Tag Cisco

FBI Alerts on FSB-Linked Hackers Targeting Unpatched Cisco Devices for Cyber Espionage

Date: Aug 20, 2025 | Cyber Espionage / Vulnerability

A state-sponsored Russian hacking group, identified as Static Tundra, is exploiting a seven-year-old vulnerability in Cisco IOS and Cisco IOS XE software to gain persistent access to targeted networks. Cisco Talos revealed that these attacks are primarily aimed at telecommunications, higher education, and manufacturing sectors across North America, Asia, Africa, and Europe. Potential victims are selected based on their “strategic interest” to Russia, with recent targets focusing on Ukraine and its allies amid the ongoing Russo-Ukrainian conflict. The exploited vulnerability, CVE-2018-0171 (CVSS score: 9.8), is a critical flaw in the Smart Install feature of Cisco software, which may allow unauthorized remote attackers to initiate denial-of-service (DoS) attacks or execute arbitrary code.

FBI Alerts to FSB-Linked Hackers Targeting Unpatched Cisco Devices for Cyber Espionage On August 20, 2025, the FBI issued a warning regarding a Russian state-sponsored cyber espionage group known as Static Tundra. This group has been identified as exploiting a significant vulnerability in Cisco IOS and Cisco IOS XE software,…

Read More

FBI Alerts on FSB-Linked Hackers Targeting Unpatched Cisco Devices for Cyber Espionage

Date: Aug 20, 2025 | Cyber Espionage / Vulnerability

A state-sponsored Russian hacking group, identified as Static Tundra, is exploiting a seven-year-old vulnerability in Cisco IOS and Cisco IOS XE software to gain persistent access to targeted networks. Cisco Talos revealed that these attacks are primarily aimed at telecommunications, higher education, and manufacturing sectors across North America, Asia, Africa, and Europe. Potential victims are selected based on their “strategic interest” to Russia, with recent targets focusing on Ukraine and its allies amid the ongoing Russo-Ukrainian conflict. The exploited vulnerability, CVE-2018-0171 (CVSS score: 9.8), is a critical flaw in the Smart Install feature of Cisco software, which may allow unauthorized remote attackers to initiate denial-of-service (DoS) attacks or execute arbitrary code.

Yesterday’s Vulnerabilities Are Tomorrow’s Challenges

June 03, 2021

Major software vulnerabilities are an ongoing reality, as evidenced by Microsoft’s patching of between 55 and 110 vulnerabilities each month this year, with 7% to 17% classified as critical. May recorded the lowest number of vulnerabilities, totaling 55, with only four deemed critical. Alarmingly, many of these critical vulnerabilities are familiar foes, such as remote code execution and privilege escalation. Microsoft isn’t alone in this; companies like Apple, Adobe, Google, and Cisco also issue regular security updates to address significant vulnerabilities.

With major flaws affecting so many applications, can we envision a secure future? The answer is yes, but the road ahead will undoubtedly present challenges. Although these vulnerabilities may not be new to seasoned defenders, adversaries continuously adapt and exploit these weaknesses.

Recurring Vulnerabilities: A Persistent Challenge in Cybersecurity June 3, 2021 Software vulnerabilities continue to plague organizations across the globe, as evidenced by the fact that Microsoft has addressed between 55 and 110 vulnerabilities every month this year. Alarmingly, 7% to 17% of these identified vulnerabilities have been classified as critical,…

Read More

Yesterday’s Vulnerabilities Are Tomorrow’s Challenges

June 03, 2021

Major software vulnerabilities are an ongoing reality, as evidenced by Microsoft’s patching of between 55 and 110 vulnerabilities each month this year, with 7% to 17% classified as critical. May recorded the lowest number of vulnerabilities, totaling 55, with only four deemed critical. Alarmingly, many of these critical vulnerabilities are familiar foes, such as remote code execution and privilege escalation. Microsoft isn’t alone in this; companies like Apple, Adobe, Google, and Cisco also issue regular security updates to address significant vulnerabilities.

With major flaws affecting so many applications, can we envision a secure future? The answer is yes, but the road ahead will undoubtedly present challenges. Although these vulnerabilities may not be new to seasoned defenders, adversaries continuously adapt and exploit these weaknesses.

Anthropic Collaborates with Competitors to Prevent AI from Compromising Security

In late March, leaked reports revealed that Anthropic has developed a new AI model named Mythos, which they formally announced on Tuesday. Alongside this announcement, the company introduced an industry consortium called Project Glasswing, aimed at addressing the cybersecurity implications associated with this advanced model and the evolving capabilities across…

Read MoreAnthropic Collaborates with Competitors to Prevent AI from Compromising Security

Anthropic Declares Its New Model Too Risky for Public Release

AI-Driven Security Operations, Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Anthropic Restricts Access to New AI Model Due to Misuse Concerns David Perera (@daveperera), Chris Riotta (@chrisriotta) • April 7, 2026 Image: Shutterstock In a significant development for cybersecurity, Anthropic announced the creation of an artificial intelligence…

Read MoreAnthropic Declares Its New Model Too Risky for Public Release

Chinese Hackers Breach U.S. Trade Group Before Trump-Xi Trade Summit

Researchers have identified a Chinese cyber-espionage campaign targeting the United States ahead of the upcoming trade summit between President Donald Trump and President Xi Jinping. The findings, detailed in a report released by Fidelis Cybersecurity, reveal that the Chinese APT10 hacking group infiltrated the “Events” page of the U.S. National…

Read MoreChinese Hackers Breach U.S. Trade Group Before Trump-Xi Trade Summit

⚡ Weekly Roundup: Firewall Vulnerabilities, AI Data Breaches, Android Hacks, APT Incidents, Insider Leaks, and Beyond

The past week underscored a critical evolution in cyber threats, illustrating that attackers no longer require large-scale hacks to unleash significant damage. Instead, they are targeting essential tools that organizations rely on, including firewalls, browser extensions, and even smart devices. These seemingly minor vulnerabilities can become gateways to severe breaches.…

Read More⚡ Weekly Roundup: Firewall Vulnerabilities, AI Data Breaches, Android Hacks, APT Incidents, Insider Leaks, and Beyond

Hackers Actively Exploiting Vulnerabilities in Cisco AnyConnect and GIGABYTE Drivers

Cisco has issued a warning regarding active exploitation attempts of two persistent vulnerabilities in the Cisco AnyConnect Secure Mobility Client for Windows, which have been present for two years. The vulnerabilities, identified as CVE-2020-3153 (with a CVSS score of 6.5) and CVE-2020-3433 (CVSS score: 7.8), could potentially allow authenticated local…

Read MoreHackers Actively Exploiting Vulnerabilities in Cisco AnyConnect and GIGABYTE Drivers

New Menlo Security CEO Focuses on Agentic AI Runtime Protection

Artificial Intelligence & Machine Learning, Data Security, Next-Generation Technologies & Secure Development Former Mandiant Executive Bill Robbins Aims to Advance Browser-Based AI Security Michael Novinson (MichaelNovinson) • February 27, 2026 Bill Robbins, CEO, Menlo Security (Image: Menlo Security) Menlo Security has appointed Bill Robbins, a seasoned leader from Mandiant, as…

Read MoreNew Menlo Security CEO Focuses on Agentic AI Runtime Protection

⚡ Weekly Roundup: AI Automation Breaches, Telecom Spying, Prompt Theft & Beyond

This week underscored a critical lesson: minor oversights can lead to significant consequences. Tools designed to streamline operations quickly become vulnerabilities when basic protections are disregarded. Attackers didn’t rely on sophisticated methods; they exploited existing exposure and acted swiftly in environments lacking adequate defenses. The scale of the attacks exacerbated…

Read More⚡ Weekly Roundup: AI Automation Breaches, Telecom Spying, Prompt Theft & Beyond