Government Intelligence

Cyber operations targeting government agencies, defense organizations, and public sector infrastructure.

86
Total Reports
14
Critical Threats
63
High Threats
HIGHVulnerability

CISA KEV: Microsoft Microsoft — Microsoft Exchange Server Cross-Site Scripting Vulnerability

Microsoft Exchange Server contains a cross-site scripting vulnerability during web page generation in Outlook Web Access and when certain interaction conditions are met, arbitrary JavaScript can be executed in the browser context.

CVE-2026-42897Microsoft Microsoft
CISA KEV
HIGHVulnerability

CISA KEV: Cisco Catalyst SD-WAN — Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability

Cisco Catalyst SD-WAN Controller & Manager contain an authentication bypass vulnerability that allows an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system.

CVE-2026-20182Cisco Catalyst SD-WAN
CISA KEV
HIGHVulnerability

CISA KEV: BerriAI LiteLLM — BerriAI LiteLLM SQL Injection Vulnerability

BerriAI LiteLLM contains a SQL injection vulnerability that allows an attacker to read data from the proxy's database and potentially modify it, leading to unauthorised access to the proxy and the credentials it manages.

CVE-2026-42208BerriAI LiteLLM
CISA KEV
HIGHVulnerability

CISA KEV: Ivanti Endpoint Manager Mobile (EPMM) — Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability

Ivanti Endpoint Manager Mobile (EPMM) contains an improper input validation vulnerability that allows a remotely authenticated user with administrative access to achieve remote code execution.

CVE-2026-6973Ivanti Endpoint Manager Mobile (EPMM)
CISA KEV
HIGHVulnerability

CISA KEV: Palo Alto Networks PAN-OS — Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability

Palo Alto Networks PAN-OS contains an out-of-bounds write vulnerability in the User-ID Authentication Portal (aka Captive Portal) service that can allow an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets.

CVE-2026-0300Palo Alto Networks PAN-OS
CISA KEV
HIGHVulnerability

CISA KEV: Linux Kernel — Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability

Linux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation.

CVE-2026-31431Linux Kernel
CISA KEV
HIGHVulnerability

CISA KEV: WebPros cPanel & WHM and WP2 (WordPress Squared) — WebPros cPanel & WHM and WP2 (WordPress Squared) Missing Authentication for Critical Function Vulnerability

WebPros cPanel & WHM (WebHost Manager) and WP2 (WordPress Squared) contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

CVE-2026-41940WebPros cPanel & WHM and WP2 (WordPress Squared)
CISA KEV
HIGHVulnerability

CISA KEV: ConnectWise ScreenConnect — ConnectWise ScreenConnect Path Traversal Vulnerability

ConnectWise ScreenConnect contains a path traversal vulnerability which could allow an attacker to execute remote code or directly impact confidential data and critical systems.

CVE-2024-1708ConnectWise ScreenConnect
CISA KEV
HIGHVulnerability

CISA KEV: Microsoft Windows — Microsoft Windows Protection Mechanism Failure Vulnerability

Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network.

CVE-2026-32202Microsoft Windows
CISA KEV
HIGHVulnerability

CISA KEV: SimpleHelp SimpleHelp — SimpleHelp Path Traversal Vulnerability

SimpleHelp contains a path traversal vulnerability that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user.

CVE-2024-57728SimpleHelp SimpleHelp
CISA KEV
HIGHVulnerability

CISA KEV: SimpleHelp SimpleHelp — SimpleHelp Missing Authorization Vulnerability

SimpleHelp contains a missing authorization vulnerability that could allow low-privileged technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.

CVE-2024-57726SimpleHelp SimpleHelp
CISA KEV
HIGHVulnerability

CISA KEV: Samsung MagicINFO 9 Server — Samsung MagicINFO 9 Server Path Traversal Vulnerability

Samsung MagicINFO 9 Server contains a path traversal vulnerability that could allow an attacker to write arbitrary files as system authority.

CVE-2024-7399Samsung MagicINFO 9 Server
CISA KEV
HIGHVulnerability

CISA KEV: D-Link DIR-823X — D-Link DIR-823X Command Injection Vulnerability

D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

CVE-2025-29635D-Link DIR-823X
CISA KEV
HIGHVulnerability

CISA KEV: Marimo Marimo — Marimo Remote Code Execution Vulnerability

Marimo contains an pre-authorization remote code execution vulnerability, allowing an unauthenticated attacked to shell access and execute arbitrary system commands.

CVE-2026-39987Marimo Marimo
CISA KEV
HIGHVulnerability

CISA KEV: Microsoft Defender — Microsoft Defender Insufficient Granularity of Access Control Vulnerability

Microsoft Defender contains an insufficient granularity of access control vulnerability that could allow an authorized attacker to escalate privileges locally.

CVE-2026-33825Microsoft Defender
CISA KEV
HIGHVulnerability

CISA KEV: Kentico Kentico Xperience — Kentico Xperience Path Traversal Vulnerability

Kentico Xperience contains a path traversal vulnerability that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations.

CVE-2025-2749Kentico Kentico Xperience
CISA KEV
HIGHVulnerability

CISA KEV: Synacor Zimbra Collaboration Suite (ZCS) — Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability

Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that could allow attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information.

CVE-2025-48700Synacor Zimbra Collaboration Suite (ZCS)
CISA KEV
HIGHVulnerability

CISA KEV: JetBrains TeamCity — JetBrains TeamCity Relative Path Traversal Vulnerability

JetBrains TeamCity contains a relative path traversal vulnerability that could allow limited admin actions to be performed.

CVE-2024-27199JetBrains TeamCity
CISA KEV
HIGHVulnerability

CISA KEV: Cisco Catalyst SD-WAN Manger — Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability

Cisco Catalyst SD-WAN Manager contains an incorrect use of privileged APIs vulnerability due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges.

CVE-2026-20122Cisco Catalyst SD-WAN Manger
CISA KEV
HIGHVulnerability

CISA KEV: PaperCut NG/MF — PaperCut NG/MF Improper Authentication Vulnerability

PaperCut NG/MF contains an improper authentication vulnerability that could allow remote attackers to bypass authentication on affected installations via the SecurityRequestFilter class.

CVE-2023-27351PaperCut NG/MF
CISA KEV
HIGHVulnerability

CISA KEV: Cisco Catalyst SD-WAN Manager — Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability

Cisco Catalyst SD-WAN Manager contains an exposure of sensitive information to an unauthorized actor vulnerability that could allow remote attackers to view sensitive information on affected systems.

CVE-2026-20133Cisco Catalyst SD-WAN Manager
CISA KEV
HIGHVulnerability

CISA KEV: Quest KACE Systems Management Appliance (SMA) — Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability

Quest KACE Systems Management Appliance (SMA) contains an improper authentication vulnerability that could allow attackers to impersonate legitimate users without valid credentials.

CVE-2025-32975Quest KACE Systems Management Appliance (SMA)
CISA KEV
HIGHVulnerability

CISA KEV: Cisco Catalyst SD-WAN Manager — Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability

Cisco Catalyst SD-WAN Manager contains a storing passwords in a recoverable format vulnerability that allows an authenticated, local attacker to gain DCA user privileges by accessing a credential file for the DCA user on the filesystem as a low-privileged user.

CVE-2026-20128Cisco Catalyst SD-WAN Manager
CISA KEV
HIGHVulnerability

CISA KEV: Apache ActiveMQ — Apache ActiveMQ Improper Input Validation Vulnerability

Apache ActiveMQ contains an improper input validation vulnerability that allows for code injection.

CVE-2026-34197Apache ActiveMQ
CISA KEV
HIGHVulnerability

CISA KEV: Microsoft Office — Microsoft Office Remote Code Execution

Microsoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object.

CVE-2009-0238Microsoft Office
CISA KEV
HIGHVulnerability

CISA KEV: Microsoft SharePoint Server — Microsoft SharePoint Server Improper Input Validation Vulnerability

Microsoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network.

CVE-2026-32201Microsoft SharePoint Server
CISA KEV
HIGHVulnerability

CISA KEV: Fortinet FortiClient EMS — Fortinet SQL Injection Vulnerability

Fortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

CVE-2026-21643Fortinet FortiClient EMS
CISA KEV
HIGHVulnerability

CISA KEV: Microsoft Windows — Microsoft Windows Link Following Vulnerability

Microsoft Windows contains a link following vulnerability that allows for privilege escalation

CVE-2025-60710Microsoft Windows
CISA KEV
HIGHVulnerability

CISA KEV: Microsoft Exchange Server — Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability

Microsoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution.

CVE-2023-21529Microsoft Exchange Server
CISA KEV
HIGHVulnerability

CISA KEV: Microsoft Windows — Microsoft Windows Out-of-Bounds Read Vulnerability

Microsoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation

CVE-2023-36424Microsoft Windows
CISA KEV
HIGHVulnerability

CISA KEV: Adobe Acrobat and Reader — Adobe Acrobat and Reader Prototype Pollution Vulnerability

Adobe Acrobat and Reader contain a prototype pollution vulnerability that allows for arbitrary code execution.

CVE-2026-34621Adobe Acrobat and Reader
CISA KEV
HIGHVulnerability

CISA KEV: Adobe Acrobat — Adobe Acrobat Use-After-Free Vulnerability

Adobe Acrobat contains a use-after-free vulnerability that allows for code execution

CVE-2020-9715Adobe Acrobat
CISA KEV
HIGHVulnerability

CISA KEV: Microsoft Visual Basic for Applications (VBA) — Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability

Microsoft Visual Basic for Applications (VBA) contains an insecure library loading vulnerability that could allow for remote code execution.

CVE-2012-1854Microsoft Visual Basic for Applications (VBA)
CISA KEV
HIGHVulnerability

CISA KEV: Ivanti Endpoint Manager Mobile (EPMM) — Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability

Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.

CVE-2026-1340Ivanti Endpoint Manager Mobile (EPMM)
CISA KEV
HIGHVulnerability

CISA KEV: Fortinet FortiClient EMS — Fortinet FortiClient EMS Improper Access Control Vulnerability

Fortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

CVE-2026-35616Fortinet FortiClient EMS
CISA KEV
HIGHVulnerability

CISA KEV: TrueConf Client — TrueConf Client Download of Code Without Integrity Check Vulnerability

TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.

CVE-2026-3502TrueConf Client
CISA KEV
HIGHVulnerability

CISA KEV: Google Dawn — Google Dawn Use-After-Free Vulnerability

Google Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

CVE-2026-5281Google Dawn
CISA KEV
CRITICALZero DayExploited

Critical Zero-Day in Palo Alto PAN-OS Firewalls Under Active Mass Exploitation

A critical unauthenticated RCE in PAN-OS GlobalProtect is being mass exploited. Over 25,000 devices vulnerable. CISA issues emergency directive.

CVE-2026-0015PAN-OS 11.1
Palo Alto Networks PSIRT
CRITICALZero DayExploited

UNC3886 Deploys Firmware Rootkit on Juniper MX Routers via Zero-Day

UNC3886 exploits Juniper Junos zero-day to deploy firmware-level rootkits on MX-series routers. Implant survives software upgrades and factory resets.

CVE-2026-29001Juniper MX Series
Mandiant
CRITICALAptExploited

Salt Typhoon Compromises Three Additional US Telecom Providers

CISA and FBI confirm Salt Typhoon has compromised three additional US telecom providers, totaling twelve. Lawful intercept systems accessed.

Cisco IOS XR
CISA / FBI Joint Advisory
HIGHVulnerability

CISA KEV: Citrix NetScaler — Citrix NetScaler Out-of-Bounds Read Vulnerability

Citrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread.

CVE-2026-3055Citrix NetScaler
CISA KEV
HIGHData Breach

Cl0p Claims 200 New Victims from Cleo Campaign — Threatens Mass Data Release

Cl0p adds 200 organizations to its leak site from the Cleo file transfer campaign. Threatens mass data release starting April 1 if ransoms unpaid.

Cleo Harmony
BleepingComputer / Cl0p Leak Site
CRITICALAi

Critical RCE Chain in Microsoft Azure Kubernetes Service Exposes Cloud Workloads

Three chained vulnerabilities in Azure AKS allow container escape and host node RCE. 40% of AKS clusters were vulnerable before patching.

CVE-2026-21345CVE-2026-21346Azure Kubernetes Service
Microsoft MSRC / Wiz Research
CRITICALAptExploited

Volt Typhoon Compromises US Natural Gas Pipeline Operator OT Networks

Volt Typhoon confirmed inside OT networks of a major US natural gas pipeline operator. Access to safety instrumented systems raises explosion risk concerns.

Pipeline SCADA
CISA / TSA Emergency Directive
HIGHVulnerability

CISA KEV: F5 BIG-IP — F5 BIG-IP Unspecified Vulnerability

F5 BIG-IP APM contains an unspecified vulnerability that could allow a threat actor to achieve remote code execution.

CVE-2025-53521F5 BIG-IP
CISA KEV
HIGHAptExploited

APT29 OAuth Consent Phishing Campaign Targets 14 NATO Governments

APT29 compromises 500+ government accounts across NATO via malicious Azure app registrations requesting mail and file access.

Microsoft 365
Microsoft Threat Intelligence
HIGHVulnerability

CISA KEV: Aquasecurity Trivy — Aquasecurity Trivy Embedded Malicious Code Vulnerability

Aquasecurity Trivy contains an embedded malicious code vulnerability that could allow an attacker to gain access to everything in the CI/CD environment, including all tokens, SSH keys, cloud credentials, database passwords, and any sensitive configuration in memory.

CVE-2026-33634Aquasecurity Trivy
CISA KEV
CRITICALMalwareExploited

Sandworm Targets European Energy Companies with Industroyer3 Variant

Sandworm deploys Industroyer3 variant against energy companies in Poland and Baltic states. ICS-specific payload targets Siemens SIPROTEC relays.

Siemens SIPROTEC
CERT-EU / Mandiant
HIGHVulnerability

CISA KEV: Langflow Langflow — Langflow Code Injection Vulnerability

Langflow contains a code injection vulnerability that could allow building public flows without requiring authentication.

CVE-2026-33017Langflow Langflow
CISA KEV
CRITICALAptExploited

Volt Typhoon in US Water Systems Triggers EPA Emergency Order

EPA emergency order after confirming Volt Typhoon access to water treatment SCADA systems serving 20M+ Americans. Chemical dosing manipulation capability confirmed.

SCADA Systems
EPA / CISA Emergency Advisory
HIGHZero DayExploited

Chrome Zero-Day Exploited by Spyware Vendor Against Journalists

Google patches V8 zero-day exploited by commercial spyware vendor. One-click full chain achieves RCE targeting journalists and activists.

CVE-2026-1893Google Chrome 134
Google Threat Analysis Group
CRITICALAptExploited

APT29 Targets European Cloud Service Providers in Operation CloudJack

APT29 compromises two European cloud hosting providers to access customer environments. Hundreds of EU government and enterprise tenants at risk.

European Cloud Platforms
Microsoft / ANSSI
HIGHSupply ChainExploited

Cl0p Mass Exploits Cleo File Transfer Zero-Day — 600+ Organizations Hit

Cl0p launches fourth major file transfer campaign exploiting Cleo Harmony, VLTrader, and LexiCom zero-day. Systematic data exfiltration ongoing.

CVE-2026-27891Cleo Harmony
Huntress / Cleo Advisory
CRITICALVulnerabilityExploited

Critical Fortinet FortiManager Flaw Enables Managed Firewall Takeover

CVE-2026-48788 allows registration of rogue FortiGate devices to FortiManager, enabling config push to entire managed firewall estate.

CVE-2026-48788FortiManager 7.4
Fortinet PSIRT / Mandiant
LOWRansomware

LockBit Affiliate Arrested — Europol Seizes $14M in Cryptocurrency

Europol arrests LockBit affiliate in Ukraine and seizes $14M in cryptocurrency. Suspect linked to attacks on 150+ organizations.

N/A
Europol / FBI
MEDIUMVulnerability

NIST NVD Backlog Exceeds 30,000 Unanalyzed CVEs

NVD backlog doubles year-over-year, creating blind spots in vuln management. Industry coalition demands congressional emergency funding.

NIST NVD
Cybersecurity Coalition
HIGHVulnerability

CISA KEV: Laravel Livewire — Laravel Livewire Code Injection Vulnerability

Laravel Livewire contain a code injection vulnerability that could allow unauthenticated attackers to achieve remote command execution in specific scenarios.

CVE-2025-54068Laravel Livewire
CISA KEV
HIGHVulnerability

CISA KEV: Apple Multiple Products — Apple Multiple Products Buffer Overflow Vulnerability

Apple Safari, iOS, watchOS, visionOS, iPadOS, macOS, and tvOS contain a buffer overflow vulnerability that could allow the processing of maliciously crafted web content which may lead to memory corruption.

CVE-2025-31277Apple Multiple Products
CISA KEV
HIGHVulnerability

CISA KEV: Apple Multiple Products — Apple Multiple Products Classic Buffer Overflow Vulnerability

Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain a classic buffer overflow vulnerability which could allow a malicious application to cause unexpected system termination or write kernel memory.

CVE-2025-43520Apple Multiple Products
CISA KEV
HIGHVulnerability

CISA KEV: Apple Multiple Products — Apple Multiple Products Improper Locking Vulnerability

Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability that could allow a malicious application to cause unexpected changes in memory shared between processes.

CVE-2025-43510Apple Multiple Products
CISA KEV
HIGHVulnerability

CISA KEV: Craft CMS Craft CMS — Craft CMS Code Injection Vulnerability

Craft CMS contains a code injection vulnerability that allows a remote attacker to execute arbitrary code.

CVE-2025-32432Craft CMS Craft CMS
CISA KEV
LOWAi

ENISA Publishes 2026 Threat Landscape Report — Ransomware and AI Threats Dominate

ENISA annual report identifies ransomware, AI-enabled threats, and supply chain attacks as the top three cyber threats facing Europe in 2026.

N/A
ENISA
LOWVulnerability

CISA Releases Updated Zero Trust Maturity Model v3.0

CISA publishes Zero Trust Maturity Model v3.0 with updated guidance for identity, devices, networks, applications, and data pillars.

N/A
CISA
CRITICALVulnerabilityExploited

Critical VMware ESXi Vulnerability Allows Guest-to-Host Escape

A critical use-after-free vulnerability in VMware ESXi allows virtual machine escape. Active exploitation by ransomware groups confirmed.

CVE-2026-22224CVE-2026-22225VMware ESXi 7.0
Broadcom / Microsoft Threat Intelligence
CRITICALAiExploited

Sandworm Deploys New Wiper Malware Against Ukrainian Energy Grid

Russian GRU Sandworm group deploys new wiper variant AcidBurn targeting Ukrainian power distribution systems during winter heating season.

Schneider Electric SCADA
CERT-UA / Mandiant
CRITICALZero DayExploited

Ivanti Connect Secure New Zero-Day Under Active Exploitation

Another zero-day in Ivanti Connect Secure VPN appliances. Stack buffer overflow enables unauthenticated RCE. Third major Ivanti VPN zero-day in two years.

CVE-2026-18321Ivanti Connect Secure
Mandiant / Ivanti
HIGHAptExploited

UNC3886 Linked to VMware vCenter Exploitation Campaign Targeting Defense Sector

UNC3886 exploits known VMware vCenter vulnerabilities to deploy VirtualPita and VirtualPie backdoors across defense contractor virtualization infrastructure.

CVE-2025-22224CVE-2025-22225VMware vCenter Server
Mandiant / Microsoft
HIGHAptExploited

APT28 Compromises European Defense Contractor via Outlook Zero-Day

APT28 exploits Outlook NTLM relay zero-day to compromise a major European defense contractor. Classified project data at risk.

CVE-2026-15899Microsoft Outlook
ANSSI / Microsoft Threat Intelligence
MEDIUMApt

OpenAI Discloses State-Sponsored Misuse of ChatGPT for Cyber Operations

OpenAI reports disrupting five state-sponsored groups using ChatGPT for reconnaissance, phishing content generation, and malware debugging.

ChatGPT
OpenAI Threat Intelligence
CRITICALVulnerabilityExploited

Microsoft Patches 97 Vulnerabilities Including Three Actively Exploited Zero-Days

March 2026 Patch Tuesday addresses 97 CVEs with three actively exploited zero-days in Windows kernel, NTLM, and Hyper-V.

CVE-2026-21399CVE-2026-21400Windows 10/11
Microsoft MSRC
HIGHMalwareExploited

Flax Typhoon IoT Botnet Resurfaces with 300,000 Compromised Devices

Despite FBI disruption in 2024, Flax Typhoon has rebuilt its IoT botnet to over 300,000 compromised routers, cameras, and NAS devices worldwide.

SOHO Routers
Lumen Black Lotus Labs / FBI
HIGHAiPOC

Critical Cisco NX-OS Command Injection Affects Data Center Switches

Command injection in Cisco NX-OS CLI allows authenticated users to escalate to root on Nexus data center switches. PoC exploit published.

CVE-2026-20356Cisco NX-OS
Cisco PSIRT
HIGHAptExploited

APT28 Exploits Cisco Router Vulnerabilities for Long-Term Espionage

UK NCSC warns APT28 exploiting Cisco router vulnerabilities to establish persistent espionage infrastructure across European government networks.

CVE-2026-20145Cisco IOS
UK NCSC / NSA
HIGHRansomwareExploited

Medusa Ransomware Campaign Targets 40+ US School Districts

Medusa ransomware group attacks over 40 US school districts via compromised RDP. Student and staff PII at risk. FBI issues sector-wide alert.

Windows Server
FBI / CISA Joint Advisory
HIGHMalware

Sandworm Uses Compromised Ubiquiti Routers as C2 Infrastructure

FBI warns Sandworm is using a botnet of compromised Ubiquiti EdgeRouters as proxy C2 infrastructure for espionage operations against NATO targets.

Ubiquiti EdgeRouter
FBI / NSA Joint Advisory
HIGHRansomware

ALPHV Successor RansomHub Becomes Top Ransomware Threat in Q1 2026

RansomHub, believed to include former ALPHV/BlackCat operators, claims 185+ victims in Q1 2026 alone. Now the most prolific ransomware operation.

Windows Server
Group-IB / Recorded Future
CRITICALVulnerabilityExploited

Critical SonicWall SMA Gateway Auth Bypass Under Active Exploitation

Authentication bypass in SonicWall SMA 1000 series gateways allows unauthenticated admin access. Active exploitation confirmed by CISA.

CVE-2026-5135SonicWall SMA 1000
SonicWall PSIRT / Arctic Wolf
MEDIUMDdos

European Banking Authority Reports 340% Increase in DDoS Attacks on Banks

EBA reports unprecedented surge in DDoS attacks against European financial institutions. Pro-Russian hacktivist groups responsible for majority of attacks.

Banking Platforms
European Banking Authority
HIGHVulnerabilityExploited

Jenkins Security Advisory Patches Critical RCE in Pipeline Plugin

Critical deserialization vulnerability in Jenkins Pipeline plugin allows unauthenticated RCE. 150,000+ Jenkins instances exposed.

CVE-2026-4321Jenkins
Jenkins Security Advisory
MEDIUMVulnerability

CISA Adds 12 Vulnerabilities to Known Exploited Vulnerabilities Catalog in One Week

CISA adds 12 vulnerabilities to KEV catalog in a single week — the highest since the catalog launch. Reflects accelerating exploitation pace.

Multiple Vendors
CISA
MEDIUMApt

Australia Cyber Security Centre Warns of Attacks on Critical Infrastructure OT Networks

ACSC issues urgent advisory on increased targeting of Australian critical infrastructure OT networks by state-sponsored actors.

SCADA Systems
ACSC
HIGHAi

Google Project Zero Discloses Linux Kernel Zero-Day in eBPF Subsystem

Google Project Zero discloses a critical privilege escalation in the Linux kernel eBPF verifier. Affects cloud workloads, containers, and Android.

CVE-2026-0399Linux Kernel 5.15-6.8
Google Project Zero
LOWMalware

Interpol Operation Synergia II Dismantles 22,000 Malicious Servers Globally

Interpol-led operation takes down 22,000 malicious servers across 100+ countries. 41 arrests made. Focus on phishing, ransomware, and infostealer infrastructure.

Malicious Infrastructure
Interpol
HIGHAptExploited

Iranian APT Targets US Defense Industrial Base with New MalwareLoader

Iranian threat actor Peach Sandstorm deploys novel loader in campaign against US defense industrial base. Targets include drone and satellite manufacturers.

Azure AD
Microsoft Threat Intelligence
HIGHRansomwareExploited

Major US Airport Systems Hit by Coordinated Ransomware Attack

Coordinated ransomware attack disrupts systems at four major US airports. Flight information, baggage handling, and check-in systems affected.

Airport Management Systems
TSA / CISA
HIGHZero DayExploited

Apple Patches Actively Exploited WebKit Zero-Day in iOS and macOS

Apple releases emergency updates for iOS 18.4 and macOS 15.4 to fix WebKit zero-day used in targeted attacks. Sophisticated exploit chain confirmed.

CVE-2026-23529iOS 18
Apple / Citizen Lab