126Articles
9Categories
2026-04-01Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-5281 Google Dawn Use-After-Free Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses…
KEV
πŸ›
Cisco Breached: Source Code Stolen - Cybersecurity Today
πŸ›
Hackers Actively Exploit Critical WebLogic RCE Vulnerabilities in Ongoing Attacks
πŸ›
TrueConf Vulnerability Under Active Exploitation in Southeast Asia Government Attacks
πŸ›
CVE-2025-66037 OpenSC: Out of Bounds vulnerability
πŸ›
CVE-2026-34714
πŸ›
CVE-2026-21717
πŸ›
CVE-2026-21715
πŸ›
CVE-2026-21714
πŸ›
CVE-2025-49010 OpenSC: Stack-buffer-overflow WRITE in GET RESPONSE
πŸ›
CVE-2025-66215 OpenSC: Stack-buffer-overflow WRITE in card-oberthur
πŸ›
CVE-2025-66038 OpenSC: `sc_compacttlv_find_tag` can return out-of-bounds pointers
πŸ›
CVE-2026-4176 Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib
πŸ›
CVE-2026-21710
πŸ›
CVE-2026-34043 Serialize JavaScript has CPU Exhaustion Denial of Service via crafted array-like objects
πŸ›
CVE-2026-21716
πŸ›
CVE-2026-21713
πŸ›
CVE-2026-21711
πŸ›
CVE-2023-52676 bpf: Guard stack limits against 32bit overflow
πŸ›
CVE-2024-35839 netfilter: bridge: replace physindev with physinif in nf_bridge_info
πŸ›
PoC Exploit Code Published for nginx-ui Backup Restore Security Flaw
πŸ›
CVE-2024-41013 xfs: don't walk off the end of a directory data block
πŸ›
Vim Modeline Vulnerability Opens Door to Arbitrary OS Command Execution
πŸ›
New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation β€” Patch Released
KEV
πŸ›
Exploited Zero-Day Among 21 Vulnerabilities Patched in Chrome
πŸ›
Vim and GNU Emacs: Claude Code helpfully found zero-day exploits for both
⚠️
Mercor says it was hit by cyberattack tied to compromise of open-source LiteLLM project
⚠️
Anthropic employee error exposes Claude Code source
⚠️
Google Cloud’s Vertex AI Hit by Vulnerability Enabling Sensitive Data Access
⚠️
Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms
⚠️
Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents
⚠️
9 ways CISOs can combat AI hallucinations
⚠️
Security awareness is not a control: Rethinking human risk in enterprise security
⚠️
A Taxonomy of Cognitive Security
⚠️
Google fixes fourth Chrome zero-day exploited in attacks in 2026
⚠️
Hackers Exploit Hotel Booking Systems to Send Fake Payment Requests to Guests
⚠️
Unrelenting Threats Against Government and Education: Why Human Risk Is the Front Line
⚠️
WhatsApp malware campaign uses malicious VBS files to gain persistent access
⚠️
Cisco Faces Alleged Data Leak as ShinyHunters Claims Responsibility
⚠️
Microsoft Teams to Improve Privacy With EXIF Data Removal Feature
⚠️
Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts
⚠️
TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets - Infosecurity Magazine
⚠️
Google Warns of New Chrome Zero-Day Under Active Exploitation – Users Urged to Update Immediately
KEV
⚠️
US Charges Uranium Crypto Exchange Hacker
⚠️
Routine Access Is Powering Modern Intrusions, a New Threat Report Finds
⚠️
CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails
⚠️
Fireside Chat: AI agents are reshaping mobile attacks β€” and exposing weak API trust models
⚠️
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
⚠️
Chronic Resource Constraints: Doing More With Less in Public Sector Cybersecurity
⚠️
Hackers exploit TrueConf zero-day to push malicious software updates
⚠️
RSA 2026: Agentic Future, Analog Fundamentals β€” The Paradox of Why the Old Guard Still Survives
⚠️
Apple expands iOS 18 updates to more iPhones to block DarkSword attacks
KEV
⚠️
TrendAI Insight: New U.S. National Cyber Strategy
⚠️
6 critical mistakes that undermine cyber resilience (and how to fix them)
⚠️
6 metrics IT leaders can’t afford to ignore for business resilience
⚠️
5 critical steps to achieve business resilience in cybersecurity
⚠️
7 ways to improve your business resilience with backup and recovery
⚠️
5 Steps to break free from alert fatigue and build resilient security operations
⚠️
5 essential steps to bulletproof your endpoint security (and avoid the biggest mistakes)
⚠️
Frequently Asked Questions About the Axios npm Supply Chain Attack by North Korea-Nexus Threat Actor UNC1069
⚠️
Securing the open source supply chain across GitHub
⚠️
Mutation testing for the agentic era
⚠️
Risky Business #831 -- The AI bugpocalypse begins
KEV
πŸ“‹
Apple releases security fix for older iPhones and iPads to protect against DarkSword attacks
πŸ“’
Closing the Gap by Enhancing Visibility and Mitigating Risks
πŸ“’
Executive Paralysis and Two Pre-Recorded RSAC 2026 Interviews from DigiCert and Okta - BSW #441
πŸ“’
Google Chrome security advisory (AV26-306)
πŸ“’
Cisco security advisory (AV26-307)
πŸ“’
Drupal security advisory (AV26-308)
πŸ”₯
Google Drive ransomware detection now on by default for paying users
πŸ”₯
North Korean Hackers Breach Axios Package, Target Windows, macOS, and Linux Systems
πŸ”₯
SUCCESS - 253,510 breached accounts
πŸ”₯
Axios NPM Package Breached in North Korean Supply Chain Attack
πŸ”₯
Webinar Today: Agentic AI vs. Identity’s Last Mile Problem
πŸ”₯
TeamPCP Supply Chain Campaign: Update 005 - First Confirmed Victim Disclosure, Post-Compromise Cloud Enumeration Documented, and Axios Attribution Narrows, (Wed, Apr 1st)
πŸ”₯
When Crisis Plans Fail to Act
πŸ”₯
Hasbro says it was hacked, and may take β€˜several weeks’ to recover
πŸ”₯
Toy Giant Hasbro Hit by Cyberattack
πŸ”₯
Is β€œHackback” Official US Cybersecurity Strategy?
πŸ”₯
Leadership or Career Risk
πŸ”₯
Smashing Security podcast #461: This man hid $400 million in a fishing rod. Then it vanished
πŸ”₯
Major Cyber Attacks in March 2026: OAuth Phishing,Β SVG Smuggling,Β Magecart, and More
πŸ•΅οΈ
ISC Stormcast For Wednesday, April 1st, 2026 https://isc.sans.edu/podcastdetail/9874, (Wed, Apr 1st)
πŸ•΅οΈ
XLoader malware Sharpens Obfuscation, Masks C2 Traffic via Decoy Servers
πŸ•΅οΈ
NPM Supply Chain Attack Uses undicy-http to Deploy RAT
πŸ•΅οΈ
PyPI Telnyx Python SDK Backdoored to Steal Credentials on Windows, macOS, and Linux
πŸ•΅οΈ
Windows 11 Update Fixes Critical Installation Loop Problem
πŸ•΅οΈ
CrewAI Hit by Critical Vulnerabilities Enabling Sandbox Escape and Host Compromise
πŸ•΅οΈ
Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069
πŸ•΅οΈ
Cybersecurity Firm TAC Security Hits 10,000 Clients, Enters Top 5 in Global VM & AppSec
πŸ•΅οΈ
CrystalX Malware-as-a-Service Spreads via Telegram With Stealer, RAT Tools
πŸ•΅οΈ
Hacker zielen auf Exilportal Iranwire
πŸ•΅οΈ
3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)
πŸ•΅οΈ
GIGABYTE Control Center vulnerable to arbitrary file write flaw
πŸ•΅οΈ
CrewAI Vulnerabilities Expose Devices to Hacking - SecurityWeek
πŸ•΅οΈ
Ethereum-Based EtherRAT, EtherHiding Power Stealthy Malware Campaigns
πŸ•΅οΈ
WA local gov entity lost $350,000 in phishing attack - iTnews
πŸ•΅οΈ
Axios npm supply chain attack: Malicious updates add remote access trojan | news | SC Media
πŸ•΅οΈ
Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures
πŸ•΅οΈ
Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass
πŸ•΅οΈ
FBI Warns of Data Security Risks From China-Made Mobile Apps
πŸ•΅οΈ
New DeepLoad Malware Dropped in ClickFix Attacks
πŸ•΅οΈ
Depthfirst Raises $80 Million in Series B Funding
πŸ•΅οΈ
Mitigating the Axios npm supply chain compromise
🌐
Alleged RedLine malware developer extradited to United States
🌐
Malicious Script That Gets Rid of ADS, (Wed, Apr 1st)
🌐
CrystalX RAT: a Trojan for pranks, remote access, and cryptocurrency theft | Kaspersky official blog
🌐
WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware
🌐
'NoVoice' Android malware on Google Play infected 2.3 million devices
🌐
New CrystalRAT malware adds RAT, stealer and prankware features
🌐
The Shift: An Era of Quantum Geopolitics
🌐
Inside the Axios supply chain compromise - one RAT to rule them all
🌐
Elastic releases detections for the Axios supply chain compromise
🌐
A laughing RAT: CrystalX combines spyware, stealer, and prankware features
πŸ“‘
Weekly Threat Bulletin – April 1st, 2026
πŸ“‘
New Windows 11 emergency update fixes preview update install issues
πŸ“‘
Im Fokus: IT-Leadership
πŸ“‘
FBI warns against using Chinese mobile apps due to privacy risks
πŸ“‘
Block the Prompt, Not the Work: The End of "Doctor No"
πŸ“‘
New EvilTokens service fuels Microsoft device code phishing attacks
πŸ“‘
De-fi platform Drift suspends deposits and withdrawals after millions in crypto stolen in hack
πŸ“‘
Digital assets after death: Managing risks to your loved one’s digital estate
πŸ“‘
STARDUST CHOLLIMA Likely Compromises Axios npm Package
πŸ“‘
Falcon for IT Supports Windows Secure Boot Certificate Lifecycle Management
πŸ“‘
Industrialization of the Fraud Ecosystem Blog
πŸ“‘
AI Security Risks: Proofpoint CSO Ryan Kalember, Live at RSAC 2026