8,560Articles
91Days
94Feeds
🚨
Microsoft Defender vulnerabilities exploited in the wild (CVE-2026-41091, CVE-2026-45498)Attackers are exploiting two Microsoft Defender vulnerabilities (CVE-2026-41091 and CVE-2026-45498), Microsoft acknowledged and CISA confirmed by adding them to its Known Exploited Vulnerabilities catalog. The vulnerabilities CVE-2026-41091 allows for local privilege elevation (L…
KEV
🚨
Mini Shai-Hulud: Frequently asked questions about the TeamPCP npm and PyPI supply chain campaignA self-propagating worm has compromised more than 170 npm and PyPI packages, defeating provenance attestation and breaching OpenAI and Mistral AI. Here is what you need to know. Key takeaways Mini Shai-Hulud is a self-propagating worm by TeamPCP that steals developer and cloud cr…
KEV
🐛
Microsoft is working on a patch for ‘YellowKey’ attack on Bitlocker, offers temporary fix
🐛
Highly Critical Drupal Core Flaw Exposes PostgreSQL Sites to RCE Attacks
🐛
CVE-2026-45585 Windows BitLocker Security Feature Bypass Vulnerability
🐛
CVE-2026-43619 Rsync < 3.4.3 Symlink Race Condition via Path-Based Syscalls
🐛
CVE-2026-43618 Rsync < 3.4.3 Integer Overflow Information Disclosure
🐛
CVE-2026-43620 Rsync < 3.4.3 Out-of-Bounds Array Read via recv_files()
🐛
CVE-2026-47784 In memcached before 1.6.42, password data for SASL password database authentication has a timing side channel because memcmp is used by sasl_server_userdb_checkpass.
🐛
CVE-2026-47783 In memcached before 1.6.42, username data for SASL password database authentication has a timing side channel because a loop exits as soon as a valid username is found by sasl_server_userdb_checkpass.
🐛
CVE-2026-32792 Packet of death with DNSCrypt
🐛
CVE-2026-42960 Possible cache poisoning via promiscuous records for the authority section
🐛
CVE-2026-42959 Crash during DNSSEC validation of malicious content
🐛
CVE-2026-44608 Use after free and crash under special conditions in RPZ code
🐛
CVE-2026-33278 Possible arbitrary code execution during DNSSEC validation
🐛
CVE-2026-42923 Degradation of service with unbounded NSEC3 hash calculations
🐛
CVE-2026-45803 gh: GitHub Actions log output in `gh run view` allows terminal escape sequence injection
🐛
CVE-2026-43970 Decompression Bomb in cow_spdy:inflate/2 Allows Memory Exhaustion via Crafted SPDY Frame
🐛
CVE-2026-43617 Rsync < 3.4.3 Authorization Bypass via Hostname Resolution
🐛
CVE-2026-45232 Rsync < 3.4.3 Off-by-One Stack Write via HTTP Proxy
🐛
CVE-2026-29518 Rsync < 3.4.3 TOCTOU Race Condition Allows Symlink-Based Arbitrary File Write
🐛
CVE-2026-41292 Long list of incoming EDNS options degrades performance
🐛
CVE-2026-42534 Jostle logic bypass degrades resolution performance
🐛
CVE-2026-40622 Another 'ghost domain names' attack variant
🐛
CVE-2026-42944 Heap overflow with multiple NSID, COOKIE, PADDING EDNS options
🐛
CVE-2026-44390 Unbounded name compression in certain cases causes degradation of service
🐛
CVE-2026-45736 ws: Uninitialized memory disclosure
🐛
Nine-Year-Old Kernel Flaw Puts Linux SSH Private Keys at Risk
🐛
9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros
🐛
Critical Vulnerability in Cisco Secure Workload Threatens Enterprise API Security
🐛
Microsoft Warns of Two Actively Exploited Defender Vulnerabilities
KEV
🐛
Microsoft Defender Zero-Day Vulnerabilities Actively Exploited in the Wild
KEV
🐛
CVE-2026-9082: Highly Critical SQL Injection Vulnerability in Drupal Core (SA-CORE-2026-004)
KEV
🐛
Cisco fixed maximum severity flaw CVE-2026-20223 in Secure Workload
⚠️
New GhostTree Attack Causes EDR Tools to Hang, Leaving Files Unscanned
⚠️
Claude Code Sandbox Flaw May Compromise User Secrets
⚠️
Cyber threats push SMBs to spend more on security
⚠️
PoC Released for PinTheft Linux Flaw Enabling Root Privilege Escalation
⚠️
WantToCry Ransomware Exploits SMB to Encrypt Remote Files
⚠️
Windows93 / Myspace93 - 46,105 breached accounts
⚠️
The friendly skies aren’t friendly.
⚠️
Why AI changed the threat model for travel technology
⚠️
AI red teaming agents change how LLMs get tested
⚠️
Follow the Crypto
⚠️
Critical Drupal Vulnerability Could Leave Sites Open to Cyberattack
⚠️
Mini Shai-Hulud Hits @antv npm Packages, Targets CI/CD Secrets
⚠️
AI becoming an SOC imperative for curtailing emerging cyber threats
⚠️
Terra adds continuous network exploitation validation to its platform
⚠️
Indian Student Data Weaponized in Phishing and Financial Fraud Campaigns
⚠️
ASAPP expands adversarial testing for enterprise AI systems
⚠️
New NGINX 0-Day RCE “nginx-poolslip” Threatens Millions of Servers
⚠️
Fake Invitation Phishing Campaign Steals Credentials From U.S. Organizations
⚠️
A Hacker Group Is Poisoning Open Source Code at an Unprecedented Scale
⚠️
Microsoft releases open-source tools to operationalize AI agent safety
⚠️
Apache OFBiz RCE Flaw Abuses Password-Change Restrictions for Authentication Bypass
⚠️
Tenable One deepens third-party integrations with new Open Connector for unified risk visibility
⚠️
Europol dismantles ‘First VPN’ service used by ransomware gangs
⚠️
ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories
⚠️
Selective HTTP Proxying in Linux, (Thu, May 21st)
⚠️
Reducing Phish-Prone Rates Without Training Fatigue: A Practical Playbook for Traditional Organizations
⚠️
Chinese APTs Share Linux Backdoor in Central Asia Telco Attacks
⚠️
Content Delivery Exploit Opens Websites to Brand Hijacking
⚠️
Q1 2026 Threat Landscape Report: Zero-clicks, geopolitical tensions, and some wins for law enforcement
⚠️
Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor
⚠️
Cybersecurity’s Hidden Communication Risk
⚠️
UK plans for cybercrime law reform would protect almost no one, experts warn
⚠️
Authorities dismantle First VPN, used by ransomware actors
⚠️
CISA asks cybersecurity community to alert it to vulnerability exploitation
KEV
⚠️
Attackers are bypassing MFA on SonicWall VPNs because something was wrong with previous fix
📋
Google Chrome Security Flaws Could Let Attackers Execute Code Remotely
📢
Mullvad confirms VPN fingerprinting flaw, says fix is on the way
🔥
GitHub Internal Repositories Breached via Malicious Nx Console VS Code Extension
🔥
Dragonica Lunaris - 126,293 breached accounts
🔥
Grafana Labs Says Code Breach Stemmed from TanStack Attack
🔥
GitHub, Grafana Labs breaches traced back to TanStack supply chain compromise
🔥
GitHub Breach Traced to Malicious 'Nx Console' VS Code Extension
🔥
Grafana Labs links GitHub environment breach to TanStack npm supply chain attack
🔥
Cybercriminal VPN Dismantled in Europol Crackdown
🕵️
ISC Stormcast For Thursday, May 21st, 2026 https://isc.sans.edu/podcastdetail/9940, (Thu, May 21st)
🕵️
Product showcase: Bitdefender Mobile Security for iOS protects privacy where scams begin
🕵️
Two U.S. Executives Plead Guilty in India-Based Tech Support Fraud Schemes
🕵️
BadIIS Malware Hijacks IIS Servers to Redirect Users to Illicit Sites
🕵️
Most dark web activity revolves around a handful of topics
🕵️
P2PInfect Botnet Targets Kubernetes via Exposed Redis
🕵️
Riverbed introduces new Aternity tools for autonomous IT operations
🕵️
Forward launches Predict to test network changes before deployment
🕵️
CTERA brings AI insights and automation for unstructured data
🕵️
Virtru centers file collaboration around data-level protection
🕵️
Tenable Hexa AI automates remediation across attack surfaces
🕵️
TamperedChef Malware Hides in Signed Apps to Drop Stealers and RATs
🕵️
Fake Microsoft Teams Downloads Spread ValleyRAT Malware
🕵️
The readiness paradox: Why a false sense of cyber confidence is becoming a liability
🕵️
Discord Enables End-to-End Encryption by Default Across Voice and Video Features
🕵️
Fitbit Air vs Pixel Watch 4: Which Should You Wear at Night?
🕵️
Google Health 5.0 Brings New Fitbit App Design, AI Coach, and Android Widget
🕵️
Google Brings a Long-Missing Apple Feature to Android
🕵️
Permanent Jobs Fall in UK as Temporary Placements Rise: Report
🕵️
Historic SpaceX IPO Filing Reveals Starlink, AI, and Mars Ambitions
🕵️
Glucose Tracking Is Turning Into the Next Big Health Data Platform
🌐
Shifting Budget Dynamics for Identity Security and AI Agents
🌐
ASCII art in phishing emails | Kaspersky official blog
🌐
Catch spyware in the act with Windows Webcam Monitoring
🌐
Three-Quarters of Firms Knowingly Ship Vulnerable Code
🌐
AI Agents Are Shifting Identity Security Budget Dynamics
🎙️
Who’s responsible when AI starts making mistakes?
📡
Scam ads, AI hallucinations, and legal implications.
📡
The EU Is Going Through a Trump-Fueled Breakup With Big Tech
📡
Discord adds end-to-end encryption to voice and video calls by default
📡
When Identity is the Attack Path
📡
Researchers left AI agents alone in a virtual town and watched it all unravel
📡
Scammers are abusing an internal Microsoft account to send spam links
📡
TikTok, YouTube, and Roblox face scrutiny, but age gates won’t fix child safety
📡
Nine-Year-Old Linux Kernel Flaw Leaks SSH Keys and Password Hashes
🐛
FreePBX Security Flaw Lets Attackers Access User Portals
🐛
CVE Lite CLI: Open-source dependency vulnerability scanner
🐛
CVE-2026-43493 crypto: pcrypt - Fix handling of MAY_BACKLOG requests
🐛
CVE-2026-43491 net: qrtr: ns: Limit the maximum server registration per node
🐛
CVE-2026-43492 lib/crypto: mpi: Fix integer underflow in mpi_read_raw_from_sgl()
🐛
Pardus Linux Vulnerability Lets Local Attackers Gain Silent Root Access
🐛
DirtyDecrypt: PoC Released for yet another Linux flaw
🐛
Microsoft provides mitigation for “YellowKey” BitLocker bypass flaw (CVE-2026-45585)
🐛
Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit
🐛
Why some security fixes never reach your vulnerability dashboard
🐛
How an image could compromise your Mac: understanding an ExifTool vulnerability (CVE-2026-3102)
🐛
Critical ExifTool Vulnerability Lets Hackers Compromise Macs via Malicious Images
🐛
NVIDIA Triton Inference Server Flaw Raises Risk of Unauthorized Access
🐛
Microsoft issues YellowKey mitigation, no patch yet
🐛
VU#980487: Local privilege escalation in Linux Kernel (Dirty Frag)
🐛
Drupal admins rushing to patch maximum severity SQL injection vulnerability
⚠️
Windows 11 BitLocker Zero-Day, TeamPCP Malware Leak, Iran Gas Station Hacks | Cybersecurity Today
⚠️
GitHub Investigating TeamPCP Claimed Breach of ~4,000 Internal Repositories
⚠️
Grafana GitHub Breach Exposes Source Code via TanStack npm Attack
⚠️
PoC Exploit Released for DirtyDecrypt Linux Kernel Vulnerability
⚠️
Hackers Exploit MSHTA to Deploy LummaStealer and Amatera Malware
⚠️
GitHub Source Code Reportedly Compromised, TeamPCP Claims Breach
⚠️
Risky Business #838 -- GitHub investigates possible breach
⚠️
New NGINX Vulnerability Exposes Servers to Malicious Code Execution
⚠️
Alleged Huawei zero-day blamed for the 2025 Luxembourg telecom crash
⚠️
Interpol's 'Operation Ramz' Pioneers Cross-Region Collabs in Middle East
⚠️
Verizon DBIR: Vulnerability Exploits Overtake Credentials as Top Access Vector
⚠️
TeamPCP GitHub Breach: Internal GitHub Repositories Allegedly Accessed
⚠️
Shift to Prevention and Enforcement as We Repeat Security Mistakes With AI - Rob Allen - BSW #448
⚠️
GitHub confirms internal repository theft as TeamPCP claims attack
⚠️
TeamPCP breached GitHub’s internal codebase via poisoned VS Code extension
⚠️
SHub Reaper impersonates Apple, Google, and Microsoft in one MacOS attack chain
⚠️
ArmorCode gives security teams AI workers for exposure and remediation
⚠️
Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development
⚠️
Grafana GitHub Security Incident Reportedly Connected to TanStack npm Ransomware
⚠️
Gremlin Stealer Hides C2 and Exfiltration Paths in Encrypted Resources
⚠️
Old Breaches Resold as New Corporate Data Leaks
⚠️
GitHub admits major source code leak after 3,800 internal repositories breached
⚠️
Implement agentic AI in cybersecurity with Tenable Hexa AI: Reduce cyber risk at machine speed
⚠️
Ukraine probes teen suspect in cyber theft scheme targeting California online shoppers
⚠️
Compromised coding tool helped hackers breach thousands of GitHub repositories
⚠️
Carding site B1ack’s Stash dumps 4.6 Million stolen cards for free
⚠️
Patch Now: Critical Flaw in OT Robot OS Gives Attackers Control
⚠️
Verizon DBIR: Vulnerability exploitation is the dominant initial access vector
⚠️
NanoCo lands $12 million seed funding, launches enterprise assistant built on NanoClaw
⚠️
Operationalizing CTEM Faster: Build Surface Command Dashboards in Minutes
⚠️
The cost of trusting the extension ecosystem.
⚠️
GitHub Confirms Breach, 4K Internal Repos Stolen
⚠️
The AI Kill Switch Problem
⚠️
PinTheft: Another Linux Privilege Escalation, Another Working Exploit, This Time Targeting Arch
⚠️
Fake Android Apps Commit Carrier Billing Fraud for Premium Svcs.
📋
Smashing Security podcast #468: High-speed train hacks and homicidal lawnmowers
📢
Why Policy in Amazon Bedrock AgentCore chose Cedar for securing agentic workflows
🔥
Microsoft disrupts malware code-signing service used by ransomware gangs
🔥
What happens when your identity provider becomes the kill chain
🔥
FBI warns students and staff that ShinyHunters may come knocking after Canvas breach
🔥
A malicious VS code extension just breached GitHub ‘s internal repositories
🔥
Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals
🔥
GitHub Confirms Breach of Internal Repositories Via Malicious VS Code Extension
🔥
Fox Tempest Linked to Malware-Signing Service Abusing Microsoft Artifact Signing
🔥
Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks
🔥
Microsoft DurableTask Python Client Targeted in TeamPCP Cyberattack
🔥
Customers say Trump Mobile is leaking their personal information
🔥
GitHub says hackers stole data from thousands of internal repositories
🔥
GitHub discloses breach of 3,800 internal code repositories.
🔥
7-Eleven confirms breach after ShinyHunters claims
🔥
GitHub says internal repositories were impacted in poisoned VS Code extension attack
🔥
7-Eleven hit by data breach
🔥
Microsoft disrupts cybercrime operation that hid behind legitimate software
🔥
Meet Rampart and Clarity, Microsoft’s new red team combo AI agents
🔥
Processes and Culture Top Reasons Behind Data Breaches
🔥
Investigating unauthorized access to GitHub’s internal repositories
🕵️
ISC Stormcast For Wednesday, May 20th, 2026 https://isc.sans.edu/podcastdetail/9938, (Wed, May 20th)
🕵️
7 hard truths security pros should know: 2026 DevOps Threats Report
🕵️
When your AI assistant has the keys to production
🕵️
Trapdoor Android Ad Fraud Ring Abuses 455 Apps for Fake Clicks
🕵️
DevilNFC Malware Traps Android Users in NFC Relay Attacks
🕵️
Mini Shai-Hulud Attack Hits npm Ecosystem, Compromising Over 600 Packages
🕵️
Single-Letter Go Module Typosquat Drops DNS-Based Backdoor
🕵️
Communicating cyber risk in dollars boards understand
🕵️
Void Botnet Leverages Ethereum for Resilient C2
🕵️
Eviltokens: A Conversation with Huntress on an AI‑Enabled Device Code Phishing Campaign
🕵️
GUEST ESSAY: AI can speed up communication, but it can also weaken human connection
🕵️
Darwinium updates mobile SDKs to detect remote access scam activity
🕵️
Fake Tax Assessment Pages Spread Windows Malware
🕵️
Tracking TamperedChef Clusters via Certificate and Code Reuse
🕵️
Trust3 AI focuses on AI agent risks with MCP Security layer
🕵️
GraphWorm Malware Abuses Microsoft OneDrive for Stealthy C2 Operations
🕵️
China-Linked Webworm APT Evolves Tactics, Expands to European Targets
🕵️
FBI: $388 million lost in crypto ATM scams in 2026
🕵️
Novata uses AI to map risk across portfolios and supply chains
🕵️
On AI Security
🕵️
Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API
🕵️
Report: Romance Scams Cost UK Victims £102 Million Last Year
🕵️
They Put Industrial Systems On Wi-Fi
🕵️
Block Everything By Default
🕵️
How Can MSSPs Scale Threat Detection Without Burning Out Their Analysts?
🕵️
Same Problem, Different Angles: When Red Team and Blue Team Actually Talk to Each Other
🕵️
Tor launches crowdfunding campaign to support internet freedom projects
🕵️
AI assistants can be hijacked and manipulated by inaudible sounds
🕵️
Steam removes ‘Beyond The Dark’ horror game over malware reports
🕵️
Webworm APT targets European government organizations with new backdoors
🌐
Typosquatting Is No Longer a User Problem. It's a Supply Chain Problem
🌐
Malicious TV boxes: how a cheap “SuperBox” turns your home into a proxy node for cybercriminals | Kaspersky official blog
🌐
Fake malware-signing service Fox Tempest dismantled by Microsoft
🌐
Android Malware Campaign Used Hundreds of Fake Apps to Silently Charge Users
🌐
Mini Shai-Hulud Hits Hundreds of npm Packages in AntV Ecosystem
🎙️
Building AI Content Systems That Actually Work with David Ebner of Content Workshop
📡
Weekly Threat Bulletin – May 20th, 2026
📡
Data Brokers’ and AI Firms’ Opt-Out Forms Are Built to Fail, Report Finds
📡
Researchers Warn CypherLoc Scareware Has Targeted Millions of Users
📡
Firefox 151 packs big privacy upgrades into a small update
📡
Agent AI is Coming. Are You Ready?
📡
AWS Security Hub Extended: Why enterprise security products should sell themselves
📡
FTC warns 12 major tech firms of violating Take It Down Act
📡
Discord migrates all users to end-to-end encryption by default
📡
Texas, Florida top list of states reporting millions of dollars lost through crypto ATMs
📡
A New York Cop Got Injured at a Boxing Match. Now Madison Square Garden Is Banning His Lawyer
📡
Socket raises $60 million in Series C funding.
📡
A Bipartisan Amendment Would End Police License Plate Tracking Nationwide
📡
Cyber Pros Can't Decide If AI Is a Good or a Bad Thing
🚨
Key findings from the Verizon DBIR 2026: Slower vulnerability remediation meets faster exploitationThe 2026 Verizon Data Breach Investigations Report (DBIR) reveals a troubling trend: vulnerability exploitation has surged to become the number one initial access vector while remediation rates have worsened. Key takeaways Vulnerability exploitation has surged to become the leadi…
KEV
🐛
Exchange Zero-Day Under Attack, Ransomware Gets Smarter, Fortinet Critical Flaws
KEV
🐛
CVE-2026-7246 Pallets Click contains a command injection via Unsanitized Filename "click.edit()"
🐛
CVE-2026-31721 usb: gadget: f_hid: move list and spinlock inits from bind to alloc
🐛
CVE-2026-31704 ksmbd: use check_add_overflow() to prevent u16 DACL size overflow
🐛
CVE-2026-31702 f2fs: fix use-after-free of sbi in f2fs_compress_write_end_io()
🐛
CVE-2026-37458 Missing input validation in the MP_REACH_NLRI component of FRRouting (FRR) stable/10.0 to stable/10.6 allows authenticated attackers to cause a Denial of Service (DoS) via supplying a crafted UPDATE message.
🐛
CVE-2026-4873 connection reuse ignores TLS requirement
🐛
CVE-2026-6429 netrc credential leak with reused proxy connection
🐛
CVE-2026-5545 wrong reuse of HTTP Negotiate connection
🐛
CVE-2026-6253 proxy credentials leak over redirect-to proxy
🐛
CVE-2026-5773 wrong reuse of SMB connection
🐛
CVE-2026-37459 An integer underflow in FRRouting (FRR) stable/10.0 to stable/10.6 allows attackers to cause a Denial of Service (DoS) via supplying a crafted BGP UPDATE message.
🐛
CVE-2026-6276 stale custom cookie host causes cookie leak
🐛
CVE-2026-7168 cross-proxy Digest auth state leak
🐛
CVE-2025-1176 GNU Binutils ld elflink.c _bfd_elf_gc_mark_rsec heap-based overflow
🐛
CVE-2025-1178 GNU Binutils ld libbfd.c bfd_putl64 memory corruption
🐛
CVE-2025-0665 eventfd double close
🐛
Four-Faith Industrial Routers Targeted in Botnet Hijacking Campaign
🐛
20-Year-Old PostgreSQL Flaw Gets Public PoC Exploit for Remote Code Execution
🐛
DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability
🐛
macOS flaw allowed rogue apps to access chat and browser data
🐛
Contractor’s public GitHub account exposed GovCloud and CISA credentials
⚠️
CTT - 468,124 breached accounts
⚠️
GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials
⚠️
CISA Admin Reportedly Exposes AWS GovCloud Credentials in Public GitHub Repository
⚠️
SEPPmail Gateway Flaws Expose Organizations to RCE and Email Traffic Interception
⚠️
Mythos Preview Automates PoC Exploit Creation for Vulnerability Research
⚠️
Public Instagram posts provide raw material for AI phishing campaigns
⚠️
Earbud sensors can authenticate users by their heartbeat, study finds
⚠️
Compromised GitHub Action Steals Workflow Credentials
⚠️
Hackers Exploit Entra ID Accounts to Steal Microsoft 365, Azure Data
⚠️
Protecting the Neglected: Measuring County Cyber Risk with Dr. Ido Sivan Sevilla
⚠️
iProov brings identity verification to video meetings to reduce fraud risks
⚠️
PostgreSQL Flaws Expose Databases to Remote Code Execution and SQL Injection
⚠️
Shai-Hulud worm copycats emerge after source code leak
⚠️
7 tips for accelerating cyber incident recovery
⚠️
Grafana Labs Confirms Hackers Stole Source Code
⚠️
SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access
⚠️
Operation Ramz Dismantles 53 Servers Used in Scam and Malware Campaigns
⚠️
Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare
⚠️
UAC-0184 Uses Bitsadmin and HTA Files to Deliver Gated Malware
⚠️
AI Raises the Bar on Vulnerability Awareness and Secure-by-Design Software
⚠️
Phishing Campaign Exploits Google AppSheets to Target Facebook Accounts
⚠️
Internet Explorer may be dead, but its ghost still runs malware
⚠️
PureLogs infostealer is stealing credentials worldwide
⚠️
Hackers have compromised dozens of popular open source packages in an ongoing supply chain attack
⚠️
GitHub scales back bug bounties, reminds users security is their responsibility too
⚠️
Mini Shai-Hulud returns, compromising hundreds of npm packages
⚠️
Patch bypass allows hackers to exploit prior flaw in SonicWall SSL-VPN
⚠️
Rapid7’s 2026 Global Cybersecurity Summit: Key Takeaways for Security Leaders
⚠️
TP-Link, Photoshop, OpenVPN, Norton VPN vulnerabilities
⚠️
Governing infrastructure as code using pattern-based policy as code
⚠️
Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps
⚠️
Microsoft dismantled malware-signing network Fox Tempest
⚠️
News alert: Orchid Security study finds invisible identities now outnumber managed accounts
⚠️
AntV data visualization tool the latest to be hit by ongoing npm supply chain attacks
⚠️
Huawei zero-day attack behind last year’s crash of Luxembourg's entire telecoms network
⚠️
CISA secrets left sitting on GitHub.
⚠️
Attackers hit vulnerabilities hard last year, making exploits the top entry point for breaches
⚠️
Windows Zero-Day Barrage Continues After Patch Tuesday
⚠️
AI Spam Is Breaking Bug Bounties
⚠️
Verizon DBIR: Enterprises Face a Dangerous Vulnerability Glut
⚠️
Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
⚠️
SN 1079: Daybreak and Codename MDASH - Microsoft's Edge Password Blunder
📋
macOS Malware Abuses Fake Google Update for Persistence
📋
Drupal is rolling out an emergency security update on May 20. You cannot miss it
📢
Cybersecurity jobs available right now: May 19, 2026
📢
AI infrastructure is cracking under sovereignty demands
📢
Kimsuky Uses LNK, JSE Lures to Target Recruiters, Crypto Users, Defense Officials
📢
US cyber agency CISA exposed reams of passwords and cloud keys to the open web
📢
CISA contractor exposed AWS GovCloud keys on GitHub.
📢
CISA Exposes Secrets, Credentials in 'Private' Repo
📢
CISA credential leak raises alarms, and Capitol Hill demands answers
🔥
Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account
🔥
Compromised Nx Console VS Code Extension Steals Developer and Cloud Secrets
🔥
Mini Shai-Hulud Attack Hits @antv npm Packages
🔥
Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer
🔥
Gentlemen Ransomware Targets Windows, Linux, NAS, BSD, and ESXi Systems
🔥
Poland shifts away from Signal following cyberattacks on officials’ accounts
🔥
ShinyHunters Takes Responsibility for Attack on Learning Management Platform
🔥
The New Phishing Click: How OAuth Consent Bypasses MFA
🔥
CyberheistNews Vol 16 #20 [Heads Up] Today You Have Only 60 Seconds to Stop That Breach. Are You Ready?
🔥
Looking Back, Looking Forward: Digesting a Dynamic Bouillabaisse of Cyber Evolution
🔥
Selector extends AI-driven observability into multi-cloud environments
🔥
When AI Starts Acting Malicious
🔥
Microsoft Takes Down Fox Tempest for Providing Ransomware-Enabling Signing Tool
🔥
Microsoft disrupts cybercrime service that abused software verification systems en masse
🔥
Biometrics, diagnoses, and bank details exposed in major healthcare breach
🔥
Microsoft disrupts Fox Tempest malware-signing-as-a-service platform tied to ransomware gangs
🔥
CIRT insights: How to help prevent unauthorized account removals from AWS Organizations
🕵️
ISC Stormcast For Tuesday, May 19th, 2026 https://isc.sans.edu/podcastdetail/9936, (Tue, May 19th)
🕵️
Microsoft to Retire Teams Together Mode to Improve Performance
🕵️
JavaScript Malware Campaign Drops Crypto Clipper via PowerShell
🕵️
Babel Street targets AI-driven threats with new agentic investigation capabilities
🕵️
Egnyte unveils Email Capture and AI features to unify fragmented data
🕵️
The State of AI & AppSec - Keith Hoodlet - ASW #383
🕵️
Discord enables E2EE by default for all voice and video communications
🕵️
Laurie Anderson Is Quoting Me
🕵️
Microsoft Edge Enhances Security by Preventing Password Loading at Startup
🕵️
Top 5 Phishing-Driven Social Engineering Attacks on Companies in 2026
🕵️
Anthropic Denies EU Access to Claude Mythos, ChatGPT 5.5 Comes to Rescue
🕵️
VoidStealer Malware Targets Chrome Data Despite Built-In Browser Protections
🕵️
LaunchDarkly adds real-time controls for AI agents in production
🕵️
Canonical ships Ubuntu Core 26 with 15 years of security maintenance
🕵️
New macOS infostealer impersonates Apple, Microsoft, and Google in a single attack chain
🕵️
The end of unencrypted Discord calls is here
🕵️
Microsoft’s legacy MSHTA tool heavily abused in malware attacks
🕵️
Two-Thirds of Nonhuman Accounts Are Unseen and Unmanaged, According to Orchid Security’s Identity Gap Report
🕵️
Warning: Phishing Attacks Are Abusing the Kuse AI App
🕵️
Mozilla hardens Firefox against fingerprinting, adds one-click session wipe
🕵️
Criminal IP Returns to Infosecurity Europe 2026 with Advanced AI-Driven TI & ASM
🕵️
AI Isn’t Finding Novel Bugs
🕵️
Microsoft Launches New Surface AI PCs for Business Buyers
🕵️
Anthropic Just Bought a Developer Tool Used by OpenAI, Google
🕵️
Agentic AI, Strong Racks, Weak Fabric: Inside Dell’s AI Bet
🕵️
Mac Users Face New Malware Threat Spoofing Apple, Google, and Microsoft
🕵️
Apple’s Siri Could Get a Grammarly-Like AI Writing Tool at WWDC
🕵️
Apple Intelligence Powers New Accessibility Features for iPhone, Mac
🕵️
Microsoft Confirms Windows Update Bug Blocking Security Fixes
🕵️
My Mother the Car, AI Slop, Nginx, Polyscope, Drupal, , GitHub, Aaran Leyland - SWN #582
🌐
From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat
🌐
From Ivory Tower to Iron Curtain: The Academics Who Reshaped the CIA
🌐
Stealer Spoofs Google, Microsoft &amp; Apple, Then Backdoors macOS
📡
Hackers Bypass Security Tools to Target Users Directly
📡
How to Make Apps and Websites Remove Your Nonconsensual Nudes
📡
Massive MENA cybercrime Operation Ramz disrupts infrastructure and arrests 201 suspects
📡
YouTube wants your face to fight deepfakes
📡
Agentic AI Accelerates Software Builds and Mobile App Attacks
📡
Facebook scam promises cheap Aldi meat boxes, steals payment info instead
📡
Tools for spotting and disabling AI systems in an enterprise
📡
Telecom sector launches its own private ISAC
📡
UK regulator to require tech firms to tackle deepfakes, non-consensual intimate images
📡
Discord enables end-to-end encrypted voice and video calling for every user
📡
From teen hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing
📡
Microsoft Exchange ProxyShell Scanning Doubles in April 2026 as Two Distinct Campaign Clusters Emerge
🐛
Experts warn of active exploitation of critical NGINX flaw CVE-2026-42945
KEV
🐛
Critical Marimo RCE Flaw Could Let Attackers Execute Malicious Code Remotely
🐛
Chaotic Eclipse discloses MiniPlasma zero-day, suggesting a missing or undone 2020 Windows security fix
🐛
VU#777338: SGLang contains two remote code execution and one path traversal vulnerability
KEV
🐛
Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flaws
🐛
Critical NGINX Vulnerability Lets Hackers Launch Remote Code Execution Attacks
KEV
🐛
Gamaredon Deploys GammaDrop, GammaLoad in Phishing Campaigns
🐛
‘Patched’ Windows bug resurfaces 6 years later as working SYSTEM-level exploit
🐛
Attackers are exploiting critical NGINX vulnerability (CVE-2026-42945)
🐛
Microsoft Exchange Zero-Day Under Attack, No Patch Available
⚠️
The Boring Stuff is Dangerous Now
⚠️
When ransomware hits, confidence doesn’t restore endpoints
⚠️
Claude Code Vulnerability Allows Attackers to Run Commands Through Crafted Deeplinks
⚠️
Former CISA nominee Sean Plankey named US CEO of defense startup
⚠️
Crafted JPEGs Could Trigger PHP Memory Bugs for Exploitation
⚠️
Researchers Build First Public Apple M5 macOS Kernel Exploit with Mythos Preview
⚠️
Malicious npm Packages Steal SSH Keys, Cloud Credentials, and Crypto Wallets
⚠️
Lyrie: Open-source autonomous pentesting agent
⚠️
AI shrinks vulnerability exploitation window to hours
⚠️
Critical FunnelKit Vulnerability Puts 40,000+ WooCommerce Sites at Risk
⚠️
n8n Security Flaws Could Let Attackers Achieve Remote Code Execution
⚠️
201 arrested in INTERPOL disruption of phishing and fraud networks
⚠️
Why the best security investment a board can make in 2026 isn’t another tool
⚠️
AI coding is fueling a secrets-sprawl crisis few CISOs are containing
⚠️
AI Has a data problem, cascading breaches, and the weekly news - Dimitri Sirota - ESW #459
⚠️
Security Researchers Find 47 Zero-Days at Pwn2Own Berlin
⚠️
Attackers accessed, downloaded code from Grafana Labs’ GitHub
⚠️
MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems
⚠️
Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware
⚠️
Zero-Day Exploit Against Windows BitLocker
⚠️
Gremlin Stealer Hides Payloads in .NET Resources to Evade Detection
⚠️
New image-based prompt injection attack targets multimodal AI models
⚠️
Open source tool maker Grafana Labs says hackers stole its code, refuses to pay ransom
⚠️
AI Security Shifts To Data Control
⚠️
ShinyHunters hack 7-Eleven: franchisee data and Salesforce records exposed
⚠️
⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More
⚠️
Researchers craft a kernel exploit on Apple's M5 chips, with help from Mythos.
⚠️
18th May – Threat Intelligence Report
⚠️
MY TAKE: AI agents force a rethink of enterprise service lines as vendors move up the tech tack
⚠️
AI cyberattackers are getting better faster
⚠️
Microsoft: Edge 148 will stop loading cleartext passwords in memory
⚠️
AI is drowning software maintainers in junk security reports
⚠️
Game over for 74 suspected scammers after Dutch cops plastered their faces on billboards
⚠️
AI Ends Productivity Guesswork
⚠️
Grafana confirms GitHub token breach cybercrime group claims the attack
⚠️
Microsoft May security patch fails for some due to boot partition size glitch
⚠️
The M5 just met its memory problem.
⚠️
AI might cut false positives, but it won’t stop the slop
⚠️
Shai-Hulud Worm Clones Spread After Code Release
⚠️
Multiple Vulnerabilities in NGINX Could Allow for Remote Code Execution
📢
Can Laws Stop Deepfakes? South Korea Aims to Find Out
📢
Microsoft Acknowledges Windows 11 Update Failure Linked to Error 0x800f0922
📢
NCSC Publishes Guidance on Securing Agentic AI Use
📢
CISA Admin Leaked AWS GovCloud Keys on Github
🔥
Weekly Update 504
🔥
Grafana Labs Confirms Security Incident Involving GitHub Codebase Access
🔥
Hackers Abuse Cloudflare Storage to Exfiltrate Network Files
🔥
Paper Werewolf APT Spreads EchoGather RAT via Fake Adobe Installer
🔥
The Canvas breach proved that prevention is no longer enough
🔥
NYC Health and Hospitals says hackers stole medical data and fingerprints during breach affecting at least 1.8 million people
🔥
Fuel Tank Breaches Expand Scope of Iran's Cyber Offensive
🔥
Grafana refuses to pay ransom after codebase theft
🔥
More than 200 arrested in cyber raids aimed at Middle East scam networks
🔥
Addi - 34,532,941 breached accounts
🕵️
Product showcase: McAfee + ChatGPT integration turns doubt into a scam check
🕵️
Linux Torvalds Warns AI Bug Report Spam Is Disrupting Linux Security Discussions
🕵️
1 Million WordPress Websites Exposed by Avada Builder Security Vulnerabilities
🕵️
The AI backdoor your security stack is not built to see
🕵️
Fast16 Malware Sabotages Nuclear Test Simulations by Altering Data
🕵️
Hackers Hide PureLogs Infostealer in PawsRunner Loader
🕵️
OtterCookie Malware Steals Dev Secrets, SSH Keys, Cloud Credentials, and Tokens
🕵️
ANY.RUN Turns 10: Special Offers for Stronger Security Operations
🕵️
Signal begins testing automatic key verification for encrypted chats
🕵️
How a government contest launched a revolution in AI-based bug hunting
🕵️
SmartBear expands ReadyAPI with AI-powered API testing capabilities
🕵️
What Is an Al Agent in Cybersecurity?
🕵️
Grafana Labs says hacker gained access to codebase through leaked token
🕵️
7 Hidden iPhone Features That Actually Make a Difference
🕵️
Fitbit Bug Leaves Pixel Watch Users Missing Sleep Data Again
🕵️
Windows 11 Start Menu, Taskbar Are Getting More Customization
🕵️
Mozilla calls on UK to exclude VPNs from age verification rules
🕵️
Apple’s Siri Revamp May Add Auto-Deleting Chats
🕵️
Banned Nvidia AI Chips Keep Reaching China Despite US Crackdown
🕵️
Apple’s Fall Lineup Could Include Foldable iPhone, New Macs
🕵️
Interpol leads cybercrime crackdown across 13 countries in Middle East, North Africa
🕵️
Poland urges officials to ditch Signal for state-run messaging apps
🕵️
TeamPCP Supply Chain Campaign: Activity Through 2026-05-17, (Mon, May 18th)
🕵️
FTC: Americans Lost $2.1 Billion to Social Media Scams Last Year
🌐
A week in security (May 11 &#8211; May 17)
🌐
Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulations
🌐
Developer Workstations Are Now Part of the Software Supply Chain
🌐
IT threat evolution in Q1 2026. Mobile statistics
🌐
IT threat evolution in Q1 2026. Non-mobile statistics
📰
N2K CyberWire's T-Minus returns with focus on the critical intersection of space and cybersecurity
🎙️
AI is distorting the Holocaust (Lock and Code S07E10)
📡
Bank of England, FCA and Treasury Raise Alarm Over Frontier AI
📡
An ICE Firearms Trainer Was Involved in At Least 4 Deadly Shootings
📡
Microsoft is changing Edge’s plaintext password behavior
📡
How to Reduce Phishing Exposure Before It Turns into Business Disruption
📡
Interpol Launches Sweeping Cybercrime Crackdown in MENA Region
📡
The Infosecurity Europe Cyber Startup Competition: Meet the Finalists
📡
Public Amazon bucket leaks sensitive guest data from Japanese hotel platform Tabiq
📡
B1ack’s Stash Releases 4.6 Million Stolen Credit Cards for Free
📡
Experts warn of privacy risks as AI firms looks to connect to financial accounts
📡
INTERPOL Operation Ramz Disrupts MENA Cybercrime Networks with 201 Arrests
📡
'Claw Chain' Vulnerabilities Threaten OpenClaw Deployments
🐛
CVE-2026-46483 Vim: Command injection in tar#Vimuntar via missing shellescape {special} flag
🐛
CVE-2026-44283 etcd: Read access via PrevKv in etcd transactions may bypass RBAC authorization checks
🐛
CVE-2026-8368 LWP::UserAgent versions before 6.83 for Perl leak Authorization and Proxy-Authorization headers on cross-origin redirects
🐛
CVE-2026-8328 FTP PASV SSRF, ftpcp() does not use actual peer address, trusts server-supplied PASV host address
🐛
NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE
KEV
🐛
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 97
⚠️
Pwn2Own Berlin 2026, Day Three: DEVCORE Crowned Master of Pwn, $1.298 Million Total
⚠️
Grafana GitHub Token Breach Led to Codebase Download and Extortion Attempt
⚠️
Week in review: Cisco patches SD-WAN 0-day, unpatched Microsoft Exchange Server flaw exploited
⚠️
GitHub Actions Cache Poisoning is eating open source
⚠️
Pwn2Own Berlin 2026 concludes with $1.29 million paid for 47 zero-days
⚠️
Security Affairs newsletter Round 577 by Pierluigi Paganini – INTERNATIONAL EDITION
⚠️
Attackers exploit Funnel Builder bug to inject e-skimmers into e-stores
KEV
⚠️
iodéOS review: Privacy-focused Android that doesn’t get in your way
⚠️
Debian 13.5 point release lands with security fixes, bug patches
🎙️
From cyberspace to space-cyber.
🚨
U.S. CISA adds a flaw in Microsoft Exchange Server to its Known Exploited Vulnerabilities catalogThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Microsoft Exchange Server to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in Microsoft Exchange Server, tracked as CVE-202…
KEV
🐛
CVE-2026-44673 libyang: lyb_read_string() integer overflow → heap buffer overflow
🐛
CVE-2026-6478 PostgreSQL discloses MD5-hashed passwords via covert timing channel
🐛
CVE-2026-6473 PostgreSQL server undersizes allocations, via integer wraparound
🐛
CVE-2026-6638 PostgreSQL REFRESH PUBLICATION allows SQL injection via table name
🐛
CVE-2026-6637 PostgreSQL refint allows stack buffer overflow and SQL injection
🐛
CVE-2026-6477 PostgreSQL libpq lo_* functions let server superuser overwrite client stack memory
🐛
CVE-2026-40460 NGINX ngx_quic_module vulnerability
🐛
CVE-2026-42934 NGINX ngx_http_charset_module vulnerability
🐛
CVE-2026-42946 NGINX ngx_http_scgi_module and ngx_http_uwsgi_module vulnerability
🐛
CVE-2026-44662 rust-openssl: Heap buffer overflow when encrypting with AES key-wrap-with-padding
🐛
CVE-2026-44431 urllib3: Sensitive headers forwarded across origins in proxied low-level redirects
🐛
CVE-2026-43490 ksmbd: validate inherited ACE SID length
🐛
CVE-2026-6475 PostgreSQL pg_basebackup and pg_rewind can overwrite unrelated files of origin superuser choice
🐛
CVE-2026-6474 PostgreSQL timeofday() can disclose portions of server memory
🐛
CVE-2026-6472 PostgreSQL CREATE TYPE does not check multirange schema CREATE privilege
🐛
CVE-2026-6479 PostgreSQL SSL/GSS init causes denial of service, via uncontrolled recursion
🐛
CVE-2026-40701 NGINX ngx_http_ssl_module vulnerability
🐛
CVE-2026-42945 NGINX ngx_http_rewrite_module vulnerability
🐛
CVE-2026-46333 ptrace: slightly saner 'get_dumpable()' logic
🐛
Linux “ssh-keysign-pwn” Flaw Exposing Critical Authentication Files
⚠️
Inside CIRA: How Canada's .ca Registry Became a Global DNS & Cybersecurity Force
⚠️
JDownloader Website Hack Exposes Windows and Linux Users to Malicious Installers
⚠️
OpenAI and others deal with fallout from TanStack supply-chain attack.
⚠️
OpenAI hit by supply chain attack linked to malicious TanStack packages
⚠️
AI Broke Patch Management
⚠️
Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming
🔥
Cybercriminal Twins Caught After They Forgot to Turn Off Microsoft Teams Recording
🔥
Russian APT Turla builds long-term access tool with Kazuar Botnet evolution
🕵️
Friday Squid Blogging: Bigfin Squid
🕵️
Scam papers served.
🚨
CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access ExploitsThe U.S.Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a newly disclosed vulnerability impacting Cisco Catalyst SD-WAN Controller to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to remedi…
KEV
🚨
Cisco warns of an actively exploited SD-WAN flaw with max severityCisco has disclosed a max-severity authentication bypass vulnerability affecting its Catalyst SD-WAN Controller and Catalyst SD-WAN Manager platforms, warning that the flaw has already been found to be exploited in the wild. The disclosure follows an earlier authentication bypass…
KEV
🚨
CVE-2026-20182: Cisco Catalyst SD-WAN Auth Bypass Added to CISA KEVCVE-2026-20182: Cisco Catalyst SD-WAN Auth Bypass Added to CISA KEV Cisco has disclosed CVE-2026-20182, a critical authentication bypass affecting Cisco Catalyst SD-WAN Controller (formerly vSmart) and Cisco Catalyst SD-WAN Manager (formerly vManage). The flaw is in the peering a…
KEV
🐛
Palo Alto Firewalls Hit by Zero-Day Allowing Arbitrary Code Execution as Root
🐛
On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email
🐛
Next.js Security Flaw Leaks Cloud Credentials, API Keys, and Admin Interfaces
🐛
CVE-2026-42304 Twisted: Denial of Service (DoS) in twisted.names via Crafted DNS Compression Pointer Chains
🐛
CVE-2026-4893 CVE-2026-4893
🐛
CVE-2026-2291 CVE-2026-2291
🐛
CVE-2026-5172 CVE-2026-5172
🐛
CVE-2026-4890 CVE-2026-4890
🐛
CVE-2026-42011 Gnutls: gnutls: security bypass due to incorrect name constraint handling
🐛
CVE-2026-34956 Openvswitch: open vswitch: denial of service via malformed ftp epasv command
🐛
CVE-2026-7210 The expat and elementtree parsers use insufficient entropy for XML hash-flooding protection
🐛
CVE-2026-43969 Cookie Request Header Injection via Unvalidated Encoder in cow_cookie:cookie/1
🐛
CVE-2026-8295 Integer overflow in simdjson
🐛
CVE-2026-4891 CVE-2026-4891
🐛
CVE-2026-4892 CVE-2026-4892
🐛
CVE-2026-42010 Gnutls: gnutls: authentication bypass via nul character in username
🐛
CVE-2026-7790 Unbounded chunk-size hex digits in cowlib cause quadratic CPU and memory DoS
🐛
CVE-2026-43968 CR Injection in SSE Encoder Enables Event Splitting via cow_sse:event/1
🐛
Cisco Catalyst SD-WAN Controller Flaw Under Active Exploitation for Admin Access
KEV
🐛
Amazon Redshift JDBC Driver Flaws Expose Systems to RCE Attacks
🐛
Unpatched Microsoft Exchange Server vulnerability exploited (CVE-2026-42897)
🐛
PraisonAI Vulnerability Actively Exploited Within Hours of Being Made Public
KEV
🐛
VMware Fusion Flaw Could Allow Attackers to Gain Root Privileges
🐛
Cisco patches another actively exploited SD-WAN zero-day (CVE-2026-20182)
KEV
🐛
CVE-2026-40379 Azure Entra ID Spoofing Vulnerability
🐛
CVE-2026-42897: Microsoft confirms active exploitation of Exchange Server zero-day
🐛
Exchange Server zero-day vulnerability can be triggered by opening a malicious email
KEV
🐛
Metasploit Wrap-Up 05/15/2026
⚠️
How a Google API Key Became an $8,000 AI Bill, Meta Scam Ads Lawsuit, and 73-Second Cyber Attacks
⚠️
The AI oversight paradox: Is the investment worth the cost of watching it?
⚠️
Hackers Exploit Scheduled Tasks for Persistence in FrostyNeighbor Attacks
⚠️
Dell SupportAssist Update Forces Windows Systems Into BSOD Loop
⚠️
Soap Box: Where does AI fit into cloud security?
⚠️
TeamPCP Hackers Exploit CI/CD Pipelines to Steal Cloud Credentials
⚠️
Pwn2Own Berlin 2026, Day One: $523,000 paid out, AI products fall
⚠️
Multiple cPanel Vulnerabilities Could Lead to Sensitive Resource Exposure
⚠️
China-Linked Hackers Deploy New TencShell Malware Against Global Manufacturer
⚠️
Researchers uncover YellowKey and GreenPlasma Windows Zero-Days
⚠️
Microsoft Edge, Windows 11, and LiteLLM Fall to Exploits at Pwn2Own Berlin 2026
⚠️
EU’s Cyber Resiliency Act will put IT leaders to the test
KEV
⚠️
The economics of ransomware 3.0
⚠️
Rocky Linux launches opt-in security repository for urgent fixes
⚠️
Microsoft Warns HPE Operations Agent Abused in Malware-Free Attacks
⚠️
Autonomous systems are finally working. Security is next
⚠️
Gremlin Stealer's Evolved Tactics: Hiding in Plain Sight With Resource Files
⚠️
TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates
⚠️
Akamai to acquire LayerX for $205 million
⚠️
Shai-Hulud Worm Steals Dev Secrets Across npm, GitHub, AWS & Kubernetes
⚠️
Google Project Zero Details Pixel 10 Zero-Click Exploit Chain
⚠️
Hackers Exploit OAuth Device Flow to Steal Microsoft 365 Tokens
⚠️
Microsoft Reports Severe Zero-Day Flaw in On-Prem Exchange Servers
⚠️
Redesigning Security Culture for the Agentic Age
⚠️
CISA orders all federal agencies to patch exploited bug in Cisco SD-WAN systems by Sunday
⚠️
Researchers claim the first macOS kernel exploit on Apple M5 chips
⚠️
Hack One, Own Every Mower
⚠️
Cisco zero-day under ongoing attack by persistent threat group
⚠️
Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence
⚠️
US orders travelers on Air Force One to throw away gifts, pins, and burner phones after China trip
⚠️
OpenAI impacted by TanStack supply-chain attack.
⚠️
Attackers exploit critical flaw in Cisco Catalyst SD-WAN Controller
⚠️
Mullvad VPN exit IP patterns could enable user fingerprinting
⚠️
Here’s how the FTC plans to enforce the Take It Down Act
⚠️
A Vulnerability in Microsoft Exchange Server Could Allow for Arbitrary Code Execution
⚠️
One email could be all it takes.
⚠️
Microsoft Exchange zero-day chain nets DEVCORE $200K at Pwn2Own
⚠️
Expired domain leads to supply chain attack on node-ipc npm package
⚠️
Cisco, Canvas, Microsoft, Exchange 0-Days, NPM Backdoors, GPT-5.5 and more... - SWN #581
⚠️
Pwn2Own Berlin 2026, Day Two: $385,750 more, Microsoft Exchange falls, and the running total crosses $900K
📋
Google Patches 79 Chrome Security Vulnerabilities, 14 Rated Critical
📢
Signal threatens to leave Canada over proposed lawful access bill
📢
What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface
📢
Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access
🔥
Taiwan Incident Highlights Cybersecurity Gaps in Rail Systems
🔥
Windows 11 and NVIDIA hacked on the first day of Pwn2Own Berlin 2026
🔥
OpenAI confirms exposure in recent ‘Shai-Hulud’ supply-chain attack
🔥
Inside The Gentlemen Ransomware Leak: When the Hunter Becomes the Hunted
🔥
Gunra Ransomware Expands RaaS After Conti Locker Shift
🔥
Attackers replaced JDownloader installer downloads with malware
🔥
More than $10 million stolen from crypto platform THORChain
🔥
Your NPM Package Is Stealing Secrets
🕵️
New infosec products of the week: May 15, 2026
🕵️
ISC Stormcast For Friday, May 15th, 2026 https://isc.sans.edu/podcastdetail/9934, (Fri, May 15th)
🕵️
Popular node-ipc npm Library Hit by Supply Chain Attack, Impacting 822K Weekly Downloads
🕵️
Deepfake detection is losing ground to generative models
🕵️
Zombie linkages are keeping expired domains trusted for years
🕵️
Microsoft Exposes Kazuar Malware’s Modular P2P Botnet Architecture
🕵️
Keycard helps developers secure autonomous AI agents with scoped access
🕵️
Tycoon 2FA Operators Use OAuth Device Code Phishing to Bypass MFA
🕵️
OrBit Rootkit Targets Linux to Steal SSH and Sudo Credentials
🕵️
Thieves unlock stolen iPhones using cheap tools sold on Telegram
🕵️
Bypassing On-Camera Age-Verification Checks
🕵️
Ghostwriter group resumes attacks on Ukrainian Government targets
🕵️
Google lets Workspace admins apply one policy across all SAML apps
🕵️
Traffic-Themed SMS Phishing Targets Users Around the World
🕵️
Raising the bar: Quality, shared responsibility, and the future of GitHub’s bug bounty program
🕵️
Figure Humanoid Robots Sort Packages Non-Stop in 24/7 Demo
🕵️
Google’s Default 15GB Free Storage Is Ending for Some New Accounts
🕵️
MSPs need AI to fight AI-fueled cyberthreats: Guardz
🕵️
Why Integrate Threat Intelligence Feeds into Email Security?
🕵️
US Approves Nvidia H200 Sales to China, But Shipments Remain Stalled
🕵️
New Windows Update May Undo Bad Driver Updates on Its Own
🕵️
Apple and OpenAI’s ChatGPT Deal Reportedly Risks Legal Clash
🕵️
OpenAI Warns Mac Users to Update Apps After Supply-Chain Attack
🕵️
Colorado governor commutes prison sentence for election denier Tina Peters
🌐
&#x5b;Guest Diary&#x5d; New Malware Libraries means New Signatures, (Fri, May 15th)
📡
Strong Stack. Strong Team. Real Security Resilience.
📡
Cyber Pioneers Ponder Past as Prologue
📡
Meta’s confusing new approach to chat privacy
📡
Gremlin Stealer Evolves into Modular Threat with Advanced Evasion Capabilities
📡
The AWS AI Security Framework: Securing AI with the right controls, at the right layers, at the right phases
📡
A hotel check-in system left a million passports and driver’s licenses open for anyone to see
🚨
Fragnesia (CVE-2026-46300): Frequently asked questions about new Linux Kernel XFRM ESP-in-TCP privilege escalationA new Linux kernel local privilege escalation exploit with a public proof-of-concept targets the same subsystem as Dirty Frag but requires a separate patch. Key Takeaways CVE-2026-46300 (Fragnesia) is the latest high severity local privilege escalation vulnerability in the Linux …
KEV
🚨
U.S. CISA adds a flaw in Cisco Catalyst SD-WAN  to its Known Exploited Vulnerabilities catalogThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Cisco Catalyst SD-WAN to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in Cisco Catalyst SD-WAN, tracked as CVE-2026-20182 …
KEV
🚨
Frequently asked questions about the continued exploitation of Cisco Catalyst SD-WAN vulnerabilities (CVE-2026-20182)Multiple critical authentication bypass vulnerabilities in Cisco Catalyst SD-WAN Controller and Manager are under active exploitation by multiple threat clusters, including CVE-2026-20182, which has been exploited as a zero-day by a sophisticated threat actor. Key Takeaways CVE-2…
KEV
🐛
New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption
🐛
18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE
🐛
Langflow CVE-2026-33017 Exploited to Steal AWS Keys, Deploy NATS Worker
KEV
🐛
MongoDB Security Flaw Enables Arbitrary Code Execution on Vulnerable Systems
🐛
Critical Exim Mailer Flaw Enables Remote Code Execution Attacks
🐛
PraisonAI vulnerability gets scanned within 4 hours of disclosure
🐛
PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure
🐛
Windows DNS Client Security Flaw Exposes Systems to Remote Code Execution
🐛
CVE-2026-42945: NGINX Rewrite Heap Overflow Enables Remote DoS & Potential RCE
🐛
Critical WordPress Plugin Flaw Allows Unauthorized Access to Websites
🐛
NGINX Rift: an 18-year-old flaw in the world’s most deployed web server just came to light
🐛
Fragnesia: New Linux kernel LPE bug was spawned by Dirty Frag patch (CVE-2026-46300)
🐛
CVE-2026-42897 Microsoft Exchange Server Spoofing Vulnerability
🐛
CVE-2026-41615 Microsoft Authenticator Information Disclosure Vulnerability
🐛
Broadcom releases VMware Fusion security update for root access bug
🐛
CVE-2026-20182: Critical authentication bypass in Cisco Catalyst SD-WAN Controller (FIXED)
🐛
The Dark Side of Efficiency: When Network Controllers Become "God Mode" for Attackers
KEV
🐛
Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilities
🐛
Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access
KEV
🐛
Linux Kernel bug Fragnesia allows local root access attacks
🐛
CVE-2026-0265: Authentication Bypass in Palo Alto Networks PAN-OS
KEV
🐛
Meet Fragnesia, the third Linux kernel vulnerability in a month
🐛
AI agent finds 18-year-old remote code execution flaw in Nginx
⚠️
Amazon Quick Security Flaw Allowed Restricted Users to Access AI Chat Agents
⚠️
GitLab Security Flaw Allows Cross-Site Scripting and Unauthenticated DoS
⚠️
Hackers Hijack HWMonitor to Sideload Malicious DLL
⚠️
PoC Released for 18-Year-Old NGINX Flaw Allowing Remote Code Execution
⚠️
Packagist Warns: Update Composer Now After GitHub Actions Token Leak
⚠️
New Exim BDAT GnuTLS Vulnerability Enables Code Execution Attacks
⚠️
Gentlemen RaaS Exploits Fortinet and Cisco Edge Devices for Initial Access
⚠️
Abrigo - 711,099 breached accounts
⚠️
What CISOs need to land a board role
⚠️
Deepfake sextortion forces schools to remove student photos from websites
⚠️
My relationship status is “compromised.”
⚠️
CERN’s open source KiCad library gives the world 17,000 circuit board components
⚠️
Over 70% of organizations hit by identity breaches
⚠️
Machine identities outnumber humans 109 to 1
⚠️
Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation
⚠️
Microsoft turns Copilot Studio into an AI agent control center
⚠️
New Malware Framework Enables Screen Control and UAC Bypass
⚠️
Canon MailSuite Security Flaw Allows Attackers to Execute Code Remotely
⚠️
How AI Hallucinations Are Creating Real Security Risks
⚠️
Chinese APT Exploits Microsoft Exchange to Breach Energy Sector Network
⚠️
TeamPCP, BreachForums Launch $1K Supply-Chain Attack Contest
⚠️
FlowerStorm phishing gang adopts virtual-machine obfuscation to evade email defenses
⚠️
Frontier AI models reap rapid discovery of security vulnerabilities
⚠️
ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories
⚠️
The time of much patching is coming
⚠️
ODNI taps officials to coordinate response to foreign election threats
⚠️
Regional routing for AWS access portals: Implementing custom vanity domains for IAM Identity Center
⚠️
The era of AI-powered attacks is here.
⚠️
Google announces hackers are using AI to create zero days.
⚠️
OpenAI asks macOS users to update after TanStack npm supply chain attack
⚠️
Maximum Severity Cisco SD-WAN Bug Exploited in the Wild
KEV
⚠️
You're not going to patch your way out of this - PSW #926
⚠️
Bring out your dead: How agentic AI for cybersecurity helps you rid your cloud of forgotten, risky assets
⚠️
AI Just Hacked Hardware
📢
The Human Side of Threat Intelligence
📢
Sony's failed attempt to stop piracy.
📢
HYCU aiR detects insider risk and AI activity from backups
📢
Pentagon cyber official calls advanced AI ‘revolutionary warfare’
🔥
Welcoming the Bahamian Government to Have I Been Pwned
🔥
When ransomware gets physical: cybercriminals turn to threats of violence
🔥
FamousSparrow targets Azerbaijani energy sector in multi-wave espionage campaign
🔥
Nitrogen Ransomware claims massive data theft from Foxconn
🔥
BreachForums & TeamPCP Promote Supply Chain Competition as Cybercrime Gets Gamified
🔥
Microsoft Research: AI Can Generate Realistic Command-Line and Process Telemetry
🔥
LATAM Under Siege: Agent Tesla’s 18-Month Credential Theft Campaign Against Chilean Enterprises
🔥
Foxconn Attack Highlights Manufacturing's Cyber Crisis
🔥
Top 5 Surface Web Hacker Forums in 2026
🔥
Sandworm Hackers Shift From IT Breaches to Critical OT Targets
🔥
LABScon25 Replay | Breach Alpha: Trading on Cyber Fallout
🔥
When Nobody Reports the Threat
🔥
Major tech manufacturer Foxconn confirms cyberattack hit North American factories
🔥
West Pharmaceutical starts restoring operations after ransomware attack
🔥
Fighting AI-Assisted Ransomware Threats
🕵️
ISC Stormcast For Thursday, May 14th, 2026 https://isc.sans.edu/podcastdetail/9932, (Thu, May 14th)
🕵️
Lyrie.ai Unveils Open Standard for Agent Security and Joins Anthropic’s Cyber Verification Program
🕵️
Russian official admits VPNs cannot be fully blocked without breaking the internet
🕵️
Texas sues Netflix for profiling children and selling data to advertisers
🕵️
AI cyber capability is speeding past earlier projections
🕵️
Vector embedding security gap exposes enterprise AI pipelines
🕵️
Closing the AI governance gap in your enterprise
🕵️
170 npm Packages Hijacked to Steal GitHub, AWS & Kubernetes Secrets
🕵️
Microsoft’s WinUI agent plugin trims token use by over 70% during development
🕵️
How Dangerous Is Anthropic’s Mythos AI?
🕵️
Kimsuky targets organizations with PebbleDash-based tools
🕵️
Cofense adds AI-powered campaign detection to stop phishing attacks
🕵️
Warning: Netflix Phishing Scams Can Lead to Serious Consequences
🕵️
Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike
🕵️
A spyware investigator exposed Russian government hackers trying to hijack Signal accounts
🕵️
Mustang Panda Linked to Updated FDMTP Backdoor in Asia-Pacific Espionage Campaign
🕵️
Apple’s iPhone Privacy Feature Expands to More Users Worldwide
🕵️
Jeff Bezos’ Blue Origin May Need Outside Cash to Catch SpaceX
🕵️
LinkedIn Cuts Jobs Despite Revenue Growth as Tech Layoffs Keep Spreading
🕵️
Upcoming Speaking Engagements
🕵️
Phishing Attacks Begin Targeting the 2026 FIFA World Cup
🕵️
More money is going to physical security, but it’s often CISOs that oversee it: EY
🕵️
Microsoft: Russian hackers evolved Kazuar malware into stealthy P2P botnet
🕵️
'FrostyNeighbor' APT Carefully Targets Govt Orgs in Poland, Ukraine
🕵️
Trump’s China Summit Turns Into a Big Tech Power Play
🕵️
Top New Features in Android 17 You’ll Notice This Year
🕵️
Microsoft Retires ‘Copilot Mode’ as Edge Gets Built-In AI Tools
🕵️
Kevin O’Leary’s ‘Wonder Valley’ Data Center Advances as Job Estimates Shift
KEV
🕵️
White House cyber official: identity security matters more than ever in the age of AI
🕵️
SecurityScorecard Snags Driftnet to Level Up Threat Intelligence
🌐
Why Malwarebytes blocks some Yahoo Mail redirects
🌐
Google Launches Android Spyware Forensics Tool for High-Risk Users
🌐
Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets
📰
Daily Briefing for 05.14.26
📡
Simple bypass of the link preview function in Outlook Junk folder, (Thu, May 14th)
📡
Most Organizations Now Use AI Agents for Sensitive Security Tasks
📡
ICO Publishes Five-Step Plan to Counter Emerging AI-Powered Attacks
📡
Your iPhone Gets Stolen. Then the Hacking Begins
📡
New Fragnesia Flaw Hands Linux Local Users Root Access
📡
AI Drives Cybersecurity Investments, Widening 'Valley of Death'
📡
Cisco cuts nearly 4,000 jobs to spend more on AI, reports ‘record quarterly revenue’
📡
OpenAI says hackers stole some data after latest code security issue
📡
Automating post-quantum cryptography readiness using AWS Config
📡
Suspected Dream Market kingpin arrested after gold bars sent to his home address
📡
13 Cybersecurity Frameworks for 2026 and How to Choose | Huntress
🐛
May Patch Tuesday roundup: Critical holes in Windows Netlogon, DNS, and SAP S/4HANA
🐛
Patch Tuesday - May 2026
🐛
CVE-2026-43894 jq: Wild stack write via signed-integer overflow in decNumber D2U() macro
🐛
CVE-2026-43896 jq: Stack Overflow in Recursive Object Merge
🐛
CVE-2026-43895 jq: Embedded NUL in jq import paths causes local redaction-policy bypass and preserves sensitive fields in published artifacts
🐛
CVE-2026-40612 jq: Stack overflow via unbounded recursion in jv_contains
🐛
CVE-2026-41256 jq: Embedded NUL truncates top-level jq programs loaded with -f
🐛
CVE-2026-31767 drm/i915/dsi: Don't do DSC horizontal timing adjustments in command mode
🐛
CVE-2026-43249 9p/xen: protect xen_9pfs_front_free against concurrent calls
🐛
CVE-2026-8177 XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when parsing XML node names containing truncated UTF-8 byte sequences
🐛
CVE-2026-6210 Type confusion and heap-buffer-overflow in Qt SVG marker handling causing application crash
🐛
CVE-2026-41257 jq: Signed-int overflow in `stack_reallocate` (jq VM stack)
🐛
Critical Fortinet vulnerabilities fixed in FortiSandbox and FortiAuthenticator
🐛
Microsoft’s agentic security system found four critical Windows RCE flaws
🐛
Microsoft’s new AI system finds 16 Windows flaws, including four critical RCEs
🐛
Quest KACE SMA flaw CVE-2025-32975: when one unpatched tool opens the door to 60 organizations
🐛
When IT Support Calls: Dissecting a ModeloRAT Campaign from Teams to Domain Compromise
🐛
Fortinet fixes two critical RCE flaws in FortiAuthenticator and FortiSandbox
KEV
⚠️
Canvas Breach 'Deal' With ShinyHunters, AI Zero-Day Warning, Checkmarx Hit Again
⚠️
Researchers open-source a Wi-Fi cyber range for security training
⚠️
Risky Business #837 -- GitHub Actions footgun claims TanStack
⚠️
Sandyaa: Open-source autonomous security bug hunter
⚠️
ClickFix Evolves Using Decade-Old Open-Source Python SOCKS5 Proxy
⚠️
2026 CSO Award winners showcase business-enabling cyber innovation
KEV
⚠️
Google entdeckt erstmals KI-basierten Zero-Day-Exploit
⚠️
NetSPI AI-powered Continuous Pentesting identifies high-impact vulnerabilities
⚠️
Report: 4 in 10 UK Businesses Were Breached by Phishing Last Year
⚠️
CISA’s AI SBOM guidance pushes software supply-chain oversight into new territory
⚠️
Breaking things to keep them safe with Philippe Laulheret
⚠️
ClickFix finds a backup plan in PySoxy proxy chains
⚠️
May 2026 Patch Tuesday: no zero-days but plenty to fix
⚠️
KDE gets over €1 million investment to strengthen security and core infrastructure
⚠️
May 2026 Patch Tuesday: 137 Vulnerabilities, No Zero-Days
KEV
⚠️
Most Remediation Programs Never Confirm the Fix Actually Worked
⚠️
Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws
⚠️
Palo Alto bets on identity security for autonomous AI with Idira launch
⚠️
Securing data centers in the agentic AI era
⚠️
Microsoft on pace to break annual vulnerability record as AI-driven patch wave takes hold
⚠️
Microsoft's MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday
⚠️
Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation
⚠️
What happens when China’s AI catches up to Mythos?
⚠️
How to Identify and Exploit New Vulnerabilities
⚠️
Rapid7 Partner Academy: Driving Impact with Gold Stevie Award-Winning Partner Services Certifications
⚠️
Microsoft Teams Vulnerability Allows Hackers to Perform Spoofing Attacks
⚠️
Patch Tuesday notes: Microsoft patches over a hundred flaws, none of which are zero-days.
⚠️
Viral ‘RuView’ GitHub project uses Wi-Fi to track movement through walls
⚠️
Microsoft’s Patch Tuesday Update Targets 120 Security Flaws
⚠️
Exaforce raises $125 million in Series B funding.
⚠️
Dark Reading Celebrates 20 Years as a Leading Authority on Cybersecurity, Highlighting the People, Events, Ideas, and Technologies Shaping the Modern Risk Landscape
⚠️
Tables Turn on 'The Gentlemen' RaaS Gang With Data Leak
⚠️
Fired employee sought AI help to hide deletion of hosting firm’s customer data
📋
Microsoft Fixes 17 Critical Flaws in May Patch Tuesday
📋
Microsoft Releases Cumulative Update for Windows 11, Version 25H2 and 24H2
📋
Google Launches New Android Security Features to Fight Scams, Theft
📋
Microsoft Patch Tuesday for May 2026 fix 138 bugs, some of them are alarming
📋
Every layer needs a patch now.
📢
Versa CSPM brings continuous visibility to cloud risk and compliance exposure
📢
Apricorn hardens ASK3 encrypted USB drive for extreme conditions
📢
Signal responds to phishing attacks with new in-app security warnings
📢
Navigating the Cybersecurity Landscape in India Empowering Human and AI Agents
📢
PCI PIN and P2PE compliance packages for AWS Payment Cryptography are now available
📢
Introducing the updated AWS User Guide to Governance, Risk, and Compliance for Responsible AI Adoption
📢
Checkbox Assessments Aren't Fit to Measure to Risk
🔥
GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data
🔥
Ransomware Gangs Use BYOVD and EDR Killers to Disable Security Tools
🔥
Infostealer Malware Fuels Corporate Breaches From Personal Devices
🔥
Q1 2026 Ransomware Attacks Hits 2,122 Orgs Amid Fewer, More Impactful Groups
🔥
Canada Life - 237,810 breached accounts
🔥
Optimize Legal Operations as the CISO Role Changes to Address Skills Gaps and AI - BSW #447
🔥
New SOC-Ready Reporting for Faster Triage, Escalation, and Incident Response with ANY.RUN
🔥
Instructure settles with hackers following massive student data theft
🔥
Ransomware: Over Half of CISOs Would Consider Paying Ransom to Hackers
🔥
Canvas owner reaches ‘agreement’ with threat actors after data breach
🔥
Thus Spoke…The Gentlemen
🔥
Tuskira’s Kairo exposes hidden AI-driven breach paths
🔥
US lawmakers demand answers from Instructure after Canvas data breaches
🔥
The Real Work Starts After Breach
🔥
Canvas Owner Reaches Agreement With Cybercriminals After Ransomware Attack
🔥
Ransomware hackers claim breach at Foxconn, a major electronics manufacturer for Apple, Google, and Nvidia
🔥
Hackers Claim 11M Files Stolen From Foxconn, Supplier to Apple and Nvidia
🔥
Canvas Breach Hackers Reach Deal After Claiming 275M Records Stolen
🔥
Google Enhances Android Mobile Security with New AI-powered Protections
🔥
Foxconn confirms cyberattack affecting some North American facilities
🔥
Student Messages Were the Real Target
🔥
OpenLoop Health confirms January 2026 Data breach affecting 716,000
🔥
Smashing Security podcast #467: How ShinyHunters hacked the world’s biggest universities
🕵️
ISC Stormcast For Wednesday, May 13th, 2026 https://isc.sans.edu/podcastdetail/9930, (Wed, May 13th)
🕵️
Android pushes new scam, theft, and AI protections in 2026 update wave
🕵️
The hidden risk of non-human identities in AI adoption
🕵️
Fake FinalShell and Xshell Sites Push Kong RAT Malware
🕵️
Proton Pass rated “well above par” in independent security audit
🕵️
OpenAI’s GPT-5.5 is as Good as Mythos at Finding Security Vulnerabilities
🕵️
LW ROUNDTABLE: Microsoft Edge normalizes credential exposure — security pros push back
🕵️
Android adds ‘Intrusion Logging’ system to detect spyware attacks
🕵️
AI Agents Generate Custom Hacking Tools on the Fly
🕵️
China's 'FamousSparrow' APT Nests in South Caucasus Energy Firm
🕵️
The Rise of Cyber Threats and AI in the Philippines: A New Era Beyond Legacy Security
🕵️
Daybreak is OpenAI’s answer to the AI arms race in cybersecurity
🕵️
OpenAI launches Daybreak to combat cyber threats
🕵️
WhatsApp adds Incognito Chat for private Meta AI conversations
🕵️
Weaponized AI: The new frontier of fraud and identity spoofing
🕵️
Google Introduces Googlebook, a Gemini-First Laptop Platform
🕵️
TIOBE Index for May 2026: R Ascends as Statistical Tools Consolidate
🕵️
DOJ releases legal rationale for nationwide voter data collection
🕵️
WhatsApp launches “Incognito Chat” for private AI conversations
🕵️
AI Won’t Invent the Future
🕵️
Attackers Weaponize RubyGems for Data Dead Drops
🕵️
Researchers say AI just broke every benchmark for autonomous cyber capability
🕵️
Closed briefing sets stage for House hearing on Anthropic’s Mythos and cyber risks
🌐
Android Adds Intrusion Logging for Sophisticated Spyware Forensics
🌐
Global Cyber Agencies Issue New SBOMs for AI Guidance to Tackle AI Supply Chain Risks
🌐
This is what some the world’s largest banks of malware look like stacked as hard drives
📰
[Webinar] Why Your AppSec Tools Miss the "Lethal Path" (and How to Fix It)
📰
UK moves to shield security researchers in cybercrime law overhaul
🎙️
Cyber Creator Tyler Ramsbey Shares How to Grow an Audience & Community in Cyber
📡
Weekly Threat Bulletin – May 13th, 2026
📡
Proxying the Unproxyable&#x3f; Sending EXE traffic to a Proxy, (Wed, May 13th)
📡
&#x5b;GUEST DIARY&#x5d; Tearing apart website fraud to see how it works., (Wed, May 13th)
📡
UK Cybersecurity Market Expands to £14.7bn with Strong Growth in AI Security Firms
📡
Dark Web Profile: Keymous+
📡
Texas sued Netflix over claims it secretly collected and sold users’ data
📡
Avada Builder Flaws Expose One Million WordPress Sites
📡
WhatsApp Adds Meta AI Chats That Are Built to Be Fully Private
📡
European Commission head pushes creation of new law delaying teens’ social media access
📡
Alleged Dream Market admin arrested in Germany after US indictment
📡
DHS Plans Experiment Running ‘Reconnaissance’ Drones Along the US-Canada Border
📡
Detecting and preventing crypto mining in your AWS environment
🚨
Why patching SLAs should be the floor, not the strategyI’ve been a CISO for two separate companies, know several CISOs personally, and interact with many others through various cybersecurity forums. We all have one thing in common. We can tell you our patching SLA numbers off the top of our heads. Ninety-five percent of criticals clo…
KEV
🚨
How Rapid7 is bringing Cyber GRC closer to security operationsSabeen Malik is VP, Global Government Affairs and Public Policy at Rapid7. ⠀ Security teams need a better way to connect what they detect, what they fix, and what they can prove. The pace of modern security operations no longer works in defenders’ favor. IBM’s Cost of a Data Brea…
KEV
🐛
Linux kernel maintainers suggest a ‘kill switch’ to protect systems until a zero-day vulnerability is patched
🐛
BitUnlocker Downgrade Attack Bypasses Windows 11 Disk Encryption in Minutes
🐛
CVE-2026-43500 rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present
🐛
Cline AI Agent Flaw Allows Attackers to Launch RCE Attacks
🐛
cPanel flaw exposes enterprises to hosting supply-chain risks
🐛
Copy.Fail Linux Vulnerability
🐛
Attackers exploit cPanel CVE-2026-41940 to deploy Filemanager Backdoor
🐛
JetBrains TeamCity vulnerability allows privilege escalation, API exposure (CVE-2026-44413)
🐛
Stealthy hackers exploit cPanel flaw in active backdoor campaign (CVE-2026-41940)
🐛
CVE-2026-32204 Azure Monitor Agent Elevation of Privilege Vulnerability
🐛
CVE-2026-32177 .NET Elevation of Privilege Vulnerability
🐛
CVE-2026-21530 Windows Rich Text Edit Elevation of Privilege Vulnerability
🐛
CVE-2026-33117 Azure SDK for Java Security Feature Bypass Vulnerability
🐛
CVE-2026-33834 Windows Event Logging Service Elevation of Privilege Vulnerability
🐛
CVE-2026-33839 Win32k Elevation of Privilege Vulnerability
🐛
CVE-2026-33840 Win32k Elevation of Privilege Vulnerability
🐛
CVE-2026-33841 Windows Kernel Elevation of Privilege Vulnerability
🐛
CVE-2026-34329 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
🐛
CVE-2026-34330 Win32k Elevation of Privilege Vulnerability
🐛
CVE-2026-34331 Win32k Elevation of Privilege Vulnerability
🐛
CVE-2026-34333 Windows Win32k Elevation of Privilege Vulnerability
🐛
CVE-2026-34342 Windows Print Spooler Elevation of Privilege Vulnerability
🐛
CVE-2026-34343 Windows Application Identity (AppID) Subsystem Elevation of Privilege Vulnerability
🐛
CVE-2026-34344 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
🐛
CVE-2026-34345 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
🐛
CVE-2026-34347 Windows Win32k Elevation of Privilege Vulnerability
🐛
CVE-2026-34350 Windows Storport Miniport Driver Denial of Service Vulnerability
🐛
CVE-2026-34351 Windows TCP/IP Elevation of Privilege Vulnerability
🐛
CVE-2026-35415 Windows Storage Spaces Controller Elevation of Privilege Vulnerability
🐛
CVE-2026-35416 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
🐛
CVE-2026-35417 Windows Win32k Elevation of Privilege Vulnerability
🐛
CVE-2026-35418 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
🐛
CVE-2026-35419 Windows DWM Core Library Information Disclosure Vulnerability
🐛
CVE-2026-35420 Windows Kernel Elevation of Privilege Vulnerability
🐛
CVE-2026-35421 Windows GDI Remote Code Execution Vulnerability
🐛
CVE-2026-35422 Windows TCP/IP Driver Security Feature Bypass Vulnerability
🐛
CVE-2026-35423 Windows 11 Telnet Client Information Disclosure Vulnerability
🐛
CVE-2026-35424 Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability
🐛
CVE-2026-35433 .NET Elevation of Privilege Vulnerability
🐛
CVE-2026-35438 Windows Admin Center Elevation of Privilege Vulnerability
🐛
CVE-2026-35439 Microsoft SharePoint Server Remote Code Execution Vulnerability
🐛
CVE-2026-35440 Microsoft Word Information Disclosure Vulnerability
🐛
CVE-2026-40360 Microsoft Excel Information Disclosure Vulnerability
🐛
CVE-2026-40363 Microsoft Office Remote Code Execution Vulnerability
🐛
CVE-2026-40364 Microsoft Word Remote Code Execution Vulnerability
🐛
CVE-2026-40366 Microsoft Word Remote Code Execution Vulnerability
🐛
CVE-2026-40368 Microsoft SharePoint Server Remote Code Execution Vulnerability
🐛
CVE-2026-40374 Microsoft Power Automate Desktop Information Disclosure Vulnerability
🐛
CVE-2026-40377 Microsoft Cryptographic Services Elevation of Privilege Vulnerability
🐛
CVE-2026-40380 Windows Volume Manager Extension Driver Remote Code Execution Vulnerability
🐛
CVE-2026-40399 Windows TCP/IP Elevation of Privilege Vulnerability
🐛
CVE-2026-40405 Windows TCP/IP Denial of Service Vulnerability
🐛
CVE-2026-40406 Windows TCP/IP Information Disclosure Vulnerability
🐛
CVE-2026-40407 Windows Common Log File System Driver Elevation of Privilege Vulnerability
🐛
CVE-2026-40408 Windows WAN ARP Driver Elevation of Privilege Vulnerability
🐛
CVE-2026-40410 Windows SMB Client Elevation of Privilege Vulnerability
🐛
CVE-2026-40414 Windows TCP/IP Denial of Service Vulnerability
🐛
CVE-2026-40415 Windows TCP/IP Remote Code Execution Vulnerability
🐛
CVE-2026-40417 Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability
🐛
CVE-2026-40419 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
🐛
CVE-2026-40421 Microsoft Word Information Disclosure Vulnerability
🐛
CVE-2026-41088 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
🐛
CVE-2026-41089 Windows Netlogon Remote Code Execution Vulnerability
🐛
CVE-2026-41094 Microsoft Data Formulator Remote Code Execution Vulnerability
🐛
CVE-2026-41095 Data Deduplication Elevation of Privilege Vulnerability
🐛
CVE-2026-41096 Windows DNS Client Remote Code Execution Vulnerability
🐛
CVE-2026-41100 Microsoft 365 Copilot for Android Spoofing Vulnerability
🐛
CVE-2026-41101 Microsoft Word for Android Spoofing Vulnerability
🐛
CVE-2026-41102 Microsoft PowerPoint for Android Spoofing Vulnerability
🐛
CVE-2026-41109 GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability
🐛
CVE-2026-41610 Visual Studio Code Security Feature Bypass Vulnerability
🐛
CVE-2026-41611 Visual Studio Code Remote Code Execution Vulnerability
🐛
CVE-2026-41612 Visual Studio Code Information Disclosure Vulnerability
🐛
CVE-2026-41614 M365 Copilot for Desktop Spoofing Vulnerability
🐛
CVE-2026-32161 Windows Native WiFi Miniport Driver Remote Code Execution Vulnerability
🐛
CVE-2026-32170 Windows Rich Text Edit Elevation of Privilege Vulnerability
🐛
CVE-2026-32185 Microsoft Teams Spoofing Vulnerability
🐛
CVE-2026-42831 Microsoft Office Remote Code Execution Vulnerability
🐛
CVE-2026-32175 .NET Core Tampering Vulnerability
🐛
CVE-2026-42825 Windows Telephony Service Elevation of Privilege Vulnerability
🐛
CVE-2026-42896 Windows DWM Core Library Elevation of Privilege Vulnerability
🐛
CVE-2026-42898 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
🐛
CVE-2026-42899 ASP.NET Core Denial of Service Vulnerability
🐛
CVE-2026-33110 Microsoft SharePoint Server Remote Code Execution Vulnerability
🐛
CVE-2026-33112 Microsoft SharePoint Server Remote Code Execution Vulnerability
🐛
CVE-2026-33833 Azure Machine Learning Notebook Spoofing Vulnerability
🐛
CVE-2026-33835 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
🐛
CVE-2026-33837 Windows TCP/IP Local Elevation of Privilege Vulnerability
🐛
CVE-2026-33838 Windows Message Queuing (MSMQ) Elevation of Privilege Vulnerability
🐛
CVE-2026-34332 Windows Kernel-Mode Driver Remote Code Execution Vulnerability
🐛
CVE-2026-34334 Windows TCP/IP Elevation of Privilege Vulnerability
🐛
CVE-2026-34336 Windows DWM Core Library Information Disclosure Vulnerability
🐛
CVE-2026-34337 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
🐛
CVE-2026-34338 Windows Telephony Service Elevation of Privilege Vulnerability
🐛
CVE-2026-34339 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
🐛
CVE-2026-34340 Windows Projected File System Elevation of Privilege Vulnerability
🐛
CVE-2026-34341 Windows Link-Layer Discovery Protocol (LLDP) Elevation of Privilege Vulnerability
🐛
CVE-2026-40357 Microsoft SharePoint Server Remote Code Execution Vulnerability
🐛
CVE-2026-40358 Microsoft Office Remote Code Execution Vulnerability
🐛
CVE-2026-40359 Microsoft Excel Remote Code Execution Vulnerability
🐛
CVE-2026-40361 Microsoft Word Remote Code Execution Vulnerability
🐛
CVE-2026-40362 Microsoft Excel Remote Code Execution Vulnerability
🐛
CVE-2026-40365 Microsoft SharePoint Server Remote Code Execution Vulnerability
🐛
CVE-2026-40367 Microsoft Word Remote Code Execution Vulnerability
🐛
CVE-2026-40370 SQL Server Remote Code Execution Vulnerability
🐛
CVE-2026-40369 Windows Kernel Elevation of Privilege Vulnerability
🐛
CVE-2026-40382 Windows Telephony Service Elevation of Privilege Vulnerability
🐛
CVE-2026-40397 Windows Common Log File System Driver Elevation of Privilege Vulnerability
🐛
CVE-2026-32209 Windows Filtering Platform (WFP) Security Feature Bypass Vulnerability
🐛
CVE-2026-40398 Windows Remote Desktop Services Elevation of Privilege Vulnerability
🐛
CVE-2026-40401 Windows TCP/IP Denial of Service Vulnerability
🐛
CVE-2026-40402 Windows Hyper-V Elevation of Privilege Vulnerability
🐛
CVE-2026-40403 Windows Graphics Component Remote Code Execution Vulnerability
🐛
CVE-2026-40413 Windows TCP/IP Denial of Service Vulnerability
🐛
CVE-2026-40418 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
🐛
CVE-2026-35436 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
🐛
CVE-2026-40420 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
🐛
CVE-2026-41086 Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability
🐛
CVE-2026-41097 Secure Boot Security Feature Bypass Vulnerability
🐛
CVE-2026-40381 Azure Connected Machine Agent Elevation of Privilege Vulnerability
🐛
CVE-2026-41103 Microsoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability
🐛
CVE-2026-41613 Visual Studio Code Elevation of Privilege Vulnerability
🐛
CVE-2026-42823 Azure Logic Apps Elevation of Privilege Vulnerability
🐛
CVE-2026-42830 Azure Monitor Agent Metrics Extension Elevation of Privilege Vulnerability
🐛
CVE-2026-42832 Microsoft Office Spoofing Vulnerability
🐛
CVE-2026-42833 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
🐛
CVE-2025-54518 AMD: CVE-2025-54518 CPU OP Cache Corruption
🐛
CVE-2026-42893 Microsoft Outlook for iOS Tampering Vulnerability
🐛
Microsoft’s May 2026 Patch Tuesday Addresses 118 CVEs (CVE-2026-41103)
KEV
🐛
New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution
🐛
Microsoft May 2026 Patch Tuesday: Many fixes, but no zero-days
KEV
⚠️
Google Warns Hackers Are Using AI to Build Working Zero-Day Exploits
⚠️
HEIDI: Free IDE security plugin for open-source vulnerability checks
⚠️
Magecart Hackers Exploit Google Tag Manager to Inject Credit Card Skimmers
⚠️
OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation
⚠️
OpenAI Daybreak Automates Vulnerability Detection and Patching
⚠️
Claude Chrome Extension Flaw Lets Malicious Add-Ons Steal Gmail and Drive Data
⚠️
OpenAI’s Daybreak uses Codex Security to identify risky attack paths
⚠️
CISOs step into the AI spotlight
⚠️
Why Basic Security Practices Still Work - Rob Allen - ASW #382
⚠️
Developer workstations are the new beachhead
⚠️
WannaCry, the ransomware attack that changed the history of cybersecurity
⚠️
Six new dnsmasq vulnerabilities open the door to DNS cache poisoning, local root
⚠️
Škoda confirms unauthorized access to its online shop
⚠️
Open WebUI File Upload Vulnerability Enables 1-Click RCE Attack
⚠️
Fake Claude Code takes the IElevator to your browser secrets
⚠️
Go fuzzing was missing half the toolkit. We forked the toolchain to fix it.
⚠️
Attackers Combine ClickFix With PySoxy Proxying to Maintain Persistence
⚠️
Citrix moves secure access to a flexible, credit-based consumption model
⚠️
Top 10 Deep & Dark Web Forums
⚠️
Zoom Rooms and Workplace Flaws Expose Users to Elevated Access Attacks
⚠️
Threat Actors Abuse Vercel AI Tools to Mass-Produce Realistic Phishing Sites
⚠️
SAP Releases Patch for Critical SQL Injection Flaw in S/4HANA
⚠️
OpenAI introduces Daybreak cyber platform, takes on Anthropic Mythos
⚠️
Google Says Hackers Used AI to Build Zero-Day Exploit
⚠️
Exaforce raises $125M Series B to build AI for catching and stopping cyberattacks as they happen
⚠️
The world’s most “Dangerous” AI, Anthropic’s Mythos, found only one flaw in curl
⚠️
Mullvad shares workaround for Android 16 VPN leak that remains unfixed
⚠️
Exaforce raises $125 million to respond to AI-powered attacks
⚠️
Amazon Quick authorization bypass let users reach blocked AI chat agents
⚠️
Google launches new Android security feature to help uncover spyware attacks
⚠️
Mistral AI SDK, TanStack Router hit in npm software supply chain attack
⚠️
Critical Patches Issued for Microsoft Products, May 12, 2026
⚠️
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
⚠️
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
⚠️
Stop Chasing Individual CVEs
⚠️
Windows 11 security update fixes critical Bing and Azure flaws
KEV
⚠️
Multiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution
⚠️
Hackers accessed BWH Hotels reservation system for months
⚠️
AWS Security Agent full repository code scanning feature now available in preview
⚠️
‘Mini Shai-Hulud’ malware compromises hundreds of open-source packages in sprawling supply-chain attack
⚠️
It's Patch Tuesday for Microsoft and Not a Zero-Day In Sight
⚠️
AI-Written Exploits Are Here
⚠️
SN 1078: DigiCert does it right - Hugging Face Under Fire
📋
Microsoft May 2026 Patch Tuesday, (Tue, May 12th)
📋
iOS 26.5 Updates RCS Messaging, Apple Maps, and iPhone Wallpapers
📋
Patch Tuesday, May 2026 Edition
📋
Microsoft Patch Tuesday for May 2026 — Snort rules and prominent vulnerabilities
📋
Microsoft addresses 137 vulnerabilities in May’s Patch Tuesday, including 13 rated critical
📢
Navigating Human and Agentic Risks for Financial Institutions in the APJ Region
📢
Major world economies spell out key elements of AI ‘ingredients list’
🔥
Checkmarx Jenkins AST Plugin Compromised in KICS Supply Chain Attack
🔥
84 npm Packages Linked to TanStack Hit by Supply-Chain Breach
🔥
Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak
🔥
State of ransomware in 2026
🔥
Microsoft Warns: MistralAI PyPI Package Compromised with Malware
🔥
Stolen Canvas data was “returned” after hacker agreement, Instructure says
🔥
South Staffordshire Water Fined £1m After Data Breach
🔥
Cushman & Wakefield - 310,431 breached accounts
🔥
State-sponsored actors, better known as the friends you don’t want
🔥
New ‘Shai-Hulud’ attack breached hundreds of npm and PyPI packages
🔥
Hackers Hijack Microsoft Teams Accounts to Spread ModeloRAT Malware
🔥
ANY.RUN & Elastic Security: Bring Threat Intelligence into Detection and Investigation Workflows
🔥
Cushman and Wakefield Confirms Data Breach Impacting Over 310,000 Accounts
🔥
Instructure strikes deal with hackers who breached it twice
🔥
Instructure pays ransom after Canvas incident as Congress announces investigation
🔥
Canvas owner reaches agreement with ShinyHunters, says user data was deleted
🔥
Instructure took a risky approach to recover stolen Canvas data
🔥
Identity takes center stage as a leading factor in enterprise cyberattacks
🔥
Hugging Face Packages Weaponized With a Single File Tweak
🔥
Report: Most Phishing Attacks Abuse Trusted Services
🔥
West Pharmaceutical warns of ransomware attack impacting business operations
🔥
Foxconn confirms cyberattack impacting North American factories
🔥
Foxconn Ransomware Attack Shows Nothing Is Safe Forever
🕵️
ISC Stormcast For Tuesday, May 12th, 2026 https://isc.sans.edu/podcastdetail/9928, (Tue, May 12th)
🕵️
The hidden smart fridge risks that emerge years after purchase
🕵️
Cybersecurity jobs available right now: May 12, 2026
🕵️
TrickMo Android Malware Targets Banking, Wallet, and Authenticator Apps
🕵️
Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages
🕵️
Fake TronLink Chrome Extension Steals Crypto Wallet Credentials
🕵️
North Korea Hackers Abuse Git Hooks to Deploy Cross-Platform Malware
🕵️
AI is separating the companies built to scale from the ones built to sell
🕵️
The Civil War Spies and Saboteurs Across the Canadian Border
🕵️
Signal rolls out new protections against impersonation attacks
🕵️
Vidar Stealer Campaign Evades EDR to Steal Credentials
🕵️
AI and an absent government: Takeaways from RSAC 2026
🕵️
CyberheistNews Vol 16 #19 Crafty Criminals Continue to Pose as Help Desks in Social Engineering Attacks
🕵️
General Motors to pay $12.75 million over driver data sales
🕵️
Download: The IT and security field guide to AI adoption
🕵️
AI Can’t Detect Malicious Intent
🕵️
This Samsung 4TB Portable SSD Moves Files at 2,000 MB/s For $1K
🕵️
Veeam Intelligent ResOps unifies data context and recovery
🕵️
FIRESIDE CHAT: Cyber insurers deepen SMB security role as supply chain attacks spread
🕵️
ThreatDown ITDR prevents credential-based attacks
🕵️
SAP unveils Autonomous Enterprise for AI-driven business operations
🕵️
Google and Amnesty International teamed up to make it harder for spyware vendors to hide
🕵️
Over 1 Million Baby Monitors, Security Cameras Exposed Through Meari Flaws
🕵️
Samsung Galaxy Watch Glucose Tracking: What Works Now and What Doesn’t
🕵️
6 Best ChatGPT Photo Editing Trends in 2026 (With Prompts to Try)
🕵️
Tomato, JDownloader, TempPCP, Bad Vibes, Dirty Frag, Giedi Prime, Aaran Leyland - SWN #580
🕵️
Fedora Hummingbird brings the container security model to a Linux host OS
🌐
TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack
🌐
Android banking Trojan TrickMo evolves using TON network for C2
🌐
Malicious Hugging Face Repository Typosquats OpenAI
🌐
Webinar: What the Riskiest SOC Alerts Go Unanswered - and How Radiant Security Can Help
🌐
New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots
🌐
RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded
🌐
Instructure strikes a deal with ShinyHunters.
🌐
China’s hackers aren’t invincible.
🎙️
Inside the Media Mind of Shaun Waterman: Freelancer
📡
Elastic Security MCP App: Interactive security operations inside your AI Tools
📡
iOS 26.5 Brings Default End-to-End Encrypted RCS Messaging Between iPhone and Android
📡
1 in 8 employees have sold company logins or know someone who has
📡
Why Agentic AI Is Security's Next Blind Spot
📡
10 Best Dark / Deep Web Browsers for Anonymity
📡
End‑to‑End Encrypted RCS Messaging Arrives Across iPhone and Android
📡
20 Leaders Who Built the CISO Era: 2 Decades of Change
📡
Mini Shai-Hulud Hits TanStack npm Packages
📡
Enabling AI sovereignty on AWS
📡
OpenAI Launches 'Daybreak' to Help Build Secure By Design Software
📡
U.S. bank disclose security lapse after sharing customer data with AI app
📡
Fake Claude search results lure Mac users into ClickFix attack
📡
European countries are exporting surveillance tech to countries with poor human rights records, report says
📡
Guardrail Technologies launches Traffic Light for Code & AI™; first security technology to verify & secure AI code and the people creating it
📡
Twin brothers wipe 96 gov't databases minutes after being fired
📡
Congressman launches inquiry into how food retailers use surveillance pricing
📡
Iran Is Using Tiny ‘Mosquito’ Boats to Shut Down the Strait of Hormuz
📡
LLMjacking: what these attacks are, and how to protect AI servers
🚨
U.S. CISA adds a flaw in BerriAI LiteLLM to its Known Exploited Vulnerabilities catalogThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BerriAI LiteLLM to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in BerriAI LiteLLM, tracked as CVE-2026-42208 (CVSS score …
KEV
🐛
CVE-2026-31706 ksmbd: validate num_aces and harden ACE walk in smb_inherit_dacl()
🐛
CVE-2026-31723 usb: gadget: f_subset: Fix net_device lifecycle with device_move
🐛
CVE-2026-31724 usb: gadget: f_eem: Fix net_device lifecycle with device_move
🐛
CVE-2026-43036 net: use skb_header_pointer() for TCPv4 GSO frag_off check
🐛
CVE-2026-31707 ksmbd: validate response sizes in ipc_validate_msg()
🐛
CVE-2026-43042 mpls: add seqcount to protect the platform_label{,s} pair
🐛
CVE-2026-31771 Bluetooth: hci_event: move wake reason storage into validated event handlers
🐛
CVE-2026-43052 wifi: mac80211: check tdls flag in ieee80211_tdls_oper
🐛
CVE-2026-31709 smb: client: validate the whole DACL before rewriting it in cifsacl
🐛
CVE-2026-43010 bpf: Reject sleepable kprobe_multi programs at attach time
🐛
CVE-2026-43474 fs: init flags_valid before calling vfs_fileattr_get
🐛
CVE-2025-71302 drm/panthor: fix for dma-fence safe access rules
🐛
CVE-2026-43309 md raid: fix hang when stopping arrays with metadata through dm-raid
🐛
CVE-2026-43320 drm/amd/display: Fix dsc eDP issue
🐛
CVE-2026-43300 drm/panel: Fix a possible null-pointer dereference in jdi_panel_dsi_remove()
🐛
CVE-2026-43306 bpf: crypto: Use the correct destructor kfunc type
🐛
CVE-2026-43443 ASoC: amd: acp-mach-common: Add missing error check for clock acquisition
🐛
CVE-2026-43319 spi: spidev: fix lock inversion between spi_lock and buf_lock
🐛
CVE-2026-43344 perf/x86/intel/uncore: Fix die ID init and look up bugs
🐛
CVE-2026-43305 drm/amd/display: Fix mismatched unlock for DMUB HW lock in HWSS fast path
🐛
CVE-2026-43310 media: verisilicon: Avoid G2 bus error while decoding H.264 and HEVC
🐛
CVE-2026-43400 drm/amdgpu: add upper bound check on user inputs in signal ioctl
🐛
CVE-2026-43292 mm/vmalloc: prevent RCU stalls in kasan_release_vmalloc_node
🐛
CVE-2026-43398 drm/amdgpu: add upper bound check on user inputs in wait ioctl
🐛
CVE-2026-43311 soc/tegra: pmc: Fix unsafe generic_handle_irq() call
🐛
CVE-2026-43421 usb: gadget: f_ncm: Fix net_device lifecycle with device_move
🐛
CVE-2026-43308 btrfs: don't BUG() on unexpected delayed ref type in run_one_delayed_ref()
🐛
CVE-2026-42256 net-imap: Denial of service via high iteration count for `SCRAM-*` authentication
🐛
CVE-2026-42246 net-imap vulnerable to STARTTLS stripping via invalid response timing
🐛
CVE-2026-45186
🐛
CVE-2026-7261 SoapServer session-persisted object use-after-free via SOAP header fault
🐛
CVE-2026-7568 Signed integer overflow in metaphone()
🐛
CVE-2026-43053 xfs: close crash window in attr dabtree inactivation
🐛
CVE-2026-43048 HID: core: Mitigate potential OOB by removing bogus memset()
🐛
CVE-2026-31777 ALSA: ctxfi: Check the error for index mapping
🐛
CVE-2026-31722 usb: gadget: f_rndis: Fix net_device lifecycle with device_move
🐛
CVE-2026-31725 usb: gadget: f_ecm: Fix net_device lifecycle with device_move
🐛
CVE-2026-43049 HID: logitech-hidpp: Prevent use-after-free on force feedback initialisation failure
🐛
CVE-2026-31712 ksmbd: require minimum ACE size in smb_check_perm_dacl()
🐛
CVE-2026-43019 Bluetooth: hci_conn: fix potential UAF in set_cig_params_sync
🐛
CVE-2026-31729 usb: typec: ucsi: validate connector number in ucsi_notify_common()
🐛
CVE-2026-43009 bpf: Fix incorrect pruning due to atomic fetch precision tracking
🐛
CVE-2026-31715 f2fs: fix UAF caused by decrementing sbi->nr_pages[] in f2fs_write_end_io()
🐛
CVE-2026-43338 btrfs: reserve enough transaction items for qgroup ioctls
🐛
CVE-2026-43318 drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify
🐛
CVE-2026-43416 powerpc, perf: Check that current->mm is alive before getting user callchain
🐛
CVE-2026-43352 i3c: mipi-i3c-hci: Correct RING_CTRL_ABORT handling in DMA dequeue
🐛
CVE-2026-43284 xfrm: esp: avoid in-place decrypt on shared skb frags
🐛
CVE-2025-71299 spi: cadence-quadspi: Parse DT for flashes with the rest of the DT parsing
🐛
CVE-2026-43317 most: core: fix leak on early registration failure
🐛
CVE-2026-43321 bpf: Properly mark live registers for indirect jumps
🐛
CVE-2026-43456 bonding: fix type confusion in bond_setup_by_slave()
🐛
CVE-2026-43298 drm/amdgpu: Skip vcn poison irq release on VF
🐛
CVE-2026-43299 btrfs: do not ASSERT() when the fs flips RO inside btrfs_repair_io_failure()
🐛
CVE-2026-43294 drm: renesas: rz-du: mipi_dsi: fix kernel panic when rebooting for some panels
🐛
CVE-2026-43353 i3c: mipi-i3c-hci: Fix race in DMA ring dequeue
🐛
CVE-2026-42257 net-imap: Command Injection via "raw" arguments to multiple commands
🐛
CVE-2026-42258 net-imap: Command Injection via unvalidated Symbol inputs
🐛
CVE-2026-7258 Out-of-bounds read in urldecode() on NetBSD
🐛
CVE-2026-6722 Use-After-Free in SOAP using Apache map
🐛
CVE-2026-6735 XSS within PHP-FPM status endpoint
🐛
CVE-2026-7262 NULL pointer dereference in SOAP apache:Map decoder with missing <value>
🐛
CVE-2025-14179 SQL injection in pdo_firebird via NUL bytes in quoted strings
🐛
CVE-2026-7259 Null pointer dereference in php_mb_check_encoding() via mb_ereg_search_init()
🐛
CVE-2025-21723 scsi: mpi3mr: Fix possible crash when setting up bsg fails
🐛
CVE-2025-21714 RDMA/mlx5: Fix implicit ODP use after free
🐛
PoC Exploit Released for Android Zero-Click Flaw Enabling Remote Shell Access
🐛
1,800+ MCP servers exposed without authentication: How zero trust can secure the AI agent revolution
🐛
The impact of Mythos and Florida Man, confidence gaps, phishing, & AI adoption - Erich... - ESW #458
🐛
cPanel and WHM Servers Targeted in Attacks Exploiting CVE-2026-41940
🐛
New ‘Dirty Frag’ exploit targets Linux kernel for root access
KEV
🐛
Linux developers weigh emergency “killswitch” for vulnerable kernel functions
🐛
VU#937808: Casdoor contains Arbitrary File Write vulnerability
🐛
VU#471747: dnsmasq contains several vulnerabilities, including attacker DNS redirect, privilege escalation, and heap manipulation
🐛
cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor
⚠️
Canvas Breach Exposes 275M Accounts | AI Targets Water Systems | GM OnStar Settlement
⚠️
New cPanel and WHM Vulnerabilities Expose Servers to Code Execution and DoS Attacks
⚠️
JDownloader Hack Spreads New Python RAT
⚠️
Security teams are turning to AI to survive alert overload
⚠️
macOS Malware Abuses Google Ads and Claude Shared Chats to Deliver Payloads
⚠️
ODINI Malware Uses CPU Magnetic Signals to Exfiltrate Data from Air-Gapped Systems
⚠️
Rustinel: Open-source endpoint detection for Windows and Linux
⚠️
Review: Foundations of Cybersecurity, 2nd edition
⚠️
Windows CreateFileW API Flaw Could Let Attackers Lock SMB Files at Scale
⚠️
Crimenetwork Bust Reveals 22,000 Members and Over 100 Illicit Vendors
⚠️
ShinyHunters Exploits Canvas LMS Free Teacher Accounts in New Breach
⚠️
Mythos finds a curl vulnerability
⚠️
8 guiding principles for reskilling the SOC for agentic AI
⚠️
The scam economy has found its AI upgrade
⚠️
Microsoft 365 Copilot Flaws Could Let Attackers Access Sensitive Data
⚠️
AI security is repeating endpoint security’s biggest mistake
⚠️
Instructure confirms Canvas user data exposed in cyberattack
⚠️
Your Purple Team Isn't Purple — It's Just Red and Blue in the Same Room
⚠️
PHP SOAP Extension Flaw Could Let Attackers Execute Code Remotely
⚠️
Malicious Hugging Face model masquerading as OpenAI release hits 244K downloads
⚠️
Hackers Observed Using AI to Develop Zero-Day for the First Time
⚠️
Hackers Use AI for Exploit Development, Attack Automation
⚠️
Police take down relaunched criminal marketplace with 22,000 users, €3.6 million in revenue
⚠️
fsnotify Maintainer Access Change Sparks Supply Chain Security Concerns
⚠️
Lyrie.ai Joins First Batch of Anthropic’s Cyber Verification Program
⚠️
Google discovers weaponized zero-day exploits created with AI
⚠️
GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access
⚠️
Google spotted an AI-developed zero-day before attackers could use it
⚠️
Google researchers uncover criminal zero-day exploit likely built with AI
⚠️
Why we use CAPTCHAs, (Mon, May 11th)
⚠️
AI used to develop working zero-day exploit, researchers warn
⚠️
Google warns artificial intelligence is accelerating cyberattacks and zero-day exploits
⚠️
'Dirty Frag' Exploit Poised to Blow Up on Enterprise Linux Distros
⚠️
Final Countdown: Last Chance to Join the Rapid7 Global Cybersecurity Summit
⚠️
Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation
⚠️
IAM for MSSPs: The Hidden Risk of Blind Trust - Dustin Sachs - CSP #224
⚠️
Red Hat extends open source technology into space
⚠️
Identity security firm SailPoint discloses GitHub repository breach
⚠️
FCC Robocall Crackdown Raises Privacy Concerns Over Mandatory ID Checks
⚠️
AI Isn’t Replacing Cybersecurity
⚠️
California hits GM with record $12.75M fine for selling driver location data
⚠️
Google says cybercriminals used AI to develop zero-day exploit
⚠️
Foreign routers get a longer lifeline.
⚠️
Inside AD CS Escalation: Unpacking Advanced Misuse Techniques and Tools
📋
US: FCC Relaxes Foreign-Made Router Ban to Allow for Security Updates
📋
FCC pushes ban on security updates for foreign-made routers, drones to 2029
📢
Police Shut Relaunched Crimenetwork Dark Web Marketplace
📢
Dirty Frag: Linux kernel hit by second major security flaw in two weeks
📢
Alation AI Governance creates a system of record for AI oversight
📢
When Ransomware Negotiators Flip Sides
🔥
Welcoming the Costa Rican Government to Have I Been Pwned
🔥
Weaponized JPEG file Drops Trojanized ScreenConnect Malware
🔥
Zara Data Breach Impacts Nearly 200,000 Customers
🔥
The State of Ransomware – Q1 2026
🔥
ShinyHunters Escalates Canvas Extortion with School by School Ransom Campaign
🔥
UK water company allowed hackers to lurk undetected for nearly two years, regulator finds
🔥
11th May – Threat Intelligence Report
🔥
Cyber Espionage Group Targets Aviation Firms to Steal Map Data
🔥
A 2nd Canvas data breach causes major disruptions for schools, colleges
🔥
Poor security left hackers inside water company network for nearly two years
🔥
Zimperium Mobile App Response Agent helps security teams counter mobile attacks
🔥
Welcoming the Bangladesh Government to Have I Been Pwned
🕵️
ISC Stormcast For Monday, May 11th, 2026 https://isc.sans.edu/podcastdetail/9926, (Mon, May 11th)
🕵️
Top 10 Best Secure Code Review Services For Developers in 2026
🕵️
Top 10 Best DevSecOps Companies For Secure SDLC 2026
🕵️
Checkmarx Jenkins Plugin Backdoored in New TeamPCP Supply Chain Attack
🕵️
OpenClaw Malware Targets Crypto Wallets and Bitwarden Credentials
🕵️
The missing cybersecurity leader in small business
🕵️
Fake Claude Campaign Uses PlugX-Style DLL Sideloading Chain
🕵️
Trending Hugging Face Repo With 200K Downloads Spreads Windows Malware
🕵️
Sandboxie Escape Flaw Could Let Attackers Gain SYSTEM-Level Privileges
🕵️
Instagram messaging encryption removed, and privacy advocates are pushing back
🕵️
The questionnaire-based TPRM model is broken, and TrustCloud has a fix
🕵️
LLMs and Text-in-Text Steganography
🕵️
New cybersecurity industry alliance aims to lead US critical infrastructure protection
🕵️
Python Infostealer Hides in GitHub Releases to Bypass Detection
🕵️
SailPoint Agentic Fabric expands identity governance to autonomous AI agents
🕵️
Google’s new reCAPTCHA system restricts access to the open web
🕵️
Lyrie.ai Joins First Batch of Anthropic’s Cyber Verification Program
🕵️
Apple, Intel Reportedly Near Chip Deal That Could Reduce TSMC Reliance
🕵️
Microsoft’s Voluntary Retirement Offer: New Details Reveal Who Qualifies
🕵️
Your Team of 10 Gets This AI Project Management Platform for Just $99
🕵️
SS&C Intralinks FundCentre AI vs. Juniper Square: Which platform better supports modern private markets fund managers?
🕵️
macOS 27 May Get a New Look: Here’s What Apple Could Change
🕵️
Entries now open for the 2026 CSO30 Australia Awards
🕵️
News Alert: Lyrie.ai joins Anthropic verification program, unveils protocol for securing AI agents
🕵️
TikTok Launches £3.99 Ad-Free Plan for UK Users
🕵️
Mac Users Warned Over Fake Claude Install Instructions
🕵️
1.8 Billion Gmail Users May Want to Check This AI Privacy Setting
🕵️
FCC moves to impose “Know Your Customer” rules for VoIP providers
🕵️
iOS 26.5 is out, bringing encrypted RCS messaging to iPhone and Android users
🕵️
Pressure mounts on Canvas as data leak extortion deadline looms
🌐
A week in security (May 4 &#8211; May 10)
🌐
⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More
🌐
TrickMo Variant Routes Android Trojan Traffic Through TON
🌐
FCC eases restrictions on foreign-made routers.
📡
Instagram removed end-to-end encryption for DMs. What should users do?
📡
Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads
📡
Identity is the new perimeter as rapid NHI proliferation threatens visibility and control
📡
Crimenetwork returns after takedown, dismantled again by German authorities
📡
Yarbo responds to robot flaws that could mow down their owners
📡
Fake Claude Code Page Pushes PowerShell Stealer at Devs
📡
Rushed Patches Follow Broken Embargo on New Linux Kernel Vulnerabilities
📡
Complimentary virtual training: Get hands-on with AWS Security Services
📡
Texas sues Netflix over alleged data practices that create ‘surveillance machinery’ without user consent
📡
Apple Patches Everything, (Mon, May 11th)
📡
FCC Softens Ban on Foreign-Made Routers
📡
Tech Can't Stop These Threats — Your People Can
🐛
CVE-2026-33814 Infinite loop in HTTP/2 transport when given bad SETTINGS_MAX_FRAME_SIZE in net/http/internal/http2 in golang.org/x/net
🐛
CVE-2026-39823 Bypass of meta content URL escaping causes XSS in html/template
🐛
CVE-2026-41889 pgx: SQL Injection via placeholder confusion with dollar quoted string literals
🐛
CVE-2026-6664 PgBouncer integer overflow in PgBouncer network packet parsing
🐛
CVE-2026-6665 PgBouncer buffer overflow in SCRAM
🐛
CVE-2026-6667 PgBouncer missing authorization check in KILL_CLIENT admin command
🐛
CVE-2026-6666 PgBouncer crash in kill_pool_logins_server_error
🐛
CVE-2026-45130 Vim: Heap Buffer Overflow in spell file loading
🐛
CVE-2026-44656 Vim: OS Command Injection via 'path' completion
🐛
CVE-2026-33811 Crash when handling long CNAME response in net
🐛
CVE-2026-39817 Invoking "go tool pack" does not sanitize output paths in cmd/go
🐛
CVE-2026-39819 Invoking "go bug" follows symlinks in predictable temporary filenames in cmd/go
🐛
CVE-2026-39820 Quadratic string concatentation in consumeComment in net/mail
🐛
CVE-2026-39825 ReverseProxy forwards queries with more than urlmaxqueryparams parameters in net/http/httputil
🐛
CVE-2026-39826 Escaper bypass leads to XSS in html/template
🐛
CVE-2026-39836 Panic in Dial and LookupPort when handling NUL byte on Windows in net
🐛
CVE-2026-42499 Quadratic string concatenation in consumePhrase in net/mail
🐛
CVE-2026-42501 Malicious module proxy can bypass checksum database in cmd/go
🐛
CVE-2026-33079 Mistune ReDoS in LINK_TITLE_RE allows denial of service with crafted Markdown titles
🐛
Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak
⚠️
Week in review: cPanel vulnerability actively exploited, DigiCert breach, LinkedIn job scams
KEV
⚠️
Official JDownloader site served malware to Windows and Linux users between May 6 and May 7
⚠️
New cPanel vulnerabilities could allow file access and remote code execution
🔥
CyberWire Daily at 10: The evolution of geopolitics and warfare.
🔥
Security Affairs newsletter Round 576 by Pierluigi Paganini – INTERNATIONAL EDITION
🔥
Weekly Update 503
🕵️
YARA-X 1.16.0 Release, (Sun, May 10th)
🌐
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 96
🐛
cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now
⚠️
NVIDIA Confirms GeForce Data Breach Exposed Users’ Personal Data
⚠️
Cybersecurity Today Month in Review: AI Coding Risks, Canvas Breach, QR Phishing Surge
⚠️
Vidar Infostealer Campaign Steals Passwords, Cookies, Crypto Wallets, and Device Data
⚠️
ShinyHunters defaces Canvas portals during finals week.
📢
Hackable Robot Lawn Mower Unlocks a New Nightmare
🔥
Braintrust security incident raises concerns over AI supply chain risks
🕵️
The spy who logged me in.
🕵️
TCLBANKER Malware Leverages WhatsApp and Outlook Worm Features in Active Attacks
🕵️
AI Coding Agents Need Sandboxes
🌐
Quasar Linux RAT (QLNX): A Fileless Linux Implant Built for Stealth and Persistence
🚨
Your refresh plan has a CVE blind spotThe conversation is straightforward, but the problem behind it is not. The customer bought servers in 2017 and typically refresh every five to six years. Generally, around the 2022 to 2023 timeframe, they would have looked to buy new. Historically, that is what would have happene…
KEV
🚨
CVE-2026-6973: Authenticated Admin RCE In Ivanti EPMM Added to CISA KEVCVE-2026-6973: Authenticated Admin RCE In Ivanti EPMM Added to CISA KEV Ivanti has patched CVE-2026-6973, a high-severity remote code execution (RCE) vulnerability affecting Ivanti Endpoint Manager Mobile (EPMM) on-prem deployments. The vulnerability has been exploited in the wil…
KEV
🚨
Why the approaching flood of vulnerabilities changes everything — and what to do about itAI-driven discovery, NIST’s retreat from universal enrichment, and the end of “good enough” vulnerability management Key takeaways AI-driven discovery tools are accelerating CVE volume, resulting in an expected deluge of 59,000 disclosed vulnerabilities this year.   NIST has…
KEV
🚨
Dirty Frag (CVE-2026-43284, CVE-2026-43500): Frequently asked questions about this Linux kernel privilege escalation vulnerability chainWeeks after the Copy Fail vulnerability was revealed, a new Linux kernel escalation vulnerability has been uncovered. Dubbed “Dirty Frag,” this flaw could allow a local user to gain root access on affected Linux distributions. Public exploit code has been released prior to patche…
KEV
🚨
Five new holes, one exploited, found in Ivanti Endpoint Manager MobileThe five new vulnerabilities discovered in Ivanti’s on-premises mobile endpoint management solution are a “classic example of the legacy trap” that CSOs must avoid, says an expert. “Patch today to survive the weekend,” said Robert Enderle of the Enderle Group, “but start planning…
KEV
🐛
13 new critical holes in JavaScript sandbox allow execution of arbitrary code
🐛
Palo Alto Networks firewall flaw has been exploited for several weeks
🐛
PoC Exploit Released for Dirty Frag Linux Kernel Vulnerability
🐛
Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions
🐛
Another Universal Linux Local Privilege Escalation (LPE) Vulnerability: Dirty Frag, (Fri, May 8th)
🐛
CVE-2026-41673 xmldom: Denial of service via uncontrolled recursion in XML serialization
🐛
CVE-2026-43869 Apache Thrift: TSSLTransportFactory.java hostname verification
🐛
CVE-2026-41672 xmldom: XML node injection through unvalidated comment serialization
🐛
CVE-2026-41674 xmldom: XML injection through unvalidated DocumentType serialization
🐛
CVE-2026-41675 xmldom: XML node injection through unvalidated processing instruction serialization
🐛
CVE-2026-25243 redis-server RESTORE invalid memory access may allow remote code execution
🐛
CVE-2026-31717 ksmbd: validate owner of durable handle on reconnect
🐛
CVE-2026-23631 redis-server Lua use-after-free may allow remote code execution
🐛
CVE-2026-31718 ksmbd: fix use-after-free in __ksmbd_close_fd() via durable scavenger
🐛
CVE-2026-23479 redis-server use-after-free in unblock client flow may allow remote code execution
🐛
CVE-2026-25588 RedisTimeSeries RESTORE invalid memory access may allow remote code execution
🐛
CVE-2026-25589 RedisBloom RESTORE invalid memory access may allow remote code execution
🐛
Critical Vulnerability in Rancher Fleet Enables Full Cluster-Admin Privileges
🐛
CVE-2025-68670: discovering an RCE vulnerability in xrdp
🐛
Your CTEM program is probably ignoring MCP. Here’s how to fix it
🐛
Ivanti EPMM vulnerability exploited in zero-day attacks (CVE-2026-6973)
🐛
Dirty Frag: Unpatched Linux vulnerability delivers root access
🐛
Metasploit Wrap-Up 05/08/2026
🐛
VU#260001: Linux kernel contains local privilege escalation vulnerability (Copy Fail)
⚠️
Become a millionaire by bug hunting on Android
⚠️
Meta allegedly made billions from scam advertising while online fraud explodes worldwide.
⚠️
NWHStealer Campaign Deploys Bun Loader, Anti-VM Evasion, and Encrypted C2
⚠️
Multiple Critical Flaws Fixed in Next.js and React Server Components
⚠️
423 Firefox Flaws Fixed as Browser Gains Support for Claude, Mythos, and More
⚠️
May 2026 Patch Tuesday forecast: AI starts driving security industry changes
⚠️
Mental health apps are collecting more than emotional conversations
⚠️
Product showcase: NetGuard open-source firewall for Android
⚠️
Snyk integrates Claude to advance AI-native application security
⚠️
Fake Moustache Fools Age Checks, Sparks Online Safety Act Fears
⚠️
Trellix Investigates RansomHouse Breach Claims Involving Source Code Repository
⚠️
Pen tests show AI security flaws far more severe than legacy software bugs
⚠️
Helping North Korean IT remote workers is becoming a fast track to prison
⚠️
New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials
⚠️
Cline Kanban WebSocket Vulnerability Enables Malicious Sites to Take Over AI Coding Agents
⚠️
Claude in Chrome is taking orders from the wrong extensions
⚠️
Dirty Frag: A new Linux privilege escalation vulnerability is already in the wild
⚠️
From Cyberwar to Cognitive Warfare: The Geopolitical Impact on Cybersecurity in Africa
⚠️
Pam Backdoor Targets Linux Systems to Steal SSH Credentials
⚠️
Zero Chaos: Scaling Detection Engineering at the Speed of Software, with Detection As Code
⚠️
MFA Alone Won’t Save You
⚠️
ShinyHunters defaces Canvas portals during finals week.
⚠️
Multiple universities forced to reschedule final exams after Canvas cyber incident
⚠️
Apple and Meta warn Canada’s Bill C-22 forces encryption backdoors
⚠️
Insider Betting on Polymarket
⚠️
The four-day race you don’t want to be in.
KEV
⚠️
Canvas, Shai-Hulud, QuasarRat, 0Days, Anthropic, Aaran Leyland, and EU Compliance! - SWN #579
📢
EU calls VPNs “a loophole that needs closing” in age verification push
📢
Kingdom Market administrator given 16-year sentence
🔥
Canvas Breach Disrupts Schools & Colleges Nationwide
🔥
The Canvas Hack Is a New Kind of Ransomware Debacle
🔥
Hackers Use Morse Code to Trick Grok and Bankrbot, Steal $200K in Crypto Tokens
🔥
Zara - 197,376 breached accounts
🔥
PCPJack Campaign Boots TeamPCP Off Compromised Machines
🔥
Canvas outage hits thousands of universities as ShinyHunters threatens leak
🔥
Avantra’s new AI can diagnose SAP failures in seconds
🔥
Former IT contractor convicted for wiping 96 US government databases
🔥
Microsoft says Edge’s plaintext password behavior is “by design”
🔥
You Have 60 Seconds to Stop the Breach. Are You Ready?
🔥
Pro-Ukraine BO Team and Head Mare hackers appear to team up in attacks against Russia
🔥
ShinyHunters claims nearly 9,000 schools affected by Canvas data breach
🔥
Instructure confirms cybersecurity incident
🔥
Anthropic’s Claude used in attempted compromise of Mexican water utility
🔥
Zara Data Breach: 197,000 Customers Exposed in Third-Party Security Incident
🔥
Poland says hackers breached water treatment plants, and the U.S. is facing the same threat
🔥
Cyberattacks on Poland’s Water Plants: A Blueprint for Hybrid Warfare
🔥
RansomHouse says it breached Trellix and exposes internal systems
🔥
Developers Are the New Target
🕵️
ISC Stormcast For Friday, May 8th, 2026 https://isc.sans.edu/podcastdetail/9924, (Fri, May 8th)
🕵️
New infosec products of the week: May 8, 2026
🕵️
Your coworker might be selling company logins, and thinks it’s fine
🕵️
New Infostealer Campaign Abuses GitHub Releases to Hide Malware Payloads
🕵️
PCPJack Worm Targets Docker, Kubernetes, Redis, and MongoDB Credentials
🕵️
Transilience AI unveils Security Operating System for cloud remediation
🕵️
Object First Fleet Manager simplifies distributed backup storage
🕵️
Roblox chat moderation gets bypassed by leet speak and code words
🕵️
Signed Logitech Installer Abused to Drop TCLBANKER Banking Trojan
🕵️
Securonix launches AI threat research agent and ThreatWatch validation tool
🕵️
OpenAI tunes GPT-5.5-Cyber for more permissive security workflows
🕵️
ZiChatBot Malware Abuses Zulip APIs for Stealthy C2 Operations
🕵️
Google is turning Android Studio into a policy watchdog
🕵️
Modular RAT Campaign Steals Credentials and Captures Screenshots
🕵️
Fake OpenClaw Installer Targets Crypto Wallets and Password Managers
🕵️
Flaw in Claude’s Chrome extension allowed ‘any’ other plugin to hijack victims’ AI
🕵️
SOCRadar Recognized in the 2026 Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies
🕵️
Sen. Schumer seeks DHS plan on AI cyber coordination with state, local governments
🕵️
Friday Squid Blogging: Giant Squid Live in the Waters of Western Australia
🌐
Australian Cyber Security Centre Issues Alert Over ClickFix Attacks
🌐
Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise
🌐
TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms
🌐
Space, the internet's next frontier.
📡
Detecting Web Server Probing & Fuzzing in Traefik with Automated Cloudflare Response
📡
Meet Rassvet, Russia’s Answer to Starlink
📡
AI, Cyberwarfare, and Autonomous Weapons: Inside America’s New Military Strategy
📡
Sri Lanka makes 37 arrests as it raids another scam centre
📡
One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk
📡
ShinyHunters escalates Canvas attacks with school login defacements
📡
Inside Department 4: Russia’s secret school for hackers
📡
One in eight UK workers has sold their company passwords, and bosses think it’s fine
📡
The Evolution of Kaspersky SIEM | Kaspersky official blog
📡
Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads
📡
US defense contractor who sold hacking tools to Russian broker ordered to pay $10M to former employers
📡
Virginia man found guilty of deleting 96 government databases
📡
GM to pay over $12 million in California privacy settlement involving driver data
📡
ShinyHunters Claims Second Attack Against Instructure
🚨
U.S. CISA adds a flaw in Palo Alto Networks PAN-OS to its Known Exploited Vulnerabilities catalogThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Palo Alto Networks PAN-OS to its Known Exploited Vulnerabilities catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in the Palo Alto Networks PAN-OS, tracked as CVE-…
KEV
🚨
U.S. CISA adds a flaw in Ivanti Endpoint Manager Mobile (EPMM) to its Known Exploited Vulnerabilities catalogThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Ivanti Endpoint Manager Mobile (EPMM) to its Known Exploited Vulnerabilities catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in the Ivanti Endpoint Manager Mobile…
KEV
🐛
Threat Brief: Exploitation of PAN-OS Captive Portal Zero-Day for Unauthenticated Remote Code Execution
🐛
Cisco Network Flaw Exposes Devices to Remote Denial-of-Service Exploits
🐛
CVE-2026-33190 CoreDNS TSIG authentication bypass on encrypted DNS transports
🐛
CVE-2026-32936 CoreDNS DoH GET path missing size validation causes CPU and memory amplification
🐛
CVE-2026-35579 CoreDNS TSIG authentication bypass on gRPC, QUIC, DoH, and DoH3 transports
🐛
CVE-2026-42151 Prometheus Azure AD remote write OAuth client secret exposed via config API
🐛
CVE-2026-42154 Prometheus: remote read endpoint allows denial of service via crafted snappy payload
🐛
CVE-2026-43248 vhost: move vdpa group bound check to vhost_vdpa
🐛
CVE-2026-43127 ntfs3: fix circular locking dependency in run_unpack_ex
🐛
CVE-2026-43161 iommu/vt-d: Skip dev-iotlb flush for inaccessible PCIe device without scalable mode
🐛
CVE-2026-43245 ntfs: ->d_compare() must not block
🐛
CVE-2026-43137 ASoC: SOF: Intel: hda: Fix NULL pointer dereference
🐛
CVE-2026-43234 team: avoid NETDEV_CHANGEMTU event when unregistering slave
🐛
CVE-2026-43185 ksmbd: fix signededness bug in smb_direct_prepare_negotiation()
🐛
CVE-2025-71273 wifi: rtw88: Use devm_kmemdup() in rtw_set_supported_band()
🐛
CVE-2026-43153 xfs: remove xfs_attr_leaf_hasname
🐛
CVE-2026-43116 netfilter: ctnetlink: ensure safe access to master conntrack
🐛
CVE-2026-43244 kcm: fix zero-frag skb in frag_list on partial sendmsg error
🐛
CVE-2026-43191 drm/amd/display: Adjust PHY FSM transition to TX_EN-to-PLL_ON for TMDS on DCN35
🐛
CVE-2025-71272 most: core: fix resource leak in most_register_interface error paths
🐛
CVE-2026-33489 CoreDNS transfer plugin subzone ACL bypass via lexicographic zone comparison
🐛
CVE-2026-32934 CoreDNS DNS-over-QUIC unbounded goroutine growth leads to denial of service
🐛
CVE-2026-43073 x86-64: rename misleadingly named '__copy_user_nocache()' function
🐛
CVE-2026-43125 dlm: validate length in dlm_search_rsb_tree
🐛
CVE-2026-43176 wifi: rtw89: pci: validate release report content before using for RTL8922DE
🐛
CVE-2026-43204 ASoC: qcom: q6asm: drop DSP responses for closed data streams
🐛
CVE-2026-43131 drm/amd/pm: Fix null pointer dereference issue
🐛
CVE-2026-43126 ALSA: mixer: oss: Add card disconnect checkpoints
🐛
CVE-2026-43198 tcp: fix potential race in tcp_v6_syn_recv_sock()
🐛
CVE-2025-71290 misc: ti_fpc202: fix a potential memory leak in probe function
🐛
CVE-2026-43115 srcu: Use irq_work to start GP in tiny SRCU
🐛
CVE-2025-71293 drm/amdgpu/ras: Move ras data alloc before bad page check
🐛
CVE-2026-43172 wifi: iwlwifi: fix 22000 series SMEM parsing
🐛
CVE-2025-71285 net: qrtr: Drop the MHI auto_queue feature for IPCR DL channels
🐛
CVE-2026-43197 netconsole: avoid OOB reads, msg is not nul-terminated
🐛
CVE-2026-43118 btrfs: fix zero size inode with non-zero size after log replay
🐛
CVE-2026-43109 x86: shadow stacks: proper error handling for mmap lock
🐛
CVE-2026-43129 ima: verify the previous kernel's IMA buffer lies in addressable RAM
🐛
CVE-2026-43274 mailbox: mchp-ipc-sbi: fix out-of-bounds access in mchp_ipc_get_cluster_aggr_irq()
🐛
CVE-2026-43258 alpha: fix user-space corruption during memory compaction
🐛
CVE-2025-71289 fs/ntfs3: handle attr_set_size() errors when truncating files
🐛
CVE-2026-43107 xfrm: account XFRMA_IF_ID in aevent size calculation
🐛
CVE-2026-43243 drm/amd/display: Add signal type check for dcn401 get_phyd32clk_src
🐛
CVE-2025-71294 drm/amdgpu: fix NULL pointer issue buffer funcs
🐛
CVE-2026-43250 usb: chipidea: udc: fix DMA and SG cleanup in _ep_nuke()
🐛
CVE-2026-43237 drm/amdgpu: Refactor amdgpu_gem_va_ioctl for Handling Last Fence Update and Timeline Management v4
🐛
CVE-2026-43201 APEI/GHES: ARM processor Error: don't go past allocated memory
🐛
CVE-2026-43219 net: cpsw_new: Fix potential unregister of netdev that has not been registered yet
🐛
CVE-2026-43165 hwmon: (nct7363) Fix a resource leak in nct7363_present_pwm_fanin
🐛
CVE-2026-43088 net: af_key: zero aligned sockaddr tail in PF_KEY exports
🐛
CVE-2026-43195 drm/amdgpu: validate user queue size constraints
🐛
CVE-2026-43213 wifi: rtw89: pci: validate sequence number of TX release report
🐛
CVE-2026-43228 hfs: Replace BUG_ON with error handling for CNID count checks
🐛
CVE-2026-43216 net: Drop the lock in skb_may_tx_timestamp()
🐛
CVE-2026-43119 Bluetooth: hci_sync: annotate data-races around hdev->req_status
🐛
CVE-2026-43267 wifi: rtw89: fix potential zero beacon interval in beacon tracking
🐛
CVE-2026-43101 ipv6: ioam: fix potential NULL dereferences in __ioam6_fill_trace_data()
🐛
CVE-2026-43199 net/mlx5e: Fix "scheduling while atomic" in IPsec MAC address query
🐛
CVE-2026-43083 net: ioam6: fix OOB and missing lock
🐛
CVE-2026-43870 Apache Thrift: Node.js web_server.js multi-vulnerability
🐛
CVE-2026-43868 Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern
🐛
CVE-2026-33523 Apache HTTP Server: multiple modules: HTTP response splitting forwarding malicious status line
🐛
CVE-2026-23918 Apache HTTP Server: http2: double free and possible RCE on early reset
🐛
CVE-2026-34059 Apache HTTP Server: mod_proxy_ajp: Heap Over-Read and memory disclosure in ajp_parse_data()
🐛
CVE-2026-34032 Apache HTTP Server: mod_proxy_ajp: Heap Buffer Over-Read Due to Missing Null-Termination Check (ajp_msg_get_string)
🐛
CVE-2026-24072 Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr
🐛
CVE-2026-33006 Apache HTTP Server: mod_auth_digest timing attack
🐛
CVE-2026-33007 Apache HTTP Server: mod_authn_socache crash
🐛
CVE-2026-29169 Apache HTTP Server: mod_dav_lock indirect lock crash
🐛
CVE-2026-29168 Apache HTTP Server: mod_md unrestricted OCSP response
🐛
CVE-2026-33857 Apache HTTP Server: Off-by-one OOB reads in AJP getter functions
🐛
Redis Security Flaws Expose Servers to Remote Code Execution Risks
🐛
CVE-2026-34318
🐛
CVE-2026-34317
🐛
CVE-2026-34319
🐛
CVE-2026-33845 Gnutls: gnutls: denial of service via dtls zero-length fragment
🐛
CVE-2026-3833 Gnutls: gnutls: policy bypass due to case-sensitive nameconstraints comparison
🐛
CVE-2026-3832 Gnutls: gnutls: security bypass allows acceptance of revoked server certificates via crafted ocsp response
🐛
CVE-2026-6383 Kubevirt: kubevirt: unauthorized subresource access due to improper rbac evaluation
🐛
CVE-2026-34875
🐛
CVE-2026-34874
🐛
CVE-2026-34876
🐛
CVE-2026-25835
🐛
CVE-2025-66442
🐛
CVE-2026-34873
🐛
CVE-2026-34871
🐛
CVE-2026-34872
🐛
CVE-2026-25834
🐛
CVE-2026-25833
🐛
CVE-2026-41082
🐛
CISA Issues Warning Over Palo Alto PAN-OS Flaw Enabling Root-Level Access
KEV
🐛
Critical Palo Alto Networks software bug hits exposed firewalls
KEV
🐛
CVE-2026-26956: vm2 Sandbox Escape Enables Host RCE in Node.js 25
🐛
PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage
🐛
Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access
🐛
Ollama vulnerability highlights danger of AI frameworks with unrestricted access
🐛
Nation-state actors exploit Palo Alto PAN-OS zero-day for weeks
⚠️
Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks
⚠️
US government agency to safety test frontier AI models before release
⚠️
vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution
⚠️
Cybercriminals Exploit Microsoft Teams to Phish Login Credentials and Bypass MFA
⚠️
DeepFake it till you make it.
⚠️
Open-source MCP server monitoring for Python apps
⚠️
Critical vm2 Node.js Library Flaws Enable Arbitrary Code Execution Attacks
⚠️
UAT-8302 Targets Government Agencies With Custom Malware and Open-Source Tools
⚠️
Hackers Exploit Google Ads to Steal GoDaddy ManageWP Logins
⚠️
Ten years later, has the GDPR fulfilled its purpose?
⚠️
Researchers Spot Uptick in Use of Vercel for Phishing Campaigns
⚠️
CallPhantom Android scam reached 7.3 million downloads on Google Play
⚠️
Scammers Exploit Disposable VoIP Numbers to Bypass Reputation Blocking
⚠️
CISOs: Align cyber risk communication with boardroom psychology
⚠️
ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories
⚠️
Claude and SpaceX Join Forces to Enhance Large-Scale Compute Capacity
⚠️
Spring Vulnerabilities Open Door to Arbitrary File Access and GCP Secret Leaks
⚠️
The AI-vs-AI battle is already happening. Watch it live at EXPOSURE 2026.
⚠️
If a fake moustache can fool age checks, is the Online Safety Act working?
⚠️
Exploits and vulnerabilities in Q1 2026
⚠️
One House Democrat is pressing Commerce on the government’s spyware use
⚠️
How Cloudflare responded to the “Copy Fail” Linux vulnerability
⚠️
Why Security in 2026 Requires Continuous Threat and Exposure Management (CTEM) at Scale
⚠️
Businesses hide vast majority of ransomware attacks, report finds
⚠️
Palo Alto Networks warns state-linked cluster behind zero-day exploitation
⚠️
Cisco patches high-severity flaws enabling SSRF, code execution attacks
⚠️
Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
⚠️
PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems
⚠️
ICYMI: April 2026 @AWS Security
⚠️
LinkedIn illegally blocking free accounts from seeing ‘who’s viewed your profile’ data, group alleges
⚠️
Getting Rid of Your VPN - Rob Allen - PSW #925
⚠️
Ivanti customers confront yet another actively exploited zero-day
KEV
⚠️
Rapid7 and OpenAI: Helping Defenders Move at Machine Speed
📋
Google pushes massive Chrome security update to patch 127 flaws
📢
Trump’s AI Preemption Playbook.
📢
Kloudfuse 4.0 delivers AI-governed observability and scalable workload isolation
📢
Bots in translation: Can AI really fix SIEM rule sprawl across vendors?
📢
New CISA initiative aims to help critical infrastructure operators prepare for disruptions.
📢
Has CISA Finally Found Its New Leader in Tom Parker?
📢
Pentagon reaches deals with seven AI providers.
📢
Trump officials are steering a cybersecurity scholarship program toward AI
📢
The backup plan needs a backup plan.
📢
Iranian government hackers using Chaos ransomware as cover, researchers say
🔥
Woflow - 447,593 breached accounts
🔥
Day Zero Readiness: The Operational Gaps That Break Incident Response
🔥
Polish intelligence warns hackers attacked water treatment control systems
🔥
World's First AI-Driven Cyberattack Couldn't Breach OT Systems
🔥
One Click, Total Shutdown: The "Patient Zero" Webinar on Killing Stealth Breaches
🔥
North Carolina man pleads guilty to doxxing Supreme Court justices
🔥
Hackers hack victims hacked by other hackers
🔥
Unplug your way to better code
🔥
“ClaudeBleed” allows any Chrome extension to control Anthropic’s AI assistant
🔥
Hackers deface school login pages after claiming another Instructure hack
🔥
VPN Access Without Open Ports
🕵️
North Korean hackers targeted ethnic Koreans in China with Android ‘BirdCall’ malware
🕵️
ISC Stormcast For Thursday, May 7th, 2026 https://isc.sans.edu/podcastdetail/9922, (Thu, May 7th)
🕵️
An Adaptive Cyber Analytics UI for Web Honeypot Logs &#x5b;Guest Diary&#x5d;, (Wed, May 6th)
🕵️
WatchGuard Agent Flaws Allow Attackers to Gain Full SYSTEM Privileges on Windows
🕵️
Fake Disk Cleanup Apps Fuel New macOS ClickFix Attack
🕵️
Multi-model AI is creating a routing headache for enterprises
🕵️
Malicious NuGet Packages Steal Browser Credentials, SSH Keys, and Crypto Wallets
🕵️
Red Hat Enterprise Linux adds post-quantum security and AI-driven automation in latest releases
🕵️
Google Chrome 148 Released With Fixes for 127 Security Flaws
🕵️
Why “Trusted Publishing” Can’t Save Us from Social Engineering
🕵️
Daemon Tools Developer Confirms Software Was Trojanized
🕵️
Smart Glasses for the Authorities
🕵️
Hackers Weaponize Claude AI in Attacks on Water and Drainage Utilities
🕵️
Fake Claude AI Installers Used to Spread Malware in New Cyber Scam
🕵️
Fake Call History Apps on Google Play Steal Payments, Hit 7.3M+ Downloads
🕵️
American duo sentenced for hosting laptop farms for North Korean IT workers
🕵️
Manual Changes Break Security
🕵️
Google Seeks EU Deal Over ‘Parasite SEO’ News Rankings
🕵️
Android 17: Everything We Know About Google’s Biggest Year Yet
🕵️
Apple’s $250M Siri Settlement Could Pay Eligible iPhone Buyers
🕵️
This Dell 15 Laptop Offers a Sensible Daily Driver Setup for Just $307
🕵️
World Password Day 2026: Treat Identity as the Perimeter (and Act Like It)
🕵️
New TCLBANKER malware self-spreads through WhatsApp and Outlook
🕵️
Mac Studio, Mac mini Buyers Are Losing Options Amid AI Demand
🕵️
Alphabet Poised to Overtake Nvidia as the World’s Most Valuable Public Company
🕵️
Elon Musk’s Texas Chip Plant Could Cost $119B, Filings Show
🌐
TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook
🌐
AI in the Wrong Hands
🌐
PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux
🌐
Nearly half of the world’s passwords can be cracked in under a minute | Kaspersky official blog
🌐
From Android TVs to routers: the xlabs_v1 Mirai-based botnet built for DDoS attacks
🌐
OpenAI and Anthropic LLMs Used in Critical Infrastructure Cyber-Attack, Warns Dragos
🌐
Fake Claude AI Site Drops Beagle Backdoor on Windows Users
🌐
After Replacing TeamPCP Malware, 'PCPJack' Steals Cloud Secrets
🎙️
How do we secure applications when anyone can code?
📡
PCPJack | Cloud Worm Evicts TeamPCP and Steals Credentials at Scale
📡
Thousands of Vibe-Coded Apps Expose Corporate and Personal Data on the Open Web
📡
'TrustFall' Exposes Claude Code Execution Risk
📡
Operation HookedWing: 4-Year Multi-Sector Attack Analysis
📡
Police arrest SMS blaster crew that sent malicious messages to thousands across Toronto
📡
2 days left: Get 50% off a second pass to TechCrunch Disrupt 2026
📡
Massive AI investment scam network spans 15,500 domains
📡
Legacy Security Tools Are Failing Data Protection, Capital One Software Report Finds
📡
Cline Kanban Flaw Lets Websites Hijack AI Coding Agents
📡
How Anthropic’s Mythos has rewritten Firefox’s approach to cybersecurity
📡
AWS achieves SNI 27017, SNI 27018, and SNI 9001 certifications for the AWS Asia Pacific (Jakarta) Region
📡
How to Disable Google's Gemini in Chrome
🐛
QR Phishing Explodes, Ubuntu Under Attack, CISA Warns Critical Infrastructure Prepare for Isolation
🐛
Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution
KEV
🐛
CVE-2026-43037 ip6_tunnel: clear skb2->cb[] in ip4ip6_err()
🐛
CVE-2026-43964
🐛
Critical Palo Alto Firewall Vulnerability Enables Attackers to Gain Root Privileges
🐛
Argo CD ServerSideDiff Flaw Allows Attackers to Extract Kubernetes Secrets
🐛
Palo Alto Networks PAN-OS flaw exploited for remote code execution
KEV
🐛
Apache fixes critical HTTP/2 double-free flaw CVE-2026-23918 enabling RCE
🐛
WhatsApp warns of Instagram Reels bug that could load risky content
KEV
🐛
Root-level RCE vulnerability in Palo Alto firewalls exploited (CVE-2026-0300)
KEV
🐛
Critical Buffer Overflow in Palo Alto Networks PAN-OS User-ID Authentication Portal (CVE-2026-0300)
KEV
🐛
Palo Alto warns of critical software bug used in firewall attacks
⚠️
Weekly Update 502
⚠️
Zero-Auth Vulnerability Enables Cross-Tenant Access at DoD Contractor
⚠️
Malicious OpenClaw Skill Targets Agentic AI Workflows to Deploy RATs and Stealers
⚠️
Ransomware Gangs Escalate Attacks on Aviation and Aerospace Sector
⚠️
Risky Business #836 -- You can't patch the bugpocalypse
⚠️
Russia’s Forest Blizzard Is Abusing Home + Small Office Routers for Cred Theft
⚠️
Proofpoint Establishes Innovation Precedent for Source-Agnostic Modern Enterprise Investigations
⚠️
Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs
⚠️
Salesforce Marketing Cloud Vulnerability Exposes Email Data Risk
⚠️
Poisoned truth: The quiet security threat inside enterprise AI
⚠️
Train like you fight: Why cyber operations teams need no-notice drills
⚠️
Teach to Sell and Two Interviews from RSAC 2026 from Dropzone AI and Microsoft - BSW #446
⚠️
CloudZ RAT Exploits Microsoft Phone Link to Steal SMS OTPs
⚠️
Intel 471 speeds threat hunting and remediation with Retroactive Threat Detections
⚠️
UiPath adds agentic AI capabilities to Automation Suite for government agencies
⚠️
New Relic advances AI observability with new intelligence layer
⚠️
ServiceNow strengthens enterprise AI security with Autonomous Security & Risk platform
⚠️
Taiwan High Speed Rail Hit by Spoofing Attack That Stops Three Trains
⚠️
New malware turns Linux systems into P2P attack networks
⚠️
Attackers Continue to Pose as Help Desks in Social Engineering Attacks
⚠️
Phishing Attack Weaponizes Calendar Invites to Steal Login Credentials
⚠️
Massive DDoS Attack Generates 2.45 Billion Requests Using 1.2 Million IP Addresses
⚠️
FEMITBOT Network Exploits Telegram Mini Apps to Spread Crypto Scams and Android Malware
⚠️
Anthropic’s CEO warns the “moment of danger” is real. But most are looking in the wrong place.
⚠️
Muddying the Tracks: The State-Sponsored Shadow Behind Chaos Ransomware
⚠️
CloudZ Malware Abuses Phone Link to Steal SMS OTPs
⚠️
GrapheneOS fixes Android VPN leak Google refused to patch
⚠️
CISA warns of CopyFail exploitation.
⚠️
Speed, Not AI, Breaks You
⚠️
A critical Palo Alto PAN-OS zero-day is being exploited in the wild
KEV
⚠️
A Vulnerability in Apache HTTP Server Could Allow for Remote Code Execution
⚠️
The exploit that writes its own story.
⚠️
A Vulnerability in PAN-OS Could Allow for Remote Code Execution
📢
Iran-Linked Hackers Target Oman Ministries in Webshell and Data Theft Campaign
📢
Attackers Bypass Azure AD Conditional Access Using Phantom Device Registration
📢
How CISOs Reduce Cyber Risk with MITRE ATT&CK
📢
CISA Urges Critical Infrastructure Providers to Make Plans to Remain Operational if hit by Cyber-Attack
📢
NIST will test three major tech firms’ frontier AI models for cybersecurity risks
📢
Iranian state-backed spies pose as ransomware slingers in false flag attacks
📢
New CISA initiative aims for critical infrastructure to operate offline during cyberattacks
📢
New compliance guide available: ISO/IEC 42001:2023 on AWS
🔥
QLNX Targets Developers in Supply Chain Credential Theft Campaign
🔥
Ransomware Gang Member Linked to Russian Cybercrime Group Sentenced to Prison
🔥
Vimeo Confirms Breach Exposing 119,000 Unique User Email Addresses
🔥
Middle East Cyber Battle Field Broadens — Especially in UAE
🔥
LegionProxy - 10,144 breached accounts
🔥
Millions of students&#8217; personal data stolen in major education breach
🔥
Iran-Linked APT Posed as Chaos Ransomware Member in Espionage Campaign
🔥
MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack
🔥
Iran-sponsored threat group behind false flag social engineering campaign
🔥
Cybercriminals Are Complaining About AI Slop Flooding Their Forums
🔥
Iranian cyber espionage disguised as a Chaos Ransomware attack
🔥
DOJ says ransomware gang tapped into Russian government databases
🔥
AI evaluation startup Braintrust confirms breach, tells every customer to rotate sensitive keys
🔥
Instructure Breach Exposes Schools' Vendor Dependence
🕵️
ISC Stormcast For Wednesday, May 6th, 2026 https://isc.sans.edu/podcastdetail/9920, (Wed, May 6th)
🕵️
Remus Infostealer Adopts Lumma-Style Browser Key Theft to Bypass App-Bound Encryption
🕵️
Your Container Is Not a Sandbox
🕵️
Rowhammer Attack Against NVIDIA Chips
🕵️
Insights into the clustering and reuse of phone numbers in scam emails
🕵️
Extreme Networks introduces Agent ONE for autonomous enterprise networking
🕵️
8×8 updates CX platform with AI, analytics, and frontline management capabilities
🕵️
Proton Mail brings quantum-safe email encryption to all accounts
🕵️
groundcover expands its observability platform with enhanced Synthetic Monitoring and RUM
🕵️
Megaport enhances network resilience with integrated DDoS protection
🕵️
Darkhub Hacking-for-Hire Portal Promotes Crypto Fraud and Spyware Services
🕵️
Microsoft Teams on Android Now Lets Users Join External Meetings Through SIP
🕵️
OceanLotus suspected of using PyPI to deliver ZiChatBot malware
🕵️
Swapper – A Pure Regex Match/Replace Burp Extension
🕵️
Google Chrome silently installs 4GB Gemini Nano AI model on user devices
🕵️
Salat Malware Abuses QUIC and WebSockets for Stealthy C2 Control
🕵️
Belief Comes Before Growth
🕵️
Businesses eager but unprepared for AI to transform their security strategies
🕵️
Mozilla, Mullvad, Proton, sign letter opposing UK age verification
🕵️
Building Trust in Low-Touch Teams
🕵️
A DOD contractor’s API flaw exposed military course data and service member records
🌐
Malicious PyTorch Lightning update hits AI supply chain security
🌐
Google's Android Apps Get Public Verification to Stop Supply Chain Attacks
🌐
Websites with an undefined trust level: avoiding the trap
🌐
How VoidStealer bypasses Chrome’s protections to hijack sessions and steal data | Kaspersky official blog
🌐
LABScon25 Replay | Please Connect to the Foreign Entity to Enhance Your User Experience
🌐
Attackers adopt JavaScript runtime Bun to spread NWHStealer
🌐
Some kids are bypassing age verification checks with a fake mustache
🌐
Yet Another Way to Bypass Google Chrome's Encryption Protection
🎙️
Smashing Security podcast #466: Meta sees everything, Copy Fail, and a deepfake gets hired
📡
Weekly Threat Bulletin – May 6th, 2026
📡
One in Eight Workers Has Sold Their Corporate Logins
📡
From Stuxnet to ChatGPT: 20 News Events That Shaped Cyber
📡
The Hacker News Launches 'Cybersecurity Stars Awards 2026' — Submissions Now Open
📡
Your AI Agents Are Already Inside the Perimeter. Do You Know What They're Doing?
📡
Hackers compromise Daemon Tools in global supply-chain attack, researchers say
📡
Google Chrome&#8217;s silent 4GB AI download problem
📡
XBOW secures an additional $35 million in Series C funding.
📡
A Kid With a Fake Mustache Tricked an Online Age-Verification Tool
📡
After 17 years, Gavril Sandu extradited to U.S. for hacking scheme
📡
Taiwan High-Speed Rail Emergency Braking Hack: How a Student Stopped the Trains and Exposed a Major Security Gap
🚨
CISA mulls new three-day remediation deadline for critical flawsExperts have mixed reactions to a report that the US Cybersecurity and Infrastructure Security Agency (CISA) is considering reducing the timeline in which government agencies must address critical vulnerabilities from two weeks to only three days. The current 14-day window applie…
KEV
🐛
Apache HTTP Server Vulnerability Exposes Millions to Remote Code Execution Threats
🐛
Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API
KEV
🐛
CVE-2026-42798
🐛
CVE-2026-40170 ngtcp2 has a qlog transport parameter serialization stack buffer overflow
🐛
CVE-2026-37457
🐛
MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks
🐛
Critical Weaver E-cology RCE Exploit Raises Alarm for Enterprise Systems
KEV
🐛
AI finds 20-year-old bugs in PostgreSQL and MariaDB
🐛
Five ways to use Kiro and Amazon Q to strengthen your security posture
🐛
Critical Android vulnerability CVE-2026-0073 fixed by Google
🐛
Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE
🐛
Unpatched flaws turn Ollama’s auto-updater into a persistent RCE vector, researchers say
🐛
Copy Fail: What You Need to Know About the Most Severe Linux Threat in Years
⚠️
Anthropic Mythos spurs White House to weigh pre-release reviews for high-risk AI models
⚠️
Mythbehavior under investigation.
⚠️
174: Pacific Rim
⚠️
Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries
⚠️
The Terrorist Designation: A New Red Line for Ransomware with Cynthia Kaiser
⚠️
Qualcomm Chipset Vulnerabilities Raise Alarm Over Remote Code Execution Risk
⚠️
Attackers Exploit Amazon SES to Send Authenticated Phishing Emails
⚠️
Critical Android Zero-Click Vulnerability Enables Remote Shell Access
⚠️
Trellix Reveals Unauthorized Access to Source Code
⚠️
CISOs step up to the security workforce challenge
⚠️
Keeping Up With the OWASP GenAI Project - Scott Clinton - ASW #381
⚠️
NCSC Warns of an AI-Fuelled “Vulnerability Patch Wave”
⚠️
DarkSword Malware
⚠️
WhatsApp Security Flaw Enables Malicious URL Execution Through Instagram Reels
⚠️
Education Sector Hit by Espionage, Phishing, and Supply Chain Attacks
⚠️
Microsoft warns of global campaign stealing auth tokens from 35K users
⚠️
CloudZ malware hijacks Microsoft Phone Link to intercept SMS and OTPs
⚠️
We Scanned 1 Million Exposed AI Services. Here's How Bad the Security Actually Is
⚠️
Silver Fox Uses Fake Tax Notices to Drop ValleyRAT and ABCDoor Backdoor
⚠️
Cisco Acquisition of Astrix Security Signals to Strengthen on Non-Human Identity Security
⚠️
Stealthy malware abuses Microsoft Phone Link to siphon SMS OTPs from enterprise PCs
⚠️
C/C++ checklist challenges, solved
⚠️
US-Targeted Phishing Campaign Exposes Credential and Remote Access Risks for CISOs
⚠️
How Far the US Went to Rescue Hostage Bowe Bergdahl
⚠️
PoC tool extracts cleartext passwords from Microsoft Edge memory
⚠️
A Walkthrough of the 2026 Global Cybersecurity Summit Agenda
⚠️
Fake SSA Emails Drive Venomous#Helper Phishing Campaign
⚠️
Google to pay up to $1.5 million for zero-click Pixel Titan M exploits
⚠️
China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions
⚠️
Oracle will patch more often to counter AI cybersecurity threat
⚠️
Trellix investigating breach of source code repository
⚠️
Microsoft Edge Stores Passwords in Process Memory, Posing Enterprise Risk
⚠️
UK's NCSC warns of AI-driven "patch wave."
⚠️
Apple brings end-to-end encryption to RCS messaging in iOS 26.5
⚠️
Tanium Atlas aims to accelerate threat response in the AI era
⚠️
CISA pushes critical infrastructure operators to prepare to work in isolation
⚠️
Google AppSheet Abuse Helped Phish 30,000 Facebook Accounts
⚠️
Google Update: Android Flaw Could Put Billions of Devices at Risk
⚠️
Edge browser leaves passwords exposed in plain text, says researcher
⚠️
CVE Disclosures Become AI Prompts
⚠️
Strengthening cyber defense through policy and people.
⚠️
The fixes keep coming.
⚠️
Trellix Source Code Breach Highlights Growing Supply Chain Threats
⚠️
Patch in 3 Days or Break
KEV
⚠️
SN 1077: A Browser AI API? - End of Bug Bounties?
📋
Oracle rolls out monthly security patch updates
📢
Download: Secure Foundations for AI Workloads on AWS
📢
Microsoft: Phishing campaign used fake compliance notices to compromise employee accounts
📢
LuxSci Launches Enterprise-Grade HIPAA-Compliant Email Security for Mid-Sized Healthcare Organizations
📢
CISA urges critical infrastructure firms to ‘fortify’ now before it’s too late
📢
Microsoft Flags Mass Phishing Campaign Using Fake Compliance Emails
📢
CISA boasts AI automation improvements to threat analysis, mission support
📢
Supply-chain attacks take aim at your AI coding agents
📢
Zino, 0auth, VSS, Mental Health Hackers, 3 Days of KEV, Copy/Fail, AI, Aaran Leyland - SWN #578
KEV
📢
CISA wants critical infrastructure to operate ‘weeks to months’ in isolation during conflict
🔥
Vimeo - 119,167 breached accounts
🔥
DigiCert Hacked in Screensaver-Based Attack to Fraudulently Obtain EV Code Signing Certificates
🔥
Educational tech firm Instructure data breach may have impacted 9,000 schools
🔥
ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows
🔥
APT37 hacks gaming platform to spread new BirdCall Android spyware
🔥
Australia launches cyber review board modeled on version disbanded in US
🔥
Conti ransomware gang member sentenced to 102 months in prison
🔥
Introducing the New AI-Native KnowBe4 SAT
🔥
ScarCruft Targets Gaming Platform With Windows, Android Backdoors
🔥
Hackers Abuse DAEMON Tools Distribution Channel to Deliver Malicious Payloads
🔥
Hackers steal students’ data during breach at education tech giant Instructure
🔥
North Korean APT Targets Yanbian Gamers via Trojanized Platform
🔥
DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware
🔥
Latvian national sentenced for ransomware attacks run by former Conti leaders
🔥
Conti, Akira ransomware affiliate given 8-year sentence
🔥
Vimeo confirms breach via third-party vendor impacts 119K users
🔥
U.S. court sentences Karakurt ransomware negotiator to 8.5 years
🕵️
ISC Stormcast For Tuesday, May 5th, 2026 https://isc.sans.edu/podcastdetail/9918, (Tue, May 5th)
🕵️
Microsoft Edge Found Storing Saved Passwords in Cleartext Memory at Startup
🕵️
pnpm 11 Enables Default Release-Age Guard to Curb npm Supply Chain Attacks
🕵️
Fake “Notepad++ for Mac” Site May Pose Malware Risk for Mac Users
🕵️
New Attribution Framework Links APT Campaigns Across Key Layers
🕵️
North Korean hackers trojanize gaming platform to spy on ethnic Koreans in China
🕵️
Meta adds proof-based security to encrypted backups
🕵️
Code of Conduct Phish Hits 35,000 Users in Multi-Stage AiTM Attack
🕵️
FTC orders Kochava to stop selling people’s location data
🕵️
Anomali ThreatStream Next-Gen speeds threat response across workflows
🕵️
Cerberus Stalkerware Hits Google Play, Abuses Accessibility and Firebase for Remote Control
🕵️
UAT-8302 and its box full of malware
🕵️
VIAVI CyberFlood CF1000 pushes 400G validation for multi-terabit AI data centers
🕵️
OWASP AI Security Summit May 27
🕵️
Kaspersky suspects Chinese hackers planted a backdoor into Daemon Tools in ‘widespread’ attack
🕵️
Samsung Display Reveals Screens That Measure Health, Stretch, and Fight Glare
🕵️
iOS 26.5 to Introduce Encrypted RCS, Maps Changes, and New EU Features
🕵️
Enhance Your Expertise Anytime with Unlimited Online Courses — Now $19.97
🕵️
What If Your Digital Footprint Could Shrink?
🕵️
Power Through Projects with the Microsoft Office 2024 Home & Business
🕵️
Apple Wallet May Get ‘Create a Pass’ Tool for Event Tickets, Gift Cards
🕵️
Proton Mail rolls out quantum-resistant encryption for all users
🕵️
Brave sees 100% Linux growth as browser reaches 115M monthly users
🕵️
LastPass Mobile Smart Scanner improves password security
🕵️
New WhatsApp Flaws Could Affect Billions of Users After Meta Security Patch
🕵️
News alert: LuxSci launches HIPAA-compliant email platform for mid-size healthcare market
🌐
Supply chain attack via DAEMON Tools | Kaspersky official blog
🌐
Update WhatsApp now: Two new flaws could expose you to malicious files
🌐
FTC bans data broker Kochava from selling sensitive location info
🎙️
How the Story of a USB Penetration Test Went Viral
📡
Elastic Workflows GA: automation where your security data already lives
📡
The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed
📡
Cleartext Passwords in MS Edge&#x3f; In 2026&#x3f;, (Mon, May 4th)
📡
SSL.com rotates their root certificate today, (Tue, May 5th)
📡
CloudZ RAT potentially steals OTP messages using Pheno plugin
📡
AI Adoption Outpaces Safety Policies, Leaving Organizations Exposed to Cyber Risk
📡
4 days left: Get 50% off a second TechCrunch Disrupt 2026 pass to make more deals faster
📡
Introducing AI traffic analysis dashboards for AWS WAF
🚨
U.S. CISA adds a flaw in Linux Kernel to its Known Exploited Vulnerabilities catalogThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Linux Kernel to its Known Exploited Vulnerabilities catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in the Linux Kernel, tracked as CVE-2026-31431 (CVSS score of …
KEV
🐛
FreeBSD Systems at Risk From DHCP Client RCE Vulnerability
🐛
cPanel Vulnerability Exploited to Compromise Government and Military Servers
🐛
CISA Flags Linux Kernel Vulnerability as Threat Actors Launch Attacks
KEV
🐛
CISA warns “Copy Fail” Linux flaw is already actively exploited
KEV
🐛
Critical MOVEit Automation auth bypass vulnerability fixed (CVE-2026-4670)
🐛
Multiple threat actors actively exploit cPanel vulnerability (CVE-2026-41940)
🐛
Hackers target governments and MSPs via critical cPanel flaw CVE-2026-41940
🐛
MOVEit automation flaws could enable full system compromise
⚠️
Spotting third-party cyber risk before attackers do
⚠️
What researchers learned about building an LLM security workflow
⚠️
Reborn Gaming - 126 breached accounts
⚠️
Pipelock: Open-source AI agent firewall
⚠️
Trellix Source Code Breach Exposes Repository to Unauthorized Access
⚠️
Top 10 AI Pentest Tools
⚠️
AI-Powered Threat Actors Accelerate 0-Day Discovery at Machine Speed
⚠️
MOVEit Authentication Bypass Vulnerability Sparks Security Concerns
⚠️
CISA Alert Highlights Active Exploitation of cPanel & WHM Security Bug
KEV
⚠️
New Apache MINA Vulnerabilities Open Door to Remote Code Execution Attacks
⚠️
The fake IT worker problem CISOs can’t ignore
⚠️
How CISOs should utilize data security posture management to inform risk
⚠️
Post Quantum Migration Struggles, AI Threats, and Modern Defenses - ESW #457
⚠️
Claude Security enters public beta with Opus 4.7 vulnerability scanning and patching
⚠️
Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks
⚠️
276 Arrested as Authorities Dismantle Crypto Scam Centers Targeting Americans
⚠️
AI speeds flaw discovery, forcing rapid updates, UK NCSC warns
⚠️
DigiCert suffers breach, stolen certificates used to sign malware
⚠️
Stronger Cybersecurity, Stronger Business: NIST Celebrates 2026 National Small Business Week
⚠️
Malicious TanStack Package Abuses Postinstall Script to Steal Developer Secrets
⚠️
Security agencies draw red lines around agentic AI deployments
⚠️
Cisco Launches AI Provenance Tool to Strengthen Security and Compliance
⚠️
Security for AI: A strategic framework for closing the AI exposure gap
⚠️
4th May – Threat Intelligence Report
⚠️
Q-Day Might Come Sooner
⚠️
Owl IRD enables one-way forensic data transfer for incident response teams
⚠️
Two cybersecurity pros get prison time for helping ransomware gang
KEV
⚠️
⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & More
⚠️
Progress Software urges customers to patch critical MOVEit flaw.
⚠️
Critical vulnerability in cPanel leads to widespread exploitation
⚠️
A Vulnerability in WHM cPanel and WP Squared Could Allow for Remote Code Execution
⚠️
Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools
⚠️
Hackers are still exploiting the cPanel bug to gain control of thousands of websites
⚠️
Security without a login screen.
⚠️
Exploit Cyber-Frenzy Threatens Millions via Critical cPanel Vulnerability
⚠️
‘Copy Fail’ is a real Linux security crisis wrapped in AI slop
KEV
📢
Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M
📢
DigiCert Root Certificates Incorrectly Detected as Malware by Microsoft Defender
📢
Penske Logistics launches platform for real-time supply chain visibility
📢
US government warns of severe CopyFail bug affecting major versions of Linux
🔥
15-year-old detained over massive data breach at French government agency
🔥
DOJ Sentences Two Americans for ALPHV BlackCat Ransomware Attacks
KEV
🔥
2026: The Year of AI-Assisted Attacks
🔥
Bluekit Phishing Kit Streamlines Domains, 2FA Lures, and Session Hijacking
🔥
Canvas Confirms Data Breach Following ShinyHunters Claim
🔥
DigiCert breached via malicious screensaver file
🔥
Cyberattacks are raising your prices (Lock and Code S07E09)
🔥
Ransomware group claims breach of pro-Orbán Hungarian media firm
🔥
Educational company Infrastructure reports cyber incident
🕵️
ISC Stormcast For Monday, May 4th, 2026 https://isc.sans.edu/podcastdetail/9916, (Mon, May 4th)
🕵️
Your work apps are quietly handing 19 data points to someone
🕵️
Brush shell 0.4.0 tightens script safety, widens platform support
🕵️
Email Bombing, Fake IT Support Calls Drive Microsoft Teams Phishing Surge
🕵️
UK Government Announces Plans to Grow National AI Infrastructure
🕵️
AI Agent Reportedly Deletes Company’s Entire Database, Admits to Violating Guardrails
🕵️
Lens Agents brings policy control to AI across cloud and desktop
🕵️
Attackers Hijack SAP npm Packages to Steal Dev Secrets
🕵️
Hacking Polymarket
🕵️
Why data centers now belong on the critical infrastructure list
🕵️
Botnet Hijacks ADB-Exposed Android Devices to Target Minecraft Servers
🕵️
Meta enhances security of WhatsApp and Messenger encrypted backups
🕵️
Report: Deepfake Fraud Causes Billions in Losses
🕵️
New MOVEit vulnerabilities prompt urgent vendor warning
🕵️
Silver Fox Springs Tax-Themed Attacks on Orgs in India, Russia
🕵️
Operant AI Endpoint Protector secures AI agents and MCP tools
🕵️
Blend Autopilot MCP brings AI agent orchestration to lending platforms
🕵️
A college student is suing a dating app that allegedly used her TikTok videos to target men in her dormitory
🕵️
Gen Z Is Bringing the iPod Back as a Distraction-Free Music Escape
🕵️
Google Workspace Adds 5 AI Upgrades That Could Change Daily Work
🕵️
The $59 AI Tool Turning Forms Into Smart Workflows
🕵️
Apple Eyes ‘Aggressive Pricing’ for iPhone 18 Pro Amid Rising Costs
🕵️
GameStop Launches $56 Billion Bid to Take Over eBay
🕵️
Indirect Prompt Injection Is Now a Real-World AI Security Threat
🕵️
Microsoft Defender Bug Triggers False Malware Alerts for DigiCert Certificates
🕵️
6 Best No-Log VPNs in 2026
🕵️
5 Best VPNs for Android in 2026
🕵️
The 7 Best iPhone VPNs in 2026
🌐
A week in security (April 27 &#8211; May 3)
🌐
Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia
📡
Nvidia China Market Share Zero
📡
Bluekit phishing kit enables automated phishing with 40+ templates and AI tools
📡
How OpenClaw’s agent skills become an attack surface
📡
“Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security
📡
Teenager alleged to be Scattered Spider hacker arrested in Finland, faces US extradition
📡
The motivation of droids from the “Star Wars” universe | Kaspersky official blog
📡
Thousands of Facebook accounts stolen by phishing emails sent through Google
📡
The 2026 World Cup scam economy is already running before the first whistle
📡
How Dark Reading Lifted Off the Launchpad in 2006
📡
DShield Honeypot Update, (Mon, May 4th)
📡
US healthcare marketplaces shared citizenship and race data with ad tech giants
📡
5 days only: Bring a partner or colleague and get 50% off a second TechCrunch Disrupt 2026 pass
📡
DHS Demanded Google Surrender Data on Canadian's Activity, Location Over Anti-ICE Posts
📡
Forbes preliminarily agrees to pay $10 million to settle California wiretapping lawsuit
📡
Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass
📡
TeamPCP Weekly Analysis: 2026-W18 (2026-04-27 through 2026-05-03), (Mon, May 4th)
📡
Securing open proxies in your AWS environment
📡
RMM Tools Fuel Stealthy Phishing Campaign
🚨
CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEVThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability, t…
KEV
🚨
U.S. CISA adds a flaw in WebPros cPanel to its Known Exploited Vulnerabilities catalogThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in WebPros cPanel to its Known Exploited Vulnerabilities catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in Microsoft Defender, tracked as CVE-2026-41940 (CVSS score…
KEV
🐛
CVE-2026-37555
🐛
CVE-2026-6842 Nano: nano: local attacker can inject malicious .desktop launcher due to insecure directory permissions
🐛
CVE-2026-6845 Binutils: binutils: denial of service via crafted elf file
🐛
CVE-2026-6846 Binutils: binutils: arbitrary code execution via malformed xcoff object file processing
🐛
CVE-2026-30656
🐛
CVE-2026-6843 Nano: nano: format string vulnerability leads to denial of service
🐛
CVE-2017-20230 Storable versions before 3.05 for Perl has a stack overflow
🐛
CVE-2026-32148 Lockfile checksums not verified in Hex allows dependency integrity bypass
🐛
CVE-2025-11083 GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow
🐛
CVE-2026-7598 libssh2 userauth.c userauth_password integer overflow
🐛
CVE-2026-43058 media: vidtv: fix pass-by-value structs causing MSAN warnings
🐛
CVE-2025-9403 jqlang jq JSON jq_test.c run_jq_tests assertion
🐛
CVE-2025-8224 GNU Binutils BFD Library elf.c bfd_elf_get_str_section null pointer dereference
⚠️
Week in review: High-severity LPE vulnerability in the Linux kernel, cPanel 0-day exploited for months
⚠️
Google Revamps Bug Bounty Programs: Android Rewards Rise, Chrome Payouts Drop in the Age of AI
🔥
Security Affairs newsletter Round 575 by Pierluigi Paganini – INTERNATIONAL EDITION
🔥
Salt Typhoon breach IBM subsidiary in Italy: a warning for Europe’s digital defenses
🔥
Marcus & Millichap - 1,837,078 breached accounts
🕵️
Wireshark 4.6.5 Released, (Sun, May 3rd)
🕵️
ChatGPT advanced account security adds passkeys and hardware keys
🌐
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 95
📡
3 easy-to-miss cybersecurity risks for small businesses
🐛
cPanelSniper PoC Exploit Disclosed as 44,000 Servers Reportedly Compromised
🐛
CVE-2026-28532 FRRouting < 10.5.3 Integer Overflow in OSPF TLV Parser Functions
🐛
CVE-2026-4948 Firewalld: firewalld: local unprivileged user can modify firewall state due to d-bus setter mis-authorization
🐛
Massive cPanel campaign compromised 44,000 servers worldwide
⚠️
Connected Cars Are Rolling Spy Networks — And They Can Be Hacked
⚠️
Double-edged threat.
⚠️
OpenAI and Anthropic brief Congress on cyber-capable AI models.
⚠️
Trellix Confirms Source Code Breach With Unauthorized Repository Access
⚠️
ZenBusiness - 5,118,184 breached accounts
⚠️
Trellix discloses the breach of a code repository
🔥
Massive Facebook Phishing Operation Leverages AppSheet, Netlify, and Telegram
🔥
New Deep#Door RAT uses stealth and persistence to target Windows
🔥
Two US cybersecurity experts sentenced in ransomware case, third awaits July ruling
KEV
🕵️
The Data That Actually Matters
🕵️
What Could Go Wrong With AI Audit
📡
Disneyland Now Uses Face Recognition on Visitors
🐛
‘Trivial’ exploit can give attackers root access to Linux kernel
🐛
Chromium: CVE-2026-7343 Use after free in Views
🐛
Chromium: CVE-2026-7363 Use after free in Canvas
🐛
Chromium: CVE-2026-7359 Use after free in ANGLE
🐛
Chromium: CVE-2026-7333 Use after free in GPU
🐛
Chromium: CVE-2026-7360 Insufficient validation of untrusted input in Compositing
🐛
Chromium: CVE-2026-7344 Use after free in Accessibility
🐛
Chromium: CVE-2026-7358 Use after free in Animation
🐛
Chromium: CVE-2026-7334 Use after free in Views
🐛
Chromium: CVE-2026-7357 Use after free in GPU
🐛
Chromium: CVE-2026-7356 Use after free in Navigation
🐛
Chromium: CVE-2026-7353 Heap buffer overflow in Skia
🐛
Chromium: CVE-2026-7351 Race in MHTML
🐛
Chromium: CVE-2026-7354 Out of bounds read and write in Angle
🐛
Chromium: CVE-2026-7349 Use after free in Cast
🐛
Chromium: CVE-2026-7348 Use after free in Codecs
🐛
Chromium: CVE-2026-7335 Use after free in media
🐛
Chromium: CVE-2026-7336 Use after free in WebRTC
🐛
Chromium: CVE-2026-7350 Use after free in WebMIDI
🐛
Chromium: CVE-2026-7345 Insufficient validation of untrusted input in Feedback
🐛
Chromium: CVE-2026-7347 Use after free in Chromoting
🐛
Chromium: CVE-2026-7346 Inappropriate implementation in Tint
🐛
Chromium: CVE-2026-7337 Type Confusion in V8
🐛
Chromium: CVE-2026-7338 Use after free in Cast
🐛
Chromium: CVE-2026-7341 Use after free in WebRTC
🐛
Chromium: CVE-2026-7340 Integer overflow in ANGLE
🐛
Chromium: CVE-2026-7339 Heap buffer overflow in WebRTC
🐛
Chromium: CVE-2026-7355 Use after free in Media
🐛
WhatsApp Encryption Under Fire After Probe Shut Down
🐛
CVE-2026-31533 net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption
🐛
CVE-2026-41526
🐛
CVE-2026-40356
🐛
CVE-2026-3087 shutil.unpack_archive() doesn't check for Windows absolute paths in ZIPs
🐛
CVE-2026-31692 rtnetlink: add missing netlink_ns_capable() check for peer netns
🐛
CVE-2026-40355
🐛
Federal agencies must patch cPanel bug by Sunday, CISA says
🐛
Windows shell spoofing vulnerability puts sensitive data at risk
KEV
🐛
Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers
🐛
Metasploit Wrap-Up 05/01/2026
⚠️
Snake Oilers: Ent AI, Spacewalk and Mondoo
⚠️
New infosec products of the month: April 2026
⚠️
Fake CAPTCHA Scam Uses SMS Pumping to Inflate Phone Bills
⚠️
Aman - 215,563 breached accounts
⚠️
AI traffic is getting bigger, louder, and less predictable
⚠️
Claude Security Enters Public Beta for Enterprise Customers
⚠️
Open-source privacy proxy masks PII before prompts reach external AI services
⚠️
Shadow AI risks deepen as 31% of users get no employer training
⚠️
China-Aligned Hackers Deploy ShadowPad in Multi-Stage Espionage Campaign
⚠️
Multiple Wireshark Vulnerabilities Allow Arbitrary Code Execution via Malformed Packets
⚠️
AI-Powered Ransomware Surge Hits 7,831 Victims Worldwide
⚠️
DDoS Malware Targets Jenkins to Hit Valve Game Servers
⚠️
Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft
⚠️
Just 34% of cyber pros plan to stick with their current employer
⚠️
Managing OT risk at scale: Why OT cyber decisions are leadership decisions
⚠️
Human-centric failures: Why BEC continues to work despite MFA
⚠️
Actively exploited cPanel bug exposes millions of websites to takeover
KEV
⚠️
Nine-Year-Old Zero-Day Flaw in Linux Kernel Discovered by AI-Equipped Security Researcher
⚠️
Anthropic launches Claude Security to counter rapid AI-Powered exploits
⚠️
Utah becomes first US state to require age verification for VPN use
⚠️
Mozilla warns Chrome’s Prompt API threatens web neutrality
⚠️
Anthropic Rolls Out Claude Security for AI Vulnerability Scanning
⚠️
Vulnerability remediation: Match CVEs to asset owners in seconds with Tenable Hexa AI
⚠️
British cyber agency warns of looming ‘patch wave’ as AI speeds flaw discovery
⚠️
China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists
⚠️
A Medicare database leaked Social Security numbers.
⚠️
TCP Packet Walks Into a Bar
⚠️
Your KnowBe4 Fresh Content Updates from April 2026
⚠️
Think before you deploy the agent.
⚠️
Hidden Risk QR Code Phishing
⚠️
AI agents can bypass guardrails and put credentials at risk, Okta study finds
⚠️
Essential Data Sources for Detection Beyond the Endpoint
📋
Microsoft Windows 11 April 2026 Security Update Disrupts Third-Party Backup Tools
📋
SonicWall patches three SonicOS flaws in Gen 6, 7 and 8 firewalls. Patch them now
📢
Multiple Exim Mail Server Vulnerabilities Could Trigger Crashes via Malicious DNS Data
📢
EtherRAT Uses SEO Poisoning and Fake GitHub Pages to Target Enterprise Admins
📢
Nearly every Linux system built since 2017 vulnerable to ‘Copy Fail’ flaw
📢
UK Tech Ministers Opposing Government Plans to Align with EU AI Rules
📢
US government, allies publish guidance on how to safely deploy AI agents
📢
Announcing the ISO 31000:2018 Risk Management on AWS Compliance Guide
🔥
A Ransomware Negotiator Was Working for a Ransomware Gang
🔥
Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks
KEV
🔥
Two American Cybersecurity Workers Jailed for BlackCat Ransomware Attacks
🔥
Cyber incident responders who carried out ransomware attacks given 4-year sentences
🔥
30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign
🔥
The new speed of cyber defense with Andrew Carr from Booz Allen
🕵️
ISC Stormcast For Friday, May 1st, 2026 https://isc.sans.edu/podcastdetail/9914, (Fri, May 1st)
🕵️
Identity is the control plane for distributed infrastructure
🕵️
Ruby Gems and Go Modules Used in Campaign Targeting GitHub Actions
🕵️
Deep#Door Stealer Targets Passwords, Tokens, SSH Keys, and Wi-Fi Credentials
🕵️
FBI Warns Logistics Sector of Fake Business Identity Cargo Scams
🕵️
CAPTCHA and ClickFix Abuse Fuels Credential Theft Surge
🕵️
New Android Spyware Platform Enables Rebranding and Resale
🕵️
Name That Toon: Mark of (Security) Progress
🕵️
Download: Automating Pentest Delivery Guide
🕵️
Cyber spies target Russian aviation firms to steal satellite and GPS data
🕵️
Samsung’s Next Galaxy Book Could Run Android Instead of Windows
🕵️
US and allies urge ‘careful adoption’ of AI agents
🕵️
German MPs advised to drop Signal in favor of Wire over security concerns
🕵️
As email phishing evolves, malicious attachments decline and QR codes surge
🕵️
OpenAI Introduces Password-Free Login for Millions of ChatGPT Users
🕵️
Microsoft Flagged 8.3B Phishing Emails in Q1 as QR Codes, CAPTCHAs Rise
🕵️
Alert: Payroll-Hijacking Attacks Are Targeting Canadian Employees
🕵️
Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations
🕵️
DOS, Seneca the Younger, Outlook, CopyFail, cPanel, QR, Ruby, Go, Talkie, Josh Marpet - SWN #577
🕵️
White House questions tech industry on defensive AI use, cybersecurity resilience
🕵️
Apple Sales Jump as ‘Most Popular’ iPhone Fuels Growth
🕵️
Breaking encryption with quantum computing — Interview with Chris Peikert
🕵️
76% of All Crypto Stolen in 2026 Is Now in North Korea
📡
Enterprise Spotlight: Transforming software development with AI
📡
Top Five Sales Challenges Costing MSPs Cybersecurity Revenue
📡
20 Years in Cyber: Dark Reading Marks Milestone With Month of Special Coverage
📡
Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks
📡
Carding service Jerry’s Store leak exposes 345,000 stolen payment cards
📡
Ubuntu services hit by outages after DDoS attack
📡
If AI's So Smart, Why Does It Keep Deleting Production Databases?
📡
Senate Judiciary advances bill that would bar minors from interacting with AI companions
📡
Digital attacks drive a new wave of cargo theft, FBI says
📡
Malicious Ad for Homebrew Leads to MacSync Stealer, (Fri, May 1st)
📡
Security posture improvement in the AI era
📡
Social Engineering Leveled Up. Has Your Security Program?
🚨
Copy Fail (CVE-2026-31431): Frequently asked questions about Linux kernel privilege escalation vulnerabilityA flaw in the Linux kernel present since 2017 allows a local user to gain root access on virtually every major Linux distribution. A public exploit is available and reported to work reliably. Key Takeaways CVE-2026-31431 is a high severity local privilege escalation vulnerability…
KEV
🐛
Linux Kernel 0-Day “Copy Fail” Grants Root Access Across Major Distros Since 2017
🐛
ProFTPD SQL Injection Flaw Opens Door To Remote Code Execution Attacks
🐛
CVE-2017-3731 Truncated packet could crash via OOB read
🐛
CVE-2026-31545 NFC: nxp-nci: allow GPIOs to sleep
🐛
CVE-2026-31546 net: bonding: fix NULL deref in bond_debug_rlb_hash_show
🐛
CVE-2026-6357 pip self-update functionality can import newly installed modules after wheel installation
🐛
CVE-2026-41603 Apache Thrift: Java TSSLTransportFactory hostname verification
🐛
CVE-2026-41607 Apache Thrift: C++ JSON OOB read
🐛
CVE-2026-41636 Apache Thrift: Node.js skip() recursion
🐛
CVE-2026-34477 Apache Log4j Core: verifyHostName attribute silently ignored in TLS configuration, allowing hostname verification bypass
🐛
CVE-2026-31429 net: skb: fix cross-cache free of KFENCE-allocated skb head
🐛
CVE-2026-41305 PostCSS has XSS via Unescaped </style> in its CSS Stringify Output
🐛
CVE-2026-3298 Out-of-bounds write in Windows asyncio.ProacterEventLoop.sock_recvfrom_into() when using nbytes
🐛
CVE-2026-31508 net: openvswitch: Avoid releasing netdev before teardown completes
🐛
CVE-2026-31540 drm/i915/gt: Check set_default_submission() before deferencing
🐛
CVE-2026-6238 Buffer overread in ns_printrrf with corrupted RDATA field
🐛
CVE-2026-31499 Bluetooth: L2CAP: Fix deadlock in l2cap_conn_del()
🐛
CVE-2025-48431 Apache Thrift: Specially crafted input can crash a c_glib Thrift server with invalid pointer error.
🐛
CVE-2026-41602 Apache Thrift: Go TFramedTransport uint32 overflow
🐛
CVE-2026-41604 Apache Thrift: Swift Range crash in skip()
🐛
CVE-2026-41605 Apache Thrift: Swift Compact Protocol integer overflow
🐛
CVE-2026-41606 Apache Thrift: c_glib dispatch stack overflow
🐛
New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions
🐛
Attackers Exploit cPanel Authentication Bypass 0-Day After PoC Release
KEV
🐛
Critical cPanel zero-day auth bypass exploited since February
KEV
🐛
CVE-2019-1551 rsaz_512_sqr overflow bug on x86_64
🐛
PoC Disclosed for Critical Root ASUSTOR ADM RCE Flaw
🐛
Nine-year-old Linux kernel flaw enables reliable local privilege escalation (CVE-2026-31431)
🐛
“Copy Fail” gives root access to all Linux systems via 732-byte exploit
🐛
cPanel zero-day exploited for months before patch release (CVE-2026-41940)
🐛
Copy Fail: New Linux bug enables Root via page‑cache corruption
🐛
cPanel’s authentication bypass bug is being exploited in the wild, CISA warns
KEV
⚠️
Amazon Layoffs Hit Thousands Across Multiple States as Fresh Stores Close
⚠️
Microsoft Confirms Windows Flaw Is Being Exploited After Incomplete Patch
⚠️
Researchers unearth industrial sabotage malware that predated Stuxnet by 5 years
⚠️
SonicWall SonicOS Flaw Lets Attackers Bypass Access Controls and Crash Firewalls
⚠️
A game of loans.
⚠️
Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution
⚠️
Qinglong Task Scheduler RCE Flaws Exploited in the Wild
KEV
⚠️
Jenkins Plugin Updates Fix Path Traversal and Stored XSS Bugs
⚠️
SAP npm package attack highlights risks in developer tools and CI/CD pipelines
⚠️
Stopping the quiet drift toward excessive agency with re-permissioning
⚠️
ODNI to CISOs on threat assessments: You’re on your own
⚠️
Max-severity RCE flaw found in Google Gemini CLI
⚠️
New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials
⚠️
Dismantle implicit trust in OT networks, CISA tells critical infrastructure operators
⚠️
Cisco releases open-source toolkit for verifying AI model lineage
⚠️
Met Police face criticism for using AI to spy on their own officers
⚠️
Hackers arrested for stealing and reselling 600,000 Roblox accounts
⚠️
AI Is Scaling Cyber Attacks
⚠️
Arbitrary code execution and Claude Code CLI: How Claude executed code before you click 'trust'
⚠️
"Copy Fail" flaw leads to privilege escalation on Linux.
⚠️
Agent’s claims on WhatsApp access spark security concerns
⚠️
Hackers are actively exploiting a bug in cPanel, used by millions of websites
⚠️
Bridging the gap: How to integrate Claude Security into the Tenable One Exposure Management Platform
⚠️
Another AI-Assisted Software Scan Yields 9-Year-Old Linux Bug
⚠️
FIRESTARTER - PSW #924
⚠️
When Trusted Sites Turn Malicious
⚠️
That AI Extension Helping You Write Emails? It’s Reading Them First
⚠️
Bank regulator sounds warning over cybersecurity threat posed by AI models
📢
EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades
📢
CISA and Partners Publish Zero Trust Guidance For OT Security
📢
Zambia cancels global digital freedoms conference days before start
📢
Hackers earning millions from hijacked cargo, FBI says
🔥
Compromised SAP npm Packages Found Harvesting Developer and CI/CD Secrets
🔥
Operation Winter SHIELD: What the FBI Wants Industry to Do Now
🔥
Meta accused of violating DSA by failing to safeguard minors
🔥
Why Your Email Security Needs a Global Human Network to Close the Detection Gap
🔥
Moldova’s health insurance agency reports possible data leak after cyberattack
🔥
UK: Education Sector Faces Surge in Cyber Breaches Despite Stable National Threat Levels
🔥
Anti-DDoS Firm Heaped Attacks on Brazilian ISPs
🔥
France investigates 15-year-old over alleged hack of national ID agency
🔥
France arrests 15-year-old hacker who stole data of 11.7 million people
🔥
PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials
🔥
TeamPCP Hits SAP Packages With 'Mini Shai-Hulud' Attack
🔥
Former incident responders sentenced to 4 years in prison for committing ransomware attacks
KEV
🕵️
Danger of Libredtail &#x5b;Guest Diary&#x5d;, (Wed, Apr 29th)
🕵️
Tesla Optimus Robot Launch Timeline Targets 2027 Scale
🕵️
ISC Stormcast For Thursday, April 30th, 2026 https://isc.sans.edu/podcastdetail/9912, (Thu, Apr 30th)
🕵️
Large-scale Roblox hacking operation shut down by Ukrainian authorities
🕵️
Backdoored WordPress Plugin Abuses Remote Update Checker for Silent Code Delivery
🕵️
Everyone’s building AI agents. Almost nobody’s ready for what they do to identity.
🕵️
Fast16 Malware
🕵️
OpenAI Unveils Cyber Defense Roadmap Focused on AI-Powered Security
🕵️
Microsoft PowerToys 0.99 Adds Multi-Monitor Tools for Windows Users
🕵️
Release Notes: Expanded Threat Intelligence Access, AI Assisted Search 1,770 New Detections and More
🕵️
5 Best Employer of Record Services in 2026
🕵️
Researchers develop tool to expose GPS signal spoofing in transit networks
🕵️
Proxmox Backup Server 4.2 arrives with S3 storage support and parallel sync jobs
🕵️
Two new extortion crews are speedrunning the Scattered Spider playbook
🕵️
PwC partners with Google Cloud to take on the managed security market
🕵️
How to Design Security for Agentic AI
🕵️
SHARED INTEL Q&A: PKI’s unfinished business—’digital passports’ for content, models and agents
🕵️
US agencies promote zero-trust practices for operational technology networks
🕵️
AWS Expands Amazon Connect Into AI Tools for Hiring, Healthcare, and Supply Chains
🕵️
Congress kicks the can down the road on surveillance law (again)
🕵️
FCC tightens KYC rules for telecoms, closes loophole for banned foreign services
🌐
Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India
🌐
Cyber is the Number One Global “People Risk,” Says Marsh
🌐
Exposed Data Illustrates the Nightmare Scenario for a Stalkerware Victim
🌐
ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories
🌐
Deep#Door Python Backdoor Evades Detection On Windows
🌐
Three Arrested for Hacking Over 610,000 Roblox Accounts
📡
Claude Mythos Fears Startle Japan's Financial Services Sector
📡
All rise for the Chatrie.
📡
Iran-linked Handala hackers leak US Marines data, send chilling WhatsApp threats
📡
Europol Busts Albanian Scam Call Centers in Major Online Fraud Case
📡
Post-quantum encryption for Cloudflare IPsec is generally available
📡
Oracle Red Bull Racing Team Revs Up Automation to Boost Security
📡
Dental practice software maker fixes bug that exposed patients’ medical records
📡
Hackers stole hundreds of thousands of Roblox accounts: Here’s what to do
📡
Trump’s cyber ambassador nominee advances to full Senate vote
📡
OpenAI Rolls Out ‘Advanced’ Security Mode for At-Risk Accounts
📡
After dissing Anthropic for limiting Mythos, OpenAI restricts access to Cyber, too
📡
Great responsibility, without great power
📡
More PayPal emails hijacked to deliver tech support scams
📡
One copy too many.
📡
Geofence Supreme Court case kicks off.
📡
Anthropic's Mythos Has Landed: Here's What Comes Next for Cyber
📡
Congress punts FISA renewal to June
🚨
U.S. CISA adds Microsoft Windows Shell and ConnectWise ScreenConnect flaws to its Known Exploited Vulnerabilities catalogU.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Windows Shell and ConnectWise ScreenConnect flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Windows Shell and ConnectWise ScreenConnect f…
KEV
🚨
CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEVThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities are l…
KEV
🚨
CISA adds Microsoft, ConnectWise vulnerabilities to active exploitation catalogRussia has used one of the flaws, security experts said, while North Korea has used the other.
🐛
LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure
🐛
GitHub.com and Enterprise Server Vulnerability Allows Remote Code Execution
🐛
CISA Warns of Windows Shell Zero-Day Exploited in Attacks
KEV
🐛
CVE-2026-24051 OpenTelemetry-Go Affected by Arbitrary Code Execution via PATH Hijacking
🐛
CVE-2017-3735
🐛
CVE-2017-3736
🐛
CVE-2019-1547 ECDSA remote timing attack
🐛
CVE-2019-1549 Fork Protection
🐛
CVE-2019-1563 Padding Oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey
🐛
CVE-2026-31686 mm/kasan: fix double free for kasan pXds
🐛
CVE-2026-41898 rust-openssl: Unchecked callback-returned length in PSK and cookie generate trampolines can cause OpenSSL to leak adjacent memory to the network peer
🐛
CVE-2026-33999 Xorg: xwayland: x.org x server: denial of service via integer underflow in xkb compatibility map handling
🐛
CVE-2026-31689 EDAC/mc: Fix error path ordering in edac_mc_alloc()
🐛
CVE-2026-31688 driver core: enforce device_lock for driver_match_device()
🐛
CVE-2026-31548 wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down
🐛
CVE-2026-31549 i2c: cp2615: fix serial string NULL-deref at probe
🐛
CVE-2026-31550 pmdomain: bcm: bcm2835-power: Increase ASB control timeout
🐛
CVE-2026-31551 wifi: mac80211: Fix static_branch_dec() underflow for aql_disable.
🐛
CVE-2026-31552 wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom
🐛
CVE-2026-31584 media: mediatek: vcodec: fix use-after-free in encoder release path
🐛
CVE-2026-31661 wifi: brcmsmac: Fix dma_free_coherent() size
🐛
CVE-2026-31563 net: macb: Use dev_consume_skb_any() to free TX SKBs
🐛
CVE-2026-31648 mm: filemap: fix nr_pages calculation overflow in filemap_map_pages()
🐛
CVE-2026-40225
🐛
CVE-2026-5435 Potential buffer overflow in ns_sprintrrf TSIG handling path
🐛
CVE-2026-40556 Insecure Directory Permissions in GNU nano Leading to Privilege Abuse
🐛
CVE-2026-6861 Emacs: emacs: memory corruption vulnerability when processing svg css
🐛
CVE-2026-2708 Libsoup: libsoup: http request smuggling via duplicate content-length headers
🐛
CVE-2026-6732 Libxml2: libxml2: denial of service via crafted xsd-validated document
🐛
CVE-2026-6019 BaseCookie.js_output() does not neutralize embedded characters
🐛
CVE-2026-34001 Xorg: xwayland: x.org x server: use-after-free vulnerability leads to server crash and potential memory corruption
🐛
CVE-2026-34003 Xorg: xwayland: x.org x server: information exposure and denial of service via out-of-bounds memory access
🐛
CISA, Microsoft warn of active exploitation of Windows Shell vulnerability (CVE-2026-32202)
🐛
CVE-2026-3854 Exposes a Critical Weak Point in GitHub’s Git Push Pipeline
🐛
CISA Warns of ConnectWise ScreenConnect Flaw Exploited in Attacks
KEV
🐛
Critical GitHub RCE bug exposed millions of repositories
🐛
CVE-2026-42208: LiteLLM bug exploited 36 hours after its disclosure
🐛
CVE-2026-41940: cPanel & WHM Authentication Bypass
KEV
⚠️
CI/CD pipeline abuse: the problem no one is watching
⚠️
More fake extensions linked to GlassWorm found in Open VSX code marketplace
⚠️
Product showcase: SimpleX Chat removes user identifiers from messaging
⚠️
Massive Python Supply Chain Hack, $2.1B Scam Losses, North Korea Targets Crypto Execs
⚠️
cPanel Releases Emergency Patch for Critical Authentication Flaw
⚠️
Risky Business #835 -- Why the Fast16 malware is badass
⚠️
Vimeo Confirms Data Breach After Hackers Access User Database
⚠️
ShinyHunters exploit Anodot incident to target Vimeo
⚠️
Virtue AI PolicyGuard turns AI policies into enforceable runtime guardrails
⚠️
SLOTAGENT Malware Hides API Calls and Strings to Thwart Analysis
⚠️
DigitalOcean AI-Native Cloud unifies infrastructure, inference, and agents for production AI
⚠️
Claude Mythos Has Found 271 Zero-Days in Firefox
⚠️
Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately
⚠️
AWS leans on prior ingenuity to face future AI and quantum threats
⚠️
The Next Frontier: Autonomous Security and RSAC Interviews from Quantro & SandboxAQ - BSW #445
⚠️
Cursor AI Coding Agent Vulnerability Lets Attackers Run Code on Developers’ Machines
⚠️
U.S. Charges Suspected Scattered Spider Member Over Cyber Intrusions
⚠️
Extending Ruzzy with LibAFL
⚠️
Cursor AI Extension Flaw Exposes Developer Tokens to Credential Theft
⚠️
Mastering agentic AI security through exposure management
⚠️
Experts on Experts: The 2026 Threat Landscape is Moving Faster than Defenders Expect
⚠️
Microsoft won&#8217;t patch PhantomRPC: Feature or bug?
⚠️
All supported cPanel versions hit by critical auth bug, now patched
⚠️
Swiss police arrest 10 suspected members of Nigeria-linked crime group Black Axe
⚠️
AI Speeds Up Cyber Attacks
⚠️
AI Finds 38 Security Flaws in Electronic Health Record Platform
⚠️
What It Takes to Run Marketing Solo with Sara Ceballos, Director of Marketing at BreachRx
⚠️
A wake-up call on frontier AI.
⚠️
Reverse Engineering With AI Unearths High-Severity GitHub Bug
⚠️
Five Things we Took Away from Gartner SRM Sydney 2026
📋
Microsoft Confirms Remote Desktop Warning Issue After April Update
📢
amazee.ai’s amazeeClaw simplifies production deployment of AI agents with regional control
📢
Alleged Silk Typhoon hacker extradited to the United States to face charges
📢
Sri Lanka discloses another missing payment, days after hackers stole $2.5M from its finance ministry
🔥
BlueNoroff Deploys Fileless PowerShell in AI-Generated Zoom Lure Campaign
🔥
Vect 2.0 RaaS Expands Attacks Across Windows, Linux, and ESXi
🔥
LofyStealer Targets Minecraft Players via Node.js Loader and Browser Injection
🔥
VECT 2.0 Ransomware Wipes Large Files Across Windows, Linux & ESXi
🔥
Critical Flaw Turns Vect Ransomware into Data Destroying Wiper
🔥
Researchers Track 2.9 Billion Compromised Credentials
🔥
OpenAI and Anthropic brief Congress on cyber-capable AI models.
🔥
European Commission accuses Meta of breaching child safety rules
🔥
Vect 2.0 Ransomware Acts as Wiper, Thanks to Design Error
🔥
SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware
🔥
Google AppSheet abused to compromise 30,000 Facebook accounts
🔥
Smashing Security podcast #465: This developer wanted to cheat at Roblox. It cost millions
🕵️
ISC Stormcast For Wednesday, April 29th, 2026 https://isc.sans.edu/podcastdetail/9910, (Wed, Apr 29th)
🕵️
The Exchange Online security controls organizations keep getting wrong
🕵️
AI prompt confidentiality and false citations worry researchers
🕵️
Identity discovery: The overlooked lever in strategic risk reduction
🕵️
Fedora Linux 44 ships with GNOME 50 and KDE Plasma 6.6
🕵️
Margin vs. Madness: Fixing MSSP Top 5 Operational Nightmares
🕵️
Eino’s agentic network observability platform enables real-time, AI-driven network insights
🕵️
Microchip expands Trust Shield with PQC-ready root of trust and secure boot controllers
🕵️
Kaseya agentic IT management unifies data and automates ticketing, security and backups
🕵️
At Machine Speed
🕵️
AI-powered honeypots: Turning the tables on malicious AI agents
🕵️
Scam-checking just got a lot easier: Malwarebytes is now in Claude
🕵️
9 Best Project Management Software in 2026
🕵️
State CISOs losing confidence in ability to manage cyber risks
🕵️
Apple removes AdGuard’s TrustTunnel iOS app from Russian App Store
🕵️
Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks
🕵️
Phishing Attacks Target Executives via Microsoft Teams
🕵️
Lazarus Targets macOS Users With New “Mach-O Man” Malware Kit
🕵️
A Practical Guide to BloodHound Data Collection
🕵️
Set AI Security Red Lines Now
🕵️
This $30 Subscription Will Bring AI Into Your Business
🕵️
Congress, industry ponder government posture for protecting data centers
🕵️
SAS Launches AI Governance Tools to Tame Agentic AI in the Enterprise
🕵️
AWS to Resell OpenAI Products After Microsoft Loses Exclusive License
🕵️
New Apple Rumor: iOS 27 Could Add AI Editing Tools to Photos
🕵️
Hackers Abuse Robinhood Signup Process to Deliver Phishing Emails
🕵️
CISOs Step Into the Boardroom
🌐
Lotus Wiper Attack Targeted Venezuelan Energy Firms, Utilities
🌐
New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs
📡
Weekly Threat Bulletin – April 29th, 2026
📡
A Quarter of Healthcare Organizations Report Medical Device Cyber-Attacks
📡
What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)
📡
Today's Odd Web Requests, (Wed, Apr 29th)
📡
Malicious npm Dependency Linked to AI Assisted Commit Targets Crypto Wallets
📡
What Is Dark Web Monitoring?
📡
Cursor Extension Flaw Exposes Developer API Keys
📡
Internet censorship index reveals Russia’s lead and widespread content blocking
📡
Vehicle-based surveillance tools | Kaspersky official blog
📡
Designing trust and safety into Amazon Bedrock powered applications
📡
Cloudsmith raises $72 million in Series C funding.
📡
US, China partner on scam center takedown in Dubai
📡
Researchers built a chatbot that only knows the world before 1931
📡
House approves spy program on second attempt, Senate fate murky
🐛
Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202
KEV
🐛
Critical LiteLLM Flaw Enables Database Attacks Through SQL Injection
🐛
Notepad++ Vulnerability Lets Attackers Crash App and Expose Memory Data
🐛
Infected Cisco firewalls need cold start to clear persistent Firestarter backdoor
🐛
Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE
🐛
Hugging Face LeRobot Flaw Opens Door to Remote Code Execution Attacks
🐛
Critical Cursor bug could turn routine Git into RCE
🐛
Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push
🐛
CVE-2026-3854 GitHub flaw enables remote code execution
⚠️
Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover
⚠️
ClickUp Security Flaw Exposes 959 Emails Linked to Major Fortune 500 Firms
⚠️
Claude Opus 4.6-Powered AI Coding Agent Wipes Production Database in 9 Seconds
⚠️
What CISOs need to get right as identity enters the agentic era
⚠️
Stopping AiTM attacks: The defenses that actually work after authentication succeeds
⚠️
Top 10 Web Hacking Techniques of 2025 and a Hint for 2026 - James Kettle - ASW #380
⚠️
Building Resilience in a World of Constant Threats
⚠️
Vimeo suffers 3rd-party breach exposing user data, hackers threaten leak
⚠️
MDR Selection is a Partnership Decision
⚠️
After Mythos: New Playbooks For a Zero-Window Era
⚠️
Securing RAG pipelines in enterprise SaaS
⚠️
What Anthropic’s Mythos Means for the Future of Cybersecurity
⚠️
Microsoft fixes Entra ID flaw enabling privilege escalation
⚠️
HTTP Requests with X-Vercel-Set-Bypass-Cookie Header, (Tue, Apr 28th)
⚠️
Securing the git push pipeline: Responding to a critical remote code execution vulnerability
⚠️
Signal Phishing Campaign Targets German Officials in Suspected Russian Operation
⚠️
Get Motivated: What to Expect from Our Keynote at Rapid7's Global Cybersecurity Summit
⚠️
Access control with IAM Identity Center session tags
⚠️
A Vulnerability in OpenSSH Could Allow for Authentication Bypass
⚠️
Why Sharing a Screenshot Can Get You Jailed in the UAE
⚠️
Pitney Bowes confirms Salesforce breach after hacker leaks 25 million records
⚠️
Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
⚠️
Oracle Quarterly Critical Patches Issued April 21, 2026
⚠️
Vidar Rises to Top of Chaotic Infostealer Market
⚠️
Spy agency officials say job loss anxiety, moving fast ‘safely’ among top challenges in AI workforce overhaul
📋
Fake Tax Audits and Updates Fuel Silver Fox Malware Campaign
📢
French police arrest 21-year-old “HexDex” hacker over 100 alleged data breaches
📢
No Metrics Are Better Than Bad Metrics in the SOC, Says NCSC
📢
NCSC launches SilentGlass, a plug-in device to secure HDMI and DisplayPort links
📢
Signal to roll out anti-phishing safeguards following account takeovers
📢
War hits where it hurts.
🔥
Weekly Update 501
🔥
Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks
🔥
Proofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in Place
🔥
Checkmarx Confirms Security Incident Involving GitHub Repository Exposure
🔥
Ransomware Turf War as 0APT and KryBit Groups Trade Blows
🔥
VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi
🔥
Iran war updates.
🔥
Medtronic Confirms Data Breach After ShinyHunters Claims
🔥
VECT: Ransomware by design, Wiper by accident
🔥
Video site Vimeo blames security incident on Anodot breach
🔥
ADT Confirms Major Data Breach Exposing Millions of Names, Partial SSNs
🔥
What the March 2026 Threat Technique Catalog update means for your AWS environment
🔥
Feuding Ransomware Groups Leak Each Other's Data
🕵️
Chinese national extradited to US for pandemic-era Silk Typhoon attacks
🕵️
ISC Stormcast For Tuesday, April 28th, 2026 https://isc.sans.edu/podcastdetail/9908, (Tue, Apr 28th)
🕵️
Microsoft Expands Copilot Agent Mode for Outlook Inbox and Calendar Tasks
🕵️
Chinese-Backed Smishing Rings Scale Credential Theft via SMS and OTT Apps
🕵️
Sandworm Uses SSH-over-Tor Tunnel for Stealthy Long-Term Persistence
🕵️
WhatsApp Tests Encrypted Cloud Backup Service for Safer Message Storage
🕵️
OilRig Hides C2 Config in Google Drive Image via LSB Steganography
🕵️
Fake KYC Android Malware Spreads via WhatsApp to Hijack Bank Accounts
🕵️
GUEST ESSAY: How augmented reality (AR) can turn building images into ad space with no control
🕵️
U.S. companies hit with record fines for privacy in 2025
🕵️
North Korean Hackers Target Crypto Firms with ClickFix and AI-Made Zoom Lures
🕵️
Google Cloud Next AI Keynote: 5 Takeaways for IT Leaders
🕵️
Best Legal Project Management Software in 2026
🕵️
Fake CAPTCHA scam turns a quick click into a costly phone bill
🕵️
Silk Typhoon Hacker Extradited to U.S. from Italy
🕵️
Phishing-to-RMM Attacks: The Remote Access Blind Spot CISOs Can’t Ignore
🕵️
Chinese National Extradited Over Silk Typhoon Cyber Campaign
🕵️
5 Stages of The Threat Intelligence Lifecycle
🕵️
CyberheistNews Vol 16 #17 [Heads Up] This Sophisticated Scam Should Be a Warning to All Companies
🕵️
AI’s False Novelty Trap
🕵️
Rep. Delia Ramirez takes over as top House cybersecurity Dem
🕵️
‘Fundamental tension’ undermines manufacturers’ cybersecurity
🕵️
Stop Juggling AI Tools — This Lifetime Deal Puts GPT‑4o and More in One Place
🕵️
Visual Studio 2026 Brings AI Deeper Into Development and It’s 90% Off Right Now
🕵️
50k on YouTube!
🕵️
50K Subscribers. This is Security Weekly.
🕵️
Apple’s $599 Mac mini Sells Out, Resurfaces on eBay Above Retail
🕵️
Google, Kaggle Relaunch Free AI Course Focused on ‘Vibe Coding’
🕵️
Samsung Galaxy Glasses Leak: Pricing, Specs, and Launch Timeline Revealed
🕵️
‘Windows K2’ Could Be Microsoft’s Answer to Years of Windows 11 Frustration
🕵️
Xpeng Flying Car Deliveries Target 2027 as Certification Gaps Remain
🕵️
ORMs Reopened Injection Risks
🕵️
Police arrest 10 suspected members of Black Axe cybercrime gang
🕵️
Federal CIO cautious on Anthropic’s Mythos despite planned rollout
🕵️
Elfsmasher, PYPI, Facebook, Glassworm, Medtronic, OpenSSH, Sararimen, Aaran Leyland - SWN #576
🕵️
ClickUp Data Leak Exposes Enterprise Emails for Over a Year
🕵️
BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
🕵️
Play-to-Earn Collapse Risk
🕵️
FIDO Alliance wants to keep AI agents from going rogue on online payments
🕵️
SN 1076: FAST16.SYS - Unmasking the NSA's Most Diabolical Digital Sabotage
🌐
New Android spyware Morpheus linked to Italian surveillance firm
🌐
Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About
🌐
Fresh Wave of GlassWorm VS Code Extensions Slices Through Supply Chain
🌐
Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign
🌐
Paragon is not collaborating with Italian authorities probing spyware attacks, report says
📡
Chinese engineer stole US military and NASA software for years
📡
From DMV to Wallet: Understanding Verifiable Digital Credential Issuance
📡
The Hunt for American Turncoats in World War II Europe
📡
From the Kaiser to the Führer: Inside the World of Lothar Witzke
📡
A practical guide to secure vibe-coding for small businesses | Kaspersky official blog
📡
Five defender priorities from the Talos Year in Review
📡
Ukrainian police detain hackers suspected of stealing thousands of Roblox accounts for resale
📡
The Race Is on to Keep AI Agents From Running Wild With Your Credit Cards
📡
US Supreme Court appears split over controversial use of ‘geofence’ search warrants
📡
Cyber Command, NSA chief warns foreign adversaries likely to target midterms
📡
NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later
🚨
As the NVD scales back CVE enrichment, here’s what Tenable customers need to knowNIST’s shift toward selective CVE enrichment creates significant visibility gaps for teams relying solely on the National Vulnerability Database. As AI accelerates vulnerability disclosure rates, organizations need independent, high-fidelity intelligence to prioritize risks that …
KEV
🚨
TeamPCP Supply Chain Campaign: Update 008 - 26-Day Pause Ends with Three Concurrent Compromises (Checkmarx KICS, Bitwarden CLI Cascade, xinference PyPI), CanisterSprawl npm Worm Identified, and Tier 1 Coverage Returns, (Mon, Apr 27th)This update succeeds&#;x26;#;xc2;&#;x26;#;xa0; TeamPCP Supply Chain Campaign Update 007 , published April 8, 2026, which left the campaign in credential-monetization mode following the Cisco source code theft via Trivy-linke…
KEV
🐛
CVE-2018-0734 Timing attack against DSA
🐛
CVE-2018-0735 Timing attack against ECDSA signature generation
🐛
Nessus Agent Windows Flaw Enables SYSTEM-Level Code Execution
🐛
Metabase Enterprise RCE Flaw Now Has Public Proof-of-Concept Exploit
🐛
AI is reshaping DevSecOps to bring security closer to the code
🐛
Firefox bug CVE-2026-6770 enabled cross-site tracking and Tor fingerprinting
⚠️
Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud
⚠️
Critical Gemini CLI Flaw Raises Supply Chain Security Concerns
⚠️
Attackers Chain CODESYS Vulnerabilities to Backdoor Applications
⚠️
ADT - 5,488,888 breached accounts
⚠️
U.S. utility giant Itron discloses a security breach
⚠️
25 open-source cybersecurity tools that don’t care about your budget
⚠️
Product showcase: LuLu reveals unauthorized outbound connections from Mac apps
⚠️
OpenClaw Flaws Expose Systems to Policy Bypass Attacks
⚠️
The ‘manager of agents’: How AI evolves the SOC analyst role
⚠️
Rethinking Security from the OS Up in the Age of AI and more RSAC 2026 Interviews - ESW #456
⚠️
Fake Income Tax Notices Used to Spread Malware
⚠️
Itron Discloses Data Breach After Hackers Access Internal Systems
⚠️
Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side
⚠️
PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks
⚠️
Microsoft patched an ‘agent-only’ role that was not
⚠️
27th April – Threat Intelligence Report
⚠️
EU Proposes Forcing Google to Share Search Data With Rivals Under DMA
⚠️
US, UK authorities warn that Firestarter backdoor malware survives patching
⚠️
Medical device giant Medtronic confirms data breach incident
⚠️
Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack
⚠️
Unpatched 'PhantomRPC' Flaw in Windows Enables Privilege Escalation
⚠️
Optimize security operations through an AWS Security Hub POC
⚠️
Open source package with 1 million monthly downloads stole user credentials
📋
Microsoft Releases Enterprise Policy Option to Disable Windows 11 Copilot
📢
TLS Connect gives SMBs a right-sized automated tool to manage TLS certificates
🔥
Cyber Weapon in Toronto, Grid Attack, Stuxnet Lie Exposed
🔥
Critical infrastructure giant Itron says it was hacked
🔥
Hackers impersonate Microsoft Teams help desk to breach corporate networks
🔥
Utilities Tech Supplier Itron Discloses Cyber-Attack, Operations Unaffected
🔥
LINKEDIN BROWSERGATE
🔥
FIRESIDE CHAT: Leaked secrets are now the go-to attack vector — and AI is accelerating exposures
🔥
Ransomware Uses Your Own Permissions
🔥
Major critical infrastructure supplier reports cyberattack
🔥
Senators seek answers about hackers obtaining sensitive student data from ostensibly anonymous tip line
🔥
Hacker who allegedly carried out cyberattacks for China is extradited to U.S.
🔥
Simplicity Stops Data Exfiltration
🔥
Medtronic discloses security incident after ShinyHunters claimed theft of 9M+ records
🔥
The Supreme Court sits on the geofence.
🔥
Pitney Bowes - 8,243,989 breached accounts
🕵️
NPM Worm Hits Namastex Packages, Steals Secrets Across Registries
🕵️
ClickFix Attack Swaps PowerShell for Cmdkey, Remote Regsvr32 Payloads
🕵️
Vidar Malware Conceals Payloads in JPEG, TXT Files to Evade Detection
🕵️
Fast16 Malware Targets High-Value Systems With Sabotage Capabilities
🕵️
Suspicious Microsoft Store App Vibing.exe Allegedly Harvests Screens and Audio
🕵️
Italy moves to extradite Chinese national to the U.S. over hacking charges
🕵️
Aptori expands its platform with autonomous offensive testing to reduce security bottlenecks
🕵️
Your IAM was built for humans, AI agents don’t care
🕵️
The AI criminal mastermind is already hiring on gig platforms
🕵️
North Korean Hackers Target Pharma Firms with Malware-Laced Excel Attacks
🕵️
Why I Chose This $19.97 Lifetime Deal Over MasterClass
🕵️
7 Best Project Budgeting Software in 2026
🕵️
Linux ELF Malware Generator Evades ML Detection With Semantic-Preserving Changes
🕵️
Researchers Warn macOS textutil, KeePassXC Can Fuel Automation Attacks
🕵️
Medieval Encrypted Letter Decoded
🕵️
Price Drop: Upgrade to Windows 11 Pro for Only $10
🕵️
New Malware Hides Behind Obfuscation and Staged Payloads
🕵️
Fake YouTube Downloads Spread Vidar Malware to Steal Corporate Logins
🕵️
Anthropic Draws Google’s $40B Bet in Latest AI Megadeal
🕵️
Get Lifetime Access to Microsoft Office 2021 for Just $30
🕵️
BlackFile actively extorting data-theft victims in retail and hospitality sector
🕵️
New Hack Lets 30-Year-Old Windows PCs Run Modern Linux
🕵️
China’s Honor Just Launched an iPhone Lookalike in Europe
🕵️
Apple Watch Blood Oxygen Monitoring Gets Major Breakthrough
🕵️
EU’s proposed Google data access rule could enable large-scale surveillance
🕵️
EU Funds Sovereign Cloud Infrastructure with €180 Million Contract
🕵️
China Startup Secures $8.4B in Credit Lines for Orbital Data Center Push
🕵️
The Prompt Engineering Cheat Sheet: How to Write Better AI Prompts
🕵️
China Shuts Down Meta’s $2.5B Bid for AI Startup Manus
🕵️
Apple ‘Ultra’ 2026: A New iPhone, MacBook Tier May Be Coming
🕵️
Truecaller Faces New Pressure in India as Growth Matures
🕵️
WhatsApp to End Support for Millions of Older Android Phones in 2026
🕵️
UNC6692 Combines Social Engineering, Malware, Cloud Abuse
🕵️
Supreme Court justices skeptically question both sides in geofence surveillance case
🌐
A week in security (April 20 &#8211; April 26)
🌐
Fast16: Pre-Stuxnet malware that targeted precision engineering software
🌐
Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet
🌐
Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware
🌐
20-Year-Old Malware Rewrites History of Cyber Sabotage
🌐
⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More
🌐
Phishing crypto-wallet clones in the App Store and other attacks on iOS and macOS crypto owners | Kaspersky official blog
📡
When security becomes the attack surface: Why endpoint protection must evolve
📡
BlackFile Group Targets Retail and Hospitality with Vishing Attacks
📡
Most Cybersecurity Professionals Feel Undervalued and Underpaid
📡
Parsing Agentic Offensive Security's Existential Threat
📡
Widely Used Browser Extensions Selling User Data
📡
Chinese spy posed as researcher in spear-phishing campaign targeting NASA to steal defense software
📡
US Sanctions Target Cambodian Scam Network Leaders
📡
Disinformation campaign targeted Tibetan parliament-in-exile elections
📡
Italy extradites alleged Chinese state hacker to US
📡
Can I do that with policy? Understanding the AWS Service Authorization Reference
📡
US Supreme Court weighs legality of geofence warrants.
📡
Money launderer for crypto thieves given 5-year sentence
📡
Cole Allen Charged With Attempting to Assassinate Trump
📡
Supreme Court signals location data searches should require a warrant
📡
Tennessee becomes second state to ban cryptocurrency ATMs over scam concerns
🚨
Security Affairs newsletter Round 574 by Pierluigi Paganini – INTERNATIONAL EDITIONA new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. U.S. CISA adds SimpleHelp, Sa…
KEV
🐛
CVE-2022-2068 The c_rehash script allows command injection
🐛
CVE-2026-31619 ALSA: fireworks: bound device-supplied status before string array lookup
🐛
CVE-2026-41079 OpenPrinting CUPS: Heap out-of-bounds read in SNMP supply-level polling leaks stack memory to authenticated users
🐛
CVE-2026-31557 nvmet: move async event work off nvmet-wq
🐛
CVE-2026-31606 usb: gadget: f_hid: don't call cdev_init while cdev in use
🐛
CVE-2026-31646 net: lan966x: fix page_pool error handling in lan966x_fdma_rx_alloc_page_pool()
🐛
CVE-2026-31620 ALSA: usx2y: us144mkii: fix NULL deref on missing interface 0
🐛
CVE-2026-31593 KVM: SEV: Reject attempts to sync VMSA of an already-launched/encrypted vCPU
🐛
CVE-2026-31667 Input: uinput - fix circular locking dependency with ff-core
🐛
CVE-2026-31590 KVM: SEV: Drop WARN on large size for KVM_MEMORY_ENCRYPT_REG_REGION
🐛
CVE-2026-31618 fbdev: tdfxfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO
🐛
CVE-2026-31617 usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb()
🐛
CVE-2026-31589 mm: call ->free_folio() directly in folio_unmap_invalidate()
🐛
CVE-2026-31660 nfc: pn533: allocate rx skb before consuming bytes
🐛
CVE-2026-31605 fbdev: udlfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO
🐛
CVE-2026-31566 drm/amdgpu: Fix fence put before wait in amdgpu_amdkfd_submit_ib
🐛
CVE-2026-31599 media: vidtv: fix NULL pointer dereference in vidtv_channel_pmt_match_sections
🐛
CVE-2026-31602 ALSA: ctxfi: Limit PTP to a single page
🐛
CVE-2026-31637 rxrpc: reject undecryptable rxkad response tickets
🐛
CVE-2026-31570 can: gw: fix OOB heap access in cgw_csum_crc8_rel()
🐛
CVE-2026-31624 HID: core: clamp report_size in s32ton() to avoid undefined shift
🐛
CVE-2026-31651 mmc: vub300: fix NULL-deref on disconnect
🐛
CVE-2026-23420 wifi: wlcore: Fix a locking bug
🐛
CVE-2026-31672 wifi: rt2x00usb: fix devres lifetime
🐛
CVE-2026-23422 dpaa2-switch: Fix interrupt storm after receiving bad if_id in IRQ handler
🐛
CVE-2026-31565 RDMA/irdma: Fix deadlock during netdev reset with active connections
🐛
CVE-2026-31621 bnge: return after auxiliary_device_uninit() in error path
🐛
CVE-2026-31626 staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify()
🐛
CVE-2026-31663 xfrm: hold dev ref until after transport_finish NF_HOOK
🐛
CVE-2026-31615 usb: gadget: renesas_usb3: validate endpoint index in standard request handlers
🐛
CVE-2026-31610 ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc
🐛
CVE-2026-41066 lxml: Default configuration of iterparse() and ETCompatXMLParser() allows XXE to local files
🐛
CVE-2026-31645 net: lan966x: fix page pool leak in error paths
🐛
CVE-2026-41907 uuid: Missing buffer bounds check in `v3`/`v5`/`v6` when `buf` is provided
🐛
CVE-2026-41411 Vim: Command injection via backtick expansion in tag filenames
🐛
CVE-2026-31598 ocfs2: fix possible deadlock between unlink and dio_end_io_write
🐛
CVE-2026-31537 smb: server: make use of smbdirect_socket.send_io.bcredits
🐛
CVE-2026-23414 tls: Purge async_hold in tls_decrypt_async_wait()
🐛
CVE-2026-31603 staging: sm750fb: fix division by zero in ps_to_hz()
🐛
CVE-2026-31608 smb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list()
🐛
CVE-2026-31611 ksmbd: require 3 sub-authorities before reading sub_auth[2]
🐛
CVE-2026-32147 SFTP chroot bypass via path traversal in SSH_FXP_FSETSTAT
🐛
CVE-2026-31600 arm64: mm: Handle invalid large leaf mappings correctly
🐛
CVE-2026-41676 rust-openssl: Deriver::derive and PkeyCtxRef::derive can overflow short buffers on OpenSSL 1.1.1
🐛
CVE-2026-31627 i2c: s3c24xx: check the size of the SMBUS message before using it
🐛
CVE-2026-31671 xfrm_user: fix info leak in build_report()
🐛
CVE-2026-31560 spi: spi-dw-dma: fix print error log when wait finish transaction
🐛
CVE-2026-41678 rust-openssl: Incorrect bounds assertion in aes key wrap
🐛
CVE-2026-31612 ksmbd: validate EaNameLength in smb2_get_ea()
🐛
CVE-2026-31568 s390/mm: Add missing secure storage access fixups for donated memory
🐛
CVE-2026-31587 ASoC: qcom: q6apm: move component registration to unmanaged version
🐛
CVE-2026-31575 mm/userfaultfd: fix hugetlb fault mutex hash calculation
🐛
CVE-2026-31662 tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG
🐛
CVE-2026-31580 bcache: fix cached_dev.sb_bio use-after-free and crash
🐛
CVE-2026-41681 rust-openssl: MdCtxRef::digest_final() writes past caller buffer with no length check
🐛
CVE-2026-31639 rxrpc: Fix key reference count leak from call->key
🐛
CVE-2026-31657 batman-adv: hold claim backbone gateways by reference
🐛
CVE-2026-31591 KVM: SEV: Lock all vCPUs when synchronzing VMSAs for SNP launch finish
🐛
CVE-2026-31629 nfc: llcp: add missing return after LLCP_CLOSED checks
🐛
CVE-2026-31579 wireguard: device: use exit_rtnl callback instead of manual rtnl_lock in pre_exit
🐛
CVE-2026-31628 x86/CPU: Fix FPDSS on Zen1
🐛
CVE-2026-31630 rxrpc: proc: size address buffers for %pISpc output
🐛
CVE-2026-31655 pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled
🐛
CVE-2026-31685 netfilter: ip6t_eui64: reject invalid MAC header for all packets
🐛
CVE-2026-31649 net: stmmac: fix integer underflow in chain mode
🐛
CVE-2026-31669 mptcp: fix slab-use-after-free in __inet_lookup_established
🐛
CVE-2026-31680 net: ipv6: flowlabel: defer exclusive option free until RCU teardown
🐛
CVE-2026-31576 media: hackrf: fix to not free memory after the device is registered in hackrf_probe()
🐛
CVE-2026-31678 openvswitch: defer tunnel netdev_put to RCU release
🐛
CVE-2026-31595 PCI: endpoint: pci-epf-vntb: Stop cmd_handler work in epf_ntb_epc_cleanup
🐛
CVE-2026-31681 netfilter: xt_multiport: validate range encoding in checkentry
🐛
CVE-2026-31586 mm: blk-cgroup: fix use-after-free in cgwb_release_workfn()
🐛
CVE-2026-31578 media: as102: fix to not free memory after the device is registered in as102_usb_probe()
🐛
CVE-2026-31682 bridge: br_nd_send: linearize skb before parsing ND options
🐛
CVE-2026-31659 batman-adv: reject oversized global TT response buffers
🐛
CVE-2026-31625 HID: alps: fix NULL pointer dereference in alps_raw_event()
🐛
CVE-2026-31679 openvswitch: validate MPLS set/set_masked payload length
🐛
CVE-2026-31674 netfilter: ip6t_rt: reject oversized addrnr in rt_mt6_check()
🐛
CVE-2026-31673 af_unix: read UNIX_DIAG_VFS data under unix_state_lock
🐛
CVE-2026-31664 xfrm: clear trailing padding in build_polexpire()
🐛
CVE-2026-31622 NFC: digital: Bounds check NFC-A cascade depth in SDD response handler
🐛
CVE-2026-31597 ocfs2: fix use-after-free in ocfs2_fault() when VM_FAULT_RETRY
🐛
CVE-2026-31592 KVM: SEV: Protect *all* of sev_mem_enc_register_region() with kvm->lock
🐛
CVE-2026-31656 drm/i915/gt: fix refcount underflow in intel_engine_park_heartbeat
🐛
CVE-2026-23401 KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE
🐛
CVE-2026-31555 futex: Clear stale exiting pointer in futex_lock_pi() retry path
🐛
CVE-2026-31607 usbip: validate number_of_packets in usbip_pack_ret_submit()
🐛
CVE-2026-31536 smb: server: let send_done handle a completion without IB_SEND_SIGNALED
🐛
CVE-2026-31583 media: em28xx: fix use-after-free in em28xx_v4l2_open()
🐛
CVE-2026-31638 rxrpc: Only put the call ref if one was acquired
🐛
CVE-2026-31574 clockevents: Add missing resets of the next_event_forced flag
KEV
🐛
CVE-2026-31596 ocfs2: handle invalid dinode in ocfs2_group_extend
🐛
CVE-2026-31581 ALSA: 6fire: fix use-after-free on disconnect
🐛
CVE-2026-31604 wifi: rtw88: fix device leak on probe failure
🐛
CVE-2026-31585 media: vidtv: fix nfeeds state corruption on start_streaming failure
🐛
CVE-2026-31577 nilfs2: fix NULL i_assoc_inode dereference in nilfs_mdt_save_to_shadow_map
🐛
CVE-2026-41140 Poetry: Path traversal in tar extraction on Python 3.10.0 - 3.10.12 and 3.11.0 - 3.11.4
🐛
CVE-2026-31665 netfilter: nft_ct: fix use-after-free in timeout object destroy
🐛
CVE-2026-31670 net: rfkill: prevent unlimited numbers of rfkill events from being created
🐛
CVE-2026-31642 rxrpc: Fix call removal to use RCU safe deletion
🐛
CVE-2026-31613 smb: client: fix OOB reads parsing symlink error response
🐛
CVE-2026-31623 net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete()
🐛
CVE-2026-31594 PCI: endpoint: pci-epf-vntb: Remove duplicate resource teardown
🐛
CVE-2026-31609 smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush()
🐛
CVE-2026-41677 rust-openssl: Out-of-bounds read in PEM password callback when user callback returns an oversized length
🐛
CVE-2026-31616 usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete()
🐛
CVE-2026-31601 vfio/xe: Reorganize the init to decouple migration from reset
🐛
CVE-2026-31668 seg6: separate dst_cache for input and output paths in seg6 lwtunnel
🐛
CVE-2026-31582 hwmon: (powerz) Fix use-after-free on USB disconnect
🐛
CVE-2026-31676 rxrpc: only handle RESPONSE during service challenge
🐛
CVE-2026-31588 KVM: x86: Use scratch field in MMIO fragment to hold small write values
🐛
CVE-2026-31677 crypto: af_alg - limit RX SG extraction by receive buffer budget
🐛
CVE-2026-31675 net/sched: sch_netem: fix out-of-bounds access in packet corruption
🐛
CVE-2026-31634 rxrpc: fix reference count leak in rxrpc_server_keyring()
🐛
CVE-2026-31684 net: sched: act_csum: validate nested VLAN headers
🐛
CVE-2026-31658 net: altera-tse: fix skb leak on DMA mapping error in tse_start_xmit()
🐛
CVE-2026-23394 af_unix: Give up GC if MSG_PEEK intervened.
🐛
CVE-2026-23362 can: bcm: fix locking for bcm_op runtime updates
🐛
CVE-2026-31788 xen/privcmd: restrict usage in unprivileged domU
🐛
CVE-2026-23360 nvme: fix admin queue leak on controller reset
🐛
Critical bug in CrowdStrike LogScale let attackers access files
⚠️
Week in review: Claude Mythos finds 271 Firefox flaws, Vercel breach
🔥
Trigona ransomware adopts custom tool to steal data and evade detection
🔥
Udemy - 1,401,259 breached accounts
🕵️
XChat launches standalone iOS app as security concerns remain
🕵️
GopherWhisper: new China-linked APT targets Mongolia with Go-based malware
🕵️
Npm Slop & Wonky Software Supply Chains
🌐
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 94
📡
California Engineer Identified in Suspected Shooting at White House Correspondents' Dinner
🚨
CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal DeadlineThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added four vulnerabilities impacting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link DIR-823X series routers to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.…
KEV
🚨
U.S. CISA adds SimpleHelp, Samsung, and D-Link flaws to its Known Exploited Vulnerabilities catalogU.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SimpleHelp, Samsung, and D-Link flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added SimpleHelp, Samsung, and D-Link flaws to its Known Exploi…
KEV
🐛
CVE-2026-41080
🐛
CVE-2026-23438 net: mvpp2: guard flow control update with global_tx_fc in buffer switching
🐛
CVE-2026-23439 udp_tunnel: fix NULL deref caused by udp_sock_create6 when CONFIG_IPV6=n
🐛
CVE-2026-23446 net: usb: aqc111: Do not perform PM inside suspend callback
🐛
CVE-2026-23447 net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check
🐛
CVE-2026-5450 scanf %mc off-by-one heap buffer overflow
🐛
CVE-2026-23428 ksmbd: fix use-after-free of share_conf in compound request
🐛
CVE-2026-23434 mtd: rawnand: serialize lock/unlock against other NAND operations
🐛
CVE-2026-41205 Mako: Path traversal via double-slash URI prefix in TemplateLookup
🐛
CVE-2025-13763 Libopensc: opensc: multiple uses of uninitialized variable
🐛
Over 400,000 sites at risk as hackers exploit Breeze Cache plugin flaw (CVE-2026-3844)
⚠️
The Patch Gap Is the Problem
⚠️
Governments and industry race to harness AI for vulnerability discovery.
⚠️
Firefox is quietly experimenting with Brave’s ad-blocking engine
📢
CISA reports persistent FIRESTARTER backdoor on Cisco ASA device in federal network
🔥
Discord Sleuths Gained Unauthorized Access to Anthropic’s Mythos
🌐
Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software
🎙️
Cybersecurity Today Weekend: Deepfakes, the Death of Truth, and Verifying AI in the Enterprise
📡
Monitoring Claude Code/Cowork at scale with OTel in Elastic
📡
A QRazy clever scam.
🐛
Hackers Track 900+ React2Shell Exploits via Telegram Bots
🐛
Hackers Exploit Ollama Model Uploads to Leak Server Data
🐛
CVE-2026-5958 Race Condition in GNU Sed
🐛
CVE-2026-31531 ipv4: nexthop: allocate skb dynamically in rtm_get_nexthop()
🐛
CVE-2026-41989
🐛
CVE-2026-41988
🐛
CVE-2026-31532 can: raw: fix ro->uniq use-after-free in raw_rcv()
🐛
Python Vulnerability Enables Out-of-Bounds Write on Windows
🐛
LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure
🐛
Hackers Exploit Cisco Firepower N-Day Flaws for Unauthorized Access
🐛
12-year-old Pack2TheRoot bug lets Linux users gain root privileges
🐛
Metasploit Wrap-Up 04/25/2026
⚠️
Inside The Vercel Supply Chain Exploit
⚠️
Hackers Exploit SS7 and Diameter Flaws to Track Mobile Users Globally
⚠️
PhantomRPC: A new privilege escalation technique in Windows RPC
⚠️
Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2
⚠️
Xiongmai IP Camera Flaw Lets Attackers Bypass Authentication
⚠️
Hackers Exploit Pastebin PowerShell Script to Hijack Telegram Sessions
⚠️
Firefox flaw enables cross-site tracking, undermines Tor Browser defenses
⚠️
Hackers Exploit Agent ID Administrator Role to Hijack Service Principals
⚠️
UK Biobank Data Breach: Health Data of 500,000 Listed for Sale in China
⚠️
3 Reasons to Attend our Global Cybersecurity Summit if you’re Focused on AI, Threats, and CTEM
⚠️
CIS Control Becomes Law
⚠️
FIRESTARTER malware remained on Cisco devices after patches were applied.
⚠️
Meta’s Biggest Layoff of 2026 Is Confirmed to Start Next Month
⚠️
CISA last in line for access to Anthropic Mythos
⚠️
New US House privacy bills raise hard questions about enterprise data collection
⚠️
When Updates Turn Into Malware
📢
Chinese attackers are pwning your infrastructure to use in attacks, 10 countries warn
📢
Chinese attackers are pwning your infrastructure to use in attacks, 10 countries warn
📢
China-linked threat actors use consumer device botnets to evade detection, warn UK and partners
📢
Compromised everyday devices power Chinese cyber espionage operations
📢
New Cisco firewall malware can only be killed by pulling the plug
📢
Norway's prime minister proposes ban on social media access for young teens
📢
NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software
📢
FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches
📢
Iran’s cyber threat may be less ‘shock and awe’ than ‘low and slow,’ officials say
📢
A digital battlefield in practice.
📢
Latest spy power reauthorization bill leaves critics unimpressed
🔥
Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Attack
🔥
Carnival - 7,531,359 breached accounts
🔥
Ransomware Gang Unveils Custom Data-Theft Tool
🔥
Hackers Impersonate IT Helpdesk Staff to Breach Firms via Microsoft Teams
🔥
Bitwarden CLI Compromised After Malicious GitHub Actions Workflow
🔥
China-Linked Hackers Hide Behind Compromised Routers
🔥
AI is speeding up nation-state cyber programs
🔥
Checkmarx supply chain attack impacts Bitwarden npm distribution path
🔥
AI Phishing Is No. 1 With a Bullet for Cyberattackers
🔥
Signal phishing campaign targets Germany’s Bundestag President Julia Klöckner
🔥
Hasbro expects March cyberattack to impact second-quarter revenue
🔥
Scattered Spider co-conspirator pleads guilty
🔥
ADT says customer data stolen in cyber intrusion
🔥
ADT confirms data breach after hacker claims 10 million records stolen
🕵️
ISC Stormcast For Friday, April 24th, 2026 https://isc.sans.edu/podcastdetail/9906, (Fri, Apr 24th)
🕵️
PLC Cybersecurity — Securing Industrial Control Systems
🕵️
Turn Your iPad Into a Work Machine While This Keyboard Case Is $30 Off
🕵️
Sign, Send, and Manage Documents Online for Just $79
🕵️
Ubuntu 26.04 LTS delivers memory-safe system tools and live patching for Arm servers
🕵️
OpenAI’s GPT-5.5 is out with expanded cybersecurity safeguards
🕵️
Void Dokkaebi Hackers Spread Malware Through Fake Job Interviews
🕵️
Covert telecom spying campaign “Ghost Operators” tracks users worldwide
🕵️
Meta is overhauling how you sign in, manage settings, and protect your accounts
🕵️
Fake CAPTCHA Scam Triggers Costly SMS Fraud
🕵️
Hiding Bluetooth Trackers in Mail
🕵️
GPT-5.5 Bio Bug Bounty Program Aims to Improve AI Safety and Performance
🕵️
Claude Desktop Reportedly Adds Browser Access Bridge for Chromium Browsers
🕵️
Mythos Mystery in Mozilla Numbers: How 22 Vulns Became 271 or Maybe 3 in April
🕵️
Inside agenteV2: How Brazilian Attackers Use Fake Court Summons to Steal Banking Credentials in Real Time
🕵️
Off-Topic Friday
🕵️
North Korea's Lazarus Targets macOS Users via ClickFix
🕵️
Windows 10 Support Is Over. Here Are 6 Options for Users
🕵️
US lawmakers introduce bill to require warrants for government data searches
🕵️
Health Records of 500,000 UK Biobank Volunteers Listed Online in China
🕵️
TGR-STA-1030: New Activity in Central and South America
🕵️
Friday Squid Blogging: How Squid Survived Extinction Events
🕵️
Scylla &Charybdis, Kyber, Trigonia, Namastex, GitHub, Crypto, Cables, Aaran Leyland - SWN #575
🕵️
The npm Threat Landscape: Attack Surface and Mitigations
🕵️
DeepSeek Drops Cheaper V4 AI as Huawei Jumps In
🌐
Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation
🌐
26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases
🌐
Another spyware maker caught distributing fake Android snooping apps
📡
Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine
📡
Medical data of 500,000 UK volunteers listed for sale on Alibaba
📡
AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns
📡
Toronto police arrest three in Canada’s first mobile SMS blaster case
📡
The Latest Push to Extend Key US Spy Powers Is Still a Mess
📡
Glasswing Secured the Code. The Rest of Your Stack Is Still on You
📡
Pentagon grapples with securing AI as it moves toward autonomous warfare
📡
Protecting your secrets from tomorrow’s quantum risks
📡
US Busts Myanmar Ring Targeting US Citizens in Financial Fraud
📡
Eavesdropping via fiber-optic cables | Kaspersky official blog
🚨
U.S. CISA adds a flaw in Microsoft Defender to its Known Exploited Vulnerabilities catalogThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Microsoft Defender to its Known Exploited Vulnerabilities catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in Microsoft Defender, tracked as CVE-2026-33825 (CVSS s…
KEV
🐛
CVE-2026-27820 zlib: Buffer Overflow in Zlib::GzipReader ungetc via large input leads to memory corruption
🐛
CVE-2026-5928 Static buffer overflow in deprecated nis_local_principal
🐛
CVE-2026-35239
🐛
CVE-2026-34271
🐛
CVE-2026-35238
🐛
CVE-2026-34267
🐛
CVE-2026-22005
🐛
CVE-2026-22015
🐛
CVE-2026-31452 ext4: convert inline data to extents when truncate exceeds inline size
🐛
CVE-2026-31455 xfs: stop reclaim before pushing AIL during unmount
🐛
CVE-2026-31476 ksmbd: do not expire session on binding failure
🐛
CVE-2026-31474 can: isotp: fix tx.buf use-after-free in isotp_sendmsg()
🐛
CVE-2026-31464 scsi: ibmvfc: Fix OOB access in ibmvfc_discover_targets_done()
🐛
CVE-2026-31461 drm/amd/display: Fix drm_edid leak in amdgpu_dm
🐛
CVE-2026-31441 dmaengine: idxd: Fix memory leak when a wq is reset
🐛
CVE-2026-31454 xfs: save ailp before dropping the AIL lock in push callbacks
🐛
CVE-2026-31432 ksmbd: fix OOB write in QUERY_INFO for compound requests
🐛
CVE-2026-31502 team: fix header_ops type confusion with non-Ethernet ports
🐛
CVE-2026-31495 netfilter: ctnetlink: use netlink policy range checks
🐛
CVE-2026-31448 ext4: avoid infinite loops caused by residual data
🐛
CVE-2026-31439 dmaengine: xilinx: xdma: Fix regmap init error handling
🐛
CVE-2026-31477 ksmbd: fix memory leaks and NULL deref in smb2_lock()
🐛
CVE-2026-31530 cxl/port: Fix use after free of parent_port in cxl_detach_ep()
🐛
CVE-2026-31480 tracing: Fix potential deadlock in cpu hotplug with osnoise
🐛
CVE-2026-31512 Bluetooth: L2CAP: Validate PDU length before reading SDU length in l2cap_ecred_data_rcv()
🐛
CVE-2026-31450 ext4: publish jinode after initialization
🐛
CVE-2026-31493 RDMA/efa: Fix use of completion ctx after free
🐛
CVE-2026-31521 module: Fix kernel panic when a symbol st_shndx is out of bounds
🐛
CVE-2026-41445 KissFFT Integer Overflow Heap Buffer Overflow via kiss_fftndr_alloc()
🐛
CVE-2026-5358 Static buffer overflow in deprecated nis_local_principal
🐛
CVE-2026-34278
🐛
CVE-2026-21998
🐛
CVE-2026-35237
🐛
CVE-2026-22009
🐛
CVE-2026-34270
🐛
CVE-2026-34293
🐛
CVE-2026-22002
🐛
CVE-2026-22017
🐛
CVE-2026-34303
🐛
CVE-2026-34308
🐛
CVE-2026-34304
🐛
CVE-2026-34276
🐛
CVE-2026-22004
🐛
CVE-2026-22001
🐛
CVE-2026-35240
🐛
CVE-2026-35236
🐛
CVE-2026-40706
🐛
CVE-2026-3219 pip doesn't reject concatenated ZIP and tar archives
🐛
CVE-2026-40890 github.com/gomarkdown/markdown: Out-of-bounds Read in SmartypantsRenderer
🐛
CVE-2026-31524 HID: asus: avoid memory leak in asus_report_fixup()
🐛
CVE-2026-31486 hwmon: (pmbus/core) Protect regulator operations with mutex
🐛
CVE-2026-31487 spi: use generic driver_override infrastructure
🐛
CVE-2026-31496 netfilter: nf_conntrack_expect: skip expectations in other netns via proc
🐛
CVE-2026-31515 af_key: validate families in pfkey_send_migrate()
🐛
CVE-2026-31516 xfrm: prevent policy_hthresh.work from racing with netns teardown
🐛
CVE-2026-31488 drm/amd/display: Do not skip unrelated mode changes in DSC validation
🐛
CVE-2026-31527 driver core: platform: use generic driver_override infrastructure
🐛
CVE-2026-31506 net: bcmasp: fix double free of WoL irq
🐛
CVE-2026-31458 mm/damon/sysfs: check contexts->nr before accessing contexts_arr[0]
🐛
CVE-2026-31504 net: fix fanout UAF in packet_release() via NETDEV_UP race
🐛
CVE-2026-31462 drm/amdgpu: prevent immediate PASID reuse case
🐛
CVE-2026-31523 nvme-pci: ensure we're polling a polled queue
🐛
CVE-2026-31497 Bluetooth: btusb: clamp SCO altsetting table indices
🐛
CVE-2026-31440 dmaengine: idxd: Fix leaking event log memory
🐛
CVE-2026-31505 iavf: fix out-of-bounds writes in iavf_get_ethtool_stats()
🐛
CVE-2026-31431 crypto: algif_aead - Revert to operating out-of-place
🐛
CVE-2026-31489 spi: meson-spicc: Fix double-put in remove path
🐛
CVE-2026-31469 virtio_net: Fix UAF on dst_ops when IFF_XMIT_DST_RELEASE is cleared and napi_tx is false
🐛
CVE-2026-31510 Bluetooth: L2CAP: Fix null-ptr-deref on l2cap_sock_ready_cb
🐛
CVE-2026-31449 ext4: validate p_idx bounds in ext4_ext_correct_indexes
🐛
CVE-2026-31482 s390/entry: Scrub r12 register on kernel entry
🐛
CVE-2026-31518 esp: fix skb leak with espintcp and async crypto
🐛
CVE-2026-31446 ext4: fix use-after-free in update_super_work when racing with umount
🐛
CVE-2026-31520 HID: apple: avoid memory leak in apple_report_fixup()
🐛
CVE-2026-31519 btrfs: set BTRFS_ROOT_ORPHAN_CLEANUP during subvol create
🐛
CVE-2026-31433 ksmbd: fix potencial OOB in get_file_all_info() for compound requests
🐛
CVE-2026-31485 spi: spi-fsl-lpspi: fix teardown order issue (UAF)
🐛
CVE-2026-31483 s390/syscalls: Add spectre boundary for syscall dispatch table
🐛
CVE-2026-31507 net/smc: fix double-free of smc_spd_priv when tee() duplicates splice pipe buffer
🐛
CVE-2026-31500 Bluetooth: btintel: serialize btintel_hw_error() with hci_req_sync_lock
🐛
CVE-2026-31447 ext4: reject mount if bigalloc with s_first_data_block != 0
🐛
CVE-2026-31444 ksmbd: fix use-after-free and NULL deref in smb_grant_oplock()
🐛
CVE-2026-31522 HID: magicmouse: avoid memory leak in magicmouse_report_fixup()
🐛
CVE-2026-31478 ksmbd: replace hardcoded hdr2_len with offsetof() in smb2_calc_max_out_buf_len()
🐛
CVE-2026-31509 nfc: nci: fix circular locking dependency in nci_close_device
🐛
CVE-2026-31451 ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio
🐛
CVE-2026-31528 perf: Make sure to use pmu_ctx->pmu for groups
🐛
CVE-2026-31503 udp: Fix wildcard bind conflict check when using hash2
🐛
CVE-2026-31498 Bluetooth: L2CAP: Fix ERTM re-init and zero pdu_len infinite loop
🐛
CVE-2026-31453 xfs: avoid dereferencing log items after push callbacks
🐛
CVE-2026-31525 bpf: Fix undefined behavior in interpreter sdiv/smod for INT_MIN
🐛
CVE-2026-31467 erofs: add GFP_NOIO in the bio completion if needed
🐛
CVE-2026-31492 RDMA/irdma: Initialize free_qp completion before using it
🐛
CVE-2026-31494 net: macb: use the current queue number for stats
🐛
CVE-2026-31473 media: mc, v4l2: serialize REINIT and REQBUFS with req_queue_mutex
🐛
CVE-2026-6507 Dnsmasq: dnsmasq: denial of service due to out-of-bounds write in dhcp bootreply processing
🐛
CVE-2026-28808 ScriptAlias CGI targets bypass directory auth in inets httpd (mod_auth vs mod_cgi path mismatch)
🐛
CVE-2026-6409 Denial of Service (DoS) vulnerability exists in the Protobuf PHP library during the parsing of untrusted input
🐛
CVE-2026-5187 Heap Out-of-Bounds Write in DecodeObjectId() in wolfSSL
🐛
Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case
🐛
Attackers Exploit LMDeploy Flaw in the Wild Within 12 Hours of Advisory
🐛
Apple Patches Exploited Notification Flaw, (Thu, Apr 23rd)
🐛
VU#748485: Unauthenticated configuration modification vulnerability in Central Office Services - Content Hosting Component
🐛
iOS Flaw Let Deleted Notifications Linger, Apple Issues Fix
🐛
UAT-4356's Targeting of Cisco Firepower Devices
⚠️
Malicious pgserve, automagik developer tools found in npm registry
⚠️
Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox
⚠️
Riddled with flaws, serial-to-Ethernet converters endanger critical infrastructure
⚠️
SLAM, scam, thank you ma’am.
⚠️
Apple Patches Privacy Issue Exposing Signal Message Data Through Notifications
⚠️
Claude Mythos Exposes 271 Zero-Day Security Flaws in Firefox
⚠️
Apple fixes iOS privacy flaw that allowed Signal message retrieval
⚠️
Vercel Finds More Compromised Accounts in Context.ai-Linked Breach
⚠️
Microsoft taps Anthropic’s Mythos to strengthen secure software development
⚠️
Researchers Uncover 10 In-the-Wild Prompt Injection Payloads Targeting AI Agents
⚠️
Apple fixes iOS bug that kept deleted notifications, including chat previews
⚠️
[Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed
⚠️
Google gets agent-ready for the Mythos age
⚠️
DNN vulnerability puts 750,000 websites at risk​ | Cybernews
⚠️
Flaw in Microsoft-owned GitHub repository allowed RCE via issue submission | news | SC Media
⚠️
Trailmark turns code into graphs
⚠️
Vercel Confirms Security Breach Affecting Customer Accounts
⚠️
Offer customers passkeys by default, UK’s NCSC tells enterprises
⚠️
House Republicans unveil data privacy law that would override state protections
⚠️
ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories
⚠️
Vercel says some of its customers’ data was stolen prior to its recent hack
⚠️
Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite
⚠️
Sony to enforce age checks for PlayStation users in the UK starting in June
⚠️
Five steps to become Mythos ready
⚠️
Surveillance vendors exploit telecom weaknesses.
⚠️
Luxury cosmetics giant Rituals discloses data breach impacting member personal details
⚠️
Recent Microsoft Defender Vulnerability Exploited as Zero-Day - SecurityWeek
⚠️
Surveillance companies exploiting telecom system to spy on targets’ locations, research shows
⚠️
CISA: US agency breached through Cisco vulnerability, FIRESTARTER backdoor allowed access through March
⚠️
Surveillance campaigns use commercial surveillance tools to exploit long-known telecom vulnerabilities
⚠️
Microsoft Offers First-Ever Retirement Buyouts to Thousands of Employees
⚠️
3 practical ways AI threat detection improves enterprise cyber resilience
⚠️
The curious case of Sean Plankey’s derailed CISA nomination
⚠️
Your signal is showing.
⚠️
Back to (or Start) Fundamentals? - Rajesh Khazanchi - PSW #923
⚠️
AI threats in the wild: The current state of prompt injections on the web
⚠️
Supply Chain Defense Limits
⚠️
Vercel attack fallout expands to more customers and third-party systems
⚠️
Bitwarden CLI password manager trojanized in supply chain attack
📢
NCSC Backs Passkeys, Hailing a New Era of Sign-in
📢
Defending Against China-Nexus Covert Networks of Compromised Devices | CISA
📢
Trump’s pick for CISA director withdraws from consideration
📢
China disguises cyberattacks with ‘covert network’ botnets, US and allies warn
📢
A dozen allied agencies say China is building covert hacker networks out of everyday routers
📢
Trump’s pick to run US cyber agency CISA asks to drop out
📢
US, UK agencies warn hackers were hiding on Cisco firewalls long after patches were applied
🔥
How does AI change the economics of cybercrime?
🔥
Checkmarx KICS Docker Repo Hijacked in Malicious Code Injection Attack
🔥
Breach School
🔥
Xinference PyPI Breach Exposes Developers to Cloud Credential Theft
🔥
Lazarus Lures Developers With Backdoored Coding Tests
🔥
Malicious npm Package Hijacks Hugging Face for Malware Delivery
🔥
RAMP Uncovered: Anatomy of Russia’s Ransomware Marketplace
🔥
Discord-Linked Group Accessed Anthropic’s Claude Mythos AI in Vendor Breach
🔥
Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief Says - SecurityWeek
🔥
Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign
🔥
How cyberattacks on companies affect everyone
🔥
Bitwarden CLI backdoored in Checkmarx supply chain attack
🔥
UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware
🕵️
ISC Stormcast For Thursday, April 23rd, 2026 https://isc.sans.edu/podcastdetail/9904, (Thu, Apr 23rd)
🕵️
Fake TradingView AI Site Spreads Needle Stealer Through Phony TradingClaw App
🕵️
Tropic Trooper Uses Custom Beacon and VS Code Tunnels for Stealthy Remote Access
🕵️
Fake Wallpaper App, YouTube Channel Used to Spread notnullOSX Malware
🕵️
Microsoft Graph API misused by new GoGra Linux malware for hidden communication
🕵️
What Is Square? Pricing, Features & How It Works
🕵️
North Korean Fake IT Workers Infiltrate Firms to Dodge Sanctions
🕵️
Brave brings “Shred” to Android for one-tap tracking data deletion
🕵️
China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors
🕵️
Outlook Mailboxes Used to Conceal Linux GoGra Backdoor Traffic
🕵️
Can AI Attack the Cloud? Lessons From Building an Autonomous Cloud Offensive Multi-Agent System
🕵️
FBI Extracts Deleted Signal Messages from iPhone Notification Database
🕵️
GitLab Fixes Flaws That Could Allow Attackers to Hijack User Sessions
🕵️
Outlook Mailboxes Abused to Conceal Linux GoGra Backdoor Traffic
🕵️
Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens
🕵️
FBI: Americans Lost More Than $20 billion to Fraud Last Year
🕵️
Phishing reclaims the top initial access spot, attackers experiment with AI tools - Help Net Security
🕵️
Microsoft releases emergency patches for critical ASP.NET flaw
🕵️
Cloud Security Isn’t What You Think
🕵️
Apple’s $599 Mac mini Just Sold Out Everywhere
🕵️
AI-written software creates hassles for wary security teams
🕵️
Google’s Pixel Update Sparks ‘Severe’ Battery Drain Across Multiple Models
🕵️
Researcher claims Claude Desktop installs “spyware” on macOS
🕵️
Iran-nexus threat groups refine attacks against critical infrastructure
🕵️
New Pentagon Plan Would Pour $54B Into Drones, AI Combat Systems
🕵️
Apple Fixes iPhone Bug After FBI Retrieved Signal Messages
🕵️
TikTok Invests $1.16 Billion in New Finland Facility to Localize European Data
🕵️
Samsung Galaxy Connect Now Works on Any Windows 11 PC
🕵️
Hackers Use Hidden Website Instructions in New Attacks on AI Assistants
🕵️
India’s App Boom Has a Revenue Problem
🕵️
Dragos: Despite AI use, new malware targeting water plants is ‘hype’
🕵️
Frontier AI and the Future of Defense: Your Top Questions Answered
🌐
TrendAI™’s AI Security Brief podcast joins the N2K CyberWire network.
🌐
China-linked hackers targeted Mongolian government using Slack, Discord for covert communications
🌐
Newly Deciphered Sabotage Malware May Have Targeted Iran’s Nuclear Program—and Predates Stuxnet
📡
Section 702 survives for now.
📡
Roblox clamps down on chats and age checks as legal pressure builds
📡
Cyber-Attacks Surge 63% Annually in Education Sector
📡
Google Introduces Unique AI Agent Identities in New Gemini Enterprise Platform
📡
Project Glasswing Proved AI Can Find the Bugs. Who's Going to Fix Them?
📡
Surveillance vendors caught abusing access to telcos to track people’s phone locations, researchers say
📡
Apple Fixes iOS Notification Bug Exposing Deleted Messages
📡
Medical data of 500,000 Britons put up for sale on Chinese website
📡
Spam and phishing targeting taxpayers | Kaspersky official blog
📡
Google Favors General‑Purpose Gemini Models Over Cybersecurity‑Specific AI
📡
It pays to be a forever student
📡
India drops national ID app mandate.
📡
US sanctions Cambodian senator for millions earned through scam compounds
📡
fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet
🚨
Anthropic bets on EPSS for the coming bug surgeAnthropic’s Mythos has intensified a problem that vulnerability management programs were already struggling to contain: too many vulnerabilities and not enough clarity about which ones matter. What changes with Mythos — and the AI-based class of vulnerability discovery systems it…
KEV
🚨
CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlinessubmitted by kid to cybersecurity 1 points | 0 comments https://thehackernews.com/2026/04/cisa-adds-8-exploited-flaws-to-kev-sets.html
KEV
🐛
Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape
🐛
Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug
🐛
Critical Spring Authorization Server Issue Exposes Systems to XSS and SSRF Attacks
🐛
Critical Bamboo Data Centre and Server Flaw Enables Command Injection Attacks
🐛
Mozilla Firefox 150 Released With Fixes for Multiple Code Execution Vulnerabilities
🐛
VU#518910: Ollama GGUF Quantization Remote Memory Leak
🐛
Microsoft out-of-band updates fixed critical ASP.NET Core privilege escalation flaw
🐛
Mirai Botnet exploits CVE-2025-29635 to target legacy D-Link routers
🐛
Microsoft issues out-of-band patch for critical security flaw in update to ASP.NET Core
🐛
Microsoft Patch Still Leaves 1,300 SharePoint Servers Exposed
⚠️
Vercel Breach Started With AI Tool
⚠️
Microsoft Issues Emergency .NET 10.0.7 Update to Patch Elevation of Privilege Vulnerability
⚠️
1,370+ Microsoft SharePoint Servers at Risk of Spoofing Attacks Found Exposed Online
KEV
⚠️
DinDoor Backdoor Exploits Deno and MSI Installers to Slip Past Detection
⚠️
From Shame to Fame: Changing Behaviors and RSAC Interviews from Tanium and Illumio - BSW #444
⚠️
Risky Business #834 -- Vercel gets owned, Mozilla dumps hundreds of Mythos bugs
⚠️
The AI era demands a different kind of CISO
⚠️
Lotus Wiper Hits Energy Sector in Destructive Cyberattack
⚠️
Mullvad to add feature that forces all iOS traffic through the VPN tunnel
⚠️
Toxic Combinations: When Cross-App Permissions Stack into Risk
⚠️
NFC tap-to-pay gets tapped by hackers
⚠️
Mozilla says Claude’s Mythos AI helped uncover 271 flaws in Firefox
⚠️
109 Fake GitHub Repos Spread SmartLoader, StealC Malware
⚠️
Iran claims US exploited networking equipment backdoors during strikes
⚠️
Unsecured Perforce Servers Expose Sensitive Data From Major Orgs - SecurityWeek
⚠️
Actively exploited Apache ActiveMQ flaw impacts 6,400 servers
KEV
⚠️
Punishment Fails Behavior Change
⚠️
News alert: BreachLock’s integrated attack validation platform debuts in Gartner AEV category
⚠️
Microsoft SharePoint vulnerability widely exposed across multiple countries
⚠️
New Apple Phishing Scam Uses Fake $899 iPhone Purchase Alert
⚠️
DDoS wave continues as Mastodon hit after Bluesky incident
⚠️
Apple fixes bug that cops used to extract deleted chat messages from iPhones
⚠️
The leak was only a matter of time.
📢
Namastex npm Packages Spread TeamPCP-Style CanisterWorm Malware
📢
The Cybercrime Shift: From Opportunistic Attacks to Marketplace-Driven Ecosystem
📢
UK Faces a Cyber ‘Perfect Storm’ Driven by Tech Advances and Nation State Threats, NCSC Warns
📢
IR Trends Q1 2026: Phishing reemerges as top initial access vector, as attacks targeting public administration persist
📢
Iran, Russia and China behind most major cyberattacks on UK, security chief warns
📢
Iran, Russia and China behind most major cyberattacks on UK, security chief warns
📢
New Defense Department cyber strategy imminent, official says
📢
NCSC Unveils SilentGlass, a Plug-In Device to Protect Monitors from Cyber-Attacks
📢
Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens
📢
CISA director pick Sean Plankey withdraws his nomination
📢
House Republicans roll out national privacy bill
📢
Anonymous Competition Drives Executives
📢
Trump’s CISA director pick withdraws after tumultuous nomination
🔥
&#x5b;Guest Diary&#x5d; Beyond Cryptojacking: Telegram tdata as a Credential Harvesting Vector, Lessons from a Honeypot Incident, (Wed, Apr 22nd)
🔥
Exclusive Anthropic Cyber Tool Mythos Accessed by Unapproved Actors
🔥
French Authorities Confirm Data Breach Amid Hackers’ Data Leak Allegations
🔥
Former Ransomware Negotiator Pleads Guilty to Working For BlackCat Cyber Gang
🔥
Ransomware Negotiator Pleads Guilty to BlackCat Scheme
🔥
UK cyber agency handling four major incidents a week as nation-state attacks surge
🔥
French govt agency confirms breach as hacker offers to sell data
🔥
Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000 - SecurityWeek
🔥
Cosmetics giant Rituals confirms data breach of customer membership records
🔥
French police arrest suspected hacker behind dozens of data breaches
🔥
Malicious TikTok Downloader Extensions Quietly Compromised 130K Users
🔥
France confirms data breach at government agency that manages citizens’ IDs
🔥
Smashing Security podcast #464: Rockstar got hacked. The data was junk. The secrets it revealed were not
🕵️
ISC Stormcast For Wednesday, April 22nd, 2026 https://isc.sans.edu/podcastdetail/9902, (Wed, Apr 22nd)
🕵️
Wireshark tutorial: Capture vs. Display Filters
🕵️
Nobody runs a marathon by accident
🕵️
Microsoft-Signed Binary Helps Deliver LOTUSLITE in India Spy Campaign
🕵️
Scale Computing Spotlights Edge Wins in Retail, K-12
🕵️
Amazon, Anthropic Expand Alliance With 5GW Compute Push to Power Claude
🕵️
Hackers Tie Iranian Espionage to CastleRAT and ChainShell
🕵️
Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles
🕵️
Auraboros RAT Adds Live Audio, Keylogging, and Cookie Theft via Open C2 Panel
🕵️
Microsoft warns of fake IT worker identities infiltrating cloud environments
🕵️
Unauthorized Group Gains Access to Anthropic's Exclusive Cyber Tool Mythos
🕵️
When Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks
🕵️
ICE Uses Graphite Spyware
🕵️
French Fintech Accounts Used to Launder Stolen Funds Before Detection
🕵️
NGate NFC malware targets Android users through trojanized payment app - Help Net Security
🕵️
Microsoft Must Face £2.1B UK Cloud Licensing Lawsuit
🕵️
Researchers Uncover SIM Farm-as-a-Service Operation Spanning 87 Panels in 17 Nations
🕵️
Azure SRE Agent flaw lets outsiders silently eavesdrop on enterprise cloud operations | CSO Online
🕵️
Phishing Campaigns Abuse AI Workflow Automation Platforms
🕵️
Malicious Google Ads Hit Crypto Users With Wallet Drainers
🕵️
Downloads falsos do Google Antigravity estão roubando contas em questão de minutos | Malwarebytes
🕵️
More Attack Context for Faster Triage, Response, and Hunting. Now Available to Every SOC
🕵️
What are You Working on Wednesday
🕵️
Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API
🕵️
Phishing — sometimes with AI’s help — topped initial-access methods in Q1, Cisco says
🕵️
Network Engineering Basics
🕵️
Revolut Reportedly Targets $200B IPO Valuation in Huge Fintech Bet
🕵️
The Supreme Court is about to decide how far geofence warrants can go
🕵️
AI Tools Are Helping Mediocre North Korean Hackers Steal Millions
🕵️
Authentication No Longer Means Safe
🕵️
Hackers Impersonate IT Help Desk on Microsoft Teams to Gain Access, Steal Data
🕵️
Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain
🕵️
KelpDAO suffers $290 million heist tied to Lazarus hackers
🕵️
Fake Google Antigravity Installer Can Steal Accounts in Minutes
🕵️
Microsoft: Most Windows 11 Users Don’t Need Third-Party Antivirus
🕵️
Harvester: APT Group Expands Toolset With New GoGra Linux Backdoor
🕵️
AI Demand Is Forcing a Rethink of Data Center Power, Cooling
🕵️
Vonage, Girls Who Code Show What ‘Responsible AI’ Looks Like
🕵️
Mozilla Fixes 271 Firefox Bugs Using Anthropic’s Mythos AI
🕵️
North Korean hackers siphon more than $12 million from crypto users in sprawling campaign
🌐
Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack
🌐
Researcher claims Claude Desktop installs “spyware” on macOS
🌐
Malicious trading website drops malware that hands your browser to attackers
🌐
UK government says 100 countries have spyware that can hack people’s phones
🌐
Targeting developers: real-world cases, tactics, and defense strategies | Kaspersky official blog
🌐
Hackers deployed wiper malware in destructive attacks on Venezuela’s energy sector
🌐
LABScon25 Replay | Are Your Chinese Cameras Spying For You Or On You?
🎙️
Alignment Episode: How Traci Byrne Works Across CISOs, Startups, and Partners
🎙️
The AI-driven gap between innovation and security with Brian Vecci from Varonis
📡
Weekly Threat Bulletin – April 22nd, 2026
📡
Winter 2025 SOC 1 report is now available with 184 services in scope
📡
Venezuela energy sector targeted by highly destructive Lotus wiper
📡
Researchers Uncover ProxySmart Software Powering 90+ SIM Farms
📡
Surge in Silent Subject Phishing Attacks Targets VIP Users
📡
China’s cyber capabilities now equal to the US, warns Dutch intelligence
📡
Critical BRIDGE:BREAK flaws impact Lantronix and Silex Technology converters
📡
UK Commits £90m for Cybersecurity and Pushes for ‘Resilience Pledge’
📡
Unauthorized users gain access to Anthropic's Mythos model.
📡
A technical walkthrough of multicloud full-stack security using AWS Security Hub Extended
📡
MacOS Native Tools Enable Stealthy Enterprise Attacks
📡
Artemis emerges from stealth with $70 million in funding.
🚨
CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal DeadlinesThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including three flaws impacting Cisco Catalyst SD-WAN Manager, citing evidence of active exploitation. The list of vuln…
KEV
🚨
U.S. CISA adds Cisco Catalyst, Kentico Xperience, PaperCut NG/MF, Synacor ZCS, Quest KACE SMA, and JetBrains TeamCity flaws to its Known Exploited Vulnerabilities catalogU.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Cisco Catalyst, Kentico Xperience, PaperCut NG/MF, Synacor ZCS, Quest KACE SMA, and JetBrains TeamCity flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency…
KEV
🚨
Trust Lags Behind Technology.Anthropic’s Mythos proves irresistible despite claimed supply chain risks.Iran claims U.S. backdoors hit its networks. New Coast Guard rules target maritime OT security. A fresh NGate Android malware variant emerges. Thousands of ActiveMQ servers face active exploitation risk. CI…
KEV
🐛
Malicious GGUF Models Could Trigger Remote Code Execution on SGLang Servers
🐛
6,000+ Publicly Exposed Apache ActiveMQ Instances Found Vulnerable to CVE-2026-34197
🐛
CVE-2026-41254
🐛
Apache Syncope RCE Vulnerability Detailed After Public Exploit Code Release
🐛
Azure SRE Agent flaw lets outsiders silently eavesdrop on enterprise cloud operations
🐛
VU#414811: Terrarium contains a vulnerability that allows arbitrary code execution
🐛
VU#890999: Radware Alteon has a reflected XSS vulnerability that can execute JavaScript in the host browser
🐛
Thousands of Apache ActiveMQ instances still unpatched, weeks after an actively exploited hole discovered
KEV
⚠️
Lovable AI App Builder Hit by Reported API Flaw Exposing Thousands of Projects
⚠️
AI-Driven Exploitation Could Shrink Defenders’ Patch Window
⚠️
173: Tarjeteros
⚠️
GitHub Issue Alerts Exploited in OAuth Phishing Scam Targeting Developers
⚠️
CISA Alerts Defenders to Exploited Cisco Catalyst SD-WAN Manager Security Flaws
KEV
⚠️
Bluesky hit by 24-hour DDoS attack as pro-Iran group claims responsibility
⚠️
Top techniques attackers use to infiltrate your systems today
⚠️
The thin gray line: Handala, CyberAv3ngers and Iran’s proxy ops
⚠️
The Human Aspect of Red Teams - Brian Fox, Tom Tovar, T. Gwyddon 'Data' Owen - ASW #379
⚠️
Vercel Confirms Cyber Incident After Sophisticated Attacker Exploits Third‑Party Tool
⚠️
Microsoft spots Sapphire Sleet macOS attack using AppleScript and social engineering
⚠️
Why identity is the driving force behind digital transformation
⚠️
Mythos can find the vulnerability. It can’t tell you what to do about it.
⚠️
No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks
⚠️
Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution
⚠️
UK probes Telegram and other chat apps over child safety failures
⚠️
Prompt injection turned Google’s Antigravity file search into RCE
⚠️
The Vercel breach started at a tool nobody was watching
⚠️
Alert: WhatsApp Phishing Campaign Delivers Malware
⚠️
Phishing and MFA exploitation: Targeting the keys to the kingdom
⚠️
Cloud platform Vercel says company breached through third-party AI tool
⚠️
22 BRIDGE:BREAK Flaws Expose 20,000 Lantronix and Silex Serial-to-IP Converters
⚠️
CISA confirms exploitation of 3 more Cisco networking device vulnerabilities
⚠️
The Ungoverned Workforce: Cybersecurity Insiders Finds 92% Lack Visibility Into AI Identities
⚠️
Security Game Isn’t Fair
⚠️
Mozilla: Anthropic's Mythos found 271 zero-day vulnerabilities in Firefox 150
⚠️
Robosawmill, Gentleman, Vercel, GitHub, Claude, RS232, Josh Marpet, and More... - SWN #574
⚠️
Oracle April 2026 Critical Patch Update Addresses 241 CVEs
⚠️
Former DigitalMint ransomware negotiator pleads guilty to extortion scheme
📢
SideWinder Spoofs Chrome PDF Viewer, Zimbra to Steal Government Webmail Logins
📢
CISA Warns Compromised Axios npm Package Fueled Major Supply Chain Attack
📢
European Commission Moving to Classify ChatGPT as ‘Very Large Online Search Engine’ Under Digital Services Act
📢
CISA urges security teams to view environments following axios compromise
🔥
12 Fraudulent Browser Extensions Disguised as TikTok Downloaders Compromise 130K Users
🔥
Gentlemen RaaS Hits Windows, Linux, and ESXi With New C-Based Locker
🔥
PureRAT Hides PE Payloads in PNGs for Fileless Execution
🔥
Unchecked AI Agents Cause Cybersecurity Incidents at Two Thirds of Firms
🔥
5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time
🔥
The Gentlemen Ransomware Expands With Rapid Affiliate Growth
🔥
Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023
🔥
Ransomware negotiator pleads guilty to helping ransomware gang
🔥
BreachLock Named Representative Vendor in the 2026 Gartner Market Guide for Adversarial Exposure Validation
🔥
Lawmakers ponder terrorism designations, homicide charges over hospital ransomware attacks
🔥
SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation
🔥
Ransomware negotiator caught secretly assisting BlackCat extortion scheme
🔥
Weekly Update 500
🕵️
End of an Era: Tim Cook Steps Down as Apple CEO, John Ternus to Take Over
🕵️
ISC Stormcast For Tuesday, April 21st, 2026 https://isc.sans.edu/podcastdetail/9900, (Tue, Apr 21st)
🕵️
Square POS Review 2026: Pricing, Features, Pros and Cons
🕵️
A .WAV With A Payload, (Tue, Apr 21st)
🕵️
New Lazarus APT Campaign: “Mach-O Man” macOS Malware Kit Hits Businesses
🕵️
North Korean Blamed for $290m KelpDAO Crypto Heist
🕵️
Get Microsoft Office 2024 Plus a Full Training Bundle for Just $114
🕵️
Set Your Business Up With Microsoft Office 2019 & Windows 11 Pro, $26
🕵️
FakeWallet cryptostealer propagating via iOS App Store applications
🕵️
New NGate Android malware variant uses NFC app to steal card data
🕵️
pompelmi – ClamAV antivirus scanning for Node.js, zero dependencies
🕵️
Mexican Surveillance Company
🕵️
NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs
🕵️
AI-Powered NGate Malware Evades Detection Inside NFC Payment Apps
🕵️
Claude Code, Gemini CLI, and GitHub Copilot Exposed to Prompt Injection via GitHub Comments
🕵️
All-in-One PDFtoolkit Unlimited Is $79 (reg. $619)
🕵️
Google’s AI Overviews Produce Hundreds of Millions of Inaccurate Answers Every Day, Analysis Suggests
🕵️
Amazon Deepens Anthropic Partnership, Eyeing Up to $25B as Claude Demand Surges
🕵️
LLMs Push Red Team Boundaries
🕵️
Big banks seek to ease security worries as AI push accelerates
🕵️
67% of Android apps log data not mentioned in their privacy policies
🕵️
This Sophisticated Scam Should Be a Warning To All Companies
🕵️
Leak Points to Google’s ‘Fitbit Air’ as a Screen-Free Wearable for Health Tracking
🕵️
Apple May Drop iOS 27 Support for Four iPhones, Leaving Millions Behind
🕵️
Huawei Just Beat Apple and Samsung to a New Foldable Format in China
🕵️
Google Photos Rolls Out New AI-Powered Portrait Editing Features
🕵️
Quantum Computers Are Not a Threat to 128-bit Symmetric Keys
🕵️
Scottish man pleads guilty to attack spree that created Scattered Spider’s notoriety
🕵️
North Korea’s Lazarus APT stole $290M from Kelp DAO
🕵️
MacBook Neo Cheat Sheet: Everything to Know About Apple’s Budget Mac
🕵️
Intel Handheld Gaming Chip Core G3: Can It Challenge AMD in 2026?
🕵️
Meta Tests Paid WhatsApp Features With New ‘Plus’ Tier
🕵️
Galaxy S27 Could Debut Samsung’s Biggest Battery Upgrade in Years
🕵️
China Deploys Robot Dogs, Drones, and Humanoids to Run a ‘Full-Space’ Metro System
🌐
The US NSA is using Anthropic’s Claude Mythos despite supply chain risk
🌐
Fake Google Antigravity downloads are stealing accounts in minutes
🌐
Trojanized Android App Fuels New Wave of NFC Fraud
📰
Daily Briefing for 04.21.26
🎙️
The Three-Layer Strategy for Autonomous Agent Governance with Joe Hladik and Amit Malik
🎙️
[Podcast] It's not you, it's your printer: State-sponsored and phishing threats in 2025
📡
Bad Apples: Weaponizing native macOS primitives for movement and execution
📡
Android 17 ends all-or-nothing access to your contacts
📡
They Built a Legendary Privacy Tool. Now They’re Sworn Enemies
📡
Real Apple notifications are being used to drive tech support scams
📡
EU targets two Russian propaganda networks with new sanctions
📡
‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty
📡
UK regulator to probe Telegram, teen chat sites for potential child safety violations
📡
Meta Is Sued Over Scam Ads on Facebook and Instagram
📡
Mozilla Used Anthropic’s Mythos to Find and Fix 151 Bugs in Firefox
🐛
Security Researcher Goes To War Against Microsoft
🐛
NIST Adopts Risk-Based NVD Model as CVE Submissions Jump 263% Since 2020
🐛
Copilot & Agentforce offen für Prompt-Injection-Tricks
🐛
Claude Mythos – ist der Hype gerechtfertigt?
🐛
TBK DVR Vulnerability CVE-2024-3721 Exploited to Spread Nexcorium DDoS Malware
🐛
VU#915947: SGLang is vulnerable to remote code execution when rendering chat templates from a model file
🐛
Attackers Exploit DVR Command Injection Flaw to Deploy Mirai-Based Botnet
🐛
CVE-2023-33538 under attack for a year, but exploitation still unsuccessful
🐛
National Vulnerability Database (NVD) Shifts to Selective Enrichment as CVE Volume Surges | Flashpoint
🐛
SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files
⚠️
deleteduser.com - a $15 Personally Identifiable Information (PII) Magnet
⚠️
Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials
⚠️
Vercel Reports Data Breach Amid Claims of Compromised Internal Infrastructure
⚠️
QEMU Hijacked as Stealth Backdoor for Credential Theft, Ransomware
⚠️
Critical Gardyn Flaws Open Smart Garden Devices to Remote Hijacking
⚠️
Handling the CVE Flood With EPSS, (Mon, Apr 20th)
⚠️
Ungepatchte Windows-Zero-Days RedSun, UnDefend und BlueHammer werden attackiert
⚠️
AI Model Claude Opus turns bugs into exploits for just $2,283
⚠️
Angriff auf Next.js-Hersteller Vercel: Kundendaten abgegriffen
⚠️
Making AI actually work in the enterprise and more RSAC Conference 2026 interviews - A... - ESW #455
⚠️
Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain
⚠️
CISOs reshape their roles as business risk strategists
⚠️
Network ‘background noise’ may predict the next big edge-device vulnerability
⚠️
Fracturing Software Security With Frontier AI Models
⚠️
Third-party AI hack triggers Vercel breach, internal environments accessed
⚠️
Anthropic MCP Hit by Critical Vulnerability Enabling Remote Code Execution
⚠️
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched
KEV
⚠️
Attackers abuse Microsoft Teams to impersonate the IT helpdesk in a new enterprise intrusion playbook
⚠️
Hackers exploit Vercel’s trust in AI integration
⚠️
CISA flags Apache ActiveMQ flaw as actively exploited in attacks
KEV
⚠️
Vercel confirms breach as hackers claim to be selling stolen data
⚠️
Gh0st RAT, CloverPlus Hit Victims in Dual-Malware Campaign
⚠️
ShowDoc Vulnerability Patched in 2020 Now Used in Active Server Takeovers
⚠️
⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More
⚠️
App host Vercel says it was hacked and customer data stolen
⚠️
AI Agents Are Insider Risk
⚠️
Fireside Chat: PKI has carried digital trust through every tech advance—now comes the hardest one
⚠️
Vulnerability exploitation surges often precede disclosure, offering possible early warnings
⚠️
Vercel systems targeted after third-party tool compromised
⚠️
Cloud development platform Vercel confirms breach.
⚠️
2026’s Breach List So Far: FBI Hacked, 1B Androids at Risk, 270M iPhones Vulnerable
⚠️
Vercel Confirms Major Security Incident as Hacker Claims $2M Ransom Demand
⚠️
Survey: Security Leaders Emphasize Need for Workforce Education
⚠️
Microsoft Defender Flaws Exploited on Windows, Two Left Unpatched
⚠️
The MCP Disclosure Is the AI Era’s ‘Open Redirect’ Moment
⚠️
When one weak link is enough.
⚠️
The FTC’s AI portfolio is about to get bigger
⚠️
Vercel’s security breach started with malware disguised as Roblox cheats
⚠️
Small Banks at Risk of Collapse
⚠️
Vuln in Google’s Antigravity AI agent manager could escape sandbox, give attackers remote code execution
📢
NCSC Outlines Coordinated Plan to Boost NHS Cyber Resilience
📢
Iran’s MOIS Tied to Coordinated Cyber Campaign Using Multiple Hacker Personas
📢
Minister: Swedish heating plant targeted by pro-Russian cyberattack
📢
Cyberattack at French identity document agency may have exposed personal data
🔥
Fake Helpdesk Attack Uses Teams and Quick Assist to Breach Targets
🔥
British Hacker Admits Stealing Millions in Virtual Currency From Targeted Companies
🔥
JanaWare Ransomware Hits Turkish Users via Tailored Adwind RAT
🔥
DFIR Report – The Gentlemen & SystemBC: A Sneak Peek Behind the Proxy
🔥
Bluesky blames app outage on ‘sophisticated’ DDoS attack
🔥
20th April – Threat Intelligence Report
🔥
Crypto infrastructure company blames $290 million theft on North Korean hackers
🔥
Scattered Spider member Tyler Buchanan pleads guilty to major crypto theft
🔥
Amtrak Data Breach Exposes 2.1M Records, Reports Suggest Larger Leak
🔥
France’s ANTS ID System website hit by cyberattack, possible data breach
🕵️
ISC Stormcast For Monday, April 20th, 2026 https://isc.sans.edu/podcastdetail/9898, (Mon, Apr 20th)
🕵️
Public Notion Pages Expose Editors’ Profile Photos and Email Addresses
🕵️
ZionSiphon Hits Israeli Water Systems With OT Sabotage Malware
🕵️
NSA Confirms Use of Anthropic’s Mythos Despite Pentagon Blacklist
🕵️
Top ERP Software Vendors in 2026
🕵️
Windows 11 Dev Build Introduces Improved Secure Boot Oversight and Storage Security
🕵️
iTerm2 Flaw Turns SSH Escape Sequences Into Arbitrary Code Execution
🕵️
Microsoft-Signed Malware Built With FUD Crypt Packs Persistence and C2
🕵️
MiningDropper Spreads Infostealers, RATs, Banking Malware on Android
🕵️
Is “Satoshi Nakamoto” Really Adam Back?
🕵️
North Korea-Linked UNC1069 Hacks Crypto Pros via Fake Meetings
🕵️
Notion pages have leaked user data via an unauthenticated API since 2022
🕵️
Intel Utility Hijacked in AppDomain Attack to Launch Malware
🕵️
New RecruitRat, SaferRat, Astrinox, Massiv Android Malware Found Targeting 800 Apps
🕵️
Critical sandbox bypass fixed in popular Thymeleaf Java template engine | CSO Online
🕵️
This $20 Career Prep Bundle Teaches Something Others Neglect
🕵️
Why the Axios attack proves AI is mandatory for supply chain security
🕵️
Meta Plans Up to 8,000 Job Cuts in New Round of Layoffs
🕵️
Anthropic secretly installs spyware when you install Claude Desktop
🕵️
Stellantis teams with Microsoft to strengthen digital capabilities
🕵️
Apple’s App Store found hosting ‘FakeWallet’ crypto-stealing apps
🕵️
North Korea hackers blamed for $290M crypto theft
🕵️
Chrome Privacy Concerns Rise as Expert Warns of Fingerprinting Risks
🕵️
Amazon Debuts ‘Slimmest Ever’ Fire TV Stick HD Starting at $34.99
🕵️
Italy fines national postal service $14.7M over invasive data collection
🕵️
Over 800 Android Apps Targeted in PIN-Stealing Trojan Campaign
🕵️
Bad Data Breaks AI Systems
🕵️
Mac Studio 2026: Apple’s New Desktop Faces a Delayed Timeline
🕵️
China’s Robot Half Marathon Was More Than a Stunt
🕵️
This VPN Lets You Verify Your Business Privacy For $130
🌐
A week in security (April 13 &#8211; April 19)
🌐
Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems
🌐
ZionSiphon Malware Targets Water Infrastructure Systems
🌐
Formbook Malware Campaign Uses Multiple Obfuscation Techniques to Avoid Detection
🎙️
Beyond IT: Cybersecurity is a strategic business risk
🎙️
Big Tech can stop scams. They just don&#8217;t (Lock and Code S07E08)
🎙️
Building a unified security ecosystem with Melissa K. Smith from SentinelOne
📡
Microsoft: Update außer der Reihe gegen ungewollte Server-Reboots
📡
Zahlreiche Attacken auf Dell PowerProtect Data Domain möglich
📡
FakeWallet crypto stealer spreading through iOS apps in the App Store
📡
FakeWallet crypto stealer spreading through iOS apps in the App Store
📡
The Weird, Twisting Tale of How China Spied on Alysa Liu and Her Dad
📡
Crypto Exchange Grinex Blames Western Spies for $13m Theft
📡
Why Most AI Deployments Stall After the Demo
📡
British hacker tied to Scattered Spider campaign pleads guilty in $8M scheme
📡
Mythos: An AI tool too powerful for public release
📡
How to clone an AWS CloudHSM cluster across Regions
📡
Elon Musk fails to appear for questioning by French police over sexualized AI images on X
📡
Mastodon says its flagship server was hit by a DDoS attack
📡
Italian regulator fines national postal service orgs $15 million for data privacy violations
🐛
CVE-2026-5160
🐛
CVE-2026-6100 Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure
🐛
CVE-2026-4786 Incomplete mitigation of CVE-2026-4519, %action expansion for command injection to webbrowser.open()
⚠️
Vercel confirms security incident as hackers claim to sell internal access
📢
A new licensing period and legal regulations for VPN services are being discussed in Türkiye.
🔥
Cyber attacks fuel surge in cargo theft across logistics industry
🔥
Carnival Corporation probes data breach after claims of 8.7M records theft
🕵️
Oil Industry Hacker Accused of Targeting Environmental Activists Appears in Court
🕵️
Microsoft's Silent Lockout: Why WireGuard, VeraCrypt & Windscribe Can No Longer Update Windows Users
🌐
Security Affairs newsletter Round 573 by Pierluigi Paganini – INTERNATIONAL EDITION
🌐
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 93
📡
Staatliches Bedrohungsmanagement: Psychisch kranke Personen mit Risikopotential
📡
Palantir posts mini-manifesto denouncing inclusivity and ‘regressive’ cultures
🐛
NVD shifts strategy to deal with a CVE backlog.
🐛
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet
🐛
Nexcorium Mirai Variant Weaponises TBK DVR Vulnerability in Fresh IoT Botnet Push
⚠️
Claude Opus wrote a Chrome exploit for $2,283
⚠️
Cybersecurity Today Month in Review of March/April 2026
⚠️
Microsoft Defender under attack as three zero-days, two of them still unpatched, enable elevated access
⚠️
Nexcorium Mirai variant exploits TBK DVR flaw to launch DDoS attacks
⚠️
Researcher Claims Claude Opus Enabled Creation of Working Chrome Exploit
⚠️
Hidden VMs: how hackers leverage QEMU to stealthily steal data and spread malware
📢
NIST gives up enriching most CVEs
🔥
A new breed of RAT.
🔥
$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims
🔥
Proaktive Ermittlungen gegen Cybercrime auf Landesebene
🕵️
HTTP desync in Discord's media proxy: Spying on a whole platform
🕵️
It Is Time to Ban the Sale of Precise Geolocation
🚨
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active ExploitationA recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To that end, the agency has added the vulnerability, tracked as CV…
KEV
🚨
U.S. CISA adds a flaw in Apache ActiveMQ to its Known Exploited Vulnerabilities catalogThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Apache ActiveMQ to its Known Exploited Vulnerabilities catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in Apache ActiveMQ, tracked as CVE-2026-34197 (CVSS score o…
KEV
🐛
Cisco Warns Webex Customers Of Critical SSO Problem
🐛
NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions
🐛
CVE-2026-33948 jq: Embedded-NUL Truncation in CLI JSON Input Path Causes Prefix-Only Validation of Malformed Input
🐛
CVE-2026-40164 jq: Algorithmic complexity DoS via hardcoded MurmurHash3 seed
🐛
CVE-2026-35469 SpdyStream: DOS on CRI
🐛
CVE-2026-39956 jq: Missing runtime type checks for _strindices lead to crash and limited memory disclosure
🐛
CVE-2026-32316 jq: Integer overflow in jvp_string_append() allows Heap-based Buffer Overflow
🐛
CVE-2026-33947 jq: Unbounded Recursion in jv_setpath(), jv_getpath() and delpaths_sorted()
🐛
CVE-2026-39979 jq: Out-of-Bounds Read in jv_parse_sized() Error Formatting for Non-NUL-Terminated Counted Buffers
🐛
CVE-2026-41035
🐛
CVE-2026-35199 SymCrypt SymCryptXmssSign function - Heap overflow via 64->32-bit leaf-count truncation
🐛
CVE-2025-14821 Libssh: libssh: insecure default configuration leads to local man-in-the-middle attacks on windows
🐛
CVE-2026-40179 Prometheus: Stored XSS via metric names and label values in web UI tooltips and metrics explorer
🐛
PoC Released for FortiSandbox Flaw Enabling Arbitrary Command Execution
🐛
Weaponized CVE-2026-39987 Pushes Blockchain Backdoor Through Hugging Face
🐛
Another Microsoft Defender privilege escalation bug emerges days after patch
🐛
TP-Link Routers Hit by Mirai in CVE-2023-33538 Attacks
🐛
NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities - Infosecurity Magazine
🐛
Chromium: CVE-2026-6296 Heap buffer overflow in ANGLE
🐛
Chromium: CVE-2026-6363 Type Confusion in V8
🐛
Chromium: CVE-2026-6359 Use after free in Video
🐛
Chromium: CVE-2026-6364 Out of bounds read in Skia
🐛
Chromium: CVE-2026-6362 Use after free in Codecs
🐛
Chromium: CVE-2026-6313 Insufficient policy enforcement in CORS
🐛
Chromium: CVE-2026-6314 Out of bounds write in GPU
🐛
Chromium: CVE-2026-6318 Use after free in Codecs
🐛
Chromium: CVE-2026-6361 Heap buffer overflow in PDFium
🐛
Chromium: CVE-2026-6310 Use after free in Dawn
🐛
Chromium: CVE-2026-6360 Use after free in FileSystem
🐛
Chromium: CVE-2026-6316 Use after free in Forms
🐛
Chromium: CVE-2026-6309 Use after free in Viz
🐛
Chromium: CVE-2026-6311 Uninitialized Use in Accessibility
🐛
Chromium: CVE-2026-6307 Type Confusion in Turbofan
🐛
Chromium: CVE-2026-6306 Heap buffer overflow in PDFium
🐛
Chromium: CVE-2026-6303 Use after free in Codecs
🐛
Chromium: CVE-2026-6308 Out of bounds read in Media
🐛
Chromium: CVE-2026-6302 Use after free in Video
🐛
Chromium: CVE-2026-6300 Use after free in CSS
🐛
Chromium: CVE-2026-6304 Use after free in Graphite
🐛
Chromium: CVE-2026-6305 Heap buffer overflow in PDFium
🐛
Chromium: CVE-2026-6301 Type Confusion in Turbofan
🐛
Chromium: CVE-2026-6317 Use after free in Cast
🐛
Chromium: CVE-2026-6312 Insufficient policy enforcement in Passwords
🐛
Chromium: CVE-2026-6298 Heap buffer overflow in Skia
🐛
Chromium: CVE-2026-6297 Use after free in Proxy
🐛
Chromium: CVE-2026-6299 Use after free in Prerender
🐛
Critical sandbox bypass fixed in popular Thymeleaf Java template engine
⚠️
Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts
⚠️
Fake Zoom SDK Update Spreads Sapphire Sleet Malware in New macOS Attack Chain
⚠️
Critical Flowise Flaw Enables Remote Command Execution via MCP Adapters
⚠️
Google Deploys Gemini AI to Stop Threat Actors, Blocking 8.3 Billion Ads
⚠️
Amtrak - 2,147,679 breached accounts
⚠️
Local area network anonymity hardening tool for Linux
⚠️
Palo Alto’s Helmut Reisinger sees a cyber sea change ahead as AI advances
⚠️
Mythos and Cybersecurity
⚠️
Tails 7.6.2 patches vulnerability that could expose saved files - Help Net Security
⚠️
We beat Google’s zero-knowledge proof of quantum cryptanalysis
⚠️
SEO Poisoning Attack Uses Microsoft Binary to Install RMM Tool
⚠️
Operation PowerOFF Knocks Out 75,000 DDoS Attackers and Over 50 Service Domains
⚠️
White House moves to give federal agencies access to Anthropic’s Claude Mythos
⚠️
Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face
⚠️
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched
KEV
⚠️
PowMix botnet targets Czech workforce
⚠️
Operation PowerOFF: 53 DDoS domains seized and 3 Million criminal accounts uncovered
⚠️
Pen Test Took Down Campus WiFi
⚠️
We Reproduced Anthropic's Mythos Findings With Public Models
⚠️
Inditex confirms third-party breach as hackers threaten Zara data leak
⚠️
New “RedSun” Windows Defender zero-day exploited in the wild
KEV
⚠️
Hackers are abusing unpatched Windows security flaws to hack into organizations
⚠️
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched
KEV
⚠️
Flawed Cisco update threatens to stop APs from getting further patches
⚠️
Temporary fix for Section 702.
KEV
⚠️
Securing autonomous AI at scale with Arvind (Nitro) Nithrakashyap from Rubrik
📢
With US spy laws set to expire, lawmakers are split over protecting Americans from warrantless surveillance
📢
US House extends FISA Section 702 for ten days.
🔥
Payouts King Emerges: New Ransomware Operation Tied to Ex-BlackBasta Members
🔥
108 Chrome extensions caught stealing user data and hijacking sessions
🔥
“Your shipment has arrived” email hides remote access software
🔥
Data breach at edtech giant McGraw Hill affects 13.5 million accounts
🔥
Industrial Systems Hit by New Email-Worm Threat Wave
🔥
Amtrak data breach exposed information of 2.1 million accounts
🔥
AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech
🔥
Man who hacked US Supreme Court filing system sentenced to probation
🔥
Kyrgyzstan-based crypto exchange Grinex shuts down after $13.7M cyber heist, blames Western Intelligence
🕵️
ISC Stormcast For Friday, April 17th, 2026 https://isc.sans.edu/podcastdetail/9896, (Fri, Apr 17th)
🕵️
Hackers Deploy ATHR for Scalable AI-Driven Vishing and Credential Theft
🕵️
Anthropic Introduces Claude Opus 4.7 for Advanced Problem-Solving
🕵️
ZionSiphon Malware Hits Israeli Desalination Plants
🕵️
Censys Warns 6 Million Public-Facing FTP Servers Are Still Exposed in 2026
🕵️
Fiverr left customer files public and searchable on Google
🕵️
Top 5 Disaster Recovery Companies in 2026
🕵️
OpenAI Extends GPT-5.4-Cyber Access to Trusted Organizations Worldwide
🕵️
Microsoft Acknowledges Reboot Loop Issue on Windows Servers Following April Patches
🕵️
Identity at the Edge: How the Sixth Annual Identity Management Day Highlights the New Frontiers of Trust
🕵️
ZionSiphon malware designed to sabotage water treatment systems
🕵️
Operation PowerOFF identifies 75k DDoS users, takes down 53 domains
🕵️
North Korea Uses ClickFix to Target macOS Users' Data
🕵️
Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads - Infosecurity Magazine
🕵️
Six million FTP servers exposed online | Cybernews
🕵️
Bluesky Outage: Coordinated Traffic Attack Causes Widespread Errors
🕵️
Off-Topic Friday
🕵️
Over 13M Kemper Corporation records leaked on the dark web, hackers claim | Cybernews
🕵️
Cisco patches critical bugs in Webex, ISE | news | SC Media
🕵️
New Phishing Attack Turns n8n Into On-Demand Malware Machine
🕵️
Widespread AI Use Masks a Growing Workplace Readiness Gap
🕵️
Brave to launch minimalist “Origin” browser with core privacy features
🕵️
Tor VPN for Android security audit confirms robust design
🕵️
Transform security logs into OCSF format using a configuration-driven ETL solution
🕵️
Anthropic Releases Opus 4.7, Not as ‘Broadly Capable’ as Mythos AI
🕵️
Clothing Retailer Patches Website Flaw Exposing Customer Data
🕵️
Chinese Humanoid Robots Dominate Opening Day of Canton Fair 2026
🕵️
Apple iPhone Ultra: New Leak Reveals ‘Passport’ Design, High Price Tag
🕵️
Friday Squid Blogging: New Giant Squid Video
🕵️
Dougbot, RedSun, ATHR, Vishing, Cisco, Google, Chrome, Severance, Shor, Josh Marpet.. - SWN #573
🌐
Inside ZionSiphon: politically driven malware aims at Israeli water systems
🌐
Analyse: Vom Mythos zur Vulnocalypse und was jetzt wirklich zu tun ist
🌐
Hackers leverage leaked government intelligence tools to target everyday iOS users | Kaspersky official blog
🎙️
Auslegungssache 157: Datenschutz vor Gericht
📡
Lumma Stealer infection with Sectop RAT (ArechClient2), (Fri, Apr 17th)
📡
Angreifer attackieren Apache ActiveMQ Broker, Apache ActiveMQ
📡
Ärger mit aktueller NordVPN-App für macOS
📡
Amazon: Ring-Kameras jetzt mit optionaler Gesichtserkennung
📡
Windows-Updates: Unerwartete Server-Reboots und Anmeldestörungen
📡
Jetzt patchen nginx-ui! Angreifer übernehmen Kontrolle über Nginx-Server
📡
Österlicher Zertifikats-GAU bei D-Trust: Zehntausende Zertifikate ungültig
📡
YubiKey Manager: Sicherheitslücke ermöglicht Ausführung untergeschobenen Codes
📡
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul
📡
Singer loses life savings to fake wallet downloaded from the Apple App Store
📡
Android 13 erreicht Support-Ende: Millionen Geräte betroffen
📡
This old-school scam is still working
📡
DraftKings hacker sentenced to prison, ordered to pay $1.4 Million
📡
EU-App zur Altersprüfung: Experten knacken „Sorglos-Paket“ in Minuten
🐛
Nginx-UI Flaw Actively Exploited to Enable Full Server Takeover
KEV
🐛
Splunk Enterprise and Cloud Platform Exposed to Dangerous RCE Vulnerability
🐛
Cisco Webex Vulnerability Allows User Impersonation Attacks
🐛
New PoC Exploit Published for Microsoft Defender 0-Day Flaw
🐛
Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution
🐛
Behind the Mythos hype, Glasswing has just one confirmed CVE
🐛
Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
KEV
🐛
NVD shifts strategy to deal with a CVE backlog.
🐛
Too many flaws, not enough time.
🐛
NIST cuts down CVE analysis amid vulnerability overload
KEV
🐛
Cisco Systems issues three advisories for critical vulnerabilities in Webex, ISE
⚠️
McGraw Hill - 13,500,136 breached accounts
⚠️
Konform Browser - Open source web browser taking privacy, security and freedom to the next level
⚠️
Who is winning the scam game?
⚠️
AI Content Hijacks Google Discover to Deliver Malicious Alerts
⚠️
UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign
⚠️
Cisco FMC Zero-Day Among 31 High-Impact Vulnerabilities Exploited in March
KEV
⚠️
Chrome Privacy Vulnerability Exposes Users via Fingerprinting and Header Leaks
⚠️
Critical Cisco ISE Flaws Let Remote Attackers Execute Malicious Code
⚠️
Sniffnet 1.5: Welches Programm funkt nach Hause?
⚠️
Human Trust of AI Agents
⚠️
Hackers Exploit n8n Webhooks to Spread Malware
⚠️
The endless CISO reporting line debate — and what it says about cybersecurity leadership
⚠️
PowMix botnet targets Czech workforce
⚠️
Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever
KEV
⚠️
Fake ProtonVPN, game mod sites spread NWHStealer in new Windows malware campaign
⚠️
Microsoft’s Windows Recall still allows silent data extraction
KEV
⚠️
Microsoft, Salesforce Patch AI Agent Data Leak Flaws
⚠️
PHP Composer flaws enable remote command execution via Perforce VCS
⚠️
ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories
⚠️
Vom BlueHammer-Autor: Neuer Windows-Zeroday verschafft Adminrechte
⚠️
AI platform n8n abused for stealthy phishing and malware delivery
⚠️
EU’s official age verification app found exposing sensitive user data
⚠️
Fake Proton VPN sites are pushing NWHStealer malware to Windows users
⚠️
Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic
⚠️
EU’s official age verification app found exposing sensitive user data; also EU Age Verification can be bypassed using their own infrastructure
⚠️
The Q1 vulnerability pulse
⚠️
Foxit, LibRaw vulnerabilities
⚠️
Beating the Mythos clock: Using Tenable Hexa AI custom agents for automated patching
⚠️
McGraw-Hill Confirms Data Exposure, Hackers Claim 45M Salesforce Records Leaked
⚠️
RCE by design: MCP architectural choice haunts AI agent ecosystem
⚠️
When “No Exploit” Becomes One
⚠️
The AI "Vulnpocolypse" Is Real? - PSW #922
📋
Critical Chrome Flaws Allow Arbitrary Code Execution – Patch Immediately
📢
Insurance carriers quietly back away from covering AI outputs
📢
Spionageangst im Bendlerblock: Pistorius verbannt Privat-Handys aus Sitzungen
📢
Early Results From KnowBe4’s AI Agents Show Easier Administration and Lower Cyber Risk
🔥
How Nations Hack, Spy, and Win
🔥
Sweden reports cyberattack attempt on heating plant amid rising energy threats
🔥
Booking.com breach gives scammers what they need to target guests
🔥
McGraw Hill data breach incident exposed 13.5 million accounts
🔥
[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment
🔥
UAC-0247 Hits Hospitals, Governments With Browser and WhatsApp Data Theft
🔥
Autovista blames ransomware for service disruption • The Register
🔥
Cookeville hospital notifies 337K after hack​ | Cybernews
KEV
🔥
Malicious WordPress Plugins with Backdoors Compromise Thousands of Websites
🔥
Cookeville Regional Medical Center hospital data breach impacts 337,917 people
KEV
🔥
Here's What Agentic AI Can Do With Have I Been Pwned's APIs
🕵️
ISC Stormcast For Thursday, April 16th, 2026 https://isc.sans.edu/podcastdetail/9894, (Thu, Apr 16th)
🕵️
Fake Adobe Reader Download Drops ScreenConnect via Fileless Loader
🕵️
Russian Hosting Tied to 1,250+ C2 Servers Across 165 Providers
🕵️
Two U.S. Nationals Sentenced in $5 Million DPRK Remote Worker Laptop Farm Scheme
🕵️
From clinics to government: UAC-0247 expands cyber campaign across Ukraine
🕵️
BlobPhish: The Phantom Phishing Campaign Hiding in Browser Memory
🕵️
US Moves Toward Mandatory Data Center Energy Reporting as EIA Pilot Expands
🕵️
Google, Microsoft, Meta Tracking You Even if You Opt Out - New Research
🕵️
French cops free mother and son after crypto kidnapping • The Register
🕵️
AI adoption is outpacing the safeguards around it - Help Net Security
🕵️
WordPress plugins injected with malicious code​ | Cybernews
🕵️
Fortinet Patches Critical FortiSandbox Vulnerabilities - SecurityWeek
🕵️
Quantum-safe encrypted cloud storage Tuta Drive debuts in closed beta
🕵️
AI Security Arms Race Begins
🕵️
Adobe Expands Firefly Into AI-Powered Editing Assistant Across Creative Apps
🕵️
Two Americans sentenced for helping North Korea steal $5 million in fake IT worker scheme
🕵️
Major Disney Layoffs: 1,000 Jobs Cut in Tech-Driven Shakeup
🕵️
EU Declares New Digital Age Verification App Ready for Deployment
🕵️
New MacBook Pro Overhaul Expected with OLED, Touchscreen, and M6 Chips
🕵️
NTT Research Launches Scale Academy to Bring Lab Technology to Market
🕵️
The Boy That Cried Mythos: Verification is Collapsing Trust in Anthropic
🌐
Anthropic vs Washington.
🌐
A fake Slack download is giving attackers a hidden desktop on your machine
🌐
Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks
🎙️
Extending zero trust beyond the endpoint with Rob Allen from ThreatLocker
📡
Chrome-Update stopft 31 Sicherheitslücken, davon fünf kritische
📡
Cisco: Kritische Codeschmuggel-Lücken in ISE und mehr geschlossen
📡
Anonymisierendes Linux: Notfallupdate auf Tails 7.6.2 schließt Flatpak-Lücke
📡
More than pretty pictures: Wendy Bishop on visual storytelling in tech
📡
Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu
📡
Fashion retailer Express left customers’ personal data and order details exposed to the internet
📡
Browser Guard gets even better with Access Control
📡
“iCloud storage is full” scam is back, and now it wants your payment details
📡
Android Canary: Google testet überarbeitetes Kontextmenü für App-Icons
📡
Gimp: Ungepatchte Lücke erlaubt Codeschmuggel mit GIFs
📡
ÖPNV-Expressmodus-Funktion beim iPhone: YouTuber zeigen potenziellen Angriff
📡
„Power Off“: BKA geht gegen DDoS-Angebote vor
📡
It’s not just you — Bluesky is (sorta) down
📡
Die Natur ist unsere Quelle der Zufälligkeit: zum Tode von Michael O. Rabin
📡
European police email 75,000 people asking them to stop DDoS attacks
📡
Cisco fixed four critical flaws in Identity Services and Webex
📡
Treasury Secretary holds a meeting to cover risks related to Anthropic’s new model.
🚨
Risky Business #833 -- The Great Mythos Freakout of 2026On this week’s show, Patrick Gray, Adam Boileau and James Wilson discuss the week’s cybersecurity news. They cover: Everyone has an opinion about Claude Mythos… even though almost nobody has used it yet CISA adds a 2009 Excel bug to the KEV list, u wot? Adobe also parties like it…
KEV
🚨
U.S. CISA adds Microsoft SharePoint Server, and Microsoft Office Excel flaws to its Known Exploited Vulnerabilities catalogU.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft SharePoint Server, and Microsoft Office Excel flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Apple, Laravel Livewire and …
KEV
🐛
April Patch Tuesday roundup: Zero day vulnerabilities and critical bugs
KEV
🐛
Microsoft Patch Tuesday for April 2026 fixed actively exploited SharePoint zero-day
KEV
🐛
CVE-2026-33555
🐛
CVE-2026-5466 wc_VerifyEccsiHash missing sanity check
🐛
CVE-2026-5194 wolfSSL ECDSA Certificate Verification
🐛
CVE-2026-5448 1-2 Byte Buffer Overflow in wolfSSL_X509_notAfter/notBefore
🐛
CVE-2026-5264 DTLS 1.3 ACK heap buffer overflow
🐛
CVE-2026-5778 Integer underflow leads to out-of-bounds access in sniffer ChaCha decrypt path.
🐛
CVE-2026-5460 Heap Use-After-Free in PQC Hybrid KeyShare Error Cleanup in wolfSSL TLS 1.3
🐛
CVE-2026-5446 wolfSSL ARIA-GCM TLS 1.2/DTLS 1.2 GCM nonce reuse
🐛
CVE-2026-34601 xmldom: XML injection via unsafe CDATA serialization allows attacker-controlled markup insertion
🐛
CVE-2026-5393 OOB Read in DoTls13CertificateVerify with WOLFSSL_DUAL_ALG_CERTS
🐛
CVE-2026-5500 Improper Validation of AES-GCM Authentication Tag Length in PKCS#7 Envelope Allows Authentication Bypass
🐛
CVE-2026-5504 PKCS7 CBC Padding Oracle — Plaintext Recovery
🐛
CVE-2026-5501 Improper Certificate Signature Verification in X.509 Chain Validation Allows Forged Leaf Certificates
🐛
CVE-2026-5507 Session Cache Restore — Arbitrary Free via Deserialized Pointer
🐛
CVE-2026-5477 Prefix-substitution forgery via integer overflow in wolfCrypt CMAC
🐛
CVE-2026-5479 wolfSSL EVP ChaCha20-Poly1305 AEAD authentication tag
🐛
CVE-2026-5503 out-of-bounds write in TLSX_EchChangeSNI via attacker-controlled publicName
🐛
CVE-2026-5295 Stack Buffer Overflow in wolfSSL PKCS7 wc_PKCS7_DecryptOri() via Oversized OID
🐛
CVE-2026-5188 Integer underflow in X.509 SAN parsing in wolfSSL
🐛
CVE-2026-5447 Heap buffer overflow in CertFromX509() via AuthorityKeyIdentifier
🐛
CVE-2026-5772 MatchDomainName 1-Byte Stack Buffer Over-Read in Hostname Validation
🐛
CVE-2026-5263 URI nameConstraints not enforced in ConfirmNameConstraints()
🐛
CVE-2026-5392 wolfSSL heap OOB read in PKCS7 SignedData streaming
🐛
CVE-2026-1502 HTTP client proxy tunnel headers not validated for CR/LF
🐛
CVE-2026-35201 Discount has an Out-of-bounds Read in rdiscount
🐛
CVE-2026-34481 Apache Log4j JSON Template Layout: Improper serialization of non-finite floating-point values in JsonTemplateLayout
🐛
CVE-2026-34479 Apache Log4j 1 to Log4j 2 bridge: Silent log event loss in Log4j1XmlLayout due to unescaped XML 1.0 forbidden characters
🐛
CVE-2026-34480 Apache Log4j Core: Silent log event loss in XmlLayout due to unescaped XML 1.0 forbidden characters
🐛
CVE-2026-40175 Axios has Unrestricted Cloud Metadata Exfiltration via Header Injection Chain
🐛
CVE-2025-62718 Axios has a NO_PROXY Hostname Normalization Bypass Leads to SSRF
🐛
Microsoft Warns of Actively Exploited SharePoint Server Zero-Day
KEV
🐛
CVE-2025-30258 In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."
🐛
Windows Active Directory Flaw Opens Door to Malicious Code Execution
🐛
Copilot and Agentforce fall to form-based prompt injection tricks
🐛
Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
KEV
🐛
April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More
🐛
CVE-2026-33032: severe nginx-ui bug grants unauthenticated server access
KEV
🐛
Critical nginx UI tool vulnerability opens web servers to full compromise
⚠️
Curity looks to reinvent IAM with runtime authorization for AI agents
⚠️
North Korean Spies DM You On Facebook
⚠️
Top 10 Best Passwordless Authentication Solutions in 2026
⚠️
13 Fragen gegen Drittanbieterrisiken
⚠️
Microsoft Patch Tuesday April 2026 Fixes 168 Flaws, Including an Actively Exploited Zero-Day
KEV
⚠️
OpenAI Introduces GPT-5.4 for Reverse Engineering, Vulnerability Discovery, and Malware Analysis
⚠️
Ivanti Neurons for ITSM Vulnerabilities Let Remote Attackers Hijack User Sessions
⚠️
Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action
⚠️
Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities
⚠️
Hackers Exploit Hidden Microsoft 365 Mailbox Rules to Steal Sensitive Business Emails
⚠️
PHP Composer flaws enable remote command execution via Perforce VCS
⚠️
The need for a board-level definition of cyber resilience
⚠️
Credit Resources Vault: Why this credit email set off our scam alarms
⚠️
The deepfake dilemma: From financial fraud to reputational crisis
⚠️
April Patch Tuesday fixes two zero-days, including one under active attack
⚠️
Hackers Abuse Google Cloud Storage to Slip Remcos RAT Past Email Filters
⚠️
MuddyWater-Style Hackers Probe 12,000+ Systems Ahead of Middle East
⚠️
Unlocking foundational visibility for cyber-physical systems with OT vulnerability management
⚠️
Top 10 Best Application Security Testing Companies in 2026
⚠️
Organizations Warned of Exploited Windows, Adobe Acrobat Vulnerabilities - SecurityWeek
⚠️
Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities
⚠️
wolfSSL Vulnerability Hits IoT, Routers and Military Systems, Update Now!
⚠️
EFF urges state probe into Google over undisclosed data sharing with ICE
⚠️
Patch Tuesday notes: Microsoft addresses two zero-days.
⚠️
Microsoft Issues Massive Windows Patch for 160+ Bugs, Including Two Zero-Days
⚠️
A heavy patch Tuesday lands.
⚠️
Smashing Security podcast #463: This AI company leaked its own code. It’s also built something terrifying
📋
Fortinet Fixes 11 Security Flaws Affecting FortiSandbox, FortiOS, FortiAnalyzer, and FortiManager
📋
Microsoft Rolls Out KB5083769 Update for Windows 11 24H2 and 25H2
📢
Chile’s Cybersecurity Framework Law: How SOCs Achieve Compliance and Response Readiness
📢
Michigan’s New Bill Takes Aim at AI Employee Surveillance
📢
Deterministic + Agentic AI: The Architecture Exposure Validation Requires
📢
Google, Microsoft, Meta Accused of Tracking Users Even After Privacy Opt-Out
📢
Sweden blames Russian hackers for attempting ‘destructive’ cyberattack on thermal plant
🔥
'Addicted to hacking': Young hacker behind historic breach speaks out for 1st time, before reporting to prison
🔥
JanaWare Ransomware Hits Turkish Users via Customized Adwind RAT
🔥
Not All CISO Gigs Are Created Equal and RSAC Interviews from ESET and Mimecast - BSW #443
🔥
Trusted WordPress Plugins Hijacked in 8-Month Stealth Backdoor Campaign
🔥
Comcast’s $117.5M Breach Settlement: Up to 30M People May Qualify
🔥
&#x5b;Guest Diary&#x5d; Compromised DVRs and Finding Them in the Wild, (Thu, Apr 16th)
🕵️
ISC Stormcast For Wednesday, April 15th, 2026 https://isc.sans.edu/podcastdetail/9892, (Wed, Apr 15th)
🕵️
Dragon Boss Solutions Supply Chain Attack Exposes 25,000+ Endpoints
🕵️
FUNNULL Scam Network Resurfaces With 175+ Rotating Domains Worldwide
🕵️
Agentic LLM Browsers Open New Front in Prompt Injection, Data Theft
🕵️
Fiverr exposes sensitive data via public URLs indexed by Google
🕵️
Get This Fast and Powerful Lenovo ThinkPad for $1,000 Off
🕵️
Defense in Depth, Medieval Style
🕵️
Your AI Hiring Tools Are Now a Civil Rights Liability in Illinois
🕵️
Google Uses Rust-Based Firmware in Pixel 10 Modem to Improve Memory Safety
🕵️
The n8n n8mare: How threat actors are misusing AI workflow automation
🕵️
Top 10 Best API Security Providers Protecting Web Apps in 2026
🕵️
Google Photos Fixes Android Image Editing Tool: Here’s What Changed
🕵️
This $60 AI Assistant Aims to Consolidate Your Daily Work Tools
🕵️
Why CSOs Fail the Business
🕵️
Dependency cooldowns turn you into a free-rider
🕵️
Testing reveals Claude Mythos's offensive capabilities and limits - Help Net Security
🕵️
Malicious Chrome Extensions Campaign Exposes User Data - Infosecurity Magazine
🕵️
WhatsApp New Update Lets You Chat Without Sharing Your Phone Number
🕵️
Microsoft Takes Over Key Stargate Site in Latest OpenAI Pullback
🕵️
Kraken Exchange Faces Extortion After Insider Recorded System Footage
🕵️
Fake Ledger Live app on Apple’s App Store stole $9.5M in crypto
🕵️
Google to penalize “back button hijacking” starting June 2026
🕵️
n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails
🕵️
AI Zuckerberg Runs the Company
🕵️
Cybersecurity Looks Like Proof of Work Now
🕵️
Massive Chrome Extension Scam Exposes 20,000 Users to Data Theft
🕵️
YouTube Will Show Fewer Livestream Ads During Purchases and Chat Spikes
🕵️
SS&C Intralinks DealCentre AI vs. Datasite: Which platform is built for the future of dealmaking?
🕵️
News Alert: NTT Research launches SaltGrain—advanced Attribute-Based Encryption security
🕵️
Tech Layoffs Continue: Snap Cuts 1,000 Jobs, Citing ‘Rapid Advancements’ in AI
🕵️
Security Became the Business Nexus
🌐
From fake Proton VPN sites to gaming mods, this Windows infostealer is everywhere
🌐
Mirax malware campaign hits 220K accounts, enables full remote control
🌐
Threat landscape for industrial automation systems in Q4 2025
🌐
Nach Anthropic Mythos: OpenAI kündigt GPT-5.4-Cyber an
🎙️
Human-centered security in an AI world with Johnny Hand from TrendAI
📡
Weekly Threat Bulletin – April 15th, 2026
📡
Azure-Hosted Scanning Cluster Launches WordPress Webshell Discovery Campaign
📡
Scanning for AI Models, (Tue, Apr 14th)
📡
What Founders Get Wrong About Early Marketing with Merav Ben Avi, VP of Marketing at YL Ventures
📡
OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams
📡
Fortinet stopft 18 Sicherheitslecks
📡
Patchday: Angreifer attackieren Edge und Microsoft SharePoint Server
📡
Warnung vor Attacken auf 17 Jahre alte Excel-Lücke
📡
Adobe-Patchday: Kritische Schadcode-Lücken bedrohen Photoshop & Co.
📡
Bugs ohne Bounty: Eclipse Foundation startet Sicherheitsprogramm für Open VSX
📡
Microsoft Office 2021: Support endet am 13. Oktober 2026
📡
„Passwort“ Folge 55: News mit Claude-Code-Klau, PKI-Oopsies und Quantenturbo
📡
Raspberry Pi OS 6.2: Update verspricht mehr Sicherheit
📡
108 malicious Chrome extensions caught stealing Google and Telegram data from 20,000 users
📡
WireGuard: Update für Windows-Client nach vier Jahren
📡
Fake YouTube copyright notices can steal your Google login
📡
OpenSSL 4.0 verschlüsselt, was TLS bisher verraten hat
📡
Überwachung weltweit: Bundesregierung winkt UN-Cybercrime-Konvention durch
📡
21. BSI-Sicherheitskongress: NIS-2-Umsetzung weit hinter den Erwartungen
📡
Identität bleibt geheim: EU-App für Altersnachweis kommt
📡
Spotting cyberthreats: a guide for blind and low-vision users | Kaspersky official blog
📡
AI clickbait can turn your notifications into a scam feed
📡
Cisco intends to acquire AI observability and evaluation platform provider Galileo
🚨
CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe SoftwareThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows - CVE-2026-21643 (CVSS score: 9.1) …
KEV
🚨
How AI is transforming threat detectionArtificial intelligence is rapidly reshaping how security teams detect and hunt cyber threats by helping analyze vast volumes of security data, uncovering subtle signs of malicious activity, and identifying potential attacks faster than traditional tools or human analysts alone. …
KEV
🚨
U.S. CISA adds Adobe, Fortinet, Microsoft Exchange Server, and Microsoft Windows flaws to its Known Exploited Vulnerabilities catalogU.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Adobe, Fortinet, Microsoft Exchange Server, and Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Apple, Laravel Livewire…
KEV
🚨
Claude Mythos: Prepare for your board’s cybersecurity questions about the latest AI model from AnthropicWith the Federal Reserve Chairman meeting with bank CEOs to discuss the security implications of Claude Mythos, you can bet that your board of directors will ask you about the impact of the AI model on your cybersecurity strategy. Here’s how to prepare.  Key takeaways Anthro…
KEV
🐛
ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers
KEV
🐛
CVE-2025-1147 GNU Binutils nm nm.c internal_strlen buffer overflow
🐛
CVE-2025-1148 GNU Binutils ld ldelfgen.c link_order_scan memory leak
🐛
CVE-2025-11839 GNU Binutils prdbg.c tg_tag_type return value
🐛
CVE-2026-40385
🐛
CVE-2026-40393
🐛
CVE-2026-31416 netfilter: nfnetlink_log: account for netlink header size
🐛
CVE-2026-31423 net/sched: sch_hfsc: fix divide-by-zero in rtsc_min()
🐛
CVE-2026-31424 netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP
🐛
CVE-2026-31427 netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp
🐛
CVE-2026-31419 net: bonding: fix use-after-free in bond_xmit_broadcast()
🐛
CVE-2026-31421 net/sched: cls_fw: fix NULL pointer dereference on shared blocks
🐛
CVE-2026-31428 netfilter: nfnetlink_log: fix uninitialized padding leak in NFULA_PAYLOAD
🐛
CVE-2026-31418 netfilter: ipset: drop logically empty buckets in mtype_del
🐛
CVE-2026-40386
🐛
CVE-2026-31417 net/x25: Fix overflow when accumulating packets
🐛
CVE-2026-31422 net/sched: cls_flow: fix NULL pointer dereference on shared blocks
🐛
CVE-2026-31414 netfilter: nf_conntrack_expect: use expect->helper
🐛
CVE-2026-31426 ACPI: EC: clean up handlers on probe failure in acpi_ec_setup()
🐛
CVE-2026-31420 bridge: mrp: reject zero test interval to avoid OOM panic
🐛
Hackers Exploit Critical ShowDoc RCE Flaw in Ongoing Attacks
🐛
CISA Warns Fortinet SQL Injection Flaw Is Being Actively Exploited
KEV
🐛
Attackers target unpatched ShowDoc servers via CVE-2025-0520
KEV
🐛
Critical etcd Vulnerability Allows Unauthorized Access to Sensitive Cluster APIs
🐛
Adobe issues emergency fix for Acrobat Reader flaw exploited in the wild (CVE-2026-34621) - Help Net Security
KEV
🐛
New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released
🐛
CVE-2026-20930 Windows Management Services Elevation of Privilege Vulnerability
🐛
CVE-2026-25250 MITRE: CVE-2026-25250 Secure Boot disable Eazy Fix
🐛
CVE-2026-23653 GitHub Copilot and Visual Studio Code Information Disclosure Vulnerability
🐛
CVE-2026-25184 Applocker Filter Driver (applockerfltr.sys) Elevation of Privilege Vulnerability
🐛
CVE-2026-20945 Microsoft SharePoint Server Spoofing Vulnerability
🐛
CVE-2026-23670 Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability
🐛
CVE-2026-26149 Microsoft Power Apps Security Feature Bypass
🐛
CVE-2026-26151 Remote Desktop Spoofing Vulnerability
🐛
CVE-2026-26154 Windows Server Update Service (WSUS) Tampering Vulnerability
🐛
CVE-2026-26155 Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
🐛
CVE-2026-26160 Remote Desktop Licensing Service Elevation of Privilege Vulnerability
🐛
CVE-2026-26161 Windows Sensor Data Service Elevation of Privilege Vulnerability
🐛
CVE-2026-26162 Windows OLE Elevation of Privilege Vulnerability
🐛
CVE-2026-26165 Windows Shell Elevation of Privilege Vulnerability
🐛
CVE-2026-26166 Windows Shell Elevation of Privilege Vulnerability
🐛
CVE-2026-26167 Windows Push Notifications Elevation of Privilege Vulnerability
🐛
CVE-2026-26174 Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
🐛
CVE-2026-26175 Windows Boot Manager Security Feature Bypass Vulnerability
🐛
CVE-2026-26179 Windows Kernel Elevation of Privilege Vulnerability
🐛
CVE-2026-26180 Windows Kernel Elevation of Privilege Vulnerability
🐛
CVE-2026-26181 Microsoft Brokering File System Elevation of Privilege Vulnerability
🐛
CVE-2026-26183 Remote Access Management service/API (RPC server) Elevation of Privilege Vulnerability
🐛
CVE-2026-27906 Windows Hello Security Feature Bypass Vulnerability
🐛
CVE-2026-27907 Windows Storage Spaces Controller Elevation of Privilege Vulnerability
🐛
CVE-2026-27908 Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability
🐛
CVE-2026-27915 Windows UPnP Device Host Elevation of Privilege Vulnerability
🐛
CVE-2026-27917 Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Elevation of Privilege Vulnerability
🐛
CVE-2026-27918 Windows Shell Elevation of Privilege Vulnerability
🐛
CVE-2026-27919 Windows UPnP Device Host Elevation of Privilege Vulnerability
🐛
CVE-2026-27921 Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability
🐛
CVE-2026-27924 Desktop Window Manager Elevation of Privilege Vulnerability
🐛
CVE-2026-27926 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
🐛
CVE-2026-27927 Windows Projected File System Elevation of Privilege Vulnerability
🐛
CVE-2026-27929 Windows LUA File Virtualization Filter Driver Elevation of Privilege Vulnerability
🐛
CVE-2026-27931 Windows GDI Information Disclosure Vulnerability
🐛
CVE-2026-32071 Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
🐛
CVE-2026-32073 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
🐛
CVE-2026-32075 Windows UPnP Device Host Elevation of Privilege Vulnerability
🐛
CVE-2026-32081 Package Catalog Information Disclosure Vulnerability
🐛
CVE-2026-32082 Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
🐛
CVE-2026-32083 Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
🐛
CVE-2026-32085 Remote Procedure Call Information Disclosure Vulnerability
🐛
CVE-2026-32087 Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
🐛
CVE-2026-32089 Windows Speech Brokered Api Elevation of Privilege Vulnerability
🐛
CVE-2026-32090 Windows Speech Brokered Api Elevation of Privilege Vulnerability
🐛
CVE-2026-32093 Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
🐛
CVE-2026-32152 Desktop Window Manager Elevation of Privilege Vulnerability
🐛
CVE-2026-32154 Desktop Window Manager Elevation of Privilege Vulnerability
🐛
CVE-2026-32156 Windows UPnP Device Host Remote Code Execution Vulnerability
🐛
CVE-2026-32157 Remote Desktop Client Remote Code Execution Vulnerability
🐛
CVE-2026-32158 Windows Push Notifications Elevation of Privilege Vulnerability
🐛
CVE-2026-32159 Windows Push Notifications Elevation of Privilege Vulnerability
🐛
CVE-2026-32160 Windows Push Notifications Elevation of Privilege Vulnerability
🐛
CVE-2026-0390 UEFI Secure Boot Security Feature Bypass Vulnerability
🐛
CVE-2026-32165 Windows User Interface Core Elevation of Privilege Vulnerability
🐛
CVE-2026-32167 SQL Server Elevation of Privilege Vulnerability
🐛
CVE-2026-32168 Azure Monitor Agent Elevation of Privilege Vulnerability
🐛
CVE-2026-32178 .NET Spoofing Vulnerability
🐛
CVE-2026-32181 Connected User Experiences and Telemetry Service Denial of Service Vulnerability
🐛
CVE-2026-32183 Windows Snipping Tool Remote Code Execution Vulnerability
🐛
CVE-2026-32184 Microsoft High Performance Compute (HPC) Pack Elevation of Privilege Vulnerability
🐛
CVE-2026-32188 Microsoft Excel Information Disclosure Vulnerability
🐛
CVE-2026-32189 Microsoft Excel Remote Code Execution Vulnerability
🐛
CVE-2026-32192 Azure Monitor Agent Elevation of Privilege Vulnerability
🐛
CVE-2026-32195 Windows Kernel Elevation of Privilege Vulnerability
🐛
CVE-2026-32202 Windows Shell Spoofing Vulnerability
🐛
CVE-2026-32215 Windows Kernel Information Disclosure Vulnerability
🐛
CVE-2026-32216 Windows Redirected Drive Buffering System Denial of Service Vulnerability
🐛
CVE-2026-32217 Windows Kernel Information Disclosure Vulnerability
🐛
CVE-2026-32218 Windows Kernel Information Disclosure Vulnerability
🐛
CVE-2023-20585 AMD: CVE-2023-20585 IOMMU Write Buffer Vulnerability
🐛
CVE-2026-32219 Microsoft Brokering File System Elevation of Privilege Vulnerability
🐛
CVE-2026-32220 UEFI Secure Boot Security Feature Bypass Vulnerability
🐛
CVE-2026-32221 Windows Graphics Component Remote Code Execution Vulnerability
🐛
CVE-2026-32222 Windows Win32k Elevation of Privilege Vulnerability
🐛
CVE-2026-32223 Windows USB Printing Stack (usbprint.sys) Elevation of Privilege Vulnerability
🐛
CVE-2026-32224 Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
🐛
CVE-2026-32226 .NET Framework Denial of Service Vulnerability
🐛
CVE-2026-33095 Microsoft Word Remote Code Execution Vulnerability
🐛
CVE-2026-33096 HTTP.sys Denial of Service Vulnerability
🐛
CVE-2026-33098 Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability
🐛
CVE-2026-33116 .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
🐛
CVE-2026-33120 Microsoft SQL Server Remote Code Execution Vulnerability
🐛
CVE-2026-33822 Microsoft Word Information Disclosure Vulnerability
🐛
CVE-2026-33826 Windows Active Directory Remote Code Execution Vulnerability
🐛
CVE-2026-32212 Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability
🐛
CVE-2026-32631 GitHub: CVE-2026-32631 'git clone' from manipulated repositories can leak NTLM hashes
🐛
CVE-2026-21637 HackerOne: CVE-2026-21637 TLS PSK/ALPN Callback Exceptions Bypass Error Handlers
🐛
CVE-2026-20928 Windows Recovery Environment Security Feature Bypass Vulnerability
🐛
CVE-2026-20806 Windows COM Server Information Disclosure Vulnerability
🐛
CVE-2026-23657 Microsoft Word Remote Code Execution Vulnerability
🐛
CVE-2026-23666 .NET Framework Denial of Service Vulnerability
🐛
CVE-2026-26143 Microsoft PowerShell Security Feature Bypass Vulnerability
🐛
CVE-2026-26152 Microsoft Cryptographic Services Elevation of Privilege Vulnerability
🐛
CVE-2026-26153 Windows Encrypted File System (EFS) Elevation of Privilege Vulnerability
🐛
CVE-2026-26156 Windows Hyper-V Remote Code Execution Vulnerability
🐛
CVE-2026-26159 Remote Desktop Licensing Service Elevation of Privilege Vulnerability
🐛
CVE-2026-26163 Windows Kernel Elevation of Privilege Vulnerability
🐛
CVE-2026-26168 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
🐛
CVE-2026-26169 Windows Kernel Memory Information Disclosure Vulnerability
🐛
CVE-2026-26170 PowerShell Elevation of Privilege Vulnerability
🐛
CVE-2026-26172 Windows Push Notifications Elevation of Privilege Vulnerability
🐛
CVE-2026-26173 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
🐛
CVE-2026-26176 Windows Client Side Caching driver (csc.sys) Elevation of Privilege Vulnerability
🐛
CVE-2026-26177 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
🐛
CVE-2026-26178 Windows Advanced Rasterization Platform Elevation of Privilege Vulnerability
🐛
CVE-2026-26182 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
🐛
CVE-2026-26184 Windows Projected File System Elevation of Privilege Vulnerability
🐛
CVE-2026-27909 Windows Search Service Elevation of Privilege Vulnerability
🐛
CVE-2026-27910 Windows Installer Elevation of Privilege Vulnerability
🐛
CVE-2026-27911 Windows User Interface Core Elevation of Privilege Vulnerability
🐛
CVE-2026-27912 Windows Kerberos Elevation of Privilege Vulnerability
🐛
CVE-2026-27913 Windows BitLocker Security Feature Bypass Vulnerability
🐛
CVE-2026-27914 Microsoft Management Console Elevation of Privilege Vulnerability
🐛
CVE-2026-27916 Windows UPnP Device Host Elevation of Privilege Vulnerability
🐛
CVE-2026-27920 Windows UPnP Device Host Elevation of Privilege Vulnerability
🐛
CVE-2026-27922 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
🐛
CVE-2026-27923 Desktop Window Manager Elevation of Privilege Vulnerability
🐛
CVE-2026-27925 Windows UPnP Device Host Information Disclosure Vulnerability
🐛
CVE-2026-27928 Windows Hello Security Feature Bypass Vulnerability
🐛
CVE-2026-27930 Windows GDI Information Disclosure Vulnerability
🐛
CVE-2026-32068 Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
🐛
CVE-2026-32069 Windows Projected File System Elevation of Privilege Vulnerability
🐛
CVE-2026-32070 Windows Common Log File System Driver Elevation of Privilege Vulnerability
🐛
CVE-2026-32072 Active Directory Spoofing Vulnerability
🐛
CVE-2026-32074 Windows Projected File System Elevation of Privilege Vulnerability
🐛
CVE-2026-32076 Windows Storage Spaces Controller Elevation of Privilege Vulnerability
🐛
CVE-2026-32077 Windows UPnP Device Host Elevation of Privilege Vulnerability
🐛
CVE-2026-32078 Windows Projected File System Elevation of Privilege Vulnerability
🐛
CVE-2026-32079 Web Account Manager Information Disclosure Vulnerability
🐛
CVE-2026-32080 Windows WalletService Elevation of Privilege Vulnerability
🐛
CVE-2026-32084 Windows Print Spooler Information Disclosure Vulnerability
🐛
CVE-2026-32086 Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
🐛
CVE-2026-32088 Windows Biometric Service Security Feature Bypass Vulnerability
🐛
CVE-2026-32091 Microsoft Brokering File System Elevation of Privilege Vulnerability
🐛
CVE-2026-32149 Windows Hyper-V Remote Code Execution Vulnerability
🐛
CVE-2026-32150 Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
🐛
CVE-2026-32151 Windows Shell Information Disclosure Vulnerability
🐛
CVE-2026-32153 Windows Speech Runtime Elevation of Privilege Vulnerability
🐛
CVE-2026-32155 Desktop Window Manager Elevation of Privilege Vulnerability
🐛
CVE-2026-32162 Windows COM Elevation of Privilege Vulnerability
🐛
CVE-2026-32163 Windows User Interface Core Elevation of Privilege Vulnerability
🐛
CVE-2026-32164 Windows User Interface Core Elevation of Privilege Vulnerability
🐛
CVE-2026-32171 Azure Logic Apps Elevation of Privilege Vulnerability
🐛
CVE-2026-32176 SQL Server Elevation of Privilege Vulnerability
🐛
CVE-2026-32190 Microsoft Office Remote Code Execution Vulnerability
🐛
CVE-2026-32196 Windows Admin Center Spoofing Vulnerability
🐛
CVE-2026-32197 Microsoft Excel Remote Code Execution Vulnerability
🐛
CVE-2026-32198 Microsoft Excel Remote Code Execution Vulnerability
🐛
CVE-2026-32199 Microsoft Excel Remote Code Execution Vulnerability
🐛
CVE-2026-32200 Microsoft PowerPoint Remote Code Execution Vulnerability
🐛
CVE-2026-32201 Microsoft SharePoint Server Spoofing Vulnerability
🐛
CVE-2026-26171 .NET Denial of Service Vulnerability
🐛
CVE-2026-32203 .NET and Visual Studio Denial of Service Vulnerability
🐛
CVE-2026-32225 Windows Shell Security Feature Bypass Vulnerability
🐛
CVE-2026-33099 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
🐛
CVE-2026-33100 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
🐛
CVE-2026-33101 Windows Print Spooler Elevation of Privilege Vulnerability
🐛
CVE-2026-33103 Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
🐛
CVE-2026-33104 Win32k Elevation of Privilege Vulnerability
🐛
CVE-2026-33114 Microsoft Word Remote Code Execution Vulnerability
🐛
CVE-2026-33115 Microsoft Word Remote Code Execution Vulnerability
🐛
CVE-2026-33827 Windows TCP/IP Remote Code Execution Vulnerability
🐛
CVE-2026-33824 Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability
🐛
CVE-2026-33829 Windows Snipping Tool Spoofing Vulnerability
🐛
CVE-2026-32214 Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability
🐛
CVE-2026-33825 Microsoft Defender Elevation of Privilege Vulnerability
🐛
Microsoft’s April 2026 Patch Tuesday Addresses 163 CVEs (CVE-2026-32201)
KEV
⚠️
How Hackers Are Thinking About AI
⚠️
Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)
⚠️
CISA Alerts on Exploited Microsoft Exchange and Windows CLFS Security Flaws
KEV
⚠️
Hackers Exploit Obsidian Plugin to Deploy Cross-Platform Malware
⚠️
Synology SSL VPN Client Vulnerability Enabled Remote Access to Sensitive Files
⚠️
The AI inflection point: What security leaders must do now
⚠️
Securing Software's Journey with the OWASP SPVS - ASW #378
⚠️
AI Codex Exploits Samsung TV Driver Flaw to Gain Root Access
⚠️
China-linked cloud credential heist runs on typos and SMTP
⚠️
Securing non-human identities: automated revocation, OAuth, and scoped permissions
⚠️
US, UK and Canada disrupt $45M crypto theft in Operation Atlantic
⚠️
Adobe fixes PDF zero-day security bug that hackers have exploited for months
⚠️
AI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad Fraud
⚠️
EU regulators largely denied access to Anthropic Mythos
⚠️
Kali Forms Vulnerability Enables Remote Code Execution RCE
⚠️
Hack the AI agent: Build agentic AI security skills with the GitHub Secure Code Game
⚠️
Personal data of 1 million gym members compromised in Basic-Fit security incident
⚠️
Adobe Issues Emergency Patch for Critical PDF Flaw Exploited For Months
⚠️
4 questions to ask before outsourcing MDR
⚠️
5 trends defining the future of AI-powered cybersecurity
⚠️
Patch Tuesday, April 2026 Edition
KEV
⚠️
Zuckbot, Rockstar, Klaude, Browsers Galore, Microsoft 365, ATC, Kieran Human and more - SWN #572
⚠️
Microsoft’s April Windows update fixes 165 flaws, one exploited zero-day
KEV
⚠️
Secure AI agent access patterns to AWS resources using Model Context Protocol
📋
SAP Patch Day Fixes Critical SQL Injection, DoS, and Code Injection Flaws
📋
Microsoft Patch Tuesday April 2026., (Tue, Apr 14th)
📋
Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities
📢
Angriffe auf sieben Sicherheitslücken beobachtet – eine ist 14 Jahre alt
📢
Omnistealer uses the blockchain to steal everything it can
📢
Anthropic co-founder confirms the company briefed the Trump administration on Mythos
📢
AI Breaks Identity Models
🔥
Weekly Update 499
🔥
Okta Under Attack as Hackers Skip Phishing for Identity Systems
🔥
Rockstar’s GTA Game Hacked, 78.6 Million Records Published Online
🔥
Is Booking.com compromised ?
🔥
Janela RAT Spreads via Fake MSI Installers, Malicious Extensions
🔥
Booking.com breach sparks scam wave targeting travelers’ bookings
🔥
Mirax Android RAT Hijacks Infected Phones as Residential Proxies
🔥
European Gym giant Basic-Fit data breach affects 1 million members
🔥
Three Rowhammer attacks targeting GDDR6 | Kaspersky official blog
🔥
France builds its own digital future.
🕵️
ISC Stormcast For Tuesday, April 14th, 2026 https://isc.sans.edu/podcastdetail/9890, (Tue, Apr 14th)
🕵️
APT41 Targets Linux Cloud Servers With New Winnti Backdoor
🕵️
Fake Proxifier GitHub Installer Spreads ClipBanker Crypto Malware
🕵️
GUEST ESSAY: Google’s 2029 deadline exposes readiness gap as move to quantum-safe crypto lags
🕵️
Cyber-Inspekteur: Hybride Attacken nehmen weiter zu
🕵️
Someone Bought 30 WordPress Plugins and Planted a Backdoor in All of Them.
🕵️
When Trust Becomes a Weapon: Google Cloud Storage Phishing Deploying Remcos RAT
🕵️
China Clean Tech and the Gulf Energy Shock
🕵️
108 Chrome extensions caught stealing user data and hijacking sessions
🕵️
New KnowBe4 Agent Risk Manager Addresses Pervasive AI Agent Risk
🕵️
Mirax Android Trojan Turns Devices Into Residential Proxy Nodes - Infosecurity Magazine
🕵️
Mozilla Criticizes Microsoft for Installing Copilot on Windows Without User Consent
🕵️
JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025
🕵️
Build Real Coding Skills for $43 with Visual Studio 2026 Bundle
🕵️
APT41 Delivers 'Undetectable' Backdoor to Steal Cloud Credentials
🕵️
PlugX USB Worm Hits Multiple Continents via DLL Sideloading
🕵️
Botnet Exposed: Hackers Leave Worker Access and Root Passwords Wide Open
🕵️
Our evaluation of Claude Mythos Preview’s cyber capabilities
🕵️
OpenAI Impacted by North Korea-Linked Axios Supply Chain Hack - SecurityWeek
🕵️
Fake Ledger app on the Apple App Store steals $9.5 million from 50 users
🕵️
SAP Patch Day Fixes Critical SQL Injection, DoS, and Code Injection Flaws
🕵️
Turn Your Expertise Into Published Books Using Advanced AI Technology
🕵️
Top 10 Security Isn’t Enough
🕵️
How exposed is your code? Find out in minutes—for free
🕵️
Upcoming Speaking Engagements
🕵️
CyberheistNews Vol 16 #15 Anthropic's Mythos Is Not Just a Tool. It's Something You Have to Contain.
🕵️
Security Risk Advisors Purple Team Participants Can Now Earn CPE Credits
🕵️
AI “Watershed Moment” or expensive pen tester? The AISI Mythos Data
🕵️
Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)
🕵️
State-sponsored threats: Different objectives, similar access paths
🕵️
Jeff Bezos-Backed EV Startup Raises $650M to Launch $25K Electric Pickup
🕵️
X Cuts Clickbait Payouts and Exposes a Creator Program Problem
🕵️
Microsoft to Retire Outlook Lite, Impacting Millions of Android Users
🕵️
What is AEO SEO? Why Answer Engine Optimization Is the Next Evolution of SEO
🕵️
HubSpot Launches AEO Tool to Help Brands Compete in AI Search
🕵️
Motorola Razr 70 Ultra Specs Leak Raises Familiar Concerns
🕵️
Toyota Unveils Basketball-Shooting Robot With Vision Tech
🕵️
Google $135M Settlement: Millions of Android Users May Qualify for Payout
🕵️
Apple’s Mac mini 2026: New Leak Teases M5 Upgrade, Release Timeline
🕵️
Proton boosts Drive performance and expands encrypted workspace features
🕵️
Amazon to Acquire Globalstar in $11.6B Bid to Power Future iPhones
🌐
Fake Claude AI installer abuses DLL sideloading to deploy PlugX
🌐
CPUID: Angreifer haben über Webseite Malware-Installer verteilt
🌐
Someone planted backdoors in dozens of WordPress plug-ins used in thousands of websites
📡
108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users
📡
FIFA World Cup 2026: More than One-Third of Official Partners Expose the Public to the Risk of Email Fraud
📡
Phantom in the vault: Obsidian abused to deliver PhantomPulse RAT
📡
ChatGPT under scrutiny as Florida investigates campus shooting
📡
Sicherheitslücke: wolfSSL-Bibliothek winkt manipulierte Zertifikate durch
📡
Rockstar Games: Kriminelle Gang veröffentlicht Daten
📡
Linux 7.0 erschienen – mehr als ein Nummernsprung
📡
SAP-Patchday: Eine kritische SQL-Injection-Lücke – und 18 weitere
📡
Scaling MCP adoption: Our reference architecture for simpler, safer and cheaper enterprise deployments of MCP
📡
Managed OAuth for Access: make internal apps agent-ready in one click
📡
Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security
📡
UK gov's Mythos AI tests help separate cybersecurity threat from hype
🚨
CISA Adds Seven Known Exploited Vulnerabilities to CatalogCISA has added seven new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2012-1854 Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability CVE-2020-9715 Adobe Acrobat Use-After-Free Vulner…
KEV
🐛
Adobe Fixes Actively Exploited Zero-Day in Acrobat Reader
KEV
🐛
WordPress Plugin Vulnerability Enables Admin Takeover via Auth Bypass
🐛
Marimo RCE Vulnerability Exploited Within 10 Hours of Public Disclosure
KEV
🐛
Critical Axios Vulnerability Enables Remote Code Execution, PoC Released
🐛
Seven IBM WebSphere Liberty flaws can be chained into full takeover
🐛
Critical flaw in Marimo Python notebook exploited within 10 hours of disclosure
KEV
🐛
Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw
⚠️
Banks Panic As Anthropic Mythos Exposes Software Vulnerabilties
⚠️
Apache Tomcat Flaws Enable EncryptInterceptor Bypass
⚠️
CISOs tackle the AI visibility gap
⚠️
We catch up on the news, including AI vuln hunting; also more RSAC interviews! - ESW #454
⚠️
AI Chatbots and Trust
⚠️
International Operation Targets Multimillion-Dollar Crypto Theft Schemes
⚠️
Hackers Exploit MSBuild LOLBin to Evade Detection in Fileless Windows Attacks
⚠️
Critical Marimo pre-auth RCE flaw now under active exploitation
⚠️
Your MTTD Looks Great. Your Post-Alert Gap Doesn't
⚠️
⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More
⚠️
Too Many Vulnerabilities to Fix
⚠️
From Compliance to Code: Rethinking Cloud Security - Richard Marcus - CSP #223
⚠️
On Anthropic’s Mythos Preview and Project Glasswing
⚠️
Anthropic's Mythos Preview: Why the Human Layer Matters More, Not Less
⚠️
Anthropic’s Mythos signals a structural cybersecurity shift
⚠️
March 2026 CVE Landscape: 31 High-Impact Vulnerabilities Identified, Interlock Ransomware Group Exploits Cisco FMC Zero-Day
⚠️
Simply opening a PDF could trigger this Adobe Reader zero-day
KEV
⚠️
Citizen Lab: Webloc tracked 500M devices for global law enforcement
⚠️
GrafanaGhost: The AI That Leaked Everything Without Being Hacked
⚠️
Get Secure Cloud Storage on a 2TB Lifetime Plan with Internxt for $100
⚠️
Rockstar Games confirms data breach as ShinyHunters leaks 78 million records
⚠️
Booking.com data breach exposed users’ reservation details
⚠️
Standard fiber optic cables can be turned into remote microphones
⚠️
Hallmark data breach exposed information of 1.7 million accounts
📢
Google Brings End-to-End Encrypted Gmail to Android and iPhone
📢
New Nginx 1.29.8 and FreeNginx Versions Patch Critical Security Flaws
📢
[Control systems] CISA ICS security advisories (AV26–339)
📢
Ubuntu security advisory (AV26-338)
📢
Adobe Acrobat security advisory (AV26-340)
📢
IBM security advisory (AV26-342)
📢
Red Hat security advisory (AV26-341)
🔥
EDR Killers Broaden Ransomware Tactics, ESET Warns
🔥
APT37 Uses Facebook, Telegram, and Trojanzied Installer in New Targeted Cyberattack
🔥
OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident
🔥
Basic-Fit Suffers Data Breach Affecting Millions Across Multiple Nations
🔥
CPUID Hacked to Serve Trojanized CPU-Z and HWMonitor Downloads
🔥
How to protect your privacy while using smart sex toys | Kaspersky official blog
🔥
Nearly 4,000 US industrial devices exposed to Iranian cyberattacks
🔥
OpenAI Impacted by North Korea-Linked Axios Supply Chain Hack
🔥
Hacker Used Claude Code, GPT-4.1 to Exfiltrate Hundreds of Millions of Mexican Records
🔥
Hack at Anodot leaves over a dozen breached companies facing extortion
🔥
Booking.com confirms hackers accessed customers’ data
🔥
Rockstar Games receives “pay or leak” warning after cyberattack
🔥
Iran-linked group Handala claims to have breached three major UAE organizations
🔥
CPUID watering hole attack spreads STX RAT malware
🔥
Booking.com Hack Exposes Customer Data, Sparks Travel Scam Fears
🕵️
ISC Stormcast For Monday, April 13th, 2026 https://isc.sans.edu/podcastdetail/9888, (Mon, Apr 13th)
🕵️
WhatsApp’s “End-to-End Encryption by Default” Claim Called Consumer Fraud by Pavel Durov
🕵️
Elon Musk Announces XChat Launch With Self-Destructing Messages
🕵️
Gmail Brings End-to-End Encryption to Android and iOS for Enterprise Users
🕵️
VIPERTUNNEL Python Backdoor Hidden in Fake DLL, Obfuscated Loader Chain
🕵️
Fake Claude Website Distributes PlugX RAT
🕵️
North Korea's APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware
🕵️
Iran-Linked CyberAv3ngers Target Water Utilities, Industrial Controllers
🕵️
Juniper Networks Patches Dozens of Junos OS Vulnerabilities - SecurityWeek
🕵️
Microsoft: Canadian employees targeted in payroll pirate attacks
🕵️
New Phishing Kit Streamlines ClickFix Attacks
🕵️
GitHub and Jira Alerts Hijacked for Trusted-SaaS Phishing
🕵️
BrowserGate: Claims of LinkedIn ‘Spying’ Clash With Security Research Findings
🕵️
Booking.com Says Hackers Accessed User Information
🕵️
The Risk of Trusted System Access
🕵️
Outlook Breaks on Moon Mission
🕵️
Just 21 IP Addresses Are Now Behind Nearly Half of All RDP Scanning on the Internet
🕵️
Google’s ‘Tap to Share’ Could Finally Give Android Its AirDrop Moment
🕵️
Google Rolls Out End-to-End Encryption to Eligible Gmail Users on Mobile
🕵️
Own Windows 11 Pro and Microsoft Office 2024 for just $105
🕵️
Your Data, Always Within Reach – 2TB of Lifetime Cloud Storage Is $75
🕵️
Apple Car Key Support Coming to Lexus Vehicles: What We Know So Far
🕵️
Surfshark unveils new Dausos VPN protocol with dedicated user tunnels
🌐
The silent “Storm”: New infostealer hijacks sessions, decrypts server-side
🌐
JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025
🌐
A week in security (April 6 &#8211; April 12)
🌐
JanelaRAT: a financial threat targeting users in Latin America
🌐
iPhone forensics expose Signal messages after app removal in U.S. case
🌐
„ClickFix“-Angriffe auf macOS jetzt auch via Script Editor
📡
Scans for EncystPHP Webshell, (Mon, Apr 13th)
📡
FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts
📡
FBI announces takedown of phishing operation that targeted thousands of victims
📡
The Iran War: What You Need to Know
📡
Hackers access Booking.com user data, company secures systems
📡
KI-Betrug: Deutsche überschätzen ihre Fähigkeit, Deepfakes zu entlarven
📡
Fitnesskette Basic-Fit: Rund eine Million Mitglieder von Datenleck betroffen
📡
SSL-Konfigurationsfehler gefährdet VMware Tanzu Spring Cloud Gateway
📡
Angreifer attackieren Python-Notebook Marimo
🐛
Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621
KEV
🐛
CVE-2026-35206 Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment
🐛
CVE-2026-34757 LIBPNG has a yse-after-free in png_set_PLTE, png_set_tRNS and png_set_hIST leading to corrupted chunk data and potential heap information disclosure
🐛
CVE-2026-40226
🐛
CVE-2026-39853 osslsigncode has a Stack Buffer Overflow via Unbounded Digest Copy During Signature Verification
🐛
CVE-2026-39855 osslsigncode has an Integer Underflow in PE Page Hash Calculation Can Cause Out-of-Bounds Read
🐛
CVE-2026-39856 osslsigncode has an Out-of-Bounds Read via Unvalidated Section Bounds in PE Page Hash Calculation
🐛
Adobe Patches Reader Zero-Day Exploited for Months
🐛
Adobe fixes actively exploited Acrobat Reader flaw CVE-2026-34621
KEV
⚠️
Hallmark - 1,736,520 breached accounts
⚠️
Critical Marimo pre-auth RCE flaw now under active exploitation
🔥
CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads
🔥
Hackers claim control over Venice San Marco anti-flood pumps
🔥
Crime-as-a-Service: Regierung warnt vor hochprofessionellen kriminellen Netzen
🕵️
No one owes you supply-chain security
🕵️
TIOBE Index for April 2026: C Gains Again While Rust Loses Some Steam
🕵️
TIOBE Index for April 2026: Top 10 Most Popular Programming Languages
📡
Frontier artificial intelligence
📡
Rockstar bestätigt Cyberangriff und Datendiebstahl
🐛
Jeff Williams CTO Cofounder of Contrast Security and OWASP co-founder on Mythos and AI Security
🐛
CVE-2026-28810 Predictable DNS Transaction IDs Enable Cache Poisoning in Built-in Resolver
🐛
CVE-2026-29181 OpenTelemetry-Go multi-value `baggage` header extraction causes excessive allocations (remote dos amplification)
🐛
CVE-2026-27144 Miscompilation allows memory corruption via CONVNOP-wrapped array copy in cmd/compile
🐛
CVE-2026-32282 TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix
🐛
CVE-2026-33810 Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509
🐛
CVE-2026-4878 Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()
🐛
CVE-2026-35611 Addressable has a Regular Expression Denial of Service in Addressable templates
🐛
CVE-2026-28389 Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo
🐛
CVE-2026-28390 Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo
🐛
CVE-2026-39882 OpenTelemetry-Go OTLP HTTP exporters read unbounded HTTP response bodies
🐛
CVE-2026-32288 Unbounded allocation for old GNU sparse in archive/tar
🐛
CVE-2026-32281 Inefficient policy validation in crypto/x509
🐛
CVE-2026-32289 JsBraceDepth Context Tracking Bugs (XSS) in html/template
🐛
CVE-2026-32283 Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls
🐛
CVE-2026-32280 Unexpected work during chain building in crypto/x509
🐛
CVE-2026-27143 Missing bound checks can lead to memory corruption in safe Go in cmd/compile
🐛
CVE-2026-27140 Code execution vulnerability in SWIG code generation in cmd/go
⚠️
Claude and ChatGPT Exploited in Sweeping Cyber Campaign Against Government Agencies
⚠️
Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data
⚠️
Over 20,000 crypto fraud victims identified in international crackdown
⚠️
Two different attackers poisoned popular open source tools - and showed us the future of supply chain compromise
🔥
HWMonitor & CPU-Z users were exposed to malware through fake downloads after CPUID breach
🔥
Security PSA: Popular Tools CPU-Z and HWMonitor Were Briefly Compromised
🕵️
CPUID site hijacked to serve malware instead of HWMonitor downloads
🕵️
Google rolls out end-to-end encryption for Gmail on Android and iOS devices for enterprise users, letting them read and compose emails without additional tools
🕵️
Google rolls out end-to-end encryption for Gmail on Android and iOS devices for enterprise users, letting them read and compose emails without additional tools
🕵️
Google rolls out end-to-end encryption for Gmail on Android and iOS devices for enterprise users, letting them read and compose emails without additional tools
🕵️
Google rolls out end-to-end encryption for Gmail on Android and iOS devices for enterprise users, letting them read and compose emails without additional tools
🕵️
Google Locks Chrome Sessions to Devices to Stop Cookie Theft
🕵️
Supply chain nightmare: How Rust will be attacked and what we can do to mitigate the inevitable
🕵️
AI Cybersecurity After Mythos: The Jagged Frontier
📡
Jetzt patchen! Adobe veröffentlicht Notfall-Sicherheitsupdate für Acrobat Reader
📡
Einzelhändler frustriert über strenge Regeln bei KI-Kameras
📡
US-Regierung traf sich vor Mythos-Preview-Rollout mit KI-Herstellern
🚨
Analysis of one billion CISA KEV remediation records exposes limits of human-scale securityAnalysis of 1 billion CISA KEV remediation records reveal a breaking point for human-scale security. Qualys shows most critical flaws are exploited before defenders can patch them. [...]
KEV
🚨
Breaking the Patch Sound Barrier: Your Vulnerability Remediation Will Not Keep Up AI Exploit Speed.Breaking the Patch Sound Barrier: Your Vulnerability Remediation Will Not Keep Up AI Exploit Speed. So? Many years ago while at Gartner , I wrote a blog post where I defined the concept of the “Patch Sound Barrier.” ( original via Archive if you don’t believe that I was that smar…
KEV
🐛
Juniper Networks Default Credential Vulnerability Allows Unauthorized Full Access
🐛
CVE-2026-23405 apparmor: fix: limit the number of levels of policy namespaces
🐛
CVE-2026-40026 Sleuth Kit ISO9660 SUSP Extension Reference Out-of-Bounds Read
🐛
CVE-2026-40025 Sleuth Kit APFS Keybag Parser Out-of-Bounds Read
🐛
CVE-2026-40024 Sleuth Kit tsk_recover Path Traversal
🐛
CVE-2026-39881 Vim Ex command injection in Vims NetBeans integration
🐛
CVE-2026-23403 apparmor: fix memory leak in verify_header
🐛
CVE-2026-23404 apparmor: replace recursive profile removal with iterative approach
🐛
CVE-2026-23406 apparmor: fix side-effect bug in match_char() macro usage
🐛
CVE-2026-23407 apparmor: fix missing bounds check on DEFAULT table in verify_dfa()
🐛
CVE-2026-23408 apparmor: Fix double free of ns_name in aa_replace_profiles()
🐛
CVE-2026-23409 apparmor: fix differential encoding verification
🐛
CVE-2026-23410 apparmor: fix race on rawdata dereference
🐛
CVE-2026-23411 apparmor: fix race between freeing data and fs accessing it
🐛
New React Server Components Flaw Could Let Attackers Trigger DoS
🐛
HPE Aruba Private 5G Vulnerability Opens Door to Credential Theft Attacks
🐛
Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure
🐛
Claude uncovers a 13‑year‑old ActiveMQ RCE bug within minutes
🐛
Hackers Exploit GitHub Copilot Flaw to Exfiltrate Sensitive Data
🐛
Bringing Rust to the Pixel Baseband
🐛
Old Docker authorization bypass pops up despite previous patch
🐛
Chromium: CVE-2026-5899 Incorrect security UI in History Navigation
🐛
Chromium: CVE-2026-5897 Incorrect security UI in Downloads
🐛
Chromium: CVE-2026-5898 Incorrect security UI in Omnibox
🐛
Chromium: CVE-2026-5896 Policy bypass in Audio
🐛
Chromium: CVE-2026-5894 Inappropriate implementation in PDF
🐛
Chromium: CVE-2026-5893 Race in V8
🐛
Chromium: CVE-2026-5891 Insufficient policy enforcement in browser UI
🐛
Chromium: CVE-2026-5892 Insufficient policy enforcement in PWAs
🐛
Chromium: CVE-2026-5886 Out of bounds read in WebAudio
🐛
Chromium: CVE-2026-5888 Uninitialized Use in WebCodecs
🐛
Chromium: CVE-2026-5890 Race in WebCodecs
🐛
Chromium: CVE-2026-5884 Insufficient validation of untrusted input in Media
🐛
Chromium: CVE-2026-5885 Insufficient validation of untrusted input in WebML
🐛
Chromium: CVE-2026-5895 Incorrect security UI in Omnibox
🐛
Chromium: CVE-2026-5883 Use after free in Media
🐛
Chromium: CVE-2026-5887 Insufficient validation of untrusted input in Downloads
🐛
Chromium: CVE-2026-5889 Cryptographic Flaw in PDFium
🐛
Chromium: CVE-2026-5880 Incorrect security UI in browser UI
🐛
Chromium: CVE-2026-5879 Insufficient validation of untrusted input in ANGLE
🐛
Chromium: CVE-2026-5882 Incorrect security UI in Fullscreen
🐛
Chromium: CVE-2026-5881 Policy bypass in LocalNetworkAccess
🐛
Chromium: CVE-2026-5876 Side-channel information leakage in Navigation
🐛
Chromium: CVE-2026-5878 Incorrect security UI in Blink
🐛
Chromium: CVE-2026-5877 Use after free in Navigation
🐛
Chromium: CVE-2026-5874 Use after free in PrivateAI
🐛
Chromium: CVE-2026-5871 Type Confusion in V8
🐛
Chromium: CVE-2026-5872 Use after free in Blink
🐛
Chromium: CVE-2026-5873 Out of bounds read and write in V8
🐛
Chromium: CVE-2026-5875 Policy bypass in Blink
🐛
Chromium: CVE-2026-5869 Heap buffer overflow in WebML
🐛
Chromium: CVE-2026-5870 Integer overflow in Skia
🐛
Chromium: CVE-2026-5868 Heap buffer overflow in ANGLE
🐛
Chromium: CVE-2026-5864 Heap buffer overflow in WebAudio
🐛
Chromium: CVE-2026-5862 Inappropriate implementation in V8
🐛
Chromium: CVE-2026-5867 Heap buffer overflow in WebML
🐛
Chromium: CVE-2026-5860 Use after free in WebRTC
🐛
Chromium: CVE-2026-5863 Inappropriate implementation in V8
🐛
Chromium: CVE-2026-5858 Heap buffer overflow in WebML
🐛
Chromium: CVE-2026-5859 Integer overflow in WebML
🐛
Chromium: CVE-2026-5861 Use after free in V8
🐛
Chromium: CVE-2026-5918 Inappropriate implementation in Navigation
🐛
Chromium: CVE-2026-5919 Insufficient validation of untrusted input in WebSockets
🐛
Chromium: CVE-2026-5913 Out of bounds read in Blink
🐛
Chromium: CVE-2026-5915 Insufficient validation of untrusted input in WebML
🐛
Chromium: CVE-2026-5914 Type Confusion in CSS
🐛
Chromium: CVE-2026-5911 Policy bypass in ServiceWorkers
🐛
Chromium: CVE-2026-5909 Integer overflow in Media
🐛
Chromium: CVE-2026-5912 Integer overflow in WebRTC
🐛
Chromium: CVE-2026-5910 Integer overflow in Media
🐛
Chromium: CVE-2026-5908 Integer overflow in Media
🐛
Chromium: CVE-2026-5907 Insufficient data validation in Media
🐛
Chromium: CVE-2026-5904 Use after free in V8
🐛
Chromium: CVE-2026-5865 Type Confusion in V8
🐛
Chromium: CVE-2026-5906 Incorrect security UI in Omnibox
🐛
Chromium: CVE-2026-5905 Incorrect security UI in Permissions
🐛
Chromium: CVE-2026-5900 Policy bypass in Downloads
🐛
Chromium: CVE-2026-5866 Use after free in Media
🐛
Chromium: CVE-2026-5903 Policy bypass in IFrameSandbox
🐛
Chromium: CVE-2026-5902 Race in Media
🐛
Chromium: CVE-2026-5901 Policy bypass in DevTools
🐛
CVE-2026-33119 Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
🐛
CVE-2026-33118 Microsoft Edge (Chromium-based) Spoofing Vulnerability
⚠️
News alert: Mallory launches AI-native platform to cut through alert noise and surface real risk
⚠️
AWS Fixes Severe RCE, Privilege Escalation Flaws in Research and Engineering Studio
⚠️
ChatGPT, Claude, and Gemini Among 11 AI Models Vulnerable to One-Line Jailbreak
⚠️
Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet Users
⚠️
TP-Link Devices at Risk as Multiple Security Flaws Enable Takeover
⚠️
Critical Marimo Flaw Exploited Hours After Public Disclosure
⚠️
The cyber winners and losers in Trump’s 2027 budget
⚠️
CMMC compliance in the age of AI
⚠️
Why most zero-trust architectures fail at the traffic layer
⚠️
Fake BTS Tour Ticket Scams Target Fans Worldwide
⚠️
Orthanc DICOM Vulnerabilities Lead to Crashes, RCE
⚠️
Hungarian government email passwords exposed ahead of election
⚠️
Juniper Networks Patches Dozens of Junos OS Vulnerabilities
⚠️
EngageSDK Vulnerability puts millions of crypto wallets at risk
⚠️
FCC Can’t Define a Router
⚠️
In Other News: Cyberattack Stings Stryker, Windows Zero-Day, China Supercomputer Hack
⚠️
Hacker Unknown now known, named on Europol’s most-wanted list
⚠️
Google adds end-to-end Gmail encryption to Android, iOS devices for enterprises
⚠️
Crushing the Axios supply chain threat with Tenable Hexa AI: Use cases for agentic AI
⚠️
[local] NetBT e-Fatura - Privilege Escalation
⚠️
Microsoft: Third-Party Android Vulnerability Leaves Over 50M Users Exposed
⚠️
AI Expansion, Security Crises, and Workforce Upheaval Define This Week in Tech
⚠️
Webloc surveillance system tracks millions using mobile ad data
⚠️
Warten auf Sicherheitsupdate: Angreifer attackieren Adobe Reader
📢
Rising Compliance Oversight Pressure: From Audit Fatigue to Continuous Readiness
📢
Google Chrome security advisory (AV26-337)
📢
Friday Squid Blogging: Squid Overfishing in the South Pacific
📢
ur best techno-babble to bypass clueless auditors?
📢
ur best techno-babble to bypass clueless auditors?
🔥
Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers
🔥
Iranian APT alert: 5,219 Rockwell PLCs exposed online
🔥
Massive Data Breach Exposes 337K LAPD-Linked Records
🔥
Healthcare IT solutions provider ChipSoft hit by ransomware attack
🔥
Cryptocurrency ATM giant Bitcoin Depot reports $3.6 million stolen in cyberattack | The Record from Recorded Future News
🔥
Nearly 4,000 US industrial devices exposed to Iranian cyberattacks
🔥
CPUID hijacked to serve malware as HWMonitor downloads
🔥
VIP Credential Monitoring Blog
🕵️
WhatsApp Adds Username Feature to Boost Privacy and Reduce Number Sharing
🕵️
DesckVB RAT Uses Fileless .NET Loader to Evade Detection
🕵️
GlassWorm Trojan Hits VS Code, Cursor, Windsurf via OpenVSX Extension
🕵️
Obfuscated JavaScript or Nothing, (Thu, Apr 9th)
🕵️
MuddyWater Uses Russian MaaS in New ChainShell Attack
🕵️
GitHub, GitLab Abused for Malware and Phishing Campaigns
🕵️
Google Rolls Out Cookie Theft Protections in Chrome
🕵️
Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action
🕵️
Middle East Espionage Attack Uses Fake Secure Messaging Apps to Deliver ProSpy
🕵️
MITRE Releases Fight Fraud Framework
🕵️
Sen. Sanders Talks to Claude About AI and Privacy
🕵️
Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000
🕵️
Do extremely short credential lifetimes actually help security?
🕵️
Microsoft: Canadian employees targeted in payroll pirate attacks
🕵️
Smart Slider updates hijacked to push malicious WordPress, Joomla versions
🕵️
New ‘LucidRook’ malware used in targeted attacks on NGOs, universities
🕵️
Industry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback Friday
🕵️
EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallet Installs
🕵️
Google Warns of New Threat Group Targeting BPOs and Helpdesks - Infosecurity Magazine
🕵️
FBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification Database
🕵️
Storm-2755 Uses AiTM Hijacking to Divert Employee Salaries
🕵️
Phishing Campaign Targets Japanese Firms During Tax Season
🕵️
Staypuft, Claude, One Pixel, deepfakes, Raccoon, BOFH, Satoshi Nakamoto, Josh Marpet. - SWN #571
🕵️
Samsung Eyes Vietnam for $4B Semiconductor Packaging Project
🕵️
Alibaba Launches AI Data Center Powered by 10,000 Homegrown Chips
🕵️
Google Brings NotebookLM to Gemini for Easy Project Organization
🕵️
New Apple Rumor: iPhone Air 2 Leak Suggests Major Upgrades After First-Gen Criticism
🕵️
Mitsubishi Targets Hybrid Vehicle Production in the Philippines by 2028
🕵️
When Are Payroll Taxes Due? 2026 Due Dates and Requirements
🕵️
Embedded Finance vs Banking as a Service in 2026: Key Differences Explained
🕵️
Session says funding will last until July, pauses development
🕵️
Signal is testing a new plaintext chat export feature in Beta 8.7
🕵️
HWMonitor and CPU-Z downloads hijacked to deliver malware to users
🌐
Supply chain attack at CPUID pushes malware with CPU-Z/HWMonitor
🌐
Fake Claude site installs malware that gives attackers access to your computer
🎙️
Snake Oilers: Burp AI, Sondera and Truffle Security
📡
Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows
📡
Google rolls out Gmail end-to-end encryption on mobile devices
📡
Browser Extensions Are the New AI Consumption Channel That No One Is Talking About
📡
GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
📡
France to ditch Windows for Linux to reduce reliance on US tech
📡
How to protect your organization from AirSnitch Wi-Fi vulnerabilities | Kaspersky official blog
📡
ChatGPT rolls out new $100 Pro subscription to challenge Claude
📡
Recovery scammers hit you when you’re down: Here’s how to avoid a second strike
📡
AI and cryptocurrency scams are costing Americans billions, FBI reports
📡
[webapps] D-Link DIR-650IN - Authenticated Command Injection
📡
ClickFix finds a new way to infect Macs
📡
iOS: Gelöschte Signal-Daten von FBI via Benachrichtigungsdatenbank extrahiert
📡
Frankreichs Plan: Weg von Windows, hin zu Linux
📡
Google Chrome macht Cookie-Klau unter Windows sinnlos
📡
Pornografische KI-Plattform MyLovely.ai: Datenleck von 106.000 Konten
🚨
Patch windows collapse as time-to-exploit acceleratesThe gap between vulnerability disclosure and exploitation is drastically decreasing, putting security teams’ patching practices on notice. According to Rapid7’s latest Cyber Threat Landscape Report , confirmed exploitation of newly disclosed high- and critical-severity vulnerabil…
KEV
🚨
What to Know About CyberAv3ngers: The IRGC-Linked Group Targeting Critical InfrastructureAn Iran-affiliated threat group has evolved from defacing water utility displays to deploying custom ICS malware and exploiting Rockwell Automation PLCs across multiple U.S. critical infrastructure sectors. Key takeaways: CyberAv3ngers is a state-directed threat group operating u…
KEV
🐛
Fortinet EMS Zero-Day, Anthropic's AI Finds Thousands of Bugs, Iranian Hackers Target US ICS
KEV
🐛
Palo Alto Cortex XSOAR Flaw in Microsoft Teams Integration Lets Attackers Access Data
🐛
CVE-2026-34933 Avahi: Reachable assertion in `transport_flags_from_domain()` via conflicting publish flags crashes avahi-daemon
🐛
CVE-2026-39314 CUPS has an integer underflow in `_ppdCreateFromIPP` causes root cupsd crash via negative `job-password-supported`
🐛
CVE-2026-31789 Heap Buffer Overflow in Hexadecimal Conversion
🐛
CVE-2026-28387 Potential Use-after-free in DANE Client Code
🐛
CVE-2026-31790 Incorrect Failure Handling in RSA KEM RSASVE Encapsulation
🐛
CVE-2026-28388 NULL Pointer Dereference When Processing a Delta CRL
🐛
CVE-2026-34446 ONNX: Arbitrary File Read via ExternalData Hardlink Bypass in ONNX load
🐛
CVE-2026-39316 CUPS has a use-after-free in `cupsdDeleteTemporaryPrinters` via dangling subscription pointer
🐛
CVE-2026-35093 Libinput: libinput: unauthorized code execution and information disclosure through lua bytecode plugins
🐛
CVE-2026-34445 ONNX: Malicious ONNX models can crash servers by exploiting unprotected object settings.
🐛
CISA Issues Warning on Critical Ivanti EPMM Flaw Exploited in Ongoing Attacks
KEV
🐛
Technical Details Released for Critical Cisco SSM Command Execution Vulnerability
🐛
Vulnerability-Lookup 4.4.0
KEV
🐛
Hackers have been exploiting an unpatched Adobe Reader vulnerability for months
KEV
🐛
VU#536588: Multiple Heap Buffer Overflows in Orthanc DICOM Server
⚠️
Questions raised about how LinkedIn uses the petabytes of data it collects
⚠️
GitLab Addresses Multiple Vulnerabilities Linked to DoS and Code Injection
⚠️
Multiple SonicWall Flaws Enable SQL Injection and Privilege Escalation Attacks
⚠️
Microsoft suspends dev accounts for high-profile open source projects
⚠️
Linux Foundation Leader Impersonated in Slack Attack on Open Source Developers
⚠️
Adobe Reader Zero-Day Exploited for Months: Researcher
⚠️
Weak at the seams
⚠️
Hackers exploiting Acrobat Reader zero-day flaw since December
⚠️
Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025
⚠️
Critical Vulnerability in Ninja Forms Exposes WordPress Sites - Infosecurity Magazine
⚠️
Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities
⚠️
New ClickFix variant bypasses Apple safeguards with one‑click script execution
⚠️
New Phishing Campaign Exploits Google Storage to Deliver Remcos RAT
⚠️
Attackers Deploy Hidden Magecart Skimmer on Magento Using SVG onload Abuse
⚠️
Hackers Actively Attacking Adobe Reader Users Using Sophisticated 0-Day Exploit
⚠️
ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories
⚠️
Intent redirection vulnerability in third-party SDK exposed millions of Android wallets to potential risk
⚠️
Microsoft BANNED WireGuard, VeraCrypt & Windscribe With Zero Warning
⚠️
Cloudflare ‘actively adjusting’ quantum priorities in wake of Google warning
⚠️
EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets
⚠️
Healthcare IT solutions provider ChipSoft hit by ransomware attack
⚠️
AI Makes All Bug Shallow? - PSW #921
⚠️
U.S. Public Sector Under Siege: Threat Intelligence for Q1 2026
⚠️
[webapps] React Server 19.2.0 - Remote Code Execution
⚠️
[webapps] Jumbo Website Manager - Remote Code Execution
⚠️
[local] ZSH 5.9 - RCE
⚠️
Master C and C++ with our new Testing Handbook chapter
📋
Critical Chrome Flaws Let Attackers Execute Arbitrary Code
📋
AI Can Catch Malicious Updates
📢
Microsoft Details How Defender Protects High-Value Assets in Real-World Attacks
📢
The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security
📢
STX RAT Hides Remote Desktop, Steals Data to Dodge Detection
📢
Juniper Networks security advisory (AV26-334)
📢
HPE security advisory (AV26-333)
📢
Qualcomm security advisory – April 2026 monthly rollup (AV26-335)
📢
Tenable security advisory (AV26-336)
📢
Elastic on Defence Cyber Marvel 2026: A Technical overview from the Exercise Floor
🔥
Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long
🔥
Microsoft Confirms Windows 11 Update Breaks Start Menu Search
🔥
Hackers steal $3.6 million from crypto ATM giant Bitcoin Depot
🔥
300,000 People Impacted by Eurail Data Breach
🔥
China’s Tianjin Supercomputer Center Allegedly Hit in 10-Petabyte Data Theft
🔥
Fake Security Tool Spreads LucidRook in Taiwan Cyberattacks
🔥
Eurail says December data breach impacts 300,000 individuals
🔥
Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access
🔥
Apple Intelligence AI Guardrails Bypassed in New Attack
🔥
Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees
🔥
Eurail says December data breach impacts 300,000 individuals
🔥
Protecting Cookies with Device Bound Session Credentials
🔥
CASI Leaderboard Shifts: Developer Role Attack, and Three Concerning Incidents
🕵️
ISC Stormcast For Thursday, April 9th, 2026 https://isc.sans.edu/podcastdetail/9886, (Thu, Apr 9th)
🕵️
Meta Business Alerts Abused for Phishing Campaigns
🕵️
Silver Fox Campaign Spreads ValleyRAT via Fake Chinese Telegram Language Pack
🕵️
$3.6 Million Stolen in Bitcoin Depot Hack
🕵️
RoningLoader Campaign Uses DLL Side-Loading, Code Injection to Slip Past Defenses
🕵️
Package Security Problems for AI Agents
🕵️
LinkedIn Hidden Code Secretly Searches Your Browser for Installed Extensions
🕵️
Google Warns of New Campaign Targeting BPOs to Steal Corporate Data
🕵️
On Microsoft’s Lousy Cloud Security
🕵️
ClickFix Campaign Abuses macOS Script Editor to Deploy Atomic Stealer
🕵️
Iran Disrupts US Critical Infrastructure Via Exposed PLCs
🕵️
Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region
🕵️
13-year-old bug in ActiveMQ lets hackers remotely execute commands
🕵️
Webinar: From noise to signal - What threat actors are targeting next
🕵️
FBI: Cybercrime Losses Neared $21 Billion in 2025 - SecurityWeek
🕵️
Phishing Campaign Impersonates Palo Alto Networks Recruiters
🕵️
Can we Trust AI? No – But Eventually We Must
🕵️
ClickFix, Malicious DMGs Push notnullOSX to macOS Users
🕵️
AI Phishing Attack Prevention Strategies: How AI Identifies and Limits Human Risk
🕵️
U.S. Treasury to loop in crypto sector on hacker warnings shared with traditional firms
🕵️
The agentic SOC—Rethinking SecOps for the next decade
🕵️
New VENOM phishing attacks steal senior executives' Microsoft logins
🕵️
The long road to your crypto: ClipBanker and its marathon infection chain
🕵️
How Phishing Is Targeting Germany’s Economy: Active Threats from Finance to Manufacturing
🌐
Smart Slider updates hijacked to push malicious WordPress, Joomla versions
🌐
UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns
🌐
Google Chrome adds infostealer protection against session cookie theft
🌐
New ‘LucidRook’ malware used in targeted attacks on NGOs, universities
🌐
This fake Windows support website delivers password-stealing malware
📡
Number Usage in Passwords: Take Two, (Thu, Apr 9th)
📡
The Hidden Security Risks of Shadow AI in Enterprises
📡
Fake BTS ARIRANG tour tickets: K-pop fans being targeted by scammers | Kaspersky official blog
📡
When attackers already have the keys, MFA is just another door to open
📡
Hacker stole £700,000 from U.K. energy company by redirecting payment
📡
Tearing down a car telematic unit (and finding an accident on Facebook)
📡
Third-Party Risk Is an Intelligence Operation. It's Time We Treated It Like One.
📡
[webapps] RomM 4.4.0 - XSS_CSRF Chain
📡
Scammers pose as Amazon support to steal your account
📡
NSFW app leak exposes 70,000 prompts linked to individual users
📡
30,000 private Facebook images allegedly downloaded by Meta employee
🚨
TeamPCP Supply Chain Campaign: Update 007 - Cisco Source Code Stolen via Trivy-Linked Breach, Google GTIG Tracks TeamPCP as UNC6780, and CISA KEV Deadline Arrives with No Standalone Advisory, (Wed, Apr 8th)This is the seventh update to the TeamPCP supply chain campaign threat intelligence report,&#;x26;#;xc2;&#;x26;#;xa0; "When the Security Scanner Became the Weapon" &#;x26;#;xc2;&#;x26…
KEV
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-1340 Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability This type of vulnerability is a frequent attack vector for malici…
KEV
🐛
Claude Identifies Critical 13-Year-Old RCE Vulnerability in Apache ActiveMQ
🐛
CVE-2026-34982 Vim modeline bypass via various options affects Vim < 9.2.0276
🐛
CVE-2026-35177 Path traversal issue with zip.vim in Vim
🐛
Docker Authorization Bypass Flaw Exposed Hosts to Potential Attackers
🐛
Multiple OpenSSL Flaws Expose Sensitive Data in RSA KEM Handling
🐛
Hackers exploit a critical Flowise flaw affecting thousands of AI workflows
🐛
Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
⚠️
Cybercriminals Use Fake Zoom, Teams Calls to Deliver Malware
⚠️
Claude Code Leak Exploited to Spread Vidar and GhostSocks via GitHub Releases
⚠️
Remus Infostealer Debuts With Stealthy New Credential-Theft Tactics
⚠️
Assessing Claude Mythos Preview’s cybersecurity capabilities
⚠️
GreyNoise Launches C2 Detection for Exploited Edge Devices
⚠️
Top 10 Best Multi-Factor Authentication (MFA) Providers in 2026
⚠️
The tabletop exercise grows up
⚠️
Microsoft’s new Agent Governance Toolkit targets top OWASP risks for AI agents
⚠️
Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems
⚠️
The zero-day timeline just collapsed. Here’s what security leaders do next
⚠️
US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking
⚠️
LLM-generated passwords are indefensible. Your codebase may already prove it
⚠️
Forest Blizzard leverages router compromises to launch AiTM attacks, target Outlook sessions
⚠️
Hackers Targeting Ninja Forms Vulnerability That Exposes WordPress Sites to Takeover
⚠️
Hackers Target Adobe Reader Users With Sophisticated Zero-Day Exploit
⚠️
Iran‑linked PLC attacks cause real‑world disruption at critical US infra sites
⚠️
Massachusetts Hospital Diverts Ambulances as Cyberattack Causes Disruption
⚠️
Anthropic Launches Claude Mythos Preview Focused on Zero-Day Vulnerability Discovery
⚠️
Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign
⚠️
Voice Phishing is a Growing Social Engineering Threat
⚠️
Joint advisory on Russian GRU exploiting vulnerable routers to steal sensitive information
⚠️
RCE Bug Lurked in Apache ActiveMQ Classic for 13 Years
⚠️
GrafanaGhost Exploit Bypasses AI Guardrails for Silent Data Exfiltrati
⚠️
Developer of VeraCrypt encryption software says Windows users may face boot-up issues after Microsoft locked his account
⚠️
Data Leakage Vulnerability Patched in OpenSSL
⚠️
Yael Nardi joins Minimus as Chief Business Officer to drive hyper-growth
⚠️
Legit Login Flow Turned Attack
⚠️
13-year-old bug in ActiveMQ lets hackers remotely execute commands
⚠️
How botnet-driven DDoS attacks evolved in 2H 2025
⚠️
CISA orders feds to patch exploited Ivanti EPMM flaw by Sunday
⚠️
Arelion employs NETSCOUT Arbor DDoS protection products
⚠️
WireGuard VPN developer can’t ship software updates after Microsoft locks account
⚠️
Hackers use pixel-large SVG trick to hide credit card stealer
⚠️
[webapps] FortiWeb 8.0.2 - Remote Code Execution
⚠️
[webapps] xibocms 3.3.4 - RCE
⚠️
[webapps] Horilla v1.3 - RCE
⚠️
Risky Business #832 -- Anthropic unveils magical 0day computer God
📋
IBM Security Verify Access Flaws Let Remote Attackers Access Sensitive Data
📢
HPE security advisory (AV26-325)
📢
CUPS security advisory (AV26-326)
📢
GitLab security advisory (AV26-327)
📢
Mitel security advisory (AV26-328)
📢
OpenSSL security advisory (AV26-329)
📢
Ivanti security advisory (AV26-068) – Update 2
📢
Apache ActiveMQ security advisory (AV26-330)
📢
Palo Alto Networks security advisory (AV26-331)
📢
SonicWall security advisory (AV26-332)
📢
A framework for securely collecting forensic artifacts into S3 buckets
📢
Russian hacking group targets home and small office routers to spy on users
🔥
Snowflake customers hit in data theft attacks after SaaS integrator breach
🔥
My Lovely AI - 106,271 breached accounts
🔥
FBI Takes Down Russian Campaign That Compromised Thousands of Routers
🔥
Zero Trust Readiness and Two RSAC 2026 Interviews from Fenix24 and Absolute Security - BSW #442
🔥
Hackers steal and leak sensitive LAPD police documents
🔥
Thousands of consumer routers hacked by Russia's military
🕵️
ISC Stormcast For Wednesday, April 8th, 2026 https://isc.sans.edu/podcastdetail/9884, (Wed, Apr 8th)
🕵️
Iran-Linked Hackers Disrupt US Critical Infrastructure via PLC Attacks
🕵️
ComfyUI Servers Hijacked for Cryptomining, Proxy Botnet Ops
🕵️
Fiber Optic Cables Turned Into Hidden Microphones to Spy on Private Conversations
🕵️
Russian Threat Actors Abuse Home Routers in Expanding DNS Hijacking Wave
🕵️
Minimum Release Age is an Underrated Supply Chain Defense
🕵️
N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust
🕵️
Python Supply-Chain Compromise
🕵️
Masjesu Botnet Targets Routers in Commercial DDoS Attacks
🕵️
Evasive Masjesu DDoS Botnet Targets IoT Devices
🕵️
EvilTokens Uses Stolen Microsoft 365 Tokens, AI to Supercharge BEC
🕵️
Anthropic Unveils ‘Claude Mythos’ – A Cybersecurity Breakthrough That Could Also Supercharge Attacks
🕵️
What are You Working on Wednesday
🕵️
FBI: Cybercrime Losses Neared $21 Billion in 2025
🕵️
Major outage cripples Russian banking apps and metro payments nationwide
🕵️
LLMs vs Machine Learning for Security
🕵️
APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies
🕵️
6 Winter 2026 G2 Leader Badges prove this DDoS protection stands out
🕵️
VeraCrypt lockdown
🕵️
Don’t Know Your Data? Problem
🕵️
Google: New UNC6783 hackers steal corporate Zendesk support tickets
🕵️
Announcing ADEM Universal Agent
🕵️
Understanding and Anticipating Venezuelan Government Actions
🕵️
Building Phishing Detection That Works: 3 Steps for CISOs
🌐
Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs
🌐
Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices
🌐
New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy
🌐
New macOS stealer campaign uses Script Editor in ClickFix attack
🌐
Hack-for-hire group caught targeting Android devices and iCloud backups
🌐
Financial cyberthreats in 2025 and the outlook for 2026
🎙️
Smashing Security podcast #462: LinkedIn is spying on you, and you agreed to nothing
📡
Weekly Threat Bulletin – April 8th, 2026
📡
Microsoft rolls out fix for broken Windows Start Menu search
📡
Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)
📡
Is a $30,000 GPU Good at Password Cracking?
📡
Final 3 days to save up to $500 on your TechCrunch Disrupt 2026 pass
📡
More Honeypot Fingerprinting Scans, (Wed, Apr 8th)
📡
Hardening security management console settings | Kaspersky official blog
📡
[local] 7-Zip 24.00 - Directory Traversal
📡
[local] SQLite 3.50.1 - Heap Overflow
📡
[local] Microsoft MMC MSC EvilTwin - Local Admin Creation
📡
Your extensions leak clues about you, so we made sure Browser Guard doesn&#8217;t
📡
Timeshare owners warned to watch out for cartel-linked scams
🚨
CISA Alerts Defenders to Actively Exploited Fortinet Zero-Day VulnerabilityThe Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding a critical zero-day vulnerability in Fortinet products. The agency officially added the flaw to its Known Exploited Vulnerabilities (KEV) catalog on April 6, 2026, indicating that t…
KEV
🐛
50,000 WordPress Sites Running Ninja Forms Vulnerable to Critical File Upload RCE
🐛
Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed
🐛
CVE-2026-35386
🐛
CVE-2026-34743 XZ Utils: Buffer overflow in lzma_index_append()
🐛
CVE-2026-31410 ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION
🐛
CVE-2026-31407 netfilter: conntrack: add missing netlink policy validations
🐛
CVE-2026-3184 Util-linux: util-linux: access control bypass due to improper hostname canonicalization
🐛
CVE-2026-34591 Poetry Has Wheel Path Traversal Which Can Lead to Arbitrary File Write
🐛
CVE-2026-35388
🐛
CVE-2026-35387
🐛
CVE-2026-35385
🐛
CVE-2026-31408 Bluetooth: SCO: Fix use-after-free in sco_recv_frame() due to missing sock_hold
🐛
Attackers Exploit Flowise Injection Vulnerability as 15,000+ Instances Remain Exposed
KEV
🐛
Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
🐛
Max severity Flowise RCE vulnerability now exploited in attacks
🐛
AL26-007 - Vulnerability impacting Fortinet FortiClientEMS - CVE-2026-35616
🐛
Fortinet releases emergency hotfix for FortiClient EMS zero-day flaw
⚠️
North Korea's $285M Crypto Heist, China Breaches FBI System, Delve Faces New Allegations
⚠️
Windows Defender 0-Day Published Online, Giving Attackers Potential Full Access
⚠️
Microsoft Warns Storm-1175 Exploiting Web-Facing Vulnerabilities to Deploy Medusa Ransomware
⚠️
172: SuperBox
⚠️
Threat Actors Exploit LogMeIn Resolve, ScreenConnect in Phishing Campaigns
⚠️
China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware
⚠️
Life imprisonment for Cambodian scam compound operators – but will it make a difference?
⚠️
The rise of proactive cyber: Why defense is no longer enough
⚠️
The noisy tenants: Engineering fairness in multi-tenant SIEM solutions
⚠️
AppSec News Roundup on Claude Code Leak, Axios NPM Compromise, Secure Design - ASW #377
⚠️
Critical Android Flaw Allows Zero-Interaction Denial-of-Service Attacks
⚠️
Hong Kong Police Can Force You to Reveal Your Encryption Keys
⚠️
New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips
⚠️
Supply chain security is now a board-level issue: Here’s what CSOs need to know
⚠️
Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit
⚠️
Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems
⚠️
Hackers Exploit Next.js React2Shell Vulnerability, Breach 766 Hosts in 24 Hours
⚠️
Microsoft says Medusa-linked Storm-1175 is speeding ransomware attacks
⚠️
Fake Gemini npm Package Steals AI Tool Tokens
⚠️
GPUBreach Attack Could Lead to Full System Takeover and Root Shell Access
⚠️
[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk
⚠️
Zero‑click Grafana AI attack can enable enterprise data exfiltration
⚠️
Campaign Mode: Because Your SOC Team Has a Life
⚠️
Windmill Developer Platform Flaws Expose Users to RCE Attacks, Proof-of-Concept Published
⚠️
Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign
⚠️
CUPS Vulnerabilities Could Allow Remote Attackers to Achieve Root-Level Code Execution
⚠️
GrafanaGhost: Attackers Can Abuse Grafana to Leak Enterprise Data
⚠️
Trump administration plans to cut cybersecurity agency’s budget by $700 million
⚠️
Why Your Automated Pentesting Tool Just Hit a Wall
⚠️
Severe StrongBox Vulnerability Patched in Android
⚠️
One Click Took Down the Supply Chain
⚠️
Critical Flowise Vulnerability in Attacker Crosshairs
⚠️
Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins
⚠️
Milking the last drop of Intego - Time for Windows to get its LPE
⚠️
Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign
⚠️
A Little Bit Pivoting: What Web Shells are Attackers Looking for&#x3f;, (Tue, Apr 7th)
⚠️
5 steps to strengthen supply chain security and improve cyber resilience
⚠️
5 ways to strengthen identity security and improve attack resilience
⚠️
5 practical steps to strengthen attack resilience with attack surface management
KEV
⚠️
AI Found and Exploited Bugs Automatically
⚠️
Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
⚠️
Hackers exploit critical flaw in Ninja Forms WordPress plugin
⚠️
What Anthropic Glasswing reveals about the future of vulnerability discovery
⚠️
What we learned about TEE security from auditing WhatsApp's Private Inference
⚠️
ClickFix Meets AI: A Multi-Platform Attack Targeting macOS in the Wild
📢
White House Seeks to Slash CISA Funding by $707 Million
📢
Fortinet security advisory (AV26-313)
📢
Android security advisory – April 2026 monthly rollup (AV26-314)
📢
Microsoft Edge security advisory (AV26-315)
📢
IBM security advisory (AV26-316)
📢
Ubuntu security advisory (AV26-317)
📢
Red Hat security advisory (AV26-318)
📢
VMware security advisory (AV26-319)
📢
Iranian hackers are targeting American critical infrastructure, U.S. agencies warn
📢
Erlang security advisory (AV26-320)
📢
Hitachi security advisory (AV26-321)
📢
Dell security advisory (AV26-322)
📢
[Control systems] CISA ICS security advisories (AV26–324)
📢
Mozilla security advisory (AV26-323)
🔥
Weekly Update 498
🔥
German Police Unmask REvil Ransomware Leader
🔥
GPUBreach: Root Shell Access Achieved via GPU Rowhammer Attack
🔥
Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
🔥
The Hidden Cost of Recurring Credential Incidents
🔥
Kubernetes Flaws Let Hackers Jump From Containers to Cloud Accounts
🔥
New GPUBreach attack enables system takeover via GPU rowhammer
🔥
The dangers of telehealth: data breaches, phishing, and spam | Kaspersky official blog
🔥
German authorities identify REvil and GandCrab ransomware bosses
🔥
AI for Human Risk Management Shift to Adaptive Behavior Based Training
🔥
Russia Hacked Routers to Steal Microsoft Office Tokens
🔥
Snowflake customers hit in data theft attacks after SaaS integrator breach
🔥
FBI: Americans lost a record $21 billion to cybercrime last year
🔥
Support platform breach exposes Hims &amp; Hers customer data
🕵️
Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations
🕵️
ISC Stormcast For Tuesday, April 7th, 2026 https://isc.sans.edu/podcastdetail/9882, (Tue, Apr 7th)
🕵️
Fake TradingView Premium Reddit Posts Spread Vidar and AMOS Stealers
🕵️
Wynn Resorts Says 21,000 Employees Affected by ShinyHunters Hack
🕵️
New Microsoft Defender Update Issued for Windows 11, Windows 10, and Server Images
🕵️
Iran-Linked Hackers Hit M365 Tenants in Middle East Password Spray Campaign
🕵️
Fake Installers Spread RATs, Monero Miners in Ongoing Malware Campaign
🕵️
Tor-Backed ClickFix Campaign Drops Node.js RAT on Windows
🕵️
FIRESIDE CHAT: Geopolitical turmoil, rising AI risk add a new layer to enterprise cyber defense
🕵️
Hackers Weaponize Claude Code Leak to Spread Vidar and GhostSocks Malware
🕵️
Guardarian Users Targeted With Malicious Strapi NPM Packages - SecurityWeek
🕵️
BPFDoor Variants Hide with Stateless C2 and ICMP Relay Tactics
🕵️
Webinar Today: Why Automated Pentesting Alone Is Not Enough
🕵️
SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks
🕵️
Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do
🕵️
CyberheistNews Vol 16 #14 [Heads Up] Clever Hackers Use Custom Fonts to Bypass AI Defenses
🕵️
The New Rules of Engagement: Matching Agentic Attack Speed
🕵️
Trent AI Emerges From Stealth With $13 Million in Funding
🕵️
Bounty Available (>$2,000) for QubesOS BusKill package
🕵️
Russian government hackers broke into thousands of home routers to steal passwords
🕵️
Bounty Available (>$2,000) for QubesOS BusKill package
🕵️
US warns of Iranian hackers targeting critical infrastructure
🕵️
Anthropic Unveils ‘Claude Mythos’ – A Cybersecurity Breakthrough That Could Also Supercharge Attacks
🕵️
Cthullu, BlueHammer, NK, CUPs, Axios, Fortinet, Cognitive Surrender, Aaran Leyland - SWN #570
🕵️
The AI Chip War Explained
🕵️
As breakout time accelerates, prevention-first cybersecurity takes center stage
🕵️
Palo Alto Networks at Nutanix .NEXT 2026
🕵️
Building AI defenses at scale: Before the threats emerge
🌐
Supply chain integrity risk assessments: Evaluation criteria (ITSAP.10.071)
📡
Cybersecurity in the Age of Instant Software
📡
Anthropic debuts preview of powerful new AI model Mythos in new cybersecurity initiative
📡
Cloudflare targets 2029 for full post-quantum security
📡
Traffic violation scams swap links for QR codes to steal your card details
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-35616 - Fortinet FortiClient EMS Improper Access Control Vulnerability This type of vulnerability is a frequent attack vector for malicio…
KEV
🚨
CVE-2026-35616: Fortinet FortiClientEMS improper access control vulnerability exploited in the wildExploitation has been observed for CVE-2026-35616, a critical improper access control zero-day vulnerability affecting Fortinet FortiClientEMS devices. Key takeaways: CVE-2026-35616, an improper access control vulnerability, has been exploited in the wild as a zero-day.   Pu…
KEV
🐛
2,000+ FortiClient EMS Instances Exposed Online as Attackers Exploit Active RCE Flaw
🐛
Critical Dgraph Database Flaw Allowed Attackers to Bypass Authentication
🐛
6 ways attackers abuse AI services to hack your business
🐛
New multilingual severity classifiers for vulnerability analysis
🐛
Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure
KEV
🐛
ZDI-26-257: (0Day) Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
🐛
ZDI-26-256: (0Day) Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
🐛
ZDI-26-255: (0Day) Labcenter Electronics Proteus PDSPRJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
🐛
ZDI-26-254: (0Day) Labcenter Electronics Proteus PDSPRJ File Parsing Type Confusion Remote Code Execution Vulnerability
⚠️
Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
⚠️
36 Malicious Strapi npm Packages Deliver Redis RCE, Persistent C2 Malware
⚠️
Google DeepMind Flags New Threat as Malicious Web Content Puts AI Agents at Risk
⚠️
Hackers Breach ILSpy WordPress Domain to Deliver Malware
⚠️
Apache Traffic Server Flaw Allowed Attackers to Trigger Denial-of-Service Attacks
⚠️
How often are redirects used in phishing in 2026&#x3f;, (Mon, Apr 6th)
⚠️
Escaping the COTS trap
⚠️
Battling payment fraud with tokenization and executive interviews from RSAC 2026 - ESW #453
⚠️
Fortinet Rushes Emergency Fixes for Exploited Zero-Day
⚠️
Google’s Bug Bounty Program Hits Record $17 Million in 2025 Payouts
⚠️
Authentication is broken: Here’s how security leaders can actually fix it
⚠️
Critical Claude Code Flaw Silently Bypasses User-Configured Security Rules
⚠️
North Korea’s Modular Malware Strategy Hides Attribution, Defies Takedowns
⚠️
North Korean hackers abuse LNKs and GitHub repos in ongoing campaign
⚠️
Hackers exploit React2Shell in automated credential theft campaign
⚠️
A Vulnerability in Fortinet FortiClientEMS Could Allow for Arbitrary Code Execution
⚠️
Your KnowBe4 Fresh Compliance Plus Content Updates | March 2026
⚠️
Google Brings Lazy Loading to Media Files in New Chrome Release
⚠️
⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More
⚠️
Google DeepMind Researchers Map Web Attacks Against AI Agents
⚠️
CISA orders feds to patch Fortinet flaw exploited in attacks by Friday
KEV
⚠️
North Korea’s hijack of one of the web’s most used open source projects was likely weeks in the making
⚠️
Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations
⚠️
Microsoft links Medusa ransomware affiliate to zero-day attacks
⚠️
New Mexico’s Meta Ruling and Encryption
⚠️
Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit
⚠️
Microsoft links Medusa ransomware affiliate to zero-day attacks
⚠️
[local] Desktop Window Manager Core Library 10.0.10240.0 - Privilege Escalation
⚠️
[webapps] WBCE CMS 1.6.4 - Remote Code Execution
⚠️
[webapps] RiteCMS 3.1.0 - Authenticated Remote Code Execution
🔥
Threat Actors Weaponize Fake Microsoft Teams Domains to Target Users
🔥
BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks
🔥
Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
🔥
Alleged REvil Leader ‘UNKN’ Identified by German Authorities in New Takedown Effort
🔥
Drift Protocol Hit in $286M Suspected North Korea-Linked Crypto Heist
🔥
Trojanized PyPI AI Proxy Steals Claude Prompt, Exfiltrates Data
🔥
Why Simple Breach Monitoring is No Longer Enough
🔥
Social Engineering Fraud Explodes
🔥
Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps
🔥
Why Simple Breach Monitoring is No Longer Enough
🔥
New GPUBreach attack enables system takeover via GPU rowhammer
🔥
German authorities identify REvil and GangCrab ransomware bosses
🔥
German authorities identify REvil and GandCrab ransomware bosses
🕵️
ISC Stormcast For Monday, April 6th, 2026 https://isc.sans.edu/podcastdetail/9880, (Mon, Apr 6th)
🕵️
ResokerRAT Hijacks Telegram API to Command Infected Windows PCs
🕵️
Poisoned Axios Package Spreads Cross-Platform Malware via Phantom Dependency
🕵️
Google Wants to Transition to Post-Quantum Cryptography by 2029
🕵️
North Korean Hackers Target High-Profile Node.js Maintainers
🕵️
Guardarian Users Targeted With Malicious Strapi NPM Packages
🕵️
Fake GitHub CI Update Steals Secrets and Tokens
🕵️
GitHub-Backed Malware Spread via LNK Files in South Korea
🕵️
Traffic violation scams switch to QR codes in new phishing texts
🕵️
How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers
🕵️
Detection and Prevention of Misdirected Emails: What to Know
🕵️
Hackers Using Fake "Microsoft Teams" Domains to Attack Users Via Malicious Payload
🕵️
Watch this video of how a job interviewer exposes a North Korean fake IT worker
🕵️
Adobe modifies hosts file to detect whether Creative Cloud is installed
🕵️
Inside an AI‑enabled device code phishing campaign
🕵️
Your Behavior Can Expose Fraud
🌐
Convicted spyware maker Bryan Fleming avoids jail at sentencing
🌐
A week in security (March 30 &#8211; April 5)
📡
Ticket savings of up to $500 this week for TechCrunch Disrupt 2026
📡
Drift $280M crypto theft linked to 6-month in-person operation
📡
DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea
📡
Microsoft removes Support and Recovery Assistant from Windows
📡
Microsoft fixes Classic Outlook bug causing email delivery issues
📡
Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs
📡
[local] is-localhost-ip 2.0.0 - SSRF
📡
[webapps] Fortinet FortiWeb v8.0.1 - Auth Bypass
📡
[local] Windows Kernel - Elevation of Privilege
📡
[webapps] ASP.net 8.0.10 - Bypass
📡
[webapps] Grafana 11.6.0 - SSRF
📡
[webapps] Zhiyuan OA - arbitrary file upload leading
📡
[webapps] WordPress Madara - Local File Inclusion
🐛
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
KEV
🐛
CVE-2026-35414
🐛
CVE-2026-34978 OpenPrinting CUPS: Path traversal in RSS notify-recipient-uri enables file write outside CacheDir/rss (and clobbering of job.cache)
🐛
CVE-2026-27447 OpenPrinting CUPS: Authorization bypass via case-insensitive group-member lookup
🐛
CVE-2026-23473 io_uring/poll: fix multishot recv missing EOF on wakeup race
🐛
CVE-2026-31394 mac80211: fix crash in ieee80211_chan_bw_change for AP_VLAN stations
🐛
CVE-2026-23468 drm/amdgpu: Limit BO list entry count to prevent resource exhaustion
🐛
CVE-2026-23442 ipv6: add NULL checks for idev in SRv6 paths
🐛
CVE-2026-27456 util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup
🐛
CVE-2026-35535
🐛
CVE-2026-34979 OpenPrinting CUPS: Heap overflow in `get_options()`
🐛
CVE-2026-34980 OpenPrinting CUPS: Shared PostScript queue lets anonymous Print-Job requests reach `lp` code execution over the network
🐛
CVE-2026-34990 OpenPrinting CUPS: Local print admin token disclosure using temporary printers
🐛
CVE-2026-23472 serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN
🐛
CVE-2026-23444 wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure
🐛
Hackers exploit React2Shell in automated credential theft campaign
⚠️
36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants
⚠️
New FortiClient EMS flaw exploited in attacks, emergency patch released
KEV
⚠️
New FortiClient EMS flaw exploited in attacks, emergency patch released
KEV
🕵️
WhatsApp malware campaign installs backdoors
🎙️
Killer robots are here. Now what? (Lock and Code S07E07)
📡
Traffic violation scams switch to QR codes in new phishing texts
📡
$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation
📡
How CrowdStrike Is Accelerating Exposure Evaluation as Adversaries Gain Speed
⚠️
SongTrivia2 - 291,739 breached accounts
⚠️
LinkedIn Hidden Code Secretly Scans Users’ Computers for Installed Software
⚠️
Top 10 Best Identity And Access Management (IAM) Companies 2026
⚠️
A Vulnerability in Fortinet FortiClientEMS Could Allow for Arbitrary Code Execution
⚠️
How Attackers Bypass MFA Today
📢
Top 10 Best Privileged Access Management (PAM) Solutions 2026
📢
Introducing the Landing Zone Accelerator on AWS Universal Configuration and LZA Compliance Workbook
🔥
Crunchyroll - 1,195,684 breached accounts
🔥
Hackers Launch Social Engineering Offensive Against Key Node.js Maintainers
🔥
European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack
🕵️
Anthropic Ends Claude Subscription Access for Third-Party Tools Like OpenClaw
🕵️
Stop Committing Your Secrets (You Know Who You Are)
🕵️
OpenClaw gives users yet another reason to be freaked out about security
🕵️
Axios npm hack used fake Teams error fix to hijack maintainer account
🌐
After fighting malware for decades, this cybersecurity veteran is now hacking drones
📰
Elastic Security Integrations Roundup: Q1 2026
📡
Device code phishing attacks surge 37x as new kits spread online
🚨
CISA Includes TrueConf Security Flaw in KEV Catalog After Exploitation in the WildThe Cybersecurity and Infrastructure Security Agency (CISA) has officially added a critical security flaw affecting the TrueConf Client to its Known Exploited Vulnerabilities (KEV) catalog. This addition follows clear evidence that threat actors are actively exploiting the bug in…
KEV
🐛
Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
🐛
Attackers Abuse React2Shell Flaw to Compromise 700+ Next.js Hosts
🐛
CVE-2026-34073 cryptography has incomplete DNS name constraint enforcement on peer names
🐛
14,000+ F5 BIG-IP APM Instances Exposed Online as Attackers Exploit RCE Vulnerability
🐛
CNVD Severity Classification and RMSV Effects: Honest Metrics & Data Leakage
🐛
New Progress ShareFile Flaws Expose Servers to Unauthorized Remote Takeover
🐛
CERT-EU blames Trivy supply chain attack for Europa.eu data breach
🐛
Google patches fourth Chrome zero-day so far this year
🐛
Security lapse lets researchers view React2Shell hackers’ dashboard
⚠️
Cloudflare’s new CMS is not a WordPress killer, it’s a WordPress alternative
⚠️
Microsoft now force upgrades unmanaged Windows 11 24H2 PCs
⚠️
12 cyber industry trends revealed at RSAC 2026
⚠️
Trusted Platforms Exploited to Steal Philippine Banking Credentials
⚠️
Nigerian romance scammer jailed after being caught out by fellow fraudster
⚠️
Axios npm compromise traced to targeted social engineering attack
⚠️
React2Shell Exploited in Large-Scale Credential Harvesting Campaign
⚠️
Mobile Attack Surface Expands as Enterprises Lose Control
⚠️
Critical ShareFile Flaws Lead to Unauthenticated RCE
⚠️
Microsoft Forces Unmanaged Windows 11 Devices to Upgrade to Version 24H2
⚠️
In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware
⚠️
Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads
⚠️
TrueConf Zero-Day Exploited in Asian Government Attacks
⚠️
Warning: Phishing Attacks Are Exploiting the War in Iran
⚠️
When Vendors Skip Linux Support
⚠️
Your KnowBe4 Fresh Content Updates from March 2026
⚠️
Managing open-source vulnerabilities | Kaspersky official blog
⚠️
Claude Code is still vulnerable to an attack Anthropic has already fixed
⚠️
Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
⚠️
Internet Bug Bounty program hits pause on payouts
⚠️
The developer credential economy: Why exposure data is the new front line in the supply chain war
⚠️
Simplifying MBA obfuscation with CoBRA
📢
OpenSSH 10.3 Released With Patch for Shell Injection and Other Security Flaws
📢
Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK
📢
Infrastructure Engineer Pleads Guilty to Locking 254 Windows Servers at Former Employer
📢
A core infrastructure engineer pleads guilty to federal charges in insider attack
🔥
Adobe Data Breach Allegedly Exposes 13 Million Support Tickets
🔥
Qilin Ransomware Deploys Malicious DLL to Disable Most EDR Defenses
🔥
North Korea-Linked Hackers Hit Axios npm in Supply Chain Attack
🔥
CERT-EU: European Commission hack exposes data of 30 EU entities
🔥
Phorpiex Botnet Fuels Ransomware, Sextortion, and Crypto-Theft Attacks
🔥
Hackers Weaponize Venom Stealer via ClickFix Lures for Massive Data Exfiltration
🔥
T-Mobile Sets the Record Straight on Latest Data Breach Filing
🔥
Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture
🔥
TeamPCP Supply Chain Campaign: Update 006 - CERT-EU Confirms European Commission Cloud Breach, Sportradar Details Emerge, and Mandiant Quantifies Campaign at 1,000&#x2b; SaaS Environments, (Fri, Apr 3rd)
🔥
Evolution of Ransomware: Multi-Extortion Ransomware Attacks
🔥
Europe’s cyber agency blames hacking gangs for massive data breach and leak
🔥
Die Linke German political party confirms data stolen by Qilin ransomware
🔥
Hims & Hers warns of data breach after Zendesk support ticket breach
🔥
Outbound Email Security: Protecting Data and Reputation
🔥
Nation-State Crypto Heists Explained
🕵️
ISC Stormcast For Friday, April 3rd, 2026 https://isc.sans.edu/podcastdetail/9878, (Fri, Apr 3rd)
🕵️
North Korea Uses GitHub as C2 in New LNK Phishing Campaign
🕵️
Top 10 Best SaaS Security Posture Management (SSPM) Tools 2026
🕵️
TP-Link Router Flaws Allowed Attackers to Launch DoS Attacks and Cause Crashes
🕵️
AI Models Including Gemini 3 and Claude Haiku 4.5 Secretly Protected Other Models From Removal
🕵️
Malicious Chrome Extension “ChatGPT Ad Blocker” Targets Users, Steals Conversations
🕵️
North Korean Hackers Drain $285 Million From Drift in 10 Seconds
🕵️
Kimsuky Uses Malicious LNK Files to Drop Python Backdoor
🕵️
Company that Secretly Records and Publishes Zoom Meetings
🕵️
UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
🕵️
China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing
🕵️
Friday Squid Blogging: Jurassic Fish Chokes on Squid
🕵️
DexterBot, Darksword, Eviltokens, Tubular Bells, Claude, Drift, Gmail, Josh Marpet - SWN #569
🕵️
Don’t let A.I. read your .env files
🌐
Electric Vehicles and EV Security - Steve Visconti CEO of Xiid Corporation with David Shipley
🌐
New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
🌐
How the World Got Owned Episode 2: The 1990s, Part One
KEV
📡
Man admits to locking thousands of Windows devices in extortion plot
📡
Microsoft still working to fix Exchange Online mailbox access issues
📡
LinkedIn secretely scans for 6,000+ Chrome extensions, collects data
📡
LinkedIn secretly scans for 6,000+ Chrome extensions, collects data
📡
Day in the Life: Product Manager at Recorded Future
📡
How AWS KMS and AWS Encryption SDK overcome symmetric encryption bounds
📡
That dream job offer from Coca-Cola or Ferrari? It’s a trap for your passwords
📡
Blocking children from social media is a badly executed good idea
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its  Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.  CVE-2026-3502  TrueConf Client Download of Code Without Integrity Check Vulnerability  This type of…
KEV
🐛
Symantec DLP Agent Flaw Exposed Systems to Privilege Escalation Attacks
🐛
Cisco Warns of Critical IMC Vulnerability Enabling Authentication Bypass
🐛
Critical PX4 Autopilot Vulnerability Let Attackers Gain Control of Drones
🐛
Cisco Smart Software Manager Flaw Allowed Arbitrary Command Execution
🐛
CVE-2026-5107 FRRouting FRR EVPN Type-2 Route bgp_evpn.c process_type2_route access control
🐛
CVE-2026-4046 iconv crash due to assertion failure with untrusted input
🐛
CVE-2026-5119 Libsoup: libsoup: information disclosure via cleartext transmission of cookies during https tunnel establishment
🐛
CVE-2026-4897 Polkit: polkit: denial of service via unbounded input processing through standard input
🐛
CVE-2026-29785 NATS Server panic via malicious compression on leafnode port
🐛
CVE-2026-4739 Integer overflow vulnerabilities in InsightSoftwareConsortium/ITK
🐛
CVE-2026-33554
🐛
CVE-2026-5201 Gdk-pixbuf: gdk-pixbuf: denial of service via heap-based buffer overflow when processing a specially crafted jpeg image
🐛
CVE-2026-5121 Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing
🐛
CVE-2026-2100 P11-kit: p11-kit: null dereference via c_derivekey with specific null parameters
🐛
CVE-2026-4732 Out-of-bounds Read Overflow in tildearrow/furnace
🐛
CVE-2026-2436 Libsoup: libsoup: denial of service via use-after-free in soupserver during tls handshake
🐛
CVE-2026-33216 NATS has MQTT plaintext password disclosure
🐛
CVE-2026-32287 Infinite loop in github.com/antchfx/xpath
🐛
CISA Issues Alert on Chrome Zero-Day Under Active Exploitation
KEV
🐛
Cybersecurity in the age of instant software
🐛
Attempts to Exploit Exposed "Vite" Installs (CVE-2025-30208), (Thu, Apr 2nd)
🐛
Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise
🐛
Cisco fixes critical IMC auth bypass present in many products
🐛
CVE-2026-32213 Azure AI Foundry Elevation of Privilege Vulnerability
🐛
Chromium: CVE-2026-5289 Use after free in Navigation
🐛
Chromium: CVE-2026-5286 Use after free in Dawn
🐛
Chromium: CVE-2026-5287 Use after free in PDF
🐛
Chromium: CVE-2026-5285 Use after free in WebGL
🐛
Chromium: CVE-2026-5284 Use after free in Dawn
🐛
Chromium: CVE-2026-5283 Inappropriate implementation in ANGLE
🐛
Chromium: CVE-2026-5281 Use after free in Dawn
🐛
Chromium: CVE-2026-5280 Use after free in WebCodecs
🐛
Chromium: CVE-2026-5279 Object corruption in V8
🐛
Chromium: CVE-2026-5292 Out of bounds read in WebCodecs
🐛
Chromium: CVE-2026-5290 Use after free in Compositing
🐛
Chromium: CVE-2026-5277 Integer overflow in ANGLE
🐛
Chromium: CVE-2026-5276 Insufficient policy enforcement in WebUSB
🐛
Chromium: CVE-2026-5275 Heap buffer overflow in ANGLE
🐛
Chromium: CVE-2026-5274 Integer overflow in Codecs
🐛
Chromium: CVE-2026-5273 Use after free in CSS
🐛
Chromium: CVE-2026-5272 Heap buffer overflow in GPU
🐛
CVE-2026-32186 Microsoft Bing Elevation of Privilege Vulnerability
🐛
CVE-2026-33107 Azure Databricks Elevation of Privilege Vulnerability
🐛
CVE-2026-26135 Azure Custom Locations Resource Provider (RP) Elevation of Privilege Vulnerability
🐛
CVE-2026-33105 Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability
🐛
CVE-2026-32173 Azure SRE Agent Information Disclosure Vulnerability
🐛
CVE-2026-32211 Azure MCP Server Information Disclosure Vulnerability
🐛
Chromium: CVE-2026-5291 Inappropriate implementation in WebGL
🐛
vSphere and BRICKSTORM Malware: A Defender's Guide
🐛
ZDI-26-253: Microsoft Visual Studio Code mcp.json Command Injection Remote Code Execution Vulnerability
🐛
ZDI-26-252: Mozilla Firefox IonMonkey Switch Statement Optimization Type Confusion Remote Code Execution Vulnerability
🐛
ZDI-26-251: Foxit PDF Reader Update Service Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
🐛
VU#951662: MuPDF by Artifex contains integer overflow vulnerability.
⚠️
AfterPack: Claude Code's Source Didn't Leak. It Was Already Public for Years.
⚠️
Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit
⚠️
Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks
⚠️
Apple Releases iOS 18.7.7 Update to Defend Against DarkSword Exploit
⚠️
NoVoice on Google Play Exploits 22 Flaws to Hit Millions of Android Users
⚠️
Possible US Government iPhone Hacking Tool Leaked
⚠️
Hackers exploit TrueConf zero-day to push malicious software updates
⚠️
The State of Trusted Open Source Report
⚠️
Cisco Patches Critical and High-Severity Vulnerabilities
⚠️
EvilTokens abuses Microsoft device code flow for account takeovers
⚠️
Akira-Style Ransomware Campaign Hits Windows Users Across South America
⚠️
Matrix Protocol Surveillance and Forensic Analysis Suite
⚠️
New Progress ShareFile flaws can be chained in pre-auth RCE attacks
⚠️
Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime
⚠️
ICE says it bought Paragon’s spyware to use in drug trafficking cases
⚠️
Apple Rolls Out DarkSword Exploit Protection to More Devices
⚠️
US Bans All Foreign-Made Consumer Routers
⚠️
Critical Vulnerability in Claude Code Emerges Days After Source Leak
⚠️
Google Workspace’s continuous approach to mitigating indirect prompt injections
⚠️
Claude Code leak used to push infostealer malware on GitHub
⚠️
Risks, emerging when developing or using open-source software
⚠️
What Is A Router? (And all things AI) - PSW #920
⚠️
AI Configures Vulnerabilities for You
⚠️
Multiple Vulnerabilities in Progress ShareFile Could Allow for Remote Code Execution
⚠️
Multiple Vulnerabilities in Cisco Products Could Allow for Arbitrary Code Execution
⚠️
SightHouse: Automated function identification
⚠️
Apple expands “DarkSword” patches to iOS 18.7.7
📢
FBI Warns Chinese Mobile Apps Could Expose User Data to Cyberattacks
📢
Variance Raises $21.5M for Compliance Investigation Platform Powered by AI Agents
📢
Progress security advisory (AV26-310)
📢
Cesanta security advisory (AV26-311)
📢
Drift loses $280 million as hackers seize Security Council powers
📢
OpenSSH security advisory (AV26-312)
📢
Drift loses $280 million North Korean hackers seize Security Council powers
📢
Four security principles for agentic AI systems
🔥
Axios npm Supply Chain Breach: Microsoft Shares Mitigation Steps
🔥
Mercor Hit by LiteLLM Supply Chain Attack
🔥
UK manufacturers under cyber fire with 80% reporting attacks • The Register
🔥
250,000 Affected by Data Breach at Nacogdoches Memorial Hospital
🔥
Iranian Hacker Group Handal Claims Breach of Israeli Defense Firm
🔥
Mercor confirms security incident tied to LiteLLM supply chain attack | The Record from Recorded Future News
🔥
Medtech giant Stryker fully operational after data-wiping attack
🔥
Crypto platform Drift suspends services after millions stolen in security incident | The Record from Recorded Future News
🔥
Threat actor abuse of AI accelerates from tool to cyberattack surface
🔥
Telehealth giant Hims & Hers says its customer support system was hacked
🕵️
ISC Stormcast For Thursday, April 2nd, 2026 https://isc.sans.edu/podcastdetail/9876, (Thu, Apr 2nd)
🕵️
News Alert: TAC Security surpasses 10,000 customers, scaling global VM and AppSec platform
🕵️
Linx Security Raises $50 Million for Identity Security and Governance
🕵️
Remcos RAT Attack Uses Obfuscated Scripts, Trusted Windows Tools
🕵️
WhatsApp Attack Chain Delivers VBS, Cloud Payloads, MSI Backdoor
🕵️
TA416 Broadens Europe Spy Campaign With Web Bugs and Malware
🕵️
New ZAP PTK Add-On Converts Browser Security Findings Into Native ZAP Alerts
🕵️
Sophisticated CrystalX RAT Emerges
🕵️
WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action
🕵️
RFQ Malware Campaign Uses DOCX, RTF, JS, and Python
🕵️
Fake CERT-UA Site Spreads Go-Based RAT in Phishing Campaign
🕵️
New CrystalRAT malware adds RAT, stealer and prankware features
🕵️
Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners
🕵️
Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures
🕵️
WhatsApp malware campaign uses malicious VBS files to gain persistent access | CSO Online
🕵️
Infrsatructure Attacks With Physical Consequences Down 25%
🕵️
Chinese Hackers Target European Governments in Espionage Campaigns - Infosecurity Magazine
🕵️
The Risk of Negative Self-Talk
🕵️
Cybersecurity M&A Roundup: 38 Deals Announced in March 2026
🕵️
Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments
🕵️
How to Prevent Phishing Emails by Reducing Human Risk
🕵️
From Reactive to Proactive: 5 Steps to SOC Maturity with Threat Intelligence
🌐
ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories
🌐
How we caught the Axios supply chain attack
🌐
Hooked on Linux: Rootkit Detection Engineering
🌐
Malwarebytes Privacy VPN receives full third-party audit
📡
Microsoft links Classic Outlook issue to email delivery problems
📡
Critical Cisco IMC auth bypass gives attackers Admin access
📡
Suggested organizational security and privacy control and activity profile — Medium impact (ITSP.10.033-01)
📡
Bulletin de sécurité WatchGuard (AV26-309)
📡
Residential proxies evaded IP reputation checks in 78% of 4B sessions
📡
Money transfer app Duc exposed thousands of driver’s licenses and passports to the open web
📡
Latin America and the Caribbean Cybercrime Landscape
📡
Prioritizing Alerts Triage with Higher-Order Detection Rules
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-5281 Google Dawn Use-After-Free Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses…
KEV
🐛
Cisco Breached: Source Code Stolen - Cybersecurity Today
🐛
Hackers Actively Exploit Critical WebLogic RCE Vulnerabilities in Ongoing Attacks
🐛
TrueConf Vulnerability Under Active Exploitation in Southeast Asia Government Attacks
🐛
CVE-2025-66037 OpenSC: Out of Bounds vulnerability
🐛
CVE-2026-34714
🐛
CVE-2026-21717
🐛
CVE-2026-21715
🐛
CVE-2026-21714
🐛
CVE-2025-49010 OpenSC: Stack-buffer-overflow WRITE in GET RESPONSE
🐛
CVE-2025-66215 OpenSC: Stack-buffer-overflow WRITE in card-oberthur
🐛
CVE-2025-66038 OpenSC: `sc_compacttlv_find_tag` can return out-of-bounds pointers
🐛
CVE-2026-4176 Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib
🐛
CVE-2026-21710
🐛
CVE-2026-34043 Serialize JavaScript has CPU Exhaustion Denial of Service via crafted array-like objects
🐛
CVE-2026-21716
🐛
CVE-2026-21713
🐛
CVE-2026-21711
🐛
CVE-2023-52676 bpf: Guard stack limits against 32bit overflow
🐛
CVE-2024-35839 netfilter: bridge: replace physindev with physinif in nf_bridge_info
🐛
PoC Exploit Code Published for nginx-ui Backup Restore Security Flaw
🐛
CVE-2024-41013 xfs: don't walk off the end of a directory data block
🐛
Vim Modeline Vulnerability Opens Door to Arbitrary OS Command Execution
🐛
New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released
KEV
🐛
Exploited Zero-Day Among 21 Vulnerabilities Patched in Chrome
🐛
Vim and GNU Emacs: Claude Code helpfully found zero-day exploits for both
⚠️
Mercor says it was hit by cyberattack tied to compromise of open-source LiteLLM project
⚠️
Anthropic employee error exposes Claude Code source
⚠️
Google Cloud’s Vertex AI Hit by Vulnerability Enabling Sensitive Data Access
⚠️
Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms
⚠️
Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents
⚠️
9 ways CISOs can combat AI hallucinations
⚠️
Security awareness is not a control: Rethinking human risk in enterprise security
⚠️
A Taxonomy of Cognitive Security
⚠️
Google fixes fourth Chrome zero-day exploited in attacks in 2026
⚠️
Hackers Exploit Hotel Booking Systems to Send Fake Payment Requests to Guests
⚠️
Unrelenting Threats Against Government and Education: Why Human Risk Is the Front Line
⚠️
WhatsApp malware campaign uses malicious VBS files to gain persistent access
⚠️
Cisco Faces Alleged Data Leak as ShinyHunters Claims Responsibility
⚠️
Microsoft Teams to Improve Privacy With EXIF Data Removal Feature
⚠️
Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts
⚠️
TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets - Infosecurity Magazine
⚠️
Google Warns of New Chrome Zero-Day Under Active Exploitation – Users Urged to Update Immediately
KEV
⚠️
US Charges Uranium Crypto Exchange Hacker
⚠️
Routine Access Is Powering Modern Intrusions, a New Threat Report Finds
⚠️
CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails
⚠️
Fireside Chat: AI agents are reshaping mobile attacks — and exposing weak API trust models
⚠️
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
⚠️
Chronic Resource Constraints: Doing More With Less in Public Sector Cybersecurity
⚠️
Hackers exploit TrueConf zero-day to push malicious software updates
⚠️
RSA 2026: Agentic Future, Analog Fundamentals — The Paradox of Why the Old Guard Still Survives
⚠️
Apple expands iOS 18 updates to more iPhones to block DarkSword attacks
KEV
⚠️
TrendAI Insight: New U.S. National Cyber Strategy
⚠️
6 critical mistakes that undermine cyber resilience (and how to fix them)
⚠️
6 metrics IT leaders can’t afford to ignore for business resilience
⚠️
5 critical steps to achieve business resilience in cybersecurity
⚠️
7 ways to improve your business resilience with backup and recovery
⚠️
5 Steps to break free from alert fatigue and build resilient security operations
⚠️
5 essential steps to bulletproof your endpoint security (and avoid the biggest mistakes)
⚠️
Frequently Asked Questions About the Axios npm Supply Chain Attack by North Korea-Nexus Threat Actor UNC1069
⚠️
Securing the open source supply chain across GitHub
⚠️
Mutation testing for the agentic era
⚠️
Risky Business #831 -- The AI bugpocalypse begins
KEV
📋
Apple releases security fix for older iPhones and iPads to protect against DarkSword attacks
📢
Closing the Gap by Enhancing Visibility and Mitigating Risks
📢
Executive Paralysis and Two Pre-Recorded RSAC 2026 Interviews from DigiCert and Okta - BSW #441
📢
Google Chrome security advisory (AV26-306)
📢
Cisco security advisory (AV26-307)
📢
Drupal security advisory (AV26-308)
🔥
Google Drive ransomware detection now on by default for paying users
🔥
North Korean Hackers Breach Axios Package, Target Windows, macOS, and Linux Systems
🔥
SUCCESS - 253,510 breached accounts
🔥
Axios NPM Package Breached in North Korean Supply Chain Attack
🔥
Webinar Today: Agentic AI vs. Identity’s Last Mile Problem
🔥
TeamPCP Supply Chain Campaign: Update 005 - First Confirmed Victim Disclosure, Post-Compromise Cloud Enumeration Documented, and Axios Attribution Narrows, (Wed, Apr 1st)
🔥
When Crisis Plans Fail to Act
🔥
Hasbro says it was hacked, and may take ‘several weeks’ to recover
🔥
Toy Giant Hasbro Hit by Cyberattack
🔥
Is “Hackback” Official US Cybersecurity Strategy?
🔥
Leadership or Career Risk
🔥
Smashing Security podcast #461: This man hid $400 million in a fishing rod. Then it vanished
🔥
Major Cyber Attacks in March 2026: OAuth Phishing, SVG Smuggling, Magecart, and More
🕵️
ISC Stormcast For Wednesday, April 1st, 2026 https://isc.sans.edu/podcastdetail/9874, (Wed, Apr 1st)
🕵️
XLoader malware Sharpens Obfuscation, Masks C2 Traffic via Decoy Servers
🕵️
NPM Supply Chain Attack Uses undicy-http to Deploy RAT
🕵️
PyPI Telnyx Python SDK Backdoored to Steal Credentials on Windows, macOS, and Linux
🕵️
Windows 11 Update Fixes Critical Installation Loop Problem
🕵️
CrewAI Hit by Critical Vulnerabilities Enabling Sandbox Escape and Host Compromise
🕵️
Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069
🕵️
Cybersecurity Firm TAC Security Hits 10,000 Clients, Enters Top 5 in Global VM & AppSec
🕵️
CrystalX Malware-as-a-Service Spreads via Telegram With Stealer, RAT Tools
🕵️
Hacker zielen auf Exilportal Iranwire
🕵️
3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)
🕵️
GIGABYTE Control Center vulnerable to arbitrary file write flaw
🕵️
CrewAI Vulnerabilities Expose Devices to Hacking - SecurityWeek
🕵️
Ethereum-Based EtherRAT, EtherHiding Power Stealthy Malware Campaigns
🕵️
WA local gov entity lost $350,000 in phishing attack - iTnews
🕵️
Axios npm supply chain attack: Malicious updates add remote access trojan | news | SC Media
🕵️
Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures
🕵️
Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass
🕵️
FBI Warns of Data Security Risks From China-Made Mobile Apps
🕵️
New DeepLoad Malware Dropped in ClickFix Attacks
🕵️
Depthfirst Raises $80 Million in Series B Funding
🕵️
Mitigating the Axios npm supply chain compromise
🌐
Alleged RedLine malware developer extradited to United States
🌐
Malicious Script That Gets Rid of ADS, (Wed, Apr 1st)
🌐
CrystalX RAT: a Trojan for pranks, remote access, and cryptocurrency theft | Kaspersky official blog
🌐
WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware
🌐
'NoVoice' Android malware on Google Play infected 2.3 million devices
🌐
New CrystalRAT malware adds RAT, stealer and prankware features
🌐
The Shift: An Era of Quantum Geopolitics
🌐
Inside the Axios supply chain compromise - one RAT to rule them all
🌐
Elastic releases detections for the Axios supply chain compromise
🌐
A laughing RAT: CrystalX combines spyware, stealer, and prankware features
📡
Weekly Threat Bulletin – April 1st, 2026
📡
New Windows 11 emergency update fixes preview update install issues
📡
Im Fokus: IT-Leadership
📡
FBI warns against using Chinese mobile apps due to privacy risks
📡
Block the Prompt, Not the Work: The End of "Doctor No"
📡
New EvilTokens service fuels Microsoft device code phishing attacks
📡
De-fi platform Drift suspends deposits and withdrawals after millions in crypto stolen in hack
📡
Digital assets after death: Managing risks to your loved one’s digital estate
📡
STARDUST CHOLLIMA Likely Compromises Axios npm Package
📡
Falcon for IT Supports Windows Secure Boot Certificate Lifecycle Management
📡
Industrialization of the Fraud Ecosystem Blog
📡
AI Security Risks: Proofpoint CSO Ryan Kalember, Live at RSAC 2026
🚨
5-month-old F5 BIG-IP DoS bug becomes critical RCE exploited in the wildA vulnerability misclassified five months ago as a denial-of-service issue in F5 BIG-IP Access Policy Manager (APM) turned out to be a critical pre-authentication remote code execution flaw that is now under active exploitation. Hackers are using it to deploy a persistent malware…
KEV
🐛
AL26-006 - Vulnerability impacting Citrix NetScaler ADC and NetScaler Gateway - CVE-2026-3055
🐛
TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks
KEV
🐛
CVE-2026-33636 LIBPNG has ARM NEON Palette Expansion Out-of-Bounds Read on AArch64
🐛
CVE-2025-67030
🐛
CVE-2026-0965 Libssh: libssh: denial of service via improper configuration file handling
🐛
CVE-2026-21712
🐛
CVE-2026-34353
🐛
CVE-2026-33750 brace-expansion: Zero-step sequence causes process hang and memory exhaustion
🐛
CVE-2026-33938 Handlebars.js has JavaScript Injection via AST Type Confusion by tampering @partial-block
🐛
CVE-2026-33939 Handlebars.js has Denial of Service via Malformed Decorator Syntax in Template Compilation
🐛
CVE-2026-33937 Handlebars.js has JavaScript Injection via AST Type Confusion
🐛
CVE-2026-33936 python-ecdsa: Denial of Service via improper DER length validation in crafted private keys
🐛
CVE-2026-33416 LIBPNG has use-after-free via pointer aliasing in `png_set_tRNS` and `png_set_PLTE`
🐛
CVE-2026-25645 Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility function
🐛
CVE-2026-0967 Libssh: libssh: denial of service via inefficient regular expression processing
🐛
CVE-2026-0966 Libssh: buffer underflow in ssh_get_hexa() on invalid input
🐛
CVE-2026-0964 Libssh: improper sanitation of paths received from scp servers
🐛
CVE-2026-33895 Forge has signature forgery in Ed25519 due to missing S > L check
🐛
CVE-2026-33896 Forge has a basicConstraints bypass in its certificate chain verification (RFC 5280 violation)
🐛
CVE-2026-33891 Forge has Denial of Service via Infinite Loop in BigInteger.modInverse() with Zero Input
🐛
CVE-2026-33542 Incus does not verify combined fingerprint when downloading images from simplestreams servers
🐛
CVE-2026-33941 Handlebars.js has JavaScript Injection in CLI Precompiler via Unescaped Names and Options
🐛
CVE-2026-33916 Handlebars.js has Prototype Pollution Leading to XSS through Partial Template Injection
🐛
CVE-2026-33940 Handlebars.js has JavaScript Injection via AST Type Confusion when passing an object as dynamic partial
🐛
Chromium: CVE-2026-4676 Use after free in Dawn
🐛
Detecting CVE-2026-20929: Kerberos Authentication Relay via CNAME Abuse
🐛
ZDI-26-250: Linux Kernel Analog Device Driver Improper Validation of Array Index Local Privilege Escalation Vulnerability
⚠️
CISA orders feds to patch actively exploited Citrix flaw by Thursday
KEV
⚠️
CrewAI Vulnerabilities Expose Devices to Hacking
⚠️
Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption
⚠️
Exploitation of Critical Fortinet FortiClient EMS Flaw Begins
⚠️
StrongSwan Flaw Allows Unauthenticated Attackers to Crash VPNs
⚠️
Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts
⚠️
The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority
⚠️
Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains
⚠️
The New Playground for Cybercriminals: Securing the Microsoft Teams Frontier
⚠️
PNG Vulnerabilities Allow Attackers to Trigger Crashes and Leak Sensitive Data
⚠️
Apple Adds ClickFix Attack Warnings in New macOS Tahoe Security Feature
⚠️
Tax Filing Scams Used to Deliver Malware in New Cybercrime Campaigns
⚠️
CareCloud Data Breach Exposes Patient Data After Hackers Access IT Systems
⚠️
Hacker hijacks Axios open-source project, used by millions, to push malware
⚠️
Iranian hackers breach FBI director’s personal email, and post his CV and photos online
⚠️
VRP 2025 Year in Review
⚠️
OpenAI patches twin leaks as Codex slips and ChatGPT spills
⚠️
8 ways to bolster your security posture on the cheap
⚠️
The external pressures redefining cybersecurity risk
⚠️
6 key takeaways from RSA Conference 2026
KEV
⚠️
Developing the Skills Needed for Modern Software Development - Keith Hoodlet, Ron Rasi... - ASW #376
⚠️
Vulnerability Research Is Cooked — Quarrelsome
⚠️
Cybercriminals Exploit Tax Season With New Phishing Tactics - Infosecurity Magazine
⚠️
Hackers exploiting critical F5 BIG-IP flaw in attacks, patch now
⚠️
Cisco source code stolen in Trivy-linked dev environment breach
⚠️
Android Developer Verification Rollout Begins Ahead of September Enforcement
⚠️
Attackers trojanize Axios HTTP library in highest-impact npm supply chain attack
⚠️
Beyond the Hype: Cyber Readiness, Zero Trust, and an Unscripted Conversation - SWN #568
⚠️
Claude AI finds Vim, Emacs RCE bugs that trigger on file open
⚠️
Cisco source code stolen in Trivy-linked dev environment breach
⚠️
Claude Code source code accidentally leaked in NPM package
⚠️
Multiple Vulnerabilities in Apple Products Could Allow for Privilege Escalation
⚠️
North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack
⚠️
Supply chain attack on Axios npm package: Scope, impact, and remediations
⚠️
What’s new in Tenable Cloud Security: Custom policies, AWS ABAC, and research-driven protection
⚠️
How we made Trail of Bits AI-native (so far)
📋
Lloyds Data Security Incident Impacts 450,000 Individuals
📢
Nokia security advisory (AV26-302)
📢
Docker security advisory (AV26–301)
📢
Roundcube security advisory (AV26-300)
📢
Hitachi security advisory (AV26-299)
📢
Red Hat security advisory (AV26-298)
📢
[Control systems] CISA ICS security advisories (AV26-297)
📢
Ubuntu security advisory (AV26-296)
📢
Dell security advisory (AV26-295)
📢
IBM security advisory (AV26-294)
📢
Fortinet security advisory (AV26-096) – Update 1
📢
Dutch Finance Ministry takes treasury banking portal offline after breach
📢
Windows Tools Abused to Kill AV Ahead of Ransomware Attacks
📢
Dutch Finance Ministry Responds to Cyberattack by Taking Systems Offline
📢
Dutch Finance Ministry takes treasury banking portal offline after breach
📢
[Control systems] ABB security advisory (AV26-303)
📢
Symantec security advisory (AV26-304)
📢
HPE security advisory (AV26-305)
📢
New compliance guide available: ISO/IEC 27001:2022 on AWS
🔥
The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust
🔥
Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks
🔥
Weekly Update 497
🔥
Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account
🔥
Application Control Bypass for Data Exfiltration, (Tue, Mar 31st)
🔥
TeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Compromise, TeamPCP Runs Dual Ransomware Operations, and AstraZeneca Data Released, (Mon, Mar 30th)
🔥
WhatsApp malware campaign delivers VBScript and MSI backdoors
🔥
Axios NPM Packages Breached in Ongoing Supply Chain Attack
🔥
Telegram-Based ResokerRAT Adds Screenshot Capture and Persistence
🔥
Google Introduces Advanced Ransomware Defense and Recovery Features in Drive
🔥
Cuties AI - 144,250 breached accounts
🔥
Fahndung nach Cyberkriminellen – 130 Firmen attackiert
🔥
Why ransomware is now after your data — and how to protect your home storage | Kaspersky official blog
🔥
Supply Chain Attack on Axios Pulls Malicious Dependency from npm
🔥
Behind the Curtain: AI's looming cyber nightmare
🔥
Incident response
🔥
Axios NPM Package Compromised: Supply Chain Attack Hits JavaScript HTTP Client with 100M+ Weekly Downloads
🕵️
Inventors of Quantum Cryptography Win Turing Award
🕵️
Censys Raises $70 Million for Internet Intelligence Platform
🕵️
Venom Stealer Raises Stakes With Continuous Credential Harvesting
🕵️
TeamPCP Moves From OSS to AWS Environments
🕵️
ISC Stormcast For Tuesday, March 31st, 2026 https://isc.sans.edu/podcastdetail/9872, (Tue, Mar 31st)
🕵️
The threat to critical infrastructure has changed. Has your readiness?
🕵️
Applying security fundamentals to AI: Practical advice for CISOs
🕵️
CyberheistNews Vol 16 #13 The 'Urgency Trap': Why Time Pressure is Your Biggest Email Red Flag
🕵️
World Backup Day: Because “It Won’t Happen to Me” Often Means It Will
🕵️
EvilTokens Launches New Phishing Service Targeting Microsoft Accounts
🕵️
Five Browser and AI Security Questions Keeping CxOs up at Night
🕵️
Can Small LLMs Solve Security Flaws?
🕵️
Supply chain attack hits 300 million-download Axios npm package
🕵️
P2P WhatsApp Clone – No Setup or Signup
🕵️
Healthcare tech firm CareCloud says hackers stole patient data
🕵️
OpenAI ChatGPT fixes DNS data smuggling flaw • The Register
🕵️
Master These Tools or Potentially Get Left Behind
🕵️
Release Notes: Cross-Platform Threat Analysis with macOS, SSL Decryption, and 1,300+ New Detections
🌐
EtherHiding: The trojan in your toolchain
🌐
Hackers compromise Axios npm package to drop cross-platform malware
🌐
Supply chain risk management
🌐
Axios Future of Cybersecurity: Russians suspected of using iPhone spyware
📡
How to Categorize AI Agents and Prioritize Risk
📡
Microsoft fixes Outlook Classic crashes caused by Teams Meeting add-in
📡
Hacker charged with stealing $53 million from Uranium crypto exchange
📡
Health data giant CareCloud says hackers accessed patients’ medical records
📡
TrendAI™ Research at RSAC 2026: Advancing Defense Across AI‑Driven and Cyber‑Physical Threats
📡
QBDI vs TritonDSE against a VM: who will be the fastest?
📡
Media protection
📡
Maintenance
📡
Identification and authentication
📡
Contingency planning
📡
Configuration management
📡
Assessment, authorization, and monitoring
📡
Audit and accountability
📡
Awareness and training
📡
Access control
📡
The controls and assurance activities families
📡
Concepts and structure
📡
Foreword, Overview, Introduction
📡
Security and privacy controls and assurance activities catalogue (ITSP.10.033)
📡
Cyber security and privacy risk management: A lifecycle approach
📡
System and information integrity
📡
System and communications protection
📡
System and services acquisition
📡
Risk assessment
📡
Personal information handling and transparency
📡
Personnel security
📡
Program management
📡
Planning
📡
Physical and environmental protection
📡
The Real Risk of Vibecoding
📡
GIGABYTE Control Center vulnerable to arbitrary file write flaw
📡
Proton launches new "Meet" privacy-focused conferencing platform
📡
Google now allows you to change your @gmail.com address
📡
This month in security with Tony Anscombe – March 2026 edition
📡
AWS Security Agent on-demand penetration testing now generally available
📡
Fake Installers to Monero: A Multi-Tool Mining Operation
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-3055 Citrix NetScaler Out-of-Bounds Read Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors …
KEV
🐛
Critical Citrix NetScaler memory flaw actively exploited in attacks
KEV
🐛
Fortinet hit by another exploited cybersecurity flaw
KEV
🐛
LangChain path traversal bug adds to input validation woes in AI pipelines
🐛
Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521) - Help Net Security
🐛
ZDI-26-249: NoMachine Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
🐛
ZDI-26-248: NoMachine External Control of File Path Local Privilege Escalation Vulnerability
🐛
ZDI-26-247: NoMachine External Control of File Path Arbitrary File Deletion Vulnerability
🐛
ZDI-26-246: (0Day) aws-mcp-server Command Injection Remote Code Execution Vulnerability
🐛
ZDI-26-245: (0Day) aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability
🐛
ZDI-26-244: (Pwn2Own) QNAP QHora-322 miro_webserver_controllers_api_login_singIn Authentication Bypass Vulnerability
🐛
ZDI-26-243: (Pwn2Own) QNAP TS-453E write_file_to_svr External Control of File Path Remote Code Execution Vulnerability
🐛
ZDI-26-242: (Pwn2Own) QNAP TS-453E server_handlers.pyc rr2s.kwargs Error Message Information Disclosure Vulnerability
🐛
ZDI-26-241: (Pwn2Own) QNAP QHora-322 qvpn_db_mgr username SQL Injection Remote Code Execution Vulnerability
🐛
ZDI-26-240: (Pwn2Own) QNAP QHora-322 qvpn_db_mgr role_type Improper Neutralization of Escape Sequences Authentication Bypass Vulnerability
🐛
ZDI-26-239: (Pwn2Own) QNAP QHora-322 login.newAuthMiddleware.Authenticator Authentication Bypass Vulnerability
🐛
ZDI-26-238: Linux Kernel AoE Driver Use-After-Free Local Privilege Escalation Vulnerability
🐛
ZDI-26-237: (Pwn2Own) QNAP QHora-322 ip6_wanifset Improper Restriction of Communication Channel to Intended Endpoints Firewall Bypass Vulnerability
🐛
ZDI-26-236: Digilent DASYLab DSB File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
🐛
ZDI-26-235: Digilent DASYLab DSA File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
🐛
ZDI-26-234: Digilent DASYLab DSA File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
🐛
ZDI-26-233: Digilent DASYLab DSA File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
🐛
ZDI-26-232: (Pwn2Own) Red Hat Enterprise Linux vmwgfx Driver Integer Overflow Local Privilege Escalation Vulnerability
🐛
ZDI-26-231: Apple macOS Exposure of Sensitive Information to Unauthorized Sphere Information Disclosure Vulnerability
🐛
ZDI-26-230: Apple macOS CoreMedia Framework Out-Of-Bounds Write Remote Code Execution Vulnerability
🐛
ZDI-26-229: OpenClaw Client PKCE Verifier Information Disclosure Vulnerability
🐛
ZDI-26-228: OpenClaw Canvas Authentication Bypass Vulnerability
🐛
ZDI-26-227: OpenClaw Canvas Path Traversal Information Disclosure Vulnerability
🐛
VU#221883: CrewAI contains multiple vulnerabilities including SSRF, RCE and local file read
⚠️
Russian State Hackers Go After IoS Devices
⚠️
A Vulnerability in F5 Products Could Allow for Remote Code Execution
⚠️
Multiple Vulnerabilities in NetScaler ADC and NetScaler Gateway Could Allow for Memory Overread
⚠️
Healthcare tech firm CareCloud says hackers stole patient data
⚠️
Hackers exploiting critical F5 BIG-IP flaw in attacks, patch now
⚠️
Critical Fortinet Forticlient EMS flaw now exploited in attacks
⚠️
OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability
⚠️
⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More
⚠️
Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign
⚠️
Report: There Are Nearly 66 Billion Stolen Identity Records on Criminal Forums
⚠️
Leak reveals Anthropic’s ‘Mythos,’ a powerful AI model aimed at cybersecurity use cases
⚠️
APIs are the new perimeter: Here’s how CISOs are securing them
⚠️
Why Kubernetes controllers are the perfect backdoor
⚠️
Oops, all Interviews: Switching to Cyber, CISO Reflections, and the State of TPCRM - ESW #452
⚠️
VU#655822: Kyverno is vulnerable to server-side request forgery (SSRF)
⚠️
Cloudflare Client-Side Security: smarter detection, now open to everyone
📢
Popular AI gateway startup LiteLLM ditches controversial startup Delve
📢
Automated Audits vs. Manual: The Binary Choice
🔥
New RoadK1ll WebSocket implant used to pivot on breached networks
🔥
European Commission confirms data breach after Europa.eu hack
🔥
HIBP Mega Update: Passkeys, k-Anonymity Searches, Massive Speed Enhancements and a Bulk Domain Verification API
🔥
Dutch Police discloses security breach after phishing attack
🕵️
Apple’s Camera Indicator Lights
🕵️
DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials
🕵️
ISC Stormcast For Monday, March 30th, 2026 https://isc.sans.edu/podcastdetail/9870, (Mon, Mar 30th)
🕵️
Addressing the OWASP Top 10 Risks in Agentic AI with Microsoft Copilot Studio
🕵️
Criminals Are Selling Stolen Tax Forms for Cheap on the Dark Web
🕵️
FIRESIDE CHAT: AI gives rise to a semantic attack surface, forcing a new class of network defense
🕵️
Security Leadership Styles: Builder, Fixer, or Scale Operator
🕵️
Mentorship Monday - Discussions for career and learning!
🕵️
Security boffins harvest bumper crop of API keys from web • The Register
🕵️
DevSecOps Tools?
🕵️
LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks
🕵️
TeamPCP Targets Telnyx Package in Latest Software Supply Chain Attack - Infosecurity Magazine
🕵️
China Upgrades the Backdoor It Uses to Spy on Telcos Globally
🕵️
ANY.RUN at RSAC™ 2026: Highlights & Industry Recognition
🌐
TeamPCP’s Telnyx Attack Marks a Shift in Tactics Beyond LiteLLM
📡
Apple adds macOS Terminal warning to block ClickFix attacks
📡
How to Evaluate AI SOC Agents: 7 Questions Gartner Says You Should Be Asking
📡
Microsoft pulls KB5079391 Windows update over install issues
📡
3 SOC Process Fixes That Unlock Tier 1 Productivity
📡
Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels
📡
The State of Secrets Sprawl 2026: 9 Takeaways for CISOs
📡
DShield (Cowrie) Honeypot Stats and When Sessions Disconnect, (Mon, Mar 30th)
📡
Apple will hide your email address from apps and websites, but not cops
📡
An iron curtain for AI: how to improve autonomous AI agent security | Kaspersky official blog
📡
15 Top Cybersecurity CEOs On The Future Of AI Agents: RSAC 2026
🐛
CVE-2026-3104 Memory leak in code preparing DNSSEC proofs of non-existence
🐛
CVE-2026-3591 A stack use-after-return flaw in SIG(0) handling code may enable ACL bypass
🐛
CVE-2026-23399 nf_tables: nft_dynset: fix possible stateful expression memleak in error path
🐛
CVE-2025-70888
🐛
CVE-2026-1519 Excessive NSEC3 iterations cause high CPU load during insecure delegation validation
🐛
CVE-2026-32241 Flannel vulnerable to cross-node remote code execution via extension backend BackendData injection
🐛
CVE-2026-3119 Authenticated query containing a TKEY record may cause named to terminate unexpectedly
🐛
CVE-2026-33671 Picomatch has a ReDoS vulnerability via extglob quantifiers
🐛
CVE-2026-33672 Picomatch: Method Injection in POSIX Character Classes causes incorrect Glob Matching
🐛
CVE-2026-4833 Orc discount Markdown markdown.c compile recursion
🔥
ShinyHunters says it stole 350GB+ of data in a cyberattack on the European Commission, detected on March 24; the EC says its internal systems were not affected
🔥
ShinyHunters says it stole 350GB+ of data in a cyberattack on the European Commission, detected on March 24; the EC says its internal systems were not affected
🔥
ShinyHunters says it stole 350GB+ of data in a cyberattack on the European Commission, detected on March 24; the EC says its internal systems were not affected
🚨
CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM ExploitationThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting F5 BIG-IP Access Policy Manager (APM) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability in question is…
KEV
🐛
CVE-2026-33343 etcd: Nested etcd transactions bypass RBAC authorization checks
🐛
CVE-2026-33413 etcd: Authorization bypasses in multiple APIs
🐛
Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug
⚠️
Open VSX Scanner Vulnerability Lets Malicious Extensions Go Live
⚠️
TA446 Deploys Leaked DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign
⚠️
New Infinity Stealer malware grabs macOS data via ClickFix lures
🔥
Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild
🔥
Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild
🔥
Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild
🔥
European Commission Confirms Cyberattack After AWS Account Breach
🔥
Fake Certificate Loader Hides BlankGrabber Malware Chain
🔥
TeamPCP Supply Chain Campaign: Update 003 - Operational Tempo Shift as Campaign Enters Monetization Phase With No New Compromises in 48 Hours, (Sat, Mar 28th)
🔥
Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack
🕵️
Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs
🕵️
Malicious Browser Extensions Hijack Users’ AI Chats in New “Prompt Poaching” Attack
🕵️
What Are You Giving Up?
🎙️
RSAC Recap: Agentic AI and Interview With Commvault CISO Bill O'Connell
🚨
CISA Adds Critical Aquasecurity Trivy Scanner Vulnerability to KEV CatalogThe Cybersecurity and Infrastructure Security Agency (CISA) has urgently added a critical flaw affecting Aquasecurity’s Trivy scanner to its Known Exploited Vulnerabilities (KEV) catalog. Tracked as CVE-2026-33634, this security weakness involves embedded malicious code that targ…
KEV
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-53521 F5 BIG-IP Remote Code Execution Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and…
KEV
🐛
ISC Issues Critical Warning Over Kea DHCP Vulnerability That Could Remotely Crash Services
🐛
Windows Error Reporting Vulnerability Exposes Systems to Privilege Escalation, Allowing SYSTEM Access
🐛
CVE-2026-28753 NGINX ngx_mail_proxy_module vulnerability
🐛
CVE-2026-32647 NGINX ngx_http_mp4_module vulnerability
🐛
CVE-2026-23398 icmp: fix NULL pointer dereference in icmp_tag_validation()
🐛
CVE-2026-23396 wifi: mac80211: fix NULL deref in mesh_matches_local()
🐛
CVE-2026-4645 Github.com/antchfx/xpath: xpath: denial of service via crafted boolean xpath expressions
🐛
CVE-2026-34085
🐛
CVE-2026-33526 Squid vulnerable to Denial of Service in ICP Request handling
🐛
CVE-2026-33515 Squid has issues in ICP message handling
🐛
CVE-2026-32748 Squid has Denial of Service in ICP Response handling
🐛
CVE-2026-27651 NGINX ngx_mail_auth_http_module vulnerability
🐛
CVE-2026-27654 NGINX ngx_http_dav_module vulnerability
🐛
CVE-2026-27784 NGINX ngx_http_mp4_module vulnerability
🐛
CVE-2026-28755 NGINX ngx_stream_ssl_module vulnerability
🐛
CVE-2026-23397 nfnetlink_osf: validate individual option lengths in fingerprints
🐛
CVE-2026-4647 Binutils: out-of-bounds read in xcoff relocation processing in gnu binutils bfd library
🐛
CVE-2026-4746 Heap Buffer Over-Write Vulenrabilty in timeplus-io/proton
🐛
CVE-2026-4775 Libtiff: libtiff: arbitrary code execution or denial of service via signed integer overflow in tiff file processing
🐛
CVE-2026-23068 spi: spi-sprd-adi: Fix double free in probe error path
🐛
CVE-2025-71183 btrfs: always detect conflicting inodes when logging inode refs
🐛
CVE-2025-71184 btrfs: fix NULL dereference on root when tracing inode eviction
🐛
CVE-2026-23004 dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list()
🐛
CISA Flags Critical PTC Vulnerability That Had German Police Mobilized
🐛
Attackers exploit critical Langflow RCE within hours as CISA sounds alarm
KEV
🐛
Rapid Exploitation of CVE-2026-21962 Hits Oracle WebLogic - Infosecurity Magazine
🐛
Chromium: CVE-2026-4673 Heap buffer overflow in WebAudio
🐛
Chromium: CVE-2026-4680 Use after free in FedCM
🐛
Chromium: CVE-2026-4677 Out of bounds read in WebAudio
🐛
Chromium: CVE-2026-4675 Heap buffer overflow in WebGL
🐛
Chromium: CVE-2026-4679 Integer overflow in Fonts
🐛
Chromium: CVE-2026-4674 Out of bounds read in CSS
🐛
Chromium: CVE-2026-4442 Heap buffer overflow in CSS
🐛
CVE-2026-32187 Microsoft Edge (Chromium-based) Defense in Depth Vulnerability
⚠️
Google: The quantum apocalypse is coming sooner than we thought
⚠️
BreachForums Verion 5 - 339,778 breached accounts
⚠️
Red Hat Warns of Malware Embedded in Popular Linux Tool, Opening Doors for Unauthorized Access
⚠️
LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks
⚠️
TeamPCP Hackers Focus on AI Developers, Planting Malicious Code to Disrupt Projects
⚠️
8 steps CISOs can take to empower their teams
⚠️
Coruna iOS Exploit Kit Likely an Update to Operation Triangulation
⚠️
CISA: New Langflow flaw actively exploited to hijack AI workflows
KEV
⚠️
BIND 9 Security Flaws Allow Attackers to Bypass Security Controls and Crash Servers
⚠️
A forensic intelligence suite for Matrix investigators
⚠️
Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks
⚠️
Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits
⚠️
A Matrix forensic intelligence suite for investigators
⚠️
Custom Fonts Can Trick AI Assistants Into Approving Phishing Sites
⚠️
Trivy Under Attack Again: Widespread GitHub Actions Tag Compromise Exposes CI/CD Secrets
⚠️
European Commission data stolen in a cyberattack on the infrastructure hosting its web sites
⚠️
Spot Scam Red Flags Fast
📢
WatchGuard security advisory (AV26-289)
📢
Ericsson security advisory (AV26-292)
📢
FreeBSD security advisory (AV26-291)
📢
[Control systems] Siemens security advisory (AV26-290)
📢
Microsoft Edge security advisory (AV26-293)
🔥
Iran Targeted by Self-Propagating Malware in Supply-Chain Cyberattacks
🔥
Anonymous Tip System Breach May Expose Tipsters
🔥
Dutch Police discloses security breach after phishing attack
🔥
Silver Fox Cyberattack Targets Japanese Businesses with Tax-Themed Phishing Scams
🔥
Bearlyfy Hits 70+ Russian Firms with Custom GenieLocker Ransomware
🔥
Cyberangriff auf die Linke
🔥
European Commission investigating breach after Amazon cloud hack
🔥
Hightower Holding Data Breach Impacts 130,000 - SecurityWeek
🔥
In Other News: Palo Alto Recruiter Scam, Anti-Deepfake Chip, Google Sets 2029 Quantum Deadline
🔥
TeamPCP Supply Chain Campaign: Update 002 - Telnyx PyPI Compromise, Vect Ransomware Mass Affiliate Program, and First Named Victim Claim, (Fri, Mar 27th)
🔥
Apple says no one using Lockdown Mode has been hacked with spyware
🔥
Iranian hackers claim breach of FBI director Kash Patel’s personal email account
🔥
European Commission investigating breach after Amazon cloud account hack
🔥
TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files
🔥
Lloyds Bank reveals how IT bug exposed transaction data
🔥
European Commission confirms cyberattack after hackers claim data breach
🔥
The telnyx packages on PyPI have been compromised
🔥
Compromised telnyx on PyPI: WAV Steganography and Credential Theft
🔥
Backdoored Telnyx PyPI package pushes malware hidden in WAV audio
🔥
Iranian-linked hackers claimed responsibility for the breach of FBI Direct Kash Patel’s personal email account
🔥
Iranian-linked hackers claimed responsibility for the breach of FBI Direct Kash Patel’s personal email account
🔥
Iranian-linked hackers claimed responsibility for the breach of FBI Direct Kash Patel’s personal email account
🕵️
ISC Stormcast For Friday, March 27th, 2026 https://isc.sans.edu/podcastdetail/9868, (Fri, Mar 27th)
🕵️
Off-Topic Friday
🕵️
Fake Cloudflare CAPTCHA Pages Deliver Infiniti Stealer Malware on macOS
🕵️
Hackers Implant Stealthy BPFdoor Backdoors in Telecom Networks for Persistent Access
🕵️
Phishing ZIP Files Used to Deploy PXA Stealer Targeting Financial Firms
🕵️
Hackers Deploy USB Malware, RATs, and Stealers in Southeast Asian Government Attacks
🕵️
Hackers Target South Asian Financial Firm with BRUSHWORM and BRUSHLOGGER Attacks
🕵️
RSAC 2026 Conference Announcements Summary (Days 3-4)
🕵️
TP-Link Patches High-Severity Router Vulnerabilities
🕵️
How Adaptive Email Security Helps Navigate Threats in the Age of AI
🕵️
Invoice Fraud Costs UK Construction Sector Millions, NCA Warns - Infosecurity Magazine
🕵️
AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion
🕵️
NYC Health Notifying Patients of 2 Third-Party Hacks
🕵️
OpenAI Launches Bug Bounty Program for Abuse and Safety Risks
🕵️
The Post-Quantum Visibility Problem
🕵️
Pro-Iranian Hacking group Claims Credit for Hack of FBI Director Kash Patel’s Personal Account
🕵️
Hackers have exposed more than 8.3 million supposedly confidential reports to tip lines like Crime Stoppers
🕵️
Hackers have exposed more than 8.3 million supposedly confidential reports to tip lines like Crime Stoppers
🕵️
Hackers have exposed more than 8.3 million supposedly confidential reports to tip lines like Crime Stoppers
🕵️
Introducing Our KnowBe4 AI Agents
🕵️
Friday Squid Blogging: Bioluminescent Bacteria in Squid
🕵️
How Microsoft Defender protects high-value assets in real-world attack scenarios
🕵️
Scam Baiting, AI, and the New Grift Economy, Part 2 - Rinoa Poison - SWN #567
🕵️
RSAC 2026: No easy fixes for expanding AI attack surface, but a coordinated response is emerging
🌐
Fake VS Code alerts on GitHub spread malware to developers
🌐
Elastic Security Labs uncovers BRUSHWORM and BRUSHLOGGER
🎙️
Soap Box: Red teaming AI systems with SpecterOps
📡
Windows 11 KB5079391 update rolls out Smart App Control improvements
📡
Anti-piracy coalition takes down AnimePlay app with 5 million users
📡
We Are At War
📡
Agentic GRC: Teams Get the Tech. The Mindset Shift Is What's Missing.
📡
Most notable supply-chain attacks of 2025 | Kaspersky official blog
📡
RSAC 2026 wrap-up – Week in security with Tony Anscombe
📡
A cunning predator: How Silver Fox preys on Japanese firms this tax season
📡
How AI Agents Are Redefining the Insider Risk Threat Model
🚨
TeamPCP Supply Chain Campaign: Update 001 &#x3f; Checkmarx Scope Wider Than Reported, CISA KEV Entry, and Detection Tools Available, (Thu, Mar 26th)This is the first update to the TeamPCP supply chain campaign threat intelligence report, “When the Security Scanner Became the Weapon” (v3.0, March 25, 2026). That report covers the full campaign from the February 28 initial access through …
KEV
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-33634 Aqua Security Trivy Embedded Malicious Code Vulnerability This type of vulnerability is a frequent attack vector for malicious cybe…
KEV
🐛
Cisco Secure Firewall Vulnerability Exposes Systems to Remote Code Execution by Attackers
🐛
Microsoft Unveils New Guidance to Detect and Defend Against Trivy Supply Chain Attack
🐛
CVE-2026-2297 SourcelessFileLoader does not use io.open_code()
🐛
CVE-2025-66413 Git for Windows leaks NTLM hash when cloning from an attacker-controlled server
🐛
CVE-2026-29111 systemd: Local unprivileged user can trigger an assert
🐛
CVE-2026-23382 HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them
🐛
CVE-2026-23391 netfilter: xt_CT: drop pending enqueued packets on template removal
🐛
CVE-2026-23377 ice: change XDP RxQ frag_size from DMA write length to xdp.frame_sz
🐛
CVE-2026-23359 bpf: Fix stack-out-of-bounds write in devmap
🐛
CVE-2026-23325 wifi: mt76: mt7996: Fix possible oob access in mt7996_mac_write_txwi_80211()
🐛
CVE-2026-23313 i40e: Fix preempt count leak in napi poll tracepoint
🐛
CVE-2026-23306 scsi: pm8001: Fix use-after-free in pm8001_queue_command()
🐛
CVE-2026-23383 bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing
🐛
CVE-2026-23307 can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message
🐛
CVE-2026-23348 cxl: Fix race of nvdimm_bus object when creating nvdimm objects
🐛
CVE-2026-23378 net/sched: act_ife: Fix metalist update behavior
🐛
CVE-2026-23352 x86/efi: defer freeing of boot services memory
🐛
CVE-2026-23298 can: ucan: Fix infinite loop from zero-length messages
🐛
CVE-2026-23371 sched/deadline: Fix missing ENQUEUE_REPLENISH during PI de-boosting
🐛
CVE-2026-23340 net: sched: avoid qdisc_reset_all_tx_gt() vs dequeue race for lockless qdiscs
🐛
CVE-2026-23351 netfilter: nft_set_pipapo: split gc into unlink and reclaim phase
🐛
CVE-2026-23319 bpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim
🐛
CVE-2026-23300 net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop
🐛
CVE-2026-23293 net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled
🐛
CVE-2026-23343 xdp: produce a warning when calculated tailroom is negative
🐛
CVE-2026-23389 ice: Fix memory leak in ice_set_ringparam()
🐛
CVE-2026-23324 can: usb: etas_es58x: correctly anchor the urb in the read bulk callback
🐛
CVE-2026-23365 net: usb: kalmia: validate USB endpoints
🐛
CVE-2026-23284 net: ethernet: mtk_eth_soc: Reset prog ptr to old_prog in case of error in mtk_xdp_setup()
🐛
CVE-2026-33186 gRPC-Go has an authorization bypass via missing leading slash in :path
🐛
CVE-2026-33412 Vim affected by Command injection via newline in glob()
🐛
CVE-2026-23370 platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data
🐛
CVE-2026-23333 netfilter: nft_set_rbtree: validate open interval overlap
🐛
CVE-2026-23372 nfc: rawsock: cancel tx_work before socket teardown
🐛
CVE-2026-23315 wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211()
🐛
CVE-2026-23312 net: usb: kaweth: validate USB endpoints
🐛
CVE-2026-23330 nfc: nci: complete pending data exchange on device close
🐛
CVE-2026-23361 PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry
🐛
CVE-2026-23285 drbd: fix null-pointer dereference on local read error
🐛
CVE-2026-23296 scsi: core: Fix refcount leak for tagset_refcnt
🐛
CVE-2026-23392 netfilter: nf_tables: release flowtable after rcu grace period on error
🐛
CVE-2026-23318 ALSA: usb-audio: Use correct version for UAC3 header validation
🐛
CVE-2026-23388 Squashfs: check metadata block offset is within range
🐛
CVE-2026-23286 atm: lec: fix null-ptr-deref in lec_arp_clear_vccs
🐛
CVE-2026-23368 net: phy: register phy led_triggers during probe to avoid AB-BA deadlock
🐛
CVE-2026-23390 tracing/dma: Cap dma_map_sg tracepoint arrays to prevent buffer overflow
🐛
CVE-2026-23292 scsi: target: Fix recursive locking in __configfs_open_file()
🐛
CVE-2026-23364 ksmbd: Compare MACs in constant time
🐛
CVE-2026-23346 arm64: io: Extract user memory type in ioremap_prot()
🐛
CVE-2026-23334 can: usb: f81604: handle short interrupt urb messages properly
🐛
CVE-2026-23303 smb: client: Don't log plaintext credentials in cifs_set_cifscreds
🐛
CVE-2026-23304 ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu()
🐛
CVE-2026-23320 usb: gadget: f_ncm: align net_device lifecycle with bind/unbind
🐛
CVE-2026-23290 net: usb: pegasus: validate USB endpoints
🐛
CVE-2026-23339 nfc: nci: free skb on nci_transceive early error paths
🐛
CVE-2026-23335 RDMA/irdma: Fix kernel stack leak in irdma_create_user_ah()
🐛
CVE-2026-23302 net: annotate data-races around sk->sk_{data_ready,write_space}
🐛
CVE-2026-23386 gve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL
🐛
CVE-2026-23308 pinctrl: equilibrium: fix warning trace on load
🐛
CVE-2026-23291 nfc: pn533: properly drop the usb interface reference on disconnect
🐛
CVE-2026-23357 can: mcp251x: fix deadlock in error path of mcp251x_open
🐛
CVE-2026-23287 irqchip/sifive-plic: Fix frozen interrupt due to affinity setting
🐛
CVE-2026-23336 wifi: cfg80211: cancel rfkill_block work in wiphy_unregister()
🐛
CVE-2026-23281 wifi: libertas: fix use-after-free in lbs_free_adapter()
🐛
CVE-2026-23381 net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled
🐛
CVE-2026-23395 Bluetooth: L2CAP: Fix accepting multiple L2CAP_ECRED_CONN_REQ
🐛
CVE-2026-23374 blktrace: fix __this_cpu_read/write in preemptible context
🐛
CVE-2026-23289 IB/mthca: Add missed mthca_unmap_user_db() for mthca_create_srq()
🐛
CVE-2026-23317 drm/vmwgfx: Return the correct value in vmw_translate_ptr functions
🐛
CVE-2026-23347 can: usb: f81604: correctly anchor the urb in the read bulk callback
🐛
CVE-2026-23310 bpf/bonding: reject vlan+srcmac xmit_hash_policy change when XDP is loaded
🐛
CVE-2026-23356 drbd: fix "LOGIC BUG" in drbd_al_begin_io_nonblock()
🐛
CVE-2026-23327 cxl/mbox: validate payload size before accessing contents in cxl_payload_from_user_allowed()
🐛
CVE-2026-23367 wifi: radiotap: reject radiotap with unknown bits
🐛
CVE-2026-23279 wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame()
🐛
CVE-2026-23379 net/sched: ets: fix divide by zero in the offload path
🐛
CVE-2026-23393 bridge: cfm: Fix race condition in peer_mep deletion
🐛
IDrive for Windows Vulnerability Allows Attackers to Escalate Privileges and Gain Unauthorized Access
🐛
CISA Issues Urgent Warning on Langflow Code Injection Vulnerability Actively Exploited in Attacks
KEV
🐛
CISA: New Langflow flaw actively exploited to hijack AI workflows
KEV
🐛
Coruna: the framework used in Operation Triangulation
⚠️
Delve did the security compliance on LiteLLM, an AI project hit by malware
⚠️
Sound Radix - 292,993 breached accounts
⚠️
Node.js Releases Urgent Patches for Multiple Vulnerabilities Exposing Systems to DoS and Crashes
⚠️
Fake VS Code Security Alerts on GitHub Spread Malware in Massive Phishing Attack
⚠️
LeakBase Forum Admin Arrested by Russian Authorities in Global Cybercrime Operation
⚠️
Fake npm Install Messages Conceal RAT Malware in New Open Source Supply Chain Attack
⚠️
Preventing Account Takeovers: A Practical Guide to Detection and Response
⚠️
Synology DiskStation Manager Vulnerability Puts Users at Risk of Remote Command Execution Attacks
⚠️
WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites
⚠️
Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks
⚠️
Critical NVIDIA Vulnerabilities Risk Remote Code Execution and Denial-of-Service Attacks
⚠️
Silver Fox Tax Audit Phishing Campaign Shifts from RATs to Python Stealers
⚠️
GitHub phishers use fake OpenClaw tokens to drain crypto wallets
⚠️
Critical Ivanti EPMM Vulnerabilities Expose Systems to Arbitrary Code Execution Attacks
KEV
⚠️
Cisco Patches Multiple Vulnerabilities in IOS Software
⚠️
Databricks pitches Lakewatch as a cheaper SIEM — but is it really?
⚠️
Coruna iOS exploit framework linked to Triangulation attacks
⚠️
Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website
⚠️
University Donor Data Under Attack
⚠️
New ClickFix Attack Exploits Windows Run Dialog and macOS Terminal to Deploy Malware
⚠️
Great Patching Lessons To Learn From The Zero Day Clock
⚠️
In WAF we (should not) trust
⚠️
AI is the Top Cyber Priority for Defenders as Criminals Exploit it - Infosecurity Magazine
⚠️
The CISO’s guide to responding to shadow AI
⚠️
Report: Attackers Can Trick AI Assistants Into Displaying Phishing Messages
⚠️
Ajax football club hack exposed fan data, enabled ticket hijack
⚠️
Scanning The Internet with Linux Tools - PSW #919
⚠️
Uncover prompt injection, insider threats with the Tenable One Model Refusal Detection
⚠️
A year of open source vulnerability trends: CVEs, advisories, and malware
⚠️
Active Magecart Campaign Targets Spain, Steals Card Data via Hijacked eStores for Bank Fraud
📢
Alleged RedLine Malware Administrator Extradited to US
📢
TeamPCP deploys CanisterWorm on NPM following Trivy compromise
📢
As the US Midterms Approach, AI Is Going to Emerge as a Key Issue Concerning Voters
📢
Aqua Security security advisory (AV26-283)
📢
PTC security advisory (AV26-282)
📢
Squid security advisory (AV26-284)
📢
Grafana security advisory (AV26-285)
📢
[Control systems] ABB security advisory (AV26-286)
📢
Spring security advisory (AV26-288)
📢
HPE security advisory (AV26-287)
🔥
Scuf Gaming - 128,683 breached accounts
🔥
Torg Grabber Malware Shifts from Telegram Exfiltration to Encrypted REST API for C2
🔥
Russia arrests suspected owner of LeakBase cybercrime forum
🔥
Ransomware attack disrupts operation at major Spanish fishing port | The Record from Recorded Future News
🔥
Hightower Holding Data Breach Impacts 130,000
🔥
UK sanctions Xinbi marketplace linked to Asian scam centers
🔥
Iran-Linked Pay2Key Ransomware Group Re-Emerges - Infosecurity Magazine
🔥
Why Financial Firms are Outgrowing Traditional Email Security
🔥
Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise
🕵️
Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner
🕵️
ISC Stormcast For Thursday, March 26th, 2026 https://isc.sans.edu/podcastdetail/9866, (Thu, Mar 26th)
🕵️
Thousands of websites are accidentally broadcasting sensitive data
🕵️
Thousands of websites are accidentally broadcasting sensitive data
🕵️
Thousands of websites are accidentally broadcasting sensitive data
🕵️
Kiss Loader Malware Targets with Early Bird APC Injection in New Attack Campaign
🕵️
Dell and HP Roll Out Quantum-Resistant Device Security and AI-Era Cyber Resilience
🕵️
Fake Screenshot Lures Target Web3 Support Staff with Multi-Stage Malware Attack
🕵️
[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks
🕵️
Hackers claim to have accessed data tied to millions of crime tipsters
🕵️
PyPI warns developers after LiteLLM malware found stealing cloud and CI/CD credentials | CSO Online
🕵️
GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data
🕵️
Enterprise Cybersecurity Software Fails 20% of the Time, Warns Report - Infosecurity Magazine
🕵️
TP-Link warns users to patch critical router auth bypass flaw
🕵️
Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure
🕵️
GhostClaw AI Malware Targets macOS Users with Credential-Stealing Payloads
🕵️
New Torg Grabber infostealer malware targets 728 crypto wallets
🕵️
BIND Updates Patch High-Severity Vulnerabilities
🕵️
VoidLink Rootkit Leverages eBPF and Kernel Modules to Stealthily Infiltrate Linux Systems
🕵️
TikTok for Business accounts targeted in new phishing campaign
🕵️
Leak Bazaar Converts Stolen Corporate Data Into Organized Criminal Marketplace
🕵️
Scammers Abuse Calendar Invites to Plant Phony Subscription Notices
🕵️
Google bumps up Q Day deadline to 2029, far sooner than previously thought
🕵️
A nearly undetectable LLM attack needs only a handful of poisoned samples - Help Net Security
🕵️
China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks
🕵️
LLMs Solve Firmware Upgrade Chaos
🕵️
ANY.RUN Recognized for Innovations and Market Leadership at Global InfoSec Awards 2026
🌐
Pawn Storm Campaign Deploys PRISMEX, Targets Government and Critical Infrastructure Entities
🌐
How scammers use legitimate surveys to link to malicious sites | Kaspersky official blog
🌐
Suspected RedLine infostealer malware admin extradited to US
🌐
Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks
🌐
Illuminating VoidLink: Technical analysis of the VoidLink rootkit framework
🌐
An AI gateway designed to steal your data
🎙️
Smashing Security podcast #460: Never knock on the door of a nuclear submarine base and ask for a selfie
📡
Masters of Imitation: How Hackers and Art Forgers Perfect the Art of Deception
📡
ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories
📡
Conntour raises $7M from General Catalyst, YC to build an AI search engine for security video systems
📡
Inside a Modern Fraud Attack: From Bot Signups to Account Takeovers
📡
WhatsApp rolls out more AI features, iOS multi-account support
📡
A major hacking tool has leaked online, putting millions of iPhones at risk. Here’s what you need to know
📡
World Leaks data extortion: What you need to know
📡
Preparing for agentic AI: A financial services approach
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-33017 Langflow Code Injection Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses s…
KEV
🐛
CVE-2026-4426 Libarchive: libarchive: denial of service via malformed iso file processing
🐛
CVE-2026-4395 Heap-based buffer overflow in wc_ecc_import_x963_ex KCAPI path
🐛
CVE-2026-1005 Integer underflow leads to out-of-bounds access in sniffer AES-GCM/CCM/ARIA-GCM decrypt path
🐛
CVE-2026-3549 ECH parsing heap buffer overflow
🐛
CVE-2026-25075 strongSwan 4.5.0 < 6.0.5 EAP-TTLS AVP Parsing Integer Underflow
🐛
CVE-2026-33056 tar-rs: unpack_in can chmod arbitrary directories by following symlinks
🐛
CVE-2026-33055 tar-rs incorrectly ignores PAX size headers if header size is nonzero
🐛
CVE-2026-4424 Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing
🐛
CVE-2026-3099 Libsoup: libsoup: authentication bypass via digest authentication replay attack
🐛
CVE-2026-2369 Libsoup: libsoup: buffer overread due to integer underflow when handling zero-length resources
🐛
CVE-2026-0819 Stack buffer overflow in PKCS7 SignedData encoding with custom signed attributes
🐛
CVE-2026-4159 wc_PKCS7_DecodeEnvelopedData 1 byte out-of-bounds read
🐛
CVE-2026-3580 Compiler-induced timing leak in sp_256_get_entry_256_9 on RISC-V
🐛
CVE-2026-3849 Buffer Overflow in HPKE via Oversized ECH Config
🐛
CVE-2026-3579 Non-constant time multiplication subroutine __muldi3 on RISC-V RV32I
🐛
CVE-2026-3229 Integer Overflow in Certificate Chain Allocation
🐛
CVE-2026-3230 Improper key_share validation in TLS 1.3 HelloRetryRequest
🐛
CVE-2026-3503 Fault injection attack with ML-DSA and ML-KEM on ARM
🐛
CVE-2026-3548 Buffer overflow in CRL number parsing in wolfSSL
🐛
CVE-2026-2645 Acceptance of CertificateVerify Message before ClientKeyExchange in TLS 1.2
🐛
CVE-2026-3547 wolfSSL: out-of-bounds read (DoS) in ALPN parsing due to incomplete validation
🐛
CVE-2026-2646 Heap buffer overflow in session parsing with wolfSSL_d2i_SSL_SESSION() function
🐛
CVE-2025-69720
🐛
CVE-2026-32141 flatted: Unbounded recursion DoS in parse() revive phase
🐛
CVE-2026-33228 flatted: Prototype Pollution via parse()
🐛
CVE-2025-13462 tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling
🐛
CVE-2026-4519 webbrowser.open() allows leading dashes in URLs
🐛
CVE-2026-2443 Libsoup: out-of-bounds read in libsoup handle_partial_get() leading to heap information disclosure
🐛
CVE-2026-27623 Valkey has Pre-Authentication DOS from malformed RESP request
🐛
CVE-2026-0716 Libsoup: out-of-bounds read in libsoup websocket frame processing
🐛
F5 NGINX Plus & Open‑Source Flaw Lets Attackers Execute Code via MP4 File
🐛
GoHarbor Issues Urgent Patch for Harbor Flaw Allowing Full Registry Compromise
🐛
Chained vulnerabilities in Cisco Catalyst switches could induce denial-of-service
🐛
New critical Citrix NetScaler hole of similar severity to CitrixBleed2, says expert
🐛
Security for AI: A guide to managing the risks of vibe coding and AI in software development
⚠️
Aqua Security’s Trivy Scanner Hit by Supply Chain Attack, Threatening Software Integrity
⚠️
HackerOne Confirms Employee Data Stolen Following Linked Navia Hack
⚠️
Compromised LiteLLM Package With 95M Downloads Tied to TeamPCP, After Trivy & KICS Hacks
⚠️
AI is breaking traditional security models — Here’s where they fail first
⚠️
Say Easy, Do Hard - Crypto-Agility - BSW #440
⚠️
6 key trends reshaping the IAM market
⚠️
ClawHub Vulnerability Lets Attackers Manipulate Rankings to Become Top Skill
⚠️
Hackers Exploiting Magento Flaw to Execute Remote Code and Seize Full Account Access
⚠️
PyPI warns developers after LiteLLM malware found stealing cloud and CI/CD credentials
⚠️
PTC warns of imminent threat from critical Windchill, FlexPLM RCE bug
⚠️
Trivy supply chain breach compromises over 1,000 SaaS environments, Lapsus$ joins the extortion wave
⚠️
The Kill Chain Is Obsolete When Your AI Agent Is the Threat
⚠️
VulnMCP 1.0.0 released
⚠️
Security for the Quantum Era: Implementing Post-Quantum Cryptography in Android
⚠️
Citrix urges admins to patch NetScaler flaws as soon as possible
⚠️
Trojanization of Trivy, Checkmarx, and LiteLLM solutions | Kaspersky official blog
⚠️
LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace
⚠️
Matrix forensic toolset for tracing membership events
⚠️
Why Your Human Risk Management Strategy Can’t Ignore AI
⚠️
Apple Patches (almost) everything again. March 2026 edition., (Wed, Mar 25th)
⚠️
PolyShell attacks target 56% of all vulnerable Magento stores
⚠️
GitHub adds AI-powered bug detection to expand security coverage
⚠️
ClickFix Campaigns Targeting Windows and macOS
⚠️
Try our new dimensional analysis Claude plugin
⚠️
Risky Business #830 -- LiteLLM and security scanner supply chains compromised
📢
Sen. Wyden Warns of Another Section 702 Abuse
📢
Dutch Finance Ministry probing cyber breach affecting internal systems | The Record from Recorded Future News
📢
Nodejs security advisory (AV26-277)
📢
GitLab security advisory (AV26-276)
📢
n8n security advisory (AV26-278)
📢
Russia arrests alleged owner of cybercrime forum LeakBase, report says
📢
ISC BIND security advisory (AV26-280)
📢
Hitachi security advisory (AV26-279)
📢
Cisco security advisory (AV26-281)
📢
Convicted spyware chief hints that Greece’s government was behind dozens of phone hacks
🔥
Five Malicious npm Packages Target Crypto Developers, Steal Wallet Keys via Telegram
🔥
HackerOne Employee Data Exposed in Massive Navia Breach
🔥
Manager of botnet used in ransomware attacks gets 2 years in prison
🔥
New Study Reveals How Infostealer Infections Lead to Dark Web Exposure in Just 48 Hours
🔥
US Prisons Russian Access Broker for Aiding Ransomware Attacks
🔥
SmartApeSG ClickFix Campaign Spreads Remcos, NetSupport RAT, StealC, Sectop RAT
🔥
Linux Ransomware Pay2Key Targets Servers, Virtualization Hosts, and Cloud Workloads
🔥
From Trivy to Broad OSS Compromise: TeamPCP Hits Docker Hub, VS Code, PyPI
🔥
3.1 Million Impacted by QualDerm Data Breach - SecurityWeek
🔥
Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks
🔥
When Encryption Suddenly Fails
🔥
Identity security is the new pressure point for modern cyberattacks
🔥
Your AI Stack Just Handed Over Your Root Keys: Inside the litellm PyPI Breach
🔥
Anatomy of a Cyber World Global Report 2026
🕵️
Guidance for detecting, investigating, and defending against the Trivy supply chain compromise
🕵️
ISC Stormcast For Wednesday, March 25th, 2026 https://isc.sans.edu/podcastdetail/9864, (Wed, Mar 25th)
🕵️
RSAC Presenter Says "Time to Kill One of Cybersecurity's Most Overworked Terms"
🕵️
Google Authenticator’s Hidden Passkey Design May Expose New Passwordless Attack Vectors
🕵️
FCC Blocks New Foreign Consumer Router Models Citing Serious Security Risks
🕵️
Kali Linux 2026.1 Launches With 8 New Hacking Tools for Penetration Testers
🕵️
AI-Driven ‘OpenClaw Trap’ Campaign Targets Developers and Gamers via Trojanized GitHub Repos
🕵️
Checkmarx KICS Code Scanner Targeted in Widening Supply Chain Hit
🕵️
Citrix Urges Immediate Patching for Critical NetScaler Vulnerabilities - Infosecurity Magazine
🕵️
Mozilla Releases Firefox 149.0 With Free Built‑In VPN Offering 50 GB Monthly Data
🕵️
RSAC 2026 Conference Announcements Summary (Day 2)
🕵️
Mirai Botnets Evolve Into Major DDoS and Proxy Abuse Threats
🕵️
FCC Bans New Routers Made Outside the US Over National Security Risks
🕵️
Obfuscated VBS and PNG Loaders Power New Open Directory Malware Campaign with RAT Payloads
🕵️
iOS, macOS 26.4 Roll Out With Fresh Security Patches
🕵️
China-Backed Hackers Target Southeast Asian Military Systems in Ongoing Spy Campaign
🕵️
What are You Working on Wednesday
🕵️
AI Speeds Attacks, But Identity Remains Cybersecurity’s Weakest Link
🕵️
Russian Cybercriminal Gets 2-Year Prison Sentence in US
🕵️
GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data
🕵️
2026 Cybersecurity Excellence Awards Winners Announced during RSA Conference as AI Security Dominates
🕵️
MY YAKE: A decade of cyber collaboration, built under Obama, is now hostage to a political grudge
🕵️
Onit Security Raises $11 Million for Exposure Management Platform
🕵️
AI Expands the Scam Target Pool
🕵️
Bubble AI app builder abused to steal Microsoft account credentials
🕵️
You Don’t Know Your Assets
🌐
FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns
🌐
Paid AI Accounts Are Now a Hot Underground Commodity
🌐
New Torg Grabber infostealer malware targets 728 crypto wallets
📡
Weekly Threat Bulletin – March 25th, 2026
📡
SmartApeSG campaign pushes Remcos RAT, NetSupport RAT, StealC, and Sectop RAT (ArechClient2), (Wed, Mar 25th)
📡
How one man used 10,000 bots to steal $8,000,000 from music artists
📡
TP-Link warns users to patch critical router auth bypass flaw
📡
Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse
📡
Kali Linux 2026.1 released with 8 new tools, new BackTrack mode
📡
Joint guidance on securing space and cyber security for low earth orbit satellite communications
📡
Virtual machines, virtually everywhere – and with real security gaps
📡
How Charlotte AI AgentWorks Fuels Security's Agentic Ecosystem
📡
5 Ways To Protect Enterprise Value During A Merger Or Acquisition
🐛
Critical NetScaler ADC and Gateway Flaws Expose Systems to Remote Attacks
🐛
Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks
🐛
VU#330121: IDrive for Windows contains local privilege escalation vulnerability
⚠️
Palo Alto updates security platform to discover AI agents
⚠️
Chrome Security Update Fixes 8 Vulnerabilities That Could Enable Remote Code Execution
⚠️
Roundcube Releases Urgent Security Update to Fix Critical Bugs
⚠️
NIST Releases Quick-Start Guide Linking Cybersecurity, Enterprise Risk, and Workforce Management
⚠️
Why CISOs should embrace AI honeypots
⚠️
Founder of CoinDCX Arrested Amid Serious Fraud and Cheating Charges
⚠️
Streamline physical security to enable data center growth in the era of AI
⚠️
Why Proactive Security Is Far Better Than Patching - Erik Nost - ASW #375
⚠️
Autonomous AI adoption is on the rise, but it’s risky
⚠️
Threat Actors Target MS-SQL Servers to Deploy ICE Cloud Scanner Malware
⚠️
Multiple Vulnerabilities in TP-Link Devices Enable Arbitrary Command Execution
⚠️
Critical Citrix NetScaler Vulnerability Poised for Exploitation, Security Firms Warn
⚠️
Dell Wyse Management Flaws Could Lead to Full System Compromise
⚠️
New ‘StoatWaffle’ malware auto‑executes attacks on developers
⚠️
DarkSword Exploit Chain Leaked Online, Posing Risk to Millions of iPhones
⚠️
Tycoon2FA Operators Resume Cloud Account Phishing Following Infrastructure
⚠️
HP launches TPM Guard to help defeat physical TPM attacks
⚠️
News alert: DDoS attacks surge 150%—Gcore analysis shows faster, cheaper more frequent attacks
⚠️
Best Practices for Implementing AI Agents
⚠️
Your Attack Surface Just Expanded
⚠️
100,000+ New Vulnerabilities This Year and Most Will Be Zero-Days Exploited Faster
⚠️
PTC warns of imminent threat from critical Windchill, FlexPLM RCE bug
⚠️
Cloud workload security: Mind the gaps
⚠️
ZDI-26-226: (0Day) Microsoft Azure MCP AzureCliService Command Injection Remote Code Execution Vulnerability
⚠️
Meet Tenable Hexa AI: Agentic AI for exposure management
⚠️
VU#577436: Hard coded credentials vulnerability in GoHarbor's Harbor
⚠️
Spotting issues in DeFi with dimensional analysis
📢
Delve halts demos, Insight Partners scrubs investment post amid ‘fake compliance’ allegations
📢
Delve - Fake Compliance as a Service
📢
Delve - Fake Compliance as a Service
📢
TeamPCP Unleashes Iran-Targeted CanisterWorm Kubernetes Wiper
📢
Dutch Ministry of Finance discloses breach affecting employees
📢
HackerOne discloses employee data breach after Navia hack
📢
Mozilla security advisory (AV26-271)
📢
Google Chrome security advisory (AV26-270)
📢
VMware security advisory (AV26-272)
📢
[Control systems] Helmholz security advisory (AV26-274)
📢
F5 security advisory (AV26-273)
📢
Apple security advisory (AV26-275)
🔥
US State Department launches the Bureau of Emerging Threats to tackle current and future threats, including cyberattacks and AI weaponization by adversaries
🔥
US State Department launches the Bureau of Emerging Threats to tackle current and future threats, including cyberattacks and AI weaponization by adversaries
🔥
US State Department launches the Bureau of Emerging Threats to tackle current and future threats, including cyberattacks and AI weaponization by adversaries
🔥
Weekly Update 496
🔥
New Leak Site Tied to Active Initial Access Broker Emerges on Underground Forums
🔥
U.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware Damage
🔥
Russian Access Broker Jailed for Facilitating Ransomware Attacks Targeting U.S. Companies
🔥
Mazda Says Employee, Partner Information Stolen in Cyberattack
🔥
TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials
🔥
3.1 Million Impacted by QualDerm Data Breach
🔥
Yanluowang ransomware access broker gets 81 months in prison
🔥
Infinite Campus warns of breach after ShinyHunters claims data theft
🔥
Extortion Group Claims It Hacked AstraZeneca
🔥
SQL Server Ransomware Attacks: How They Work and How to Harden Your Database
🔥
Crunchyroll confirms data breach after hacker claims unauthorized access
🔥
Poland Faced a Surge in Cyberattacks in 2025, Including a Major Assault on the Energy Sector
🔥
TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise
🔥
Popular LiteLLM PyPI package compromised in TeamPCP supply chain attack
🕵️
ISC Stormcast For Tuesday, March 24th, 2026 https://isc.sans.edu/podcastdetail/9862, (Tue, Mar 24th)
🕵️
The US bans all new foreign-made network routers
🕵️
Fake ChatGPT Invites Target Android Users With Malware
🕵️
SilentConnect Uses Fake Invites to Deploy ScreenConnect RAT
🕵️
Microsoft Unveils New GenAI Security Protections in Azure AI Foundry
🕵️
Google Forms Job Scam Spreads PureHVNC Malware
🕵️
Stryker Says Malicious File Found During Probe Into Iran-Linked Attack
🕵️
Gcore Radar report reveals 150% surge in DDoS attacks year-on-year
🕵️
Team Mirai and Democracy
🕵️
Iran Built a Vast Camera Network to Control Dissent. Israel Turned It Into a Targeting Tool
🕵️
Webinar Today: Putting CIS Controls and Benchmarks into Practice
🕵️
Chrome 146 Update Patches High-Severity Vulnerabilities
🕵️
Detecting IP KVMs, (Tue, Mar 24th)
🕵️
The Hardest Part of Security
🕵️
DDoS-Angriffe haben sich verdoppelt
🕵️
RSAC 2026 Conference Announcements Summary (Day 1)
🕵️
Supply Chain Attack in litellm 1.82.8 on PyPI
🕵️
CyberheistNews Vol 16 #12 [Keep An Eye Out] Why Unsecured Outlook Email Is Risky
🕵️
I Didn’t Revoke my API Keys Because Claude Called Me An Idiot
🕵️
Governing AI agent behavior: Aligning user, developer, role, and organizational intent
🕵️
Why Agentic AI Systems Need Better Governance – Lessons from OpenClaw
🕵️
DoE Publishes 5-Year Energy Security Plan
🕵️
Scam Baiting, AI, and the New Grift Economy, Part 1 - Rinoa Poison - SWN #566
🕵️
When Virtual Machines Fail You
🕵️
Mandiant Global Median Dwell Time Deteriorates from 11 to 14 Days
🌐
Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR
🌐
Investigating from the Endpoint Across Your Environment with Elastic Security XDR
📡
The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills
📡
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials
📡
5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents
📡
Bubble’s role in phishing scams | Kaspersky official blog
📡
Zero Trust: Bridging the Gap Between Authentication and Trust
📡
FCC bans import of new consumer routers made overseas, citing security risks
📡
Microsoft fixes bug causing Classic Outlook sync issues with Gmail
📡
Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner
📡
Firefox now has a free built-in VPN with 50GB monthly data limit
📡
FCC bans new routers made outside the USA over security risks
📡
CrowdStrike Flex for Services Expands Access to Elite Security Expertise
📡
Falcon Data Security Secures Data Wherever It Lives and Moves
📡
CrowdStrike Advances CNAPP with Industry-First Adversary-Informed Risk Prioritization
📡
CrowdStrike Services and Agentic MDR Put the Agentic SOC in Reach
📡
Sumit Dhawan on the importance of intent-based AI security
📡
20 Coolest AI And Security Products At RSAC 2026
📡
Security Automation with Elastic Workflows: From Alert to Response
📡
Streamlining the Security Analyst Experience
📡
Supercharge Your SOC
🐛
AL26-005 – Critical vulnerability impacting Microsoft SharePoint Server – CVE-2026-20963
🐛
Oracle Releases Emergency Patch for Critical Identity Manager Vulnerability
KEV
🐛
Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems
🐛
Chromium: CVE-2026-4464 Integer overflow in ANGLE
🐛
Chromium: CVE-2026-4463 Heap buffer overflow in WebRTC
🐛
Chromium: CVE-2026-4462 Out of bounds read in Blink
🐛
Chromium: CVE-2026-4461 Inappropriate implementation in V8
🐛
Chromium: CVE-2026-4456 Use after free in Digital Credentials API
🐛
Chromium: CVE-2026-4460 Out of bounds read in Skia
🐛
Chromium: CVE-2026-4457 Type Confusion in V8
🐛
Chromium: CVE-2026-4446 Use after free in WebRTC
🐛
Chromium: CVE-2026-4449 Use after free in Blink
🐛
Chromium: CVE-2026-4445 Use after free in WebRTC
🐛
Chromium: CVE-2026-4451 Insufficient validation of untrusted input in Navigation
🐛
Chromium: CVE-2026-4447 Inappropriate implementation in V8
🐛
Chromium: CVE-2026-4444 Stack buffer overflow in WebRTC
🐛
Chromium: CVE-2026-4455 Heap buffer overflow in PDFium
🐛
Chromium: CVE-2026-4452 Integer overflow in ANGLE
🐛
Chromium: CVE-2026-4443 Heap buffer overflow in WebAudio
🐛
Chromium: CVE-2026-4448 Heap buffer overflow in ANGLE
🐛
Chromium: CVE-2026-4441 Use after free in Base
🐛
CVE-2026-4438 gethostbyaddr and gethostbyaddr_r return invalid DNS hostnames
🐛
Chromium: CVE-2026-4454 Use after free in Network
🐛
Chromium: CVE-2026-4450 Out of bounds write in V8
🐛
CVE-2026-4437 gethostbyaddr and gethostbyaddr_r may incorrectly handle DNS response
🐛
Chromium: CVE-2026-4458 Use after free in Extensions
🐛
Chromium: CVE-2026-4440 Out of bounds read and write in WebGL
🐛
Hackers Exploit Quest KACE SMA Flaw to Harvest Credentials
🐛
CISA Warns of Craft CMS Code Injection Flaw Exploited in Active Attacks
KEV
🐛
Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure
🐛
ZDI-26-225: (Pwn2Own) Samsung Galaxy S25 Samsung Account Open Redirect Security Bypass Vulnerability
🐛
ZDI-26-224: (Pwn2Own) Samsung Galaxy S25 Samsung Account Cross-Site Scripting Remote Code Execution Vulnerability
🐛
ZDI-26-223: (Pwn2Own) Samsung Galaxy S25 Smart Touch Call Application Protection Mechanism Failure Information Disclosure Vulnerability
🐛
ZDI-26-222: (Pwn2Own) Canon imageCLASS MF654Cdw BJNP Memory Corruption Remote Code Execution Vulnerability
⚠️
Microsoft Xbox One Hacked
⚠️
Startup Accused Of Helping Fake Privacy and Security Audits
⚠️
CISA orders feds to patch DarkSword iOS flaws exploited attacks
⚠️
Aqua’s Trivy Vulnerability Scanner Hit by Supply Chain Attack
⚠️
QNAP Patches Four Vulnerabilities Exploited at Pwn2Own
⚠️
Tycoon 2FA Fully Operational Despite Law Enforcement Takedown
⚠️
⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More
⚠️
We Found Eight Attack Vectors Inside AWS Bedrock. Here's What Attackers Can Do with Them
⚠️
The ‘Urgency Trap’: Why Time Pressure is Your Biggest Email Red Flag
⚠️
Critical QNAP QVR Pro Flaw Could Let Remote Attackers Access Systems
⚠️
Faster attacks and ‘recovery denial’ ransomware reshape threat landscape
⚠️
Chrome ABE bypass discovered: New VoidStealer malware steals passwords and cookies
⚠️
Behavioral XDR and threat intel nab North Korean fake IT worker within 10 days of hire
⚠️
Why US companies must be ready for quantum by 2030: A practical roadmap
⚠️
The insider threat rises again
⚠️
cpe-guesser 2.0 released
⚠️
Patch Now: Oracle's Fusion Middleware Has Critical RCE Flaw
⚠️
Trivy vulnerability scanner backdoored with credential stealer in supply chain attack | CSO Online
⚠️
Why One-Time Pen Testing Isn’t Enough
⚠️
Someone has publicly leaked an exploit kit that can hack millions of iPhones
⚠️
A Vulnerability in Oracle Products Could Allow for Remote Code Execution
⚠️
I Built 7 MCP Servers for Security Tools. The Protocol Was the Easy Part.
⚠️
Someone has publicly leaked an exploit kit that can hack millions of iPhones
⚠️
Securing the AI Enterprise — Introducing Prisma AIRS 3.0
⚠️
The Cryptographic Reset Has Begun
⚠️
M-Trends 2026: Data, Insights, and Strategies From the Frontlines
⚠️
IAM policy types: How and when to use them
📋
511,000+ End-of-Life IIS Instances Found Online, Raising Security Risks
📢
VMware security advisory (AV26-269)
📢
Microsoft Edge security advisory (AV26-268)
📢
Citrix security advisory (AV26-267)
📢
Red Hat security advisory (AV26-266)
📢
[Control systems] CISA ICS security advisories (AV26–265)
📢
Ubuntu security advisory (AV26-264)
📢
Dell security advisory (AV26-263)
📢
IBM security advisory (AV26-262)
📢
Oracle security advisory (AV26-261)
📢
Kubernetes security advisory (AV26-260)
📢
FBI warns of Handala hackers using Telegram in malware attacks
📢
‘CanisterWorm’ Springs Wiper Attack Targeting Iran
📢
Reflections from the Second NIST Cyber AI Profile Workshop
📢
Federal immigration agents filmed making airport arrests as Trump calls in ICE to ease security line delays
📢
CISA orders feds to patch max-severity Cisco flaw by Sunday
🔥
M-Trends 2026: Initial Access Handoff Shrinks From Hours to 22 Seconds
🔥
Chip Services Firm Trio-Tech Says Subsidiary Hit by Ransomware
🔥
Case study: How predictive shielding in Defender stopped GPO-based ransomware before it started
🔥
Libyan Refinery Targeted in Prolonged Spy Campaign With AsyncRAT
🔥
Can AI help critical infrastructure, the state of the cyber market, and weekly news - ESW #451
🔥
Trivy Compromised by "TeamPCP" | Wiz Blog
🔥
Navia Data Breach Impacts 2.7 Million - SecurityWeek
🔥
Crunchyroll probes breach after hacker claims to steal 6.8M users' data
🔥
Mazda discloses security breach exposing employee and partner data
🔥
RuneScape Boards - 222,762 breached accounts
🕵️
RSAC 2026 Conference Announcements Summary (Pre-Event)
🕵️
ISC Stormcast For Monday, March 23rd, 2026 https://isc.sans.edu/podcastdetail/9860, (Mon, Mar 23rd)
🕵️
Tax Scam Google Ads Push BYOVD EDR Killer, Huntress Finds
🕵️
SEO Poisoning Campaign Uses Fake Popular Apps to Deliver AsyncRAT
🕵️
MioLab MacOS Stealer Expands With ClickFix, Wallet Theft, Team APIs
🕵️
Oblivion RAT Masquerades as Play Store Update to Spy on Android Users
🕵️
$30 IP-KVM Flaws Could Enable BIOS-Level Enterprise Network Attacks
🕵️
FBI says Iranian hackers are using Telegram to steal data in malware attacks
🕵️
AI-First Security Is Mostly Hype
🕵️
Burp Anonymizer
🕵️
Thousands of Magento Sites Hit in Ongoing Defacement Campaign - SecurityWeek
🕵️
BurpAnonymizer
🕵️
North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware
🕵️
Securing the Era of Agentic AI with Prisma SASE
🕵️
Prisma Browser for Business — A Secure Workspace for Small Business
🕵️
GitHub expands application security coverage with AI‑powered detections
🌐
Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware
🌐
Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper
📡
Trivy supply-chain attack spreads to Docker, GitHub repos
📡
Varonis Atlas: Securing AI and the Data That Powers It
📡
Microsoft Exchange Online service change causes email access issues
📡
New KB5085516 emergency update fixes Microsoft account sign-in
📡
Russian authorities block paywall removal site Archive.today
📡
TeamPCP deploys Iran-targeted wiper in Kubernetes attacks
📡
Tool updates: lots of security and logic fixes, (Mon, Mar 23rd)
📡
Tycoon2FA phishing platform returns after recent police disruption
📡
OpenAI rolls out ChatGPT Library to store your personal files
📡
Proofpoint Redefines Email and Data Security for the Agentic Workspace
⚠️
FIRESIDE CHAT: In the AI age, your MFA, authentication apps can be compromised in minutes
KEV
📢
Delve accused of misleading customers with ‘fake compliance’
🌐
VoidStealer malware steals Chrome master key via debugger trick
🐛
Critical Quest KACE Vulnerability Potentially Exploited in Attacks
🐛
Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager
🐛
CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026
KEV
🐛
CVE-2026-23204 net/sched: cls_u32: use skb_header_pointer_careful()
🐛
CVE-2026-23274 netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels
🐛
CVE-2026-23278 netfilter: nf_tables: always walk all pending catchall elements
🐛
CVE-2026-23272 netfilter: nf_tables: unconditionally bump set->nelems before insertion
🐛
CVE-2026-23276 net: add xmit recursion limit to tunnel xmit functions
🐛
CVE-2026-3634 Libsoup: libsoup: http header injection and response splitting via crlf injection in content-type header
🐛
CVE-2026-3632 Libsoup: libsoup: http smuggling and server-side request forgery via malformed hostnames
🐛
CVE-2026-3479 pkgutil.get_data() does not enforce documented restrictions
🐛
CVE-2026-27135 nghttp2 Denial of service: Assertion failure due to the missing state validation
🐛
CVE-2026-23277 net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit
🐛
CVE-2026-23271 perf: Fix __perf_event_overflow() vs perf_remove_from_context() race
🐛
CVE-2026-32766 astral-tokio-tar insufficiently validates PAX extensions during extraction
🐛
CVE-2026-3633 Libsoup: libsoup: header and http request injection via crlf injection
🐛
CVE-2026-30922 pyasn1 Vulnerable to Denial of Service via Unbounded Recursion
⚠️
The Fundamental Mistake in Cybersecurity Risk Management
⚠️
Trivy vulnerability scanner breach pushed infostealer via GitHub Actions
⚠️
Trivy vulnerability scanner backdoored with credential stealer in supply chain attack
⚠️
Linux Telnet Vulnerability Exposed
📢
FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks
📢
Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages
🔥
Are nations ready to be the cybersecurity insurers of last resort?
🕵️
MY TAKE: As RSAC 2026 opens, AI has bifurcated cybersecurity into two wars—the clock is running
📡
Google adds ‘Advanced Flow’ for safe APK sideloading on Android
📡
Microsoft Azure Monitor alerts abused for callback phishing attacks
🚨
CISA Adds Five Known Exploited Vulnerabilities to CatalogCISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-31277 Apple Multiple Products Buffer Overflow Vulnerability CVE-2025-32432 Craft CMS Code Injection Vulnerability CVE-2025-43510 Apple…
KEV
🚨
Vulneratility-Lookup 4.2.0submitted by cm0002 to cybersecurity 3 points | 0 comments https://github.com/vulnerability-lookup/vulnerability-lookup/releases/tag/v4.2.0 It is our honour to announce the release of Vulnerability-Lookup 4.2.0 ! This version brings a large number of new CSAF-based vulnerability …
KEV
🐛
Oracle pushes emergency fix for critical Identity Manager RCE flaw
🐛
CISA orders feds to patch max-severity Cisco flaw by Sunday
🐛
Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure
🐛
CVE-2026-23214 btrfs: reject new transactions if the fs is fully read-only
🐛
CVE-2026-23221 bus: fsl-mc: fix use-after-free in driver_override_show()
🐛
CVE-2025-71221 dmaengine: mmp_pdma: Fix race condition in mmp_pdma_residue()
🐛
CVE-2026-23110 scsi: core: Wake up the error handler when final completions race against each other
🐛
CVE-2026-23171 bonding: fix use-after-free due to enslave fail after slave array update
🐛
CVE-2026-23213 drm/amd/pm: Disable MMIO access during SMU Mode 1 reset
🐛
CVE-2025-71225 md: suspend array while updating raid_disks via sysfs
🐛
CVE-2025-71227 wifi: mac80211: don't WARN for connections on invalid channels
🐛
CVE-2025-71233 PCI: endpoint: Avoid creating sub-groups asynchronously
🐛
CVE-2025-71236 scsi: qla2xxx: Validate sp before freeing associated memory
🐛
CVE-2026-23227 drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free
🐛
CVE-2026-23207 spi: tegra210-quad: Protect curr_xfer check in IRQ handler
🐛
CVE-2026-23113 io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop
🐛
CVE-2026-23118 rxrpc: Fix data-race warning and potential load/store tearing
🐛
CVE-2026-23126 netdevsim: fix a race issue related to the operation on bpf_bound_progs list
🐛
CVE-2026-23154 net: fix segmentation of forwarding fraglist GRO
🐛
CVE-2026-23157 btrfs: do not strictly require dirty metadata threshold for metadata writepages
🐛
CVE-2026-23169 mptcp: fix race in mptcp_pm_nl_flush_addrs_doit()
🐛
CVE-2026-23191 ALSA: aloop: Fix racy access at PCM trigger
🐛
CVE-2026-23208 ALSA: usb-audio: Prevent excessive number of frames
🐛
CVE-2026-23269 apparmor: validate DFA start states are in bounds in unpack_pdb
🐛
CVE-2026-23259 io_uring/rw: free potentially allocated iovec on cache put failure
🐛
CVE-2026-23268 apparmor: fix unprivileged local user can do privileged policy management
🐛
CVE-2026-23266 fbdev: rivafb: fix divide error in nv3_arb()
🐛
CVE-2026-23265 f2fs: fix to do sanity check on node footer in {read,write}_end_io
🐛
CVE-2006-10002 XML::Parser versions through 2.47 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes
🐛
CVE-2026-23255 net: add proper RCU protection to /proc/net/ptype
🐛
CVE-2026-23253 media: dvb-core: fix wrong reinitialization of ringbuffer on reopen
🐛
CVE-2025-71269 btrfs: do not free data reservation in fallback from inline due to -ENOSPC
🐛
CVE-2026-23267 f2fs: fix IS_CHECKPOINTED flag inconsistency issue caused by concurrent atomic commit and checkpoint writes
🐛
CVE-2006-10003 XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflow in st_serial_stack
⚠️
54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security
⚠️
Proton Mail Shared User Information with the Police
⚠️
FBI Seizes Iran-Linked Handala Leak Site After Stryker Intune Wipe Attack: Cybersecurity Today
KEV
⚠️
Police take down 373,000 fake CSAM sites in Operation Alice
⚠️
Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets
⚠️
Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover
⚠️
DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks
⚠️
Apple Warns Older iPhones Vulnerable to Coruna, DarkSword Exploit Kit Attacks
⚠️
All aboard: the NIST Cybersecurity for IoT Program is headed to our next stop! Share your input on where we’re headed during our Future Directions Two-Day Workshop on March 31st.
⚠️
GSocket Backdoor Delivered Through Bash Script, (Fri, Mar 20th)
⚠️
CTI-REALM: A new benchmark for end-to-end detection rule generation with AI agents
⚠️
Stop using AI to submit bug reports, says Google
⚠️
The espionage reality: Your infrastructure is already in the collection path
⚠️
Ahab and Peewee Herman, Zoom, Vibe Hacking, SharePoint, Meta, AgeID, Josh Marpet - SWN #565
⚠️
Unexpected Flaw in Laundry Cards
⚠️
Cryptographers engage in war of words over RustSec bug reports and subsequent ban
⚠️
An Android physical security tool
⚠️
Intego X9: Never trust my updates
📢
US accuses Iran’s government of operating hacktivist group that hacked Stryker
📢
DDoS-Attacken: Schlag gegen internationale Cyberkriminelle
🔥
FBI links Signal phishing attacks to Russian intelligence services
🔥
How CISOs Can Survive the Era of Geopolitical Cyberattacks
🔥
In Other News: New Android Safeguards, Operation Alice, UK Toughens Cyber Reporting
🔥
Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
🔥
The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks
🔥
Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers
🔥
Cyberattack on vehicle breathalyzer company leaves drivers stranded across the US
🔥
Denver’s crosswalks hacked to broadcast anti-Trump messages
🔥
LeakNet ransomware: what you need to know
🔥
Water utilities strengthen cybersecurity through cooperation
🔥
DoJ has taken down botnets behind the largest-ever DDoS attack
🔥
DoJ has taken down botnets behind the largest-ever DDoS attack
🔥
DoJ has taken down botnets behind the largest-ever DDoS attack
🔥
Move fast and save things: A quick guide to recovering a hacked account
🕵️
Friday Squid Blogging: Jumbo Flying Squid in the South Pacific
🕵️
3 Men Charged With Conspiring to Smuggle US Artificial Intelligence to China
🕵️
ISC Stormcast For Friday, March 20th, 2026 https://isc.sans.edu/podcastdetail/9858, (Fri, Mar 20th)
🕵️
Secure agentic AI end-to-end
🕵️
Inside Our 'Human Risk: In-Person Experience' in Leeds
🕵️
Digital Cleanup: It’s Not Just Your Files, It’s Your Brain
🕵️
GUEST ESSAY: Executives trust AI security even as security teams confront blind spots, new risks
🕵️
Discord Age Verification Rollback
🕵️
French aircraft carrier Charles de Gaulle tracked via Strava activity in OPSEC failure
🌐
Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams
🌐
Predator spyware disables iOS camera and microphone indicators | Kaspersky official blog
📡
A French Navy officer accidentally leaked the location of an aircraft carrier by logging his run on Strava
📡
Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario
🚨
CISA Adds Exploited Zimbra Collaboration Suite Flaw to Warning ListThe Cybersecurity and Infrastructure Security Agency (CISA) has officially added a critical vulnerability affecting the Zimbra Collaboration Suite (ZCS) to its Known Exploited Vulnerabilities (KEV) catalog. Federal agencies and organizations using the platform must apply the nece…
KEV
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.  CVE-2026-20131 Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserializa…
KEV
🐛
CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware Attacks
KEV
🐛
CVE-2026-23233 f2fs: fix to avoid mapping wrong physical block for swapfile
🐛
CVE-2026-23242 RDMA/siw: Fix potential NULL pointer dereference in header processing
🐛
CVE-2026-23245 net/sched: act_gate: snapshot parameters with RCU on replace
🐛
CVE-2025-71266 fs: ntfs3: check return value of indx_find to avoid infinite loop
🐛
CVE-2025-71267 fs: ntfs3: fix infinite loop triggered by zero-sized ATTR_LIST
🐛
CVE-2026-23244 nvme: fix memory allocation in nvme_pr_read_keys()
🐛
CVE-2026-23243 RDMA/umad: Reject negative data_len in ib_umad_write
🐛
CVE-2026-4224 Stack overflow parsing XML with deeply nested DTD content models
🐛
CVE-2026-3644 Incomplete control character validation in http.cookies
🐛
CVE-2026-23248 perf/core: Fix refcount bug and potential UAF in perf_mmap
🐛
CVE-2026-23246 wifi: mac80211: bounds-check link_id in ieee80211_ml_reconfiguration
🐛
CVE-2026-23247 tcp: secure_seq: add back ports to TS offset
🐛
CVE-2025-71265 fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata
🐛
CVE-2026-27448 pyOpenSSL allows TLS connection bypass via unhandled callback exception in set_tlsext_servername_callback
🐛
CVE-2026-27459 pyOpenSSL DTLS cookie callback buffer overflow
🐛
CISA Warns of Attacks Exploiting Recent SharePoint Vulnerability
KEV
🐛
Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access
🐛
Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE
🐛
Telnet vulnerability opens door to remote code execution as root
🐛
Ransomware group exploited Cisco firewall vulnerability as a zero day, weeks before a patch appeared
🐛
CVE-2026-32169 Azure Cloud Shell Elevation of Privilege Vulnerability
🐛
CVE-2026-26139 Microsoft Purview Elevation of Privilege Vulnerability
🐛
CVE-2026-26138 Microsoft Purview Elevation of Privilege Vulnerability
🐛
CVE-2026-32191 Microsoft Bing Images Remote Code Execution Vulnerability
🐛
CVE-2026-23658 Azure DevOps: msazure Elevation of Privilege Vulnerability
🐛
CVE-2026-26120 Microsoft Bing Tampering Vulnerability
🐛
CVE-2026-23659 Azure Data Factory Information Disclosure Vulnerability
🐛
CVE-2026-24299 M365 Copilot Information Disclosure Vulnerability
🐛
CVE-2026-26136 Microsoft Copilot Information Disclosure Vulnerability
🐛
CVE-2026-26137 Microsoft 365 Copilot BizChat Elevation of Privilege Vulnerability
🐛
CVE-2026-32194 Microsoft Bing Images Remote Code Execution Vulnerability
🐛
ZDI-26-221: GIMP XPM File Parsing Integer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-220: GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-219: GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-218: GIMP ANI File Parsing Integer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-217: GIMP PSD File Parsing Integer Overflow Remote Code Execution Vulnerability
⚠️
Interesting Message Stored in Cowrie Logs, (Wed, Mar 18th)
⚠️
Cisco Firewall Zero-Day Actively Exploited to Deliver Interlock Ransomware
KEV
⚠️
New iOS Exploit Uses Advanced iPhone Hacking Tools to Steal Personal Data
⚠️
ScreenConnect Flaw Lets Hackers Steal Machine Keys and Hijack Sessions
⚠️
Aura Confirms Data Breach Exposing 900,000 Customer Records
⚠️
Anthropic ban heralds new era of supply chain risk — with no clear playbook
⚠️
Cisco Firewall Vulnerability Exploited as Zero-Day in Interlock Ransomware Attacks
⚠️
Your MFA isn’t broken — it’s being bypassed, and your employees can’t tell the difference
⚠️
Hacking a Robot Vacuum
⚠️
DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover
⚠️
Critical Microsoft SharePoint flaw now exploited in attacks
⚠️
Pyronut Package Backdoors Telegram Bots With RCE
⚠️
The multi-billion dollar mistake: Why cloud misconfigurations are your biggest security threat
⚠️
CISA urges US orgs to secure Microsoft Intune systems after Stryker breach
⚠️
Claude Vulnerabilities Allow Data Exfiltration and Malicious Redirect Attacks
⚠️
CISA orders feds to patch Zimbra XSS flaw exploited in attacks
⚠️
Russian APT Exploits Zimbra Vulnerability Against Ukraine
⚠️
New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data
⚠️
7 Ways to Prevent Privilege Escalation via Password Resets
⚠️
Cybersecurity Responsibility Is Shifting
⚠️
ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More
⚠️
Russian hackers exploit Zimbra flaw in Ukrainian govt attacks
⚠️
Beijing wants its own quantum-resistant encryption standards rather than adopt NIST’s
⚠️
Critical ScreenConnect Vulnerability Exposes Machine Keys
⚠️
Privacy Platform Cloaked Raises $375M to Expand Consumer Tools and Enterprise Reach
⚠️
News alert: SpyCloud study reveal stolen tokens, session data fuel surge in non-human identity attacks
⚠️
Anton’s Security Blog Quarterly Q1 2026
KEV
⚠️
CISA urges IT to harden endpoint management systems after cyberattack by pro-Iranian group
⚠️
That cheap KVM device could expose your network to remote compromise
⚠️
SpyCloud’s 2026 Identity Exposure Report Reveals Explosion of Non-Human Identity Theft
⚠️
Hacking IP KVMs & Reversing with Radare2 - Sergi Àlvarez - PSW #918
⚠️
Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
⚠️
Linux & Cloud Detection Engineering - Getting Started with Defend for Containers (D4C)
📢
5 key priorities for your RSAC 2026 agenda
📢
CISA Calls on Organizations to Strengthen Microsoft Intune Security After Stryker Incident
📢
Ubiquiti security advisory (AV26-258)
📢
CISA urges companies to secure Microsoft Intune systems after hackers mass-wipe Stryker devices
📢
Microsoft security advisory – January 2026 monthly rollup (AV26-024) – Update 2
📢
Spring security advisory (AV26-259)
🔥
Raven Emerges From Stealth With $20 Million in Funding
🔥
Aura confirms data breach exposing 900,000 marketing contacts
🔥
Security Firm Aura Discloses Data Breach Impacting 900,000 Records
🔥
Marquis Data Breach Affects 672,000 Individuals
🔥
FBI seizes pro-Iranian hacking group’s websites after destructive Stryker hack
🔥
Iran Readied Cyberattack Capabilities for Response Prior to Epic Fury
🔥
FBI seizes Handala data leak site after Stryker cyberattack
🔥
When tax season becomes cyberattack season: Phishing and malware campaigns using tax-related lures
🔥
Bitrefill blames North Korean Lazarus group for cyberattack
🔥
1stProtect Emerges From Stealth With $20 Million in Funding
🔥
Millions of iPhones can be hacked with a new tool found in the wild
🕵️
ISC Stormcast For Thursday, March 19th, 2026 https://isc.sans.edu/podcastdetail/9856, (Thu, Mar 19th)
🕵️
SnappyClient Implant Blends Remote Access, Data Theft, and Stealth Evasion
🕵️
WaterPlum Unleashes “StoatWaffle” Malware in VSCode Supply Chain Attack
🕵️
Iran-Linked Botnet Exposed After Open Directory Leak Reveals 15-Node Relay Network
🕵️
Open VSX Extension Delivers RAT and Stealer via GitHub Downloader
🕵️
Researchers disclose vulnerabilities in IP KVMs from four manufacturers
🕵️
Horabot Returns in Mexico, Spreading via Phishing and Email Worm Attacks
🕵️
OpenWebUI Servers Targeted in Attacks Using AI Payloads to Steal Data
🕵️
Fake Tools and CDNs Power New “Vibe-Coded” Malware Campaign
🕵️
ConnectWise patches new flaw allowing ScreenConnect hijacking
🕵️
Average Number of Daily API Attacks Up 113% Annually - Infosecurity Magazine
🕵️
Hacker Conversations: Ben Harris, from Unintentional Young Hacker to Intentional Adult CEO
🕵️
CISO Whisperer Names 11 Vendors Leading the Shift from Tools to Outcomes at RSA Conference 2026
🕵️
Oasis Security Raises $120 Million for Agentic Access Management
🕵️
Our KnowBe4 Community Is One of Our Greatest Strengths
🕵️
New tools and guidance: Announcing Zero Trust for AI
🕵️
Securing the Enterprise AI Ecosystem with ServiceNow and Prisma AIRS
🕵️
App Stores Aren’t Actually Safe
🕵️
PC MLA says hackers accessed and shared intimate images on his devices
🌐
New ‘Perseus’ Android malware checks user notes for secrets
🌐
2025 Year in Review: Malicious, Infrastructure
🎙️
Smashing Security podcast #459: This clever scam nearly hijacked a tech CEO’s Apple ID
📡
IndonesianFoods Spam Campaign: 89 000 junk packages in npm
📡
How Ceros Gives Security Teams Visibility and Control in Claude Code
📡
Max severity Ubiquiti UniFi flaw may allow account takeover
📡
Consumer-focused privacy company Cloaked raises $375M as it expands to enterprise
📡
Copyright Lures Mask a Multi‑Stage PureLog Stealer Attack on Key Industries
📡
EDR killers explained: Beyond the drivers
📡
From Invitation to Infection: How SILENTCONNECT Delivers ScreenConnect
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-66376 Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability This type of vulnerability is a frequent attack vector …
KEV
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-20963 Microsoft SharePoint Deserialization of Untrusted Data Vulnerability This type of vulnerability is a frequent attack vector for mal…
KEV
🐛
Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE via Port 23
🐛
FortiClient Hit by Severe SQL Injection Vulnerability Enabling Database Intrusion
🐛
Researchers Disclose ‘RegPwn,’ a Windows Registry Weakness Allowing SYSTEM Access
🐛
New Kubernetes NFS CSI Vulnerability Enables Unauthorized Directory Deletion and Changes
🐛
Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS
🐛
CVE-2026-23241 audit: add missing syscalls to read class
🐛
CVE-2025-71239 audit: add fchmodat2() to change attributes class
🐛
Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit
🐛
Ubuntu Desktop Vulnerability Lets Attackers Escalate Privileges to Full Root Access
🐛
Critical Telnetd Vulnerability Enables Remote Code Execution Attacks
🐛
Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access
🐛
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors
🐛
Amazon threat intelligence teams identify Interlock ransomware campaign targeting enterprise firewalls
⚠️
Another Medicat Device Firm Hit
⚠️
AWS Bedrock AgentCore Sandbox Bypass Enables Stealthy C2 and Data Exfiltration
⚠️
Fake Telegram Download Site Delivers Stealthy In-Memory Malware Loader
⚠️
CISOs rethink their data protection strategies
⚠️
Aura - 903,080 breached accounts
⚠️
From Misconfigured Spring Boot Actuator to SharePoint Exfiltration: How Stolen Credentials Bypass MFA
⚠️
Cybersecurity and privacy priorities for 2026: The legal risk map
⚠️
ClickFix treibt neue Infostealer-Kampagnen an
⚠️
Can you prove the person on the other side is real?
⚠️
Researcher Discovers 4th WhatsApp View Once Bypass; Meta Won’t Patch
⚠️
ForceMemo Hijacks GitHub Accounts, Backdoors Python Repos
⚠️
Reco targets AI agent blind spots with new security capability
⚠️
Apple WebKit Security Flaw Exposes iOS and macOS Users to Content-Based Bypass Attacks
⚠️
Crypto e-commerce platform Bitrefill accuses North Korea of stealing 18,500 purchase records | The Record from Recorded Future News
⚠️
The Refund Fraud Economy: Exploiting Major Retailers and Payment Platforms
⚠️
New “Darksword” iOS exploit used in infostealer attack on iPhones
⚠️
‘DarkSword’ iOS Exploit Kit Used by State-Sponsored Hackers, Spyware Vendors
⚠️
Ransomware gang exploits Cisco flaw in zero-day attacks since January
⚠️
AI Reinforces Your Bias
⚠️
ConnectWise patches new flaw allowing ScreenConnect hijacking
⚠️
Shipping-Themed Phishing Scams Target the Middle East and Africa
⚠️
The Collapse of Predictive Security in the Age of Machine-Speed Attacks
⚠️
CISA orders feds to patch Zimbra XSS flaw exploited in attacks
KEV
⚠️
CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization
📋
Apple Debuts Background Security Improvements With Fresh WebKit Patches
📢
[Control Systems] Phoenix Contact Security Advisory (AV26-247)
📢
Apple security advisory (AV26-248)
📢
GNU security advisory (AV26-249)
📢
Mitel security advisory (AV26-250)
📢
VMware security advisory (AV26-252)
📢
Atlassian security advisory (AV26-251)
📢
Citrix security advisory (AV26-253)
📢
Roundcube security advisory (AV26-254)
📢
Jenkins security advisory (AV26-255)
📢
Google Chrome security advisory (AV26-256)
📢
ConnectWise security advisory (AV26-257)
🔥
Microsoft Teams-Based Vishing Attack Tricks Victims Into Quick Assist Takeover
🔥
LeakNet boosts ransomware with ClickFix lures, stealthy Deno loader
🔥
Less Lucrative Ransomware Market Makes Attackers Alter Methods
🔥
9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors
🔥
Iranian Hackers Likely Used Malware-Stolen Credentials in Stryker Breach
🔥
Robotic Surgery Giant Intuitive Discloses Cyberattack - SecurityWeek
🔥
Shadow AI Risk: How SaaS Apps Are Quietly Enabling Massive Breaches
🔥
Marquis says over 672,000 people had personal and financial data stolen in ransomware attack
🔥
Marquis: Ransomware gang stole data of 672K people in cyberattack
🔥
Aura confirms data breach exposing 900,000 marketing contacts
🕵️
News alert: GitGuardian study shows AI coding tools double leak rates as 29M credentials hit GitHub
🕵️
News alert: Orchid Security brings Zero-Trust to AI Agent identities, earns Gartner recognition
🕵️
Judicial Targets Hit by COVERT RAT via Court Docs and GitHub Payloads
🕵️
Boggy Serpens Hits Diplomats, Critical Infrastructure in Espionage Waves
🕵️
Vidar Stealer 2.0 Spreads via Fake Game Cheats Shared on GitHub and Reddit
🕵️
Language of the Board as CISO-Board Time Falls Short and CISOs Struggle with Risk - BSW #439
🕵️
Iran Cyber Ops Merge With PsyOps and EW Amid Escalating Conflict
🕵️
OpenAI Introduces GPT-5.4 Mini and Nano for Faster, Lightweight AI Performance
🕵️
BSI moniert Software-Sicherheit im Gesundheitswesen
🕵️
Meta’s AI Glasses and Privacy
🕵️
ISC Stormcast For Wednesday, March 18th, 2026 https://isc.sans.edu/podcastdetail/9854, (Wed, Mar 18th)
🕵️
Android OS-Level Attack Bypasses Mobile Payment Security - Infosecurity Magazine
🕵️
Hackers Target Cybersecurity Firm Outpost24 in 7-Stage Phish
🕵️
CursorJack’ Attack Path Exposes Code Execution Risk in AI Development - Infosecurity Magazine
🕵️
UIDAI Introduces Bug Bounty Program to Strengthen Aadhaar Defenses
🕵️
Scans for "adminer", (Wed, Mar 18th)
🕵️
FancyBear Server Leak Exposes Stolen Credentials, 2FA Secrets, NATO Targets
🕵️
Manifold Raises $8 Million for AI Detection and Response
🕵️
The Lost Art of BIA
🕵️
Russians caught stealing personal data from Ukrainians with new advanced iPhone hacking tools
🕵️
Virtual Summit Today: Supply Chain & Third-Party Risk Summit
🕵️
EU Sanctions Chinese, Iranian Firms Supporting Hacking Operations
🕵️
Cloud Security Startup Native Exits Stealth With $42 Million in Funding
🕵️
Observability for AI Systems: Strengthening visibility for proactive risk detection
🕵️
OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs
🕵️
Autonomous Offensive Security Firm XBOW Raises $120M at $1B+ Valuation
🕵️
Who Really Owns AI Decisions
🕵️
How NextWave’s Evolution Drives Shared Success
🎙️
Risky Business #829 -- Sneaky lobsters: Why AI is the new insider threat
📡
Weekly Threat Bulletin – March 18th, 2026
📡
Why East-West Visibility Matters for Grid Security
📡
Product Walkthrough: How Mesh CSMA Reveals and Breaks Attack Paths to Crown Jewels
📡
Claude Code Security and Magecart: Getting the Threat Model Right
📡
Nordstrom's email system abused to send crypto scams to customers
📡
FBI is buying location data to track US citizens, director confirms
📡
Proofpoint Pursues FedRAMP High Authorization Process for Collaboration Security
📡
The SOC Files: Time to “Sapecar”. Unpacking a new Horabot campaign in Mexico
🐛
CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths
KEV
🐛
CVE-2026-32775
🐛
CVE-2026-23941 Request smuggling via first-wins Content-Length parsing in inets httpd
🐛
CVE-2026-23943 Pre-auth SSH DoS via unbounded zlib inflate
🐛
CVE-2025-69647
🐛
CVE-2025-69648
🐛
CVE-2026-32249 NFA regex engine NULL pointer dereference affects Vim < 9.2.0137
🐛
CVE-2026-32776
🐛
CVE-2026-32778
🐛
CVE-2026-32777
🐛
CVE-2026-23942 SFTP root escape via component-agnostic prefix check in ssh_sftpd
🐛
CVE-2026-4111 Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive
🐛
CVE-2026-2673 OpenSSL TLS 1.3 server may choose unexpected key agreement group
🐛
CVE-2026-4105 Systemd: systemd: privilege escalation via improper access control in registermachine d-bus method
🐛
CVE-2026-23066 rxrpc: Fix recvmsg() unconditional requeue
🐛
CVE-2026-1703 Limited path traversal when installing wheel archives
🐛
CVE-2026-23069 vsock/virtio: fix potential underflow in virtio_transport_get_credit()
🐛
Angular XSS Vulnerability Threatens Thousands of Web Applications
🐛
CISA Flags Year-Old Wing FTP Vulnerability as Exploited
🐛
Nvidia NemoClaw promises to run OpenClaw agents securely
🐛
Apple pushes first Background Security Improvements update to fix WebKit flaw
🐛
ZDI-26-216: (Pwn2Own) QNAP TS-453E smbd domain_name Argument Injection Authentication Bypass Vulnerability
⚠️
GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos
⚠️
New CondiBot Variant and ‘Monaco’ Miner Target More Network Devices
⚠️
CISA Alerts Users to Exploited Chrome 0-Day Flaws
KEV
⚠️
Runtime: The new frontier of AI agent security
⚠️
WebFiling Flaw at UK Companies House Exposed Director Data for Months
⚠️
CISA Issues Alert on Wing FTP Server Vulnerability Used in Attacks
KEV
⚠️
Creating Better Security Guidance and Code with LLMs - Mark Curphey - ASW #374
⚠️
South Korean Police Accidentally Post Cryptocurrency Wallet Password
⚠️
Microsoft Launches AI-Driven Troubleshooting for Purview Data Lifecycle Tools
⚠️
AWS Bedrock’s ‘isolated’ sandbox comes with a DNS escape hatch
⚠️
GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos
⚠️
LeakNet ransomware uses ClickFix and Deno runtime for stealthy attacks
⚠️
CISA flags Wing FTP Server flaw as actively exploited in attacks
KEV
⚠️
174 Vulnerabilities Targeted by RondoDox Botnet
⚠️
Iranian Hackers Use Compromised Cameras for Regional Surveillance
⚠️
Microsoft stops force-installing the Microsoft 365 Copilot app
⚠️
Outdated OWASP Advice
⚠️
UK Companies House Exposed Details of Millions of Firms
⚠️
Tech Giants Invest $12.5 Million in Open Source Security
⚠️
AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE
⚠️
End / Collapse: New Code, New Risks
⚠️
Apple rolls out first ‘background security’ update for iPhones, iPads, and Macs to fix Safari bug
⚠️
Anton’s Vibe Coding Experience: A Reflection on Risk Decisions
⚠️
Malware Hiding on Steam
⚠️
LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
⚠️
Investing in the people shaping open source and securing the future together
⚠️
Get started with Elastic Security from your AI agent
📢
Windows 11 25H2/24H2 Update Addresses Bluetooth Device Visibility Issues
📢
Spring security advisory (AV26-245)
📢
Stryker says it’s restoring systems after pro-Iran hackers wiped thousands of employee devices
📢
GitHub security advisory (AV26-246)
🔥
Weekly Update 495
🔥
Stryker Targeted by Large-Scale Wiper Attack, Tens of Thousands of Devices Lost
🔥
Hackers Abuse Trusted Websites in New Attacks on Microsoft Teams Users
🔥
Payload ransomware hits Windows and ESXi with Babuk-style encryption
🔥
AI, APIs and DDoS Collide in New Era of Coordinated Cyberattacks
🔥
Google Warns Ransomware Groups Shift to Data Theft as Profits Decline
🔥
Robotic Surgery Giant Intuitive Discloses Cyberattack
🔥
LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader
🔥
Europe sanctions Chinese and Iranian firms for cyberattacks
🕵️
ISC Stormcast For Tuesday, March 17th, 2026 https://isc.sans.edu/podcastdetail/9852, (Tue, Mar 17th)
🕵️
LiveChat Support Tools Abused in SaaS Phishing Scheme
🕵️
Malicious NPM Packages Spread PylangGhost RAT in Supply Chain Attack
🕵️
Researchers Uncover Ways to Decrypt Palo Alto Cortex XDR BIOC Rules for Evasion
🕵️
Hackers Leverage Safe Links and URL Rewriting to Evade Detection
🕵️
What is Integrated Cloud Email Security (ICES) and Why do you Need It?
🕵️
Packagist Themes Deliver Trojanized jQuery in OphimCMS Supply Chain Attack
🕵️
Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malware
🕵️
Glassworm Malware Infects Popular React Native npm Packages
🕵️
Microsoft Issues Emergency Patch for Critical Windows 11 RRAS Vulnerabilities
🕵️
IPv4 Mapped IPv6 Addresses, (Tue, Mar 17th)
🕵️
Tracebit Raises $20M for Cloud-Native Deception Technology
🕵️
Microsoft shares fix for Windows C: drive access issues on Samsung PCs
🕵️
Google, Meta, Microsoft Among Signatories of Pact to Combat Scams
🕵️
Security Flaw in AWS Bedrock Code Interpreter Raises Alarms - Infosecurity Magazine
🕵️
Cyber-Attacken fluten Eon-Netz: Angriffe verzehnfacht
🕵️
UK Agency Exposed Corporate Executive Data - BankInfoSecurity
🕵️
GitGuardian Reports an 81% Surge of AI-Service Leaks as 29M Secrets Hit Public GitHub
🕵️
Orchid Security Recognized by Gartner® as a Representative Vendor of Guardian Agents
🕵️
Surf AI Raises $57 Million for Agentic Security Operations Platform
🕵️
CyberheistNews Vol 16 #11 9 Must-Know Best Practices for Email Security
🕵️
We don't need to hack your AI Agent to hack your AI Agent - SRLabs Research
🕵️
We don't need to hack your AI Agent to hack your AI Agent - SRLabs Research
🕵️
Switzerland built an alternative to BGP. Nobody noticed
🕵️
Switzerland built an alternative to BGP. Nobody noticed
🕵️
From Windows to macOS: ClickFix attacks shift tactics with ChatGPT-based lures
🕵️
New font-rendering trick hides malicious commands from AI tools
🕵️
From Phishing to AI Agents: Can We Design for Digital Mindfulness?
🕵️
So Many AI Attacks, It Made Quantum Seem Easy
🕵️
AI Spicy Mode, Steam, Glassworm, Samsung, Stryker, Waymo, Cole Porter, and More - SWN #564
🌐
AI is Everywhere, But CISOs are Still Securing It with Yesterday's Skills and Tools, Study Finds
🌐
GlassWorm malware hits 400+ code repos on GitHub, npm, VSCode, OpenVSX
📡
Microsoft: Enabling Teams Meeting add-in breaks Outlook Classic
📡
New Windows 11 hotpatch fixes Bluetooth device visibility issue
📡
New font-rendering trick hides malicious commands from AI tools
📡
Top 5 Things CISOs Need to Do Today to Secure AI Agents
📡
Researchers disclose vulnerabilities in IP KVMs from four manufacturers
📡
How World ID wants to put a unique human identity on every AI agent
📡
AWS completes the second GDV community audit with participant insurers in Germany
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.  CVE-2025-47813 Wing FTP Server Information Disclosure Vulnerability This type of vulnerability is a frequent attack vector for malicious cyb…
KEV
🐛
FortiGate Firewall Exploitation Fuels Network Breaches in New Attack Wave
🐛
Nine critical vulnerabilities in Linux AppArmor put over 12M enterprise systems at risk
🐛
Chromium: CVE-2026-3909 Out of bounds write in Skia
🐛
Ransomware Under Pressure: Tactics, Techniques, and Procedures in a Shifting Threat Landscape
🐛
ZDI-26-215: KeePassXC OpenSSL Configuration Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
🐛
ZDI-26-214: GIMP HDR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-213: GIMP LBM File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-212: Schneider Electric EcoStruxure Data Center Expert Hard-coded Password Remote Code Execution Vulnerability
🐛
ZDI-26-211: Delta Electronics ASDA-Soft PAR File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-210: (Pwn2Own) Samsung Galaxy S25 Samsung Members Security Feature Bypass Vulnerability
🐛
ZDI-26-209: (Pwn2Own) Samsung Galaxy S25 Samsung Members Open Redirect Security Bypass Vulnerability
🐛
ZDI-26-208: (Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Integer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-207: (Pwn2Own) Canon imageCLASS MF654Cdw dtdc_addr_importSub Stack-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-206: (Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
🐛
ZDI-26-205: (Pwn2Own) Canon imageCLASS MF654Cdw PJCC Request Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-204: (Pwn2Own) Canon imageCLASS MF654Cdw XPS Parser Stack-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-203: (Pwn2Own) Canon imageCLASS MF654Cdw XML SOAP Request Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-202: (Pwn2Own) QNAP TS-453E Hyper Data Protector Plugin query_original_file_size SQL Injection Remote Code Execution Vulnerability
🐛
ZDI-26-201: (Pwn2Own) QNAP TS-453E Hyper Data Protector Plugin Hard-Coded Credentials Authentication Bypass Vulnerability
🐛
ZDI-26-200: (Pwn2Own) QNAP TS-453E nvrlog_event_add msg SQL Injection Remote Code Execution Vulnerability
🐛
ZDI-26-199: (Pwn2Own) QNAP TS-453E conn_log_tool Format String Remote Code Execution Vulnerability
🐛
ZDI-26-198: (Pwn2Own) QNAP TS-453E malware_remover Code Injection Remote Code Execution Vulnerability
🐛
ZDI-26-197: (Pwn2Own) ChargePoint Home Flex revssh Service Command Injection Remote Code Execution Vulnerability
🐛
ZDI-26-196: (Pwn2Own) ChargePoint Home Flex OCPP getpreq Stack-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-195: (Pwn2Own) ChargePoint Home Flex Inclusion of Sensitive Information in Source Code Information Disclosure Vulnerability
🐛
ZDI-26-194: Microsoft Exchange InterceptorSmtpAgent Improper Input Validation Security Feature Bypass Vulnerability
🐛
ZDI-26-193: (Pwn2Own) Linux Kernel nf_tables_newset Out-Of-Bounds Write Information Disclosure Vulnerability
🐛
ZDI-26-192: Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerability
🐛
ZDI-26-191: (Pwn2Own) Linux Kernel nf_tables Use-After-Free Privilege Escalation Vulnerability
🐛
ZDI-26-190: (Pwn2Own) VMware Workstation PVSCSI Heap-based Buffer Overflow Local Privilege Escalation Vulnerability
🐛
ZDI-26-189: (Pwn2Own) VMware ESXi VMXNET3 Integer Overflow Local Privilege Escalation Vulnerability
🐛
ZDI-26-188: (Pwn2Own) VMware ESXi VMCI Integer Underflow Local Privilege Escalation Vulnerability
🐛
ZDI-26-187: (Pwn2Own) Synology DiskStation Manager Netatalk Library Buffer Overflow Remote Code Execution Vulnerability
⚠️
Notorious Hacker Group "The Comm," Operation Synergia Takedown, Stryker Cyberattack Update & More
⚠️
Microsoft Issues Out-of-Band Patch for Critical Windows 11 RRAS RCE Flaws
⚠️
Attackers Exploit Teams, Quick Assist to Deploy Stealthy A0Backdoor
⚠️
ClickFix techniques evolve in new infostealer campaigns
⚠️
What it takes to win that CSO role
⚠️
AI Governance, new book (Code War) from Allie Mellen, and the weekly news! - ESW #450
⚠️
DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage
⚠️
MEA Shipment Phishing Scams Surge, Stealing Banking Data in Real Time
⚠️
Open VSX extensions hijacked: GlassWorm malware spreads via dependency abuse
⚠️
ForceMemo: Python Repositories Compromised in GlassWorm Aftermath
⚠️
Betterleaks Launches as Open-Source Tool for Scanning Files, Directories, and Git Repositories
⚠️
RondoDox Botnet Scales Up, Exploiting 174 Vulnerabilities via Residential IPs
⚠️
Why Security Validation Is Becoming Agentic
⚠️
ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers
⚠️
Chrome 146 Update Patches Two Exploited Zero-Days - SecurityWeek
⚠️
Handala Hackers Exploit RDP and NetBird in Coordinated Wiper Attacks
⚠️
Why Cyber Attribution Gets Complicated
⚠️
⚡ Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More
⚠️
CISA flags Wing FTP Server flaw as actively exploited in attacks
KEV
⚠️
TrendAI™ Supports Global Law Enforcement Efforts
⚠️
VU#624941: LibreChat RAG API contains a log-injection vulnerability
📢
Dell security advisory (AV26-238)
📢
IBM security advisory (AV26-237)
📢
Ubuntu security advisory (AV26-239)
📢
Google Chrome security advisory (AV26-240)
📢
Red Hat security advisory (AV26-242)
📢
[Control systems] CISA ICS security advisories (AV26–241)
📢
Microsoft Edge security advisory (AV26-243)
📢
HPE security advisory (AV26-244)
🔥
OpenClaw AI Agents Vulnerable to Indirect Prompt Injection, Causing Data Leaks
🔥
IBM Discovers ‘Slopoly’ AI-Generated Malware Linked to Hive0163 Ransomware
🔥
Web Shells, Tunnels, and Ransomware: Dissecting a Warlock Attack
🔥
Google Unveils Android 17 Advanced Protection Mode to Stop Malicious Services
🔥
Google Looker Studio Vulnerabilities Allow Attackers to Exfiltrate Data from Google Services
🔥
China-Linked Hackers Hit Asian Militaries in Patient Espionage Operation
🔥
Cyberattack Hits Poland’s Nuclear Research Center
🔥
CamelClone Uses Public File-Sharing Sites in Government Cyberattacks
🔥
Poland's nuclear research centre targeted by cyberattack
🔥
Security Firm Executive Targeted in Sophisticated Phishing Attack
🔥
Stryker attack wiped tens of thousands of devices, no malware needed
🔥
2025 Identity Threat Landscape Report: Inside the Infostealer Economy: Credential Threats in 2025
🕵️
ISC Stormcast For Monday, March 16th, 2026 https://isc.sans.edu/podcastdetail/9850, (Mon, Mar 16th)
🕵️
Meta Permanently Disables End-to-End Encryption for Instagram DMs
🕵️
Konni Hijacks KakaoTalk Accounts in Spear-Phishing Malware Campaign
🕵️
ACRStealer Variant Deploys Syscall Evasion, TLS C2, Secondary Payloads
🕵️
Hacking Attempt Reported at Poland’s Nuclear Research Center
🕵️
Creating Noise: The Emerging Obfuscation Technique Designed to Evade Email Security NLP Detection Capabilities
🕵️
Fake FileZilla Downloads Spread RAT via Stealthy Multi-Stage Loader
🕵️
Possible New Result in Quantum Factorization
🕵️
Fake enterprise VPN sites used to steal company credentials
🕵️
Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation
🕵️
Threat Actor Targeting VPN Users in New Credential Theft Campaign
🕵️
Mentorship Monday - Discussions for career and learning!
🕵️
AppsFlyer Web SDK hijacked to spread crypto-stealing JavaScript code
🕵️
Oracle EBS Hack: Only 4 Corporate Giants Still Silent on Potential Impact
🕵️
Help on the line: How a Microsoft Teams support call led to compromise
🕵️
New Microsoft Purview innovations for Fabric to safely accelerate your AI transformation
🕵️
AI Hallucinations Become Security’s Problem
🌐
Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse
🌐
Free real estate: GoPix, the banking Trojan living off your memory
📡
Microsoft pulls Samsung app blocking Windows C: drive from Store
📡
/proxy/ URL scans with IP addresses, (Mon, Mar 16th)
📡
Shadow AI is everywhere. Here’s how to find and secure it.
📡
When AI hallucinations turn fatal: how to stay grounded in reality | Kaspersky official blog
📡
Microsoft Exchange Online outage blocks access to mailboxes
📡
UK’s Companies House confirms security flaw exposed business data
📡
Free parking in Russia after Distributed Denial-of-Service attack knocks city’s parking system offline
📡
Securing Autonomous AI Agents with TrendAI & NVIDIA OpenShell
⚠️
Divine Skins - 105,814 breached accounts
⚠️
How do I Send a Secure Email in Outlook?
⚠️
Betterleaks, a new open-source secrets scanner to replace Gitleaks
🔥
Baydöner - 1,266,822 breached accounts
🔥
Loblaw Data Breach Impacts Customer Information
📡
Wiz investor unpacks Google’s $32B acquisition
📡
OpenAI says ChatGPT ads are not rolling out globally for now
🐛
CVE-2026-31802 node-tar Symlink Path Traversal via Drive-Relative Linkpath
🐛
CVE-2026-3381 Compress::Raw::Zlib versions through 2.219 for Perl use potentially insecure versions of zlib
🐛
CVE-2026-27171 zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.
⚠️
Global Authorities Take Down 45,000 Malicious IPs Used in Ransomware Campaigns
⚠️
Critical HPE AOS-CX Vulnerability Allows Admin Password Resets
⚠️
Hidden Risk: Windows LNK & Archive Attack Surface
⚠️
CrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Root
⚠️
CrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Root
⚠️
OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration
⚠️
Microsoft releases Windows 11 OOB hotpatch to fix RRAS RCE flaw
⚠️
Deploy AWS applications and access AWS accounts across multiple Regions with IAM Identity Center
🔥
Received Someone Else’s Confidential Email? Here’s What To Do.
🕵️
GlassWorm Spreads via 72 Malicious Open VSX Extensions Hidden in Transitive Dependencies
🕵️
GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers
🕵️
Upcoming Speaking Engagements
🕵️
MY TAKE: The AI magic is back — whether it endured depends on Amazon’s next moves
🎙️
AI Anxiety: Cybersecurity Today with Special Guest Krish Banerjee, Managing Director (Partner) & Canada Lead - Data & AI - Accenture
📡
SmartApeSG campaign uses ClickFix page to push Remcos RAT, (Sat, Mar 14th)
📡
AppsFlyer Web SDK used to spread crypto stealer JavaScript code
🚨
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-3909 Google Skia Out-of-Bounds Write Vulnerability CVE-2026-3910 Google Chromium V8 Unspecified Vulnerability These types of vulnerabil…
KEV
🐛
OpenSSH GSSAPI Flaw Can Be Exploited to Crash SSH Child Processes
🐛
Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution
🐛
Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8
KEV
🐛
CVE-2026-3904
🐛
CVE-2026-3805 use after free in SMB connection reuse
🐛
Two Newly Discovered Chrome Zero-Days Exploited in the Wild to Run Malicious Code
KEV
🐛
Veeam warns admins to patch now as critical RCE flaws hit Backup & Replication
KEV
🐛
New Critical AdGuard Home Flaw Lets Attackers Bypass Authentication
🐛
Google warns of two actively exploited Chrome zero days
KEV
🐛
Chromium: CVE-2026-3942 Incorrect security UI in PictureInPicture
🐛
Chromium: CVE-2026-3931 Heap buffer overflow in Skia
🐛
Chromium: CVE-2026-3941 Insufficient policy enforcement in DevTools
🐛
Chromium: CVE-2026-3940 Insufficient policy enforcement in DevTools
🐛
Chromium: CVE-2026-3939 Use after free in WebView
🐛
Chromium: CVE-2026-3938 Insufficient policy enforcement in Clipboard
🐛
Chromium: CVE-2026-3937 Incorrect security UI in Downloads
🐛
Chromium: CVE-2026-3935 Incorrect security UI in WebAppInstalls
🐛
Chromium: CVE-2026-3934 Insufficient policy enforcement in ChromeDriver
🐛
Chromium: CVE-2026-3932 Insufficient policy enforcement in PDF
🐛
Chromium: CVE-2026-3925 Incorrect security UI in LookalikeChecks
🐛
Chromium: CVE-2026-3915 Heap buffer overflow in WebML
🐛
Chromium: CVE-2026-3936 Use after free in WebView
🐛
Chromium: CVE-2026-3929 Side-channel information leakage in ResourceTiming
🐛
Chromium: CVE-2026-3928 Insufficient policy enforcement in Extensions
🐛
Chromium: CVE-2026-3927 Incorrect security UI in PictureInPicture
🐛
Chromium: CVE-2026-3926 Out of bounds read in V8
🐛
Chromium: CVE-2026-3924 Use after free in WindowDialog
🐛
Chromium: CVE-2026-3923 Use after free in WebMIDI
🐛
Chromium: CVE-2026-3922 Use after free in MediaStream
🐛
Chromium: CVE-2026-3921 Use after free in TextEncoding
🐛
Chromium: CVE-2026-3920 Out of bounds memory access in WebML
🐛
Chromium: CVE-2026-3919 Use after free in Extensions
🐛
Chromium: CVE-2026-3918 Use after free in WebMCP
🐛
Chromium: CVE-2026-3917 Use after free in Agents
🐛
Chromium: CVE-2026-3916 Out of bounds read in Web Speech
🐛
Chromium: CVE-2026-3914 Integer overflow in WebML
🐛
Chromium: CVE-2026-3913 Heap buffer overflow in WebML
🐛
CVE-2026-0385 Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
🐛
Chromium: CVE-2026-3930 Unsafe navigation in Navigation
🐛
Chromium: CVE-2026-3910 Inappropriate implementation in V8
⚠️
Telus Digital hit with massive data breach
⚠️
Starbucks discloses data breach affecting hundreds of employees
⚠️
Google fixes two new Chrome zero-days exploited in attacks
⚠️
Authorities Disrupt SocksEscort Proxy Service Powered by AVrecon Botnet
⚠️
Chrome 146 Update Patches Two Exploited Zero-Days
⚠️
Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation
⚠️
Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries
⚠️
Authorities Shut Down Proxy Service Linked to Malware Campaign Targeting Thousands of Users
⚠️
Starbucks Data Breach Exposes Personal Data of Hundreds of Users
⚠️
Storm-2561 Uses SEO Poisoning, Fake Signed VPN Apps to Steal Enterprise Credentials
⚠️
Iran War Bait Fuels TA453, TA473 Phishing Campaigns
⚠️
Apple Releases Emergency iOS 15.8.7 Update to Block ‘Coruna’ Exploit Kit
⚠️
Critical CrackArmor Vulnerabilities Expose 12.6 Million Linux Servers to Full Root Takeover
⚠️
Hybrid resilience: Designing incident response across on-prem, cloud and SaaS without losing your mind
⚠️
Storm-2561 targets enterprise VPN users with SEO poisoning, fake clients
⚠️
The cyber perimeter was never dead. We just abandoned it.
⚠️
Police sinkholes 45,000 IP addresses in cybercrime crackdown
⚠️
AI May Speed Zero-Day Discovery
⚠️
In Other News: N8n Flaw Exploited, Slopoly Malware, Interpol Cybercrime Crackdown
⚠️
Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials
⚠️
INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
⚠️
Cyber criminals too are working from home… your home
⚠️
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
📋
Microsoft: Windows 11 users can't access C: drive on some Samsung PCs
📢
Google Chrome security advisory (AV26-235)
📢
[Control systems] ABB security advisory (AV26-236)
🔥
AI Agent Hacks McKinsey Chatbot in 2 Hours
🔥
Fileless Remcos RAT Attack Uses JavaScript and PowerShell to Slip Past Detection
🔥
A React-based phishing page with credential exfiltration via EmailJS, (Fri, Mar 13th)
🔥
PsExec and Renamed Backup Tools Enabled Data Theft Before INC Ransomware Attack
🔥
Six Packagist Packages Linked to Trojanized jQuery Campaign
🔥
Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War
🔥
Starbucks Data Breach Impacts Employees
🔥
Poland's nuclear research centre targeted by cyberattack
🔥
Exposed: Bank Leak, Copilot Zero-Click, AI Agent Hijacks, Stryker Wipe & Josh Marpet - SWN #563
🕵️
ISC Stormcast For Friday, March 13th, 2026 https://isc.sans.edu/podcastdetail/9848, (Fri, Mar 13th)
🕵️
Off-Topic Friday
🕵️
Microsoft Copilot Email and Teams Summarization Flaw Opens Door to Phishing Attacks
🕵️
Academia and the “AI Brain Drain”
🕵️
Bold Security Emerges From Stealth With $40 Million in Funding
🕵️
Google Paid Out $17 Million in Bug Bounty Rewards in 2025
🕵️
Iran-Linked Hacker Attack on Stryker Disrupted Manufacturing and Shipping
🕵️
Onyx Security Launches With $40 Million in Funding
🕵️
Email DLP: Everything You Need to Know
🕵️
AI-HealthTech Innovator Humata Health Partners with AccuKnox for Zero Trust CNAPP
🕵️
Fake enterprise VPN downloads used to steal company credentials
🕵️
45,000 malicious IP addresses taken down in international cyber operation
🕵️
Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware
🕵️
Supply-chain attack using invisible code hits GitHub and other repositories
🕵️
Friday Squid Blogging: Increased Squid Population in the Falklands
🕵️
Anthropic Refused Pentagon AI Request
🕵️
CyberRisk TV Live Coverage from RSAC 2026 - Day 4
🕵️
CyberRisk TV Live Coverage from RSAC 2026 - Day 3
🕵️
CyberRisk TV Live Coverage from RSAC 2026 - Day 2
🕵️
CyberRisk TV Live Coverage from RSAC 2026 - Day 1
🕵️
Risky Biz Soap Box: It took a decade, but allowlisting is cool again
🌐
Investigating a New Click-Fix Variant
🌐
The FBI is investigating malware hidden inside games hosted on Steam
🌐
FBI seeks victims of Steam games used to spread malware
📡
From VMware to what’s next: Protecting data during hypervisor migration
📡
Microsoft investigates classic Outlook sync and connection issues
📡
Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026
📡
Face value: What it takes to fool facial recognition
📡
Managing Elastic Security Detection Rules with Terraform
🐛
CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed
KEV
🐛
“Zombie ZIP”: Neue Angriffstechnik täuscht Virenscanner
🐛
CVE-2026-25679 Incorrect parsing of IPv6 host literals in net/url
🐛
CVE-2026-23868
🐛
CVE-2026-3783 token leak with redirect and netrc
🐛
CVE-2026-23239 espintcp: Fix race condition in espintcp_close()
🐛
CVE-2026-23240 tls: Fix race condition in tls_sw_cancel_work_tx()
🐛
CVE-2026-1965 bad reuse of HTTP Negotiate connection
🐛
CVE-2026-3784 wrong proxy connection reuse with credentials
🐛
Splunk RCE Vulnerability Exposes Systems to Arbitrary Shell Command Execution by Attackers
🐛
Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit
🐛
Palo Alto Cortex XDR Broker Vulnerability Exposes Systems to Sensitive Information Theft and Modification
🐛
CVE-2026-26133 M365 Copilot Information Disclosure Vulnerability
🐛
Looking at the SmarterMail API Vulnerability CVE-2026-24423
🐛
VU#665416: SGLang (sglang) is vulnerable to code execution attacks via unsafe pickle deserialization
⚠️
Chrome Update Addresses 29 Vulnerabilities, Mitigating Remote Code Execution Threats
⚠️
Cisco IOS XR Vulnerability Exposes Systems to Root Command Execution by Attackers
⚠️
AI use is changing how much companies pay for cyber insurance
⚠️
Splunk, Zoom Patch Severe Vulnerabilities
⚠️
4,000+ Routers Compromised by KadNap Malware Exploiting Vulnerabilities
⚠️
New ClickFix Attacks Target macOS Users with MacSync Infostealer
⚠️
Hackers Exploit Remote Management Tools to Gain Initial Access to Corporate Networks
⚠️
Hackers Exploit CloudFlare Anti-Security to Steal Microsoft 365 Login Credentials
⚠️
North Korean fake IT worker tradecraft exposed
⚠️
CISA orders feds to patch n8n RCE flaw exploited in attacks
⚠️
Apple patches older iPhones and iPads against Coruna exploits
⚠️
How Do I Send a Secure Email in Outlook?
⚠️
Apple Updates Legacy iOS Versions to Patch Coruna Exploits
⚠️
Google paid $17.1 million for vulnerability reports in 2025
⚠️
A Nerd's Life: Weeks of Firmware Teardown to Prove We Were Right
⚠️
US disrupts SocksEscort proxy network powered by Linux malware
⚠️
Law enforcement shuts down botnet made of tens of thousands of hacked routers
⚠️
Veeam warns of critical flaws exposing backup servers to RCE attacks
⚠️
Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays
⚠️
Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks
⚠️
Vulnerability Mis-Management - PSW #917
⚠️
Fraudsters are using public planning records to target permit applicants
⚠️
VU#907705: Graphql-upload-minimal has a prototype pollution vulnerability.
📢
Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets
📢
Splunk security advisory (AV26-227)
📢
Palo Alto Networks security advisory (AV26-228)
📢
Veeam security advisory (AV26-229)
📢
Zoom security advisory (AV26-231)
📢
GitHub security advisory (AV26-230)
📢
[Control systems] ABB security advisory (AV26-232)
📢
Apple security advisory (AV26-233)
📢
Medical giant Stryker crippled after Iranian hackers remotely wipe computers
📢
HPE security advisory (AV26-234)
📢
iPhones and iPads Approved for NATO Classified Data
📢
FBI: Phishing Attacks Are Impersonating City and County Officials
📢
Aruba Switch Auth Bypass Risk
📢
How to manage the lifecycle of Amazon Machine Images using AMI Lineage for AWS
🔥
Stryker Faces Cyber Attack as Hackers Report System Breach and Device Destruction
🔥
Ericsson US Hit by Cyber Attack, Hackers Steal Personal Data of Employees and Customers
🔥
US charges another ransomware negotiator linked to BlackCat attacks
🔥
Polyfill Supply Chain Attack Impacting 100k Sites Linked to North Korea
🔥
Attackers Don't Just Send Phishing Emails. They Weaponize Your SOC's Workload
🔥
PhantomRaven returns to npm with 88 bad packages
🔥
INC Ransomware Group Holds Healthcare Hostage in Oceania
🔥
France's Cybersecurity Agency Reports Ransomware Attack Drop in 2025 - Infosecurity Magazine
🔥
AI-Driven Phishing Attacks Bypass Email Filters, Land in Inboxes
🔥
States Can't Handle Nation-State Cyber Attacks
🔥
Telus Digital confirms breach after hacker claims 1 petabyte data theft
🔥
ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More
🔥
AI-generated Slopoly malware used in Interlock ransomware attack
🔥
England Hockey investigating ransomware data breach
🔥
Canadian retail giant Loblaw notifies customers of data breach
🕵️
When your IoT Device Logs in as Admin, It&#x3f;s too Late&#x21; &#x5b;Guest Diary&#x5d;, (Wed, Mar 11th)
🕵️
ISC Stormcast For Thursday, March 12th, 2026 https://isc.sans.edu/podcastdetail/9846, (Thu, Mar 12th)
🕵️
Google Finalizes $32 Billion Deal to Acquire Wiz, Strengthening Cloud Security
🕵️
Meta Unveils New Anti-Scam Tools for WhatsApp, Facebook, and Messenger
🕵️
Iran‑Linked Hackers Tap Criminal Ecosystem to Bolster State Cyber Ops
🕵️
CastleRAT Attack Leverages Deno JavaScript Runtime to Bypass Enterprise Defenses
🕵️
The Human IOC: Why Security Professionals Struggle with Social Vetting
🕵️
Cisco Patches High-Severity IOS XR Vulnerabilities
🕵️
Critical N8n Vulnerabilities Allowed Server Takeover
🕵️
Critical flaw in HPE Aruba CX switches lets attackers seize admin control without credentials | CSO Online
🕵️
SQLi flaw in Elementor Ally plugin impacts 250k+ WordPress sites
🕵️
Only 24% Of organizations Test Identity Recovery Every Six Months - Infosecurity Magazine
🕵️
Ally WordPress Plugin Flaw Exposes Over 200,000 Websites to Attacks
🕵️
Medtech giant Stryker offline after Iran-linked wiper malware attack
🕵️
Meta Launches New Protection Tools as It Helps Disrupt Scam Centers
🕵️
Detecting and analyzing prompt abuse in AI tools
🕵️
Exposing the Kroll Crypto Wallet Scam
🕵️
From transparency to action: What the latest Microsoft email security benchmark reveals
🕵️
Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft
🕵️
AMOS and Amatera disguised as AI agents | Kaspersky official blog
🎙️
Smashing Security podcast #458: How not to steal $46 million from the US government
📡
Cyber Security Today Special Report: Attack from Iran
📡
Your Signal account is safe – unless you fall for this trick
📡
Going the Extra Mile: Travel Rewards Turn into Underground Currency.
📡
How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs
📡
Cyber fallout from the Iran war: What to have on your radar
📡
February 2026 CVE Landscape: 13 Critical Vulnerabilities Mark 43% Drop from January
📡
Announcing Cloudflare Account Abuse Protection: prevent fraudulent attacks from bots and humans
🚨
Critical flaw in HPE Aruba CX switches lets attackers seize admin control without credentialsHPE Aruba Networking has released patches for five vulnerabilities in its AOS-CX switch software, the most severe of which could let a remote attacker take administrative control of enterprise network switches without any credentials. The critical flaw, CVE-2026-23813, scored 9.8…
KEV
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-68613 n8n Improper Control of Dynamically-Managed Code Resources Vulnerability This type of vulnerability is a frequent attack vector for…
KEV
🐛
Fake Claude Code Installs, Arpa Phishing, Iranian and Russian Teams Mount Cyber Retaliation
🐛
Microsoft SQL Server Zero-Day Exposes Privilege Escalation Risk for Users
🐛
Fortinet FortiManager fgtupdates Flaw Enables Attackers to Execute Malicious Commands Remotely
🐛
Microsoft .NET 0-Day Flaw Opens Doors for Denial of Service Attacks
🐛
CVE-2026-26017 CoreDNS ACL Bypass
🐛
CVE-2026-26018 CoreDNS Loop Detection Denial of Service Vulnerability
🐛
CVE-2026-3731 libssh SFTP Extension Name sftp.c sftp_extensions_get_data out-of-bounds
🐛
CVE-2025-69646 Binutils objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF debug_rnglists data. A logic error in the handling of the debug_rnglists header can cause objdump to repeatedly print the same warning message and fail to terminate, resulting in an unbounded logging loop until the process is interrupted. The issue was observed in binutils 2.44. A local attacker can exploit this vulnerability by supplying a malicious input file, leading to excessive CPU and I/O usage and preventing completion of the objdump analysis.
🐛
CVE-2025-69652 GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an abort (SIGABRT) when processing a crafted ELF binary with malformed DWARF abbrev or debug information. Due to incomplete state cleanup in process_debug_info(), an invalid debug_info_p state may propagate into DWARF attribute parsing routines. When certain malformed attributes result in an unexpected data length of zero, byte_get_little_endian() triggers a fatal abort. No evidence of memory corruption or code execution was observed; the impact is limited to denial of service.
🐛
CVE-2025-69645 Binutils objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF debug information. A logic error in the handling of DWARF compilation units can result in an invalid offset_size value being used inside byte_get_little_endian, leading to an abort (SIGABRT). The issue was observed in binutils 2.44. A local attacker can trigger the crash by supplying a malicious input file.
🐛
CVE-2025-69649 GNU Binutils thru 2.46 readelf contains a null pointer dereference vulnerability when processing a crafted ELF binary with malformed header fields. During relocation processing, an invalid or null section pointer may be passed into display_relocations(), resulting in a segmentation fault (SIGSEGV) and abrupt termination. No evidence of memory corruption beyond the null pointer dereference, nor any possibility of code execution, was observed.
🐛
CVE-2026-27142 URLs in meta content attribute actions are not escaped in html/template
🐛
CVE-2026-3713 pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow
🐛
CVE-2026-27139 FileInfo can escape from a Root in os
🐛
CVE-2024-14027 xattr: switch to CLASS(fd)
🐛
CVE-2026-29786 node-tar: Hardlink Path Traversal via Drive-Relative Linkpath
🐛
CVE-2025-69650 GNU Binutils thru 2.46 readelf contains a double free vulnerability when processing a crafted ELF binary with malformed relocation data. During GOT relocation handling, dump_relocations may return early without initializing the all_relocations array. As a result, process_got_section_contents() may pass an uninitialized r_symbol pointer to free(), leading to a double free and terminating the program with SIGABRT. No evidence of exploitable memory corruption or code execution was observed; the impact is limited to denial of service.
🐛
CVE-2025-69651 GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an invalid pointer free when processing a crafted ELF binary with malformed relocation or symbol data. If dump_relocations returns early due to parsing errors, the internal all_relocations array may remain partially uninitialized. Later, process_got_section_contents() may attempt to free an invalid r_symbol pointer, triggering memory corruption checks in glibc and causing the program to terminate with SIGABRT. No evidence of further memory corruption or code execution was observed; the impact is limited to denial of service.
🐛
CVE-2025-69644 An issue was discovered in Binutils before 2.46. The objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed debug information. A logic flaw in the handling of DWARF location list headers can cause objdump to enter an unbounded loop and produce endless output until manually interrupted. This issue affects versions prior to the upstream fix and allows a local attacker to cause excessive resource consumption by supplying a malicious input file.
🐛
CVE-2026-27137 Incorrect enforcement of email constraints in crypto/x509
🐛
CVE-2026-27138 Panic in name constraint checking for malformed certificates in crypto/x509
🐛
Microsoft Active Directory Flaw Allows Attackers to Escalate Privileges
🐛
Analyzing "Zombie Zip" Files (CVE-2026-0866), (Wed, Mar 11th)
🐛
Critical Vulnerability in Microsoft Office Allows Malicious Code to Run Remotely
🐛
Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices
🐛
Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials
🐛
PageJack in Action: CVE-2022-0995 exploit
🐛
Chromium: CVE-2026-3537 Object lifecycle issue in PowerVR
🐛
CISA warns of actively exploited Ivanti EPM and Cisco SD-WAN flaws
KEV
🐛
Six mistakes in ERC-4337 smart accounts
⚠️
Microsoft Patch Tuesday, March 2026 Edition
⚠️
Jack & Jill went up the hill — and an AI tried to hack them
⚠️
Microsoft Fixes 79 Vulnerabilities in March 2026 Patch Tuesday, Mitigating Two Exploited 0-Days
⚠️
Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets
⚠️
HR Departments Targeted by Multi-Layered BlackSanta EDR Killer Malware
⚠️
12 ways attackers abuse cloud services to hack your enterprise
⚠️
UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours
⚠️
Being Exploitable While Your Risk Tolerance Changes and You Unblock Innovation - BSW #438
⚠️
Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days
⚠️
A 5-step approach to taming shadow AI
⚠️
Why zero trust breaks down in IoT and OT environments
⚠️
Did cybersecurity recently have its Gatling gun moment?
⚠️
Salesforce confirms ShinyHunters exploited Experience Cloud sites | news | SC Media
⚠️
Overly permissive ‘guest’ settings put Salesforce customers at risk
⚠️
FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
⚠️
Fortinet, Ivanti, Intel Patch High-Severity Vulnerabilities
⚠️
How to 10x Your Vulnerability Management Program in the Agentic Era
⚠️
CISA: Recently patched Ivanti EPM flaw now actively exploited
KEV
⚠️
What Boards Must Demand in the Age of AI-Automated Exploitation
⚠️
AWS expands Security Hub for multicloud security operations
⚠️
UNC6426 Hackers Exploit NPM Package to Gain AWS Admin Access in 72 Hours
⚠️
Managing Python on Servers
⚠️
CISA orders feds to patch n8n RCE flaw exploited in attacks
KEV
⚠️
SQLi flaw in Elementor Ally plugin impacts 250k+ WordPress sites
⚠️
Contagious Interview: Malware delivered through fake developer job interviews
⚠️
Resumés with malicious ISO attachments are circulating, says Aryaka
⚠️
Risky Business #828 -- The Coruna exploits are truly exquisite
📋
ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Moxa, Mitsubishi Electric
📢
Canada Needs Nationalized, Public AI
📢
Canadian retailer Loblaw investigates data breach
📢
[Control systems] Hitachi security advisory (AV26-218)
📢
VMware security advisory (AV26-221)
📢
Google Chrome security advisory (AV26-220)
📢
Intel security advisory (AV26-219)
📢
GitLab security advisory (AV26-222)
📢
HPE security advisory (AV26-224)
📢
Cisco security advisory (AV26-223)
📢
Drupal security advisory (AV26-225)
📢
JetBrains security advisory (AV26-226)
🔥
Trojanized Red Alert App Targets Israeli Users in SMS Scam to Steal Sensitive Data
🔥
‘BlackSanta’ Malware Activates EDR and AV Killer Before Detonating Payload
🔥
Michelin Confirms Data Breach Linked to Oracle EBS Attack
🔥
238,000 Impacted by Bell Ambulance Data Breach
🔥
Hacker broke into FBI and compromised Epstein files, report says
🔥
New PhantomRaven NPM attack wave steals dev data via 88 packages
🔥
Ransomware Attacks Surge by 50% Even as Payments Drop
🔥
Cork Stryker plants hit by suspected global Iranian-linked cyberattack | Cork Beo
🔥
AI Agent Hacks McKinsey
🕵️
ISC Stormcast For Wednesday, March 11th, 2026 https://isc.sans.edu/podcastdetail/9844, (Wed, Mar 11th)
🕵️
PhantomRaven Malware Resurfaces, Targets npm Supply Chain to Steal Developer Secrets
🕵️
What are You Working on Wednesday
🕵️
BeatBanker Trojan Spreads via Phishing, Deploys Crypto Miner and RAT on Targeted Devices
🕵️
Google Warns of AI‑Driven Adaptive Malware Rewriting Its Own Code
🕵️
Quantro Security Emerges From Stealth With $2.5 Million in Funding
🕵️
Instagram Down: Global Outage Prevents Users from Posting and Messaging
🕵️
UK plans to shift fraud fight onto telecoms, tech companies | The Record from Recorded Future News
🕵️
OpenAI to Acquire AI Security Startup Promptfoo
🕵️
Scanner Raises $22 Million for AI-Powered Threat Hunting
🕵️
New 'Zombie ZIP' technique lets malware slip past security tools
🕵️
CISO Conversations: Aimee Cardwell
🕵️
Balancing LLMs and SLMs for Data Security
🕵️
Teen crew caught selling DDoS attack tools - Help Net Security
🕵️
Wiz Joins Google Cloud as Landmark Acquisition Closes
🕵️
Asus routers hijacked to power dangerous cybercrime proxy network
🕵️
MedTech Giant Stryker Crippled by Iran-Linked Hacker Attack
🕵️
Senate Confirms Joshua Rudd to Lead NSA and US Cyber Command
🕵️
Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown
🕵️
New ‘BlackSanta’ EDR killer spotted targeting HR departments
🕵️
News alert: Qevlar AI raises $30M to turn security alerts into actionable defense insights across SOCs
🕵️
CISO Tenure Has Doubled
🌐
BeatBanker and BTMOB trojans: infection techniques and how to stay safe | Kaspersky official blog
🌐
Medtech giant Stryker offline after Iran-linked wiper malware attack
📡
Weekly Threat Bulletin – March 11th, 2026
📡
Google completes $32B acquisition of Wiz
📡
Meta adds new WhatsApp, Facebook, and Messenger anti-scam tools
📡
Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown
📡
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
📡
Researchers Trick Perplexity's Comet AI Browser Into Phishing Scam in Under Four Minutes
📡
Pro-Iran hacktivist group says it is behind attack on medical tech giant Stryker
📡
WhatsApp introduces parent-managed accounts for pre-teens
📡
AI Security for Apps is now generally available
🚨
3 New Actively Exploited Flaws to PatchCISA recently added three new vulnerabilities to the Known Exploited Vulnerabilities catalog (KEV), signaling active exploitation in the wild. These flaws impact critical software including Workspace ONE UEM, SolarWinds help desk, and Ivanti Endpoint Manager, allowing remote atta…
KEV
🐛
CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
KEV
🐛
CVE-2026-3494 MariaDB Server Audit Plugin Comment Handling Bypass
🐛
Cloudflare Pingora Flaws Enable Request Smuggling and Cache Poisoning Attacks
🐛
Gogs Flaw Could Let Attackers Quietly Overwrite Large File Storage Data
🐛
CISA Alerts on Ivanti Endpoint Manager Vulnerability Auth Bypass Exploited in the Wild
KEV
🐛
CVE-2026-21262 SQL Server Elevation of Privilege Vulnerability
🐛
CVE-2026-23660 Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability
🐛
CVE-2026-23664 Azure IoT Explorer Information Disclosure Vulnerability
🐛
CVE-2026-23667 Broadcast DVR Elevation of Privilege Vulnerability
🐛
CVE-2026-23668 Windows Graphics Component Elevation of Privilege Vulnerability
🐛
CVE-2026-23669 Windows Print Spooler Remote Code Execution Vulnerability
🐛
CVE-2026-23671 Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability
🐛
CVE-2026-23672 Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability
🐛
CVE-2026-23673 Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
🐛
CVE-2026-24282 Push message Routing Service Elevation of Privilege Vulnerability
🐛
CVE-2026-24283 Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability
🐛
CVE-2026-24285 Win32k Elevation of Privilege Vulnerability
🐛
CVE-2026-24287 Windows Kernel Elevation of Privilege Vulnerability
🐛
CVE-2026-24288 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
🐛
CVE-2026-24289 Windows Kernel Elevation of Privilege Vulnerability
🐛
CVE-2026-24290 Windows Projected File System Elevation of Privilege Vulnerability
🐛
CVE-2026-24291 Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability
🐛
CVE-2026-24292 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
🐛
CVE-2026-24293 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
🐛
CVE-2026-24294 Windows SMB Server Elevation of Privilege Vulnerability
🐛
CVE-2026-24295 Windows Device Association Service Elevation of Privilege Vulnerability
🐛
CVE-2026-24296 Windows Device Association Service Elevation of Privilege Vulnerability
🐛
CVE-2026-24297 Windows Kerberos Security Feature Bypass Vulnerability
🐛
CVE-2026-25165 Performance Counters for Windows Elevation of Privilege Vulnerability
🐛
CVE-2026-25166 Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability
🐛
CVE-2026-25167 Microsoft Brokering File System Elevation of Privilege Vulnerability
🐛
CVE-2026-25168 Windows Graphics Component Denial of Service Vulnerability
🐛
CVE-2026-25169 Windows Graphics Component Denial of Service Vulnerability
🐛
CVE-2026-25170 Windows Hyper-V Elevation of Privilege Vulnerability
🐛
CVE-2026-25171 Windows Authentication Elevation of Privilege Vulnerability
🐛
CVE-2026-25172 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
🐛
CVE-2026-25173 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
🐛
CVE-2026-25174 Windows Extensible File Allocation Table Elevation of Privilege Vulnerability
🐛
CVE-2026-25175 Windows NTFS Elevation of Privilege Vulnerability
🐛
CVE-2026-25176 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
🐛
CVE-2026-25177 Active Directory Domain Services Elevation of Privilege Vulnerability
🐛
CVE-2026-25178 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
🐛
CVE-2026-25179 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
🐛
CVE-2026-25180 Windows Graphics Component Information Disclosure Vulnerability
🐛
CVE-2026-25181 GDI+ Information Disclosure Vulnerability
🐛
CVE-2026-25185 Windows Shell Link Processing Spoofing Vulnerability
🐛
CVE-2026-25186 Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability
🐛
CVE-2026-25187 Winlogon Elevation of Privilege Vulnerability
🐛
CVE-2026-25188 Windows Telephony Service Elevation of Privilege Vulnerability
🐛
CVE-2026-25189 Windows DWM Core Library Elevation of Privilege Vulnerability
🐛
CVE-2026-25190 GDI Remote Code Execution Vulnerability
🐛
CVE-2026-26105 Microsoft SharePoint Server Spoofing Vulnerability
🐛
CVE-2026-26111 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
🐛
CVE-2026-26112 Microsoft Excel Remote Code Execution Vulnerability
🐛
CVE-2026-26113 Microsoft Office Remote Code Execution Vulnerability
🐛
CVE-2026-26114 Microsoft SharePoint Server Remote Code Execution Vulnerability
🐛
CVE-2026-23656 Windows App Installer Spoofing Vulnerability
🐛
CVE-2026-20967 System Center Operations Manager (SCOM) Elevation of Privilege Vulnerability
🐛
CVE-2026-26121 Azure IOT Explorer Spoofing Vulnerability
🐛
CVE-2026-26115 SQL Server Elevation of Privilege Vulnerability
🐛
CVE-2026-26116 SQL Server Elevation of Privilege Vulnerability
🐛
CVE-2026-26128 Windows SMB Server Elevation of Privilege Vulnerability
🐛
CVE-2026-26131 .NET Elevation of Privilege Vulnerability
🐛
CVE-2026-26132 Windows Kernel Elevation of Privilege Vulnerability
🐛
CVE-2026-26134 Microsoft Office Elevation of Privilege Vulnerability
🐛
CVE-2026-26127 .NET Denial of Service Vulnerability
🐛
CVE-2026-23674 MapUrlToZone Security Feature Bypass Vulnerability
🐛
CVE-2026-26148 Microsoft Azure AD SSH Login extension for Linux Elevation of Privilege Vulnerability
🐛
CVE-2026-23654 GitHub: Zero Shot SCFoundation Remote Code Execution Vulnerability
🐛
CVE-2026-23661 Azure IoT Explorer Information Disclosure Vulnerability
🐛
CVE-2026-23662 Azure IoT Explorer Information Disclosure Vulnerability
🐛
CVE-2026-23665 Linux Azure Diagnostic extension (LAD) Elevation of Privilege Vulnerability
🐛
CVE-2026-26106 Microsoft SharePoint Server Remote Code Execution Vulnerability
🐛
CVE-2026-26107 Microsoft Excel Remote Code Execution Vulnerability
🐛
CVE-2026-26108 Microsoft Excel Remote Code Execution Vulnerability
🐛
CVE-2026-26109 Microsoft Excel Remote Code Execution Vulnerability
🐛
CVE-2026-26110 Microsoft Office Remote Code Execution Vulnerability
🐛
CVE-2026-26117 Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability
🐛
CVE-2026-26118 Azure MCP Server Tools Elevation of Privilege Vulnerability
🐛
CVE-2026-26123 Microsoft Authenticator Information Disclosure Vulnerability
🐛
CVE-2026-26130 ASP.NET Core Denial of Service Vulnerability
🐛
CVE-2026-26141 Hybrid Worker Extension (Arc‑enabled Windows VMs) Elevation of Privilege Vulnerability
🐛
CVE-2026-26144 Microsoft Excel Information Disclosure Vulnerability
🐛
CVE-2026-26030 GitHub: CVE-2026-26030 Microsoft Semantic Kernel InMemoryVectorStore filter functionality vulnerable
🐛
March Patch Tuesday: Three high severity holes in Microsoft Office
🐛
ZDI-26-186: Fortinet FortiClient Link Following Local Privilege Escalation Vulnerability
🐛
ZDI-26-185: Microsoft Windows GDI Bitmap Parsing Out-Of-Bound Read Information Disclosure Vulnerability
🐛
ZDI-26-184: Microsoft Windows NDIS Driver Use-After-Free Local Privilege Escalation Vulnerability
🐛
ZDI-26-183: Microsoft Windows win32full Improper Release Local Privilege Escalation Vulnerability
🐛
ZDI-26-182: Microsoft Windows win32full Improper Release Local Privilege Escalation Vulnerability
🐛
ZDI-26-181: Microsoft Windows win32full Improper Release Local Privilege Escalation Vulnerability
🐛
ZDI-26-180: Microsoft Windows cdd Improper Locking Local Privilege Escalation Vulnerability
🐛
ZDI-26-179: Microsoft Windows win32kfull Improper Locking Local Privilege Escalation Vulnerability
🐛
ZDI-26-178: Microsoft Windows cdd Improper Locking Local Privilege Escalation Vulnerability
🐛
ZDI-26-177: Array Networks MotionPro ArrayInstallManager Incorrect Permission Assignment Local Privilege Escalation Vulnerability
🐛
ZDI-26-176: Apple macOS libusd_ms Alembic File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
🐛
ZDI-26-175: Apple macOS ImageIO SGI File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
🐛
ZDI-26-174: Apple macOS ImageIO SGI File Parsing Integer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-173: Apple macOS Audio APAC Frame Decoding Out-Of-Bounds Write Remote Code Execution Vulnerability
⚠️
An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor
⚠️
Hacker abusing .arpa domain to evade phishing detection, says Infoblox
⚠️
Chinese APT Campaign Uses Middle East Lures to Target Qatar With PlugX
⚠️
When AI safety constrains defenders more than attackers
⚠️
I replaced manual pen tests with automation. Here’s what I learned.
⚠️
Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
⚠️
iPhone Hacking Toolkit Tied to Russian Espionage May Have Originated in the U.S.
⚠️
Making Medical Devices Secure - Tamil Mathi - ASW #373
⚠️
Why access decisions are becoming the weakest link in identity security
⚠️
OpenAI to acquire Promptfoo to strengthen AI agent security testing
⚠️
APT28 hackers deploy customized variant of Covenant open-source tool
⚠️
The OT security time bomb: Why legacy industrial systems are the biggest cyber risk nobody wants to fix
⚠️
OpenClaw Advisory Surge Highlights Blind Spot Between GitHub and CVE Vulnerability Tracking
⚠️
SIM Swaps Expose a Critical Flaw in Identity Security
⚠️
Devs looking for OpenClaw get served a GhostClaw RAT
⚠️
CISA: Recently patched Ivanti EPM flaw now actively exploited
KEV
⚠️
Recent Ivanti Endpoint Manager Flaw Exploited in Attacks
KEV
⚠️
The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction
⚠️
SAP Releases Patches for Security Flaws Allowing Remote Code Execution
⚠️
ShinyHunters claims ongoing Salesforce Aura data theft attacks
⚠️
OpenAI Rolls Out Codex Security Vulnerability Scanner
⚠️
Kevin Mandia’s Armadin Launches With $190 Million in Funding
KEV
⚠️
Hundreds of Salesforce Customers Allegedly Targeted in New Data Theft Campaign
⚠️
New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries
⚠️
Announcing the Custom SAPA Agent: Security Awareness Measurement Built for Your Environment
⚠️
Attackers Use Malformed ZIP Archives to Evade Antivirus and EDR Tools
⚠️
Top 10 Best Anti-Phishing Tools in 2026
⚠️
AI Medical Devices Attack Surface
⚠️
FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
⚠️
Microsoft Patch Tuesday March 2026, (Tue, Mar 10th)
⚠️
Microsoft March 2026 Patch Tuesday fixes 2 zero-days, 79 flaws
⚠️
Microsoft releases Windows 10 KB5078885 extended security update
⚠️
Adobe Patches 80 Vulnerabilities Across Eight Products
⚠️
Microsoft March 2026 Patch Tuesday fixes 2 zero-days, 79 flaws
⚠️
Microsoft Patches 83 Vulnerabilities
KEV
⚠️
The CSO role is evolving fast with AI in Cyber Defense strategy
⚠️
Threat intelligence by ESET is a game changer
⚠️
Google Cloud Security Threat Horizons Report #13 (H1 2026) Is Out!
⚠️
New ‘BlackSanta’ EDR killer spotted targeting HR departments
⚠️
Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution
⚠️
Critical Patches Issued for Microsoft Products, March 10, 2026
⚠️
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
📋
Microsoft to enable Windows hotpatch security updates by default
📢
Jailbreaking the F-35 Fighter Jet
📢
PwC got hacked
📢
PwC got hacked
📢
PwC got hacked
📢
Kubernetes security advisory (AV26-208)
📢
My nephew says he hacked PwC's Saas vendor
📢
[Control systems] Schneider Electric security advisory (AV26-210)
📢
SAP security advisory – March 2026 monthly rollup (AV26-209)
📢
Mozilla security advisory (AV26-211)
📢
[Control systems] Siemens security advisory (AV26-212)
📢
Ivanti security advisory (AV26-214)
📢
Microsoft security advisory – March 2026 monthly rollup (AV26-213)
📢
DOGE employee stole Social Security data and put it on a thumb drive, report says
📢
HPE security advisory (AV26-217)
📢
Fortinet security advisory (AV26-216)
📢
Adobe security advisory (AV26-215)
📢
Precious Bodily Fluids, InstallFix, CISA, Claude, Overtime, Sim Swaps, Aaran Leyland - SWN #562
📢
AWS European Sovereign Cloud achieves first compliance milestone: SOC 2 and C5 reports plus seven ISO certifications
🔥
Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials
🔥
Weekly Update 494
🔥
GhostClaw Masquerades as OpenClaw in Bid to Plunder Developer Data
🔥
Signal Confirms Sophisticated Phishing Scheme Caused Account Compromises
🔥
SurxRAT Android Malware Uses LLMs for Phishing and Data Theft
🔥
TriZetto Provider Solutions Breach Hits 3.4 Million Patients - Infosecurity Magazine
🔥
Ericsson US discloses data breach after service provider hack
🔥
UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device
🔥
Thousands Affected by Ericsson Data Breach
🔥
Through the Lens of MDR: Analysis of KongTuke’s ClickFix Abuse of Compromised WordPress Sites
🕵️
ISC Stormcast For Tuesday, March 10th, 2026 https://isc.sans.edu/podcastdetail/9842, (Tue, Mar 10th)
🕵️
Hackers Use Microsoft Teams to Manipulate Employees Into Allowing Remote Access
🕵️
Anthropic Files Lawsuit Against U.S. Government Over Claude Risk Designation
🕵️
Cylake Raises $45 Million to Secure Organizations Barred From Cloud
🕵️
Signed malware posing as Teams and Zoom apps drops RMM backdoors
🕵️
OpenAI to Acquire Promptfoo to Address Vulnerabilities in AI Systems
🕵️
Leading Myanmar Fleet Management Company Yoma Fleet Selects AccuKnox SIEM to Replace Legacy Tools
🕵️
Escape Raises $18 Million to Automate Pentesting
🕵️
APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military
🕵️
Microsoft Teams phishing targets employees with A0Backdoor malware
🕵️
Dutch Intel Warns of Russian Hackers Hijacking Signal, WhatsApp Attacks
🕵️
SAP Patches Critical FS-QUO, NetWeaver Vulnerabilities
🕵️
Kai Emerges From Stealth With $125M in Funding for AI Platform Bridging IT and OT Security
🕵️
Webinar Today: Securing Fragile OT in an Exposed World
🕵️
CyberheistNews Vol 16 #10 How to Spot a Phishing Website Before It Steals Your Data
🕵️
Jazz Emerges From Stealth With $61M in Funding for AI-Powered DLP
🕵️
Readable Code Might Improve Security
🕵️
Yes, You Need AI to Defeat AI
🕵️
Sednit reloaded: Back in the trenches
🌐
The New Turing Test: How Threats Use Geometry to Prove 'Humanness'
🌐
New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy network
🌐
KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet
🌐
New 'Zombie ZIP' technique lets malware slip past security tools
🌐
New BeatBanker Android malware poses as Starlink app to hijack devices
🌐
BeatBanker: A dual‑mode Android Trojan
📡
CISOs in a Pinch: A Security Analysis of OpenClaw
📡
How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows
📡
Microsoft brings phishing-resistant Windows sign-ins via Entra passkeys
📡
Twitter suspended 800 million accounts last year – so why does manipulation remain so rampant?
📡
Windows 11 KB5079473 & KB5078883 cumulative updates released
📡
HPE warns of critical AOS-CX flaw allowing admin password resets
📡
Mental health apps are leaking your private thoughts. How do you protect yourself? | Kaspersky official blog
📡
Mandiant’s founder just raised $190M for his autonomous AI agent security startup
📡
Investigating multi-vector attacks in Log Explorer
📡
Security is a team sport: AWS at RSAC 2026 Conference
📡
AWS Security Hub is expanding to unify security operations across multicloud environments
🚨
Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalogsubmitted by kid to cybersecurity 1 points | 0 comments https://thehackernews.com/2026/03/hikvision-and-rockwell-automation-cvss.html
KEV
🚨
CISA Adds Three Known Exploited Vulnerabilities to CatalogCISA has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2021-22054 Omnissa Workspace ONE Server-Side Request Forgery CVE-2025-26399 SolarWinds Web Help Desk Deserialization of Untrusted Data Vul…
KEV
🐛
Critical ExifTool Vulnerability Allows Malicious Images to Execute Code on macOS
🐛
Nginx UI Vulnerabilities Let Attackers Download Full System Backups
🐛
1-Click ZITADEL Vulnerability Could Allow Full System Takeover
🐛
Apache ZooKeeper Flaw Exposes Sensitive Data to Attackers
🐛
Vaultwarden Vulnerabilities Enable Privilege Escalation and Data Exposure
🐛
CVE program funding secured, easing fears of repeat crisis
🐛
ZDI-26-172: Unraid Authentication Request Path Traversal Authentication Bypass Vulnerability
🐛
ZDI-26-171: Unraid Update Request Path Traversal Remote Code Execution Vulnerability
🐛
VU#976247: Retraction of "Antivirus and Endpoint Detection and Response Archive Scanning Engines may not properly scan malformed ZIP archives"
⚠️
Coruna iOS Exploit Kit Goes Mass-Market: Cybersecurity Today for March 9, 2026 with David Shipley
⚠️
CISA Alerts Users to Actively Exploited Vulnerabilities Impacting macOS and iOS
KEV
⚠️
WiFi Signals Can Track Human Activity Through Walls by Mapping Body Keypoints
⚠️
TrendAI™ at [un]prompted 2026: From KYC Exploits to Agentic Defense
⚠️
PQC roadmap remains hazy as vendors race for early advantage
⚠️
Hikvision Multiple Product Vulnerability Could Let Attackers Escalate Privileges
KEV
⚠️
ExifTool Vulnerability Lets Malicious Images Trigger macOS Code Execution
⚠️
4 ways to prepare your SOC for agentic AI
⚠️
Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure
⚠️
Rogues gallery: 15 worst ransomware groups active today
⚠️
Breaking in with CrashFix, supply chain security, and CMMC phase 1 - ESW #449
⚠️
New Attack Against Wi-Fi
⚠️
Cyber Espionage Group CL-UNK-1068 Linked to China Targets Asian Infrastructure
⚠️
OpenAI says Codex Security found 11,000 high-impact bugs in a month
⚠️
CISA warns feds to patch iOS flaws exploited in crypto-theft attacks
⚠️
⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware
⚠️
Open-source tool Sage puts a security layer between AI agents and the OS
⚠️
Open-source tool Sage puts a security layer between AI agents and the OS
⚠️
ShinyHunters claims ongoing Salesforce Aura data theft attacks
⚠️
Ericsson US discloses data breach after service provider hack
⚠️
Google: Cloud attacks exploit flaws more than weak credentials
⚠️
My Really Fun RSA 2026 Presentations!
⚠️
Fixing request smuggling vulnerabilities in Pingora OSS deployments
⚠️
Active defense: introducing a stateful vulnerability scanner for APIs
📢
Tarnung als Taktik: Warum Ransomware-Angriffe raffinierter werden
📢
Your KnowBe4 Fresh Compliance Plus Content Updates | February 2026
📢
CMMC Is Now In Contracts
📢
IBM security advisory (AV26-200)
📢
Red Hat security advisory (AV26-202)
📢
Ubuntu security advisory (AV26-201)
📢
[Control systems] CISA ICS security advisories (AV26–204)
📢
Dell security advisory (AV26-203)
📢
[Control Systems] Moxa security advisory (AV26-205)
📢
Mozilla security advisory (AV26-207)
📢
Microsoft Edge security advisory (AV26-206)
📢
From Alerts to Action: Making Public–Private Threat Intel Actually Useful - Ian Washburn - CSP #222
📢
9 Must-Know Best Practices for Email Security
📢
Ivanti security advisory (AV26-113) – Update 1
🔥
Countries with Most Personal Records Leaked in Data Breaches (2004-2025)
🔥
Countries with Most Personal Records Leaked in Data Breaches (2004-2025)
🔥
Countries with Most Personal Records Leaked in Data Breaches (2004-2025)
🔥
Microsoft: Fake AI Extensions Breached Chat Histories in 20,000+ Enterprise Tenants
🔥
Why Password Audits Miss the Accounts Attackers Actually Want
🔥
Russian-backed hackers have gained access to Signal and WhatsApp accounts used ‌by officials, military personnel and journalists, as claimed by two intelligence agencies in the Netherlands.
🔥
UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device
🔥
Salt Typhoon is hacking the world’s phone and internet giants. Here’s everywhere that’s been hit.
🕵️
ISC Stormcast For Monday, March 9th, 2026 https://isc.sans.edu/podcastdetail/9840, (Mon, Mar 9th)
🕵️
Transparent Tribe’s ‘Vibeware’ Move Points to AI-Made Malware at Scale
🕵️
Cybercrime Group in Vietnam Enables Massive Fraudulent Signups
🕵️
ClipXDaemon Malware Targets Crypto Users in Linux X11 Sessions
🕵️
NIS-2: Tausende reißen BSI-Frist und riskieren Strafen
🕵️
MaaS VIP Keylogger Campaign Uses Steganography to Steal Credentials at Scale
🕵️
Cloned AI Tool Sites Distribute Malware in ‘InstallFix’ Campaign
🕵️
Iran-Linked Hackers Target U.S. Critical Infrastructure Amid Rising Cyber Threats
🕵️
Internet Infrastructure TLD .arpa Abused in Phishing Attacks
🕵️
Iran-linked APT targets US critical sectors with new backdoors - Help Net Security
🕵️
BoryptGrab Malware Abuses GitHub to Steal Browser and Crypto Wallet Data
🕵️
Mentorship Monday - Discussions for career and learning!
🕵️
ClickFix Attack Uses Windows Terminal to Evade Detection
🕵️
900+ Certificates Used by Fortune 500, Governments Exposed by Key Leaks
🕵️
Fake CleanMyMac Site Spreads SHub Stealer, Targets Crypto Wallets
🕵️
FBI Investigating ‘Suspicious’ Cyber Activity on System Holding Sensitive Surveillance Information - SecurityWeek
🕵️
Secure agentic AI for your Frontier Transformation
🕵️
Security Risk Advisors Releases “The Purple Perspective 2026” Report
🕵️
Cybersecurity M&A Roundup: 42 Deals Announced in February 2026
🕵️
AI-to-AI Communication and Secret AI Code Must Be Stopped At All Costs
🕵️
Stop Credential Stealers With This
🕵️
Announcing Prisma AIRS Availability in Singapore Region
🕵️
From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
🌐
Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft
🌐
Can the Security Platform Finally Deliver for the Mid-Market?
🌐
Microsoft Teams phishing targets employees with backdoors
📡
Ring’s Jamie Siminoff has been trying to calm privacy fears since the Super Bowl, but his answers may not help
📡
Microsoft still working to fix Windows Explorer white flashes
📡
Encrypted Client Hello: Ready for Prime Time&#x3f;, (Mon, Mar 9th)
📡
FBI warns of phishing attacks impersonating US city, county officials
📡
Russian government hackers targeting Signal and WhatsApp users, Dutch spies warn
📡
Microsoft Teams will tag third-party bots trying to join meetings
📡
OpenAI acquires Promptfoo to secure its AI agents
📡
Dutch govt warns of Signal, WhatsApp account hijacking attacks
🐛
Recent Cisco Catalyst SD-WAN Vulnerability Now Widely Exploited
⚠️
Feds take notice of iOS vulnerabilities exploited under mysterious circumstances
📢
Brazilian Federal Police can reportedly reverse WhatsApp's "view once" messages
🕵️
Hackers abuse .arpa DNS and ipv6 to evade phishing defenses
📡
EU court adviser says banks must immediately refund phishing victims
📡
How AI Assistants are Moving the Security Goalposts
⚠️
Claude AI Exposes 22 Firefox Vulnerabilities in Just Two Weeks
⚠️
Cybersecurity Today Month in Review: World In Turmoil
⚠️
OpenAI’s Codex Security Built to Automate Vulnerability Discovery and Remediation
⚠️
What Is OSINT?
🔥
Microsoft: Hackers abusing AI at every stage of cyberattacks
🔥
Termite ransomware breaches linked to ClickFix CastleRAT attacks
🕵️
FBI Investigating ‘Suspicious’ Cyber Activity on System Holding Sensitive Surveillance Information
🕵️
YARA-X 1.14.0 Release, (Sat, Mar 7th)
🕵️
Malicious Browser Add‑on Targets imToken Users’ Private Keys
🕵️
Pentagon’s Chief Tech Officer Says He Clashed With AI Company Anthropic Over Autonomous Warfare
🕵️
Over 100 GitHub Repositories Distributing BoryptGrab Stealer
🕵️
Android Devices Shipping With Malware
🕵️
US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies
📡
Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model
📡
OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues
🚨
Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV CatalogThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The critical-severity vulnerabi…
KEV
🚨
CISA Adds iOS Flaws From Coruna Exploit Kit to KEV ListThe nation-state-grade iOS exploit kit targets 23 vulnerabilities affecting iOS 13 to 17.2.1. The post CISA Adds iOS Flaws From Coruna Exploit Kit to KEV List appeared first on SecurityWeek .
KEV
🐛
WordPress Membership Plugin Flaw Lets Attackers Create Admin Accounts
🐛
Zero-day exploits hit enterprises faster and harder
🐛
Apache ActiveMQ Flaw Enables DoS Attacks via Malformed Network Packets
🐛
AVideo Platform Vulnerability Allows Hackers to Hijack Streams via Zero-Click Command Injection
🐛
ZDI-26-170: GStreamer H.266 Codec Parser Out-Of-Bounds Write Remote Code Execution Vulnerability
🐛
ZDI-26-169: GStreamer H.266 Codec Parser Integer Underflow Remote Code Execution Vulnerability
🐛
ZDI-26-168: GStreamer RIFF Palette Integer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-167: GStreamer rtpqdm2depay Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-166: GStreamer rtpqdm2depay Out-Of-Bounds Write Remote Code Execution Vulnerability
🐛
ZDI-26-165: GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote Code Execution Vulnerability
🐛
ZDI-26-164: GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-163: GStreamer JPEG Parser Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-162: GStreamer H.266 Codec Parser Stack-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-161: GStreamer DVB Subtitles Out-Of-Bounds Write Remote Code Execution Vulnerability
🐛
ZDI-26-160: (Pwn2Own) Philips Hue Bridge hk_hap Ed25519 Signature Verification Authentication Bypass Vulnerability
🐛
ZDI-26-159: (Pwn2Own) Philips Hue Bridge hk_hap characteristics Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-158: (Pwn2Own) Philips Hue Bridge HomeKit hk_hap_pair_storage_put Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-157: (Pwn2Own) Philips Hue Bridge HomeKit Accessory Protocol Static Nonce Authentication Bypass Vulnerability
🐛
ZDI-26-156: (Pwn2Own) Philips Hue Bridge HomeKit Accessory Protocol Transient Pairing Mode Authentication Bypass Vulnerability
🐛
ZDI-26-155: (Pwn2Own) Philips Hue Bridge hap_pair_verify_handler Sub-TLV Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-154: (Pwn2Own) Philips Hue Bridge HomeKit Pair-Setup Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-153: (Pwn2Own) Philips Hue Bridge Zigbee Stack Custom Command Handler Heap-based Buffer Overflow Remote Code Execution Vulnerability
🐛
ZDI-26-152: Docker Desktop Docker Plugins Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
🐛
ZDI-26-151: Delta Electronics CNCSoft-G2 DPAX File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
⚠️
LeakBase marketplace unplugged by cops in 14 countries
⚠️
Europa im Visier von Cyber-Identitätsdieben
⚠️
Google Uncovers 90 Zero-Day Vulnerabilities Under Active Exploitation in 2025
KEV
⚠️
FBI Detains U.S. Government Contractor in Massive $46 Million Fraud Scheme
⚠️
Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
⚠️
Challenges and projects for the CISO in 2026
⚠️
AWS-LC Flaw Exposes Amazon Users to Attacks by Bypassing Certificate Chain Validation
⚠️
Teenage hacker myth primed for a middle-age criminal makeover
⚠️
Claude Used to Hack Mexican Government
⚠️
Rockwell Vulnerability Allowing Remote ICS Hacking Exploited in Attacks
⚠️
Google: Half of 2025's 90 Exploited Zero-Days Aimed at Enterprises - SecurityWeek
⚠️
RMM Tools Crucial for IT Operations, But Growing Threat as Attackers Weaponize Them
⚠️
Targeted advertising is also targeting malware
⚠️
Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
⚠️
WordPress membership plugin bug exploited to create admin accounts
⚠️
Your KnowBe4 Fresh Content Updates from February 2026
⚠️
What Tools Do Hackers Use to Weaponize Emails?
⚠️
EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security
⚠️
Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT
⚠️
CISA warns of Apple flaws exploited in spyware, crypto-theft attacks
⚠️
OAuth vulnerability in n8n automation platform could lead to system compromise
⚠️
How hackers bypassed MFA with a $120 phishing kit – until a global takedown shut it down
⚠️
Only 30 minutes per quarter on cyber risk: Why CISO-board conversations are falling short
⚠️
ClickFix attackers using new tactic to evade detection, says Microsoft
⚠️
Iran vs Everyone: 2FA-Bypass Phish, APT41 Drive, iOS 0days, Josh Marpet, and More - SWN #561
⚠️
Trump’s cyber strategy emphasizes offensive operations, deregulation, AI
⚠️
Proactive Preparation and Hardening Against Destructive Attacks: 2026 Edition
⚠️
How to scan for vulnerabilities with GitHub Security Lab’s open source AI-powered framework
📢
France's health ministry has confirmed a data breach involving the exposure of administrative information for 15.8 million patients and sensitive doctors' notes for approximately 165,000 individuals
📢
France's health ministry has confirmed a data breach involving the exposure of administrative information for 15.8 million patients and sensitive doctors' notes for approximately 165,000 individuals
📢
Wikipedia Hit By JavaScript Worm, ICE Contractor Data Base Leaked and more...
📢
Microsoft 365 Backup to add file-level restore for faster recovery
📢
FBI wiretap system tapped by hackers
📢
Friday Squid Blogging: Squid in Byzantine Monk Cooking
🔥
A ransomware attack on August 31, 2025, compromised the data of 1.2 million at the University of Hawaiʻi Cancer Center, targeting research servers but sparing clinical operations
🔥
A ransomware attack on August 31, 2025, compromised the data of 1.2 million at the University of Hawaiʻi Cancer Center, targeting research servers but sparing clinical operations
🔥
FBI investigates breach of surveillance and wiretap systems
🔥
Iranian APT Hacked US Airport, Bank, Software Company
🔥
FBI investigating ‘suspicious’ cyber activities on critical surveillance network | CNN Politics
🔥
TriZetto confirms 3.4M people’s health and personal data was stolen during breach
🔥
Ransomware Before Windows Even Starts
🔥
In Other News: FBI Hacked, US Security Pro Killed in Iran War, Hijacked Cameras Used in Khamenei Strike
🔥
Cognizant TriZetto breach exposes health data of 3.4 million patients
🔥
Data Loss Prevention (DLP): What It Is, Types, and Solutions
🔥
Ransomware attacks on schools and colleges | Kaspersky official blog
🕵️
ISC Stormcast For Friday, March 6th, 2026 https://isc.sans.edu/podcastdetail/9838, (Fri, Mar 6th)
🕵️
Microsoft, working with Europol, authorities from 6 countries, and 11 security organizations, disrupted the Tycoon 2FA phishing-as-a-service platform on seizing 330 domains
🕵️
Microsoft, working with Europol, authorities from 6 countries, and 11 security organizations, disrupted the Tycoon 2FA phishing-as-a-service platform on seizing 330 domains
🕵️
China-Nexus Hackers Target Telecommunication Providers with New Malware Attack
🕵️
New Linux Rootkits Leverage Advanced eBPF and io_uring Techniques for Stealthy Attacks
🕵️
Data Security Firm Evervault Raises $25 Million in Series B Funding
🕵️
China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks
🕵️
James ‘Aaron’ Bishop Tapped to Serve as New Pentagon CISO
🕵️
Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware
🕵️
PleaseFix Flaw Lets Hackers Access 1Password Vault via Comet AI Browser
🕵️
2024 TfL hack affected around 10 million people, BBC can reveal
🕵️
Off-Topic Friday
🕵️
Fake Claude Code install guides push infostealers in InstallFix attacks
🕵️
Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India
🕵️
ArmorCode Raises $16 Million for Exposure Management Platform
🕵️
Anthropic and the Pentagon
🕵️
AI as tradecraft: How threat actors operationalize AI
🕵️
Fake Calendar Invitations Move to Microsoft Outlook
🕵️
How the National Cyber Strategy Secures Our Digital Way of Life
🕵️
APT Attack Hiding In Plain Sight
🌐
Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor
📡
Ghanain man pleads guilty to role in $100 million fraud ring
📡
The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity
📡
Anthropic’s Claude found 22 vulnerabilities in Firefox over two weeks
📡
What cybersecurity actually does for your business
🚨
CISA Adds Five Known Exploited Vulnerabilities to CatalogCISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability CVE-2021-22681 Rockwell Multiple Products Insufficient Protecte…
KEV
🐛
14 old software bugs that took way too long to squash
🐛
Cisco Secure Firewall Management Flaw Allows Remote Code Execution
🐛
CVE-2026-23234 f2fs: fix to avoid UAF in f2fs_write_end_io()
🐛
CVE-2026-23235 f2fs: fix out-of-bounds access in sysfs attribute read/write
🐛
CVE-2026-23237 platform/x86: classmate-laptop: Add missing NULL pointer checks
🐛
CVE-2026-23238 romfs: check sb_set_blocksize() return value
🐛
CVE-2026-3336 PKCS7_verify Certificate Chain Validation Bypass in AWS-LC
🐛
CVE-2026-0038 In multiple functions of mem_protect.c, there is a possible way to execute arbitrary code due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
🐛
CVE-2026-23865 An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2.
🐛
CVE-2026-23236 fbdev: smscufx: properly copy ioctl memory to kernelspace
🐛
CVE-2025-71238 scsi: qla2xxx: Fix bsg_done() causing double free
🐛
CVE-2026-23231 netfilter: nf_tables: fix use-after-free in nf_tables_addchain()
🐛
CVE-2026-3338 PKCS7_verify Signature Validation Bypass in AWS-LC
🐛
Critical pac4j-jwt Authentication Bypass Vulnerability Allows Attackers to Impersonate Any User
🐛
CVE-2025-8732 libxml2 xmlcatalog xmlParseSGMLCatalog recursion
🐛
Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild
KEV
🐛
CVE-2026-24821 A heap-based buffer over-read that might affect a system that compiles untrusted Lua code in turanszkij/WickedEngine.
🐛
CVE-2026-27141 Sending certain HTTP/2 frames can cause a server to panic in golang.org/x/net
🐛
CVE-2025-68121 Unexpected session resumption in crypto/tls
🐛
PoC Exploit for Cisco SD-WAN 0-Day Vulnerability Now Released, Actively Exploited in the Wild
KEV
🐛
New MongoDB Vulnerability Allows Attackers to Crash Servers, Exposing Critical Data
🐛
Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
🐛
Cisco issues emergency patches for critical firewall vulnerabilities
🐛
CVE-2026-23651 Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
🐛
CVE-2026-21536 Microsoft Devices Pricing Program Remote Code Execution Vulnerability
🐛
CVE-2026-26124 Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
🐛
CVE-2026-26125 Payment Orchestrator Service Elevation of Privilege Vulnerability
🐛
CVE-2026-26122 Microsoft ACI Confidential Containers Information Disclosure Vulnerability
🐛
Look What You Made Us Patch: 2025 Zero-Days in Review
KEV
⚠️
Smashing Security podcast #457: How a cybersecurity boss framed his own employee
⚠️
Microsoft leads takedown of Tycoon2FA phishing service infrastructure
⚠️
Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks
⚠️
Operation Leak: Authorities Dismantle LeakBase Forum, Secure User Data and IP Logs
⚠️
Cisco Catalyst SD-WAN Flaws Expose Devices to Root Access, Threatening Network Security
⚠️
State-affiliated hackers set up for critical OT attacks that operators may not detect
⚠️
Cisco Secure Firewall Vulnerability Exposes Networks to Authentication Bypass Attacks
⚠️
Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
⚠️
FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials
⚠️
RedAlert Mobile Espionage Campaign Exploits Trojanized Rocket Alert App to Spy on Civilians
⚠️
Reclaim Security Raises $26M to Eliminate the 27-Day Remediation Gap
⚠️
Google Rolls Out Emergency Chrome Update to Patch 10 Critical Security Vulnerabilities
⚠️
ClickFix Campaign Exploits Fake LinkedIn VCs to Spread Malware Among Crypto and Web3 Experts
⚠️
Top 10 Best Cybersecurity Marketing Agencies to Watch in 2026
⚠️
Cisco flags more SD-WAN flaws as actively exploited in attacks
KEV
⚠️
APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
⚠️
Where Multi-Factor Authentication Stops and Credential Abuse Starts
⚠️
DPRK Hackers Target Crypto Firms, Steal Keys and Cloud Assets in Coordinated Attacks
⚠️
Police dismantles online gambling ring exploiting Ukrainian women
⚠️
Threat Actors Exploit Fake Claude Code Downloads to Deploy Infostealer Malware
⚠️
Coruna iOS exploit kit moved from spy tool to mass criminal campaign in under a year
⚠️
Google: Half of 2025’s 90 Exploited Zero-Days Aimed at Enterprises
⚠️
Google says 90 zero-days were exploited in attacks last year
KEV
⚠️
Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech
⚠️
WordPress membership plugin bug exploited to create admin accounts
⚠️
Email Security: What It Is, How It Works, and Best Protection Methods
⚠️
A Vulnerability in pac4j-jwt (JwtAuthenticator) Could Allow for Authentication Bypass
⚠️
Multiple Vulnerabilities in Cisco Products Could Allow for Remote Code Execution
⚠️
On the Effectiveness of Mutational Grammar Fuzzing
📢
Differentiating Between a Targeted Intrusion and an Automated Opportunistic Scanning &#x5b;Guest Diary&#x5d;, (Wed, Mar 4th)
📢
Phobos ransomware admin pleads guilty to wire fraud conspiracy
📢
Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
📢
OpenText security advisory (AV26-199)
🔥
Cyberattack Alert: Hackers Impersonate LastPass Support to Steal Vault Passwords
🔥
Hacked App Part of US/Israeli Propaganda Campaign Against Iran
🔥
Russian Ransomware Operator Pleads Guilty in US
🔥
Israel Hacked Traffic Cameras in Iran
🔥
Wikipedia hit by self-propagating JavaScript worm that vandalized pages
🔥
Italian prosecutors confirm journalist was hacked with Paragon spyware
🕵️
Online ads surpassed email as the primary malware channel in 2025, accounting for 60%+ of all observed malware and phishing campaigns
🕵️
Online ads surpassed email as the primary malware channel in 2025, accounting for 60%+ of all observed malware and phishing campaigns
🕵️
Authorities from 14 countries shut down LeakBase, seize its domains, and arrest multiple people allegedly tied to the cybercrime forum, which had 142K+ members
🕵️
Authorities from 14 countries shut down LeakBase, seize its domains, and arrest multiple people allegedly tied to the cybercrime forum, which had 142K+ members
🕵️
Tycoon 2FA Phishing Operation Dismantled in Joint Raid by Microsoft and Europol
🕵️
Threat Actors Intensify Targeting of IP Cameras Across the Middle East Amid Ongoing Conflict
🕵️
Cisco Patches Critical Vulnerabilities in Enterprise Networking Products
🕵️
LeakBase Cybercrime Forum Shut Down, Suspects Arrested
🕵️
Reclaim Security Raises $20 Million to Accelerate Remediation
🕵️
ISC Stormcast For Thursday, March 5th, 2026 https://isc.sans.edu/podcastdetail/9836, (Thu, Mar 5th)
🕵️
RingH23 Threat Actors Target MacCMS and CDN Infrastructure with New Arsenal
🕵️
Europol schließt riesigen Markt für gestohlene Daten
🕵️
Europol: Großer Markt für gestohlene Daten geschlossen
🕵️
Spear Phishing Attacks: Top 7 Signs to Watch For
🕵️
I Wrote a Book About AI Sycophancy. I Didn’t Use AI to Write It.
🕵️
Embrace Every Choice You Make
🕵️
Navigating the U.S. Public Sector’s Unrelenting Cyber Crisis
🕵️
Google Safe Browsing missed 84% of phishing sites we found in February
🕵️
Malicious AI Assistant Extensions Harvest LLM Chat Histories
🕵️
Women’s History Month: Encouraging women in cybersecurity at every career stage
🕵️
riverside bios embedded edge zero footprint enterprise security
🕵️
Threat Actors Abuse Messaging Platforms to Launch Phishing Attacks
🕵️
Airsnitch, Claude, Hacking Firewalls - PSW #916
🕵️
The Weak Spot in Encrypted WiFi
🕵️
Chinese state hackers target telcos with new malware toolkit
🌐
ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
🌐
New BoryptGrab Stealer Targets Windows Users via Deceptive GitHub Pages
🌐
Joint guidance on supply chain risks and mitigations for artificial intelligence and machine learning
🌐
Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware
📡
How to disable unwanted AI assistants and features on your PC and smartphone | Kaspersky official blog
📡
Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
📡
2026 Browser Data Reveals Major Enterprise Security Blind Spots
📡
Bypassing debug password protection on the RH850 family using fault injection
📡
Top 10 artificial intelligence security actions: A primer - ITSAP.10.049
📡
CASI Leaderboard Shifts: Sugar-Coated Poison, and the Expanding AI Attack Surface
📡
FBI arrests suspect linked to $46M crypto theft from US Marshals
📡
FYI: Impersonators are (still) targeting companies with fake TechCrunch outreach
📡
FBI investigating hack on its wiretap and surveillance systems: report
📡
How SMBs use threat research and MDR to build a defensive edge
📡
VU#772695: A flawed TLS handshake implementation affects Viber Proxy in multiple platforms
📡
AWS completes the 2026 annual Dubai Electronic Security Centre (DESC) certification audit
📡
2025 ISO and CSA STAR certificates are now available with one additional service and one new region
🚨
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV CatalogThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed security flaw impacting Broadcom VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, citing active exploitation in the wild. The high-severity vulnerabi…
KEV
🐛
VMware Aria Operations Vulnerability Exploited in the Wild
KEV
🐛
CISA Warns of VMware Aria Operations Vulnerability Actively Exploited in Attacks
KEV
🐛
CVE-2026-25541 Bytes is vulnerable to integer overflow in BytesMut::reserve
🐛
CISA Warns Qualcomm Chipsets Memory Corruption Vulnerability Is Actively Exploited in Attacks
KEV
⚠️
AI-powered attack kits go open source, and CyberStrikeAI may be just the beginning
⚠️
Malicious Laravel Packages Deploy PHP RAT, Grant Remote Access to Attackers
⚠️
Thousands of iPhones Compromised in Massive Hack via Coruna Exploit Kit with 23 Vulnerabilities
⚠️
AI Driven Warare
⚠️
Silver Dragon APT Group Exploits Google Drive for Covert Attacks on Europe, Asia
⚠️
Microsoft Alerts Customers to New Phishing Attack Exploiting OAuth in Entra ID to Bypass Detection
⚠️
How to know you’re a real-deal CSO — and whether that job opening truly seeks one
⚠️
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
⚠️
IPVanish VPN for macOS Flaw Enables Privilege Escalation and Code Execution
⚠️
Critical FreeScout Vulnerability Leads to Full Server Compromise
⚠️
Anthropic AI ultimatums and IP theft: The unspoken risk
⚠️
Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
⚠️
Want More XWorm&#x3f;, (Wed, Mar 4th)
⚠️
Perplexity’s Comet Browser Breached Through Calendar Invite Attack
⚠️
Manipulating AI Summarization Features
⚠️
New Threat Report: AI Accelerates High-Velocity Cyber Attacks
⚠️
Honeywell Controllers Widely Exposed Without Authentication
⚠️
Iranian cyberattacks fail to materialize but threat remains acute
⚠️
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
⚠️
How a Brute Force Attack Unmasked a Ransomware Infrastructure Network
⚠️
Europol-coordinated action disrupts Tycoon2FA phishing platform
⚠️
Europol, Microsoft, TrendAI™ and Collaborators Halt Tycoon 2FA Operations
⚠️
Spyware-grade Coruna iOS exploit kit now used in crypto theft attacks
⚠️
Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers
⚠️
Enhanced access denied error messages with policy ARNs
⚠️
Risky Business #827 -- Iranian cyber threat actors are down but not out
📋
Cisco warns of max severity Secure FMC flaws giving root access
📢
Windows 11 23H2 to 25H2 Upgrade Reportedly Disrupts Internet Connectivity for Users
📢
AzCopy Utility Misused for Data Exfiltration in Ongoing Ransomware Attacks
📢
Iran‑Linked “Dust Specter” APT Deploys AI‑Aided Malware Against Iraqi Officials
📢
Google Chrome security advisory (AV26-194)
📢
Tenable security advisory (AV26-195)
📢
HPE security advisory (AV26-196)
📢
Cisco security advisory (AV26-197)
📢
Drupal security advisory (AV26-198)
🔥
Hacktivist group “Department of Peace” claims to have breached a DHS tech‑procurement office, leaking ICE contract records involving over 6,000 vendors, including major defense and surveillance firms
🔥
Hacktivist group “Department of Peace” claims to have breached a DHS tech‑procurement office, leaking ICE contract records involving over 6,000 vendors, including major defense and surveillance firms
🔥
LexisNexis Faces Data Breach After 2.04 GB of Data Allegedly Stolen
🔥
Iranian APT Groups Intensify Cyberattacks on Critical Infrastructure Amid Rising Geopolitical Tensions
🔥
VoidLink Malware Framework Targets Kubernetes and AI Workloads in New Cyber Attack Wave
🔥
LastPass Warns of New Phishing Campaign
🔥
Ransomware attack exposes 1.2 million University of Hawaii Cancer Center records | news | SC Media
🔥
How Pirated Software Turns Helpful Employees Into Malware Delivery Agents
🔥
Paint maker giant AkzoNobel confirms cyberattack on U.S. site
🔥
LexisNexis says hackers accessed legacy data in contained breach | The Record from Recorded Future News
🔥
Mississippi medical center reopens clinics hit by ransomware attack
🔥
FBI seizes LeakBase cybercrime forum, data of 142,000 members
🔥
New LexisNexis Data Breach Confirmed After Hackers Leak Files
🔥
AI Agents and the Revival of Hacking
🔥
U.S. and EU police shut down LeakBase, a site accused of sharing stolen passwords and hacking tools
🔥
Why AI, Zero Trust, and modern security require deep visibility
🔥
AI Is Supercharging Phishing
🕵️
ISC Stormcast For Wednesday, March 4th, 2026 https://isc.sans.edu/podcastdetail/9834, (Wed, Mar 4th)
🕵️
A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals
🕵️
A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals
🕵️
Phishing Campaign Uses Google Cloud to Host Malicious Redirects via GCS Bucket
🕵️
Building Trusted Automation as Leaders Struggle with AI Adoption and CISOs Hire - BSW #437
🕵️
Global Coalition Publishes 6G Security and Resilience Principles
🕵️
Webinar Today: Designing an OT SOC for Safety, Reliability, and Business Continuity
🕵️
Google Plans Two-Week Release Schedule for Chrome
🕵️
Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks - Infosecurity Magazine
🕵️
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
🕵️
AI Security Firm JetStream Launches With $34 Million in Seed Funding
🕵️
Threat actors weaponize OAuth redirection logic to deliver malware - Help Net Security
🕵️
How to Identify a Phishing Website
🕵️
What are You Working on Wednesday
🕵️
Hacker Conversations: Inti De Ceukelaire, Raging Against the Machine Creatively
🕵️
Weird server requests
🕵️
Who’s Really in Control of AI?
🕵️
Zurich Acquires Beazley in $11 Billion Deal to Lead Cyberinsurance
🕵️
MY TAKE: ChatGPT is turning into Microsoft Office — and power users are paying the price
🕵️
Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale
🕵️
Revolutionizing Linux Maintenance with Update Scripts
🕵️
Phishing Simulation: How It Works to Reduce Risk
🕵️
Hacker mass-mails HungerRush extortion emails to restaurant patrons
🕵️
Tycoon 2FA Phishing Platform Dismantled in Global Takedown
🕵️
The 10-hour problem: How visibility gaps are burning out the SOC
🕵️
TurboTax SMS Scam
🕵️
Protecting education: How MDR can tip the balance in favor of schools
📡
New RFP Template for AI Usage Control and AI Governance
📡
What a browser-in-the-browser attack is, and how to spot a fake login window | Kaspersky official blog
📡
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
📡
Fake LastPass support email threads try to steal vault passwords
📡
Windows 10 KB5075039 update fixes broken Recovery Environment
📡
Bitwarden adds support for passkey login on Windows 11
🚨
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-21385 Qualcomm Multiple Chipsets Memory Corruption Vulnerability CVE-2026-22719 Broadcom VMware Aria Operations Command Injection Vulne…
KEV
🚨
CISA flags VMware Aria Operations RCE flaw as exploited in attacksThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a VMware Aria Operations vulnerability tracked as CVE-2026-22719 to its Known Exploited Vulnerabilities catalog, flagging the flaw as exploited in attacks. [...]
KEV
🐛
Chrome Gemini Vulnerability Lets Attackers Access Victims’ Camera and Microphone Remotely
🐛
Angular i18n Flaw Lets Hackers Execute Malicious Code via Critical XSS Vulnerability
🐛
Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited
KEV
🐛
MS-Agent Vulnerability Exposes AI Agents to Remote Hijacking, Granting Full System Control
🐛
CVE-2026-23217 riscv: trace: fix snapshot deadlock with sbi ecall
🐛
CVE-2026-1979 mruby JMPNOT-to-JMPIF Optimization vm.c mrb_vm_exec use after free
🐛
HPE AutoPass Vulnerability Allows Remote Attackers to Bypass Authentication
🐛
Zerobot Malware Exploits Tenda Command Injection Vulnerabilities to Deploy Malicious Payloads
🐛
APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday
🐛
Bruteforce Scans for CrushFTP , (Tue, Mar 3rd)
KEV
🐛
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
🐛
ZDI-26-150: Docker Desktop for Mac Docker Model Runner Exposed Dangerous Function Denial-of-Service Vulnerability
🐛
ZDI-26-149: Trend Micro Cleaner One Pro Link Following Denial-of-Service Vulnerability
🐛
ZDI-26-148: Trend Micro Apex Central Improper Authentication Privilege Escalation Vulnerability
🐛
ZDI-26-147: Trend Micro Apex Central Improper Authentication Privilege Escalation Vulnerability
🐛
ZDI-26-146: Trend Micro Apex Central Manual Update Server-Side Request Forgery Vulnerability
🐛
ZDI-26-145: Trend Micro Apex Central Scheduled Update Server-Side Request Forgery Vulnerability
🐛
ZDI-26-144: Trend Micro Apex Central Hub Server Server-Side Request Forgery Vulnerability
🐛
ZDI-26-143: Trend Micro Apex One Security Agent TmSelfProtect Origin Validation Error Local Privilege Escalation Vulnerability
🐛
ZDI-26-142: Trend Micro Apex One Security Agent Cache Mechanism Time-Of-Check Time-Of-Use Local Privilege Escalation Vulnerability
🐛
ZDI-26-141: Trend Micro Apex One Security Agent iCore Service Signature Verification Time-Of-Check Time-Of-Use Local Privilege Escalation Vulnerability
🐛
ZDI-26-140: Trend Micro Apex One Origin Validation Error Local Privilege Escalation Vulnerability
🐛
ZDI-26-139: Trend Micro Apex One Security Agent iCore Service Origin Validation Error Local Privilege Escalation Vulnerability
🐛
ZDI-26-138: Trend Micro Apex One Virus Scan Engine Link Following Local Privilege Escalation Vulnerability
🐛
ZDI-26-137: Trend Micro Apex One Console Directory Traversal Remote Code Execution Vulnerability
🐛
ZDI-26-136: Trend Micro Apex One Console Directory Traversal Remote Code Execution Vulnerability
🐛
ZDI-26-135: LangChain LangGraph BaseCache Deserialization of Untrusted Data Remote Code Execution Vulnerability
🐛
ZDI-26-134: Hewlett Packard Enterprise AutoPass License Server Authentication Bypass Vulnerability
🐛
ZDI-26-133: (Pwn2Own) Music Assistant _update_library_item External Control of File Path Remote Code Execution Vulnerability
⚠️
Cyberattackers Exploit OpenVSX Aqua Trivy with Malicious AI Prompts to Hijack Coding Tools
⚠️
Android Security Update Fixes 129 Flaws and Tackles Actively Exploited Zero-Day Flaw
KEV
⚠️
Google Chrome Introduces Merkle Tree Certificates to Protect HTTPS from Quantum Attacks
⚠️
Hackerbot-Claw Bot Exploits GitHub Actions CI/CD Flaw to Attack Microsoft and DataDog
⚠️
7 factors impacting the cyber skills gap
⚠️
171: Melody Fraud
⚠️
Android gets patches for Qualcomm zero-day exploited in attacks
KEV
⚠️
Provecho - 712,904 breached accounts
⚠️
Epic Fury introduces new layer of enterprise risk
⚠️
Hackers Exploit Telegram for Initial Access to Corporate VPN, RDP, and Cloud Systems
⚠️
Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise
⚠️
Fortinet FortiGate Devices Targeted by CyberStrikeAI, Allowing Hackers to Bypass Security
⚠️
New ‘StegaBin’ Campaign Deploys Multi-Stage Credential Stealer via 26 Malicious npm Packages
⚠️
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
⚠️
Malicious “RedAlert - Rocket Alerts” Application Targets Israeli Phone Calls, SMS, and User Information | Cloudflare
⚠️
Android Update Patches Exploited Qualcomm Zero-Day
⚠️
Shannon: Autonomous AI Tool with Nmap Integration Can Uncover and Exploit Security Flaws
⚠️
Vulnerability Allowed Hijacking Chrome's Gemini Live AI Assistant - SecurityWeek
⚠️
Malvertising Actor ‘D-Shortiez’ Exploits WebKit Back-Button Hijack in Forced-Redirect Campaign
⚠️
OAuth phishers make ‘check where the link points’ advice ineffective
⚠️
Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities | CyberScoop
KEV
⚠️
SloppyLemming Espionage Campaign Targets Pakistan, Bangladesh with BurrowShell Backdoor and Rust RAT
⚠️
New ‘AirSnitch’ Attack Shows Wi-Fi Client Isolation Could be a False Sense of Security
⚠️
UK reduces cyberattack fix times from two months to eight days - Help Net Security
⚠️
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
⚠️
Why AppSec Wastes 70% of Its Time
⚠️
Honeywell, Researcher Clash Over Impact of Building Controller Vulnerability
⚠️
Archipelo and Checkmarx Announce Partnership Connecting AppSec Detection with DevSPM
⚠️
Hacked traffic cams and hijacked TVs: How cyber operations supported the war against Iran
⚠️
Iranian Strikes on Amazon Data Centers Highlight Industry’s Vulnerability to Physical Disasters
⚠️
Malicious NPM Packages Target Developers
⚠️
A suite of government hacking tools targeting iPhones is now being used by cybercriminals
⚠️
Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution
⚠️
[webapps] Easy File Sharing Web Server v7.2 - Buffer Overflow
⚠️
2025 FINMA ISAE 3000 Type II attestation report available with 183 services in scope
📢
Jetzt Staats-CISO werden – für unter 160.000 Euro
📢
WatchGuard security advisory (AV26-189)
📢
Qualcomm security advisory – March 2026 monthly rollup (AV26-190)
📢
[Control systems] Mitsubishi Electric security advisory (AV26-191)
📢
Samsung mobile security advisory (AV26-192)
📢
Django security advisory (AV26-193)
📢
Can LLMs Really Prioritize AppSec?
🔥
UH Cancer Center data breach affects nearly 1.2 million people
🔥
Star Citizen game dev discloses breach affecting user data
🔥
Pakistan’s Top News Channels Hacked and Hijacked With Anti-Military Messages
🔥
1.2 Million Affected by University of Hawaii Cancer Center Data Breach
🔥
Compromised Site Management Panels are a Hot Item in Cybercrime Markets
🔥
LexisNexis confirms data breach as hackers leak stolen files
🔥
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
🔥
Paint maker giant AkzoNobel confirms cyberattack on U.S. site
🔥
Latin America's Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence
🕵️
Google quantum-proofs HTTPS by squeezing 15kB of data into 700-byte space
🕵️
ISC Stormcast For Tuesday, March 3rd, 2026 https://isc.sans.edu/podcastdetail/9832, (Tue, Mar 3rd)
🕵️
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
🕵️
AuraStealer Infostealer Targeting Users with 48 C2 Domains in Ongoing Campaigns
🕵️
Malvertising Campaign Spreads AMOS ‘malext’ macOS Infostealer via Fake Text-Sharing Ads
🕵️
Researchers Uncover Method to Track Cars via Tire Sensors
🕵️
Studie: Hacker legen Betrieb bei vielen Unternehmen lahm
🕵️
Epic Fury Cyber Shock: Iran’s Internet Down, Hacktivists Hit Back
🕵️
Modern AppSec that keeps pace with AI development - James Wickett - ASW #372
🕵️
On Moltbook
🕵️
Iran Cyber Front: Hacktivist Activity Rises, but State-Sponsored Attacks Stay Low
🕵️
New Starkiller Phishing Framework Uses Real Login Pages to Bypass MFA Security
🕵️
North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT
🕵️
How Risky is Sending a Sensitive Work Email to the Wrong Person?
🕵️
Quantum Decryption of RSA is Much Closer than Expected
🕵️
CyberheistNews Vol 16 #09 Fake Video Meeting Invites Trick Users Into Installing RMM Tools
🕵️
Geekery: Bookending the COROS Security Debacle of 2025
🕵️
Fig Security Launches With $38 Million to Bolster SecOps Resilience
🕵️
The Banality of AI (Hallucination → Bomb School?)
🕵️
LLMs can unmask pseudonymous users at scale with surprising accuracy
🕵️
North Korea, DOJ, APT 28, Anthropic, OpenClaw, Supply Chain, Josh Marpet, and More - SWN #560
🕵️
Signed malware impersonating workplace apps deploys RMM backdoors
🌐
SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains
🌐
Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
🌐
Microsoft: Hackers abuse OAuth error flows to spread malware
📡
CISOs in a Pinch: A Security Analysis of OpenClaw
📡
Amazon: Drone strikes damaged AWS data centers in Middle East
📡
With developer verification, Google's Apple envy threatens to dismantle Android's open legacy
📡
AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged
📡
Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow
📡
Fig Security emerges from stealth with $38M to help security teams deal with change
📡
Weekly Threat Bulletin – March 4th, 2026
📡
Avira: Deserialize, Delete and Escalate - The Proper Way to Use an AV
📡
They seized $4.8m in crypto… then gave the master key to the internet
📡
AI assistant in Kaspersky Container Security
📡
Google Chrome shifts to two-week release cycle for increased stability
📡
Facebook accounts unavailable in worldwide outage
📡
Claude Code Security set the Cybersecurity Stocks on Fire - Here's the Signal in the Smoke
📡
[webapps] WordPress Backup Migration 1.3.7 - Remote Command Execution
📡
[webapps] mailcow 2025-01a - Host Header Password Reset Poisoning
📡
[webapps] WeGIA 3.5.0 - SQL Injection
📡
[webapps] Boss Mini v1.4.0 - Local File Inclusion (LFI)
📡
How Cloudy translates complex security into human action
📡
From reactive to proactive: closing the phishing gap with LLMs
🚨
Vulnerability Report - February 2026submitted by cm0002 to cybersecurity 1 points | 0 comments https://www.vulnerability-lookup.org/2026/03/02/vulnerability-report-february-2026/ Introduction This vulnerability report has been generated using data aggregated on Vulnerability-Lookup , with contributions from the pla…
KEV
🐛
Angular SSR Flaw Enables Unauthorized Server-Side Requests in Web Apps
🐛
APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday
🐛
Langflow CSV Agent Flaw Could Let Attackers Execute Arbitrary Code
🐛
OneUptime Command Injection Vulnerability Poses Major Risk of Full System Takeover
🐛
Proof-of-Concept Released for Windows ALPC Privilege Escalation via Error Reporting
🐛
MSHTML Zero-Day in Windows Exploited by APT28 Prior to Feb 2026 Security Update
KEV
🐛
CVE-2026-3102: macOS ExifTool image-processing vulnerability | Kaspersky official blog
🐛
New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel
🐛
VU#431821: MS-Agent does not properly sanitize commands sent to its shell tool, allowing for RCE
⚠️
OpenClaw 0-Click Flaw Lets Malicious Websites Hijack Developer AI Agents
⚠️
Pixel Perfect Browser Extension Exploited for Stealth Script Injection and Security Header Stripping
⚠️
How CISOs can build a resilient workforce
⚠️
CISA Leadership Shakeup, OpenClaw Hijack, Robot Vacuums and More
⚠️
Middle East AWS Outage Sends Shockwaves Through Cloud Infrastructure Service
⚠️
CISA Alerts on RESURGE Malware Exploiting Ivanti Connect Secure Zero-Days
⚠️
Hackers Launch Massive SonicWall Firewall Attack Using 4,000+ IP Addresses
⚠️
North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT
⚠️
Project Compass Operation Cracks Down on “The Com” Cybercrime Collective – 30 Arrested, 179 Suspects Identified
⚠️
A scorecard for cyber and risk culture
⚠️
Innovation without exposure: A CISO’s secure-by-design framework for business outcomes
⚠️
GTFire Phishing Campaign Exploits Google Services to Bypass Detection and Harvest Credentials
⚠️
UXSS Vulnerability in DuckDuckGo Browser’s AutoConsent JS Bridge Allows Cross-Origin Attacks
⚠️
TPMS Flaw in Toyota, Mercedes, and Other Major Brands Enables Covert Vehicle Tracking
⚠️
⚡ Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More
⚠️
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
⚠️
hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions
⚠️
Vulnerability Allowed Hijacking Chrome’s Gemini Live AI Assistant
⚠️
Vulnerability monitoring service secures public-sector websites faster
⚠️
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
⚠️
CyberStrikeAI tool adopted by hackers for AI-powered attacks
📢
OT Security/business resilience, lack of incentives for securing software & the news - ESW #448
📢
Nick Andersen Appointed Acting Director of CISA
📢
CISA warns that RESURGE malware can be dormant on Ivanti devices
📢
UK warns of Iranian cyberattack risks amid Middle-East conflict
📢
IBM security advisory (AV26-180)
📢
Ubuntu security advisory (AV26-182)
📢
Dell security advisory (AV26-181)
📢
[Control systems] CISA ICS security advisories (AV26–183)
📢
Red Hat security advisory (AV26-184)
📢
VMware security advisory (AV26-186)
📢
HPE security advisory (AV26-185)
📢
Veeam security advisory (AV26-188)
📢
Android security advisory – March 2026 monthly rollup (AV26-187)
🔥
KomikoAI - 1,060,191 breached accounts
🔥
Israel hacked BadeSaba, a popular Iranian prayer app with 5M+ installs on Google Play, to send messages urging Iranian military personnel to defect
🔥
Israel hacked BadeSaba, a popular Iranian prayer app with 5M+ installs on Google Play, to send messages urging Iranian military personnel to defect
🔥
Quitbro - 22,874 breached accounts
🔥
Prayer App Used by Millions Hacked to Broadcast Defection Messages Amid U.S.-Israel Strikes on Iran
🔥
Weekly Update 493
🔥
Hacker erpressen weniger Lösegeld
🔥
Lovora - 495,556 breached accounts
🔥
GUEST ESSAY: Real cyber risks arise when small flaws combine and alerts are viewed in isolation
🔥
US-Israel and Iran Trade Cyberattacks: Pro-West Hacks Cause Disruption as Tehran Retaliates
🔥
Canadian Tire Data Breach Impacts 38 Million Accounts - SecurityWeek
🔥
900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
🔥
Hackers Weaponize Claude Code in Mexican Government Cyberattack - SecurityWeek
🔥
Madison Square Garden Data Breach Confirmed Months After Hacker Attack
🔥
When the Worst Actually Happens
🔥
Hacktivists claim to have hacked Homeland Security to release ICE contract data
🕵️
ISC Stormcast For Monday, March 2nd, 2026 https://isc.sans.edu/podcastdetail/9830, (Mon, Mar 2nd)
🕵️
OCRFix Botnet Uses ClickFix Phishing and EtherHiding to Mask Blockchain C2 Infrastructure
🕵️
Quick Howto: ZIP Files Inside RTF, (Mon, Mar 2nd)
🕵️
Wireshark 4.6.4 Released, (Mon, Mar 2nd)
🕵️
Google Working Towards Quantum-Safe Chrome HTTPS Certificates
🕵️
North Korean APT Targets Air-Gapped Systems in Recent Campaign
🕵️
LLM-Assisted Deanonymization
🕵️
Hackers Use 1Campaign to Hide Malicious Ads From Google Reviewers
🕵️
AWS Expands Security Hub Into a Cross-Domain Security Platform
🕵️
The Case for Behavioral AI in Legal Email Security
🕵️
ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
🕵️
Mentorship Monday - Discussions for career and learning!
🕵️
Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat
🕵️
Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome
🕵️
An App That Detects Smart Glasses
🕵️
OAuth redirection abuse enables phishing and malware delivery
🕵️
News alert: DDoS attacks surge 75% in 2025; Link11 says attacks now sustained, not sporadic
🕵️
Why Service Providers Must Become Secure AI Factories
🌐
Cyber threat bulletin: Iranian Cyber Threat Response to US/Israel strikes, February 2026
📡
Im Fokus: RZ-Modernisierung
📡
Anthropic confirms Claude is down in a worldwide outage
📡
How to Protect Your SaaS from Bot Attacks with SafeLine WAF
📡
Hackers and internet outages hit Iran amid U.S. air strikes
📡
How Deepfakes and Injection Attacks Are Breaking Identity Verification
📡
Florida woman imprisoned for massive Microsoft license fraud scheme
📡
Alabama man pleads guilty to hacking, extorting hundreds of women
📡
Fake Google Security site uses PWA app to steal credentials, MFA codes
📡
A new app alerts you if someone nearby is wearing smart glasses
🐛
CVE-2026-28417 Vim has OS Command Injection in netrw
🐛
CVE-2026-28421 Vim has a heap-buffer-overflow and a segmentation fault
🐛
CVE-2026-28418 Vim has Heap-based Buffer Overflow in Emacs tags parsing
🐛
CVE-2026-28419 Vim has Heap-based Buffer Underflow in Emacs tags parsing
🐛
CVE-2026-28422 Vim has stack-buffer-overflow in build_stl_str_hl()
🐛
CVE-2026-28420 Vim has Heap-based Buffer Overflow and OOB Read in :terminal
⚠️
Hackers Weaponize Claude Code in Mexican Government Cyberattack
⚠️
ClawJacked attack let malicious websites hijack OpenClaw to steal data
📡
Samsung TVs to stop collecting Texans’ data without express consent
📡
Let’s explore the best alternatives to Discord
🐛
CVE-2025-40082 hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()
🐛
CVE-2023-54207 HID: uclogic: Correct devm device reference for hidinput input_dev name
🐛
CVE-2025-68340 team: Move team device type change at the end of team_port_add
🐛
CVE-2025-71147 KEYS: trusted: Fix a memory leak in tpm2_load_cmd
🐛
CVE-2025-71152 net: dsa: properly keep track of conduit reference
🐛
CVE-2025-71154 net: usb: rtl8150: fix memory leak on usb_submit_urb() failure
🐛
CVE-2025-71160 netfilter: nf_tables: avoid chain re-validation if possible
🐛
CVE-2025-71161 dm-verity: disable recursive forward error correction
🐛
CVE-2025-71163 dmaengine: idxd: fix device leaks on compat bind and unbind
🐛
CVE-2026-22976 net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset
🐛
CVE-2026-22977 net: sock: fix hardened usercopy panic in sock_recv_errqueue
🐛
CVE-2026-22978 wifi: avoid kernel-infoleak from struct iw_point
🐛
CVE-2026-22992 libceph: return the handler error from mon_handle_auth_done()
🐛
CVE-2026-22996 net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv
🐛
CVE-2026-22997 net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon receiving the second rts
🐛
CVE-2026-22998 nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec
🐛
CVE-2025-71150 ksmbd: Fix refcount leak when invalid session is found on session lookup
🐛
CVE-2025-71162 dmaengine: tegra-adma: Fix use-after-free
🐛
CVE-2026-22979 net: fix memory leak in skb_segment_list for GRO packets
🐛
CVE-2026-22980 nfsd: provide locking for v4_end_grace
🐛
CVE-2026-22982 net: mscc: ocelot: Fix crash when adding interface under a lag
🐛
CVE-2026-22984 libceph: prevent potential out-of-bounds reads in handle_auth_done()
🐛
CVE-2026-22990 libceph: replace overzealous BUG_ON in osdmap_apply_incremental()
🐛
CVE-2026-22991 libceph: make free_choose_arg_map() resilient to partial allocation
🐛
CVE-2026-22999 net/sched: sch_qfq: do not free existing class in qfq_change_class()
🐛
CVE-2026-23212 bonding: annotate data-races around slave->last_rx
🐛
CVE-2026-23220 ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths
🐛
CVE-2025-71232 scsi: qla2xxx: Free sp in error path to fix system crash
🐛
CVE-2026-28364 In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.
🐛
CVE-2026-23216 scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()
🐛
CVE-2026-23222 crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly
🐛
CVE-2026-23228 smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()
🐛
CVE-2025-71235 scsi: qla2xxx: Delay module unload while fabric scan in progress
🐛
CVE-2025-71229 wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()
🐛
CVE-2025-71237 nilfs2: Fix potential block overflow that cause system hang
⚠️
Cybersecurity Today Weekend with Carey Frey, VP and Chief Security Officer at TELUS
⚠️
Hackers Exploit Windows File Explorer and WebDAV to Distribute Malware
⚠️
Who is the Kimwolf Botmaster “Dort”?
⚠️
ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
📢
Compliant or Facing Federal Fines
📢
This month in security with Tony Anscombe – February 2026 edition
🔥
Canadian Tire Data Breach Impacts 38 Million Accounts
🔥
QuickLens Chrome extension steals crypto, shows ClickFix attack
🕵️
Trump Bans Anthropic AI in Federal Agencies Amid Growing Security Concerns
🕵️
Fake Zoom and Google Meet Phishing Campaigns Deploy Teramind Surveillance Software
🕵️
MY TAKE: The Pentagon punished Anthropic for red lines it accepted from OpenAI hours later
🌐
Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute
📡
India disrupts access to popular developer platform Supabase with blocking order
📡
Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement
📡
$4.8M in crypto stolen after Korean tax agency exposes wallet seed
🐛
Cisco SD-WAN Bug Actively Exploited
KEV
🐛
AL26-004 - Critical vulnerability affecting Cisco Catalyst SD-WAN - CVE-2026-20127
🐛
AL26-003 - Vulnerability affecting BeyondTrust - CVE-2026-1731
🐛
Juniper Networks PTX Routers Affected by Critical Vulnerability
🐛
CVE-2026-27571 nats-server websockets are vulnerable to pre-auth memory DoS
🐛
CVE-2026-21620 TFTP Path Traversal
🐛
CVE-2026-27965 Vitess users with backup storage access can gain unauthorized access to production deployment environments
🐛
CVE-2026-27969 Vitess users with backup storage access can write to arbitrary file paths on restore
🐛
CVE-2025-69873 ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., "^(a|a)*$") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with $data: true for dynamic schema validation.
🐛
Stored XSS Vulnerability in RustFS Console Puts S3 Admin Credentials at Risk
🐛
FreeBSD Vulnerabilities Enable Attackers to Crash Entire System
🐛
Your personal OpenClaw agent may also be taking orders from malicious websites
🐛
CISA warns that RESURGE malware can be dormant on Ivanti devices
🐛
Security hole could let hackers take over Juniper Networks PTX core routers
⚠️
900 Sangoma FreePBX Instances Infected With Web Shells
⚠️
Researchers Unveil Aeternum C2 Infrastructure with Advanced Evasion and Persistence Tactics
⚠️
Critical Trend Micro Apex One Vulnerabilities Allow Remote Malicious Code Execution
⚠️
Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor in Developer Environments
⚠️
Infostealers Drive Massive Brute-Force Attacks on Corporate SSO Gateways with Stolen Credentials
⚠️
US authorities punish sellers of malware and spyware
⚠️
Why application security must start at the load balancer
⚠️
How to make LLMs a defensive advantage without creating a new attack surface
⚠️
Ransomware groups switch to stealthy attacks and long-term access
⚠️
Hacker kompromittieren immer schneller
⚠️
Trend Micro warns of critical Apex One code execution flaws
⚠️
Third-Party Patching and the Business Footprint We All Share
⚠️
Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor
⚠️
Cultivating a robust and efficient quantum-safe HTTPS
⚠️
900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
⚠️
‘Silent’ Google API key change exposed Gemini AI data
⚠️
Friday Squid Blogging: Squid Fishing in Peru
⚠️
Open Source Risk Is Exploding
📢
Why Tehran’s Two-Tiered Internet Is So Dangerous
📢
n8n security advisory (AV26-176)
📢
Drupal security advisory (AV26-175)
📢
ServiceNow security advisory (AV26-174)
📢
VMware security advisory (AV26-173)
📢
Juniper Networks security advisory (AV26-172)
📢
Cisco security advisory (AV26-166) – Update 1
📢
JetBrains security advisory (AV26-171)
📢
GitLab security advisory (AV26-170)
📢
AMD security advisory (AV26-169)
📢
Trend Micro security advisory (AV26-168)
📢
Zyxel security advisory (AV26-167)
📢
SolarWinds security advisory (AV26-165)
📢
HPE security advisory (AV26-164)
📢
[Control systems] ABB security advisory (AV26-163)
📢
VMware security advisory (AV26-162)
📢
SonicWall security advisory (AV26-161)
📢
Mozilla security advisory (AV26-160)
📢
Google Chrome security advisory (AV26-159)
📢
Docker security advisory (AV26–158)
📢
HPE security advisory (AV26-157)
📢
Dell security advisory (AV26-156)
📢
Microsoft Edge security advisory (AV26-155)
📢
Ubuntu security advisory (AV26-154)
📢
Red Hat security advisory (AV26-153)
📢
IBM security advisory (AV26-152)
📢
[Control systems] CISA ICS security advisories (AV26–151)
📢
HPE security advisory (AV26-150)
📢
Tenable security advisory (AV26-149)
📢
IceWarp security advisory (AV26-148)
📢
Splunk security advisory (AV26-147)
📢
GitHub security advisory (AV26-146)
📢
Google Chrome security advisory (AV26-145)
📢
F5 security advisory (AV26-144)
📢
Dell security advisory (AV26-138) – Update 1
📢
Microsoft Edge security advisory (AV26-143)
📢
Jenkins security advisory (AV26-142)
📢
Atlassian security advisory (AV26-141)
📢
[Control systems] ABB security advisory (AV26-140)
📢
HPE security advisory (AV26-139)
📢
Google Chrome security advisory (AV26-130) - Update 1
📢
Tenable security advisory (AV26-137)
📢
Mozilla security advisory (AV26-136)
📢
Red Hat security advisory (AV26-135)
📢
[Control systems] CISA ICS security advisories (AV26-134)
📢
Ubuntu security advisory (AV26-133)
📢
Dell security advisory (AV26-132)
📢
IBM security advisory (AV26-131)
📢
Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking
📢
Vshell Gains Popularity Among Cybercriminals as Cobalt Strike Alternative
📢
One of the ‘most influential cybersecurity’ roles will pay under $175,000
📢
In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators
📢
CISA replaces acting director after a bumbling year on the job
📢
VMware security advisory (AV26-178)
📢
Microsoft Edge security advisory (AV26-177)
📢
FreeBSD security advisory (AV26-179)
🔥
Cyber incident reporting guidelines: Key information sharing requirements – ITSM.00.140
🔥
Cyber Centre releases Ransomware Threat Outlook 2025 to 2027
🔥
Ransomware playbook (ITSM.00.099)
🔥
Ransomware Threat Outlook 2025-2027
🔥
What to do when your organization has been compromised by a cyber attack (ITSAP.00.009)
🔥
Developing your incident response plan (ITSAP.40.003)
🔥
Developing your business continuity plan (ITSAP.10.005)
🔥
38 Million Allegedly Impacted by ManoMano Data Breach
🔥
ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks
🔥
1 Million Records from Dutch Telco Odido Leaked Online in Massive Data Breach
🔥
UFP Technologies discloses data breach after cybersecurity incident | brief | SC Media
🔥
European DYI chain ManoMano data breach impacts 38 million customers
🔥
Ransomware payment rate drops to record low as attacks surge
🔥
APT37 hackers use new malware to breach air-gapped networks
🕵️
Phishing Attacks Against People Seeking Programming Jobs
🕵️
Chilean Carding Shop Operator Extradited to US
🕵️
Anthropic Refuses to Bend to Pentagon on AI Safeguards as Dispute Nears Deadline
🕵️
Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience
🕵️
Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
🕵️
ISC Stormcast For Friday, February 27th, 2026 https://isc.sans.edu/podcastdetail/9828, (Fri, Feb 27th)
🕵️
Study Finds 87% of Organizations Exposed to Attacks Due to Known Vulnerabilities
🕵️
Dohdoor Malware Targets U.S. Schools and Healthcare with Multi-Stage Attack
🕵️
Vshell: A Chinese-Language Alternative to Cobalt Strike  - Censys
🕵️
Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens
🕵️
Hacking group begins leaking customer data in Dutch telecom Odido hack
🕵️
Critical Juniper Networks PTX flaw allows full router takeover
🕵️
Google API Keys Weren't Secrets. But then Gemini Changed the Rules. ◆ Truffle Security Co.
🕵️
The Rise of Kratos: How the New Phishing-as-a-Service Kit Industrializes Cybercrime
🕵️
Don’t Let AI Make Passwords
🕵️
Common Facebook Scam Method
🕵️
Trump Orders All Federal Agencies to Phase Out Use of Anthropic Technology
🕵️
Brainstorm, SonicWall, Junos, Glienicke Brücke, Burger King, Claude, Josh Marpet - SWN #559
🌐
Joint guidance on malicious cyber threats to SD-WAN networks
🌐
CSE calls on Canadian organizations and critical infrastructure providers to strengthen defences on fourth anniversary of Russia’s invasion of Ukraine
🌐
The cyber threat to marine transportation
🌐
Fake Fedex Email Delivers Donuts&#x21;, (Fri, Feb 27th)
📡
Security considerations for SIMs (ITSAP.10.021)
📡
GeekWeek 11
📡
Spotting malicious email messages (ITSAP.00.100)
📡
Cyber security considerations for drone use (ITSAP.00.143)
📡
Developing your IT recovery plan (ITSAP.40.004)
📡
Improving cyber security resilience through emergency preparedness planning (ITSM.10.014)
📡
Joint guidance on secure connectivity principles for operational technology
📡
Ukrainian man pleads guilty to running AI-powered fake ID site
📡
Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams
📡
Enterprise Spotlight: Data Center Modernization
📡
Local KTAE and the IDA Pro plugin | Kaspersky official blog
📡
Europol-led crackdown on The Com hackers leads to 30 arrests
📡
DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams
📡
Microsoft testing Windows 11 batch file security improvements
📡
Mobile app permissions (still) matter more than you may think
📡
Bringing more transparency to post-quantum usage, encrypted messaging, and routing security
🐛
Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access
🐛
Chromium: CVE-2026-3063 Inappropriate implementation in DevTools
🐛
Chromium: CVE-2026-3062 Out of bounds read and write in Tint
🐛
Chromium: CVE-2026-3061 Out of bounds read in Media
🐛
CVE-2026-23229 crypto: virtio - Add spinlock protection with virtqueue notification
🐛
CVE-2025-71230 hfs: ensure sb->s_fs_info is always cleaned up
🐛
CVE-2026-23224 erofs: fix UAF issue for file-backed mounts w/ directio option
🐛
CVE-2025-67733 Valkey Affected by RESP Protocol Injection via Lua error_reply
🐛
CVE-2026-21863 Malformed Valkey Cluster bus message can lead to Remote DoS
🐛
CVE-2025-62878 Local Path Provisioner vulnerable to Path Traversal via parameters.pathPattern
🐛
CVE-2026-23223 xfs: fix UAF in xchk_btree_check_block_owner
🐛
CVE-2026-23225 sched/mmcid: Don't assume CID is CPU owned on mode switch
🐛
CVE-2025-61143 libtiff up to v4.7.1 was discovered to contain a NULL pointer dereference via the component libtiff/tif_open.c.
🐛
CVE-2025-61144 libtiff up to v4.7.1 was discovered to contain a stack overflow via the readSeparateStripsIntoBuffer function.
🐛
CVE-2025-61145 libtiff up to v4.7.1 was discovered to contain a double free via the component tools/tiffcrop.c.
🐛
CVE-2025-11563 wcurl path traversal with percent-encoded slashes
🐛
CVE-2021-20225 A flaw was found in grub2 in versions prior to 2.06. The option parser allows an attacker to write past the end of a heap-allocated buffer by calling certain commands with a large number of specific short forms of options. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
🐛
CVE-2021-20233 A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the menu rendering code performs a length calculation on the assumption that expressing a quoted single quote will require 3 characters while it actually requires 4 characters which allows an attacker to corrupt memory by one byte for each quote in the input. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
🐛
CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability
⚠️
Multiple Vulnerabilities in Cisco Catalyst SD-WAN Products Could Allow for Authentication Bypass
⚠️
Trend Micro warns of critical Apex One code execution flaws
⚠️
Critical Juniper Networks PTX flaw allows full router takeover
⚠️
Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown
⚠️
Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens
⚠️
Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023
⚠️
China-linked hackers used Google Sheets to spy on telecoms and governments across 42 countries
⚠️
The farmers and the mercenaries: Rethinking the ‘human layer’ in security
⚠️
5 trends that should top CISO’s RSA 2026 agendas
⚠️
Steaelite RAT combines data theft and ransomware management capability in one tool
⚠️
Nuke Docker From Orbit?
⚠️
How Russia is intercepting communications from European satellites
⚠️
Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023
⚠️
Zyxel warns of critical RCE flaw affecting over a dozen routers
⚠️
Intego X9: Why your macOS antivirus should not trust PIDs
⚠️
A Deep Dive into the GetProcessHandleFromHwnd API
📋
ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories
📢
CISA Issues Updated RESURGE Malware Analysis Highlighting a Stealthy but Active Threat
📢
AI Is Taking Over Cybersecurity - PSW #915
📢
Google disrupts Chinese-linked group UNC2814, which breached 53+ organizations across 42 countries and utilized Google Sheets to manage targeting and data theft
📢
Google disrupts Chinese-linked group UNC2814, which breached 53+ organizations across 42 countries and utilized Google Sheets to manage targeting and data theft
📢
Google disrupts Chinese-linked group UNC2814, which breached 53+ organizations across 42 countries and utilized Google Sheets to manage targeting and data theft
🔥
European DYI chain ManoMano data breach impacts 38 million customers
🔥
Olympique Marseille confirms 'attempted' cyberattack after data leak
🔥
Ransomware payment rate drops to record low as attacks surge
🔥
Expert Recommends: Prepare for PQC Right Now
🔥
Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware
🔥
Your staff are your biggest security risk: AI is making it worse
🔥
Notorious ransomware gang allegedly blackmailed by fake FSB officer
🔥
Smashing Security podcast #456: How to lose friends and DDoS people
🔥
Odido - 688,102 breached accounts
🔥
Cost of Insider Incidents Surges 20% to Nearly $20m - Infosecurity Magazine
🕵️
LLMs Generate Predictable Passwords
🕵️
Apple iPhone and iPad Cleared for Classified NATO Use
🕵️
Four Risks Boards Cannot Treat as Background Noise
🕵️
Claude Code Flaws Exposed Developer Devices to Silent Hacking
🕵️
UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor
🕵️
Finding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance &#x5b;Guest Diary&#x5d;, (Tue, Feb 24th)
🕵️
ISC Stormcast For Thursday, February 26th, 2026 https://isc.sans.edu/podcastdetail/9826, (Thu, Feb 26th)
🕵️
Threat modeling AI applications
🕵️
Nation-State Threat Actors Incorporate AI to Streamline Attacks
🕵️
FedRAMP's Role in Risk Management
🕵️
Fake Job Interviews Are Installing Backdoors on Developer Machines
🕵️
Unknown hacker used Claude to steal 150GB of Mexican government data, including 195M taxpayer records, in December 2025 and January 2026
🕵️
Unknown hacker used Claude to steal 150GB of Mexican government data, including 195M taxpayer records, in December 2025 and January 2026
🕵️
Conduent Says Hack Now Affects at Least 25 Million Patients
🕵️
Unknown hacker used Claude to steal 150GB of Mexican government data, including 195M taxpayer records, in December 2025 and January 2026
🌐
The CLAIR Model: A Synthesized Conceptual Framework for Mapping Critical Infrastructure Interdependencies &#x5b;Guest Diary&#x5d;, (Wed, Feb 25th)
🌐
Spyware makers sentenced to prison in Greece for wiretapping politicians and journalists
📡
AI Capabilities Are Advancing Faster Than AI Security
📡
Previously harmless Google API keys now expose Gemini AI data
📡
Microsoft expands Windows restore to more enterprise devices
📡
New York sues Valve for promoting illegal gambling via game loot boxes
📡
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
📡
Recorded Future Expands Coverage of Scams and Financial Fraud with Money Mule Intelligence from CYBERA
🚨
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its  Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.  CVE-2022-20775  Cisco Catalyst SD-WAN Path Traversal Vulnerability CVE-2026-20127  Cisco Cat…
KEV
🐛
Discord Finds Age Identification May Have Privacy Concerns
🐛
Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023
KEV
🐛
SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution
🐛
CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability
KEV
🐛
CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisco SD-WAN Systems
KEV
🐛
CVE-2026-27199 Werkzeug safe_join() allows Windows special device names
🐛
CVE-2026-2739 This affects versions of the package bn.js before 5.2.3. Calling maskn(0) on any BN instance corrupts the internal state, causing toString(), divmod(), and other methods to enter an infinite loop, hanging the process indefinitely.
🐛
CVE-2026-26960 node-tar has Arbitrary File Read/Write via Hardlink Target Escape Through Symlink Chain in Extraction
🐛
CVE-2026-27211 Cloud Hypervisor: Host File Exfiltration via QCOW Backing File Abuse
🐛
CVE-2023-53543 vdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check
🐛
Five Eyes issue emergency directive on exploited Cisco SD-WAN zero-day
KEV
🐛
ZDI-26-132: Siemens SINEC NMS Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
🐛
ZDI-26-131: Siemens SINEC NMS Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
🐛
ZDI-26-130: IceWarp collaboration Directory Traversal Information Disclosure Vulnerability
🐛
ZDI-26-129: Socomec DIRIS A-40 HTTP API Authentication Bypass Vulnerability
🐛
ZDI-26-128: (Pwn2Own) Ubiquiti Networks AI Pro Uncaught Exception Denial-of-Service Vulnerability
🐛
ZDI-26-127: (Pwn2Own) Ubiquiti Networks AI Pro Cleartext Transmission Information Disclosure Vulnerability
🐛
ZDI-26-126: (Pwn2Own) Ubiquiti Networks AI Pro Discovery Protocol Missing Encryption Protocol Downgrade Vulnerability
🐛
ZDI-26-125: Docker Desktop grpcfuse Kernel Module Out-Of-Bounds Read Information Disclosure Vulnerability
🐛
ZDI-26-124: claude-hovercraft executeClaudeCode Command Injection Remote Code Execution Vulnerability
⚠️
Medical device maker UFP Technologies warns of data stolen in cyberattack
⚠️
The OpenClaw Hype: Analysis of Chatter from Open-Source Deep and Dark Web
⚠️
Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries
⚠️
Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration
⚠️
Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker
⚠️
RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN
⚠️
US cybersecurity agency CISA reportedly in dire shape amid Trump cuts and layoffs
⚠️
Inside the story of the US defense contractor who leaked hacking tools to Russia
⚠️
Staying One Step Ahead: Strengthening Android’s Lead in Scam Protection
⚠️
Microsoft warns of job‑themed repo lures targeting developers with multi‑stage backdoors
⚠️
Boards don’t need cyber metrics — they need risk signals
⚠️
Bake Security In Early
⚠️
VMware Aria Operations Vulnerability Could Allow Remote Code Execution - SecurityWeek
⚠️
Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign
⚠️
mquire: Linux memory forensics without external dependencies
⚠️
Risky Business #826 -- A week of AI mishaps and skulduggery
📢
Immediate Action Required: CISA Issues Emergency Directive to Secure Cisco SD-WAN Systems
📢
Governing AI with Security Fundamentals
📢
Infinite AI Monkeys, Ploutus, Serv-U, Fortinet, Cyberwar, COBOL, NIST, Aaran Leyland - SWN #558
🔥
Poisoning AI Training Data
🔥
Chinese cyberspies breached dozens of telecom firms, govt agencies
🔥
Marquis sues SonicWall over backup breach that led to ransomware attack
🔥
Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware
🔥
Canadian Tire - 38,306,562 breached accounts
🕵️
ISC Stormcast For Wednesday, February 25th, 2026 https://isc.sans.edu/podcastdetail/9824, (Wed, Feb 25th)
🕵️
Google Reports On Adversarial Use of AI in Late 2025
🕵️
News alert: One Identity fills CFO-COO role to strengthen operating discipline amid expansion
🕵️
Ukrainian convicted for helping fake North Korean IT workers
🕵️
The SOC Is Now Agentic — Introducing the Next Evolution of Cortex
🕵️
Variations of the ClickFix | Kaspersky official blog
🕵️
Security as a Business Enabler by Re-envisioning Risk and Leading through Uncertainty - BSW #436
🕵️
What are You Working on Wednesday
🕵️
Malicious NuGet Package Targets Stripe Developers - Infosecurity Magazine
🕵️
ShinyHunters leak 12.4M CarGurus records after ransom threat
🕵️
Phishing campaign targets freight and logistics orgs in the US, Europe
🌐
Fake Next.js job interview tests backdoor developer's devices
📡
Weekly Threat Bulletin – February 25th, 2026
📡
SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks
📡
Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It
📡
Manual Processes Are Putting National Security at Risk
📡
$10,000 bounty offered if you can hack Ring cameras to stop them sharing your data with Amazon
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-25108 Soliton Systems K.K. FileZen OS Command Injection Vulnerability This type of vulnerability is a frequent attack vector for maliciou…
KEV
⚠️
APT28 Targeted European Entities Using Webhook-Based Macro Malware
⚠️
Celebrating Two Years of CSF 2.0!
⚠️
Open Redirects: A Forgotten Vulnerability&#x3f;, (Tue, Feb 24th)
⚠️
Developer-targeting campaign using malicious Next.js repositories
⚠️
Treasury sanctions Russian zero-day broker accused of buying exploits stolen from US defense contractor
⚠️
News alert: Sendmarc highlights impact of DMARC update on evolving email security standards
⚠️
Helping Users with Practical Advice to Protect their Digital Devices - Runa Sandvik - ASW #371
⚠️
January 2026 CVE Landscape: 23 Critical Vulnerabilities Mark 5% Increase, APT28 Exploits Microsoft Office Zero-Day
KEV
🔥
The Ghost in the Shell: Why Agentic AI is a Corporate Security Nightmare
🔥
Weekly Update 492
🔥
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
🔥
Scaling security operations with Microsoft Defender autonomous defense and expert-led services
🔥
CarGurus data breach affects 12.5 million accounts
🔥
Marquis sues firewall provider SonicWall, alleges security failings with its firewall backup led to ransomware attack
🔥
Conduent data breach grows, affecting at least 25M people
🔥
Preparing for Russia’s New Generation Warfare in Europe
🕵️
Is AI Good for Democracy?
🕵️
UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware
🕵️
ISC Stormcast For Tuesday, February 24th, 2026 https://isc.sans.edu/podcastdetail/9822, (Tue, Feb 24th)
🕵️
Fake Video Meeting Invites Trick Users Into Installing RMM Tools
🕵️
CyberheistNews Vol 16 #08 Do Passwords Need to Be 25+ Characters Due to AI and Quantum Attacks?
🕵️
Introducing the AIDA Orchestration Agent: Always-On Human Risk Management Has Arrived
🕵️
A Joint Vision for Simplified SASE Management at Scale
🕵️
Hidden Risks in Security Defaults
🕵️
Signal vs WhatsApp: Privacy Choice
🌐
UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors
📡
Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem
📡
Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model
📡
Former L3Harris Trenchant boss jailed for selling hacking tools to Russian broker
⚠️
Amazon Kiro Prod Disruption, Claude Code Security, Salt Typhoon Warning, and Youth Radicalization
⚠️
Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
⚠️
Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens
⚠️
VPN flaws allowed Chinese hackers to compromise dozens of Ivanti customers, says report
⚠️
Unseen Devices in Your Network
⚠️
Bringing intelligence to assets, new White House cybersecurity strategy, and the news - ESW #447
⚠️
AI-augmented threat actor accesses FortiGate devices at scale
⚠️
ZDI-26-123: Docker Desktop MCP Server Cleartext Storage of Sensitive Information Vulnerability
📢
On the Security of Password Managers
🕵️
Another day, another malicious JPEG, (Mon, Feb 23rd)
🕵️
ISC Stormcast For Monday, February 23rd, 2026 https://isc.sans.edu/podcastdetail/9820, (Mon, Feb 23rd)
🕵️
AI Is Only as Good as Your Data
🕵️
Mentorship Monday - Discussions for career and learning!
🕵️
We hid backdoors in ~40MB binaries and asked AI + Ghidra to find them
🌐
⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More
🌐
MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP
📡
How Exposed Endpoints Increase Risk Across LLM Infrastructure
📡
Americans are destroying Flock surveillance cameras
📡
5 days left to lock in the lowest TechCrunch Disrupt 2026 ticket rates
📡
Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer
📡
Faking it on the phone: How to tell if a voice call is AI or not
🔥
CarGurus - 12,461,887 breached accounts
🕵️
Integrated Cloud Email Security (ICES) vs Secure Email Gateway (SEG)
📡
6 days left to lock in the lowest TechCrunch Disrupt 2026 rates
🚨
CISA Adds Two Actively Exploited Roundcube Flaws to KEV CatalogThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities in question are listed below …
KEV
🐛
CVE-2021-24119 In Trusted Firmware Mbed TLS 2.24.0, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially Intel SGX.
🐛
CVE-2020-36426 An issue was discovered in Arm Mbed TLS before 2.24.0. mbedtls_x509_crl_parse_der has a buffer over-read (of one byte).
🐛
CVE-2025-21846 acct: perform last write from workqueue
🐛
CVE-2025-21847 ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data()
🐛
CVE-2025-21863 io_uring: prevent opcode speculation
🐛
CVE-2025-29768 Vim vulnerable to potential data loss with zip.vim and special crafted zip files
🐛
CVE-2024-55549 xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue
🐛
CVE-2024-58088 bpf: Fix deadlock when freeing cgroup storage
🐛
CVE-2025-21856 s390/ism: add release function for struct device
🐛
CVE-2025-21866 powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC
🐛
CVE-2025-21861 mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize()
🐛
CVE-2025-1767 This CVE only affects Kubernetes clusters that utilize the in-tree gitRepo volume to clone git repositories from other pods within the same node. Since the in-tree gitRepo volume feature has been deprecated and will not receive security updates upstream, any cluster still using this feature remains vulnerable.
🐛
CVE-2025-21864 tcp: drop secpath at the same time as we currently drop dst
🐛
CVE-2025-2953 PyTorch torch.mkldnn_max_pool2d denial of service
🐛
CVE-2024-8176 Libexpat: expat: improper restriction of xml entity expansion depth in libexpat
🐛
CVE-2025-21839 KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop
🐛
CVE-2025-21855 ibmvnic: Don't reference skb after sending to VIOS
🐛
CVE-2025-68763 crypto: starfive - Correctly handle return of sg_nents_for_len
🐛
CVE-2025-68758 backlight: led-bl: Add devlink to supplier LEDs
🐛
CVE-2025-15444 Crypt::Sodium::XS module versions prior to 0.000042, for Perl, include a vulnerable version of libsodium
🐛
CVE-2025-68771 ocfs2: fix kernel BUG in ocfs2_find_victim_chain
🐛
CVE-2025-68786 ksmbd: skip lock-range check on equal size to avoid size==0 underflow
🐛
CVE-2025-71133 RDMA/irdma: avoid invalid read in irdma_net_event
🐛
CVE-2025-71114 via_wdt: fix critical boot hang due to unnamed resource allocation
🐛
CVE-2025-71109 MIPS: ftrace: Fix memory corruption when kernel is located beyond 32 bits
🐛
CVE-2025-71143 clk: samsung: exynos-clkout: Assign .num before accessing .hws
🐛
CVE-2025-68755 staging: most: remove broken i2c driver
🐛
CVE-2025-13034 No QUIC certificate pinning with GnuTLS
🐛
CVE-2025-14017 broken TLS options for threaded LDAPS
🐛
CVE-2025-15224 libssh key passphrase bypass without agent set
🐛
CVE-2025-14524 bearer token leak on cross-protocol redirect
🐛
CVE-2025-15079 libssh global known_hosts override
🐛
CVE-2025-14819 OpenSSL partial chain store policy bypass
🐛
CVE-2026-21860 Werkzeug safe_join() allows Windows special device names with compound extensions
🐛
CVE-2026-22702 virtualenv Has TOCTOU Vulnerabilities in Directory Creation
🐛
CVE-2025-68823 ublk: fix deadlock when reading partition table
🐛
CVE-2025-68781 usb: phy: fsl-usb: Fix use-after-free in delayed work during device removal
🐛
CVE-2025-68808 media: vidtv: initialize local pointers upon transfer of memory ownership
🐛
CVE-2025-71066 net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change
🐛
CVE-2025-71067 ntfs: set dummy blocksize to read boot_block when mounting
🐛
CVE-2025-68819 media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg()
🐛
CVE-2025-68817 ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency
🐛
CVE-2025-71064 net: hns3: using the num_tqps in the vf driver to apply for resources
🐛
CVE-2025-71081 ASoC: stm32: sai: fix OF node leak on probe
🐛
CVE-2025-71074 functionfs: fix the open/removal races
🐛
CVE-2025-71101 platform/x86: hp-bioscfg: Fix out-of-bounds array access in ACPI package parsing
🐛
CVE-2025-71122 iommufd/selftest: Check for overflow in IOMMU_TEST_OP_ADD_RESERVED
🐛
CVE-2025-71105 f2fs: use global inline_xattr_slab instead of per-sb slab cache
🐛
CVE-2019-14584 Null pointer dereference in Tianocore EDK2
🐛
CVE-2022-22576 An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S) IMAP(S) POP3(S) and LDAP(S) (openldap only).
🐛
CVE-2022-27775 An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.
🐛
CVE-2022-27781 libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server's certificate chain.Due to an erroneous function a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.
🐛
CVE-2022-27782 libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However several TLS andSSH settings were left out from the configuration match checks making themmatch too easily.
🐛
CVE-2022-27774 An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.
🐛
CVE-2022-27779 libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl's "cookie engine" can bebuilt with or without [Public Suffix List](https://publicsuffix.org/)awareness. If PSL support not provided a more rudimentary check exists to atleast prevent cookies from being set on TLDs. This check was broken if thehost name in the URL uses a trailing dot.This can allow arbitrary sites to set cookies that then would get sent to adifferent and unrelated site or domain.
🐛
CVE-2022-27780 The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL making it a *different* URL usingthe wrong host name when it is later retrieved.For example a URL like `http://example.com%2F127.0.0.1/` would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters checks and more.
🐛
CVE-2025-48637 In multiple functions of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
🐛
CVE-2022-24791 Use after free in Wasmtime
🐛
CVE-2022-3996 X.509 Policy Constraints Double Locking
🐛
CVE-2022-3064 Excessive resource consumption in gopkg.in/yaml.v2
🐛
CVE-2022-32207 When curl < 7.84.0 saves cookies alt-svc and hsts data to local files it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation it might accidentally *widen* the permissions for the target file leaving the updated file accessible to more users than intended.
🐛
CVE-2022-32208 When curl < 7.84.0 does FTP transfers secured by krb5 it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.
🐛
CVE-2022-32206 curl < 7.84.0 supports "chained" HTTP compression algorithms meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb" makingcurl end up spending enormous amounts of allocated heap memory or trying toand returning out of memory errors.
🐛
CVE-2023-5824 Squid: dos against http and https
🐛
CVE-2023-46847 Squid: denial of service in http digest authentication
🐛
CVE-2024-53173 NFSv4.0: Fix a use-after-free problem in the asynchronous open()
🐛
CVE-2024-56538 drm: zynqmp_kms: Unplug DRM device before removal
🐛
CVE-2024-56598 jfs: array-index-out-of-bounds fix in dtReadFirst
🐛
CVE-2024-11738 Rustls: rustls network-reachable panic in `acceptor::accept`
🐛
CVE-2024-53208 Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync
🐛
CVE-2024-53186 ksmbd: fix use-after-free in SMB request handling
🐛
CVE-2024-56595 jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
🐛
CVE-2024-47814 use-after-free when closing buffers in Vim
🐛
CVE-2024-49882 ext4: fix double brelse() the buffer of the extents path
🐛
CVE-2024-49954 static_call: Replace pointless WARN_ON() in static_call_module_notify()
🐛
CVE-2024-49959 jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error
🐛
CVE-2024-49965 ocfs2: remove unreasonable unlock in ocfs2_read_blocks
🐛
CVE-2024-49973 r8169: add tally counter fields added with RTL8125
🐛
CVE-2024-50003 drm/amd/display: Fix system hang while resume with TBT monitor
🐛
CVE-2024-50006 ext4: fix i_data_sem unlock order in ext4_ind_migrate()
🐛
CVE-2024-50085 mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow
🐛
CVE-2024-8508 Unbounded name compression could lead to Denial of Service
🐛
CVE-2024-8927 cgi.force_redirect configuration is bypassable due to the environment variable collision
🐛
CVE-2024-9355 Golang-fips: golang fips zeroed buffer
🐛
CVE-2024-49974 NFSD: Limit the number of concurrent async COPY operations
🐛
CVE-2024-49998 net: dsa: improve shutdown sequence
🐛
CVE-2024-50066 mm/mremap: fix move_normal_pmd/retract_page_tables race
🐛
CVE-2024-50073 tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
🐛
CVE-2024-50088 btrfs: fix uninitialized pointer free in add_inode_ref()
🐛
CVE-2024-8926 PHP CGI Parameter Injection Vulnerability (CVE-2024-4577 bypass)
🐛
CVE-2024-45720 Apache Subversion: Command line argument injection on Windows platforms
🐛
CVE-2024-9407 Buildah: podman: improper input validation in bind-propagation option of dockerfile run --mount instruction
🐛
CVE-2024-31227 Denial-of-service due to malformed ACL selectors in Redis
🐛
CVE-2024-31228 Denial-of-service due to unbounded pattern matching in Redis
🐛
CVE-2024-31449 Lua library commands may lead to stack overflow and RCE in Redis
🐛
CVE-2024-47191 pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because in the context of PAM code running as root it mishandles usersfile access such as by calling fchown in the presence of a symlink.
🐛
CVE-2024-47554 Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader
🐛
CVE-2024-49946 ppp: do not assume bh is held in ppp_channel_bridge_input()
🐛
CVE-2024-49950 Bluetooth: L2CAP: Fix uaf in l2cap_connect
🐛
CVE-2024-49955 ACPI: battery: Fix possible crash when unregistering a battery hook
🐛
CVE-2024-49958 ocfs2: reserve space for inline xattr before attaching reflink tree
🐛
CVE-2024-49963 mailbox: bcm2835: Fix timeout during suspend mode
🐛
CVE-2024-50001 net/mlx5: Fix error path in multi-packet WQE transmit
🐛
CVE-2024-50002 static_call: Handle module init failure correctly in static_call_del_module()
🐛
CVE-2024-50005 mac802154: Fix potential RCU dereference issue in mac802154_scan_worker
🐛
CVE-2024-50007 ALSA: asihpi: Fix potential OOB array access
🐛
CVE-2024-50008 wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext()
🐛
CVE-2024-8925 Erroneous parsing of multipart form data
🐛
CVE-2024-9026 PHP-FPM logs from children may be altered
🐛
CVE-2024-9632 Xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability
🐛
CVE-2024-50010 exec: don't WARN for racy path_noexec check
🐛
CVE-2024-50072 x86/bugs: Use code segment selector for VERW operand
🐛
CVE-2024-50084 net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test()
🐛
CVE-2024-9341 Podman: buildah: cri-o: fips crypto-policy directory mounting issue in containers/common go library
🐛
CVE-2024-38667 riscv: prevent pt_regs corruption for secondary idle threads
🐛
CVE-2024-38588 ftrace: Fix possible use-after-free issue in ftrace_location()
🐛
CVE-2024-39291 drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode()
🐛
CVE-2024-44965 x86/mm: Fix pti_clone_pgtable() alignment assumption
🐛
CVE-2024-44991 tcp: prevent concurrent execution of tcp_sk_exit_batch
🐛
CVE-2024-44996 vsock: fix recursive ->recvmsg calls
🐛
CVE-2024-45001 net: mana: Fix RX buf alloc_size alignment and atomic op panic
🐛
CVE-2024-45012 nouveau/firmware: use dma non-coherent allocator
🐛
CVE-2024-45016 netem: fix return value if duplicate enqueue fails
🐛
CVE-2024-45019 net/mlx5e: Take state lock during tx timeout reporter
🐛
CVE-2024-45028 mmc: mmc_test: Fix NULL dereference on allocation failure
🐛
CVE-2024-45030 igb: cope with large MAX_SKB_FRAGS
🐛
CVE-2024-46672 wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion
🐛
CVE-2024-46675 usb: dwc3: core: Prevent USB core invalid event buffer address access
🐛
CVE-2024-46680 Bluetooth: btnxpuart: Fix random crash seen while removing driver
🐛
CVE-2024-46686 smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req()
🐛
CVE-2024-46689 soc: qcom: cmd-db: Map shared memory as WC not WB
🐛
CVE-2024-46693 soc: qcom: pmic_glink: Fix race during initialization
🐛
CVE-2024-46695 selinuxsmack: don't bypass permissions check in inode_setsecctx hook
🐛
CVE-2024-46706 tty: serial: fsl_lpuart: mark last busy before uart_add_one_port
🐛
CVE-2024-46707 KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3
🐛
CVE-2024-46709 drm/vmwgfx: Fix prime with external buffers
🐛
CVE-2024-46720 drm/amdgpu: fix dereference after null check
🐛
CVE-2024-46722 drm/amdgpu: fix mc_data out-of-bounds read warning
🐛
CVE-2024-46726 drm/amd/display: Ensure index calculation will not overflow
🐛
CVE-2024-46728 drm/amd/display: Check index for aux_rd_interval before using
🐛
CVE-2024-46737 nvmet-tcp: fix kernel crash if commands allocation fails
🐛
CVE-2024-46739 uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind
🐛
CVE-2024-46741 misc: fastrpc: Fix double free of 'buf' in error path
🐛
CVE-2024-46742 smb/server: fix potential null-ptr-deref of lease_ctx_info in smb2_open()
🐛
CVE-2024-46746 HID: amd_sfh: free driver_data after destroying hid device
🐛
CVE-2024-46747 HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
🐛
CVE-2024-46756 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
🐛
CVE-2024-46761 pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv
🐛
CVE-2024-46763 fou: Fix null-ptr-deref in GRO.
🐛
CVE-2024-46770 ice: Add netif_device_attach/detach into PF reset flow
🐛
CVE-2024-46781 nilfs2: fix missing cleanup on rollforward recovery error
🐛
CVE-2024-46784 net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup
🐛
CVE-2024-46791 can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open
🐛
CVE-2024-46796 smb: client: fix double put of @cfile in smb2_set_path_size()
🐛
CVE-2024-46798 ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object
🐛
CVE-2024-46802 drm/amd/display: added NULL check at start of dc_validate_stream
🐛
CVE-2024-46804 drm/amd/display: Add array index check for hdcp ddc access
🐛
CVE-2024-46806 drm/amdgpu: Fix the warning division or modulo by zero
🐛
CVE-2024-46809 drm/amd/display: Check BIOS images before it is used
🐛
CVE-2024-46811 drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box
🐛
CVE-2024-46818 drm/amd/display: Check gpio_id before used as array index
🐛
CVE-2024-46821 drm/amd/pm: Fix negative array index read
🐛
CVE-2024-46832 MIPS: cevt-r4k: Don't call get_c0_compare_int if timer irq is installed
🐛
CVE-2024-46836 usb: gadget: aspeed_udc: validate endpoint index for ast udc
🐛
CVE-2024-46840 btrfs: clean up our handling of refs == 0 in snapshot delete
🐛
CVE-2024-46853 spi: nxp-fspi: fix the KASAN report out-of-bounds bug
🐛
CVE-2024-46855 netfilter: nft_socket: fix sk refcount leaks
🐛
CVE-2024-46860 wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change
🐛
CVE-2024-46864 x86/hyperv: fix kexec crash due to VP assist page corruption
🐛
CVE-2024-44949 parisc: fix a possible DMA corruption
🐛
CVE-2024-44963 btrfs: do not BUG_ON() when freeing tree block after error
🐛
CVE-2024-46772 drm/amd/display: Check denominator crb_pipes before used
🐛
CVE-2024-46751 btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info()
🐛
CVE-2024-0133 NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.
🐛
CVE-2024-44947 fuse: Initialize beyond-EOF page contents before setting uptodate
🐛
CVE-2024-44960 usb: gadget: core: Check for unset descriptor
🐛
CVE-2024-44966 binfmt_flat: Fix corruption when not offsetting data start
🐛
CVE-2024-44969 s390/sclp: Prevent release of buffer in I/O
🐛
CVE-2024-45003 vfs: Don't evict inode under the inode lru traversing context
🐛
CVE-2024-45005 KVM: s390: fix validity interception issue when gisa is switched off
🐛
CVE-2024-45011 char: xillybus: Check USB endpoints when probing device
🐛
CVE-2024-45018 netfilter: flowtable: initialise extack before use
🐛
CVE-2024-45020 bpf: Fix a kernel verifier crash in stacksafe()
🐛
CVE-2024-45022 mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0
🐛
CVE-2024-45029 i2c: tegra: Do not mark ACPI devices as irq safe
🐛
CVE-2024-46676 nfc: pn533: Add poll mod list filling check
🐛
CVE-2024-46678 bonding: change ipsec_lock from spin lock to mutex
🐛
CVE-2024-46679 ethtool: check device is present when getting link settings
🐛
CVE-2024-46685 pinctrl: single: fix potential NULL dereference in pcs_get_function()
🐛
CVE-2024-46687 btrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk()
🐛
CVE-2024-46692 firmware: qcom: scm: Mark get_wq_ctx() as atomic call
🐛
CVE-2024-46694 drm/amd/display: avoid using null object of framebuffer
🐛
CVE-2024-46702 thunderbolt: Mark XDomain as unplugged when router is removed
🐛
CVE-2024-46710 drm/vmwgfx: Prevent unmapping active read buffers
🐛
CVE-2024-46711 mptcp: pm: fix ID 0 endp usage after multiple re-creations
🐛
CVE-2024-46719 usb: typec: ucsi: Fix null pointer dereference in trace
🐛
CVE-2024-46721 apparmor: fix possible NULL pointer dereference
🐛
CVE-2024-46723 drm/amdgpu: fix ucode out-of-bounds read warning
🐛
CVE-2024-46724 drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number
🐛
CVE-2024-46725 drm/amdgpu: Fix out-of-bounds write warning
🐛
CVE-2024-46731 drm/amd/pm: fix the Out-of-bounds read warning
🐛
CVE-2024-46732 drm/amd/display: Assign linear_pitch_alignment even for VM
🐛
CVE-2024-46735 ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery()
🐛
CVE-2024-46738 VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
🐛
CVE-2024-46740 binder: fix UAF caused by offsets overwrite
🐛
CVE-2024-46743 of/irq: Prevent device address out-of-bounds read in interrupt map walk
🐛
CVE-2024-46749 Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush()
🐛
CVE-2024-46755 wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id()
🐛
CVE-2024-46757 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
🐛
CVE-2024-46758 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
🐛
CVE-2024-46759 hwmon: (adc128d818) Fix underflows seen when writing limit attributes
🐛
CVE-2024-46760 wifi: rtw88: usb: schedule rx work after everything is set up
🐛
CVE-2024-46762 xen: privcmd: Fix possible access to a freed kirqfd instance
🐛
CVE-2024-46765 ice: protect XDP configuration with a mutex
🐛
CVE-2024-46773 drm/amd/display: Check denominator pbn_div before used
🐛
CVE-2024-46782 ila: call nf_unregister_net_hooks() sooner
🐛
CVE-2024-46786 fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF
🐛
CVE-2024-46795 ksmbd: unset the binding mark of a reused connection
🐛
CVE-2024-46797 powerpc/qspinlock: Fix deadlock in MCS queue
🐛
CVE-2024-46800 sch/netem: fix use after free in netem_dequeue
🐛
CVE-2024-46803 drm/amdkfd: Check debug trap enable before write dbg_ev_file
🐛
CVE-2024-46805 drm/amdgpu: fix the waring dereferencing hive
🐛
CVE-2024-46807 drm/amd/amdgpu: Check tbo resource pointer
🐛
CVE-2024-46810 drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ
🐛
CVE-2024-46814 drm/amd/display: Check msg_id before processing transcation
🐛
CVE-2024-46819 drm/amdgpu: the warning dereferencing obj for nbio_v7_4
🐛
CVE-2024-46822 arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry
🐛
CVE-2024-46829 rtmutex: Drop rt_mutex::wait_lock before scheduling
🐛
CVE-2024-46831 net: microchip: vcap: Fix use-after-free error in kunit test
🐛
CVE-2024-46838 userfaultfd: don't BUG_ON() if khugepaged yanks our page table
🐛
CVE-2024-46843 scsi: ufs: core: Remove SCSI host only if added
🐛
CVE-2024-46844 um: line: always fill *error_out in setup_one_line()
🐛
CVE-2024-46845 tracing/timerlat: Only clear timer if a kthread exists
🐛
CVE-2024-46846 spi: rockchip: Resolve unbalanced runtime PM / system PM handling
🐛
CVE-2024-46847 mm: vmalloc: ensure vmap_block is initialised before adding to queue
🐛
CVE-2024-46848 perf/x86/intel: Limit the period on Haswell
🐛
CVE-2024-46852 dma-buf: heaps: Fix off-by-one in CMA heap fault handler
🐛
CVE-2024-46854 net: dpaa: Pad packets to ETH_ZLEN
🐛
CVE-2024-46859 platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses
🐛
CVE-2024-46861 usbnet: ipheth: do not stop RX on failing RX callback
🐛
CVE-2024-46863 ASoC: Intel: soc-acpi-intel-lnl-match: add missing empty item
🐛
CVE-2024-46841 btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc()
🐛
CVE-2024-44950 serial: sc16is7xx: fix invalid FIFO access with special register set
🐛
CVE-2013-4416 The Ocaml xenstored implementation (oxenstored) in Xen 4.1.x, 4.2.x, and 4.3.x allows local guest domains to cause a denial of service (domain shutdown) via a large message reply.
🐛
CVE-2024-42311 hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()
🐛
CVE-2023-7256 Double-free in libpcap before 1.10.5 with remote packet capture support.
🐛
CVE-2024-43835 virtio_net: Fix napi_skb_cache_put warning
🐛
CVE-2024-43839 bna: adjust 'name' buf size of bna_tcb and bna_ccb structures
🐛
CVE-2024-42308 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
🐛
CVE-2024-43817 net: missing check virtio
🐛
CVE-2024-43871 devres: Fix memory leakage caused by driver API devm_free_percpu()
🐛
CVE-2024-43882 exec: Fix ToCToU between perm check and set-uid/gid usage
🐛
CVE-2024-44944 netfilter: ctnetlink: use helper function to calculate expect ID
🐛
CVE-2024-8006 NULL pointer dereference in libpcap before 1.10.5 with remote packet capture support
🐛
CVE-2024-43834 xdp: fix invalid wait context of page_pool_destroy()
🐛
CVE-2024-42122 drm/amd/display: Add NULL pointer check for kzalloc
🐛
CVE-2023-52920 bpf: support non-r10 register spill/fill to/from stack in precision tracking
🐛
CVE-2024-50131 tracing: Consider the NULL character when validating the event length
🐛
CVE-2024-50130 netfilter: bpf: must hold reference on net namespace
🐛
CVE-2024-26951 wireguard: netlink: check for dangling peer via is_dead instead of empty list
🐛
CVE-2024-26984 nouveau: fix instmem race condition around ptr stores
🐛
CVE-2024-26961 mac802154: fix llsec key resources release in mac802154_llsec_key_del
🐛
CVE-2024-26965 clk: qcom: mmcc-msm8974: fix terminating of frequency table arrays
🐛
CVE-2024-26966 clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays
🐛
CVE-2024-26973 fat: fix uninitialized field in nostale filehandles
🐛
CVE-2024-26993 fs: sysfs: Fix reference leak in sysfs_break_active_protection()
🐛
CVE-2024-27000 serial: mxs-auart: add spinlock around changing cts state
🐛
CVE-2024-32624 HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5T__ref_mem_setnull in H5Tref.c (called from H5T__conv_ref in H5Tconv.c) resulting in the corruption of the instruction pointer.
🐛
CVE-2024-33873 HDF5 Library through 1.14.3 has a heap-based buffer overflow in H5D__scatter_mem in H5Dscatgath.c.
🐛
CVE-2024-33877 HDF5 Library through 1.14.3 has a heap-based buffer overflow in H5T__conv_struct_opt in H5Tconv.c.
⚠️
Agentic AI Security Is Broken and How To Fix It: Ido Shlomo, Co-founder and CTO of Token Security
⚠️
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
⚠️
Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning
⚠️
EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security
⚠️
AI Threats: What Could Go Wrong?
⚠️
France's Ministry of Economy disclosed that attackers used stolen official credentials to access FICOBA, the national bank account registry, exposing data on 1.2 million accounts
🔥
What Happens If I Click A Phishing Link?
🕵️
What is OAuth?
📡
7 days until ticket prices rise for TechCrunch Disrupt 2026
🚨
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-49113 RoundCube Webmail Deserialization of Untrusted Data Vulnerability CVE-2025-68461 RoundCube Webmail Cross-site Scripting Vulnerabi…
KEV
🐛
CISA Orders Emergency Patch for Actively Exploited Dell Flaw;
KEV
🐛
BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration
🐛
CVE-2024-20328 ClamAV VirusEvent File Processing Command Injection Vulnerability
🐛
Chromium: CVE-2026-2649 Integer overflow in V8
🐛
Chromium: CVE-2026-2648 Heap buffer overflow in PDFium
🐛
Chromium: CVE-2026-2650 Heap buffer overflow in Media
⚠️
Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems
⚠️
ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware
⚠️
Ukrainian man jailed for identity theft that helped North Koreans get jobs at US companies
⚠️
Spanish police say they have arrested hacker who booked luxury hotel rooms for just one cent
⚠️
CarMax - 431,371 breached accounts
⚠️
CyberRiskTV Live Coverage from Zero Trust World 2026 - Day 1
⚠️
Using threat modeling and prompt injection to audit Comet
📢
Risky Biz Soap Box: The lethal trifecta of AI risks
🔥
Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026
🔥
FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025
🔥
How To Recall An Email In Outlook
🕵️
Friday Squid Blogging: Squid Cartoon
🕵️
Ring Cancels Its Partnership with Flock
🕵️
Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case
🕵️
Humans Will Give AI Anything If You Make It Sound Cool Enough
🕵️
Google's App Store: Hidden Risks
🕵️
Off-Topic Friday
🕵️
CyberRiskTV Live Coverage from Zero Trust World 2026 - Day 2
📡
‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
📡
Former Google Engineers Indicted Over Trade Secret Transfers to Iran