Government Intelligence
Cyber operations targeting government agencies, defense organizations, and public sector infrastructure.
CISA KEV: TrueConf Client — TrueConf Client Download of Code Without Integrity Check Vulnerability
TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.
CISA KEV: Google Dawn — Google Dawn Use-After-Free Vulnerability
Google Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Critical Zero-Day in Palo Alto PAN-OS Firewalls Under Active Mass Exploitation
A critical unauthenticated RCE in PAN-OS GlobalProtect is being mass exploited. Over 25,000 devices vulnerable. CISA issues emergency directive.
UNC3886 Deploys Firmware Rootkit on Juniper MX Routers via Zero-Day
UNC3886 exploits Juniper Junos zero-day to deploy firmware-level rootkits on MX-series routers. Implant survives software upgrades and factory resets.
Salt Typhoon Compromises Three Additional US Telecom Providers
CISA and FBI confirm Salt Typhoon has compromised three additional US telecom providers, totaling twelve. Lawful intercept systems accessed.
CISA KEV: Citrix NetScaler — Citrix NetScaler Out-of-Bounds Read Vulnerability
Citrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread.
Cl0p Claims 200 New Victims from Cleo Campaign — Threatens Mass Data Release
Cl0p adds 200 organizations to its leak site from the Cleo file transfer campaign. Threatens mass data release starting April 1 if ransoms unpaid.
Critical RCE Chain in Microsoft Azure Kubernetes Service Exposes Cloud Workloads
Three chained vulnerabilities in Azure AKS allow container escape and host node RCE. 40% of AKS clusters were vulnerable before patching.
Volt Typhoon Compromises US Natural Gas Pipeline Operator OT Networks
Volt Typhoon confirmed inside OT networks of a major US natural gas pipeline operator. Access to safety instrumented systems raises explosion risk concerns.
CISA KEV: F5 BIG-IP — F5 BIG-IP Unspecified Vulnerability
F5 BIG-IP APM contains an unspecified vulnerability that could allow a threat actor to achieve remote code execution.
APT29 OAuth Consent Phishing Campaign Targets 14 NATO Governments
APT29 compromises 500+ government accounts across NATO via malicious Azure app registrations requesting mail and file access.
CISA KEV: Aquasecurity Trivy — Aquasecurity Trivy Embedded Malicious Code Vulnerability
Aquasecurity Trivy contains an embedded malicious code vulnerability that could allow an attacker to gain access to everything in the CI/CD environment, including all tokens, SSH keys, cloud credentials, database passwords, and any sensitive configuration in memory.
Sandworm Targets European Energy Companies with Industroyer3 Variant
Sandworm deploys Industroyer3 variant against energy companies in Poland and Baltic states. ICS-specific payload targets Siemens SIPROTEC relays.
CISA KEV: Langflow Langflow — Langflow Code Injection Vulnerability
Langflow contains a code injection vulnerability that could allow building public flows without requiring authentication.
Volt Typhoon in US Water Systems Triggers EPA Emergency Order
EPA emergency order after confirming Volt Typhoon access to water treatment SCADA systems serving 20M+ Americans. Chemical dosing manipulation capability confirmed.
Chrome Zero-Day Exploited by Spyware Vendor Against Journalists
Google patches V8 zero-day exploited by commercial spyware vendor. One-click full chain achieves RCE targeting journalists and activists.
APT29 Targets European Cloud Service Providers in Operation CloudJack
APT29 compromises two European cloud hosting providers to access customer environments. Hundreds of EU government and enterprise tenants at risk.
Cl0p Mass Exploits Cleo File Transfer Zero-Day — 600+ Organizations Hit
Cl0p launches fourth major file transfer campaign exploiting Cleo Harmony, VLTrader, and LexiCom zero-day. Systematic data exfiltration ongoing.
Critical Fortinet FortiManager Flaw Enables Managed Firewall Takeover
CVE-2026-48788 allows registration of rogue FortiGate devices to FortiManager, enabling config push to entire managed firewall estate.
LockBit Affiliate Arrested — Europol Seizes $14M in Cryptocurrency
Europol arrests LockBit affiliate in Ukraine and seizes $14M in cryptocurrency. Suspect linked to attacks on 150+ organizations.
NIST NVD Backlog Exceeds 30,000 Unanalyzed CVEs
NVD backlog doubles year-over-year, creating blind spots in vuln management. Industry coalition demands congressional emergency funding.
CISA KEV: Apple Multiple Products — Apple Multiple Products Classic Buffer Overflow Vulnerability
Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain a classic buffer overflow vulnerability which could allow a malicious application to cause unexpected system termination or write kernel memory.
CISA KEV: Craft CMS Craft CMS — Craft CMS Code Injection Vulnerability
Craft CMS contains a code injection vulnerability that allows a remote attacker to execute arbitrary code.
CISA KEV: Apple Multiple Products — Apple Multiple Products Buffer Overflow Vulnerability
Apple Safari, iOS, watchOS, visionOS, iPadOS, macOS, and tvOS contain a buffer overflow vulnerability that could allow the processing of maliciously crafted web content which may lead to memory corruption.
CISA KEV: Apple Multiple Products — Apple Multiple Products Improper Locking Vulnerability
Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability that could allow a malicious application to cause unexpected changes in memory shared between processes.
CISA KEV: Laravel Livewire — Laravel Livewire Code Injection Vulnerability
Laravel Livewire contain a code injection vulnerability that could allow unauthenticated attackers to achieve remote command execution in specific scenarios.
ENISA Publishes 2026 Threat Landscape Report — Ransomware and AI Threats Dominate
ENISA annual report identifies ransomware, AI-enabled threats, and supply chain attacks as the top three cyber threats facing Europe in 2026.
CISA Releases Updated Zero Trust Maturity Model v3.0
CISA publishes Zero Trust Maturity Model v3.0 with updated guidance for identity, devices, networks, applications, and data pillars.
Critical VMware ESXi Vulnerability Allows Guest-to-Host Escape
A critical use-after-free vulnerability in VMware ESXi allows virtual machine escape. Active exploitation by ransomware groups confirmed.
Sandworm Deploys New Wiper Malware Against Ukrainian Energy Grid
Russian GRU Sandworm group deploys new wiper variant AcidBurn targeting Ukrainian power distribution systems during winter heating season.
Ivanti Connect Secure New Zero-Day Under Active Exploitation
Another zero-day in Ivanti Connect Secure VPN appliances. Stack buffer overflow enables unauthenticated RCE. Third major Ivanti VPN zero-day in two years.
UNC3886 Linked to VMware vCenter Exploitation Campaign Targeting Defense Sector
UNC3886 exploits known VMware vCenter vulnerabilities to deploy VirtualPita and VirtualPie backdoors across defense contractor virtualization infrastructure.
APT28 Compromises European Defense Contractor via Outlook Zero-Day
APT28 exploits Outlook NTLM relay zero-day to compromise a major European defense contractor. Classified project data at risk.
OpenAI Discloses State-Sponsored Misuse of ChatGPT for Cyber Operations
OpenAI reports disrupting five state-sponsored groups using ChatGPT for reconnaissance, phishing content generation, and malware debugging.
Microsoft Patches 97 Vulnerabilities Including Three Actively Exploited Zero-Days
March 2026 Patch Tuesday addresses 97 CVEs with three actively exploited zero-days in Windows kernel, NTLM, and Hyper-V.
Flax Typhoon IoT Botnet Resurfaces with 300,000 Compromised Devices
Despite FBI disruption in 2024, Flax Typhoon has rebuilt its IoT botnet to over 300,000 compromised routers, cameras, and NAS devices worldwide.
Critical Cisco NX-OS Command Injection Affects Data Center Switches
Command injection in Cisco NX-OS CLI allows authenticated users to escalate to root on Nexus data center switches. PoC exploit published.
APT28 Exploits Cisco Router Vulnerabilities for Long-Term Espionage
UK NCSC warns APT28 exploiting Cisco router vulnerabilities to establish persistent espionage infrastructure across European government networks.
Medusa Ransomware Campaign Targets 40+ US School Districts
Medusa ransomware group attacks over 40 US school districts via compromised RDP. Student and staff PII at risk. FBI issues sector-wide alert.
Sandworm Uses Compromised Ubiquiti Routers as C2 Infrastructure
FBI warns Sandworm is using a botnet of compromised Ubiquiti EdgeRouters as proxy C2 infrastructure for espionage operations against NATO targets.
ALPHV Successor RansomHub Becomes Top Ransomware Threat in Q1 2026
RansomHub, believed to include former ALPHV/BlackCat operators, claims 185+ victims in Q1 2026 alone. Now the most prolific ransomware operation.
Critical SonicWall SMA Gateway Auth Bypass Under Active Exploitation
Authentication bypass in SonicWall SMA 1000 series gateways allows unauthenticated admin access. Active exploitation confirmed by CISA.
European Banking Authority Reports 340% Increase in DDoS Attacks on Banks
EBA reports unprecedented surge in DDoS attacks against European financial institutions. Pro-Russian hacktivist groups responsible for majority of attacks.
Jenkins Security Advisory Patches Critical RCE in Pipeline Plugin
Critical deserialization vulnerability in Jenkins Pipeline plugin allows unauthenticated RCE. 150,000+ Jenkins instances exposed.
CISA Adds 12 Vulnerabilities to Known Exploited Vulnerabilities Catalog in One Week
CISA adds 12 vulnerabilities to KEV catalog in a single week — the highest since the catalog launch. Reflects accelerating exploitation pace.
Australia Cyber Security Centre Warns of Attacks on Critical Infrastructure OT Networks
ACSC issues urgent advisory on increased targeting of Australian critical infrastructure OT networks by state-sponsored actors.
Google Project Zero Discloses Linux Kernel Zero-Day in eBPF Subsystem
Google Project Zero discloses a critical privilege escalation in the Linux kernel eBPF verifier. Affects cloud workloads, containers, and Android.
Interpol Operation Synergia II Dismantles 22,000 Malicious Servers Globally
Interpol-led operation takes down 22,000 malicious servers across 100+ countries. 41 arrests made. Focus on phishing, ransomware, and infostealer infrastructure.
Iranian APT Targets US Defense Industrial Base with New MalwareLoader
Iranian threat actor Peach Sandstorm deploys novel loader in campaign against US defense industrial base. Targets include drone and satellite manufacturers.
Major US Airport Systems Hit by Coordinated Ransomware Attack
Coordinated ransomware attack disrupts systems at four major US airports. Flight information, baggage handling, and check-in systems affected.
Apple Patches Actively Exploited WebKit Zero-Day in iOS and macOS
Apple releases emergency updates for iOS 18.4 and macOS 15.4 to fix WebKit zero-day used in targeted attacks. Sophisticated exploit chain confirmed.