Tag: infrastructure
-
Funk von kritischer Infrastruktur leicht abhörbar
Viele KRITIS-Einrichtungen wie Energieversorger verzichten auf verschlüsselte Funknetze.Etliche Einrichtungen der kritischen Infrastruktur in Deutschland kommunizieren mit ungeschützter Funktechnik. Der Digitalfunk zahlreicher Haftanstalten, Flughäfen und Energieversorger lässt sich mit geringem technischen Aufwand auch aus der Ferne abhören, weil die Betreiber auf die Verschlüsselung ihrer Netze verzichten, wie die “Wirtschaftswoche” berichtet.Die AG Kritis, eine anerkannte unabhängige Arbeitsgruppe…
-
Enterprises still aren’t getting IAM right
Tags: access, ai, api, authentication, automation, cloud, control, credentials, cybersecurity, data, email, governance, iam, identity, incident response, infrastructure, least-privilege, password, risk, saas, service, toolJust 1% have fully implemented a modern just-in-time (JIT) privileged access model;91% say at least half of their privileged access is always-on (standard privilege), providing unrestricted, persistent access to sensitive systems;45% apply the same privileged access controls to human and AI identities;33% lack clear AI access policies.The research also revealed a growing issue with “shadow…
-
CISA retires 10 emergency cyber orders in rare bulk closure
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has retired 10 Emergency Directives issued between 2019 and 2024, saying that the required actions have been completed or are now covered by Binding Operational Directive 22-01. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisa-retires-10-emergency-cyber-orders-in-rare-bulk-closure/
-
What are the latest trends in NHIs security?
How Are Non-Human Identities Shaping Today’s Security Landscape? When was the last time you pondered the sheer scale of machine identities operating within your organization? Non-Human Identities (NHIs), the silent sentinels navigating the complexities of modern security infrastructure, are becoming increasingly pivotal in safeguarding sensitive data and operations. The task of providing comprehensive protection from……
-
TÜV-Verband zum Stromausfall in Berlin: Deutschlands Infrastruktur braucht mehr Resilienz
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/tuev-verband-stromausfall-berlin-deutschland-infrastruktur-bedarf-resilienz
-
Cyber Retaliation Risks Rise After US-Venezuela Operation
CISA Warns of Retaliatory Cyber Action From Hostile State Actors After Venezuela. Federal cybersecurity officials are warning of a likely uptick in retaliatory cyber activity from China and Russia-linked threat actors after the U.S. military raid in Venezuela, urging infrastructure operators to brace for disruptive probing and attacks. First seen on govinfosecurity.com Jump to article:…
-
CISA sunsets 10 emergency directives thanks to evolution of exploited vulnerabilities catalog
The Cybersecurity and Infrastructure Security Agency (CISA) said on Thursday that the 10 directives being retired were issued between 2019 and 2024, spanning both the Trump and Biden administrations. First seen on therecord.media Jump to article: therecord.media/cisa-sunsets-10-emergency-directives
-
Maximum Severity HPE OneView Flaw Exploited in the Wild
Exploitation of CVE-2025-37164 can enable remote code execution on HPE’s IT infrastructure management platform, leading to devastating consequences. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/maximum-severity-hpe-oneview-flaw-exploited
-
Breach Roundup: Firewalls Headed for Obsolesce
Also, Sedgwick Confirms Breach, Romanian Power Firm Hit, D-Link Flaws Exploited. This week, Moody’s said firewalls will be obsolete, Romanian critical infrastructure hacked, Sedgwick breach and a D-Link DSL flaw. Finland seized the Fitburg. Microsoft said Direct Send not to blame for Exchange phishing. Malicious Chrome extensions, European hotels targeted and health breaches. First seen…
-
Report: China Breached Email Systems Used by U.S. Congressional Staff
Beijing dismissed accusations of Chinese involvement in a significant cyberattack against United States congressional staff email systems on Thursday, characterizing the allegations as >>politically motivated disinformation.<< The denial comes after the Financial Times reported that Chinese hackers successfully compromised email infrastructure used by members of powerful House of Representatives committees, according to sources familiar with…
-
Ransomware attacks kept climbing in 2025 as gangs refused to stay dead
Cop wins hit crime infrastructure, not the people behind it First seen on theregister.com Jump to article: www.theregister.com/2026/01/08/ransomware_2025_emsisoft/
-
Phishing-Angreifer setzen vermehrt auf E-Mail-Routing-Lücken
Tags: 2fa, authentication, business, cyberattack, dmarc, dns, email, framework, infrastructure, intelligence, mail, mfa, microsoft, password, phishing, risk, service, spam, threatAngreifer missbrauchen falsch konfigurierte Richtlinien, um Phishing-E-Mails wie interne E-Mails aussehen zu lassen, Filter zu umgehen und Anmeldedaten zu stehlen.Das Threat Intelligence Team von Microsoft hat kürzlich festgestellt, dass Angreifer zunehmend komplexe E-Mail-Weiterleitungen und falsch konfigurierte Domain-Spoofing-Schutzmaßnahmen ausnutzen. Dabei lassen sie ihre Phishing-Nachrichten so aussehen, als würden sie von den angegriffenen Organisationen selbst stammen.In den…
-
NIS2-Umsetzung: Neues BSI-Portal geht an den Start
Tags: bsi, ceo, cloud, cyber, gartner, infrastructure, linkedin, nis-2, resilience, risk-analysis, risk-management, service, vulnerabilityUnternehmen können sich ab sofort über das neue BSI-Portal als NIS2-Einrichtung registrieren und IT-Sicherheitsvorfälle melden.Seit Anfang Dezember gilt die EU-Sicherheitsrichtline NIS2 auch in Deutschland. Rund 29.500 Unternehmen sind dadurch verpflichtet, sich als NIS-2-Einrichtungen zu registrieren und dem Bundesamt für Sicherheit in der Informationstechnik (BSI) erhebliche Sicherheitsvorfälle zu melden. Vor diesem Hintergrund hat das BSI ein…
-
NISUmsetzung: BSI schaltet Meldeportal auf Amazon-Servern frei
Fast 30.000 Firmen und Behörden der kritischen Infrastruktur müssen sich beim BSI registrieren. Das Portal läuft auf Clouddiensten von AWS. First seen on golem.de Jump to article: www.golem.de/news/nis-2-umsetzung-bsi-schaltet-meldeportal-auf-amazon-servern-frei-2601-203957.html
-
UAT-7290 targets high value telecommunications infrastructure in South Asia
Talos assesses with high confidence that UAT-7290 is a sophisticated threat actor falling under the China-nexus of Advanced Persistent Threat actors (APTs). UAT-7290 primarily targets telecommunications providers in South Asia. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/uat-7290/
-
U.S. CISA adds HPE OneView and Microsoft Office PowerPoint flaws to its Known Exploited Vulnerabilities catalog
Tags: cisa, cve, cybersecurity, exploit, flaw, infrastructure, kev, microsoft, office, vulnerabilityU.S. Cybersecurity and Infrastructure Security Agency (CISA) adds HPE OneView and Microsoft Office PowerPoint flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added HPE OneView and Microsoft Office PowerPoint flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws added to the catalog: CVE-2009-0556 is a memory corruption flaw…
-
China-linked groups intensify attacks on Taiwan’s critical infrastructure, NSB warns
Taiwan says China-linked cyberattacks on its energy sector rose tenfold in 2025, hitting critical infrastructure across nine sectors, with total incidents up 6%. Taiwan reports China-linked cyberattacks on its energy sector surged tenfold in 2025, targeting critical infrastructure across nine sectors, with total incidents up 6% YoY. Taiwan’s National Security Bureau (NSB) reports China launched…
-
CISA tags max severity HPE OneView flaw as actively exploited
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has flagged a maximum-severity HPE OneView vulnerability as actively exploited in attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisa-tags-max-severity-hpe-oneview-flaw-as-actively-exploited/
-
BlueDelta Hackers Target Microsoft OWA, Google, and Sophos VPN to Steal Credentials
A sophisticated credential-harvesting operation conducted by BlueDelta, a Russian state-sponsored threat group linked to the GRU’s Main Directorate, targeted critical infrastructure organizations and research institutions throughout 2025, according to a comprehensive investigation by Recorded Future’s Insikt Group. The campaign, spanning February through September 2025, represents a significant evolution in the group’s persistent credential-theft operations, with…
-
CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited
Tags: cisa, cve, cybersecurity, exploit, flaw, infrastructure, injection, kev, microsoft, office, vulnerabilityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting Microsoft Office and Hewlett Packard Enterprise (HPE) OneView to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.The vulnerabilities are listed below -CVE-2009-0556 (CVSS score: 8.8) – A code injection vulnerability in Microsoft Office First seen on thehackernews.com…
-
How scalable are secret management methods for NHIs?
How Do Non-Human Identities Influence Cybersecurity Strategies? What role do Non-Human Identities (NHIs) play in your cybersecurity strategy? Where technology is increasingly shaped by machine-to-machine interactions, the significance of NHIs has grown exponentially. These identities are not just essential but central to infrastructure integrity. NHIs encompass machine identities, which are represented through unique “Secrets” such……
-
Threat Actors Exploit Google Cloud Services to Steal Microsoft 365 Credentials
Tags: cloud, credentials, cyber, cybersecurity, email, exploit, google, infrastructure, malicious, microsoft, phishing, service, threatA sophisticated phishing campaign is exploiting Google Cloud infrastructure to bypass email security filters and steal Microsoft 365 credentials, demonstrating how attackers increasingly abuse trusted cloud platforms to lend legitimacy to their malicious activities. Cybersecurity researchers at Check Point have uncovered a large-scale operation targeting approximately 3,200 organizations, resulting in over 9,300 phishing emails over…
-
Chinese Hackers Launch Ongoing Attacks on Taiwan’s Critical Infrastructure
China’s state-sponsored cyber operations against Taiwan have intensified dramatically, with threat actors launching an average of 2.63 million intrusion attempts daily targeting critical infrastructure across nine primary sectors, according to a newly released report from Taiwan’s National Security Bureau (NSB). The NSB report documents a concerning pattern of synchronized cyber warfare operations that correlate directly…
-
Malicious NPM Packages Deliver NodeCordRAT
IntroductionZscaler ThreatLabz regularly monitors the npm database for suspicious packages. In November 2025, ThreatLabz identified three malicious packages: bitcoin-main-lib, bitcoin-lib-js, and bip40. The bitcoin-main-lib and bitcoin-lib-js packages execute a postinstall.cjs script during installation, which installs bip40, the package that contains the malicious payload. This final payload, named NodeCordRAT by ThreatLabz, is a remote access trojan (RAT) with data-stealing capabilities. It is also possible to download bip40…
-
Malicious NPM Packages Deliver NodeCordRAT
IntroductionZscaler ThreatLabz regularly monitors the npm database for suspicious packages. In November 2025, ThreatLabz identified three malicious packages: bitcoin-main-lib, bitcoin-lib-js, and bip40. The bitcoin-main-lib and bitcoin-lib-js packages execute a postinstall.cjs script during installation, which installs bip40, the package that contains the malicious payload. This final payload, named NodeCordRAT by ThreatLabz, is a remote access trojan (RAT) with data-stealing capabilities. It is also possible to download bip40…
-
Neue Ransomware-Bedrohung zielt auf deutsche Unternehmen
Tags: backup, ciso, cloud, cyberattack, encryption, extortion, firewall, germany, infrastructure, intelligence, network, ransomware, threat, tool, vmware, vulnerabilityDer Ransomware-Dienst Ransomhouse nutzt jetzt eine komplexe Dual-Schlüssel-Verschlüsselung und automatisierte Angriffe auf VMware ESXi.Sicherheitsexperten haben kürzlich festgestellt, dass die Ransomware-Gruppe Jolly Scorpius ihren RaaS-(Ransomware as a Service)-Dienst Ransomhouse massiv verbessert hat. Wie das Threat-Intelligence-Team von Palo Alto Networks berichtet, nutzt die Gruppe jetzt ein fortschrittliches duales Verschlüsselungssystem.Die Angriffe basieren auf einer aktualisierten Version des Verschlüsselungs-Trojaner…
-
China intensifies Cyber-Attacks on Taiwan as Energy Sector Sees Tenfold Spike
Taiwan recorded an average of 2.63 million cyber intrusion attempts to it critical infrastructure per day coming from China in 2025 First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/china-intensifies-cyberattacks/

