[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"tag:nis2":3},{"tag":4,"articles":8,"awareness":51,"events":52,"tips":53,"focus_items":54,"total_count":55},{"slug":5,"name":6,"description":7},"nis2","NIS2","EU Network and Information Security Directive",[9,18,27,35,43],{"id":10,"title":11,"slug":12,"brief":13,"ai_summary":14,"url":15,"image_url":16,"published_at":17},"5aa55168-04ed-44cb-8e3a-6735d92d4fc7","Siemens Siemens ROS#","siemens-siemens-ros-a78764","Siemens ROS# path traversal vulnerability (CVE-2026-41551) allows arbitrary file access in versions before 2.2.2.","Siemens ROS# versions before 2.2.2 contain a critical path traversal vulnerability (CVE-2026-41551) in the file_server ROS service that allows remote attackers to read and write arbitrary files with the privileges of the service user. The vulnerability stems from improper input sanitization and has a CVSS v3.1 score of 9.1 (Critical). Siemens has released version 2.2.2 as a fix and recommends immediate update, while providing interim mitigations including network isolation and appropriate user rights restrictions.","https:\u002F\u002Fwww.cisa.gov\u002Fnews-events\u002Fics-advisories\u002Ficsa-26-134-08",null,"2026-05-14T12:00:00+00:00",{"id":19,"title":20,"slug":21,"brief":22,"ai_summary":23,"url":24,"image_url":25,"published_at":26},"b7e41a02-b13f-4ec4-91fa-bce732eb655c","Threat landscape for industrial automation systems in Q4 2025","threat-landscape-for-industrial-automation-systems-in-q4-2025-ee121b","Kaspersky Q4 2025 report reveals ICS threat trends, Backdoor.MSIL.XWorm surge via phishing.","Kaspersky's Q4 2025 industrial automation threat report shows malicious object detections on ICS computers decreased to 19.7%, but email-based worms surged globally, particularly Backdoor.MSIL.XWorm distributed through \"Curriculum-vitae-catalina\" phishing campaigns targeting HR staff. The malware appeared in all regions in Q4 2025 despite zero detection in Q3, with highest impact in Southern Europe, South America, and the Middle East.","https:\u002F\u002Fsecurelist.com\u002Findustrial-threat-report-q4-2025\u002F119392\u002F","https:\u002F\u002Fmedia.kasperskycontenthub.com\u002Fwp-content\u002Fuploads\u002Fsites\u002F43\u002F2026\u002F04\u002F15120820\u002FSL-industrial-threats-q4-2025-featured-scaled.jpg","2026-04-15T12:30:48+00:00",{"id":28,"title":29,"slug":30,"brief":31,"ai_summary":32,"url":33,"image_url":16,"published_at":34},"833c94cd-94db-4e8c-abbc-438fdd2d21d8","The threat to critical infrastructure has changed. Has your readiness?","the-threat-to-critical-infrastructure-has-changed-has-your-readiness","Microsoft threat intelligence warns CI leaders of persistent nation-state intrusions targeting critical infrastructure","Microsoft Threat Intelligence reports that critical infrastructure threat landscape has fundamentally shifted, with threat actors now establishing persistent, stealthy footholds rather than pursuing opportunistic disruption or data theft. The observation is backed by global regulatory momentum including NIS2, Japan's Active Cyber Defense legislation, and Canada's Bill C8, with law enforcement initiatives like Operation Winter SHIELD emphasizing verified readiness over awareness. Key vulnerabilities stem from legacy systems operating in hybrid IT-OT environments with identity as the central control layer, creating convergence of identity-driven intrusions, living-off-the-land persistence, and nation-state prepositioning.","https:\u002F\u002Fwww.microsoft.com\u002Fen-us\u002Fsecurity\u002Fsecurity-insider\u002Fthreat-landscape\u002Fthreat-to-critical-infrastructure-has-changed","2026-03-31T17:00:00+00:00",{"id":36,"title":37,"slug":38,"brief":39,"ai_summary":40,"url":41,"image_url":16,"published_at":42},"cfb95f45-87ef-4e1f-bcfa-ad4139b7bb50","PX4 Autopilot","px4-autopilot","Critical authentication bypass in PX4 Autopilot MAVLink protocol allows unauthenticated remote shell command execution.","CISA disclosed CVE-2026-1579, a critical vulnerability (CVSS 9.8) in PX4 Autopilot v1.16.0 affecting transportation, emergency services, and defense sectors worldwide. The MAVLink communication protocol lacks cryptographic authentication by default, enabling unauthenticated attackers with MAVLink interface access to execute arbitrary shell commands via the SERIAL_CONTROL message. PX4 recommends enabling MAVLink 2.0 message signing and has published hardening guidance; no active exploitation has been reported.","https:\u002F\u002Fwww.cisa.gov\u002Fnews-events\u002Fics-advisories\u002Ficsa-26-090-02","2026-03-31T12:00:00+00:00",{"id":44,"title":45,"slug":46,"brief":47,"ai_summary":48,"url":49,"image_url":16,"published_at":50},"98f6797c-e3af-4f24-86fa-50c17c41eb84","WAGO GmbH & Co. KG Industrial Managed Switches","wago-gmbh-co-kg-industrial-managed-switches","WAGO industrial managed switches have critical unauthenticated remote CLI escape vulnerability affecting 15+ hardware","CVE-2026-3587 is a critical (CVSS 10.0) vulnerability in WAGO GmbH & Co. KG industrial managed switches that allows unauthenticated remote attackers to exploit a hidden CLI function to escape the restricted interface and achieve full device compromise. The vulnerability affects 15+ hardware models (852-series) deployed globally across critical infrastructure sectors including energy, manufacturing, and transportation. WAGO has released patched firmware versions (S1 variants) and mitigation guidance including disabling SSH\u002FTelnet.","https:\u002F\u002Fwww.cisa.gov\u002Fnews-events\u002Fics-advisories\u002Ficsa-26-085-01","2026-03-26T12:00:00+00:00",[],[],[],[],5]