98Articles
9Categories
2026-03-18Date
๐Ÿšจ
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-66376 Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability This type of vulnerability is a frequent attack vector โ€ฆ
KEV
๐Ÿšจ
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-20963 Microsoft SharePoint Deserialization of Untrusted Data Vulnerability This type of vulnerability is a frequent attack vector for malโ€ฆ
KEV
๐Ÿ›
Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE via Port 23
๐Ÿ›
FortiClient Hit by Severe SQL Injection Vulnerability Enabling Database Intrusion
๐Ÿ›
Researchers Disclose โ€˜RegPwn,โ€™ a Windows Registry Weakness Allowing SYSTEM Access
๐Ÿ›
New Kubernetes NFS CSI Vulnerability Enables Unauthorized Directory Deletion and Changes
๐Ÿ›
Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS
๐Ÿ›
CVE-2026-23241 audit: add missing syscalls to read class
๐Ÿ›
CVE-2025-71239 audit: add fchmodat2() to change attributes class
๐Ÿ›
Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit
๐Ÿ›
Ubuntu Desktop Vulnerability Lets Attackers Escalate Privileges to Full Root Access
๐Ÿ›
Critical Telnetd Vulnerability Enables Remote Code Execution Attacks
๐Ÿ›
Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access
๐Ÿ›
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors
๐Ÿ›
Amazon threat intelligence teams identify Interlock ransomware campaign targeting enterprise firewalls
โš ๏ธ
Another Medicat Device Firm Hit
โš ๏ธ
AWS Bedrock AgentCore Sandbox Bypass Enables Stealthy C2 and Data Exfiltration
โš ๏ธ
Fake Telegram Download Site Delivers Stealthy In-Memory Malware Loader
โš ๏ธ
CISOs rethink their data protection strategies
โš ๏ธ
Aura - 903,080 breached accounts
โš ๏ธ
From Misconfigured Spring Boot Actuator to SharePoint Exfiltration: How Stolen Credentials Bypass MFA
โš ๏ธ
Cybersecurity and privacy priorities for 2026: The legal risk map
โš ๏ธ
ClickFix treibt neue Infostealer-Kampagnen an
โš ๏ธ
Can you prove the person on the other side is real?
โš ๏ธ
Researcher Discovers 4th WhatsApp View Once Bypass; Meta Wonโ€™t Patch
โš ๏ธ
ForceMemo Hijacks GitHub Accounts, Backdoors Python Repos
โš ๏ธ
Reco targets AI agent blind spots with new security capability
โš ๏ธ
Apple WebKit Security Flaw Exposes iOS and macOS Users to Content-Based Bypass Attacks
โš ๏ธ
Crypto e-commerce platform Bitrefill accuses North Korea of stealing 18,500 purchase records | The Record from Recorded Future News
โš ๏ธ
The Refund Fraud Economy: Exploiting Major Retailers and Payment Platforms
โš ๏ธ
New โ€œDarkswordโ€ iOS exploit used in infostealer attack on iPhones
โš ๏ธ
โ€˜DarkSwordโ€™ iOS Exploit Kit Used by State-Sponsored Hackers, Spyware Vendors
โš ๏ธ
Ransomware gang exploits Cisco flaw in zero-day attacks since January
โš ๏ธ
AI Reinforces Your Bias
โš ๏ธ
ConnectWise patches new flaw allowing ScreenConnect hijacking
โš ๏ธ
Shipping-Themed Phishing Scams Target the Middle East and Africa
โš ๏ธ
The Collapse of Predictive Security in the Age of Machine-Speed Attacks
โš ๏ธ
CISA orders feds to patch Zimbra XSS flaw exploited in attacks
KEV
โš ๏ธ
CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization
๐Ÿ“‹
Apple Debuts Background Security Improvements With Fresh WebKit Patches
๐Ÿ“ข
[Control Systems] Phoenix Contact Security Advisory (AV26-247)
๐Ÿ“ข
Apple security advisory (AV26-248)
๐Ÿ“ข
GNU security advisory (AV26-249)
๐Ÿ“ข
Mitel security advisory (AV26-250)
๐Ÿ“ข
VMware security advisory (AV26-252)
๐Ÿ“ข
Atlassian security advisory (AV26-251)
๐Ÿ“ข
Citrix security advisory (AV26-253)
๐Ÿ“ข
Roundcube security advisory (AV26-254)
๐Ÿ“ข
Jenkins security advisory (AV26-255)
๐Ÿ“ข
Google Chrome security advisory (AV26-256)
๐Ÿ“ข
ConnectWise security advisory (AV26-257)
๐Ÿ”ฅ
Microsoft Teams-Based Vishing Attack Tricks Victims Into Quick Assist Takeover
๐Ÿ”ฅ
LeakNet boosts ransomware with ClickFix lures, stealthy Deno loader
๐Ÿ”ฅ
Less Lucrative Ransomware Market Makes Attackers Alter Methods
๐Ÿ”ฅ
9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors
๐Ÿ”ฅ
Iranian Hackers Likely Used Malware-Stolen Credentials in Stryker Breach
๐Ÿ”ฅ
Robotic Surgery Giant Intuitive Discloses Cyberattack - SecurityWeek
๐Ÿ”ฅ
Shadow AI Risk: How SaaS Apps Are Quietly Enabling Massive Breaches
๐Ÿ”ฅ
Marquis says over 672,000 people had personal and financial data stolen in ransomware attack
๐Ÿ”ฅ
Marquis: Ransomware gang stole data of 672K people in cyberattack
๐Ÿ”ฅ
Aura confirms data breach exposing 900,000 marketing contacts
๐Ÿ•ต๏ธ
News alert: GitGuardian study shows AI coding tools double leak rates as 29M credentials hit GitHub
๐Ÿ•ต๏ธ
News alert: Orchid Security brings Zero-Trust to AI Agent identities, earns Gartner recognition
๐Ÿ•ต๏ธ
Judicial Targets Hit by COVERT RAT via Court Docs and GitHub Payloads
๐Ÿ•ต๏ธ
Boggy Serpens Hits Diplomats, Critical Infrastructure in Espionage Waves
๐Ÿ•ต๏ธ
Vidar Stealer 2.0 Spreads via Fake Game Cheats Shared on GitHub and Reddit
๐Ÿ•ต๏ธ
Language of the Board as CISO-Board Time Falls Short and CISOs Struggle with Risk - BSW #439
๐Ÿ•ต๏ธ
Iran Cyber Ops Merge With PsyOps and EW Amid Escalating Conflict
๐Ÿ•ต๏ธ
OpenAI Introduces GPT-5.4 Mini and Nano for Faster, Lightweight AI Performance
๐Ÿ•ต๏ธ
BSI moniert Software-Sicherheit im Gesundheitswesen
๐Ÿ•ต๏ธ
Metaโ€™s AI Glasses and Privacy
๐Ÿ•ต๏ธ
ISC Stormcast For Wednesday, March 18th, 2026 https://isc.sans.edu/podcastdetail/9854, (Wed, Mar 18th)
๐Ÿ•ต๏ธ
Android OS-Level Attack Bypasses Mobile Payment Security - Infosecurity Magazine
๐Ÿ•ต๏ธ
Hackers Target Cybersecurity Firm Outpost24 in 7-Stage Phish
๐Ÿ•ต๏ธ
CursorJackโ€™ Attack Path Exposes Code Execution Risk in AI Development - Infosecurity Magazine
๐Ÿ•ต๏ธ
UIDAI Introduces Bug Bounty Program to Strengthen Aadhaar Defenses
๐Ÿ•ต๏ธ
Scans for "adminer", (Wed, Mar 18th)
๐Ÿ•ต๏ธ
FancyBear Server Leak Exposes Stolen Credentials, 2FA Secrets, NATO Targets
๐Ÿ•ต๏ธ
Manifold Raises $8 Million for AI Detection and Response
๐Ÿ•ต๏ธ
The Lost Art of BIA
๐Ÿ•ต๏ธ
Russians caught stealing personal data from Ukrainians with new advanced iPhone hacking tools
๐Ÿ•ต๏ธ
Virtual Summit Today: Supply Chain & Third-Party Risk Summit
๐Ÿ•ต๏ธ
EU Sanctions Chinese, Iranian Firms Supporting Hacking Operations
๐Ÿ•ต๏ธ
Cloud Security Startup Native Exits Stealth With $42 Million in Funding
๐Ÿ•ต๏ธ
Observability for AI Systems: Strengthening visibility for proactive risk detection
๐Ÿ•ต๏ธ
OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs
๐Ÿ•ต๏ธ
Autonomous Offensive Security Firm XBOW Raises $120M at $1B+ Valuation
๐Ÿ•ต๏ธ
Who Really Owns AI Decisions
๐Ÿ•ต๏ธ
How NextWaveโ€™s Evolution Drives Shared Success
๐ŸŽ™๏ธ
Risky Business #829 -- Sneaky lobsters: Why AI is the new insider threat
๐Ÿ“ก
Weekly Threat Bulletin โ€“ March 18th, 2026
๐Ÿ“ก
Why East-West Visibility Matters for Grid Security
๐Ÿ“ก
Product Walkthrough: How Mesh CSMA Reveals and Breaks Attack Paths to Crown Jewels
๐Ÿ“ก
Claude Code Security and Magecart: Getting the Threat Model Right
๐Ÿ“ก
Nordstrom's email system abused to send crypto scams to customers
๐Ÿ“ก
FBI is buying location data to track US citizens, director confirms
๐Ÿ“ก
Proofpoint Pursues FedRAMP High Authorization Process for Collaboration Security
๐Ÿ“ก
The SOC Files: Time to โ€œSapecarโ€. Unpacking a new Horabot campaign in Mexico