Articles tagged "Critical"

Found 363 articles

A recent cyberattack linked to Russian hackers, specifically the Sandworm/Electrum group, has targeted the Polish power grid, affecting communication and control systems at 30 different sites. As a result of this intrusion, several Industrial Control Systems (ICS) devices have been rendered inoperable, or 'bricked.' This incident raises concerns not only about the immediate impact on Poland's energy infrastructure but also about the broader implications for critical infrastructure security across Europe. The attack reflects ongoing tensions in the region and highlights vulnerabilities in essential services that could have far-reaching consequences if exploited further.

Impact: Polish power grid, Industrial Control Systems (ICS) devices
Remediation: N/A
Read Original
Actively Exploited

Ivanti has released patches for two critical vulnerabilities in its EPMM (Enterprise Mobile Management) software that could let attackers execute arbitrary code remotely without authentication. These vulnerabilities are serious because they can be exploited by anyone with internet access to take control of affected systems. Organizations using the EPMM platform should prioritize applying these updates to prevent potential breaches. The vulnerabilities were discovered to be actively exploited in the wild, which means companies are at risk if they do not take immediate action. This incident underscores the need for regular software updates and vigilance in cybersecurity practices.

Impact: Ivanti EPMM software
Remediation: Apply the latest patches provided by Ivanti for the EPMM software.
Read Original

Ivanti has revealed two serious vulnerabilities in its Endpoint Manager Mobile (EPMM) software, identified as CVE-2026-1281 and CVE-2026-1340. These vulnerabilities are currently being exploited in zero-day attacks, meaning attackers have already taken advantage of them before any fix was made available. Organizations using EPMM are at risk, as these flaws could allow unauthorized access to sensitive mobile device management functions. The situation is urgent, as the vulnerabilities are actively being exploited in the wild, which could lead to data breaches or unauthorized control over managed devices. Users and companies are advised to monitor for updates and take immediate action to secure their systems.

Impact: Ivanti Endpoint Manager Mobile (EPMM)
Remediation: Users should apply any available patches or updates from Ivanti as soon as they are released. In the meantime, organizations are advised to limit access to the EPMM software and monitor for unusual activity.
Read Original

Recent vulnerabilities have been discovered in n8n, a widely used AI automation platform. These flaws could allow attackers to take control of servers and steal sensitive user credentials. This poses a significant risk to businesses that rely on n8n for automating workflows and managing data. If exploited, these vulnerabilities could lead to unauthorized access and data breaches, potentially impacting customer trust and company reputation. Users of n8n should take immediate action to secure their systems and monitor for any suspicious activity.

Impact: n8n automation platform
Remediation: Users are advised to apply security patches as they become available and review their system configurations for any vulnerabilities.
Read Original

Zscaler's recent testing has revealed alarming vulnerabilities in enterprise AI systems, finding that 90% of these systems have critical weaknesses that can be exploited in less than 90 minutes. The research indicates that the median time to experience a critical failure is just 16 minutes. This poses a significant risk for businesses relying on AI technology, as attackers could potentially compromise their systems before adequate defenses are put in place. With the growing adoption of AI in various sectors, companies need to be aware of these vulnerabilities and take immediate action to secure their systems. The findings serve as a wake-up call for organizations to assess their AI infrastructure and implement stronger security measures.

Impact: Enterprise AI systems
Remediation: Organizations should conduct security assessments of their AI systems and implement stronger security protocols to mitigate vulnerabilities.
Read Original

SolarWinds has addressed four critical vulnerabilities found in their Web Help Desk software that could allow attackers to execute code remotely or bypass authentication. These flaws can be exploited without requiring any user credentials, posing a serious risk to organizations using the software. Companies that rely on Web Help Desk should prioritize applying the latest patches to protect their systems from potential attacks. The vulnerabilities were disclosed recently, making immediate action essential to prevent exploitation. Users and administrators are urged to check for updates and ensure their installations are secure.

Impact: SolarWinds Web Help Desk software
Remediation: Users should apply the latest patches provided by SolarWinds for Web Help Desk.
Read Original

In late December, Poland's energy grid experienced a coordinated cyberattack that affected around 30 facilities nationwide. The attackers targeted various distributed energy resources, including combined heat and power plants, as well as wind and solar energy systems. This incident raises concerns about the security of critical infrastructure, as energy systems are essential for everyday life and economic stability. The attack not only disrupted operations but also highlighted vulnerabilities in the energy sector that could be exploited in the future. Authorities are likely to investigate the incident further to bolster defenses against potential future threats.

Impact: Combined heat and power (CHP) facilities, wind and solar dispatch systems
Remediation: N/A
Read Original

Fortinet has confirmed a new zero-day vulnerability that is allowing attackers to exploit single sign-on (SSO) authentication for malicious logins. In response to the ongoing attacks, the company has temporarily disabled FortiCloud SSO authentication across all devices to mitigate the risk. This means that users relying on this feature for secure access may face disruptions while Fortinet works on a solution. The situation is particularly concerning as it puts sensitive information at risk and could lead to unauthorized access to critical systems. Companies using Fortinet products should monitor the situation closely and be prepared to implement any updates once they are released.

Impact: FortiCloud SSO authentication
Remediation: Temporarily disabled FortiCloud SSO authentication for all devices
Read Original

SEC Consult has identified several security vulnerabilities in Dormakaba's exos 9300 access systems, including hardcoded credentials, weak passwords, and command injection flaws. These vulnerabilities could allow attackers to remotely unlock doors, posing a significant risk to physical security in facilities that rely on these systems. Dormakaba, a leading provider of access control solutions, serves a wide range of industries, meaning many organizations could be affected. Users of the exos 9300 need to be aware of these vulnerabilities and take immediate action to secure their systems to prevent unauthorized access. The findings emphasize the need for strong security practices in access control systems, especially in critical infrastructure.

Impact: Dormakaba exos 9300 access systems
Remediation: Users should change hardcoded credentials and implement stronger password policies. Regular security audits and updates should be performed to mitigate command injection risks.
Read Original

Researchers have identified two serious vulnerabilities in n8n, an open-source workflow automation tool, that could allow attackers to execute code remotely. These flaws are related to how n8n handles its sandboxing, which is supposed to isolate code execution for security. If exploited, these vulnerabilities could let malicious actors run arbitrary code on affected systems, potentially compromising sensitive data and system integrity. Users of n8n should take this issue seriously, as it poses significant risks to any workflows that utilize the platform. It's crucial for organizations to stay updated on these types of vulnerabilities to safeguard their operations.

Impact: n8n workflow automation tool
Remediation: Users should apply any available patches or updates from n8n and review their configurations to enhance security. Specific patch numbers or updates were not mentioned.
Read Original

Fortinet has issued patches for a serious vulnerability in its FortiOS software, identified as CVE-2026-24858, which has been actively exploited by attackers. This flaw allows unauthorized users to bypass Single Sign-On (SSO) authentication, posing a significant risk to organizations using affected systems. The vulnerability has a high CVSS score of 9.4, indicating its severity. It impacts several products, including FortiOS, FortiManager, and FortiAnalyzer. Companies utilizing these systems should prioritize applying the available patches to protect against potential breaches.

Impact: FortiOS, FortiManager, FortiAnalyzer
Remediation: Fortinet has started rolling out patches for CVE-2026-24858. Users are advised to apply these patches immediately to mitigate the risk of exploitation.
Read Original

SolarWinds has issued important security updates to address two serious vulnerabilities in its Web Help Desk software. The flaws include an authentication bypass that could allow unauthorized access and a remote command execution (RCE) vulnerability, which could enable attackers to run commands on affected systems. These issues affect users of the Web Help Desk, which is widely used in IT support environments. Organizations relying on this software need to act quickly, as these vulnerabilities could lead to significant security breaches if exploited. Users are advised to apply the updates provided by SolarWinds to mitigate these risks.

Impact: SolarWinds Web Help Desk software
Remediation: Users should apply the latest security updates released by SolarWinds to patch the vulnerabilities.
Read Original

Researchers from JFrog Security Research have identified two significant vulnerabilities in the n8n workflow automation platform. The most critical issue, tracked as CVE-2026-1470, has a CVSS score of 9.9 and involves an eval injection vulnerability that allows authenticated users to execute arbitrary code remotely. This flaw poses a severe risk, as it could potentially enable attackers to manipulate the system and access sensitive data. Users of n8n should take immediate action to secure their installations, especially those who rely on this platform for workflow automation. Prompt updates and monitoring are essential to mitigate risks associated with these vulnerabilities.

Impact: n8n workflow automation platform, versions not specified
Remediation: Users should update to the latest version of n8n to patch the vulnerabilities. Regularly review user permissions and limit access to the system to reduce risk.
Read Original
Actively Exploited

Recent analysis by Zscaler has revealed alarming security vulnerabilities in enterprise AI systems, with every system examined showing at least one critical flaw. The findings indicate that 90% of these systems can be compromised in less than 90 minutes. This is particularly concerning as businesses increasingly rely on AI tools for various operations. The implications are serious, as these vulnerabilities could lead to data breaches and unauthorized access to sensitive information. Companies utilizing AI technology must prioritize security measures to protect their systems and data from potential attacks.

Impact: Enterprise AI systems
Remediation: Companies should implement immediate security assessments and updates, strengthen access controls, and consider deploying additional threat detection systems.
Read Original

Cybersecurity researchers have identified that a group known as Mustang Panda, believed to be linked to the Chinese government, is using an updated backdoor called COOLCLIENT in cyber espionage campaigns. These attacks, which have been ongoing in 2025, primarily target government entities, allowing the attackers to steal sensitive data from compromised systems. This new version of COOLCLIENT enhances the group's capabilities, raising concerns about the potential for significant data breaches in critical government sectors. The implications of these attacks could lead to compromised national security and the exposure of sensitive governmental information. Organizations, especially those in the public sector, need to bolster their security measures to protect against such sophisticated threats.

Impact: Government entities
Remediation: Organizations should enhance their endpoint security, implement regular software updates, and conduct thorough security audits to detect and mitigate potential intrusions.
Read Original
PreviousPage 6 of 25Next