News
CVE-2026-25599 – Missing authentication and clear‑text data transmission of Orca heat pumps
Summary Missing authentication and clear‑text transmission of data from the heat pumps to the control server, combined with the absence of input validation on aggregated data, can lead to stored …
More
CVE-2025-42611 – Authentication bypass in multiple RouterOS services caused by improper certificate validation
Summary RouterOS provides various services that rely on correct verification of client and server certificates to secure confidentiality and integrity of communications. This includes OpenVPN, CAPsMAN, Dot1x (802.1X), among others. …
More
VANTAGE – Vulnerability Assessment aNd Testing Automation for Global Enhancement
Project coordinator Diadikasia Business Consulting Symvouloi Epicheiriseon AE Diadikasia Business Consultants SA, GR Project partners Project duration 1 January 2026 – 31 December 2028 (36 months) Summary VANTAGE (Vulnerability Assessment …
More
INTERCEPT – IncideNt ThrEat shaRing CybErsecurity PlaTform
Project coordinator: T-2, Družba za ustvarjanje razvoj in trženje elektronskih komunikacij in opreme d. o. o., Slovenia Contact details: intercept@t-2.com Project partners: T-2 d. o. o., Družba za ustvarjanje …
More
CyberSEAS: Cyber Securing Energy dAta Services
The CyberSEAS project is a collaborative project improving the cyber security of the European electrical power energy systems (EPES) and the overall resilience of energy supply chains, protecting them from …
More
2017-SI-IA-0124 – Strengthening operational aspects of cyber-security capacities in Slovenia
The Action increased the preparedness of SI-CERT by ensuring compliance with the requirements and tasks arising from the NIS Directive.
More
ALiEnS-SOC – Artificial Intelligence for Slovenian Electro-Energy Sector Security Operation Centre
Project coordinator: ELES d. o. o., Operater kombiniranega prenosnega in distribucijskega elektroenergetskega omrežja, Slovenia Project partners: Elektro Celje, Podjetje za distribucijo električne energije d. d., Slovenija Elektro Gorenjska, Podjetje …
More
Advanced Ransomware Attacks
In most cases, the vector of infection is either a malicious email that contains a malicious attachment or link, or an attack via an inadequately secured Remote Desktop Protocol. Nonetheless, cybercriminals can also exploit new vulnerabilities to gain unauthorised access to target networks.
More