158Articles
9Categories
2026-03-31Date
🚨
5-month-old F5 BIG-IP DoS bug becomes critical RCE exploited in the wildA vulnerability misclassified five months ago as a denial-of-service issue in F5 BIG-IP Access Policy Manager (APM) turned out to be a critical pre-authentication remote code execution flaw that is now under active exploitation. Hackers are using it to deploy a persistent malware…
KEV
πŸ›
AL26-006 - Vulnerability impacting Citrix NetScaler ADC and NetScaler Gateway - CVE-2026-3055
πŸ›
TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks
KEV
πŸ›
CVE-2026-33636 LIBPNG has ARM NEON Palette Expansion Out-of-Bounds Read on AArch64
πŸ›
CVE-2025-67030
πŸ›
CVE-2026-0965 Libssh: libssh: denial of service via improper configuration file handling
πŸ›
CVE-2026-21712
πŸ›
CVE-2026-34353
πŸ›
CVE-2026-33750 brace-expansion: Zero-step sequence causes process hang and memory exhaustion
πŸ›
CVE-2026-33938 Handlebars.js has JavaScript Injection via AST Type Confusion by tampering @partial-block
πŸ›
CVE-2026-33939 Handlebars.js has Denial of Service via Malformed Decorator Syntax in Template Compilation
πŸ›
CVE-2026-33937 Handlebars.js has JavaScript Injection via AST Type Confusion
πŸ›
CVE-2026-33936 python-ecdsa: Denial of Service via improper DER length validation in crafted private keys
πŸ›
CVE-2026-33416 LIBPNG has use-after-free via pointer aliasing in `png_set_tRNS` and `png_set_PLTE`
πŸ›
CVE-2026-25645 Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility function
πŸ›
CVE-2026-0967 Libssh: libssh: denial of service via inefficient regular expression processing
πŸ›
CVE-2026-0966 Libssh: buffer underflow in ssh_get_hexa() on invalid input
πŸ›
CVE-2026-0964 Libssh: improper sanitation of paths received from scp servers
πŸ›
CVE-2026-33895 Forge has signature forgery in Ed25519 due to missing S > L check
πŸ›
CVE-2026-33896 Forge has a basicConstraints bypass in its certificate chain verification (RFC 5280 violation)
πŸ›
CVE-2026-33891 Forge has Denial of Service via Infinite Loop in BigInteger.modInverse() with Zero Input
πŸ›
CVE-2026-33542 Incus does not verify combined fingerprint when downloading images from simplestreams servers
πŸ›
CVE-2026-33941 Handlebars.js has JavaScript Injection in CLI Precompiler via Unescaped Names and Options
πŸ›
CVE-2026-33916 Handlebars.js has Prototype Pollution Leading to XSS through Partial Template Injection
πŸ›
CVE-2026-33940 Handlebars.js has JavaScript Injection via AST Type Confusion when passing an object as dynamic partial
πŸ›
Chromium: CVE-2026-4676 Use after free in Dawn
πŸ›
Detecting CVE-2026-20929: Kerberos Authentication Relay via CNAME Abuse
πŸ›
ZDI-26-250: Linux Kernel Analog Device Driver Improper Validation of Array Index Local Privilege Escalation Vulnerability
⚠️
CISA orders feds to patch actively exploited Citrix flaw by Thursday
KEV
⚠️
CrewAI Vulnerabilities Expose Devices to Hacking
⚠️
Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption
⚠️
Exploitation of Critical Fortinet FortiClient EMS Flaw Begins
⚠️
StrongSwan Flaw Allows Unauthenticated Attackers to Crash VPNs
⚠️
Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts
⚠️
The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority
⚠️
Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains
⚠️
The New Playground for Cybercriminals: Securing the Microsoft Teams Frontier
⚠️
PNG Vulnerabilities Allow Attackers to Trigger Crashes and Leak Sensitive Data
⚠️
Apple Adds ClickFix Attack Warnings in New macOS Tahoe Security Feature
⚠️
Tax Filing Scams Used to Deliver Malware in New Cybercrime Campaigns
⚠️
CareCloud Data Breach Exposes Patient Data After Hackers Access IT Systems
⚠️
Hacker hijacks Axios open-source project, used by millions, to push malware
⚠️
Iranian hackers breach FBI director’s personal email, and post his CV and photos online
⚠️
VRP 2025 Year in Review
⚠️
OpenAI patches twin leaks as Codex slips and ChatGPT spills
⚠️
8 ways to bolster your security posture on the cheap
⚠️
The external pressures redefining cybersecurity risk
⚠️
6 key takeaways from RSA Conference 2026
KEV
⚠️
Developing the Skills Needed for Modern Software Development - Keith Hoodlet, Ron Rasi... - ASW #376
⚠️
Vulnerability Research Is Cooked β€” Quarrelsome
⚠️
Cybercriminals Exploit Tax Season With New Phishing Tactics - Infosecurity Magazine
⚠️
Hackers exploiting critical F5 BIG-IP flaw in attacks, patch now
⚠️
Cisco source code stolen in Trivy-linked dev environment breach
⚠️
Android Developer Verification Rollout Begins Ahead of September Enforcement
⚠️
Attackers trojanize Axios HTTP library in highest-impact npm supply chain attack
⚠️
Beyond the Hype: Cyber Readiness, Zero Trust, and an Unscripted Conversation - SWN #568
⚠️
Claude AI finds Vim, Emacs RCE bugs that trigger on file open
⚠️
Cisco source code stolen in Trivy-linked dev environment breach
⚠️
Claude Code source code accidentally leaked in NPM package
⚠️
Multiple Vulnerabilities in Apple Products Could Allow for Privilege Escalation
⚠️
North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack
⚠️
Supply chain attack on Axios npm package: Scope, impact, and remediations
⚠️
What’s new in Tenable Cloud Security: Custom policies, AWS ABAC, and research-driven protection
⚠️
How we made Trail of Bits AI-native (so far)
πŸ“‹
Lloyds Data Security Incident Impacts 450,000 Individuals
πŸ“’
Nokia security advisory (AV26-302)
πŸ“’
Docker security advisory (AV26–301)
πŸ“’
Roundcube security advisory (AV26-300)
πŸ“’
Hitachi security advisory (AV26-299)
πŸ“’
Red Hat security advisory (AV26-298)
πŸ“’
[Control systems] CISA ICS security advisories (AV26-297)
πŸ“’
Ubuntu security advisory (AV26-296)
πŸ“’
Dell security advisory (AV26-295)
πŸ“’
IBM security advisory (AV26-294)
πŸ“’
Fortinet security advisory (AV26-096) – Update 1
πŸ“’
Dutch Finance Ministry takes treasury banking portal offline after breach
πŸ“’
Windows Tools Abused to Kill AV Ahead of Ransomware Attacks
πŸ“’
Dutch Finance Ministry Responds to Cyberattack by Taking Systems Offline
πŸ“’
Dutch Finance Ministry takes treasury banking portal offline after breach
πŸ“’
[Control systems] ABB security advisory (AV26-303)
πŸ“’
Symantec security advisory (AV26-304)
πŸ“’
HPE security advisory (AV26-305)
πŸ“’
New compliance guide available: ISO/IEC 27001:2022 on AWS
πŸ”₯
The Next Cybersecurity Crisis Isn’t Breachesβ€”It’s Data You Can’t Trust
πŸ”₯
Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks
πŸ”₯
Weekly Update 497
πŸ”₯
Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account
πŸ”₯
Application Control Bypass for Data Exfiltration, (Tue, Mar 31st)
πŸ”₯
TeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Compromise, TeamPCP Runs Dual Ransomware Operations, and AstraZeneca Data Released, (Mon, Mar 30th)
πŸ”₯
WhatsApp malware campaign delivers VBScript and MSI backdoors
πŸ”₯
Axios NPM Packages Breached in Ongoing Supply Chain Attack
πŸ”₯
Telegram-Based ResokerRAT Adds Screenshot Capture and Persistence
πŸ”₯
Google Introduces Advanced Ransomware Defense and Recovery Features in Drive
πŸ”₯
Cuties AI - 144,250 breached accounts
πŸ”₯
Fahndung nach Cyberkriminellen – 130 Firmen attackiert
πŸ”₯
Why ransomware is now after your data β€” and how to protect your home storage | Kaspersky official blog
πŸ”₯
Supply Chain Attack on Axios Pulls Malicious Dependency from npm
πŸ”₯
Behind the Curtain: AI's looming cyber nightmare
πŸ”₯
Incident response
πŸ”₯
Axios NPM Package Compromised: Supply Chain Attack Hits JavaScript HTTP Client with 100M+ Weekly Downloads
πŸ•΅οΈ
Inventors of Quantum Cryptography Win Turing Award
πŸ•΅οΈ
Censys Raises $70 Million for Internet Intelligence Platform
πŸ•΅οΈ
Venom Stealer Raises Stakes With Continuous Credential Harvesting
πŸ•΅οΈ
TeamPCP Moves From OSS to AWS Environments
πŸ•΅οΈ
ISC Stormcast For Tuesday, March 31st, 2026 https://isc.sans.edu/podcastdetail/9872, (Tue, Mar 31st)
πŸ•΅οΈ
The threat to critical infrastructure has changed. Has your readiness?
πŸ•΅οΈ
Applying security fundamentals to AI: Practical advice for CISOs
πŸ•΅οΈ
CyberheistNews Vol 16 #13 The 'Urgency Trap': Why Time Pressure is Your Biggest Email Red Flag
πŸ•΅οΈ
World Backup Day: Because β€œIt Won’t Happen to Me” Often Means It Will
πŸ•΅οΈ
EvilTokens Launches New Phishing Service Targeting Microsoft Accounts
πŸ•΅οΈ
Five Browser and AI Security Questions Keeping CxOs up at Night
πŸ•΅οΈ
Can Small LLMs Solve Security Flaws?
πŸ•΅οΈ
Supply chain attack hits 300 million-download Axios npm package
πŸ•΅οΈ
P2P WhatsApp Clone – No Setup or Signup
πŸ•΅οΈ
Healthcare tech firm CareCloud says hackers stole patient data
πŸ•΅οΈ
OpenAI ChatGPT fixes DNS data smuggling flaw β€’ The Register
πŸ•΅οΈ
Master These Tools or Potentially Get Left Behind
πŸ•΅οΈ
Release Notes: Cross-PlatformΒ Threat Analysis with macOS, SSL Decryption, andΒ 1,300+ New Detections
🌐
EtherHiding: The trojan in your toolchain
🌐
Hackers compromise Axios npm package to drop cross-platform malware
🌐
Supply chain risk management
🌐
Axios Future of Cybersecurity: Russians suspected of using iPhone spyware
πŸ“‘
How to Categorize AI Agents and Prioritize Risk
πŸ“‘
Microsoft fixes Outlook Classic crashes caused by Teams Meeting add-in
πŸ“‘
Hacker charged with stealing $53 million from Uranium crypto exchange
πŸ“‘
Health data giant CareCloud says hackers accessed patients’ medical records
πŸ“‘
TrendAIβ„’ Research at RSAC 2026: Advancing Defense Across AI‑Driven and Cyber‑Physical Threats
πŸ“‘
QBDI vs TritonDSE against a VM: who will be the fastest?
πŸ“‘
Media protection
πŸ“‘
Maintenance
πŸ“‘
Identification and authentication
πŸ“‘
Contingency planning
πŸ“‘
Configuration management
πŸ“‘
Assessment, authorization, and monitoring
πŸ“‘
Audit and accountability
πŸ“‘
Awareness and training
πŸ“‘
Access control
πŸ“‘
The controls and assurance activities families
πŸ“‘
Concepts and structure
πŸ“‘
Foreword, Overview, Introduction
πŸ“‘
Security and privacy controls and assurance activities catalogue (ITSP.10.033)
πŸ“‘
Cyber security and privacy risk management: A lifecycle approach
πŸ“‘
System and information integrity
πŸ“‘
System and communications protection
πŸ“‘
System and services acquisition
πŸ“‘
Risk assessment
πŸ“‘
Personal information handling and transparency
πŸ“‘
Personnel security
πŸ“‘
Program management
πŸ“‘
Planning
πŸ“‘
Physical and environmental protection
πŸ“‘
The Real Risk of Vibecoding
πŸ“‘
GIGABYTE Control Center vulnerable to arbitrary file write flaw
πŸ“‘
Proton launches new "Meet" privacy-focused conferencing platform
πŸ“‘
Google now allows you to change your @gmail.com address
πŸ“‘
This month in security with Tony Anscombe – March 2026 edition
πŸ“‘
AWS Security Agent on-demand penetration testing now generally available
πŸ“‘
Fake Installers to Monero: A Multi-Tool Mining Operation