Our news

  • CISA Releases Twenty-Two Industrial Control Systems Advisories

    CISA released twenty-two Industrial Control Systems (ICS) advisories on May 15, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-135-01 Siemens RUGGEDCOM APE1808 Devices ICSA-25-135-02 Siemens INTRALOG WMS ICSA-25-135-03 Siemens BACnet ATEC Devices ICSA-25-135-04 Siemens Desigo ICSA-25-135-05 Siemens SIPROTEC and SICAM ICSA-25-135-06 Siemens Teamcenter Visualization ICSA-25-135-07 Siemens IPC

    READ MORE

  • Vulnerability Summary for the Week of May 5, 2025

    High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 1clickmigration–1 Click WordPress Migration Plugin 100% FREE for a limited time The 1 Click WordPress Migration Plugin – 100% FREE for a limited time plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ‘start_restore’ function

    READ MORE

  • Update to How CISA Shares Cyber-Related Alerts and Notifications

    Starting May 12, CISA is changing how we announce cybersecurity updates and the release of new guidance. These announcements will only be shared through CISA social media platforms, email, and RSS feeds and will no longer be listed on our Cybersecurity Alerts & Advisories webpage.   The focus of our Cybersecurity Alerts & Advisories webpage will

    READ MORE

  • Vulnerability Summary for the Week of April 28, 2025

    High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info Novel-Plus–Novel-Plus A vulnerability, which was classified as critical, was found in 20120630 Novel-Plus up to 0e156c04b4b7ce0563bef6c97af4476fcda8f160. Affected is the function genCode of the file novel-admin/src/main/java/com/java2nb/common/controller/GeneratorController.java. The manipulation leads to missing authentication. It is possible to launch the attack remotely. The exploit has been disclosed

    READ MORE

  • Burnout and Alert Fatigue in Cybersecurity

    Cybersecurity workers operate in an environment where they must protect against the constantly evolving tactics of cyber criminals. Often the systems created to support defensive operations can generate excessive noise for analysts who must filter through a flood of alerts which frequently contain numerous false positives. When cybersecurity professionals face these relentless streams of alerts, they can

    READ MORE

  • Vulnerability Summary for the Week of April 21, 2025

    High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info AdeptLanguage–Adept  Adept is a language for general purpose programming. Prior to commit a1a41b7, the remoteBuild.yml workflow file uses actions/upload-artifact@v4 to upload the mac-standalone artifact. This artifact is a zip of the current directory, which includes the automatically generated .git/config file containing the run’s GITHUB_TOKEN.

    READ MORE

  • Vulnerability Summary for the Week of April 14, 2025

    High Vulnerabilities Primary Vendor — Product Description Published CVSS Score Source Info apple — macos A memory corruption issue was addressed with improved bounds checking. This issue is fixed in tvOS 18.4.1, visionOS 2.4.1, iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1. Processing an audio stream in a maliciously crafted media file may result in

    READ MORE

  • CISA Releases Guidance on Credential Risks Associated with Potential Legacy Oracle Cloud Compromise

    CISA is aware of public reporting regarding potential unauthorized access to a legacy Oracle cloud environment. While the scope and impact remains unconfirmed, the nature of the reported activity presents potential risk to organizations and individuals, particularly where credential material may be exposed, reused across separate, unaffiliated systems, or embedded (i.e., hardcoded into scripts, applications,

    READ MORE

  • Beware of the Tax Trap

    It’s that time of year again, tax season, and if you are anything like me and most of my friends who keep saying “I need to file my taxes” all the way until April 14th, you know that day is here. Don’t worry, millions of Americans are scrambling to file their 2024 returns before tomorrow’s

    READ MORE

  • A Seismic Shift in Cryptography and Cybersecurity 

    The field of cybersecurity is staring down the barrel of a fundamental shift in how we look at security and encryption, and quantum computers are holding the business end of this particular boom stick. A computer’s thought process will run in the binary code known as bits, where 1s and 0s are processed in order.

    READ MORE