124Articles
8Categories
2026-04-07Date
🚨
CISA Alerts Defenders to Actively Exploited Fortinet Zero-Day VulnerabilityThe Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding a critical zero-day vulnerability in Fortinet products. The agency officially added the flaw to its Known Exploited Vulnerabilities (KEV) catalog on April 6, 2026, indicating that t…
KEV
🐛
50,000 WordPress Sites Running Ninja Forms Vulnerable to Critical File Upload RCE
🐛
Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed
🐛
CVE-2026-35386
🐛
CVE-2026-34743 XZ Utils: Buffer overflow in lzma_index_append()
🐛
CVE-2026-31410 ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION
🐛
CVE-2026-31407 netfilter: conntrack: add missing netlink policy validations
🐛
CVE-2026-3184 Util-linux: util-linux: access control bypass due to improper hostname canonicalization
🐛
CVE-2026-34591 Poetry Has Wheel Path Traversal Which Can Lead to Arbitrary File Write
🐛
CVE-2026-35388
🐛
CVE-2026-35387
🐛
CVE-2026-35385
🐛
CVE-2026-31408 Bluetooth: SCO: Fix use-after-free in sco_recv_frame() due to missing sock_hold
🐛
Attackers Exploit Flowise Injection Vulnerability as 15,000+ Instances Remain Exposed
KEV
🐛
Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
🐛
Max severity Flowise RCE vulnerability now exploited in attacks
🐛
AL26-007 - Vulnerability impacting Fortinet FortiClientEMS - CVE-2026-35616
🐛
Fortinet releases emergency hotfix for FortiClient EMS zero-day flaw
⚠️
North Korea's $285M Crypto Heist, China Breaches FBI System, Delve Faces New Allegations
⚠️
Windows Defender 0-Day Published Online, Giving Attackers Potential Full Access
⚠️
Microsoft Warns Storm-1175 Exploiting Web-Facing Vulnerabilities to Deploy Medusa Ransomware
⚠️
172: SuperBox
⚠️
Threat Actors Exploit LogMeIn Resolve, ScreenConnect in Phishing Campaigns
⚠️
China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware
⚠️
Life imprisonment for Cambodian scam compound operators – but will it make a difference?
⚠️
The rise of proactive cyber: Why defense is no longer enough
⚠️
The noisy tenants: Engineering fairness in multi-tenant SIEM solutions
⚠️
AppSec News Roundup on Claude Code Leak, Axios NPM Compromise, Secure Design - ASW #377
⚠️
Critical Android Flaw Allows Zero-Interaction Denial-of-Service Attacks
⚠️
Hong Kong Police Can Force You to Reveal Your Encryption Keys
⚠️
New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips
⚠️
Supply chain security is now a board-level issue: Here’s what CSOs need to know
⚠️
Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit
⚠️
Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems
⚠️
Hackers Exploit Next.js React2Shell Vulnerability, Breach 766 Hosts in 24 Hours
⚠️
Microsoft says Medusa-linked Storm-1175 is speeding ransomware attacks
⚠️
Fake Gemini npm Package Steals AI Tool Tokens
⚠️
GPUBreach Attack Could Lead to Full System Takeover and Root Shell Access
⚠️
[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk
⚠️
Zero‑click Grafana AI attack can enable enterprise data exfiltration
⚠️
Campaign Mode: Because Your SOC Team Has a Life
⚠️
Windmill Developer Platform Flaws Expose Users to RCE Attacks, Proof-of-Concept Published
⚠️
Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign
⚠️
CUPS Vulnerabilities Could Allow Remote Attackers to Achieve Root-Level Code Execution
⚠️
GrafanaGhost: Attackers Can Abuse Grafana to Leak Enterprise Data
⚠️
Trump administration plans to cut cybersecurity agency’s budget by $700 million
⚠️
Why Your Automated Pentesting Tool Just Hit a Wall
⚠️
Severe StrongBox Vulnerability Patched in Android
⚠️
One Click Took Down the Supply Chain
⚠️
Critical Flowise Vulnerability in Attacker Crosshairs
⚠️
Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins
⚠️
Milking the last drop of Intego - Time for Windows to get its LPE
⚠️
Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign
⚠️
A Little Bit Pivoting: What Web Shells are Attackers Looking for?, (Tue, Apr 7th)
⚠️
5 steps to strengthen supply chain security and improve cyber resilience
⚠️
5 ways to strengthen identity security and improve attack resilience
⚠️
5 practical steps to strengthen attack resilience with attack surface management
KEV
⚠️
AI Found and Exploited Bugs Automatically
⚠️
Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
⚠️
Hackers exploit critical flaw in Ninja Forms WordPress plugin
⚠️
What Anthropic Glasswing reveals about the future of vulnerability discovery
⚠️
What we learned about TEE security from auditing WhatsApp's Private Inference
⚠️
ClickFix Meets AI: A Multi-Platform Attack Targeting macOS in the Wild
📢
White House Seeks to Slash CISA Funding by $707 Million
📢
Fortinet security advisory (AV26-313)
📢
Android security advisory – April 2026 monthly rollup (AV26-314)
📢
Microsoft Edge security advisory (AV26-315)
📢
IBM security advisory (AV26-316)
📢
Ubuntu security advisory (AV26-317)
📢
Red Hat security advisory (AV26-318)
📢
VMware security advisory (AV26-319)
📢
Iranian hackers are targeting American critical infrastructure, U.S. agencies warn
📢
Erlang security advisory (AV26-320)
📢
Hitachi security advisory (AV26-321)
📢
Dell security advisory (AV26-322)
📢
[Control systems] CISA ICS security advisories (AV26–324)
📢
Mozilla security advisory (AV26-323)
🔥
Weekly Update 498
🔥
German Police Unmask REvil Ransomware Leader
🔥
GPUBreach: Root Shell Access Achieved via GPU Rowhammer Attack
🔥
Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
🔥
The Hidden Cost of Recurring Credential Incidents
🔥
Kubernetes Flaws Let Hackers Jump From Containers to Cloud Accounts
🔥
New GPUBreach attack enables system takeover via GPU rowhammer
🔥
The dangers of telehealth: data breaches, phishing, and spam | Kaspersky official blog
🔥
German authorities identify REvil and GandCrab ransomware bosses
🔥
AI for Human Risk Management Shift to Adaptive Behavior Based Training
🔥
Russia Hacked Routers to Steal Microsoft Office Tokens
🔥
Snowflake customers hit in data theft attacks after SaaS integrator breach
🔥
FBI: Americans lost a record $21 billion to cybercrime last year
🔥
Support platform breach exposes Hims & Hers customer data
🕵️
Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations
🕵️
ISC Stormcast For Tuesday, April 7th, 2026 https://isc.sans.edu/podcastdetail/9882, (Tue, Apr 7th)
🕵️
Fake TradingView Premium Reddit Posts Spread Vidar and AMOS Stealers
🕵️
Wynn Resorts Says 21,000 Employees Affected by ShinyHunters Hack
🕵️
New Microsoft Defender Update Issued for Windows 11, Windows 10, and Server Images
🕵️
Iran-Linked Hackers Hit M365 Tenants in Middle East Password Spray Campaign
🕵️
Fake Installers Spread RATs, Monero Miners in Ongoing Malware Campaign
🕵️
Tor-Backed ClickFix Campaign Drops Node.js RAT on Windows
🕵️
FIRESIDE CHAT: Geopolitical turmoil, rising AI risk add a new layer to enterprise cyber defense
🕵️
Hackers Weaponize Claude Code Leak to Spread Vidar and GhostSocks Malware
🕵️
Guardarian Users Targeted With Malicious Strapi NPM Packages - SecurityWeek
🕵️
BPFDoor Variants Hide with Stateless C2 and ICMP Relay Tactics
🕵️
Webinar Today: Why Automated Pentesting Alone Is Not Enough
🕵️
SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks
🕵️
Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do
🕵️
CyberheistNews Vol 16 #14 [Heads Up] Clever Hackers Use Custom Fonts to Bypass AI Defenses
🕵️
The New Rules of Engagement: Matching Agentic Attack Speed
🕵️
Trent AI Emerges From Stealth With $13 Million in Funding
🕵️
Bounty Available (>$2,000) for QubesOS BusKill package
🕵️
Russian government hackers broke into thousands of home routers to steal passwords
🕵️
Bounty Available (>$2,000) for QubesOS BusKill package
🕵️
US warns of Iranian hackers targeting critical infrastructure
🕵️
Anthropic Unveils ‘Claude Mythos’ – A Cybersecurity Breakthrough That Could Also Supercharge Attacks
🕵️
Cthullu, BlueHammer, NK, CUPs, Axios, Fortinet, Cognitive Surrender, Aaran Leyland - SWN #570
🕵️
The AI Chip War Explained
🕵️
As breakout time accelerates, prevention-first cybersecurity takes center stage
🕵️
Palo Alto Networks at Nutanix .NEXT 2026
🕵️
Building AI defenses at scale: Before the threats emerge
🌐
Supply chain integrity risk assessments: Evaluation criteria (ITSAP.10.071)
📡
Cybersecurity in the Age of Instant Software
📡
Anthropic debuts preview of powerful new AI model Mythos in new cybersecurity initiative
📡
Cloudflare targets 2029 for full post-quantum security
📡
Traffic violation scams swap links for QR codes to steal your card details