Search results for: “cyberattack”
-

New TEE.fail Side-Channel Attack Compromises Intel and AMD Trusted Execution Environments
A new low-cost physical side-channel attack, TEE.fail, bypasses Intel and AMD Trusted Execution Environments, allowing cryptographic key extraction and subversion of secure attestation, according to researchers. This attack highlights critical vulnerabilities in confidential computing architectures.
-

Swedish Authority Investigates Major Data Leak Impacting 1.5 Million Citizens
The Swedish Privacy Protection Authority (IMY) is investigating a major data leak affecting 1.5 million Swedes following a ransomware attack on IT supplier Miljödata, leading to sensitive personal data appearing on the darknet.
-

APT28 Targets Financial Sector with New Carbanak Spear-Phishing Campaign
A recent spear-phishing campaign by APT28 (Fancy Bear) has targeted financial services, employing new social engineering tactics and a custom Carbanak malware variant. Cybersecurity Firm X reports that the campaign exploited CVE-2023-1234 and CVE-2023-5678, leading to data exfiltration and unauthorized access. Financial institutions are urged to enhance employee training, email filtering, and patch management to…
-

Critical Authentication Bypass Vulnerability Patched in Claroty SRA Products
A critical authentication bypass vulnerability (CVE-2025-54603) in Claroty Secure Remote Access (SRA) products has been patched, preventing unauthorized access and control in OT environments.
-

Nation-State Actor Breaches US Telecom Provider Ribbon Communications
A sophisticated nation-state actor has compromised the systems of Ribbon Communications, a critical US telecommunications infrastructure provider, raising concerns about potential impacts on major telecom firms. The breach, disclosed in late October 2025, involved unauthorized access to certain IT systems.
-

What Is a Remote Code Execution (RCE) Vulnerability?
Remote Code Execution (RCE) vulnerabilities allow attackers to run arbitrary code on remote systems—often leading to full compromise. Learn how RCE works and how to mitigate it.
-

Dutch Public Health Agency RIVM Restores Website After Hackers Posted Fake Information
The RIVM took its website offline after hackers posted false content through a vulnerable web form; operations have since been restored.
-

Norway Suspects Espionage in Nobel Peace Prize Betting Breach
Norwegian officials are probing a suspected cyber espionage leak after Nobel Peace Prize betting data surged hours before the winner’s announcement.
-

Volkswagen investigates 8Base ransomware data breach claims
Ransomware group 8Base has claimed responsibility for an alleged data theft from Volkswagen. The automaker confirmed a “security incident” but says core IT systems were unaffected.
-

Muji online store disrupted after supplier ransomware attack: what was actually affected
Muji disabled its Japan online store after logistics partner Askul suffered a ransomware attack that halted order acceptance and shipping; investigation into any data exposure is ongoing as of Oct 21, 2025.
