141Articles
10Categories
2026-04-15Date
🚨
Risky Business #833 -- The Great Mythos Freakout of 2026On this week’s show, Patrick Gray, Adam Boileau and James Wilson discuss the week’s cybersecurity news. They cover: Everyone has an opinion about Claude Mythos… even though almost nobody has used it yet CISA adds a 2009 Excel bug to the KEV list, u wot? Adobe also parties like it…
KEV
🚨
U.S. CISA adds Microsoft SharePoint Server, and Microsoft Office Excel flaws to its Known Exploited Vulnerabilities catalogU.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft SharePoint Server, and Microsoft Office Excel flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Apple, Laravel Livewire and …
KEV
🐛
April Patch Tuesday roundup: Zero day vulnerabilities and critical bugs
KEV
🐛
Microsoft Patch Tuesday for April 2026 fixed actively exploited SharePoint zero-day
KEV
🐛
CVE-2026-33555
🐛
CVE-2026-5466 wc_VerifyEccsiHash missing sanity check
🐛
CVE-2026-5194 wolfSSL ECDSA Certificate Verification
🐛
CVE-2026-5448 1-2 Byte Buffer Overflow in wolfSSL_X509_notAfter/notBefore
🐛
CVE-2026-5264 DTLS 1.3 ACK heap buffer overflow
🐛
CVE-2026-5778 Integer underflow leads to out-of-bounds access in sniffer ChaCha decrypt path.
🐛
CVE-2026-5460 Heap Use-After-Free in PQC Hybrid KeyShare Error Cleanup in wolfSSL TLS 1.3
🐛
CVE-2026-5446 wolfSSL ARIA-GCM TLS 1.2/DTLS 1.2 GCM nonce reuse
🐛
CVE-2026-34601 xmldom: XML injection via unsafe CDATA serialization allows attacker-controlled markup insertion
🐛
CVE-2026-5393 OOB Read in DoTls13CertificateVerify with WOLFSSL_DUAL_ALG_CERTS
🐛
CVE-2026-5500 Improper Validation of AES-GCM Authentication Tag Length in PKCS#7 Envelope Allows Authentication Bypass
🐛
CVE-2026-5504 PKCS7 CBC Padding Oracle — Plaintext Recovery
🐛
CVE-2026-5501 Improper Certificate Signature Verification in X.509 Chain Validation Allows Forged Leaf Certificates
🐛
CVE-2026-5507 Session Cache Restore — Arbitrary Free via Deserialized Pointer
🐛
CVE-2026-5477 Prefix-substitution forgery via integer overflow in wolfCrypt CMAC
🐛
CVE-2026-5479 wolfSSL EVP ChaCha20-Poly1305 AEAD authentication tag
🐛
CVE-2026-5503 out-of-bounds write in TLSX_EchChangeSNI via attacker-controlled publicName
🐛
CVE-2026-5295 Stack Buffer Overflow in wolfSSL PKCS7 wc_PKCS7_DecryptOri() via Oversized OID
🐛
CVE-2026-5188 Integer underflow in X.509 SAN parsing in wolfSSL
🐛
CVE-2026-5447 Heap buffer overflow in CertFromX509() via AuthorityKeyIdentifier
🐛
CVE-2026-5772 MatchDomainName 1-Byte Stack Buffer Over-Read in Hostname Validation
🐛
CVE-2026-5263 URI nameConstraints not enforced in ConfirmNameConstraints()
🐛
CVE-2026-5392 wolfSSL heap OOB read in PKCS7 SignedData streaming
🐛
CVE-2026-1502 HTTP client proxy tunnel headers not validated for CR/LF
🐛
CVE-2026-35201 Discount has an Out-of-bounds Read in rdiscount
🐛
CVE-2026-34481 Apache Log4j JSON Template Layout: Improper serialization of non-finite floating-point values in JsonTemplateLayout
🐛
CVE-2026-34479 Apache Log4j 1 to Log4j 2 bridge: Silent log event loss in Log4j1XmlLayout due to unescaped XML 1.0 forbidden characters
🐛
CVE-2026-34480 Apache Log4j Core: Silent log event loss in XmlLayout due to unescaped XML 1.0 forbidden characters
🐛
CVE-2026-40175 Axios has Unrestricted Cloud Metadata Exfiltration via Header Injection Chain
🐛
CVE-2025-62718 Axios has a NO_PROXY Hostname Normalization Bypass Leads to SSRF
🐛
Microsoft Warns of Actively Exploited SharePoint Server Zero-Day
KEV
🐛
CVE-2025-30258 In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."
🐛
Windows Active Directory Flaw Opens Door to Malicious Code Execution
🐛
Copilot and Agentforce fall to form-based prompt injection tricks
🐛
Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
KEV
🐛
April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More
🐛
CVE-2026-33032: severe nginx-ui bug grants unauthenticated server access
KEV
🐛
Critical nginx UI tool vulnerability opens web servers to full compromise
⚠️
Curity looks to reinvent IAM with runtime authorization for AI agents
⚠️
North Korean Spies DM You On Facebook
⚠️
Top 10 Best Passwordless Authentication Solutions in 2026
⚠️
13 Fragen gegen Drittanbieterrisiken
⚠️
Microsoft Patch Tuesday April 2026 Fixes 168 Flaws, Including an Actively Exploited Zero-Day
KEV
⚠️
OpenAI Introduces GPT-5.4 for Reverse Engineering, Vulnerability Discovery, and Malware Analysis
⚠️
Ivanti Neurons for ITSM Vulnerabilities Let Remote Attackers Hijack User Sessions
⚠️
Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action
⚠️
Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities
⚠️
Hackers Exploit Hidden Microsoft 365 Mailbox Rules to Steal Sensitive Business Emails
⚠️
PHP Composer flaws enable remote command execution via Perforce VCS
⚠️
The need for a board-level definition of cyber resilience
⚠️
Credit Resources Vault: Why this credit email set off our scam alarms
⚠️
The deepfake dilemma: From financial fraud to reputational crisis
⚠️
April Patch Tuesday fixes two zero-days, including one under active attack
⚠️
Hackers Abuse Google Cloud Storage to Slip Remcos RAT Past Email Filters
⚠️
MuddyWater-Style Hackers Probe 12,000+ Systems Ahead of Middle East
⚠️
Unlocking foundational visibility for cyber-physical systems with OT vulnerability management
⚠️
Top 10 Best Application Security Testing Companies in 2026
⚠️
Organizations Warned of Exploited Windows, Adobe Acrobat Vulnerabilities - SecurityWeek
⚠️
Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities
⚠️
wolfSSL Vulnerability Hits IoT, Routers and Military Systems, Update Now!
⚠️
EFF urges state probe into Google over undisclosed data sharing with ICE
⚠️
Patch Tuesday notes: Microsoft addresses two zero-days.
⚠️
Microsoft Issues Massive Windows Patch for 160+ Bugs, Including Two Zero-Days
⚠️
A heavy patch Tuesday lands.
⚠️
Smashing Security podcast #463: This AI company leaked its own code. It’s also built something terrifying
📋
Fortinet Fixes 11 Security Flaws Affecting FortiSandbox, FortiOS, FortiAnalyzer, and FortiManager
📋
Microsoft Rolls Out KB5083769 Update for Windows 11 24H2 and 25H2
📢
Chile’s Cybersecurity Framework Law: How SOCs Achieve Compliance and Response Readiness
📢
Michigan’s New Bill Takes Aim at AI Employee Surveillance
📢
Deterministic + Agentic AI: The Architecture Exposure Validation Requires
📢
Google, Microsoft, Meta Accused of Tracking Users Even After Privacy Opt-Out
📢
Sweden blames Russian hackers for attempting ‘destructive’ cyberattack on thermal plant
🔥
'Addicted to hacking': Young hacker behind historic breach speaks out for 1st time, before reporting to prison
🔥
JanaWare Ransomware Hits Turkish Users via Customized Adwind RAT
🔥
Not All CISO Gigs Are Created Equal and RSAC Interviews from ESET and Mimecast - BSW #443
🔥
Trusted WordPress Plugins Hijacked in 8-Month Stealth Backdoor Campaign
🔥
Comcast’s $117.5M Breach Settlement: Up to 30M People May Qualify
🔥
[Guest Diary] Compromised DVRs and Finding Them in the Wild, (Thu, Apr 16th)
🕵️
ISC Stormcast For Wednesday, April 15th, 2026 https://isc.sans.edu/podcastdetail/9892, (Wed, Apr 15th)
🕵️
Dragon Boss Solutions Supply Chain Attack Exposes 25,000+ Endpoints
🕵️
FUNNULL Scam Network Resurfaces With 175+ Rotating Domains Worldwide
🕵️
Agentic LLM Browsers Open New Front in Prompt Injection, Data Theft
🕵️
Fiverr exposes sensitive data via public URLs indexed by Google
🕵️
Get This Fast and Powerful Lenovo ThinkPad for $1,000 Off
🕵️
Defense in Depth, Medieval Style
🕵️
Your AI Hiring Tools Are Now a Civil Rights Liability in Illinois
🕵️
Google Uses Rust-Based Firmware in Pixel 10 Modem to Improve Memory Safety
🕵️
The n8n n8mare: How threat actors are misusing AI workflow automation
🕵️
Top 10 Best API Security Providers Protecting Web Apps in 2026
🕵️
Google Photos Fixes Android Image Editing Tool: Here’s What Changed
🕵️
This $60 AI Assistant Aims to Consolidate Your Daily Work Tools
🕵️
Why CSOs Fail the Business
🕵️
Dependency cooldowns turn you into a free-rider
🕵️
Testing reveals Claude Mythos's offensive capabilities and limits - Help Net Security
🕵️
Malicious Chrome Extensions Campaign Exposes User Data - Infosecurity Magazine
🕵️
WhatsApp New Update Lets You Chat Without Sharing Your Phone Number
🕵️
Microsoft Takes Over Key Stargate Site in Latest OpenAI Pullback
🕵️
Kraken Exchange Faces Extortion After Insider Recorded System Footage
🕵️
Fake Ledger Live app on Apple’s App Store stole $9.5M in crypto
🕵️
Google to penalize “back button hijacking” starting June 2026
🕵️
n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails
🕵️
AI Zuckerberg Runs the Company
🕵️
Cybersecurity Looks Like Proof of Work Now
🕵️
Massive Chrome Extension Scam Exposes 20,000 Users to Data Theft
🕵️
YouTube Will Show Fewer Livestream Ads During Purchases and Chat Spikes
🕵️
SS&C Intralinks DealCentre AI vs. Datasite: Which platform is built for the future of dealmaking?
🕵️
News Alert: NTT Research launches SaltGrain—advanced Attribute-Based Encryption security
🕵️
Tech Layoffs Continue: Snap Cuts 1,000 Jobs, Citing ‘Rapid Advancements’ in AI
🕵️
Security Became the Business Nexus
🌐
From fake Proton VPN sites to gaming mods, this Windows infostealer is everywhere
🌐
Mirax malware campaign hits 220K accounts, enables full remote control
🌐
Threat landscape for industrial automation systems in Q4 2025
🌐
Nach Anthropic Mythos: OpenAI kündigt GPT-5.4-Cyber an
🎙️
Human-centered security in an AI world with Johnny Hand from TrendAI
📡
Weekly Threat Bulletin – April 15th, 2026
📡
Azure-Hosted Scanning Cluster Launches WordPress Webshell Discovery Campaign
📡
Scanning for AI Models, (Tue, Apr 14th)
📡
What Founders Get Wrong About Early Marketing with Merav Ben Avi, VP of Marketing at YL Ventures
📡
OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams
📡
Fortinet stopft 18 Sicherheitslecks
📡
Patchday: Angreifer attackieren Edge und Microsoft SharePoint Server
📡
Warnung vor Attacken auf 17 Jahre alte Excel-Lücke
📡
Adobe-Patchday: Kritische Schadcode-Lücken bedrohen Photoshop & Co.
📡
Bugs ohne Bounty: Eclipse Foundation startet Sicherheitsprogramm für Open VSX
📡
Microsoft Office 2021: Support endet am 13. Oktober 2026
📡
„Passwort“ Folge 55: News mit Claude-Code-Klau, PKI-Oopsies und Quantenturbo
📡
Raspberry Pi OS 6.2: Update verspricht mehr Sicherheit
📡
108 malicious Chrome extensions caught stealing Google and Telegram data from 20,000 users
📡
WireGuard: Update für Windows-Client nach vier Jahren
📡
Fake YouTube copyright notices can steal your Google login
📡
OpenSSL 4.0 verschlüsselt, was TLS bisher verraten hat
📡
Überwachung weltweit: Bundesregierung winkt UN-Cybercrime-Konvention durch
📡
21. BSI-Sicherheitskongress: NIS-2-Umsetzung weit hinter den Erwartungen
📡
Identität bleibt geheim: EU-App für Altersnachweis kommt
📡
Spotting cyberthreats: a guide for blind and low-vision users | Kaspersky official blog
📡
AI clickbait can turn your notifications into a scam feed
📡
Cisco intends to acquire AI observability and evaluation platform provider Galileo