RSS feed source: International Atomic Energy Association--Nuclear & Radiological Events

several missile attacks by Zionist regime of israel

Print View Posted on: 13 June 2025

Event Date: 13 June 2025 Event Type: Other Event Location: Iran, Islamic Republic of, NATANZ Nuclear facilities INES Rating: Not provided

Despite the prohibition of attacks on nuclear facilities and the fact that such actions contravene all international norms and principles of international law, the Natanz nuclear facilities – which have been under continuous IAEA inspection and verification measures – was subjected to aerial and missile attacks by the Zionist regime from approximately 3:00 AM to 8:00 AM Iran Standard Time (IRST) on 13 June 2025. No increase in off-site radiation levels has been reported as of this time. Further investigation are still ongoing continuously.

INES Rating: Not provided

Impact on people and the environment Release beyond authorized limits? No Overexposure of a member of the public? No Overexposure of a worker? No Impact

Click this link to continue reading the article on the source website.

RSS feed source: International Atomic Energy Association--Nuclear & Radiological Events

Summary

The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this advisory in response to ransomware actors leveraging unpatched instances of a vulnerability in SimpleHelp Remote Monitoring and Management (RMM) to compromise customers of a utility billing software provider. This incident reflects a broader pattern of ransomware actors targeting organizations through unpatched versions of SimpleHelp RMM since January 2025.

SimpleHelp versions 5.5.7 and earlier contain several vulnerabilities, including CVE-2024-57727—a path traversal vulnerability.1 Ransomware actors likely leveraged CVE-2024-57727 to access downstream customers’ unpatched SimpleHelp RMM for disruption of services in double extortion compromises.1 

CISA added CVE-2024-57727 to its Known Exploited Vulnerabilities (KEV) Catalog on Feb. 13, 2025.

CISA urges software vendors, downstream customers, and end users to immediately implement the Mitigations listed in this advisory based on confirmed compromise or risk of compromise.

Download the PDF version of this report:

AA25-163A Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider (PDF, 420.49 KB ) Mitigations

CISA recommends organizations implement the mitigations below to respond to emerging ransomware activity exploiting SimpleHelp software. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and

Click this link to continue reading the article on the source website.

RSS feed source: International Atomic Energy Association--Nuclear & Radiological Events

The National Institute of Standards and Technology (NIST), through its Communications Technology Laboratory (CTL), plays a key role in ensuring today’s technology operates safely and effectively. Accurate and reliable radio frequency (RF)

Click this link to continue reading the article on the source website.

RSS feed source: International Atomic Energy Association--Nuclear & Radiological Events

REGISTER NOW 5×5 ― the confirmation of a strong and clear signal ― and the place to make your voice heard and drive public safety communications forward. In 2025, the FirstNet Authority and the National Institute of Standards and Technology’s Public

Click this link to continue reading the article on the source website.