Blogs - Security








NIST News
- NIST Report to Congress Provides Update on Champlain Towers South Investigation 2025-02-05The report notes that the team has completed all experimental work on the physical evidence from the building’s structural elements.Sarah Henderson
- New Atom-Based Thermometer Measures Temperature More Accurately 2025-01-23This atomic thermometer provides accurate measurements “out of the box” because it relies on the basic principles of quantum physics.Sarah Henderson
- Novel ‘Quantum Refrigerator’ Is Great at Erasing Quantum Computer’s Chalkboard 2025-01-09Quantum computers need a "clean" workspace, and a team including scientists at NIST has found a way to make one.Sarah Henderson
- NIST Database Can Help Increase Recycling of Textiles and Clothing 2025-01-07Picture this: You have a bag of heavily used clothes that can no longer be donated taking up space in your closet, so you drop it off at your local recycling center. But what happens to that bag of clothes? You might assume that the clothes would getSarah Henderson
- Study Highlights Need for Standardized Measurement Methods in Gene Therapy 2025-01-06Scientists looked at multiple techniques used to measure the modified viruses deployed in some gene therapy research and treatments.Sarah Henderson
- Biden-Harris Administration Awards Semiconductor Research Corporation Manufacturing Consortium Corporation $285M for New CHIPS Manufacturing USA Institute for Digital Twins, Headquartered in North Carolina 2025-01-03Today, the U.S. Department of Commerce announced that CHIPS for America awarded the Semiconductor Research Corporation Manufacturing Consortium Corporation (SRC) $285 million to establish and operate a CHIPS Manufacturing USA institute headquarteredJoy Antwi
- NIST Develops Genetic Material for Validating H5N1 Bird Flu Diagnostic Tests 2025-01-02To bolster the nation’s preparedness for a pandemic, the National Institute of Standards and Technology (NIST) has developed a synthetic, nonhazardous genetic material to support the development and validation of diagnostic tests for the H5N1 virusMegan King
- PFAS Found in Firefighter Gloves, Hoods and Wildland Gear 2024-12-17The amount of PFAS in each sample varied greatly, so it may be possible to design gear that reduces exposure.Sarah Henderson
- 3 NIST Researchers Receive Presidential Rank Awards 2024-12-05All three were awarded the “Distinguished Rank,” the highest category of Presidential Rank Awards.Sarah Henderson
- NIST Transfers Evidence From Champlain Towers South to Miami-Dade Police Department 2024-11-21The National Construction Safety Team has reached an important milestone in its investigation into the 2021 partial collapse of Champlain Towers South.Sarah Henderson
- FACT SHEET: U.S. Department of Commerce & U.S. Department of State Launch the International Network of AI Safety Institutes at Inaugural Convening in San Francisco 2024-11-20San Francisco, California – Today the U.S. Department of Commerce and U.S. Department of State are co-hosting the inaugural convening of the International Network of AI Safety Institutes, a new global effort to advance the science of AI safety andVictoria Ballagh
- Melissa Midzor Named Director of NIST’s Communications Technology Laboratory 2024-11-18The lab focuses on advancing communications technology through research and development in core network technologies, next-generation wireless systems, public safety communications, smart infrastructure and spectrum sharing.Sarah Henderson
- AI Can ‘Hear’ When a Lithium Battery Is About to Catch Fire 2024-11-14NIST researchers have trained AI to detect the telltale sound even in noisy environments.Sarah Henderson
- NIST Awards $15 Million to ASTM International to Establish Standardization Center of Excellence 2024-10-15The new center will support U.S. engagement in international standardization for critical and emerging technologies.Sarah Henderson
- NIST Announces 2024 Baldrige Awards for Performance Excellence 2024-10-10The Baldrige Award was redesigned earlier this year to focus on organizational resilience.Sarah Henderson
- Smart New Laser Technology Can Monitor Greenhouse Gases Faster, More Sensitively 2024-10-09New laser technology, known as free-form dual-comb spectroscopy, quickly measures gases of interest by homing in on the most information-rich parts of a sample.Sarah Henderson
- NIST Awards Up to $1.5 Million to Support Development of Regenerative Medicine Standards Curricula 2024-10-08The awardees will create training programs on the standards, protocols and measurements underpinning the field.Sarah Henderson
- NIST Awards $6 Million to Carnegie Mellon University to Establish an AI Cooperative Research Center 2024-09-24The CMU/NIST AI Measurement Science & Engineering Cooperative Research Center will seek to advance AI risk management practices and evaluation approaches through stakeholder partnerships.Sarah Henderson
- Biden-Harris Administration Announces First CHIPS Commercial Fabrication Facilities Award with Polar Semiconductor, Establishing Independent American Foundry 2024-09-24Today, as part of the Biden-Harris Administration’s Investing in America agenda, the U.S. Department of Commerce announced its first award under the CHIPS Incentives Program’s Funding Opportunity for Commercial Fabrication Facilities of up to $123Joy Antwi
- NIST Awards $3 Million for Community-Based Cybersecurity Workforce Development 2024-09-23The grants of roughly $200,000 each will go to organizations that are working to address the nation’s shortage of skilled cybersecurity employees.Sarah Henderson
NIST Events
- NIST OWM Info Hour: The State of Hydrogen Fuel in the Current Marketplace 2025-08-21This Info Hour will examine the status of hydrogen applications that fall under weights and measures jurisdiction. The community first recognized sales of hydrogen as a cryogenic fluid. In 2005, spearheaded by the American Competitiveness Initiative toYvonne A. Branden
- 75 Contract Review 2025-08-14This two-hour webinar will consider internal auditing techniques and best practices used by a metrology laboratory to comply with ISO/IEC 17025:2017 criteria. Learning Objectives At the end of this session, using your notes and ISO/IEC 17025:2017 orYvonne A. Branden
- 2053 Advanced Mass Seminar 2025-07-28The 9-day, hands-on Advanced Mass calibration seminar focuses on the comprehension and application of the advanced mass dissemination procedures, the equations, and associated calculations. It includes the operation of the laboratory equipmentYvonne A. Branden
- 76 State Laboratory Annual Submission Process 2025-07-10The State Laboratory Annual Submission Process webinar provides guidance on how to successfully submit all required materials to develop a complete and timely Recognition Application according to NIST Handbook (HB) 143, State Weights and MeasuresYvonne A. Branden
- 77 Software Verification and Validation Part I & II 2025-06-26Session I (June 26, 2025) and Session II (July 17, 2025) These two 2-hour sessions on Software Verification and Validation will focus on the use of Microsoft Excel in calibration laboratories and examine the ISO/IEC 17025:2017 requirements related toYvonne A. Branden
- NIST OWM Info Hour: Tips and Tools for Navigating the PDF Electronic Version of NIST Handbooks 2025-06-12Date: June 12, 2025 Time: 2:00 to 3:00 p.m. Eastern Time OWM Technical Contact: Isabel Chavez Baucom Add to Calendar This is the last year (2025) that NIST Handbooks 44, 130, and 133 will be printed in hard copy. In this informational session, weYvonne A. Branden
- Towards Increased Data Sharing and Standardization for Illicit Drug Analysis and Monitoring 2025-06-11As part of NIST's response to the 2023 TRANQ Research Act, we have started a series of workshop to better understand the current states and needs surrounding drug detection, analysis, and monitoring from the perspective of different stakeholderCrissy Robinson
- Needs and Research Gaps Surrounding Safe Handling of Synthetic Opioids and Other Emerging Compounds of Concern 2025-06-09As part of NIST's response to the 2023 TRANQ Research Act, we have started a series of workshop to better understand the current states and needs surrounding drug detection, analysis, and monitoring from the perspective of different stakeholderCrissy Robinson
- 5x5: The Public Safety Innovation Summit 2025-06-03REGISTER NOW 5x5 ― the confirmation of a strong and clear signal ― and the place to make your voice heard and drive public safety communications forward. In 2025, the FirstNet Authority and the National Institute of Standards and Technology’s PublicCrissy Robinson
- 78 Combined Regional Measurement Assurance Program (C-RMAP) 2025-06-01NIST Handbook 143, Section 5.2, Table 2 notes that annual attendance at the RMAP training session is required for ongoing laboratory Recognition of State weights and measures metrology staff. Handbook 143, Program Handbook details the criteria usedYvonne A. Branden
- 16th Annual NICE Conference and Expo 2025-06-01The NICE Conference and Expo will take place June 1-3, 2025. Location to be announced. This event is supported by the National Initiative for Cybersecurity Education (NICE), a program of the National Institute of Standards and Technology in the U.SSusana Barraza
- NIST OWM Info Hour: OWM's Role Within NCWM and U.S. Weights and Measures System 2025-05-15NIST Office of Weights and Measures will provide a clear understanding of our role within the NCWM and the Weights and Measures system in the United States. NIST OWM has a statutory responsibility to promote “cooperation with the states in securingYvonne A. Branden
- 79 Internal Auditing Best Practices 2025-05-15This 2-hour webinar will consider internal auditing techniques and best practices that are used by a metrology laboratory to comply with ISO/IEC 17025:2017 criteria. Learning Objectives During this webinar, using your notes and ISO/IEC 17025:2017 orYvonne A. Branden
- 5th High-Performance Computing Security Workshop 2025-05-07High-performance computing (HPC) systems provide fundamental computing infrastructure and play a pivotal role in economic competitiveness and scientific discovery. Security is an essential component of HPC. NIST HPC Security Working Group (WG) hasCrissy Robinson
- ANSI/NIST-ITL Update Workshop 2025-04-22Join us in Rockville for a directed discussion of the ANSI/NIST-ITL 1-2025 standard update at the NIST NCCoE Facility. We will review, discuss, and vote on the results of the expert working groups, including adding support for contactlessCrissy Robinson
- NIST OWM Info Hour: EVSE Metrology Training Program 2025-04-17Learn about the JOET-supported effort at the NIST Office of Weights and Measures (OWM) to develop an electric vehicle supply equipment (EVSE) metrology training program. An overview of the JOET/OWM collaboration and its role in meeting the 97% uptimeYvonne A. Branden
- Building a Path Forward for Meaningful Cannabis Breathalyzer Realization 2025-04-16We are bringing together participants from government, forensic laboratories, industry, academia, law enforcement agencies, and standards organizations to foster an open and candid discussion for a broad view of the path forward to realize meaningfulCrissy Robinson
- 80 Fundamentals of Metrology - SIM Participants Only 2025-04-14Course Description The 5-day Fundamentals of Metrology seminar is an intensive course that introduces participants to the concepts of measurement systems, units, good laboratory practices, data integrity, measurement uncertainty, measurementYvonne A. Branden
- Open Industrial Digital Ecosystem Summit 2025-04-08The Open Industrial Digital Ecosystem Summit is an annual event bringing together thought leaders, experts, practitioners, developers, and users of standards for data semantics. The event is co-hosted by the Systems Integration Division of thePauline Truong
- 81 Fundamentals of Metrology 2025-04-07Course Description The 5-day Fundamentals of Metrology seminar is an intensive course that introduces participants to the concepts of measurement systems, units, good laboratory practices, data integrity, measurement uncertainty, measurementYvonne A. Branden
CISA Blog
- Unlocking Vulnrichment: Enriching CVE Data 2025-01-21 CISA
- Defending Democracy: The #PROTECT2024 Chapter in Election Infrastructure Security 2025-01-17 CISA
- United in Cyber Defense: A Model for Operational Collaboration 2025-01-16 CISA
- Forging National Resilience for an Era of Disruption 2025-01-16 CISA
- Strengthening America’s Resilience Against the PRC Cyber Threats 2025-01-15 CISA
- Building a Secure by Design Ecosystem 2025-01-13 CISA
- Securing Federal Networks: Evolving to an Enterprise Approach 2025-01-13 CISA
- CISA Through the Years: Policy and Impact 2025-01-10 CISA
- Corporate Cyber Governance: Owning Cyber Risk at the Board Level 2025-01-08 CISA
- From Awareness to Action—Cybersecurity for Everyone from K through Gray 2025-01-08 CISA
CISA Blog
- Unlocking Vulnrichment: Enriching CVE Data 2025-01-21 CISA
- Defending Democracy: The #PROTECT2024 Chapter in Election Infrastructure Security 2025-01-17 CISA
- United in Cyber Defense: A Model for Operational Collaboration 2025-01-16 CISA
- Forging National Resilience for an Era of Disruption 2025-01-16 CISA
- Strengthening America’s Resilience Against the PRC Cyber Threats 2025-01-15 CISA
- Building a Secure by Design Ecosystem 2025-01-13 CISA
- Securing Federal Networks: Evolving to an Enterprise Approach 2025-01-13 CISA
- CISA Through the Years: Policy and Impact 2025-01-10 CISA
- Corporate Cyber Governance: Owning Cyber Risk at the Board Level 2025-01-08 CISA
- From Awareness to Action—Cybersecurity for Everyone from K through Gray 2025-01-08 CISA
ICS Advisories
- Schneider Electric EcoStruxure Power Monitoring Expert (PME) 2025-02-06View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.1 ATTENTION: Exploitable remotely Vendor: Schneider Electric Equipment: EcoStruxure Power Monitoring Expert (PME) Vulnerability: Deserialization of Untrusted Data 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to remotely execute code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Schneider Electric reports that the following products are […]CISA
- ABB Drive Composer 2025-02-06View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: ABB Equipment: Drive Composer Vulnerability: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 2. RISK EVALUATION Successful exploitation of this vulnerability could allow attackers unauthorized access to the file system on the host machine. An attacker can exploit […]CISA
- Schneider Electric EcoStruxure 2025-02-06View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Low attack complexity Vendor: Schneider Electric Equipment: EcoStruxure Vulnerability: Uncontrolled Search Path Element 2. RISK EVALUATION Successful exploitation of this vulnerability allows for local privilege escalation, which could lead to the execution of a malicious Dynamic-Link Library (DLL). 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following […]CISA
- Trimble Cityworks 2025-02-06View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.6 ATTENTION: Exploitable remotely/low attack complexity/known public exploitation Vendor: Trimble Equipment: Cityworks Vulnerability: Deserialization of Untrusted Data 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an authenticated user to perform a remote code execution. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Trimble Cityworks, […]CISA
- Elber Communications Equipment 2025-02-04View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available Vendor: Elber Equipment: Communications Equipment Vulnerabilities: Authentication Bypass Using an Alternate Path or Channel, Hidden Functionality 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker unauthorized administrative access to the affected device. 3. TECHNICAL DETAILS 3.1 […]CISA
- Schneider Electric Web Designer for Modicon 2025-02-04View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Schneider Electric Equipment: Web Designer for Modicon Vulnerability: Improper Restriction of XML External Entity Reference 2. RISK EVALUATION Successful exploitation of this vulnerability could result in information disclosure, workstation integrity and potential remote code execution on the compromised computer. 3. TECHNICAL DETAILS […]CISA
- Schneider Electric Modicon M340 and BMXNOE0100/0110, BMXNOR0200H 2025-02-04View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.6 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon M340 and BMXNOE0100/0110, BMXNOR0200H Vulnerability: Exposure of Sensitive Information to an Unauthorized Actor 2. RISK EVALUATION Successful exploitation of this vulnerability could cause information disclosure of a restricted web page, modification of a web page, and a […]CISA
- AutomationDirect C-more EA9 HMI 2025-02-04View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: AutomationDirect Equipment: C-more EA9 HMI Vulnerability: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition or achieve remote code execution on the affected […]CISA
- Schneider Electric Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC 2025-02-04View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC Vulnerability: Incorrect Calculation of Buffer Size 2. RISK EVALUATION Successful exploitation of this vulnerability could cause a denial-of-service of the product when an unauthenticated user sends a crafted HTTPS packet […]CISA
- Schneider Electric Pro-face GP-Pro EX and Remote HMI 2025-02-04View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.1 ATTENTION: Exploitable remotely Vendor: Schneider Electric Equipment: Pro-face GP-Pro EX and Remote HMI Vulnerability: Improper Enforcement of Message Integrity During Transmission in a Communication Channel 2. RISK EVALUATION Successful exploitation of this vulnerability could allow man-in-the-middle attacks, resulting in information disclosure, integrity issues, and operational failures. 3. […]CISA
- Rockwell Automation 1756-L8zS3 and 1756-L3zS3 2025-02-04View CSAF 1. EXECUTIVE SUMMARY CVSS v4 7.1 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: 1756-L8zS3, 1756-L3zS3 Vulnerability: Improper Handling of Exceptional Conditions 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a remote, non-privileged user to send malicious requests resulting in a major nonrecoverable fault causing a denial-of-service condition. 3. TECHNICAL […]CISA
- Western Telematic Inc NPS Series, DSM Series, CPM Series 2025-02-04View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Western Telematic Inc Equipment: NPS Series, DSM Series, CPM Series Vulnerability: External Control of File Name or Path 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an authenticated attacker to gain privileged access to files on the device's filesystem. […]CISA
- Rockwell Automation KEPServer 2025-01-30View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: KEPServer Vulnerability: Uncontrolled Resource Consumption 2. RISK EVALUATION Successful exploitation of this vulnerability could cause the device to crash. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Rockwell Automation's KEPServer are affected: KEPServer: Versions 6.0 - […]CISA
- New Rock Technologies Cloud Connected Devices 2025-01-30View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: New Rock Technologies Equipment: Cloud Connected Devices Vulnerabilities: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'), Improper Neutralization of Wildcards or Matching Symbols 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker full […]CISA
- Rockwell Automation FactoryTalk AssetCentre 2025-01-30View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: FactoryTalk AssetCentre Vulnerabilities: Inadequate Encryption Strength, Insufficiently Protected Credentials 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to extract passwords, access, credentials, or impersonate other users. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following […]CISA
- Hitachi Energy UNEM 2025-01-30View CSAF 1. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Hitachi Energy Equipment: UNEM Vulnerabilities: Authentication Bypass Using an Alternate Path or Channel, Argument Injection, Heap-based Buffer Overflow, Improper Certificate Validation, Use of Hard-coded Password, Improper Restriction of Excessive Authentication Attempts, Cleartext Storage of Sensitive Information, Incorrect User Management 2. RISK […]CISA
- Schneider Electric System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs 2025-01-30View CSAF 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Harmony Industrial PC, Pro-face Industrial PC Vulnerability: Exposure of Sensitive Information to an Unauthorized Actor 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to access sensitive information. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Schneider […]CISA
- Schneider Electric RemoteConnect and SCADAPack x70 Utilities 2025-01-28View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Low Attack Complexity Vendor: Schneider Electric Equipment: Electric RemoteConnect and SCADAPack x70 Utilities Vulnerability: Deserialization of Untrusted Data 2. RISK EVALUATION Successful exploitation of this vulnerability could lead to loss of confidentiality, integrity, and potential remote code execution on workstation when a non-admin authenticated user opens […]CISA
- Rockwell Automation FactoryTalk View Site Edition 2025-01-28View CSAF 1. EXECUTIVE SUMMARY CVSS v4 7.0 ATTENTION: Low attack complexity Vendor: Rockwell Automation Equipment: FactoryTalk View Site Edition Vulnerabilities: Incorrect Permission Assignment for Critical Resource, Improper Control of Generation of Code ('Code Injection') 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to gain unauthenticated access to system configuration files […]CISA
- Rockwell Automation FactoryTalk 2025-01-28View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Low attack complexity Vendor: Rockwell Automation Equipment: FactoryTalk Vulnerabilities: Incorrect Authorization, Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to execute code on the device with elevated privileges. 3. […]CISA
ICS Medical Advisories
- Orthanc Server 2025-02-06View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.2 ATTENTION: Exploitable remotely/low attack complexity Vendor: Orthanc Equipment: Orthanc Server Vulnerability: Missing Authentication for Critical Function 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to disclose sensitive information, modify records, or cause a denial-of-service condition. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following […]CISA
- MicroDicom DICOM Viewer 2025-02-06View CSAF 1. EXECUTIVE SUMMARY CVSS v4 5.7 ATTENTION: Low attack complexity Vendor: MicroDicom Equipment: DICOM Viewer Vulnerability: Improper Certificate Validation 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to alter network traffic and perform a machine-in-the-middle (MITM) attack. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following MicroDicom DICOM Viewer are […]CISA
- Contec Health CMS8000 Patient Monitor 2025-01-30View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Contec Health Equipment: CMS8000 Patient Monitor Vulnerabilities: Out-of-bounds Write, Hidden Functionality (Backdoor), Privacy Leakage 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to remotely send specially formatted UDP requests or connect to an unknown external network that […]CISA
- Ossur Mobile Logic Application 2024-12-19View CSAF 1. EXECUTIVE SUMMARY CVSS v4 5.6 ATTENTION: Low attack complexity Vendor: Ossur Equipment: Mobile Logic Application Vulnerabilities: Exposure of Sensitive System Information to an Unauthorized Control Sphere, Command Injection, Use of Hard-coded Credentials 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker unauthorized access to sensitive information. 3. TECHNICAL DETAILS […]CISA
- BD Diagnostic Solutions Products (Update A) 2024-12-17View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.0 ATTENTION: Low attack complexity Vendor: Becton, Dickinson and Company (BD) Equipment: Diagnostic Solutions Products Vulnerability: Use of Default Credentials 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to use default credentials to access, modify, or delete sensitive data, which could impact the availability […]CISA
- Baxter Life2000 Ventilation System 2024-11-14View CSAF 1. EXECUTIVE SUMMARY CVSS v4 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Baxter Equipment: Life2000 Ventilation System Vulnerabilities: Cleartext Transmission of Sensitive Information, Improper Restriction of Excessive Authentication Attempts, Use of Hard-Coded Credentials, Improper Physical Access Control, Download of Code Without Integrity Check, On-Chip Debug and Test Interface With Improper Access Control, Missing […]CISA
- BPL Medical Technologies PWS-01-BT and BPL Be Well Android Application 2024-09-10View CSAF 1. EXECUTIVE SUMMARY CVSS v4 5.1 ATTENTION: Low attack complexity/public exploits are available Vendor: BPL Medical Technologies Equipment: PWS-01-BT, Be Well Android App Vulnerability: Cleartext Transmission of Sensitive Information 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to intercept and modify information as it being processed 3. TECHNICAL DETAILS […]CISA
- Baxter Connex Health Portal 2024-09-05View CSAF 1. EXECUTIVE SUMMARY CVSS v3.1 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Baxter Equipment: Connex Health Portal Vulnerabilities: SQL Injection, Improper Access Control 2. RISK EVALUATION Successful exploitation of these vulnerabilities could lead to malicious code injection, shutdown of database service, or the ability to access, modify, or delete sensitive data from the […]CISA
- Philips Vue PACS (Update A) 2024-07-18View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.0 ATTENTION: Low attack complexity Vendor: Philips Equipment: Vue PACS Vulnerabilities: Allocation of Resources Without Limits or Throttling, Use of Default Credentials 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to gain access to the database, which could impact system availability and data integrity […]CISA
- MicroDicom DICOM Viewer 2024-06-11View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: MicroDicom Equipment: DICOM Viewer Vulnerabilities: Improper Authorization in Handler for Custom URL Scheme, Stack-based Buffer Overflow 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to both retrieve and plant medical image files on a victim's system and […]CISA
- Baxter Welch Allyn Connex Spot Monitor 2024-05-30View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.1 ATTENTION: Exploitable remotely Vendor: Baxter Equipment: Welch Allyn Connex Spot Monitor (CSM) Vulnerability: Use of Default Cryptographic Key 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to modify device configuration and firmware data. Tampering with this data could lead to device compromise, resulting […]CISA
- Baxter Welch Allyn Configuration Tool 2024-05-30View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.4 ATTENTION: Exploitable remotely Vendor: Baxter Equipment: Welch Allyn Configuration Tool Vulnerability: Insufficiently Protected Credentials 2. RISK EVALUATION Successful exploitation of this vulnerability could lead to the unintended exposure of credentials to unauthorized users. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Baxter (formerly Hillrom and Welch Allyn) […]CISA
- Santesoft Sante FFT Imaging 2024-03-05View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Santesoft Equipment: Sante FFT Imaging Vulnerability: Out-of-Bounds Write 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a local attacker to execute arbitrary code once a user opens a malicious DCM file on affected FFT Imaging installations. 3. TECHNICAL DETAILS 3.1 […]CISA
- MicroDicom DICOM Viewer 2024-02-29View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: MicroDicom Equipment: DICOM Viewer Vulnerabilities: Heap-based Buffer Overflow, Out-of-Bounds Write 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to cause memory corruption issues leading to execution of arbitrary code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions […]CISA
- Santesoft Sante DICOM Viewer Pro 2024-02-27View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Santesoft Equipment: Sante DICOM Viewer Pro Vulnerability: Out-of-Bounds Read 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to disclose information and execute arbitrary code on affected installations of the product. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following […]CISA
- Orthanc Osimis DICOM Web Viewer 2024-01-23View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.1 ATTENTION: Exploitable remotely/low attack complexity Vendor: Orthanc Equipment: Osimis Web Viewer Vulnerability: Cross-site Scripting 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code inside the victim's browser. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Osimis Web […]CISA
- BD FACSChorus 2023-11-28View CSAF 1. EXECUTIVE SUMMARY CVSS v3 5.4 ATTENTION: Low attack complexity Vendor: Becton, Dickinson and Company (BD) Equipment: FACSChorus Vulnerabilities: Missing Protection Mechanism for Alternate Hardware Interface, Missing Authentication for Critical Function, Improper Authentication, Use of Hard-coded Credentials, Insecure Inherited Permissions, 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker with […]CISA
- Santesoft Sante FFT Imaging 2023-10-11View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Santesoft Equipment: Sante FFT Imaging Vulnerability: Out-of-Bounds Read 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to disclose information and execute arbitrary code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Santesof products are affected: Sante FFT Imaging: […]CISA
- Santesoft Sante DICOM Viewer Pro 2023-10-11View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Santesoft Equipment: Sante DICOM Viewer Pro Vulnerabilities: Out-of-bounds Write, Stack-based Buffer Overflow 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to disclose information and execute arbitrary code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Santesoft products are […]CISA
- Softneta MedDream PACS 2023-09-051. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Softneta Equipment: MedDream PACS Vulnerabilities: Exposed Dangerous Method or Function, Plaintext Storage of a Password 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to obtain and leak plaintext credentials or remotely execute arbitrary code. 3. TECHNICAL DETAILS 3.1 AFFECTED […]CISA
The Hacker News
- Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection 2025-02-08Cybersecurity researchers have uncovered two malicious machine learning (ML) models on Hugging Face that leveraged an unusual technique of "broken" pickle files to evade detection. "The pickle files extracted from the mentioned PyTorch archives revealed the malicious Python content at the beginning of the file," ReversingLabs researcher Karlo Zanki said in a report shared with […]
- DeepSeek App Transmits Sensitive User and Device Data Without Encryption 2025-02-07A new audit of DeepSeek's mobile app for the Apple iOS operating system has found glaring security issues, the foremost being that it sends sensitive data over the internet sans any encryption, exposing it to interception and manipulation attacks. The assessment comes from NowSecure, which also found that the app fails to adhere to best […]
- CISA Warns of Active Exploits Targeting Trimble Cityworks Vulnerability 2025-02-07The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned that a security flaw impacting Trimble Cityworks GIS-centric asset management software has come under active exploitation in the wild. The vulnerability in question is CVE-2025-0994 (CVSS v4 score: 8.6), a deserialization of untrusted data bug that could permit an attacker to conduct remote code execution. […]
- AI-Powered Social Engineering: Reinvented Threats 2025-02-07The foundations for social engineering attacks – manipulating humans – might not have changed much over the years. It’s the vectors – how these techniques are deployed – that are evolving. And like most industries these days, AI is accelerating its evolution. This article explores how these changes are impacting business, and how cybersecurity leaders […]
- Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks 2025-02-07Microsoft is warning of an insecure practice wherein software developers are incorporating publicly disclosed ASP.NET machine keys from publicly accessible resources, thereby putting their applications in attackers' pathway. The tech giant's threat intelligence team said it observed limited activity in December 2024 that involved an unknown threat actor using a publicly available, static ASP.NET
- India’s RBI Introduces Exclusive "bank.in" Domain to Combat Digital Banking Fraud 2025-02-07India's central bank, the Reserve Bank of India (RBI), said it's introducing an exclusive "bank.in" internet domain for banks in the country to combat digital financial fraud. "This initiative aims to reduce cyber security threats and malicious activities like phishing; and, streamline secure financial services, thereby enhancing trust in digital banking and payment services," the […]
- Hackers Exploiting SimpleHelp RMM Flaws for Persistent Access and Ransomware 2025-02-07Threat actors have been observed exploiting recently disclosed security flaws in SimpleHelp's Remote Monitoring and Management (RMM) software as a precursor for what appears to be a ransomware attack. The intrusion leveraged the now-patched vulnerabilities to gain initial access and maintain persistent remote access to an unspecified target network, cybersecurity company Field Effect said in […]
- Fake Google Chrome Sites Distribute ValleyRAT Malware via DLL Hijacking 2025-02-06Bogus websites advertising Google Chrome have been used to distribute malicious installers for a remote access trojan called ValleyRAT. The malware, first detected in 2023, is attributed to a threat actor tracked as Silver Fox, with prior attack campaigns primarily targeting Chinese-speaking regions like Hong Kong, Taiwan, and Mainland China. "This actor has increasingly targeted […]
- Ransomware Extortion Drops to $813.5M in 2024, Down from $1.25B in 2023 2025-02-06Ransomware attacks netted cybercrime groups a total of $813.5 million in 2024, a decline from $1.25 billion in 2023. The total amount extorted during the first half of 2024 stood at $459.8 million, blockchain intelligence firm Chainalysis said, adding payment activity slumped after July 2024 by about 3.94%. "The number of ransomware events increased into […]
- SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images 2025-02-06A new malware campaign dubbed SparkCat has leveraged a suit of bogus apps on both Apple's and Google's respective app stores to steal victims' mnemonic phrases associated with cryptocurrency wallets. The attacks leverage an optical character recognition (OCR) model to exfiltrate select images containing wallet recovery phrases from photo libraries to a command-and-control (C2) server,
- The Evolving Role of PAM in Cybersecurity Leadership Agendas for 2025 2025-02-06Privileged Access Management (PAM) has emerged as a cornerstone of modern cybersecurity strategies, shifting from a technical necessity to a critical pillar in leadership agendas. With the PAM market projected to reach $42.96 billion by 2037 (according to Research Nester), organizations invest heavily in PAM solutions. Why is PAM climbing the ranks of leadership priorities? […]
- North Korean APT Kimsuky Uses forceCopy Malware to Steal Browser-Stored Credentials 2025-02-06The North Korea-linked nation-state hacking group known as Kimsuky has been observed conducting spear-phishing attacks to deliver an information stealer malware named forceCopy, according to new findings from the AhnLab Security Intelligence Center (ASEC). The attacks commence with phishing emails containing a Windows shortcut (LNK) file that's disguised as a Microsoft Office or PDF document.
- Top 3 Ransomware Threats Active in 2025 2025-02-06You arrive at the office, power up your system, and panic sets in. Every file is locked, and every system is frozen. A ransom demand flashes on your screen: "Pay $2 million in Bitcoin within 48 hours or lose everything." And the worst part is that even after paying, there’s no guarantee you’ll get your […]
- Cisco Patches Critical ISE Vulnerabilities Enabling Root CmdExec and PrivEsc 2025-02-06Cisco has released updates to address two critical security flaws Identity Services Engine (ISE) that could allow remote attackers to execute arbitrary commands and elevate privileges on susceptible devices. The vulnerabilities are listed below - CVE-2025-20124 (CVSS score: 9.9) - An insecure Java deserialization vulnerability in an API of Cisco ISE that could permit an […]
- Cross-Platform JavaScript Stealer Targets Crypto Wallets in New Lazarus Group Campaign 2025-02-05The North Korea-linked Lazarus Group has been linked to an active campaign that leverages fake LinkedIn job offers in the cryptocurrency and travel sectors to deliver malware capable of infecting Windows, macOS, and Linux operating systems. According to cybersecurity company Bitdefender, the scam begins with a message sent on a professional social media network, enticing […]
- Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts 2025-02-05Cybercriminals are increasingly leveraging legitimate HTTP client tools to facilitate account takeover (ATO) attacks on Microsoft 365 environments. Enterprise security company Proofpoint said it observed campaigns using HTTP clients Axios and Node Fetch to send HTTP requests and receive HTTP responses from web servers with the goal of conducting ATO attacks. "Originally sourced from public
- Silent Lynx Using PowerShell, Golang, and C++ Loaders in Multi-Stage Cyberattacks 2025-02-05A previously undocumented threat actor known as Silent Lynx has been linked to cyber attacks targeting various entities in Kyrgyzstan and Turkmenistan. "This threat group has previously targeted entities around Eastern Europe and Central Asian government think tanks involved in economic decision making and banking sector," Seqrite Labs researcher Subhajeet Singha said in a technical […]
- New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack 2025-02-05Veeam has released patches to address a critical security flaw impacting its Backup software that could allow an attacker to execute arbitrary code on susceptible systems. The vulnerability, tracked as CVE-2025-23114, carries a CVSS score of 9.0 out of 10.0. "A vulnerability within the Veeam Updater component that allows an attacker to utilize a Man-in-the-Middle […]
- Navigating the Future: Key IT Vulnerability Management Trends 2025-02-05As the cybersecurity landscape continues to evolve, proactive vulnerability management has become a critical priority for managed service providers (MSPs) and IT teams. Recent trends indicate that organizations increasingly prioritize more frequent IT security vulnerability assessments to identify and address potential security flaws. Staying informed on these trends can help MSPs and IT teams
- AsyncRAT Campaign Uses Python Payloads and TryCloudflare Tunnels for Stealth Attacks 2025-02-05A malware campaign has been observed delivering a remote access trojan (RAT) named AsyncRAT by making use of Python payloads and TryCloudflare tunnels. "AsyncRAT is a remote access trojan (RAT) that exploits the async/await pattern for efficient, asynchronous communication," Forcepoint X-Labs researcher Jyotika Singh said in an analysis. "It allows attackers to control infected systems