BeyondTrust has issued a warning about a serious vulnerability in its Remote Support (RS) and Privileged Remote Access (PRA) software. This flaw could let unauthorized attackers run arbitrary code on affected systems, posing a significant security risk. Users of these software products are strongly advised to apply the necessary patches to protect their systems from potential exploitation. The vulnerability's nature means that it could be exploited without requiring any form of authentication, making it particularly dangerous. Organizations using BeyondTrust's software should prioritize updating to secure their environments against this threat.
Articles tagged "Critical"
Found 363 articles
Help Net Security
CVE-2026-1731BeyondTrust has addressed a serious remote code execution vulnerability, identified as CVE-2026-1731, which affects its Remote Support (RS) and Privileged Remote Access (PRA) solutions. This vulnerability can be exploited without authentication, making it particularly dangerous for self-hosted customers. BeyondTrust is urging users to apply the patch immediately to protect their systems. Unlike a previous zero-day vulnerability exploited by threat actors linked to China, this issue was discovered by a security researcher and disclosed privately. The prompt action by BeyondTrust highlights the necessity for timely vulnerability management in remote access tools, which are critical for many organizations.
CyberScoop
The article discusses the challenges of AI security, emphasizing that the vulnerabilities lie beyond just cloud infrastructure. Instead, the real risks come from the complex web of supply chains, agents, and human interactions that support AI systems. This means that organizations need to focus on securing these interconnected elements to prevent potential attacks. As AI becomes more integrated into various sectors, the need for comprehensive security measures that address these broader vulnerabilities is critical. Companies must recognize that traditional security practices may not be sufficient to protect against sophisticated threats targeting these components.
Infosecurity Magazine
The Cybersecurity and Infrastructure Security Agency (CISA) has mandated that all federal agencies must decommission any edge devices that are no longer supported within the next 12 months. This directive aims to mitigate risks associated with these outdated devices, which are more susceptible to exploitation by cyber attackers. End of support devices lack critical security updates, making them a target for those looking to breach federal networks. By enforcing this rule, CISA is taking proactive steps to enhance the security posture of government systems and protect sensitive data from potential threats. Agencies must now prioritize replacing or upgrading these devices to comply with the new directive and safeguard their networks.
Security Affairs
Romania’s national oil pipeline operator, Conpet, recently experienced a cyberattack that disrupted its business systems and caused its website to go offline temporarily. As a state-controlled company responsible for transporting crude oil and liquid petroleum products, any disruption in its operations can have significant implications for the country's energy supply. The incident highlights the vulnerabilities that critical infrastructure companies face, especially in the current digital landscape where such attacks are increasingly common. While Conpet has not disclosed specific details about the attack or the extent of the damage, the incident raises concerns about the security measures in place to protect essential services from cyber threats.
Hackread – Cybersecurity News, Data Breaches, AI and More
A UK construction firm has fallen victim to an attack by the Russian Prometei botnet, as detailed by cybersecurity firm eSentire. The attack involved the use of TOR for anonymity, and attackers focused on stealing passwords and employing decoy tactics to mislead security measures. This incident raises concerns about the security of critical infrastructure in the construction sector, which may not be as fortified against cyber threats as other industries. The implications are significant, as compromised systems can lead to operational disruptions and financial losses for businesses. Companies in similar sectors should take note and assess their own cybersecurity defenses to prevent similar attacks.
SCM feed for Latest
Recent reports indicate that nearly 7.1% of skills associated with the open-source AI agent OpenClaw on the ClawHub marketplace may be exposing sensitive information such as API keys, credentials, and credit card details. This vulnerability arises from issues in the SKILL.md instructions, which guide developers on how to create and use these skills. The exposure of such critical data can lead to unauthorized access and financial fraud, impacting both developers and users who rely on these AI capabilities. It's crucial for developers to review their implementations and ensure they are safeguarding sensitive information to prevent potential exploitation. This incident serves as a reminder of the importance of secure coding practices in open-source projects.
SCM feed for Latest
Conpet, a company involved in oil and gasoline transport, fell victim to a cyberattack that compromised its corporate IT infrastructure. The Qilin ransomware group has claimed responsibility for the attack. Despite the breach, Conpet reported that its main operations remained unaffected, meaning their transport services continued without interruption. This incident raises concerns about the security of critical infrastructure sectors, as ransomware attacks can lead to significant operational disruptions and data loss. Companies in similar industries should evaluate their cybersecurity measures to protect against such threats.
On December 29, 2025, Poland's critical infrastructure faced a series of cyberattacks aimed at energy and industrial sectors, including wind and solar farms, a manufacturing company, and a combined heat and power plant. The attacks were executed by a single threat actor, as confirmed by Poland's national computer emergency response team, CERT Polska. Fortunately, these incidents were purely destructive and did not disrupt energy generation or distribution. The attackers gained access through exposed VPN connections, raising concerns about the security practices in place across the nation’s energy sector. This incident serves as a reminder of the vulnerabilities that can exist in critical infrastructure systems, emphasizing the need for improved cybersecurity measures.
BleepingComputer
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has mandated that federal agencies must identify and remove outdated network edge devices that no longer receive security updates from their manufacturers. This directive is critical because such devices can pose significant security risks if they are not regularly updated to protect against vulnerabilities. Edge devices, which connect internal networks to external ones, can be entry points for attackers if they are not properly maintained. The CISA's move aims to bolster the security posture of federal networks by ensuring that all devices are up-to-date and protected against known threats. Agencies are now required to take action to ensure compliance with this directive to safeguard sensitive data and maintain national security.
The House panel has approved five bills aimed at strengthening cybersecurity defenses in the energy sector. This decision follows the Department of Energy's recent Liberty Eclipse cybersecurity exercise, which evaluated the sector's readiness against cyber threats. These legislative measures are designed to enhance the security infrastructure of energy companies, which are increasingly targeted by cyberattacks. The move underscores the government's recognition of the energy sector's vulnerability and the need for improved protective measures to safeguard critical infrastructure. This legislative push is significant as it reflects ongoing concerns about the potential impact of cyber incidents on energy supplies and national security.
A significant vulnerability has been found in SmarterMail, a popular email server software, which allows attackers to execute arbitrary code remotely without needing authentication. This flaw has already been exploited in ransomware attacks, raising concerns for organizations that rely on this software. Attackers can send specially crafted HTTP requests to take control of affected systems, potentially leading to data breaches and operational disruptions. Users and administrators of SmarterMail are urged to take immediate action to protect their systems. The situation is critical as the vulnerability is currently being exploited in the wild, making prompt remediation essential.
SCM feed for Latest
n8n, an open-source automation platform, is facing serious security issues due to two critical vulnerabilities that allow attackers to escape the platform's sandbox. These flaws could potentially give attackers complete control over the server and lead to the compromise of user credentials. Users of n8n should be particularly concerned as these vulnerabilities pose a high risk of server takeover. The discovery of these issues raises alarms for organizations relying on n8n for AI orchestration, highlighting the need for immediate action to secure their systems. It's crucial for affected users to stay informed and apply any necessary updates to mitigate risks.
Security Affairs
Italy's Foreign Minister Antonio Tajani announced that the country successfully thwarted a series of cyberattacks linked to a pro-Russian group known as Noname057(16). These attacks targeted various entities, including the Foreign Ministry offices, with one affecting operations in Washington, D.C. Additionally, the group aimed at disrupting websites and hotels associated with the upcoming Milano Cortina 2026 Winter Olympics. This incident highlights ongoing cybersecurity concerns related to geopolitical tensions, particularly as major international events approach. The Italian government’s proactive measures demonstrate the importance of safeguarding critical infrastructure and national security against external threats.
BleepingComputer
Conpet, Romania's national oil pipeline operator, reported a cyberattack on Tuesday that disrupted its business operations and took down its website. The attack affected the company’s ability to manage its systems effectively, although details on the type of attack or the perpetrators have not been disclosed. This incident raises concerns about the security of critical infrastructure, particularly in the energy sector, where such attacks can have significant implications for supply chains and national security. As authorities investigate, it’s crucial for companies in similar sectors to review their cybersecurity measures to prevent similar disruptions in the future.