Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Cyberattacks Exploit Major Software Vulnerabilities, Affecting Global Infrastructure
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Cyberattacks Exploit Major Software Vulnerabilities, Affecting Global Infrastructure

Highlights

  • SAP vulnerabilities exposed, prompting cybersecurity scrutiny worldwide.

  • Multiple sectors, including oil and government, faced attacks.

  • Google confirmed successful zero-day exploits starting in March.

Kaan Demirel
Last updated: 15 May, 2025 - 9:09 pm 9:09 pm
Kaan Demirel 4 months ago
Share
SHARE

Recent revelations about global cyberattacks have put a spotlight on the vulnerabilities within the systems of some of the world’s largest software manufacturers. These zero-day exploits have underscored the urgent need for improved cybersecurity measures. With parallels drawn to previous notable attacks like Salt Typhoon and Volt Typhoon, industry leaders warn of the expansive reach and potential damage of these latest security breaches. This revelation arrives at a critical juncture in cyber defense, as companies and governmental bodies scramble to secure their infrastructures.

Contents
What Are the Recent Vulnerabilities?How Are Organizations Addressing the Threat?What Is the Extent of the Impact?

Cyberattacks on enterprise-level software have been a recurring concern within the information technology sector, with previous incidents exposing systemic weaknesses in security infrastructure. The exploitation of zero-days, targeted at SAP software, is reminiscent of the heightened responses seen during the SolarWinds attack. Historically, such breaches have prompted substantial efforts to strengthen cyber defenses, yet full resolution remains a challenging task for many organizations.

What Are the Recent Vulnerabilities?

The vulnerabilities, which escaped detection by researchers and corporations until recently, have been patched in recent months. Malicious entities, however, continue to leverage these weaknesses. Three cyber groups, believed to be affiliated with the Chinese government, have reportedly gained access to these vulnerabilities. Furthermore, ransomware factions have joined this exploitation effort, raising the stakes for affected companies. According to Dave DeWalt of NightDragon, “a race” has ensued to capitalize on these flaws.

How Are Organizations Addressing the Threat?

Organizations including Onapsis, EclecticIQ, and Google’s Mandiant have documented and are actively tracking these exploitations. Notably, Onapsis has worked alongside Mandiant in crafting an open-source tool to identify these understated attacks. “We’ve uncovered attack strategies that remain undetected by traditional methods,” said Mariano Nunez of Onapsis. Companies now face the significant challenge of implementing comprehensive system reboots, vital for the application of necessary patches to SAP’s middleware.

What Is the Extent of the Impact?

With over 580 documented victims, this attack has predominantly impacted entities in the U.S., U.K., and Saudi Arabia. Various sectors, from oil and government agencies to medical and manufacturing industries, have reported breaches. Google’s Threat Intelligence Group has verified ongoing exploitation, dating back to earlier this year. The lag in public awareness, despite early signs of the breach, exacerbates the situation, offering ample time to attackers for data exfiltration.

As cybersecurity continues to remain a pressing issue, these attacks reveal the pervasive threats posed by hidden vulnerabilities within critical infrastructures. Companies leveraging SAP software are urged to apply recent patches to mitigate further risks. Vigilance and comprehensive cybersecurity strategies will be vital in anticipating and counteracting similar threats. It is imperative for organizations to remain proactive, strengthening defenses to protect against emerging cyber threats.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

OpenAI and Anthropic Partner with US, UK Agencies to Safeguard AI Models

Attackers Breach npm Packages, Exposing Software Supply Chain Weakness

Akira Ransomware Hits SonicWall Firewalls as Attacks Escalate

CISA Maintains Operational Strength Despite Budget and Staff Reductions

Senator Demands FTC Probe Over Microsoft Security Defaults

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article North Korea Builds Cyber Network Resembling a Mafia Operation
Next Article Wordle Players Face Their Toughest Challenge Yet

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

xAI Reorganizes Workforce, Seeks Experts for Specialized AI Tutor Roles
AI Technology
Volkswagen Faces Ongoing Delays Securing Tesla Supercharger Access
Electric Vehicle
ARM Institute Honors Members for Boosting U.S. Manufacturing Automation
AI
Ondas Holdings Secures $217M to Expand Autonomous System Offerings
Robotics
Tesla Increases Giga Berlin Production to Meet Growing Demand
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?