140Articles
7Categories
2026-02-27Date
πŸ›
Cisco SD-WAN Bug Actively Exploited
KEV
πŸ›
AL26-004 - Critical vulnerability affecting Cisco Catalyst SD-WAN - CVE-2026-20127
πŸ›
AL26-003 - Vulnerability affecting BeyondTrust - CVE-2026-1731
πŸ›
Juniper Networks PTX Routers Affected by Critical Vulnerability
πŸ›
CVE-2026-27571 nats-server websockets are vulnerable to pre-auth memory DoS
πŸ›
CVE-2026-21620 TFTP Path Traversal
πŸ›
CVE-2026-27965 Vitess users with backup storage access can gain unauthorized access to production deployment environments
πŸ›
CVE-2026-27969 Vitess users with backup storage access can write to arbitrary file paths on restore
πŸ›
CVE-2025-69873 ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., "^(a|a)*$") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with $data: true for dynamic schema validation.
πŸ›
Stored XSS Vulnerability in RustFS Console Puts S3 Admin Credentials at Risk
πŸ›
FreeBSD Vulnerabilities Enable Attackers to Crash Entire System
πŸ›
Your personal OpenClaw agent may also be taking orders from malicious websites
πŸ›
CISA warns that RESURGE malware can be dormant on Ivanti devices
πŸ›
Security hole could let hackers take over Juniper Networks PTX core routers
⚠️
900 Sangoma FreePBX Instances Infected With Web Shells
⚠️
Researchers Unveil Aeternum C2 Infrastructure with Advanced Evasion and Persistence Tactics
⚠️
Critical Trend Micro Apex One Vulnerabilities Allow Remote Malicious Code Execution
⚠️
Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor in Developer Environments
⚠️
Infostealers Drive Massive Brute-Force Attacks on Corporate SSO Gateways with Stolen Credentials
⚠️
US authorities punish sellers of malware and spyware
⚠️
Why application security must start at the load balancer
⚠️
How to make LLMs a defensive advantage without creating a new attack surface
⚠️
Ransomware groups switch to stealthy attacks and long-term access
⚠️
Hacker kompromittieren immer schneller
⚠️
Trend Micro warns of critical Apex One code execution flaws
⚠️
Third-Party Patching and the Business Footprint We All Share
⚠️
Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor
⚠️
Cultivating a robust and efficient quantum-safe HTTPS
⚠️
900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
⚠️
β€˜Silent’ Google API key change exposed Gemini AI data
⚠️
Friday Squid Blogging: Squid Fishing in Peru
⚠️
Open Source Risk Is Exploding
πŸ“’
Why Tehran’s Two-Tiered Internet Is So Dangerous
πŸ“’
n8n security advisory (AV26-176)
πŸ“’
Drupal security advisory (AV26-175)
πŸ“’
ServiceNow security advisory (AV26-174)
πŸ“’
VMware security advisory (AV26-173)
πŸ“’
Juniper Networks security advisory (AV26-172)
πŸ“’
Cisco security advisory (AV26-166) – Update 1
πŸ“’
JetBrains security advisory (AV26-171)
πŸ“’
GitLab security advisory (AV26-170)
πŸ“’
AMD security advisory (AV26-169)
πŸ“’
Trend Micro security advisory (AV26-168)
πŸ“’
Zyxel security advisory (AV26-167)
πŸ“’
SolarWinds security advisory (AV26-165)
πŸ“’
HPE security advisory (AV26-164)
πŸ“’
[Control systems] ABB security advisory (AV26-163)
πŸ“’
VMware security advisory (AV26-162)
πŸ“’
SonicWall security advisory (AV26-161)
πŸ“’
Mozilla security advisory (AV26-160)
πŸ“’
Google Chrome security advisory (AV26-159)
πŸ“’
Docker security advisory (AV26–158)
πŸ“’
HPE security advisory (AV26-157)
πŸ“’
Dell security advisory (AV26-156)
πŸ“’
Microsoft Edge security advisory (AV26-155)
πŸ“’
Ubuntu security advisory (AV26-154)
πŸ“’
Red Hat security advisory (AV26-153)
πŸ“’
IBM security advisory (AV26-152)
πŸ“’
[Control systems] CISA ICS security advisories (AV26–151)
πŸ“’
HPE security advisory (AV26-150)
πŸ“’
Tenable security advisory (AV26-149)
πŸ“’
IceWarp security advisory (AV26-148)
πŸ“’
Splunk security advisory (AV26-147)
πŸ“’
GitHub security advisory (AV26-146)
πŸ“’
Google Chrome security advisory (AV26-145)
πŸ“’
F5 security advisory (AV26-144)
πŸ“’
Dell security advisory (AV26-138) – Update 1
πŸ“’
Microsoft Edge security advisory (AV26-143)
πŸ“’
Jenkins security advisory (AV26-142)
πŸ“’
Atlassian security advisory (AV26-141)
πŸ“’
[Control systems] ABB security advisory (AV26-140)
πŸ“’
HPE security advisory (AV26-139)
πŸ“’
Google Chrome security advisory (AV26-130) - Update 1
πŸ“’
Tenable security advisory (AV26-137)
πŸ“’
Mozilla security advisory (AV26-136)
πŸ“’
Red Hat security advisory (AV26-135)
πŸ“’
[Control systems] CISA ICS security advisories (AV26-134)
πŸ“’
Ubuntu security advisory (AV26-133)
πŸ“’
Dell security advisory (AV26-132)
πŸ“’
IBM security advisory (AV26-131)
πŸ“’
Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking
πŸ“’
Vshell Gains Popularity Among Cybercriminals as Cobalt Strike Alternative
πŸ“’
One of the β€˜most influential cybersecurity’ roles will pay under $175,000
πŸ“’
In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators
πŸ“’
CISA replaces acting director after a bumbling year on the job
πŸ“’
VMware security advisory (AV26-178)
πŸ“’
Microsoft Edge security advisory (AV26-177)
πŸ“’
FreeBSD security advisory (AV26-179)
πŸ”₯
Cyber incident reporting guidelines: Key information sharing requirements – ITSM.00.140
πŸ”₯
Cyber Centre releases Ransomware Threat Outlook 2025 to 2027
πŸ”₯
Ransomware playbook (ITSM.00.099)
πŸ”₯
Ransomware Threat Outlook 2025-2027
πŸ”₯
What to do when your organization has been compromised by a cyber attack (ITSAP.00.009)
πŸ”₯
Developing your incident response plan (ITSAP.40.003)
πŸ”₯
Developing your business continuity plan (ITSAP.10.005)
πŸ”₯
38 Million Allegedly Impacted by ManoMano Data Breach
πŸ”₯
ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks
πŸ”₯
1 Million Records from Dutch Telco Odido Leaked Online in Massive Data Breach
πŸ”₯
UFP Technologies discloses data breach after cybersecurity incident | brief | SC Media
πŸ”₯
European DYI chain ManoMano data breach impacts 38 million customers
πŸ”₯
Ransomware payment rate drops to record low as attacks surge
πŸ”₯
APT37 hackers use new malware to breach air-gapped networks
πŸ•΅οΈ
Phishing Attacks Against People Seeking Programming Jobs
πŸ•΅οΈ
Chilean Carding Shop Operator Extradited to US
πŸ•΅οΈ
Anthropic Refuses to Bend to Pentagon on AI Safeguards as Dispute Nears Deadline
πŸ•΅οΈ
Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience
πŸ•΅οΈ
Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
πŸ•΅οΈ
ISC Stormcast For Friday, February 27th, 2026 https://isc.sans.edu/podcastdetail/9828, (Fri, Feb 27th)
πŸ•΅οΈ
Study Finds 87% of Organizations Exposed to Attacks Due to Known Vulnerabilities
πŸ•΅οΈ
Dohdoor Malware Targets U.S. Schools and Healthcare with Multi-Stage Attack
πŸ•΅οΈ
Vshell: A Chinese-Language Alternative to Cobalt StrikeΒ  - Censys
πŸ•΅οΈ
Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens
πŸ•΅οΈ
Hacking group begins leaking customer data in Dutch telecom Odido hack
πŸ•΅οΈ
Critical Juniper Networks PTX flaw allows full router takeover
πŸ•΅οΈ
Google API Keys Weren't Secrets. But then Gemini Changed the Rules. β—† Truffle Security Co.
πŸ•΅οΈ
The Rise of Kratos: How the New Phishing-as-a-Service Kit Industrializes Cybercrime
πŸ•΅οΈ
Don’t Let AI Make Passwords
πŸ•΅οΈ
Common Facebook Scam Method
πŸ•΅οΈ
Trump Orders All Federal Agencies to Phase Out Use of Anthropic Technology
πŸ•΅οΈ
Brainstorm, SonicWall, Junos, Glienicke BrΓΌcke, Burger King, Claude, Josh Marpet - SWN #559
🌐
Joint guidance on malicious cyber threats to SD-WAN networks
🌐
CSE calls on Canadian organizations and critical infrastructure providers to strengthen defences on fourth anniversary of Russia’s invasion of Ukraine
🌐
The cyber threat to marine transportation
🌐
Fake Fedex Email Delivers Donuts!, (Fri, Feb 27th)
πŸ“‘
Security considerations for SIMs (ITSAP.10.021)
πŸ“‘
GeekWeek 11
πŸ“‘
Spotting malicious email messages (ITSAP.00.100)
πŸ“‘
Cyber security considerations for drone use (ITSAP.00.143)
πŸ“‘
Developing your IT recovery plan (ITSAP.40.004)
πŸ“‘
Improving cyber security resilience through emergency preparedness planning (ITSM.10.014)
πŸ“‘
Joint guidance on secure connectivity principles for operational technology
πŸ“‘
Ukrainian man pleads guilty to running AI-powered fake ID site
πŸ“‘
Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams
πŸ“‘
Enterprise Spotlight: Data Center Modernization
πŸ“‘
Local KTAE and the IDA Pro plugin | Kaspersky official blog
πŸ“‘
Europol-led crackdown on The Com hackers leads to 30 arrests
πŸ“‘
DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams
πŸ“‘
Microsoft testing Windows 11 batch file security improvements
πŸ“‘
Mobile app permissions (still) matter more than you may think
πŸ“‘
Bringing more transparency to post-quantum usage, encrypted messaging, and routing security