96Articles
8Categories
2026-03-06Date
🚨
Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV CatalogThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The critical-severity vulnerabi…
KEV
🚨
CISA Adds iOS Flaws From Coruna Exploit Kit to KEV ListThe nation-state-grade iOS exploit kit targets 23 vulnerabilities affecting iOS 13 to 17.2.1. The post CISA Adds iOS Flaws From Coruna Exploit Kit to KEV List appeared first on SecurityWeek .
KEV
🐛
WordPress Membership Plugin Flaw Lets Attackers Create Admin Accounts
🐛
Zero-day exploits hit enterprises faster and harder
🐛
Apache ActiveMQ Flaw Enables DoS Attacks via Malformed Network Packets
🐛
AVideo Platform Vulnerability Allows Hackers to Hijack Streams via Zero-Click Command Injection
🐛
ZDI-26-170: GStreamer H.266 Codec Parser Out-Of-Bounds Write Remote Code Execution Vulnerability
🐛
ZDI-26-169: GStreamer H.266 Codec Parser Integer Underflow Remote Code Execution Vulnerability
🐛
ZDI-26-168: GStreamer RIFF Palette Integer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-167: GStreamer rtpqdm2depay Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-166: GStreamer rtpqdm2depay Out-Of-Bounds Write Remote Code Execution Vulnerability
🐛
ZDI-26-165: GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote Code Execution Vulnerability
🐛
ZDI-26-164: GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-163: GStreamer JPEG Parser Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-162: GStreamer H.266 Codec Parser Stack-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-161: GStreamer DVB Subtitles Out-Of-Bounds Write Remote Code Execution Vulnerability
🐛
ZDI-26-160: (Pwn2Own) Philips Hue Bridge hk_hap Ed25519 Signature Verification Authentication Bypass Vulnerability
🐛
ZDI-26-159: (Pwn2Own) Philips Hue Bridge hk_hap characteristics Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-158: (Pwn2Own) Philips Hue Bridge HomeKit hk_hap_pair_storage_put Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-157: (Pwn2Own) Philips Hue Bridge HomeKit Accessory Protocol Static Nonce Authentication Bypass Vulnerability
🐛
ZDI-26-156: (Pwn2Own) Philips Hue Bridge HomeKit Accessory Protocol Transient Pairing Mode Authentication Bypass Vulnerability
🐛
ZDI-26-155: (Pwn2Own) Philips Hue Bridge hap_pair_verify_handler Sub-TLV Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-154: (Pwn2Own) Philips Hue Bridge HomeKit Pair-Setup Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-153: (Pwn2Own) Philips Hue Bridge Zigbee Stack Custom Command Handler Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-152: Docker Desktop Docker Plugins Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
🐛
ZDI-26-151: Delta Electronics CNCSoft-G2 DPAX File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
⚠️
LeakBase marketplace unplugged by cops in 14 countries
⚠️
Europa im Visier von Cyber-Identitätsdieben
⚠️
Google Uncovers 90 Zero-Day Vulnerabilities Under Active Exploitation in 2025
KEV
⚠️
FBI Detains U.S. Government Contractor in Massive $46 Million Fraud Scheme
⚠️
Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
⚠️
Challenges and projects for the CISO in 2026
⚠️
AWS-LC Flaw Exposes Amazon Users to Attacks by Bypassing Certificate Chain Validation
⚠️
Teenage hacker myth primed for a middle-age criminal makeover
⚠️
Claude Used to Hack Mexican Government
⚠️
Rockwell Vulnerability Allowing Remote ICS Hacking Exploited in Attacks
⚠️
Google: Half of 2025's 90 Exploited Zero-Days Aimed at Enterprises - SecurityWeek
⚠️
RMM Tools Crucial for IT Operations, But Growing Threat as Attackers Weaponize Them
⚠️
Targeted advertising is also targeting malware
⚠️
Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
⚠️
WordPress membership plugin bug exploited to create admin accounts
⚠️
Your KnowBe4 Fresh Content Updates from February 2026
⚠️
What Tools Do Hackers Use to Weaponize Emails?
⚠️
EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security
⚠️
Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT
⚠️
CISA warns of Apple flaws exploited in spyware, crypto-theft attacks
⚠️
OAuth vulnerability in n8n automation platform could lead to system compromise
⚠️
How hackers bypassed MFA with a $120 phishing kit – until a global takedown shut it down
⚠️
Only 30 minutes per quarter on cyber risk: Why CISO-board conversations are falling short
⚠️
ClickFix attackers using new tactic to evade detection, says Microsoft
⚠️
Iran vs Everyone: 2FA-Bypass Phish, APT41 Drive, iOS 0days, Josh Marpet, and More - SWN #561
⚠️
Trump’s cyber strategy emphasizes offensive operations, deregulation, AI
⚠️
Proactive Preparation and Hardening Against Destructive Attacks: 2026 Edition
⚠️
How to scan for vulnerabilities with GitHub Security Lab’s open source AI-powered framework
📢
France's health ministry has confirmed a data breach involving the exposure of administrative information for 15.8 million patients and sensitive doctors' notes for approximately 165,000 individuals
📢
France's health ministry has confirmed a data breach involving the exposure of administrative information for 15.8 million patients and sensitive doctors' notes for approximately 165,000 individuals
📢
Wikipedia Hit By JavaScript Worm, ICE Contractor Data Base Leaked and more...
📢
Microsoft 365 Backup to add file-level restore for faster recovery
📢
FBI wiretap system tapped by hackers
📢
Friday Squid Blogging: Squid in Byzantine Monk Cooking
🔥
A ransomware attack on August 31, 2025, compromised the data of 1.2 million at the University of Hawaiʻi Cancer Center, targeting research servers but sparing clinical operations
🔥
A ransomware attack on August 31, 2025, compromised the data of 1.2 million at the University of Hawaiʻi Cancer Center, targeting research servers but sparing clinical operations
🔥
FBI investigates breach of surveillance and wiretap systems
🔥
Iranian APT Hacked US Airport, Bank, Software Company
🔥
FBI investigating ‘suspicious’ cyber activities on critical surveillance network | CNN Politics
🔥
TriZetto confirms 3.4M people’s health and personal data was stolen during breach
🔥
Ransomware Before Windows Even Starts
🔥
In Other News: FBI Hacked, US Security Pro Killed in Iran War, Hijacked Cameras Used in Khamenei Strike
🔥
Cognizant TriZetto breach exposes health data of 3.4 million patients
🔥
Data Loss Prevention (DLP): What It Is, Types, and Solutions
🔥
Ransomware attacks on schools and colleges | Kaspersky official blog
🕵️
ISC Stormcast For Friday, March 6th, 2026 https://isc.sans.edu/podcastdetail/9838, (Fri, Mar 6th)
🕵️
Microsoft, working with Europol, authorities from 6 countries, and 11 security organizations, disrupted the Tycoon 2FA phishing-as-a-service platform on seizing 330 domains
🕵️
Microsoft, working with Europol, authorities from 6 countries, and 11 security organizations, disrupted the Tycoon 2FA phishing-as-a-service platform on seizing 330 domains
🕵️
China-Nexus Hackers Target Telecommunication Providers with New Malware Attack
🕵️
New Linux Rootkits Leverage Advanced eBPF and io_uring Techniques for Stealthy Attacks
🕵️
Data Security Firm Evervault Raises $25 Million in Series B Funding
🕵️
China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks
🕵️
James ‘Aaron’ Bishop Tapped to Serve as New Pentagon CISO
🕵️
Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware
🕵️
PleaseFix Flaw Lets Hackers Access 1Password Vault via Comet AI Browser
🕵️
2024 TfL hack affected around 10 million people, BBC can reveal
🕵️
Off-Topic Friday
🕵️
Fake Claude Code install guides push infostealers in InstallFix attacks
🕵️
Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India
🕵️
ArmorCode Raises $16 Million for Exposure Management Platform
🕵️
Anthropic and the Pentagon
🕵️
AI as tradecraft: How threat actors operationalize AI
🕵️
Fake Calendar Invitations Move to Microsoft Outlook
🕵️
How the National Cyber Strategy Secures Our Digital Way of Life
🕵️
APT Attack Hiding In Plain Sight
🌐
Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor
📡
Ghanain man pleads guilty to role in $100 million fraud ring
📡
The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity
📡
Anthropic’s Claude found 22 vulnerabilities in Firefox over two weeks
📡
What cybersecurity actually does for your business