Finnish Authorities Detain Crew After Undersea Internet Cable Severed

Hackread – Cybersecurity News, Data Breaches, AI, and More

Overview

A cargo ship named Fitburg has been detained by Finnish authorities following the severing of an undersea internet cable connecting Finland and Estonia. Two crew members were arrested after investigators discovered sanctioned steel on board. Authorities are now looking into whether the cable break was a result of an accident or a deliberate act that could be linked to hybrid warfare tactics. This incident raises concerns about potential threats to critical infrastructure and the security of internet communications in the region, highlighting the vulnerabilities of undersea cables that are essential for global connectivity.

Key Takeaways

  • Affected Systems: Undersea internet cable between Finland and Estonia
  • Timeline: Ongoing since the cable severance incident

Original Article Summary

After a sudden internet cable break between Finland and Estonia, authorities have seized the cargo ship Fitburg. With two crew members arrested and sanctioned steel found on board, investigators are now probing if this was an accident or a deliberate act of hybrid warfare.

Impact

Undersea internet cable between Finland and Estonia

Exploitation Status

The exploitation status is currently unknown. Monitor vendor advisories and security bulletins for updates.

Timeline

Ongoing since the cable severance incident

Remediation

Not specified

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Critical.

Related Coverage

Bitwarden NPM Package Hit in Supply Chain Attack

SecurityWeek

A recent supply chain attack has targeted the Bitwarden NPM package, linked to a group called TeamPCP. This incident draws parallels to the Shai-Hulud worm, indicating a significant threat to developers using the Bitwarden package for password management solutions. The attack raises concerns about the security of software dependencies, as malicious code can be injected into widely used packages. Developers and organizations relying on Bitwarden should be vigilant and assess their systems for any signs of compromise. The incident underscores the ongoing risks associated with supply chain attacks in the software development ecosystem.

Apr 24, 2026

PhantomRPC: A new privilege escalation technique in Windows RPC

Securelist

Researchers at Kaspersky have identified a new vulnerability in the Remote Procedure Call (RPC) architecture of Windows. This flaw allows an attacker to set up a counterfeit RPC server, which they can then use to gain elevated privileges on a target system. The implications of this vulnerability are significant, as it could enable attackers to execute malicious actions with higher access rights, potentially compromising sensitive data and system integrity. Organizations using affected systems should be vigilant and consider implementing security measures to defend against this exploitation. The discovery emphasizes the need for regular updates and security practices to mitigate such risks.

Apr 24, 2026

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

The Hacker News

A serious security vulnerability in LMDeploy, a toolkit for managing large language models, has been actively exploited less than 13 hours after being made public. This flaw, designated as CVE-2026-33626, has a CVSS score of 7.5 and involves a Server-Side Request Forgery (SSRF) issue, which attackers can use to gain access to sensitive data. This incident poses significant risks for users and organizations that rely on LMDeploy for deploying and serving machine learning models. Given the rapid exploitation of this vulnerability, companies using LMDeploy should take immediate action to safeguard their systems. The swift response from attackers emphasizes the need for stringent monitoring and prompt patching of critical vulnerabilities.

Apr 24, 2026

A study of 1,000 Android apps finds a privacy policy logging gap

Help Net Security

A recent study examining 1,000 Android apps revealed a significant disconnect between the logging practices of developers and the privacy policies drafted by legal teams. Developers often include log statements for debugging and performance tracking, but these logs may not align with what is disclosed in the apps' privacy policies. This inconsistency raises concerns about compliance with regulations like the General Data Protection Regulation (GDPR), as users may not be fully informed about the data being collected and how it's used. The findings suggest that companies need to improve communication between their development and legal teams to ensure transparency and proper user consent. This gap not only affects user trust but also increases the risk of legal repercussions for the companies involved.

Apr 24, 2026

How indirect prompt injection attacks on AI work - and 6 ways to shut them down

Latest news

Cybercriminals have discovered a method to manipulate artificial intelligence systems through indirect prompt injection attacks. This technique tricks AI into revealing sensitive information, executing harmful code, or redirecting users to malicious websites. Such attacks can potentially compromise personal data and security, affecting both individuals and organizations that rely on AI technologies. Researchers emphasize the need for robust security measures to protect against these tactics, as the implications for data privacy and system integrity are significant. Users and companies alike should be aware of these risks and implement strategies to mitigate them.

Apr 24, 2026

Vercel attack fallout expands to more customers and third-party systems

CyberScoop

Vercel has reported finding more signs of a security compromise affecting its customer base, raising concerns about potential risks to downstream systems. While the exact nature of the exposure remains unclear, the company is actively investigating the situation and working to assess the impact on its clients. This incident is significant because it may not only affect Vercel's direct customers but also third-party systems connected to them, amplifying the risk of broader security issues. Companies using Vercel's services should remain vigilant and monitor for any unusual activity as the investigation unfolds. The situation is still developing, and further updates are expected as Vercel continues to analyze the extent of the compromise.

Apr 23, 2026