Tag: TRJ Cybersecurity
KEV CATALOG EXPANSION — F5 BIG-IP REMOTE CODE EXECUTION VULNERABILITY ADDED AFTER ACTIVE EXPLOITATION CONFIRMED
CSAM DETECTION FRAMEWORK COLLAPSE — EUROPEAN PARLIAMENT REJECTS EXTENSION OF SCANNING RULES, DISRUPTING PLATFORM-LEVEL DETECTION PIPELINES
CISA CAPABILITY COLLAPSE — FEDERAL SHUTDOWN FORCES CYBER DEFENSE INTO REACTIVE MODE AS WORKFORCE DROPS AND SYSTEMIC RISK EXPANDS
APPLE AGE VERIFICATION ENFORCEMENT — UK IOS UPDATE INTRODUCES MANDATORY ID AND PAYMENT-BASED AGE CHECKS AS REGULATORY PRESSURE INTENSIFIES
AI SUPPLY CHAIN COMPROMISE: MALICIOUS LITELLM PACKAGES ENABLE CREDENTIAL THEFT AND PERSISTENT ACCESS ACROSS CLOUD ENVIRONMENTS
ACTIVE EXPLOITATION CONFIRMED — CISA ADDS LANGFLOW CODE INJECTION FLAW TO KEV CATALOG, SIGNALING IMMEDIATE RISK TO FEDERAL AND PRIVATE SYSTEMS
ENDPOINT CONTROL HIJACK WINDOW — ENTERPRISE MANAGEMENT SYSTEMS TARGETED IN LIVE CAMPAIGN FOLLOWING STRYKER ENVIRONMENT BREACH
PERSEUS MALWARE CAMPAIGN — ANDROID STREAMING APPS USED AS TROJANIZED DELIVERY VECTOR FOR CREDENTIAL THEFT AND NOTE EXTRACTION OPERATIONS
MEDUSA RANSOMWARE STRIKES HEALTHCARE AND GOVERNMENT SYSTEMS — MULTI-STATE DISRUPTION WITH DATA EXTORTION DEADLINES
SUPPLY CHAIN BREACH EXPANDS — MARQUIS SOFTWARE INCIDENT EXPOSES 670K+ RECORDS ACROSS BANKING NETWORKS
Active Exploitation Confirmed: Wing FTP Server Information Disclosure Vulnerability Added to KEV Catalog
Active Exploitation Confirmed: Google Skia and Chromium V8 Vulnerabilities Added to Federal KEV Catalog
Fake Starlink and Government Apps Used in Android Malware Campaign Targeting Brazilian Banking and Crypto Users
Siemens SIMATIC Advisory Exposes High-Severity Code Injection Risk Across S7-1500 and ET 200SP Industrial Controllers
Global Botnet Infrastructure Dismantled as U.S. and European Authorities Shut Down SocksEscort Router Proxy Network
White House Orders Federal Crackdown on Transnational Cybercrime and Proposes Victim Restoration Program
TRJ Cybersecurity — ICS Advisory: Apeman Camera Vulnerabilities Expose Remote Control and Surveillance Risks
Suspicious Activity Detected on FBI Surveillance Network Triggers Federal Cybersecurity Investigation
Phobos Ransomware Operator Pleads Guilty After Global Extortion Campaign Targeted Over 1,000 Organizations
Global Law Enforcement Disrupts Tycoon 2FA Phishing Platform Used to Breach Hospitals, Schools, and Corporate Accounts
CISA Flags Five Actively Exploited Vulnerabilities in Expanding KEV Catalog, Exposing Surveillance Devices, Industrial Systems, and Apple Platforms
International Law Enforcement Operation Dismantles Major Cybercrime Forum Used for Trafficking Stolen Data
Delta Electronics CNCSoft-G2 Industrial Control Software Vulnerability Exposes Critical Manufacturing Systems to Potential Remote Code Execution
Ransomware Breach at University of Hawaiʻi Cancer Center Exposes Data Linked to Up to 1.2 Million Individuals
ICS Vulnerability Alert: Mitsubishi Electric MELSEC iQ-F EtherNet/IP Modules Exposed to Remote Denial-of-Service Attacks
Critical ICS Vulnerability Found in Labkotec LID-3300IP Monitoring System — Remote System Control Possible
Portwell Engineering Toolkits Vulnerability Raises Privilege Escalation Risks in Industrial Development Environments
TRJ Cybersecurity — Google Disrupts China-Linked Espionage Campaign Targeting Global Telecom and Government Networks
TRJ Cybersecurity — SWITCH EV Platform Vulnerabilities Expose Global Charging Infrastructure to Impersonation and Session Hijack Risk
TRJ Cybersecurity — Pelco Sarix Pro 3 IP Cameras Exposed to Authentication Bypass — Surveillance Integrity at Risk
TRJ Cybersecurity — Frick Quantum HD Controllers Exposed to Pre-Authentication Remote Code Execution — Food & Agriculture Infrastructure at Risk
TRJ Cybersecurity — EV2GO Charging Platform Exposed: Authentication Failures Create High-Risk Entry Points Across Global EV Infrastructure
TRJ Cybersecurity — CloudCharge Platform Vulnerabilities Open Global EV Charging Networks to Session Hijack and Impersonation Risk
ICS ALERT: GARDYN HOME KIT CLOUD & FIRMWARE VULNERABILITIES EXPOSE EDGE DEVICES TO UNAUTHENTICATED TAKEOVER
TRJ CYBERSECURITY — NORTH KOREAN LAZARUS OPERATORS DEPLOY MEDUSA RANSOMWARE IN CROSS-REGIONAL ATTACKS
CISA MOVES TO ELIMINATE END-OF-SUPPORT EDGE DEVICES AS OPENEOX STANDARD TARGETS LIFECYCLE BLIND SPOTS
DIGITAL PROXY WORKFORCE: Ukrainian Facilitator Sentenced in North Korea IT Infiltration Scheme Targeting U.S. Companies
INITIAL ACCESS FOR SALE: Romanian Actor Pleads Guilty After Breaching Oregon Emergency Management Network
CHIPCHAIN LOCKDOWN: Ransomware Strike on Advantest Raises Supply-Side Disruption Risk Across Global Semiconductor Testing Infrastructure
THE SILENT GRID: Volt Typhoon Persistence Across U.S. Utilities Signals Long-Term OT Compromise Risk
TEXAS FILES LAWSUIT AGAINST TP-LINK OVER ALLEGED SECURITY MISREPRESENTATIONS AND ROUTER EXPOSURE RISKS
CVE-2026-22769: DELL RECOVERPOINT ZERO-DAY TRIGGERS FEDERAL PATCH ORDER AMID ACTIVE STATE-BACKED EXPLOITATION
GLOBAL CYBER THREAT SURGE — LIVE MALWARE, RANSOMWARE, AI-DRIVEN INTRUSIONS IMPACTING GOVERNMENT, MILITARY & LAW ENFORCEMENT
North Korean Threat Actor Deploys Deepfake Zoom Ruse and ClickFix Malware in Targeted Crypto Executive Intrusion
Georgia-Based Healthcare Network Reports 626,540 Patient Records Exposed in Qilin Ransomware Intrusion
DIGITAL SQUATTING SURGES 68% AS ATTACKERS WEAPONIZE ROUTINE AND MUSCLE MEMORY TO HARVEST CREDENTIALS
REHEARSING THE BREACH: CHINA’S CYBER RANGE DOCTRINE AND THE QUIET MILITARIZATION OF CRITICAL INFRASTRUCTURE
Apple Pay Real-Time 2FA Harvesting Campaign Exploits Phone-Based Trust to Bypass Account Protections
CISA Orders Federal Agencies to Remove End-of-Life Network Devices Amid Escalating Exploitation Campaigns
CISA Orders Emergency Patch After Exploited SolarWinds Web Help Desk Vulnerability Bypasses Prior Fixes
Russian State-Linked Hackers Exploit Newly Patched Microsoft Office Flaw in Espionage Campaign Across Ukraine and Europe
Notepad++ Update Infrastructure Hijacked in Targeted Supply-Chain Intrusion Linked to State-Aligned Actors
