Danish intelligence officials have accused Russia of launching cyberattacks on Denmark's water utility, which is part of a broader pattern of hybrid attacks targeting Western countries. The attacks are believed to threaten critical infrastructure, raising concerns about the security of essential services. The specific impact on the water utility has not been detailed, but such incidents could disrupt water supply and compromise public safety. This situation highlights ongoing geopolitical tensions and the increasing role of cyber warfare in international relations. As countries like Denmark bolster their defenses, the implications for national security and public trust in infrastructure are significant.
Articles tagged "Critical"
Found 202 articles
WatchGuard has alerted its customers about a serious remote code execution vulnerability affecting its Firebox firewalls. This flaw is currently being exploited by attackers, which raises significant security concerns for users who have not yet applied the necessary patches. The vulnerability allows unauthorized individuals to execute commands on affected devices, potentially compromising network security. Customers are urged to act swiftly to mitigate risks by updating their systems. This situation underscores the critical need for timely software updates in maintaining cybersecurity.
Security Affairs
Cisco has disclosed a critical zero-day vulnerability, tracked as CVE-2025-20393, affecting its Secure Email Gateway and Secure Email/Web Manager products. This vulnerability is currently being exploited by a China-linked advanced persistent threat group known as UAT-9686. The attack campaign began on December 10 and targets specific systems, raising significant concerns for organizations relying on these Cisco products. Users and administrators should be particularly vigilant, as this active exploitation could lead to unauthorized access and data breaches. The urgency of addressing this vulnerability cannot be overstated, given its potential impact on email security and the sensitive information handled by these systems.
SonicWall's SMA1000 devices are facing a serious security threat due to a newly discovered zero-day vulnerability. Attackers have combined this flaw with another critical vulnerability that was revealed earlier this year, creating a dangerous situation for users. This means that anyone using these devices may be at risk of exploitation, potentially allowing unauthorized access to sensitive systems. Companies that rely on SonicWall for secure access should take immediate action to assess their security and implement any available patches. The situation emphasizes the need for vigilance and timely updates in cybersecurity practices.
Hewlett Packard Enterprise (HPE) has addressed a serious security vulnerability in its OneView software that allows unauthenticated remote code execution. This flaw, identified as CVE-2025-37164, has been rated with a CVSS score of 10.0, indicating its critical nature. HPE OneView, used for managing IT infrastructure, could potentially allow attackers to take control of affected systems without needing to authenticate. This vulnerability can impact organizations relying on this software for IT operations, making it crucial for users to apply the necessary updates to safeguard their environments. HPE's prompt action to patch this flaw is vital in preventing potential exploitation by malicious actors.
BleepingComputer
French authorities have arrested two crew members of an Italian passenger ferry, including a Latvian national, for allegedly installing malware on the vessel. This malware could have allowed them to gain remote control over the ship, raising serious concerns about maritime security. The incident underscores the vulnerabilities that can exist in critical infrastructure like passenger ferries, where cyberattacks could potentially endanger lives and disrupt operations. Authorities are investigating the extent of the malware's capabilities and the intentions behind its installation. This case serves as a reminder for the maritime industry to enhance cybersecurity measures to protect against similar threats.
BleepingComputer
Hewlett Packard Enterprise (HPE) has released a critical patch for a severe vulnerability in its HPE OneView software that allows attackers to execute arbitrary code remotely. This flaw poses a significant risk as it could enable cybercriminals to take control of affected systems without any user intervention. Organizations using HPE OneView are urged to apply the patch immediately to protect their infrastructure from potential exploitation. The impact of this vulnerability could be extensive, affecting businesses that rely on this software for managing their IT environments. Users should ensure they are running the latest version to mitigate this serious threat.
France's counterespionage agency is currently investigating a cyberattack that may have involved remote control malware found on an international passenger ferry. This incident raises concerns about foreign interference, as authorities suspect that the malware could be part of a larger plot targeting maritime operations. The presence of such malware on a passenger ferry poses significant risks not only to the vessel itself but also to the safety of the passengers and crew onboard. The investigation is ongoing, and officials are working to determine the extent of the threat and the potential perpetrators behind this attack. This situation emphasizes the vulnerabilities that exist in critical transportation infrastructure and the need for enhanced cybersecurity measures in the maritime sector.
SecurityWeek
SonicWall has released patches for a medium-severity vulnerability in its SMA 1000 series, which has been exploited alongside a critical bug to enable remote code execution. This means that attackers could potentially gain control of affected devices, posing serious risks to organizations using this equipment. Users of SonicWall's SMA 1000 should prioritize applying the latest updates to safeguard their systems. The existence of this zero-day exploit indicates that the vulnerability was being actively exploited before it was disclosed, which raises concerns about the security of devices that have not yet been patched. Companies are urged to review their security measures and ensure they are using the most up-to-date software to protect against such threats.
A new vulnerability, tracked as CVE-2025-20393, has been discovered in Cisco's Secure Email Gateway and Secure Email and Web Manager appliances. This zero-day flaw is reportedly being exploited by hackers linked to China, posing a significant risk to organizations using these products. The vulnerability allows attackers to bypass security controls, potentially leading to unauthorized access and data breaches. Companies using these Cisco appliances should prioritize patching and monitoring their systems to mitigate the risks associated with this exploit. The discovery of this flaw is particularly concerning given the ongoing cyber threats targeting critical infrastructure and enterprise environments.
BleepingComputer
At the Zeroday Cloud hacking competition held in London, cybersecurity researchers were awarded a total of $320,000 for identifying 11 serious remote code execution vulnerabilities in cloud infrastructure components. These vulnerabilities could potentially allow attackers to execute malicious code on affected systems, posing significant risks to cloud service providers and their customers. The event showcased the importance of proactive security measures in cloud computing, as vulnerabilities like these can lead to data breaches and service disruptions. By encouraging the discovery of such flaws, the competition aims to strengthen the overall security of cloud environments. Companies relying on cloud infrastructure should stay vigilant and address any reported vulnerabilities promptly to safeguard their systems.
BleepingComputer
French authorities have arrested a 22-year-old man in connection with a cyberattack that targeted the Ministry of the Interior earlier this month. The attack raised concerns about the security of sensitive government information and the potential for disruption to public services. While details about the specific nature of the attack have not been disclosed, the incident is significant as it highlights vulnerabilities within government systems. Cyberattacks on public institutions can erode trust in government operations and compromise citizen data. This arrest is part of ongoing efforts by law enforcement to combat cybercrime and ensure the security of critical infrastructure.
Infosecurity Magazine
A serious vulnerability in the Motors WordPress theme has been discovered, which affects over 20,000 websites. This flaw allows low-privileged users to gain full administrative control of the affected sites. As a result, attackers could exploit this weakness to alter site content, steal sensitive information, or even take the site offline. Website owners using this theme should take immediate action to secure their sites and prevent unauthorized access. The issue underlines the importance of regularly updating themes and plugins to protect against potential security risks.
BleepingComputer
A ransomware group has taken advantage of a serious vulnerability in React2Shell, identified as CVE-2025-55182, to infiltrate corporate networks. Once they gain access, they deploy their file-encrypting malware in under a minute, making the attack extremely swift and damaging. This incident highlights the urgency for organizations to address this vulnerability, as it poses a significant risk to corporate data security. Companies using systems that incorporate React2Shell need to remain vigilant and take immediate action to protect their networks from potential exploitation. The rapid nature of these attacks underlines the necessity for robust security measures and timely updates.
Help Net Security
CVE-2025-59718Researchers at Arctic Wolf have reported that attackers are actively exploiting a vulnerability in Fortinet's FortiGate firewalls, identified as CVE-2025-59718. This flaw allows unauthorized access to the firewalls, enabling attackers to export sensitive system configuration files. These files can reveal critical information about the network, security policies, and even encrypted passwords, which could facilitate further attacks. Organizations using FortiGate firewalls should take immediate action to protect their systems, as the risk of a security breach is significant due to the data that can be accessed through this vulnerability. The situation underscores the importance of timely updates and security measures to safeguard network infrastructure.