Skip to content

Articles tagged: critical-infrastructure

96 articles found

a few men looking at a computer screen
ransomwarehealthcarecritical-infrastructure

Ransomware Hits Healthcare

A recent ransomware attack on Dutch healthcare software vendor ChipSoft highlights the vulnerability of healthcare organizations to such attacks, which can have significant consequences for patient care. This article explores the key facts and implications of this threat. Ransomware attacks are a growing concern for healthcare.

3 min read
A security and privacy dashboard with its status.
vulnerability-exploitationpatchingdata-theft

CISA Orders Patch for Critical Flaw as Data Theft Attacks Hit

US government agencies face a critical deadline to patch an Ivanti EPMM flaw, while Snowflake customers suffer data theft attacks due to a SaaS integrator breach. Learn about the vulnerabilities and how to protect yourself.

5 min read
pathway at night
critical-infrastructureiot-securityddos-attacks

Critical Infrastructure Under Siege

Targeted attacks on critical infrastructure and IoT devices are on the rise, with the US disrupting a Russian espionage operation involving hacked routers and DNS hijacking. Learn about the key threats and how to protect your organization.

critical
5 min read
black digital device at 19 00
zero-dayransomwarecritical-infrastructure

Critical Flaws in Fortinet and Next.js Under Active Exploitation

Active exploitation of critical flaws in Fortinet and React2Shell, ransomware attacks on critical infrastructure, and significant crypto thefts highlight the urgent need for robust security measures. Read on to understand these threats and how to protect against them.

5 min read
a close up of a typewriter with a paper on it
critical-infrastructureiranian-hackersoperational-technology

Iranian Hackers Target US Critical Infrastructure

Iranian threat actors are targeting US critical infrastructure, including water and wastewater systems and the energy sector, causing operational disruption and financial losses. The FBI and Pentagon have issued warnings about these threats. Readers should understand the scope of these attacks and take immediate action to protect their organizations.

medium
5 min read
a close up of a clock on a computer screen
zero-dayremote-code-executioncritical-infrastructure

Zero-Day Vulnerabilities Under Active Exploitation

Multiple zero-day vulnerabilities are being actively exploited, including a critical flaw in Ivanti Endpoint Manager Mobile and 13-year-old bugs in Apache ActiveMQ Classic and Flowise. These vulnerabilities pose significant risks to federal enterprises and other organizations.

critical
3 min read
red and black laptop computer
ddos-attackscritical-infrastructureransomware

DDoS Attacks Disrupt Critical Infrastructure

A large-scale DDoS attack on Russian telecom giant Rostelecom has disrupted internet services across dozens of cities, highlighting the importance of robust security measures. Meanwhile, REvil leaders have been identified behind 130 German ransomware attacks, and emerging threats like LiteLLM are turning developer machines into credential vaults for attackers.

5 min read
a padlock on a red, blue, and pink background
iranian-hackersrussia-linked-hackerscritical-infrastructure

Iranian Hackers Target US Critical Infrastructure as Russia Steals Microsoft Tokens

Iranian-affiliated cyber actors are exploiting programmable logic controllers in US critical infrastructure, while Russian hackers steal Microsoft Office tokens via router exploitation. Mitsubishi Electric products also vulnerable to attacks.

3 min read
a reflection of a lamp in a glass window
nation-state-attackscritical-infrastructuredns-hijacking

Nation-State Cyber Attacks Target US Infrastructure

Iranian and Russian nation-state actors are launching targeted cyber attacks against US critical infrastructure, including energy and water facilities. These attacks exploit vulnerabilities in programmable logic controllers and compromise SOHO routers for DNS hijacking.

4 min read
black flat screen computer monitor
cyberattacksdata-leakorganization-security

Cyberattack Hits German Party

A cyberattack on the German political party Die Linke has raised concerns about cybersecurity threats to organizations. Hackers have threatened to leak data, emphasizing the need for robust security measures.

5 min read
A combination lock rests on a computer keyboard.
zero-dayransomwarewindows

Medusa Ransomware Zero-Day Attacks

Medusa ransomware affiliate linked to zero-day attacks, posing a significant risk to organizations. Microsoft has identified Storm-1175 as the actor behind Medusa payloads, highlighting the need for timely vulnerability remediation and robust security measures.

4 min read
a laptop computer sitting on top of a wooden table
ransomwarezero-daywindows

Qilin and Warlock Ransomware Threats Escalate

Qilin and Warlock ransomware operations are using vulnerable drivers to disable over 300 EDR tools, posing a significant threat to cybersecurity. Learn about the emerging threats and techniques used by these ransomware groups.

5 min read
man in brown shirt standing near black and gray electronic device
supply-chain-attackdata-breachvideo-conferencing-vulnerability

Trivy Supply Chain Attack Hits EU Commission

The European Commission has confirmed a data breach linked to the Trivy supply chain attack, with over 300GB of sensitive data stolen. This incident highlights vulnerabilities in supply chain and video conferencing software, emphasizing the need for swift patching and robust security measures.

medium
4 min read
man in black jacket using computer
ransomwarecyberattackscritical-infrastructure

Ransomware Attacks Escalate with Qilin and REF1695 Operations

Active ransomware and cyberattacks are on the rise, with Qilin and REF1695 operations targeting organizations worldwide. Critical infrastructure is at risk, including emergency communications systems. Learn about the key threats and how to protect yourself.

5 min read
person using laptop computers
critical-infrastructurevulnerabilitiesremote-code-execution

Critical Infrastructure Under Siege

Vulnerabilities in critical infrastructure pose significant risks, with ShareFile flaws and Hitachi Energy's Ellipse product under attack. Emerging threats like CrystalRAT malware and Casbaneiro bank trojan also threaten security. Learn about the key threats and how to protect yourself.

critical
4 min read
Servers illuminate a futuristic cityscape with a data center.
supply-chaincloud-securitycritical-infrastructure

EU Commission Hack Exposes Data

The European Commission's cloud infrastructure was hacked by TeamPCP, exposing data from at least 29 other EU entities. This incident highlights the significant risk of supply chain attacks and the need for robust access controls.

4 min read
a laptop computer sitting on top of a desk
social-engineeringcryptocurrencynorth-korean-hackers

North Korean Hackers Steal $285 Million

North Korean hackers have stolen $285 million from the Solana-based decentralized exchange Drift in a durable nonce social engineering attack. This critical incident highlights the significant threat posed by North Korean hacking groups to cryptocurrency exchanges. Read on for key details and recommendations.

4 min read
pink and white love you and love me print padlock
vulnerabilitiessupply-chain-riskscritical-infrastructure

Supply Chain Risks Surge Amid Critical Vulnerabilities

Critical vulnerabilities in supply chain infrastructure pose significant threats to organizations. Recent discoveries highlight the need for robust security measures and timely patching.

5 min read
black and red laptop computer
zero-daymalwarephishing

Zero-Day Exploits Hit TrueConf Servers and Banking Systems

Hackers exploit zero-day vulnerability in TrueConf conference servers to push malicious updates, while a phishing campaign targets Latin America and Europe with Windows banking trojans like Casbaneiro. These attacks highlight the ongoing threat of zero-day exploits and social engineering.

4 min read
Security, privacy, and performance status with fix options.
ransomwareai-securitycloud-security

Ransomware & AI Threats Escalate

Hospitals face severe consequences from ransomware attacks, while Google's Vertex AI poses a security risk due to over-privileged agents. Attackers are increasingly using trusted tools against organizations, highlighting the need for vigilance and rehearsals in defense.

5 min read
black flat screen tv showing game
ransomwaredata-wiping-attackscritical-infrastructure

Ransomware Strikes Medtech Giant

Medtech giant Stryker suffered a data-wiping attack claimed by Iranian-linked Handala hacktivist group, highlighting risks to critical infrastructure. The company has since returned to full operation, but the incident underscores the severity of ransomware threats.

5 min read
A stack of books sitting on top of a table
high-severity-vulnerabilitiesarbitrary-code-executionpx4-autopilot

High-Severity Bugs Hit PX4 Autopilot, Vim, GNU Emacs

Multiple high-severity vulnerabilities have been disclosed in products like PX4 Autopilot, Vim, and GNU Emacs, affecting various systems including transportation and defense. These flaws could allow arbitrary code execution or other malicious activities. Affected vendors have released patches or recommendations to mitigate these vulnerabilities.

critical
5 min read
black and red screen display
vulnerabilitieszero-daycritical-infrastructure

Critical Flaws Exposed in Anritsu, Cisco, and Telegram

Multiple high-severity vulnerabilities have been discovered in Anritsu Remote Spectrum Monitor, Cisco source code, and a critical no-click flaw in Telegram. These threats pose significant risks to communications, defense, and emergency services. Understanding these vulnerabilities is crucial for proactive defense.

4 min read
woman in black framed eyeglasses using laptop computer
healthcare-data-breachcybersecurity-incidentpatient-data-leak

CareCloud Probes Potential Healthcare Data Breach

A potential data breach at healthcare IT platform CareCloud may have leaked patient data, highlighting ongoing cybersecurity risks in the healthcare sector. The incident is under investigation and has been disclosed to the Securities and Exchange Commission. This article provides an overview of the situation and its implications.

3 min read
zero-daycitrix-netscalerf5-big-ip

Citrix & F5 Under Attack

Critical vulnerabilities in Citrix NetScaler and F5 BIG-IP are being exploited, allowing attackers to gain administrative access and deploy webshells. Organizations using these products must patch immediately to prevent attacks.

3 min read
A wooden block spelling cybersec on a table
zero-daywordpresscitrix-netscaler

WordPress and Citrix NetScaler Vulnerabilities Under Active Exploitation

High-severity vulnerabilities in WordPress plugins and Citrix NetScaler are being actively exploited, putting over 500,000 websites and critical infrastructure at risk. Administrators must prioritize patching to prevent exploitation.

4 min read
black steering wheel in car
automotive-cybersecurityconnected-vehiclesautonomous-vehicles

Automotive Cybersecurity Threats Rise

The cybersecurity of vehicles is under threat due to the rise of connected and autonomous vehicles, introducing new vulnerabilities. As technology advances in the automotive industry, the need for robust cybersecurity measures grows. Readers should be aware of the evolving threat landscape and take necessary precautions.

4 min read
A computer screen displays lines of code.
ransomwarewindowscritical-infrastructure

Bearlyfy's Custom Ransomware Hits Russian Firms

The Bearlyfy group has launched targeted ransomware attacks on over 70 Russian companies using custom GenieLocker ransomware, demonstrating increased sophistication in ransomware campaigns. These attacks aim to inflict maximum damage on Russian businesses, highlighting the need for enhanced cybersecurity measures.

4 min read
a close up of a typewriter with a paper on it
critical-infrastructurequantum-computingencryption

Critical Infrastructure Under Siege

A critical vulnerability in WAGO industrial switches threatens energy and transportation systems, while Google warns of quantum computers potentially hacking encrypted systems by 2029. Learn how to protect your organization from these emerging threats.

critical
3 min read
A laptop computer sitting on top of a desk
nation-state-malwarespywarezero-day

Nation-State Malware Upgrades

Nation-state malware is evolving with China's APT Red Menshen upgrading its BPFdoor malware, and exploit kits like Coruna and DarkSword spreading on the Dark Web. Intermediaries are driving the global spyware market expansion, making it harder for organizations to defend themselves.

4 min read
red padlock on black computer keyboard
ransomwareai-driven-securitycritical-infrastructure

Ransomware Disrupts Spanish Port as Experts Urge AI-Driven Security

A ransomware attack has disrupted operations at a major Spanish fishing port, highlighting the need for AI-native security tools to combat AI-based attacks. Experts emphasize that defenders must use AI-driven security to counter these threats. Learn about the recent attack and the importance of AI-driven security in this article.

6 min read
red padlock on black computer keyboard
state-sponsored-hackingtelecom-securitykernel-implants

Chinese Hackers Target Telecom Infrastructure

Chinese state-sponsored hackers are targeting telecom infrastructure with kernel implants and passive backdoors, enabling long-term espionage with significant national security implications. This attack highlights the ongoing threat of Chinese hacking groups to critical infrastructure.

5 min read
brown padlock on black computer keyboard
ransomwarebotnetcybercrime

Russian Cybercriminal Sentenced to Prison for Ransomware Attacks

A Russian national has been sentenced to two years in prison for managing a botnet used in ransomware attacks against US companies. This sentencing highlights ongoing efforts to combat cybercrime and ransomware attacks. Learn more about the threat and how to protect yourself.

4 min read
zero-dayremote-code-executioncisa

CISA Orders Patching of Actively Exploited n8n Vulnerability

CISA has ordered federal agencies to patch the actively exploited n8n vulnerability, indicating a significant threat to government systems. The vulnerability allows for remote code execution, making it a high-priority patch for affected systems. Prompt patching is essential to prevent exploitation and protect against potential attacks.

4 min read
a desk with several monitors
cybercrimelaw-enforcementlinux

Cybercrime and Law Enforcement Under Spotlight

The Cyber National Mission Force is getting a new commander amid broader leadership turnover. Meanwhile, Poland foiled a cyberattack on a nuclear center that may have originated from Iran, and US law enforcement agencies disrupted the SocksEscort cybercrime proxy network powered by Linux malware.

4 min read
wiper-malwarecritical-infrastructureiran-linked

Iran-Linked Wiper Malware Hits Medtech Firm Stryker

A critical Iran-linked wiper malware attack on medtech firm Stryker has raised concerns about nation-state actors targeting critical infrastructure. Meanwhile, new malware campaigns, including Slopoly and VENON, are evolving the threat landscape. Learn about these emerging threats and how to protect your organization.

3 min read
a hand holding a phone
zero-dayioswindows

Critical Patches Released for iOS and Windows

Apple and Microsoft have released critical security patches to prevent exploitation of known vulnerabilities. Users are advised to update their software immediately to protect against potential attacks.

4 min read
a laptop computer sitting on top of a desk
zero-dayransomwarelinux

Critical n8n and KadNap Exploits, Ransomware Surge

Active exploitation of n8n and KadNap malware poses critical threats, while ransomware attacks target healthcare organizations and critical infrastructure. Stay informed on the latest cybersecurity threats and take action to protect your systems.

critical
4 min read
green padlock on pink surface
supply-chain-attacksdata-breachesremote-code-execution

Critical Supply Chain Attacks Hit Veeam and Cloud Environments

Supply chain attacks and data breaches are on the rise, with Veeam Software patching critical flaws in its Backup & Replication solution and a threat actor breaching a cloud environment in 72 hours. Learn about the key threats and how to protect your organization.

5 min read
silhouette of woman standing in front of blue light
emerging-threatsai-powered-securitydata-loss-prevention

AI-Powered Security Solutions Gain Momentum

Jazz and Kai secure funding for AI-powered data loss prevention and IT-OT security, while OpenAI's Codex finds hundreds of critical vulnerabilities. Learn about the emerging threats and funding in AI-powered security solutions.

4 min read
a blue and white logo
cloud-securitycritical-infrastructurezero-day

Cloud Resilience Under Fire

The Middle East conflict exposes significant cloud resilience gaps, while major vendors release critical ICS patches. Learn how to protect your infrastructure from emerging threats.

3 min read
gold padlock on blue and white floral door
cloud-securityzero-dayphishing

Cloud Vulnerabilities Under Siege

Hackers are exploiting cloud and software vulnerabilities at an alarming rate, with high-value organizations in Asia being targeted. Malicious code and phishing campaigns are also on the rise, highlighting the need for rapid patching and vigilance. Adobe has patched 80 vulnerabilities across eight products, and cybercriminals are impersonating city officials to steal permit payments.

5 min read
a desk with several monitors
critical-infrastructureransomwarezero-day

Critical Infrastructure Under Siege

Critical infrastructure faces significant threats from vulnerabilities, ransomware, and nation-state attacks. Recent discoveries include Honeywell IQ4x BMS Controller and Apeman Cameras vulnerabilities, as well as new malware and threat actor activity. Learn how to protect your systems.

critical
5 min read
Inside an old-fashioned control room.
critical-infrastructureindustrial-control-systemskadnap-malware

Critical Infrastructure Under Siege

Critical infrastructure faces multiple threats, including vulnerabilities in industrial control systems, the KadNap malware targeting routers, and emerging AI-powered attacks. Organizations must prioritize patching, securing networks, and implementing robust cybersecurity strategies to protect against these threats.

medium
5 min read
A couple of padlocks attached to a fence
zero-dayauthentication-bypassendpoint-security

Critical Ivanti Flaw Exploited, APT28 Espionage Campaign Uncovered

A critical flaw in Ivanti Endpoint Manager is being actively exploited, while APT28's customized Covenant malware is used for long-term espionage. Learn about the threats and how to protect yourself.

4 min read
Facebook profile lock screen on a smartphone
phishingsocial-engineeringwindows

Phishing Attacks Surge

Russian state-sponsored hackers are targeting government officials and journalists with Signal and WhatsApp phishing campaigns, while threat actors abuse .arpa DNS and IPv6 to evade defenses. Financial and healthcare organizations are also being targeted with Microsoft Teams phishing and A0Backdoor malware.

5 min read
graphical user interface
ransomwarecyber-campaignswindows

ClickFix Ransomware and Russian Cyber Campaigns

ClickFix attack and Termite ransomware pose high severity threats, while Russian cyber campaigns target Signal and WhatsApp. Emerging threats include abuse of internet infrastructure and custom malware. Stay informed to protect against these evolving cyber threats.

4 min read
a desk with several monitors
targeted-attackscritical-infrastructureweb-server-exploits

Critical Infrastructure Under Siege

A Chinese threat actor is targeting critical infrastructure in Asia, exploiting web servers and using Mimikatz. The campaign has targeted multiple sectors, including aviation, energy, and government, highlighting the need for increased security measures.

medium
6 min read
a desk with a keyboard, glasses and a laptop
data-breachhealthcare-securitypatient-privacy

Cognizant TriZetto Breach Exposes 3.4M Patient Records

A critical data breach at Cognizant TriZetto has exposed sensitive health information of 3.4 million patients, highlighting vulnerabilities in healthcare data security. This incident underscores the need for robust security measures to protect patient privacy. Read on for key details and recommendations.

5 min read
black LED keyboard
cybercrimephishing-as-a-servicecryptocurrency

Cybercrime Surges with $46M Crypto Heist and Phishing-as-a-Service Takedown

A recent surge in cybercrime includes a $46 million cryptocurrency heist and the takedown of a phishing-as-a-service operation. Learn about the latest threats and how to protect yourself.

5 min read
a typewriter on a table
nation-state-actorsmalwaresocial-engineering

Nation-State Actors Unleash New Malware Campaigns

Nation-state actors are launching sophisticated malware campaigns, including the ClickFix social engineering campaign and attacks on Iraqi officials. These threats highlight the evolving landscape of cyberattacks and the need for heightened security measures.

4 min read
red padlock on black computer keyboard
state-sponsored-attacksvulnerabilitiesexploits

State-Sponsored Threats and Vulnerabilities Plague Cybersecurity

State-sponsored threat actors and vulnerabilities pose significant risks to cybersecurity. Chinese state hackers target telcos, while vulnerabilities in Avira antivirus and WordPress plugins are exploited. Learn about the key threats and how to protect yourself.

6 min read
a computer monitor with a lot of code on it
targeted-attackscritical-infrastructureransomware

Critical Infrastructure Under Siege

Targeted attacks on critical infrastructure are on the rise, with a China-linked APT group targeting telecommunication service providers and a Russian ransomware operator pleading guilty in the US. These attacks highlight the need for robust security measures and international cooperation.

5 min read
A cell phone sitting on top of a keyboard
zero-dayiosgithub

Zero-Day Exploits Target iOS and GitHub Users

Critical zero-day vulnerabilities are being actively exploited, targeting iOS users and GitHub repositories. Over 100 GitHub repositories are distributing the BoryptGrab stealer, while CISA has added iOS flaws from the Coruna exploit kit to the KEV list. Users must take immediate action to protect themselves.

3 min read
A laptop computer sitting on top of a desk
ai-driven-attacksnation-state-attacksmalware

AI-Driven Threats Intensify Nation-State Attacks

Nation-state actors are leveraging AI-powered tools to launch sophisticated cyberattacks, targeting governments and organizations worldwide. Recent campaigns by Transparent Tribe and Iranian APT hackers demonstrate the growing threat of AI-driven attacks. Stay informed on the latest threats and learn how to protect your organization.

4 min read
red padlock on gray wire
zero-daycloud-securitynetworking-vulnerabilities

Critical Cloud and Networking Vulnerabilities Under Active Exploitation

Multiple critical vulnerabilities in cloud and networking products are being actively exploited, putting organizations at risk. VMware Aria Operations and Cisco SD-WAN products are among those affected, with patches available for some but not all vulnerabilities. Administrators must take immediate action to protect their networks.

4 min read
A laptop computer sitting on top of a desk
zero-dayai-powered-malwareinfo-stealing-malware

Zero-Day Vulnerabilities and AI-Powered Threats

Critical zero-day vulnerabilities in FreeScout and VMware Aria Operations, along with AI-powered malware and info-stealing threats, pose significant risks to organizations. Immediate action is required to patch and mitigate these threats.

4 min read
a computer screen with green lights
ransomwarecybercrimecritical-infrastructure

Ransomware Takedowns and Critical Infrastructure Threats Escalate

Law enforcement actions against ransomware operations and stolen credential marketplaces show progress, but targeted attacks on critical infrastructure and emerging threats pose significant risks. Organizations must stay vigilant and adapt their security strategies to combat these evolving threats.

4 min read
black flat screen tv showing 20 00
ai-powered-attackszero-daynetwork-security

AI-Powered Attacks Surge

The emergence of AI-powered attack tools poses a significant threat to cybersecurity. Recent breaches, including the compromise of Fortinet FortiGate firewalls, highlight the dangers of these advanced attacks. Learn how to adapt your defenses against this new frontier in cybersecurity threats.

3 min read
red and black laptop computer
hacktivist-attacksnation-state-attacksphishing

Hacktivist Surge and Cybercrime Disruption

A surge in hacktivist and nation-state attacks has hit organizations worldwide, while law enforcement actions disrupt major phishing and cybercrime platforms. Learn about the key threats and how to protect yourself.

4 min read
remote-code-executionvmware-aria-operationscritical-infrastructure

VMware Aria Operations RCE Flaw Under Active Exploitation

A critical VMware Aria Operations vulnerability is being exploited in attacks, allowing for remote code execution. This poses a significant threat to affected systems, and immediate action is required to patch the flaw. The US Cybersecurity and Infrastructure Security Agency has added the vulnerability to its Known Exploited Vulnerabilities catalog.

high
4 min read
a blue and white logo
zero-dayransomwarecloud-security

Critical Threats: AWS Drone Strikes, Ransomware, and Zero-Days

AWS data centers face drone strikes, major ransomware attacks hit healthcare and gaming, and zero-day vulnerabilities are exploited in the wild. Stay ahead of these critical threats with our latest analysis.

high
3 min read
man in black and white plaid dress shirt
iranian-cyberattacksphishingemerging-threats

Iranian Cyberattacks Disrupt Cloud Services Amidst Rising Phishing Threats

Iranian cyberattacks have hit Amazon data centers, disrupting cloud services. Meanwhile, phishing campaigns and emerging threats like quantum decryption of RSA pose significant risks. Learn about the latest cybersecurity threats and how to protect yourself.

4 min read
a close up of a keyboard and a mouse
nation-state-attackscybercrimecritical-infrastructure

Nation-State Cyberattacks Escalate Amid Global Crackdown

Nation-states are escalating their cyberattacks, with Israel and the US targeting Iran's infrastructure. Meanwhile, a global crackdown on cybercrime has led to the arrest of alleged members of 'The Com' collective.

medium
4 min read
a laptop and a computer
ransomwareai-securityhealthcare

Ransomware Hits Sensitive Targets Amid AI Security Concerns

A recent ransomware attack on the University of Hawai'i Cancer Center highlights the importance of protecting sensitive data. Meanwhile, the increasing use of AI in development poses new security challenges. Learn about these threats and how to mitigate them.

5 min read
a person holding a pencil and a broken laptop
cyberattackscritical-infrastructureddos-attacks

US-Israel and Iran Engage in Critical Cyberattacks

The US, Israel, and Iran are engaged in a series of critical cyberattacks, including wiper malware and DDoS attacks. North Korean APT groups target air-gapped systems, while cyberattacks on government and critical infrastructure continue to pose a threat.

4 min read
zero-dayai-securitycloud-security

Zero-Day AI Threats and Cloud Security Updates

Critical zero-day vulnerabilities in AI systems pose significant threats, while cloud security enhancements offer new protections. Learn about the latest developments and how to stay secure.

5 min read
green padlock on pink surface
vulnerabilitiespatched-threatswindows-11

Critical Flaws in Juniper Routers and Windows 11

New vulnerabilities have been discovered in Juniper Networks PTX routers and Windows 11, posing a significant threat to cybersecurity. These flaws can be exploited by attackers to gain remote access and execute malicious code. It is essential to patch these vulnerabilities immediately to prevent potential attacks.

3 min read
black laptop computer turned on with green screen
ransomwarehealthcarecritical-infrastructure

Ransomware Hits Healthcare

A critical ransomware attack has hit a Mississippi healthcare system, while over 900 Sangoma FreePBX instances have been compromised in ongoing web shell attacks. These incidents highlight the vulnerability of healthcare systems to cyber threats.

3 min read
laptop compute displaying command prompt
zero-dayransomwareazure

Chrome Zero-Day & Azure Ransomware Attacks

A critical Google Chrome zero-day vulnerability is being exploited, while a Microsoft Azure vulnerability is being used by ransomware attackers. Learn about these threats and how to protect yourself.

4 min read
photo of computer cables
zero-daycisco-sd-wandeveloper-targeting

Cisco SD-WAN Zero-Day Exploited, Devs Targeted, ICS Vulnerabilities Found

A critical Cisco SD-WAN zero-day is being exploited, while developers are being targeted by malicious campaigns and industrial control systems are vulnerable to new threats. Learn how to protect yourself and your organization from these emerging threats.

4 min read
photo of computer cables
zero-daycisco-sd-wanuat-10027

Cisco SD-WAN Zero-Day Exploited, UAT-10027 Hits US Education

A critical Cisco SD-WAN zero-day is being exploited, while UAT-10027 targets US education and healthcare. EV2GO and SWITCH EV charging systems also have severe vulnerabilities.

4 min read
photo of computer cables
zero-dayindustrial-control-systemscisco-ios

Critical Industrial Control System Vulnerabilities Under Active Exploitation

Multiple vulnerabilities in Yokogawa Centum and Exaopc products are under active exploitation, allowing attackers to gain control of industrial control systems. Cisco IOS and IOS XE software patches are also available to prevent further exploitation. Immediate action is required to patch these vulnerabilities.

4 min read
text
zero-dayrouter-vulnerabilitiesstate-sponsored-hacks

Critical Router Flaws and State-Sponsored Hacks Expose Networks

Zero-day vulnerabilities in Juniper Networks PTX and Zyxel routers allow for full router takeover, while Chinese cyberspies breach telecom firms and government agencies. Ransomware and cybercrime threats also persist.

5 min read
Open padlock with combination lock on keyboard
cybersecurity-industrysoftware-vulnerabilitiespatch-management

Cybersecurity Industry News and Best Practices

The cybersecurity industry is evolving rapidly with new threats and technologies emerging daily, highlighting the importance of staying informed about the latest threats and trends to maintain a strong security posture. Recent vulnerabilities in software development workflows and critical security flaws in software products underscore the need for regular patching and employee education. By understanding these risks and taking proactive measures, organizations can better protect themselves against cyber attacks.

4 min read
An unlocked padlock rests on a computer keyboard.
industrial-control-systemscybersecurity-researchvulnerabilities

Industrial Control System Vulnerabilities Pose Critical Threats

Recent vulnerabilities in industrial control systems highlight the need for ongoing security maintenance and updates. Cybersecurity research emphasizes the importance of awareness and best practices to ensure business continuity.

5 min read
text
critical-infrastructurezero-daybotnet

Critical Infrastructure Under Fire

Johnson Controls Frick Controls Quantum HD vulnerabilities pose a high risk to critical infrastructure, while the Aeternum botnet loader emerges as a new threat. Learn about these emerging threats and how to protect against them.

4 min read
Code displayed on computer screens.
targeted-attackscritical-infrastructuredevelopers

Targeted Attacks Hit Developers and Critical Infrastructure

Sophisticated threat actors are targeting developers and critical infrastructure with malicious repositories, backdoors, and vulnerabilities. Stay ahead of the threats with our analysis and recommendations.

4 min read
a group of colorful chairs
zero-daycritical-infrastructurebotnet

Zero-Day Attacks Surge: Aeternum Botnet, Critical Infrastructure Vulnerabilities, and Malicious Developer Campaigns

A surge in zero-day attacks, including the Aeternum botnet and critical infrastructure vulnerabilities, poses significant threats to global security. Meanwhile, malicious campaigns target developers and financial sectors, highlighting the need for enhanced cybersecurity measures.

4 min read
zero-daycisco-sd-wanchina-linked-espionage

Critical Cisco SD-WAN Flaw Exploited, China-Linked Espionage Uncovered, and EV Charging Hacks

A critical vulnerability in Cisco SD-WAN is being exploited, a Chinese cyber espionage campaign has been disrupted by Google, and vulnerabilities have been found in electric vehicle charging infrastructure. These threats pose significant risks to network security, intellectual property, and critical infrastructure.

5 min read
photo of computer cables
zero-daycisco-sd-wandeveloper-targeting

Cisco SD-WAN Under Attack

Multiple Cisco SD-WAN vulnerabilities are being actively exploited, while developers and IT systems face targeted attacks. Learn about the key threats and how to protect yourself.

3 min read
text
zero-dayransomwarecritical-infrastructure

Critical Cisco SD-WAN Vulnerabilities Exploited

Multiple critical vulnerabilities in Cisco SD-WAN products are being exploited, allowing attackers to gain admin access and potentially disrupt critical infrastructure. Ransomware attacks are also on the rise, with a recent surge in attack numbers despite decreased payments.

4 min read
photo of computer cables
zero-daycisco-sd-wancyber-espionage

Cisco SD-WAN Zero-Day Exploited, Chinese Cyber Espionage Disrupted

A critical zero-day vulnerability in Cisco SD-WAN is being actively exploited by attackers, while Google disrupts a Chinese cyber espionage campaign targeting telecoms and governments worldwide. Learn about the key threats and how to protect your organization.

4 min read
Workers at computers in a modern office setting
zero-daysd-wansupply-chain

Cisco SD-WAN Zero-Day Exploited, Devs Targeted, and Major Breaches

A critical Cisco SD-WAN zero-day is under active exploitation, while developers face targeted attacks, and major data breaches hit millions of users. Learn about the threats and how to protect yourself.

5 min read
photo of computer cables
zero-daycisco-sd-wanauthentication-bypass

Cisco SD-WAN Zero-Day Under Active Exploitation

A critical zero-day vulnerability in Cisco SD-WAN is being actively exploited, allowing attackers to bypass authentication and gain administrative access. This vulnerability affects Cisco Catalyst SD-WAN Controller and Manager, with a patch available. Readers should prioritize updating their systems to prevent exploitation.

4 min read
photo of computer cables
zero-daycisco-sd-wanai-threats

Cisco SD-WAN Zero-Day Exploited, AI Threats Rise

Critical Cisco SD-WAN vulnerabilities are under active exploitation, while malicious AI-related activities and targeted attacks on critical infrastructure pose significant threats to global security. Learn about the key risks and how to protect your organization.

4 min read
photo of computer cables
zero-daycisco-sd-wancyber-espionage

Critical Cisco SD-WAN Bugs Exploited Amidst Zero-Days and AI Threats

Active exploitation of critical Cisco SD-WAN vulnerabilities, alongside zero-day exploits in cyber espionage campaigns and malicious AI-generated code attacks, pose significant threats to global cybersecurity. Learn about the key risks and necessary mitigation strategies.

4 min read
a padlock on top of a circuit board
industrial-control-systemsvulnerabilitiesremote-code-execution

Industrial Control System Vulnerabilities Pose Significant Risks

The Cybersecurity and Infrastructure Security Agency (CISA) has warned of vulnerabilities in InSAT MasterSCADA and Schneider Electric EcoStruxure Building Operation products, which could allow remote code execution and unauthorized access to sensitive data. These vulnerabilities pose significant risks to critical infrastructure sectors, including energy, water, and transportation systems.

5 min read
a computer monitor and keyboard on a desk
ransomwarecyber-espionagecritical-infrastructure

Ransomware and Cyber Espionage Threats Escalate

Ransomware and cyber espionage campaigns are on the rise, targeting critical infrastructure and sensitive information. Recent attacks include a Chinese cyber espionage campaign that breached 53 organizations across 42 countries, and the Lazarus Group's use of Medusa ransomware in attacks on the Middle East and US healthcare sectors.

4 min read
A figure is using a laptop in the dark.
ransomwaredata-breachesphishing

Ransomware Attacks Surge

A surge in ransomware attacks targets healthcare organizations, while a medical device maker discloses a data breach and phishing campaigns hit freight companies. Learn about the key threats and how to protect yourself.

5 min read
A man sitting in front of a computer monitor
zero-dayremote-code-executionwindows

Critical Vulnerabilities Exposed in Trend Micro, Juniper, and Zyxel Products

Newly disclosed vulnerabilities in Trend Micro, Juniper Networks, and Zyxel products pose significant risks to users. ICS and energy sector vulnerabilities are also highlighted, emphasizing the need for urgent patches and security measures.

4 min read
photo of computer cables
zero-dayransomwarecisco-sd-wan

Cisco SD-WAN Zero-Day Exploited, Plus Ransomware and SolarWinds Patches

A critical zero-day vulnerability in Cisco SD-WAN is being actively exploited, while the Lazarus Group launches a Medusa ransomware campaign and SolarWinds patches critical Serv-U flaws. Learn about these threats and how to protect your organization.

3 min read
ransomwaremedusa-ransomwarelazarus-group

Lazarus Group Attacks Healthcare with Medusa Ransomware

The Lazarus Group has launched targeted attacks on healthcare and Middle East entities using Medusa ransomware, while vulnerabilities in InSAT MasterSCADA and Schneider Electric products pose additional risks to critical infrastructure. Learn about the threats and how to protect your organization.

4 min read
black laptop computer with white paper
zero-dayransomwaredata-breaches

Zero-Day Vulnerability Under Active Exploitation

A critical zero-day vulnerability is being actively exploited, while significant data breaches and new malware campaigns pose high risks to users. Immediate action is necessary to prevent further exploitation.

4 min read
a desk with several monitors
zero-dayransomwarecritical-infrastructure

Zero-Days & Ransomware: Twin Threats to US Security

The Lazarus Group's Medusa ransomware attacks and active exploitation of zero-day vulnerabilities pose significant threats to national security. Recent incidents involve a former US defense contractor employee selling zero-day exploits to a Russian broker and the targeting of US healthcare organizations with Medusa ransomware.

5 min read
brown padlock on black computer keyboard
zero-dayransomwaresupply-chain

SolarWinds & FortiGate Under Attack

Critical vulnerabilities in SolarWinds and FortiGate pose significant risks, while recent ransomware attacks and newly disclosed threats demand immediate attention from security teams. Learn about the key threats and how to protect your organization.

4 min read
ProjectZyper AI ProjectZyper AI

AI-powered cybersecurity threat intelligence. Aggregated, analyzed, and published daily.

Powered by AI

Status

Live threat monitor Monitoring threat feeds — updated hourly

AI-generated content. Verify critical information independently.

© 2026 ProjectZyper AI. All rights reserved.