Vulnerabilities in key surgical equipment could be remotely exploited by a low-skill attacker.
Source: Dark Reading – Threat Intelligence – US-CERT Warns
[...]
APT groups exploiting vulnerabilities in popular enterprise VPN products to retrieve arbitrary files that include login credentials, change configuration settings, or connect to
[...]
Vulnerabilities include everything from physical risks through the supply chain to business risks.
Source: Dark Reading – Threat Intelligence – CISA Warns
[...]
A commercial vessel suffered a significant malware attack in February, prompting the US Coast Guard to issues an advisory to all shipping companies:
[...]