Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations

Vulnerability Pulse

Every week, we catalog the major industrial cybersecurity vulnerabilities and updates you should know about. Here are the notable threats from the week of April 10 - 16. Sign up to get these updates right to your inbox!

April 15, 2022

VMware

VMware released security updates due to a remote code execution vulnerability found in its Cloud Director that could allow an attacker to gain control of affected systems.

Sources:

VMware,

CISA

April 14, 2022

Juniper Networks

Juniper Networks released security updates due to vulnerabilities found in multiple products that could lead to an attacker gaining control of affected systems.

Sources:

Juniper Networks,

CISA

Cisco

Cisco released security updates due to vulnerabilities in multiple products that could lead to an attacker gaining control of affected systems.

Sources:

Cisco,

CISA

April 13, 2022

Microsoft

Microsoft released an advisory to address a critical remote code execution vulnerability in Remote Procedure Call Runtime Library that could lead to an attacker gaining control of affected systems.

Sources:

Microsoft,

CISA

ICS and SCADA devices

CISA, the Department of Energy (DOE), the NSA and the FBI released a joint Cybersecurity Advisory warning that advanced persistent threat (APT) actors are capable of gaining full access to multiple ICS and SCADA devices.

Sources:

Joint Cybersecurity Advisory,

CISA

CISA

CISA added multiple new vulnerabilities to its Known Exploited Vulnerabilities Catalog.

Sources:

CISA,

CISA,

Known Exploited Vulnerabilities to Catalog

April 12, 2022

Apache

The Apache Software Foundation released a security advisory due to a vulnerability in versions of Struts that could lead to an attacker gaining control of affected systems.

Sources:

Apache,

CISA

Citrix

Citrix released security updates due to vulnerabilities found in multiple products that could lead to an attacker gaining control of affected systems.

Sources:

Citrix,

CISA

Microsoft

Microsoft released security updates due to multiple vulnerabilities found in Microsoft software that could lead to an attacker gaining control of affected systems.

Sources:

Microsoft,

CISA

Google

Google released an updated version of Chrome for Windows, Mac and Linux due to vulnerabilities that could lead to an attacker gaining control of affected systems.

Sources:

Google Chrome,

CISA

Aethon

The Aethon TUG Home Base Server contains vulnerabilities, such as missing authorization, channel accessible by non-endpoint and cross-site scripting.

Sources:

Aethon,

CISA

Mitsubishi Electric

Versions of the Mitsubishi Electric Wireless LAN communication unit GT25-WLAN contain vulnerabilities, such as improper removal of sensitive information before storage or transfer, inadequate encryption strength, missing authentication for critical function, injection and improper input…

Sources:

Mitsubishi Electric,

CISA

Inductive Automation

The Inductive Automation Ignition is vulnerable to path traversal.

Sources:

CISA

Posts navigation
  • « Previous
  • 1
  • …
  • 9
  • 10
  • 11
  • 12
  • 13
  • …
  • 49
  • Next »
SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Mitsubishi Electric - June 14, 2022
  • Meridian Cooperative - June 14, 2022
  • Johnson Controls - June 14, 2022
  • Microsoft - June 14, 2022
  • Citrix - June 14, 2022

RECENT NEWS

  • Protecting the power grid through cyber-physical threat response
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT