ScreenConnect Servers Attacked, SharePoint Flaw Exploited

▼ Summary
– Smart factories face cybersecurity vulnerabilities from unpatched IoT devices, legacy systems, and human error, with unmanaged sensors and robotic components being common attack entry points.
– TLS certificate lifespans are being formally shortened, with a plan to reduce validity from one year down to 47 days, forcing organizations to overhaul certificate management.
– A critical Microsoft SharePoint vulnerability (CVE-2026-20963) is being actively exploited, leading CISA to add it to its Known Exploited Vulnerabilities catalog.
– An international law enforcement operation took down over 45,000 malicious IP addresses and arrested 94 suspects linked to phishing, malware, and ransomware.
– Apple has begun issuing lightweight, between-release security updates called Background Security Improvements for components like Safari and WebKit.
Recent cybersecurity developments highlight a critical need for organizations to prioritize patching and proactive defense. Active exploitation is underway for a critical Microsoft SharePoint vulnerability, identified as CVE-2026-20963. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has confirmed these attacks, adding the flaw to its Known Exploited Vulnerabilities catalog. This remote code execution issue, which Microsoft patched in January, underscores the persistent threat of unpatched enterprise software.
Simultaneously, administrators of the ScreenConnect remote access platform must act immediately. ConnectWise has released a patch for a severe vulnerability, CVE-2026-3564, that could allow attackers to hijack sessions. This flaw involves abusing ASP. NET machine keys to forge trusted authentication. Given the platform’s widespread use by managed service providers and IT departments, the potential impact is significant for both cloud-hosted and on-premises deployments.
The digital threat landscape extends far beyond these specific vulnerabilities. Google researchers have uncovered a sophisticated iPhone hacking toolkit named DarkSword, which has leveraged zero-day iOS vulnerabilities since late 2025. This discovery follows the recent exposure of another spy-grade exploit kit called Coruna, indicating a concerning trend of advanced mobile targeting.
These incidents coincide with a stark warning from CISA regarding endpoint management systems. The agency points to a major cyberattack on Stryker Corporation, where attackers wiped approximately 200,000 devices and exfiltrated massive amounts of data, as a potential indicator of escalating foreign cyber activity. The directive is clear: organizations must secure their management infrastructure without delay.
In the broader ecosystem, security strategy itself is being re-evaluated. One CISO argues that building security goals around controls is a flawed approach, advocating instead for strategies tightly aligned with business outcomes. This philosophy is critical as ransomware gangs now routinely use EDR killers to disable security software before launching attacks, making these tools a standard part of their arsenal.
The human element remains a persistent challenge. A major data breach at online safety service Aura, exposing 900,000 contact records, stemmed from a targeted phone phishing attack. Furthermore, a complex hiring fraud scheme has seen North Korean nationals infiltrate Western companies as remote IT workers, securing salaries and network access through standard recruitment channels.
On a positive note, coordinated law enforcement action has made significant strides. Operation Synergia III led to the takedown of over 45,000 malicious IP addresses and servers linked to phishing and ransomware, resulting in 94 arrests. In a separate effort, U. S. and international authorities disrupted four massive IoT botnets responsible for some of the largest DDoS attacks ever recorded.
Technology providers are also introducing new protections. Google is restricting the Android accessibility API to curb abuse by banking trojans, while Apple has begun issuing lightweight security updates between major OS releases. Mozilla is integrating a free built-in VPN into Firefox, emphasizing its commitment to user privacy. Meanwhile, major tech firms are backing open source security with a new $12.5 million fund administered by The Linux Foundation.
The financial motivation for cybercrime continues to grow. INTERPOL reports that global fraud losses have climbed to $442 billion, with a 54% rise in related notices from 2024 to 2025. In a striking example, a single fraudster pleaded guilty to a scheme involving fake AI songs that were streamed billions of times, netting over $8 million in illicit royalties.
As API attacks intensify and cloud misconfigurations evolve beyond basic errors, the pressure on defenders is mounting. The push for shorter TLS certificate lifespans is forcing organizations to overhaul management practices, while new research reveals that hidden instructions in README files can trick AI coding agents into leaking data. In this environment, tools like the newly open-sourced VulHunt framework for binary analysis and the Betterleaks secrets scanner provide defenders with new resources to identify risks before attackers can exploit them.
(Source: Help Net Security)




