Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Cyberattacks Exploit Major Software Vulnerabilities, Affecting Global Infrastructure
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Cyberattacks Exploit Major Software Vulnerabilities, Affecting Global Infrastructure

Highlights

  • SAP vulnerabilities exposed, prompting cybersecurity scrutiny worldwide.

  • Multiple sectors, including oil and government, faced attacks.

  • Google confirmed successful zero-day exploits starting in March.

Kaan Demirel
Last updated: 15 May, 2025 - 9:09 pm 9:09 pm
Kaan Demirel 5 hours ago
Share
SHARE

Recent revelations about global cyberattacks have put a spotlight on the vulnerabilities within the systems of some of the world’s largest software manufacturers. These zero-day exploits have underscored the urgent need for improved cybersecurity measures. With parallels drawn to previous notable attacks like Salt Typhoon and Volt Typhoon, industry leaders warn of the expansive reach and potential damage of these latest security breaches. This revelation arrives at a critical juncture in cyber defense, as companies and governmental bodies scramble to secure their infrastructures.

Contents
What Are the Recent Vulnerabilities?How Are Organizations Addressing the Threat?What Is the Extent of the Impact?

Cyberattacks on enterprise-level software have been a recurring concern within the information technology sector, with previous incidents exposing systemic weaknesses in security infrastructure. The exploitation of zero-days, targeted at SAP software, is reminiscent of the heightened responses seen during the SolarWinds attack. Historically, such breaches have prompted substantial efforts to strengthen cyber defenses, yet full resolution remains a challenging task for many organizations.

What Are the Recent Vulnerabilities?

The vulnerabilities, which escaped detection by researchers and corporations until recently, have been patched in recent months. Malicious entities, however, continue to leverage these weaknesses. Three cyber groups, believed to be affiliated with the Chinese government, have reportedly gained access to these vulnerabilities. Furthermore, ransomware factions have joined this exploitation effort, raising the stakes for affected companies. According to Dave DeWalt of NightDragon, “a race” has ensued to capitalize on these flaws.

How Are Organizations Addressing the Threat?

Organizations including Onapsis, EclecticIQ, and Google’s Mandiant have documented and are actively tracking these exploitations. Notably, Onapsis has worked alongside Mandiant in crafting an open-source tool to identify these understated attacks. “We’ve uncovered attack strategies that remain undetected by traditional methods,” said Mariano Nunez of Onapsis. Companies now face the significant challenge of implementing comprehensive system reboots, vital for the application of necessary patches to SAP’s middleware.

What Is the Extent of the Impact?

With over 580 documented victims, this attack has predominantly impacted entities in the U.S., U.K., and Saudi Arabia. Various sectors, from oil and government agencies to medical and manufacturing industries, have reported breaches. Google’s Threat Intelligence Group has verified ongoing exploitation, dating back to earlier this year. The lag in public awareness, despite early signs of the breach, exacerbates the situation, offering ample time to attackers for data exfiltration.

As cybersecurity continues to remain a pressing issue, these attacks reveal the pervasive threats posed by hidden vulnerabilities within critical infrastructures. Companies leveraging SAP software are urged to apply recent patches to mitigate further risks. Vigilance and comprehensive cybersecurity strategies will be vital in anticipating and counteracting similar threats. It is imperative for organizations to remain proactive, strengthening defenses to protect against emerging cyber threats.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

FTC Seeks New Tools to Combat Deepfake Pornography

North Korea Builds Cyber Network Resembling a Mafia Operation

Cybercriminals Invest Illicit Profits in Surprising Ventures

DHS Faces Scrutiny for Withholding CISA Workforce Details

MITRE’s CVE Program Faces Funding Shake-up and Future Alternatives

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article North Korea Builds Cyber Network Resembling a Mafia Operation
Next Article Wordle Players Face Their Toughest Challenge Yet

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Huawei Unveils New Smart Watch With Health Tracking Features
Wearables
Elon Musk Responds to Complaints About Tesla Driver Monitoring
Electric Vehicle
Enhancements in Tesla’s Model Y Boost In-Cabin Safety
Electric Vehicle
British Financier Launches Ambitious Animal Communication Initiative
AI Technology
Intuitive Surgical Elevates Dave Rosa to CEO Role
Robotics
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?