Articles tagged "Critical"

Found 579 articles

ServiceNow has addressed a significant flaw in its AI platform that could allow attackers to impersonate users. The company claims there is no evidence that this vulnerability was exploited before the patch was released in October. However, security researchers warn that the configuration of AI agents could still lead to prompt-injection style abuses, which could potentially compromise user accounts. This situation raises concerns about the security of AI systems and the risks they pose if not properly configured. Organizations using ServiceNow's AI features should ensure they implement the latest updates to mitigate any potential risks.

Impact: ServiceNow AI platform
Remediation: ServiceNow released a patch in October 2023 to address the vulnerability.
Read Original

A Dutch appeals court has sentenced a 44-year-old hacker to seven years in prison for his role in hacking port systems to facilitate the smuggling of cocaine through European logistics hubs. The hacker exploited vulnerabilities in port networks to help traffickers move drugs into the Netherlands, highlighting a significant intersection of cybersecurity and organized crime. This case underscores the potential dangers of cyber intrusions in critical infrastructure, as they can be manipulated for illegal activities. The ruling reflects growing legal actions against cybercriminals and aims to deter similar offenses in the future. The incident raises awareness about the importance of securing logistical and transportation networks against cyber threats, which can have far-reaching implications beyond just financial losses.

Impact: Port systems, logistics hubs in Europe
Remediation: N/A
Read Original

Experts are warning that power outages in IT and operational technology (OT) systems could lead to significant cybersecurity issues by 2026. These power gaps may turn minor outages into major crises, affecting the reliability and security of critical infrastructure. Companies that rely heavily on interconnected IT and OT systems should be particularly concerned, as the potential for cyberattacks increases during power failures. If attackers take advantage of these vulnerabilities, they could disrupt services, compromise data, or even cause physical damage. This situation highlights the need for organizations to bolster their cybersecurity measures and prepare for the challenges posed by electrical failures.

Impact: IT and OT systems, critical infrastructure
Remediation: Companies should enhance their cybersecurity protocols and prepare contingency plans for outages.
Read Original

A 44-year-old man has been sentenced to prison for installing remote access malware on the systems of a logistics company in the Netherlands. He was able to carry out this cyberattack with assistance from some employees of the firm. The malware allowed him to gain unauthorized access to sensitive information, raising serious concerns about insider threats and the security of critical infrastructure. This incident serves as a reminder for companies to strengthen their cybersecurity measures and ensure that employees are aware of the risks associated with insider collaboration. The case highlights the increasing need for vigilance in protecting sensitive systems from both external and internal threats.

Impact: Logistics company systems, remote access malware
Remediation: Companies should enhance employee training on cybersecurity risks and implement stricter access controls to prevent insider threats.
Read Original

ServiceNow has reported a serious security vulnerability in its AI Platform that could allow an unauthenticated user to impersonate another user and take actions on their behalf. This flaw, identified as CVE-2025-12420, has a high severity rating of 9.3 out of 10, indicating a significant risk to users. The potential for impersonation means that attackers could exploit this weakness to gain unauthorized access to sensitive information or perform harmful actions. Organizations using ServiceNow's AI Platform should prioritize applying the patch to mitigate this risk and protect their users. The quick response from ServiceNow in addressing this vulnerability is crucial to maintaining trust in their services.

Impact: ServiceNow AI Platform
Remediation: ServiceNow has released a patch to address this vulnerability. Users are advised to apply the update as soon as possible to prevent any potential exploitation.
Read Original

A 44-year-old Dutch man has been sentenced to seven years in prison for hacking into the ports of Rotterdam and Antwerp, two of Europe's busiest ports. The Amsterdam Court of Appeal found him guilty of multiple offenses, including computer hacking and attempted extortion. His actions raised significant concerns about the security of critical infrastructure, as port operations are vital for trade and logistics. The case serves as a stark reminder of the potential risks posed by cybercriminals to essential services and the economy. Authorities hope this sentence will deter similar attacks in the future.

Impact: Rotterdam and Antwerp ports
Remediation: N/A
Read Original

APT28, a hacking group believed to be linked to Russia, has been actively targeting energy and defense organizations associated with NATO for the past year. Their primary focus has been on credential harvesting, which involves stealing usernames and passwords to gain unauthorized access to sensitive systems. This group's activities are concerning as they threaten critical infrastructure and national security, particularly in the context of ongoing geopolitical tensions. Companies in the energy and defense sectors should remain vigilant and enhance their security measures to protect against these sophisticated attacks. The sustained campaign by APT28 indicates a persistent risk that organizations must address to safeguard their data and operations.

Impact: Energy and defense organizations connected to NATO
Remediation: Organizations should enhance security measures, implement multi-factor authentication, and conduct regular security audits.
Read Original

In August 2025, the University of Hawaii's Cancer Center experienced a ransomware attack that compromised sensitive data belonging to study participants. The breach included historical documents dating back to the 1990s, which contained Social Security numbers. This incident raises significant concerns about the protection of personal information in medical research, particularly as the stolen data can be used for identity theft and fraud. The university is now facing the challenge of addressing the fallout from this breach, including notifying affected individuals and enhancing their cybersecurity measures to prevent future incidents. As healthcare institutions increasingly rely on digital systems, the need for robust data protection strategies has never been more critical.

Impact: University of Hawaii Cancer Center data, study participant information, Social Security numbers
Remediation: N/A
Read Original

APT28, a Russian cyber espionage group, has been observed targeting entities involved in energy research and defense collaboration. The group has employed tactics that involve impersonating well-known webmail and VPN services, including Microsoft OWA, Google, and Sophos VPN portals, to deceive users into revealing sensitive information. This attack is significant as it aims to infiltrate organizations that play a critical role in energy security and defense, potentially leading to the theft of valuable research and intelligence. The ongoing nature of these attacks poses a serious risk to national security and the integrity of the affected sectors, highlighting the need for organizations to enhance their cybersecurity measures. Users should be cautious and verify the authenticity of services before entering any sensitive information.

Impact: Microsoft OWA, Google services, Sophos VPN
Remediation: Organizations should implement multi-factor authentication, educate users on recognizing phishing attempts, and ensure that all software is up to date with the latest security patches.
Read Original

APT28, a cyberespionage group linked to Russia, has been targeting organizations in Turkey, Europe, North Macedonia, and Uzbekistan with credential-harvesting attacks from February to September 2025. This group, also known as Fancy Bear, has focused on personnel involved in energy, nuclear sectors, and policy-making. The attacks have included attempts to steal login credentials from staff at Turkish energy and nuclear agencies, as well as from European think tanks. Such activities pose significant risks to national security and critical infrastructure, highlighting the ongoing threat posed by state-sponsored cyber actors. Organizations in the targeted regions need to enhance their cybersecurity measures to protect sensitive information from these sophisticated attacks.

Impact: Turkish energy and nuclear agencies, European think tanks, organizations in North Macedonia and Uzbekistan
Remediation: Organizations should implement strong authentication measures, conduct regular security training for staff, and monitor for unusual account activity.
Read Original

In an interview, Hans Quivooij, the Chief Information Security Officer at Damen Shipyards Group, discusses the unique cybersecurity challenges faced by shipyards that operate on a project basis. He emphasizes that the combination of long-term industrial equipment with short-term projects and rotating contractors complicates access control and increases the threat surface. Quivooij points out that integrating IT and operational technology (OT) systems can introduce additional risks, especially in legacy environments that may lack adequate visibility. This situation is critical for shipyards as it affects their ability to secure sensitive operational data and maintain safety standards. As the shipbuilding industry evolves, understanding these complexities is essential for protecting against potential cyber threats.

Impact: Shipyards, operational technology (OT), industrial control systems (ICS)
Remediation: Implement robust access control measures, enhance visibility in legacy environments, ensure proper integration of IT and OT systems
Read Original

MuddyWater, an Iranian hacking group, has launched a spear-phishing campaign targeting various sectors in the Middle East, including diplomatic, maritime, financial, and telecom organizations. The attackers are using malicious Word documents that employ icon spoofing to trick users into activating a Rust-based remote access tool (RAT) known as RustyWater. This malware allows for asynchronous command and control, registry persistence, and anti-analysis capabilities, making it difficult for victims to detect and remove. The implications of this campaign are significant, as it could compromise sensitive information and disrupt critical infrastructure in the affected sectors. Organizations in these areas should be vigilant and enhance their cybersecurity measures to protect against such targeted attacks.

Impact: Diplomatic, maritime, financial, and telecom sectors in the Middle East
Remediation: Organizations should implement strong email filtering, conduct security awareness training for employees, and ensure that all systems are up to date with the latest security patches.
Read Original

The recent death of Aldrich Ames, a former CIA officer who turned spy for the Soviet Union, serves as a stark reminder of the dangers posed by insider threats in organizations. Ames’ actions, which led to the exposure and execution of several American agents, demonstrate how critical it is for organizations, especially in sensitive sectors like intelligence, to monitor employee behaviors and attitudes. By understanding the signs of stress and potential discontent among employees, companies can better anticipate and manage risks from insiders. This incident underscores the importance of fostering a workplace environment that addresses employee concerns before they escalate into serious security breaches. Recognizing and addressing potential insider threats can help protect sensitive information and maintain organizational integrity.

Impact: N/A
Remediation: N/A
Read Original

Coolify, a popular open-source self-hosting platform, has reported 11 serious security vulnerabilities that could be exploited by attackers. These flaws could allow unauthorized users to bypass authentication, execute remote code, and potentially take control of affected servers. This is a significant concern for anyone using Coolify for their hosting needs, as it puts sensitive data and server integrity at risk. The vulnerabilities highlight the importance of regular security assessments and timely updates in open-source software. Users are advised to monitor the situation closely and apply any available patches as soon as they are released.

Impact: Coolify platform
Remediation: Users should apply patches as they become available and review their security configurations.
Read Original

Trend Micro has released patches for a significant code execution vulnerability in its Apex Central product. This flaw could allow attackers to execute arbitrary code, putting systems at risk. Tenable has since provided proof-of-concept code and technical details, which could assist malicious actors in exploiting the vulnerability if users do not update their systems promptly. Companies using Apex Central need to apply the patches to protect their networks from potential attacks. The urgency of this update is underscored by the fact that vulnerabilities of this nature can lead to serious breaches if left unaddressed.

Impact: Apex Central
Remediation: Patches available from Trend Micro for the vulnerabilities in Apex Central.
Read Original
PreviousPage 27 of 39Next