133Articles
8Categories
2026-04-02Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its  Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.  CVE-2026-3502  TrueConf Client Download of Code Without Integrity Check Vulnerability  This type of…
KEV
πŸ›
Symantec DLP Agent Flaw Exposed Systems to Privilege Escalation Attacks
πŸ›
Cisco Warns of Critical IMC Vulnerability Enabling Authentication Bypass
πŸ›
Critical PX4 Autopilot Vulnerability Let Attackers Gain Control of Drones
πŸ›
Cisco Smart Software Manager Flaw Allowed Arbitrary Command Execution
πŸ›
CVE-2026-5107 FRRouting FRR EVPN Type-2 Route bgp_evpn.c process_type2_route access control
πŸ›
CVE-2026-4046 iconv crash due to assertion failure with untrusted input
πŸ›
CVE-2026-5119 Libsoup: libsoup: information disclosure via cleartext transmission of cookies during https tunnel establishment
πŸ›
CVE-2026-4897 Polkit: polkit: denial of service via unbounded input processing through standard input
πŸ›
CVE-2026-29785 NATS Server panic via malicious compression on leafnode port
πŸ›
CVE-2026-4739 Integer overflow vulnerabilities in InsightSoftwareConsortium/ITK
πŸ›
CVE-2026-33554
πŸ›
CVE-2026-5201 Gdk-pixbuf: gdk-pixbuf: denial of service via heap-based buffer overflow when processing a specially crafted jpeg image
πŸ›
CVE-2026-5121 Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing
πŸ›
CVE-2026-2100 P11-kit: p11-kit: null dereference via c_derivekey with specific null parameters
πŸ›
CVE-2026-4732 Out-of-bounds Read Overflow in tildearrow/furnace
πŸ›
CVE-2026-2436 Libsoup: libsoup: denial of service via use-after-free in soupserver during tls handshake
πŸ›
CVE-2026-33216 NATS has MQTT plaintext password disclosure
πŸ›
CVE-2026-32287 Infinite loop in github.com/antchfx/xpath
πŸ›
CISA Issues Alert on Chrome Zero-Day Under Active Exploitation
KEV
πŸ›
Cybersecurity in the age of instant software
πŸ›
Attempts to Exploit Exposed "Vite" Installs (CVE-2025-30208), (Thu, Apr 2nd)
πŸ›
Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise
πŸ›
Cisco fixes critical IMC auth bypass present in many products
πŸ›
CVE-2026-32213 Azure AI Foundry Elevation of Privilege Vulnerability
πŸ›
Chromium: CVE-2026-5289 Use after free in Navigation
πŸ›
Chromium: CVE-2026-5286 Use after free in Dawn
πŸ›
Chromium: CVE-2026-5287 Use after free in PDF
πŸ›
Chromium: CVE-2026-5285 Use after free in WebGL
πŸ›
Chromium: CVE-2026-5284 Use after free in Dawn
πŸ›
Chromium: CVE-2026-5283 Inappropriate implementation in ANGLE
πŸ›
Chromium: CVE-2026-5281 Use after free in Dawn
πŸ›
Chromium: CVE-2026-5280 Use after free in WebCodecs
πŸ›
Chromium: CVE-2026-5279 Object corruption in V8
πŸ›
Chromium: CVE-2026-5292 Out of bounds read in WebCodecs
πŸ›
Chromium: CVE-2026-5290 Use after free in Compositing
πŸ›
Chromium: CVE-2026-5277 Integer overflow in ANGLE
πŸ›
Chromium: CVE-2026-5276 Insufficient policy enforcement in WebUSB
πŸ›
Chromium: CVE-2026-5275 Heap buffer overflow in ANGLE
πŸ›
Chromium: CVE-2026-5274 Integer overflow in Codecs
πŸ›
Chromium: CVE-2026-5273 Use after free in CSS
πŸ›
Chromium: CVE-2026-5272 Heap buffer overflow in GPU
πŸ›
CVE-2026-32186 Microsoft Bing Elevation of Privilege Vulnerability
πŸ›
CVE-2026-33107 Azure Databricks Elevation of Privilege Vulnerability
πŸ›
CVE-2026-26135 Azure Custom Locations Resource Provider (RP) Elevation of Privilege Vulnerability
πŸ›
CVE-2026-33105 Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability
πŸ›
CVE-2026-32173 Azure SRE Agent Information Disclosure Vulnerability
πŸ›
CVE-2026-32211 Azure MCP Server Information Disclosure Vulnerability
πŸ›
Chromium: CVE-2026-5291 Inappropriate implementation in WebGL
πŸ›
vSphere and BRICKSTORM Malware: A Defender's Guide
πŸ›
ZDI-26-253: Microsoft Visual Studio Code mcp.json Command Injection Remote Code Execution Vulnerability
πŸ›
ZDI-26-252: Mozilla Firefox IonMonkey Switch Statement Optimization Type Confusion Remote Code Execution Vulnerability
πŸ›
ZDI-26-251: Foxit PDF Reader Update Service Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
πŸ›
VU#951662: MuPDF by Artifex contains integer overflow vulnerability.
⚠️
AfterPack: Claude Code's Source Didn't Leak. It Was Already Public for Years.
⚠️
Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit
⚠️
Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks
⚠️
Apple Releases iOS 18.7.7 Update to Defend Against DarkSword Exploit
⚠️
NoVoice on Google Play Exploits 22 Flaws to Hit Millions of Android Users
⚠️
Possible US Government iPhone Hacking Tool Leaked
⚠️
Hackers exploit TrueConf zero-day to push malicious software updates
⚠️
The State of Trusted Open Source Report
⚠️
Cisco Patches Critical and High-Severity Vulnerabilities
⚠️
EvilTokens abuses Microsoft device code flow for account takeovers
⚠️
Akira-Style Ransomware Campaign Hits Windows Users Across South America
⚠️
Matrix Protocol Surveillance and Forensic Analysis Suite
⚠️
New Progress ShareFile flaws can be chained in pre-auth RCE attacks
⚠️
Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime
⚠️
ICE says it bought Paragon’s spyware to use in drug trafficking cases
⚠️
Apple Rolls Out DarkSword Exploit Protection to More Devices
⚠️
US Bans All Foreign-Made Consumer Routers
⚠️
Critical Vulnerability in Claude Code Emerges Days After Source Leak
⚠️
Google Workspace’s continuous approach to mitigating indirect prompt injections
⚠️
Claude Code leak used to push infostealer malware on GitHub
⚠️
Risks, emerging when developing or using open-source software
⚠️
What Is A Router? (And all things AI) - PSW #920
⚠️
AI Configures Vulnerabilities for You
⚠️
Multiple Vulnerabilities in Progress ShareFile Could Allow for Remote Code Execution
⚠️
Multiple Vulnerabilities in Cisco Products Could Allow for Arbitrary Code Execution
⚠️
SightHouse: Automated function identification
⚠️
Apple expands β€œDarkSword” patches to iOS 18.7.7
πŸ“’
FBI Warns Chinese Mobile Apps Could Expose User Data to Cyberattacks
πŸ“’
Variance Raises $21.5M for Compliance Investigation Platform Powered by AI Agents
πŸ“’
Progress security advisory (AV26-310)
πŸ“’
Cesanta security advisory (AV26-311)
πŸ“’
Drift loses $280 million as hackers seize Security Council powers
πŸ“’
OpenSSH security advisory (AV26-312)
πŸ“’
Drift loses $280 million North Korean hackers seize Security Council powers
πŸ“’
Four security principles for agentic AI systems
πŸ”₯
Axios npm Supply Chain Breach: Microsoft Shares Mitigation Steps
πŸ”₯
Mercor Hit by LiteLLM Supply Chain Attack
πŸ”₯
UK manufacturers under cyber fire with 80% reporting attacks β€’ The Register
πŸ”₯
250,000 Affected by Data Breach at Nacogdoches Memorial Hospital
πŸ”₯
Iranian Hacker Group Handal Claims Breach of Israeli Defense Firm
πŸ”₯
Mercor confirms security incident tied to LiteLLM supply chain attack | The Record from Recorded Future News
πŸ”₯
Medtech giant Stryker fully operational after data-wiping attack
πŸ”₯
Crypto platform Drift suspends services after millions stolen in security incident | The Record from Recorded Future News
πŸ”₯
Threat actor abuse of AI accelerates from tool to cyberattack surface
πŸ”₯
Telehealth giant Hims & Hers says its customer support system was hacked
πŸ•΅οΈ
ISC Stormcast For Thursday, April 2nd, 2026 https://isc.sans.edu/podcastdetail/9876, (Thu, Apr 2nd)
πŸ•΅οΈ
News Alert: TAC Security surpasses 10,000 customers, scaling global VM and AppSec platform
πŸ•΅οΈ
Linx Security Raises $50 Million for Identity Security and Governance
πŸ•΅οΈ
Remcos RAT Attack Uses Obfuscated Scripts, Trusted Windows Tools
πŸ•΅οΈ
WhatsApp Attack Chain Delivers VBS, Cloud Payloads, MSI Backdoor
πŸ•΅οΈ
TA416 Broadens Europe Spy Campaign With Web Bugs and Malware
πŸ•΅οΈ
New ZAP PTK Add-On Converts Browser Security Findings Into Native ZAP Alerts
πŸ•΅οΈ
Sophisticated CrystalX RAT Emerges
πŸ•΅οΈ
WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action
πŸ•΅οΈ
RFQ Malware Campaign Uses DOCX, RTF, JS, and Python
πŸ•΅οΈ
Fake CERT-UA Site Spreads Go-Based RAT in Phishing Campaign
πŸ•΅οΈ
New CrystalRAT malware adds RAT, stealer and prankware features
πŸ•΅οΈ
Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners
πŸ•΅οΈ
Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures
πŸ•΅οΈ
WhatsApp malware campaign uses malicious VBS files to gain persistent access | CSO Online
πŸ•΅οΈ
Infrsatructure Attacks With Physical Consequences Down 25%
πŸ•΅οΈ
Chinese Hackers Target European Governments in Espionage Campaigns - Infosecurity Magazine
πŸ•΅οΈ
The Risk of Negative Self-Talk
πŸ•΅οΈ
Cybersecurity M&A Roundup: 38 Deals Announced in March 2026
πŸ•΅οΈ
Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments
πŸ•΅οΈ
How to Prevent Phishing Emails by Reducing Human Risk
πŸ•΅οΈ
From Reactive to Proactive: 5 Steps to SOC Maturity with Threat Intelligence
🌐
ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories
🌐
How we caught the Axios supply chain attack
🌐
Hooked on Linux: Rootkit Detection Engineering
🌐
Malwarebytes Privacy VPN receives full third-party audit
πŸ“‘
Microsoft links Classic Outlook issue to email delivery problems
πŸ“‘
Critical Cisco IMC auth bypass gives attackers Admin access
πŸ“‘
Suggested organizational security and privacy control and activity profile β€” Medium impact (ITSP.10.033-01)
πŸ“‘
Bulletin de sΓ©curitΓ© WatchGuard (AV26-309)
πŸ“‘
Residential proxies evaded IP reputation checks in 78% of 4B sessions
πŸ“‘
Money transfer app Duc exposed thousands of driver’s licenses and passports to the open web
πŸ“‘
Latin America and the Caribbean Cybercrime Landscape
πŸ“‘
Prioritizing Alerts Triage with Higher-Order Detection Rules