Rockwell Automation recently published a series of security advisories that expose numerous high-severity and critical vulnerabilities across several of its industrial automation platforms. Rockwell patched the vulnerabilities in FactoryTalk, Micro800, and ControlLogix systems and warned customers to apply the latest patches. One of the most critical vulnerabilities, identified as CVE-2025-7972, was found in the FactoryTalk Linx Network Browser. A vulnerability allows attackers to bypass FactoryTalk Linx driver token validation, which lets them add, delete, or update drivers without proper authorization. Rockwell fixed a remote code execution vulnerability (CVE-2025-7353) of critical severity in ControlLogix implementations. It would allow potential attackers to remotely take control of affected devices. For Rockwell's Micro800 series programmable logic controllers (PLCs), several vulnerabilities in the Azure RTOS, which is an open-source real-time operating system, were remediating. These are remote code execution and privilege escalation flaws and another denial-of-service (DoS) flaw that might potentially hinder system operations. Other severe vulnerabilities were remediated in other products. They are two FLEX 5000 DoS vulnerabilities, a Studio 5000 Logix Designer code execution bug, web server bugs in ArmorBlock 5000, a FactoryTalk ViewPoint privilege escalation bug, and an information exposure bug in FactoryTalk Action Manager.
Apple has revealed that it blocked more than $11 billion in fraudulent App Store transactions over the past six years, including over $2.2 billion in potentially fraudulent activit...
Trend Micro has disclosed an actively exploited zero-day vulnerability affecting its Apex One endpoint security platform used in enterprise Windows environments. The flaw, tracked ...
Drupal has warned administrators that threat actors are actively attempting to exploit a highly critical SQL injection vulnerability tracked as CVE-2026-9082. The flaw impacts Drup...