Category: Cybersecurity
West Pharmaceutical Hit by Ransomware Attack Disrupting Global Manufacturing and Distribution Operations
Critical ABB AC500 PLC Vulnerability Exposes Industrial Systems to Potential Remote Code Execution Attacks
ABB Automation Builder Gateway Vulnerability Exposes Industrial Control Environments to Remote PLC Discovery Risks
Multiple Critical ABB AC500 V3 Vulnerabilities Expose Industrial Control Systems to Access Bypass, Certificate Manipulation, and Denial-of-Service Risks
CISA Expands Federal Hiring Push Across Cybersecurity, Infrastructure Security, Acquisition, and Incident Response Divisions
CI FORTIFY: CISA WARNS CRITICAL INFRASTRUCTURE OPERATORS TO PREPARE FOR COMMUNICATIONS FAILURE, OT SABOTAGE, AND LONG-DURATION GEOPOLITICAL CYBER CONFLICT
POLISH INTELLIGENCE CONFIRMS CYBERATTACKS AGAINST WATER TREATMENT SYSTEMS AS INFRASTRUCTURE SABOTAGE THREATS ESCALATE ACROSS NATO TERRITORY
ICS Advisory: Johnson Controls CEM AC2000 Privilege Escalation Vulnerability Exposes Access Control Systems Across Critical Sectors
ICS Advisory: Hitachi Energy PCM600 Vulnerability Enables Path Traversal Risk Across Energy Sector Infrastructure
Freight Hijacking Networks Scale to $725M in Losses Through Broker Impersonation and Load Board Compromise
FRANCE NATIONAL IDENTITY BREACH: IDOR FLAW IN ANTS API ENABLES MASS RECORD EXPOSURE; MINOR SUSPECT CHARGED
ICS ADVISORY: ABB PCM600 PATH TRAVERSAL FLAW ENABLES ARBITRARY CODE EXECUTION IN CONTROL ENVIRONMENTS
ICS ADVISORY: ABB IEC 61850 STACK VULNERABILITY ENABLES DEVICE FAULT AND DENIAL-OF-SERVICE CONDITIONS
MOLDOVA HEALTH SYSTEM BREACH: NATIONAL INSURANCE DATABASE TARGETED IN SUSPECTED DATA EXFILTRATION EVENT
PENTAGON ADVANCES AI IN WARFARE SYSTEMS AS LEADERS IDENTIFY SECURITY, CONTROL, AND SUPPLY CHAIN RISKS IN AUTONOMOUS OPERATIONS
ROBLOX ACCOUNT THEFT RING DISRUPTED: UKRAINIAN AUTHORITIES DETAIN GROUP LINKED TO 610,000 COMPROMISED ACCOUNTS AND CRYPTOCURRENCY RESALE NETWORKS
MICROSOFT TEAMS IMPERSONATION CAMPAIGN: UNC6692 DEPLOYS βSNOWBELTβ BACKDOOR TO BREACH ENTERPRISE NETWORKS THROUGH SOCIAL ENGINEERING AND MALICIOUS EXTENSIONS
PRC NATIONAL EXTRADITED TO UNITED STATES ON CYBER INTRUSION CHARGES LINKED TO HAFNIUM CAMPAIGN AND TARGETING OF COVID-19 RESEARCH
CHINA-LINKED PHISHING OPERATIONS TARGET JOURNALISTS AND DIASPORA ACTIVISTS: βGLITTER CARPβ AND βSEQUIN CARPβ CAMPAIGNS DEPLOY 100+ MALICIOUS DOMAINS IN TRANSNATIONAL REPRESSION MODEL
CISA KEV UPDATE: ACTIVE EXPLOITATION CONFIRMED FOR CONNECTWISE SCREENCONNECT PATH TRAVERSAL AND MICROSOFT WINDOWS PROTECTION FAILURE
TENNESSEE BANS CRYPTOCURRENCY ATMS: FRAUD PIPELINE DISRUPTION TARGETS QR-BASED SCAM TRANSFERS AND ELDER EXPLOITATION NETWORKS
NSA GRASSMARLIN ICS ADVISORY: CVE-2026-6807 XML EXTERNAL ENTITY (XXE) EXPOSURE RISKS SENSITIVE DATA DISCLOSURE ACROSS CONTROL ENVIRONMENTS
ICS ALERT: Cybersecurity and Infrastructure Security Agency EXPANDS KNOWN EXPLOITED VULNERABILITIES CATALOG WITH FOUR ACTIVELY TARGETED FLAWS ACROSS ENTERPRISE AND NETWORK DEVICES
MOBILE BASE STATION SPOOFING OPERATION DISRUPTS MILLIONS OF CONNECTIONS IN CANADAβS FIRST SMS BLASTER CASE
ALASKA REPORTS RECORD CYBERCRIME LOSSES AS FBI DATA SHOWS SURGE IN CRYPTOCURRENCY AND AI-DRIVEN FRAUD: 2025 FIGURES REVEAL SHARP YEAR-OVER-YEAR INCREASE
ADT DATA EXPOSURE INCIDENT IMPACTS CUSTOMER RECORDS AS CRIMINAL CLAIMS SURFACE AROUND LARGE-SCALE DATA THEFT
ICS ADVISORY: Cybersecurity and Infrastructure Security Agency IDENTIFIES PRIVILEGE ESCALATION VULNERABILITY IN SIEMENS RUGGEDCOM CROSSBOW SECURE ACCESS MANAGER PRIMARY (SAM-P)
ICS ADVISORY: Cybersecurity and Infrastructure Security Agency IDENTIFIES INFORMATION DISCLOSURE AND DENIAL-OF-SERVICE RISK IN SIEMENS TPM 2.0 ACROSS INDUSTRIAL COMPUTING SYSTEMS
ICS ADVISORY: Cybersecurity and Infrastructure Security Agency FLAGS AUTHENTICATION BYPASS IN SIEMENS SINEC NMS ENABLING UNAUTHORIZED NETWORK CONTROL ACCESS
ICS ADVISORY: Cybersecurity and Infrastructure Security Agency FLAGS REMOTE CODE EXECUTION RISK IN HARDY BARTH SALIA EV CHARGE CONTROLLER THROUGH FILE UPLOAD AND BUFFER OVERFLOW FLAWS
ICS ADVISORY: Cybersecurity and Infrastructure Security Agency IDENTIFIES CERTIFICATE VALIDATION FAILURE IN SIEMENS ANALYTICS TOOLKIT ENABLING MAN-IN-THE-MIDDLE INTERCEPTION ACROSS INDUSTRIAL SYSTEMS
SCATTERED SPIDER-ASSOCIATED ACTOR PLEADS GUILTY IN $8 MILLION CRYPTO THEFT CAMPAIGN: SOCIAL ENGINEERING, SMISHING, AND ENTERPRISE ACCOUNT TAKEOVERS DRIVE MULTI-SECTOR BREACHES
FBI JACKSONVILLE ISSUES FRAUD ALERT ON IMPERSONATION SCHEMES: SCAMMERS POSE AS FEDERAL AGENTS TO EXTRACT MONEY AND SENSITIVE DATA ACROSS NORTH FLORIDA
DISTRIBUTED DENIAL-OF-SERVICE (DDOS) CAMPAIGN TARGETS BLUESKY INFRASTRUCTURE: PLATFORM REPORTS SUSTAINED TRAFFIC FLOODING ACROSS CORE APPLICATION SYSTEMS
THIRD-PARTY AI TOOL BREACH CASCADES INTO VERCEL ENVIRONMENT COMPROMISE: TOKEN EXPOSURE AND WORKSPACE TAKEOVER TRIGGER SUPPLY CHAIN RISK
OPERATION POWEROFF ESCALATES: GLOBAL TAKEDOWN TARGETS DDoS-FOR-HIRE NETWORKS POWERING MASS DISRUPTION INFRASTRUCTURE
SENATE INQUIRY TARGETS TECH PLATFORM CSAM REPORTING FAILURES: CYBERTIPLINE DATA QUALITY, AI PIPELINES, AND ENFORCEMENT GAPS UNDER REVIEW
CRITICAL ICS ALERT: ANVIZ DEVICE ECOSYSTEM EXPOSED TO HIGH-SEVERITY VULNERABILITIES WITH FULL SYSTEM COMPROMISE POTENTIAL
CYBER-ENABLED CARGO THEFT OPERATIONS DEPLOY MULTI-LAYER REMOTE ACCESS AND CERTIFICATE SIGNING TO BYPASS DEFENSES
FBI SEEKS ADDITIONAL VICTIMS IN CASE INVOLVING CORPUS CHRISTI BUSINESS OWNER VICTOR βDANNYβ ALMAGUER
ROUTER INFILTRATION: FEDERAL OPERATION DISMANTLES GRU-CONTROLLED DNS HIJACKING NETWORK INSIDE U.S. SYSTEMS
EU CSAM SCANNING CONFLICT β BIG TECH CONTINUES CONTENT DETECTION DESPITE LEGAL VOID AND REGULATORY WARNING
PLC BREACH OPERATIONS β IRAN-AFFILIATED APT CAMPAIGN TARGETS U.S. CRITICAL INFRASTRUCTURE THROUGH DIRECT OT SYSTEM MANIPULATION
CRYPTOCURRENCY AND AI FRAUD SURGE β FBI IC3 REPORT DOCUMENTS RECORD $20.8 BILLION IN LOSS AS DIGITAL SCAMS SCALE THROUGH AUTOMATION AND SOCIAL ENGINEERING
FORTINET EMS EXPOSURE β CISA ADDS ACTIVELY EXPLOITED ACCESS CONTROL VULNERABILITY TO KEV CATALOG AS ENTERPRISE ENDPOINT INFRASTRUCTURE TARGETED
MITSUBISHI ICS EXPOSURE β CREDENTIAL DISCLOSURE VULNERABILITIES IN GENESIS64 AND ICONICS SUITE ENABLE DATA COMPROMISE AND SYSTEM DISRUPTION
SIEMENS SICAM 8 EXPOSURE β MULTIPLE ICS VULNERABILITIES ENABLE DENIAL-OF-SERVICE CONDITIONS ACROSS POWER SYSTEM INFRASTRUCTURE
HITACHI ENERGY ELLIPSE RCE EXPOSURE β CRITICAL ICS VULNERABILITY ENABLES REMOTE EXECUTION VIA DESERIALIZATION FLAW
PROJECT SAFE CHILDHOOD ENFORCEMENT SURGE β EASTERN DISTRICT OF VIRGINIA RECORDS 19 CHILD EXPLOITATION CASE ACTIONS IN ONE MONTH
OPERATION WINTER SHIELD β FBI CHICAGO PUSHES CYBER RESILIENCY FRAMEWORK AMID ESCALATING NATION-STATE INTRUSIONS
LEAK BAZAAR EMERGENCE β DATA PROCESSING SERVICES TARGET RANSOMWARE STOCKPILES FOR SECONDARY MONETIZATION
INTERSTATE CHILD EXPLOITATION CASE β OHIO MAN ADMITS TO ENTICEMENT AND SEXUAL CONTACT WITH MISSOURI MINOR
GOVERNANCE TAKEOVER EXPLOIT: $280 MILLION DRAINED FROM DRIFT PROTOCOL IN SUSPECTED DPRK-ALIGNED OPERATION
LEAK BAZAAR EMERGENCE β RANSOMWARE DATA MONETIZATION SHIFTS FROM EXTORTION TO STRUCTURED EXPLOITATION PIPELINES
AXIOS SUPPLY CHAIN BREACH β MALICIOUS NPM RELEASE DELIVERS REMOTE ACCESS TROJAN ACROSS GLOBAL DEV PIPELINES
CISA KEV ALERT β ACTIVE EXPLOITATION OF CITRIX NETSCALER VULNERABILITY EXPANDS ATTACK SURFACE ACROSS ENTERPRISE EDGE SYSTEMS
AI IMAGE ABUSE ENFORCEMENT β DUTCH COURT THREATENS XAI WITH DAILY FINES OVER NONCONSENSUAL NUDIFICATION BY GROK
KEV CATALOG EXPANSION β F5 BIG-IP REMOTE CODE EXECUTION VULNERABILITY ADDED AFTER ACTIVE EXPLOITATION CONFIRMED
CSAM DETECTION FRAMEWORK COLLAPSE β EUROPEAN PARLIAMENT REJECTS EXTENSION OF SCANNING RULES, DISRUPTING PLATFORM-LEVEL DETECTION PIPELINES
ICS DEVICE COMPROMISE VECTOR β WAGO INDUSTRIAL MANAGED SWITCHES CONTAIN HIDDEN CLI FUNCTION ENABLING FULL DEVICE TAKEOVER
CISA CAPABILITY COLLAPSE β FEDERAL SHUTDOWN FORCES CYBER DEFENSE INTO REACTIVE MODE AS WORKFORCE DROPS AND SYSTEMIC RISK EXPANDS
ICS ACCESS CONTROL FAILURE β OPENCODE MESSAGING AND USSD GATEWAY VULNERABILITY ENABLES CROSS-TENANT SMS DATA EXPOSURE
APPLE AGE VERIFICATION ENFORCEMENT β UK IOS UPDATE INTRODUCES MANDATORY ID AND PAYMENT-BASED AGE CHECKS AS REGULATORY PRESSURE INTENSIFIES
ICS MEDICAL THREAT ADVISORY: GRASSROOTS DICOM (GDCM) MEMORY HANDLING FLAW ENABLES DENIAL-OF-SERVICE VIA MALFORMED FILE PARSING
AI CHIP EXPORT SCHEME DISRUPTED β THREE DEFENDANTS CHARGED IN MULTI-MILLION DOLLAR PLOT TO DIVERT U.S. CONTROLLED TECHNOLOGY TO CHINA
AI SUPPLY CHAIN COMPROMISE: MALICIOUS LITELLM PACKAGES ENABLE CREDENTIAL THEFT AND PERSISTENT ACCESS ACROSS CLOUD ENVIRONMENTS
MUSIC INDUSTRY TARGETED BY CYBER AND FINANCIAL CRIME β FBI NASHVILLE FLAGS EXPLOITATION NETWORKS LEVERAGING AI, ACCOUNT TAKEOVERS, AND FRAUD
ACTIVE EXPLOITATION CONFIRMED β CISA ADDS LANGFLOW CODE INJECTION FLAW TO KEV CATALOG, SIGNALING IMMEDIATE RISK TO FEDERAL AND PRIVATE SYSTEMS
IRANIAN CYBER PSYCHOLOGICAL OPERATIONS DISRUPTED β FEDERAL DOMAIN SEIZURES TARGET STATE-LINKED HACKING, DOXXING, AND THREAT NETWORKS
ENDPOINT CONTROL HIJACK WINDOW β ENTERPRISE MANAGEMENT SYSTEMS TARGETED IN LIVE CAMPAIGN FOLLOWING STRYKER ENVIRONMENT BREACH
PERSEUS MALWARE CAMPAIGN β ANDROID STREAMING APPS USED AS TROJANIZED DELIVERY VECTOR FOR CREDENTIAL THEFT AND NOTE EXTRACTION OPERATIONS
