102Articles
8Categories
2026-03-16Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.  CVE-2025-47813 Wing FTP Server Information Disclosure Vulnerability This type of vulnerability is a frequent attack vector for malicious cyb…
KEV
πŸ›
FortiGate Firewall Exploitation Fuels Network Breaches in New Attack Wave
πŸ›
Nine critical vulnerabilities in Linux AppArmor put over 12M enterprise systems at risk
πŸ›
Chromium: CVE-2026-3909 Out of bounds write in Skia
πŸ›
Ransomware Under Pressure: Tactics, Techniques, and Procedures in a Shifting Threat Landscape
πŸ›
ZDI-26-215: KeePassXC OpenSSL Configuration Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
πŸ›
ZDI-26-214: GIMP HDR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
πŸ›
ZDI-26-213: GIMP LBM File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
πŸ›
ZDI-26-212: Schneider Electric EcoStruxure Data Center Expert Hard-coded Password Remote Code Execution Vulnerability
πŸ›
ZDI-26-211: Delta Electronics ASDA-Soft PAR File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
πŸ›
ZDI-26-210: (Pwn2Own) Samsung Galaxy S25 Samsung Members Security Feature Bypass Vulnerability
πŸ›
ZDI-26-209: (Pwn2Own) Samsung Galaxy S25 Samsung Members Open Redirect Security Bypass Vulnerability
πŸ›
ZDI-26-208: (Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Integer Overflow Remote Code Execution Vulnerability
πŸ›
ZDI-26-207: (Pwn2Own) Canon imageCLASS MF654Cdw dtdc_addr_importSub Stack-based Buffer Overflow Remote Code Execution Vulnerability
πŸ›
ZDI-26-206: (Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
πŸ›
ZDI-26-205: (Pwn2Own) Canon imageCLASS MF654Cdw PJCC Request Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
πŸ›
ZDI-26-204: (Pwn2Own) Canon imageCLASS MF654Cdw XPS Parser Stack-based Buffer Overflow Remote Code Execution Vulnerability
πŸ›
ZDI-26-203: (Pwn2Own) Canon imageCLASS MF654Cdw XML SOAP Request Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
πŸ›
ZDI-26-202: (Pwn2Own) QNAP TS-453E Hyper Data Protector Plugin query_original_file_size SQL Injection Remote Code Execution Vulnerability
πŸ›
ZDI-26-201: (Pwn2Own) QNAP TS-453E Hyper Data Protector Plugin Hard-Coded Credentials Authentication Bypass Vulnerability
πŸ›
ZDI-26-200: (Pwn2Own) QNAP TS-453E nvrlog_event_add msg SQL Injection Remote Code Execution Vulnerability
πŸ›
ZDI-26-199: (Pwn2Own) QNAP TS-453E conn_log_tool Format String Remote Code Execution Vulnerability
πŸ›
ZDI-26-198: (Pwn2Own) QNAP TS-453E malware_remover Code Injection Remote Code Execution Vulnerability
πŸ›
ZDI-26-197: (Pwn2Own) ChargePoint Home Flex revssh Service Command Injection Remote Code Execution Vulnerability
πŸ›
ZDI-26-196: (Pwn2Own) ChargePoint Home Flex OCPP getpreq Stack-based Buffer Overflow Remote Code Execution Vulnerability
πŸ›
ZDI-26-195: (Pwn2Own) ChargePoint Home Flex Inclusion of Sensitive Information in Source Code Information Disclosure Vulnerability
πŸ›
ZDI-26-194: Microsoft Exchange InterceptorSmtpAgent Improper Input Validation Security Feature Bypass Vulnerability
πŸ›
ZDI-26-193: (Pwn2Own) Linux Kernel nf_tables_newset Out-Of-Bounds Write Information Disclosure Vulnerability
πŸ›
ZDI-26-192: Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerability
πŸ›
ZDI-26-191: (Pwn2Own) Linux Kernel nf_tables Use-After-Free Privilege Escalation Vulnerability
πŸ›
ZDI-26-190: (Pwn2Own) VMware Workstation PVSCSI Heap-based Buffer Overflow Local Privilege Escalation Vulnerability
πŸ›
ZDI-26-189: (Pwn2Own) VMware ESXi VMXNET3 Integer Overflow Local Privilege Escalation Vulnerability
πŸ›
ZDI-26-188: (Pwn2Own) VMware ESXi VMCI Integer Underflow Local Privilege Escalation Vulnerability
πŸ›
ZDI-26-187: (Pwn2Own) Synology DiskStation Manager Netatalk Library Buffer Overflow Remote Code Execution Vulnerability
⚠️
Notorious Hacker Group "The Comm," Operation Synergia Takedown, Stryker Cyberattack Update & More
⚠️
Microsoft Issues Out-of-Band Patch for Critical Windows 11 RRAS RCE Flaws
⚠️
Attackers Exploit Teams, Quick Assist to Deploy Stealthy A0Backdoor
⚠️
ClickFix techniques evolve in new infostealer campaigns
⚠️
What it takes to win that CSO role
⚠️
AI Governance, new book (Code War) from Allie Mellen, and the weekly news! - ESW #450
⚠️
DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage
⚠️
MEA Shipment Phishing Scams Surge, Stealing Banking Data in Real Time
⚠️
Open VSX extensions hijacked: GlassWorm malware spreads via dependency abuse
⚠️
ForceMemo: Python Repositories Compromised in GlassWorm Aftermath
⚠️
Betterleaks Launches as Open-Source Tool for Scanning Files, Directories, and Git Repositories
⚠️
RondoDox Botnet Scales Up, Exploiting 174 Vulnerabilities via Residential IPs
⚠️
Why Security Validation Is Becoming Agentic
⚠️
ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers
⚠️
Chrome 146 Update Patches Two Exploited Zero-Days - SecurityWeek
⚠️
Handala Hackers Exploit RDP and NetBird in Coordinated Wiper Attacks
⚠️
Why Cyber Attribution Gets Complicated
⚠️
⚑ Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More
⚠️
CISA flags Wing FTP Server flaw as actively exploited in attacks
KEV
⚠️
TrendAIβ„’ Supports Global Law Enforcement Efforts
⚠️
VU#624941: LibreChat RAG API contains a log-injection vulnerability
πŸ“’
Dell security advisory (AV26-238)
πŸ“’
IBM security advisory (AV26-237)
πŸ“’
Ubuntu security advisory (AV26-239)
πŸ“’
Google Chrome security advisory (AV26-240)
πŸ“’
Red Hat security advisory (AV26-242)
πŸ“’
[Control systems] CISA ICS security advisories (AV26–241)
πŸ“’
Microsoft Edge security advisory (AV26-243)
πŸ“’
HPE security advisory (AV26-244)
πŸ”₯
OpenClaw AI Agents Vulnerable to Indirect Prompt Injection, Causing Data Leaks
πŸ”₯
IBM Discovers β€˜Slopoly’ AI-Generated Malware Linked to Hive0163 Ransomware
πŸ”₯
Web Shells, Tunnels, and Ransomware: Dissecting a Warlock Attack
πŸ”₯
Google Unveils Android 17 Advanced Protection Mode to Stop Malicious Services
πŸ”₯
Google Looker Studio Vulnerabilities Allow Attackers to Exfiltrate Data from Google Services
πŸ”₯
China-Linked Hackers Hit Asian Militaries in Patient Espionage Operation
πŸ”₯
Cyberattack Hits Poland’s Nuclear Research Center
πŸ”₯
CamelClone Uses Public File-Sharing Sites in Government Cyberattacks
πŸ”₯
Poland's nuclear research centre targeted by cyberattack
πŸ”₯
Security Firm Executive Targeted in Sophisticated Phishing Attack
πŸ”₯
Stryker attack wiped tens of thousands of devices, no malware needed
πŸ”₯
2025 Identity Threat Landscape Report: Inside the Infostealer Economy: Credential Threats in 2025
πŸ•΅οΈ
ISC Stormcast For Monday, March 16th, 2026 https://isc.sans.edu/podcastdetail/9850, (Mon, Mar 16th)
πŸ•΅οΈ
Meta Permanently Disables End-to-End Encryption for Instagram DMs
πŸ•΅οΈ
Konni Hijacks KakaoTalk Accounts in Spear-Phishing Malware Campaign
πŸ•΅οΈ
ACRStealer Variant Deploys Syscall Evasion, TLS C2, Secondary Payloads
πŸ•΅οΈ
Hacking Attempt Reported at Poland’s Nuclear Research Center
πŸ•΅οΈ
Creating Noise: The Emerging Obfuscation Technique Designed to Evade Email Security NLP Detection Capabilities
πŸ•΅οΈ
Fake FileZilla Downloads Spread RAT via Stealthy Multi-Stage Loader
πŸ•΅οΈ
Possible New Result in Quantum Factorization
πŸ•΅οΈ
Fake enterprise VPN sites used to steal company credentials
πŸ•΅οΈ
Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation
πŸ•΅οΈ
Threat Actor Targeting VPN Users in New Credential Theft Campaign
πŸ•΅οΈ
Mentorship Monday - Discussions for career and learning!
πŸ•΅οΈ
AppsFlyer Web SDK hijacked to spread crypto-stealing JavaScript code
πŸ•΅οΈ
Oracle EBS Hack: Only 4 Corporate Giants Still Silent on Potential Impact
πŸ•΅οΈ
Help on the line: How a Microsoft Teams support call led to compromise
πŸ•΅οΈ
New Microsoft Purview innovations for Fabric to safely accelerate your AI transformation
πŸ•΅οΈ
AI Hallucinations Become Security’s Problem
🌐
Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse
🌐
Free real estate: GoPix, the banking Trojan living off your memory
πŸ“‘
Microsoft pulls Samsung app blocking Windows C: drive from Store
πŸ“‘
/proxy/ URL scans with IP addresses, (Mon, Mar 16th)
πŸ“‘
Shadow AI is everywhere. Here’s how to find and secure it.
πŸ“‘
When AI hallucinations turn fatal: how to stay grounded in reality | Kaspersky official blog
πŸ“‘
Microsoft Exchange Online outage blocks access to mailboxes
πŸ“‘
UK’s Companies House confirms security flaw exposed business data
πŸ“‘
Free parking in Russia after Distributed Denial-of-Service attack knocks city’s parking system offline
πŸ“‘
Securing Autonomous AI Agents with TrendAI & NVIDIA OpenShell