Technology Intelligence

Threats against technology companies, software vendors, cloud services, and tech infrastructure.

404
Total Reports
100
Critical Threats
124
High Threats
LOWApt

Cloudflare’s new CMS is not a WordPress killer, it’s a WordPress alternative

Cloudflare on Wednesday rolled out EmDash, which it described as “the spiritual successor to WordPress.” The security vendor positioned EmDash as a far more secure site building tool that avoids the extensive cybersecurity problems with WordPress plugins . But the Cloudflare claims go far beyond cybersecurity issues. The vendor is arguing that the very nature of websites in 2026 is sharply differe

CSO Online
CRITICALRansomware

Cisco fixes critical IMC auth bypass present in many products

Cisco has released patches for a critical vulnerability in its out-of-band management solution, present in many of its servers and appliances. The flaw allows unauthenticated remote attackers to gain admin access to the Cisco Integrated Management Controller (IMC), which gives administrators remote control over servers even when the main OS is shut down. The vulnerability, tracked as CVE-2026-2009

CVE-2026-20093
CSO Online
MEDIUMVulnerability

Geopolitics, AI, and Cybersecurity: Insights From RSAC 2026

AI-driven threats, global leadership shifts, and the future of cybersecurity in a rapidly evolving landscape were among the discussions at RSAC 2026 Conference.

Dark Reading
MEDIUMVulnerability

House Dems decry confirmed ICE usage of Paragon spyware

The trio of Democrats weren’t satisfied with Immigration and Customs Enforcement answers, and criticized the spyware’s use. The post House Dems decry confirmed ICE usage of Paragon spyware appeared first on CyberScoop .

CyberScoop
MEDIUMMalware

Claude Code leak used to push infostealer malware on GitHub

Threat actors are exploiting the recent Claude Code source code leak by using fake GitHub repositories to deliver Vidar information-stealing malware. [...]

BleepingComputer
MEDIUMVulnerability

Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate

The company's 8-K filing notes "unauthorized access" and that it's activated business continuity plans and taken some systems offline.

Dark Reading
MEDIUMVulnerability

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web Services (AWS) secrets, shell command history, Stripe API keys, and GitHub tokens at scale. Cisco Talos has attributed the operation to a threat cluster it tracks as

CVE-2025-55182
The Hacker News
MEDIUMVulnerability

Security Bosses Are All-In on AI. Here's Why

CISOs are bullish on AI and have big plans to roll out future tools. We talk to Reddit CISO Frederick Lee and leading analyst Dave Gruber about how AI is working out in the real world, as well as its future promise.

Dark Reading
MEDIUMVulnerability

Drift loses $280 million as hackers seize Security Council powers

The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers in a planned, sophisticated operation. [...]

BleepingComputer
MEDIUMVulnerability

GCP-2026-017

[object Object]

Google Cloud Security
CRITICALVulnerability

Critical Vulnerability in Claude Code Emerges Days After Source Leak

Within days of each other, Anthropic first leaked the source code to Claude Code, and then a critical vulnerability was found by Adversa AI. The post Critical Vulnerability in Claude Code Emerges Days After Source Leak appeared first on SecurityWeek .

SecurityWeek
MEDIUMVulnerability

The democratisation of business email compromise fraud

This week, Martin tells the story of a crime he encountered and how it shows that the threat landscape is changing.

Cisco Talos
MEDIUMVulnerability

Drift crypto platform confirms $280 million stolen in hack as researchers point finger at North Korea

The platform released a post-mortem on Wednesday night explaining that malicious actors gained access to Drift systems through a “novel attack” that involved the “rapid takeover” of the company’s security council administrative powers.

The Record
LOWVulnerability

French Senate passes bill that would ban children under 15 from social media

If the French effort becomes law, it would make France the first European country to follow Australia’s lead by banning social media for young teenagers.

The Record
HIGHRansomware

Akira ransomware group can achieve initial access to data encryption in less than an hour

A new report from Halcyon finds that the group also puts more effort than usual into developing working decryptors, likely to incentivize businesses to pay up. The post Akira ransomware group can achieve initial access to data encryption in less than an hour appeared first on CyberScoop .

CyberScoop
MEDIUMApt

Apple Rolls Out DarkSword Exploit Protection to More Devices

The DarkSword exploit kit has been used by both state-sponsored hackers and commercial spyware vendors. The post Apple Rolls Out DarkSword Exploit Protection to More Devices appeared first on SecurityWeek .

SecurityWeek
MEDIUMVulnerability

Lawmakers renew push for Labor Department-backed cyber apprenticeship grants

The bipartisan, bicameral Cyber Ready Workforce Act aims to cut into the country’s deficit of cybersecurity professionals. The post Lawmakers renew push for Labor Department-backed cyber apprenticeship grants appeared first on CyberScoop .

CyberScoop
MEDIUMVulnerability

RSAC 2026: AI Dominates, But Community Remains Key to Security

As AI took center stage at this year's conference, experts debated automation, oversight and the evolving role of human intelligence in cybersecurity — despite the US government's notable absence.

Dark Reading
MEDIUMVulnerability

Residential proxies evaded IP reputation checks in 78% of 4B sessions

Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users. [...]

BleepingComputer
CRITICALVulnerability

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

Cisco has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system with elevated privileges. The vulnerability, tracked as CVE-2026-20093, carries a CVSS score of 9.8 out of a maximum of 10.0. "This

CVE-2026-20093
The Hacker News
MEDIUMVulnerability

Medtech giant Stryker says it’s back up after Iranian cyberattack

The Handala group claimed responsibility for hitting the company with a wiper attack last month. The post Medtech giant Stryker says it’s back up after Iranian cyberattack appeared first on CyberScoop .

CyberScoop
MEDIUMVulnerability

Cybersecurity M&A Roundup: 38 Deals Announced in March 2026

Significant cybersecurity M&A deals announced by Airbus, Cellebrite, Databricks, Quantum eMotion, Rapid7, and OpenAI. The post Cybersecurity M&A Roundup: 38 Deals Announced in March 2026 appeared first on SecurityWeek .

SecurityWeek
MEDIUMVulnerability

New 'Storm' Infostealer Remotely Decrypts Stolen Credentials

This modern infostealer adopted server-side decryption of stolen credentials to bypass security controls

Infosecurity Magazine
MEDIUMVulnerability

NCSC Issues Security Alert Over Hackers Targeting WhatsApp and Signal Accounts

The UK’s cybersecurity agency offered advice to “high-risk’ individuals” on how to protect against social engineering and cyber-attacks

Infosecurity Magazine
MEDIUMVulnerability

Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime

Threat actors are exploiting vacant homes as "drop addresses" to intercept mail and enable fraud. Flare shows how postal services and fake identities are abused to turn mail into a fraud vector. [...]

BleepingComputer
CRITICALRansomware

vSphere and BRICKSTORM Malware: A Defender's Guide

<div class="block-paragraph_advanced"><p>Written by: Stuart Carrera</p> <hr/></div> <div class="block-paragraph_advanced"><h3><span style="vertical-align: baseline;">Introduction</span><strong style="vertical-align: baseline;"> </strong></h3> <p><span style="vertical-align: baseline;">Building on </span><a href="https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign

CVE-2026-22769
Mandiant
MEDIUMVulnerability

New Progress ShareFile flaws can be chained in pre-auth RCE attacks

Two vulnerabilities in Progress ShareFile, an enterprise-grade secure file transfer solution, can be chained to enable unauthenticated file exfiltration from affected environments. [...]

BleepingComputer
MEDIUMVulnerability

Apple Expands iOS 18 Security Updates Amid DarkSword Threat

iOS/iPadOS 18.7.7 updates expanded to protect older devices from DarkSword web exploit kit

Infosecurity Magazine
MEDIUMVulnerability

Medtech giant Stryker fully operational after data-wiping attack

Stryker Corporation, one of the world's leading medical technology companies, says it's fully operational three weeks after many of its systems were wiped out in a cyberattack claimed by the Iranian-linked Handala hacktivist group. [...]

BleepingComputer
MEDIUMVulnerability

[Video] The TTP Ep 21: When Attackers Become Trusted Users

An episode of the Talos Threat Perspective on the 2025 Year in Review trends. We explore how identity is being used to gain, extend, and maintain access inside environments.

Cisco Talos
MEDIUMMalware

Bank Trojan 'Casbaneiro' Worms Through Latin America

Augmented Marauder's multipronged banking-Trojan cyber campaigns are targeting Spanish speakers, evading detection, and replicating rapidly.

Dark Reading
HIGHRansomware

Researchers Observe Sub-One-Hour Ransomware Attacks

Halcyon says Akira is now capable of carrying out an entire ransomware attack in less than an hour

Infosecurity Magazine
MEDIUMMalware

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

LNK files use GitHub C2, embedded decoders and PowerShell for persistence and data exfiltration

Infosecurity Magazine
HIGHApt

New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay

Executive Overview Advanced persistent threats (APTs) are constantly and consistently changing tactics as network defenders plug holes in defenses. Static indicators of compromise (IoCs) for the BPFDoor have been widely deployed, forcing threat actors to get creative in their use of this particular strain of malware. What they came up with is ingenious. New research from Rapid7 Labs has uncovered

Rapid7
MEDIUMVulnerability

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just a quick and honest look at the messy reality of keeping systems safe this week. Things are moving fast. The list includes researchers chaining small bugs together to create massive backdoors, old software flaws

The Hacker News
MEDIUMVulnerability

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion &amp; 10 More Stories

The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just a quick and honest look at the messy reality of keeping systems safe this week. Things are moving fast. The list includes researchers chaining small bugs together to create massive backdoors, old software flaws

The Hacker News
LOWZero Day

EvilTokens abuses Microsoft device code flow for account takeovers

A new phishing-as-a-service (PhaaS) campaign is abusing Microsoft’s device code authentication flow to gain unauthorized access to user accounts. Sekoia researchers first spotted the toolkit “EvilTokens” that lets attackers capture authentication tokens by tricking users into completing a legitimate login process in Microsoft’s own environment. The activity, observed since at least mid-February, r

CSO Online
CRITICALVulnerability

Cisco Patches Critical and High-Severity Vulnerabilities

The bugs could lead to authentication bypass, remote code execution, information disclosure, and privilege escalation. The post Cisco Patches Critical and High-Severity Vulnerabilities appeared first on SecurityWeek .

SecurityWeek
CRITICALVulnerability

Siemens SICAM 8 Products

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-092-01.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Multiple SICAM 8 products are affected by multiple vulnerabilities that could lead to denial of service, namely: - SICAM A8000 Device firmware - CPCI85 for CP-8031/CP-8050 - SICORE for CP-8010/CP-8012 - RTUM85 for CP-8010/CP-8012 - SI

CVE-2026-27663CVE-2026-27664
CISA Advisories
CRITICALPhishing

Yokogawa CENTUM VP

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-092-02.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could allow an attacker to login as the PROG user and modify permissions.</strong></p> <p>The following versions of Yokogawa CENTUM VP are affected:</p> <ul> <li>CENTUM VP >=R5.01.00|</li>

CVE-2025-7741
CISA Advisories
CRITICALVulnerability

Hitachi Energy Ellipse

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-092-03.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Hitachi Energy is aware of a Jasper Report vulnerability that affects the Ellipse product versions mentioned in this document below. This vulnerability can be exploited to carry out remote code execution (RCE) attack on the product. P

CVE-2025-10492
CISA Advisories
MEDIUMVulnerability

CISA Adds One Known Exploited Vulnerability to Catalog

<p>CISA has added&nbsp;one&nbsp;new&nbsp;vulnerability&nbsp;to its&nbsp;<a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">Known Exploited Vulnerabilities (KEV) Catalog</a>, based on evidence of active exploitation.&nbsp;</p> <ul> <li><a href="https://www.cve.org/CVERecord?id=CVE-2026-3502" target="_blank">CVE-2026-3502</a>&nbsp;TrueConf&nbsp;Client Download of Code Without Int

CVE-2026-3502
CISA Advisories
HIGHData Breach

250,000 Affected by Data Breach at Nacogdoches Memorial Hospital

In January 2026, a threat actor hacked the hospital’s internal network and stole personal and health information. The post 250,000 Affected by Data Breach at Nacogdoches Memorial Hospital appeared first on SecurityWeek .

SecurityWeek
MEDIUMMalware

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency miners since November 2023. "Beyond cryptomining, the threat actor monetizes infections through CPA (Cost Per Action) fraud, directing victims to content locker pages under the guise of software registration," Elastic

The Hacker News
MEDIUMVulnerability

The State of Trusted Open Source Report

In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data and customer base on open source consumption across our catalog of container image projects, versions, images, language libraries, and builds. These insights shed light on what teams pull, deploy, and maintain day to day, alongside the vulnerabilities and

The Hacker News
CRITICALVulnerability

Critical Cisco IMC auth bypass gives attackers Admin access

Cisco has patched several critical and high-severity vulnerabilities, including an Integrated Management Controller (IMC) authentication bypass that enables attackers to gain Admin access. [...]

BleepingComputer
HIGHData Breach

Mercor Hit by LiteLLM Supply Chain Attack

The AI recruiting firm is investigating the incident as Lapsus$ claimed the theft of 4TB of Mercor data. The post Mercor Hit by LiteLLM Supply Chain Attack appeared first on SecurityWeek .

SecurityWeek
CRITICALVulnerability

NVD Critical: CVE-2026-33615 — An unauthenticated remote attacker can exploit an unauthenticated SQL Injection ...

An unauthenticated remote attacker can exploit an unauthenticated SQL Injection vulnerability in the setinfo endpoint due to improper neutralization of special elements in a SQL UPDATE command. This can result in a total loss of integrity and availability.

CVE-2026-33615
NIST NVD
MEDIUMMalware

UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications

Talos is disclosing a large-scale automated credential harvesting campaign carried out by a threat cluster we currently track as UAT-10608. The campaign is primarily leveraging a collection framework dubbed “NEXUS Listener.”

Cisco Talos
HIGHRansomware

Qilin EDR killer infection chain

This blog provides an in-depth analysis of the malicious “msimg32.dll” used in Qilin ransomware attacks, which is a multi-stage infection chain targeting EDR systems.

Cisco Talos
MEDIUMVulnerability

Inside the Talos 2025 Year in Review: A discussion on what the data means for defenders

A conversation between Cisco Talos and Cisco Security leaders on the 2025 threat landscape, from identity attacks and legacy vulnerabilities to AI-driven threats, and what defenders should prioritize now.

Cisco Talos
HIGHRansomware

An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases

There were 134 ransomware incidents reported in Japan in 2025, representing a 17.5% year-over-year increase from 2024.

Cisco Talos
MEDIUMMalware

Sophisticated CrystalX RAT Emerges

The malware can spy on victims, steal their information, and make configuration changes on devices. The post Sophisticated CrystalX RAT Emerges appeared first on SecurityWeek .

SecurityWeek
MEDIUMVulnerability

WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action

Meta-owned messaging platform WhatsApp said it alerted about 200 users who were tricked into installing a bogus version of its iOS app that was infected with spyware. According to reports from Italian newspaper La Repubblica and news agency ANSA, the vast majority of the targets are located in Italy. It's assessed that the threat actors behind the activity used social engineering

The Hacker News
MEDIUMVulnerability

Microsoft links Classic Outlook issue to email delivery problems

Microsoft is investigating a known issue that prevents some Classic Outlook users from sending emails via Outlook.com. [...]

BleepingComputer
CRITICALZero Day

Cybersecurity in the age of instant software

AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an application on demand — a spreadsheet, for example — and delete it when you’re done using it than to buy one commercially. Future systems could include a

CSO Online
CRITICALVulnerability

Most CNI Firms Face Up to £5m in Downtime from OT Attacks

E2e-assure says 80% of critical infrastructure providers could face millions in downtime from cyber-attacks

Infosecurity Magazine
CRITICALVulnerability

Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks

Internet security watchdog Shadowserver has found over 14,000 BIG-IP APM instances exposed online amid ongoing attacks exploiting a critical-severity remote code execution (RCE) vulnerability. [...]

BleepingComputer
MEDIUMVulnerability

Variance Raises $21.5M for Compliance Investigation Platform Powered by AI Agents

Variance has raised a total of $26 million in funding and the latest investment will fuel platform growth. The post Variance Raises $21.5M for Compliance Investigation Platform Powered by AI Agents appeared first on SecurityWeek .

SecurityWeek
MEDIUMVulnerability

Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit

Apple on Wednesday expanded the availability of iOS 18.7.7 and iPadOS 18.7.7 to a broader range of devices to protect users from the risk posed by a recently disclosed exploit kit known as DarkSword. "We enabled the availability of iOS 18.7.7 for more devices on April 1, 2026, so users with Automatic Updates turned on can automatically receive important security

The Hacker News
MEDIUMVulnerability

Linx Security Raises $50 Million for Identity Security and Governance

The company will accelerate product development, scale go-to-market efforts, and expand its global footprint. The post Linx Security Raises $50 Million for Identity Security and Governance appeared first on SecurityWeek .

SecurityWeek
LOWVulnerability

Tools, um MCP-Server abzusichern

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/11/Gorodenkoff_shutterstock_2324952347_16z9.jpg?quality=50&strip=all 7200w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Gorodenkoff_shutterstock_2324952347_16z9.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Gorodenkoff_shutterstock_2324952347_16z9.jpg?resize=768%2C432&qualit

CSO Online
HIGHVulnerability

CISA KEV: TrueConf Client — TrueConf Client Download of Code Without Integrity Check Vulnerability

TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.

CVE-2026-3502TrueConf Client
CISA KEV
MEDIUMMalware

WhatsApp warns users of fake app used to distribute spyware

The Meta subsidiary alleges that Italy’s SIO spyware manufacturer designed the phony app specifically for iPhones. Most of the impacted users are in Italy, according to a WhatsApp announcement.

The Record
MEDIUMMalware

New CrystalRAT malware adds RAT, stealer and prankware features

A new malware-as-a-service called CrystalRAT is being promoted on Telegram, offering remote access, data theft, keylogging, and clipboard hijacking capabilities. [...]

BleepingComputer
HIGHRansomware

Ransomware Will Hit Hospitals. Rehearsals Are Key to Defense

A chief medical information officer describes what hospitals face when they inevitably suffer a ransomware attack—whether it leads to short- or long-term outages.

Dark Reading
CRITICALVulnerability

Apple expands iOS 18 updates to more iPhones to block DarkSword attacks

Apple has now made it possible for more iPhones still running iOS 18 to receive security updates that protect against the actively exploited DarkSword exploit kit. [...]

BleepingComputer
CRITICALZero Day

Hackers exploit TrueConf zero-day to push malicious software updates

Hackers have targeted TrueConf conference servers in attacks that exploit a zero-day vulnerability, allowing them to execute arbitrary files on all connected endpoints. [...]

BleepingComputer
MEDIUMVulnerability

Crypto platform Drift suspends services after millions stolen in security incident

Security experts believe hundreds of millions of dollars worth of cryptocurrency were stolen from decentralized finance platform Drift on Wednesday after the site confirmed it was experiencing a cyberattack.

The Record
MEDIUMVulnerability

Nissan says stolen data came from third-party vendor after hacking group claims breach

A hacking group claimed this week to have breached the file-transfer system used by a company that offers services to Nissan and Infiniti dealerships across North America. Nissan said there was no indication "customer information was accessed or put at risk."

The Record
LOWPhishing

New EvilTokens service fuels Microsoft device code phishing attacks

A new malicious kit called EvilTokens integrates device code phishing capabilities, allowing attackers to hijack Microsoft accounts and provide advanced features for business email compromise attacks. [...]

BleepingComputer
MEDIUMVulnerability

LatAm's Self-Taught Cyber Talent Overlooked Amid Cyberattack Glut

A newly released study exclusively shared with Dark Reading details the unique circumstances that make up Latin America's labor pool, and why organizations may want to expand their talent search.

Dark Reading
MEDIUMSupply Chain

Mercor confirms security incident tied to LiteLLM supply chain attack

Although the LiteLLM attack was reportedly tied to a group called TeamPCP, the hacking gang Lapsus$ claimed on its website that it obtained hundreds of gigabytes of Mercor’s data.

The Record
MEDIUMSupply Chain

Threat Brief: Widespread Impact of the Axios Supply Chain Attack

Unit 42 discusses the supply chain attack targeting Axios. Learn about the full attack chain, from the dropper to forensic cleanup. The post Threat Brief: Widespread Impact of the Axios Supply Chain Attack appeared first on Unit 42 .

Unit 42 (Palo Alto)
MEDIUMMalware

'NoVoice' Android malware on Google Play infected 2.3 million devices

A new Android malware named NoVoice was found on Google Play, hidden in more than 50 apps that were downloaded at least 2.3 million times. [...]

BleepingComputer
HIGHRansomware

North Dakota water treatment plant reports March ransomware attack

A water treatment plant in the city of Minot, North Dakota, was hit with ransomware but city officials said it continues to operate normally.

The Record
CRITICALZero Day

Vim and GNU Emacs: Claude Code helpfully found zero-day exploits for both

Developers can spend days using fuzzing tools to find security weaknesses in code. Alternatively, they can simply ask an LLM to do the job for them in seconds. The catch: LLMs are evolving so rapidly that this convenience might come with hidden dangers. The latest example is from researcher Hung Nguyen from AI red teaming company Calif, who, with simple prompts to Anthropic’s Claude Code, was able

CVE-2026-34714
CSO Online
CRITICALVulnerability

NVD Critical: CVE-2026-20160 — A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allo...

A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected SSM On-Prem host. This vulnerability is due to the unintentional exposure of an&nbsp;internal service. An attacker could exploit this vulnerability by sending a crafted request to the API of the expo

CVE-2026-20160
NIST NVD
CRITICALVulnerability

NVD Critical: CVE-2026-20093 — A vulnerability in the change password functionality of Cisco Integrated Managem...

A vulnerability in the change password functionality of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system as&nbsp;Admin. This vulnerability is due to incorrect handling of password change requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device.

CVE-2026-20093
NIST NVD
MEDIUMVulnerability

Cyberattacks Intensify Pressure on Latin American Governments

Cyber threats across Latin America are increasingly targeting government systems, from disruptive attacks in Puerto Rico to a surge of probes against Colombia’s health sector.

Dark Reading
MEDIUMVulnerability

Depthfirst Raises $80 Million in Series B Funding

The startup will expand its AI research team, train additional security models, and scale enterprise adoption. The post Depthfirst Raises $80 Million in Series B Funding appeared first on SecurityWeek .

SecurityWeek
MEDIUMVulnerability

Cambodia extradites alleged cyber scam linchpin to China as crackdown intensifies

Li Xiong was the head of Huione Group, whose branded entities at one time included an online banking arm, cryptocurrency exchange and online marketplace which has been referred to as an “Amazon for criminals.”

The Record
MEDIUMVulnerability

Hasbro takes some systems offline after cybersecurity incident

The company filed a notice with the Securities Exchange Commission (SEC) on Wednesday warning investors that its IT team discovered unauthorized access on March 28.

The Record
CRITICALMalware

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a new phishing campaign in which the cybersecurity agency itself was impersonated to distribute a remote administration tool known as AGEWHEEZE. As part of the attacks, the threat actors, tracked as UAC-0255, sent emails on March 26 and 27, 2026, posing as CERT-UA to distribute a password-protected ZIP archive

The Hacker News
MEDIUMVulnerability

Toy Giant Hasbro Hit by Cyberattack

The company is investigating the full scope of the incident, including whether any files have been compromised. The post Toy Giant Hasbro Hit by Cyberattack appeared first on SecurityWeek .

SecurityWeek
MEDIUMMalware

New DeepLoad Malware Dropped in ClickFix Attacks

The malware steals credentials, installs a malicious browser extension, and can spread via USB drives. The post New DeepLoad Malware Dropped in ClickFix Attacks appeared first on SecurityWeek .

SecurityWeek
MEDIUMVulnerability

Google Introduces Android Dev Verification Amid Openness Debate

Android requires dev identity verification for sideloaded apps; phased global rollout from September

Infosecurity Magazine
MEDIUMVulnerability

Venom Stealer MaaS Platform Commoditizes ClickFix Attacks

A new service on the cybercrime market provides automated capabilities to create persistent information-stealing social engineering attacks.

Dark Reading
CRITICALZero Day

Exploited Zero-Day Among 21 Vulnerabilities Patched in Chrome

Google has announced fixes for CVE-2026-5281, a zero-day affecting Chrome’s Dawn component. The post Exploited Zero-Day Among 21 Vulnerabilities Patched in Chrome appeared first on SecurityWeek .

CVE-2026-5281
SecurityWeek
MEDIUMApt

European-Chinese geopolitical issues drive renewed cyberespionage campaign

Proofpoint researchers say the group behind the surge, TA416, had turned away from Europe for a few years. The post European-Chinese geopolitical issues drive renewed cyberespionage campaign appeared first on CyberScoop .

CyberScoop
CRITICALVulnerability

NVD CRITICAL: CVE-2026-34430 — ByteDance Deer-Flow versions prior to commit 92c7a20 contain a sandbox escape vu...

ByteDance Deer-Flow versions prior to commit 92c7a20 contain a sandbox escape vulnerability in bash tool handling that allows attackers to execute arbitrary commands on the host system by bypassing regex-based validation using shell features such as directory changes and relative paths. Attackers can exploit the incomplete shell semantics modeling to read and modify files outside the sandbox bound

CVE-2026-34430
NIST NVD
MEDIUMMalware

Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass

Microsoft is calling attention to a new campaign that has leveraged WhatsApp messages to distribute malicious Visual Basic Script (VBS) files. The activity, beginning in late February 2026, leverages these scripts to initiate a multi-stage infection chain for establishing persistence and enabling remote access. It's currently not known what lures the threat actors use to trick users into

The Hacker News
MEDIUMVulnerability

Routine Access Is Powering Modern Intrusions, a New Threat Report Finds

Modern intrusions increasingly start with valid credentials and routine access, not exploits. Blackpoint Cyber's upcoming threat report shows how VPN abuse, RMM tools, and social engineering drive most incidents. [...]

BleepingComputer
MEDIUMVulnerability

FBI Warns of Data Security Risks From China-Made Mobile Apps

The agency has not named the problematic foreign-made applications, but TikTok and Temu come to mind. The post FBI Warns of Data Security Risks From China-Made Mobile Apps appeared first on SecurityWeek .

SecurityWeek
MEDIUMVulnerability

US Charges Uranium Crypto Exchange Hacker

Jonathan Spalletta exploited smart contract vulnerabilities to steal approximately $55 million in cryptocurrency and cause Uranium to shut down. The post US Charges Uranium Crypto Exchange Hacker appeared first on SecurityWeek .

SecurityWeek
MEDIUMMalware

New Venom Stealer MaaS Platform Automates Continuous Data Theft

Venom Stealer malware-as-a-service automates ClickFix social engineering, credential and crypto exfiltration

Infosecurity Magazine
CRITICALVulnerability

NVD Critical: CVE-2026-29014 — MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code injec...

MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code injection vulnerability that allows remote attackers to execute arbitrary code by sending crafted requests with malicious PHP code. Attackers can exploit insufficient input neutralization in the execution path to achieve remote code execution and gain full control over the affected server.

CVE-2026-29014
NIST NVD
MEDIUMVulnerability

Webinar Today: Agentic AI vs. Identity’s Last Mile Problem

Join the webcast as we explore what Agentic AI can and cannot solve today, and real world breach scenarios linked to disconnected applications. The post Webinar Today: Agentic AI vs. Identity’s Last Mile Problem appeared first on SecurityWeek .

SecurityWeek
LOWVulnerability

What CISOs Should Expect from AI Powered MDR in 2026, According to Rapid7 CEO Corey Thomas

In the latest episode of Rapid7’s Experts on Experts, I’m joined by Rapid7 CEO Corey Thomas for a candid conversation about where AI is genuinely changing security operations, and where the hype still outruns reality. The short version is that AI is already improving productivity in software development, but the bigger shift for security leaders is what it can do with telemetry at scale. As Corey

Rapid7
MEDIUMVulnerability

Block the Prompt, Not the Work: The End of "Doctor No"

There is a character that keeps appearing in enterprise security departments, and most CISOs know exactly who that is. It doesn&rsquo;t build. It doesn&rsquo;t enable. Its entire function is to say "No." No to ChatGPT. No to DeepSeek. No to the file-sharing tool the product team swears by. For years, this looked like security. But in 2026, "Doctor No" is no longer just a management headache &

The Hacker News
MEDIUMMalware

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A multi-pronged phishing campaign is targeting Spanish-speaking users in organizations across Latin America and Europe to deliver Windows banking trojans like Casbaneiro (aka Metamorfo) via another malware called Horabot. The activity has been attributed to a Brazilian cybercrime threat actor tracked as Augmented Marauder and Water Saci. The e-crime group was first documented by Trend Micro in

The Hacker News
MEDIUMVulnerability

Romania under daily barrage of cyberattacks, defense minister says

Romanian government institutions are facing thousands of cyberattack attempts every day targeting a wide range of public institutions, Defense Minister Radu Miruta said.

The Record
MEDIUMApt

Chinese Hackers Target European Governments in Espionage Campaigns

Chinese state-backed group TA416 had suspended its cyber espionage operations in Europe since 2023, noted Proofpoint

Infosecurity Magazine
CRITICALZero Day

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

Google on Thursday released security updates for its Chrome web browser to address 21 vulnerabilities, including a zero-day flaw that it said has been exploited in the wild. The high-severity vulnerability, CVE-2026-5281 (CVSS score: N/A), concerns a use-after-free bug in Dawn, an open-source and cross-platform implementation of the WebGPU standard. "Use-after-free in Dawn in Google Chrome prior

CVE-2026-5281
The Hacker News
MEDIUMVulnerability

FBI warns against using Chinese mobile apps due to privacy risks

The U.S. Federal Bureau of Investigation (FBI) warned Americans against using foreign-developed mobile applications, particularly those created by Chinese developers. [...]

BleepingComputer
LOWMalware

WhatsApp malware campaign uses malicious VBS files to gain persistent access

Microsoft is warning WhatsApp users of a new malware campaign that tricks them into executing malicious Visual Basic Script (VBS) files, ultimately enabling persistence and remote access. In a March 31 report , Microsoft Defender Experts said attackers have been distributing malicious Visual Basic Script (VBS) files through WhatsApp since at least late February, relying on social engineering to ge

CSO Online
LOWMalware

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)

For years, cybersecurity has followed a familiar model: block malware, stop the attack. Now, attackers are moving on to what’s next. Threat actors now use malware less frequently in favor of what’s already inside your environment, including abusing trusted tools, native binaries, and legitimate admin utilities to move laterally, escalate privileges, and persist without raising alarms. Most

The Hacker News
MEDIUMVulnerability

Hacker zielen auf Exilportal Iranwire

Unbekannte sollen das Exilportal Iranwire gehackt haben. PX Media – shutterstock.com Hacker haben nach Angaben der iranischen Justiz mutmaßlich Zugriff auf Daten eines bekannten Exilportals erlangt. Dabei seien große Menge an Daten erbeutet worden, darunter Schriftwechsel, Listen von Angestellten, Informanten sowie streng vertrauliche Daten, berichtete das Sprachrohr der iranischen Justiz, die Nac

CSO Online
MEDIUMVulnerability

Are We Training AI Too Late?

Ask the Expert: Cybersecurity teams need to expand their field of view to include new, unique threat sources, rather than relying on past, proven threat actors.

Dark Reading
CRITICALZero Day

Google fixes fourth Chrome zero-day exploited in attacks in 2026

Google has fixed the fourth Chrome vulnerability exploited in zero-day attacks since the start of the year. [...]

BleepingComputer
MEDIUMVulnerability

Eight in 10 UK Manufacturers Hit by Cyber Incident in a Year

Most UK manufacturers compromised last year suffered financial loss, says ESET

Infosecurity Magazine
CRITICALVulnerability

9 ways CISOs can combat AI hallucinations

AI hallucinations are a well-known problem and, when it comes to compliance assessments, these convincing but inaccurate assessments can cause real damage with poor risk assessments, incorrect policy guidance, or even inaccurate incident reports. Cybersecurity leaders say the real trouble starts when AI moves past writing summaries and begins making judgment calls. That’s when it’s asked to decide

CSO Online
MEDIUMMalware

Hackers Hijack Axios npm Package to Spread RATs

Threat actors hijacked the popular npm package axios to spread RAT malware after compromising an open‑source maintainer’s account, researchers warn

Infosecurity Magazine
MEDIUMVulnerability

Digital assets after death: Managing risks to your loved one’s digital estate

Fraudsters often target the accounts of the deceased or their grieving relatives. Here’s how to keep the scammers at bay.

WeLiveSecurity (ESET)
LOWMalware

Security awareness is not a control: Rethinking human risk in enterprise security

Organizations have been responding to phishing, business email compromise, and credential theft in essentially the same manner for over ten years. They essentially follow a playbook that involves investing in awareness training, running phishing simulations, and requiring employees to complete annual security modules. The reason behind this is simple and the reasoning behind these efforts is strai

CSO Online
LOWSupply Chain

Axios NPM Package Breached in North Korean Supply Chain Attack

A long-lived NPM access token was used to bypass the GitHub Actions OIDC-based CI/CD publishing workflow and push backdoored package versions. The post Axios NPM Package Breached in North Korean Supply Chain Attack appeared first on SecurityWeek .

SecurityWeek
MEDIUMSupply Chain

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Google has formally attributed the supply chain compromise of the popular Axios npm package to a financially motivated North Korean threat activity cluster tracked as UNC1069. "We have attributed the attack to a suspected North Korean threat actor we track as UNC1069," John Hultquist, chief analyst at Google Threat Intelligence Group (GTIG), told The Hacker News in a statement. "North Korean

The Hacker News
MEDIUMVulnerability

Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents

Palo Alto Networks has disclosed the details of its analysis of Google Cloud Platform’s Vertex AI. The post Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents appeared first on SecurityWeek .

SecurityWeek
MEDIUMVulnerability

Im Fokus: IT-Leadership

CSO Online
HIGHRansomware

Google Drive ransomware detection now on by default for paying users

Google announced that the AI-powered Google Drive ransomware detection feature has reached general availability and is now enabled by default for all paying users. [...]

BleepingComputer
MEDIUMVulnerability

Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms

Anthropic on Tuesday confirmed that internal code for its popular artificial intelligence (AI) coding assistant, Claude Code, had been inadvertently released due to a human error. "No sensitive customer data or credentials were involved or exposed," an Anthropic spokesperson said in a statement shared with CNBC News. "This was a release packaging issue caused by human error, not a security

The Hacker News
MEDIUMVulnerability

Enterprise Spotlight: Setting the 2026 IT agenda

IT leaders are setting their operations strategies for 2026 with an eye toward agility, flexibility, and tangible business results. Download the January 2026 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World and learn about the trends and technologies that will drive the IT agenda in the year ahead.

CSO Online
MEDIUMMalware

A laughing RAT: CrystalX combines spyware, stealer, and prankware features

Kaspersky researchers analyze a new CrystalX RAT distributed as MaaS and featuring extensive spyware, stealer, and prankware capabilities.

Securelist (Kaspersky)
CRITICALVulnerability

New Windows 11 emergency update fixes preview update install issues

Microsoft released an emergency update to fix the March 2026 KB5079391 non-security preview update, which was pulled over the weekend due to installation issues. [...]

BleepingComputer
LOWData Breach

Attack Surface Management – ein Kaufratgeber

Mit diesen Attack Surface Management Tools sorgen Sie im Idealfall dafür, dass sich Angreifer gar nicht erst verbeißen. Sergey Zaykov | shutterstock.com Regelmäßige Netzwerk-Scans reichen für eine gehärtete Angriffsfläche nicht mehr aus. Um die Sicherheit von Unternehmensressourcen und Kundendaten zu gewährleisten, ist eine kontinuierliche Überwachung auf neue Ressourcen und Konfigurationsabweichu

CSO Online
CRITICALData Breach

Anthropic employee error exposes Claude Code source

An Anthropic employee accidentally exposed the entire proprietary source code for its AI programming tool, Claude Code, by including a source map file in a version of the tool posted on Anthropic’s open npm registry account, a risky mistake, says an AI expert. “A compromised source map is a security risk,” said US-based cybersecurity and AI expert Joseph Steinberg . “A hacker can use a source map

CSO Online
CRITICALVulnerability

NVD Critical: CVE-2025-71281 — XenForo before 2.3.7 does not properly restrict methods callable from within tem...

XenForo before 2.3.7 does not properly restrict methods callable from within templates. A loose prefix match was used instead of a stricter first-word match for methods accessible through callbacks and variable method calls in templates, potentially allowing unauthorized method invocations.

CVE-2025-71281
NIST NVD
CRITICALVulnerability

NVD Critical: CVE-2025-71279 — XenForo before 2.3.7 contains a security issue affecting Passkeys that have been...

XenForo before 2.3.7 contains a security issue affecting Passkeys that have been added to user accounts. An attacker may be able to compromise the security of Passkey-based authentication.

CVE-2025-71279
NIST NVD
MEDIUMVulnerability

Claude Code source code accidentally leaked in NPM package

Anthropic says it accidentally leaked the source code for Claude Code, which is closed source, but the company says no customer data or credentials were exposed. [...]

BleepingComputer
MEDIUMVulnerability

White House executive order purports to limit mail-in voting, mandate federal voter lists

The order is expected to be quickly challenged in court, where the Trump administration’s previous efforts have been struck down as unconstitutional. The post White House executive order purports to limit mail-in voting, mandate federal voter lists appeared first on CyberScoop .

CyberScoop
HIGHVulnerability

CISA KEV: Google Dawn — Google Dawn Use-After-Free Vulnerability

Google Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

CVE-2026-5281Google Dawn
CISA KEV
LOWVulnerability

Google now allows you to change your @gmail.com address

Google is rolling out a new feature in the U.S. that allows users to change their @gmail address or create a new alias. [...]

BleepingComputer
MEDIUMVulnerability

Proton launches new "Meet" privacy-focused conferencing platform

Proton has announced a new video conferencing service named Meet and positioned it as a privacy-focused alternative to mainstream services like Google Meet, Zoom, and Microsoft Teams. [...]

BleepingComputer
LOWVulnerability

GIGABYTE Control Center vulnerable to arbitrary file write flaw

The GIGABYTE Control Center is vulnerable to an arbitrary file-write flaw that could allow a remote, unauthenticated attacker to access files on vulnerable hosts. [...]

BleepingComputer
MEDIUMVulnerability

The Forgotten Endpoint: Security Risks of Dormant Devices

Technology Talk: That forgotten notebook holds plenty of secrets to enterprise access.

Dark Reading
LOWVulnerability

Claude AI finds Vim, Emacs RCE bugs that trigger on file open

Vulnerabilities in the Vim and GNU Emacs text editors, discovered using simple prompts with the Claude assistant, allow remote code execution simply by opening a file. [...]

BleepingComputer
HIGHRansomware

Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure

TeamPCP continues its string of supply chain attacks, and announces a partnership with Vect ransomware group. The post Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure appeared first on Unit 42 .

CVE-2025-55182
Unit 42 (Palo Alto)
MEDIUMVulnerability

Axios NPM Package Compromised in Precision Attack

The NPM package for Axios, a popular JavaScript HTTP client library, was briefly compromised this week, possibly by North Korean threat actors.

Dark Reading
LOWSupply Chain

Attackers trojanize Axios HTTP library in highest-impact npm supply chain attack

Attackers compromised the npm account of the lead maintainer of Axios, a widely used JavaScript HTTP client library, and used it to publish malicious versions of the package that deployed a cross-platform remote access trojan on developer machines. The incident represents the highest-impact npm supply chain attack on record given Axios’ approximately 100 million weekly downloads and its presence i

CSO Online
MEDIUMVulnerability

Google's Vertex AI Is Over-Privileged. That's a Problem

Palo Alto Networks researchers show how attackers could exploit AI agents on Google's Vertex AI to steal data and break into restricted cloud infrastructure.

Dark Reading
MEDIUMVulnerability

TeamPCP Breaches Cloud, SaaS Instances With Stolen Credentials

The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly to compromised credentials.

Dark Reading
MEDIUMVulnerability

GCP-2026-014

[object Object]

Google Cloud Security
MEDIUMVulnerability

GCP-2026-010

[object Object]

Google Cloud Security
MEDIUMVulnerability

GCP-2026-011

[object Object]

Google Cloud Security
MEDIUMVulnerability

GCP-2026-007

[object Object]

Google Cloud Security
MEDIUMVulnerability

GCP-2026-003

[object Object]

Google Cloud Security
MEDIUMVulnerability

GCP-2026-013

[object Object]

Google Cloud Security
MEDIUMVulnerability

GCP-2026-009

[object Object]

Google Cloud Security
MEDIUMVulnerability

GCP-2026-005

[object Object]

Google Cloud Security
MEDIUMVulnerability

GCP-2026-016

[object Object]

Google Cloud Security
MEDIUMVulnerability

GCP-2026-008

[object Object]

Google Cloud Security
MEDIUMVulnerability

GCP-2026-006

[object Object]

Google Cloud Security
MEDIUMVulnerability

GCP-2026-002

[object Object]

Google Cloud Security
MEDIUMVulnerability

GCP-2026-015

[object Object]

Google Cloud Security
MEDIUMVulnerability

GCP-2026-004

[object Object]

Google Cloud Security
MEDIUMVulnerability

GCP-2026-012

[object Object]

Google Cloud Security
CRITICALMalware

5-month-old F5 BIG-IP DoS bug becomes critical RCE exploited in the wild

A vulnerability misclassified five months ago as a denial-of-service issue in F5 BIG-IP Access Policy Manager (APM) turned out to be a critical pre-authentication remote code execution flaw that is now under active exploitation. Hackers are using it to deploy a persistent malware program that runs with root privileges. The CVE-2025-53521 vulnerability was first disclosed in October 2025 as a DoS i

CVE-2025-53521
CSO Online
MEDIUMVulnerability

Android Developer Verification Rollout Begins Ahead of September Enforcement

Google on Monday said it's officially rolling out Android developer verification to all developers to combat the problem of bad actors distributing harmful apps while "hiding behind anonymity." The development comes ahead of a planned verification mandate that goes into effect in Brazil, Indonesia, Singapore, and Thailand this September, before it expands globally next year. As part of this

The Hacker News
CRITICALZero DayExploited

Critical Zero-Day in Palo Alto PAN-OS Firewalls Under Active Mass Exploitation

A critical unauthenticated RCE in PAN-OS GlobalProtect is being mass exploited. Over 25,000 devices vulnerable. CISA issues emergency directive.

CVE-2026-0015PAN-OS 11.1
Palo Alto Networks PSIRT
MEDIUMSupply Chain

Cisco source code stolen in Trivy-linked dev environment breach

Cisco has suffered a cyberattack after threat actors used stolen credentials from the recent Trivy supply chain attack to breach its internal development environment and steal source code belonging to the company and its customers. [...]

BleepingComputer
HIGHRansomware

Attack on axios software developer tool threatens widespread compromises

Researchers at numerous firms are sounding warnings about the supply-chain attack on an open-source project with 100 million weekly downloads. The post Attack on axios software developer tool threatens widespread compromises appeared first on CyberScoop .

CyberScoop
CRITICALZero Day

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

A high-severity security flaw in the TrueConf client video conferencing software has been exploited in the wild as a zero-day as part of a campaign targeting government entities in Southeast Asia dubbed TrueChaos. The vulnerability in question is CVE-2026-3502 (CVSS score: 7.8), a lack of integrity check when fetching application update code, allowing an attacker to distribute a tampered update,

CVE-2026-3502
The Hacker News
MEDIUMVulnerability

Censys Raises $70 Million for Internet Intelligence Platform

The latest funding round brings the total venture capital investment in Censys to $149 million. The post Censys Raises $70 Million for Internet Intelligence Platform appeared first on SecurityWeek .

SecurityWeek
MEDIUMVulnerability

Maryland Man Charged Over $53m Uranium Finance Crypto Hack

Maryland man accused of $53m Uranium Finance hack, exploited smart contract flaws, laundered funds

Infosecurity Magazine
MEDIUMVulnerability

AI and Quantum Are Forcing a Rethink of Digital Trust

In a conversation with Dark Reading’s Terry Sweeney, DigiCert CEO Amit Sinha explains how AI-driven identities and quantum threats are reshaping the foundations of digital trust.

Dark Reading
CRITICALVulnerability

NVD CRITICAL: CVE-2026-34532 — Parse Server is an open source backend that can be deployed to any infrastructur...

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.67 and 9.7.0-alpha.11, an attacker can bypass Cloud Function validator access controls by appending "prototype.constructor" to the function name in the URL. When a Cloud Function handler is declared using the function keyword and its validator is a plain object or arrow fun

CVE-2026-34532
NIST NVD
CRITICALVulnerability

NVD Critical: CVE-2026-34162 — FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, the FastGPT...

FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, the FastGPT HTTP tools testing endpoint (/api/core/app/httpTools/runTool) is exposed without any authentication. This endpoint acts as a full HTTP proxy — it accepts a user-supplied baseUrl, toolPath, HTTP method, custom headers, and body, then makes a server-side HTTP request and returns the complete response to the caller. This

CVE-2026-34162
NIST NVD
MEDIUMVulnerability

How to Categorize AI Agents and Prioritize Risk

AI agent risk isn't equal, it scales with access to systems and level of autonomy. Token Security explains how CISOs should categorize agents and prioritize what to secure first. [...]

BleepingComputer
MEDIUMVulnerability

Phantom Project Bundles Infostealer, Crypter and RAT For Sale

Phantom Stealer .NET harvests browser credentials, cookies, cards, sessions, as stealer-as-a-service

Infosecurity Magazine
HIGHRansomware

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack

<div class="block-paragraph_advanced"><p>Written by: Austin Larsen, Dima Lenz, Adrian Hernandez, Tyler McLellan, Christopher Gardner, Ashley Zaya, Michael Rudden, Mon Liclican</p> <hr/></div> <div class="block-paragraph_advanced"><h3><span style="vertical-align: baseline;">Introduction</span><strong style="vertical-align: baseline;"> </strong></h3> <p><span style="vertical-align: baseline;">Google

Mandiant
MEDIUMMalware

Hackers compromise Axios npm package to drop cross-platform malware

Hackers hijacked the npm account of the Axios package, a JavaScript HTTP client with 100M+ weekly downloads, to deliver remote access trojans to Linux, Windows, and macOS systems. [...]

BleepingComputer
HIGHRansomware

Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations

Iranian APTs are blurring the lines between state-sponsored and cybercriminal activities to target high-impact US organizations.

Dark Reading
LOWVulnerability

Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts

Cybersecurity researchers have disclosed a security "blind spot" in Google Cloud's Vertex AI platform that could allow artificial intelligence (AI) agents to be weaponized by an attacker to gain unauthorized access to sensitive data and compromise an organization's cloud environment. According to Palo Alto Networks Unit 42, the issue relates to how the Vertex AI permission model can be misused

The Hacker News
MEDIUMVulnerability

ChatGPT Security Issue Enabled Data Theft via Single Prompt

OpenAI has patched vulnerability, which Check Point said was because of a DNS loophole

Infosecurity Magazine
CRITICALRansomware

Initial Access Brokers have Shifted to High-Value Targets and Premium Pricing

Initial Access Brokers (IABs) are a key component of the cybercrime ecosystem, offering hassle-free building blocks for ransomware, data theft, and extortion. Rapid7’s analysis of H2 2025 activity across five major forums grants fresh insight into a power balance shift toward initial access sales from newer marketplaces, such as RAMP and DarkForums. Higher asking prices and more focus on high-valu

CVE-2025-61882
Rapid7
CRITICALVulnerability

NVD Critical: CVE-2026-32917 — OpenClaw before 2026.3.13 contains a remote command injection vulnerability in t...

OpenClaw before 2026.3.13 contains a remote command injection vulnerability in the iMessage attachment staging flow that allows attackers to execute arbitrary commands on configured remote hosts. The vulnerability exists because unsanitized remote attachment paths containing shell metacharacters are passed directly to the SCP remote operand without validation, enabling command execution when remot

CVE-2026-32917
NIST NVD
CRITICALVulnerability

NVD Critical: CVE-2026-32916 — OpenClaw versions 2026.3.7 before 2026.3.11 contain an authorization bypass vuln...

OpenClaw versions 2026.3.7 before 2026.3.11 contain an authorization bypass vulnerability where plugin subagent routes execute gateway methods through a synthetic operator client with broad administrative scopes. Remote unauthenticated requests to plugin-owned routes can invoke runtime.subagent methods to perform privileged gateway actions including session deletion and agent execution.

CVE-2026-32916
NIST NVD
HIGHRansomware

TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets

TeamPCP is exploring ways to monetize the secrets harvested during supply chain attacks, with identified ties to the Lapsus$ and Vect ransomware gangs

Infosecurity Magazine
LOWSupply Chain

OpenAI patches twin leaks as Codex slips and ChatGPT spills

OpenAI has fixed two flaws in its AI stack that could allow AI agents to move sensitive data in unintended ways. The issues, disclosed by researchers at BeyondTrust and Check Point Research, affect the OpenAI Codex coding agent and ChatGPT’s code execution environment, respectively. One enabled GitHub token theft through command injection, while the other exposed a hidden channel for silently leak

CSO Online
MEDIUMVulnerability

Microsoft fixes Outlook Classic crashes caused by Teams Meeting add-in

​Microsoft has resolved a known issue that rendered the classic Outlook email client unusable for users who enabled the Microsoft Teams Meeting Add-in. [...]

BleepingComputer
CRITICALPhishing

PX4 Autopilot

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-090-02.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could allow an attacker with access to the MAVLink interface to execute arbitrary shell commands without cryptographic authentication.</strong></p> <p>The following versions of PX4 Autopil

CVE-2026-1579
CISA Advisories
CRITICALVulnerability

Anritsu Remote Spectrum Monitor

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-090-01.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could allow attackers with network access to alter operational settings, obtain sensitive signal data, or disrupt device availability.</strong></p> <p>The following versions of Anritsu Rem

CVE-2026-3356
CISA Advisories
MEDIUMVulnerability

The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority

The cybersecurity landscape is accelerating at an unprecedented rate. What is emerging is not simply a rise in the number of vulnerabilities or tools, but a dramatic increase in speed. Speed of attack, speed of exploitation, and speed of change across modern environments. This is the defining challenge of the new era of digital warfare: the weaponization of Artificial Intelligence. Threat actors

The Hacker News
MEDIUMMalware

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

Chinese-speaking users are the target of an active campaign that uses typosquatted domains impersonating trusted software brands to deliver a previously undocumented remote access trojan named AtlasCross RAT. "The operation covers VPN clients, encrypted messengers, video conferencing tools, cryptocurrency trackers, and e-commerce applications, with eleven confirmed delivery domains impersonating

The Hacker News
HIGHData Breach

Employee Data Breaches Surge to Seven-Year High

Analysis from law firm Nockolds suggests non-cyber incidents are driving up employee data breaches

Infosecurity Magazine
MEDIUMMalware

Double Agents: Exposing Security Blind Spots in GCP Vertex AI

Unit 42 uncovers a "double agent" flaw in Google Cloud's Vertex AI, demonstrating how overprivileged AI agents can compromise cloud environments. The post Double Agents: Exposing Security Blind Spots in GCP Vertex AI appeared first on Unit 42 .

Unit 42 (Palo Alto)
HIGHRansomware

Ransomware in 2025: Blending in is the strategy

A summary of the top ransomware trends from the Talos 2025 Year in Review, with a focus on identity, attacker tactics, and practical defenses.

Cisco Talos
CRITICALZero DayExploited

UNC3886 Deploys Firmware Rootkit on Juniper MX Routers via Zero-Day

UNC3886 exploits Juniper Junos zero-day to deploy firmware-level rootkits on MX-series routers. Implant survives software upgrades and factory resets.

CVE-2026-29001Juniper MX Series
Mandiant
CRITICALZero Day

8 ways to bolster your security posture on the cheap

As every CISO knows, maintaining a strong cybersecurity posture is costly. What’s not so well known is that there are many ways cybersecurity can be enhanced with the help of relatively trivial investments. Simply by thinking creatively, a security leader can substantially boost enterprise protection at a minimal cost. Could your organization benefit from some extra low-cost protection? If so, her

CSO Online
HIGHRansomware

The external pressures redefining cybersecurity risk

Over the last four years, I’ve watched organizations get blindsided by threats that originated in a third-party network. More than 35% of data breaches are caused by a compromised vendor or partner, not by any failure in the organization’s controls. While many organizations know that the biggest threats to their security come from forces entirely outside their control, that risk is accelerating th

CSO Online
MEDIUMVulnerability

NCSC Urges Immediate Patching of F5 BIG-IP Bug

The National Cyber Security Centre wants UK firms to patch CVE-2025-53521

CVE-2025-53521
Infosecurity Magazine
MEDIUMVulnerability

This month in security with Tony Anscombe – March 2026 edition

The past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization needs a well-thought-out cyber-resilience plan

WeLiveSecurity (ESET)
HIGHRansomware

Fahndung nach Cyberkriminellen – 130 Firmen attackiert

130 Unternehmen und Institutionen gerieten ins Visier der Hacker. Tayler Derden | shutterstock.com Nach jahrelangen Cybercrime-Angriffen auf mehr als Hundert Unternehmen und Einrichtungen in Deutschland haben Ermittler zwei zentrale Verdächtige identifiziert. Der eine sei der mutmaßliche Kopf von zwei Hackergruppen, der andere der mutmaßliche Programmierer der von diesen Gruppen genutzten Schadsof

CSO Online
MEDIUMSupply Chain

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

The popular HTTP client known as Axios has suffered a supply chain attack after two newly published versions of the npm package introduced a malicious dependency that delivers a trojan capable of targeting Windows, macOS, and Linux systems. Versions 1.14.1 and 0.30.4 of Axios have been found to inject "plain-crypto-js" version 4.2.1 as a fake dependency. According to StepSecurity, the two

The Hacker News
CRITICALVulnerability

NVD Critical: CVE-2026-3300 — The Everest Forms Pro plugin for WordPress is vulnerable to Remote Code Executio...

The Everest Forms Pro plugin for WordPress is vulnerable to Remote Code Execution via PHP Code Injection in all versions up to, and including, 1.9.12. This is due to the Calculation Addon's process_filter() function concatenating user-submitted form field values into a PHP code string without proper escaping before passing it to eval(). The sanitize_text_field() function applied to input does not

CVE-2026-3300
NIST NVD
CRITICALVulnerability

NVD Critical: CVE-2026-30880 — baserCMS is a website development framework. Prior to version 5.2.3, baserCMS ha...

baserCMS is a website development framework. Prior to version 5.2.3, baserCMS has an OS command injection vulnerability in the installer. This issue has been patched in version 5.2.3.

CVE-2026-30880
NIST NVD
CRITICALVulnerability

NVD Critical: CVE-2026-27697 — baserCMS is a website development framework. Prior to version 5.2.3, baserCMS ha...

baserCMS is a website development framework. Prior to version 5.2.3, baserCMS has a SQL injection vulnerability in blog posts. This issue has been patched in version 5.2.3.

CVE-2026-27697
NIST NVD
CRITICALRansomware

Fortinet hit by another exploited cybersecurity flaw

Yet another critical flaw in a Fortinet product has come to light as attackers continue to target the company, this time by actively exploiting a critical SQL injection vulnerability in the cybersecurity company’s management server. The vulnerability, ( CVE-2026-21643 ), allows unauthenticated threat actors to execute arbitrary code on unpatched systems via specifically-crafted HTTP requests. Thes

CVE-2026-21643
CSO Online
CRITICALVulnerability

NVD Critical: CVE-2026-4257 — The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side ...

The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side Template Injection (SSTI) leading to Remote Code Execution (RCE) in all versions up to, and including, 1.7.36. This is due to the plugin using the Twig `Twig_Loader_String` template engine without sandboxing, combined with the `cfsPreFill` prefill functionality that allows unauthenticated users to inject arbitrary Twig

CVE-2026-4257
NIST NVD
MEDIUMMalware

AI-Powered 'DeepLoad' Malware Steals Credentials, Evades Detection

The massive amount of junk code that hides the malware's logic from security scans was almost certainly generated by AI, researchers say.

Dark Reading
CRITICALVulnerability

NVD Critical: CVE-2026-33026 — Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3....

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.4, the nginx-ui backup restore mechanism allows attackers to tamper with encrypted backup archives and inject malicious configuration during restoration. This issue has been patched in version 2.3.4.

CVE-2026-33026
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-28505 — Tautulli is a Python based monitoring and tracking tool for Plex Media Server. P...

Tautulli is a Python based monitoring and tracking tool for Plex Media Server. Prior to version 2.17.0, the str_eval() function in notification_handler.py implements a sandboxed eval() for notification text templates. The sandbox attempts to restrict callable names by inspecting code.co_names of the compiled code object. However, co_names only contains names from the outer code object. When a lamb

CVE-2026-28505
NIST NVD
MEDIUMVulnerability

AI-Driven Code Surge Is Forcing a Rethink of AppSec

In a conversation with Dark Reading’s Terry Sweeney, Black Duck CEO Jason Schmitt explains how AI is reshaping application security and why it must evolve to keep pace.

Dark Reading
MEDIUMMalware

Researchers say credential-stealing campaign used AI to build evasion ‘at every stage’

DeepLoad logs keystrokes, buries details behind reams of AI-generated code, and re-infect hosts days after being blocked, according to ReliaQuest. The post Researchers say credential-stealing campaign used AI to build evasion ‘at every stage’ appeared first on CyberScoop .

CyberScoop
MEDIUMVulnerability

F5 BIG-IP Vulnerability Reclassified as RCE, Under Exploitation

CVE-2025-53521 was initially disclosed in October as a high-severity denial-of-service (DoS) flaw, but new information has revealed the bug is actually much more dangerous.

CVE-2025-53521
Dark Reading
CRITICALVulnerability

NVD Critical: CVE-2026-33030 — Nginx UI is a web user interface for the Nginx web server. In versions 2.3.3 and...

Nginx UI is a web user interface for the Nginx web server. In versions 2.3.3 and prior, Nginx-UI contains an Insecure Direct Object Reference (IDOR) vulnerability that allows any authenticated user to access, modify, and delete resources belonging to other users. The application's base Model struct lacks a user_id field, and all resource endpoints perform queries by ID without verifying user owner

CVE-2026-33030
NIST NVD
LOWVulnerability

OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability

A previously unknown vulnerability in OpenAI ChatGPT allowed sensitive conversation data to be exfiltrated without user knowledge or consent, according to new findings from Check Point. "A single malicious prompt could turn an otherwise ordinary conversation into a covert exfiltration channel, leaking user messages, uploaded files, and other sensitive content," the cybersecurity company said in

The Hacker News
LOWVulnerability

Red Teaming in 2026: What to Expect at our 2026 Global Cybersecurity Summit

Red teaming has always played a role in testing defenses, but in 2026 its role is changing. Security teams are no longer asking whether an attacker can get in. That question has already been answered. The real challenge is whether teams can detect, validate, and respond before an incident escalates. That shift sits at the center of this year’s Rapid7 Global Cybersecurity Summit , taking place on M

Rapid7
MEDIUMVulnerability

Manufacturing &amp; Healthcare Share Struggles with Passwords

The two key economic sectors struggle with security for a reason: Many insiders view access management as a roadblock, while attackers see it as a way in.

Dark Reading
MEDIUMApt

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

A new campaign has leveraged the ClickFix social engineering tactic as a way to distribute a previously undocumented malware loader referred to as DeepLoad. "It likely uses AI-assisted obfuscation and process injection to evade static scanning, while credential theft starts immediately and captures passwords and sessions even if the primary loader is blocked," ReliaQuest researchers Thassanai

The Hacker News
CRITICALVulnerability

Storm Brews Over Critical, No-Click Telegram Flaw

The vulnerability, which is allegedly triggered by a corrupted sticker in the messaging app, received a 9.8 CVSS score, but Telegram denies it exists.

Dark Reading
MEDIUMMalware

Cybercriminals Exploit Tax Season With New Phishing Tactics

Tax-season phishing floods deliver RMM malware, credential theft, BEC and tax-form scams

Infosecurity Magazine
MEDIUMVulnerability

Optimizing Risk Discovery and Remediation with Qualys Gateway Service (QGS)

Unpatched vulnerabilities remain one of the largest drivers of cyber risk, accounting for&#160;nearly 60%&#160;of cyber compromises. Modern security programs are therefore measured not only by how quickly they discover risk, but also by how efficiently they remediate it. As organizations scale vulnerability management and patching operations, network efficiency, bandwidth utilization, and connecti

Qualys Blog
MEDIUMVulnerability

Lloyds IT Glitch Exposed Data of Nearly 500,000 Banking Customers

Lloyds app glitch exposed up to 447,936 customers’ transactions and personal data during update

Infosecurity Magazine
MEDIUMVulnerability

⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

Some weeks are loud. This one was quieter but not in a good way. Long-running operations are finally hitting courtrooms, old attack methods are showing up in new places, and research that stopped being theoretical right around the time defenders stopped paying attention. There's a bit of everything this week. Persistence plays, legal wins, influence ops, and at least one thing that looks boring

The Hacker News
LOWVulnerability

3 SOC Process Fixes That Unlock Tier 1 Productivity

What is really slowing Tier 1 down: the threat itself or the process around it? In many SOCs, the biggest delays do not come from the threat alone. They come from fragmented workflows, manual triage steps, and limited visibility early in the investigation. Fixing those process gaps can help Tier 1 move faster, reduce unnecessary escalations, and improve how the entire SOC responds under pressure

The Hacker News
MEDIUMPhishing

Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels

Cybersecurity researchers have discovered a remote access toolkit of Russian-origin that's distributed via malicious Windows shortcut (LNK) files that are disguised as private key folders. The CTRL toolkit, according to Censys, is custom-built using .NET and includes various executables" to facilitate credential phishing, keylogging, Remote Desktop Protocol (RDP) hijacking, and reverse tunneling

The Hacker News
MEDIUMMalware

DeepLoad Malware Combines ClickFix With AI-Generated Code to Avoid Detection

Researchers at ReliaQuest warn of persistent malware campaign targeting enterprise credentials

Infosecurity Magazine
LOWVulnerability

The State of Secrets Sprawl 2026: 9 Takeaways for CISOs

Secrets sprawl isn't slowing down: in 2025, it accelerated faster than most security teams anticipated. GitGuardian's State of Secrets Sprawl 2026 report analyzed billions of commits across public GitHub and uncovered 29 million new hardcoded secrets in 2025 alone, a 34% increase year over year and the largest single-year jump ever recorded. This year's findings reveal three core trends: AI has

The Hacker News
CRITICALVulnerability

Critical Citrix NetScaler Vulnerability Exploited in the Wild

Researchers from watchTowr and Defused have found evidence that attackers are actively exploiting CVE-2026-3055, a critical NetScaler vulnerability

CVE-2026-3055
Infosecurity Magazine
MEDIUMVulnerability

ICO Fines UK Nuisance Call Scammers £100,000

The UK Information Commissioner’s Office has handed a £100,000 fine to Birmingham-based TMAC

Infosecurity Magazine
HIGHData Breach

European Commission Confirms Cloud Data Breach

The European Commission has revealed details of a data breach impacting its AWS infrastructure

Infosecurity Magazine
MEDIUMMalware

Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign

Three threat activity clusters aligned with China have targeted a government organization in Southeast Asia as part of what has been described as a "complex and well-resourced operation." The campaigns have led to the deployment of various malware families, including HIUPAN (aka USBFect, MISTCLOAK, or U2DiskWatch), PUBLOAD, EggStremeFuel (aka RawCookie), EggStremeLoader (aka Gorem RAT), MASOL

The Hacker News
HIGHVulnerability

CISA KEV: Citrix NetScaler — Citrix NetScaler Out-of-Bounds Read Vulnerability

Citrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread.

CVE-2026-3055Citrix NetScaler
CISA KEV
CRITICALVulnerability

NVD CRITICAL: CVE-2026-0558 — A vulnerability in parisneo/lollms, up to and including version 2.2.0, allows un...

A vulnerability in parisneo/lollms, up to and including version 2.2.0, allows unauthenticated users to upload and process files through the `/api/files/extract-text` endpoint. This endpoint does not enforce authentication, unlike other file-related endpoints, and lacks the `Depends(get_current_active_user)` dependency. This issue can lead to denial of service (DoS) through resource exhaustion, inf

CVE-2026-0558
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-32987 — OpenClaw before 2026.3.13 allows bootstrap setup codes to be replayed during dev...

OpenClaw before 2026.3.13 allows bootstrap setup codes to be replayed during device pairing verification in src/infra/device-bootstrap.ts. Attackers can verify a valid bootstrap code multiple times before approval to escalate pending pairing scopes, including privilege escalation to operator.admin.

CVE-2026-32987
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-32975 — OpenClaw before 2026.3.12 contains a weak authorization vulnerability in Zalouse...

OpenClaw before 2026.3.12 contains a weak authorization vulnerability in Zalouser allowlist mode that matches mutable group display names instead of stable group identifiers. Attackers can create groups with identical names to allowlisted groups to bypass channel authorization and route messages from unintended groups to the agent.

CVE-2026-32975
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-32974 — OpenClaw before 2026.3.12 contains an authentication bypass vulnerability in Fei...

OpenClaw before 2026.3.12 contains an authentication bypass vulnerability in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing acceptance of forged events. Unauthenticated network attackers can inject forged Feishu events and trigger downstream tool execution by reaching the webhook endpoint.

CVE-2026-32974
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-32973 — OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability where ...

OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability where matchesExecAllowlistPattern improperly normalizes patterns with lowercasing and glob matching that overmatches on POSIX paths. Attackers can exploit the ? wildcard matching across path segments to execute commands or paths not intended by operators.

CVE-2026-32973
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-32924 — OpenClaw before 2026.3.12 contains an authorization bypass vulnerability where F...

OpenClaw before 2026.3.12 contains an authorization bypass vulnerability where Feishu reaction events with omitted chat_type are misclassified as p2p conversations instead of group chats. Attackers can exploit this misclassification to bypass groupAllowFrom and requireMention protections in group chat reaction-derived events.

CVE-2026-32924
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-32922 — OpenClaw before 2026.3.11 contains a privilege escalation vulnerability in devic...

OpenClaw before 2026.3.11 contains a privilege escalation vulnerability in device.token.rotate that allows callers with operator.pairing scope to mint tokens with broader scopes by failing to constrain newly minted scopes to the caller's current scope set. Attackers can obtain operator.admin tokens for paired devices and achieve remote code execution on connected nodes via system.run or gain unaut

CVE-2026-32922
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-5035 — A vulnerability has been found in code-projects Accounting System 1.0. This affe...

A vulnerability has been found in code-projects Accounting System 1.0. This affects an unknown part of the file /view_work.php of the component Parameter Handler. Such manipulation of the argument en_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2026-5035
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-5034 — A flaw has been found in code-projects Accounting System 1.0. Affected by this i...

A flaw has been found in code-projects Accounting System 1.0. Affected by this issue is some unknown functionality of the file /edit_costumer.php of the component Parameter Handler. This manipulation of the argument cos_id causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.

CVE-2026-5034
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-5033 — A vulnerability was detected in code-projects Accounting System 1.0. Affected by...

A vulnerability was detected in code-projects Accounting System 1.0. Affected by this vulnerability is an unknown functionality of the file /view_costumer.php of the component Parameter Handler. The manipulation of the argument cos_id results in sql injection. The attack may be performed from remote. The exploit is now public and may be used.

CVE-2026-5033
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-5030 — A vulnerability has been found in Totolink NR1800X 9.1.0u.6279_B20210910. This i...

A vulnerability has been found in Totolink NR1800X 9.1.0u.6279_B20210910. This issue affects the function NTPSyncWithHost of the file /cgi-bin/cstecgi.cgi of the component Telnet Service. The manipulation of the argument host_time leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVE-2026-5030
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-5020 — A vulnerability was detected in Totolink A3600R 4.1.2cu.5182_B20201102. Affected...

A vulnerability was detected in Totolink A3600R 4.1.2cu.5182_B20201102. Affected by this issue is the function setNoticeCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. The manipulation of the argument NoticeUrl results in command injection. The attack may be launched remotely. The exploit is now public and may be used.

CVE-2026-5020
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-4851 — GRID::Machine versions through 0.127 for Perl allows arbitrary code execution vi...

GRID::Machine versions through 0.127 for Perl allows arbitrary code execution via unsafe deserialization. GRID::Machine provides Remote Procedure Calls (RPC) over SSH for Perl. The client connects to remote hosts to execute code on them. A compromised or malicious remote host can execute arbitrary code back on the client through unsafe deserialization in the RPC protocol. read_operation() in lib

CVE-2026-4851
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-5019 — A security vulnerability has been detected in code-projects Simple Food Order Sy...

A security vulnerability has been detected in code-projects Simple Food Order System 1.0. Affected by this vulnerability is an unknown functionality of the file all-orders.php of the component Parameter Handler. The manipulation of the argument Status leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

CVE-2026-5019
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-5018 — A weakness has been identified in code-projects Simple Food Order System 1.0. Af...

A weakness has been identified in code-projects Simple Food Order System 1.0. Affected is an unknown function of the file register-router.php of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

CVE-2026-5018
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-5017 — A security flaw has been discovered in code-projects Simple Food Order System 1....

A security flaw has been discovered in code-projects Simple Food Order System 1.0. This impacts an unknown function of the file /all-tickets.php of the component Parameter Handler. Performing a manipulation of the argument Status results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.

CVE-2026-5017
NIST NVD
CRITICALVulnerability

Critical RCE Chain in Microsoft Azure Kubernetes Service Exposes Cloud Workloads

Three chained vulnerabilities in Azure AKS allow container escape and host node RCE. 40% of AKS clusters were vulnerable before patching.

CVE-2026-21345CVE-2026-21346Azure Kubernetes Service
Microsoft MSRC / Wiz Research
CRITICALVulnerabilityPOC

NVD CRITICAL: CVE-2026-3256 — HTTP::Session versions through 0.53 for Perl defaults to using insecurely genera...

HTTP::Session versions through 0.53 for Perl defaults to using insecurely generated session ids. HTTP::Session defaults to using HTTP::Session::ID::SHA1 to generate session ids using a SHA-1 hash seeded with the built-in rand function, the high resolution epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Da

CVE-2026-3256
NIST NVD
CRITICALVulnerabilityPOC

NVD CRITICAL: CVE-2025-15604 — Amon2 versions before 6.17 for Perl use an insecure random_string implementation...

Amon2 versions before 6.17 for Perl use an insecure random_string implementation for security functions. In versions 6.06 through 6.16, the random_string function will attempt to read bytes from the /dev/urandom device, but if that is unavailable then it generates bytes by concatenating a SHA-1 hash seeded with the built-in rand() function, the PID, and the high resolution epoch time. The PID wi

CVE-2025-15604
NIST NVD
MEDIUMVulnerability

Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack

Threat actors with ties to Iran successfully broke into the personal email account of Kash Patel, the director of the U.S. Federal Bureau of Investigation (FBI), and leaked a cache of photos and other documents to the internet. Handala Hack Team, which carried out the breach, said on its website that Patel "will now find his name among the list of successfully hacked victims." In a statement

The Hacker News
HIGHVulnerability

NVD HIGH: CVE-2026-5000 — A vulnerability was detected in PromtEngineer localGPT up to 4d41c7d1713b16b216d...

A vulnerability was detected in PromtEngineer localGPT up to 4d41c7d1713b16b216d8e062e51a5dd88b20b054. Impacted is the function LocalGPTHandler of the file backend/server.py of the component API Endpoint. The manipulation of the argument BaseHTTPRequestHandler results in missing authentication. The attack can be executed remotely. This product implements a rolling release for ongoing delivery, whi

CVE-2026-5000
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-4998 — A weakness has been identified in Sinaptik AI PandasAI up to 3.0.0. This vulnera...

A weakness has been identified in Sinaptik AI PandasAI up to 3.0.0. This vulnerability affects the function CodeExecutor.execute of the file pandasai/core/code_execution/code_executor.py of the component Chat Message Handler. Executing a manipulation can lead to code injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The

CVE-2026-4998
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-4996 — A vulnerability was identified in Sinaptik AI PandasAI up to 0.1.4. Affected by ...

A vulnerability was identified in Sinaptik AI PandasAI up to 0.1.4. Affected by this issue is the function delete_question_and_answers/delete_docs/update_question_answer/update_docs/get_relevant_question_answers_by_id/get_relevant_docs_by_id of the file extensions/ee/vectorstores/lancedb/pandasai_lancedb/lancedb.py of the component pandasai-lancedb Extension. Such manipulation leads to sql injecti

CVE-2026-4996
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2018-25225 — SIPP 3.3 contains a stack-based buffer overflow vulnerability that allows local ...

SIPP 3.3 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbitrary code by supplying malicious input in the configuration file. Attackers can craft a configuration file with oversized values that overflow a stack buffer, overwriting the return address and executing arbitrary code through return-oriented programming gadgets.

CVE-2018-25225
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2018-25224 — PMS 0.42 contains a stack-based buffer overflow vulnerability that allows local ...

PMS 0.42 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbitrary code by supplying malicious values in the configuration file. Attackers can craft configuration files with oversized input that overflows the stack buffer and execute shell commands via return-oriented programming gadgets.

CVE-2018-25224
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2018-25223 — Crashmail 1.6 contains a stack-based buffer overflow vulnerability that allows r...

Crashmail 1.6 contains a stack-based buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending malicious input to the application. Attackers can craft payloads with ROP chains to achieve code execution in the application context, with failed attempts potentially causing denial of service.

CVE-2018-25223
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2018-25222 — SC v7.16 contains a stack-based buffer overflow vulnerability that allows local ...

SC v7.16 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying oversized input that exceeds buffer boundaries. Attackers can craft malicious input strings exceeding 1052 bytes to overwrite the instruction pointer and execute shellcode in the application context.

CVE-2018-25222
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2018-25221 — EChat Server 3.1 contains a buffer overflow vulnerability in the chat.ghp endpoi...

EChat Server 3.1 contains a buffer overflow vulnerability in the chat.ghp endpoint that allows remote attackers to execute arbitrary code by supplying an oversized username parameter. Attackers can send a GET request to chat.ghp with a malicious username value containing shellcode and ROP gadgets to achieve code execution in the application context.

CVE-2018-25221
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2018-25220 — Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows att...

Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of padding followed by a return-oriented programming chain to overwrite the instruction pointer and execute shell commands with application privileges.

CVE-2018-25220
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2017-20229 — MAWK 1.3.3-17 and prior contains a stack-based buffer overflow vulnerability tha...

MAWK 1.3.3-17 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting inadequate boundary checks on user-supplied input. Attackers can craft malicious input that overflows the stack buffer and execute a return-oriented programming chain to spawn a shell with application privileges.

CVE-2017-20229
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2017-20228 — Flat Assembler 1.71.21 contains a stack-based buffer overflow vulnerability that...

Flat Assembler 1.71.21 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying oversized input to the application. Attackers can craft malicious assembly input exceeding 5895 bytes to overwrite the instruction pointer and execute return-oriented programming chains for shell command execution.

CVE-2017-20228
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2017-20227 — JAD Java Decompiler 1.5.8e-1kali1 and prior contains a stack-based buffer overfl...

JAD Java Decompiler 1.5.8e-1kali1 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying overly long input that exceeds buffer boundaries. Attackers can craft malicious input passed to the jad command to overflow the stack and execute a return-oriented programming chain that spawns a shell.

CVE-2017-20227
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2017-20226 — Mapscrn 2.0.3 contains a stack-based buffer overflow vulnerability that allows l...

Mapscrn 2.0.3 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized input buffer. Attackers can craft a malicious buffer with junk data, return address, NOP instructions, and shellcode to overflow the stack and achieve code execution or denial of service.

CVE-2017-20226
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2017-20225 — TiEmu 2.08 and prior contains a stack-based buffer overflow vulnerability that a...

TiEmu 2.08 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting inadequate boundary checks on user-supplied input. Attackers can trigger the overflow through command-line arguments passed to the application, leveraging ROP gadgets to bypass protections and execute shellcode in the application context.

CVE-2017-20225
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2016-20049 — JAD 1.5.8e-1kali1 and prior contains a stack-based buffer overflow vulnerability...

JAD 1.5.8e-1kali1 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying oversized input that exceeds buffer boundaries. Attackers can craft malicious input strings exceeding 8150 bytes to overflow the stack, overwrite return addresses, and execute shellcode in the application context.

CVE-2016-20049
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2016-20048 — iSelect 1.4.0-2+b1 contains a local buffer overflow vulnerability that allows lo...

iSelect 1.4.0-2+b1 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized value to the -k/--key parameter. Attackers can craft a malicious argument containing a NOP sled, shellcode, and return address to overflow a 1024-byte stack buffer and gain code execution with user privileges.

CVE-2016-20048
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2016-20047 — EKG Gadu 1.9~pre+r2855-3+b1 contains a local buffer overflow vulnerability in th...

EKG Gadu 1.9~pre+r2855-3+b1 contains a local buffer overflow vulnerability in the username handling that allows local attackers to execute arbitrary code by supplying an oversized username string. Attackers can trigger the overflow in the strlcpy function by passing a crafted buffer exceeding 258 bytes to overwrite the instruction pointer and execute shellcode with user privileges.

CVE-2016-20047
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2016-20046 — zFTP Client 20061220+dfsg3-4.1 contains a buffer overflow vulnerability in the N...

zFTP Client 20061220+dfsg3-4.1 contains a buffer overflow vulnerability in the NAME parameter handling of FTP connections that allows local attackers to crash the application or execute arbitrary code. Attackers can supply an oversized NAME value exceeding the 80-byte buffer allocated in strcpy_chk to overwrite the instruction pointer and execute shellcode with user privileges.

CVE-2016-20046
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2016-20045 — HNB Organizer 1.9.18-10 contains a local buffer overflow vulnerability that allo...

HNB Organizer 1.9.18-10 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized argument to the -rc command-line parameter. Attackers can craft a malicious input string exceeding 108 bytes containing shellcode and a return address to overwrite the stack and achieve code execution.

CVE-2016-20045
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2016-20044 — PInfo 0.6.9-5.1 contains a local buffer overflow vulnerability that allows local...

PInfo 0.6.9-5.1 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized argument to the -m parameter. Attackers can craft a malicious input string with 564 bytes of padding followed by a return address to overwrite the instruction pointer and execute shellcode with user privileges.

CVE-2016-20044
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2016-20043 — NRSS RSS Reader 0.3.9-1 contains a stack buffer overflow vulnerability that allo...

NRSS RSS Reader 0.3.9-1 contains a stack buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized argument to the -F parameter. Attackers can craft a malicious input with 256 bytes of padding followed by a controlled EIP value to overwrite the return address and achieve code execution.

CVE-2016-20043
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2016-20042 — TRN 3.6-23 contains a stack buffer overflow vulnerability that allows local atta...

TRN 3.6-23 contains a stack buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized argument to the application. Attackers can craft a malicious command-line argument with 156 bytes of padding followed by a return address to overwrite the instruction pointer and execute shellcode with user privileges.

CVE-2016-20042
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2016-20041 — Yasr 0.6.9-5 contains a buffer overflow vulnerability that allows local attacker...

Yasr 0.6.9-5 contains a buffer overflow vulnerability that allows local attackers to crash the application or execute arbitrary code by supplying an oversized argument to the -p parameter. Attackers can invoke yasr with a crafted payload containing junk data, shellcode, and a return address to overwrite the stack and trigger code execution.

CVE-2016-20041
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2016-20040 — TiEmu 3.03-nogdb+dfsg-3 contains a buffer overflow vulnerability in the ROM para...

TiEmu 3.03-nogdb+dfsg-3 contains a buffer overflow vulnerability in the ROM parameter handling that allows local attackers to crash the application or execute arbitrary code. Attackers can supply an oversized ROM parameter to the tiemu command-line interface to overflow the stack buffer and overwrite the instruction pointer with malicious addresses.

CVE-2016-20040
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2016-20039 — Multi Emulator Super System 0.154-3.1 contains a buffer overflow vulnerability i...

Multi Emulator Super System 0.154-3.1 contains a buffer overflow vulnerability in the gamma parameter handling that allows local attackers to crash the application or execute arbitrary code. Attackers can supply an oversized gamma parameter value to overflow the stack buffer and overwrite the instruction pointer with a controlled address to achieve code execution.

CVE-2016-20039
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2016-20038 — yTree 1.94-1.1 contains a stack-based buffer overflow vulnerability that allows ...

yTree 1.94-1.1 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an excessively long argument to the application. Attackers can craft a malicious command-line argument containing shellcode and a return address to overwrite the stack and execute code in the application context.

CVE-2016-20038
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2016-20037 — xwpe 1.5.30a-2.1 and prior contains a stack-based buffer overflow vulnerability ...

xwpe 1.5.30a-2.1 and prior contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying overly long input strings that exceed buffer boundaries. Attackers can craft malicious command-line arguments with 262 bytes of junk data followed by shellcode to overwrite the instruction pointer and achieve code execution or denial of service.

CVE-2016-20037
NIST NVD
CRITICALVulnerability

Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug

A recently disclosed critical security flaw impacting Citrix NetScaler ADC and NetScaler Gateway is witnessing active reconnaissance activity, according to Defused Cyber and watchTowr. The vulnerability, CVE-2026-3055 (CVSS score: 9.3), refers to a case of insufficient input validation leading to memory overread, which an attacker could exploit to leak potentially sensitive information. Per

CVE-2026-3055
The Hacker News
MEDIUMApt

TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

Proofpoint has disclosed details of a targeted email campaign in which threat actors with ties to Russia are leveraging the recently disclosed DarkSword exploit kit to target iOS devices. The activity has been attributed with high confidence to the Russian state-sponsored threat group known as TA446, which is also tracked by the broader cybersecurity community under the monikers Callisto,

The Hacker News
HIGHVulnerability

NVD HIGH: CVE-2025-12886 — The Oxygen Theme theme for WordPress is vulnerable to Server-Side Request Forger...

The Oxygen Theme theme for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.0.8 via the laborator_calc_route AJAX action. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

CVE-2025-12886
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-4987 — The SureForms – Contact Form, Payment Form & Other Custom Form Builder plugin fo...

The SureForms – Contact Form, Payment Form & Other Custom Form Builder plugin for WordPress is vulnerable to Payment Amount Bypass in all versions up to, and including, 2.5.2. This is due to the create_payment_intent() function performing a payment validation solely based on the value of a user-controlled parameter. This makes it possible for unauthenticated attackers to bypass configured form pay

CVE-2026-4987
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-1679 — The eswifi socket offload driver copies user-provided payloads into a fixed buff...

The eswifi socket offload driver copies user-provided payloads into a fixed buffer without checking available space; oversized sends overflow `eswifi->buf`, corrupting kernel memory (CWE-120). Exploit requires local code that can call the socket send API; no remote attacker can reach it directly.

CVE-2026-1679
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-4248 — The Ultimate Member plugin for WordPress is vulnerable to Sensitive Information ...

The Ultimate Member plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.2. This is due to the '{usermeta:password_reset_link}' template tag being processed within post content via the '[um_loggedin]' shortcode, which generates a valid password reset token for the currently logged-in user viewing the page. This makes it possible for authen

CVE-2026-4248
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-33994 — Locutus brings stdlibs of other programming languages to JavaScript for educatio...

Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Starting in version 2.0.39 and prior to version 3.0.25, a prototype pollution vulnerability exists in the `parse_str` function of the npm package locutus. An attacker can pollute `Object.prototype` by overriding `RegExp.prototype.test` and then passing a crafted query string to `parse_str`, bypassing the

CVE-2026-33994
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-33993 — Locutus brings stdlibs of other programming languages to JavaScript for educatio...

Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to version 3.0.25, the `unserialize()` function in `locutus/php/var/unserialize` assigns deserialized keys to plain objects via bracket notation without filtering the `__proto__` key. When a PHP serialized payload contains `__proto__` as an array or object key, JavaScript's `__proto__` setter is inv

CVE-2026-33993
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-33941 — Handlebars provides the power necessary to let users build semantic templates. I...

Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, the Handlebars CLI precompiler (`bin/handlebars` / `lib/precompiler.js`) concatenates user-controlled strings — template file names and several CLI options — directly into the JavaScript it emits, without any escaping or sanitization. An attacker who can influence template filenames or C

CVE-2026-33941
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-27309 — Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free...

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE-2026-27309
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2019-25652 — UniFi Network Controller before version 5.10.22 and 5.11.x before 5.11.18 contai...

UniFi Network Controller before version 5.10.22 and 5.11.x before 5.11.18 contains an improper certificate verification vulnerability that allows adjacent network attackers to conduct man-in-the-middle attacks by presenting a false SSL certificate during SMTP connections. Attackers can intercept SMTP traffic and obtain credentials by exploiting the insecure SSL host verification mechanism in the S

CVE-2019-25652
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2019-25651 — Ubiquiti UniFi Network Controller prior to 5.10.12 (excluding 5.6.42), UAP FW pr...

Ubiquiti UniFi Network Controller prior to 5.10.12 (excluding 5.6.42), UAP FW prior to 4.0.6, UAP-AC, UAP-AC v2, and UAP-AC Outdoor FW prior to 3.8.17, USW FW prior to 4.0.6, USG FW prior to 4.4.34 uses AES-CBC encryption for device-to-controller communication, which contains cryptographic weaknesses that allow attackers to recover encryption keys from captured traffic. Attackers with adjacent net

CVE-2019-25651
NIST NVD
LOWVulnerability

Metasploit Wrap-Up 03/27/2026

Better NTLM Relaying Functionality This week’s release brings an improvement to the SMB NTLM relay server. In the past, it’s support has been expanded with modules for relaying to HTTP (ESC8), MSSQL and LDAP while still receiving connections over the humble SMB service. Prior to this release, clients required a key behavior in how they handled SMB’s STATUS_NETWORK_SESSION_EXPIRED error code, in or

CVE-2026-23767CVE-2025-12548
Rapid7
HIGHVulnerability

NVD HIGH: CVE-2026-4975 — A vulnerability has been found in Tenda AC15 15.03.05.19. This affects the funct...

A vulnerability has been found in Tenda AC15 15.03.05.19. This affects the function formSetCfm of the file /goform/setcfm of the component POST Request Handler. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVE-2026-4975
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-4974 — A flaw has been found in Tenda AC7 15.03.06.44. Affected by this issue is the fu...

A flaw has been found in Tenda AC7 15.03.06.44. Affected by this issue is the function fromSetSysTime of the file /goform/SetSysTimeCfg of the component POST Request Handler. Executing a manipulation of the argument Time can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.

CVE-2026-4974
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-34391 — Fleet is open source device management software. Prior to 4.81.1, a vulnerabilit...

Fleet is open source device management software. Prior to 4.81.1, a vulnerability in Fleet's Windows MDM command processing allows a malicious enrolled device to access MDM commands intended for other devices, potentially exposing sensitive configuration data such as WiFi credentials, VPN secrets, and certificate payloads across the entire Windows fleet. Version 4.81.1 patches the issue.

CVE-2026-34391
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-34388 — Fleet is open source device management software. Prior to 4.81.0, a denial-of-se...

Fleet is open source device management software. Prior to 4.81.0, a denial-of-service vulnerability in Fleet's gRPC Launcher endpoint allows an authenticated host to crash the entire Fleet server process by sending an unexpected log type value. The server terminates immediately, disrupting all connected hosts, MDM enrollments, and API consumers. Version 4.81.0 patches the issue.

CVE-2026-34388
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-33871 — Netty is an asynchronous, event-driven network application framework. In version...

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, a remote user can trigger a Denial of Service (DoS) against a Netty HTTP/2 server by sending a flood of `CONTINUATION` frames. The server's lack of a limit on the number of `CONTINUATION` frames, combined with a bypass of existing size-based mitigations using zero-byte frames,

CVE-2026-33871
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-34386 — Fleet is open source device management software. Prior to 4.81.0, a SQL injectio...

Fleet is open source device management software. Prior to 4.81.0, a SQL injection vulnerability in Fleet's MDM bootstrap package configuration allows an authenticated user with Team Admin or Global Admin privileges to modify arbitrary team configurations, exfiltrate sensitive data from the Fleet database, and inject arbitrary content into team configs via direct API calls. Version 4.81.0 patches t

CVE-2026-34386
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-29180 — Fleet is open source device management software. Prior to 4.81.1, a broken acces...

Fleet is open source device management software. Prior to 4.81.1, a broken access control vulnerability in Fleet's host transfer API allows a team maintainer to transfer hosts from any team into their own team, bypassing team isolation boundaries. Once transferred, the attacker gains full control over the stolen hosts, including the ability to execute scripts with root privileges. Version 4.81.1 p

CVE-2026-29180
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-26061 — Fleet is open source device management software. Prior to 4.81.0, Fleet containe...

Fleet is open source device management software. Prior to 4.81.0, Fleet contained multiple unauthenticated HTTP endpoints that read request bodies without enforcing a size limit. An unauthenticated attacker could exploit this behavior by sending large or repeated HTTP payloads, causing excessive memory allocation and resulting in a denial-of-service (DoS) condition. Version 4.81.0 patches the issu

CVE-2026-26061
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-26060 — Fleet is open source device management software. Prior to 4.81.0, a vulnerabilit...

Fleet is open source device management software. Prior to 4.81.0, a vulnerability in Fleet’s password management logic could allow previously issued password reset tokens to remain valid after a user changes their password. As a result, a stale password reset token could be reused to reset the account password even after a defensive password change. Version 4.81.0 patches the issue.

CVE-2026-26060
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2025-15617 — Wazuh version 4.12.0 contains an exposure vulnerability in GitHub Actions workfl...

Wazuh version 4.12.0 contains an exposure vulnerability in GitHub Actions workflow artifacts that allows attackers to extract the GITHUB_TOKEN from uploaded artifacts. Attackers can use the exposed token within a limited time window to perform unauthorized actions such as pushing malicious commits or altering release tags.

CVE-2025-15617
NIST NVD
MEDIUMVulnerability

Iranian hackers, Handala, claim to compromise FBI Director Kash Patel’s personal data

The FBI said it was aware of hackers targeting Patel’s personal email, and that no government information was taken. The post Iranian hackers, Handala, claim to compromise FBI Director Kash Patel’s personal data appeared first on CyberScoop .

CyberScoop
HIGHVulnerability

NVD HIGH: CVE-2026-33867 — WWBN AVideo is an open source video platform. In versions up to and including 26...

WWBN AVideo is an open source video platform. In versions up to and including 26.0, AVideo allows content owners to password-protect individual videos. The video password is stored in the database in plaintext — no hashing, salting, or encryption is applied. If an attacker gains read access to the database (via SQL injection, a database backup, or misconfigured access controls), they obtain all vi

CVE-2026-33867
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-33770 — WWBN AVideo is an open source video platform. In versions up to and including 26...

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `fixCleanTitle()` static method in `objects/category.php` constructs a SQL SELECT query by directly interpolating both `$clean_title` and `$id` into the query string without using prepared statements or parameterized queries. An attacker who can trigger category creation or renaming with a crafted title value c

CVE-2026-33770
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-33767 — WWBN AVideo is an open source video platform. In versions up to and including 26...

WWBN AVideo is an open source video platform. In versions up to and including 26.0, in `objects/like.php`, the `getLike()` method constructs a SQL query using a prepared statement placeholder (`?`) for `users_id` but directly concatenates `$this->videos_id` into the query string without parameterization. An attacker who can control the `videos_id` value (via a crafted request) can inject arbitrary

CVE-2026-33767
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-28369 — A flaw was found in Undertow. When Undertow receives an HTTP request where the f...

A flaw was found in Undertow. When Undertow receives an HTTP request where the first header line starts with one or more spaces, it incorrectly processes the request by stripping these leading spaces. This behavior, which violates HTTP standards, can be exploited by a remote attacker to perform request smuggling. Request smuggling allows an attacker to bypass security mechanisms, access restricted

CVE-2026-28369
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-28368 — A flaw was found in Undertow. This vulnerability allows a remote attacker to con...

A flaw was found in Undertow. This vulnerability allows a remote attacker to construct specially crafted requests where header names are parsed differently by Undertow compared to upstream proxies. This discrepancy in header interpretation can be exploited to launch request smuggling attacks, potentially bypassing security controls and accessing unauthorized resources.

CVE-2026-28368
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2025-15616 — Wazuh wazuh-agent and wazuh-manager versions 2.1.0 before 4.8.0 contain multiple...

Wazuh wazuh-agent and wazuh-manager versions 2.1.0 before 4.8.0 contain multiple shell injection and untrusted search path vulnerabilities that allow attackers to execute arbitrary commands through various components including logcollector configuration, maild SMTP server tags, and Kaspersky AR script parameters. Attackers can exploit these vulnerabilities by injecting malicious commands through c

CVE-2025-15616
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2025-15615 — Wazuh Manager authd service in wazuh-manager packages through version 4.7.3 cont...

Wazuh Manager authd service in wazuh-manager packages through version 4.7.3 contains an improper restriction of client-initiated SSL/TLS renegotiation vulnerability that allows remote attackers to cause a denial of service by sending excessive renegotiation requests. Attackers can exploit the lack of renegotiation limits to consume CPU resources and render the authd service unavailable.

CVE-2025-15615
NIST NVD
MEDIUMVulnerability

Security leaders say the next two years are going to be &#8216;insane&#8217;

Kevin Mandia, Morgan Adamski, and Alex Stamos tell CyberScoop that AI is finding bugs faster than anyone can fix them, exploit development is accelerating, and most organizations aren't prepared for what's coming. The post Security leaders say the next two years are going to be &#8216;insane&#8217; appeared first on CyberScoop .

CyberScoop
MEDIUMApt

China Upgrades the Backdoor It Uses to Spy on Telcos Globally

Chinese APT Red Menshen's super-advanced BPFdoor malware defeats traditional cybersecurity protections. All telcos can do, really, is try hunting it down.

Dark Reading
MEDIUMVulnerability

Wartime Usage of Compromised IP Cameras Highlight Their Danger

The list of countries exploiting Internet-connected cameras to give them eyes inside their adversaries' borders continues to expand. What should companies look out for?

Dark Reading
HIGHVulnerability

NVD HIGH: CVE-2026-4959 — A vulnerability was found in OpenBMB XAgent 1.0.0. This impacts the function che...

A vulnerability was found in OpenBMB XAgent 1.0.0. This impacts the function check_user of the file XAgentServer/application/websockets/share.py of the component ShareServer WebSocket Endpoint. Performing a manipulation of the argument interaction_id results in missing authentication. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was

CVE-2026-4959
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-32983 — Wazuh Manager authd service in wazuh-manager packages through version 4.7.3 cont...

Wazuh Manager authd service in wazuh-manager packages through version 4.7.3 contains an improper restriction of client-initiated SSL/TLS renegotiation vulnerability that allows remote attackers to cause a denial of service by sending excessive renegotiation requests. Attackers can exploit the lack of renegotiation limits to consume CPU resources and render the authd service unavailable.

CVE-2026-32983
NIST NVD
MEDIUMPhishing

New Wave of AiTM Phishing Targets TikTok for Business

Push Security has uncovered a new AiTM phishing campaign targeting TikTok for Business accounts using Google and TikTok themed login pages

Infosecurity Magazine
HIGHVulnerability

NVD HIGH: CVE-2026-4956 — A vulnerability was detected in Shenzhen Ruiming Technology Streamax Crocus 1.3....

A vulnerability was detected in Shenzhen Ruiming Technology Streamax Crocus 1.3.44. The affected element is an unknown function of the file /DevicePrint.do?Action=ReadTask of the component Parameter Handler. The manipulation of the argument State results in sql injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this discl

CVE-2026-4956
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-4955 — A vulnerability was found in Shenzhen Ruiming Technology Streamax Crocus 1.3.44....

A vulnerability was found in Shenzhen Ruiming Technology Streamax Crocus 1.3.44. This impacts an unknown function of the file /OperateStatistic.do. The manipulation of the argument VehicleID results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2026-4955
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-33757 — OpenBao is an open source identity-based secrets management system. Prior to ver...

OpenBao is an open source identity-based secrets management system. Prior to version 2.5.2, OpenBao does not prompt for user confirmation when logging in via JWT/OIDC and a role with `callback_mode` set to `direct`. This allows an attacker to start an authentication request and perform "remote phishing" by having the victim visit the URL and automatically log-in to the session of the attacker. Des

CVE-2026-33757
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-27877 — When using public dashboards and direct data-sources, all direct data-sources' p...

When using public dashboards and direct data-sources, all direct data-sources' passwords are exposed despite not being used in dashboards. No passwords of proxied data-sources are exposed. We encourage all direct data-sources to be converted to proxied data-sources as far as possible to improve your deployments' security.

CVE-2026-27877
NIST NVD
MEDIUMSupply Chain

TeamPCP Targets Telnyx Package in Latest PyPI Software Supply Chain Attack

Socket and Endor Labs discovered a new TeamPCP campaign leading to the delivery of credential-stealing malware

Infosecurity Magazine
HIGHData BreachExploited

Lazarus Group Targets DeFi Protocols with New Smart Contract Exploit Kit

Lazarus Group deploys modular smart contract exploit toolkit targeting DeFi protocols. $200M stolen across four platforms in March.

DeFi Protocols
Chainalysis / SlowMist
CRITICALSupply Chain

Why CVSS is No Longer Enough for Exposure Management

For years, cybersecurity professionals have relied on a familiar metric to dictate their day-to-day priorities: the Common Vulnerability Scoring System (CVSS). In today’s hyper-connected, sprawling IT environments, utilizing a static severity score as the ultimate arbiter of risk creates opportunities for threat actors. While defenders chase down theoretical, high-scoring alerts, adversaries are q

Rapid7
CRITICALRansomware

Infrastructure Attacks With Physical Consequences Down 25%

Operational technology (OT) at industrial and critical infrastructure sites seem to have been benefitting from a lull in ransomware, and hackers' relative ignorance of OT systems.

Dark Reading
MEDIUMVulnerability

Google Sets 2029 Deadline for Quantum-Safe Cryptography

The post-quantum future may be coming sooner than you think, as Google plans to have PQC migration in place by 2029.

Dark Reading
CRITICALVulnerability

NVD CRITICAL: CVE-2026-25101 — Bludit allows user's session identifier to be set before authentication. The val...

Bludit allows user's session identifier to be set before authentication. The value of this session ID stays the same after authentication. This behavior enables an attacker to fix a session ID for a victim and later hijack the authenticated session. This issue was fixed in version 3.17.2.

CVE-2026-25101
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-25099 — Bludit’s API plugin allows an authenticated attacker with a valid API token to u...

Bludit’s API plugin allows an authenticated attacker with a valid API token to upload files of any type and extension without restriction, which can then be executed, leading to Remote Code Execution. This issue was fixed in 3.18.4.

CVE-2026-25099
NIST NVD
MEDIUMVulnerability

RSAC 2026 wrap-up – Week in security with Tony Anscombe

This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations haven't caught up with

WeLiveSecurity (ESET)
MEDIUMVulnerability

A cunning predator: How Silver Fox preys on Japanese firms this tax season

Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening them

WeLiveSecurity (ESET)
CRITICALVulnerability

NVD CRITICAL: CVE-2026-33280 — Hidden functionality issue exists in BUFFALO Wi-Fi router products, which may al...

Hidden functionality issue exists in BUFFALO Wi-Fi router products, which may allow an attacker to gain access to the product’s debugging functionality, resulting in the execution of arbitrary OS commands.

CVE-2026-33280
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-32669 — Code injection vulnerability exists in BUFFALO Wi-Fi router products. If this vu...

Code injection vulnerability exists in BUFFALO Wi-Fi router products. If this vulnerability is exploited, an arbitrary code may be executed on the products.

CVE-2026-32669
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-27650 — OS Command Injection vulnerability exists in BUFFALO Wi-Fi router products. If t...

OS Command Injection vulnerability exists in BUFFALO Wi-Fi router products. If this vulnerability is exploited, an arbitrary OS command may be executed on the products.

CVE-2026-27650
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-4908 — A security flaw has been discovered in code-projects Simple Laundry System 1.0. ...

A security flaw has been discovered in code-projects Simple Laundry System 1.0. This affects an unknown function of the file /modstaffinfo.php of the component Parameter Handler. The manipulation of the argument userid results in sql injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.

CVE-2026-4908
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-4906 — A vulnerability was determined in Tenda AC5 15.03.06.47. The affected element is...

A vulnerability was determined in Tenda AC5 15.03.06.47. The affected element is the function decodePwd of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

CVE-2026-4906
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-33935 — MyTube is a self-hosted downloader and player for several video websites Prior t...

MyTube is a self-hosted downloader and player for several video websites Prior to version 1.8.72, an unauthenticated attacker can lock out administrator and visitor accounts from password-based authentication by triggering failed login attempts. The application exposes three password verification endpoints, all of which are publicly accessible. All three endpoints share a single file-backed login

CVE-2026-33935
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-33890 — MyTube is a self-hosted downloader and player for several video websites Prior t...

MyTube is a self-hosted downloader and player for several video websites Prior to version 1.8.71, an unauthenticated attacker can register an arbitrary passkey and subsequently authenticate with it to obtain a full admin session. The application exposes passkey registration endpoints without requiring prior authentication. Any successfully authenticated passkey is automatically granted an administ

CVE-2026-33890
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-33747 — BuildKit is a toolkit for converting source code to build artifacts in an effici...

BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Prior to version 0.28.1, when using a custom BuildKit frontend, the frontend can craft an API message that causes files to be written outside of the BuildKit state directory for the execution context. The issue has been fixed in v0.28.1. The vulnerability requires using an untrust

CVE-2026-33747
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-33745 — cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library...

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.39.0, the cpp-httplib HTTP client forwards stored Basic Auth, Bearer Token, and Digest Auth credentials to arbitrary hosts when following cross-origin HTTP redirects (301/302/307/308). A malicious or compromised server can redirect the client to an attacker-controlled host, which then receives the plaintex

CVE-2026-33745
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-33735 — MyTube is a self-hosted downloader and player for several video websites Prior t...

MyTube is a self-hosted downloader and player for several video websites Prior to version 1.8.69, an authorization bypass in the `/api/settings/import-database` endpoint allows attackers with low-privilege credentials to upload and replace the application's SQLite database entirely, leading to a full compromise of the application. The bypass is relevant for other POST routes as well. Version 1.8.6

CVE-2026-33735
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-33721 — MapServer is a system for developing web-based GIS applications. Starting in ver...

MapServer is a system for developing web-based GIS applications. Starting in version 4.2 and prior to version 8.6.1, a heap-buffer-overflow write in MapServer’s SLD (Styled Layer Descriptor) parser lets a remote, unauthenticated attacker crash the MapServer process by sending a crafted SLD with more than 100 Threshold elements inside a ColorMap/Categorize structure (commonly reachable via WMS GetM

CVE-2026-33721
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-33701 — OpenTelemetry Java Instrumentation provides OpenTelemetry auto-instrumentation a...

OpenTelemetry Java Instrumentation provides OpenTelemetry auto-instrumentation and instrumentation libraries for Java. In versions prior to 2.26.1, the RMI instrumentation registered a custom endpoint that deserialized incoming data without applying serialization filters. On JDK version 16 and earlier, an attacker with network access to a JMX or RMI port on an instrumented JVM could exploit this t

CVE-2026-33701
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-33699 — pypdf is a free and open-source pure-python PDF library. Versions prior to 6.9.2...

pypdf is a free and open-source pure-python PDF library. Versions prior to 6.9.2 have a vulnerability in which an attacker can craft a PDF which leads to an infinite loop. This requires reading a file in non-strict mode. This has been fixed in pypdf 6.9.2. If users cannot upgrade yet, consider applying the changes from the patch manually.

CVE-2026-33699
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-4905 — A vulnerability was found in Tenda AC5 15.03.06.47. Impacted is the function for...

A vulnerability was found in Tenda AC5 15.03.06.47. Impacted is the function formWifiWpsOOB of the file /goform/WifiWpsOOB of the component POST Request Handler. Performing a manipulation of the argument index results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

CVE-2026-4905
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-4904 — A vulnerability has been found in Tenda AC5 15.03.06.47. This issue affects the ...

A vulnerability has been found in Tenda AC5 15.03.06.47. This issue affects the function formSetCfm of the file /goform/setcfm of the component POST Request Handler. Such manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVE-2026-4904
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-33945 — Incus is a system container and virtual machine manager. Incus instances have an...

Incus is a system container and virtual machine manager. Incus instances have an option to provide credentials to systemd in the guest. For containers, this is handled through a shared directory. Prior to version 6.23.0, an attacker can set a configuration key named something like `systemd.credential.../../../../../../root/.bashrc` to cause Incus to write outside of the `credentials` directory ass

CVE-2026-33945
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-29070 — Open WebUI is a self-hosted artificial intelligence platform designed to operate...

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.8.6, an access control check is missing when deleting a file from a knowledge base. The only check being done is that the user has write access to the knowledge base (or is admin), but NOT that the file actually belongs to this knowledge base. It is thus possible to delete arbitrar

CVE-2026-29070
NIST NVD
HIGHVulnerability

CISA KEV: F5 BIG-IP — F5 BIG-IP Unspecified Vulnerability

F5 BIG-IP APM contains an unspecified vulnerability that could allow a threat actor to achieve remote code execution.

CVE-2025-53521F5 BIG-IP
CISA KEV
HIGHVulnerability

NVD HIGH: CVE-2026-4903 — A flaw has been found in Tenda AC5 15.03.06.47. This vulnerability affects the f...

A flaw has been found in Tenda AC5 15.03.06.47. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. This manipulation of the argument PPPOEPassword causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.

CVE-2026-4903
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-4902 — A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function...

A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

CVE-2026-4902
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-33711 — Incus is a system container and virtual machine manager. Incus provides an API t...

Incus is a system container and virtual machine manager. Incus provides an API to retrieve VM screenshots. That API relies on the use of a temporary file for QEMU to write the screenshot to which is then picked up and sent to the user prior to deletion. As versions prior to 6.23.0 use predictable paths under /tmp for this, an attacker with local access to the system can abuse this mechanism by cre

CVE-2026-33711
NIST NVD
MEDIUMVulnerability

ODNI tackles AI, threat hunting, app cybersecurity in year-one tech review

It’s the first significant cybersecurity-related announcement under Director of National Intelligence Tulsi Gabbard. The post ODNI tackles AI, threat hunting, app cybersecurity in year-one tech review appeared first on CyberScoop .

CyberScoop
HIGHVulnerability

NVD HIGH: CVE-2026-33670 — SiYuan is a personal knowledge management system. Prior to version 3.6.2, the /a...

SiYuan is a personal knowledge management system. Prior to version 3.6.2, the /api/file/readDir interface was used to traverse and retrieve the file names of all documents under a notebook. Version 3.6.2 patches the issue.

CVE-2026-33670
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-33669 — SiYuan is a personal knowledge management system. Prior to version 3.6.2, docume...

SiYuan is a personal knowledge management system. Prior to version 3.6.2, document IDs were retrieved via the /api/file/readDir interface, and then the /api/block/getChildBlocks interface was used to view the content of all documents. Version 3.6.2 patches the issue.

CVE-2026-33669
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-33661 — Pay is an open-source payment SDK extension package for various Chinese payment ...

Pay is an open-source payment SDK extension package for various Chinese payment services. Prior to version 3.7.20, the `verify_wechat_sign()` function in `src/Functions.php` unconditionally skips all signature verification when the PSR-7 request reports `localhost` as the host. An attacker can exploit this by sending a crafted HTTP request to the WeChat Pay callback endpoint with a `Host: localhos

CVE-2026-33661
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2025-12805 — A flaw was found in Red Hat OpenShift AI (RHOAI) llama-stack-operator. This vuln...

A flaw was found in Red Hat OpenShift AI (RHOAI) llama-stack-operator. This vulnerability allows unauthorized access to Llama Stack services deployed in other namespaces via direct network requests, because no NetworkPolicy restricts access to the llama-stack service endpoint. As a result, a user in one namespace can access another user’s Llama Stack instance and potentially view or manipulate sen

CVE-2025-12805
NIST NVD
HIGHRansomware

Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran (Updated March 26)

Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations for defenders. The post Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran (Updated March 26) appeared first on Unit 42 .

Unit 42 (Palo Alto)
MEDIUMApt

Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government

Unit 42 uncovers multiple clusters of cyberespionage targeting a Southeast Asian government organization with USBFect, RATs and loaders. The post Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government appeared first on Unit 42 .

Unit 42 (Palo Alto)
HIGHVulnerability

NVD HIGH: CVE-2026-3622 — The vulnerability exists in the UPnP component of TL-WR841N v14, where improper ...

The vulnerability exists in the UPnP component of TL-WR841N v14, where improper input validation leads to an out-of-bounds read, potentially causing a crash of the UPnP service. Successful exploitation can cause the UPnP service to crash, resulting in a Denial-of-Service condition.  This vulnerability affects TL-WR841N v14 < EN_0.9.1 4.19 Build 260303 Rel.42399n (V14_260303) and < US_0.9.1.4.19

CVE-2026-3622
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-33645 — Fireshare facilitates self-hosted media and link sharing. In version 1.5.1, an a...

Fireshare facilitates self-hosted media and link sharing. In version 1.5.1, an authenticated path traversal vulnerability in Fireshare’s chunked upload endpoint allows an attacker to write arbitrary files outside the intended upload directory. The `checkSum` multipart field is used directly in filesystem path construction without sanitization or containment checks. This enables unauthorized file w

CVE-2026-33645
NIST NVD
CRITICALVulnerability

NVD CRITICAL: CVE-2026-33640 — Outline is a service that allows for collaborative documentation. Outline implem...

Outline is a service that allows for collaborative documentation. Outline implements an Email OTP login flow for users not associated with an Identity Provider. Starting in version 0.86.0 and prior to version 1.6.0, Outline does not invalidate OTP codes based on amount or frequency of invalid submissions, rather it relies on the rate limiter to restrict attempts. Consequently, identified bypasses

CVE-2026-33640
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-33623 — PinchTab is a standalone HTTP server that gives AI agents direct control over a ...

PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab `v0.8.4` contains a Windows-only command injection issue in the orphaned Chrome cleanup path. When an instance is stopped, the Windows cleanup routine builds a PowerShell `-Command` string using a `needle` derived from the profile path. In `v0.8.4`, that string interpolation escapes backslashes

CVE-2026-33623
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-33622 — PinchTab is a standalone HTTP server that gives AI agents direct control over a ...

PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab `v0.8.3` through `v0.8.5` allow arbitrary JavaScript execution through `POST /wait` and `POST /tabs/{id}/wait` when the request uses `fn` mode, even if `security.allowEvaluate` is disabled. `POST /evaluate` correctly enforces the `security.allowEvaluate` guard, which is disabled by default. How

CVE-2026-33622
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2023-7338 — Ruckus Unleashed contains a remote code execution vulnerability in the web-based...

Ruckus Unleashed contains a remote code execution vulnerability in the web-based management interface that allows authenticated remote attackers to execute arbitrary code on the system when gateway mode is enabled. Attackers can exploit this vulnerability by sending specially crafted requests through the management interface to achieve arbitrary code execution on affected systems.

CVE-2023-7338
NIST NVD
MEDIUMMalware

Coruna, DarkSword &amp; Democratizing Nation-State Exploit Kits

Nation-state malware is being sold on the Dark Web and leaked to GitHub; and ordinary organizations might not stand much of a chance of defending themselves.

Dark Reading
MEDIUMVulnerability

Is the FCC's Router Ban the Wrong Fix?

The agency put foreign-made consumer routers on its list of prohibited communications devices, but the ban could create more problems down the road.

Dark Reading
MEDIUMVulnerability

Automotive Cybersecurity Threats Grow in Era of Connected, Autonomous Vehicles

More than a decade since the 2015 Jeep hack, the cybersecurity of vehicles remains of the utmost importance.

Dark Reading
HIGHVulnerability

NVD HIGH: CVE-2026-3121 — A flaw was found in Keycloak. An administrator with `manage-clients` permission ...

A flaw was found in Keycloak. An administrator with `manage-clients` permission can exploit a misconfiguration where this permission is equivalent to `manage-permissions`. This allows the administrator to escalate privileges and gain control over roles, users, or other administrative functions within the realm. This privilege escalation can occur when admin permissions are enabled at the realm lev

CVE-2026-3121
NIST NVD
HIGHVulnerability

NVD HIGH: CVE-2026-33152 — Tandoor Recipes is an application for managing recipes, planning meals, and buil...

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, Tandoor Recipes configures Django REST Framework with BasicAuthentication as one of the default authentication backends. The AllAuth rate limiting configuration (ACCOUNT_RATE_LIMITS: login: 5/m/ip) only applies to the HTML-based login endpoint at /accounts/login/. Any AP

CVE-2026-33152
NIST NVD
CRITICALVulnerability

Critical Flaw in Langflow AI Platform Under Attack

Threats actors pounced on the code injection vulnerability within hours of its disclosure, demonstrating that organizations have little time to address critical bugs.

Dark Reading
MEDIUMVulnerability

TP-Link, Canva, HikVision vulnerabilities

Cisco Talos&#x2019; Vulnerability Discovery & Research team recently disclosed a vulnerability in HikVision, as well as 10 in TP-Link, and 19 in Canva. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco&#x2019;s third-party vulnerability disclosure policy . For

Cisco Talos
HIGHVulnerability

NVD HIGH: CVE-2026-32857 — Firecrawl version 2.8.0 and prior contain a server-side request forgery (SSRF) p...

Firecrawl version 2.8.0 and prior contain a server-side request forgery (SSRF) protection bypass vulnerability in the Playwright scraping service where network policy validation is applied only to the initial user-supplied URL and not to subsequent redirect destinations. Attackers can supply an externally valid URL that passes validation and returns an HTTP redirect to an internal or restricted re

CVE-2026-32857
NIST NVD
MEDIUMVulnerability

A puppet made me cry and all I got was this t-shirt

In this week's newsletter, Amy draws parallels between the collaborative themes of "Project Hail Mary" and the massive team effort behind the newly released Talos Year in Review report.

Cisco Talos
HIGHVulnerability

CISA KEV: Aquasecurity Trivy — Aquasecurity Trivy Embedded Malicious Code Vulnerability

Aquasecurity Trivy contains an embedded malicious code vulnerability that could allow an attacker to gain access to everything in the CI/CD environment, including all tokens, SSH keys, cloud credentials, database passwords, and any sensitive configuration in memory.

CVE-2026-33634Aquasecurity Trivy
CISA KEV
HIGHSupply Chain

Supply Chain Attack Compromises Python AI/ML Libraries — 45M Downloads

Three popular Python AI/ML packages on PyPI compromised. Credential-stealing code targets AWS, GCP, Azure, and AI API keys.

CVE-2026-31001CVE-2026-31002PyPI ecosystem
JFrog Security Research
HIGHVulnerability

CISA KEV: Langflow Langflow — Langflow Code Injection Vulnerability

Langflow contains a code injection vulnerability that could allow building public flows without requiring authentication.

CVE-2026-33017Langflow Langflow
CISA KEV
HIGHZero DayExploited

Chrome Zero-Day Exploited by Spyware Vendor Against Journalists

Google patches V8 zero-day exploited by commercial spyware vendor. One-click full chain achieves RCE targeting journalists and activists.

CVE-2026-1893Google Chrome 134
Google Threat Analysis Group
CRITICALAptExploited

APT29 Targets European Cloud Service Providers in Operation CloudJack

APT29 compromises two European cloud hosting providers to access customer environments. Hundreds of EU government and enterprise tenants at risk.

European Cloud Platforms
Microsoft / ANSSI
MEDIUMVulnerability

NIST NVD Backlog Exceeds 30,000 Unanalyzed CVEs

NVD backlog doubles year-over-year, creating blind spots in vuln management. Industry coalition demands congressional emergency funding.

NIST NVD
Cybersecurity Coalition
HIGHVulnerability

CISA KEV: Craft CMS Craft CMS — Craft CMS Code Injection Vulnerability

Craft CMS contains a code injection vulnerability that allows a remote attacker to execute arbitrary code.

CVE-2025-32432Craft CMS Craft CMS
CISA KEV
HIGHVulnerability

CISA KEV: Laravel Livewire — Laravel Livewire Code Injection Vulnerability

Laravel Livewire contain a code injection vulnerability that could allow unauthenticated attackers to achieve remote command execution in specific scenarios.

CVE-2025-54068Laravel Livewire
CISA KEV
HIGHVulnerability

CISA KEV: Apple Multiple Products — Apple Multiple Products Improper Locking Vulnerability

Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability that could allow a malicious application to cause unexpected changes in memory shared between processes.

CVE-2025-43510Apple Multiple Products
CISA KEV
HIGHVulnerability

CISA KEV: Apple Multiple Products — Apple Multiple Products Classic Buffer Overflow Vulnerability

Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain a classic buffer overflow vulnerability which could allow a malicious application to cause unexpected system termination or write kernel memory.

CVE-2025-43520Apple Multiple Products
CISA KEV
HIGHVulnerability

CISA KEV: Apple Multiple Products — Apple Multiple Products Buffer Overflow Vulnerability

Apple Safari, iOS, watchOS, visionOS, iPadOS, macOS, and tvOS contain a buffer overflow vulnerability that could allow the processing of maliciously crafted web content which may lead to memory corruption.

CVE-2025-31277Apple Multiple Products
CISA KEV
CRITICALData BreachExploited

Lazarus Group Linked to $1.5B Bybit Cryptocurrency Heist

FBI attributes the $1.5 billion Bybit cryptocurrency exchange hack to North Korea Lazarus Group. Largest crypto theft in history.

Bybit Exchange
FBI / Chainalysis
LOWVulnerability

ENISA Publishes 2026 Threat Landscape Report — Ransomware and AI Threats Dominate

ENISA annual report identifies ransomware, AI-enabled threats, and supply chain attacks as the top three cyber threats facing Europe in 2026.

N/A
ENISA
HIGHRansomwareExploited

Black Basta Ransomware Pivots to Microsoft Teams Social Engineering

Black Basta affiliates using Microsoft Teams messages and Quick Assist for initial access, bypassing email security controls entirely.

Microsoft Teams
Microsoft Threat Intelligence
LOWVulnerability

CISA Releases Updated Zero Trust Maturity Model v3.0

CISA publishes Zero Trust Maturity Model v3.0 with updated guidance for identity, devices, networks, applications, and data pillars.

N/A
CISA
CRITICALVulnerabilityExploited

Critical VMware ESXi Vulnerability Allows Guest-to-Host Escape

A critical use-after-free vulnerability in VMware ESXi allows virtual machine escape. Active exploitation by ransomware groups confirmed.

CVE-2026-22224CVE-2026-22225VMware ESXi 7.0
Broadcom / Microsoft Threat Intelligence
HIGHPhishingExploited

Scattered Spider Uses AI Voice Cloning to Bypass Voice-Based MFA

Scattered Spider adopts AI voice cloning to defeat voice verification MFA at financial institutions. Three banks confirm successful bypass.

Voice MFA Systems
FS-ISAC
CRITICALZero DayExploited

Ivanti Connect Secure New Zero-Day Under Active Exploitation

Another zero-day in Ivanti Connect Secure VPN appliances. Stack buffer overflow enables unauthenticated RCE. Third major Ivanti VPN zero-day in two years.

CVE-2026-18321Ivanti Connect Secure
Mandiant / Ivanti
HIGHAptExploited

UNC3886 Linked to VMware vCenter Exploitation Campaign Targeting Defense Sector

UNC3886 exploits known VMware vCenter vulnerabilities to deploy VirtualPita and VirtualPie backdoors across defense contractor virtualization infrastructure.

CVE-2025-22224CVE-2025-22225VMware vCenter Server
Mandiant / Microsoft
MEDIUMApt

OpenAI Discloses State-Sponsored Misuse of ChatGPT for Cyber Operations

OpenAI reports disrupting five state-sponsored groups using ChatGPT for reconnaissance, phishing content generation, and malware debugging.

ChatGPT
OpenAI Threat Intelligence
CRITICALVulnerabilityExploited

Microsoft Patches 97 Vulnerabilities Including Three Actively Exploited Zero-Days

March 2026 Patch Tuesday addresses 97 CVEs with three actively exploited zero-days in Windows kernel, NTLM, and Hyper-V.

CVE-2026-21399CVE-2026-21400Windows 10/11
Microsoft MSRC
HIGHMalwareExploited

Flax Typhoon IoT Botnet Resurfaces with 300,000 Compromised Devices

Despite FBI disruption in 2024, Flax Typhoon has rebuilt its IoT botnet to over 300,000 compromised routers, cameras, and NAS devices worldwide.

SOHO Routers
Lumen Black Lotus Labs / FBI
MEDIUMData Breach

Major Credential Stuffing Campaign Targets Streaming Services — 500K Accounts Compromised

Massive credential stuffing campaign compromises 500,000+ streaming service accounts across three major platforms. Accounts sold on dark web.

Streaming Platforms
Recorded Future / SpyCloud
HIGHVulnerabilityPOC

Critical Cisco NX-OS Command Injection Affects Data Center Switches

Command injection in Cisco NX-OS CLI allows authenticated users to escalate to root on Nexus data center switches. PoC exploit published.

CVE-2026-20356Cisco NX-OS
Cisco PSIRT
HIGHRansomwareExploited

Play Ransomware Targets Managed Service Providers for Downstream Access

Play ransomware compromises three MSPs to deploy ransomware across 120+ downstream client organizations simultaneously.

FortiOS
CISA / MS-ISAC Advisory
HIGHVulnerabilityExploited

Critical WordPress Plugin Vulnerability Affects 5 Million Sites

Unauthenticated SQL injection in a top WordPress security plugin allows database takeover. 5 million active installations at risk.

CVE-2026-8001WordPress
WPScan / Wordfence
LOWVulnerability

SEC Proposes Updated Cybersecurity Incident Reporting Rules for Public Companies

SEC proposes amendments requiring public companies to report material cyber incidents within 48 hours, down from 4 business days.

N/A
SEC
HIGHRansomware

ALPHV Successor RansomHub Becomes Top Ransomware Threat in Q1 2026

RansomHub, believed to include former ALPHV/BlackCat operators, claims 185+ victims in Q1 2026 alone. Now the most prolific ransomware operation.

Windows Server
Group-IB / Recorded Future
HIGHPhishing

FBI Warns of AI-Generated Deepfake Voice Attacks Targeting Corporate Executives

FBI issues alert on rising deepfake voice attacks using AI-cloned executive voices to authorize fraudulent wire transfers. $68M stolen in Q1 2026.

AI Voice Cloning Tools
FBI IC3
MEDIUMInsider Threat

North Korean IT Workers Infiltrate Fortune 500 Companies via Remote Positions

DOJ charges 14 North Korean nationals operating as remote IT workers at Fortune 500 companies. $88M in wages funneled to DPRK regime.

Remote Work Platforms
DOJ / FBI
MEDIUMRansomware

Black Basta Internal Chat Logs Leaked — Reveal Operations and Targets

Leaked internal communications from Black Basta ransomware group reveal operational structure, target selection process, and connections to former Conti members.

N/A
Prodaft / VX-Underground
LOWApt

Scattered Spider Member Arrested in Spain — FBI Unseals Indictment

FBI and Spanish police arrest alleged Scattered Spider member linked to MGM, Caesars, and healthcare breaches. Indictment details $100M+ in damages.

N/A
FBI / Europol
HIGHVulnerabilityExploited

Jenkins Security Advisory Patches Critical RCE in Pipeline Plugin

Critical deserialization vulnerability in Jenkins Pipeline plugin allows unauthenticated RCE. 150,000+ Jenkins instances exposed.

CVE-2026-4321Jenkins
Jenkins Security Advisory
HIGHSupply Chain

GitHub Actions Supply Chain Attack Injects Malware Into CI/CD Pipelines

Compromised GitHub Action used by 23,000+ repositories injects credential-stealing code into CI/CD pipelines. Broad exposure across enterprise repositories.

GitHub Actions
GitHub Security Advisory
MEDIUMVulnerability

CISA Adds 12 Vulnerabilities to Known Exploited Vulnerabilities Catalog in One Week

CISA adds 12 vulnerabilities to KEV catalog in a single week — the highest since the catalog launch. Reflects accelerating exploitation pace.

Multiple Vendors
CISA
HIGHVulnerability

Google Project Zero Discloses Linux Kernel Zero-Day in eBPF Subsystem

Google Project Zero discloses a critical privilege escalation in the Linux kernel eBPF verifier. Affects cloud workloads, containers, and Android.

CVE-2026-0399Linux Kernel 5.15-6.8
Google Project Zero
LOWMalware

Interpol Operation Synergia II Dismantles 22,000 Malicious Servers Globally

Interpol-led operation takes down 22,000 malicious servers across 100+ countries. 41 arrests made. Focus on phishing, ransomware, and infostealer infrastructure.

Malicious Infrastructure
Interpol
HIGHAptExploited

Iranian APT Targets US Defense Industrial Base with New MalwareLoader

Iranian threat actor Peach Sandstorm deploys novel loader in campaign against US defense industrial base. Targets include drone and satellite manufacturers.

Azure AD
Microsoft Threat Intelligence
HIGHRansomwareExploited

Major US Airport Systems Hit by Coordinated Ransomware Attack

Coordinated ransomware attack disrupts systems at four major US airports. Flight information, baggage handling, and check-in systems affected.

Airport Management Systems
TSA / CISA
HIGHZero DayExploited

Apple Patches Actively Exploited WebKit Zero-Day in iOS and macOS

Apple releases emergency updates for iOS 18.4 and macOS 15.4 to fix WebKit zero-day used in targeted attacks. Sophisticated exploit chain confirmed.

CVE-2026-23529iOS 18
Apple / Citizen Lab