Over the weekend, Heathrow was among a number of airports hit by a cyber-attack. You can get details here:
Dr. Martin J. Kraemer, Security Awareness Advocate at KnowBe4 had this to say:
“More information has come to light: Dublin airports have also been affected, and a ransomware demand was made. This does not mean the motivation could not also have been sabotage, but one motivation is now clear: extortion.
We still need more information to actually understand the true impact and ramification of the attack.
The EU is still investigating the attack while the impact is widespread. We should not expect the EU to determine the source as early. That is because there is still a lack of clarity since authorities and corporations have confusing messaging. The NCSC is investigating a cyber incident. Collins Aerospace is talking about a cyber-related disruption. We require more transparency before we can make meaningful conclusions as to who is behind this and what their benefits are.
Organizations must ready themselves, as the incident highlights the urgency of protecting organizations and enforcing supply chain security. NIS2 and other regulations are more important than ever.”
Javvad Malik, Lead Security Awareness Advocate at KnowBe4 follows with this:
“Air travel depends on shared systems, so a failure in a common check‑in platform quickly cascades into missed connections, accessibility shortfalls, and staff forced into manual workarounds.
It’s why it’s important to build in graceful failure by assuming the primary system will go down and rehearsing manual operations, offline boarding, and accessible contingencies, with cross‑trained staff and basic tools ready.
Reduce single points of failure by diversifying providers where feasible, segmenting tenants, and ring‑fencing critical functions so one vendor outage doesn’t halt everyone. Above all, communicate clearly and often, prioritize vulnerable passengers, and empower frontline teams to make humane decisions.”
This is brutal for travellers. And unless governments and airport authorities do everything possible to beef up their defences from this sort of thing, the possibility exists that this scenario will repeat itself.
Critical GoAnywhere MFT Vulnerability Could Lead to Command Injection Says SOCRadar
Posted in Commentary with tags SOCRadar on September 22, 2025 by itnerdToday, SOCRadar researchers published an analysis looking at a recently revealed flaw in Fortra’s GoAnywhere MFT.
This critical vulnerability in the platform’s License Servlet, tracked as CVE-2025-10035, could open the door to severe exploitation if left unpatched. With a maximum severity score, this issue demands immediate attention from administrators.
While at this time, there is no confirmed evidence of exploitation, history suggests that this risk is very real. GoAnywhere MFT was previously exploited through CVE-2023-0669; in these attacks, the Clop ransomware group claimed responsibility for breaching numerous organizations. That earlier flaw triggered a surge in ransomware incidents, making this newly disclosed CVE a prime candidate for future attacks.
The analysis reveals what exactly this CVE is, as well as its impact, and ideal mitigation steps for organizations at risk.
For full details, the analysis can be found at this link: https://socradar.io/cve-2025-10035-goanywhere-mft-flaw-command-injection/
Leave a comment »