Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

690+ Articles
118+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE
ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE
NEWS

ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE

This week's threat roundup covers an unpatched Microsoft Defender zero-day, active SonicWall brute-force campaigns, a 17-year-old Excel RCE vulnerability now being exploited, and 15 additional security stories demanding attention.

Dylan H.

News Desk

April 19, 2026
4 min read

Another week, another pile of threats. The April 16 ThreatsDay Bulletin from The Hacker News covers 18 distinct stories — including a Microsoft Defender zero-day that's still unpatched, SonicWall appliances under sustained brute-force assault, and a 17-year-old Excel code execution vulnerability that apparently never got the memo it was supposed to stop working.

Top Stories

Microsoft Defender Zero-Day (Unpatched)

A zero-day vulnerability in Microsoft Defender for Endpoint is being tracked in active exploitation. The flaw enables attackers to disable Defender's real-time protection on targeted endpoints without triggering alerts — effectively blinding the EDR before executing malicious payloads.

Microsoft has acknowledged the vulnerability but has not yet released a patch. Workarounds involve:

  • Enabling Tamper Protection via Intune or Microsoft Defender portal
  • Monitoring for registry key modifications under HKLM\SOFTWARE\Microsoft\Windows Defender\
  • Alerting on DisableAntiSpyware and DisableRealtimeMonitoring policy changes

SonicWall Brute-Force Campaigns

Threat actors are conducting large-scale credential brute-force attacks against SonicWall SMA (Secure Mobile Access) and NetExtender VPN appliances. Attackers are targeting:

  • Default and weak admin credentials on internet-exposed management interfaces
  • Accounts with usernames matching common enterprise naming conventions (first.last, flast)
  • Legacy SonicWall firmware versions with known authentication weaknesses

Approximately 23,000 SonicWall appliances remain internet-exposed with management interfaces publicly accessible, according to Shodan scans. Organizations should:

  1. Restrict management interface access to trusted IP ranges
  2. Enforce strong password policies and account lockout thresholds
  3. Upgrade to patched firmware versions (SMA 10.2.1.14 or later)
  4. Enable MFA for all VPN and management authentication

17-Year-Old Excel RCE (CVE-2009-3130 Variant)

A vulnerability class first identified in Microsoft Excel 2007–2010 era is being resurrected in modern attack chains. Researchers confirmed that a variant of the old OLE object embedding technique (related to CVE-2009-3130) can be triggered in current Excel versions when processing legacy .xls format files.

The flaw allows arbitrary code execution when a victim opens a maliciously crafted spreadsheet. Attack chains observed in the wild use:

  • Phishing emails with .xls attachments (not .xlsx)
  • Excel's legacy DDE (Dynamic Data Exchange) mechanism
  • Macro-free exploitation — no VBA or Office macro settings required

Microsoft has confirmed the issue affects Excel through Office 2021 under specific legacy file processing conditions. A patch is expected in the next Patch Tuesday cycle.

Additional Headlines This Week

StoryImpact
Fortinet SSL-VPN mass scanning resumesThreat actors scanning for CVE-2024-21762 targets
Chrome extension steals MetaMask seeds45,000 installs before removal
Node.js supply chain via npm typosquatting12 malicious packages, 180K downloads
Clop ransomware resurgence targets healthcare8 new victims disclosed
Okta phishing via stolen session cookiesBypasses SSO in post-auth window
GitLab SSRF flaw under active exploitationCVE-2026-2494, CVSS 8.2
Palo Alto PAN-OS DoS via crafted packetsNo auth required, affects GlobalProtect
Android banking trojan updated with overlayTargets 200+ banking apps
Iranian APT targets Middle East energy sectorSpear-phishing with custom backdoor
PyPI malicious packages embed crypto miners28 packages active for 3+ weeks

Key Takeaways for Defenders

Patch prioritization this week:

  1. Apply Microsoft Defender Tamper Protection immediately (zero-day mitigation)
  2. Audit SonicWall exposure and enforce MFA
  3. Block legacy .xls attachments at the email gateway if not business-required
  4. Review Chrome extension inventory for unauthorized additions

Detection focus:

  • Defender registry key modifications (tamper attempts)
  • Unusual auth failures against VPN appliances from single source IPs
  • Excel processes spawning child processes or network connections

The volume and variety of active exploitation this week reinforces that patching velocity is the primary lever defenders control. The 17-year-old Excel vulnerability in particular illustrates how legacy file format support creates long tail attack surface that's easy to overlook.

#Zero-Day#Microsoft#SonicWall#Excel#Vulnerability#Weekly Roundup

Related Articles

Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities

Microsoft's April 2026 Patch Tuesday addresses a record 169 security vulnerabilities including a SharePoint zero-day actively exploited in the wild, 8 Critical-rated flaws, and dozens of remote code execution bugs across Windows, Office, and Azure.

4 min read

CISA Adds Zimbra XSS and SharePoint RCE to KEV; Cisco FMC Zero-Day Tied to Ransomware

CISA added actively exploited Zimbra Collaboration Suite and Microsoft SharePoint vulnerabilities to its Known Exploited Vulnerabilities catalog on March...

7 min read

In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested

This week's cybersecurity roundup covers the proposed Satellite Cybersecurity Act, a $90,000 Chrome heap overflow bug, a 16-year-old hacker arrest, ShinyHunters targeting Rockstar Games, the ShowDoc vulnerability under active exploitation, and a proposed $19M EPA cybersecurity budget boost.

3 min read
Back to all News