Articles tagged "Critical"

Found 576 articles

Hackers have been exploiting a serious vulnerability in the React Native CLI, identified as CVE-2025-11953, to execute remote commands and deploy stealthy Rust-based malware. This flaw arises from the React Native CLI's Metro server, which, by default, binds to external interfaces, making it susceptible to unauthorized access. This exploitation occurred weeks before the vulnerability was publicly disclosed, indicating that attackers are actively targeting this weakness. Users of React Native should be particularly vigilant, as the impact could extend to various applications built on this framework. Prompt action is necessary to secure affected systems and prevent further malicious activities.

Impact: React Native CLI, Metro server
Remediation: Users should immediately restrict access to the Metro server by modifying configuration settings to bind only to local interfaces. Additionally, they should monitor their systems for any signs of unauthorized access or malware installation. Regular updates and patches from React Native should be applied as they become available.
Read Original

A newly discovered vulnerability in React Native has been exploited in the wild, allowing attackers to disable security protections and deliver malware to affected devices. This flaw, which was previously thought to be a theoretical risk, has now raised alarms among developers and users of applications built with React Native. The impact of this vulnerability can be significant, as it compromises the integrity and security of applications, potentially affecting millions of users. Developers are urged to take immediate action to secure their applications and protect user data from malicious exploitation.

Impact: React Native applications, including those developed by various companies using this framework.
Remediation: Developers should apply security patches provided by React Native, review their application code for vulnerabilities, and enhance security measures to prevent unauthorized access. Regularly updating to the latest versions of React Native is also advised.
Read Original

A serious security vulnerability, identified as CVE-2025-11953 and nicknamed Metro4Shell, has been discovered in the Metro Development Server, which is part of the '@react-native-community/cli' npm package. This flaw, rated 9.8 on the CVSS scale, allows remote attackers to execute arbitrary code without authentication. Researchers from VulnCheck first detected active exploitation of this vulnerability on December 21, 2025. This poses a significant risk for developers and organizations using this package, as it could lead to unauthorized control over their systems. Users of the affected npm package need to take immediate action to protect their applications.

Impact: Metro Development Server in the '@react-native-community/cli' npm package.
Remediation: Developers should update their '@react-native-community/cli' package to the latest version to mitigate the vulnerability. They should also review their server configurations and implement security best practices to limit exposure to such attacks.
Read Original

The manufacturing industry in the U.S. is facing increasing cybersecurity threats, particularly from intensified cyberattacks believed to be originating from China. In response to these growing risks, manufacturing firms are coming together to strengthen their cybersecurity efforts through the Manufacturing Information Sharing and Analysis Center (ISAC). This collaboration aims to enhance the sharing of information about potential threats and vulnerabilities among companies within the sector. As critical infrastructure becomes more targeted by malicious actors, these partnerships are essential for protecting sensitive data and ensuring operational continuity. The move reflects a recognition that collective defense strategies are crucial in combating sophisticated cyber threats.

Impact: Manufacturing sector, critical infrastructure
Remediation: N/A
Read Original

Tulsa International Airport has reportedly been compromised by the Qilin ransomware group, which claims to have stolen more than a dozen files from the airport's internal systems. This incident raises concerns about the security of critical infrastructure, as airports handle sensitive data and operations that are vital for public safety and travel. The breach could potentially disrupt airport operations or expose personal information of employees and travelers. As ransomware attacks continue to target essential services, this incident serves as a reminder for organizations to bolster their cybersecurity measures against increasing threats from cybercriminals. The situation is still developing, and further details regarding the extent of the breach and its implications are awaited.

Impact: Tulsa International Airport internal network systems
Remediation: N/A
Read Original

Iranian hackers have utilized artificial intelligence to carry out cyberattacks targeting individuals and organizations that have reported on human rights abuses amid ongoing protests in the country. This campaign, known as RedKitten, aims to intimidate and silence voices critical of the Iranian government. The use of large language models in these attacks indicates a shift in tactics, as attackers look to enhance their capabilities in spreading misinformation and conducting surveillance. Those affected include non-governmental organizations, activists, and journalists who are documenting the protests and human rights violations. This development raises significant concerns about the intersection of technology and state-sponsored aggression, particularly in how it can stifle dissent and manipulate narratives during critical social movements.

Impact: Individuals and non-governmental organizations reporting human rights abuses in Iran.
Remediation: Organizations should enhance their cybersecurity measures, including employee training on recognizing phishing attempts and employing robust monitoring tools to detect unusual activities.
Read Original

As federal agencies like the Cybersecurity and Infrastructure Security Agency (CISA) scale back their support for election security, state officials are feeling the pressure to fill the gap. Secretaries of State across the country are now seeking alternative cybersecurity services to protect their election systems. This shift comes at a time when many states are still working to bolster their defenses following past election interference incidents. The lack of federal resources means states will need to rely more on their own budgets and local expertise, which could lead to disparities in security measures across the nation. Ensuring safe and secure elections is critical for maintaining public trust in the electoral process.

Impact: Election systems, state cybersecurity resources
Remediation: States are advised to seek local cybersecurity services and allocate budget for election security improvements.
Read Original

The National Security Agency (NSA) has released new guidelines aimed at helping organizations implement Zero Trust security models effectively. This approach focuses on minimizing trust assumptions within networks, requiring strict verification for every user and device attempting to access resources. The guidelines are designed for organizations looking to reach a target-level maturity in their Zero Trust practices, which is increasingly important as cyber threats evolve. By adopting these recommendations, companies can better protect their sensitive data and systems from unauthorized access. This is particularly relevant for sectors handling critical infrastructure or sensitive information.

Impact: N/A
Remediation: Organizations should follow the NSA's guidelines for Zero Trust implementation.
Read Original
Ivanti Issues Urgent Fix for Critical Zero-Day Flaws Under Active Attack

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Ivanti has reported two serious vulnerabilities in its Endpoint Manager Mobile (EPMM) software, identified as CVE-2026-1281 and CVE-2026-1340. These flaws allow remote code execution, meaning attackers could potentially take control of affected systems without needing physical access. The company warns that these vulnerabilities are currently being actively exploited, putting users at risk. Organizations using EPMM should prioritize applying the necessary security updates to safeguard their systems. Failure to address these vulnerabilities could lead to significant security breaches, affecting both the integrity of user data and the overall security posture of the organization.

Impact: Ivanti Endpoint Manager Mobile (EPMM) software
Remediation: Users should apply the latest patches provided by Ivanti for EPMM to mitigate the vulnerabilities. Specific patch numbers or versions were not mentioned in the article, but it is critical to ensure that the software is updated to the latest version available.
Read Original

Poland's Computer Emergency Response Team (CERT) has reported a serious cyberattack on the country's energy facilities. The attack involved the exploitation of default credentials in industrial control systems (ICS), which allowed attackers to gain unauthorized access and cause significant disruptions. This incident raises concerns about the security of critical infrastructure, particularly as it highlights the risks associated with using default login information. The targeted energy facilities are crucial for Poland's power supply, and any breach in their security can have widespread implications for both the economy and public safety. The report also suggests that this attack may be part of a broader trend of cyber threats aimed at critical infrastructure worldwide.

Impact: Polish energy facilities, industrial control systems (ICS)
Remediation: Organizations should change default credentials immediately, implement stronger access controls, and regularly update their security protocols for ICS.
Read Original

Japan and Britain are stepping up their collaboration on cybersecurity and the supply of critical minerals in response to growing concerns over China's influence in the region. This partnership aims to enhance both countries' resilience against potential cyber threats and secure essential resources that are vital for technology and defense sectors. The agreement comes amid increasing geopolitical tensions and highlights the need for nations to work together to protect their infrastructure and supply chains. By sharing expertise and resources, Japan and Britain aim to bolster their defenses and ensure a stable supply of critical minerals, which are crucial for various industries, including electronics and renewable energy.

Impact: Critical minerals supply chains, cybersecurity infrastructure
Remediation: N/A
Read Original

The latest edition of the Security Affairs newsletter covers several significant cybersecurity developments. Notably, the Department of Justice has released information about a skilled hacker allegedly working for Jeffrey Epstein, raising concerns about the implications of such associations for cybersecurity. Additionally, cyberattacks have disrupted communication systems at Wind and Solar companies, highlighting vulnerabilities in critical infrastructure. These incidents underscore the ongoing risks that hackers pose to both individuals and organizations, particularly in sectors that are essential for energy generation and distribution. As these stories unfold, they serve as a reminder for companies to enhance their security measures and for users to remain vigilant against potential threats.

Impact: Wind and Solar communications systems
Remediation: Companies should review and strengthen their cybersecurity protocols, particularly in critical infrastructure.
Read Original

On December 29, 2025, Poland experienced a wave of cyberattacks that targeted more than 30 wind and solar farms, a manufacturing facility, and a significant combined heat and power (CHP) plant. This CHP plant is crucial as it supplies heat to nearly 500,000 residents. CERT Polska reported that these coordinated attacks disrupted operations, raising concerns about the security of renewable energy sources and critical infrastructure. The impact of these attacks could have far-reaching consequences, not only affecting energy supply but also potentially leading to economic losses and undermining public trust in energy providers. As the world moves towards greener energy solutions, safeguarding these facilities from cyber threats is increasingly important.

Impact: Wind farms, solar farms, manufacturing company, combined heat and power plant
Remediation: N/A
Read Original

According to Government Technology, the number of recorded data breaches soared to 3,322 last year, marking the highest level ever documented. Alarmingly, about 70% of the breach notices lacked essential details about the incidents, leaving users and stakeholders in the dark about the nature of the breaches and the extent of the data compromised. This lack of transparency is concerning, as it prevents affected individuals from understanding their risks and taking necessary precautions. The surge in breaches indicates a growing vulnerability landscape, which raises questions about the effectiveness of current security measures across various sectors. As organizations continue to face increasing cyber threats, the need for clearer communication and accountability in breach disclosures becomes ever more critical.

Impact: N/A
Remediation: N/A
Read Original

OpenSSL has patched 12 vulnerabilities, including a critical remote code execution (RCE) flaw that poses a significant risk to users. These vulnerabilities mainly arise from issues related to memory safety, parsing robustness, and resource handling. Affected products include various versions of OpenSSL, which is widely used across different platforms and applications. This is particularly concerning for organizations that rely on OpenSSL for secure communications, as attackers could exploit these flaws to gain unauthorized access or control over systems. Users and administrators are urged to apply the latest patches to mitigate these risks and protect their systems from potential exploitation.

Impact: OpenSSL versions affected include 1.0.2, 1.1.1, and 3.0.0.
Remediation: Users should update to the latest version of OpenSSL to address these vulnerabilities. Specific patch numbers were not provided.
Read Original
PreviousPage 19 of 39Next