SIGNALS WEEKLY: When Management Planes Become the Battlefield
š« Your āmanagement planeā is now the battlefield. Cisco Secure Email + HPE OneView are seeing active exploitation, and UAT-8837 is chasing CI targets. Patch like itās a fire drill. š„š§Æ
TL;DR
-
[Vulnerabilities] Active exploitation is focusing on internet-exposed enterprise management surfaces (Cisco Secure Email appliances; HPE OneView), increasing risk of follow-on persistence and credential access after initial compromise.
-
[Intrusion Sets] China-nexus UAT-8837 is targeting North American critical infrastructure, leveraging Sitecore CVE-2025-53690 and common post-compromise tooling to expand footholds.
-
[Disruption/Ransomware] Pro-Russia hacktivists continue DDoS against UK entities while law enforcement escalates pressure on ransomware leadership (Black Basta), reinforcing the need for availability resilience and faster identity hardening (Net-NTLMv1 deprecation).
AlphaHunt
Stop doomscrolling, start decisioning. We chewed through the muck so your team doesnāt have to. ā Subscribe!
Like this? Forward this to a friend!
(Have feedback? Did something resonate with you? Did something annoy you? Just hit reply! :))
Current Stories
TL;DR
-
[Vulnerabilities] Exploitation is concentrating on internet-exposed āmanagement planeā targets: Cisco confirms in-the-wild exploitation of Secure Email appliances (incl. root-level command execution and persistence) and Check Point reports mass exploitation of HPE OneView RCE attributed to the RondoDox botnet.
-
[Intrusion Sets] Cisco Talos reports China-nexus UAT-8837 targeting North American critical infrastructure, including exploitation of Sitecore CVE-2025-53690 and follow-on use of common post-compromise tooling to expand access.
-
[Geopolitics/Disruption] UK NCSC warns Russia-aligned hacktivists (notably NoName057(16)) continue denial-of-service activity against UK organizationsāpushing āavailability resilienceā (providers/CDN/ISP coordination, scaling, monitoring) back to the top of the list.
-
[Ransomware] Germanyās BKA published a public appeal for information on Oleg Evgenievich NEFEDOV, alleging he founded/led the Black Basta operationāan indicator of sustained law-enforcement focus on ransomware leadership and monetization infrastructure.
-
[OT/ICS] CISA and partners released āSecure Connectivity Principles for OT,ā reinforcing a cross-government push to reduce insecure/exposed OT connectivity (including third-party access paths) that commonly enables both opportunistic and state-backed intrusion.
AlphaHunt Converge - Plug in your Flight Crew
Get intelligence where it counts. No dashboards. No detours. AlphaHunt Converge teases out your intent, reviews the results and delivers actionable intel right inside Slack. We turn noise into signal and analysts into force multipliers.
Anticipate, Donāt Chase.
References
-
(2026-01-15) Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager
-
(2026-01-15) Patch Now: Active Exploitation Underway for Critical HPE OneView Vulnerability
-
(2026-01-15) UAT-8837 targets critical infrastructure sectors in North America
-
(2026-01-19) Pro-Russia hacktivist activity continues to target UK organisations
-
(2026-01-15) NEFEDOV, Oleg Evgenievich
-
(2026-01-14) Secure Connectivity Principles for Operational Technology (OT)
