76Articles
8Categories
2026-04-03Date
🚨
CISA Includes TrueConf Security Flaw in KEV Catalog After Exploitation in the WildThe Cybersecurity and Infrastructure Security Agency (CISA) has officially added a critical security flaw affecting the TrueConf Client to its Known Exploited Vulnerabilities (KEV) catalog. This addition follows clear evidence that threat actors are actively exploiting the bug in…
KEV
🐛
Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
🐛
Attackers Abuse React2Shell Flaw to Compromise 700+ Next.js Hosts
🐛
CVE-2026-34073 cryptography has incomplete DNS name constraint enforcement on peer names
🐛
14,000+ F5 BIG-IP APM Instances Exposed Online as Attackers Exploit RCE Vulnerability
🐛
CNVD Severity Classification and RMSV Effects: Honest Metrics & Data Leakage
🐛
New Progress ShareFile Flaws Expose Servers to Unauthorized Remote Takeover
🐛
CERT-EU blames Trivy supply chain attack for Europa.eu data breach
🐛
Google patches fourth Chrome zero-day so far this year
🐛
Security lapse lets researchers view React2Shell hackers’ dashboard
⚠️
Cloudflare’s new CMS is not a WordPress killer, it’s a WordPress alternative
⚠️
Microsoft now force upgrades unmanaged Windows 11 24H2 PCs
⚠️
12 cyber industry trends revealed at RSAC 2026
⚠️
Trusted Platforms Exploited to Steal Philippine Banking Credentials
⚠️
Nigerian romance scammer jailed after being caught out by fellow fraudster
⚠️
Axios npm compromise traced to targeted social engineering attack
⚠️
React2Shell Exploited in Large-Scale Credential Harvesting Campaign
⚠️
Mobile Attack Surface Expands as Enterprises Lose Control
⚠️
Critical ShareFile Flaws Lead to Unauthenticated RCE
⚠️
Microsoft Forces Unmanaged Windows 11 Devices to Upgrade to Version 24H2
⚠️
In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware
⚠️
Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads
⚠️
TrueConf Zero-Day Exploited in Asian Government Attacks
⚠️
Warning: Phishing Attacks Are Exploiting the War in Iran
⚠️
When Vendors Skip Linux Support
⚠️
Your KnowBe4 Fresh Content Updates from March 2026
⚠️
Managing open-source vulnerabilities | Kaspersky official blog
⚠️
Claude Code is still vulnerable to an attack Anthropic has already fixed
⚠️
Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
⚠️
Internet Bug Bounty program hits pause on payouts
⚠️
The developer credential economy: Why exposure data is the new front line in the supply chain war
⚠️
Simplifying MBA obfuscation with CoBRA
📢
OpenSSH 10.3 Released With Patch for Shell Injection and Other Security Flaws
📢
Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK
📢
Infrastructure Engineer Pleads Guilty to Locking 254 Windows Servers at Former Employer
📢
A core infrastructure engineer pleads guilty to federal charges in insider attack
🔥
Adobe Data Breach Allegedly Exposes 13 Million Support Tickets
🔥
Qilin Ransomware Deploys Malicious DLL to Disable Most EDR Defenses
🔥
North Korea-Linked Hackers Hit Axios npm in Supply Chain Attack
🔥
CERT-EU: European Commission hack exposes data of 30 EU entities
🔥
Phorpiex Botnet Fuels Ransomware, Sextortion, and Crypto-Theft Attacks
🔥
Hackers Weaponize Venom Stealer via ClickFix Lures for Massive Data Exfiltration
🔥
T-Mobile Sets the Record Straight on Latest Data Breach Filing
🔥
Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture
🔥
TeamPCP Supply Chain Campaign: Update 006 - CERT-EU Confirms European Commission Cloud Breach, Sportradar Details Emerge, and Mandiant Quantifies Campaign at 1,000+ SaaS Environments, (Fri, Apr 3rd)
🔥
Evolution of Ransomware: Multi-Extortion Ransomware Attacks
🔥
Europe’s cyber agency blames hacking gangs for massive data breach and leak
🔥
Die Linke German political party confirms data stolen by Qilin ransomware
🔥
Hims & Hers warns of data breach after Zendesk support ticket breach
🔥
Outbound Email Security: Protecting Data and Reputation
🔥
Nation-State Crypto Heists Explained
🕵️
ISC Stormcast For Friday, April 3rd, 2026 https://isc.sans.edu/podcastdetail/9878, (Fri, Apr 3rd)
🕵️
North Korea Uses GitHub as C2 in New LNK Phishing Campaign
🕵️
Top 10 Best SaaS Security Posture Management (SSPM) Tools 2026
🕵️
TP-Link Router Flaws Allowed Attackers to Launch DoS Attacks and Cause Crashes
🕵️
AI Models Including Gemini 3 and Claude Haiku 4.5 Secretly Protected Other Models From Removal
🕵️
Malicious Chrome Extension “ChatGPT Ad Blocker” Targets Users, Steals Conversations
🕵️
North Korean Hackers Drain $285 Million From Drift in 10 Seconds
🕵️
Kimsuky Uses Malicious LNK Files to Drop Python Backdoor
🕵️
Company that Secretly Records and Publishes Zoom Meetings
🕵️
UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
🕵️
China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing
🕵️
Friday Squid Blogging: Jurassic Fish Chokes on Squid
🕵️
DexterBot, Darksword, Eviltokens, Tubular Bells, Claude, Drift, Gmail, Josh Marpet - SWN #569
🕵️
Don’t let A.I. read your .env files
🌐
Electric Vehicles and EV Security - Steve Visconti CEO of Xiid Corporation with David Shipley
🌐
New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
🌐
How the World Got Owned Episode 2: The 1990s, Part One
KEV
📡
Man admits to locking thousands of Windows devices in extortion plot
📡
Microsoft still working to fix Exchange Online mailbox access issues
📡
LinkedIn secretely scans for 6,000+ Chrome extensions, collects data
📡
LinkedIn secretly scans for 6,000+ Chrome extensions, collects data
📡
Day in the Life: Product Manager at Recorded Future
📡
How AWS KMS and AWS Encryption SDK overcome symmetric encryption bounds
📡
That dream job offer from Coca-Cola or Ferrari? It’s a trap for your passwords
📡
Blocking children from social media is a badly executed good idea