113Articles
9Categories
2026-03-11Date
🚨
Critical flaw in HPE Aruba CX switches lets attackers seize admin control without credentialsHPE Aruba Networking has released patches for five vulnerabilities in its AOS-CX switch software, the most severe of which could let a remote attacker take administrative control of enterprise network switches without any credentials. The critical flaw, CVE-2026-23813, scored 9.8…
KEV
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-68613 n8n Improper Control of Dynamically-Managed Code Resources Vulnerability This type of vulnerability is a frequent attack vector for…
KEV
πŸ›
Fake Claude Code Installs, Arpa Phishing, Iranian and Russian Teams Mount Cyber Retaliation
πŸ›
Microsoft SQL Server Zero-Day Exposes Privilege Escalation Risk for Users
πŸ›
Fortinet FortiManager fgtupdates Flaw Enables Attackers to Execute Malicious Commands Remotely
πŸ›
Microsoft .NET 0-Day Flaw Opens Doors for Denial of Service Attacks
πŸ›
CVE-2026-26017 CoreDNS ACL Bypass
πŸ›
CVE-2026-26018 CoreDNS Loop Detection Denial of Service Vulnerability
πŸ›
CVE-2026-3731 libssh SFTP Extension Name sftp.c sftp_extensions_get_data out-of-bounds
πŸ›
CVE-2025-69646 Binutils objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF debug_rnglists data. A logic error in the handling of the debug_rnglists header can cause objdump to repeatedly print the same warning message and fail to terminate, resulting in an unbounded logging loop until the process is interrupted. The issue was observed in binutils 2.44. A local attacker can exploit this vulnerability by supplying a malicious input file, leading to excessive CPU and I/O usage and preventing completion of the objdump analysis.
πŸ›
CVE-2025-69652 GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an abort (SIGABRT) when processing a crafted ELF binary with malformed DWARF abbrev or debug information. Due to incomplete state cleanup in process_debug_info(), an invalid debug_info_p state may propagate into DWARF attribute parsing routines. When certain malformed attributes result in an unexpected data length of zero, byte_get_little_endian() triggers a fatal abort. No evidence of memory corruption or code execution was observed; the impact is limited to denial of service.
πŸ›
CVE-2025-69645 Binutils objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF debug information. A logic error in the handling of DWARF compilation units can result in an invalid offset_size value being used inside byte_get_little_endian, leading to an abort (SIGABRT). The issue was observed in binutils 2.44. A local attacker can trigger the crash by supplying a malicious input file.
πŸ›
CVE-2025-69649 GNU Binutils thru 2.46 readelf contains a null pointer dereference vulnerability when processing a crafted ELF binary with malformed header fields. During relocation processing, an invalid or null section pointer may be passed into display_relocations(), resulting in a segmentation fault (SIGSEGV) and abrupt termination. No evidence of memory corruption beyond the null pointer dereference, nor any possibility of code execution, was observed.
πŸ›
CVE-2026-27142 URLs in meta content attribute actions are not escaped in html/template
πŸ›
CVE-2026-3713 pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow
πŸ›
CVE-2026-27139 FileInfo can escape from a Root in os
πŸ›
CVE-2024-14027 xattr: switch to CLASS(fd)
πŸ›
CVE-2026-29786 node-tar: Hardlink Path Traversal via Drive-Relative Linkpath
πŸ›
CVE-2025-69650 GNU Binutils thru 2.46 readelf contains a double free vulnerability when processing a crafted ELF binary with malformed relocation data. During GOT relocation handling, dump_relocations may return early without initializing the all_relocations array. As a result, process_got_section_contents() may pass an uninitialized r_symbol pointer to free(), leading to a double free and terminating the program with SIGABRT. No evidence of exploitable memory corruption or code execution was observed; the impact is limited to denial of service.
πŸ›
CVE-2025-69651 GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an invalid pointer free when processing a crafted ELF binary with malformed relocation or symbol data. If dump_relocations returns early due to parsing errors, the internal all_relocations array may remain partially uninitialized. Later, process_got_section_contents() may attempt to free an invalid r_symbol pointer, triggering memory corruption checks in glibc and causing the program to terminate with SIGABRT. No evidence of further memory corruption or code execution was observed; the impact is limited to denial of service.
πŸ›
CVE-2025-69644 An issue was discovered in Binutils before 2.46. The objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed debug information. A logic flaw in the handling of DWARF location list headers can cause objdump to enter an unbounded loop and produce endless output until manually interrupted. This issue affects versions prior to the upstream fix and allows a local attacker to cause excessive resource consumption by supplying a malicious input file.
πŸ›
CVE-2026-27137 Incorrect enforcement of email constraints in crypto/x509
πŸ›
CVE-2026-27138 Panic in name constraint checking for malformed certificates in crypto/x509
πŸ›
Microsoft Active Directory Flaw Allows Attackers to Escalate Privileges
πŸ›
Analyzing "Zombie Zip" Files (CVE-2026-0866), (Wed, Mar 11th)
πŸ›
Critical Vulnerability in Microsoft Office Allows Malicious Code to Run Remotely
πŸ›
Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices
πŸ›
Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials
πŸ›
PageJack in Action: CVE-2022-0995 exploit
πŸ›
Chromium: CVE-2026-3537 Object lifecycle issue in PowerVR
πŸ›
CISA warns of actively exploited Ivanti EPM and Cisco SD-WAN flaws
KEV
πŸ›
Six mistakes in ERC-4337 smart accounts
⚠️
Microsoft Patch Tuesday, March 2026 Edition
⚠️
Jack & Jill went up the hill β€” and an AI tried to hack them
⚠️
Microsoft Fixes 79 Vulnerabilities in March 2026 Patch Tuesday, Mitigating Two Exploited 0-Days
⚠️
Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets
⚠️
HR Departments Targeted by Multi-Layered BlackSanta EDR Killer Malware
⚠️
12 ways attackers abuse cloud services to hack your enterprise
⚠️
UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours
⚠️
Being Exploitable While Your Risk Tolerance Changes and You Unblock Innovation - BSW #438
⚠️
Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days
⚠️
A 5-step approach to taming shadow AI
⚠️
Why zero trust breaks down in IoT and OT environments
⚠️
Did cybersecurity recently have its Gatling gun moment?
⚠️
Salesforce confirms ShinyHunters exploited Experience Cloud sites | news | SC Media
⚠️
Overly permissive β€˜guest’ settings put Salesforce customers at risk
⚠️
FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
⚠️
Fortinet, Ivanti, Intel Patch High-Severity Vulnerabilities
⚠️
How to 10x Your Vulnerability Management Program in the Agentic Era
⚠️
CISA: Recently patched Ivanti EPM flaw now actively exploited
KEV
⚠️
What Boards Must Demand in the Age of AI-Automated Exploitation
⚠️
AWS expands Security Hub for multicloud security operations
⚠️
UNC6426 Hackers Exploit NPM Package to Gain AWS Admin Access in 72 Hours
⚠️
Managing Python on Servers
⚠️
CISA orders feds to patch n8n RCE flaw exploited in attacks
KEV
⚠️
SQLi flaw in Elementor Ally plugin impacts 250k+ WordPress sites
⚠️
Contagious Interview: Malware delivered through fake developer job interviews
⚠️
ResumΓ©s with malicious ISO attachments are circulating, says Aryaka
⚠️
Risky Business #828 -- The Coruna exploits are truly exquisite
πŸ“‹
ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Moxa, Mitsubishi Electric
πŸ“’
Canada Needs Nationalized, Public AI
πŸ“’
Canadian retailer Loblaw investigates data breach
πŸ“’
[Control systems] Hitachi security advisory (AV26-218)
πŸ“’
VMware security advisory (AV26-221)
πŸ“’
Google Chrome security advisory (AV26-220)
πŸ“’
Intel security advisory (AV26-219)
πŸ“’
GitLab security advisory (AV26-222)
πŸ“’
HPE security advisory (AV26-224)
πŸ“’
Cisco security advisory (AV26-223)
πŸ“’
Drupal security advisory (AV26-225)
πŸ“’
JetBrains security advisory (AV26-226)
πŸ”₯
Trojanized Red Alert App Targets Israeli Users in SMS Scam to Steal Sensitive Data
πŸ”₯
β€˜BlackSanta’ Malware Activates EDR and AV Killer Before Detonating Payload
πŸ”₯
Michelin Confirms Data Breach Linked to Oracle EBS Attack
πŸ”₯
238,000 Impacted by Bell Ambulance Data Breach
πŸ”₯
Hacker broke into FBI and compromised Epstein files, report says
πŸ”₯
New PhantomRaven NPM attack wave steals dev data via 88 packages
πŸ”₯
Ransomware Attacks Surge by 50% Even as Payments Drop
πŸ”₯
Cork Stryker plants hit by suspected global Iranian-linked cyberattack | Cork Beo
πŸ”₯
AI Agent Hacks McKinsey
πŸ•΅οΈ
ISC Stormcast For Wednesday, March 11th, 2026 https://isc.sans.edu/podcastdetail/9844, (Wed, Mar 11th)
πŸ•΅οΈ
PhantomRaven Malware Resurfaces, Targets npm Supply Chain to Steal Developer Secrets
πŸ•΅οΈ
What are You Working on Wednesday
πŸ•΅οΈ
BeatBanker Trojan Spreads via Phishing, Deploys Crypto Miner and RAT on Targeted Devices
πŸ•΅οΈ
Google Warns of AI‑Driven Adaptive Malware Rewriting Its Own Code
πŸ•΅οΈ
Quantro Security Emerges From Stealth With $2.5 Million in Funding
πŸ•΅οΈ
Instagram Down: Global Outage Prevents Users from Posting and Messaging
πŸ•΅οΈ
UK plans to shift fraud fight onto telecoms, tech companies | The Record from Recorded Future News
πŸ•΅οΈ
OpenAI to Acquire AI Security Startup Promptfoo
πŸ•΅οΈ
Scanner Raises $22 Million for AI-Powered Threat Hunting
πŸ•΅οΈ
New 'Zombie ZIP' technique lets malware slip past security tools
πŸ•΅οΈ
CISO Conversations: Aimee Cardwell
πŸ•΅οΈ
Balancing LLMs and SLMs for Data Security
πŸ•΅οΈ
Teen crew caught selling DDoS attack tools - Help Net Security
πŸ•΅οΈ
Wiz Joins Google Cloud as Landmark Acquisition Closes
πŸ•΅οΈ
Asus routers hijacked to power dangerous cybercrime proxy network
πŸ•΅οΈ
MedTech Giant Stryker Crippled by Iran-Linked Hacker Attack
πŸ•΅οΈ
Senate Confirms Joshua Rudd to Lead NSA and US Cyber Command
πŸ•΅οΈ
Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown
πŸ•΅οΈ
New β€˜BlackSanta’ EDR killer spotted targeting HR departments
πŸ•΅οΈ
News alert: Qevlar AI raises $30M to turn security alerts into actionable defense insights across SOCs
πŸ•΅οΈ
CISO Tenure Has Doubled
🌐
BeatBanker and BTMOB trojans: infection techniques and how to stay safe | Kaspersky official blog
🌐
Medtech giant Stryker offline after Iran-linked wiper malware attack
πŸ“‘
Weekly Threat Bulletin – March 11th, 2026
πŸ“‘
Google completes $32B acquisition of Wiz
πŸ“‘
Meta adds new WhatsApp, Facebook, and Messenger anti-scam tools
πŸ“‘
Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown
πŸ“‘
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
πŸ“‘
Researchers Trick Perplexity's Comet AI Browser Into Phishing Scam in Under Four Minutes
πŸ“‘
Pro-Iran hacktivist group says it is behind attack on medical tech giant Stryker
πŸ“‘
WhatsApp introduces parent-managed accounts for pre-teens
πŸ“‘
AI Security for Apps is now generally available