Geopolitical Volatility and the Iranian Cyber Threat: What Defenders Need to Know Now

The intersection of kinetic warfare and keyboard-driven operations has never been more visible. Following the joint U.S. and Israeli military strikes against Iranian nuclear and military assets on February 28, 2026, the Canadian Centre for Cyber Security (CCCS) has issued a critical threat bulletin. At Critical Path Security, we've always maintained that layered defence isn't a buzzword-it's a survival requirement. As geopolitical tensions boil over into the digital domain, Iranian state-sponsored actors are pivoting from standard espionage to disruptive and destructive operations. Here is what the current threat landscape looks like and, more importantly, what your team should be doing about it. The Threat Profile: Beyond Simple Phishing The CCCS identifies four primary ways Iran is likely to respond. While information operations and harassment are common, the real risk to our clients lies in the targeting of critical infrastructure and poorly secured IoT/ICS devices. Iranian actors (including IRGC-affiliated groups) typically…

0 Comments

UNC6201 Exploits Dell RecoverPoint Zero-Day: What Security Teams Need to Know

What Security Teams Need to Know In a significant and ongoing cyber-espionage campaign, a sophisticated threat actor has been exploiting a critical zero-day vulnerability in Dell RecoverPoint for Virtual Machines since at least mid-2024. The vulnerability - tracked as CVE-2026-22769 and carrying a CVSSv3.1 score of 10.0 (Critical) - has enabled remote unauthenticated access, root-level persistence, lateral movement, and deployment of custom malware across compromised enterprise environments. This post breaks down the technical details, adversary activity, enterprise impact, and immediate defensive actions organizations should take. What Is CVE-2026-22769? CVE-2026-22769 is a critical vulnerability in Dell RecoverPoint for Virtual Machines (RP4VM) versions prior to 6.0.3.1 HF1. The root cause is the presence of hard-coded credentials within the appliance's Apache Tomcat Manager configuration. An attacker with knowledge of these credentials can authenticate remotely without valid user input, effectively bypassing standard authentication controls. Successful exploitation enables: Unauthenticated remote access Root-level command execution Installation…

0 Comments

When Security Incidents Become Customer Incidents

Lessons from the BridgePay Payment Infrastructure Disruption Cybersecurity incidents rarely remain confined to technical environments. What begins as an infrastructure issue quickly surfaces in daily operations - transactions failing, services becoming unavailable, workflows interrupted, and customers seeking answers. In those moments, the event is no longer viewed through a security lens. It's experienced as disruption. Availability, reliability, and responsiveness are tested in real time, and the impact becomes visible well beyond the systems where it originated. A recent ransomware attack affecting U.S. payment gateway provider BridgePay illustrates how quickly this transition occurs, and why organizations should view cybersecurity through both technical and business lenses. What Happened In early February 2026, BridgePay confirmed a ransomware incident that caused a system-wide outage across core payment-processing infrastructure. The disruption escalated rapidly after degraded performance was detected in virtual terminal and API systems early in the morning, eventually resulting in full service interruption. The…

0 Comments

From Leaderboards to Lateral Movement: The Risk of Workplace Gaming

Introduction The line between work and personal life no longer fades at five o'clock, it simply shifts. Company laptops travel into kitchens, airports, hotel rooms, and living rooms and along the way, a simple question arises… What happens when work devices become entertainment devices? On the surface, allowing employees to play games on company-issued hardware may seem harmless. A quick round between meetings. A stress-reliever after hours. A morale booster. But beneath the pixels and soundtracks lies something far less playful, a dramatically expanded attack surface. Games are not just software. They are update engines, ad networks, embedded browsers, chat platforms, and third-party plugin ecosystems, many of them developed outside the enterprise security model. When installed on a corporate device, they become a direct bridge between untrusted internet code and sensitive business systems. This is where leadership must choose… Do we allow gaming, and secure it properly… or do we…

0 Comments