Articles tagged "Critical"

Found 579 articles

The article discusses ongoing cyber espionage activities by China and Russia targeting the United States' critical infrastructure and government networks. China is reportedly stealing sensitive information and embedding tools into key systems, allowing for future leverage against the U.S. Similarly, Russia is ramping up its operations to test the resilience of American infrastructure. This situation poses significant risks not only to national security but also to the integrity of essential services that millions of people rely on. Experts emphasize the urgent need for stronger cybersecurity measures to protect against these persistent threats.

Impact: United States critical infrastructure, federal government networks
Remediation: Strengthening cybersecurity protocols, increasing monitoring of critical systems, and implementing advanced threat detection solutions.
Read Original
Disney Fined $10M for Violating Children’s Privacy Laws on YouTube

Hackread – Cybersecurity News, Data Breaches, AI, and More

Disney has agreed to pay a $10 million settlement with the Department of Justice (DOJ) and the Federal Trade Commission (FTC) for violating children's privacy laws on YouTube. The charges stem from breaches of the Children's Online Privacy Protection Act (COPPA), which mandates strict guidelines on how companies can collect and manage data from children under 13. This settlement is significant as it not only holds Disney accountable but also emphasizes the importance of protecting children's data online. In response to these violations, Disney is implementing new rules to ensure compliance with COPPA and better safeguard children's privacy. This incident serves as a reminder to all companies about the critical need to adhere to privacy regulations, especially when dealing with vulnerable populations like children.

Impact: YouTube, Disney's online platforms
Remediation: Disney is implementing new rules to comply with COPPA and better protect children's privacy.
Read Original
Actively Exploited

Resecurity recently caught a group known as ShinyHunters, also referred to as Scattered Lapsus$ Hunters, using decoy accounts to target various sectors including airlines, telecommunications, and law enforcement in September 2025. This detection took place through a honeypot operation, where fake accounts were set up to lure attackers. The activities of ShinyHunters are concerning as they indicate a growing trend of sophisticated cyber attacks aimed at critical industries. The group is known for stealing sensitive data and selling it on the dark web, which poses significant risks to both organizations and individuals. Resecurity's findings emphasize the need for enhanced cybersecurity measures across these sectors to prevent future breaches.

Impact: Airlines, telecommunications, law enforcement agencies
Remediation: Organizations should implement advanced monitoring systems to detect decoy account usage and enhance security protocols to protect sensitive data.
Read Original
Actively Exploited

The latest Security Affairs Malware newsletter outlines several concerning cybersecurity incidents. Notably, the Evasive Panda APT group has been reported to poison DNS requests to deploy MgBot, a type of malware. Additionally, there is a spear-phishing campaign that targets U.S. and allied manufacturing and healthcare organizations by exploiting vulnerabilities in the npm registry. Furthermore, details have emerged about a supply chain incident involving EmEditor, where information-stealing malware has been distributed. These incidents demonstrate the ongoing threat posed by sophisticated cyber actors, particularly in sectors critical to national security and public health.

Impact: MgBot malware, npm registry, EmEditor software
Remediation: Organizations should enhance their email filtering, monitor DNS traffic for unusual activities, and ensure software is updated to the latest versions. Specific patches or updates were not mentioned.
Read Original
Finnish Authorities Detain Crew After Undersea Internet Cable Severed

Hackread – Cybersecurity News, Data Breaches, AI, and More

A cargo ship named Fitburg has been detained by Finnish authorities following the severing of an undersea internet cable connecting Finland and Estonia. Two crew members were arrested after investigators discovered sanctioned steel on board. Authorities are now looking into whether the cable break was a result of an accident or a deliberate act that could be linked to hybrid warfare tactics. This incident raises concerns about potential threats to critical infrastructure and the security of internet communications in the region, highlighting the vulnerabilities of undersea cables that are essential for global connectivity.

Impact: Undersea internet cable between Finland and Estonia
Remediation: N/A
Read Original

The European Space Agency (ESA) has confirmed a data breach after a hacker, known as '888', attempted to sell stolen data online. The breach involved external science servers, raising concerns about the security of sensitive information related to ESA's projects. This incident highlights the risks that organizations face from cybercriminals looking to exploit vulnerabilities for financial gain. The ESA's acknowledgment of the breach indicates that they are taking steps to address the situation, but the full scope of the data compromised remains unclear. As this breach could potentially affect ongoing scientific research and collaborations, it underscores the need for robust cybersecurity measures in institutions handling critical data.

Impact: European Space Agency external science servers
Remediation: N/A
Read Original

The RondoDox botnet has been identified exploiting a serious vulnerability known as React2Shell (CVE-2025-55182) to compromise Next.js servers. This flaw allows attackers to inject malware and cryptominers into systems that have not been properly secured. Organizations using Next.js frameworks are particularly at risk, as the botnet targets these servers directly. This incident underscores the necessity for companies to regularly update their software and apply security patches to prevent such attacks. The ongoing exploitation of this vulnerability poses significant risks to data integrity and can lead to unauthorized resource usage, impacting both performance and costs for affected users.

Impact: Next.js servers, specifically those vulnerable to the React2Shell flaw (CVE-2025-55182)
Remediation: Organizations should immediately update their Next.js servers to the latest version that addresses the React2Shell vulnerability. Regularly applying security patches and conducting vulnerability assessments are also recommended to mitigate risks from similar exploits.
Read Original

IBM has identified a serious vulnerability in its API Connect software, classified as CVE-2025-13915. Rated 9.8 out of 10 on the CVSS scale, this flaw allows remote attackers to bypass authentication, potentially granting them unauthorized access to the application. This issue poses a significant risk to organizations using API Connect, as it could lead to data breaches and other malicious activities. Users of the software are advised to take immediate action to protect their systems. With this vulnerability being so critical, it is essential for companies to stay informed and apply any necessary updates or patches as soon as they become available.

Impact: IBM API Connect
Remediation: Organizations should monitor for updates and apply patches from IBM as soon as they are released. It's also recommended to review authentication mechanisms and consider implementing additional security measures to mitigate risks until a patch is available.
Read Original

IBM has issued a warning about a serious authentication bypass vulnerability in its API Connect platform. This flaw could allow attackers to gain unauthorized access to applications remotely, putting sensitive data at risk. Businesses using this enterprise tool should prioritize applying the necessary patches to safeguard their systems. The vulnerability affects various versions of the API Connect platform, making it critical for companies to act swiftly to prevent potential breaches. Ignoring this issue could lead to significant security incidents and data compromises.

Impact: IBM API Connect enterprise platform
Remediation: Customers are urged to apply the latest patches provided by IBM to mitigate the vulnerability.
Read Original

A serious vulnerability known as MongoBleed (CVE-2025-14847) was disclosed shortly after Christmas 2023, allowing attackers to remotely access and leak memory from unpatched MongoDB servers using zlib compression, without requiring any authentication. This flaw primarily affects deployments of MongoDB Server that utilize zlib network compression, a common feature in many setups. The vulnerability is significant because it exposes sensitive data stored in these databases, potentially impacting organizations across the U.S., China, and the EU. Cybersecurity experts are urging companies that use MongoDB to assess their systems for this vulnerability and apply necessary updates or patches to protect against exploitation. The situation highlights ongoing security challenges in the management of popular open-source database systems.

Impact: MongoDB Server deployments using zlib network compression
Remediation: Organizations should immediately patch their MongoDB servers to the latest version that addresses this vulnerability. Additionally, disabling zlib compression on affected servers can mitigate the risk until a patch is applied. Regular security audits and updates are recommended to ensure all systems remain secure.
Read Original

On December 26, 2023, the Oltenia Energy Complex, Romania's largest coal-based energy producer, fell victim to a ransomware attack attributed to the Gentlemen ransomware group. The attack severely disrupted the company's IT infrastructure, impacting its ability to operate effectively. Although specific details about the extent of the damage or data breaches have not been disclosed, the incident raises concerns about the vulnerability of critical infrastructure to cyber threats. As energy providers are essential for public services, such attacks can significantly affect energy supply and operational stability. Authorities and cybersecurity experts are likely to investigate the incident further to understand its implications and improve defenses against similar attacks in the future.

Impact: Oltenia Energy Complex IT infrastructure
Remediation: N/A
Read Original

Fortinet has issued a warning about ongoing attacks that exploit an old vulnerability in its FortiOS software, identified as CVE-2020-12812. This flaw allows attackers to bypass two-factor authentication, which can significantly compromise the security of affected systems. Organizations using FortiOS should be particularly vigilant, as this vulnerability has resurfaced in active attacks. The potential for unauthorized access puts sensitive data at risk, making it critical for users to address this issue promptly. Cybersecurity teams are urged to review their systems and implement necessary updates to safeguard against these threats.

Impact: FortiOS versions that are vulnerable to CVE-2020-12812, particularly those configured with two-factor authentication.
Remediation: Users should apply the latest patches for FortiOS as provided by Fortinet. It is also recommended to review and strengthen two-factor authentication configurations and monitor system access logs for any suspicious activities.
Read Original
Critical 0day flaw Exposes 70k XSpeeder Devices as Vendor Ignores Alert

Hackread – Cybersecurity News, Data Breaches, AI, and More

Researchers have identified a critical unpatched vulnerability, designated CVE-2025-54322, in XSpeeder networking devices, which are widely used in industrial and branch environments. Approximately 70,000 devices are affected, leaving them open to potential exploitation. The flaw was discovered by AI agents, but the vendor has not addressed the alert, raising concerns about the security of these devices. This situation poses a significant risk, as attackers could exploit the vulnerability to gain unauthorized access or disrupt operations. Companies using XSpeeder devices should take immediate action to assess their security posture and implement necessary safeguards to protect their networks.

Impact: XSpeeder networking devices, approximately 70,000 units in industrial and branch settings.
Remediation: Companies should evaluate their XSpeeder devices for potential exposure and consider implementing network segmentation and monitoring to mitigate risks. Regularly updating security protocols and reviewing access controls can also help protect against exploitation until a patch is made available.
Read Original

Fortinet has issued a warning about a vulnerability in FortiOS that has been around for five years but is still being exploited by attackers. This flaw allows unauthorized users to bypass two-factor authentication (2FA) on FortiGate firewalls, which are widely used by organizations to secure their networks. The continued exploitation of this vulnerability poses a significant risk to companies relying on these firewalls, as it can lead to unauthorized access and potential data breaches. Users of FortiGate firewalls are urged to take immediate action to protect their systems by applying available security updates. This situation serves as a reminder of the importance of keeping software up to date and addressing known vulnerabilities promptly.

Impact: FortiGate firewalls running FortiOS
Remediation: Users should apply the latest security patches from Fortinet to mitigate this vulnerability.
Read Original

A newly discovered vulnerability in MongoDB, referred to as MongoBleed, poses a significant risk by allowing remote attackers to extract sensitive information from affected servers without authentication. This flaw has been exploited in real-world attacks, raising alarms among organizations that utilize MongoDB for their data management. The vulnerability's ability to leak data could expose sensitive customer information, business secrets, and other critical data. Companies using MongoDB should prioritize patching their servers to mitigate potential breaches. It's crucial for users to remain vigilant and ensure their systems are secure against this emerging threat.

Impact: MongoDB servers
Remediation: Organizations should apply security patches provided by MongoDB and follow best practices for securing their databases.
Read Original
PreviousPage 30 of 39Next