RSS feed source: Volcano Discovery.com--Global earthquake monitor

Date and TimeMag
DepthDistanceLocationDetailsMap May 31, 07:00 am (GMT +8)

4.3

10 km39 km (24 mi) to the SW Philippine Sea, 31 km northeast of Jomalig Island, Philippines 1 reportInfoMay 27, 12:03 am (GMT +8)

4.9

50 km96 km (60 mi) to the N Philippine Islands Region 2 reportsInfoApr 3, 08:28 am (Manila)

4.4

10 km92 km (57 mi) to the S 18 km northwest of Daet, Province of Camarines Norte, Bicol, Philippines 8 reportsInfoFeb 17, 06:28 pm (GMT +8)

4.6

10 km27 km (17 mi) to the NW Philippine Sea, 79 km northeast of Jomalig Island, Philippines InfoNov 9, 2024 03:55 pm (GMT +8)

4.0

10 km36 km (22 mi) to the SW Philippine Sea, 34 km northeast of Jomalig Island, Philippines InfoNov 6, 2024 06:36 pm (Manila)

5.2

10 km62 km (38 mi) to the SW Philippine Sea, 21 km southeast of Jomalig Island, Philippines 1 reportInfoSep 4, 2024 07:16 am (GMT +8)

5.3

17 km40 km (25 mi) to the SW 28 km NE of Casuguran, Philippines 44 reportsInfoJan 17, 2023 05:57 am (Manila)

5.1

10 km71 km (44 mi) to the S Philippine Sea, 34 km north of Daet, Philippines 19 reportsInfoDec 7, 2022 01:05 pm (Manila)

5.2

10 km63 km (39 mi) to the S 34 km NNE of Sabang Indan, Philippines 114 reportsInfoNov 7, 2019 04:52 am (GMT +8)

5.4

10 km41 km (26 mi) to the SW Philippine Sea, 43 km east of Patnanungan, Quezon, Calabarzon, Philippines 86 reportsInfoSep 13, 2019 04:28 pm (Manila)

5.2

37 km67 km (42 mi) to the W Philippine Sea, 22 km northeast of Patnanungan, Quezon, Calabarzon, Philippines 753 reportsInfoSep 3, 2014 09:43 pm (Manila)

5.1

16 km40 km (25 mi)

Click this link to continue reading the article on the source website.

RSS feed source: Volcano Discovery.com--Global earthquake monitor

Summary

The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this advisory in response to ransomware actors leveraging unpatched instances of a vulnerability in SimpleHelp Remote Monitoring and Management (RMM) to compromise customers of a utility billing software provider. This incident reflects a broader pattern of ransomware actors targeting organizations through unpatched versions of SimpleHelp RMM since January 2025.

SimpleHelp versions 5.5.7 and earlier contain several vulnerabilities, including CVE-2024-57727—a path traversal vulnerability.1 Ransomware actors likely leveraged CVE-2024-57727 to access downstream customers’ unpatched SimpleHelp RMM for disruption of services in double extortion compromises.1 

CISA added CVE-2024-57727 to its Known Exploited Vulnerabilities (KEV) Catalog on Feb. 13, 2025.

CISA urges software vendors, downstream customers, and end users to immediately implement the Mitigations listed in this advisory based on confirmed compromise or risk of compromise.

Download the PDF version of this report:

AA25-163A Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider (PDF, 420.49 KB ) Mitigations

CISA recommends organizations implement the mitigations below to respond to emerging ransomware activity exploiting SimpleHelp software. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and

Click this link to continue reading the article on the source website.