#This Week in Security: Your News Briefing
Welcome to your weekly security roundup. We’ve tracked down the 10 most important stories this week—the ones everyone’s talking about, from critical threats to emerging trends that could shape your security posture. Leading the news this week is CVE-2025-43529, which has sparked conversation across 10 sources. Meanwhile, the industry is closely tracking CVE-2024-55019 | Weintek cMT-3072XH2 easyWeb 2.1.53… with 5 mentions, along with emerging details on CVE-2025-63911 | Cohesity TranZman Migration Appliance 4.0 Build…, AI-powered attack kits go open source, and CyberStrikeAI may be…, and Promoting AI Security — Acting Assistant Privacy Commissioner…. Here’s the full breakdown of what you need to know.
#🚨 Critical Threats This Week
First, the stories that demand your immediate attention:
1. CVE-2025-43529 Mentioned across 10 industry sources this week. Currently trending CVE - Hype Score: 11 - A use-after-free issue was addressed with improved memory management. Get the details →
2. CVE-2024-55019 | Weintek cMT-3072XH2 easyWeb 2.1.53 download_wb.cgi access control (EUVD-2024-55458) Mentioned across 5 industry sources this week. A vulnerability, which was classified as critical , has been found in Weintek cMT-3072XH2 easyWeb 2. Get the details →
3. CVE-2025-63911 | Cohesity TranZman Migration Appliance 4.0 Build 14614 command injection Mentioned across 5 industry sources this week. A vulnerability marked as critical has been reported in Cohesity TranZman Migration Appliance 4. Get the details →
#🛠️ Tools, Updates & Releases
New capabilities and releases worth knowing about:
1. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium . Referenced in 2 stories this week. Explore →
2. Hackers Abuse .arpa Top-Level Domain to Host Phishing Scams arpa Top-Level Domain to host phishing scams, using IPv6 tunnels, reverse DNS tricks, and shadow dom. Referenced in 2 stories this week. Explore →
3. OAuth phishers make ‘check where the link points’ advice ineffective Microsoft has warned that phishers are exploiting a built-in behavior of the OAuth authentication pr. Referenced in 2 stories this week. Explore →
#What You Should Do Next
Monitor these in your environment next week:
- Any new CVE announcements related to systems you operate
- Emerging attack techniques being discussed in the community
- Updates and patches for tools your team uses
Have a look at the full deep-dives in the trending stories below. Each one provides context that could inform your security decisions this week.
#Top Trending Stories
1. Key Threat Intel & Vulnerability Stories (20 mentions)
▼
This week's critical security updates and vulnerability disclosures:
2. AI-powered attack kits go open source, and CyberStrikeAI may be just the beginning (2 mentions)
▼
AI is making it ever easier for bad actors to launch attacks, and a newly-identified open source platform, CyberStrikeAI, seems to be lowering the bar even further. The platform packages end-to-end attack automation into a single AI-native orchest...
Read Full Article →
3. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium (2 mentions)
▼
4. LexisNexis says hackers accessed legacy data in contained breach (2 mentions)
▼
The breach emerged this week when a threat actor claimed they stole 2 GB worth of information from the company that included millions of records.
Read Full Article →
5. Hackers Abuse .arpa Top-Level Domain to Host Phishing Scams (2 mentions)
▼
Hackers abuse the .arpa Top-Level Domain to host phishing scams, using IPv6 tunnels, reverse DNS tricks, and shadow domains to bypass security checks.
Read Full Article →
6. 1.2 Million Affected by University of Hawaii Cancer Center Data Breach (2 mentions)
▼
Hackers stole names, Social Security numbers, driver’s license information, voter registration records, and health-related information. The post 1.2 Million Affected by University of Hawaii Cancer Center Data Breach appeared first on SecurityWeek .
Read Full Article →
7. OAuth phishers make ‘check where the link points’ advice ineffective (2 mentions)
▼
Microsoft has warned that phishers are exploiting a built-in behavior of the OAuth authentication protocol to redirect victims to malware, using links that point to legitimate identity provider domains such as Microsoft Entra ID and Google Workspa...
Read Full Article →
8. Android devices hit by exploited Qualcomm flaw CVE-2026-21385 (2 mentions)
▼
Google confirms that the Qualcomm Android vulnerability CVE-2026-21385 was exploited in real-world attacks. Google has confirmed that CVE-2026-21385 (CVSS score of 7.8), a high-severity vulnerability affecting an open-source Qualcomm component use...
Read Full Article →#Article Summary
| Category | Article Count |
|---|---|
| AI & LLM | 6 |
| Cloud | 1 |
| Cyber Regulatory | 0 |
| Cybersecurity | 120 |
| Security Vendor Blog | 4 |
| Tech | 8 |
| Threat Intel & Vulnerability | 19 |
| Total Articles Scanned | 158 |
#AI & LLM
Best AI security solutions 2026: Top enterprise platforms compared
▼
Artificial intelligence is no longer just powering defensive cybersecurity tools, it is reshaping the entire threat landscape. AI is accelerating reconnaissance, improving the realism of phishing, automating malware mutation, and enabling adaptive attack techniques. At the same time, enterprises ...
Read Full Article →
GPT-5.3 Instant System Card
▼
GPT-5.3 Instant: Smoother, more useful everyday conversations
▼
The Download: protesting AI, and what’s floating in space
▼
This is today’s edition of The Download, our weekday newsletter that provides a daily dose of what’s going on in the world of technology. I checked out one of the biggest anti-AI protests ever Pull the plug! Pull the plug! Stop the slop! Stop the slop! For a few hours this Saturday, February 28, ...
Read Full Article →
Scaling Search Relevance: Augmenting App Store Ranking with LLM-Generated Judgments
▼
Large-scale commercial search systems optimize for relevance to drive successful sessions that help users find what they are looking for. To maximize relevance, we leverage two complementary objectives: behavioral relevance (results users tend to click or download) and textual relevance (a result...
Read Full Article →
Closing the Gap Between Text and Speech Understanding in LLMs
▼
Large Language Models (LLMs) can be adapted to extend their text capabilities to speech inputs. However, these speech-adapted LLMs consistently underperform their text-based counterparts—and even cascaded pipelines—on language understanding tasks. We term this shortfall the text-speech understand...
Read Full Article →#Cloud
Amazon Bedrock announces OpenAI-compatible Projects API
▼
Amazon Bedrock now supports OpenAI-compatible Projects API in the Mantle inference engine in Amazon Bedrock. Amazon Bedrock is a fully managed service that offers a broad selection of best-in-class foundation models from leading AI companies like Anthropic, Meta, and OpenAI, along with a broad se...
Read Full Article →#Cyber Regulatory
#Cybersecurity
Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate
▼
Dark Reading Confidential Episode 15: Interpol relied on Will Thomas and team to help break up a sprawling cybercrime ring, leading to the arrest of 574 suspects, the recovery of more than $3 million, and the decryption of six malware variants. Here's his story.
Read Full Article →
The DocuSign Email That Wasn’t – A Three-Redirect Credential Harvest
▼
TL;DR Attackers sent a convincing DocuSign notification with a "Review & Sign" button that chained through Google Maps redirects to an Amazon S3-hosted credential harvesting page. The redirect chain defeated URL scanners, and real law-firm footers added legitimacy. IRONSCALES Adaptive AI flagged ...
Read Full Article →
CISA flags VMware Aria Operations RCE flaw as exploited in attacks
▼
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a VMware Aria Operations vulnerability tracked as CVE-2026-22719 to its Known Exploited Vulnerabilities catalog, flagging the flaw as exploited in attacks. [...]
Read Full Article →
Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes
▼
The US conducted cyberattacks ahead of strikes on Iran, Russia aims for internet independence by 2028, Google finds a new iOS exploit kit in the wild, and Chrome moves to a two-week release cycle.
Read Full Article →
Vulnerability Finding: An Inflection Point
▼
LLM-driven vuln finding has reached an inflection
Read Full Article →
Security Advisory SA-26-01 GPS Attacks
▼
GPS attacks trigger revisiting threat models
Read Full Article →
LLMs as Compilers
▼
What if we think about LLM coding as if it’s a compiler stage?
Read Full Article →
The Cyber Resilience Act (CRA)!
▼
The CRA is coming and it's going to be a dramatic change for technology producers
Read Full Article →
Threat modeling as a dial, not a switch
▼
Thinking of threat modeling with a knob helps you get more out of it.
Read Full Article →
A few thoughts on CVE
▼
Thoughts on the CVE funding crisis
Read Full Article →
Introducing the DEF CON 32 Hackers' Almanack
▼
Grateful to introduce the Hackers' Almanack!
Read Full Article →
Security Researcher Comments on HIPAA Security Rule
▼
A group of us have urged HHS to require better handling of security reports
Read Full Article →
Inside Man
▼
Some thoughts on the Voyager Episode ‘Inside Man’
Read Full Article →
Appsec Roundup - July 2024
▼
The most important stories around threat modeling, appsec and secure by design for June, 2024.
Read Full Article →
Lockbit, a study in public health
▼
Why is it hard to count lockbit infections?
Read Full Article →
Eternal sunshine of the spotless LLM
▼
Making an LLM forget is harder than it seems
Read Full Article →
CSRB Report on Microsoft
▼
The CSRB has released its report into an intrusion at Microsoft, and...it’s a doozy.
Read Full Article →
Introducing Magic Security Dust!
▼
The NVD Crisis
▼
The NVD is in crisis, and so is patch management. It’s time to modernize.
Read Full Article →
Solving Hallucinations
▼
Solving hallucinations in legal briefs is playing on easy mode —— and still too hard
Read Full Article →
Microsoft Can Fix Ransomware Tomorrow
▼
My latest at Dark Reading draws attention to how Microsoft can fix ransomware tomorrow.
Read Full Article →
Phishing Defenses
▼
Phishing behaviors, as observed in the wild.
Read Full Article →
Darkreading: Threat Modeling in the Age of OpenAI's Chatbot
▼
Pointer to Adam’s latest Darkreading article
Read Full Article →
GPT-3
▼
Text captured from GPT-3
Read Full Article →
What are we going to do: CO2 edition
▼
What happened when Microsoft tried to buy climate abatements
Read Full Article →
Ransomware is Not the Problem
▼
Arbitrarily powerful software -- applications, operating systems -- is a problem, as is preventing it from running on enterprise systems.
Read Full Article →
Colonial Pipeline, Darkside and Models
▼
The Colonial Pipeline shutdown story is interesting in all sorts of ways, and I can't delve into all of it.I did want to talk about one small aspect, which is the way responders talk about Darkside.
Read Full Article →
The Updates Must Go Through
▼
The timing of updates is not coincidental.
Read Full Article →
Ever Given & Suez
▼
Thoughts on the issues with the Ever Given blocking the Suez Canal.
Read Full Article →
Threat Modeling and Social Issues
▼
For Data Breach Today, I spoke with Anna Delaney about threat modeling for issues that are in the news right now.
Read Full Article →
Vaccines
▼
You may have noticed that my end of the year posts are all science focused. Today, a set of resources on the COVID vaccines.
Read Full Article →
Interesting reads
▼
Sharing for you, bookmarking for me.
Read Full Article →
Episode 9 Spoilers
▼
Today is the last Star Wars Day before Episode 9 comes out, and brings the Skywalker saga to its end.
Read Full Article →
Leave Those Numbers for April 1st
▼
Over-inflated numbers won't scare me into buying your ‘solution’.
Read Full Article →
High ROI Security Advisory Boards
▼
Discussing the value of Security Advisory Boards
Read Full Article →
CVE Funding and Process
▼
[no description provided]
Read Full Article →
Carpenter!
▼
[no description provided]
Read Full Article →
The DREAD Pirates
▼
[no description provided]
Read Full Article →
Pen Testing The Empire
▼
[no description provided]
Read Full Article →
Threat Modeling Tooling from 2017
▼
[no description provided]
Read Full Article →
20 Year Software: Engineering and Updates
▼
[no description provided]
Read Full Article →
Hospital Ransomware
▼
[no description provided]
Read Full Article →
Warrants for Cleaning Malware in Kelihos
▼
[no description provided]
Read Full Article →
Threat Modeling & IoT
▼
[no description provided]
Read Full Article →
People are The Weakest Link In Security?
▼
[no description provided]
Read Full Article →
Modeling Attackers and Their Motives
▼
There are a number of reports out recently, breathlessly presenting their analysis of one threatening group of baddies or another. Most readers should, at most, skim their analysis of the perpetrators. Read on for why.
Read Full Article →
Can effective AI security make IT teams feel relieved
▼
How Can Non-Human Identities Revolutionize AI Security? Have you ever considered the role machine identities play in AI security? Where artificial intelligence is becoming integral to numerous sectors, securing these non-human identities (NHIs) is critical. NHIs, essentially machine identities, f...
Read Full Article →
Can advanced AI security solutions help you feel more relaxed
▼
Are Non-Human Identities the Key to Robust Cybersecurity? Safeguarding digital assets goes beyond securing human credentials. Increasingly, organizations are realizing the need to extend this protection to Non-Human Identities (NHIs), machine-driven identities integral to modern IT. These NHIs co...
Read Full Article →
How is AI security getting better over the years
▼
How Do Non-Human Identities Influence AI Security? Have you ever wondered how the intricate dance between machine identities and cybersecurity shapes AI security? The advent of advanced AI systems has introduced an array of complex security challenges. Non-Human Identities (NHIs) have become para...
Read Full Article →
Microsoft: Hackers abuse OAuth error flows to spread malware
▼
Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take users to malicious pages. [...]
Read Full Article →
Researchers discover suite of agentic AI browser vulnerabilities
▼
Through a simple calendar invite, AI browsers like Comet can be directed to access local file systems, browse directories, open and read files, and exfiltrate data. The post Researchers discover suite of agentic AI browser vulnerabilities appeared first on CyberScoop .
Read Full Article →
Qualcomm Zero-Day Exploited in Targeted Android Attacks
▼
The exploitation activity against CVE-2026-21385, a high-severity memory corruption flaw, could be tied to commercial spyware or nation-state threat groups.
Read Full Article →
Vulnerability Management vs. Patch Management Explained
▼
The post Vulnerability Management vs. Patch Management Explained appeared first on AI Security Automation . The post Vulnerability Management vs. Patch Management Explained appeared first on Security Boulevard .
Read Full Article →
Coruna: Spy-grade iOS exploit kit powering financial crime
▼
A powerful iOS exploit kit has circulated among multiple threat actors over the past year, moving from a commercial surveillance operation to state-linked espionage campaigns and, ultimately, ended into the hands of financially motivated hackers, according to new research from Google’s Threat Int...
Read Full Article →
Fake Zoom and Google Meet Pages Trick Users Into Installing Monitoring Tool
▼
Fake Zoom and Google Meet pages trick users into installing a monitoring software on Windows systems through phishing links and fake updates.
Read Full Article →
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
▼
Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack. The intrusions, identified by Huntress last month across five partner...
Read Full Article →
Threat actors weaponize OAuth redirection logic to deliver malware
▼
An ongoing phishing campaign is abusing the OAuth authentication redirection mechanism to avoid triggering conventional email and browser defenses, Microsoft researchers have revealed. The attackers are targeting government and public-sector organizations, and redirecting unsuspecting users from ...
Read Full Article →
LexisNexis confirms data breach as hackers leak stolen files
▼
American data analytics company LexisNexis Legal & Professional has confirmed to BleepingComputer that hackers breached its servers and accessed some customer and business information. [...]
Read Full Article →
Microsoft warns of OAuth phishing campaigns able to bypass email and browser defenses - says 'these campaigns demonstrate that this abuse is operational, not theoretical'
▼
An OAuth feature is being abused in the wild to drop malware to people's computers.
Read Full Article →
Compromised Site Management Panels are a Hot Item in Cybercrime Markets
▼
Compromised cPanel credentials are being sold in bulk across underground channels as plug-and-play phishing and scam infrastructure. Flare explains how analyzing 200,000 underground posts reveals a commoditized market for hacked site management panels. [...]
Read Full Article →
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
▼
The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks. The new findings come from Team Cymru, which detected it...
Read Full Article →
Enigma AI enables internal trust governance to asset-to-asset communications
▼
Enigma Networks has announced the general availability of its Internal Trust Governance platform, Enigma AI, which continuously determines and validates which communications are necessary and safe across enterprise networks. Just as identity and access management (IAM) governs trust for users, En...
Read Full Article →
OAuth phishers make ‘check where the link points’ advice ineffective
▼
Microsoft has warned that phishers are exploiting a built-in behavior of the OAuth authentication protocol to redirect victims to malware, using links that point to legitimate identity provider domains such as Microsoft Entra ID and Google Workspace. The links look safe but ultimately lead somewh...
Read Full Article →
Jetzt Staats-CISO werden – für unter 160.000 Euro
▼
width="1600" height="900" sizes="auto, (max-width: 1600px) 100vw, 1600px"> Das britische Government Communications Headquarters (GCHQ) in Cheltenham, England. GCHQ Eine aktuelle Stellenausschreibung sorgt in der Branche für Kopfschütteln. Sie legt nahe, dass manche hochrangigen Regierungsstellen ...
Read Full Article →
Android Update Patches Exploited Qualcomm Zero-Day
▼
An integer overflow or wraparound in the Qualcomm graphics component, the bug leads to memory corruption. The post Android Update Patches Exploited Qualcomm Zero-Day appeared first on SecurityWeek .
Read Full Article →
This new phishing campaign uses a fake Google Account security page to steal passcodes and more
▼
Hackers don't need an app to steal login credentials anymore - a PWA will do.
Read Full Article →
Phishing campaign exploits OAuth redirection to bypass defenses
▼
Microsoft researchers warn that threat actors abuse OAuth redirects to target government users and deliver malware. Microsoft has warned of phishing campaigns targeting government and public-sector organizations by abusing OAuth URL redirection. Instead of stealing credentials or exploiting softw...
Read Full Article →
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
▼
Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections. It's advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a...
Read Full Article →
Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign
▼
Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack
Read Full Article →
UH Cancer Center data breach affects nearly 1.2 million people
▼
The University of Hawaii confirmed that a ransomware gang stole the data of nearly 1.2 million individuals in August 2025 after breaching its Cancer Center's Epidemiology Division. [...]
Read Full Article →
Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
▼
Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers. The activity, the company said, targets government and public-sector organizations with the end goal of red...
Read Full Article →
SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains
▼
The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh. The activity, per Arctic Wolf, took place between January 2025 and January 2026. It involves the use of ...
Read Full Article →
CyberStrikeAI tool adopted by hackers for AI-powered attacks
▼
Researchers warn that a newly identified open-source AI security testing platform called CyberStrikeAI was used by the same threat actor behind a recent campaign that breached hundreds of Fortinet FortiGate firewalls. [...]
Read Full Article →
The Biosig Project libbiosig Intan CLP parsing heap-based buffer overflow vulnerability + 1 similar
▼
The Biosig Project libbiosig ABF parsing out-of-bounds read vulnerability
▼
Hackers hijack .arpa domain for phishing scams — hosting malicious websites and domains where no one can spot them
▼
Cybercriminals exploit the .arpa domain and IPv6 addresses to deliver phishing pages, bypassing traditional security and stealing credentials.
Read Full Article →
Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities
▼
The company’s latest security update contains the highest number of Android vulnerabilities patched in a single month since April 2018. The post Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities appeared first on CyberScoop .
Read Full Article →
Fake Google Security site uses PWA app to steal credentials, MFA codes
▼
A phishing campaign is using a fake Google Account security page to deliver a web-based app capable of stealing one-time passcodes, harvesting cryptocurrency wallet addresses, and proxying attacker traffic through victims' browsers. [...]
Read Full Article →
Alabama man pleads guilty to hacking, extorting hundreds of women
▼
A 22-year-old Alabama man pleaded guilty to extortion, cyberstalking, and computer fraud charges after hijacking the social media accounts of hundreds of young women (including minors). [...]
Read Full Article →
New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel
▼
Cybersecurity researchers have disclosed details of a now-patched security flaw in Google Chrome that could have permitted attackers to escalate privileges and gain access to local files on the system. The vulnerability, tracked as CVE-2026-0628 (CVSS score: 8.8), has been described as a case of ...
Read Full Article →
Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel
▼
John Hultquist suggests “aggressive” Iranian cyber attackers will target the US and its Gulf allies with plausibly deniable ransomware attacks, hacktivist campaigns and more
Read Full Article →
APT37 combines cloud storage and USB implants to infiltrate air-gapped systems
▼
North Korea-linked APT 37 used Zoho WorkDrive and USB malware to breach air-gapped networks in the Ruby Jumper campaign. North Korean group ScarCruft (aka APT37, Reaper, and Group123) deployed new tools in a campaign dubbed Ruby Jumper, using a backdoor that leverages Zoho WorkDrive for C2 and a ...
Read Full Article →
LLM-Assisted Deanonymization
▼
Turns out that LLMs are good at de-anonymization: We show that LLM agents can figure out who you are from your anonymous online posts. Across Hacker News, Reddit, LinkedIn, and anonymized interview transcripts, our method identifies users with high precision and scales to tens of thousands of c...
Read Full Article →
From fake nudes to fake quotes: AI deepfakes plagued Olympic athletes
▼
Trolls on 4chan generated sexualized images of female athletes, and the White House shared an AI-manipulated video of a hockey player—welcome to the new normal. The post From fake nudes to fake quotes: AI deepfakes plagued Olympic athletes appeared first on CyberScoop .
Read Full Article →
Ransomware Payments Decline 8% as Attacks Surge 50%
▼
Chainalysis reveals a big surge in median ransomware payment size in 2025 despite overall drop in criminal revenue
Read Full Article →
Europol’s Project Compass nets 30 arrests in crackdown on “The Com”
▼
Europol’s Project Compass led to 30 arrests targeting ‘The Com’ network, identifying 62 victims and protecting four children from harm. A yearlong operation, code-named Project Compass, led by Europol has dealt a major blow to The Com,’ a cybercrime network known for targeting children and teenag...
Read Full Article →
Hacker erpressen weniger Lösegeld
▼
immer mehr betroffene Unternehmen und Organisationen folgen dem Rat, kein Lösegeld zu zahlen . fadfebrian – shutterstock.com Laut einem neuen Bericht des Analyseunternehmens Chainalysis konnten Hacker im Jahr 2025 im Zusammenhang mit Ransomware-Angriffen insgesamt 820 Millionen Dollar erbeuten. A...
Read Full Article →
Risky Bulletin: LLMs can deanonymize internet users based on their comments
▼
LLMs can deanonymize internet users based on their comments, CISA gets a new acting director, hackers steal 15 million records from the French Ministry of Health, and Google takes down an ad fraud botnet.
Read Full Article →
Who is the Kimwolf Botmaster “Dort”?
▼
In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world's largest and most disruptive botnet. Since then, the person in control of Kimwolf -- who goes by the handle "Dort" -- has coordinated a barrage of dist...
Read Full Article →
Looking for a holiday bargain? Don't get caught out — experts warn of dark web travel agencies using stolen credit cards to buy hotels, flights, and more
▼
Cybercriminal networks resell real travel bookings bought with stolen credit cards.
Read Full Article →
Life Mirrors Art: Ransomware Hits Hospitals on TV & IRL
▼
HBO's "The Pitt" is showing audiences what a real Mississippi healthcare system is going through this week, thanks to a ransomware attack.
Read Full Article →
Watch out - that Google Tasks email could be a scam, and land you in hot water at work
▼
Hackers found a new legitimate tool to abuse, and this time it's Google Tasks.
Read Full Article →
Ransomware payments drop to record low, even as attacks surge
▼
Fewer businesses are paying, but ransomware groups are growing in number.
Read Full Article →
The Case for Why Better Breach Transparency Matters
▼
It's become a standard practice for organizations to disclose the bare minimum about a data breach, or worse — not disclose the incident at all.
Read Full Article →
ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks
▼
The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay commands and breach air-gapped networks....
Read Full Article →
Phishing Attacks Against People Seeking Programming Jobs
▼
This is new. North Korean hackers are posing as company recruiters, enticing job candidates to participate in coding challenges. When they run the code they are supposed to work on, it installs malware on their system. News article .
Read Full Article →
Your personal OpenClaw agent may also be taking orders from malicious websites
▼
If you thought running an AI agent locally kept it safely inside your machine’s walls, you’re in for a surprise. Researchers at Oasis Security have disclosed a flaw chain that allowed a malicious website to quietly connect to a locally running OpenClaw agent and take full control. The issue stems...
Read Full Article →
‘Project Compass’ Cracks Down on ‘The Com’: 30 Members of Notorious Cybercrime Gang Arrested
▼
International law enforcement operation led by Europol targets network of teenagers and young adults involved in ransomware attacks, extortion and other crimes
Read Full Article →
ManoMano data breach: massive DIY chain incident impacts 38 million customers - here's what we know
▼
French ecommerce site suffers third-party breach, losing data on millions of customers.
Read Full Article →
Risky Bulletin: Russian man extorts Conti ransomware group
▼
A Russian man prosecuted for extorting the Conti ransomware group, Google takes down a Chinese cyber-espionage operation, Anthropic tells Department of War to pound sand over AI restrictions, and a Cisco zero-day was exploited in the wild for three years.
Read Full Article →
Cisco SD-WAN Zero-Day Under Exploitation for 3 Years
▼
The maximum-severity vulnerability CVE-2026-20127 was exploited by an unknown but sophisticated threat actor who left very little evidence behind.
Read Full Article →
Project Compass is Europol’s new playbook for taking on The Com
▼
Officials said 30 perpetrators have been arrested in the past year, and global law enforcement cooperation is closing the gap. The post Project Compass is Europol’s new playbook for taking on The Com appeared first on CyberScoop .
Read Full Article →
Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown
▼
Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts. "Instead of relying on traditional servers or domains for command-and-control, Aeternum stores ...
Read Full Article →
Google takes down telecom hackers using Sheets and SaaS apps to spread mayhem
▼
A decade-old threat actor is up to some new shenanigans, but Google is having none of it.
Read Full Article →
Aeternum Botnet Shifts Command Control to Polygon Blockchain
▼
New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts
Read Full Article →
Hackers are harnessing AI to exploit security flaws faster than ever
▼
As AI gets integrated, attacks speed up and grow in severity, so buisnesses should shape up.
Read Full Article →
Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks Intensify
▼
2025 saw 32M phishing emails, with identity threats surpassing vulnerabilities
Read Full Article →
Notorious ransomware gang allegedly blackmailed by fake FSB officer
▼
There is a certain poetic justice in a cybersecurity-related story that has emerged from Moscow this week: A man has been accused of trying to extort money... from a notorious Russian ransomware gang. Read more in my article on the Hot for Security blog.
Read Full Article →
Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign
▼
UNC2814 hit 53 victims in 42 countries with novel backdoor in decade long cyber espionage operation
Read Full Article →
LLMs Generate Predictable Passwords
▼
LLMs are bad at generating passwords: There are strong noticeable patterns among these 50 passwords that can be seen easily: All of the passwords start with a letter, usually uppercase G, almost always followed by the digit 7. Character choices are highly uneven for example, L , 9, m, 2, $ and ...
Read Full Article →
Srsly Risky Biz: Is Claude too woke for war?
▼
Tom Uren and Amberleigh Jack talk about the argy-bargy between the Pentagon and AI company Anthropic. US Defense Secretary Pete Hegseth is demanding that all safeguards are lifted from Claude, while Anthropic CEO Dario Amodei is insisting on protections against mass surveillance of Americans and ...
Read Full Article →
Smashing Security podcast #456: How to lose friends and DDoS people
▼
When the mysterious operator of an internet archiving-service decided to silence a curious Finnish blogger, they didn’t just send a stroppy email - they allegedly weaponised their own CAPTCHA page to launch a DDoS attack, threatened to invent an entirely new genre of AI porn, and tampered with pa...
Read Full Article →
RAMP Forum Seizure Fractures Ransomware Ecosystem
▼
Researchers suggest defenders monitor how these malicious groups re-form and leverage the useful threat intel to guide their next moves.
Read Full Article →
Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries
▼
Google on Wednesday disclosed that it worked with industry partners to disrupt the infrastructure of a suspected China-nexus cyber espionage group tracked as UNC2814 that breached at least 53 organizations across 42 countries. "This prolific, elusive actor has a long history of targeting internat...
Read Full Article →
Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration
▼
Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic's Claude Code, an artificial intelligence (AI)-powered coding assistant, that could result in remote code execution and theft of API credentials. "The vulnerabilities exploit various configuration mechanisms, ...
Read Full Article →
This new cybercrime platform lets hackers run malicious Google Ads and hide from Google's screening process
▼
1Campaign has been around for three years and comes with a fancy dashboard.
Read Full Article →
SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks
▼
The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women to pull off social engineering attacks. The idea is to hire them for voice phishing campaigns targeting IT help desks, Dataminr said in a new threat brief....
Read Full Article →
SolarWinds Serv-U has some critical security flaws, so users should update now or face attack
▼
Four critical flaws were addressed, all of which could lead to remote code execution.
Read Full Article →
Operation Red Card 2.0 Leads to 651 Arrests in Africa
▼
In the latest operation targeting cybercrime groups, African law enforcement agencies cooperated with Interpol and cybersecurity firms to recover more than $4.3 million.
Read Full Article →
SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution
▼
SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution. The vulnerabilities, all rated 9.1 on the CVSS scoring system, are listed below - CVE-2025-40538 - A broken access c...
Read Full Article →#Security Vendor Blog
PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers
▼
Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.
Read Full Article →
Threats Making WAVs - Incident Response to a Cryptomining Attack
▼
Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident res...
Read Full Article →
Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran
▼
Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations for defenders. The post Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran appeared first on Unit 42 .
Read Full Article →
Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel
▼
A high-severity CVE-2026-0628 in Chrome's Gemini allowed local file access and privacy invasion. Google quickly patched the flaw. The post Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel appeared first on Unit 42 .
Read Full Article →#Tech
OpenAI says its latest model is less likely to beat around the bush
▼
The AI giant is also trying to walk back some terms of its deal with the Defense Department OpenAI says GPT‑5.3 Instant, the latest addition to its GPT-5.3 family of models, is less inclined to moralize.…
Read Full Article →
Iran's cyberwar has begun
▼
'Expect elevated activity for the foreseeable future' Iranian hackers have launched spying expeditions, digital probes, and distributed denial of service (DDoS) attacks in the wake of the US and Israel launching missile strikes over the weekend, and security researchers urge organizations to expe...
Read Full Article →
This free tool checks if a link is safe in seconds
▼
So, you’ve received a suspicious link and would like to check whether the website is dangerous before visiting it. You can do this, for example, with the “URL Void” service from the security provider “No Virus Thanks.” To do this, go to www.urlvoid.com , enter the web address in question, and cli...
Read Full Article →
Trump administration bans Anthropic, seemingly embraces OpenAI
▼
The Trump administration on Friday moved to ban the use of products from artificial intelligence company Anthropic by federal businesses, escalating a high-stakes clash over whether private AI makers can limit how the US military uses their systems. Just hours later, Anthropic rival OpenAI’s CEO,...
Read Full Article →
OpenAI launches stateful AI on AWS, signaling a control plane power shift
▼
Stateless AI, in which a model offers one-off answers without context from previous sessions, can be helpful in the short-term but lacking for more complex, multi-step scenarios. To overcome these limitations, OpenAI is introducing what it is calling, naturally, “stateful AI.” The company has ann...
Read Full Article →
Claude 3 snares itself regular writing gig
▼
Claude Opus 3, which has been replaced by Claude Opus 4.6 as Anthropic’s most powerful AI model, has managed to find a new position. The “newly retired” AI model has launched its own Substack blog, Claude’s Corner , which it is aiming to publish it weekly. Claude set out its purpose in writing th...
Read Full Article →
Do NOT use AI-generated passwords, security experts warn
▼
Choosing a secure password isn’t always easy. That’s why some people are turning to “artificial intelligence” (e.g., chatbots like ChatGPT and Google Gemini) to create secure passwords for them. But security experts at Irregular warn against this approach. After some tests, they’ve discovered tha...
Read Full Article →
I hate that we need scam protection in ChatGPT. But we do
▼
AI doesn’t always give accurate answers—much less specific. Meanwhile, security software sometimes gets outright ignored. You wouldn’t think combining the two would make for a solid match, but Malwarebytes is proving me wrong. Recently, the venerable security software maker launched a ChatGPT int...
Read Full Article →#Threat Intel & Vulnerability
Introducing "AI Unlocked: Decoding Prompt Injection," a New Interactive Challenge
▼
CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security
▼
CrowdStrike Achieves NCSC CIR Assurance for Incident Response
▼
Bruteforce Scans for CrushFTP , (Tue, Mar 3rd)
▼
CrushFTP is a Java-based open source file transfer system. It is offered for multiple operating systems. If you run a CrushFTP instance, you may remember that the software has had some serious vulnerabilities: CVE-2024-4040 (the template-injection flaw that let unauthenticated attackers escape th...
Read Full Article →
The Resilience Retainer: Incident Response Retainers, Reimagined
▼
Too many organizations today still rely on "legacy" retainer models. These traditional contracts are often rigid, opaque, and reactive, and designed for a world that no longer exists.
Read Full Article →
Chrome flaw let extensions hijack Gemini’s camera, mic, and file access
▼
Researchers found a now-patched vulnerability in "Live in Chrome" that allowed a Chrome extension to inherit Gemini’s permissions.
Read Full Article →
Talos on the developing situation in the Middle East
▼
Cisco Talos continues to monitor the ongoing conflict in the Middle East. As always, we will be watching closely for any cyber-related incidents that are tied to the conflict.
Read Full Article →
[webapps] Easy File Sharing Web Server v7.2 - Buffer Overflow + 1 similar
▼
Easy File Sharing Web Server v7.2 - Buffer Overflow
Read Full Article →
[webapps] WeGIA 3.5.0 - SQL Injection + 1 similar
▼
WeGIA 3.5.0 - SQL Injection
Read Full Article →
VU#431821: MS-Agent does not properly sanitize commands sent to its shell tool, allowing for RCE
▼
Overview A command injection vulnerability was identified in the MS-Agent framework that can be triggered through unsanitized prompt-derived input. An attacker can craft untrusted input introduced via a chat prompt or other external content sources, resulting in arbitrary command execution on the...
Read Full Article →
Shutdown Stalls Compliance Plans for Cyber Breach Reporting Rule
▼
Cassandre Coyer reports: A partial government shutdown threatens to further derail a key federal cybersecurity agency’s incident reporting rule—and delay answers that companies need to comply. The Department of Homeland Security shutdown, now entering its third week, may push back the finish line...
Read Full Article →
CISA Releases New Guidance on Assembling Multi-Disciplinary Insider Threat Management Teams
▼
Ashley Nyquist, Ashden Fein, Caleb Skeath, John Webster Leslie, Matthew Harden, Catherine McGrath, and Samar Amidi of Covington and Burling write: On January 28, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) published a new resource on Assembling a Multi-Disciplinary Insi...
Read Full Article →
Purchase order attachment isn’t a PDF. It’s phishing for your password
▼
A fake purchase order attachment turned out to be a phishing page designed to harvest your login details.
Read Full Article →
Fake Fedex Email Delivers Donuts!, (Fri, Feb 27th)
▼
It's Friday, let's have a look at another simple piece of malware to close a busy week! I received a Fedex notification about a delivery. Usually, such emails are simple phishing attacks that redirect you to a fake login page to collect your credentials. Here, it was a bit different:
Read Full Article →
Inside a fake Google security check that becomes a browser RAT
▼
Disguised as a security check, this fake Google alert uses browser permissions to harvest contacts, location data, and more.
Read Full Article →
Notorious ransomware gang allegedly blackmailed by fake FSB officer
▼
There is a certain poetic justice in a cybersecurity-related story that has emerged from Moscow this week: A man has been accused of trying to extort money... from a notorious Russian ransomware gang. Conti, one of the world's most infamous cybercriminal operations, was allegedly the victim of an...
Read Full Article →
The CLAIR Model: A Synthesized Conceptual Framework for Mapping Critical Infrastructure Interdependencies [Guest Diary], (Wed, Feb 25th)
▼
New Dohdoor malware campaign targets education and health care
▼
Cisco Talos discovered an ongoing malicious campaign since at least as early as December 2025 by a threat actor we track as “UAT-10027,” delivering a previously undisclosed backdoor dubbed “Dohdoor.”
Read Full Article →
Active exploitation of Cisco Catalyst SD-WAN by UAT-8616
▼
Cisco Talos is tracking the active exploitation of CVE-2026-20127, a vulnerability in Cisco Catalyst SD-WAN Controller, formerly vSmart, that allows an unauthenticated remote attacker to bypass authentication and obtain administrative privileges.
Read Full Article →📋 CVE Reference Bulletin (114 vulnerabilities) ▼
⚠️ Reference material: Click CVE IDs for full details. Severity indicators are approximate classifications.
| CVE ID | Severity | Product | Source |
|---|---|---|---|
| CVE-2026-28518 | ⚪ Unknown | 46b3e76 / EUVD-2026-9296 | VulnDB |
| CVE-2026-28342 | ⚪ Unknown | OliveTin PasswordHash | |
| CVE-2026-27631 | ⚪ Unknown | EUVD-2026-9263 / Nessus ID 300392 | VulnDB |
| CVE-2026-27596 | ⚪ Unknown | EUVD-2026-9262 | VulnDB |
| CVE-2026-27446 | ⚪ Unknown | Apache Artemis/ActiveMQ | |
| CVE-2026-26892 | ⚪ Unknown | EUVD-2026-9309 | VulnDB |
| CVE-2026-26891 | ⚪ Unknown | SourceCodester Logistic | |
| CVE-2026-26890 | ⚪ Unknown | SourceCodester Pharmacy | |
| CVE-2026-26889 | ⚪ Unknown | SourceCodester Pharmacy | |
| CVE-2026-26888 | ⚪ Unknown | SourceCodester Pharmacy | |
| CVE-2026-26887 | ⚪ Unknown | SourceCodester Pharmacy | |
| CVE-2026-26886 | ⚪ Unknown | SourceCodester Simple | |
| CVE-2026-26885 | ⚪ Unknown | SourceCodester Simple | |
| CVE-2026-26884 | ⚪ Unknown | SourceCodester Simple | |
| CVE-2026-26883 | ⚪ Unknown | SourceCodester Simple | |
| CVE-2026-26279 | ⚪ Unknown | Froxlor up | |
| CVE-2026-25884 | ⚪ Unknown | EUVD-2026-9259 | VulnDB |
| CVE-2026-25674 | ⚪ Unknown | djangoproject Django | |
| CVE-2026-25673 | ⚪ Unknown | Django up | |
| CVE-2026-25108 | ⚪ Unknown | Vulnerability | The Hacker News |
| CVE-2026-24103 | 🔵 LOW | EUVD-2026-9293 | VulnDB |
| CVE-2026-22891 | 🔴 CRITICAL | TALOS-2026-2361 | VulnDB |
| CVE-2026-22886 | ⚪ Unknown | Eclipse OpenMQ | |
| CVE-2026-21513 | ⚪ Unknown | MSHTML 0-Day Exploited | The Hacker News |
| CVE-2026-21385 | ⚪ Unknown | in Qualcomm Android | The Hacker News |
| CVE-2026-20801 | 🔴 CRITICAL | Gallagher NxWitness | |
| CVE-2026-20777 | 🔴 CRITICAL | TALOS-2026-2362 | VulnDB |
| CVE-2026-20757 | 🔴 CRITICAL | Gallagher Command | |
| CVE-2026-20127 | ⚪ Unknown | Exploited Since 2023 | The Hacker News |
| CVE-2026-3494 | ⚪ Unknown | MariaDB Server | |
| CVE-2026-3486 | ⚪ Unknown | EUVD-2026-9323 | VulnDB |
| CVE-2026-3485 | ⚪ Unknown | EUVD-2026-9322 | VulnDB |
| CVE-2026-3484 | ⚪ Unknown | EUVD-2026-9317 | VulnDB |
| CVE-2026-3465 | ⚪ Unknown | EUVD-2026-9297 | VulnDB |
| CVE-2026-3463 | 🔵 LOW | Issue 138 / ID 147 | VulnDB |
| CVE-2026-3455 | 🔴 CRITICAL | ID 412 | VulnDB |
| CVE-2026-3449 | 🔵 LOW | SNYK-JS-TOOTALLNATEONCE-15250612 | VulnDB |
| CVE-2026-3437 | ⚪ Unknown | icsa-26-062-04 | VulnDB |
| CVE-2026-3351 | ⚪ Unknown | GHSA-crmg-9m86-636r | VulnDB |
| CVE-2026-3344 | ⚪ Unknown | wgsa-2026-0005 | VulnDB |
| CVE-2026-3343 | ⚪ Unknown | wgsa-2026-0004 | VulnDB |
| CVE-2026-3342 | ⚪ Unknown | wgsa-2026-0003 | VulnDB |
| CVE-2026-3338 | ⚪ Unknown | GHSA-jchq-39cv-q4wj | VulnDB |
| CVE-2026-3337 | ⚪ Unknown | GHSA-frmv-5gcm-jwxh | VulnDB |
| CVE-2026-3336 | ⚪ Unknown | GHSA-cfwj-9wp5-wqvp | VulnDB |
| CVE-2026-3136 | ⚪ Unknown | Google Cloud | |
| CVE-2026-3102 | ⚪ Unknown | : macOS ExifTool | Kaspersky Offic |
| CVE-2026-2732 | ⚪ Unknown | Enable Media | |
| CVE-2026-2637 | ⚪ Unknown | iBoysoft NTFS | |
| CVE-2026-2568 | ⚪ Unknown | CRM Perks | |
| CVE-2026-2363 | ⚪ Unknown | WP-Members Membership | |
| CVE-2026-2292 | ⚪ Unknown | Morkva UA | |
| CVE-2026-2289 | ⚪ Unknown | Taskbuilder Plugin | |
| CVE-2026-2256 | ⚪ Unknown | ModelScope ms-agent | |
| CVE-2026-1980 | ⚪ Unknown | WPBookit Plugin | |
| CVE-2026-1945 | ⚪ Unknown | WPBookit Plugin | |
| CVE-2026-1876 | ⚪ Unknown | Mitsubishi Electric | |
| CVE-2026-1875 | ⚪ Unknown | Mitsubishi Electric | |
| CVE-2026-1874 | 🔵 LOW | Mitsubishi Electric | |
| CVE-2026-1651 | 🔴 CRITICAL | Icegram Express | |
| CVE-2026-1492 | ⚪ Unknown | User Registration | |
| CVE-2026-1273 | ⚪ Unknown | PostX Plugin | |
| CVE-2026-0754 | ⚪ Unknown | HP VVX/Edge | |
| CVE-2026-0540 | ⚪ Unknown | cure53 DOMPurify | |
| CVE-2026-0005 | ⚪ Unknown | Google Android | |
| CVE-2025-70821 | ⚪ Unknown | EUVD-2025-208233 | VulnDB |
| CVE-2025-70236 | 🔵 LOW | EUVD-2025-208248 | VulnDB |
| CVE-2025-69765 | 🔵 LOW | Tenda AX3 | |
| CVE-2025-68613 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-67840 | ⚪ Unknown | Cohesity TranZman | |
| CVE-2025-66945 | ⚪ Unknown | Zdir 4.x | |
| CVE-2025-66680 | ⚪ Unknown | WiseCleaner Wise | |
| CVE-2025-66363 | ⚪ Unknown | Samsung Mobile | |
| CVE-2025-66168 | 🔴 CRITICAL | Apache ActiveMQ | |
| CVE-2025-64736 | 🔴 CRITICAL | TALOS-2025-2323 / EUVD-2025-208232 | VulnDB |
| CVE-2025-64328 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-63912 | ⚪ Unknown | Cohesity TranZman | |
| CVE-2025-63911 | ⚪ Unknown | Cohesity TranZman | |
| CVE-2025-63910 | ⚪ Unknown | Cohesity TranZman | |
| CVE-2025-63909 | ⚪ Unknown | Cohesity TranZman | |
| CVE-2025-62817 | ⚪ Unknown | Processor Samsung | |
| CVE-2025-62816 | ⚪ Unknown | Samsung Mobile | |
| CVE-2025-62815 | ⚪ Unknown | Processor Samsung | |
| CVE-2025-62814 | ⚪ Unknown | Samsung Mobile | |
| CVE-2025-59060 | ⚪ Unknown | Apache Ranger | |
| CVE-2025-59059 | ⚪ Unknown | Apache Ranger | |
| CVE-2025-57622 | ⚪ Unknown | EUVD-2025-208231 | VulnDB |
| CVE-2025-54136 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-52365 | ⚪ Unknown | EUVD-2025-208230 | VulnDB |
| CVE-2025-47147 | 🔴 CRITICAL | Gallagher Command | |
| CVE-2025-43529 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-38617 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-15599 | ⚪ Unknown | cure53 DOMPurify | |
| CVE-2025-15595 | ⚪ Unknown | mlsoft Inno | |
| CVE-2025-14500 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-12345 | 🔵 LOW | LLM-Claw 0.1.0/0.1.1/0.1.1a/0.1.1 | |
| CVE-2025-10891 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-7544 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-0282 | ⚪ Unknown | Intruder Intel | |
| CVE-2024-55027 | ⚪ Unknown | EUVD-2024-55466 | VulnDB |
| CVE-2024-55026 | ⚪ Unknown | EUVD-2024-55465 | VulnDB |
| CVE-2024-55025 | ⚪ Unknown | EUVD-2024-55464 | VulnDB |
| CVE-2024-55024 | ⚪ Unknown | EUVD-2024-55463 | VulnDB |
| CVE-2024-55023 | ⚪ Unknown | EUVD-2024-55462 | VulnDB |
| CVE-2024-55022 | ⚪ Unknown | EUVD-2024-55461 | VulnDB |
| CVE-2024-55021 | ⚪ Unknown | EUVD-2024-55460 | VulnDB |
| CVE-2024-55020 | ⚪ Unknown | EUVD-2024-55459 | VulnDB |
| CVE-2024-55019 | ⚪ Unknown | EUVD-2024-55458 | VulnDB |
| CVE-2023-31044 | ⚪ Unknown | Nokia Impact | |
| CVE-2023-23397 | ⚪ Unknown | Intruder Intel | |
| CVE-2021-35486 | 🔴 CRITICAL | Nokia Impact | |
| CVE-2021-35485 | 🔴 CRITICAL | Nokia Impact | |
| CVE-2021-35484 | 🔴 CRITICAL | Nokia Impact | |
| CVE-2021-35483 | 🔴 CRITICAL | Nokia Impact |
<p class="text-muted-foreground text-xs mt-3 italic">💡 Tip: Use the <strong>CVE ID</strong> column as a quick reference. For detailed analysis, also check the editorial sections above for deeper coverage of significant vulnerabilities.</p>