If you have an email in Roundcube, be careful! They may have illegally accessed your account

The recognized webmail platform Roundcube faces serious security threats, according to researchers and the Cybersecurity and Infrastructure Security Agency (CISA). The vulnerabilities, registered as CVE-2025-49113 and CVE-2025-68461, have been added to CISA’s Known Exploited Vulnerabilities catalog, indicating their severity. The first vulnerability, CVE-2025-49113, is a deserialization issue that has remained unresolved for nearly 10 years and has a severity score of 9.9. Cyber-errors This flaw has caught the attention of attackers, especially due to the extensive use of Roundcube in sectors such as government and in institutions […]

The recognized webmail platform Roundcube faces serious security threats, according to researchers and the Cybersecurity and Infrastructure Security Agency (CISA). The vulnerabilities, registered as CVE-2025-49113 and CVE-2025-68461, have been added to CISA’s Known Exploited Vulnerabilities catalog, indicating their severity. The first vulnerability, CVE-2025-49113, is a deserialization issue that has remained unresolved for nearly 10 years and has a severity score of 9.9.

Cyber-errors

This flaw has caught the attention of attackers, especially due to the extensive use of Roundcube in sectors such as government and higher education institutions. In a report by the Shadowserver organization, it was revealed that approximately 84,000 instances of the software are vulnerable. Ryan Dewhurst, head of proactive threat intelligence at the firm watchTowr, highlighted that the popularity of Roundcube makes it an attractive target for hackers, especially because “webmail services are a goldmine”.

The second vulnerability mentioned, CVE-2025-68461, is related to a cross-site scripting issue and was fixed in December 2025. Roundcube has urged its users to upgrade to versions that include the necessary fixes to mitigate these security risks.

The continuous exposure to these vulnerabilities and the constant focus of hackers, including those linked to governments, create an alarming landscape for Roundcube users. With the increase in cyberattacks, institutions must take proactive measures to secure their email platforms.

Hackers have endangered the United Kingdom after attacking a strategic point: water

Since January 2024, five cyberattacks targeting drinking water facilities in the United Kingdom have been recorded, marking a record for any two-year period. This figure, obtained through Freedom of Information requests to the country’s water regulator, the Drinking Water Inspectorate, suggests that the actual number of attack attempts is likely higher, given that the regulator is only required to report those incidents that cause service disruptions. Although these attacks did not directly affect the supply of safe water, they have managed to disrupt critical organizations, highlighting […]

Since January 2024, five cyberattacks targeting drinking water facilities in the United Kingdom have been recorded, marking a record for any two-year period.

This figure, obtained through Freedom of Information requests to the country’s water regulator, the Drinking Water Inspectorate, suggests that the actual number of attack attempts is likely higher, as the regulator is only required to report those incidents that cause service interruptions.

Despite the fact that these attacks did not directly affect the supply of safe water, they have managed to disrupt critical organizations, highlighting the real threat that malicious hackers pose to society.

Fortunately, it does not affect water safety

A particular ransomware attack that gained notoriety demanded over £3 million from Southern Water in exchange for leaked data, highlighting the risk of attacks driven by financial motivations.

The Canadian Cybersecurity Centre has warned about the activity of hacktivists who have altered systems in water, energy, and agriculture facilities. The alteration of these systems could have deadly consequences, and a simultaneous attack on several of them could paralyze daily life in the country.

“No attack aimed at critical infrastructure should be underestimated. These incidents seek to generate media attention, disrupt public services, and potentially endanger human lives,” said Jason Shea, senior network security advisor at Optiv.

This growing concern for cybersecurity poses a challenge in the face of geopolitical instability, which exposes vulnerabilities in critical infrastructure and opens the door to minor attacks that test the country’s preparedness for a larger crisis.

The police have dismantled a group of cybercriminals who have stolen nearly 6 million dollars

Law enforcement forces from several European countries have dismantled an extensive cybercrime operation called SIMCARTEL, which facilitated phishing attacks and other criminal activities through mobile networks. The action, carried out by Europol and the authorities of Austria, Estonia, and Latvia, led to the identification of more than 3,200 cases of fraud, as well as financial losses of approximately 5.3 million dollars in Austria and 490,000 dollars in Latvia. Millions in losses The operation, which took place mainly on October 10 in Latvia, resulted in the arrest of seven individuals and the […]

The law enforcement forces of several European countries have dismantled a large-scale cybercrime operation called SIMCARTEL, which facilitated phishing attacks and other criminal activities through mobile networks. The action, carried out by Europol and the authorities of Austria, Estonia, and Latvia, led to the identification of more than 3,200 cases of fraud, as well as financial losses of approximately 5.3 million dollars in Austria and 490,000 dollars in Latvia.

Millions in losses

The operation, which took place mainly on October 10 in Latvia, resulted in the arrest of seven individuals and the confiscation of 1,200 SIM box devices equipped with 40,000 active SIM cards. These cards were used to carry out a variety of cyber crimes, including credential and financial data theft, investment scams, and false emergencies in order to obtain illicit profits.

Europol described the infrastructure used by these criminals as highly sophisticated, allowing the perpetrators to create fake accounts on social media and communication platforms, which enabled them to hide their true identity and location while committing their crimes. Furthermore, more than 49 million accounts created through this criminal network have been tracked.

The operation also involved multiple raids that resulted in the seizure of hundreds of thousands of additional SIM cards, five servers, and two websites used by the criminal organization. Investigators also confiscated four luxury vehicles and froze over $833,000 in bank and cryptocurrency accounts of the suspects.

The warnings about the growth of these operations are evident, as experts from Unit 221B have identified at least 200 SIM boxes operating in different locations across the United States. This phenomenon poses significant risks to phone users, banks, network operators, and retailers, as SIM farms allow cybercriminals to carry out and sell illicit services through mobile network infrastructure.