Articles tagged "Critical"

Found 363 articles

The manufacturing industry in the U.S. is facing increasing cybersecurity threats, particularly from intensified cyberattacks believed to be originating from China. In response to these growing risks, manufacturing firms are coming together to strengthen their cybersecurity efforts through the Manufacturing Information Sharing and Analysis Center (ISAC). This collaboration aims to enhance the sharing of information about potential threats and vulnerabilities among companies within the sector. As critical infrastructure becomes more targeted by malicious actors, these partnerships are essential for protecting sensitive data and ensuring operational continuity. The move reflects a recognition that collective defense strategies are crucial in combating sophisticated cyber threats.

Impact: Manufacturing sector, critical infrastructure
Remediation: N/A
Read Original

Tulsa International Airport has reportedly been compromised by the Qilin ransomware group, which claims to have stolen more than a dozen files from the airport's internal systems. This incident raises concerns about the security of critical infrastructure, as airports handle sensitive data and operations that are vital for public safety and travel. The breach could potentially disrupt airport operations or expose personal information of employees and travelers. As ransomware attacks continue to target essential services, this incident serves as a reminder for organizations to bolster their cybersecurity measures against increasing threats from cybercriminals. The situation is still developing, and further details regarding the extent of the breach and its implications are awaited.

Impact: Tulsa International Airport internal network systems
Remediation: N/A
Read Original

Iranian hackers have utilized artificial intelligence to carry out cyberattacks targeting individuals and organizations that have reported on human rights abuses amid ongoing protests in the country. This campaign, known as RedKitten, aims to intimidate and silence voices critical of the Iranian government. The use of large language models in these attacks indicates a shift in tactics, as attackers look to enhance their capabilities in spreading misinformation and conducting surveillance. Those affected include non-governmental organizations, activists, and journalists who are documenting the protests and human rights violations. This development raises significant concerns about the intersection of technology and state-sponsored aggression, particularly in how it can stifle dissent and manipulate narratives during critical social movements.

Impact: Individuals and non-governmental organizations reporting human rights abuses in Iran.
Remediation: Organizations should enhance their cybersecurity measures, including employee training on recognizing phishing attempts and employing robust monitoring tools to detect unusual activities.
Read Original

As federal agencies like the Cybersecurity and Infrastructure Security Agency (CISA) scale back their support for election security, state officials are feeling the pressure to fill the gap. Secretaries of State across the country are now seeking alternative cybersecurity services to protect their election systems. This shift comes at a time when many states are still working to bolster their defenses following past election interference incidents. The lack of federal resources means states will need to rely more on their own budgets and local expertise, which could lead to disparities in security measures across the nation. Ensuring safe and secure elections is critical for maintaining public trust in the electoral process.

Impact: Election systems, state cybersecurity resources
Remediation: States are advised to seek local cybersecurity services and allocate budget for election security improvements.
Read Original

The National Security Agency (NSA) has released new guidelines aimed at helping organizations implement Zero Trust security models effectively. This approach focuses on minimizing trust assumptions within networks, requiring strict verification for every user and device attempting to access resources. The guidelines are designed for organizations looking to reach a target-level maturity in their Zero Trust practices, which is increasingly important as cyber threats evolve. By adopting these recommendations, companies can better protect their sensitive data and systems from unauthorized access. This is particularly relevant for sectors handling critical infrastructure or sensitive information.

Impact: N/A
Remediation: Organizations should follow the NSA's guidelines for Zero Trust implementation.
Read Original
Ivanti Issues Urgent Fix for Critical Zero-Day Flaws Under Active Attack

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Ivanti has reported two serious vulnerabilities in its Endpoint Manager Mobile (EPMM) software, identified as CVE-2026-1281 and CVE-2026-1340. These flaws allow remote code execution, meaning attackers could potentially take control of affected systems without needing physical access. The company warns that these vulnerabilities are currently being actively exploited, putting users at risk. Organizations using EPMM should prioritize applying the necessary security updates to safeguard their systems. Failure to address these vulnerabilities could lead to significant security breaches, affecting both the integrity of user data and the overall security posture of the organization.

Impact: Ivanti Endpoint Manager Mobile (EPMM) software
Remediation: Users should apply the latest patches provided by Ivanti for EPMM to mitigate the vulnerabilities. Specific patch numbers or versions were not mentioned in the article, but it is critical to ensure that the software is updated to the latest version available.
Read Original

Poland's Computer Emergency Response Team (CERT) has reported a serious cyberattack on the country's energy facilities. The attack involved the exploitation of default credentials in industrial control systems (ICS), which allowed attackers to gain unauthorized access and cause significant disruptions. This incident raises concerns about the security of critical infrastructure, particularly as it highlights the risks associated with using default login information. The targeted energy facilities are crucial for Poland's power supply, and any breach in their security can have widespread implications for both the economy and public safety. The report also suggests that this attack may be part of a broader trend of cyber threats aimed at critical infrastructure worldwide.

Impact: Polish energy facilities, industrial control systems (ICS)
Remediation: Organizations should change default credentials immediately, implement stronger access controls, and regularly update their security protocols for ICS.
Read Original

Japan and Britain are stepping up their collaboration on cybersecurity and the supply of critical minerals in response to growing concerns over China's influence in the region. This partnership aims to enhance both countries' resilience against potential cyber threats and secure essential resources that are vital for technology and defense sectors. The agreement comes amid increasing geopolitical tensions and highlights the need for nations to work together to protect their infrastructure and supply chains. By sharing expertise and resources, Japan and Britain aim to bolster their defenses and ensure a stable supply of critical minerals, which are crucial for various industries, including electronics and renewable energy.

Impact: Critical minerals supply chains, cybersecurity infrastructure
Remediation: N/A
Read Original

The latest edition of the Security Affairs newsletter covers several significant cybersecurity developments. Notably, the Department of Justice has released information about a skilled hacker allegedly working for Jeffrey Epstein, raising concerns about the implications of such associations for cybersecurity. Additionally, cyberattacks have disrupted communication systems at Wind and Solar companies, highlighting vulnerabilities in critical infrastructure. These incidents underscore the ongoing risks that hackers pose to both individuals and organizations, particularly in sectors that are essential for energy generation and distribution. As these stories unfold, they serve as a reminder for companies to enhance their security measures and for users to remain vigilant against potential threats.

Impact: Wind and Solar communications systems
Remediation: Companies should review and strengthen their cybersecurity protocols, particularly in critical infrastructure.
Read Original

On December 29, 2025, Poland experienced a wave of cyberattacks that targeted more than 30 wind and solar farms, a manufacturing facility, and a significant combined heat and power (CHP) plant. This CHP plant is crucial as it supplies heat to nearly 500,000 residents. CERT Polska reported that these coordinated attacks disrupted operations, raising concerns about the security of renewable energy sources and critical infrastructure. The impact of these attacks could have far-reaching consequences, not only affecting energy supply but also potentially leading to economic losses and undermining public trust in energy providers. As the world moves towards greener energy solutions, safeguarding these facilities from cyber threats is increasingly important.

Impact: Wind farms, solar farms, manufacturing company, combined heat and power plant
Remediation: N/A
Read Original

According to Government Technology, the number of recorded data breaches soared to 3,322 last year, marking the highest level ever documented. Alarmingly, about 70% of the breach notices lacked essential details about the incidents, leaving users and stakeholders in the dark about the nature of the breaches and the extent of the data compromised. This lack of transparency is concerning, as it prevents affected individuals from understanding their risks and taking necessary precautions. The surge in breaches indicates a growing vulnerability landscape, which raises questions about the effectiveness of current security measures across various sectors. As organizations continue to face increasing cyber threats, the need for clearer communication and accountability in breach disclosures becomes ever more critical.

Impact: N/A
Remediation: N/A
Read Original

OpenSSL has patched 12 vulnerabilities, including a critical remote code execution (RCE) flaw that poses a significant risk to users. These vulnerabilities mainly arise from issues related to memory safety, parsing robustness, and resource handling. Affected products include various versions of OpenSSL, which is widely used across different platforms and applications. This is particularly concerning for organizations that rely on OpenSSL for secure communications, as attackers could exploit these flaws to gain unauthorized access or control over systems. Users and administrators are urged to apply the latest patches to mitigate these risks and protect their systems from potential exploitation.

Impact: OpenSSL versions affected include 1.0.2, 1.1.1, and 3.0.0.
Remediation: Users should update to the latest version of OpenSSL to address these vulnerabilities. Specific patch numbers were not provided.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued new guidance focusing on insider threats, which pose a serious risk to organizations, particularly within critical infrastructure sectors. CISA emphasizes the need for organizations to form multi-disciplinary teams to effectively manage these threats. This guidance comes amid growing concerns about the potential misuse of artificial intelligence by insiders. By providing an infographic, CISA aims to help organizations understand how to better identify and mitigate these risks, ensuring a more secure operational environment. This is crucial as insider threats can lead to significant data breaches and operational disruption, affecting not only the organizations themselves but also the broader public they serve.

Impact: N/A
Remediation: Organizations should establish multi-disciplinary insider threat management teams as recommended by CISA.
Read Original

The Biden administration has decided to repeal two memorandums that set software security requirements for federal agencies. This move has been described as a way to reduce what the White House calls 'burdensome' regulations. While the memorandums are no longer in effect, some of the resources they provided can still be accessed by government organizations. The decision raises concerns about the overall security of software used by federal agencies, as these rules were designed to enhance security practices in software development and procurement. The implications of this change could affect how government entities approach software security moving forward, potentially leading to vulnerabilities in critical systems.

Impact: Federal software security practices
Remediation: N/A
Read Original

SmarterTools has released patches for two vulnerabilities in its SmarterMail email software, one of which is classified as critical. This flaw, identified as CVE-2026-24423, has a CVSS score of 9.3 and could allow attackers to execute arbitrary code on systems running affected versions of SmarterMail. Users of SmarterMail versions prior to build 9511 are particularly at risk. It's crucial for organizations using this software to update immediately to protect against potential exploitation. The existence of such a high-severity vulnerability underscores the importance of regular software updates and vigilance in cybersecurity practices.

Impact: SmarterMail versions prior to build 9511
Remediation: Users should update to SmarterMail build 9511 or later to mitigate the risks associated with this vulnerability.
Read Original
PreviousPage 5 of 25Next