Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

980+ Articles
124+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
HomeArchives

Archives

Browse all content by date

May 2026(108 articles)

May 13716,000 Impacted by OpenLoop Health Data BreachMay 1373 Seconds to Breach, 24 Hours to Patch: The Case for Autonomous ValidationMay 13China's 'FamousSparrow' APT Nests in South Caucasus Energy FirmMay 13Foxconn Confirms Cyberattack Claimed by Nitrogen Ransomware GangMay 13Government to Scrutinize Instructure Over Canvas Disruption, Data BreachMay 13Microsoft May 2026 Patch Tuesday: 137 Flaws Fixed, Zero Zero-DaysMay 13Škoda Warns of Customer Data Breach After Online Shop HackMay 13Microsoft May 2026 Patch Tuesday Fixes 120 Flaws, No Zero-DaysMay 13Microsoft Patches 138 Vulnerabilities Including DNS and Netlogon RCE FlawsMay 13New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code ExecutionMay 13CVE-2026-2993: SQL Injection in AIWU AI Chatbot WordPress PluginMay 13CVE-2026-8043: Ivanti Xtraction File Control & HTML InjectionMay 13Build a Production Monitoring Stack with Prometheus and GrafanaMay 12Exaforce Raises $125 Million for Agentic SOC PlatformMay 12Fortinet Warns of Critical RCE Flaws in FortiSandbox and FortiAuthenticatorMay 12Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65 TB Canvas LeakMay 12Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI and MoreMay 12SAP Fixes Critical Vulnerabilities in Commerce Cloud and S/4HANAMay 12UK Fines Water Supplier $1.3M for Exposing Data of 664K CustomersMay 12West Pharmaceutical Services Hit by Disruptive Ransomware AttackMay 12West Pharmaceutical Warns of Ransomware Attack Impacting Business OperationsMay 12Worm Redux: Fresh Mini Shai-Hulud Infections Bite npm Supply ChainMay 12CVE-2025-61311: Reflected XSS in docuForm Managed Print Services v11.11cMay 12CVE-2026-28872: Apple iOS & iPadOS Remote Denial-of-Service via Resource ExhaustionMay 12CVE-2026-34260 — SAP S/4HANA SQL Injection via ABAP Enterprise SearchMay 12CVE-2026-34263 — SAP Commerce Cloud Unauthenticated RCEMay 12Dell ECS and ObjectScale: Hard-Coded Credentials Vulnerability (CVE-2026-40636)May 11Build Application Firewalls Aim to Stop the Next Supply Chain AttackMay 11GM Agrees to $12.75M California Settlement Over Sale of Drivers' DataMay 11Google Detects First AI-Generated Zero-Day Exploit in the WildMay 11Google: Hackers Used AI to Develop Zero-Day Exploit for Web Admin ToolMay 11Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass ExploitationMay 11Skoda Data Breach Hits Online Shop CustomersMay 11TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain AttackMay 11UK Water Utility Fined £963,900 After Cl0p Lurked Undetected for Nearly Two YearsMay 11Why Changing Passwords Doesn't End an Active Directory BreachMay 11CVE-2021-47923: OpenCart 3.0.3.8 Session Fixation Enables Account TakeoverMay 11CVE-2021-47936: OpenCATS 0.9.4 Unauthenticated RCE via PHP File UploadMay 11CVE-2026-6433: WordPress Plugin SQLi Enables Unauthenticated PHP Code ExecutionMay 11CrowdSec: Deploy a Community-Powered Intrusion Prevention SystemMay 10American Duo Sentenced for Hosting Laptop Farms for North Korean IT WorkersMay 10Canvas Breach Disrupts Schools & Colleges NationwideMay 10Canvas Login Portals Hacked in Mass ShinyHunters Extortion CampaignMay 10Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCEMay 10Exploit Frenzy Threatens Millions via Critical cPanel VulnerabilityMay 10GM to Pay Over $12 Million in California Privacy Settlement Involving Driver DataMay 10Hackers Abuse Google Ads and Claude.ai Chats to Push Mac MalwareMay 10Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level AccessMay 10Multiple Universities Forced to Reschedule Final Exams After Canvas Cyber IncidentMay 10Ollama Out-of-Bounds Read Flaw Allows Remote Process Memory LeakMay 10One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity RiskMay 10PAN-OS RCE Exploit Under Active Use Enabling Root Access and EspionageMay 10Police Shut Down Reboot of Crimenetwork Marketplace, Arrest AdminMay 10Quasar Linux RAT Steals Developer Credentials for Software Supply Chain CompromiseMay 10ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New StoriesMay 10CVE-2026-42569: phpVMS Critical Unauthenticated Legacy Import AccessMay 9cPanel & WHM Release Fixes for Three New Vulnerabilities — Patch NowMay 9Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store DownloadsMay 9Fake OpenAI Repository on Hugging Face Pushes Infostealer MalwareMay 9GM to Pay Over $12 Million in Largest-Ever CCPA Fine Over Driver DataMay 9Ivanti Warns of New EPMM Flaw Exploited in Zero-Day AttacksMay 9JDownloader Site Hacked to Replace Installers with Python RAT MalwareMay 9New Linux 'Dirty Frag' Zero-Day Gives Root on All Major DistrosMay 9Trellix Source Code Breach Highlights Growing Supply Chain ThreatsMay 9Zara Data Breach Exposed Personal Information of 197,000 PeopleMay 9CVE-2026-25199: Apache CloudStack Proxmox Extension Allows Unauthorized Cross-Tenant Instance AccessMay 9CVE-2026-37431: Beauty Parlour Management System SQL Injection (CVSS 9.8)May 9CVE-2026-41583: ZEBRA Zcash Node Consensus Rule Bypass (CVSS 9.1)May 9CVE-2026-41588: RELATE Courseware Timing Attack in Authentication (CVSS 9.0)May 9CVE-2026-42193: Plunk Email Platform SNS Webhook ForgeryMay 9CVE-2026-42296: Argo Workflows templateReferencing Strict Mode BypassMay 9CVE-2026-8153: Universal Robots PolyScope OS Command Injection — Unauthenticated RCE on Industrial RobotsMay 8CISA Gives Federal Agencies Four Days to Patch Actively Exploited Ivanti Zero-DayMay 8Ivanti Customers Confront Yet Another Actively Exploited Zero-Day in EPMMMay 8NVIDIA Confirms GeForce NOW Data Breach Affecting Armenian UsersMay 8Trellix Source Code Breach Claimed by RansomHouse HackersMay 8CVE-2026-33109: Azure Managed Instance for Apache Cassandra Remote Code Execution (CVSS 9.9)May 8CVE-2026-41500: electerm macOS Command Injection via Install ScriptMay 8CVE-2026-41501: electerm Linux Command Injection via Install ScriptMay 8CVE-2026-42208: LiteLLM AI Gateway Pre-Auth SQL InjectionMay 3CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEVMay 3New Bluekit Phishing Kit Features AI Assistant and Automated Domain RegistrationMay 3CVE-2026-5324: WordPress Brizy Page Builder Unauthenticated Stored XSSMay 2ConsentFix v3 Automates Azure OAuth Abuse With Mass Compromise PotentialMay 2Critical cPanel Flaw Mass-Exploited in 'Sorry' Ransomware AttacksMay 2Edu-Tech Firm Instructure Discloses Cyber Incident, Probes Impact on Canvas LMSMay 2In Other News: Scattered Spider Member Arrested, SOC Metrics, NSA Tool FlawMay 2Microsoft Tests Modern Windows Run Dialog With Dark Mode and Faster PerformanceMay 2Trellix Confirms Source Code Breach With Unauthorized Repository AccessMay 2CVE-2026-42779: Critical Apache MINA Deserialization Class BypassMay 2CVE-2026-43824: Argo CD ServerSideDiff Exposes Cleartext Kubernetes SecretsMay 2CVE-2026-4882: Unauthenticated File Upload in WordPress User Registration Advanced FieldsMay 2CVE-2026-7458: Authentication Bypass via OTP Flaw in WordPress User Verification PluginMay 115-Year-Old Detained Over French Govt Agency Data BreachMay 11,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, and IntercomMay 1Cisco Releases Open Source Tool for AI Model ProvenanceMay 1Cyber Incident Responders Sentenced to 4 Years for Carrying Out Ransomware AttacksMay 1EnOcean SmartServer Flaws Expose Buildings to Remote HackingMay 1Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential TheftMay 1Top Five Sales Challenges Costing MSPs Cybersecurity RevenueMay 1US Ransomware Negotiators Get 4 Years in Prison Over BlackCat AttacksMay 1CVE-2026-31431: Linux Kernel Privilege Escalation via Incorrect Resource TransferMay 1CVE-2026-35051: Traefik ForwardAuth Authentication Bypass via Proxy Trust Abuse (CVSS 10.0)May 1CVE-2026-35547: FreeBSD libnv Heap Buffer Overflow Allows Out-of-Bounds WriteMay 1CVE-2026-39858: Traefik Forwarded-Header Sanitization Bypass in ForwardAuth and Snippet Middleware (CVSS 10.0)May 1Apache MINA Incomplete Deserialization Patch Leaves 2.1.X and 2.2.X Branches VulnerableMay 1Critical Stack-Based Buffer Overflow in Totolink NR1800X RouterMay 1Critical Authentication Bypass in WordPress Temporary Login Plugin

April 2026(383 articles)

Apr 30AI Finds 38 Security Flaws in Electronic Health Record PlatformApr 30Critical cPanel and WHM Bug Exploited as Zero-Day, PoC Now AvailableApr 30Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain AttacksApr 30European Commission Accuses Meta of Breaching Child Safety RulesApr 30FBI Links Cybercriminals to Sharp Surge in Cargo Theft AttacksApr 30Former Incident Responders Sentenced to 4 Years for Ransomware Attacks on ClientsApr 30France Investigates 15-Year-Old Over Alleged Hack of National ID AgencyApr 30Google Fixes CVSS 10 Gemini CLI RCE and Cursor Flaws Enable Code ExecutionApr 30Hackers Earning Millions from Hijacked Cargo, FBI SaysApr 30Moldova's Health Insurance Agency Reports Possible Data Leak After CyberattackApr 30PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal CredentialsApr 30Sandhills Medical Says Ransomware Breach Affects 170,000Apr 30TeamPCP Hits SAP npm Packages With 'Mini Shai-Hulud' Supply Chain AttackApr 30CVE-2026-36841: TOTOLINK N200RE V5 Command InjectionApr 30CVE-2026-41940: WebPros cPanel & WHM and WP2 Missing Authentication VulnerabilityApr 29CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEVApr 29cPanel & WHM Emergency Update Fixes Critical Auth Bypass BugApr 29Critical GitHub Vulnerability Exposed Millions of RepositoriesApr 29European Police Dismantles €50 Million Crypto Investment Fraud RingApr 29GitHub Fixes RCE Flaw That Gave Access to Millions of Private ReposApr 29Hackers Exploit RCE Flaws in Qinglong Task Scheduler for CryptominingApr 29Learning from the Vercel Breach: Shadow AI and OAuth SprawlApr 29SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain AttackApr 29Swiss Police Arrest 10 Suspected Members of Nigeria-Linked Crime Group Black AxeApr 29US & China Partner on Scam Center Takedown in DubaiApr 29Vect 2.0 Ransomware Acts as Wiper Thanks to Design ErrorApr 29VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXiApr 29CVE-2024-1708: ConnectWise ScreenConnect Path Traversal VulnerabilityApr 29CVE-2026-35155: Dell iDRAC10 Race Condition Enables Privilege EscalationApr 29Snap One WattBox 800/820 Diagnostic Auth Bypass (CVE-2026-41446)Apr 29Google Chrome GPU Use-After-Free Sandbox Escape (CVE-2026-7333)Apr 29Building a Production-Ready Reverse Proxy with Traefik v3 and DockerApr 28Broken VECT 2.0 Ransomware Acts as a Data Wiper for Large FilesApr 28Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCEApr 28Feuding Ransomware Groups Leak Each Other's DataApr 28Hackers Are Exploiting a Critical LiteLLM Pre-Auth SQLi FlawApr 28Medtronic Hack Confirmed After ShinyHunters Threatens Data LeakApr 28Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git PushApr 28Video Service Vimeo Confirms Anodot Breach Exposed User DataApr 28CVE-2024-46636: NASA EOSDIS MODAPS v8.1 SQL InjectionApr 28CVE-2026-30352: Remote Code Execution in leonvanzyl Autocoder via /devserver/start Command Injection (CVSS 9.8)Apr 28CVE-2026-40453: Apache Camel Header Filter Case-Variant Bypass Enables Network RCE (CVSS 9.9)Apr 28CVE-2026-40860: Apache Camel JMS Unsafe ObjectMessage Deserialization Enables Network RCE (CVSS 9.8)Apr 28CVE-2026-41462: ProjeQtor Unauthenticated SQL Injection in Login Endpoint Affects Versions 7.0 Through 12.4.3 (CVSS 9.8)Apr 28CVE-2026-41635: Apache MINA Class Allowlist Bypass Enables Arbitrary Code Execution (CVSS 9.8)Apr 28CVE-2026-7136: Totolink A8000RU OS Command Injection via CGI Handler wanIdx Argument (CVSS 9.8)Apr 28CVE-2026-7154: Totolink A8000RU OS Command Injection via CGI HandlerApr 28CVE-2026-7224: SQL Injection in Pizzafy Ecommerce System 1.0Apr 27Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 AttackApr 27Deepfake Voice Attacks Are Outpacing Defenses: What Security Leaders Should KnowApr 27Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS and Crypto FraudApr 27Firefox Vulnerability Allows Tor User Fingerprinting Across 'New Identity' ResetsApr 27FTC: Americans Lost Over $2.1 Billion to Social Media Scams in 2025Apr 27Home Security Giant ADT Data Breach Affects 5.5 Million PeopleApr 27Incomplete Windows Patch Opens Door to Zero-Click Attacks by APT28Apr 27Medtronic Confirms Breach After Hackers Claim 9 Million Records TheftApr 27Money Launderer for Crypto Thieves Given 5-Year Prison SentenceApr 27Money Launderer Linked to $230M Crypto Heist Gets 70 Months in PrisonApr 27PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian NetworksApr 27Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & MoreApr 27CVE-2026-6785: Memory Safety Bugs in Firefox and Thunderbird Enable Arbitrary Code ExecutionApr 27CVE-2026-6786: Memory Safety Bugs in Firefox and ThunderbirdApr 27CVE-2026-7037: Unauthenticated OS Command Injection in Totolink A8000RUApr 27CVE-2026-7077: SQL Injection in itsourcecode Courier Management SystemApr 27OpenVAS / Greenbone: Open-Source Vulnerability ScanningApr 26American Utility Firm Itron Discloses Breach of Internal IT NetworkApr 26Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain CampaignApr 26China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go BackdoorsApr 26Hypersonic Supply Chain Attacks: One Solution That Didn't Need to Know the PayloadApr 26LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of DisclosureApr 26Microsoft Now Lets Admins Uninstall Copilot on Enterprise DevicesApr 26Microsoft Patch Tuesday, March 2026 EditionApr 26New 'Pack2TheRoot' Flaw Gives Hackers Root Linux AccessApr 26Over 10,000 Zimbra Servers Vulnerable to Ongoing XSS AttacksApr 26Patch Tuesday, April 2026 EditionApr 26ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms + 25 New StoriesApr 26CVE-2026-7002: SQL Injection in KLiK SocialMediaWebsite Private Message HandlerApr 26Typecho 1.3.0 Pingback SSRF via X-Pingback Manipulation (CVE-2026-7025)Apr 25ADT Says Customer Data Stolen in Cyber IntrusionApr 25China-Linked APT GopherWhisper Abuses Legitimate Services in Government AttacksApr 25CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal DeadlineApr 25DORA and Operational Resilience: Credential Management as a Financial Risk ControlApr 25FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security PatchesApr 25Microsoft Rolls Out Revamped Windows Insider ProgramApr 25Microsoft to Roll Out Entra Passkeys on Windows in Late AprilApr 25New BlackFile Extortion Group Linked to Surge of Vishing AttacksApr 25Researchers Uncover Pre-Stuxnet 'fast16' Malware Targeting Engineering SoftwareApr 25Threat Actor Uses Microsoft Teams to Deploy New 'Snow' MalwareApr 25Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2Apr 25CVE-2025-29635: D-Link DIR-823X Command Injection VulnerabilityApr 25CVE-2026-21515: Azure IoT Central Elevation of Privilege — CVSS 9.9 CriticalApr 25CVE-2026-41248: Clerk.js Middleware Auth Bypass Exposes Protected Routes (CVSS 9.1)Apr 25CVE-2026-41478: Saltcorn SQL Injection Allows Full Database Compromise (CVSS 9.9)Apr 25CVE-2026-6951: simple-git RCE via --config Option Bypass (CVSS 9.8)Apr 24ADT Confirms Data Breach After ShinyHunters Leak ThreatApr 24Firestarter Malware Survives Cisco Firewall Updates and Security PatchesApr 24Windows Update Gets New Controls to Reduce Forced RestartsApr 24Pipecat AI Framework RCE via LivekitFrameSerializer (CVE-2025-62373)Apr 24Kofax Capture Unauthenticated RCE via Exposed .NET Remoting Channel (CVE-2026-23751)Apr 24CVE-2026-24303: Microsoft Partner Center Privilege Escalation via Improper Access ControlApr 24CVE-2026-26210: KTransformers Unsafe Deserialization RCE via Unauthenticated ZMQ RPCApr 24CVE-2026-32210: Microsoft Dynamics 365 Online SSRF Enables Unauthenticated Network SpoofingApr 24CVE-2026-39440: FunnelFormsPro WordPress Plugin Remote Code Inclusion (CVSS 9.9)Apr 24Hackage Haskell Repository Stored XSS Enables Credential Theft (CVE-2026-40470)Apr 24CVE-2026-41309: OSSN Resource Exhaustion via Crafted Pixel Bomb Image UploadApr 24SocialEngine Unauthenticated SQL Injection via Activity Endpoint (CVE-2026-41460)Apr 24CVE-2026-6885: Borg SPM 2007 Arbitrary File Upload Enables Remote Code ExecutionApr 24CVE-2026-6886: Borg SPM 2007 Authentication Bypass Allows Login as Any UserApr 24CVE-2026-6887: Borg SPM 2007 SQL Injection Exposes Full Database Access Without AuthenticationApr 24CVE-2026-6942: radare2-mcp OS Command Injection via Shell Metacharacter Filter BypassApr 23Hackers Actively Exploiting Breeze Cache File Upload Bug in WordPress AttacksApr 23Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply ChainApr 23Trigona Ransomware Deploys Custom CLI Exfiltration Tool in Active AttacksApr 23Vercel Finds More Compromised Accounts in Context.ai-Linked BreachApr 23CVE-2018-25270: ThinkPHP 5.0.23 Remote Code Execution via Routing ParameterApr 23CVE-2018-25272: ELBA5 5.8.0 RCE via Default Database Credentials and xp_cmdshellApr 23CVE-2026-33656: EspoCRM Formula Engine Attachment sourceId Overwrite (CVSS 9.1)Apr 23CVE-2026-3844 — Breeze Cache WordPress Plugin Unauthenticated File UploadApr 23CVE-2026-39987: Marimo Pre-Auth Remote Code Execution — CISA KEV AddedApr 23CVE-2026-41167: Jellystat Authenticated SQL Injection in Multiple API Endpoints (CVSS 9.1)Apr 23CVE-2026-41228 — Froxlor Path Traversal via def_language ParameterApr 23CVE-2026-41229 — Froxlor PHP Code Injection via MySQL Server SettingsApr 22Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks Against U.S. CompaniesApr 22France Titres Confirms Data Breach as Hacker Offers Stolen Citizen Data for SaleApr 22Hypersonic Supply Chain Attacks: AI Defense Stops Zero-Days Without Payload KnowledgeApr 22Kyber Ransomware Gang Uses Post-Quantum Encryption to Target Windows and ESXiApr 22Microsoft Teams to Get Efficiency Mode for Low-Resource PCsApr 22New Mirai Campaign Exploits RCE Flaw in End-of-Life D-Link RoutersApr 22New npm Supply Chain Attack Self-Spreads to Steal Developer Auth TokensApr 22Over 1,300 Microsoft SharePoint Servers Vulnerable to Ongoing Spoofing AttacksApr 22Spain Dismantles Major $4.7M Manga Piracy Platform, Arrests FourApr 22CVE-2017-20230: Perl Storable Stack Overflow — CVSS 10.0Apr 22CVE-2025-15638: Net::Dropbear Bundles Vulnerable libtomcrypt — CVSS 10.0Apr 22CVE-2026-21997: Oracle Life Sciences Empirica Signal Privilege Escalation (CVSS 8.5)Apr 22CVE-2026-22753: Spring Security Filter Chain Bypass via PathPatternRequestMatcher Servlet Path MismatchApr 22CVE-2026-6748: Critical Uninitialized Memory Flaw in Firefox and Thunderbird Web CodecsApr 22Self-Hosted Password Manager with VaultwardenApr 21Actively Exploited Apache ActiveMQ Flaw Impacts 6,400 Exposed ServersApr 21Cloud Platform Vercel Says Company Breached Through Third-Party AI ToolApr 21Crypto Infrastructure Company Blames $290 Million Theft on North Korean HackersApr 21Elon Musk Fails to Appear for Questioning by French Police Over Sexualized AI Images on XApr 21Former DigitalMint Ransomware Negotiator Pleads Guilty to $75.3M Extortion SchemeApr 21French Government Agency France Titres Confirms Data Breach as Hacker Sells Citizen DataApr 21Italian Regulator Fines National Postal Service Orgs $15 Million for Data Privacy ViolationsApr 21No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based AttacksApr 21Surge in Bomgar RMM Exploitation Demonstrates Supply Chain RiskApr 21CVE-2025-2749: Kentico Xperience Path Traversal VulnerabilityApr 21CVE-2026-24467: OpenAEV Password Reset Account TakeoverApr 21CVE-2026-29646: OpenXiangShan NEMU RISC-V Hypervisor Privilege Escalation (CVSS 9.8)Apr 21CVE-2026-32604: Spinnaker Clouddriver Remote Code Execution (CVSS 9.9)Apr 21CVE-2026-32613: Spinnaker Echo Spring Expression Language Injection (CVSS 9.9)Apr 21CVE-2026-39918: Vvveb CMS Unauthenticated PHP Code Injection via Install EndpointApr 21CVE-2026-5965: NewSoftOA Critical OS Command Injection (CVSS 9.8)Apr 20Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply ChainApr 20KelpDAO Suffers $290 Million Heist Tied to Lazarus HackersApr 20Microsoft Releases Emergency Updates to Fix Windows Server IssuesApr 20Next.js Creator Vercel HackedApr 20Researchers Detect ZionSiphon Malware Targeting Israeli Water and Desalination OT SystemsApr 20SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model FilesApr 20The Backup Myth That Is Putting Businesses at RiskApr 20The Gentlemen Ransomware Now Uses SystemBC for Bot-Powered AttacksApr 20Vercel Breach Tied to Context AI Hack Exposes Limited Customer CredentialsApr 20Vercel Employee's AI Tool Access Led to Data BreachApr 20Vercel's Security Breach Started with Malware Disguised as Roblox CheatsApr 20Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & MoreApr 20Why the Axios Attack Proves AI Is Mandatory for Supply Chain SecurityApr 20CVE-2026-20122: Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs VulnerabilityApr 20CVE-2026-32956: Critical Heap Buffer Overflow in silex SD-330AC and AMC ManagerApr 20CVE-2026-6595: SQL Injection in ProjectsAndPrograms School Management SystemApr 20Email Authentication: Deploying SPF, DKIM, and DMARC to Stop SpoofingApr 196-Year Ransomware Campaign Targets Turkish Homes and SMBsApr 19Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server TakeoverApr 19Adobe Patches Actively Exploited Zero-Day That Lingered for MonthsApr 19Analysis of 216M Security Findings Shows a 4x Increase in Critical Risk (2026 Report)Apr 19Apple Account Change Alerts Abused to Send Phishing EmailsApr 19Microsoft Drops Its Second-Largest Monthly Patch Batch on RecordApr 19Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New VulnerabilitiesApr 19Microsoft, Salesforce Patch AI Agent Data Leak FlawsApr 19NIST to Stop Rating Non-Priority Flaws Due to Volume IncreaseApr 19ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCEApr 19Tycoon 2FA Loses Phishing Kit Crown Amid Surge in AttacksApr 19Vercel Confirms Breach as Hackers Claim to Be Selling Stolen DataApr 19CVE-2026-6568: KodExplorer Path Traversal in Public Share HandlerApr 19KodExplorer fileGet Auth Bypass — Unauthenticated Remote File AccessApr 19CVE-2026-6577: DjangoBlog Missing Authentication in OwnTracks logtracks EndpointApr 19CVE-2026-6580: DjangoBlog Hard-Coded Cryptographic Key in Amap API HandlerApr 18$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence ClaimsApr 18Critical Flaw in protobuf.js Library Enables JavaScript Code ExecutionApr 18In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker ArrestedApr 18Microsoft Teams Right-Click Paste Broken by Edge Update BugApr 18Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS BotnetApr 18NAKIVO v11.2: Ransomware Defense, Faster Replication, vSphere 9 and Proxmox VE 9.0 SupportApr 18New Jersey Men Sentenced to Combined 17 Years for Running North Korean Laptop FarmsApr 18Recent Apache ActiveMQ Vulnerability Exploited in the Wild — CISA Adds CVE-2026-34197 to KEVApr 18CVE-2025-36568: Dell PowerProtect Data Domain BoostFS Credential ExposureApr 18CVE-2026-37749: SQL Injection Auth Bypass in CodeAstro Attendance System (CVSS 9.8)Apr 18CVE-2026-40285: WeGIA SQL Injection via PHP extract() Session Override (CVSS 8.8)Apr 18CVE-2026-40492: SAIL XWD Codec Heap Buffer Overflow (CVSS 9.8)Apr 18CVE-2026-40493: SAIL PSD Codec Buffer Overflow via channels * depth Miscalculation (CVSS 9.8)Apr 18CVE-2026-40494: SAIL TGA Codec RLE Decoder Asymmetric Bounds Check (CVSS 9.8)Apr 18CVE-2026-6284: PLC Brute Force Password Bypass (CVSS 9.1)Apr 18CVE-2026-6518: WordPress CMP Plugin Arbitrary File Upload and Remote Code Execution (CVSS 8.8)Apr 17CISA Flags Apache ActiveMQ Flaw as Actively Exploited in AttacksApr 17Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy OverhaulApr 17Grinex Exchange Blames Western Intelligence for $13.7M Crypto Hack, Suspends OperationsApr 17Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal AccountsApr 17Payouts King Ransomware Uses QEMU Virtual Machines to Bypass Endpoint SecurityApr 17Ransomware Attack Still Disrupting London Healthcare Nearly Two Years LaterApr 17Recently Leaked Windows Zero-Days Now Exploited in Active AttacksApr 17Three Microsoft Defender Zero-Days Actively Exploited; Two Still UnpatchedApr 17Ukraine Confirms APT28 Campaign Targeting Prosecutors and Anti-Corruption AgenciesApr 17CVE-2026-40259 — SiYuan Knowledge Management Authorization BypassApr 17CVE-2026-40322: SiYuan XSS via Mermaid innerHTML InjectionApr 17CVE-2026-6443: WordPress Accordion Plugin Backdoor in Version 1.4.6Apr 12CVE-2026-6112: Totolink A7100RU OS Command Injection via setRadvdCfgApr 12CVE-2026-6113: Totolink A7100RU OS Command Injection via setTtyServiceCfgApr 12CVE-2026-6114: Totolink A7100RU OS Command Injection via setNetworkCfgApr 12CVE-2026-6115: Totolink A7100RU OS Command Injection via setAppCfgApr 11Can Anthropic Keep Its Exploit-Writing AI Out of the Wrong Hands?Apr 11ChatGPT Rolls Out New $100 Pro Subscription to Challenge ClaudeApr 11Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad DataApr 11Commerce Setting Up New AI Export Regime to Push Adoption of 'American AI' AbroadApr 11In Other News: Cyberattack Stings Stryker, Windows Zero-Day, China Supercomputer HackApr 11Orthanc DICOM Vulnerabilities Lead to Crashes, RCEApr 11Over 20,000 Crypto Fraud Victims Identified in International CrackdownApr 11Your Next Breach Will Look Like Business as UsualApr 11CVE-2026-31845: Rukovoditel CRM Reflected XSS in Zadarma API (CVSS 9.3)Apr 11CVE-2026-34621: Adobe Acrobat Reader Prototype Pollution RCE (CVSS 9.6)Apr 11CVE-2026-4149: Sonos Era 300 Unauthenticated RCE via SMB Out-Of-Bounds AccessApr 11CVE-2026-5412: Juju Controller Facade Allows Low-Privilege Cloud Credential TheftApr 11CVE-2026-6057: FalkorDB Browser Unauthenticated Path Traversal RCEApr 101 Billion CISA KEV Records Reveal Human-Scale Security Has Hit Its LimitApr 10Dutch Hospitals Disrupted After Ransomware Hits Healthcare IT Provider ChipSoftApr 10Healthcare IT Solutions Provider ChipSoft Hit by Ransomware AttackApr 10Hims & Hers Breach Exposes the Most Sensitive Kinds of Patient PHIApr 10'It Reads Like a Spy Novel': $280M Drift Theft Linked to North Korean Fake CompaniesApr 10UK Government Threatens Tech Bosses With Jail Time Over AI Nudification ToolsApr 10CVE-2025-57735: Apache Airflow JWT Token Not Invalidated on LogoutApr 10CVE-2026-34177: Canonical LXD Incomplete VM Restriction DenylistApr 10CVE-2026-34178: Canonical LXD Backup Import Path Restriction BypassApr 10CVE-2026-34578: OPNsense LDAP Injection Enables Auth BypassApr 10CVE-2026-5977: TOTOLINK A7100RU Critical OS Command Injection via setWiFiBasicCfgApr 10CVE-2026-5978: TOTOLINK A7100RU Critical OS Command Injection via setWiFiAclRulesApr 10CVE-2026-6004: SQL Injection in code-projects Simple IT Discussion ForumApr 9Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025Apr 9Breach Exposes Sensitive LAPD Files Stored in City Attorney SystemApr 9Cryptocurrency ATM Giant Bitcoin Depot Reports $3.6 Million Stolen in CyberattackApr 9Cybercriminals Target Accountants to Drain Russian Firms' Bank AccountsApr 9EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto WalletsApr 9Eurail Says December Data Breach Impacts 300,000 IndividualsApr 9FCC Proposes New Rule to Further Crack Down on Illegal RobocallsApr 9Hackers Exploiting Acrobat Reader Zero-Day Flaw Since DecemberApr 9Hackers Steal $3.6 Million from Crypto ATM Giant Bitcoin DepotApr 9Healthcare IT Provider ChipSoft Hit by Ransomware, Services Taken OfflineApr 9Microsoft Suspends Dev Accounts for High-Profile Open Source ProjectsApr 9Russia's Forest Blizzard Harvests Logins via SOHO Router DNS PoisoningApr 9ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More StoriesApr 9CVE-2026-1830: WordPress Quick Playground Plugin RCE via Unauthenticated File UploadApr 9CVE-2026-25776: Movable Type Critical Code Injection (CVSS 9.8)Apr 9CVE-2026-39860: Nix Symlink Attack Allows Root File OverwriteApr 9CVE-2026-39888: PraisonAI Sandbox Escape Enables Remote Code ExecutionApr 9CVE-2026-39890: PraisonAI YAML Injection Achieves Remote Code ExecutionApr 9CVE-2026-4498: Kibana Fleet Plugin Privilege Escalation Exposes Elasticsearch Index DataApr 813-Year-Old Bug in ActiveMQ Lets Hackers Remotely Execute CommandsApr 8Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major SystemsApr 8APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO AlliesApr 8FBI: Cybercrime Losses Neared $21 Billion in 2025Apr 8Hackers Use Pixel-Large SVG Trick to Hide Credit Card Stealer on Magento StoresApr 8300,000+ Passport Numbers Leaked in December Eurail Data BreachApr 8Snowflake Customers Hit in Data Theft Attacks After SaaS Integrator BreachApr 8CVE-2021-4473: Tianxin Behavior Management System Unauthenticated Command InjectionApr 8CVE-2026-1340: Ivanti EPMM Code Injection VulnerabilityApr 8CVE-2026-20889: LibRaw x3f_thumb_loader Heap Buffer Overflow (CVSS 9.8)Apr 8CVE-2026-20911: LibRaw HuffTable::initval Heap Buffer Overflow (CVSS 9.8)Apr 8CVE-2026-21413: LibRaw lossless_jpeg_load_raw Heap Buffer Overflow (CVSS 9.8)Apr 8CVE-2026-22679: Weaver E-cology 10.0 Unauthenticated Remote Code ExecutionApr 8CVE-2026-39397: PayloadCMS Puck Plugin Access Control BypassApr 8CVE-2026-4003: WordPress Users Manager PN Plugin Privilege Escalation (CVSS 9.8)Apr 8CVE-2026-5731: Firefox and Thunderbird Critical Memory Safety VulnerabilitiesApr 8Velociraptor DFIR: Endpoint Forensics and Incident Response at ScaleApr 7Authorities Disrupt APT28 Router DNS Hijacks Targeting Microsoft 365Apr 7China-Linked Storm-1175 Chains Zero-Days for High-Velocity Medusa Ransomware AttacksApr 7Drift $280M Crypto Theft Linked to 6-Month In-Person DPRK InfiltrationApr 7FBI: Americans Lost a Record $21 Billion to Cybercrime Last YearApr 7Hackers Exploit Critical Flaw in Ninja Forms WordPress PluginApr 7Medusa Ransomware Is Fast to Exploit Fresh Vulnerabilities and Breach SystemsApr 7Medusa Ransomware Exploits Zero-Days to Deploy Ransomware Within 24 HoursApr 7Storm-1175 Deploys Medusa Ransomware at 'High Velocity'Apr 7The Hidden Cost of Recurring Credential IncidentsApr 7CVE-2026-1114: lollms JWT Weak Secret Key Allows Admin TakeoverApr 7CVE-2026-26026: GLPI Template Injection Enables Authenticated RCE via Admin PanelApr 7CVE-2026-35392: Critical Path Traversal in goshs Go HTTP ServerApr 7CVE-2026-5637: SQL Injection in projectworlds Car Rental System 1.0Apr 6BKA Identifies REvil Leaders Behind 130 German Ransomware AttacksApr 6Disgruntled Researcher Leaks BlueHammer Windows Zero-Day ExploitApr 6Fortinet FortiClient EMS Zero-Day CVE-2026-35616 Actively Exploited With Full Patch Still PendingApr 6German Authorities Identify REvil and GandCrab Ransomware Bosses Behind $40M in DamagesApr 6How LiteLLM Turned Developer Machines Into Credential Vaults for AttackersApr 6Medusa Ransomware Group Exploits Zero-Days to Strike Within 24 HoursApr 6Microsoft Links Storm-1175 to Medusa Ransomware Zero-Day CampaignApr 6GPUBreach: New Rowhammer Attack on GPU GDDR6 Memory Enables Full System TakeoverApr 6Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and MoreApr 6Why Simple Breach Monitoring Is No Longer EnoughApr 6CVE-2019-25662: ResourceSpace 8.6 Unauthenticated SQL InjectionApr 6CVE-2026-5554: SQL Injection in Concert Ticket Reservation System SearchApr 6CVE-2026-5555: SQL Injection in Concert Ticket Reservation System LoginApr 6CVE-2026-5575: SQL Injection in SourceCodester Record Management System LoginApr 6Network Traffic Analysis with Zeek: From Deployment to Threat DetectionApr 5$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering OperationApr 536 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent ImplantsApr 5Black Hat USA 2026: What to Expect from the Year's Biggest Security ConferenceApr 5Feds Disrupt IoT Botnets Behind Huge DDoS AttacksApr 5Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMSApr 5Germany Doxes "UNKN," Head of RU Ransomware Gangs REvil, GandCrabApr 5Hackers Exploit React2Shell in Automated Credential Theft CampaignApr 5New FortiClient EMS Flaw Exploited in Attacks, Emergency Patch ReleasedApr 5Traffic Violation Scams Switch to QR Codes in New Phishing TextsApr 5Trump Budget Proposal Would Cut Hundreds of Millions More from CISAApr 5CVE-2016-20052: Snews CMS 1.7 Unrestricted File Upload Allows Unauthenticated RCEApr 5CVE-2026-5534 — SQL Injection in itsourcecode Online Enrollment System 1.0Apr 5CVE-2026-5540 — SQL Injection in code-projects Simple Laundry System 1.0Apr 5CVE-2026-5551: SQL Injection in itsourcecode Free Hotel Reservation System LoginApr 4Axios npm Hack Used Fake Teams Error Fix to Hijack Maintainer AccountApr 4Device Code Phishing Attacks Surge 37x as New Kits Spread OnlineApr 4EU Cyber Agency Attributes Major Data Breach to TeamPCP Hacking GroupApr 4European Commission Confirms Data Breach Linked to Trivy Supply Chain AttackApr 4Evolution of Ransomware: Multi-Extortion Ransomware AttacksApr 4FCC Proposes $4.5 Million Fine for Voice Provider Hosting Suspicious Foreign RobocallsApr 4Hims & Hers Warns of Data Breach After Zendesk Support Ticket BreachApr 4Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux ServersApr 4UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain AttackApr 4CVE-2017-20237: Hirschmann HiVision Auth Bypass Enables Unauthenticated RCEApr 4CVE-2026-25197: IDOR Flaw Lets Authenticated Users Access Any Account ProfileApr 4CVE-2026-26477: DokuWiki media_upload_xhr() Denial of ServiceApr 4CVE-2026-28766: Gardyn Smart Garden API Exposes All User Accounts Without AuthenticationApr 4CVE-2026-3445: ProfilePress WordPress Plugin Allows Unauthorized Membership Payment BypassApr 4CVE-2026-35560: Amazon Athena ODBC Driver Fails Certificate Validation, Enabling MiTM Credential TheftApr 4CVE-2026-4896: WCFM WooCommerce Plugin IDOR Allows Unauthorized Order ManipulationApr 3250,000 Affected by Data Breach at Nacogdoches Memorial HospitalApr 3Blast Radius of TeamPCP Attacks Expands Amid Hacker InfightingApr 3CERT-EU: European Commission Hack Exposes Data of 30 EU EntitiesApr 3Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply ChainApr 3Claude Source Code Leak Highlights Big Supply Chain MisstepsApr 3Die Linke German Political Party Confirms Data Stolen by Qilin RansomwareApr 3In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by RansomwareApr 3Microsoft Now Force-Upgrades Unmanaged Windows 11 24H2 PCs to 25H2Apr 3The Good, the Bad and the Ugly in Cybersecurity – Week 14Apr 3CVE-2026-26135: Azure Custom Locations SSRF Enables Privilege Escalation (CVSS 9.6)Apr 3CVE-2026-28815: swift-crypto X-Wing HPKE Out-of-Bounds ReadApr 3CVE-2026-33615: Critical Unauthenticated SQL Injection in setinfo EndpointApr 2Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid CybercrimeApr 2Cisco Patches Critical and High-Severity Vulnerabilities Across Product LinesApr 2Claude Code Leak Used to Push Infostealer Malware on GitHubApr 2Critical Vulnerability in Claude Code Emerges Days After Source LeakApr 2Drift Crypto Platform Confirms $280 Million Stolen as Researchers Point to North KoreaApr 2Drift Loses $280 Million as Hackers Seize Security Council PowersApr 2Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal CredentialsApr 2Mercor Confirms Security Incident Tied to LiteLLM Supply Chain AttackApr 2New Progress ShareFile Flaws Can Be Chained in Pre-Auth RCE AttacksApr 2Nissan Says Stolen Data Came from Third-Party Vendor After Hacking Group Claims BreachApr 2Over 14,000 F5 BIG-IP APM Instances Still Exposed to RCE AttacksApr 2The State of Trusted Open Source Report: Key Findings for 2025Apr 2CVE-2026-1540: Spam Protect CF7 WordPress Plugin PHP Log RCEApr 2CVE-2026-31027: TOTOlink A3600R Buffer Overflow in setAppEasyWizardConfigApr 2CVE-2026-3502: TrueConf Client Update Integrity Bypass Enables Arbitrary Code ExecutionApr 2Juju Dqlite Cluster TLS Auth Bypass — Unauthenticated Database Access (CVE-2026-4370)Apr 1Apple Expands iOS 18 Updates to More iPhones to Block DarkSword AttacksApr 1Axios NPM Package Breached in North Korean Supply Chain AttackApr 1CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million EmailsApr 1Claude Code Source Leaked via npm Packaging Error, Anthropic ConfirmsApr 1Crypto Platform Drift Suspends Services After Hundreds of Millions StolenApr 1Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069Apr 1Google Drive Ransomware Detection Now On by Default for Paying UsersApr 1Google Fixes Fourth Chrome Zero-Day Exploited in Attacks in 2026Apr 1Hackers Exploit TrueConf Zero-Day to Push Malicious Software UpdatesApr 1New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch ReleasedApr 1'NoVoice' Android Malware on Google Play Infected 2.3 Million DevicesApr 1CVE-2025-15618: Perl Payment Module Uses Insecure MD5/rand() Secret KeyApr 1CVE-2026-0596: MLflow Command Injection via Unsanitized model_uri (CVSS 9.6)Apr 1CVE-2026-1579: MAVLink Protocol Unauthenticated Shell AccessApr 1CVE-2026-34162: FastGPT Unauthenticated HTTP Proxy Enables Full SSRF (CVSS 10.0)Apr 1CVE-2026-5272: Chrome GPU Heap Buffer Overflow Enables Remote Code ExecutionApr 1WireGuard Road Warrior VPN Server

March 2026(234 articles)

Mar 31Attack on Axios Developer Tool Threatens Widespread CompromisesMar 31Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm AccountMar 31CISA Orders Feds to Patch Actively Exploited Citrix Flaw by ThursdayMar 31Cisco Source Code Stolen in Trivy-Linked Dev Environment BreachMar 31Claude AI Finds Vim and Emacs RCE Bugs That Trigger on File OpenMar 31Claude Code Source Code Accidentally Leaked in NPM PackageMar 31Dutch Finance Ministry Takes Treasury Banking Portal Offline After BreachMar 31F5 BIG-IP Vulnerability Reclassified from DoS to RCE Under Active ExploitationMar 31Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency EncryptionMar 31Hacker Charged with Stealing $53 Million from Uranium Finance Crypto ExchangeMar 31Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key OperationsMar 31Leak Bazaar: New Criminal Service Plans to Monetize Data Stolen by Ransomware GangsMar 31State Department Reissues $10 Million Reward for Info on Iranian HackersMar 31Stolen Logins Are Fueling Everything From Ransomware to Nation-State CyberattacksMar 31CVE-2026-31946: Critical JWT Signature Verification Bypass in OpenOlat E-Learning PlatformMar 31CVE-2026-32714: Critical SQL Injection in SciTokens KeyCache (CVSS 9.8)Mar 30Critical Citrix NetScaler Memory Flaw Actively Exploited in AttacksMar 30Critical Fortinet FortiClient EMS Flaw Now Exploited in AttacksMar 30DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser CredentialsMar 30European Commission Confirms Data Breach After Europa.eu HackMar 30Hackers Now Exploit Critical F5 BIG-IP Flaw in Attacks — Patch NowMar 30Healthcare Software Firm CareCloud Informs SEC of Potential Patient Data LeakMar 30Healthcare Tech Firm CareCloud Says Hackers Stole Patient DataMar 30Italian Regulator Fines Financial Giant $36 Million for Data Protection FailuresMar 30New RoadK1ll WebSocket Implant Used to Pivot on Breached NetworksMar 30The State of Secrets Sprawl 2026: 9 Takeaways for CISOsMar 30Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber CampaignMar 30Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and MoreMar 30CVE-2025-15036: MLflow Path Traversal in Archive ExtractionMar 30CVE-2025-15379: MLflow Command Injection in Model Serving (CVSS 10.0)Mar 30CVE-2026-2370: GitLab Jira Connect Credential ImpersonationMar 30CVE-2026-32973: OpenClaw Exec Allowlist Bypass via Glob Wildcard OvermatchMar 30CVE-2026-32975: OpenClaw Zalouser Weak Authorization via Mutable Group Display NamesMar 30CVE-2026-32987: OpenClaw Bootstrap Code Replay Enables Privilege Escalation to operator.adminMar 30CVE-2026-4176: Perl Compress::Raw::Zlib Critical Vulnerability (CVSS 9.8)Mar 30CVE-2026-5128: Steam Trader 2.1.1 Unauthenticated Sensitive Data ExposureMar 30Suricata IDS/IPS Deployment: From Install to Active Threat DetectionMar 29AI Slashes Cyberattack Exploit Timelines From Years to DaysMar 29CISA: New Langflow Flaw Actively Exploited to Hijack AI WorkflowsMar 29Dutch Court Threatens xAI with Fines Over Grok's Nonconsensual Nude ImagesMar 29European Parliament Rejects Extension of CSAM Scanning Rules for Tech PlatformsMar 29FBI Confirms Hack of Director Patel's Personal Email InboxMar 29FCC Bans Import of Foreign-Made Consumer Routers Over Supply Chain Security RisksMar 29File Read Flaw in Smart Slider Plugin Impacts 500K WordPress SitesMar 29Foster City Declares State of Emergency After Ransomware Cripples Municipal ServicesMar 29ShinyHunters Breach Infinite Campus — K-12 Platform Serving 11 Million StudentsMar 29CVE-2016-20049: JAD Java Decompiler Stack-Based Buffer Overflow Enables Arbitrary Code ExecutionMar 29CVE-2017-20225: TiEmu TI Calculator Emulator Stack Buffer Overflow Allows Arbitrary Code Execution via Command-Line ArgumentsMar 29CVE-2026-32922: OpenClaw Privilege Escalation via Token Scope BypassMar 29CVE-2026-32924: OpenClaw Authorization Bypass via Feishu Chat MisclassificationMar 29CVE-2026-5016: elecV2P SSRF Vulnerability in URL Handler Allows Remote AttackMar 29CVE-2026-5017: SQL Injection in code-projects Simple Food Order System (Tickets)Mar 29CVE-2026-5018: SQL Injection in code-projects Simple Food Order System (Register)Mar 29CVE-2026-5019: SQL Injection in code-projects Simple Food Order System (Orders)Mar 29CVE-2026-5033: SQL Injection in code-projects Accounting System (Customer View)Mar 29CVE-2026-5034: SQL Injection in code-projects Accounting System 1.0Mar 28Anti-Piracy Coalition Takes Down AnimePlay App with 5 Million UsersMar 28Backdoored Telnyx PyPI Package Pushes Malware Hidden in WAV AudioMar 28Bearlyfy Hits Russian Firms with Custom GenieLocker RansomwareMar 28CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM ExploitationMar 28Citrix NetScaler CVE-2026-3055 (CVSS 9.3) Under Active ReconnaissanceMar 28Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on MacsMar 28Iran-Linked Hackers Breach FBI Director's Personal Email, Hit Stryker With Wiper AttackMar 28New Infinity Stealer Malware Grabs macOS Data via ClickFix LuresMar 28TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing CampaignMar 28TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV FilesMar 28CVE-2025-12886: Oxygen Theme SSRF Allows Unauthenticated Web RequestsMar 28CVE-2026-27856: Dovecot doveadm Timing Oracle Enables Credential RecoveryMar 28CVE-2026-27876 — Grafana Critical RCE via SQL Expression ChainMar 28CVE-2026-30303 — Axon Code OS Command Injection via Whitelist BypassMar 28CVE-2026-30304 — AI Code Safe Command Execution BypassMar 28CVE-2026-33875: Gematik Authenticator Authentication Flow Hijacking (CVSS 9.3)Mar 27European Commission Investigating Breach After Amazon Cloud Account HackMar 27CVE-2025-53521: F5 BIG-IP APM Remote Code Execution — CISA KEV (CVSS 9.8)Mar 27CVE-2026-33669: SiYuan Unauthenticated Document Content Exposure (CVSS 9.8)Mar 27CVE-2026-33670: SiYuan readDir Path Traversal Notebook Enumeration (CVSS 9.8)Mar 27Container Security Scanning with Trivy: Images, IaC, and CI/CDMar 27Build a Collaborative IPS with CrowdSecMar 26PolyShell Attacks Target 56% of All Vulnerable Magento StoresMar 26Pro-Ukraine Hacker Group Bearlyfy Targets Russian Companies with Custom RansomwareMar 26Russia Detains Alleged Admin of LeakBase Cybercrime Forum Weeks After Global CrackdownMar 26WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce SitesMar 26HashiCorp Vault: Centralized Secrets Management for Modern InfrastructureMar 26Keycloak SSO: Self-Hosted Identity Provider for Your HomelabMar 25Citrix Urges Admins to Patch NetScaler Flaws as Soon as PossibleMar 25DarkSword GitHub Leak Threatens to Turn Elite iPhone Hacking Into a Tool for the MassesMar 25LeakBase Admin Arrested in Russia Over Massive Stolen Credential MarketplaceMar 25Manager of Botnet Used in Ransomware Attacks Gets 2 Years in PrisonMar 25Paid AI Accounts Are Now a Hot Underground CommodityMar 25PTC Warns of Imminent Threat from Critical Windchill, FlexPLM RCE BugMar 25Supply Chain Attack Hits Widely-Used AI Package, Risking Thousands of CompaniesMar 25CVE-2026-27651 — NGINX ngx_mail_auth_http_module NULL Pointer DereferenceMar 243.1 Million Impacted by QualDerm Partners Data BreachMar 24Hacker Walks Away with $24.5 Million After Breaching Resolv DeFi PlatformMar 24Russian Hacker Who Helped Yanluowang Ransomware Gang Gets Nearly 7-Year Prison SentenceMar 24CVE-2026-33478: AVideo CloneSite Plugin Unauthenticated RCE (CVSS 10.0)Mar 23Crunchyroll Probes Breach After Hacker Claims to Steal 6.8M Users' DataMar 23Mazda Discloses Security Breach Exposing Employee and Partner DataMar 23Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes WiperMar 23Trivy Supply Chain Attack Targets CI/CD SecretsMar 23US Sentences Nigerian National to 7 Years in $6 Million Email Fraud SchemeMar 23Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & MoreMar 23Tenda A15 UploadCfg Stack Buffer Overflow (CVE-2026-4567)Mar 23CVE-2026-4599: jsrsasign Private Key Recovery via DSA Nonce Bias (CVSS 9.1)Mar 22CanisterWorm: First Blockchain-Powered Self-Spreading Worm Hits 47 npm PackagesMar 22Cegedim Santé Breach Exposes 15.8 Million French Healthcare Records Including HIV StatusMar 22CISA Adds Apple DarkSword iOS Exploits, Craft CMS, and Laravel Livewire Flaws to KEV CatalogMar 22FBI Warns Russian Intelligence Targeting Signal and WhatsApp in Mass Phishing CampaignMar 22Malaysia Airlines Listed by Qilin Ransomware Group — Passenger Data at RiskMar 22Trivy Vulnerability Scanner Breached to Push Infostealer via GitHub ActionsMar 22VoidStealer Malware Steals Chrome Master Key via Debugger TrickMar 22CVE-2026-3629: WordPress User Import Plugin Privilege EscalationMar 22D-Link DHP-1320 SOAP Handler Stack Buffer Overflow (CVE-2026-4529)Mar 21Two US Cybersecurity Professionals Plead Guilty to BlackCat Ransomware AttacksMar 21Interlock Ransomware Exploited Cisco FMC Zero-Day for 36 Days Before DisclosureMar 21Critical Langflow RCE Flaw Exploited Within 20 Hours of DisclosureMar 21Marquis Fintech Breach Exposes 672,000 Banking Customers via SonicWall ExploitMar 21New Speagle Malware Hijacks Cobra DocGuard for State-Sponsored EspionageMar 21CVE-2025-43510: Apple Multiple Products Improper Locking VulnerabilityMar 21CVE-2025-54068: Laravel Livewire Code Injection VulnerabilityMar 21CVE-2026-22172: OpenClaw Critical Authorization Bypass via WebSocket Scope ElevationMar 20DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS AttacksMar 20Eclypsium Raises $25 Million to Expand Device Supply Chain Security PlatformMar 20Navia Data Breach Impacts 2.7 Million PeopleMar 20Navia Discloses Data Breach Impacting 2.7 Million PeopleMar 20Oracle Pushes Emergency Fix for Critical Identity Manager RCE FlawMar 20Trivy Security Scanner GitHub Actions Breached — 75 Tags Hijacked to Steal CI/CD SecretsMar 20CVE-2025-32432: Craft CMS Code Injection VulnerabilityMar 20CVE-2026-21992: Critical Oracle Identity Manager Unauthenticated RCE via REST WebServicesMar 20CVE-2026-30836: Step CA SCEP UpdateReq Allows Unauthenticated Certificate Issuance (CVSS 10)Mar 20CVE-2026-32238: Critical Command Injection in OpenEMR Backup FunctionalityMar 19CISA Adds Zimbra XSS and SharePoint RCE to KEV; Cisco FMC Zero-Day Tied to RansomwareMar 19CVE-2026-25449: Critical Object Injection in Shinetheme Traveler WordPress PluginMar 18Cloud Security Startup Native Exits Stealth With $42 Million to Enforce Security-by-Design Across Multi-CloudMar 18Critical Unpatched GNU Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCEMar 18Marquis Ransomware Breach: 672K People Exposed as Attack Disrupts 80 US BanksMar 18Interlock Ransomware Has Been Exploiting Cisco FMC Zero-Day CVE-2026-20131 Since JanuaryMar 18Shadow AI in SaaS: How Hidden AI Agents Are Enabling Catastrophic BreachesMar 18CVE-2026-21994: Critical Unauthenticated RCE in Oracle Edge Cloud Infrastructure Designer v0.3.0Mar 18CVE-2026-25534: Spinnaker SSRF via URL Validation Bypass Using Java Underscore Parsing BugMar 18CVE-2026-25769: Wazuh Critical RCE via Insecure Deserialization in Cluster ProtocolMar 18CVE-2026-25770: Wazuh Privilege Escalation to Root via Cluster Protocol File WriteMar 18CVE-2026-30884: Critical Authorization Bypass in Moodle mod_customcert Plugin (CVSS 9.6)Mar 18CVE-2026-32298: Angeet ES3 KVM OS Command Injection via cfg.lua ScriptMar 18CVE-2026-3564: ConnectWise ScreenConnect Auth Bypass via Server Cryptographic MaterialMar 17AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCEMar 17LeakNet Ransomware Weaponizes ClickFix and Deno Runtime for Stealthy Corporate AttacksMar 17Microsoft Shares Fix for Windows C: Drive Access Issues on Samsung PCsMar 17Microsoft Halts Forced Global Rollout of Microsoft 365 Copilot AppMar 17CVE-2015-20118: Stored XSS in RealtyScript 4.0.2 Admin InterfaceMar 17CVE-2025-62319: Critical SQL Injection in HCL Unica (CVSS 9.8)Mar 17CVE-2025-69902: Critical Command Injection in kubectl-mcp-serverMar 17CVE-2026-4177: YAML::Syck Heap Buffer Overflow Enables Remote Code ExecutionMar 17CVE-2026-4312: DrangSoft GCB/FCB Audit Software Missing Authentication Allows Unauthenticated Admin Account CreationMar 16Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware AbuseMar 16CISA Adds Wing FTP Server Flaw to KEV as RCE Chain Exploits SurgeMar 16GlassWorm ForceMemo: Stolen GitHub Tokens Used to Poison Hundreds of Python ReposMar 16Shadow AI Is Everywhere. Here's How to Find and Secure It.Mar 16Stryker Cyberattack Wiped Tens of Thousands of Devices — No Malware NeededMar 16Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI AgentsMar 16CVE-2015-20115: RealtyScript 4.0.2 Stored XSS via File Upload in Admin PanelMar 16CVE-2016-20024: ZKTeco ZKTime.Net Insecure File Permissions Allow Privilege EscalationMar 16CVE-2016-20026: ZKTeco ZKBioSecurity 3.0 Hardcoded Tomcat Credentials Allow Unauthenticated RCEMar 16CVE-2016-20030: ZKTeco ZKBioSecurity 3.0 Username Enumeration via Login EndpointMar 16CVE-2025-47813: Wing FTP Server Path Disclosure Enables RCE ChainMar 16How to Deploy Falco for Kubernetes Runtime Security MonitoringMar 15Betterleaks: New Open-Source Secrets Scanner Built to Replace GitleaksMar 15Windows 11 February Update Breaks C:\ Drive Access on Samsung PCsMar 15OpenAI Says ChatGPT Ads Are Not Rolling Out Globally For NowMar 15Operation Synergia III: Police Sinkhole 45,000 IPs in Global Cybercrime CrackdownMar 14AppsFlyer Web SDK Supply Chain Attack SpreadMar 14GlassWorm Escalates: 72 Malicious Open VSX Extensions UseMar 14Microsoft Releases Windows 11 OOB Hotpatch to Fix ThreeMar 14OpenClaw AI Agent Flaws Enable Prompt Injection, 1-ClickMar 13England Hockey Investigating Data Breach After AiLockMar 13Telus Digital Confirms Massive Breach After ShinyHuntersMar 13Veeam Patches Five Critical RCE Vulnerabilities ExposingMar 13Critical RCE in Veeam Backup & Replication — AuthenticatedMar 13Critical RCE in Veeam Backup & Replication — AuthenticatedMar 13Critical RCE in Veeam Backup & Replication — Third DomainMar 13Critical RCE in Veeam Backup & Replication HA DeploymentsMar 13Critical RCE in Veeam Backup & Replication — Backup ViewerMar 13Critical CORS + Path Traversal in TinaCMS CLI Dev ServerMar 13How to Deploy Wazuh SIEM/XDR for Unified Security MonitoringMar 13HashiCorp Vault: Secrets Management for Your Homelab andMar 12CISA Flags Actively Exploited n8n RCE Bug as 24,700Mar 12CISA Orders Federal Agencies to Patch n8n RCE FlawMar 12Researchers Disclose Critical n8n Flaws Enabling RCE andMar 12CVE-2025-68613: n8n Remote Code Execution via ImproperMar 11UNC6426 Weaponizes Old nx npm Supply Chain Compromise toMar 11The Zero-Day Scramble Is Avoidable: Why Attack SurfaceMar 11Critical RCE in Hitachi Vantara Pentaho via UnrestrictedMar 11Critical Auth Bypass in Tutor LMS Pro Exposes 30,000+Mar 11Claude Code for IT Operations: Building a Multi-ProjectMar 11Securing AI-Assisted Development with Claude CodeMar 11Application Deployment Security ChecklistMar 11Backup & Disaster Recovery ChecklistMar 11Microsoft 365 Tenant Security ChecklistMar 11Network Security Audit ChecklistMar 11Vulnerability Management ChecklistMar 10CVE-2026-3038: FreeBSD Kernel Stack Buffer Overflow inMar 9Ericsson US Discloses Data Breach Affecting Employees andMar 9ShinyHunters Claims Mass Data Theft From 400 Firms viaMar 9North Korea's UNC4899 Breached Crypto Firm via AirDroppedMar 9Critical Stack-Based Buffer Overflow in Delta ElectronicsMar 9CVE-2026-3730: SQL Injection in itsourcecode Free HotelMar 9CVE-2026-3734: Improper Authorization in SourceCodesterMar 9CVE-2026-3740: SQL Injection in itsourcecode UniversityMar 9CVE-2026-3746: SQL Injection in SourceCodester SimpleMar 9How to Secure GitHub Actions Workflows with OIDC, SHAMar 9How to Configure Microsoft Sentinel Analytics RulesMar 8Termite Ransomware Operator Velvet Tempest Chains ClickFixMar 8CVE-2026-29067: ZITADEL Password Reset Poisoned byMar 8ZITADEL Critical XSS in SAML Endpoint Enables 1-ClickMar 8CVE-2026-29192: ZITADEL Stored XSS via Default Redirect URIMar 7Cognizant TriZetto Breach Exposes Health Data of 3.4Mar 7CVE-2018-25165: SQL Injection Vulnerability Disclosed inMar 7CVE-2018-25169: Denial of Service Vulnerability CataloguedMar 7CVE-2026-3589: WooCommerce CSRF Flaw Allows UnauthenticatedMar 6Google: 90 Zero-Days Exploited in 2025 — Enterprise TechMar 6Spanish-Ukrainian Police Bust Gambling Ring That ExploitedMar 6Microsoft Entra PIM: Configuring Just-in-Time Admin AccessMar 6Deception Technology Lab: T-Pot Honeypot with OpenCanaryMar 5Phobos Ransomware Admin Pleads Guilty — 1,000+ VictimsMar 4Cloudflare 2026 Threat Report: 230 Billion Daily Threats asMar 4Europol-Coordinated Action Dismantles Tycoon2FA — 330Mar 4LexisNexis Confirms Cloud Breach Exposing 400K UserMar 4CISA Issues Emergency Directive as Cisco SD-WAN Zero-DayMar 4CVE-2026-28775: Unauthenticated Root RCE in IDC SFXMar 4Mail2Shell: Zero-Click RCE in FreeScout HelpdeskMar 4CISA Adds Actively Exploited VMware Aria Operations RCEMar 3Android March 2026 Security Update Patches 129Mar 2Operation Epic Fury Triggers Unprecedented Cyber EscalationMar 1Former Cybersecurity Incident Responders Plead Guilty to

February 2026(234 articles)

Feb 28Google Disrupts Massive Chinese Espionage CampaignFeb 28Iran Plunged Into Digital Darkness: Internet Drops to 4% inFeb 27Leaked Documents Reveal China's 'Expedition Cloud' CyberFeb 27IDMerit KYC Data Breach Exposes 1 Billion Records Across 26Feb 26Cisco SD-WAN Zero-Day CVE-2026-20127 Triggers Five EyesFeb 25AI-Armed Amateur Hacker Compromises 600+ FortiGateFeb 25Diesel Vortex: Russian Cybercrime Ring Steals 1,649Feb 25The World's First Transatlantic Fiber Cable Is Being PulledFeb 25Ransomware Forces University of Mississippi Medical CenterFeb 25Microsoft MSHTML Framework Security Feature BypassFeb 25Microsoft Office Word OLE Security Feature BypassFeb 25Soliton FileZen OS Command Injection Under ActiveFeb 24Japanese Semiconductor Giant Advantest Hit by RansomwareFeb 24Anthropic Exposes Industrial-Scale AI Distillation AttacksFeb 24APT28 Operation MacroMaze: Russia-Linked Hackers HitFeb 24AT&T Breach Data Resurfaces: 176 Million Records with FullyFeb 24CrowdStrike 2026 Threat Report: eCrime Breakout Time FallsFeb 24U.S. Treasury Sanctions Russian Zero-Day Broker OperationFeb 23HellCat Ransomware Group Breaches Ascom, Exfiltrates 44GBFeb 23Cline CLI Supply Chain Attack Installs UnauthorizedFeb 23CISA Adds Two Actively Exploited Roundcube Webmail Flaws toFeb 23How to Detect and Block ClickFix AttacksFeb 23Domain Controller Hardening: Securing Active DirectoryFeb 23FortiGate Performance Optimization: Tuning Guide forFeb 23FortiGate Security Hardening: Best Practices for EnterpriseFeb 23How to Set Up BGP Monitoring and Route AlertsFeb 23Windows Server Hardening: Complete Security Guide forFeb 23Endpoint Security Baseline: Windows 11 + IntuneFeb 23IT Employee Offboarding ChecklistFeb 20CISA Loses 62% of Workforce as DHS Shutdown Guts America'sFeb 20Fintech Giant Figure Technology Confirms Breach: Nearly 1Feb 20ShinyHunters Dumps Harvard and UPenn Data After RansomFeb 20Japan Airlines Confirms Data Breach Affecting 28,000Feb 20Persona Source Code Leak Exposes Hidden BiometricFeb 20PromptSpy: First Android Malware to Weaponize Generative AIFeb 20Pro-Russian Hacktivists Launch Sustained Cyber CampaignFeb 20WormGPT Hacked: 19,000 Cybercriminal AI Platform UsersFeb 20BeyondTrust Remote Support and PRA Critical RCE UnderFeb 20Google Patches First Chrome Zero-Day of 2026: CVE-2026-2441Feb 20Microsoft February 2026 Patch Tuesday Fixes Six ActivelyFeb 20Critical RCE in Microsoft Semantic Kernel Python SDKFeb 19WEF Global Cybersecurity Outlook 2026 Warns of 'PermanentFeb 19Conduent Breach Balloons to Tens of Millions of AmericansFeb 19Hacker Accesses 1.2 Million French Bank Accounts viaFeb 19International AI Safety Report 2026 Warns of AI-DrivenFeb 18AI-Driven Threats Accelerate: Agentic Attacks, ModelFeb 18Notepad++ Supply Chain Attack Attributed to China-LinkedFeb 18Dell RecoverPoint Zero-Day Exploited by Chinese APT SinceFeb 18Critical Grandstream VoIP Vulnerability AllowsFeb 17Scattered Lapsus$ ShinyHunters Alliance Hits 100+Feb 17Adani Pledges $100 Billion for Renewable-Powered AI DataFeb 17Alibaba Launches Qwen 3.5 — Claims to Outperform GPT-5.2Feb 17ETH Zurich Finds 25 Password Recovery Attacks AgainstFeb 17Microsoft Discovers 'AI Recommendation Poisoning' viaFeb 17Nova (RALord) Ransomware Group Confirmed Active with 73Feb 17Reynolds Ransomware Embeds BYOVD Driver to Disable EDRFeb 17Warlock Ransomware Breaches SmarterTools via Its OwnFeb 17Trojanized MCP Server Deploys StealC Infostealer TargetingFeb 17UK Brings AI Chatbots Under Online Safety Act — Fines Up toFeb 17YouTube Suffers Major Global Outage Affecting 300,000+ UsersFeb 17ZeroDayRAT Mobile Spyware Enables Total Surveillance of iOSFeb 17Apple Patches Actively Exploited iOS Zero-Day Used inFeb 17BeyondTrust Remote Support Pre-Authentication RCE UnderFeb 17Cisco Unified Communications Zero-Day Exploited forFeb 16Anthropic Hits $380 Billion Valuation After Closing $30Feb 16APT28 Weaponizes Microsoft Office Zero-Day in 3 DaysFeb 16ShinyHunters Dumps 600K+ Canada Goose Customer Records onFeb 16Cloudflare BGP Routing Error Cascades Across AWS, X, andFeb 16India Hosts Global AI Impact Summit — 20 World Leaders andFeb 16Google Chrome Use-After-Free Zero-Day Under ActiveFeb 16Ivanti EPMM Zero-Days Breach Dutch, EU, and FinnishFeb 15Ransomware in 2026: Data-Only Extortion Replaces EncryptionFeb 15Russian APT 'ChainReaver' Hijacks 50 GitHub Accounts andFeb 15ClickFix Attacks Evolve — Now Abusing DNS nslookup forFeb 15GitHub Copilot Command Injection Flaws Enable Remote CodeFeb 14FBI Warns of ATM Jackpotting Surge as Losses Top $20Feb 14Claude AI Artifacts Abused to Distribute macOS InfostealerFeb 13AI Chat App Exposes 300 Million Private Messages from 25Feb 13Malicious Chrome Extension 'CL Suite' Steals Meta BusinessFeb 13ClickFix Campaign Targets European Hotels with FakeFeb 13All Four Major Nation-State Adversaries Now WeaponizingFeb 13Odido Data Breach Exposes 6.2 Million Dutch TelecomFeb 13Russian-Linked CANFAIL Malware Targets Ukrainian DefenseFeb 13Truebit Protocol Hit by $26.5 Million DeFi Hack via SmartFeb 12IRS Shares Tax Data of 1.28 Million Individuals with DHSFeb 12Romania's National Oil Pipeline Operator Conpet Hit byFeb 12Lazarus Group Plants 192 Malicious Packages in npm and PyPIFeb 12Louis Vuitton, Dior, and Tiffany Fined $25 Million OverFeb 12Ransomware Attacks Surge 49% Year-Over-Year: BlackFog 2026Feb 12Apple Patches Actively Exploited Zero-Day in dyldFeb 12Critical RCE in WPvivid Backup Plugin Threatens 900,000+Feb 11Ex-L3Harris Executive Pleads Guilty to Selling EightFeb 112026 Vulnerability Forecast: Up to 117,000 CVEs ExpectedFeb 116.8 Billion Emails Exposed Online in Massive Data LeakFeb 11North Korea Deploys AI-Generated Video and ClickFixFeb 11Ransomware Costs Projected to Hit $74 Billion in 2026, 30%Feb 11SSHStalker Linux Botnet Uses IRC Protocol for Command andFeb 11Microsoft Patch Tuesday February 2026: 6 Actively ExploitedFeb 11CVE-2026-21533: Windows Remote Desktop Services Zero-DayFeb 11SentinelOne Health Check: Agent Status Monitoring andFeb 11Deploy SentinelOne PolicyFeb 11Invoke SentinelOne Threat HuntFeb 11SentinelOne Application Control PoliciesFeb 11SentinelOne Control vs Complete Feature ComparisonFeb 11SentinelOne Create and Manage Exclusion PoliciesFeb 11SentinelOne Data Retention and Storage ManagementFeb 11SentinelOne Deep Visibility Threat HuntingFeb 11SentinelOne Deploy Agent Manual InstallationFeb 11SentinelOne Deploy Agent via Group PolicyFeb 11SentinelOne Device Control ConfigurationFeb 11SentinelOne File Fetch and Forensic File CollectionFeb 11SentinelOne Firewall Control ManagementFeb 11SentinelOne Forensics Rollback and RemediationFeb 11SentinelOne MITRE ATT&CK Threat HuntingFeb 11SentinelOne MSP Client OnboardingFeb 11SentinelOne Policy Configuration Best PracticesFeb 11SentinelOne PowerShell API AutomationFeb 11SentinelOne PowerShell Automation ScriptsFeb 11SentinelOne Purple AI Usage GuideFeb 11SentinelOne Ranger Network Discovery and IoT VisibilityFeb 11SentinelOne Remote Shell OperationsFeb 11SentinelOne RMM Integration GuideFeb 11SentinelOne Sandbox Integration ConfigurationFeb 11SentinelOne STAR Advanced Automation and WatchlistsFeb 11SentinelOne STAR Custom Detection RulesFeb 11SentinelOne Threat Investigation WorkflowFeb 11SentinelOne Timeline Forensics and Attack Chain AnalysisFeb 11IT Employee Onboarding ChecklistFeb 10Google's $32 Billion Wiz Acquisition Clears Final Hurdle asFeb 10BridgePay Payment Gateway Knocked Offline by RansomwareFeb 10China-Linked UNC3886 Breaches All Four Singapore TelecomFeb 10EU Launches NanoIC, Europe's Largest Chips Act Pilot LineFeb 10Gartner Identifies the Top 6 Cybersecurity Trends ReshapingFeb 10Microsoft Hit by Back-to-Back Outages: M365 Admin CenterFeb 10OpenAI Launches Frontier Enterprise Agent Platform andFeb 10BeyondTrust Zero-Day Allows Unauthenticated CommandFeb 10Lotus Blossom APT Compromises Notepad++ Updates to DeployFeb 10UNC3886 Zero-Day Campaign: Singapore Telecom OperatorsFeb 10Windows SmartScreen Bypass Under Active ExploitationFeb 10WinRAR Path Traversal Flaw CVE-2025-8088 Actively ExploitedFeb 10Building Offline-First PWAs with Next.js and SQLiteFeb 10Server Hardening Security ChecklistFeb 9Massive Kimwolf Botnet Disrupts I2P Anonymous NetworkFeb 9VoidLink: AI-Generated Cloud-Native Malware FrameworkFeb 9Critical PAN-OS GlobalProtect Gateway RCE VulnerabilityFeb 9Active Directory Health Check: Comprehensive DiagnosticFeb 9Building Event-Driven Systems with Python asyncioFeb 9Build an Active Directory Penetration Testing LabFeb 9Incident Response ChecklistFeb 8FBI Warns of AI-Generated Deepfake Phishing TargetingFeb 8Tirith: New Open-Source Tool Blocks Homoglyph AttacksFeb 8North Korean Hackers Use Fake Zoom Meeting to Target CryptoFeb 8International AI Safety Report: AI Now Provides 'MeaningfulFeb 8Cisco IOS XE Web UI Privilege Escalation Actively ExploitedFeb 8Configuring Windows LAPS: Automated Local Admin PasswordFeb 8Multi-Stack Docker Infrastructure with Traefik andFeb 8Cloud Migration Readiness ChecklistFeb 7CISA Mandates Full Zero Trust Architecture for FederalFeb 7Shadow Campaigns: State-Backed Espionage Group Breaches 70+Feb 7Fortinet FortiOS SSL VPN Heap Overflow Enables Pre-Auth RCEFeb 7Eight Critical n8n Vulnerabilities — Sandbox Escape toFeb 7Automating Report Generation with Python and Jinja2Feb 7Nmap Scanning Techniques for Security ProfessionalsFeb 7Build a Dedicated OSINT Investigation WorkstationFeb 6Cyberattacks on Critical Infrastructure Double in Q1 2026Feb 6DKnife: China-Linked AitM Framework Hijacks Router TrafficFeb 6Apache Struts Critical RCE via OGNL Injection ReturnsFeb 6Critical Fortinet FortiClientEMS SQL InjectionFeb 6IPTV Stream Validation and M3U Playlist Management withFeb 6OSINT Reconnaissance Methodology for Security ProfessionalsFeb 5ShinyHunters Dumps 5.1 Million Panera Bread CustomerFeb 5Substack Discloses Data Breach After 100-Day UndetectedFeb 5Amazon Alexa+ Goes GA After Tens of Millions Join BetaFeb 5Google Begins Post-Quantum Cryptography Rollout AcrossFeb 5Samsung Ends Software Support for Galaxy S21 SeriesFeb 5SpaceX-xAI Partnership Values Combined Entities Near $1.25Feb 5Conduent Breach Expands: 15.4 Million Texans Affected, 8TBFeb 5Iron Mountain Responds to Everest Ransomware Breach ClaimsFeb 5Microsoft Exchange Server SSRF to RCE Chain ActivelyFeb 5NGINX TLS Vulnerability Enables Man-in-the-Middle AttacksFeb 5SolarWinds Web Help Desk RCE Vulnerability Added to CISA KEVFeb 5Building Desktop Apps with Electron and Next.jsFeb 5Microsoft 365 Security and Compliance Configuration GuideFeb 5Microsoft 365 Security Baseline ImplementationFeb 4AI-Powered Cyberattacks Expected to Cause Major EnterpriseFeb 4Google Chrome Critical Update Patches High-Severity CodeFeb 4The Rise of Ransomware-as-a-Service: 14 Active PlatformsFeb 4Ransomware Attacks Surge in Early 2026 with 26 Claims inFeb 4CISA Adds Four Critical Vulnerabilities to KEV CatalogFeb 4Critical Google Looker Vulnerabilities Allow Full SystemFeb 4Critical n8n Vulnerability (CVSS 10.0) Enables CompleteFeb 4Group Policy Security Hardening for Windows EnvironmentsFeb 4IT Service Dashboards with PowerShell UniversalFeb 3Senator Demands AT&T, Verizon CEOs Testify Over SaltFeb 3AWS Security Hub: Centralized Security FindingsFeb 3Azure Backup: VMs, Files, and SQL with Recovery ServicesFeb 3Business Central Docker Containers: Development EnvironmentFeb 3Security Baseline Hardening: CIS Controls ImplementationFeb 3Conditional Access Policies: Zero Trust with Entra IDFeb 3Microsoft Defender for Endpoint: Configuration andFeb 3Docker Windows Containers: Native Engine Setup GuideFeb 3Enterprise BitLocker Automation with PowerShellFeb 3Exchange Online Security Hardening for EnterpriseFeb 3FortiAnalyzer Log Forwarding and Compliance ReportsFeb 3FortiGate Firewall Policy Management with PowerShellFeb 3FortiGate IPsec VPN: Site-to-Site with AzureFeb 3FortiGate SSL VPN Setup: Secure Remote Access ConfigurationFeb 3Incident Response Playbook: RansomwareFeb 3Intune Device Enrollment: Windows Autopilot SetupFeb 3Kubernetes Network Policies: Microsegmentation GuideFeb 3Kubernetes Secrets Management with External Secrets OperatorFeb 3Automated News Aggregation with Deduplication AlgorithmsFeb 3NinjaOne Scripting: PowerShell Automation LibraryFeb 3SentinelOne Agent Deployment: EDR Installation andFeb 3SentinelOne Threat Hunting with Deep VisibilityFeb 3Azure Landing Zone with TerraformFeb 3Azure Sentinel SIEM ImplementationFeb 3Building a RAG System Without ML EmbeddingsFeb 3CI/CD Pipeline with GitHub Actions and AzureFeb 3Cove Data Protection ImplementationFeb 3FortiGate SD-WAN DeploymentFeb 3Fortinet Centralized Management with FortiManager &Feb 3Homelab Media Server with Full ARR StackFeb 3Kubernetes Homelab Cluster with K3sFeb 3Network Traffic Analysis with Zeek and SuricataFeb 3NinjaOne RMM Platform SetupFeb 3SentinelOne Complete Deployment GuideFeb 2Critical Vulnerability Discovered in Popular Enterprise VPNFeb 2Building a Secure Homelab in 2026: Complete GuideFeb 2Building PWAs with IndexedDB for Offline DataFeb 2Python for Security Automation: Essential ScriptingFeb 1Microsoft Announces Major Security Features for CopilotFeb 1Building a Content Platform with Next.js 16 andFeb 1Build Your Own SIEM with Open-Source Tools

January 2026(32 articles)

Jan 30Cisco Patches Critical Webex Vulnerability Allowing RemoteJan 28Record-Breaking 31.4 Tbps DDoS Attack: Aisuru Botnet SetsJan 28SSH Hardening Best PracticesJan 28WireGuard VPN Setup: Secure Remote AccessJan 27Healthcare Sector Faces Unprecedented Ransomware Surge inJan 26Linux Server Hardening: Complete Security ChecklistJan 25WordPress Plugin Vulnerability (CVSS 10.0) Under ActiveJan 25Docker Security Fundamentals: Protecting Your ContainersJan 25Windows Security Baseline Audit: CIS Benchmark ComplianceJan 24Google Patches Actively Exploited Chrome Zero-DayJan 24Windows Security Event Log Analysis: Detect Threats andJan 23Nike Hit by Data Breach: 1.4 TB of Supply Chain Data LeakedJan 22China-Linked Hackers Exploit VMware ESXi Zero-Days toJan 22Pi-hole DNS Security: Block Ads, Trackers, and MalwareJan 22Build a Vulnerability Scanning Lab with OpenVASJan 21Mass Exploitation of Fortinet FortiGate Devices UnderwayJan 20AI-Powered Phishing Achieves 54% Click-Through RateJan 20Implementing a Robust Backup Strategy: The 3-2-1 RuleJan 18Supply Chain Attack Discovered in Popular NPM PackagesJan 18Critical D-Link Router RCE Under Active Exploitation - NoJan 18Build a Centralized Log Management System with Loki andJan 15Covenant Health Ransomware Attack Impacts 478,000 PatientsJan 15Ivanti Connect Secure Under Active Attack - CISA IssuesJan 15Network Monitoring Basics: Detect Threats Before They SpreadJan 14Microsoft January 2026 Patch Tuesday: 114 Flaws Fixed, OneJan 12Telegram Investigating Claims of 30 Million User Data BreachJan 12Build a Malware Analysis Sandbox with REMnux and FlareVMJan 10Self-Hosting a Password Manager: Vaultwarden Setup GuideJan 8US Treasury Department Confirms Network Breach byJan 6Apple Releases Critical Security Updates Across AllJan 5Cybersecurity Predictions 2026: The Hype We Can Ignore andJan 5Sedgwick Government Solutions Hit by TridentLocker