74Articles
8Categories
2026-02-26Date
πŸ›
Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access
πŸ›
Chromium: CVE-2026-3063 Inappropriate implementation in DevTools
πŸ›
Chromium: CVE-2026-3062 Out of bounds read and write in Tint
πŸ›
Chromium: CVE-2026-3061 Out of bounds read in Media
πŸ›
CVE-2026-23229 crypto: virtio - Add spinlock protection with virtqueue notification
πŸ›
CVE-2025-71230 hfs: ensure sb->s_fs_info is always cleaned up
πŸ›
CVE-2026-23224 erofs: fix UAF issue for file-backed mounts w/ directio option
πŸ›
CVE-2025-67733 Valkey Affected by RESP Protocol Injection via Lua error_reply
πŸ›
CVE-2026-21863 Malformed Valkey Cluster bus message can lead to Remote DoS
πŸ›
CVE-2025-62878 Local Path Provisioner vulnerable to Path Traversal via parameters.pathPattern
πŸ›
CVE-2026-23223 xfs: fix UAF in xchk_btree_check_block_owner
πŸ›
CVE-2026-23225 sched/mmcid: Don't assume CID is CPU owned on mode switch
πŸ›
CVE-2025-61143 libtiff up to v4.7.1 was discovered to contain a NULL pointer dereference via the component libtiff/tif_open.c.
πŸ›
CVE-2025-61144 libtiff up to v4.7.1 was discovered to contain a stack overflow via the readSeparateStripsIntoBuffer function.
πŸ›
CVE-2025-61145 libtiff up to v4.7.1 was discovered to contain a double free via the component tools/tiffcrop.c.
πŸ›
CVE-2025-11563 wcurl path traversal with percent-encoded slashes
πŸ›
CVE-2021-20225 A flaw was found in grub2 in versions prior to 2.06. The option parser allows an attacker to write past the end of a heap-allocated buffer by calling certain commands with a large number of specific short forms of options. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
πŸ›
CVE-2021-20233 A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the menu rendering code performs a length calculation on the assumption that expressing a quoted single quote will require 3 characters while it actually requires 4 characters which allows an attacker to corrupt memory by one byte for each quote in the input. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
πŸ›
CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability
⚠️
Multiple Vulnerabilities in Cisco Catalyst SD-WAN Products Could Allow for Authentication Bypass
⚠️
Trend Micro warns of critical Apex One code execution flaws
⚠️
Critical Juniper Networks PTX flaw allows full router takeover
⚠️
Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown
⚠️
Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens
⚠️
Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023
⚠️
China-linked hackers used Google Sheets to spy on telecoms and governments across 42 countries
⚠️
The farmers and the mercenaries: Rethinking the β€˜human layer’ in security
⚠️
5 trends that should top CISO’s RSA 2026 agendas
⚠️
Steaelite RAT combines data theft and ransomware management capability in one tool
⚠️
Nuke Docker From Orbit?
⚠️
How Russia is intercepting communications from European satellites
⚠️
Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023
⚠️
Zyxel warns of critical RCE flaw affecting over a dozen routers
⚠️
Intego X9: Why your macOS antivirus should not trust PIDs
⚠️
A Deep Dive into the GetProcessHandleFromHwnd API
πŸ“‹
ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories
πŸ“’
CISA Issues Updated RESURGE Malware Analysis Highlighting a Stealthy but Active Threat
πŸ“’
AI Is Taking Over Cybersecurity - PSW #915
πŸ“’
Google disrupts Chinese-linked group UNC2814, which breached 53+ organizations across 42 countries and utilized Google Sheets to manage targeting and data theft
πŸ“’
Google disrupts Chinese-linked group UNC2814, which breached 53+ organizations across 42 countries and utilized Google Sheets to manage targeting and data theft
πŸ“’
Google disrupts Chinese-linked group UNC2814, which breached 53+ organizations across 42 countries and utilized Google Sheets to manage targeting and data theft
πŸ”₯
European DYI chain ManoMano data breach impacts 38 million customers
πŸ”₯
Olympique Marseille confirms 'attempted' cyberattack after data leak
πŸ”₯
Ransomware payment rate drops to record low as attacks surge
πŸ”₯
Expert Recommends: Prepare for PQC Right Now
πŸ”₯
Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware
πŸ”₯
Your staff are your biggest security risk: AI is making it worse
πŸ”₯
Notorious ransomware gang allegedly blackmailed by fake FSB officer
πŸ”₯
Smashing Security podcast #456: How to lose friends and DDoS people
πŸ”₯
Odido - 688,102 breached accounts
πŸ”₯
Cost of Insider Incidents Surges 20% to Nearly $20m - Infosecurity Magazine
πŸ•΅οΈ
LLMs Generate Predictable Passwords
πŸ•΅οΈ
Apple iPhone and iPad Cleared for Classified NATO Use
πŸ•΅οΈ
Four Risks Boards Cannot Treat as Background Noise
πŸ•΅οΈ
Claude Code Flaws Exposed Developer Devices to Silent Hacking
πŸ•΅οΈ
UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor
πŸ•΅οΈ
Finding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
πŸ•΅οΈ
ISC Stormcast For Thursday, February 26th, 2026 https://isc.sans.edu/podcastdetail/9826, (Thu, Feb 26th)
πŸ•΅οΈ
Threat modeling AI applications
πŸ•΅οΈ
Nation-State Threat Actors Incorporate AI to Streamline Attacks
πŸ•΅οΈ
FedRAMP's Role in Risk Management
πŸ•΅οΈ
Fake Job Interviews Are Installing Backdoors on Developer Machines
πŸ•΅οΈ
Unknown hacker used Claude to steal 150GB of Mexican government data, including 195M taxpayer records, in December 2025 and January 2026
πŸ•΅οΈ
Unknown hacker used Claude to steal 150GB of Mexican government data, including 195M taxpayer records, in December 2025 and January 2026
πŸ•΅οΈ
Conduent Says Hack Now Affects at Least 25 Million Patients
πŸ•΅οΈ
Unknown hacker used Claude to steal 150GB of Mexican government data, including 195M taxpayer records, in December 2025 and January 2026
🌐
The CLAIR Model: A Synthesized Conceptual Framework for Mapping Critical Infrastructure Interdependencies [Guest Diary], (Wed, Feb 25th)
🌐
Spyware makers sentenced to prison in Greece for wiretapping politicians and journalists
πŸ“‘
AI Capabilities Are Advancing Faster Than AI Security
πŸ“‘
Previously harmless Google API keys now expose Gemini AI data
πŸ“‘
Microsoft expands Windows restore to more enterprise devices
πŸ“‘
New York sues Valve for promoting illegal gambling via game loot boxes
πŸ“‘
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
πŸ“‘
Recorded Future Expands Coverage of Scams and Financial Fraud with Money Mule Intelligence from CYBERA