Intelligence · Updated daily

Security Intelligence

AI-analysed threats, vulnerabilities and campaigns. Not just what happened — what it means, who's affected, and what to do about it.

Page 9 of 17

201–225 of 403
criticalVulnerabilityEmerging

Siemens SIMATIC S7-1500 Code Injection via Malicious Trace Files - Critical OT Supply Chain Risk

Siemens SIMATIC S7-1500 industrial controllers contain a code injection vulnerability exploitable through specially crafted trace files in the web interface, affecting multiple drive controller and edge device variants. This represents a critical remote code execution vector in operational technology environments.

CVE-2025-40943
Siemens SIMATIC Drive Controller CPU 1504D TF, Siemens SIMATIC Drive Controller CPU 1507D TF, Siemens SIMATIC ET 200SP CPU 1510SP F-1 PN
criticalSupply ChainActive

Siemens SIDIS Prime Supply Chain Vulnerability Storm - 23 CVEs from Outdated Dependencies

Siemens SIDIS Prime versions before 4.0.800 contain 23 vulnerabilities across OpenSSL, SQLite, and Node.js packages, creating a critical attack surface in industrial control environments that depend on this software.

CVE-2024-29857CVE-2024-30171CVE-2024-30172CVE-2024-41996CVE-2025-6965CVE-2025-7783CVE-2025-9230CVE-2025-9232CVE-2025-9670CVE-2025-12816CVE-2025-15284CVE-2025-58751CVE-2025-58752CVE-2025-58754CVE-2025-62522CVE-2025-64718CVE-2025-64756CVE-2025-66030CVE-2025-66031CVE-2025-66035CVE-2025-66412CVE-2025-69277CVE-2026-22610
Siemens SIDIS Prime <4.0.800
highVulnerabilityActive

IoT Administrative Credential Exposure: Factory Default and Weak Authentication Paradigm

IoT devices shipping with administrative credentials or defaulting to admin-level access create a persistent authentication bypass that enables complete device compromise. This represents a fundamental architectural failure in IoT security that affects entire device classes and is difficult to remediate post-deployment.

IoT devices (generic class), Smart home devices, Industrial IoT +1
criticalCampaignActive

INC Ransomware Expands Oceania Healthcare Targeting, Signals Regional Focus Shift

INC ransomware group is conducting sustained attacks against healthcare infrastructure across Australia, New Zealand, and Tonga, disrupting emergency services and government operations. This regional concentration indicates either a deliberate geographic pivot or emerging local infection vectors.

Australian Government Agencies, New Zealand Healthcare Facilities, Emergency Clinics (Oceania) +1
highCampaignActive

Social Engineering Campaign Targets Developer Credentials via Fake Recruitment – Supply Chain Risk Vector

Threat actors execute a sophisticated social engineering campaign impersonating recruiters from crypto and AI companies, delivering backdoors (OtterCookie, FlexibleFerret) through fake coding assessments to steal developer credentials, API tokens, and source code. This represents a high-impact supply chain attack vector targeting a critical workforce demographic.

Software developers, Crypto industry, AI/ML companies +1
criticalCampaignActive

State-Sponsored IoT Exploitation: Israeli Targeting of Iranian Critical Infrastructure via Traffic Camera Network

Israel allegedly exploited Iranian traffic camera systems to conduct surveillance and assist in targeted assassination of Iranian leadership. This demonstrates advanced state-actor capability to weaponize civilian IoT infrastructure for kinetic operations.

Iranian traffic camera network, IoT/CCTV infrastructure, Critical infrastructure (transportation)
criticalVulnerabilityEmerging

AirSnitch: Cross-Layer Wi-Fi Desynchronization Enables Full MitM Against All Network Scales

AirSnitch exploits fundamental layer 1-2 binding failures in Wi-Fi to perform bidirectional machine-in-the-middle attacks across home, office, and enterprise networks without requiring network membership or proximity constraints. The attack breaks core 802.11 assumptions about client identity synchronization.

Wi-Fi networks (802.11 standard), Home networks, Office networks +1