#This Week in Security: Your News Briefing
Welcome to your weekly security roundup. We’ve tracked down the 10 most important stories this week—the ones everyone’s talking about, from critical threats to emerging trends that could shape your security posture. Leading the news this week is CVE-2023-28432, which has sparked conversation across 10 sources. Meanwhile, the industry is closely tracking CVE-2026-2960 | D-Link DWR-M960 1.01.07 /boafrm/formDhcpv6s… with 4 mentions, along with emerging details on CVE-2026-2981 | UTT HiPER 810G up to 1.7.7-1711…, Promoting AI Security — Acting Assistant Privacy Commissioner…, and Mississippi Healthcare System Shuts Down Clinics After Ransomware…. Here’s the full breakdown of what you need to know.
#🚨 Critical Threats This Week
First, the stories that demand your immediate attention:
1. CVE-2023-28432 Mentioned across 10 industry sources this week. Currently trending CVE - Hype Score: 22 - Minio is a Multi-Cloud Object Storage framework. Get the details →
2. CVE-2026-2960 | D-Link DWR-M960 1.01.07 /boafrm/formDhcpv6s sub_468D64 submit-url stack-based overflow Mentioned across 4 industry sources this week. A vulnerability classified as critical was found in D-Link DWR-M960 1. Get the details →
3. CVE-2026-2981 | UTT HiPER 810G up to 1.7.7-1711 /goform/formTaskEdit_ap strcpy txtMin2 buffer overflow Mentioned across 3 industry sources this week. A vulnerability labeled as critical has been found in UTT HiPER 810G up to 1. Get the details →
#🛠️ Tools, Updates & Releases
New capabilities and releases worth knowing about:
1. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium . Referenced in 2 stories this week. Explore →
#What You Should Do Next
Monitor these in your environment next week:
- Any new CVE announcements related to systems you operate
- Emerging attack techniques being discussed in the community
- Updates and patches for tools your team uses
Have a look at the full deep-dives in the trending stories below. Each one provides context that could inform your security decisions this week.
#Top Trending Stories
1. Key Threat Intel & Vulnerability Stories (22 mentions)
▼
This week's critical security updates and vulnerability disclosures:
2. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium (2 mentions)
▼
3. Mississippi Healthcare System Shuts Down Clinics After Ransomware Attack (2 mentions)
▼
The University of Mississippi Medical Center shut down operations at its 35 medical clinics around the state following a ransomware attack. Healthcare facilities are top targets for cybercriminals, who look to steal the sensitive data they hold fo...
Read Full Article →
4. CISA: BeyondTrust RCE flaw now exploited in ransomware attacks (2 mentions)
▼
Hackers are actively exploiting the CVE-2026-1731 vulnerability in the BeyondTrust Remote Support product, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns. [...]
Read Full Article →
5. Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems (2 mentions)
▼
In yet another software supply chain attack, the open-source, artificial intelligence (AI)-powered coding assistant Cline CLI was updated to stealthily install OpenClaw, a self-hosted autonomous AI agent that has become exceedingly popular in the ...
Read Full Article →
6. Best-in-Class 'Starkiller' Phishing Kit Bypasses MFA (2 mentions)
▼
A user-friendly PhaaS tool beats standard methods for detecting phishing attacks by live-proxying legitimate login sites.
Read Full Article →#Article Summary
| Category | Article Count |
|---|---|
| AI & LLM | 2 |
| Cloud | 3 |
| Cyber Regulatory | 0 |
| Cybersecurity | 115 |
| Security Vendor Blog | 10 |
| Tech | 16 |
| Threat Intel & Vulnerability | 102 |
| Total Articles Scanned | 248 |
#AI & LLM
Survey Reveals AI Advances in Telecom: Networks and Automation in Driver’s Seat as Return on Investment Climbs
▼
AI is accelerating the telecommunications industry’s transformation, becoming the backbone of autonomous networks and AI-native wireless infrastructure. At the same time, the technology is unlocking new business and revenue opportunities, as telecom operators accelerate AI adoption across consume...
Read Full Article →
Asynchronous Verified Semantic Caching for Tiered LLM Architectures
▼
Large language models (LLMs) now sit in the critical path of search, assistance, and agentic workflows, making semantic caching essential for reducing inference cost and latency. Production deployments typically use a tiered static-dynamic design: a static cache of curated, offline vetted respons...
Read Full Article →#Cloud
How “Clinejection” Turned an AI Bot into a Supply Chain Attack
▼
The Clinejection vulnerability chain illustrates a dangerous new era of supply chain attacks where AI agents are turned into exploit vectors. By combining indirect prompt injection with GitHub Actions cache poisoning, attackers successfully pushed unauthorized code to thousands of developers. Thi...
Read Full Article →
Weaving Security into the Flow: New Snyk Studio Capabilities Power the AI Security Fabric
▼
Snyk Studio is redefining AI development security with new integrations for Gemini CLI and Claude Code, enabling developers to build fast without sacrificing safety. Bridge the gap between developer velocity and governance to ensure your code is secure at inception.
Read Full Article →
AWS Backup announces PrivateLink support for SAP HANA on AWS
▼
AWS Backup now supports AWS PrivateLink for SAP HANA systems running on Amazon EC2. This enables customers to route all backup traffic through private network connections without traversing the public internet, helping organizations meet security and compliance requirements for regulated workload...
Read Full Article →#Cyber Regulatory
#Cybersecurity
Modeling Attackers and Their Motives
▼
There are a number of reports out recently, breathlessly presenting their analysis of one threatening group of baddies or another. Most readers should, at most, skim their analysis of the perpetrators. Read on for why.
Read Full Article →
People are The Weakest Link In Security?
▼
[no description provided]
Read Full Article →
Threat Modeling & IoT
▼
[no description provided]
Read Full Article →
Warrants for Cleaning Malware in Kelihos
▼
[no description provided]
Read Full Article →
Hospital Ransomware
▼
[no description provided]
Read Full Article →
20 Year Software: Engineering and Updates
▼
[no description provided]
Read Full Article →
Threat Modeling Tooling from 2017
▼
[no description provided]
Read Full Article →
Pen Testing The Empire
▼
[no description provided]
Read Full Article →
The DREAD Pirates
▼
[no description provided]
Read Full Article →
Carpenter!
▼
[no description provided]
Read Full Article →
CVE Funding and Process
▼
[no description provided]
Read Full Article →
High ROI Security Advisory Boards
▼
Discussing the value of Security Advisory Boards
Read Full Article →
Leave Those Numbers for April 1st
▼
Over-inflated numbers won't scare me into buying your ‘solution’.
Read Full Article →
Episode 9 Spoilers
▼
Today is the last Star Wars Day before Episode 9 comes out, and brings the Skywalker saga to its end.
Read Full Article →
Interesting reads
▼
Sharing for you, bookmarking for me.
Read Full Article →
Vaccines
▼
You may have noticed that my end of the year posts are all science focused. Today, a set of resources on the COVID vaccines.
Read Full Article →
Threat Modeling and Social Issues
▼
For Data Breach Today, I spoke with Anna Delaney about threat modeling for issues that are in the news right now.
Read Full Article →
Ever Given & Suez
▼
Thoughts on the issues with the Ever Given blocking the Suez Canal.
Read Full Article →
The Updates Must Go Through
▼
The timing of updates is not coincidental.
Read Full Article →
Colonial Pipeline, Darkside and Models
▼
The Colonial Pipeline shutdown story is interesting in all sorts of ways, and I can't delve into all of it.I did want to talk about one small aspect, which is the way responders talk about Darkside.
Read Full Article →
Ransomware is Not the Problem
▼
Arbitrarily powerful software -- applications, operating systems -- is a problem, as is preventing it from running on enterprise systems.
Read Full Article →
What are we going to do: CO2 edition
▼
What happened when Microsoft tried to buy climate abatements
Read Full Article →
GPT-3
▼
Text captured from GPT-3
Read Full Article →
Darkreading: Threat Modeling in the Age of OpenAI's Chatbot
▼
Pointer to Adam’s latest Darkreading article
Read Full Article →
Phishing Defenses
▼
Phishing behaviors, as observed in the wild.
Read Full Article →
Microsoft Can Fix Ransomware Tomorrow
▼
My latest at Dark Reading draws attention to how Microsoft can fix ransomware tomorrow.
Read Full Article →
Solving Hallucinations
▼
Solving hallucinations in legal briefs is playing on easy mode —— and still too hard
Read Full Article →
The NVD Crisis
▼
The NVD is in crisis, and so is patch management. It’s time to modernize.
Read Full Article →
Introducing Magic Security Dust!
▼
CSRB Report on Microsoft
▼
The CSRB has released its report into an intrusion at Microsoft, and...it’s a doozy.
Read Full Article →
Eternal sunshine of the spotless LLM
▼
Making an LLM forget is harder than it seems
Read Full Article →
Lockbit, a study in public health
▼
Why is it hard to count lockbit infections?
Read Full Article →
Appsec Roundup - July 2024
▼
The most important stories around threat modeling, appsec and secure by design for June, 2024.
Read Full Article →
Inside Man
▼
Some thoughts on the Voyager Episode ‘Inside Man’
Read Full Article →
Security Researcher Comments on HIPAA Security Rule
▼
A group of us have urged HHS to require better handling of security reports
Read Full Article →
Introducing the DEF CON 32 Hackers' Almanack
▼
Grateful to introduce the Hackers' Almanack!
Read Full Article →
A few thoughts on CVE
▼
Thoughts on the CVE funding crisis
Read Full Article →
Threat modeling as a dial, not a switch
▼
Thinking of threat modeling with a knob helps you get more out of it.
Read Full Article →
The Cyber Resilience Act (CRA)!
▼
The CRA is coming and it's going to be a dramatic change for technology producers
Read Full Article →
LLMs as Compilers
▼
What if we think about LLM coding as if it’s a compiler stage?
Read Full Article →
Security Advisory SA-26-01 GPS Attacks
▼
GPS attacks trigger revisiting threat models
Read Full Article →
Vulnerability Finding: An Inflection Point
▼
LLM-driven vuln finding has reached an inflection
Read Full Article →
Arkanix Stealer pops up as short-lived AI info-stealer experiment
▼
An information-stealing malware operation named Arkanix Stealer, promoted on multiple dark web forums towards the end of 2025, was likely developed as an AI-assisted experiment. [...]
Read Full Article →
Hackers Hide Pulsar RAT Inside PNG Images in New NPM Supply Chain Attack
▼
Cybersecurity researchers at Veracode reveal a typosquatting attack that disguises Pulsar RAT as images to bypass Windows security and antivirus programs.
Read Full Article →
In 2026, Businesses Should Be Breach Ready and Never Shut Down Their Core Business
▼
“We do not know how long this situation may last. As a precaution, all of our IT systems have been taken down, and a risk assessment will be conducted before we bring things back up.” Vice Chancellor LouAnn Woodward of the University of Mississippi Medical Center uttered these words standing befo...
Read Full Article →
What role does Agentic AI play in identity and access management
▼
How Do Non-Human Identities Transform Cloud Security? Are your organization’s security measures keeping pace with evolving threats? The rise of Non-Human Identities (NHIs) is reshaping how we approach cloud security by closing gaps that have long persisted between security and R&D teams. Where bu...
Read Full Article →
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
▼
A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries. That's according to new findings from Amazon Threat Intelligence, which said i...
Read Full Article →
Amazon: AI-assisted hacker breached 600 Fortinet firewalls in 5 weeks
▼
Amazon is warning that a Russian-speaking hacker used multiple generative AI services as part of a campaign that breached more than 600 FortiGate firewalls across 55 countries in five weeks. [...]
Read Full Article →
U.S. CISA adds RoundCube Webmail flaws to its Known Exploited Vulnerabilities catalog
▼
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds RoundCube Webmail flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two RoundCube Webmail flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below ...
Read Full Article →
CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog
▼
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities in question are listed below - CVE-2025-49113 ...
Read Full Article →
‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
▼
Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cle...
Read Full Article →
Japanese tech giant Advantest hit by ransomware attack
▼
Advantest Corporation disclosed that its corporate network has been targeted in a ransomware attack that may have affected customer or employee data. [...]
Read Full Article →
Lessons From AI Hacking: Every Model, Every Layer Is Risky
▼
After two years of finding flaws in AI infrastructure, two Wiz researchers advise security pros to worry less about prompt injection and more about vulnerabilities.
Read Full Article →
Data breach at French bank registry impacts 1.2 million accounts
▼
The French Ministry of Finance has published an announcement informing of a cybersecurity incident that has impacted 1.2 million accounts. [...]
Read Full Article →
BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration
▼
Threat actors have been observed exploiting a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products to conduct a wide range of malicious actions, including deploying VShell and The vulnerability, tracked as CVE-2026-1731 (C...
Read Full Article →
Friend or foe? AI: The new cybersecurity threat and solutions
▼
Understanding the risks now emerging at every layer of the AI stack.
Read Full Article →
Latin America's Cyber Maturity Lags Threat Landscape
▼
The slower pace of upgrades has the unintended impact of creating a haven for attackers, especially for initial access brokers and ransomware gangs.
Read Full Article →
LLMs change their answers based on who’s asking
▼
AI chatbots may deliver unequal answers depending on who is asking the question. A new study from the MIT Center for Constructive Communication finds that LLMs provide less accurate information, increase refusal rates, and sometimes adopt a different tone when users appear less educated, less flu...
Read Full Article →
Criminals create business website to sell RAT disguised as RMM tool
▼
A RAT masquerading as legitimate remote monitoring and management (RMM) software is being sold to cybercriminals as a service, Proofpoint researchers recently discovered. The fake RMM tool, called TrustConnect, was being marketed via an LLM-created website parked on trustconnectsoftware[.]com, su...
Read Full Article →
KI und Komplexität als Brandbeschleuniger für Cyberkriminelle
▼
Cyberangriffe werden immer schneller, wodurch sich die Zeitspanne zwischen der ersten Kompromittierung und den negativen Folgen verkürzt. andrey_l – shutterstock.com Der Einzug von KI hat den benötigten Zeitaufwand für Cyberattacken massiv verkürzt, so dass menschliche Verteidiger nicht mehr mith...
Read Full Article →
BeyondTrust Vulnerability Exploited in Ransomware Attacks
▼
CISA has updated its KEV entry for CVE-2026-1731 to alert organizations of exploitation in ransomware attacks. The post BeyondTrust Vulnerability Exploited in Ransomware Attacks appeared first on SecurityWeek .
Read Full Article →
Mississippi medical center closes all clinics after ransomware attack
▼
The University of Mississippi Medical Center (UMMC) closed all its clinic locations statewide on Thursday following a ransomware attack. [...]
Read Full Article →
Chip Testing Giant Advantest Hit by Ransomware
▼
The company is investigating whether any customer or employee data was stolen by hackers. The post Chip Testing Giant Advantest Hit by Ransomware appeared first on SecurityWeek .
Read Full Article →
651 arrested, $4.3 million recovered in African cybercrime sweep
▼
Operation Red Card 2.0, supported by INTERPOL and involving law enforcement agencies from 16 African countries, led to 651 arrests and the recovery of more than $4.3 million from online scams. In Nigeria police took down a fraud ring that used phishing, identity theft and social engineering to sc...
Read Full Article →
PromptSpy abuses Gemini AI to gain persistent access on Android
▼
PromptSpy is the first Android malware to abuse Google’s Gemini AI, enabling persistence and advanced spying features. Security researchers at ESET have uncovered PromptSpy, the first known Android malware to exploit Google’s Gemini AI to maintain persistence. The malware can capture lockscreen d...
Read Full Article →
Risky Bulletin: RPKI infrastructure sits on shaky ground
▼
RPKI relies on vulnerable servers, the French Ministry of Economy discloses a data breach, the UK gives tech platforms 48 hours to remove revenge porn, and ClickFix-attacks are responsible for 50% of malware infections.
Read Full Article →
Major CarGurus data breach reportedly sees 1.7 million corporate records stolen
▼
CarGurus reportedly hit by ShinyHunters - with devastating effect.
Read Full Article →
Emerging Chiplet Designs Spark Fresh Cybersecurity Challenges
▼
As scaled-down circuits with limited functions redefine computing for AI systems and autonomous vehicles, their flexibility demands new approaches to safeguard critical infrastructure.
Read Full Article →
PromptSpy is the first known Android malware to use generative AI at runtime
▼
Researchers have discovered the first known Android malware to use generative AI in its execution flow, using Google's Gemini model to adapt its persistence across different devices. [...]
Read Full Article →
Supply Chain Attack Secretly Installs OpenClaw for Cline Users
▼
The malicious version of Cline's npm package — 2.3.0 — was downloaded more than 4,000 times before it was removed.
Read Full Article →
FBI: Threats from Salt Typhoon are ‘still very much ongoing’
▼
A top FBI cyber official said Salt Typhoon, the Chinese cyber espionage group behind the widespread compromise of U.S. telecommunications infrastructure in 2024, continues to pose a broad threat to both America’s private and public sectors. Michael Machtinger, deputy assistant director for cyber ...
Read Full Article →
ONCD official says Trump administration aims to bolster AI use for defense without increasing risk
▼
Alexandra Seymour also talked about cyber workforce goals, including emulating Israel’s Unit 8200. The post ONCD official says Trump administration aims to bolster AI use for defense without increasing risk appeared first on CyberScoop .
Read Full Article →
INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown
▼
An international cybercrime operation against online scams has led to 651 arrests and recovered more than $4.3 million as part of an effort led by law enforcement agencies from 16 African countries. The initiative, codenamed Operation Red Card 2.0, took place between December 8, 2025 and January ...
Read Full Article →
Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center
▼
Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their privileges. Windows Admin Center is a locally deployed, browser-based management tool set that lets users manage their Windows Clients, Servers, and Clusters without the need...
Read Full Article →
Flaw in Grandstream VoIP phones allows stealthy eavesdropping
▼
A critical vulnerability in Grandstream GXP1600 series VoIP phones allows a remote, unauthenticated attacker to gain root privileges and silently eavesdrop on communications. [...]
Read Full Article →
Keeping Google Play & Android app ecosystems safe in 2025
▼
Posted by Vijaya Kaza, VP and GM, App & Ecosystem Trust The Android ecosystem is a thriving global community built on trust, giving billions of users the confidence to download the latest apps. In order to maintain that trust, we’re focused on ensuring that apps do not cause real-world harm, such...
Read Full Article →
Cybercrime-as-a-service forces a security rethink
▼
With AI-powered tools readily available, sophisticated attacks no longer require sophisticated attackers.
Read Full Article →
Batten down the hatches - ransomware attacks are increasingly targeting firewalls, experts claim
▼
Make sure to secure your firewalls - or face the risk of ransomware attack.
Read Full Article →
Nearly 1 Million User Records Compromised in Figure Data Breach
▼
The blockchain-based lender has confirmed a data breach after ShinyHunters leaked over 2GB of data allegedly stolen from the company. The post Nearly 1 Million User Records Compromised in Figure Data Breach appeared first on SecurityWeek .
Read Full Article →
Six flaws found hiding in OpenClaw’s plumbing
▼
Security researchers have uncovered six high-to-critical flaws affecting the open-source AI agent framework OpenClaw , popularly known as a “social media for AI agents.” The flaws were discovered by Endor Labs as its researchers ran the platform through an AI-driven static application security te...
Read Full Article →
Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA
▼
A new cybercriminal toolkit uses proxies to mimic popular online services and represents a “significant escalation in phishing infrastructure,” warn researchers at Abnormal
Read Full Article →
PromptSpy ushers in the era of Android threats using GenAI
▼
ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow
Read Full Article →
Cybersicherheit braucht Reife und keine Checklisten
▼
Wenn CISOs stärkere Programme, bessere Widerstandsfähigkeit und eine sicherere Zukunft wollen, müssen sie ihren Ansatz weiterentwickeln. Overearth – shutterstock.com Cybersicherheit wird oft wie ein Spiel behandelt. Unternehmen jagen schnellen Erfolgen hinterher, haken Compliance-Listen ab oder k...
Read Full Article →
Smashing Security podcast #455: Face off: Meta’s Glasses and America’s internet kill switch
▼
Could America turn off Europe's internet? That’s one of the questions that Graham and special guest James Ball will be exploring as they discuss tech sovereignty. Could Gmail, cloud services, and critical infrastructure really become geopolitical leverage? And is anyone actually building a Plan B...
Read Full Article →
Nigerian man sentenced to 8 years in prison for running phony tax refund scheme
▼
Matthew Akande was living in Mexico when he and at least three co-conspirators broke into the networks of tax preparation firms and filed more than 1,000 fraudulent tax returns seeking tax refunds. The post Nigerian man sentenced to 8 years in prison for running phony tax refund scheme appeared f...
Read Full Article →
AI is helping hackers make new malware faster and more complex than ever - and things may only get tougher
▼
Social engineering is still the number one attack vector, but ransomware operators are stepping away from encryptors.
Read Full Article →
Critical Grandstream VoIP Bug Highlights SMB Security Blind Spot
▼
CVE-2026-2329 allows unauthenticated root-level access to SMB phone infrastructure, so attackers can intercept calls, commit toll fraud, and impersonate users.
Read Full Article →
Data breach at fintech giant Figure affects close to a million customers
▼
The Figure data breach allowed hackers to steal customer names, dates of birth, physical addresses, phone numbers, and email addresses.
Read Full Article →
‘An all-time high’: Number of ransomware groups exploded in 2025 as victim growth rate doubled - with Qilin dominating the landscape
▼
Ransomware groups reached a record high in 2025, and claimed a record number of victims in the process.
Read Full Article →
AI Found Twelve New Vulnerabilities in OpenSSL
▼
The title of the post is” What AI Security Research Looks Like When It Works ,” and I agree: In the latest OpenSSL security release> on January 27, 2026, twelve new zero-day vulnerabilities (meaning unknown to the maintainers at time of disclosure) were announced. Our AI system is responsible for...
Read Full Article →
Record Number of Ransomware Victims and Groups in 2025
▼
Searchlight Cyber reports a 30% annual increase in ransomware victim numbers in 2025
Read Full Article →
Cyberangriff auf Bahn stört Auskunftssysteme
▼
Der Angriff konnte zurückgeschlagen werden. Trotzdem mussten Reisende mit Einschränkungen leben. Deutsche Bahn AG/Volker Emersleben Die Störungen der Auskunfts- und Buchungssysteme der Deutschen Bahn sind nach Unternehmensangaben auf einen Cyberangriff zurückzuführen. Inzwischen stehen die System...
Read Full Article →
Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024
▼
A maximum severity security vulnerability in Dell RecoverPoint for Virtual Machines has been exploited as a zero-day by a suspected China-nexus threat cluster dubbed UNC6201 since mid-2024, according to a new report from Google Mandiant and Google Threat Intelligence Group (GTIG). The activity in...
Read Full Article →
Chinese APT Group Exploits Dell Zero-Day for Two Years
▼
Mandiant reveals campaign featuring exploit of a CVSS 10.0 CVE in Dell RecoverPoint for Virtual Machines
Read Full Article →
Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware
▼
Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from China to hijack the software update mechanism to selectively deliver malware to targets of interest. The version 8.9.2 update incorporates what maintainer Don Ho calls a "double lock" design th...
Read Full Article →
CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update
▼
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows - CVE-2026-2441 (CVSS score: 8.8) - A use-after...
Read Full Article →
Risky Business #825 -- Palo Alto Networks blames it on the boogie
▼
On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover: Palo Alto threat researchers want to attribute to China, but management says shush An increasing proportion of ransomware is data extortion. Is this good? Cambodia says it’s going t...
Read Full Article →
Risky Bulletin: Supply chain attack plants backdoor on Android tablets
▼
A supply chain attack plants backdoors on Android tablets, the EU blocks AI from lawmakers’ devices, Cellebrite was used against a Kenyan politician, and a Chinese APT is exploiting a Dell zero-day.
Read Full Article →
Chinese hackers exploited a Dell zero-day for 18 months before anyone noticed
▼
Google researchers said Chinese attackers have been exploiting a zero-day since mid-2024, and they’ve moved on to a more advanced version of Brickstorm malware called Grimbolt. The post Chinese hackers exploited a Dell zero-day for 18 months before anyone noticed appeared first on CyberScoop .
Read Full Article →
OpenCFD OpenFOAM Code Stream directive arbitrary code execution vulnerability
▼
Supply Chain Attack Embeds Malware in Android Devices
▼
Keenadu downloads payloads that hijack browser searches, commit ad fraud, and execute other actions without user knowledge.
Read Full Article →
Low-Skilled Cybercriminals Use AI to Perform "Vibe Extortion" Attacks
▼
Unit 42 researchers observed a low-skilled threat actor using an LLM to script a professional extortion strategy, complete with deadlines and pressure tactics
Read Full Article →
Top Japanese hotel brand reveals cyberattack - Washington hotels hit by ransomware
▼
An investigation is underway into Washington hotel attackers, but no group has claimed responsibility yet.
Read Full Article →
Significant Rise in Ransomware Attacks Targeting Industrial Operations
▼
Dragos annual report warns of a surge in ransomware attacks causing increased operational disruption in industrial environments
Read Full Article →
My Day Getting My Hands Dirty with an NDR System
▼
My objective As someone relatively inexperienced with network threat hunting, I wanted to get some hands-on experience using a network detection and response (NDR) system. My goal was to understand how NDR is used in hunting and incident response, and how it fits into the daily workflow of a Secu...
Read Full Article →
Eurail confirms stolen traveler data is on sale in the dark web - and it still doesn't know who is behind the attack
▼
The January 2026 Eurail breach just got worse, as hackers have started selling the stolen data.
Read Full Article →
Adopting AI is a major priority for businesses - but employees are falling behind on education
▼
All worker types, including CEOs, are showing a lack of readiness when it comes to using AI in cybersecurity.
Read Full Article →
Sex toy firm hit by data breach - Tenga says hacker infiltrated systems, stole customer data
▼
A Tenga employee fell for a phishing email, and gave away access to a company email account.
Read Full Article →
Google patches first Chrome zero-day of the year - so update now or face attack
▼
An 8.3/10 use after free in CSS Google Chrome bug was patched after being abused by unnamed threat actors.
Read Full Article →
Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft
▼
New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo
Read Full Article →
Blockchain fintech giant Figure hit by data breach, says 'limited number of files' impacted
▼
ShinyHunters claims responsibility, says Figure is part of the Okta single sign-on attacks.
Read Full Article →
Safe and Inclusive E‑Society: How Lithuania Is Bracing for AI‑Driven Cyber Fraud
▼
Technologies are evolving fast, reshaping economies, governance, and daily life. Yet, as innovation accelerates, so do digital risks. Technological change is no longer abstract for such a country as Lithuania, as well. From e-signatures to digital health records, the country depends on secure sys...
Read Full Article →
Google Warns of In the Wild Exploit as It Patches New Chrome Zero Day
▼
A high severity vulnerability in Google Chrome and allows remote attackers to execute code
Read Full Article →
Odido Breach Impacts Millions of Dutch Telco Users
▼
Dutch telco Odido has revealed a major data breach impacting over six million customers
Read Full Article →
New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Released
▼
Google on Friday released security updates for its Chrome browser to address a security flaw that it said has been exploited in the wild. The high-severity vulnerability, tracked as CVE-2026-2441 (CVSS score: 8.8), has been described as a use-after-free bug in CSS. Security researcher Shaheen Faz...
Read Full Article →#Security Vendor Blog
PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers
▼
Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.
Read Full Article →
Threats Making WAVs - Incident Response to a Cryptomining Attack
▼
Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident res...
Read Full Article →
VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)
▼
CVE-2026-1731 is an RCE vulnerability in identity platform BeyondTrust. This flaw allows attackers control of systems without login credentials. The post VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731) appeared first on Unit 42 .
Read Full Article →
Arkanix Stealer: a C++ & Python infostealer
▼
Kaspersky researchers analyze a C++ and Python stealer dubbed "Arkanix Stealer", which was active for several months, targeted wide range of data, was distributed as MaaS and offered referral program to its partners.
Read Full Article →
PromptSpy ushers in the era of Android threats using GenAI
▼
ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow
Read Full Article →
How “Clinejection” Turned an AI Bot into a Supply Chain Attack
▼
The Clinejection vulnerability chain illustrates a dangerous new era of supply chain attacks where AI agents are turned into exploit vectors. By combining indirect prompt injection with GitHub Actions cache poisoning, attackers successfully pushed unauthorized code to thousands of developers. Thi...
Read Full Article →
CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones (FIXED)
▼
Overview Rapid7 Labs conducted a zero-day research project against the Grandstream GXP1600 series of Voice over Internet Protocol (VoIP) phones. This research resulted in the discovery of a critical unauthenticated stack-based buffer overflow vulnerability, CVE-2026-2329. A remote attacker can le...
Read Full Article →
Zero Trust Switching: Why Firewalls Alone Can’t Secure AI Workloads
▼
Critical Vulnerabilities in Ivanti EPMM Exploited
▼
We discuss widespread exploitation of Ivanti EPMM zero-day vulns CVE-2026-1281 and CVE-2026-1340. Attackers are deploying web shells and backdoors. The post Critical Vulnerabilities in Ivanti EPMM Exploited appeared first on Unit 42 .
Read Full Article →
Weaving Security into the Flow: New Snyk Studio Capabilities Power the AI Security Fabric
▼
Snyk Studio is redefining AI development security with new integrations for Gemini CLI and Claude Code, enabling developers to build fast without sacrificing safety. Bridge the gap between developer velocity and governance to ensure your code is secure at inception.
Read Full Article →#Tech
What About the Droid Attack on the Repos?
▼
You might not have noticed, but we here at Hackaday are pretty big fans of Open Source — software, hardware, you name it. We’ve also spilled our fair share of …read more
Read Full Article →
UK council faces data breach claim after mishandling trans complaints
▼
Confidential complainant details passed to local politician following debate A UK councillor has dubbed her local authority's data breach "crazy" after the personal details of individuals behind a series of complaints were revealed to her.…
Read Full Article →
AI coding assistant Cline compromised to create more OpenClaw chaos
▼
4K unintended installs in very odd supply chain attack Someone compromised open source AI coding assistant Cline CLI's npm package earlier this week in an odd supply chain attack that secretly installed OpenClaw on developers' machines without their knowledge. …
Read Full Article →
ShinyHunters demands $1.5M not to leak Vegas casino and resort chain data
▼
What happens in Vegas… Las Vegas hotel and casino giant Wynn Resorts appears to be the latest victim of data-grabbing and extortion gang ShinyHunters.…
Read Full Article →
Your password manager isn’t as safe as you think
▼
Bitwarden, LastPass, and Dashlane are less secure than you might expect, at least if you go by the findings of security researchers at ETH Zurich and the Università della Svizzera italiana (USI) in Lugano. They’ve allegedly discovered serious security vulnerabilities in these popular password man...
Read Full Article →
EFF policy says bots can code but humans must write the docs
▼
'Just trust us' – Big Tech's hackneyed catchphrase makes an unwelcome return The Electronic Frontier Foundation says it will accept LLM generated code from contributors to its open source projects but will draw the line at non-human generated comments and documentation.…
Read Full Article →
How agentic AI will reshape engineering workflows in 2026
▼
In the two years since generative AI exploded into the mainstream, we’ve moved from awe at its capabilities to a more pragmatic question: What comes next? The answer is evident in the rise of agentic AI, systems that don’t just respond to prompts but can reason, plan and pursue complex, multi-ste...
Read Full Article →
Is AI killing technology?
▼
We’re living through the single biggest tech disruption in history (and, if not the biggest, definitely the fastest). The AI revolution promises huge productivity gains by automating complex tasks, accelerating scientific breakthroughs in medicine, biotech, materials science, and democratizing ac...
Read Full Article →
Android malware taps Gemini to navigate infected devices
▼
For now, it might not function outside of a lab Cybersecurity researchers say they've spotted the first Android malware strain that uses generative AI to improve performance once installed. But it may be only a proof of concept.…
Read Full Article →
Poland bans camera-packing cars made in China from military bases
▼
Dell, however, is welcome to help build a local-language LLM Poland’s Ministry of Defence has banned Chinese cars – and any others include tech to record position, images, or sound – from entering protected military facilities.…
Read Full Article →
ChatGPT gets ‘Lockdown Mode’ mode for extra security and privacy
▼
OpenAI is launching two new security features in ChatGPT to address growing threats to its AI systems, according to a recent blog post . As AI services increasingly connect to wider parts of the web and more external apps, the risk of so-called “prompt injection attacks” also increases. A prompt ...
Read Full Article →
With physical AI, gunslingers and risk takers need not apply
▼
Agentic AI came on like a storm over the past year or so, but blazed a trail littered with failed projects and cutting-edge high-tech junk that companies are still trying to sort out. So it’s perhaps no surprise that tech industry execs are urging enterprises to move cautiously with physical AI ,...
Read Full Article →
30 fake AI Chrome extensions caught stealing passwords and more
▼
Security experts have uncovered a number of dangerous extensions for the Chrome browser. A total of 30 extensions belonging to the AiFrame campaign have been identified as dangerous, appearing to offer AI services but actually designed to intercept sensitive information. To date, the extensions h...
Read Full Article →
Update Chrome ASAP! The first zero-day flaw of 2026 is patched
▼
A zero-day vulnerability is a flaw in software that goes undiscovered by the developers, which can then be found and exploited by hackers before anyone gets wind of it. You might’ve heard about zero-day flaws in Chrome because it happens a lot—oh boy, does it happen a lot . Well, the first one th...
Read Full Article →
Reverse Engineering Linux Distro REMnux Marks 15 Years With Major v8 Release Featuring AI Agent Support
▼
Malware analysis Linux distro gets Ubuntu 24.04 base, a new installer, and many new tools.
Read Full Article →
New Windows 11 PC? Confirm this special security protection is active
▼
Windows Security is not the same across Windows 10 and Windows 11. Microsoft’s built-in security suite protects against online and offline threats in both operating systems, but Windows 11 gets extra features. Not that most people know about it—few users keep up with the latest additions to backg...
Read Full Article →#Threat Intel & Vulnerability
CVE-2025-38352 + 1 similar
▼
Currently trending CVE - Hype Score: 10 - In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timer...
Read Full Article →
CVE-2025-49113 + 2 similar
▼
Currently trending CVE - Hype Score: 9 - Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.
Read Full Article →
CVE-2025-29969
▼
Currently trending CVE - Hype Score: 4 - Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows an authorized attacker to execute code over a network.
Read Full Article →
CVE-2025-68461
▼
Currently trending CVE - Hype Score: 4 - Roundcube Webmail before 1.5.12 and 1.6 before 1.6.12 is prone to a Cross-Site-Scripting (XSS) vulnerability via the animate tag in an SVG document.
Read Full Article →
CVE-2024-54222
▼
Currently trending CVE - Hype Score: 3 - Missing Authorization vulnerability in Seraphinite Solutions Seraphinite Accelerator seraphinite-accelerator allows Retrieve Embedded Sensitive Data.This issue affects Seraphinite Accelerator: from n/a through <= 2.22.15.
Read Full Article →
CVE-2025-69403
▼
Currently trending CVE - Hype Score: 3 - Unrestricted Upload of File with Dangerous Type vulnerability in Bravis-Themes Bravis Addons bravis-addons allows Using Malicious Files.This issue affects Bravis Addons: from n/a through <= 1.1.9.
Read Full Article →
Introducing "AI Unlocked: Decoding Prompt Injection," a New Interactive Challenge
▼
CVE-2026-2985 | Tiandy Video Surveillance System 视频监控平台 7.17.0 CLSBODownLoad.java downloadImage urlPath server-side request forgery
▼
A vulnerability classified as critical has been found in Tiandy Video Surveillance System 视频监控平台 7.17.0 . This impacts the function downloadImage of the file /com/tiandy/easy7/core/bo/CLSBODownLoad.java . Performing a manipulation of the argument urlPath results in server-side request forgery. Th...
Read Full Article →
CVE-2026-2984 | SourceCodester Student Result Management System 1.0 drop_user.php ID denial of service
▼
A vulnerability described as problematic has been identified in SourceCodester Student Result Management System 1.0 . This affects an unknown function of the file /admin/core/drop_user.php . Such manipulation of the argument ID leads to denial of service. This vulnerability is documented as CVE-2...
Read Full Article →
CVE-2026-2983 | SourceCodester Student Result Management System 1.0 Bulk Import import_users.php File access control + 1 similar
▼
A vulnerability marked as critical has been reported in SourceCodester Student Result Management System 1.0 . The impacted element is an unknown function of the file /admin/core/import_users.php of the component Bulk Import . This manipulation of the argument File causes improper access controls....
Read Full Article →
CVE-2026-2980 | UTT HiPER 810G up to 1.7.7-1711 /goform/setSysAdm strcpy passwd1 buffer overflow + 1 similar
▼
A vulnerability identified as critical has been detected in UTT HiPER 810G up to 1.7.7-1711 . Impacted is the function strcpy of the file /goform/setSysAdm . The manipulation of the argument passwd1 leads to buffer overflow. This vulnerability is listed as CVE-2026-2980 . The attack may be initia...
Read Full Article →
CVE-2026-2979 | FastApiAdmin up to 2.2.0 Scheduled Task API controller.py user_avatar_upload_controller unrestricted upload + 2 similar
▼
A vulnerability categorized as critical has been discovered in FastApiAdmin up to 2.2.0 . This issue affects the function user_avatar_upload_controller of the file /backend/app/api/v1/module_system/user/controller.py of the component Scheduled Task API . Executing a manipulation can lead to unres...
Read Full Article →
CVE-2026-2976 | FastApiAdmin up to 2.2.0 Download Endpoint controller.py download_controller file_path information disclosure
▼
A vulnerability was found in FastApiAdmin up to 2.2.0 . It has been classified as problematic . Affected by this issue is the function download_controller of the file /backend/app/api/v1/module_common/file/controller.py of the component Download Endpoint . This manipulation of the argument file_p...
Read Full Article →
CVE-2026-2975 | FastApiAdmin up to 2.2.0 Custom Documentation Endpoint init_app.py reset_api_docs information disclosure
▼
A vulnerability was found in FastApiAdmin up to 2.2.0 and classified as problematic . Affected by this vulnerability is the function reset_api_docs of the file /backend/app/plugin/init_app.py of the component Custom Documentation Endpoint . The manipulation results in information disclosure. This...
Read Full Article →
CVE-2019-25366 | microASP Portal+ CMS Requests explode_tree sql injection (Exploit 46799 / EDB-46799)
▼
A vulnerability has been found in microASP Portal+ CMS and classified as critical . Affected is an unknown function of the component Requests Handler . The manipulation of the argument explode_tree leads to sql injection. This vulnerability is uniquely identified as CVE-2019-25366 . The attack is...
Read Full Article →
CVE-2019-25439 | NoviSmart CMS Header Referer sql injection (Exploit 47152 / EDB-47152)
▼
A vulnerability, which was classified as critical , was found in NoviSmart CMS . This impacts an unknown function of the component Header Handler . Executing a manipulation of the argument Referer can lead to sql injection. This vulnerability is handled as CVE-2019-25439 . The attack can be execu...
Read Full Article →
CVE-2019-25462 | Web Ofisi Rent a Car 3 klima sql injection (Exploit 47144) + 2 similar
▼
A vulnerability, which was classified as critical , has been found in Web Ofisi Rent a Car 3 . This affects an unknown function. Performing a manipulation of the argument klima results in sql injection. This vulnerability is known as CVE-2019-25462 . Remote exploitation of the attack is possible....
Read Full Article →
CVE-2019-25461 | Web Ofisi Platinum E-Ticaret 5 productsFilterSearch q sql injection (Exploit 47140) + 1 similar
▼
A vulnerability classified as critical was found in Web Ofisi Platinum E-Ticaret 5 . The impacted element is an unknown function of the file ajax/productsFilterSearch . Such manipulation of the argument q leads to sql injection. This vulnerability is traded as CVE-2019-25461 . The attack may be l...
Read Full Article →
CVE-2019-25391 | Ashopsoftware Ashop Shopping Cart Software bannedcustomers.php blacklistitemid sql injection (Exploit 46681 / EDB-46681)
▼
A vulnerability described as critical has been identified in Ashopsoftware Ashop Shopping Cart Software . Impacted is an unknown function of the file admin/bannedcustomers.php . The manipulation of the argument blacklistitemid results in sql injection. This vulnerability is reported as CVE-2019-2...
Read Full Article →
CVE-2019-25459 | Web Ofisi Emlak V2 emlak_durumu/emlak_tipi/il/ilce/kelime/semt sql injection (Exploit 47142)
▼
A vulnerability marked as critical has been reported in Web Ofisi Emlak V2 . This issue affects some unknown processing. The manipulation of the argument emlak_durumu/emlak_tipi/il/ilce/kelime/semt leads to sql injection. This vulnerability is documented as CVE-2019-25459 . The attack can be init...
Read Full Article →
CVE-2019-25433 | Xoops CMS 2.5.9 gerar_pdf.php cid sql injection (Exploit 46835 / EDB-46835)
▼
A vulnerability labeled as critical has been found in Xoops CMS 2.5.9 . This vulnerability affects unknown code of the file gerar_pdf.php . Executing a manipulation of the argument cid can lead to sql injection. This vulnerability is registered as CVE-2019-25433 . It is possible to launch the att...
Read Full Article →
CVE-2019-25440 | Webincorp WebIncorp ERP product_detail.php prod_id sql injection (Exploit 47199 / EDB-47199)
▼
A vulnerability identified as critical has been detected in Webincorp WebIncorp ERP . This affects an unknown part of the file product_detail.php . Performing a manipulation of the argument prod_id results in sql injection. This vulnerability is cataloged as CVE-2019-25440 . It is possible to ini...
Read Full Article →
CVE-2019-25458 | Web-ofisi Firma Rehberi 1 GET Parameter il/kat/kelime sql injection (Exploit 47143) + 1 similar
▼
A vulnerability categorized as critical has been discovered in Web-ofisi Firma Rehberi 1 . Affected by this issue is some unknown functionality of the component GET Parameter Handler . Such manipulation of the argument il/kat/kelime leads to sql injection. This vulnerability is listed as CVE-2019...
Read Full Article →
CVE-2019-25442 | Webwiz Web Wiz Forums 12.01 member_profile.asp PF sql injection (Exploit 47284 / EDB-47284)
▼
A vulnerability was found in Webwiz Web Wiz Forums 12.01 and classified as critical . This affects an unknown function of the file member_profile.asp . Executing a manipulation of the argument PF can lead to sql injection. The identification of this vulnerability is CVE-2019-25442 . The attack ma...
Read Full Article →
CVE-2019-25450 | Dolibarr ERP CRM 10.0.1 HTTP POST Request card.php actioncode/demand_reason_id/availability_id sql injection (Exploit 47370 / EDB-47370)
▼
A vulnerability has been found in Dolibarr ERP CRM 10.0.1 and classified as critical . The impacted element is an unknown function of the file card.php of the component HTTP POST Request Handler . Performing a manipulation of the argument actioncode/demand_reason_id/availability_id results in sql...
Read Full Article →
CVE-2019-25446 | Digit-Rs Digit Centris ERP HTTP POST Request /korisnikinfo.php datum1/datum2/KID/PID sql injection (Exploit 47401 / EDB-47401)
▼
A vulnerability, which was classified as critical , was found in Digit-Rs Digit Centris ERP . The affected element is an unknown function of the file /korisnikinfo.php of the component HTTP POST Request Handler . Such manipulation of the argument datum1/datum2/KID/PID leads to sql injection. This...
Read Full Article →
CVE-2019-25443 | edlangley inventory-webapp GET Parameter add-item.php name/description/quantity/cat_id sql injection (Exploit 47356 / EDB-47356)
▼
A vulnerability, which was classified as critical , has been found in edlangley inventory-webapp . Impacted is an unknown function of the file add-item.php of the component GET Parameter Handler . This manipulation of the argument name/description/quantity/cat_id causes sql injection. This vulner...
Read Full Article →
CVE-2019-25452 | Dolibarr ERP CRM 10.0.1 HTTP POST Request elemid sql injection (Exploit 47362 / EDB-47362)
▼
A vulnerability classified as critical was found in Dolibarr ERP CRM 10.0.1 . This issue affects some unknown processing of the component HTTP POST Request Handler . The manipulation of the argument elemid results in sql injection. This vulnerability is known as CVE-2019-25452 . It is possible to...
Read Full Article →
CVE-2026-2972 | a466350665 Smart-SSO up to 2.1.1 Role Edit Page UserController.java save cross site scripting
▼
A vulnerability described as problematic has been identified in a466350665 Smart-SSO up to 2.1.1 . This affects the function Save of the file smart-sso-server/src/main/java/openjoe/smart/sso/server/controller/admin/UserController.java of the component Role Edit Page . Executing a manipulation can...
Read Full Article →
CVE-2026-2971 | a466350665 Smart-SSO up to 2.1.1 Login login.html redirectUri cross site scripting
▼
A vulnerability marked as problematic has been reported in a466350665 Smart-SSO up to 2.1.1 . Affected by this issue is some unknown functionality of the file smart-sso-server/src/main/resources/templates/login.html of the component Login . Performing a manipulation of the argument redirectUri re...
Read Full Article →
CVE-2026-2970 | datapizza-labs datapizza-ai 0.0.2 cache.py RedisCache deserialization
▼
A vulnerability labeled as critical has been found in datapizza-labs datapizza-ai 0.0.2 . Affected by this vulnerability is the function RedisCache of the file datapizza-ai-cache/redis/datapizza/cache/redis/cache.py . Such manipulation leads to deserialization. This vulnerability is documented as...
Read Full Article →
CVE-2026-2969 | datapizza-labs datapizza-ai 0.0.2 Jinja2 Template prompt.py ChatPromptTemplate Prompt special elements used in a template engine
▼
A vulnerability identified as critical has been detected in datapizza-labs datapizza-ai 0.0.2 . Affected is the function ChatPromptTemplate of the file datapizza-ai-core/datapizza/modules/prompt/prompt.py of the component Jinja2 Template Handler . This manipulation of the argument Prompt causes i...
Read Full Article →
CVE-2026-2968 | Cesanta Mongoose up to 7.20 Poly1305 Authentication Tag /src/tls_chacha20.c mg_chacha20_poly1305_decrypt signature verification
▼
A vulnerability categorized as critical has been discovered in Cesanta Mongoose up to 7.20 . This impacts the function mg_chacha20_poly1305_decrypt of the file /src/tls_chacha20.c of the component Poly1305 Authentication Tag Handler . The manipulation results in improper verification of cryptogra...
Read Full Article →
CVE-2026-2967 | Cesanta Mongoose up to 7.20 TCP Sequence Number /src/net_builtin.c getpeer verification of source
▼
A vulnerability was found in Cesanta Mongoose up to 7.20 . It has been rated as problematic . This affects the function getpeer of the file /src/net_builtin.c of the component TCP Sequence Number Handler . The manipulation leads to improper verification of source of a communication channel. This ...
Read Full Article →
CVE-2026-2966 | Cesanta Mongoose up to 7.20 DNS Transaction ID /src/dns.c mg_sendnsreq random random values
▼
A vulnerability was found in Cesanta Mongoose up to 7.20 . It has been declared as problematic . The impacted element is the function mg_sendnsreq of the file /src/dns.c of the component DNS Transaction ID Handler . Executing a manipulation of the argument random can lead to insufficiently random...
Read Full Article →
CVE-2026-2965 | 07FLYCMS/07FLY-CMS/07FlyCRM up to 1.2.9 System Extension edit.html Title cross site scripting
▼
A vulnerability was found in 07FLYCMS, 07FLY-CMS and 07FlyCRM up to 1.2.9 . It has been classified as problematic . The affected element is an unknown function of the file /admin/SysModule/edit.html of the component System Extension Module . Performing a manipulation of the argument Title results...
Read Full Article →
CVE-2026-2964 | higuma web-audio-recorder-js 0.1/0.1.1 Dynamic Config Handling lib/WebAudioRecorder.js extend prototype pollution
▼
A vulnerability was found in higuma web-audio-recorder-js 0.1/0.1.1 and classified as problematic . Impacted is the function extend in the library lib/WebAudioRecorder.js of the component Dynamic Config Handling . Such manipulation leads to improperly controlled modification of object prototype a...
Read Full Article →
CVE-2026-2963 | Jinher OA C6 up to 20260210 OfficeSupplyTypeRight.aspx id/offsnum sql injection
▼
A vulnerability has been found in Jinher OA C6 up to 20260210 and classified as critical . This issue affects some unknown processing of the file /C6/Jhsoft.Web.officesupply/OfficeSupplyTypeRight.aspx . This manipulation of the argument id/offsnum causes sql injection. The identification of this ...
Read Full Article →
CVE-2026-2962 | D-Link DWR-M960 1.01.07 Scheduled Reboot Configuration Endpoint /boafrm/formDateReboot sub_460F30 submit-url stack-based overflow + 5 similar
▼
A vulnerability, which was classified as critical , was found in D-Link DWR-M960 1.01.07 . This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint . The manipulation of the argument submit-url results in stack-...
Read Full Article →
CVE-2026-2961 | D-Link DWR-M960 1.01.07 VPN Configuration Endpoint formVpnConfigSetup sub_4196C4 submit-url stack-based overflow
▼
A vulnerability, which was classified as critical , has been found in D-Link DWR-M960 1.01.07 . This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint . The manipulation of the argument submit-url leads to stack-based buffer overflo...
Read Full Article →
CVE-2026-2959 | D-Link DWR-M960 1.01.07 /boafrm/formNewSchedule sub_44E0F8 url stack-based overflow + 1 similar
▼
A vulnerability classified as critical has been found in D-Link DWR-M960 1.01.07 . Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule . Performing a manipulation of the argument url results in stack-based buffer overflow. This vulnerability is known as C...
Read Full Article →
CVE-2026-2957 | qinming99 dst-admin up to 1.5.0 File BackupController.java deleteBackup denial of service
▼
A vulnerability marked as problematic has been reported in qinming99 dst-admin up to 1.5.0 . This impacts the function deleteBackup of the file src/main/java/com/tugos/dst/admin/controller/BackupController.java of the component File Handler . This manipulation causes denial of service. This vulne...
Read Full Article →
CVE-2026-2956 | qinming99 dst-admin up to 1.5.0 /home/restore revertBackup Name command injection
▼
A vulnerability labeled as critical has been found in qinming99 dst-admin up to 1.5.0 . This affects the function revertBackup of the file /home/restore . The manipulation of the argument Name results in command injection. This vulnerability is reported as CVE-2026-2956 . The attack can be launch...
Read Full Article →
CVE-2026-1369 | Conditional CAPTCHA Plugin up to 4.0.0 on WordPress redirect
▼
A vulnerability identified as problematic has been detected in Conditional CAPTCHA Plugin up to 4.0.0 on WordPress. The impacted element is an unknown function. The manipulation leads to open redirect. This vulnerability is documented as CVE-2026-1369 . The attack can be initiated remotely. There...
Read Full Article →
CarGurus - 12,461,887 breached accounts
▼
In February 2026, the automotive marketplace CarGurus was the target of a data breach attributed to the threat actor ShinyHunters . Following an attempted extortion, the data was published publicly and contained more than 12M email addresses across multiple files including user account ID mapping...
Read Full Article →
CVE-2026-2385 | The Plus Addons for Elementor Plugin up to 6.4.7 on WordPress AJAX email_data data authenticity
▼
A vulnerability categorized as critical has been discovered in The Plus Addons for Elementor Plugin up to 6.4.7 on WordPress. The affected element is an unknown function of the component AJAX Handler . Executing a manipulation of the argument email_data can lead to insufficient verification of da...
Read Full Article →
CVE-2026-2954 | Dromara UJCMS 10.0.2 ImportDataController import-channel importChanel driverClassName/url injection
▼
A vulnerability was found in Dromara UJCMS 10.0.2 . It has been rated as critical . Impacted is the function importChanel of the file /api/backend/ext/import-data/import-channel of the component ImportDataController . Performing a manipulation of the argument driverClassName/url results in inject...
Read Full Article →
CVE-2026-2953 | Dromara UJCMS 101.2 Template WebFileTemplateController.delete deleteDirectory path traversal
▼
A vulnerability was found in Dromara UJCMS 101.2 . It has been declared as critical . This issue affects the function deleteDirectory of the file WebFileTemplateController.delete of the component Template Handler . Such manipulation leads to path traversal. This vulnerability is listed as CVE-202...
Read Full Article →
CVE-2026-2952 | Vaelsys 4.1.0 HTTP POST Request /tree/tree_server.php xajaxargs os command injection
▼
A vulnerability was found in Vaelsys 4.1.0 . It has been classified as critical . This vulnerability affects unknown code of the file /tree/tree_server.php of the component HTTP POST Request Handler . This manipulation of the argument xajaxargs causes os command injection. This vulnerability is t...
Read Full Article →
CVE-2026-2947 | rymcu forest up to 0.0.5 User Profile UserInfoController.java updateUserInfo cross site scripting
▼
A vulnerability was found in rymcu forest up to 0.0.5 and classified as problematic . This affects the function updateUserInfo of the file - src/main/java/com/rymcu/forest/web/api/user/UserInfoController.java of the component User Profile Handler . The manipulation results in cross site scripting...
Read Full Article →
CVE-2026-2946 | rymcu forest up to 0.0.5 Article Content/Comments/Portfolio XssUtils.java XssUtils.replaceHtmlCode cross site scripting
▼
A vulnerability has been found in rymcu forest up to 0.0.5 and classified as problematic . Affected by this issue is the function XssUtils.replaceHtmlCode of the file src/main/java/com/rymcu/forest/util/XssUtils.java of the component Article Content/Comments/Portfolio . The manipulation leads to ...
Read Full Article →
CVE-2026-2945 | JeecgBoot 3.9.0 uploadImgByHttp fileUrl server-side request forgery
▼
A vulnerability, which was classified as critical , was found in JeecgBoot 3.9.0 . Affected by this vulnerability is an unknown functionality of the file /sys/common/uploadImgByHttp . Executing a manipulation of the argument fileUrl can lead to server-side request forgery. The identification of t...
Read Full Article →
CVE-2026-2944 | Tosei Online Store Management System ネット店舗管理システム HTTP POST Request /cgi-bin/monitor.php system os command injection
▼
A vulnerability, which was classified as critical , has been found in Tosei Online Store Management System ネット店舗管理システム 1.01 . Affected is the function system of the file /cgi-bin/monitor.php of the component HTTP POST Request Handler . Performing a manipulation of the argument DevId results in os...
Read Full Article →
CVE-2026-2943 | SapneshNaik Student Management System up to f4b4f0928f0b5551a28ee81ae7e7fe47d9345318 index.php Error cross site scripting
▼
A vulnerability classified as problematic was found in SapneshNaik Student Management System up to f4b4f0928f0b5551a28ee81ae7e7fe47d9345318 . This impacts an unknown function of the file index.php . Such manipulation of the argument Error leads to cross site scripting. This vulnerability is uniqu...
Read Full Article →
CVE-2026-2940 | Zaher1307 tiny_web_server up to 8d77b1044a0ca3a5297d8726ac8aa2cf944d481b URL tiny_web_server/tiny.c out-of-bounds write
▼
A vulnerability classified as critical has been found in Zaher1307 tiny_web_server up to 8d77b1044a0ca3a5297d8726ac8aa2cf944d481b . This affects the function tiny_web_server/tiny.c of the file tiny_web_server/tiny.c of the component URL Handler . This manipulation causes out-of-bounds write. This...
Read Full Article →
CVE-2026-2939 | itsourcecode Student Management System 1.0 Add Student /add_student/ cross site scripting
▼
A vulnerability described as problematic has been identified in itsourcecode Student Management System 1.0 . The impacted element is an unknown function of the file /add_student/ of the component Add Student Module . The manipulation results in cross site scripting. This vulnerability is known as...
Read Full Article →
CVE-2026-27576 | OpenClaw up to 2026.2.18 ACP Bridge resource consumption (GHSA-cxpw-2g23-2vgw)
▼
A vulnerability labeled as problematic has been found in OpenClaw up to 2026.2.18 . Impacted is an unknown function of the component ACP Bridge . Executing a manipulation can lead to resource consumption. This vulnerability appears as CVE-2026-27576 . The attack requires local access. There is no...
Read Full Article →
CVE-2026-27479 | ellite Wallos up to 4.6.0 getLogoFromUrl server-side request forgery (GHSA-fgmf-7g5v-jmjg)
▼
A vulnerability identified as critical has been detected in ellite Wallos up to 4.6.0 . This issue affects the function getLogoFromUrl . Performing a manipulation results in server-side request forgery. This vulnerability is reported as CVE-2026-27479 . The attack is possible to be carried out re...
Read Full Article →
CVE-2026-27574 | oneuptime up to 10.0.4 code injection (GHSA-v264-xqh4-9xmm)
▼
A vulnerability categorized as critical has been discovered in oneuptime up to 10.0.4 . This vulnerability affects unknown code. Such manipulation leads to code injection. This vulnerability is documented as CVE-2026-27574 . The attack can be executed remotely. There is not any exploit available....
Read Full Article →
CVE-2026-27487 | OpenClaw up to 2026.2.13 on macOS Claude CLI Keychain Credential Refresh Path os command injection (GHSA-4564-pvr2-qq4h)
▼
A vulnerability was found in OpenClaw up to 2026.2.13 on macOS. It has been declared as critical . Affected by this issue is some unknown functionality of the component Claude CLI Keychain Credential Refresh Path Handler . The manipulation results in os command injection. This vulnerability is ca...
Read Full Article →
CVE-2026-27486 | OpenClaw up to 2026.2.13 CLI unverified ownership (GHSA-jfv4-h8mc-jcp8)
▼
A vulnerability was found in OpenClaw up to 2026.2.13 . It has been classified as problematic . Affected by this vulnerability is an unknown functionality of the component CLI . The manipulation leads to unverified ownership. This vulnerability is listed as CVE-2026-27486 . The attack must be car...
Read Full Article →
CVE-2026-27488 | OpenClaw up to 2026.2.18 server-cron.ts fetch server-side request forgery (GHSA-w45g-5746-x9fp)
▼
A vulnerability was found in OpenClaw up to 2026.2.18 and classified as critical . Affected is the function fetch of the file src/gateway/server-cron.ts . Executing a manipulation can lead to server-side request forgery. This vulnerability is tracked as CVE-2026-27488 . The attack can be launched...
Read Full Article →
CVE-2026-27482 | ray-project ray up to 2.53.x DELETE Endpoint generic exception (GHSA-q5fh-2hc8-f6rq)
▼
A vulnerability has been found in ray-project ray up to 2.53.x and classified as problematic . This impacts an unknown function of the component DELETE Endpoint . Performing a manipulation results in declaration of catch for generic exception. This vulnerability is identified as CVE-2026-27482 . ...
Read Full Article →
CVE-2026-27485 | OpenClaw up to 2026.2.18 package_skill.py symlink (GHSA-r6h2-5gqq-v5v6)
▼
A vulnerability, which was classified as critical , was found in OpenClaw up to 2026.2.18 . This affects an unknown function of the file skills/skill-creator/scripts/package_skill.py . Such manipulation leads to symlink following. This vulnerability is referenced as CVE-2026-27485 . The attack ca...
Read Full Article →
CVE-2026-27484 | OpenClaw up to 2026.2.17 Request Parameter authorization (GHSA-wh94-p5m6-mr7j)
▼
A vulnerability, which was classified as problematic , has been found in OpenClaw up to 2026.2.17 . The impacted element is an unknown function of the component Request Parameter Handler . This manipulation causes missing authorization. The identification of this vulnerability is CVE-2026-27484 ....
Read Full Article →
CVE-2026-27579 | karnop realtime-collaboration-platform up to master Appwrite Project origin validation (GHSA-qh5m-p8jh-hx88)
▼
A vulnerability classified as problematic was found in karnop realtime-collaboration-platform up to master . The affected element is an unknown function of the component Appwrite Project . The manipulation results in origin validation error. This vulnerability was named CVE-2026-27579 . The attac...
Read Full Article →
CVE-2026-27480 | static-web-server Static Web Server up to 2.40.x response discrepancy (GHSA-qhp6-635j-x7r2)
▼
A vulnerability classified as problematic has been found in static-web-server Static Web Server up to 2.40.x . Impacted is an unknown function. The manipulation leads to observable response discrepancy. This vulnerability is uniquely identified as CVE-2026-27480 . The attack is possible to be car...
Read Full Article →
CVE-2026-27196 | Statamic CMS up to 5.73.8/6.3.1 cross site scripting (GHSA-8r7r-f4gm-wcpq)
▼
A vulnerability marked as problematic has been reported in Statamic CMS up to 5.73.8/6.3.1 . This vulnerability affects unknown code. Performing a manipulation results in cross site scripting. This vulnerability is known as CVE-2026-27196 . Remote exploitation of the attack is possible. No exploi...
Read Full Article →
CVE-2026-27458 | Kovah LinkAce up to 2.4.2 XML CDATA Section /lists/feed cross site scripting (GHSA-2r9p-95xj-p583)
▼
A vulnerability labeled as problematic has been found in Kovah LinkAce up to 2.4.2 . This affects an unknown part of the file /lists/feed of the component XML CDATA Section Handler . Such manipulation leads to basic cross site scripting. This vulnerability is traded as CVE-2026-27458 . The attack...
Read Full Article →
CVE-2026-27198 | getformwork up to 2.3.3 Account Creation privileges management (GHSA-34p4-7w83-35g2)
▼
A vulnerability identified as critical has been detected in getformwork formwork up to 2.3.3 . Affected by this issue is some unknown functionality of the component Account Creation Handler . This manipulation causes improper privilege management. This vulnerability appears as CVE-2026-27198 . Th...
Read Full Article →
CVE-2026-27199 | Pallets Werkzeug up to 3.1.5 send_from_directory windows device name (GHSA-29vq-49wr-vm6x)
▼
A vulnerability categorized as problematic has been discovered in Pallets Werkzeug up to 3.1.5 . Affected by this vulnerability is the function send_from_directory . The manipulation results in improper handling of windows device names. This vulnerability is reported as CVE-2026-27199 . The attac...
Read Full Article →
CVE-2026-27210 | mpetroff pannellum up to 2.5.6 pannellum.htm escapeHTML cross site scripting (GHSA-8423-w5wx-h2r6)
▼
A vulnerability was found in mpetroff pannellum up to 2.5.6 . It has been rated as problematic . Affected is an unknown function of the file pannellum.htm . The manipulation of the argument escapeHTML leads to cross site scripting. This vulnerability is documented as CVE-2026-27210 . The attack c...
Read Full Article →
CVE-2026-27452 | JonathanWilbur asn1-ts up to 11.0.5 information disclosure (GHSA-h5rw-vxjr-8q79)
▼
A vulnerability was found in JonathanWilbur asn1-ts up to 11.0.5 . It has been declared as problematic . This impacts an unknown function. Executing a manipulation can lead to information disclosure. This vulnerability is registered as CVE-2026-27452 . It is possible to launch the attack remotely...
Read Full Article →
CVE-2026-27464 | Metabase up to 0.57.12/0.58.6 Endpoint special elements used in a template engine (GHSA-vcj8-rcm8-gfj9)
▼
A vulnerability was found in Metabase up to 0.57.12/0.58.6 . It has been classified as problematic . This affects an unknown function of the component Endpoint . Performing a manipulation results in improper neutralization of special elements used in a template engine. This vulnerability is catal...
Read Full Article →
CVE-2026-27197 | getsentry up to 26.1.x SAML improper authentication (GHSA-ggmg-cqg6-j45g)
▼
A vulnerability was found in getsentry sentry up to 26.1.x and classified as critical . The impacted element is an unknown function of the component SAML Handler . Such manipulation leads to improper authentication. This vulnerability is listed as CVE-2026-27197 . The attack may be performed from...
Read Full Article →
CVE-2026-27469 | isso-comments isso Moderation Edit Endpoint Website cross site scripting (GHSA-9fww-8cpr-q66r)
▼
A vulnerability has been found in isso-comments isso and classified as problematic . The affected element is an unknown function of the component Moderation Edit Endpoint . This manipulation of the argument Website causes cross site scripting. This vulnerability is tracked as CVE-2026-27469 . The...
Read Full Article →
CVE-2026-27471 | Frappe ERPNext up to 15.98.0/16.6.0 authorization (GHSA-wpfx-jw7g-7f83)
▼
A vulnerability, which was classified as critical , was found in Frappe ERPNext up to 15.98.0/16.6.0 . Impacted is an unknown function. The manipulation results in missing authorization. This vulnerability is identified as CVE-2026-27471 . The attack can be executed remotely. There is not any exp...
Read Full Article →
CVE-2026-27470 | ZoneMinder up to 1.36.37/1.38.0 web/ajax/status.php getNearEvents sql injection (GHSA-r6gm-478g-f2c4 / Nessus ID 299728)
▼
A vulnerability, which was classified as critical , has been found in ZoneMinder up to 1.36.37/1.38.0 . This issue affects the function getNearEvents of the file web/ajax/status.php . The manipulation leads to sql injection. This vulnerability is referenced as CVE-2026-27470 . Remote exploitation...
Read Full Article →
CVE-2026-27211 | cloud-hypervisor Cloud Hypervisor up to 50.0 file inclusion (GHSA-jmr4-g2hv-mjj6)
▼
A vulnerability classified as problematic was found in cloud-hypervisor Cloud Hypervisor up to 50.0 . This vulnerability affects unknown code. Executing a manipulation can lead to file inclusion. The identification of this vulnerability is CVE-2026-27211 . The attack may be launched remotely. The...
Read Full Article →
CVE-2026-27467 | BigBlueButton up to 3.0.19 information disclosure (WID-SEC-2026-0463)
▼
A vulnerability classified as problematic has been found in BigBlueButton up to 3.0.19 . This affects an unknown part. Performing a manipulation results in information disclosure. This vulnerability was named CVE-2026-27467 . The attack may be initiated remotely. There is no available exploit. It...
Read Full Article →
CVE-2026-27206 | zumba json-serializer up to 3.2.2 unserialize deserialization (GHSA-v7m3-fpcr-h7m2 / Nessus ID 299639)
▼
A vulnerability marked as problematic has been reported in zumba json-serializer up to 3.2.2 . Affected by this vulnerability is the function JsonSerializer::unserialize . This manipulation causes deserialization. This vulnerability is handled as CVE-2026-27206 . The attack can be initiated remot...
Read Full Article →
CVE-2026-27205 | pallets flask up to 3.1.2 Setting cache containing sensitive information (GHSA-68rp-wp8r-4726 / Nessus ID 299724)
▼
A vulnerability labeled as problematic has been found in pallets flask up to 3.1.2 . Affected is an unknown function of the component Setting Handler . The manipulation results in use of cache containing sensitive information. This vulnerability is known as CVE-2026-27205 . It is possible to laun...
Read Full Article →
CVE-2026-2934 | YiFang CMS up to 2.0.5 Extended Management D_friendLinkGroup.php update Name cross site scripting + 2 similar
▼
A vulnerability identified as problematic has been detected in YiFang CMS up to 2.0.5 . This impacts the function update of the file app/db/admin/D_friendLinkGroup.php of the component Extended Management Module . The manipulation of the argument Name leads to cross site scripting. This vulnerabi...
Read Full Article →
Japanese-Language Phishing Emails, (Sat, Feb 21st)
▼
Introduction
Read Full Article →
CVE-2026-2930 | Tenda A18 15.13.07.13 Httpd Service /cgi-bin/UploadCfg webCgiGetUploadFile boundary stack-based overflow
▼
A vulnerability was found in Tenda A18 15.13.07.13 . It has been declared as critical . The affected element is the function webCgiGetUploadFile of the file /cgi-bin/UploadCfg of the component Httpd Service . Such manipulation of the argument boundary leads to stack-based buffer overflow. This vu...
Read Full Article →
CVE-2025-14339 | weMail Plugin up to 2.0.7 on WordPress Forms::permission authorization
▼
A vulnerability classified as critical has been found in weMail Plugin up to 2.0.7 on WordPress. Affected is the function Forms::permission . This manipulation causes missing authorization. The identification of this vulnerability is CVE-2025-14339 . It is possible to initiate the attack remotely...
Read Full Article →
CVE-2026-27121 | sveltejs svelte up to 5.51.4 Element Attribute cross site scripting (GHSA-f7gr-6p89-r883)
▼
A vulnerability described as problematic has been identified in sveltejs svelte up to 5.51.4 . This impacts an unknown function of the component Element Attribute Handler . The manipulation results in cross site scripting. This vulnerability was named CVE-2026-27121 . The attack may be performed ...
Read Full Article →
Hospitals at Risk of BeyondTrust Ransomware Hacks
▼
Marianne Kolbasuk McGee reports: U.S. federal authorities and industry officials are urging hospitals and clinics to address a critical flaw in BeyondTrust Remote Support and Privileged Remote Access software, which if exploited, could give an attacker a foothold inside a corporate network. The U...
Read Full Article →
Resource: Privacy Law Directory — Codamail
▼
Regular readers of my companion privacy-oriented site, PogoWasRight.org, may recall that the site recently noted The Data Broker Directory: Who has your data, where they got it, and who they sell it to by Codamail’s Stephen K. Gielda of Packetderm. Instead of taking a well-deserved break after al...
Read Full Article →
Facebook ads spread fake Windows 11 downloads that steal passwords and crypto wallets
▼
Attackers are weaponizing Facebook ads to distribute password-stealing malware masked as a Windows download.
Read Full Article →
CarMax - 431,371 breached accounts
▼
In January 2026, data allegedly sourced from US automotive retailer CarMax was published online following a failed extortion attempt . The data included 431k unique email addresses along with names, phone numbers and physical addresses.
Read Full Article →
UK Urges Small Businesses to ‘Lock the Door’ on Cybercrime
▼
The UK government has launched a new cybersecurity campaign aimed at small and medium-sized businesses urging them to “lock the door” on cyber criminals as digital threats escalate. The initiative — backed by the National Cyber Security Centre (NCSC) and the Department for Science, Innovation & T...
Read Full Article →
Meta patents AI that could keep you posting from beyond the grave
▼
Hopefully Meta really will file this in the "just because we can do it doesn't mean we should" drawer.
Read Full Article →
Smashing Security podcast #455: Face off: Meta’s Glasses and America’s internet kill switch
▼
Could America turn off Europe's internet? That’s one of the questions that Graham and special guest James Ball will be exploring as they discuss tech sovereignty. Could Gmail, cloud services, and critical infrastructure really become geopolitical leverage? And is anyone actually building a Plan B...
Read Full Article →
CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones (FIXED)
▼
Overview Rapid7 Labs conducted a zero-day research project against the Grandstream GXP1600 series of Voice over Internet Protocol (VoIP) phones. This research resulted in the discovery of a critical unauthenticated stack-based buffer overflow vulnerability, CVE-2026-2329. A remote attacker can le...
Read Full Article →
Job scam uses fake Google Forms site to harvest Google logins
▼
Phishers are using fake Google Forms pages hosted on lookalike domains to trick job seekers into handing over their Google credentials.
Read Full Article →
GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack
▼
GrayCharlie turns compromised WordPress sites into malware delivery machines. Discover how this threat actor chains fake browser updates and ClickFix lures to deploy NetSupport RAT, Stealc, and SectopRAT.
Read Full Article →
Scam Guard for desktop: A second set of eyes for suspicious moments
▼
Malwarebytes Scam Guard is now on Windows and Mac, bringing AI-powered scam detection to your desktop.
Read Full Article →
Update Chrome now: Zero-day bug allows code execution via malicious webpages
▼
Google has released an emergency update to patch an actively exploited zero-day—the first Chrome zero-day of the year.
Read Full Article →
Fake Incident Report Used in Phishing Campaign, (Tue, Feb 17th)
▼
This morning, I received an interesting phishing email. I&#;x26;#;xe2;&#;x26;#;x80;&#;x26;#;x99;ve a &#;x26;#;xe2;&#;x26;#;x80;&#;x26;#;x9c;love &#;x26; hate&#;x26;#;xe2;&#;x26;#;x80;&#;x9d; relation with such emails because I always have the impression to lose time when reviewing them but someti...
Read Full Article →
Canada Goose - 581,877 breached accounts
▼
In February 2026, a data breach allegedly containing data relating to Canada Goose customers was published publicly . The data contained 920k records with 582k unique email addresses and included names, phone numbers, IP addresses, physical addresses and partial credit card data, specifically car...
Read Full Article →
Google Amends Chrome with the First Important Security Fix in 2026 (CVE-2026-2441)
▼
Patch your Chrome browser! Google has issued a security update to address a serious security flaw that hackers are already exploiting. “The Stable channel has been updated to 145.0.7632.75/76 for Windows/Mac and 144.0.7559.75 for Linux, which will roll out over the coming days/weeks,” the Chrome ...
Read Full Article →