#This Week in Security: Your News Briefing
Welcome to your weekly security roundup. We’ve tracked down the 10 most important stories this week—the ones everyone’s talking about, from critical threats to emerging trends that could shape your security posture. Leading the news this week is CVE-2024-23225, which has sparked conversation across 9 sources. Meanwhile, the industry is closely tracking Threat Modeling and Social Issues with 4 mentions, along with emerging details on CVE-2026-3790 | SourceCodester Sales and Inventory System 1.0 POST…, CVE-2025-64152 | Apache IoTDB up to 1.3.5/2.0.6 path traversal, and Promoting AI Security — Acting Assistant Privacy Commissioner…. Here’s the full breakdown of what you need to know.
#🚨 Critical Threats This Week
First, the stories that demand your immediate attention:
1. CVE-2024-23225 Mentioned across 9 industry sources this week. Currently trending CVE - Hype Score: 13 - A memory corruption issue was addressed with improved validation. Get the details →
2. Threat Modeling and Social Issues Mentioned across 4 industry sources this week. For Data Breach Today, I spoke with Anna Delaney about threat modeling for issues that are in the news right now. Get the details →
3. CVE-2026-3790 | SourceCodester Sales and Inventory System 1.0 POST Parameter check_supplier_details.php stock_name1 sql injection (EUVD-2026-10280) Mentioned across 3 industry sources this week. A vulnerability categorized as critical has been discovered in SourceCodester Sales and Inventory System 1. Get the details →
#🛠️ Tools, Updates & Releases
New capabilities and releases worth knowing about:
1. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium . Referenced in 2 stories this week. Explore →
2. FBI wiretap system tapped by hackers The US Federal Bureau of Investigation (FBI) has identified a suspected incident on a network used t. Referenced in 3 stories this week. Explore →
#What You Should Do Next
Monitor these in your environment next week:
- Any new CVE announcements related to systems you operate
- Emerging attack techniques being discussed in the community
- Updates and patches for tools your team uses
Have a look at the full deep-dives in the trending stories below. Each one provides context that could inform your security decisions this week.
#Top Trending Stories
1. Key Threat Intel & Vulnerability Stories (14 mentions)
▼
This week's critical security updates and vulnerability disclosures:
- CVE-2024-23225 (9 mentions, 9 sources)
- Intruder Intel CVE Feed — CVE-2024-23225 (Mar 09, 08:17)
- Intruder Intel CVE Feed — CVE-2024-23296 (Mar 09, 08:17)
- Intruder Intel CVE Feed — CVE-2025-59287 (Mar 09, 08:17)
- Intruder Intel CVE Feed — CVE-2025-43529 (Mar 09, 08:17)
- Intruder Intel CVE Feed — CVE-2023-40238 (Mar 09, 08:17)
- Intruder Intel CVE Feed — CVE-2025-55182 (Mar 09, 08:17)
- Intruder Intel CVE Feed — CVE-2023-43000 (Mar 09, 08:17)
- Intruder Intel CVE Feed — CVE-2025-43530 (Mar 09, 08:17)
- Intruder Intel CVE Feed — CVE-2025-38617 (Mar 09, 08:17)
- CVE-2026-3790 | SourceCodester Sales and Inventory System 1.0 POST Parameter check_supplier_details.php stock_name1 sql injection (EUVD-2026-10280) (3 mentions, 3 sources)
- VulnDB — CVE-2026-3755 | SourceCodester Sales and Inventory System 1.0 POST check_custome… (Mar 07, 20:35)
- VulnDB — CVE-2026-3756 | SourceCodester Sales and Inventory System up to 1.0 /check_item_… (Mar 07, 20:35)
- VulnDB — CVE-2026-3790 | SourceCodester Sales and Inventory System 1.0 POST Parameter che… (Mar 08, 07:29)
- CVE-2025-64152 | Apache IoTDB up to 1.3.5/2.0.6 path traversal (2 mentions, 2 sources)
- VulnDB — CVE-2025-55017 | Apache IoTDB up to 1.3.5/2.0.5 path traversal (Mar 09, 06:53)
- VulnDB — CVE-2025-64152 | Apache IoTDB up to 1.3.5/2.0.6 path traversal (Mar 09, 06:54)
📰 View all 9 sources covering this story ▼
First reported: Mar 09, 08:17
📰 View all 3 sources covering this story ▼
First reported: Mar 07, 20:35 | Last update: Mar 08, 07:29
📰 View all 2 sources covering this story ▼
First reported: Mar 09, 06:53 | Last update: Mar 09, 06:54
2. Threat Modeling and Social Issues (4 mentions, 4 sources)
▼
For Data Breach Today, I spoke with Anna Delaney about threat modeling for issues that are in the news right now.
📰 View all 4 sources covering this story ▼
- Shostack + Friends Blog — Threat Modeling: What, Why and How
- Shostack + Friends Blog — Jonathan Marcil’s Threat Modeling Toolkit talk
- Shostack + Friends Blog — Threat Modeling Building Blocks
- Shostack + Friends Blog — Threat Modeling and Social Issues
3. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium (2 mentions, 2 sources)
▼
4. FBI wiretap system tapped by hackers (3 mentions, 3 sources)
▼
The US Federal Bureau of Investigation (FBI) has identified a suspected incident on a network used to manage wiretaps and foreign intelligence surveillance warrants, CNN reported . The FBI acknowledged the incident in a statement to CNN, saying, “...
📰 View all 3 sources covering this story ▼
- TechCrunch Security — FBI investigating hack on its wiretap and surveillance systems: Report (Mar 05, 21:33)
- CSO Online — FBI wiretap system tapped by hackers (Mar 06, 16:40)
- Computerworld — FBI wiretap system tapped by hackers (Mar 06, 16:45)
First reported: Mar 05, 21:33 | Last update: Mar 06, 16:45
5. Massive GitHub malware operation spreads BoryptGrab stealer (2 mentions, 2 sources)
▼
Trend Micro found BoryptGrab stealer spreading through 100+ GitHub repositories, stealing browser data, crypto wallets, system information, and user files. Trend Micro uncovered a campaign distributing the BoryptGrab information stealer through mo...
📰 View all 2 sources covering this story ▼
- SecurityWeek — Over 100 GitHub Repositories Distributing BoryptGrab Stealer (Mar 07, 12:40)
- Security Affairs — Massive GitHub malware operation spreads BoryptGrab stealer (Mar 08, 13:38)
First reported: Mar 07, 12:40 | Last update: Mar 08, 13:38
6. Recent Cisco Catalyst SD-WAN Vulnerability Now Widely Exploited (2 mentions, 2 sources)
▼
WatchTowr reports seeing exploitation attempts for CVE-2026-20127 from numerous unique IP addresses. The post Recent Cisco Catalyst SD-WAN Vulnerability Now Widely Exploited appeared first on SecurityWeek .
📰 View all 2 sources covering this story ▼
- The Hacker News — Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilitie… (Mar 05, 15:22)
- SecurityWeek — Recent Cisco Catalyst SD-WAN Vulnerability Now Widely Exploited (Mar 08, 12:15)
First reported: Mar 05, 15:22 | Last update: Mar 08, 12:15
7. Reading White House President Trump’s Cyber Strategy for America (March 2026) (2 mentions, 2 sources)
▼
White House released President Trump’s Cyber Strategy for America, framing cyberspace as a strategic domain to project power and counter growing cyber threats The White House has released “President Trump’s Cyber Strategy for America,” a document ...
📰 View all 2 sources covering this story ▼
- CyberScoop — The long-awaited Trump cyber strategy has arrived (Mar 06, 22:55)
- Security Affairs — Reading White House President Trump’s Cyber Strategy for America (March 2026) (Mar 07, 17:13)
First reported: Mar 06, 22:55 | Last update: Mar 07, 17:13
8. Feds take notice of iOS vulnerabilities exploited under mysterious circumstances (2 mentions, 2 sources)
▼
The long, strange trip of a large assembly of advanced iOS exploits.
Read Full Article →#Article Summary
| Category | Article Count |
|---|---|
| AI & LLM | 10 |
| Cloud | 3 |
| Cyber Regulatory | 0 |
| Cybersecurity | 184 |
| Security Vendor Blog | 7 |
| Tech | 21 |
| Threat Intel & Vulnerability | 27 |
| Total Articles Scanned | 252 |
#AI & LLM
How Balyasny Asset Management built an AI research engine for investing
▼
See how Balyasny built an AI research system with GPT-5.4, rigorous model evaluation, and agent workflows to transform investment analysis at scale.
Read Full Article →
The Download: an AI agent’s hit piece, and preventing lightning
▼
This is today’s edition of The Download, our weekday newsletter that provides a daily dose of what’s going on in the world of technology. Online harassment is entering its AI era Scott Shambaugh didn’t think twice when he denied an AI agent’s request to contribute to matplotlib, a software librar...
Read Full Article →
GPT-5.4 Thinking System Card + 1 similar
▼
Reasoning models struggle to control their chains of thought, and that’s good
▼
OpenAI introduces CoT-Control and finds reasoning models struggle to control their chains of thought, reinforcing monitorability as an AI safety safeguard.
Read Full Article →
Introducing GPT-5.4
▼
Introducing GPT-5.4, OpenAI’s most most capable and efficient frontier model for professional work, with state-of-the-art coding, computer use, tool search, and 1M-token context.
Read Full Article →
Introducing ChatGPT for Excel and new financial data integrations
▼
OpenAI introduces ChatGPT for Excel and new financial app integrations, powered by GPT-5.4 to accelerate modeling, research, and analysis in regulated environments.
Read Full Article →
The Download: Earth’s rumblings, and AI for strikes on Iran
▼
This is today’s edition of The Download, our weekday newsletter that provides a daily dose of what’s going on in the world of technology. Listen to Earth’s rumbling, secret soundtrack The boom of a calving glacier. The crackling rumble of a wildfire. The roar of a surging storm front. They’re the...
Read Full Article →
Extending single-minus amplitudes to gravitons
▼
A new preprint extends single-minus amplitudes to gravitons, with GPT-5.2 Pro helping derive and verify nonzero graviton tree amplitudes in quantum gravity.
Read Full Article →
Best AI security solutions 2026: Top enterprise platforms compared
▼
Artificial intelligence is no longer just powering defensive cybersecurity tools, it is reshaping the entire threat landscape. AI is accelerating reconnaissance, improving the realism of phishing, automating malware mutation, and enabling adaptive attack techniques. At the same time, enterprises ...
Read Full Article →
GPT-5.3 Instant: Smoother, more useful everyday conversations
▼
#Cloud
Introducing Amazon Connect Health, Agentic AI Built for Healthcare
▼
Amazon Connect Health is now generally available, bringing purpose-built agentic AI to healthcare organizations to streamline patient engagement and point-of-care workflows. Amazon Connect Health delivers five AI agents designed to reduce administrative burden across the care continuum — enabling...
Read Full Article →
Amazon GameLift Servers launches DDoS Protection
▼
We’re excited to announce Amazon GameLift Servers DDoS Protection, a new feature that helps game developers protect session-based multiplayer games that utilize Amazon GameLift Servers to help improve overall game session resiliency. DDoS Protection is designed to defend against denial-of-service...
Read Full Article →
AWS Config now supports 30 new resource types
▼
AWS Config now supports 30 additional AWS resource types across key services including Amazon Bedrock AgentCore and Amazon Cognito. This expansion provides greater coverage over your AWS environment, enabling you to more effectively discover, assess, audit, and remediate an even broader range of ...
Read Full Article →#Cyber Regulatory
#Cybersecurity
Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure
▼
High-value organizations located in South, Southeast, and East Asia have been targeted by a Chinese threat actor as part of a years-long campaign. The activity, which has targeted aviation, energy, government, law enforcement, pharmaceutical, technology, and telecommunications sectors, has been a...
Read Full Article →
Anthropic Claude Opus AI model discovers 22 Firefox bugs
▼
Anthropic used Claude Opus 4.6 to identify 22 Firefox vulnerabilities, most of which were high severity, all of which were fixed in Firefox 148, released in January 2026. Anthropic discovered 22 security vulnerabilities in Firefox using its Claude Opus 4.6 AI model in January 2026. Mozilla addres...
Read Full Article →
Vulnerability Finding: An Inflection Point
▼
LLM-driven vuln finding has reached an inflection
Read Full Article →
Bitlocker, the FBI, and Risk
▼
What can the Bitlocker story tell us about risk?
Read Full Article →
Security Advisory SA-26-01 GPS Attacks
▼
GPS attacks trigger revisiting threat models
Read Full Article →
LLMs as Compilers
▼
What if we think about LLM coding as if it’s a compiler stage?
Read Full Article →
The Cyber Resilience Act (CRA)!
▼
The CRA is coming and it's going to be a dramatic change for technology producers
Read Full Article →
Threat modeling as a dial, not a switch
▼
Thinking of threat modeling with a knob helps you get more out of it.
Read Full Article →
A few thoughts on CVE
▼
Thoughts on the CVE funding crisis
Read Full Article →
Introducing the DEF CON 32 Hackers' Almanack
▼
Grateful to introduce the Hackers' Almanack!
Read Full Article →
Security Researcher Comments on HIPAA Security Rule
▼
A group of us have urged HHS to require better handling of security reports
Read Full Article →
Inside Man
▼
Some thoughts on the Voyager Episode ‘Inside Man’
Read Full Article →
Party over country
▼
One of the things we expect of a politician in a civilized country is that they put their country first.
Read Full Article →
Appsec Roundup - July 2024
▼
The most important stories around threat modeling, appsec and secure by design for June, 2024.
Read Full Article →
Lockbit, a study in public health
▼
Why is it hard to count lockbit infections?
Read Full Article →
Eternal sunshine of the spotless LLM
▼
Making an LLM forget is harder than it seems
Read Full Article →
Other comments on the CSRB Microsoft Report
▼
Other people have written about the CSRB report, and I wanted to share their perspectives.
Read Full Article →
CSRB Report on Microsoft
▼
The CSRB has released its report into an intrusion at Microsoft, and...it’s a doozy.
Read Full Article →
Introducing Magic Security Dust!
▼
The NVD Crisis
▼
The NVD is in crisis, and so is patch management. It’s time to modernize.
Read Full Article →
Solving Hallucinations
▼
Solving hallucinations in legal briefs is playing on easy mode —— and still too hard
Read Full Article →
Red Teaming
▼
Red Teaming by Bryce Hoffman is a thought-provoking read.
Read Full Article →
CSRB Senate Hearing
▼
Comments following the Senate’s CSRB hearing
Read Full Article →
FDA Final Cyber Guidance is out
▼
The FDA has released their new guidance, which will be broadly impactful.
Read Full Article →
Microsoft Can Fix Ransomware Tomorrow
▼
My latest at Dark Reading draws attention to how Microsoft can fix ransomware tomorrow.
Read Full Article →
Phishing Defenses
▼
Phishing behaviors, as observed in the wild.
Read Full Article →
The Cyber Safety Review Board Should Investigate Major Historical Incidents
▼
Tarah Wheeler and Adam write in CFR
Read Full Article →
Application Security Roundup - Feb + 1 similar
▼
This month is all about memory safety, unless you’re a standards group.
Read Full Article →
The Appsec Landscape in 2023
▼
External changes will be driving appsec in 2023. It’s time to frame the decisions in front of you.
Read Full Article →
Darkreading: Threat Modeling in the Age of OpenAI's Chatbot
▼
Pointer to Adam’s latest Darkreading article
Read Full Article →
GPT-3
▼
Text captured from GPT-3
Read Full Article →
I need an extension!
▼
A few lessons from the Mazda radio incident.
Read Full Article →
What are we going to do: CO2 edition
▼
What happened when Microsoft tried to buy climate abatements
Read Full Article →
25 Years in AppSec: Looking Back
▼
Time flies and things change... A look back on the growth of this industry.
Read Full Article →
Ransomware is Not the Problem
▼
Arbitrarily powerful software -- applications, operating systems -- is a problem, as is preventing it from running on enterprise systems.
Read Full Article →
Colonial Pipeline, Darkside and Models
▼
The Colonial Pipeline shutdown story is interesting in all sorts of ways, and I can't delve into all of it.I did want to talk about one small aspect, which is the way responders talk about Darkside.
Read Full Article →
Threat Model Thursday: Technology Consumers
▼
“It depends on your threat model...”
Read Full Article →
The Updates Must Go Through
▼
The timing of updates is not coincidental.
Read Full Article →
Ever Given & Suez
▼
Thoughts on the issues with the Ever Given blocking the Suez Canal.
Read Full Article →
Vaccines
▼
You may have noticed that my end of the year posts are all science focused. Today, a set of resources on the COVID vaccines.
Read Full Article →
It's Not Working!
▼
Help me help you...
Read Full Article →
Threat Model In My Devops
▼
A recent talk by Alyssa Miller focuses on integrating threat modeling in devops.
Read Full Article →
SLR as a Webcam
▼
As I built out my home studio to record videos for my distributed classes, I was lucky enough to be able to find an in-stock HDMI capture card, but those are harder and harder to find. As it turns out, you may be able to avoid the need for that with a mix of apps.
Read Full Article →
Quick Threat Model Links October 2019
▼
Just a few things for now
Read Full Article →
Interesting reads
▼
Sharing for you, bookmarking for me.
Read Full Article →
Testing Building Blocks
▼
There are a couple of new, short (4-page), interesting papers from a team at KU Leuven discussin the building blocks of threat modeling.
Read Full Article →
Episode 9 Spoilers
▼
Today is the last Star Wars Day before Episode 9 comes out, and brings the Skywalker saga to its end.
Read Full Article →
The White Box Essays (Book Review)
▼
A resource for those developing games.
Read Full Article →
Leave Those Numbers for April 1st
▼
Over-inflated numbers won't scare me into buying your ‘solution’.
Read Full Article →
High ROI Security Advisory Boards
▼
Discussing the value of Security Advisory Boards
Read Full Article →
CVE Funding and Process
▼
[no description provided]
Read Full Article →
Carpenter!
▼
[no description provided]
Read Full Article →
'EFAIL' Is Why We Can't Have Golden Keys
▼
[no description provided]
Read Full Article →
The DREAD Pirates
▼
[no description provided]
Read Full Article →
$35M for Covering up A Breach
▼
[no description provided]
Read Full Article →
Citizen Threat Modeling and more data
▼
[no description provided]
Read Full Article →
Pen Testing The Empire
▼
[no description provided]
Read Full Article →
Threat Modeling Tooling from 2017
▼
[no description provided]
Read Full Article →
20 Year Software: Engineering and Updates
▼
[no description provided]
Read Full Article →
Threat Modeling Encrypted Databases
▼
[no description provided]
Read Full Article →
Bicycling and Risk
▼
[no description provided]
Read Full Article →
Maintaining & Updating Software
▼
[no description provided]
Read Full Article →
Certificate pinning is great in stone soup
▼
[no description provided]
Read Full Article →
Security Rarely Flows Downhill
▼
[no description provided]
Read Full Article →
Hospital Ransomware
▼
[no description provided]
Read Full Article →
Warrants for Cleaning Malware in Kelihos
▼
[no description provided]
Read Full Article →
Threat Modeling and Star Wars
▼
[no description provided]
Read Full Article →
Threat Modeling & IoT
▼
[no description provided]
Read Full Article →
Account Recovery
▼
[no description provided]
Read Full Article →
People are The Weakest Link In Security?
▼
[no description provided]
Read Full Article →
Calls for an NTSB?
▼
[no description provided]
Read Full Article →
Modeling Attackers and Their Motives
▼
There are a number of reports out recently, breathlessly presenting their analysis of one threatening group of baddies or another. Most readers should, at most, skim their analysis of the perpetrators. Read on for why.
Read Full Article →
Submarine cables move to the center of critical infrastructure security debate
▼
The cables running along the ocean floor carry the overwhelming majority of the world’s cross-border data traffic, and for most of their operational history they have attracted little strategic attention. That is changing. A new sector report from Capacity Insights draws on interviews with senior...
Read Full Article →
Cloud Security
▼
Tarnung als Taktik: Warum Ransomware-Angriffe raffinierter werden
▼
Statt eines kurzen, aber sehr schmerzhaften Stiches setzen Cyberkrimelle zunehmend darauf, sich in ihren Opfern festzubeißen und beständig auszusaugen. mycteria – shutterstock.com Ransomware-Angreifer ändern zunehmend ihre Taktik und setzen vermehrt auf unauffällige Infiltration. Dies liegt daran...
Read Full Article →
How Chinese Hackers Reached America’s Surveillance Infrastructure
▼
Chinese government-linked hackers have breached a network used by the Federal Bureau of Investigation to manage court-authorized surveillance operations. The intrusion, first detected on February 17, 2026, involved systems supporting the FBI’s Digital Collection System Network (DSCNet), infrastru...
Read Full Article →
DumpBrowserSecrets – Browser Credential Harvesting with App-Bound Encryption Bypass
▼
DumpBrowserSecrets extracts saved passwords, cookies, OAuth tokens and autofill data from Chrome, Edge, Firefox, Opera and Vivaldi, bypassing App-Bound Encryption via Early Bird APC injection.
Read Full Article →
AI Is Moving Faster Than Security Controls
▼
AI is entering organisations faster than the security controls designed to govern it. Artificial intelligence is rapidly becoming embedded across organisations. AI assistants are now writing code, summarising documents, analysing data, and supporting operational decisions. What began as experimen...
Read Full Article →
EU court adviser says banks must immediately refund phishing victims
▼
Athanasios Rantos, the Advocate General of the Court of Justice of the EU (CJEU), has issued a formal opinion suggesting that banks must immediately refund account holders affected by unauthorized transactions, even when it's their fault. [...]
Read Full Article →
Hackers abuse .arpa DNS and ipv6 to evade phishing defenses
▼
Threat actors are abusing the special-use ".arpa" domain and IPv6 reverse DNS in phishing campaigns that more easily evade domain reputation checks and email security gateways. [...]
Read Full Article →
Week in review: Weaponized OAuth redirection logic delivers malware, Patch Tuesday forecast
▼
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: BlacksmithAI: Open-source AI-powered penetration testing framework BlacksmithAI is an open-source penetration testing framework that uses multiple AI agents to execute different stages of a security ...
Read Full Article →
'What begins as a phone call from 'IT support' ends with a fully instrumented network compromise': This fake tech support scam tricks employees into infecting their own company devices
▼
Attackers deliberately crash browsers, impersonate IT staff, and convince employees to install malicious tools that deploy Havoc malware across corporate systems.
Read Full Article →
Termite ransomware breaches linked to ClickFix CastleRAT attacks
▼
Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor. [...]
Read Full Article →
US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies
▼
Trump’s Cyber Strategy calls for stronger deterrence against cyber adversaries, modernization of federal networks, protection of critical infrastructure, and investment in technologies such as AI and post-quantum cryptography. The post US Cyber Strategy Targets Adversaries, Critical Infrastructur...
Read Full Article →
CBP Used Online Ad Data to Track Phone Locations
▼
Plus: Proton helped the FBI identify a protester, the Leakbase cybercrime forum was busted in an international operation, and more.
Read Full Article →
Iran-linked hackers target IP cameras across Israel and Gulf states for military intelligence
▼
Researchers observed Iran-linked actors targeting IP cameras across Israel and Gulf countries, likely to support military intelligence and battle damage assessment. According to the Check Point Cyber Security Report 2026, cyber operations are increasingly used to support military activity and bat...
Read Full Article →
Iran-linked MuddyWater deploys Dindoor malware against U.S. organizations
▼
Iran-linked APT MuddyWater targeted U.S. organizations, deploying the new Dindoor backdoor across sectors including banks, airports, and nonprofits. Broadcom’s Symantec Threat Hunter Team uncovered a campaign by the Iran-linked MuddyWater (aka SeedWorm, TEMP.Zagros, Mango Sandstorm, TA450, and St...
Read Full Article →
Microsoft warns North Korean threat groups are scaling up fake worker schemes with generative AI
▼
Attackers have turned AI into a “force multiplier” for the country’s expansive scheme to get and keep operatives hired at global companies, researchers said. The post Microsoft warns North Korean threat groups are scaling up fake worker schemes with generative AI appeared first on CyberScoop .
Read Full Article →
Cylake Offers AI-Native Security Without Relying on Cloud Services
▼
Cylake's platform will analyze security data locally and identify potential attacks for organizations concerned about data sovereignty.
Read Full Article →
How hackers bypassed MFA with a $120 phishing kit – until a global takedown shut it down
▼
In a co-ordinated public-private operation between law enforcement agencies and cybersecurity industry partners, Tycoon 2FA - one of the world's most prolific phishing-as-a-service platforms - has been dismantled. Read more in my article on the Hot for Security blog.
Read Full Article →
Hackers exploiting WordPress membership plugin bug to create admin accounts
▼
A popular WordPress plugin can be abused to take over websites - with thousands of sites reportedly vulnerable.
Read Full Article →
CISA warns feds to patch iOS flaws exploited in crypto-theft attacks
▼
CISA ordered U.S. federal agencies to patch three iOS security flaws targeted in cyberespionage and crypto-theft attacks using the Coruna exploit kit. [...]
Read Full Article →
Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India
▼
The Pakistan-aligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence (AI)-powered coding tools to strike targets with various implants. The activity is designed to produce a "high-volume, mediocre mass of implants" that are developed ...
Read Full Article →
Fake Claude Code install guides push infostealers in InstallFix attacks
▼
Threat actors are employing a new variation of the ClickFix social engineering technique called InstallFix to convince users into running malicious commands under the pretext of installing legitimate command line interface (CLI) tools. [...]
Read Full Article →
Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT
▼
Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various encrypted remote access trojan (RATs) payloads that correspond to XWorm, AsyncRAT, and Xeno RAT. The stealthy attack chain has been codenamed VOID#GEIST by Se...
Read Full Article →
Congress looks to revive critical cyber program for rural electric utilities
▼
A House committee reauthorized an Energy Department program that funnels hundreds of millions of dollars and cybersecurity assistance to rural electric utilities. The post Congress looks to revive critical cyber program for rural electric utilities appeared first on CyberScoop .
Read Full Article →
Iran-linked APT targets US critical sectors with new backdoors
▼
An Iran-linked hacking group has been active inside the networks of several US organizations since early February, raising concerns that the activity could precede broader cyber operations connected to escalating geopolitical tensions in the Middle East. New backdoors used by Seedworm Symantec an...
Read Full Article →
CISA Adds iOS Flaws From Coruna Exploit Kit to KEV List
▼
The nation-state-grade iOS exploit kit targets 23 vulnerabilities affecting iOS 13 to 17.2.1. The post CISA Adds iOS Flaws From Coruna Exploit Kit to KEV List appeared first on SecurityWeek .
Read Full Article →
LastPass warns of scam using fake email chains spoofing account hacking 'to draw attention and generate urgency' in users
▼
What would you do if you could eavesdrop on an ongoing social engineering attack against your LastPass account?
Read Full Article →
Cisco Patches 48 Firewall Vulnerabilities with Two CVSS 10 Flaws
▼
Cisco patches 48 vulnerabilities in Secure Firewall products, including two critical CVSS 10 flaws that could allow authentication bypass and remote code execution.
Read Full Article →
Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor
▼
New research from Broadcom's Symantec and Carbon Black Threat Hunter Team has discovered evidence of an Iranian hacking group embedding itself in several U.S. companies' networks, including banks, airports, non-profit, and the Israeli arm of a software company. The activity has been attributed to...
Read Full Article →
Hexnode IdP brings device-aware authentication and zero trust to enterprise access
▼
Hexnode has announced the launch of Hexnode IdP. By introducing this native identity layer, Hexnode delivers enterprise-grade authentication and identity management within a single, unified framework. While debuting as a dedicated Identity Provider (IdP), the solution marks a significant expansio...
Read Full Article →
Ghanain man pleads guilty to role in $100 million fraud ring
▼
A Ghanaian national pleaded guilty to his role in a massive fraud ring that stole over $100 million from victims across the United States through business email compromise attacks and romance scams. [...]
Read Full Article →
Teenage hacker myth primed for a middle-age criminal makeover
▼
The Hollywood image of criminal hackers being largely teenage ne’er do wells is due for an update. That’s because profit-seeking career criminals — often approaching middle age — make up the largest cohort of today’s cybercriminals, according to an analysis of criminal cases carried out by Orange...
Read Full Article →
China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks
▼
A China-linked advanced persistent threat (APT) actor has been targeting critical telecommunications infrastructure in South America since 2024, targeting Windows and Linux systems and edge devices with three different implants. The activity is being tracked by Cisco Talos under the moniker UAT-9...
Read Full Article →
Zero-day exploits hit enterprises faster and harder
▼
Google tracked 90 vulnerabilities exploited as zero-days last year, with Chinese cyberespionage groups doubling their count from 2024 and commercial surveillance vendors overtaking state-sponsored hackers for the first time. Nearly half of the recorded zero-days targeted enterprise technologies s...
Read Full Article →
Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
▼
Microsoft on Thursday disclosed details of a new widespread ClickFix social engineering campaign that has leveraged the Windows Terminal app as a way to activate a sophisticated attack chain and deploy the Lumma Stealer malware. The activity, observed in February 2026, makes use of the terminal e...
Read Full Article →
Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog
▼
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The critical-severity vulnerabilities are listed...
Read Full Article →
7 Anzeichen für akuten MSSP-Bedarf
▼
Managed Security Service Provider können das Sicherheitsniveau nachhaltig steigern. Godlikeart | shutterstock.com Ein Managed Security Service Provider (MSSP) bietet seinen Kunden ein umfassendes Spektrum an Sicherheits-Services. Als Drittanbieter kann ein MSSP die Arbeitsbelastung der internen I...
Read Full Article →
Europa im Visier von Cyber-Identitätsdieben
▼
Deutsche Unternehmen müssen sich warm anziehen: Sowohl staatliche als auch „private“ Akteure haben es auf sie abgesehen. Shutterstock Wie die Experten von Darktrace in ihrem aktuellen Threat Report 2026 darstellen, bleiben Cloud- und E-Mail-Konten das Einfallstor Nummer Eins in Europa. Dem Berich...
Read Full Article →
Risky Bulletin: Iranian hackers are scanning for security cameras to aid missile strikes
▼
Iran attempts to hack security cameras to support its missile strikes, Israel bombs Iran’s cyber headquarters, authorities take down LeakBase and Tycoon 2FA, and TikTok says ‘no’ to encrypted private messaging.
Read Full Article →
Chinese state hackers target telcos with new malware toolkit
▼
A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge devices. [...]
Read Full Article →
Nation-State Actor Embraces AI Malware Assembly Line
▼
Pakistan's APT36 threat group has begun using vibe-coding to churn out mediocre malware, but at a scale that could overwhelm defenses.
Read Full Article →
Tycoon 2FA Goes Boom as Europol, Vendors Bust Phishing Platform
▼
The phishing-as-a-service platform was popular among cyber threat actors because of its ability to bypass multifactor authentication defenses.
Read Full Article →
FBI targeted with ‘suspicious’ activity on its networks
▼
The bureau didn’t provide any further details on the incident, which reportedly targeted a network for managing surveillance activity. The post FBI targeted with ‘suspicious’ activity on its networks appeared first on CyberScoop .
Read Full Article →
Wikipedia hit by self-propagating JavaScript worm that vandalized pages
▼
The Wikimedia Foundation suffered a security incident today after a self-propagating JavaScript worm began vandalizing pages and modifying user scripts across multiple wikis. [...]
Read Full Article →
Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
▼
Edge bugs are so fetch, and Cisco just patched 50 new ones, including some heavy hitters with 10 out of 10 scores on the CVSS scale.
Read Full Article →
Hackers exploit OpenClaw to spread malware via GitHub - and a little help from Bing
▼
OpenClaw's popularity is proving to be a great vessel for malware distribution, especially when it's advertised via Bing.
Read Full Article →
WordPress membership plugin bug exploited to create admin accounts
▼
Hackers are exploiting a critical vulnerability in the User Registration & Membership plugin, which is installed on more than 60,000 WordPress sites. [...]
Read Full Article →
Phobos ransomware leader pleads guilty, faces up to 20 years in prison
▼
The 43-year-old Russian national ran a ransomware operation that impacted more than 1,000 victims globally. The conspiracy netted more than $39 million in extortion payments. The post Phobos ransomware leader pleads guilty, faces up to 20 years in prison appeared first on CyberScoop .
Read Full Article →
PleaseFix Flaw Lets Hackers Access 1Password Vault via Comet AI Browser
▼
Researchers at Zenity Labs uncover PleaseFix flaws in Perplexity’s Comet browser. See how zero-click calendar invites allow AI agents to steal 1Password credentials and personal files.
Read Full Article →
Fig Security Emerges From Stealth to Fix Broken Security Operations
▼
Fig Security's platform traces security data flows end-to-end across SIEMs, pipelines, and response systems to alert teams before infrastructure changes break critical defenses.
Read Full Article →
Software Development Practices Help Enterprises Tackle Real-Life Risks
▼
Organizations can borrow secure-by-design processes to manage non-technical challenges like governance or the inevitable human error.
Read Full Article →
Cisco reveals 2 max-severity defects in firewall management software
▼
The vendor said it’s not aware of any active exploitation of the vulnerabilities, which could allow remote attackers to achieve root access and execute code. The post Cisco reveals 2 max-severity defects in firewall management software appeared first on CyberScoop .
Read Full Article →
AI powers innovation – but it’s also powering the next wave of cyber attacks
▼
With AI enabling fully automated cyber attacks, cyber resiliency has emerged as a critical strategy.
Read Full Article →
LeakBase Cybercrime and Hacker Forum Seized
▼
Europol seizes LeakBase cybercrime and hacker forum used to trade stolen data, disrupting a global platform with over 140,000 members.
Read Full Article →
Europol: Großer Markt für gestohlene Daten geschlossen
▼
Europol koordinierte den Schlag gegen Leakbase. PixelBiss – shutterstock.com Die Polizei von Amsterdam hat im Zuge einer internationalen Aktion laut Europol einen der weltweit größten Handelsplätze für gestohlene Daten geschlossen. Leakbase hatte weltweit 142.000 registrierte Nutzer, wie die euro...
Read Full Article →
Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns
▼
Exploit kit "Coruna" targets iPhones running iOS 13.0 to 17.2.1, focusing on financial data theft
Read Full Article →
Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
▼
A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country's Ministry of Foreign Affairs to deliver a set of never-before-seen malware. Zscaler ThreatLabz, which observed the activity in January 2026, is tracking the c...
Read Full Article →
Where Multi-Factor Authentication Stops and Credential Abuse Starts
▼
Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In Windows environments, that assumption is often wrong. Attackers still compromise networks every day using valid credentials. The issue is not MFA itself, but c...
Read Full Article →
Zero-Click FreeScout Bug Enables Remote Code Execution
▼
Ox Security warns that Mail2Shell could enable threat actors to hijack FreeScout systems without user interaction
Read Full Article →
Major data leak forum LeakBase seized by FBI, Europol, and shut down
▼
The website was taken offline, and potential members arrested.
Read Full Article →
APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
▼
Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow. "The attack chain initiates with a phishing email containing a link to a ZIP archive. Once extracted, ...
Read Full Article →
Microsoft, Europol take down global phishing as a service network which was able to bypass 2FA with ease
▼
Tycoon 2FA is no more thanks to a major law enforcement operation.
Read Full Article →
Europol Operation Seizes LeakBase Data Breach Site
▼
A global operation has resulted in the takedown of popular cybercrime forum LeakBase
Read Full Article →
Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
▼
Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at scale, was dismantled by a coalition of law enforcement agencies and security companies. The subscription-based phishing kit...
Read Full Article →
FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials
▼
A joint law enforcement operation has dismantled LeakBase, one of the world's largest online forums for cybercriminals to buy and sell stolen data and cybercrime tools. The LeakBase forum, per the U.S. Department of Justice (DoJ), had over 142,000 members and more than 215,000 messages between me...
Read Full Article →
The Zomato API Bug That Turns Phone Numbers Into Location Intel
▼
Zomato’s “Friend Recommendations” API allows unilateral contact syncing. By uploading a phone number, bad actors can extract a user’’ restaurant recommendation history and restaurant coordinates. By mapping overlapping delivery radii, an attacker can estimate a user's approximate physical locatio...
Read Full Article →
Global coalition dismantles Tycoon 2FA phishing kit
▼
Microsoft, which led the effort, said it seized 330 domains that powered the phishing platform’s core infrastructure. The alleged creator was also named in a civil complaint. The post Global coalition dismantles Tycoon 2FA phishing kit appeared first on CyberScoop .
Read Full Article →
VMware Aria Operations Bug Exploited, Cloud Resources at Risk
▼
Exploitation of the command injection flaw in VMware Aria Operations could grant an attacker broad acess to victims' cloud environments.
Read Full Article →
LLMs are getting better at unmasking people online
▼
The author of a new study told CyberScoop he's "very worried,” describing deanonymization capabilities of AI as a “large scale invasion of privacy.” The post LLMs are getting better at unmasking people online appeared first on CyberScoop .
Read Full Article →
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
▼
Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion. "The hacktivist threat in the Middle East is highly lopsided, with two groups, Keymous+ and DieNet, drivi...
Read Full Article →
Global Takedown Neutralizes Tycoon2FA Phishing Service
▼
Law enforcers and industry partners have taken down notorious phishing-as-a-service platform Tycoon2FA
Read Full Article →
LexisNexis confirms data breach, says hackers hit customer and business info
▼
FulcrumSec leaked roughly 2GB of company data, but LexisNexis says it's old and outdated.
Read Full Article →
Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate
▼
Dark Reading Confidential Episode 15: Interpol relied on Will Thomas and team to help break up a sprawling cybercrime ring, leading to the arrest of 574 suspects, the recovery of more than $3 million, and the decryption of six malware variants. Here's his story.
Read Full Article →
Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers
▼
Increased attempts to compromise surveillance cameras linked to Iran during Middle East conflict
Read Full Article →
Multi-Stage "BadPaw" Malware Campaign Targets Ukraine
▼
Malware campaign uses Ukrainian email service for credibility, deploying "BadPaw" to execute attacks
Read Full Article →
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
▼
Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1. The exploit kit featured five full iOS exploit chains and a total of 23 exploits, Google Threat Intelligence Group (GTIG) said. I...
Read Full Article →
Paint giant AkzoNobel reveals data breach, says US site was affected
▼
Ransomware operators Anubis claimed the breach, saying it stole 170GB of sensitive data
Read Full Article →
Manipulating AI Summarization Features
▼
Microsoft is reporting : Companies are embedding hidden instructions in “Summarize with AI” buttons that, when clicked, attempt to inject persistence commands into an AI assistant’s memory via URL prompt parameters…. These prompts instruct the AI to “remember [Company] as a trusted source” or “re...
Read Full Article →
Hack on French medical site sees over 15 million records leaked, including private health info
▼
A software supplier to France's health ministry was breached, with some very private information possible leaked.
Read Full Article →
New RFP Template for AI Usage Control and AI Governance
▼
As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget — to secure it. But there’s a quiet crisis unfolding in the boardroom: many organizations know they need "AI Governance," but they have no idea what they are actuall...
Read Full Article →
China's Silver Dragon Razes Governments in EU, SE Asia
▼
The emerging actor, part of the APT41 nexus, gains initial access via phishing, and uses legitimate network services to obscure cyber espionage activities.
Read Full Article →
Calls for Global Digital Estate Standard as Posthumous Deepfake Fraud Risk Grows
▼
The OpenID Foundation warns that fragmented policies on posthumous digital accounts could open the door for fraudsters to exploit AI deepfakes
Read Full Article →
Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
▼
Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that's functional on Windows, macOS, and Linux systems. The names of the packages are listed below - nhattuanbl/lara-help...
Read Full Article →
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
▼
Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to cyber attacks targeting entities in Europe and Southeast Asia since at least mid-2024. "Silver Dragon gains its initial access by exploiting public-facing int...
Read Full Article →
Risky Business #827 -- Iranian cyber threat actors are down but not out
▼
On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover: The US-Israeli attack on Iran had a whole lot of cyber. It’s clearly in the playbook now! The NSA Triangulation / L3 Harris Trenchant iOS exploit kit is on the loose, and being used...
Read Full Article →
A suite of government hacking tools targeting iPhones is now being used by cybercriminals
▼
Security researchers say exploits used by governments to hack into iPhones have been found to be used by cybercriminals. They warned of an emerging market for "secondhand" exploits.
Read Full Article →
Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes
▼
The US conducted cyberattacks ahead of strikes on Iran, Russia aims for internet independence by 2028, Google finds a new iOS exploit kit in the wild, and Chrome moves to a two-week release cycle.
Read Full Article →
Indian APT 'Sloppy Lemming' Targets Defense, Critical Infrastructure
▼
India-nexus cyber threat actors are growing more active and sophisticated, using custom tools coded in Rust and cloud-based command and control.
Read Full Article →
'A human-chosen password doesn't stand a chance': OpenClaw has yet another major security flaw — here's what we know about "ClawJacked"
▼
Don't leave your OpenClaw with an easy password, experts warn.
Read Full Article →
Qualcomm Zero-Day Exploited in Targeted Android Attacks
▼
The exploitation activity against CVE-2026-21385, a high-severity memory corruption flaw, could be tied to commercial spyware or nation-state threat groups.
Read Full Article →
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
▼
Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack. The intrusions, identified by Huntress last month across five partner...
Read Full Article →
BSIMM16 confirms: AI redefines AppSec
▼
AI coding is the new reality — and it will further destabilize software supply chain security. So step up your AppSec.
Read Full Article →
Microsoft warns of OAuth phishing campaigns able to bypass email and browser defenses - says 'these campaigns demonstrate that this abuse is operational, not theoretical'
▼
An OAuth feature is being abused in the wild to drop malware to people's computers.
Read Full Article →
Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow
▼
Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1 analysts sit at the front line of detection, and yet they are also the most vulnerable to the cognitive a...
Read Full Article →
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
▼
The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks. The new findings come from Team Cymru, which detected it...
Read Full Article →
'The attack requires no exploit, no user clicks, and no explicit request forsensitive actions': Experts say Perplexity's AI Comet browser can be hijacked to steal your passwords
▼
Security researchers found a zero-click exploit in Perplexity AI browser, and helped fix it.
Read Full Article →
This new phishing campaign uses a fake Google Account security page to steal passcodes and more
▼
Hackers don't need an app to steal login credentials anymore - a PWA will do.
Read Full Article →
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
▼
Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections. It's advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a...
Read Full Article →
Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign
▼
Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack
Read Full Article →
Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
▼
Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers. The activity, the company said, targets government and public-sector organizations with the end goal of red...
Read Full Article →
SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains
▼
The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh. The activity, per Arctic Wolf, took place between January 2025 and January 2026. It involves the use of ...
Read Full Article →
The Biosig Project libbiosig Intan CLP parsing heap-based buffer overflow vulnerability + 1 similar
▼
The Biosig Project libbiosig ABF parsing out-of-bounds read vulnerability
▼
Hackers hijack .arpa domain for phishing scams — hosting malicious websites and domains where no one can spot them
▼
Cybercriminals exploit the .arpa domain and IPv6 addresses to deliver phishing pages, bypassing traditional security and stealing credentials.
Read Full Article →
Cybercriminals are hiring women for more authentic social engineering scams — and are promising up to $1,000 per call
▼
Cybercriminal group SLSH recruits women to impersonate IT helpdesks, offering up to $1,000 per call while targeting major companies.
Read Full Article →
New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel
▼
Cybersecurity researchers have disclosed details of a now-patched security flaw in Google Chrome that could have permitted attackers to escalate privileges and gain access to local files on the system. The vulnerability, tracked as CVE-2026-0628 (CVSS score: 8.8), has been described as a case of ...
Read Full Article →
Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel
▼
John Hultquist suggests “aggressive” Iranian cyber attackers will target the US and its Gulf allies with plausibly deniable ransomware attacks, hacktivist campaigns and more
Read Full Article →
LLM-Assisted Deanonymization
▼
Turns out that LLMs are good at de-anonymization: We show that LLM agents can figure out who you are from your anonymous online posts. Across Hacker News, Reddit, LinkedIn, and anonymized interview transcripts, our method identifies users with high precision and scales to tens of thousands of c...
Read Full Article →
ClawJacked Bug Enables Covert AI Agent Hijacking
▼
Oasis Security reveals how a new ClawJacked vulnerability could allow attackers to silently take over a victim’s OpenClaw agent
Read Full Article →
Ransomware Payments Decline 8% as Attacks Surge 50%
▼
Chainalysis reveals a big surge in median ransomware payment size in 2025 despite overall drop in criminal revenue
Read Full Article →
Bug in Google's Gemini AI Panel Opens Door to Hijacking
▼
Attackers could have exploited the vulnerability to escalate privileges, violate user privacy while browsing, and access sensitive resources.
Read Full Article →
North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT
▼
Cybersecurity researchers have disclosed a new iteration of the ongoing Contagious Interview campaign, where the North Korean threat actors have published a set of 26 malicious packages to the npm registry. The packages masquerade as developer tools, but contain functionality to extract the actua...
Read Full Article →#Security Vendor Blog
PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers
▼
Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.
Read Full Article →
The Oracle of Delphi Will Steal Your Credentials
▼
Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The attacks brute forced passwords for RDP credentials to connect to the victim download and execute a previously undetected malware, which we named Trojan.sysscan.
Read Full Article →
Threats Making WAVs - Incident Response to a Cryptomining Attack
▼
Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident res...
Read Full Article →
An Investigation Into Years of Undetected Operations Targeting High-Value Sectors
▼
In-depth analysis of threat activity we call CL-UNK-1068. We discuss their toolset, including tunneling, reconnaissance and credential theft. The post An Investigation Into Years of Undetected Operations Targeting High-Value Sectors appeared first on Unit 42 .
Read Full Article →
Mobile malware evolution in 2025
▼
Statistics on Android malware and the most notable mobile threats of 2025: preinstalled backdoors Keenadu and Triada, spyware Trojans, the Kimwolf IoT botnet, and Mamont banking Trojans.
Read Full Article →
Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran
▼
Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations for defenders. The post Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran appeared first on Unit 42 .
Read Full Article →
Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel
▼
A high-severity CVE-2026-0628 in Chrome's Gemini allowed local file access and privacy invasion. Google quickly patched the flaw. The post Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel appeared first on Unit 42 .
Read Full Article →#Tech
Bug that wiped customer data saved the day – and a contract
▼
Ignorance really was the way to achieve bliss Who, Me? Welcome to another working week, and another installment of "Who, Me?" – a weekly reader-contributed column that unearths your errors and reveals how you rebounded afterwards.…
Read Full Article →
트럼프, 공세 강화한 사이버 전략 공개…AI·규제완화 전면에
▼
백악관은 도널드 트럼프 대통령의 사이버 보안 전략을 공개했다. 오랜 기간 예고돼 온 이번 전략은 7쪽 분량의 보고서 로, 공세적 사이버 작전을 미국 정책의 중심에 배치하며 기존 접근 방식과 차별화를 시도했다. 국가사이버국(Office of the National Cyber Director, ONCD)이 수립한 이번 전략은 적대 세력 교란, 산업 규제 완화, 인공지능 도입 가속화에 방점을 찍었다. 동시에 연방 정부 시스템과 핵심 인프라 방어 강화도 주요 과제로 포함했다. 미 로펌 기업 베너블(Venable LLP) 사이버 보안 ...
Read Full Article →
Stop annoying ads on nine devices for a one-time $11—through today only
▼
TL;DR: Today only: Pay $11 for a lifetime of the AdGuard Family Plan and protect up to 9 devices from ads, trackers, malware, and unwanted content. Online browsing has become more cluttered than ever, with ads, pop-ups, and trackers competing for attention on nearly every page. The AdGuard Family...
Read Full Article →
오픈AI, 업무 환경 대응 AI 모델 GPT-5.4 발표…스프레드시트·문서 작업 강화
▼
GPT-5.4는 GPT-5.3-코덱스의 코딩 성능을 통합하면서 스프레드시트, 프레젠테이션, 문서 등 전문 업무 환경에서 다양한 도구와 소프트웨어를 활용하는 방식도 개선했다. 오픈AI는 이를 통해 복잡한 실제 업무를 보다 정확하고 효율적으로 수행하고, 사용자가 원하는 결과에 도달하기까지 필요한 반복 작업도 줄일 수 있을 것으로 전망했다. 오픈AI는 성능 측면에서도 GPT-5.4는 주요 벤치마크에서 개선된 결과를 보였다고 주장했다. 예를 들어 AI 에이전트가 실제 지식 기반 업무를 수행하는 능력을 평가하는 GDPval 벤치마크에서...
Read Full Article →
Unpacking the deceptively simple science of tokenomics
▼
Inference at scale is much more complex than more GPUs, more tokens, more profits feature By now you've probably heard AI datacenters called factories. It's an apt description: power goes in and tokens come out.…
Read Full Article →
From Iran to Ukraine, everyone's trying to hack security cameras
▼
Research shows apparent Iranian state hackers trying to hijack consumer-grade cameras.
Read Full Article →
Firefox taps Anthropic AI bug hunter, but rancid RAM still flipping bits
▼
Now if only device makers would deliver higher quality components Thanks to Anthropic's AI and its bug-detecting abilities, Firefox users can now enjoy stronger security. Unfortunately, if browser crashes rather than security flaws are the problem, Claude probably can't help.…
Read Full Article →
GPT 5.4 solves previously unsolved math problem with help from long-forgotten human research
▼
GPT just keeps getting better at mathematics, increasingly solving the trickiest of problems. In January, AI testing company Epoch AI found that a previous version of the AI model, GPT-5.2 Pro had solved 31% of its mathematical challenges, a rise from the previous score best of 19%. The newest ve...
Read Full Article →
Cisco warns of two more SD-WAN bugs under active attack
▼
Switchzilla says flaws could allow file overwrites or privilege escalation Just when network admins thought the Cisco SD-WAN patch queue might finally be shrinking, Switchzilla has confirmed miscreants are exploiting more vulnerabilities in its SD-WAN management software.…
Read Full Article →
Microsoft spots ClickFix campaign getting users to self-pwn on Windows Terminal
▼
Crooks tweak familiar copy-paste ruse so that victims run malicious commands themselves A new twist on the long-running ClickFix scam is now tricking Windows users into launching Windows Terminal and pasting malware into it themselves – handing the credential-stealing Lumma infostealer the keys t...
Read Full Article →
The privacy nightmare hiding inside California’s new kid-safety rule
▼
I love my home state of California. But sometimes its best intentions go awry. It’s not surprising that California’s legislature passed the Digital Age Assurance Act ( AB 1043 ) last October—age verification is currently a popular focus within governments. (And the reason for Discord’s current st...
Read Full Article →
UK lawmakers back licensing‑first approach, adding pressure to global AI copyright standards
▼
AI developers must obtain licenses for copyrighted material before using it to train models, a committee of the House of Lords, the UK Parliament’s upper chamber, said Thursday. The committee called the approach “licensing-first,” meaning no training on protected works without prior permission an...
Read Full Article →
What the COBOL Translation Backlash Gets Right — and Wrong
▼
When Anthropic published a blog post last week describing how Claude Code can analyze and translate COBOL, the market rejoiced at yet another proof point of the power of LLMs. Critics also reacted swiftly, noting that translating COBOL is not the same as modernizing a system. After all, a system ...
Read Full Article →
Microsoft finally gets around to fixing Windows 10 Recovery Environment after breaking it in October
▼
Released from the curse of the update bork fairy Microsoft has finally fixed a Windows Recovery Environment (WinRE) bug it introduced in Windows 10's final update.…
Read Full Article →
UK Treasury not sure about ditching Oracle to join £1.7 billion shared services program it is funding
▼
It promised £1.15B… but finance ministry yet to show 'formal commitment' to adopt Workday SaaS, watchdog says The UK's Treasury is yet to fully commit to joining a multi-billion pound ERP and HR shared services program it has agreed to fund, potentially slashing any resulting savings, according t...
Read Full Article →
BMW lleva robots humanoides con IA a su fábrica de Leipzig
▼
Mientras que C-3PO era ciencia ficción en la primera película de Star Wars en 1977, los robots humanoides ya son una realidad en las naves de producción de BMW. Tras introducir Figure 2 en la planta de Spartanburg, en Estados Unidos, BMW también está desplegando robots humanoides en su planta ale...
Read Full Article →
Okta CEO ‘paranoid’ as vibe coders stir SaaS-pocalypse fears
▼
It’s ok, Todd. You’re only paranoid if you’re wrong. Okta chairman and CEO Todd McKinnon said he believes it would be difficult for an LLM alone to replicate the quality of SaaS applications his company provides, but that doesn’t stop him from worrying about competition from bots.…
Read Full Article →
Chrome 145 update fixes several critical browser vulnerabilities
▼
Instead of the expected new major version Chrome 146, Google just released another update for Chrome 145 (presumably this version’s final security update). In the new Chrome versions 145.0.7632.159/160 for Windows and macOS and 145.0.7632.159 for Linux, the developers have fixed 10 security vulne...
Read Full Article →
Chrome to start bi-weekly updates in September
▼
Starting in September, Google’s Chrome browser will receive a new release every two weeks, the company has announced . Since 2021, Chrome has been on a four-week release schedule for new major versions. The rationale for the faster two-week cycle is to enable faster delivery of performance improv...
Read Full Article →
Reddit users hate NordVPN. Are their criticisms legit?
▼
I was browsing on Reddit recently, as one does, and noticed yet another cynical comment dissing NordVPN . It compelled me to consider why exactly Nord in particular, and other popular VPNs in general, have this adverse public perception, and whether it’s actually fair. There is a trend in the onl...
Read Full Article →
This free tool checks if a link is safe in seconds
▼
So, you’ve received a suspicious link and would like to check whether the website is dangerous before visiting it. You can do this, for example, with the “URL Void” service from the security provider “No Virus Thanks.” To do this, go to www.urlvoid.com , enter the web address in question, and cli...
Read Full Article →#Threat Intel & Vulnerability
A week in security (March 2 – March 8)
▼
A list of topics we covered in the week of March 2 to March 8 of 2026
Read Full Article →
How to Scale SOC Automation with Falcon Fusion SOAR
▼
Introducing "AI Unlocked: Decoding Prompt Injection," a New Interactive Challenge
▼
The Art of Deception: How Threat Actors Master Typosquatting Campaigns to Bypass Detection
▼
CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security
▼
CrowdStrike Achieves NCSC CIR Assurance for Incident Response
▼
How hackers bypassed MFA with a $120 phishing kit - until a global takedown shut it down
▼
In a co-ordinated public-private operation between law enforcement agencies and cybersecurity industry partners one of the world's most prolific phishing-as-a-service platforms has been dismantled. First appearing in August 2023, Tycoon 2FA was designed specifically to help fraudsters hack into a...
Read Full Article →
MDR vs. MXDR: Navigating the Landscape of Managed Threat Detection and Response Solutions
▼
MDR (Managed Detection and Response) delivers focused protection at the endpoint level. MXDR (Managed Extended Detection and Response) broadens that visibility across networks, cloud environments, identities, email, and more. Choosing the Right Fit: MDR is well‑suited for smaller or less complex ...
Read Full Article →
Phobos ransomware administrator pleads guilty in US court
▼
Key operator in global ransomware scheme admits to role in multimillion-dollar extortion campaign.
Read Full Article →
Beware of fake OpenClaw installers, even if Bing points you to GitHub
▼
Bing search results pointed victims to GitHub repositories claiming to host OpenClaw installers, but in reality they installed malware.
Read Full Article →
VU#772695: A flawed TLS handshake implementation affects Viber Proxy in multiple platforms
▼
Overview The Rakuten Viber messaging app for Android V25.7.2.0g and Windows V25.6.0.0-V25.8.1.0, has a flaw in its TLS handshake implementation when using the Cloak proxy configuration. This flaw allows for easy identification of proxy usage, potentially compromising user anonymity. Description R...
Read Full Article →
On the Effectiveness of Mutational Grammar Fuzzing
▼
Mutational grammar fuzzing is a fuzzing technique in which the fuzzer uses a predefined grammar that describes the structure of the samples. When a sample gets mutated, the mutations happen in such a way that any resulting samples still adhere to the grammar rules, thus the structure of the sampl...
Read Full Article →
Differentiating Between a Targeted Intrusion and an Automated Opportunistic Scanning [Guest Diary], (Wed, Mar 4th)
▼
[This is a Guest Diary by Joseph Gruen, an ISC intern as part of the SANS.edu BACS program]
Read Full Article →
5 practical cybersecurity steps for small financial services businesses
▼
If you run an accounting firm, tax practice, bookkeeping service, mortgage brokerage, financial advisory office, or small insurance agency, your business runs on trust. You handle tax returns, payroll data, bank details, loan applications, investment accounts, and insurance policies. That makes y...
Read Full Article →
Attackers abuse OAuth’s built-in redirects to launch phishing and malware attacks
▼
Researchers have found that attackers are abusing OAuth to send users from legitimate Microsoft or Google login pages to phishing sites or malware downloads.
Read Full Article →
High-severity Qualcomm bug hits Android devices in targeted attacks
▼
Google has patched 129 Android vulnerabilities, including an actively exploited flaw in a widely used Qualcomm component.
Read Full Article →
Bruteforce Scans for CrushFTP , (Tue, Mar 3rd)
▼
CrushFTP is a Java-based open source file transfer system. It is offered for multiple operating systems. If you run a CrushFTP instance, you may remember that the software has had some serious vulnerabilities: CVE-2024-4040 (the template-injection flaw that let unauthenticated attackers escape th...
Read Full Article →
The Resilience Retainer: Incident Response Retainers, Reimagined
▼
Too many organizations today still rely on "legacy" retainer models. These traditional contracts are often rigid, opaque, and reactive, and designed for a world that no longer exists.
Read Full Article →
Chrome flaw let extensions hijack Gemini’s camera, mic, and file access
▼
Researchers found a now-patched vulnerability in "Live in Chrome" that allowed a Chrome extension to inherit Gemini’s permissions.
Read Full Article →
Talos on the developing situation in the Middle East
▼
Cisco Talos continues to monitor the ongoing conflict in the Middle East. As always, we will be watching closely for any cyber-related incidents that are tied to the conflict.
Read Full Article →
[webapps] Easy File Sharing Web Server v7.2 - Buffer Overflow + 1 similar
▼
Easy File Sharing Web Server v7.2 - Buffer Overflow
Read Full Article →
[webapps] WeGIA 3.5.0 - SQL Injection + 1 similar
▼
WeGIA 3.5.0 - SQL Injection
Read Full Article →
[webapps] Boss Mini v1.4.0 - Local File Inclusion (LFI) + 1 similar
▼
Boss Mini v1.4.0 - Local File Inclusion (LFI)
Read Full Article →
VU#431821: MS-Agent does not properly sanitize commands sent to its shell tool, allowing for RCE
▼
Overview A command injection vulnerability was identified in the MS-Agent framework that can be triggered through unsanitized prompt-derived input. An attacker can craft untrusted input introduced via a chat prompt or other external content sources, resulting in arbitrary command execution on the...
Read Full Article →
Criminal IP to Present Decision-Ready Threat Intelligence at RSAC™ 2026
▼
Torrance, United States / California, 2nd March 2026, CyberNewswire The post Criminal IP to Present Decision-Ready Threat Intelligence at RSAC™ 2026 appeared first on The Security Ledger with Paul F. Roberts .
Read Full Article →
Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat
▼
Frankfurt am Main, Germany, 2nd March 2026, CyberNewswire The post Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat appeared first on The Security Ledger with Paul F. Roberts .
Read Full Article →
Purchase order attachment isn’t a PDF. It’s phishing for your password
▼
A fake purchase order attachment turned out to be a phishing page designed to harvest your login details.
Read Full Article →📋 CVE Reference Bulletin (123 vulnerabilities) ▼
⚠️ Reference material: Click CVE IDs for full details. Severity indicators are approximate classifications.
| CVE ID | Severity | Product | Source |
|---|---|---|---|
| CVE-2026-30910 | 🔵 LOW | EUVD-2026-10200 | VulnDB |
| CVE-2026-30909 | 🔵 LOW | EUVD-2026-10199 | VulnDB |
| CVE-2026-30896 | ⚪ Unknown | Qsee Client | |
| CVE-2026-30858 | ⚪ Unknown | Tencent WeKnora | |
| CVE-2026-30852 | ⚪ Unknown | caddyserver caddy | |
| CVE-2026-29196 | ⚪ Unknown | EUVD-2026-10161 | VulnDB |
| CVE-2026-28289 | 🔴 CRITICAL | : FreeScout .206 | CVE Feed (High/ |
| CVE-2026-24713 | ⚪ Unknown | Apache IoTDB | |
| CVE-2026-24015 | ⚪ Unknown | Apache IoTDB | |
| CVE-2026-22719 | ⚪ Unknown | to KEV Catalog | The Hacker News |
| CVE-2026-21513 | ⚪ Unknown | MSHTML 0-Day Exploited | The Hacker News |
| CVE-2026-21385 | ⚪ Unknown | in Qualcomm Android | The Hacker News |
| CVE-2026-20079 | ⚪ Unknown | : “Cisco Secure | CVE Feed (High/ |
| CVE-2026-3823 | 🔵 LOW | Atop EHG2408/EHG2408-2SFP | |
| CVE-2026-3822 | ⚪ Unknown | Taipower App | |
| CVE-2026-3819 | ⚪ Unknown | SourceCodester Resort | |
| CVE-2026-3818 | ⚪ Unknown | Tiandy Easy7 | |
| CVE-2026-3817 | ⚪ Unknown | SourceCodester Patients | |
| CVE-2026-3816 | ⚪ Unknown | OWASP DefectDojo | |
| CVE-2026-3815 | 🔵 LOW | UTT HiPER | |
| CVE-2026-3814 | 🔵 LOW | UTT HiPER | |
| CVE-2026-3813 | 🔵 LOW | IE8R2F | VulnDB |
| CVE-2026-3812 | 🔵 LOW | itsourcecode Payroll | |
| CVE-2026-3811 | 🔵 LOW | 408 | VulnDB |
| CVE-2026-3810 | 🔵 LOW | 408 | VulnDB |
| CVE-2026-3809 | 🔵 LOW | 408 | VulnDB |
| CVE-2026-3808 | 🔵 LOW | 408 | VulnDB |
| CVE-2026-3807 | 🔵 LOW | 408 | VulnDB |
| CVE-2026-3806 | ⚪ Unknown | SourceCodester/janobe Resort | |
| CVE-2026-3804 | 🔵 LOW | 2204 | VulnDB |
| CVE-2026-3803 | 🔵 LOW | 2204 | VulnDB |
| CVE-2026-3802 | 🔵 LOW | 2204 | VulnDB |
| CVE-2026-3801 | 🔵 LOW | 2204 | VulnDB |
| CVE-2026-3800 | ⚪ Unknown | SourceCodester/janobe Resort | |
| CVE-2026-3799 | 🔵 LOW | 2204 | VulnDB |
| CVE-2026-3798 | ⚪ Unknown | EUVD-2026-10290 | VulnDB |
| CVE-2026-3797 | ⚪ Unknown | EUVD-2026-10289 | VulnDB |
| CVE-2026-3796 | ⚪ Unknown | EUVD-2026-10288 | VulnDB |
| CVE-2026-3795 | ⚪ Unknown | EUVD-2026-10285 | VulnDB |
| CVE-2026-3794 | ⚪ Unknown | EUVD-2026-10284 | VulnDB |
| CVE-2026-3793 | ⚪ Unknown | EUVD-2026-10283 | VulnDB |
| CVE-2026-3792 | ⚪ Unknown | EUVD-2026-10282 | VulnDB |
| CVE-2026-3791 | ⚪ Unknown | EUVD-2026-10281 | VulnDB |
| CVE-2026-3790 | ⚪ Unknown | EUVD-2026-10280 | VulnDB |
| CVE-2026-3789 | ⚪ Unknown | Issue 21 / EUVD-2026-10279 | VulnDB |
| CVE-2026-3788 | ⚪ Unknown | Issue 20 / EUVD-2026-10278 | VulnDB |
| CVE-2026-3787 | ⚪ Unknown | EUVD-2026-10277 | VulnDB |
| CVE-2026-3786 | ⚪ Unknown | EUVD-2026-10276 | VulnDB |
| CVE-2026-3785 | ⚪ Unknown | EUVD-2026-10275 | VulnDB |
| CVE-2026-3771 | ⚪ Unknown | EUVD-2026-10274 | VulnDB |
| CVE-2026-3770 | ⚪ Unknown | EUVD-2026-10273 | VulnDB |
| CVE-2026-3769 | 🔵 LOW | EUVD-2026-10272 | VulnDB |
| CVE-2026-3768 | 🔵 LOW | EUVD-2026-10271 | VulnDB |
| CVE-2026-3767 | ⚪ Unknown | EUVD-2026-10270 | VulnDB |
| CVE-2026-3766 | ⚪ Unknown | EUVD-2026-10269 | VulnDB |
| CVE-2026-3765 | ⚪ Unknown | EUVD-2026-10268 | VulnDB |
| CVE-2026-3764 | ⚪ Unknown | EUVD-2026-10267 | VulnDB |
| CVE-2026-3763 | ⚪ Unknown | EUVD-2026-10266 | VulnDB |
| CVE-2026-3762 | ⚪ Unknown | EUVD-2026-10265 | VulnDB |
| CVE-2026-3761 | ⚪ Unknown | EUVD-2026-10264 | VulnDB |
| CVE-2026-3760 | ⚪ Unknown | EUVD-2026-10263 | VulnDB |
| CVE-2026-3759 | ⚪ Unknown | EUVD-2026-10262 | VulnDB |
| CVE-2026-3758 | ⚪ Unknown | EUVD-2026-10261 | VulnDB |
| CVE-2026-3757 | ⚪ Unknown | EUVD-2026-10260 | VulnDB |
| CVE-2026-3756 | ⚪ Unknown | EUVD-2026-10259 | VulnDB |
| CVE-2026-3755 | ⚪ Unknown | EUVD-2026-10258 | VulnDB |
| CVE-2026-3754 | ⚪ Unknown | EUVD-2026-10257 | VulnDB |
| CVE-2026-3753 | ⚪ Unknown | EUVD-2026-10256 | VulnDB |
| CVE-2026-3752 | ⚪ Unknown | EUVD-2026-10255 | VulnDB |
| CVE-2026-3751 | ⚪ Unknown | EUVD-2026-10254 | VulnDB |
| CVE-2026-3750 | ⚪ Unknown | EUVD-2026-10253 | VulnDB |
| CVE-2026-3749 | ⚪ Unknown | Issue 19 / EUVD-2026-10252 | VulnDB |
| CVE-2026-3748 | ⚪ Unknown | Issue 18 / EUVD-2026-10251 | VulnDB |
| CVE-2026-3747 | ⚪ Unknown | EUVD-2026-10250 | VulnDB |
| CVE-2026-3746 | ⚪ Unknown | EUVD-2026-10249 | VulnDB |
| CVE-2026-3745 | ⚪ Unknown | EUVD-2026-10248 | VulnDB |
| CVE-2026-3744 | ⚪ Unknown | EUVD-2026-10247 | VulnDB |
| CVE-2026-3743 | ⚪ Unknown | EUVD-2026-10246 | VulnDB |
| CVE-2026-3742 | ⚪ Unknown | EUVD-2026-10245 | VulnDB |
| CVE-2026-3741 | ⚪ Unknown | EUVD-2026-10244 | VulnDB |
| CVE-2026-3740 | ⚪ Unknown | EUVD-2026-10243 | VulnDB |
| CVE-2026-3739 | ⚪ Unknown | GHSA-7476-6crq-4cw9 / EUVD-2026-102 | VulnDB |
| CVE-2026-3738 | ⚪ Unknown | EUVD-2026-10241 | VulnDB |
| CVE-2026-3737 | ⚪ Unknown | EUVD-2026-10240 | VulnDB |
| CVE-2026-3736 | ⚪ Unknown | EUVD-2026-10239 | VulnDB |
| CVE-2026-3735 | ⚪ Unknown | EUVD-2026-10238 | VulnDB |
| CVE-2026-3734 | ⚪ Unknown | EUVD-2026-10237 | VulnDB |
| CVE-2026-3733 | ⚪ Unknown | Issue 3924 / EUVD-2026-10236 | VulnDB |
| CVE-2026-3732 | 🔵 LOW | EUVD-2026-10235 | VulnDB |
| CVE-2026-3731 | ⚪ Unknown | libssh-2026-sftp-extensions / EUVD- | VulnDB |
| CVE-2026-3730 | ⚪ Unknown | EUVD-2026-10233 | VulnDB |
| CVE-2026-3729 | 🔵 LOW | EUVD-2026-10232 | VulnDB |
| CVE-2026-3728 | 🔵 LOW | EUVD-2026-10231 | VulnDB |
| CVE-2026-3727 | 🔵 LOW | EUVD-2026-10230 | VulnDB |
| CVE-2026-3726 | 🔵 LOW | EUVD-2026-10229 | VulnDB |
| CVE-2026-3725 | ⚪ Unknown | EUVD-2026-10228 | VulnDB |
| CVE-2026-3724 | ⚪ Unknown | EUVD-2026-10227 | VulnDB |
| CVE-2026-3723 | ⚪ Unknown | EUVD-2026-10226 | VulnDB |
| CVE-2026-3631 | ⚪ Unknown | PCSA-2026-00005 | VulnDB |
| CVE-2026-3630 | 🔵 LOW | PCSA-2026-00005 | VulnDB |
| CVE-2026-3102 | ⚪ Unknown | : macOS ExifTool | Kaspersky Offic |
| CVE-2026-2671 | 🔵 LOW | EUVD-2026-10185 | VulnDB |
| CVE-2026-2256 | ⚪ Unknown | : Command injection | CVE Feed (High/ |
| CVE-2026-0651 | ⚪ Unknown | CVE-2026-0651, CVE-2026-0652, CVE-2 | 0day Fans |
| CVE-2026-0006 | 🔵 LOW | : Apache HTTP | CVE Feed (High/ |
| CVE-2025-69219 | 🔵 LOW | Apache Airflow | |
| CVE-2025-64152 | ⚪ Unknown | Apache IoTDB | |
| CVE-2025-59287 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-55182 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-55017 | ⚪ Unknown | Apache IoTDB | |
| CVE-2025-43530 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-43529 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-38617 | ⚪ Unknown | Intruder Intel | |
| CVE-2025-15603 | ⚪ Unknown | open-webui up | |
| CVE-2025-14174 | ⚪ Unknown | Intruder Intel | |
| CVE-2024-23296 | ⚪ Unknown | Intruder Intel | |
| CVE-2024-23225 | ⚪ Unknown | Intruder Intel | |
| CVE-2023-43000 | ⚪ Unknown | Intruder Intel | |
| CVE-2023-41974 | ⚪ Unknown | : Apple iOS | CISA Alerts & A |
| CVE-2023-40238 | ⚪ Unknown | Intruder Intel | |
| CVE-2021-30952 | 🔵 LOW | : Apple Multiple | CISA Alerts & A |
| CVE-2021-22681 | ⚪ Unknown | : Rockwell Multiple | CISA Alerts & A |
| CVE-2017-7921 | ⚪ Unknown | : Hikvision Multiple | CISA Alerts & A |
<p class="text-muted-foreground text-xs mt-3 italic">💡 Tip: Use the <strong>CVE ID</strong> column as a quick reference. For detailed analysis, also check the editorial sections above for deeper coverage of significant vulnerabilities.</p>