The article discusses ongoing cyber espionage activities by China and Russia targeting the United States' critical infrastructure and government networks. China is reportedly stealing sensitive information and embedding tools into key systems, allowing for future leverage against the U.S. Similarly, Russia is ramping up its operations to test the resilience of American infrastructure. This situation poses significant risks not only to national security but also to the integrity of essential services that millions of people rely on. Experts emphasize the urgent need for stronger cybersecurity measures to protect against these persistent threats.
Articles tagged "Critical"
Found 579 articles
Hackread – Cybersecurity News, Data Breaches, AI, and More
Disney has agreed to pay a $10 million settlement with the Department of Justice (DOJ) and the Federal Trade Commission (FTC) for violating children's privacy laws on YouTube. The charges stem from breaches of the Children's Online Privacy Protection Act (COPPA), which mandates strict guidelines on how companies can collect and manage data from children under 13. This settlement is significant as it not only holds Disney accountable but also emphasizes the importance of protecting children's data online. In response to these violations, Disney is implementing new rules to ensure compliance with COPPA and better safeguard children's privacy. This incident serves as a reminder to all companies about the critical need to adhere to privacy regulations, especially when dealing with vulnerable populations like children.
Security Affairs
Resecurity recently caught a group known as ShinyHunters, also referred to as Scattered Lapsus$ Hunters, using decoy accounts to target various sectors including airlines, telecommunications, and law enforcement in September 2025. This detection took place through a honeypot operation, where fake accounts were set up to lure attackers. The activities of ShinyHunters are concerning as they indicate a growing trend of sophisticated cyber attacks aimed at critical industries. The group is known for stealing sensitive data and selling it on the dark web, which poses significant risks to both organizations and individuals. Resecurity's findings emphasize the need for enhanced cybersecurity measures across these sectors to prevent future breaches.
Security Affairs
The latest Security Affairs Malware newsletter outlines several concerning cybersecurity incidents. Notably, the Evasive Panda APT group has been reported to poison DNS requests to deploy MgBot, a type of malware. Additionally, there is a spear-phishing campaign that targets U.S. and allied manufacturing and healthcare organizations by exploiting vulnerabilities in the npm registry. Furthermore, details have emerged about a supply chain incident involving EmEditor, where information-stealing malware has been distributed. These incidents demonstrate the ongoing threat posed by sophisticated cyber actors, particularly in sectors critical to national security and public health.
Hackread – Cybersecurity News, Data Breaches, AI, and More
A cargo ship named Fitburg has been detained by Finnish authorities following the severing of an undersea internet cable connecting Finland and Estonia. Two crew members were arrested after investigators discovered sanctioned steel on board. Authorities are now looking into whether the cable break was a result of an accident or a deliberate act that could be linked to hybrid warfare tactics. This incident raises concerns about potential threats to critical infrastructure and the security of internet communications in the region, highlighting the vulnerabilities of undersea cables that are essential for global connectivity.
Security Affairs
The European Space Agency (ESA) has confirmed a data breach after a hacker, known as '888', attempted to sell stolen data online. The breach involved external science servers, raising concerns about the security of sensitive information related to ESA's projects. This incident highlights the risks that organizations face from cybercriminals looking to exploit vulnerabilities for financial gain. The ESA's acknowledgment of the breach indicates that they are taking steps to address the situation, but the full scope of the data compromised remains unclear. As this breach could potentially affect ongoing scientific research and collaborations, it underscores the need for robust cybersecurity measures in institutions handling critical data.
The RondoDox botnet has been identified exploiting a serious vulnerability known as React2Shell (CVE-2025-55182) to compromise Next.js servers. This flaw allows attackers to inject malware and cryptominers into systems that have not been properly secured. Organizations using Next.js frameworks are particularly at risk, as the botnet targets these servers directly. This incident underscores the necessity for companies to regularly update their software and apply security patches to prevent such attacks. The ongoing exploitation of this vulnerability poses significant risks to data integrity and can lead to unauthorized resource usage, impacting both performance and costs for affected users.
IBM has identified a serious vulnerability in its API Connect software, classified as CVE-2025-13915. Rated 9.8 out of 10 on the CVSS scale, this flaw allows remote attackers to bypass authentication, potentially granting them unauthorized access to the application. This issue poses a significant risk to organizations using API Connect, as it could lead to data breaches and other malicious activities. Users of the software are advised to take immediate action to protect their systems. With this vulnerability being so critical, it is essential for companies to stay informed and apply any necessary updates or patches as soon as they become available.
BleepingComputer
IBM has issued a warning about a serious authentication bypass vulnerability in its API Connect platform. This flaw could allow attackers to gain unauthorized access to applications remotely, putting sensitive data at risk. Businesses using this enterprise tool should prioritize applying the necessary patches to safeguard their systems. The vulnerability affects various versions of the API Connect platform, making it critical for companies to act swiftly to prevent potential breaches. Ignoring this issue could lead to significant security incidents and data compromises.
Security Affairs
CVE-2025-14847A serious vulnerability known as MongoBleed (CVE-2025-14847) was disclosed shortly after Christmas 2023, allowing attackers to remotely access and leak memory from unpatched MongoDB servers using zlib compression, without requiring any authentication. This flaw primarily affects deployments of MongoDB Server that utilize zlib network compression, a common feature in many setups. The vulnerability is significant because it exposes sensitive data stored in these databases, potentially impacting organizations across the U.S., China, and the EU. Cybersecurity experts are urging companies that use MongoDB to assess their systems for this vulnerability and apply necessary updates or patches to protect against exploitation. The situation highlights ongoing security challenges in the management of popular open-source database systems.
BleepingComputer
On December 26, 2023, the Oltenia Energy Complex, Romania's largest coal-based energy producer, fell victim to a ransomware attack attributed to the Gentlemen ransomware group. The attack severely disrupted the company's IT infrastructure, impacting its ability to operate effectively. Although specific details about the extent of the damage or data breaches have not been disclosed, the incident raises concerns about the vulnerability of critical infrastructure to cyber threats. As energy providers are essential for public services, such attacks can significantly affect energy supply and operational stability. Authorities and cybersecurity experts are likely to investigate the incident further to understand its implications and improve defenses against similar attacks in the future.
Fortinet has issued a warning about ongoing attacks that exploit an old vulnerability in its FortiOS software, identified as CVE-2020-12812. This flaw allows attackers to bypass two-factor authentication, which can significantly compromise the security of affected systems. Organizations using FortiOS should be particularly vigilant, as this vulnerability has resurfaced in active attacks. The potential for unauthorized access puts sensitive data at risk, making it critical for users to address this issue promptly. Cybersecurity teams are urged to review their systems and implement necessary updates to safeguard against these threats.
Hackread – Cybersecurity News, Data Breaches, AI, and More
Researchers have identified a critical unpatched vulnerability, designated CVE-2025-54322, in XSpeeder networking devices, which are widely used in industrial and branch environments. Approximately 70,000 devices are affected, leaving them open to potential exploitation. The flaw was discovered by AI agents, but the vendor has not addressed the alert, raising concerns about the security of these devices. This situation poses a significant risk, as attackers could exploit the vulnerability to gain unauthorized access or disrupt operations. Companies using XSpeeder devices should take immediate action to assess their security posture and implement necessary safeguards to protect their networks.
Fortinet has issued a warning about a vulnerability in FortiOS that has been around for five years but is still being exploited by attackers. This flaw allows unauthorized users to bypass two-factor authentication (2FA) on FortiGate firewalls, which are widely used by organizations to secure their networks. The continued exploitation of this vulnerability poses a significant risk to companies relying on these firewalls, as it can lead to unauthorized access and potential data breaches. Users of FortiGate firewalls are urged to take immediate action to protect their systems by applying available security updates. This situation serves as a reminder of the importance of keeping software up to date and addressing known vulnerabilities promptly.
SecurityWeek
A newly discovered vulnerability in MongoDB, referred to as MongoBleed, poses a significant risk by allowing remote attackers to extract sensitive information from affected servers without authentication. This flaw has been exploited in real-world attacks, raising alarms among organizations that utilize MongoDB for their data management. The vulnerability's ability to leak data could expose sensitive customer information, business secrets, and other critical data. Companies using MongoDB should prioritize patching their servers to mitigate potential breaches. It's crucial for users to remain vigilant and ensure their systems are secure against this emerging threat.