Kubernetes Security: Wie Sie Ihre Cluster (besser) absichern

Kubernetes has become a popular choice for enterprise software development, attracting increased attacks from cybercriminals using sophisticated exploits. Newly created Kubernetes clusters can be targeted by malicious scans within minutes, with attackers employing automated methods to find and exploit vulnerabilities.

Security hole could let hackers take over Juniper Networks PTX core routers

A critical vulnerability in Juniper Networks PTX series routers running Junos OS Evolved could allow an unauthenticated attacker to execute code with root privileges. The vulnerability, which lies in the On-Box Anomaly detection framework, affects versions earlier than 25.4R1-S1-EVO and 25.4R2-EVO, but not the standard Junos OS.

Juniper Networks PTX Routers Affected by Critical Vulnerability

Juniper Networks has released an out-of-band security update for Junos OS Evolved to address a remote code execution vulnerability, CVE-2026-21902, affecting PTX routers. This vulnerability requires immediate patching to prevent potential exploitation.

Critical Juniper Networks PTX flaw allows full router takeover

A critical vulnerability in Juniper Networks' Junos OS Evolved, affecting PTX Series routers, enables unauthenticated remote code execution with root privileges. The flaw poses a significant risk, potentially allowing attackers to gain complete control of affected routers.

Microsoft expands Windows restore to more enterprise devices

Microsoft is expanding the ability for enterprise users to restore their personal settings and Microsoft Store apps from a previous Windows 11 device. This feature aims to streamline the transition process when upgrading or replacing devices, ensuring a consistent user experience.

Pelco, Inc. Sarix Pro 3 Series IP Cameras

CISA has released an alert regarding an authentication bypass vulnerability (CVE-2026-1241) in Pelco, Inc. Sarix Pro 3 Series IP Cameras. Successful exploitation could allow attackers to gain unauthorized access to sensitive device data and bypass surveillance controls.

EV2GO ev2go.io

Multiple vulnerabilities have been identified in EV2GO ev2go.io charging stations, potentially allowing attackers to impersonate stations, hijack sessions, cause denial of service, and manipulate backend data. The most severe vulnerability, CVE-2026-24731, involves a lack of authentication for WebSocket endpoints.

EV Energy ev.energy

CISA has released an alert regarding multiple vulnerabilities affecting EV Energy's ev.energy charging stations. Successful exploitation of these vulnerabilities could allow attackers to gain unauthorized administrative control or disrupt charging services through denial-of-service attacks.

Chargemap chargemap.com

Chargemap chargemap.com is affected by multiple vulnerabilities, including missing authentication, improper restriction of authentication attempts, insufficient session expiration, and insufficiently protected credentials. Successful exploitation could lead to unauthorized administrative control over charging stations or denial-of-service attacks.

Mobility46 mobility46.se

CISA has released an alert regarding multiple vulnerabilities affecting Mobility46 charging stations. Successful exploitation of these vulnerabilities could allow attackers to gain unauthorized administrative control or disrupt charging services through denial-of-service attacks.

SWITCH EV swtchenergy.com

CISA has issued an alert regarding vulnerabilities in SWITCH EV swtchenergy.com charging stations. Successful exploitation could allow attackers to impersonate charging stations, hijack sessions, cause denial of service, and manipulate backend data; multiple CVEs are associated with the affected versions.

CloudCharge cloudcharge.se

CISA has released an alert regarding multiple vulnerabilities in CloudCharge cloudcharge.se charging stations. Successful exploitation of these vulnerabilities could allow attackers to impersonate charging stations, hijack sessions, cause denial of service, and manipulate data sent to the backend.

Johnson Controls, Inc. Frick Controls Quantum HD

CISA has released an alert regarding multiple vulnerabilities in Johnson Controls, Inc. Frick Controls Quantum HD versions <=10.22. Successful exploitation of these vulnerabilities could lead to pre-authentication remote code execution, information leaks, or denial of service.

Copeland XWEB and XWEB Pro

CISA has released an alert regarding multiple vulnerabilities in Copeland XWEB and XWEB Pro versions 1.12.1 and prior. Successful exploitation of these vulnerabilities could allow an attacker to bypass authentication, cause a denial-of-service condition, cause memory corruption, and execute arbitrary code.

Zyxel warns of critical RCE flaw affecting over a dozen routers

Zyxel has released security updates to patch a critical remote code execution (RCE) vulnerability impacting numerous router models. Unauthenticated attackers could exploit this flaw to execute arbitrary commands on vulnerable, unpatched devices, potentially gaining full control.

'Richter Scale' Model Measures Magnitude of OT Cyber Incidents

ICS/OT experts have created a new scoring system, akin to the Richter scale, for gauging the magnitude and impact of cyber incidents within operational technology (OT) environments. This system aims to provide a standardized method for assessing the severity and consequences of such events.

VMware fixes command injection flaw in Aria Operations

VMware has released patches for high- and medium-risk vulnerabilities affecting Aria Operations, Cloud Foundation, Telco Cloud Platform, and Telco Cloud Infrastructure products. The most serious flaw, CVE-2026-22719, allows unauthenticated attackers to execute arbitrary commands, while CVE-2026-22720 allows authenticated users to elevate privileges via stored XSS.

InSAT MasterSCADA BUK-TS

CISA released an advisory regarding vulnerabilities in InSAT MasterSCADA BUK-TS, specifically related to SQL Injection and OS Command Injection. Successful exploitation of these vulnerabilities may allow remote code execution.

Gardyn Home Kit

Multiple vulnerabilities in the Gardyn Home Kit, including the mobile application and Cloud API, could allow unauthenticated users to access and control edge devices, access cloud-based devices and user information, and pivot to other edge devices. The vulnerabilities include cleartext transmission of sensitive information, use of default credentials, OS command injection, and use of hard-coded credentials.

Schneider Electric EcoStruxure Building Operation Workstation

Schneider Electric has identified vulnerabilities in EcoStruxure Building Operation Workstation and WebStation that could lead to exposure of local files or denial of service, potentially resulting in data breaches and operational disruptions. The affected versions include specific releases of both Workstation and WebStation, and the vulnerabilities stem from improper restriction of XML external entity reference and improper control of code generation.

OT-Security: Why it's worth taking a look at Open Source [DE]

The article discusses the increasing importance of OT (Operational Technology) security in industrial production due to digitalization and interconnectedness, highlighting the vulnerability of production data, SCADA systems, and networked machines to cyberattacks. It explores the cost-effectiveness of open-source OT security tools as an alternative to expensive commercial solutions, emphasizing their lower costs, flexibility, and active community support.

When identity isn’t the weak link, access still is

The article discusses how attackers are bypassing traditional authentication methods by stealing tokens and compromising devices, effectively reusing existing trust relationships. It highlights the importance of continuous device verification in a Zero Trust architecture to mitigate these risks, emphasizing that identity alone is insufficient for security.

How Exposed Endpoints Increase Risk Across LLM Infrastructure

The increasing deployment of internal services and APIs to support Large Language Models (LLMs) is expanding the attack surface and introducing new security risks. The risks stem more from the infrastructure supporting the model rather than the models themselves, highlighting the importance of securing these endpoints.

Why the shift left dream has become a nightmare for security and developers

A Bleeping Computer article discusses the challenges of the "shift left" approach to security, noting that increased pressure on developers can lead to security being overlooked. A Qualys analysis of container images found that 7.3% were malicious, highlighting the need for default security measures at the infrastructure level.

Founder ditches AWS for Euro stack, finds sovereignty isn't plug-and-play

A startup founder attempted to move away from AWS and build their infrastructure using only European providers to achieve data sovereignty. The founder discovered that while cloud costs may be lower, the time and effort required to manage a less mature ecosystem are significantly higher.

Emerging Chiplet Designs Spark Fresh Cybersecurity Challenges

The rise of chiplet designs, which are scaled-down circuits with limited functions used in AI systems and autonomous vehicles, presents new cybersecurity challenges. The flexibility of these designs requires novel security approaches to protect critical infrastructure.

Abu Dhabi Finance Week Exposed VIP Passport Details

Abu Dhabi Finance Week suffered a data exposure incident where VIP passport details were left unprotected in the cloud. This incident raises concerns about data security as Abu Dhabi attempts to attract investors and become a global financial center.

Welker OdorEyes EcoSystem Pulse Bypass System with XL4 Controller

A vulnerability exists in Welker OdorEyes EcoSystem Pulse Bypass System with XL4 Controller that could lead to over- or under-odorization events. The affected product lacks proper authentication, allowing remote influence of the underlying PLC. Welker has not responded to attempts at coordination; users are encouraged to contact Welker and keep their systems updated.

Valmet DNA Engineering Web Tools

A vulnerability exists in Valmet DNA Engineering Web Tools that could allow an unauthenticated attacker to manipulate the web maintenance services URL to achieve arbitrary file read access. The affected versions are Valmet DNA Engineering Web Tools <= C2022 (CVE-2025-15577). Valmet has released a fix and recommends users contact their customer service for assistance.

EnOcean SmartServer IoT

CISA has released an alert regarding vulnerabilities in EnOcean SmartServer IoT versions up to 4.60.009. Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code and bypass ASLR.

Jinan USR IOT Technology Limited (PUSR) USR-W610

CISA released an alert regarding multiple vulnerabilities affecting Jinan USR IOT Technology Limited (PUSR) USR-W610 devices (versions <=3.1.1.0). Successful exploitation could lead to disabled authentication, denial-of-service, or credential theft, including administrator credentials.

From Exposure to Exploitation: How AI Collapses Your Response Window

The article discusses how AI is accelerating the exploitation of misconfigurations and security vulnerabilities in cloud environments. Previously considered minor operational risks to be addressed later, these issues are now being discovered and exploited much faster due to AI-powered tools.

2025 Cloud Threat Hunting and Defense Landscape

Recorded Future reports on the evolving cloud threat landscape for 2025, highlighting increased exploitation of misconfigurations, abuse of native services, and pivoting through hybrid environments. Attack patterns are evolving across exploitation, ransomware, credential abuse, and targeting of AI services.

German train line back on track after DDoS yanks the brakes

Deutsche Bahn, the German national rail company, experienced a disruption to its online services, including bookings and timetables, due to a DDoS attack. The attack lasted for nearly 24 hours, impacting customers' ability to book train trips.

Securing DevOps Pipelines with Real-Time Threat Intelligence

This article discusses how integrating real-time threat intelligence into DevOps pipelines can enhance security and enable threat-aware DevOps. It emphasizes embedding threat feeds into code scanning, build pipelines, and deployment gates to proactively detect and mitigate risks such as malicious dependencies and compromised images. The session aims to provide actionable strategies for securing the software supply chain and automating threat detection within DevOps.

Scaling Security Governance with Platform Engineering: A Proactive Approach for Workloads

This BrightTALK InfoSec article discusses how platform engineering can help organizations scale security governance and address challenges arising from the rapid adoption of cloud-native technologies. It emphasizes embedding security into developer workflows, consolidating tools, adopting policy-as-code, and automating compliance to maintain robust security without hindering development velocity. The session will also cover strategies for securing AI agents in modern platforms.

3 Ways to Start Your Intelligent Workflow Program

The article discusses the challenges organizations face in successfully implementing AI and automation initiatives, noting that a large percentage of AI proofs-of-concept fail to reach production. It emphasizes that investing in tools alone is insufficient, and a more comprehensive approach is needed to realize the full potential of intelligent workflows. The article implies that intelligent workflow programs can help security, IT, and engineering teams.

Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster

The article discusses the challenges faced by modern SOC teams in investigating cloud breaches due to the ephemeral nature of cloud infrastructure and data. It highlights the need for AI and contextual awareness to accelerate investigation processes and effectively respond to rapidly evolving cloud attacks.

Cyber Insights 2026: The Ongoing Fight to Secure Industrial Control Systems

SecurityWeek highlights the continued challenges of securing Industrial Control Systems (ICS) in 2026 due to nation-state actors, ransomware groups, and outdated infrastructure. The article stresses the importance of resilience, visibility, and modern security strategies in defending critical operations.

Honeywell CCTV Products

Honeywell CCTV products are affected by a vulnerability (CVE-2026-1670) due to missing authentication for critical functions. Successful exploitation could lead to account takeovers and unauthorized access to camera feeds by changing the recovery email address.