Berlin-based GeneralMind, founded by the team behind German unicorn Razor Group, has secured $12 million in pre-seed funding to develop its AI-driven "System of Action" for automating enterprise workflows. The platform acts as an autopilot for repetitive white-collar tasks across ERPs and email.
A newly disclosed vulnerability in Schneider Electric's Foxboro DCS, a widely used industrial control system, could allow attackers to disrupt critical infrastructure operations. The flaw, originally from Intel, affects energy and manufacturing sectors worldwide, including Australia.
Coimbatore-based Aivar has secured $4.6 million in seed funding to scale its AI-first services platform, which helps enterprises move from AI pilots to production-ready solutions. The investment will fuel expansion into the US and Middle East, targeting the gap between AI potential and execution.
21st January 2026 Cyber Update: Schneider Electric ICS Flaw Exposes Critical Infrastructure
A newly disclosed vulnerability in Schneider Electric's Foxboro DCS, a widely used industrial control system, could allow attackers to disrupt critical infrastructure operations. The flaw, originally from Intel, affects energy and manufacturing sectors worldwide, including Australia.
Cyber News Centre's cyber update for 21st January 2026: Schneider Electric has confirmed a significant vulnerability in its EcoStruxure Foxboro Distributed Control System (DCS), a platform used to manage industrial processes in critical infrastructure sectors across Australia and worldwide.
Schneider Electric is a global leader in energy management and automation, providing solutions for a wide range of industries, including energy, manufacturing, and infrastructure. The French multinational's technology is deeply embedded in Australia's critical infrastructure, managing everything from power grids to manufacturing plants.
The Update and Why It Matters
Update: The US Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory for a medium-severity vulnerability (CVSS 6.5) in Schneider Electric's EcoStruxure Foxboro DCS. The flaw, identified as CVE-2018-12130, originates from an Intel processor vulnerability known as Microarchitectural Fill Buffer Data Sampling (MFBDS). It allows an authenticated user with local access to perform a side-channel attack, potentially leading to information disclosure, loss of system functionality, or unauthorised access.
The vulnerability affects Foxboro DCS Virtualisation Servers and Standard Workstations running on specific Intel Xeon processors. Schneider Electric has released an official security notification (SEVD-2025-343-01) and is urging affected customers to apply mitigations. The advisory highlights the risk to commercial facilities, critical manufacturing, and the energy sector. This disclosure comes amid a documented surge in cyberattacks targeting industrial control systems (ICS) and operational technology (OT) globally, with hacktivist groups increasingly focused on disrupting critical infrastructure.
The vulnerability's republication by CISA on January 20, 2026, underscores its current relevance and the ongoing risk to industrial operators who have not yet applied the necessary patches or workarounds.
Why it Matters: This vulnerability is significant for Australia because the Foxboro DCS is a foundational component in the nation's energy and manufacturing sectors. A successful exploit could move beyond simple data theft, leading to the disruption of essential services like power generation or manufacturing processes.
The requirement of local access mitigates the risk of remote, internet-based attacks, but it does not eliminate the threat from insiders or attackers who have already gained a foothold in the operational network. As industrial systems become more interconnected, the line between digital and physical risk blurs. This incident serves as a critical reminder that vulnerabilities in the industrial supply chain, even those originating from a processor-level flaw, have direct implications for national security and the stability of critical infrastructure.
Get the stories that matter to you. Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.
Sign up for Cyber News Centre
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead.
Microsoft has issued an emergency patch for a critical zero-day vulnerability (CVE-2026-20805) in its Windows operating system that is being actively exploited by attackers. The flaw affects all supported versions of Windows.
Japanese automaker Nissan is the latest victim of the Everest ransomware group, which claims to have stolen 900GB of sensitive data. The breach, announced January 10, threatens internal records, dealer info, and possibly customer data —raising serious concerns for its Australian operations.
The Victorian Department of Education has confirmed a major data breach affecting all 1700+ government schools. Hackers accessed the names, emails, and encrypted passwords of current and former students, impacting potentially hundreds of thousands of individuals just weeks before the new school year
Australian car rental insurer Prosura has suffered a major data breach, exposing the personal and policy information of an estimated 300,000 customers. Attackers are now selling the stolen data identity data on a public forum after the company reportedly failed to meet their demands.
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead. Sign up for free!