Canadian Government Cyber Alerts

Canadian Government Cyber Alerts.

  • Cisco security advisory (AV26-048)
    by Canadian Centre for Cyber Security on January 21, 2026 at 7:28 pm

    <article data-history-node-id="7191" about="/en/alerts-advisories/cisco-security-advisory-av26-048" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-048<br /><strong>Date: </strong>January 21, 2026</p> <p>On January 21, 2026, Cisco published a security advisory to address a critical vulnerability in the following products:</p> <ul><li>Cisco Unified CM – versions prior to 12.5, 14 and 15</li> <li>Unified CM IM&amp;P – versions prior to 12.5, 14 and 15</li> <li>Unified CM SME – versions prior to 12.5, 14 and 15</li> <li>Webex Calling Dedicated Instance – versions prior to 12.5, 14 and 15</li> <li>Cisco Unity Connection Release – versions prior to 12.5, 14 and 15</li> </ul><p class="mrgn-bttm-md">On January 21, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-20045 to their Known Exploited Vulnerabilities (KEV) Database.</p> <p>The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested recommendations, and apply the necessary updates when available.</p> <ul class="list-unstyled"><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-20045">CISA KEV: CVE-2026-20045</a></li> <li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b">Cisco Unified Communications Products Remote Code Execution Vulnerability</a></li> <li><a href="https://tools.cisco.com/security/center/publicationListing.x">Cisco Security Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>

  • GNU security advisory (AV26-047)
    by Canadian Centre for Cyber Security on January 21, 2026 at 5:11 pm

    <article data-history-node-id="7190" about="/en/alerts-advisories/gnu-security-advisory-av26-047" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-047<br /><strong>Date: </strong>January 21, 2026</p> <p>On January 21, 2026, GNU published a security advisory to address a vulnerability in the following product. Included was a critical update for the following:</p> <ul><li>GNU InetUtils – versions 1.9.3 to 2.7</li> </ul><p class="mrgn-bttm-md">Open-source reporting indicates that an exploit for CVE-2026-24061 exists in the wild.</p> <p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates, when available.</p> <ul class="list-unstyled"><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24061">NVD – CVE-2026-24061</a></li> <li><a href="https://www.gnu.org/software/inetutils/">Inetutils – GNU network utilities</a></li> </ul></div> </div> </div> </div> </div> </article>

  • HPE security advisory (AV26-046)
    by Canadian Centre for Cyber Security on January 21, 2026 at 5:06 pm

    <article data-history-node-id="7189" about="/en/alerts-advisories/hpe-security-advisory-av26-046" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-046<br /><strong>Date: </strong>January 21, 2026</p> <p>On January 20, 2026, HPE published a security advisory to address a vulnerability in the following products:</p> <ul><li>HPE Alletra 6000 – versions prior to 6.1.2.800, version 6.1.3 versions prior to 6.1.3.300</li> <li>HPE Nimble Storage Hybrid Flash Arrays – versions prior to 6.1.2.800, version 6.1.3 versions prior to 6.1.3.300</li> <li>Nimble Storage All Flash Arrays – versions prior to 6.1.2.800, version 6.1.3 versions prior to 6.1.3.300</li> <li>HPE Alletra 5000 – versions prior to 6.1.2.800, version 6.1.3 versions prior to 6.1.3.300</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04995en_us&amp;docLocale=en_US#hpesbst04995-rev-1-hpe-alletra-6000-hpe-alletra-50-0">HPESBST04995 rev.1 – HPE Alletra 6000, HPE Alletra 5000 and HPE Nimble Storage Array OS, Remote Privilege Elevation</a></li> <li><a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">HPE Security Bulletin Library</a></li> </ul></div> </div> </div> </div> </div> </article>

  • Atlassian security advisory (AV26-045)
    by Canadian Centre for Cyber Security on January 21, 2026 at 5:00 pm

    <article data-history-node-id="7188" about="/en/alerts-advisories/atlassian-security-advisory-av26-045" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-045<br /><strong>Date: </strong>January 21, 2026</p> <p>On January 20, 2026, Atlassian published a security advisory to address vulnerabilities in the following products:</p> <ul><li>Bamboo Data Center and Server – multiple versions</li> <li>Bitbucket Data Center and Server – multiple versions</li> <li>Confluence Data Center and Server – multiple versions</li> <li>Crowd Data Center and Server – versions 7.1.0 to 7.1.2, versions 6.3.0 to 6.3.3</li> <li>Jira Data Center and Server – multiple versions</li> <li>Jira Service Management Data Center and Server – multiple versions</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://confluence.atlassian.com/security/security-bulletin-january-20-2026-1712324819.html">Security Bulletin – January 20 2026</a></li> <li><a href="https://www.atlassian.com/trust/security/advisories">Atlassian Security Advisories and Bulletins</a></li> </ul></div> </div> </div> </div> </div> </article>

  • GitLab security advisory (AV26-044)
    by Canadian Centre for Cyber Security on January 21, 2026 at 1:20 pm

    <article data-history-node-id="7187" about="/en/alerts-advisories/gitlab-security-advisory-av26-044" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-044<br /><strong>Date: </strong>January 21, 2026</p> <p>On January 21, 2026, GitLab published a security advisory to address vulnerabilities in the following products:</p> <ul><li>GitLab Community Edition (CE) – versions prior to 18.8.2, 18.7.2 and 18.6.4</li> <li>GitLab Enterprise Edition (EE) – versions prior to 18.8.2, 18.7.2 and 18.6.4</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://about.gitlab.com/releases/2026/01/21/patch-release-gitlab-18-8-2-released/">GitLab Patch Release: 18.8.2, 18.7.2, 18.6.4</a></li> <li><a href="https://about.gitlab.com/releases/categories/releases/">GitLab Releases</a></li> </ul></div> </div> </div> </div> </div> </article>

  • Google Chrome security advisory (AV26-043)
    by Canadian Centre for Cyber Security on January 21, 2026 at 1:11 pm

    <article data-history-node-id="7186" about="/en/alerts-advisories/google-chrome-security-advisory-av26-043" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-043<br /><strong>Date: </strong>January 21, 2026</p> <p>On January 20, 2026, Google published a security advisory to address vulnerabilities in the following product:</p> <ul><li>Stable Channel Chrome for Desktop – versions prior to 144.0.7559.96/.97 (Windows/Mac) and 144.0.7559.96 (Linux)</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates, when available.</p> <ul class="list-unstyled"><li><a href="https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_20.html">Google Chrome Security Advisory</a></li> </ul></div> </div> </div> </div> </div> </article>

  • Oracle security advisory – January 2026 quarterly rollup (AV26-042)
    by Canadian Centre for Cyber Security on January 21, 2026 at 1:05 pm

    <article data-history-node-id="7185" about="/en/alerts-advisories/oracle-security-advisory-january-2026-quarterly-rollup-av26-042" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-042<br /><strong>Date: </strong>January 21, 2026</p> <p>On January 20, 2026, Oracle published a security advisory to address vulnerabilities in multiple products.</p> <p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.oracle.com/security-alerts/cpujan2026.html">Oracle Critical Patch Update Advisory – January 2026</a></li> </ul></div> </div> </div> </div> </div> </article>

  • Juniper Networks security advisory (AV26-041)
    by Canadian Centre for Cyber Security on January 20, 2026 at 2:12 pm

    <article data-history-node-id="7182" about="/en/alerts-advisories/juniper-networks-security-advisory-av26-041" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-041<br /><strong>Date: </strong>January 20, 2026</p> <p>On January 14, 2026, Juniper Networks published security advisories to address vulnerabilities in multiple products:</p> <ul><li>Juniper Networks Policy Enforcer – versions prior to 24.1R3</li> <li>Juniper Networks Paragon Automation – versions prior to 24.1.1</li> <li>Junos OS Evolved – multiple versions</li> <li>Junos OS on EX4000 – versions prior to 24.4R2</li> <li>Junos OS on EX4000 – versions prior to 25.2R1-S2 and 25.2R2</li> <li>Junos OS on MX Series – multiple versions</li> <li>Junos OS on QFX5k Series – multiple versions</li> <li>Junos OS on SRX Series – multiple versions</li> <li>Junos OS on EX Series – multiple versions</li> <li>Junos OS – multiple versions</li> <li>Junos Space – versions prior to 24.1R5</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending">Juniper Networks Security Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>

  • GitLab security advisory (AV26-040)
    by Canadian Centre for Cyber Security on January 19, 2026 at 8:34 pm

    <article data-history-node-id="7181" about="/en/alerts-advisories/gitlab-security-advisory-av26-040" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-040<br /><strong>Date: </strong>January 19, 2026</p> <p>On January 16, 2026, GitLab published a security advisory to address vulnerabilities in the following products:</p> <ul><li>GitLab Community Edition (CE) – versions prior to 18.8.1</li> <li>GitLab Enterprise Edition (EE) – versions prior to 18.8.1</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates</p> <ul class="list-unstyled"><li><a href="https://about.gitlab.com/releases/2026/01/16/gitlab-18-8-1-released/">GitLab Patch Release: 18.8.1</a></li> <li><a href="https://about.gitlab.com/releases/categories/releases/">GitLab Releases</a></li> </ul><!–CUT & PASTE the French version info –></div> </div> </div> </div> </div> </article>

  • [Control systems] ABB security advisory (AV26-039)
    by Canadian Centre for Cyber Security on January 19, 2026 at 8:26 pm

    <article data-history-node-id="7180" about="/en/alerts-advisories/control-systems-abb-security-advisory-av26-039" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-039<br /><strong>Date: </strong>January 19, 2026</p> <p>On January 19, 2026, ABB published security advisories to address vulnerabilities in the following products:</p> <ul><li>Automation Studio – versions prior to 6.5</li> <li>Automation Runtime – version 6.5.0 and prior</li> <li>Automation Runtime – version R4.93 and prior</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and perform the suggested mitigations.</p> <ul class="list-unstyled"><li><a href="https://www.br-automation.com/fileadmin/SA25P004-4f45197f.pdf">Automation Studio Insufficient Server Certificate Validation CVE ID: CVE-2025-11043</a></li> <li><a href="https://www.br-automation.com/fileadmin/SA25P005-26597bd0.pdf">B&amp;R Automation Runtime Improper Handling of Flooding conditions on ANSL Server CVE ID: CVE-2025-11044</a></li> <li><a href="https://global.abb/group/en/technology/cyber-security/alerts-and-notifications">ABB Cyber security alerts and notifications</a></li> </ul><!–CUT & PASTE the French version info –></div> </div> </div> </div> </div> </article>

  • VMware security advisory (AV26-038)
    by Canadian Centre for Cyber Security on January 19, 2026 at 6:38 pm

    <article data-history-node-id="7179" about="/en/alerts-advisories/vmware-security-advisory-av26-038" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-038<br /><strong>Date: </strong>January 19, 2026</p> <p>Between January 12 and 18, 2026, VMware published security advisories to address vulnerabilities in multiple Tanzu products.</p> <ul><li>VM<span lang="en" xml:lang="en" xml:lang="en">ware Tanzu GemFire</span> – versions prior to 10.1.6</li> <li>VM<span lang="en" xml:lang="en" xml:lang="en">ware Tanzu GemFire</span> – versions prior to 10.2.1</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36758">Product Release Advisory – VMware Tanzu GemFire 10.1.6</a></li> <li><a href="https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36759">Product Release Advisory – VMware Tanzu GemFire 10.2.1</a></li> <li><a href="https://support.broadcom.com/web/ecx/security-advisory?segment=VT">Security Advisories – Tanzu</a></li> </ul></div> </div> </div> </div> </div> </article>

  • Microsoft Edge security advisory (AV26-037)
    by Canadian Centre for Cyber Security on January 19, 2026 at 6:14 pm

    <article data-history-node-id="7178" about="/en/alerts-advisories/microsoft-edge-security-advisory-av26-037" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-037<br /><strong>Date: </strong>January 19, 2026</p> <p>On January 14, 2026, Microsoft published a security update to address vulnerabilities in the following product:</p> <ul><li>Microsoft Edge Stable Channel – versions prior to 144.0.3719.82</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary update.</p> <ul class="list-unstyled"><li><a href="https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#january-14-2026">Microsoft Edge Stable Channel Release Notes</a></li> </ul><!–CUT & PASTE the French version info –></div> </div> </div> </div> </div> </article>

  • [Control systems] CISA ICS security advisories (AV26–036)
    by Canadian Centre for Cyber Security on January 19, 2026 at 5:41 pm

    <article data-history-node-id="7177" about="/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av26-036" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26–036<br /><strong>Date: </strong>January 19, 2026</p> <p>Between January 12 and 18, 2026, CISA published ICS advisories to address vulnerabilities in the following products:</p> <ul><li>AVEVA Process Optimization – versions prior to 2024.1</li> <li>Festo Firmware – multiple applications and all versions</li> <li>Rockwell Automation 432ES-IG3 Series A – version V1.001</li> <li>Rockwell Automation FactoryTalk DataMosaix Private Cloud – version 7.11</li> <li>Rockwell Automation FactoryTalk DataMosaix Private Cloud – version 8.00</li> <li>Rockwell Automation FactoryTalk DataMosaix Private Cloud – version 8.01</li> <li>Schneider Electric EcoStruxure Power Build Rapsody – multiple versions and models</li> <li>Siemens Industrial Edge Device Kit – multiple versions</li> <li>Siemens Industrial Edge Devices – multiple versions and models</li> <li>Siemens RUGGEDCOM APE1808 Devices – contact customer support to receive patch and update information</li> <li>Siemens RUGGEDCOM ROS – versions prior to V5.10.1</li> <li>Siemens SIMATIC and SIPLUS – multiple versions and models</li> <li>Siemens SINEC Security Monitor – version prior to V4.10.0</li> <li>Siemens TeleControl Server Basic – versions prior to V3.1.2.4</li> <li>YoSmart YoLink Mobile Appication – version v1.40.45</li> <li>YoSmart YoLink Smart Hub – version 0382</li> <li>YoSmart server – all versions</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link, perform the suggested mitigations and apply the necessary updates if available.</p> <ul class="list-unstyled"><li><a href="https://www.cisa.gov/news-events/cybersecurity-advisories">CISA ICS Advisories</a></li> </ul><!–CUT & PASTE the French version info –></div> </div> </div> </div> </div> </article>

  • Ubuntu security advisory (AV26-035)
    by Canadian Centre for Cyber Security on January 19, 2026 at 5:30 pm

    <article data-history-node-id="7176" about="/en/alerts-advisories/ubuntu-security-advisory-av26-035" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-035<br /><strong>Date: </strong>January 19, 2026</p> <p>Between January 12 and 18, 2026, Ubuntu published security notices to address vulnerabilities in the Linux kernel affecting the following product:</p> <ul><li>Ubuntu 20.04 LTS</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the web links provided and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://ubuntu.com/security/notices/USN-7922-5">USN-7922-5: Linux kernel (IoT) vulnerabilities</a></li> <li><a href="https://ubuntu.com/security/notices">Ubuntu Security Notices</a></li> </ul><!–CUT & PASTE the French version info –></div> </div> </div> </div> </div> </article>

  • Dell security advisory (AV26-034)
    by Canadian Centre for Cyber Security on January 19, 2026 at 5:23 pm

    <article data-history-node-id="7175" about="/en/alerts-advisories/dell-security-advisory-av26-034" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-034<br /><strong>Date: </strong>January 19, 2026</p> <p>Between January 12 and 18, 2026, Dell published security advisories to address vulnerabilities in the following products:</p> <ul><li>Dell Elastic Cloud Storage (ECS) – versions 3.8.1.0 to 3.8.1.7</li> <li>Dell ObjectScale – versions prior to 4.2.0.0</li> <li>Dell PowerScale OneFS – multiple versions</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.dell.com/support/kbdoc/en-ca/000415586/dsa-2026-049-security-update-for-dell-powerscale-onefs-multiple-vulnerabilities">DSA-2026-049: Security Update for Dell PowerScale OneFS Multiple Vulnerabilities</a></li> <li><a href="https://www.dell.com/support/kbdoc/en-ca/000415880/dsa-2026-047-security-update-for-dell-ecs-and-objectscale-multiple-vulnerabilities">DSA-2026-047: Security update for Dell ECS and ObjectScale Multiple Vulnerabilities</a></li> <li><a href="https://www.dell.com/support/security/en-ca">Dell Security advisories and notices</a></li> </ul><!–CUT & PASTE the French version info –></div> </div> </div> </div> </div> </article>

  • IBM security advisory (AV26-033)
    by Canadian Centre for Cyber Security on January 19, 2026 at 5:08 pm

    <article data-history-node-id="7174" about="/en/alerts-advisories/ibm-security-advisory-av26-033" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-033<br /><strong>Date: </strong>January 19, 2026</p> <p>Between January 12 and 18, 2026, IBM published security advisories to address vulnerabilities in multiple products. Included were critical updates for the following:</p> <ul><li>IBM Cloud Pak for Business Automation – multiple versions</li> <li>IBM Concert Software – versions 1.0.0 to 2.1.0</li> <li>IBM Datacap Navigator – versions 9.1.7, 9.1.8 and 9.1.9</li> <li>IBM Datacap – versions 9.1.7, 9.1.8 and 9.1.9</li> <li>IBM Library Support for Struts – version 2.5.37</li> <li>IBM Operations Analytics – Log Analysis – versions 1.3.7.0, 1.3.7.1 and 1.3.7.2</li> <li>IBM Robotic Process Automation for Cloud Pak – versions 23.0.0 to 23.0.20.4, versions 30.0.0 to 30.0.0.2</li> <li>IBM Robotic Process Automation – versions 23.0.0 to 23.0.20.4, versions 30.0.0 to 30.0.0.2</li> <li>IBM Security Verify Access Container – versions 10.0 to 10.0.9</li> <li>IBM Sterling External Authentication Server – versions 6.1.1.0 to 6.1.1.1</li> <li>IBM Terracotta – versions 11.1.0.0 to 11.1.0.10</li> <li>IBM Verify Identity Access Container – versions 11.0 to 11.0.1</li> <li>IBM Verify Identity Access – versions 10.0 to 10.0.9</li> <li>IBM Verify Identity Access – versions 11.0 to 11.0.1</li> <li>IBM i Access Family – versions 1.1.9.8 to 1.1.9.10</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.ibm.com/support/pages/bulletin/">IBM Product Security Incident Response</a></li> </ul><!–CUT & PASTE the French version info –></div> </div> </div> </div> </div> </article>

  • Palo Alto Networks security advisory (AV26-032)
    by Canadian Centre for Cyber Security on January 14, 2026 at 8:58 pm

    <article data-history-node-id="7171" about="/en/alerts-advisories/palo-alto-networks-security-advisory-av26-032" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-032<br /><strong>Date: </strong>January 14, 2026</p> <p>On January 14, 2026, <span lang="en" xml:lang="en" xml:lang="en">Palo Alto Networks</span> published security advisories to address vulnerabilities in the following products:</p> <ul><li>Prisma Browser – versions prior to 142.21.4.163</li> <li>PAN-OS 12.1 – versions prior to 12.1.3-h3</li> <li>PAN-OS 12.1 – versions prior to 12.1.4</li> <li>PAN-OS 11.2 – multiple versions</li> <li>PAN-OS 11.1 – multiple versions</li> <li>PAN-OS 10.2 – multiple versions</li> <li>PAN-OS 10.1 – versions prior to 10.1.14-h20</li> <li>Prisma Access 11.2 – versions prior to 11.2.7-h8</li> <li>Prisma Access 10.2 – versions prior to 10.2.10-h29</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://security.paloaltonetworks.com/PAN-SA-2026-0001">PAN-SA-2026-0001 Chromium: Monthly Vulnerability Update (January 2026)</a></li> <li><a href="https://security.paloaltonetworks.com/CVE-2026-0227">CVE-2026-0227 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal</a></li> <li><a href="https://security.paloaltonetworks.com/">Palo Alto Network Security Advisories</a></li> </ul><!–CUT & PASTE the French version info –></div> </div> </div> </div> </div> </article>

  • Red Hat security advisory (AV26-031)
    by Canadian Centre for Cyber Security on January 14, 2026 at 8:00 pm

    <article data-history-node-id="7170" about="/en/alerts-advisories/red-hat-security-advisory-av26-031" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p class="mrgn-bttm-md"><strong>Serial number: </strong>AV26-031<br /><strong>Date: </strong>January 14, 2026</p> <p>Between January 5 and 11, 2026, Red Hat published security advisories to address vulnerabilities in multiple products. Included were updates to address vulnerabilities in the Linux kernel for the following products:</p> <ul><li>Red Hat CodeReady Linux Builder – multiple versions and platforms</li> <li>Red Hat Enterprise Linux – multiple versions and platforms</li> <li>Red Hat Enterprise Linux Server – multiple versions and platforms</li> <li>Red Hat Enterprise Linux for Real Time – multiple versions and platforms</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://access.redhat.com/security/security-updates/security-advisories">Red Hat Security Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>

  • Drupal security advisory (AV26-030)
    by Canadian Centre for Cyber Security on January 14, 2026 at 7:53 pm

    <article data-history-node-id="7169" about="/en/alerts-advisories/drupal-security-advisory-av26-030" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p class="mrgn-bttm-md"><strong>Serial number: </strong>AV26-030<br /><strong>Date:</strong> January 14, 2026</p> <p>On January 14, 2026, Drupal published security advisories to address vulnerabilities in the following products:</p> <ul><li>Group invite – versions prior to 2.3.9, version 3.0.0 to versions prior to 3.0.4, version 4.0.0 to versions prior to 4.0.4</li> <li>Role Delegation – version 1.3.0 to versions prior to 1.5.0</li> <li>AT Internet SmartTag – versions prior to 1.0.1</li> <li>AT Internet Piano Analytics – versions prior to 1.0.1, version 2.0.0 to versions prior to 2.3.1</li> <li>Microsoft Entra ID SSO Login – versions prior to 1.0.4</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates or perform the suggested mitigations.</p> <ul class="list-unstyled"><li><a href="https://www.drupal.org/security">Drupal Security Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>

  • [Control systems] Schneider Electric security advisory (AV26-029)
    by Canadian Centre for Cyber Security on January 14, 2026 at 3:57 pm

    <article data-history-node-id="7168" about="/en/alerts-advisories/control-systems-schneider-electric-security-advisory-av26-029" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-029<br /><strong>Date: </strong>January 14, 2026</p> <p>On January 13, 2026, Schneider Electric published advisories to address vulnerabilities in the following products:</p> <ul><li>EcoStruxure Power Build Rapsody software – multiple versions</li> <li>Wiser iTRV2 Version Wiser iTRV3, Wiser RTR2, Wiser UFH, Wiser 16A Electrical Heat Switch, Wiser Boiler Relay, Exxact cFMT 16a, Elko cFMT 16a, Odace cFMT 2a, Merten cFMT 16a, Merten cFMT 2a, Wiser Power Micromodule, Wiser FIP Micromodule, Iconic, Wiser Connected Smart Dimmer, Iconic, Wiser Connected Smart Switch, 2AX, Iconic, Wiser Connected Smart Switch, 10AX, Iconic, Connected AC Fan Controller Iconic, Connected Smart Socket, Wiser Connected Application Module 1-Gang, Wiser Connected Application Module 2-Gang, Wiser Connected Push Button Dimmer, Wiser Connected Push Button Switch, Wiser Connected Push Button Shutter, Wiser Connected Motion Dimmer, Wiser Connected Motion Switch, Wiser Connected Rotary Dimmer, Connected Wireless Switch, Micromodule Switch, Micromodule Dimmer, Micromodule Shutter, Connected Single Socket Outlet, Connected Double Socket Outlet, Fuga Connected Socket Outlet, Mureva EV Link – all versions</li> <li>EcoStruxure™ Process Expert – versions prior to 2025</li> <li>EcoStruxure™ Process Expert for AVEVA System Platform – all versions</li> <li>Plant iT/Brewmaxx – version v9.60 and later</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-013-04&amp;p_enDocType=Security+and+Safety+Notice&amp;p_File_Name=SEVD-2026-013-04.pdf">Multiple Vulnerabilities on EcoStruxure Power Build Rapsody</a></li> <li><a href="https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-013-03&amp;p_enDocType=Security+and+Safety+Notice&amp;p_File_Name=SEVD-2026-013-03.pdf">Multiple Third-Party Vulnerabilities on Zigbee Products</a></li> <li><a href="https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-013-02&amp;p_enDocType=Security+and+Safety+Notice&amp;p_File_Name=SEVD-2026-013-02.pdf">Incorrect Default Permissions Vulnerability on EcoStruxure™ Process Expert</a></li> <li><a href="https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-013-01&amp;p_enDocType=Security+and+Safety+Notice&amp;p_File_Name=SEVD-2026-013-01.pdf">Multiple Third-Party Vulnerabilities on ProLeiT Plant iT/Brewmaxx</a></li> <li><a href="https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp">Schneider Electric Security Notifications</a></li> </ul><!–CUT & PASTE the French version info –></div> </div> </div> </div> </div> </article>

  • Mozilla security advisory (AV26-028)
    by Canadian Centre for Cyber Security on January 14, 2026 at 3:43 pm

    <article data-history-node-id="7167" about="/en/alerts-advisories/mozilla-security-advisory-av26-028" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-028<br /><strong>Date: </strong>January 14, 2026</p> <p>On January 13, 2026, Mozilla published security advisories to address vulnerabilities in the following products:</p> <ul><li>Firefox ESR – versions prior to 140.7</li> <li>Firefox ESR – versions prior to 115.32</li> <li>Firefox – versions prior to 147</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/">Mozilla Foundation Security Advisory 2026-03</a></li> <li><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-02/">Mozilla Foundation Security Advisory 2026-02</a></li> <li><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/">Mozilla Foundation Security Advisory 2026-01</a></li> <li><a href="https://www.mozilla.org/en-US/security/advisories/">Mozilla Security Advisories</a></li> </ul><!–CUT & PASTE the French version info –></div> </div> </div> </div> </div> </article>

  • Adobe security advisory (AV26-027)
    by Canadian Centre for Cyber Security on January 14, 2026 at 3:30 pm

    <article data-history-node-id="7166" about="/en/alerts-advisories/adobe-security-advisory-av26-027" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-027<br /><strong>Date: </strong>January 14, 2026</p> <p>On January 13, 2026, Adobe published security advisories to address vulnerabilities in the following products:</p> <ul><li>Adobe Dreamweaver – version 21.6 and prior</li> <li>Adobe InDesign – version ID21.0 and prior</li> <li>Adobe InDesign – version ID19.5.5 and prior</li> <li>Illustrator 2025/2026 – version 29.8.3 and prior</li> <li>Illustrator 2025/2026 – version 30.0 and prior</li> <li>Adobe InCopy – version 21.0 and prior</li> <li>Adobe InCopy – version 19.5.5 and prior</li> <li>Adobe Bridge – version 15.1.2 (LTS) and prior</li> <li>Adobe Bridge – version 16.0 and prior</li> <li>Adobe Substance 3D Modeler – version 1.22.4 and prior</li> <li>Adobe Substance 3D Stager – version 3.1.5 and prior</li> <li>Adobe Substance 3D Painter – version 11.0.3 and prior</li> <li>Adobe Substance 3D Sampler – version 5.1.0 and prior</li> <li>ColdFusion 2025/2023 – version Update 5 and prior</li> <li>ColdFusion 2025/2023 – version Update 17 and prior</li> <li>Adobe Substance 3D Designer – version 15.0.3 and prior</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://helpx.adobe.com/security.html">Adobe Security Advisories</a></li> </ul><!–CUT & PASTE the French version info –></div> </div> </div> </div> </div> </article>

  • Google Chrome security advisory (AV26-026)
    by Canadian Centre for Cyber Security on January 14, 2026 at 3:16 pm

    <article data-history-node-id="7165" about="/en/alerts-advisories/google-chrome-security-advisory-av26-026" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-026<br /><strong>Date: </strong>January 14, 2026</p> <p>On January 13, 2026, Google published a security advisory to address vulnerabilities in the following product:</p> <ul><li>Stable Channel Chrome for Desktop – versions prior to 144.0.7559.59/60 (Windows/Mac) and 144.0.7559.59 (Linux)</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates, when available.</p> <ul class="list-unstyled"><li><a href="https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html">Google Chrome Security Advisory</a></li> </ul></div> </div> </div> </div> </div> </article>

  • HPE security advisory (AV26-025)
    by Canadian Centre for Cyber Security on January 13, 2026 at 9:14 pm

    <article data-history-node-id="7164" about="/en/alerts-advisories/hpe-security-advisory-av26-025" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-025<br /><strong>Date: </strong>January 13, 2026</p> <p>On January 13, 2026, HPE published security advisories to address vulnerabilities in the following products :</p> <ul><li>HPE Networking Instant – versions 3.3.1.0 and prior</li> <li>HPE Aruba Networking AOS-8 and AOS-10 for Mobility Conductors, Controllers, and Gateways – multiple versions and platforms</li> <li>HPE Aruba Networking Virtual Intranet Access (VIA) Client for Linux – versions 4.7.5 and prior</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04988en_us&amp;docLocale=en_US#hpesbnw04988-rev-1-hpe-networking-instant-on-multi-0">HPESBNW04988 rev.1 – HPE Networking Instant On, Multiple Vulnerabilities</a></li> <li><a href="https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us&amp;docLocale=en_US#hpesbnw04987-rev-1-multiple-vulnerabilities-in-hpe-0">HPESBNW04987 rev.1 – Multiple Vulnerabilities in HPE Aruba Networking AOS-8 and AOS-10 for Mobility Conductors, Controllers, and Gateways.</a></li> <li><a href="https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04994en_us&amp;docLocale=en_US">HPESBNW04994 rev.1 – Local Privilege Escalation Vulnerability in HPE Aruba Networking Virtual Intranet Access (VIA) Client for Linux</a></li> <li><a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">HPE Security Bulletin Library</a></li> </ul><!–CUT & PASTE the French version info –></div> </div> </div> </div> </div> </article>

  • Microsoft security advisory – January 2026 monthly rollup (AV26-024)
    by Canadian Centre for Cyber Security on January 13, 2026 at 8:32 pm

    <article data-history-node-id="7163" about="/en/alerts-advisories/microsoft-security-advisory-january-2026-monthly-rollup-av26-024" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p class="mrgn-bttm-md"><strong>Serial number: </strong>AV26-024<br /><strong>Date: </strong>January 13, 2026</p> <p>On January 13, 2026, Microsoft published security advisories to address vulnerabilities in multiple products. Included were critical updates for the following products:</p> <ul><li>Azure Connected Machine Agent</li> <li>Azure Core shared client library for Python</li> <li>Microsoft 365 Apps for Enterprise</li> <li>Microsoft Excel 2016</li> <li>Microsoft Office 2016</li> <li>Microsoft Office 2019</li> <li>Microsoft Office Deployment Tool</li> <li>Microsoft Office LTSC 2021</li> <li>Microsoft Office LTSC 2024</li> <li>Microsoft Office LTSC for Mac 2021</li> <li>Microsoft Office LTSC for Mac 2024</li> <li>Microsoft SQL Server 2022</li> <li>Microsoft SQL Server 2025</li> <li>Microsoft SharePoint Enterprise Server 2016</li> <li>Microsoft SharePoint Server 2019</li> <li>Microsoft SharePoint Server Subscription Edition</li> <li>Microsoft Word 2016</li> <li>Office Online Server</li> <li>Windows 10</li> <li>Windows 11</li> <li>Windows Admin Center in Azure Portal</li> <li>Windows SDK</li> <li>Windows Server 2008</li> <li>Windows Server 2008 R2</li> <li>Windows Server 2012</li> <li>Windows Server 2012 R2</li> <li>Windows Server 2016</li> <li>Windows Server 2019</li> <li>Windows Server 2022</li> <li>Windows Server 2025</li> </ul><p>Microsoft has received reports that CVE-2026-20805 is being exploited.</p> <p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Jan">January 2026 Security Updates</a></li> <li><a href="https://msrc.microsoft.com/update-guide/en-us">Security Update Guide</a></li> </ul></div> </div> </div> </div> </div> </article>

  • Fortinet security advisory (AV26-023)
    by Canadian Centre for Cyber Security on January 13, 2026 at 8:25 pm

    <article data-history-node-id="7162" about="/en/alerts-advisories/fortinet-security-advisory-av26-023" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p class="mrgn-bttm-md"><strong>Serial number: </strong>AV26-023<br /><strong>Date: </strong>January 13, 2026</p> <p>On January 13, 2026, Fortinet published security advisories to address vulnerabilities in multiple products. Included were critical updates for the following:</p> <ul><li>FortiFone 7.0 – versions 7.0.0 to 7.0.1</li> <li>FortiFone 3.0 – versions 3.0.13 to 3.0.23</li> <li>FortiOS 7.6 – versions 7.6.0 to 7.6.3</li> <li>FortiOS 7.4 – versions 7.4.0 to 7.4.8</li> <li>FortiOS 7.2 – versions 7.2.0 to 7.2.11</li> <li>FortiOS 7.0 – versions 7.0.0 to 7.0.17</li> <li>FortiOS 6.4 – versions 6.4.0 to 6.4.16</li> <li>FortiSASE 25.2 – version 25.2.b</li> <li>FortiSASE 25.1.a – version 25.1.a.2</li> <li>FortiSIEM 7.4 – version 7.4.0</li> <li>FortiSIEM 7.3 – versions 7.3.0 to 7.3.4</li> <li>FortiSIEM 7.2 – versions 7.2.0 to 7.2.6</li> <li>FortiSIEM 7.1 – versions 7.1.0 to 7.1.8</li> <li>FortiSIEM 7.0 – versions 7.0.0 to 7.0.4</li> <li>FortiSIEM 6.7 – versions 6.7.0 to 6.7.10</li> <li>FortiSwitchManager 7.2 – versions 7.2.0 to 7.2.6</li> <li>FortiSwitchManager 7.0 – versions 7.0.0 to 7.0.5</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.fortiguard.com/psirt/FG-IR-25-084">Heap-based buffer overflow in cw_acd daemon – CVE-2025-25249</a></li> <li><a href="https://www.fortiguard.com/psirt/FG-IR-25-260">Unauthenticated access to local configuration – CVE-2025-47855</a></li> <li><a href="https://www.fortiguard.com/psirt/FG-IR-25-772">Unauthenticated remote command injection – CVE-2025-64155</a></li> <li><a href="https://www.fortiguard.com/psirt?filter=1&amp;version=&amp;severity=5&amp;severity=4&amp;severity=3&amp;severity=2">Fortinet PSIRT Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>

  • ServiceNow security advisory (AV26-022)
    by Canadian Centre for Cyber Security on January 13, 2026 at 4:48 pm

    <article data-history-node-id="7161" about="/en/alerts-advisories/servicenow-security-advisory-av26-022" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p class="mrgn-bttm-md"><strong>Serial number:</strong> AV26-022<br /><strong>Date:</strong> January 13, 2026</p> <p>On January 12, 2026, ServiceNow published a security advisory to address a critical vulnerability in the following products:</p> <ul><li>Now Assist AI Agents (sn_aia) – versions prior to 5.1.18</li> <li>Now Assist AI Agents (sn_aia) – versions prior to 5.2.19</li> <li>Virtual Agent API (sn_va_as_service) – versions prior to 3.15.2</li> <li>Virtual Agent API (sn_va_as_service) – versions prior to 4.0.4</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://support.servicenow.com/kb?id=kb_article_view&amp;sysparm_article=KB2587329">[Security Advisory] CVE-2025-12420 – Privilege Escalation in ServiceNow AI Platform</a></li> <li><a href="https://support.servicenow.com/kb?id=kb_article_view&amp;sysparm_article=KB1226057">ServiceNow security advisories</a></li> </ul></div> </div> </div> </div> </div> </article>

  • SAP security advisory – January 2026 monthly rollup (AV26-021)
    by Canadian Centre for Cyber Security on January 13, 2026 at 4:32 pm

    <article data-history-node-id="7160" about="/en/alerts-advisories/sap-security-advisory-january-2026-monthly-rollup-av26-021" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p class="mrgn-bttm-md"><strong>Serial number:</strong> AV26-021<br /><strong>Date:</strong> January 13, 2026</p> <p>On January 13, 2026, SAP published security advisories to address vulnerabilities in multiple products. Included were updates for the following:</p> <ul><li>Business Server Pages Application (Product Designer Web UI) – versions SAP_APPL 618, S4CORE 102, 103, 104, 105, 106, 107, 108, 109, EA-APPL 600, 602, 603, 604, 605, 606 and 617</li> <li>NW AS Java UME User Mapping – versions ENGINEAPI 7.50, SERVERCORE 7.50 and UMEADMIN 7.50</li> <li>SAP Application Server for ABAP and SAP NetWeaver RFCSDK – versions KRNL64UC 7.53, NWRFCSDK 7.50, KERNEL 7.53, 7.54, 7.77, 7.89, 7.93 and 9.16</li> <li>SAP Business Connector – version SAP BC 4.8</li> <li>SAP ERP Central Component and SAP S/4HANA (SAP EHS Management) – versions SAP_APPL 618, S4CORE 102, 103, 104, 105, 106, 107, 108, 109, EA-APPL 605, 606 and 617</li> <li>SAP Fiori App (Intercompany Balance Reconciliation) – versions UIAPFI70 500, 600, 700, 800, 900, 901, 902 and UIS4H 109</li> <li>SAP Fiori App (Intercompany Balance Reconciliation) – versions UIAPFI70 500, 600, 700, 800, 900, 901, 902, S4CORE 102, 103, 104, 105, 106, 107 and 108</li> <li>SAP Fiori App (Intercompany Balance Reconciliation) – versions UIAPFI70 500, 600, 700, 800, 900, 901, 902, S4CORE 102, 103, 104, 105, 106, 107, 108, 109 and UIS4H 109</li> <li>SAP HANA database – version HDB 2.00</li> <li>SAP Identity Management – versions IDM_CLM_REST_API 8.0 and IDMIC 8.0</li> <li>SAP Landscape Transformation – versions DMIS 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2018_1_752 and 2020</li> <li>SAP NetWeaver Application Server ABAP and ABAP Platform – versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 and SAP_BASIS 816</li> <li>SAP NetWeaver Enterprise Portal – version EP-RUNTIME 7.50</li> <li>SAP S/4HANA (Private Cloud and On-Premise) – versions S4CORE 102, 103, 104, 105, 106, 107, 108 and 109</li> <li>SAP S/4HANA Private Cloud and On-Premise (Financials – General Ledger) – versions S4CORE 102, 103, 104, 105, 106, 107, 108 and 109</li> <li>SAP Supplier Relationship Management (SICF Handler in SRM Catalog) – versions SRM_SERVER 700, 701, 702, 713 and 714</li> <li>SAP Wily Introscope Enterprise Manager (WorkStation) – version WILY_INTRO_ENTERPRISE 10.8</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link, perform the suggested mitigations, and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/january-2026.html">SAP Security Patch Day – January 2026</a></li> </ul></div> </div> </div> </div> </div> </article>

  • [Control systems] Siemens security advisory (AV26-020)
    by Canadian Centre for Cyber Security on January 13, 2026 at 3:26 pm

    <article data-history-node-id="7159" about="/en/alerts-advisories/control-systems-siemens-security-advisory-av26-020" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p class="mrgn-bttm-md"><strong>Serial number:</strong> AV26-020<br /><strong>Date:</strong> January 13, 2026</p> <p>On January 13, 2026, Siemens published advisories to address vulnerabilities in multiple products. Included were updates for the following products:</p> <ul><li>Industrial Edge Device Kit – x86-64 V1.24 – version V1.24.2 and prior</li> <li>Industrial Edge Device Kit – x86-64 V1.25 – version V1.25.1 and prior</li> <li>RUGGEDCOM APE1808 – contact customer support to receive patch and update information</li> <li>SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants) – version V1.3 and prior</li> <li>SIMATIC ET 200SP IM 155-6 PN R1 (6ES7155-6AU00-0HM0) – version V6.0.1 and prior</li> <li>SIMATIC ET 200SP IM 155-6 PN/3 HF (6ES7155-6AU30-0CN0) – version V4.2.2 and prior</li> <li>SIMATIC PN/PN Coupler (6ES7158-3AD10-0XA0) – version V6.0.0 and prior</li> <li>SIMATIC PN/MF Coupler (6ES7158-3MU10-0XA0) – all versions</li> <li>SIPLUS NET PN/PN Coupler (6AG2158-3AD10-4XA0) – version V6.0.0 and prior</li> <li>Siemens Industrial Edge Devices – multiple versions and platforms</li> <li>TeleControl Server Basic – versions V3.1.2.4 and prior</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the web links provided, perform the suggested mitigations and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.siemens.com/global/en/products/services/cert.html#SecurityPublications">Siemens Security Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>

  • AL26-001 – Vulnerabilities affecting n8n – CVE-2026-21858, CVE-2026-21877 and CVE-2025-68613
    by Canadian Centre for Cyber Security on January 12, 2026 at 6:45 pm

    <article data-history-node-id="7158" about="/en/alerts-advisories/al26-001-vulnerabilities-affecting-n8n-cve-2026-21858-cve-2026-21877-cve-2025-68613" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Number:</strong> AL26-001<br /><strong>Date:</strong> January 12, 2026</p> <h2>Audience</h2> <p>This Alert is intended for <abbr title="information technology">IT</abbr> professionals and managers.</p> <h2>Purpose</h2> <p>An Alert is used to raise awareness of a recently identified cyber threat that may impact cyber information assets, and to provide additional detection and mitigation advice to recipients. The Canadian Centre for Cyber Security ("Cyber Centre") is also available to provide additional assistance regarding the content of this Alert to recipients as requested.</p> <h2>Details</h2> <p>On January 7, 2026, The Cyber Centre became aware of multiple high-severity vulnerabilities in n8n, a popular workflow automation software. CVE-2026-21858<sup id="fn1-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup>, is an Improper Input Validation vulnerability that may allow an unauthenticated remote attacker to execute arbitrary code (CWE-20)<sup id="fn2-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup>. The primary issue stems from how the n8n webhook processes incoming data and manages file handling. Webhooks, used to ingest data from external applications, are triggered after requests are parsed by the parseRequestBody() function, where insufficient validation creates an attack vector<sup id="fn3-rf"><a class="fn-lnk" href="#fn3"><span class="wb-inv">Footnote </span>3</a></sup>.</p> <p>CVE-2026-21877<sup id="fn4-rf"><a class="fn-lnk" href="#fn4"><span class="wb-inv">Footnote </span>4</a></sup>, is an Improper Control of Generation of Code (‘Code Injection’) vulnerability that may allow a remote, privileged attacker to execute arbitrary code (CWE-94)<sup id="fn5-rf"><a class="fn-lnk" href="#fn5"><span class="wb-inv">Footnote </span>5</a></sup>, and may be chained with the unauthenticated vulnerability CVE-2026-21858 to achieve code execution or arbitrary file writes on certain vulnerable versions of n8n software.</p> <p>CVE‑2025‑68613<sup id="fn6-rf"><a class="fn-lnk" href="#fn6"><span class="wb-inv">Footnote </span>6</a></sup> is a critical remote code execution vulnerability resulting from insufficient isolation of user-supplied expressions in workflow configurations. This flaw enables authenticated attackers to run arbitrary code with the same privileges as the n8n process, potentially leading to complete compromise of the instance.</p> <p>On January 7, 2026, in response to the vendor advisory, the Cyber Centre released AV26-004<sup id="fn7-rf"><a class="fn-lnk" href="#fn7"><span class="wb-inv">Footnote </span>7</a></sup>.</p> <p>The Cyber Centre has observed open-source reporting that multiple Proof-of-Concepts (PoCs) are publicly available, including one that chains CVE‑2026‑21858 and CVE‑2025‑68613<sup id="fn8-rf"><a class="fn-lnk" href="#fn8"><span class="wb-inv">Footnote </span>8</a></sup>. This exploit sequence enables unauthenticated <abbr title="Remote Code Execution">RCE</abbr> by first extracting sensitive data and then executing arbitrary commands on the affected server.</p> <h2>Suggested actions</h2> <p>The Cyber Centre recommends that organizations upgrade affected instances of n8n to the latest supported version. The table below shows affected and patched versions for each CVE:</p> <div class="table-responsive"> <table class="table"><thead><tr><th scope="col">Affected product</th> <th scope="col">CVE</th> <th scope="col">Affected versions</th> <th scope="col">Patched versions</th> </tr></thead><tbody><tr><td>n8n</td> <td>CVE-2025-68613</td> <td>version 0.211.0 to versions prior to 1.120.4, 1.121.1 and 1.122.0</td> <td>1.120.4, 1.121.1, and 1.122.0</td> </tr><tr><td>n8n</td> <td>CVE-2026-21858</td> <td>version 1.65.0 to versions prior to 1.121.0</td> <td>1.121.0</td> </tr><tr><td>n8n</td> <td>CVE-2026-21877</td> <td>versions prior to 0.121.2</td> <td>1.121.3</td> </tr></tbody><thead></thead></table></div> <p>Note: n8n 1.X version will reach end of life (EOL) by beginning of March 2026<sup id="fn9-rf"><a class="fn-lnk" href="#fn9"><span class="wb-inv">Footnote </span>9</a></sup>.</p> <p>If patching is not immediately possible, the vendor suggests that users may restrict or disable publicly accessible webhook and form endpoints until upgrading is complete<sup id="fn10-rf"><a class="fn-lnk" href="#fn10"><span class="wb-inv">Footnote </span>10</a></sup>.</p> <p>In addition, the Cyber Centre strongly recommends that organizations review and implement the Cyber Centre’s Top 10 <abbr title="information technology">IT</abbr> Security Actions with an emphasis on the following topics<sup id="fn11-rf"><a class="fn-lnk" href="#fn11"><span class="wb-inv">Footnote </span>11</a></sup>.</p> <ul><li>Patch operating systems and applications</li> <li>Harden operating systems and applications</li> <li>Isolate web-facing applications</li> </ul><p>Should activity matching the content of this alert be discovered, recipients are encouraged to report via <a href="/en/incident-management">My Cyber Portal</a>, or email <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a>.</p> <h2>References</h2> <aside class="wb-fnote" role="note"><dl><dt>Footnote 1</dt> <dd id="fn1"> <p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21858">NVD – CVE-2026-21858</a></p> <p class="fn-rtn"><a href="#fn1-rf"><span class="wb-inv">Return to footnote</span>1<span class="wb-inv"> referrer</span></a></p> </dd> <dt>Footnote 2</dt> <dd id="fn2"> <p><a href="https://cwe.mitre.org/data/definitions/20.html">CWE20: Improper Input Validation</a></p> <p class="fn-rtn"><a href="#fn2-rf"><span class="wb-inv">Return to footnote</span>2<span class="wb-inv"> referrer</span></a></p> </dd> <dt>Footnote 3</dt> <dd id="fn3"> <p><a href="https://thehackernews.com/2026/01/critical-n8n-vulnerability-cvss-100.html">Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control</a></p> <p class="fn-rtn"><a href="#fn3-rf"><span class="wb-inv">Return to footnote</span>3<span class="wb-inv"> referrer</span></a></p> </dd> <dt>Footnote 4</dt> <dd id="fn4"> <p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21877">NVD – CVE-2026-21877</a></p> <p class="fn-rtn"><a href="#fn4-rf"><span class="wb-inv">Return to footnote</span>4<span class="wb-inv"> referrer</span></a></p> </dd> <dt>Footnote 5</dt> <dd id="fn5"> <p><a href="https://cwe.mitre.org/data/definitions/94.html">CWE94: Improper Control of Generation of Code (‘Code Injection’)</a></p> <p class="fn-rtn"><a href="#fn5-rf"><span class="wb-inv">Return to footnote</span>5<span class="wb-inv"> referrer</span></a></p> </dd> <dt>Footnote 6</dt> <dd id="fn6"> <p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68613">NVD – CVE-2025-68613</a></p> <p class="fn-rtn"><a href="#fn6-rf"><span class="wb-inv">Return to footnote</span>6<span class="wb-inv"> referrer</span></a></p> </dd> <dt>Footnote 7</dt> <dd id="fn7"> <p><a href="/en/alerts-advisories/n8n-security-advisory-av26-004">n8n security advisory (AV26-004)</a></p> <p class="fn-rtn"><a href="#fn7-rf"><span class="wb-inv">Return to footnote</span>7<span class="wb-inv"> referrer</span></a></p> </dd> <dt>Footnote 8</dt> <dd id="fn8"> <p><a href="https://www.databreachtoday.com/no-rest-in-2026-as-patch-alerts-amass-for-cisco-hpe-n8n-a-30482">No Rest in 2026 as Patch Alerts Amass for Cisco, HPE and n8n</a></p> <p class="fn-rtn"><a href="#fn8-rf"><span class="wb-inv">Return to footnote</span>8<span class="wb-inv"> referrer</span></a></p> </dd> <dt>Footnote 9</dt> <dd id="fn9"> <p><a href="https://blog.n8n.io/introducing-n8n-2-0/">Introducing n8n 2.0</a></p> <p class="fn-rtn"><a href="#fn9-rf"><span class="wb-inv">Return to footnote</span>9<span class="wb-inv"> referrer</span></a></p> </dd> <dt>Footnote 10</dt> <dd id="fn10"> <p><a href="https://github.com/n8n-io/n8n/security/advisories/GHSA-v4pr-fm98-w9pg">Unauthenticated File Access via Improper Webhook Request Handling (CVE-2026-21858)</a></p> <p class="fn-rtn"><a href="#fn10-rf"><span class="wb-inv">Return to footnote</span>10<span class="wb-inv"> referrer</span></a></p> </dd> <dt>Footnote 11</dt> <dd id="fn11"> <p><a href="/en/guidance/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089">Top 10 IT security actions to protect Internet connected networks and information (ITSM.10.089)</a></p> <p class="fn-rtn"><a href="#fn11-rf"><span class="wb-inv">Return to footnote</span>11<span class="wb-inv"> referrer</span></a></p> </dd> </dl></aside></div> </div> </div> </div> </div> </article>

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.