You are here

Cybersecurity

(TLP:CLEAR) High Severity Vulnerabilities Patched in Fortinet and Ivanti Products (Updated June 26, 2025)

June 26, 2025

Summary: WaterISAC’s federal partners have shared new information indicating that nation state threat actors who routinely target critical infrastructure are actively researching the below vulnerabilities in Fortinet products, which could allow them to conduct future attacks.

(TLP:CLEAR) CISA Releases New Guidance for Reducing Memory-Related Vulnerabilities

Summary: This week, CISA, in partnership with the National Security Agency (NSA), released a joint guide on reducing memory-related vulnerabilities in modern software development. The joint guide titled “Memory Safe Languages: Reducing Vulnerabilities in Modern Software Development,” identifies the main obstacles in adopting memory safe languages, provides practical solutions to address these challenges, and emphas

(TLP: CLEAR) Multiple Vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway Under Active Exploitation

Summary: On June 17 and 25, 2025, Citrix published security advisories for critical vulnerabilities impacting Citrix NetScaler ADC and NetScaler Gateway. The New York State Intelligence Center’s (NYSIC) Cyber Analysis Unit (CAU) has indicated that these products are now experiencing active exploitation in the wild.

Analyst Note: These vulnerabilities involve critical flaws in Citrix products similar to the 2023 Citrix Bleed incident (CVE-2023-4966), which saw heavy exploitation by ransomware gangs and nation-states.

(TLP:CLEAR) CISA Shares Internet Exposure Reduction Guidance

Summary: Many organizations unknowingly leave common vulnerabilities and weaknesses exposed to the internet, making them easy targets for exploitation. Misconfigured systems, default credentials, and outdated software are often publicly accessible through internet-based search and discovery platforms. By following CISA’s Internet Exposure Reduction Guidance, organizations can proactively identify and remove these exposures, reducing their online footprint and strengthening their cybersecurity posture.

(TLP:CLEAR) Censys Identified Nearly 400 Internet-Exposed HMIs Connected to U.S. Water Facilities

Summary: Cybersecurity firm Censys recently released information regarding internet-exposed Human Machine Interfaces (HMIs) connected to water systems throughout the U.S. The blog post mentions that in October, Censys researchers identified nearly 400 web-based HMIs connected to U.S. water facilities that were exposed online. The systems were found to be in one of three states: Authenticated (credentials required), Read-only (viewable without control), and Unauthenticated (full access without credentials).

Pages

Subscribe to Cybersecurity