Searching in Data Privacy & Cybersecurity · Search everything

687 changes Data Privacy & Cybersecurity

Favicon for www.ncsc.gov.uk

APT28 Exploits Routers for DNS Hijacking Attacks

The NCSC published an advisory exposing how Russian state cyber group APT28 compromised vulnerable internet routers to conduct DNS hijacking operations, enabling traffic interception and credential harvesting. The advisory provides mitigation guidance including protecting management interfaces, maintaining updated devices, and implementing two-step verification.

Priority review Guidance Cybersecurity
Favicon for www.ncsc.gov.uk

APT28 Exploits Routers to Enable DNS Hijacking Operations

The UK NCSC issued an advisory detailing how Russian state-sponsored actor APT28 exploits vulnerable routers by overwriting DHCP/DNS settings to redirect traffic through attacker-controlled DNS servers. These operations enable adversary-in-the-middle attacks that harvest passwords, OAuth tokens, and authentication credentials. The NCSC attributes APT28 to Russia's GRU military intelligence and provides indicators of compromise and mitigation guidance.

Urgent Guidance Cybersecurity
Favicon for www.csa.gov.sg

Secure Software Supply Chain and Development Workflows Advisory

The Cyber Security Agency of Singapore (CSA) issued an advisory on securing software supply chains and development workflows against cyber threats. The advisory highlights specific attack vectors including compromised package maintainer accounts, malicious dependency injection, and shadow IT adoption. CSA references the March 2026 Axios npm compromise and September 2025 @ctrl/tinycolor supply chain attack as examples of active threats targeting the software supply chain.

Priority review Guidance Cybersecurity
Favicon for www.csa.gov.sg

FortiClient EMS Critical Vulnerability Active Exploitation Hotfix Urged

The Cyber Security Agency of Singapore issued an urgent alert about CVE-2026-35616, a critical improper access control vulnerability in FortiClient EMS versions 7.4.5 through 7.4.6. The vulnerability is being actively exploited in the wild and allows unauthenticated attackers to execute unauthorized code, potentially compromising the entire server. Fortinet has released a hotfix that users must install immediately.

Urgent Notice Cybersecurity
Favicon for www.csa.gov.sg

F5 BIG-IP Critical Vulnerability Actively Exploited

The Cyber Security Agency of Singapore issued an urgent advisory warning of active exploitation of a critical vulnerability (CVE-2025-53521) in F5 BIG-IP Access Policy Manager with a CVSS v3.1 score of 9.8 out of 10. The vulnerability allows unauthenticated remote code execution and full system compromise. Affected versions include BIG-IP APM 17.5.0-17.5.1, 17.1.0-17.1.2, 16.1.0-16.1.6, and 15.1.0-15.1.10.

Urgent Notice Cybersecurity
Favicon for www.csa.gov.sg

Critical Vulnerabilities in Cisco Products

CSA Singapore issued an alert about critical CVSS 9.8 vulnerabilities in Cisco products affecting IMC and SSM On-Prem systems. CVE-2026-20093 allows authentication bypass enabling password alteration, while CVE-2026-20160 permits remote root command execution. Organizations using affected Cisco products must update immediately.

Urgent Notice Cybersecurity
Favicon for www.cisa.gov

Fortinet FortiClient EMS Improper Access Control Vulnerability Added to KEV Catalog

CISA added CVE-2026-35616 (Fortinet FortiClient EMS Improper Access Control) to the Known Exploited Vulnerabilities Catalog based on evidence of active exploitation. The vulnerability poses significant risk as a frequent attack vector for malicious cyber actors. FCEB agencies face binding remediation requirements under BOD 22-01, while CISA urges all organizations to prioritize timely remediation as part of their vulnerability management practice.

Urgent Notice Cybersecurity
Favicon for www.cisa.gov

Fortinet FortiClientEMS Improper Access Control Vulnerability

CISA published a critical cybersecurity advisory for CVE-2026-35616, an improper access control vulnerability in Fortinet FortiClientEMS versions 7.4.5 through 7.4.6. The vulnerability carries a CVSS score of 9.1 and is being actively exploited, allowing unauthenticated attackers to execute unauthorized code or commands via crafted requests. CISA has marked this vulnerability in its SSVC and KEV catalogs with active exploitation and total technical impact.

Urgent Guidance Cybersecurity
Favicon for www.csa.gov.sg

Advisory protecting websites from cyber-attacks

Advisory protecting websites from cyber-attacks

Routine Notice
Favicon for www.cert.ssi.gouv.fr

Synology Mail Station Vulnerability Advisory

CERT-FR issued a security advisory warning of a vulnerability in Synology Mail Station (versions prior to 30000001.3.19-20332 for DSM). The vulnerability, tracked as CVE-2026-5129, allows attackers to compromise data confidentiality and integrity. Users are advised to apply the vendor patch referenced in Synology security advisory Synology_SA_26_04.

Priority review Notice Cybersecurity

Showing 171–180 of 687 changes

1 16 17 18 19 20 69

Filters

Clear