Hitachi Energy FOX61x
View CSAF
Summary
Hitachi Energy is aware of a vulnerability that affects FOX61x product versions listed in this document. Successful exploitation of this vulnerability can lead to forgery attacks potentially causing impact on confidentiality, integrity and availability for the product. Please refer to the Recommended Immediate Actions for information about the mitigation/remediation. Note: This is applicable only if FOX61x devices are...
Mitsubishi Electric MELSEC iQ-R Series
View CSAF
Summary
Successful exploitation of this vulnerability may allow an attacker to read device data or part of a control program from the affected product, write device data in the affected product, or cause a denial-of-service condition on the affected product.
The following versions of Mitsubishi Electric MELSEC iQ-R Series are affected:
MELSEC iQ-R Series R08/16/32/120PCPU firmware <=48 (CVE-2025-15080)
CVSS
Vendor
Equipment
Vulnerabilities
v3 9.4
Mitsubishi Electric
Mitsubishi Electric...
TP-Link Systems Inc. VIGI Series IP Camera
View CSAF
Summary
Successful exploitation of this vulnerability could result in unauthorized users gaining administrative access to affected closed circuit television cameras.
The following versions of TP-Link Systems Inc. VIGI Series IP Camera are affected:
VIGI Cx45 Series Models C345, C445 <=3.1.0_Build_250820_Rel.57668n (CVE-2026-0629)
VIGI Cx55 Series Models C355, C455 <=3.1.0_Build_250820_Rel.58873n (CVE-2026-0629)
VIGI Cx85 Series Models C385, C485 <=3.0.2_Build_250630_Rel.71279n (CVE-2026-0629)
VIGI C340S Series <=3.1.0_Build_250625_Rel.65381n (CVE-2026-0629)
VIGI C540S Series...
Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
Cisco Talos uncovered “DKnife,” a fully featured gateway-monitoring and adversary-in-the-middle (AitM) framework comprising seven Linux-based implants that perform deep-packet inspection, manipulate traffic, and deliver malware via routers and edge devices. Based on the artifact metadata, DKnife has been used since at least 2019 and the command and control (C2) are still active as of January 2026.DKnife’s attacks target a wide range of devices, including PCs, mobile devices, and Internet of Things (IoT) devices. It delivers and interacts...
Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT
Introduction
Stan Ghouls (also known as Bloody Wolf) is an cybercriminal group that has been launching targeted attacks against organizations in Russia, Kyrgyzstan, Kazakhstan, and Uzbekistan since at least 2023. These attackers primarily have their sights set on the manufacturing, finance, and IT sectors. Their campaigns are meticulously prepared and tailored to specific victims, featuring a signature toolkit of custom...
10 types of information security threats for IT teams
Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them. - Read more
CVE-2026-21532 Azure Function Information Disclosure Vulnerability
Information published. - Read more
CVE-2026-24302 Azure Arc Elevation of Privilege Vulnerability
Information published. - Read more
[R1] Nessus Versions 10.10.2 and 10.11.2 Fix Multiple Vulnerabilities
Nessus Versions 10.10.2 and 10.11.2 Fix Multiple Vulnerabilities Arnie Cabral Thu, 02/05/2026 - 02:13
Nessus leverages third-party software to help provide underlying functionality. One of the third-party components (expat) was found to contain vulnerabilities, and updated versions have been made available by the providers.Out of caution and in line with best practice, Tenable has opted to upgrade these...
Telna launches $100m travel eSIM growth fund
Telna unveils investment fund to provide minority capital investment for eSIM startups, the first of which focuses on MVNOs and travel apps - Read more





