View CSAF Summary Successful exploitation of these vulnerabilities could allow a low-level user to alter privileges and gain full control to the device. The following versions of Weintek cMT X Series HMI EasyWeb Service are affected: cMT3072XH (CVE-2025-14750, CVE-2025-14751) cMT3072XH(T)…
EVMAPA
View CSAF Summary Successful exploitation of these vulnerabilities could lead to degraded service, a denial-of-service, or unauthorized remote command execution, which could lead to spoofing or a manipulation of charging station statuses. The following versions of EVMAPA are affected: EVMAPA…
Schneider Electric EcoStruxure Process Expert
View CSAF Summary Schneider Electric is aware of a vulnerability in its EcoStruxureTM Process and EcoStruxure™ Process Expert for AVEVA System Platform products. The EcoStruxureTM Process is a single automation system to engineer, operate, and maintain your entire infrastructure for…
Rockwell Automation CompactLogix 5370
View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition. The following versions of Rockwell Automation CompactLogix 5370 are affected: CompactLogix 5370 (CVE-2025-11743) CompactLogix 5370 (CVE-2025-11743) CompactLogix 5370 (CVE-2025-11743) CVSS Vendor Equipment Vulnerabilities…
Microsoft Security success stories: Why integrated security is the foundation of AI transformation
Discover how Ford, Icertis, and TriNet modernized security with Microsoft—embedding Zero Trust, automating defenses, and enabling secure AI innovation at scale. The post Microsoft Security success stories: Why integrated security is the foundation of AI transformation appeared first on Microsoft…
Hackers Are Using LinkedIn DMs and PDF Tools to Deploy Trojans
That LinkedIn message pretending to be job offer could just be malwre. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original article: Hackers Are Using LinkedIn DMs and PDF Tools to…
ESA Confirms Cyber Breach After Hacker Claims 200GB Data Theft
The European Space Agency (ESA) has confirmed a major cybersecurity incident in the external servers used for scientific cooperation. The hackers who carried out the operation claim responsibility for the breach in a post in the hacking community site…
Ledger Customer Data Exposed After Global-e Payment Processor Cloud Incident
A fresh leak of customer details emerged, linked not to Ledger’s systems but to Global-e – an outside firm handling payments for Ledger.com. News broke when affected users received an alert email from Global-e. That message later appeared online,…
Ireland proposes new law allowing police to use spyware
The Irish government announced that it wants to pass a law that would grant police more surveillance powers, such as using spyware to fight serious crime, while aiming to protect the privacy rights of its citizens. This article has been…
Attackers Reverse‑Engineer Patch to Exploit SmarterMail Admin Bypass in the Wild
A critical authentication bypass vulnerability in SmarterTools SmarterMail is actively being exploited in the wild by attackers, according to security researchers at watchTowr Labs. The vulnerability, tracked as WT-2026-0001, allows unauthenticated attackers to reset the system administrator password without any…
Hackers Earned $516,500 for 37 Unique 0-day Vulnerabilities – Pwn2Own Automotive 2026
Day One of Pwn2Own Automotive 2026, which delivered $516,500 USD for 37 zero-days, the event has now accumulated $955,750 USD across 66 unique vulnerabilities, demonstrating the automotive sector’s substantial attack surface. The competition showcased exploits targeting multiple vehicle subsystems, including…
Researchers Detailed r1z Initial Access Broker OPSEC Failures
U.S. authorities have pulled back the curtain on “r1z,” an initial access broker who quietly sold gateways into corporate networks around the world. Operating across popular cybercrime forums, he offered stolen VPN credentials, remote access to enterprise environments, and custom…
Attackers Infrastructure Exposed Using JA3 Fingerprinting Tool
A new powerful method to detect and trace attacker infrastructure using JA3 fingerprinting, a technique that identifies malicious tools through network communication patterns. While many security teams considered JA3 fingerprints outdated after fingerprint lists remained largely unchanged since 2021, fresh…
Obsidian Security Extends Reach to SaaS Application Integrations
Obsidian Security today announced that it has extended the reach of its platform for protecting software-as-a-service (SaaS) applications to include any integrations. Additionally, the company is now making it possible to limit which specific end users of a SaaS application…
Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access
A critical security flaw has been disclosed in the GNU InetUtils telnet daemon (telnetd) that went unnoticed for nearly 11 years. The vulnerability, tracked as CVE-2026-24061, is rated 9.8 out of 10.0 on the CVSS scoring system. It affects all…
IT Security News Hourly Summary 2026-01-22 18h : 8 posts
8 posts were published in the last hour 16:32 : Critical SmarterMail vulnerability under attack, no CVE yet 16:32 : FortiGate firewalls hit by silent SSO intrusions and config theft 16:32 : The Upside Down is Real: What Stranger Things…
Critical SmarterMail vulnerability under attack, no CVE yet
A SmarterMail flaw (WT-2026-0001) is under active attack just days after its January 15 patch, with no CVE assigned yet. A newly disclosed flaw in SmarterTools SmarterMail is being actively exploited just two days after a patch was released. The…
FortiGate firewalls hit by silent SSO intrusions and config theft
Admins say attackers are still getting in despite recent patches FortiGate firewalls are getting quietly reconfigured and stripped down by miscreants who’ve figured out how to sidestep SSO protections and grab sensitive settings right out of the box.… This article…
The Upside Down is Real: What Stranger Things Teaches Us About Modern Cybersecurity
What’s strange but quickly starting to set in is that season five was the final season of the beloved Stranger Things series on Netflix. The show has captivated audiences by pitting its plucky protagonists against an “Upside Down” world of…
Web Bot Auth: Verifying User Identity & Ensuring Agent Trust Through the Customer Journey
DataDome Bot Protect supports Web Bot Auth, enabling cryptographic verification of AI agents to eliminate fraud risk while maintaining business continuity. The post Web Bot Auth: Verifying User Identity & Ensuring Agent Trust Through the Customer Journey appeared first on…
We’ve Reached the “Customers Want Security” Stage, and AI Is Listening
I’ve seen this movie before. That’s why a recent LinkedIn post by Ilya Kabanov stopped me mid-doomscroll. Kabanov described how frontier AI companies are quietly but decisively shifting into cybersecurity. They are not joining as partners or tacking on features.…
Under Armour Ransomware Attack Exposes 72M Email Addresses
Many records also contained additional personal information such as names, dates of birth, genders, geographic locations, and purchase information. The post Under Armour Ransomware Attack Exposes 72M Email Addresses appeared first on TechRepublic. This article has been indexed from Security…
Critical Appsmith Flaw Enables Account Takeovers
Critical vulnerability in Appsmith allows account takeover via flawed password reset process This article has been indexed from www.infosecurity-magazine.com Read the original article: Critical Appsmith Flaw Enables Account Takeovers
IT teams aren’t equipped to stop rogue AI agents
Autonomous systems represent an attack surface existing cybersecurity services models aren’t designed to protect. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: IT teams aren’t equipped to stop rogue AI agents