Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

995+ Articles
124+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
Browse by Topic

All Tags

Explore our content organized by topic. Click on any tag to see related articles.

Popular Tags

#Vulnerability189 articles

• Android March 2026 Security Update Patches 129

• CISA Flags Actively Exploited n8n RCE Bug as 24,700

• CISA Orders Federal Agencies to Patch n8n RCE Flaw

View all
#Data Breach133 articles

• ShinyHunters Dumps 5.1 Million Panera Bread Customer

• Substack Discloses Data Breach After 100-Day Undetected

• Fintech Giant Figure Technology Confirms Breach: Nearly 1

View all
#CVE132 articles

• CISA Flags Actively Exploited n8n RCE Bug as 24,700

• Researchers Disclose Critical n8n Flaws Enabling RCE and

• Veeam Patches Five Critical RCE Vulnerabilities Exposing

View all
#RCE121 articles

• CISA Flags Actively Exploited n8n RCE Bug as 24,700

• CISA Orders Federal Agencies to Patch n8n RCE Flaw

• Researchers Disclose Critical n8n Flaws Enabling RCE and

View all
#Supply Chain111 articles

• WEF Global Cybersecurity Outlook 2026 Warns of 'Permanent

• Cline CLI Supply Chain Attack Installs Unauthorized

• Japanese Semiconductor Giant Advantest Hit by Ransomware

View all
#BleepingComputer100 articles

• Telus Digital Confirms Massive Breach After ShinyHunters

• AppsFlyer Web SDK Supply Chain Attack Spread

• CISA Adds Wing FTP Server Flaw to KEV as RCE Chain Exploits Surge

View all
#Ransomware95 articles

• ShinyHunters Dumps 5.1 Million Panera Bread Customer

• Ransomware in 2026: Data-Only Extortion Replaces Encryption

• HellCat Ransomware Group Breaches Ascom, Exfiltrates 44GB

View all
#Zero-Day86 articles

• Ex-L3Harris Executive Pleads Guilty to Selling Eight

• CrowdStrike 2026 Threat Report: eCrime Breakout Time Falls

• U.S. Treasury Sanctions Russian Zero-Day Broker Operation

View all
#Cybercrime78 articles

• WormGPT Hacked: 19,000 Cybercriminal AI Platform Users

• Europol-Coordinated Action Dismantles Tycoon2FA — 330

• Phobos Ransomware Admin Pleads Guilty — 1,000+ Victims

View all
#NVD61 articles

• NIST to Stop Rating Non-Priority Flaws Due to Volume Increase

• CVE-2015-20118: Stored XSS in RealtyScript 4.0.2 Admin Interface

• CVE-2018-25165: SQL Injection Vulnerability Disclosed in

View all
#Security61 articles

• Samsung Ends Software Support for Galaxy S21 Series

• Container Security Scanning with Trivy: Images, IaC, and CI/CD

• Domain Controller Hardening: Securing Active Directory

View all
#Threat Intelligence60 articles

• Ransomware in 2026: Data-Only Extortion Replaces Encryption

• AI-Driven Threats Accelerate: Agentic Attacks, Model

• AI-Armed Amateur Hacker Compromises 600+ FortiGate

View all
#Microsoft56 articles

• Europol-Coordinated Action Dismantles Tycoon2FA — 330

• Microsoft Releases Windows 11 OOB Hotpatch to Fix Three

• Windows 11 February Update Breaks C:\ Drive Access on Samsung PCs

View all
#The Hacker News55 articles

• GlassWorm Escalates: 72 Malicious Open VSX Extensions Use

• GlassWorm ForceMemo: Stolen GitHub Tokens Used to Poison Hundreds of Python Repos

• Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents

View all
#Malware54 articles

• PromptSpy: First Android Malware to Weaponize Generative AI

• Google Disrupts Massive Chinese Espionage Campaign

• GlassWorm Escalates: 72 Malicious Open VSX Extensions Use

View all
#Critical52 articles

• Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

• New FortiClient EMS Flaw Exploited in Attacks, Emergency Patch Released

• New Critical Exim Mailer Flaw Allows Remote Code Execution

View all
#Remote Code Execution47 articles

• Veeam Patches Five Critical RCE Vulnerabilities Exposing

• Critical Langflow RCE Flaw Exploited Within 20 Hours of Disclosure

• CISA: New Langflow Flaw Actively Exploited to Hijack AI Workflows

View all
#Cloud Security44 articles

• Google's $32 Billion Wiz Acquisition Clears Final Hurdle as

• CrowdStrike 2026 Threat Report: eCrime Breakout Time Falls

• Cloudflare 2026 Threat Report: 230 Billion Daily Threats as

View all
#AI Security42 articles

• AI-Driven Threats Accelerate: Agentic Attacks, Model

• WormGPT Hacked: 19,000 Cybercriminal AI Platform Users

• Cline CLI Supply Chain Attack Installs Unauthorized

View all
#Security Updates42 articles

• CISA Orders Federal Agencies to Patch n8n RCE Flaw

• Researchers Disclose Critical n8n Flaws Enabling RCE and

• Veeam Patches Five Critical RCE Vulnerabilities Exposing

View all
#Windows42 articles

• Microsoft Releases Windows 11 OOB Hotpatch to Fix Three

• Microsoft Shares Fix for Windows C: Drive Access Issues on Samsung PCs

• Microsoft Halts Forced Global Rollout of Microsoft 365 Copilot App

View all
#SQL Injection40 articles

• Hackers Are Exploiting a Critical LiteLLM Pre-Auth SQLi Flaw

• CVE-2018-25165: SQL Injection Vulnerability Disclosed in

• CVE-2019-25662: ResourceSpace 8.6 Unauthenticated SQL Injection

View all
#Privilege Escalation38 articles

• Cisco Patches Critical and High-Severity Vulnerabilities Across Product Lines

• Disgruntled Researcher Leaks BlueHammer Windows Zero-Day Exploit

• GPUBreach: New Rowhammer Attack on GPU GDDR6 Memory Enables Full System Takeover

View all
#automation38 articles

• How to Configure Microsoft Sentinel Analytics Rules

• Automating Report Generation with Python and Jinja2

• Automated News Aggregation with Deduplication Algorithms

View all
#Healthcare35 articles

• Ransomware in 2026: Data-Only Extortion Replaces Encryption

• Ransomware Forces University of Mississippi Medical Center

• Former Cybersecurity Incident Responders Plead Guilty to

View all
#APT35 articles

• Leaked Documents Reveal China's 'Expedition Cloud' Cyber

• Google Disrupts Massive Chinese Espionage Campaign

• Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

View all
#sentinelone35 articles

• The Good, the Bad and the Ugly in Cybersecurity – Week 14

• Hypersonic Supply Chain Attacks: AI Defense Stops Zero-Days Without Payload Knowledge

• Researchers Uncover Pre-Stuxnet 'fast16' Malware Targeting Engineering Software

View all
#Nation-State34 articles

• Senator Demands AT&T, Verizon CEOs Testify Over Salt

• Operation Epic Fury Triggers Unprecedented Cyber Escalation

• Cloudflare 2026 Threat Report: 230 Billion Daily Threats as

View all
#edr34 articles

• Trellix Source Code Breach Highlights Growing Supply Chain Threats

• How to Detect and Block ClickFix Attacks

• Microsoft Defender for Endpoint: Configuration and

View all
#Critical Infrastructure32 articles

• CISA Loses 62% of Workforce as DHS Shutdown Guts America's

• Japanese Semiconductor Giant Advantest Hit by Ransomware

• Ransomware Forces University of Mississippi Medical Center

View all
#AI32 articles

• Anthropic Exposes Industrial-Scale AI Distillation Attacks

• CrowdStrike 2026 Threat Report: eCrime Breakout Time Falls

• AI-Armed Amateur Hacker Compromises 600+ FortiGate

View all
#Russia30 articles

• Ex-L3Harris Executive Pleads Guilty to Selling Eight

• Pro-Russian Hacktivists Launch Sustained Cyber Campaign

• APT28 Operation MacroMaze: Russia-Linked Hackers Hit

View all
#CISA KEV30 articles

• CISA Flags Actively Exploited n8n RCE Bug as 24,700

• CISA Orders Federal Agencies to Patch n8n RCE Flaw

• CISA Adds Wing FTP Server Flaw to KEV as RCE Chain Exploits Surge

View all
#PHP29 articles

• Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

• CVE-2015-20115: RealtyScript 4.0.2 Stored XSS via File Upload in Admin Panel

• CVE-2015-20118: Stored XSS in RealtyScript 4.0.2 Admin Interface

View all
#Privacy28 articles

• Substack Discloses Data Breach After 100-Day Undetected

• IRS Shares Tax Data of 1.28 Million Individuals with DHS

• Persona Source Code Leak Exposes Hidden Biometric

View all
#Authentication Bypass28 articles

• Cisco Patches Critical and High-Severity Vulnerabilities Across Product Lines

• Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

• Critical cPanel and WHM Bug Exploited as Zero-Day, PoC Now Available

View all
#deployment27 articles

• SentinelOne Health Check: Agent Status Monitoring and

• Deploy SentinelOne Policy

• Invoke SentinelOne Threat Hunt

View all
#detection-rules27 articles

• SentinelOne Health Check: Agent Status Monitoring and

• Deploy SentinelOne Policy

• Invoke SentinelOne Threat Hunt

View all
#Google26 articles

• Google's $32 Billion Wiz Acquisition Clears Final Hurdle as

• Google Disrupts Massive Chinese Espionage Campaign

• Android March 2026 Security Update Patches 129

View all
#Phishing26 articles

• Diesel Vortex: Russian Cybercrime Ring Steals 1,649

• Operation Epic Fury Triggers Unprecedented Cyber Escalation

• Europol-Coordinated Action Dismantles Tycoon2FA — 330

View all
#npm26 articles

• UNC6426 Weaponizes Old nx npm Supply Chain Compromise to

• CanisterWorm: First Blockchain-Powered Self-Spreading Worm Hits 47 npm Packages

• Attack on Axios Developer Tool Threatens Widespread Compromises

View all
#Web Security26 articles

• AppsFlyer Web SDK Supply Chain Attack Spread

• Hackers Actively Exploiting Breeze Cache File Upload Bug in WordPress Attacks

• CVE-2015-20118: Stored XSS in RealtyScript 4.0.2 Admin Interface

View all
#WordPress26 articles

• File Read Flaw in Smart Slider Plugin Impacts 500K WordPress Sites

• Hackers Exploit Critical Flaw in Ninja Forms WordPress Plugin

• Hackers Actively Exploiting Breeze Cache File Upload Bug in WordPress Attacks

View all
#threat-hunting26 articles

• SentinelOne Health Check: Agent Status Monitoring and

• Deploy SentinelOne Policy

• Invoke SentinelOne Threat Hunt

View all
#China25 articles

• Senator Demands AT&T, Verizon CEOs Testify Over Salt

• Anthropic Exposes Industrial-Scale AI Distillation Attacks

• Leaked Documents Reveal China's 'Expedition Cloud' Cyber

View all
#Social Engineering25 articles

• Scattered Lapsus$ ShinyHunters Alliance Hits 100+

• Fintech Giant Figure Technology Confirms Breach: Nearly 1

• Axios npm Hack Used Fake Teams Error Fix to Hijack Maintainer Account

View all
#policy25 articles

• CISA Loses 62% of Workforce as DHS Shutdown Guts America's

• International AI Safety Report 2026 Warns of AI-Driven

• SentinelOne Health Check: Agent Status Monitoring and

View all
#Credential Theft25 articles

• Diesel Vortex: Russian Cybercrime Ring Steals 1,649

• Researchers Disclose Critical n8n Flaws Enabling RCE and

• GlassWorm Escalates: 72 Malicious Open VSX Extensions Use

View all
#Law Enforcement25 articles

• Former Cybersecurity Incident Responders Plead Guilty to

• Europol-Coordinated Action Dismantles Tycoon2FA — 330

• Phobos Ransomware Admin Pleads Guilty — 1,000+ Victims

View all
#Patch Tuesday25 articles

• Android March 2026 Security Update Patches 129

• Veeam Patches Five Critical RCE Vulnerabilities Exposing

• Microsoft Releases Windows 11 OOB Hotpatch to Fix Three

View all
#api25 articles

• FortiGate Firewall Policy Management with PowerShell

• SentinelOne Health Check: Agent Status Monitoring and

• Deploy SentinelOne Policy

View all
#Espionage24 articles

• Ex-L3Harris Executive Pleads Guilty to Selling Eight

• APT28 Operation MacroMaze: Russia-Linked Hackers Hit

• Leaked Documents Reveal China's 'Expedition Cloud' Cyber

View all
#firewall24 articles

• Firestarter Malware Survives Cisco Firewall Updates and Security Patches

• FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches

• Mass Exploitation of Fortinet FortiGate Devices Underway

View all
#CISA22 articles

• CISA Loses 62% of Workforce as DHS Shutdown Guts America's

• CISA Orders Federal Agencies to Patch n8n RCE Flaw

• CISA Adds Zimbra XSS and SharePoint RCE to KEV; Cisco FMC Zero-Day Tied to Ransomware

View all
#Cryptocurrency22 articles

• North Korea's UNC4899 Breached Crypto Firm via AirDropped

• AppsFlyer Web SDK Supply Chain Attack Spread

• Hacker Walks Away with $24.5 Million After Breaching Resolv DeFi Platform

View all
#Open Source21 articles

• Cline CLI Supply Chain Attack Installs Unauthorized

• Betterleaks: New Open-Source Secrets Scanner Built to Replace Gitleaks

• Claude Code Source Code Accidentally Leaked in NPM Package

View all
#Linux20 articles

• Critical Unpatched GNU Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE

• Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

• New 'Pack2TheRoot' Flaw Gives Hackers Root Linux Access

View all
#Unauthenticated20 articles

• CVE-2016-20052: Snews CMS 1.7 Unrestricted File Upload Allows Unauthenticated RCE

• CVE-2019-25662: ResourceSpace 8.6 Unauthenticated SQL Injection

• CVE-2021-4473: Tianxin Behavior Management System Unauthenticated Command Injection

View all
#CWE-8920 articles

• CVE-2019-25662: ResourceSpace 8.6 Unauthenticated SQL Injection

• CVE-2025-62319: Critical SQL Injection in HCL Unica (CVSS 9.8)

• CVE-2026-3730: SQL Injection in itsourcecode Free Hotel

View all
#Command Injection20 articles

• CVE-2021-4473: Tianxin Behavior Management System Unauthenticated Command Injection

• CVE-2025-15379: MLflow Command Injection in Model Serving (CVSS 10.0)

• CVE-2025-29635: D-Link DIR-823X Command Injection Vulnerability

View all
#Fortinet19 articles

• AI-Armed Amateur Hacker Compromises 600+ FortiGate

• Critical Fortinet FortiClient EMS Flaw Now Exploited in Attacks

• Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

View all
#North Korea19 articles

• North Korea's UNC4899 Breached Crypto Firm via AirDropped

• Axios NPM Package Breached in North Korean Supply Chain Attack

• Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

View all
#Active Exploitation19 articles

• CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

• Citrix NetScaler CVE-2026-3055 (CVSS 9.3) Under Active Reconnaissance

• CISA: New Langflow Flaw Actively Exploited to Hijack AI Workflows

View all
#incident-response19 articles

• Network Traffic Analysis with Zeek: From Deployment to Threat Detection

• Invoke SentinelOne Threat Hunt

• SentinelOne Application Control Policies

View all
#ShinyHunters18 articles

• ShinyHunters Dumps 5.1 Million Panera Bread Customer

• Scattered Lapsus$ ShinyHunters Alliance Hits 100+

• Fintech Giant Figure Technology Confirms Breach: Nearly 1

View all
#IoT18 articles

• DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks

• Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More

• Feds Disrupt IoT Botnets Behind Huge DDoS Attacks

View all
#Router17 articles

• Cisco IOS XE Web UI Privilege Escalation Actively Exploited

• CVE-2025-29635: D-Link DIR-823X Command Injection Vulnerability

• CVE-2026-31027: TOTOlink A3600R Buffer Overflow in setAppEasyWizardConfig

View all
#Government16 articles

• IRS Shares Tax Data of 1.28 Million Individuals with DHS

• LexisNexis Confirms Cloud Breach Exposing 400K User

• European Commission Confirms Data Breach After Europa.eu Hack

View all
#Python16 articles

• GlassWorm ForceMemo: Stolen GitHub Tokens Used to Poison Hundreds of Python Repos

• Supply Chain Attack Hits Widely-Used AI Package, Risking Thousands of Companies

• Backdoored Telnyx PyPI Package Pushes Malware Hidden in WAV Audio

View all
#AWS15 articles

• LexisNexis Confirms Cloud Breach Exposing 400K User

• UNC6426 Weaponizes Old nx npm Supply Chain Compromise to

• AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE

View all
#Network Security15 articles

• Critical Unpatched GNU Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE

• Citrix NetScaler CVE-2026-3055 (CVSS 9.3) Under Active Reconnaissance

• Fortinet Warns of Critical RCE Flaws in FortiSandbox and FortiAuthenticator

View all
#Cisco15 articles

• Interlock Ransomware Has Been Exploiting Cisco FMC Zero-Day CVE-2026-20131 Since January

• CISA Adds Zimbra XSS and SharePoint RCE to KEV; Cisco FMC Zero-Day Tied to Ransomware

• Interlock Ransomware Exploited Cisco FMC Zero-Day for 36 Days Before Disclosure

View all
#Docker15 articles

• Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

• Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain

• Container Security Scanning with Trivy: Images, IaC, and CI/CD

View all
#TeamPCP15 articles

• Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

• Trivy Supply Chain Attack Targets CI/CD Secrets

• TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

View all
#Azure15 articles

• Microsoft Patch Tuesday, March 2026 Edition

• ConsentFix v3 Automates Azure OAuth Abuse With Mass Compromise Potential

• Microsoft Hit by Back-to-Back Outages: M365 Admin Center

View all
#DevSecOps14 articles

• Betterleaks: New Open-Source Secrets Scanner Built to Replace Gitleaks

• The State of Secrets Sprawl 2026: 9 Takeaways for CISOs

• Cisco Source Code Stolen in Trivy-Linked Dev Environment Breach

View all
#PowerShell14 articles

• ClickFix Attacks Evolve — Now Abusing DNS nslookup for

• How to Detect and Block ClickFix Attacks

• Windows Server Hardening: Complete Security Guide for

View all
#forensics14 articles

• Deploy SentinelOne Policy

• Invoke SentinelOne Threat Hunt

• SentinelOne Control vs Complete Feature Comparison

View all
#DOJ13 articles

• Former Cybersecurity Incident Responders Plead Guilty to

• Phobos Ransomware Admin Pleads Guilty — 1,000+ Victims

• DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks

View all
#Incident Response13 articles

• Stryker Cyberattack Wiped Tens of Thousands of Devices — No Malware Needed

• Dutch Finance Ministry Takes Treasury Banking Portal Offline After Breach

• The Backup Myth That Is Putting Businesses at Risk

View all
#SecurityWeek13 articles

• Navia Data Breach Impacts 2.7 Million People

• Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

• Cisco Patches Critical and High-Severity Vulnerabilities Across Product Lines

View all
#mitre-attack13 articles

• Invoke SentinelOne Threat Hunt

• SentinelOne Control vs Complete Feature Comparison

• SentinelOne Deep Visibility Threat Hunting

View all
#FBI12 articles

• FBI Warns of ATM Jackpotting Surge as Losses Top $20

• Ransomware Forces University of Mississippi Medical Center

• FBI Warns Russian Intelligence Targeting Signal and WhatsApp in Mass Phishing Campaign

View all
#ClickFix12 articles

• Termite Ransomware Operator Velvet Tempest Chains ClickFix

• LeakNet Ransomware Weaponizes ClickFix and Deno Runtime for Stealthy Corporate Attacks

• Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

View all
#Infostealer12 articles

• VoidStealer Malware Steals Chrome Master Key via Debugger Trick

• Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

• Trivy Supply Chain Attack Targets CI/CD Secrets

View all
#DeFi12 articles

• Hacker Walks Away with $24.5 Million After Breaching Resolv DeFi Platform

• Hacker Charged with Stealing $53 Million from Uranium Finance Crypto Exchange

• Crypto Platform Drift Suspends Services After Hundreds of Millions Stolen

View all
#Compliance12 articles

• Healthcare Software Firm CareCloud Informs SEC of Potential Patient Data Leak

• DORA and Operational Resilience: Credential Management as a Financial Risk Control

• CISA Mandates Full Zero Trust Architecture for Federal

View all
#File Upload12 articles

• Hackers Actively Exploiting Breeze Cache File Upload Bug in WordPress Attacks

• CVE-2015-20115: RealtyScript 4.0.2 Stored XSS via File Upload in Admin Panel

• CVE-2016-20052: Snews CMS 1.7 Unrestricted File Upload Allows Unauthenticated RCE

View all
#Android11 articles

• PromptSpy: First Android Malware to Weaponize Generative AI

• Android March 2026 Security Update Patches 129

• Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse

View all
#Anthropic11 articles

• Anthropic Exposes Industrial-Scale AI Distillation Attacks

• Claude Code Source Code Accidentally Leaked in NPM Package

• Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms

View all
#Botnet11 articles

• DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks

• Manager of Botnet Used in Ransomware Attacks Gets 2 Years in Prison

• Feds Disrupt IoT Botnets Behind Huge DDoS Attacks

View all
#iOS11 articles

• CISA Adds Apple DarkSword iOS Exploits, Craft CMS, and Laravel Livewire Flaws to KEV Catalog

• DarkSword GitHub Leak Threatens to Turn Elite iPhone Hacking Into a Tool for the Masses

• TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

View all
#Kubernetes11 articles

• Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

• VoidLink: AI-Generated Cloud-Native Malware Framework

• CVE-2025-69902: Critical Command Injection in kubectl-mcp-server

View all
#macOS11 articles

• Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

• New Infinity Stealer Malware Grabs macOS Data via ClickFix Lures

• In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware

View all
#Code Injection11 articles

• Actively Exploited Apache ActiveMQ Flaw Impacts 6,400 Exposed Servers

• CVE-2025-32432: Craft CMS Code Injection Vulnerability

• CVE-2025-54068: Laravel Livewire Code Injection Vulnerability

View all
#Totolink11 articles

• CVE-2026-31027: TOTOlink A3600R Buffer Overflow in setAppEasyWizardConfig

• CVE-2026-36841: TOTOLINK N200RE V5 Command Injection

• CVE-2026-5977: TOTOLINK A7100RU Critical OS Command Injection via setWiFiBasicCfg

View all
#CI/CD10 articles

• UNC6426 Weaponizes Old nx npm Supply Chain Compromise to

• Trivy Security Scanner GitHub Actions Breached — 75 Tags Hijacked to Steal CI/CD Secrets

• Trivy Supply Chain Attack Targets CI/CD Secrets

View all
#GitHub10 articles

• UNC6426 Weaponizes Old nx npm Supply Chain Compromise to

• GlassWorm ForceMemo: Stolen GitHub Tokens Used to Poison Hundreds of Python Repos

• The State of Secrets Sprawl 2026: 9 Takeaways for CISOs

View all
#Apple10 articles

• CISA Adds Apple DarkSword iOS Exploits, Craft CMS, and Laravel Livewire Flaws to KEV Catalog

• Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

• Apple Expands iOS 18 Updates to More iPhones to Block DarkSword Attacks

View all
#Chrome10 articles

• VoidStealer Malware Steals Chrome Master Key via Debugger Trick

• Google Fixes Fourth Chrome Zero-Day Exploited in Attacks in 2026

• New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

View all
#Deserialization10 articles

• PTC Warns of Imminent Threat from Critical Windchill, FlexPLM RCE Bug

• Critical Flaw in protobuf.js Library Enables JavaScript Code Execution

• CVE-2026-25449: Critical Object Injection in Shinetheme Traveler WordPress Plugin

View all
#The Record10 articles

• Supply Chain Attack Hits Widely-Used AI Package, Risking Thousands of Companies

• Dutch Court Threatens xAI with Fines Over Grok's Nonconsensual Nude Images

• European Parliament Rejects Extension of CSAM Scanning Rules for Tech Platforms

View all
#Web Application10 articles

• Apache Struts Critical RCE via OGNL Injection Returns

• CVE-2026-37431: Beauty Parlour Management System SQL Injection (CVSS 9.8)

• CVE-2026-37749: SQL Injection Auth Bypass in CodeAstro Attendance System (CVSS 9.8)

View all
#Path Traversal10 articles

• CVE-2024-1708: ConnectWise ScreenConnect Path Traversal Vulnerability

• CVE-2025-15036: MLflow Path Traversal in Archive Extraction

• CVE-2025-2749: Kentico Xperience Path Traversal Vulnerability

View all
#Homelab10 articles

• Building a Secure Homelab in 2026: Complete Guide

• Keycloak SSO: Self-Hosted Identity Provider for Your Homelab

• Build a Collaborative IPS with CrowdSec

View all
#Education9 articles

• ShinyHunters Dumps Harvard and UPenn Data After Ransom

• ShinyHunters Breach Infinite Campus — K-12 Platform Serving 11 Million Students

• Edu-Tech Firm Instructure Discloses Cyber Incident, Probes Impact on Canvas LMS

View all
#Mobile Security9 articles

• PromptSpy: First Android Malware to Weaponize Generative AI

• Android March 2026 Security Update Patches 129

• Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse

View all
#DDoS9 articles

• Pro-Russian Hacktivists Launch Sustained Cyber Campaign

• Iran Plunged Into Digital Darkness: Internet Drops to 4% in

• Cloudflare 2026 Threat Report: 230 Billion Daily Threats as

View all
#Dark Web9 articles

• WormGPT Hacked: 19,000 Cybercriminal AI Platform Users

• AT&T Breach Data Resurfaces: 176 Million Records with Fully

• Paid AI Accounts Are Now a Hot Underground Commodity

View all
#FortiGate9 articles

• AI-Armed Amateur Hacker Compromises 600+ FortiGate

• Mass Exploitation of Fortinet FortiGate Devices Underway

• Fortinet FortiOS SSL VPN Heap Overflow Enables Pre-Auth RCE

View all
#Iran9 articles

• Iran Plunged Into Digital Darkness: Internet Drops to 4% in

• Operation Epic Fury Triggers Unprecedented Cyber Escalation

• Iran-Linked Hackers Breach FBI Director's Personal Email, Hit Stryker With Wiper Attack

View all
#Ukraine9 articles

• Spanish-Ukrainian Police Bust Gambling Ring That Exploited

• Pro-Ukraine Hacker Group Bearlyfy Targets Russian Companies with Custom Ransomware

• Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

View all
#Developer Security9 articles

• GlassWorm Escalates: 72 Malicious Open VSX Extensions Use

• GlassWorm ForceMemo: Stolen GitHub Tokens Used to Poison Hundreds of Python Repos

• Attack on Axios Developer Tool Threatens Widespread Compromises

View all
#Vercel9 articles

• Vercel Confirms Breach as Hackers Claim to Be Selling Stolen Data

• Next.js Creator Vercel Hacked

• Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials

View all
#SSRF9 articles

• LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

• CVE-2025-12886: Oxygen Theme SSRF Allows Unauthenticated Web Requests

• CVE-2026-25534: Spinnaker SSRF via URL Validation Bypass Using Java Underscore Parsing Bug

View all
#XSS9 articles

• Over 10,000 Zimbra Servers Vulnerable to Ongoing XSS Attacks

• CVE-2015-20115: RealtyScript 4.0.2 Stored XSS via File Upload in Admin Panel

• CVE-2015-20118: Stored XSS in RealtyScript 4.0.2 Admin Interface

View all
#Buffer Overflow9 articles

• CVE-2016-20049: JAD Java Decompiler Stack-Based Buffer Overflow Enables Arbitrary Code Execution

• CVE-2017-20225: TiEmu TI Calculator Emulator Stack Buffer Overflow Allows Arbitrary Code Execution via Command-Line Arguments

• CVE-2026-31027: TOTOlink A3600R Buffer Overflow in setAppEasyWizardConfig

View all
#CWE-789 articles

• CVE-2021-4473: Tianxin Behavior Management System Unauthenticated Command Injection

• CVE-2026-0596: MLflow Command Injection via Unsanitized model_uri (CVSS 9.6)

• CVE-2026-30303 — Axon Code OS Command Injection via Whitelist Bypass

View all
#SIEM9 articles

• CVE-2026-25769: Wazuh Critical RCE via Insecure Deserialization in Cluster Protocol

• CVE-2026-25770: Wazuh Privilege Escalation to Root via Cluster Protocol File Write

• Suricata IDS/IPS Deployment: From Install to Active Threat Detection

View all
#OS Command Injection9 articles

• CVE-2026-30303 — Axon Code OS Command Injection via Whitelist Bypass

• CVE-2026-32298: Angeet ES3 KVM OS Command Injection via cfg.lua Script

• CVE-2026-33478: AVideo CloneSite Plugin Unauthenticated RCE (CVSS 10.0)

View all
#OpenClaw8 articles

• Cline CLI Supply Chain Attack Installs Unauthorized

• OpenClaw AI Agent Flaws Enable Prompt Injection, 1-Click

• CVE-2026-22172: OpenClaw Critical Authorization Bypass via WebSocket Scope Elevation

View all
#DevOps8 articles

• Researchers Disclose Critical n8n Flaws Enabling RCE and

• Microsoft Hit by Back-to-Back Outages: M365 Admin Center

• CVE-2026-30836: Step CA SCEP UpdateReq Allows Unauthenticated Certificate Issuance (CVSS 10)

View all
#KEV8 articles

• CISA Adds Zimbra XSS and SharePoint RCE to KEV; Cisco FMC Zero-Day Tied to Ransomware

• CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

• CISA: New Langflow Flaw Actively Exploited to Hijack AI Workflows

View all
#GitHub Actions8 articles

• Trivy Security Scanner GitHub Actions Breached — 75 Tags Hijacked to Steal CI/CD Secrets

• Trivy Vulnerability Scanner Breached to Push Infostealer via GitHub Actions

• Trivy Supply Chain Attack Targets CI/CD Secrets

View all
#Identity Security8 articles

• Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

• Why Simple Breach Monitoring Is No Longer Enough

• Your Next Breach Will Look Like Business as Usual

View all
#Fraud8 articles

• Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime

• FCC Proposes $4.5 Million Fine for Voice Provider Hosting Suspicious Foreign Robocalls

• Over 20,000 Crypto Fraud Victims Identified in International Crackdown

View all
#Next.js8 articles

• Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

• Hackers Exploit React2Shell in Automated Credential Theft Campaign

• Next.js Creator Vercel Hacked

View all
#Account Takeover8 articles

• Device Code Phishing Attacks Surge 37x as New Kits Spread Online

• CVE-2021-47923: OpenCart 3.0.3.8 Session Fixation Enables Account Takeover

• Critical Auth Bypass in Tutor LMS Pro Exposes 30,000+

View all
#Zero Trust8 articles

• Your Next Breach Will Look Like Business as Usual

• CISA Mandates Full Zero Trust Architecture for Federal

• CVE-2026-30836: Step CA SCEP UpdateReq Allows Unauthenticated Certificate Issuance (CVSS 10)

View all
#Ivanti8 articles

• CISA Gives Federal Agencies Four Days to Patch Actively Exploited Ivanti Zero-Day

• Ivanti Customers Confront Yet Another Actively Exploited Zero-Day in EPMM

• Ivanti Warns of New EPMM Flaw Exploited in Zero-Day Attacks

View all
#Memory Corruption8 articles

• New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution

• CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability

• CVE-2026-20889: LibRaw x3f_thumb_loader Heap Buffer Overflow (CVSS 9.8)

View all
#VPN8 articles

• Ivanti Connect Secure Under Active Attack - CISA Issues

• Critical Vulnerability Discovered in Popular Enterprise VPN

• Critical PAN-OS GlobalProtect Gateway RCE Vulnerability

View all
#code-projects8 articles

• CVE-2026-5017: SQL Injection in code-projects Simple Food Order System (Tickets)

• CVE-2026-5018: SQL Injection in code-projects Simple Food Order System (Register)

• CVE-2026-5019: SQL Injection in code-projects Simple Food Order System (Orders)

View all
#Hardening8 articles

• Domain Controller Hardening: Securing Active Directory

• FortiGate Security Hardening: Best Practices for Enterprise

• Windows Server Hardening: Complete Security Guide for

View all
#CIS Benchmarks8 articles

• FortiGate Security Hardening: Best Practices for Enterprise

• Windows Server Hardening: Complete Security Guide for

• AWS Security Hub: Centralized Security Findings

View all
#Telecom7 articles

• Senator Demands AT&T, Verizon CEOs Testify Over Salt

• Ericsson US Discloses Data Breach Affecting Employees and

• Telus Digital Confirms Massive Breach After ShinyHunters

View all
#Cybersecurity7 articles

• WEF Global Cybersecurity Outlook 2026 Warns of 'Permanent

• Edu-Tech Firm Instructure Discloses Cyber Incident, Probes Impact on Canvas LMS

• Trellix Confirms Source Code Breach With Unauthorized Repository Access

View all
#OpenAI7 articles

• Persona Source Code Leak Exposes Hidden Biometric

• OpenAI Says ChatGPT Ads Are Not Rolling Out Globally For Now

• ChatGPT Rolls Out New $100 Pro Subscription to Challenge Claude

View all
#APT287 articles

• APT28 Operation MacroMaze: Russia-Linked Hackers Hit

• Authorities Disrupt APT28 Router DNS Hijacks Targeting Microsoft 365

• APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

View all
#Enterprise Security7 articles

• Google: 90 Zero-Days Exploited in 2025 — Enterprise Tech

• New Progress ShareFile Flaws Can Be Chained in Pre-Auth RCE Attacks

• Fortinet FortiClient EMS Zero-Day CVE-2026-35616 Actively Exploited With Full Patch Still Pending

View all
#Patch7 articles

• Oracle Pushes Emergency Fix for Critical Identity Manager RCE Flaw

• Hackers Now Exploit Critical F5 BIG-IP Flaw in Attacks — Patch Now

• Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

View all
#Blockchain7 articles

• CanisterWorm: First Blockchain-Powered Self-Spreading Worm Hits 47 npm Packages

• Hacker Walks Away with $24.5 Million After Breaching Resolv DeFi Platform

• Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

View all
#France7 articles

• Cegedim Santé Breach Exposes 15.8 Million French Healthcare Records Including HIV Status

• Elon Musk Fails to Appear for Questioning by French Police Over Sexualized AI Images on X

• French Government Agency France Titres Confirms Data Breach as Hacker Sells Citizen Data

View all
#Automotive7 articles

• Mazda Discloses Security Breach Exposing Employee and Partner Data

• Nissan Says Stolen Data Came from Third-Party Vendor After Hacking Group Claims Breach

• GM to Pay Over $12 Million in Largest-Ever CCPA Fine Over Driver Data

View all
#PyPI7 articles

• Supply Chain Attack Hits Widely-Used AI Package, Risking Thousands of Companies

• Backdoored Telnyx PyPI Package Pushes Malware Hidden in WAV Audio

• TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

View all
#Patch Now7 articles

• Critical Citrix NetScaler Memory Flaw Actively Exploited in Attacks

• Critical Fortinet FortiClient EMS Flaw Now Exploited in Attacks

• Over 14,000 F5 BIG-IP APM Instances Still Exposed to RCE Attacks

View all
#Claude7 articles

• Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms

• Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

• Can Anthropic Keep Its Exploit-Writing AI Out of the Wrong Hands?

View all
#Container Security7 articles

• The State of Trusted Open Source Report: Key Findings for 2025

• Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain

• VoidLink: AI-Generated Cloud-Native Malware Framework

View all
#Microsoft 3657 articles

• Device Code Phishing Attacks Surge 37x as New Kits Spread Online

• ConsentFix v3 Automates Azure OAuth Abuse With Mass Compromise Potential

• Exchange Online Security Hardening for Enterprise

View all
#Endpoint Security7 articles

• Payouts King Ransomware Uses QEMU Virtual Machines to Bypass Endpoint Security

• Reynolds Ransomware Embeds BYOVD Driver to Disable EDR

• Microsoft Defender for Endpoint: Configuration and

View all
#Extortion7 articles

• Former DigitalMint Ransomware Negotiator Pleads Guilty to $75.3M Extortion Scheme

• ADT Confirms Data Breach After ShinyHunters Leak Threat

• New BlackFile Extortion Group Linked to Surge of Vishing Attacks

View all
#Entra ID7 articles

• Microsoft to Roll Out Entra Passkeys on Windows in Late April

• ConsentFix v3 Automates Azure OAuth Abuse With Mass Compromise Potential

• Microsoft Entra PIM: Configuring Just-in-Time Admin Access

View all
#authentication7 articles

• cPanel & WHM Emergency Update Fixes Critical Auth Bypass Bug

• CVE-2025-57735: Apache Airflow JWT Token Not Invalidated on Logout

• CVE-2026-22753: Spring Security Filter Chain Bypass via PathPatternRequestMatcher Servlet Path Mismatch

View all
#SOC7 articles

• In Other News: Scattered Spider Member Arrested, SOC Metrics, NSA Tool Flaw

• One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk

• Exaforce Raises $125 Million for Agentic SOC Platform

View all
#DNS7 articles

• Microsoft Patches 138 Vulnerabilities Including DNS and Netlogon RCE Flaws

• ClickFix Attacks Evolve — Now Abusing DNS nslookup for

• Email Authentication: Deploying SPF, DKIM, and DMARC to Stop Spoofing

View all
#CVSS 9.87 articles

• CVE-2026-21992: Critical Oracle Identity Manager Unauthenticated RCE via REST WebServices

• CVE-2026-26210: KTransformers Unsafe Deserialization RCE via Unauthenticated ZMQ RPC

• CVE-2026-31946: Critical JWT Signature Verification Bypass in OpenOlat E-Learning Platform

View all
#Authorization Bypass7 articles

• CVE-2026-22172: OpenClaw Critical Authorization Bypass via WebSocket Scope Elevation

• CVE-2026-30884: Critical Authorization Bypass in Moodle mod_customcert Plugin (CVSS 9.6)

• CVE-2026-32924: OpenClaw Authorization Bypass via Feishu Chat Misclassification

View all
#Networking7 articles

• CVE-2026-40621: ELECOM Wireless LAN Access Point Authentication Bypass (CVSS 9.8)

• How to Set Up BGP Monitoring and Route Alerts

• Building a Secure Homelab in 2026: Complete Guide

View all
#EU6 articles

• Google's $32 Billion Wiz Acquisition Clears Final Hurdle as

• CERT-EU: European Commission Hack Exposes Data of 30 EU Entities

• DORA and Operational Resilience: Credential Management as a Financial Risk Control

View all
#Insider Threat6 articles

• Ex-L3Harris Executive Pleads Guilty to Selling Eight

• Former Cybersecurity Incident Responders Plead Guilty to

• New Jersey Men Sentenced to Combined 17 Years for Running North Korean Laptop Farms

View all
#Deepfake6 articles

• ShinyHunters Dumps Harvard and UPenn Data After Ransom

• Deepfake Voice Attacks Are Outpacing Defenses: What Security Leaders Should Know

• Weaponized AI: The New Frontier of Fraud and Identity Spoofing

View all
#PII6 articles

• Japan Airlines Confirms Data Breach Affecting 28,000

• IDMerit KYC Data Breach Exposes 1 Billion Records Across 26

• Ericsson US Discloses Data Breach Affecting Employees and

View all
#Enterprise6 articles

• HellCat Ransomware Group Breaches Ascom, Exfiltrates 44GB

• Microsoft Shares Fix for Windows C: Drive Access Issues on Samsung PCs

• Microsoft Halts Forced Global Rollout of Microsoft 365 Copilot App

View all
#Identity Theft6 articles

• AT&T Breach Data Resurfaces: 176 Million Records with Fully

• IDMerit KYC Data Breach Exposes 1 Billion Records Across 26

• Ericsson US Discloses Data Breach Affecting Employees and

View all
#Infrastructure6 articles

• The World's First Transatlantic Fiber Cable Is Being Pulled

• Record-Breaking 31.4 Tbps DDoS Attack: Aisuru Botnet Sets

• HashiCorp Vault: Centralized Secrets Management for Modern Infrastructure

View all
#HIPAA6 articles

• Cognizant TriZetto Breach Exposes Health Data of 3.4

• 3.1 Million Impacted by QualDerm Partners Data Breach

• 250,000 Affected by Data Breach at Nacogdoches Memorial Hospital

View all
#Third-Party Risk6 articles

• Ericsson US Discloses Data Breach Affecting Employees and

• Marquis Ransomware Breach: 672K People Exposed as Attack Disrupts 80 US Banks

• Hims & Hers Warns of Data Breach After Zendesk Support Ticket Breach

View all
#Vulnerability Management6 articles

• The Zero-Day Scramble Is Avoidable: Why Attack Surface

• 1 Billion CISA KEV Records Reveal Human-Scale Security Has Hit Its Limit

• Analysis of 216M Security Findings Shows a 4x Increase in Critical Risk (2026 Report)

View all
#n8n6 articles

• CISA Flags Actively Exploited n8n RCE Bug as 24,700

• CISA Orders Federal Agencies to Patch n8n RCE Flaw

• Researchers Disclose Critical n8n Flaws Enabling RCE and

View all
#Actively Exploited6 articles

• CISA Flags Actively Exploited n8n RCE Bug as 24,700

• Recent Apache ActiveMQ Vulnerability Exploited in the Wild — CISA Adds CVE-2026-34197 to KEV

• Adobe Patches Actively Exploited Zero-Day That Lingered for Months

View all
#Workflow Automation6 articles

• CISA Flags Actively Exploited n8n RCE Bug as 24,700

• CISA Orders Federal Agencies to Patch n8n RCE Flaw

• Researchers Disclose Critical n8n Flaws Enabling RCE and

View all
#Veeam6 articles

• Veeam Patches Five Critical RCE Vulnerabilities Exposing

• Critical RCE in Veeam Backup & Replication — Authenticated

• Critical RCE in Veeam Backup & Replication — Authenticated

View all
#Backup & Replication6 articles

• Veeam Patches Five Critical RCE Vulnerabilities Exposing

• Critical RCE in Veeam Backup & Replication — Authenticated

• Critical RCE in Veeam Backup & Replication — Authenticated

View all
#Enterprise Backup6 articles

• Veeam Patches Five Critical RCE Vulnerabilities Exposing

• Critical RCE in Veeam Backup & Replication — Authenticated

• Critical RCE in Veeam Backup & Replication — Authenticated

View all
#Weekly Recap6 articles

• Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents

• Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More

• Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

View all
#OAuth6 articles

• Shadow AI in SaaS: How Hidden AI Agents Are Enabling Catastrophic Breaches

• Device Code Phishing Attacks Surge 37x as New Kits Spread Online

• Vercel Employee's AI Tool Access Led to Data Breach

View all
#General6 articles

• Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

• Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More

• Anti-Piracy Coalition Takes Down AnimePlay App with 5 Million Users

View all
#LiteLLM6 articles

• Supply Chain Attack Hits Widely-Used AI Package, Risking Thousands of Companies

• Mercor Confirms Security Incident Tied to LiteLLM Supply Chain Attack

• The Good, the Bad and the Ugly in Cybersecurity – Week 14

View all
#Data Protection6 articles

• Italian Regulator Fines Financial Giant $36 Million for Data Protection Failures

• Italian Regulator Fines National Postal Service Orgs $15 Million for Data Privacy Violations

• Azure Backup: VMs, Files, and SQL with Recovery Services

View all
#Axios6 articles

• Attack on Axios Developer Tool Threatens Widespread Compromises

• Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

• Axios NPM Package Breached in North Korean Supply Chain Attack

View all
#Netherlands6 articles

• Dutch Finance Ministry Takes Treasury Banking Portal Offline After Breach

• Healthcare IT Provider ChipSoft Hit by Ransomware, Services Taken Offline

• Dutch Hospitals Disrupted After Ransomware Hits Healthcare IT Provider ChipSoft

View all
#Browser Security6 articles

• Google Fixes Fourth Chrome Zero-Day Exploited in Attacks in 2026

• New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

• Malicious Chrome Extension 'CL Suite' Steals Meta Business

View all
#IoT Security6 articles

• ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

• Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

• EnOcean SmartServer Flaws Expose Buildings to Remote Hacking

View all
#Artificial Intelligence6 articles

• Commerce Setting Up New AI Export Regime to Push Adoption of 'American AI' Abroad

• Google Detects First AI-Generated Zero-Day Exploit in the Wild

• Google: Hackers Used AI to Develop Zero-Day Exploit for Web Admin Tool

View all
#Backup6 articles

• NAKIVO v11.2: Ransomware Defense, Faster Replication, vSphere 9 and Proxmox VE 9.0 Support

• CVE-2026-32238: Critical Command Injection in OpenEMR Backup Functionality

• Azure Backup: VMs, Files, and SQL with Recovery Services

View all
#cPanel6 articles

• cPanel & WHM Emergency Update Fixes Critical Auth Bypass Bug

• Critical cPanel and WHM Bug Exploited as Zero-Day, PoC Now Available

• Critical cPanel Flaw Mass-Exploited in 'Sorry' Ransomware Attacks

View all
#Web Hosting6 articles

• cPanel & WHM Emergency Update Fixes Critical Auth Bypass Bug

• Critical cPanel and WHM Bug Exploited as Zero-Day, PoC Now Available

• Critical cPanel Flaw Mass-Exploited in 'Sorry' Ransomware Attacks

View all
#SAP6 articles

• SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

• TeamPCP Hits SAP npm Packages With 'Mini Shai-Hulud' Supply Chain Attack

• 1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, and Intercom

View all
#EPMM6 articles

• CISA Gives Federal Agencies Four Days to Patch Actively Exploited Ivanti Zero-Day

• Ivanti Customers Confront Yet Another Actively Exploited Zero-Day in EPMM

• Ivanti Warns of New EPMM Flaw Exploited in Zero-Day Attacks

View all
#Active Directory6 articles

• Why Changing Passwords Doesn't End an Active Directory Breach

• Domain Controller Hardening: Securing Active Directory

• Active Directory Health Check: Comprehensive Diagnostic

View all
#Java6 articles

• Apache Struts Critical RCE via OGNL Injection Returns

• CVE-2026-22753: Spring Security Filter Chain Bypass via PathPatternRequestMatcher Servlet Path Mismatch

• CVE-2026-40860: Apache Camel JMS Unsafe ObjectMessage Deserialization Enables Network RCE (CVSS 9.8)

View all
#Perl6 articles

• CVE-2017-20230: Perl Storable Stack Overflow — CVSS 10.0

• CVE-2025-15618: Perl Payment Module Uses Insecure MD5/rand() Secret Key

• CVE-2025-15638: Net::Dropbear Bundles Vulnerable libtomcrypt — CVSS 10.0

View all
#CVSS 106 articles

• CVE-2017-20230: Perl Storable Stack Overflow — CVSS 10.0

• CVE-2025-15638: Net::Dropbear Bundles Vulnerable libtomcrypt — CVSS 10.0

• CVE-2026-35051: Traefik ForwardAuth Authentication Bypass via Proxy Trust Abuse (CVSS 10.0)

View all
#Heap Buffer Overflow6 articles

• CVE-2026-20889: LibRaw x3f_thumb_loader Heap Buffer Overflow (CVSS 9.8)

• CVE-2026-20911: LibRaw HuffTable::initval Heap Buffer Overflow (CVSS 9.8)

• CVE-2026-21413: LibRaw lossless_jpeg_load_raw Heap Buffer Overflow (CVSS 9.8)

View all
#Plugin Vulnerability6 articles

• CVE-2026-2993: SQL Injection in AIWU AI Chatbot WordPress Plugin

• CVE-2026-3844 — Breeze Cache WordPress Plugin Unauthenticated File Upload

• CVE-2026-39440: FunnelFormsPro WordPress Plugin Remote Code Inclusion (CVSS 9.9)

View all
#Traefik6 articles

• CVE-2026-35051: Traefik ForwardAuth Authentication Bypass via Proxy Trust Abuse (CVSS 10.0)

• CVE-2026-39858: Traefik Forwarded-Header Sanitization Bypass in ForwardAuth and Snippet Middleware (CVSS 10.0)

• Multi-Stack Docker Infrastructure with Traefik and

View all
#Threat Detection6 articles

• How to Deploy Falco for Kubernetes Runtime Security Monitoring

• How to Deploy Wazuh SIEM/XDR for Unified Security Monitoring

• Python for Security Automation: Essential Scripting

View all
#Monitoring6 articles

• How to Set Up BGP Monitoring and Route Alerts

• Network Monitoring Basics: Detect Threats Before They Spread

• Build a Production Monitoring Stack with Prometheus and Grafana

View all
#Agentic AI5 articles

• AI-Driven Threats Accelerate: Agentic Attacks, Model

• OpenClaw AI Agent Flaws Enable Prompt Injection, 1-Click

• Shadow AI in SaaS: How Hidden AI Agents Are Enabling Catastrophic Breaches

View all
#Geopolitics5 articles

• WEF Global Cybersecurity Outlook 2026 Warns of 'Permanent

• Pro-Russian Hacktivists Launch Sustained Cyber Campaign

• Commerce Setting Up New AI Export Regime to Push Adoption of 'American AI' Abroad

View all
#JavaScript5 articles

• AppsFlyer Web SDK Supply Chain Attack Spread

• Critical Flaw in protobuf.js Library Enables JavaScript Code Execution

• New npm Supply Chain Attack Self-Spreads to Steal Developer Auth Tokens

View all
#Windows 115 articles

• Windows 11 February Update Breaks C:\ Drive Access on Samsung PCs

• Microsoft Now Force-Upgrades Unmanaged Windows 11 24H2 PCs to 25H2

• Microsoft Rolls Out Revamped Windows Insider Program

View all
#ChatGPT5 articles

• OpenAI Says ChatGPT Ads Are Not Rolling Out Globally For Now

• In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware

• ChatGPT Rolls Out New $100 Pro Subscription to Challenge Claude

View all
#Dark Reading5 articles

• Trivy Supply Chain Attack Targets CI/CD Secrets

• Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

• 6-Year Ransomware Campaign Targets Turkish Homes and SMBs

View all
#BEC5 articles

• US Sentences Nigerian National to 7 Years in $6 Million Email Fraud Scheme

• FBI: Americans Lost a Record $21 Billion to Cybercrime Last Year

• FBI: Cybercrime Losses Neared $21 Billion in 2025

View all
#E-Commerce5 articles

• PolyShell Attacks Target 56% of All Vulnerable Magento Stores

• WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

• Hackers Use Pixel-Large SVG Trick to Hide Credit Card Stealer on Magento Stores

View all
#F55 articles

• CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

• Hackers Now Exploit Critical F5 BIG-IP Flaw in Attacks — Patch Now

• F5 BIG-IP Vulnerability Reclassified from DoS to RCE Under Active Exploitation

View all
#BIG-IP5 articles

• CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

• Hackers Now Exploit Critical F5 BIG-IP Flaw in Attacks — Patch Now

• F5 BIG-IP Vulnerability Reclassified from DoS to RCE Under Active Exploitation

View all
#RAT5 articles

• Attack on Axios Developer Tool Threatens Widespread Compromises

• Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

• CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

View all
#Claude Code5 articles

• Claude Code Source Code Accidentally Leaked in NPM Package

• Claude Code Leak Used to Push Infostealer Malware on GitHub

• Critical Vulnerability in Claude Code Emerges Days After Source Leak

View all
#Cryptography5 articles

• Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

• Google Begins Post-Quantum Cryptography Rollout Across

• CVE-2025-15618: Perl Payment Module Uses Insecure MD5/rand() Secret Key

View all
#Backdoor5 articles

• Axios NPM Package Breached in North Korean Supply Chain Attack

• China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

• Notepad++ Supply Chain Attack Attributed to China-Linked

View all
#Use-After-Free5 articles

• Google Fixes Fourth Chrome Zero-Day Exploited in Attacks in 2026

• New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

• Google Patches First Chrome Zero-Day of 2026: CVE-2026-2441

View all
#Open Source Security5 articles

• The State of Trusted Open Source Report: Key Findings for 2025

• Axios npm Hack Used Fake Teams Error Fix to Hijack Maintainer Account

• 13-Year-Old Bug in ActiveMQ Lets Hackers Remotely Execute Commands

View all
#Security Research5 articles

• Black Hat USA 2026: What to Expect from the Year's Biggest Security Conference

• 1 Billion CISA KEV Records Reveal Human-Scale Security Has Hit Its Limit

• Analysis of 216M Security Findings Shows a 4x Increase in Critical Risk (2026 Report)

View all
#Apache ActiveMQ5 articles

• 13-Year-Old Bug in ActiveMQ Lets Hackers Remotely Execute Commands

• ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

• CISA Flags Apache ActiveMQ Flaw as Actively Exploited in Attacks

View all
#Virtualization5 articles

• Payouts King Ransomware Uses QEMU Virtual Machines to Bypass Endpoint Security

• NAKIVO v11.2: Ransomware Defense, Faster Replication, vSphere 9 and Proxmox VE 9.0 Support

• CVE-2026-25199: Apache CloudStack Proxmox Extension Allows Unauthorized Cross-Tenant Instance Access

View all
#Disaster Recovery5 articles

• NAKIVO v11.2: Ransomware Defense, Faster Replication, vSphere 9 and Proxmox VE 9.0 Support

• Azure Backup: VMs, Files, and SQL with Recovery Services

• Implementing a Robust Backup Strategy: The 3-2-1 Rule

View all
#NGINX5 articles

• Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

• 18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE

• CVE-2026-27651 — NGINX ngx_mail_auth_http_module NULL Pointer Dereference

View all
#MCP5 articles

• Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain

• Trojanized MCP Server Deploys StealC Infostealer Targeting

• CVE-2025-69902: Critical Command Injection in kubectl-mcp-server

View all
#Windows Server5 articles

• Microsoft Releases Emergency Updates to Fix Windows Server Issues

• Windows Server Hardening: Complete Security Guide for

• Active Directory Health Check: Comprehensive Diagnostic

View all
#D-Link5 articles

• New Mirai Campaign Exploits RCE Flaw in End-of-Life D-Link Routers

• CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

• CVE-2025-29635: D-Link DIR-823X Command Injection Vulnerability

View all
#Email Security5 articles

• Over 10,000 Zimbra Servers Vulnerable to Ongoing XSS Attacks

• New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution

• CVE-2026-42193: Plunk Email Platform SNS Webhook Forgery

View all
#Firefox5 articles

• Firefox Vulnerability Allows Tor User Fingerprinting Across 'New Identity' Resets

• CVE-2026-5731: Firefox and Thunderbird Critical Memory Safety Vulnerabilities

• CVE-2026-6748: Critical Uninitialized Memory Flaw in Firefox and Thunderbird Web Codecs

View all
#Mozilla5 articles

• Firefox Vulnerability Allows Tor User Fingerprinting Across 'New Identity' Resets

• CVE-2026-5731: Firefox and Thunderbird Critical Memory Safety Vulnerabilities

• CVE-2026-6748: Critical Uninitialized Memory Flaw in Firefox and Thunderbird Web Codecs

View all
#ICS5 articles

• ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories

• Cyberattacks on Critical Infrastructure Double in Q1 2026

• CVE-2017-20237: Hirschmann HiVision Auth Bypass Enables Unauthenticated RCE

View all
#BitLocker5 articles

• Windows BitLocker Zero-Day Gives Access to Protected Drives, PoC Released

• Researcher Drops YellowKey, GreenPlasma Windows Zero-Days

• Windows Zero-Days Expose BitLocker Bypasses and CTFMON Privilege Escalation

View all
#Heap Overflow5 articles

• 18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE

• CVE-2026-40492: SAIL XWD Codec Heap Buffer Overflow (CVSS 9.8)

• CVE-2026-40494: SAIL TGA Codec RLE Decoder Asymmetric Bounds Check (CVSS 9.8)

View all
#TLS5 articles

• Google Begins Post-Quantum Cryptography Rollout Across

• CVE-2026-35560: Amazon Athena ODBC Driver Fails Certificate Validation, Enabling MiTM Credential Theft

• Juju Dqlite Cluster TLS Auth Bypass — Unauthenticated Database Access (CVE-2026-4370)

View all
#SD-WAN5 articles

• CISA Issues Emergency Directive as Cisco SD-WAN Zero-Day

• Cisco SD-WAN Zero-Day CVE-2026-20127 Triggers Five Eyes

• CVE-2026-20122: Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability

View all
#Information Disclosure5 articles

• CVE-2016-20030: ZKTeco ZKBioSecurity 3.0 Username Enumeration via Login Endpoint

• CVE-2025-47813: Wing FTP Server Path Disclosure Enables RCE Chain

• CVE-2026-33669: SiYuan Unauthenticated Document Content Exposure (CVSS 9.8)

View all
#High5 articles

• CVE-2025-2749: Kentico Xperience Path Traversal Vulnerability

• CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability

• CVE-2026-22753: Spring Security Filter Chain Bypass via PathPatternRequestMatcher Servlet Path Mismatch

View all
#API Security5 articles

• CVE-2026-25197: IDOR Flaw Lets Authenticated Users Access Any Account Profile

• CVE-2026-28766: Gardyn Smart Garden API Exposes All User Accounts Without Authentication

• CVE-2026-33669: SiYuan Unauthenticated Document Content Exposure (CVSS 9.8)

View all
#Financial Crime4 articles

• FBI Warns of ATM Jackpotting Surge as Losses Top $20

• Cryptocurrency ATM Giant Bitcoin Depot Reports $3.6 Million Stolen in Cyberattack

• Cybercriminals Target Accountants to Drain Russian Firms' Bank Accounts

View all
#Gemini4 articles

• PromptSpy: First Android Malware to Weaponize Generative AI

• Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks

• All Four Major Nation-State Adversaries Now Weaponizing

View all
#Hacktivism4 articles

• Pro-Russian Hacktivists Launch Sustained Cyber Campaign

• Operation Epic Fury Triggers Unprecedented Cyber Escalation

• Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

View all
#Telecommunications4 articles

• The World's First Transatlantic Fiber Cable Is Being Pulled

• Google Disrupts Massive Chinese Espionage Campaign

• FCC Proposes $4.5 Million Fine for Voice Provider Hosting Suspicious Foreign Robocalls

View all
#Europol4 articles

• Europol-Coordinated Action Dismantles Tycoon2FA — 330

• Spanish-Ukrainian Police Bust Gambling Ring That Exploited

• Operation Synergia III: Police Sinkhole 45,000 IPs in Global Cybercrime Crackdown

View all
#RaaS4 articles

• Phobos Ransomware Admin Pleads Guilty — 1,000+ Victims

• Tables Turn on 'The Gentlemen' RaaS Gang With Data Leak

• Nova (RALord) Ransomware Group Confirmed Active with 73

View all
#Spyware4 articles

• Google: 90 Zero-Days Exploited in 2025 — Enterprise Tech

• DarkSword GitHub Leak Threatens to Turn Elite iPhone Hacking Into a Tool for the Masses

• ZeroDayRAT Mobile Spyware Enables Total Surveillance of iOS

View all
#Vulnerability Research4 articles

• Google: 90 Zero-Days Exploited in 2025 — Enterprise Tech

• Black Hat USA 2026: What to Expect from the Year's Biggest Security Conference

• GPUBreach: New Rowhammer Attack on GPU GDDR6 Memory Enables Full System Takeover

View all
#Money Laundering4 articles

• Spanish-Ukrainian Police Bust Gambling Ring That Exploited

• US Sentences Nigerian National to 7 Years in $6 Million Email Fraud Scheme

• Money Launderer for Crypto Thieves Given 5-Year Prison Sentence

View all
#Federal4 articles

• CISA Orders Federal Agencies to Patch n8n RCE Flaw

• CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

• CISA Gives Federal Agencies Four Days to Patch Actively Exploited Ivanti Zero-Day

View all
#Sandbox Escape4 articles

• Researchers Disclose Critical n8n Flaws Enabling RCE and

• CVE-2026-39888: PraisonAI Sandbox Escape Enables Remote Code Execution

• Google Chrome GPU Use-After-Free Sandbox Escape (CVE-2026-7333)

View all
#Solana4 articles

• GlassWorm Escalates: 72 Malicious Open VSX Extensions Use

• Crypto Platform Drift Suspends Services After Hundreds of Millions Stolen

• Drift Crypto Platform Confirms $280 Million Stolen as Researchers Point to North Korea

View all
#Prompt Injection4 articles

• OpenClaw AI Agent Flaws Enable Prompt Injection, 1-Click

• Microsoft, Salesforce Patch AI Agent Data Leak Flaws

• Microsoft Discovers 'AI Recommendation Poisoning' via

View all
#Samsung4 articles

• Windows 11 February Update Breaks C:\ Drive Access on Samsung PCs

• Microsoft Shares Fix for Windows C: Drive Access Issues on Samsung PCs

• CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

View all
#Regulatory4 articles

• Microsoft Halts Forced Global Rollout of Microsoft 365 Copilot App

• FCC Proposes New Rule to Further Crack Down on Illegal Robocalls

• GM to Pay Over $12 Million in Largest-Ever CCPA Fine Over Driver Data

View all
#Funding4 articles

• Cloud Security Startup Native Exits Stealth With $42 Million to Enforce Security-by-Design Across Multi-Cloud

• Eclypsium Raises $25 Million to Expand Device Supply Chain Security Platform

• Exaforce Raises $125 Million for Agentic SOC Platform

View all
#Oracle4 articles

• Oracle Pushes Emergency Fix for Critical Identity Manager RCE Flaw

• CVE-2026-21992: Critical Oracle Identity Manager Unauthenticated RCE via REST WebServices

• CVE-2026-21994: Critical Unauthenticated RCE in Oracle Edge Cloud Infrastructure Designer v0.3.0

View all
#Qilin4 articles

• Malaysia Airlines Listed by Qilin Ransomware Group — Passenger Data at Risk

• Die Linke German Political Party Confirms Data Stolen by Qilin Ransomware

• Romania's National Oil Pipeline Operator Conpet Hit by

View all
#Citrix4 articles

• Citrix Urges Admins to Patch NetScaler Flaws as Soon as Possible

• Citrix NetScaler CVE-2026-3055 (CVSS 9.3) Under Active Reconnaissance

• Critical Citrix NetScaler Memory Flaw Actively Exploited in Attacks

View all
#NetScaler4 articles

• Citrix Urges Admins to Patch NetScaler Flaws as Soon as Possible

• Citrix NetScaler CVE-2026-3055 (CVSS 9.3) Under Active Reconnaissance

• Critical Citrix NetScaler Memory Flaw Actively Exploited in Attacks

View all
#CVE-2026-30554 articles

• Citrix Urges Admins to Patch NetScaler Flaws as Soon as Possible

• Citrix NetScaler CVE-2026-3055 (CVSS 9.3) Under Active Reconnaissance

• Critical Citrix NetScaler Memory Flaw Actively Exploited in Attacks

View all
#AI Regulation4 articles

• Dutch Court Threatens xAI with Fines Over Grok's Nonconsensual Nude Images

• UK Government Threatens Tech Bosses With Jail Time Over AI Nudification Tools

• Elon Musk Fails to Appear for Questioning by French Police Over Sexualized AI Images on X

View all
#GDPR4 articles

• Dutch Court Threatens xAI with Fines Over Grok's Nonconsensual Nude Images

• Italian Regulator Fines Financial Giant $36 Million for Data Protection Failures

• Italian Regulator Fines National Postal Service Orgs $15 Million for Data Privacy Violations

View all
#Encryption4 articles

• European Parliament Rejects Extension of CSAM Scanning Rules for Tech Platforms

• Broken VECT 2.0 Ransomware Acts as a Data Wiper for Large Files

• Google Begins Post-Quantum Cryptography Rollout Across

View all
#European Commission4 articles

• European Commission Confirms Data Breach After Europa.eu Hack

• CERT-EU: European Commission Hack Exposes Data of 30 EU Entities

• EU Cyber Agency Attributes Major Data Breach to TeamPCP Hacking Group

View all
#Source Code4 articles

• Cisco Source Code Stolen in Trivy-Linked Dev Environment Breach

• Trellix Confirms Source Code Breach With Unauthorized Repository Access

• Trellix Source Code Breach Claimed by RansomHouse Hackers

View all
#Post-Quantum4 articles

• Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

• Kyber Ransomware Gang Uses Post-Quantum Encryption to Target Windows and ESXi

• Gartner Identifies the Top 6 Cybersecurity Trends Reshaping

View all
#Wiper4 articles

• Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations

• Broken VECT 2.0 Ransomware Acts as a Data Wiper for Large Files

• Vect 2.0 Ransomware Acts as Wiper Thanks to Design Error

View all
#Physical Security4 articles

• Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime

• CVE-2016-20024: ZKTeco ZKTime.Net Insecure File Permissions Allow Privilege Escalation

• CVE-2016-20026: ZKTeco ZKBioSecurity 3.0 Hardcoded Tomcat Credentials Allow Unauthenticated RCE

View all
#Pre-Auth4 articles

• New Progress ShareFile Flaws Can Be Chained in Pre-Auth RCE Attacks

• BeyondTrust Remote Support Pre-Authentication RCE Under

• CVE-2026-39987: Marimo Pre-Auth Remote Code Execution — CISA KEV Added

View all
#Penetration Testing4 articles

• Black Hat USA 2026: What to Expect from the Year's Biggest Security Conference

• Nmap Scanning Techniques for Security Professionals

• OSINT Reconnaissance Methodology for Security Professionals

View all
#KrebsOnSecurity4 articles

• Feds Disrupt IoT Botnets Behind Huge DDoS Attacks

• Germany Doxes "UNKN," Head of RU Ransomware Gangs REvil, GandCrab

• Microsoft Patch Tuesday, March 2026 Edition

View all
#CyberScoop4 articles

• Trump Budget Proposal Would Cut Hundreds of Millions More from CISA

• Why the Axios Attack Proves AI Is Mandatory for Supply Chain Security

• Former DigitalMint Ransomware Negotiator Pleads Guilty to $75.3M Extortion Scheme

View all
#Adobe4 articles

• Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

• Hackers Exploiting Acrobat Reader Zero-Day Flaw Since December

• Adobe Patches Actively Exploited Zero-Day That Lingered for Months

View all
#Weekly Roundup4 articles

• ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

• In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested

• ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE

View all
#SharePoint4 articles

• Microsoft Drops Its Second-Largest Monthly Patch Batch on Record

• Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities

• Over 1,300 Microsoft SharePoint Servers Vulnerable to Ongoing Spoofing Attacks

View all
#NIST4 articles

• NIST to Stop Rating Non-Priority Flaws Due to Volume Increase

• CISA Mandates Full Zero Trust Architecture for Federal

• Incident Response Playbook: Ransomware

View all
#BeyondTrust4 articles

• Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk

• BeyondTrust Remote Support and PRA Critical RCE Under

• BeyondTrust Remote Support Pre-Authentication RCE Under

View all
#Checkmarx4 articles

• Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain

• Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

• Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

View all
#Identity4 articles

• Microsoft to Roll Out Entra Passkeys on Windows in Late April

• Microsoft Entra PIM: Configuring Just-in-Time Admin Access

• Conditional Access Policies: Zero Trust with Entra ID

View all
#Sentencing4 articles

• Money Launderer for Crypto Thieves Given 5-Year Prison Sentence

• Former Incident Responders Sentenced to 4 Years for Ransomware Attacks on Clients

• Cyber Incident Responders Sentenced to 4 Years for Carrying Out Ransomware Attacks

View all
#MSP4 articles

• Top Five Sales Challenges Costing MSPs Cybersecurity Revenue

• NinjaOne Scripting: PowerShell Automation Library

• Cove Data Protection Implementation

View all
#Canvas4 articles

• Edu-Tech Firm Instructure Discloses Cyber Incident, Probes Impact on Canvas LMS

• Canvas Breach Disrupts Schools & Colleges Nationwide

• Multiple Universities Forced to Reschedule Final Exams After Canvas Cyber Incident

View all
#Security Operations4 articles

• One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk

• Exaforce Raises $125 Million for Agentic SOC Platform

• Incident Response Playbook: Ransomware

View all
#Manufacturing4 articles

• West Pharmaceutical Services Hit by Disruptive Ransomware Attack

• West Pharmaceutical Warns of Ransomware Attack Impacting Business Operations

• Foxconn Confirms Cyberattack Claimed by Nitrogen Ransomware Gang

View all
#Google Chrome4 articles

• Google Chrome Critical Update Patches High-Severity Code

• Google Patches Actively Exploited Chrome Zero-Day

• Google Patches First Chrome Zero-Day of 2026: CVE-2026-2441

View all
#Database4 articles

• CVE-2024-46636: NASA EOSDIS MODAPS v8.1 SQL Injection

• CVE-2026-41478: Saltcorn SQL Injection Allows Full Database Compromise (CVSS 9.9)

• Juju Dqlite Cluster TLS Auth Bypass — Unauthenticated Database Access (CVE-2026-4370)

View all
#CMS4 articles

• CVE-2025-2749: Kentico Xperience Path Traversal Vulnerability

• CVE-2026-25776: Movable Type Critical Code Injection (CVSS 9.8)

• CVE-2026-39918: Vvveb CMS Unauthenticated PHP Code Injection via Install Endpoint

View all
#Dell4 articles

• CVE-2025-36568: Dell PowerProtect Data Domain BoostFS Credential Exposure

• CVE-2026-35155: Dell iDRAC10 Race Condition Enables Privilege Escalation

• Dell ECS and ObjectScale: Hard-Coded Credentials Vulnerability (CVE-2026-40636)

View all
#Unauthenticated RCE4 articles

• CVE-2026-1579: MAVLink Protocol Unauthenticated Shell Access

• CVE-2026-37749: SQL Injection Auth Bypass in CodeAstro Attendance System (CVSS 9.8)

• CVE-2026-3844 — Breeze Cache WordPress Plugin Unauthenticated File Upload

View all
#Access Control4 articles

• CVE-2026-24303: Microsoft Partner Center Privilege Escalation via Improper Access Control

• CVE-2026-25197: IDOR Flaw Lets Authenticated Users Access Any Account Profile

• CVE-2026-33109: Azure Managed Instance for Apache Cassandra Remote Code Execution (CVSS 9.9)

View all
#Wazuh4 articles

• CVE-2026-25769: Wazuh Critical RCE via Insecure Deserialization in Cluster Protocol

• CVE-2026-25770: Wazuh Privilege Escalation to Root via Cluster Protocol File Write

• How to Deploy Wazuh SIEM/XDR for Unified Security Monitoring

View all
#SiYuan4 articles

• CVE-2026-33669: SiYuan Unauthenticated Document Content Exposure (CVSS 9.8)

• CVE-2026-33670: SiYuan readDir Path Traversal Notebook Enumeration (CVSS 9.8)

• CVE-2026-40259 — SiYuan Knowledge Management Authorization Bypass

View all
#Knowledge Management4 articles

• CVE-2026-33669: SiYuan Unauthenticated Document Content Exposure (CVSS 9.8)

• CVE-2026-33670: SiYuan readDir Path Traversal Notebook Enumeration (CVSS 9.8)

• CVE-2026-40259 — SiYuan Knowledge Management Authorization Bypass

View all
#itsourcecode4 articles

• CVE-2026-3730: SQL Injection in itsourcecode Free Hotel

• CVE-2026-3740: SQL Injection in itsourcecode University

• CVE-2026-5551: SQL Injection in itsourcecode Free Hotel Reservation System Login

View all
#SourceCodester4 articles

• CVE-2026-3734: Improper Authorization in SourceCodester

• CVE-2026-3746: SQL Injection in SourceCodester Simple

• CVE-2026-5575: SQL Injection in SourceCodester Record Management System Login

View all
#Thunderbird4 articles

• CVE-2026-5731: Firefox and Thunderbird Critical Memory Safety Vulnerabilities

• CVE-2026-6748: Critical Uninitialized Memory Flaw in Firefox and Thunderbird Web Codecs

• CVE-2026-6785: Memory Safety Bugs in Firefox and Thunderbird Enable Arbitrary Code Execution

View all
#Memory Safety4 articles

• CVE-2026-5731: Firefox and Thunderbird Critical Memory Safety Vulnerabilities

• CVE-2026-6748: Critical Uninitialized Memory Flaw in Firefox and Thunderbird Web Codecs

• CVE-2026-6785: Memory Safety Bugs in Firefox and Thunderbird Enable Arbitrary Code Execution

View all
#Intune4 articles

• Microsoft Defender for Endpoint: Configuration and

• Intune Device Enrollment: Windows Autopilot Setup

• Microsoft 365 Security Baseline Implementation

View all
#device-control4 articles

• SentinelOne Control vs Complete Feature Comparison

• SentinelOne Device Control Configuration

• SentinelOne MSP Client Onboarding

View all
#Trends3 articles

• Ransomware in 2026: Data-Only Extortion Replaces Encryption

• Cybersecurity Predictions 2026: The Hype We Can Ignore and

• Ransomware Attacks Surge 49% Year-Over-Year: BlackFog 2026

View all
#Lapsus$3 articles

• Scattered Lapsus$ ShinyHunters Alliance Hits 100+

• Mercor Confirms Security Incident Tied to LiteLLM Supply Chain Attack

• Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

View all
#Deepfakes3 articles

• AI-Driven Threats Accelerate: Agentic Attacks, Model

• UK Government Threatens Tech Bosses With Jail Time Over AI Nudification Tools

• International AI Safety Report 2026 Warns of AI-Driven

View all
#Vishing3 articles

• ShinyHunters Dumps Harvard and UPenn Data After Ransom

• New BlackFile Extortion Group Linked to Surge of Vishing Attacks

• Deepfake Voice Attacks Are Outpacing Defenses: What Security Leaders Should Know

View all
#Surveillance3 articles

• Persona Source Code Leak Exposes Hidden Biometric

• Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data

• ZeroDayRAT Mobile Spyware Enables Total Surveillance of iOS

View all
#Developer Tools3 articles

• Cline CLI Supply Chain Attack Installs Unauthorized

• Microsoft Suspends Dev Accounts for High-Profile Open Source Projects

• Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks

View all
#Europe3 articles

• APT28 Operation MacroMaze: Russia-Linked Hackers Hit

• Italian Regulator Fines Financial Giant $36 Million for Data Protection Failures

• ClickFix Campaign Targets European Hotels with Fake

View all
#Israel3 articles

• Iran Plunged Into Digital Darkness: Internet Drops to 4% in

• Operation Epic Fury Triggers Unprecedented Cyber Escalation

• Researchers Detect ZionSiphon Malware Targeting Israeli Water and Desalination OT Systems

View all
#BlackCat3 articles

• Former Cybersecurity Incident Responders Plead Guilty to

• Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks Against U.S. Companies

• US Ransomware Negotiators Get 4 Years in Prison Over BlackCat Attacks

View all
#Cloudflare3 articles

• Cloudflare 2026 Threat Report: 230 Billion Daily Threats as

• Cloudflare BGP Routing Error Cascades Across AWS, X, and

• Record-Breaking 31.4 Tbps DDoS Attack: Aisuru Botnet Sets

View all
#Spain3 articles

• Spanish-Ukrainian Police Bust Gambling Ring That Exploited

• Spain Dismantles Major $4.7M Manga Piracy Platform, Arrests Four

• Zara Data Breach Exposed Personal Information of 197,000 People

View all
#PHI3 articles

• Cognizant TriZetto Breach Exposes Health Data of 3.4

• Hims & Hers Breach Exposes the Most Sensitive Kinds of Patient PHI

• 716,000 Impacted by OpenLoop Health Data Breach

View all
#CRM3 articles

• ShinyHunters Claims Mass Data Theft From 400 Firms via

• CVE-2026-31845: Rukovoditel CRM Reflected XSS in Zadarma API (CVSS 9.3)

• CVE-2026-33656: EspoCRM Formula Engine Attachment sourceId Overwrite (CVSS 9.1)

View all
#GlassWorm3 articles

• GlassWorm Escalates: 72 Malicious Open VSX Extensions Use

• GlassWorm ForceMemo: Stolen GitHub Tokens Used to Poison Hundreds of Python Repos

• Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents

View all
#Data Exfiltration3 articles

• OpenClaw AI Agent Flaws Enable Prompt Injection, 1-Click

• AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE

• Trigona Ransomware Deploys Custom CLI Exfiltration Tool in Active Attacks

View all
#SaaS Security3 articles

• Shadow AI Is Everywhere. Here's How to Find and Secure It.

• Shadow AI in SaaS: How Hidden AI Agents Are Enabling Catastrophic Breaches

• Video Service Vimeo Confirms Anodot Breach Exposed User Data

View all
#CVE-2026-24413 articles

• Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents

• Google Patches First Chrome Zero-Day of 2026: CVE-2026-2441

• Google Chrome Use-After-Free Zero-Day Under Active

View all
#Trivy3 articles

• Trivy Security Scanner GitHub Actions Breached — 75 Tags Hijacked to Steal CI/CD Secrets

• Cisco Source Code Stolen in Trivy-Linked Dev Environment Breach

• European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

View all
#Streaming3 articles

• Crunchyroll Probes Breach After Hacker Claims to Steal 6.8M Users' Data

• Anti-Piracy Coalition Takes Down AnimePlay App with 5 Million Users

• IPTV Stream Validation and M3U Playlist Management with

View all
#Unauthorized Access3 articles

• Mazda Discloses Security Breach Exposing Employee and Partner Data

• CVE-2026-25199: Apache CloudStack Proxmox Extension Allows Unauthorized Cross-Tenant Instance Access

• CVE-2026-6886: Borg SPM 2007 Authentication Bypass Allows Login as Any User

View all
#Worm3 articles

• Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

• Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI and More

• Worm Redux: Fresh Mini Shai-Hulud Infections Bite npm Supply Chain

View all
#DarkSword3 articles

• DarkSword GitHub Leak Threatens to Turn Elite iPhone Hacking Into a Tool for the Masses

• TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

• Apple Expands iOS 18 Updates to More iPhones to Block DarkSword Attacks

View all
#Magento3 articles

• PolyShell Attacks Target 56% of All Vulnerable Magento Stores

• WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

• Hackers Use Pixel-Large SVG Trick to Hide Credit Card Stealer on Magento Stores

View all
#Steganography3 articles

• Backdoored Telnyx PyPI Package Pushes Malware Hidden in WAV Audio

• TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

• APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

View all
#CVE-2025-535213 articles

• CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

• F5 BIG-IP Vulnerability Reclassified from DoS to RCE Under Active Exploitation

• Over 14,000 F5 BIG-IP APM Instances Still Exposed to RCE Attacks

View all
#Nation State3 articles

• Iran-Linked Hackers Breach FBI Director's Personal Email, Hit Stryker With Wiper Attack

• Researchers Uncover Pre-Stuxnet 'fast16' Malware Targeting Engineering Software

• US Treasury Department Confirms Network Breach by

View all
#FCC3 articles

• FCC Bans Import of Foreign-Made Consumer Routers Over Supply Chain Security Risks

• FCC Proposes $4.5 Million Fine for Voice Provider Hosting Suspicious Foreign Robocalls

• FCC Proposes New Rule to Further Crack Down on Illegal Robocalls

View all
#Plugin Security3 articles

• File Read Flaw in Smart Slider Plugin Impacts 500K WordPress Sites

• CVE-2026-3629: WordPress User Import Plugin Privilege Escalation

• CVE-2026-6443: WordPress Accordion Plugin Backdoor in Version 1.4.6

View all
#Regulation3 articles

• Italian Regulator Fines Financial Giant $36 Million for Data Protection Failures

• European Commission Accuses Meta of Breaching Child Safety Rules

• Louis Vuitton, Dior, and Tiffany Fined $25 Million Over

View all
#UNC10693 articles

• Axios NPM Package Breached in North Korean Supply Chain Attack

• Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

• North Korean Hackers Use Fake Zoom Meeting to Target Crypto

View all
#TrueConf3 articles

• Hackers Exploit TrueConf Zero-Day to Push Malicious Software Updates

• PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks

• CVE-2026-3502: TrueConf Client Update Integrity Bypass Enables Arbitrary Code Execution

View all
#Crypto Heist3 articles

• Drift Crypto Platform Confirms $280 Million Stolen as Researchers Point to North Korea

• Drift Loses $280 Million as Hackers Seize Security Council Powers

• KelpDAO Suffers $290 Million Heist Tied to Lazarus Hackers

View all
#Drift Protocol3 articles

• Drift Crypto Platform Confirms $280 Million Stolen as Researchers Point to North Korea

• Drift Loses $280 Million as Hackers Seize Security Council Powers

• 'It Reads Like a Spy Novel': $280M Drift Theft Linked to North Korean Fake Companies

View all
#Lazarus Group3 articles

• Drift Crypto Platform Confirms $280 Million Stolen as Researchers Point to North Korea

• KelpDAO Suffers $290 Million Heist Tied to Lazarus Hackers

• Crypto Infrastructure Company Blames $290 Million Theft on North Korean Hackers

View all
#Patient Data3 articles

• 250,000 Affected by Data Breach at Nacogdoches Memorial Hospital

• Medtronic Confirms Breach After Hackers Claim 9 Million Records Theft

• Medtronic Hack Confirmed After ShinyHunters Threatens Data Leak

View all
#Germany3 articles

• Die Linke German Political Party Confirms Data Stolen by Qilin Ransomware

• BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks

• Police Shut Down Reboot of Crimenetwork Marketplace, Arrest Admin

View all
#Supply Chain Attack3 articles

• Axios npm Hack Used Fake Teams Error Fix to Hijack Maintainer Account

• Russian APT 'ChainReaver' Hijacks 50 GitHub Accounts and

• Supply Chain Attack Discovered in Popular NPM Packages

View all
#Zendesk3 articles

• Hims & Hers Warns of Data Breach After Zendesk Support Ticket Breach

• 300,000+ Passport Numbers Leaked in December Eurail Data Breach

• Hims & Hers Breach Exposes the Most Sensitive Kinds of Patient PHI

View all
#REvil3 articles

• Germany Doxes "UNKN," Head of RU Ransomware Gangs REvil, GandCrab

• BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks

• German Authorities Identify REvil and GandCrab Ransomware Bosses Behind $40M in Damages

View all
#GandCrab3 articles

• Germany Doxes "UNKN," Head of RU Ransomware Gangs REvil, GandCrab

• BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks

• German Authorities Identify REvil and GandCrab Ransomware Bosses Behind $40M in Damages

View all
#US Government3 articles

• Trump Budget Proposal Would Cut Hundreds of Millions More from CISA

• Commerce Setting Up New AI Export Regime to Push Adoption of 'American AI' Abroad

• US Treasury Department Confirms Network Breach by

View all
#Unpatched3 articles

• Disgruntled Researcher Leaks BlueHammer Windows Zero-Day Exploit

• Windows BitLocker Zero-Day Gives Access to Protected Drives, PoC Released

• Windows Zero-Days Expose BitLocker Bypasses and CTFMON Privilege Escalation

View all
#Storm-11753 articles

• Microsoft Links Storm-1175 to Medusa Ransomware Zero-Day Campaign

• China-Linked Storm-1175 Chains Zero-Days for High-Velocity Medusa Ransomware Attacks

• Storm-1175 Deploys Medusa Ransomware at 'High Velocity'

View all
#IAM3 articles

• The Hidden Cost of Recurring Credential Incidents

• Gartner Identifies the Top 6 Cybersecurity Trends Reshaping

• Microsoft Entra PIM: Configuring Just-in-Time Admin Access

View all
#Risk Management3 articles

• The Hidden Cost of Recurring Credential Incidents

• One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk

• Security Baseline Hardening: CIS Controls Implementation

View all
#Acrobat Reader3 articles

• Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

• Hackers Exploiting Acrobat Reader Zero-Day Flaw Since December

• CVE-2026-34621: Adobe Acrobat Reader Prototype Pollution RCE (CVSS 9.6)

View all
#PDF3 articles

• Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

• Hackers Exploiting Acrobat Reader Zero-Day Flaw Since December

• Adobe Patches Actively Exploited Zero-Day That Lingered for Months

View all
#Patch Management3 articles

• 1 Billion CISA KEV Records Reveal Human-Scale Security Has Hit Its Limit

• 73 Seconds to Breach, 24 Hours to Patch: The Case for Autonomous Validation

• NinjaOne RMM Platform Setup

View all
#Microsoft Teams3 articles

• Microsoft Teams Right-Click Paste Broken by Edge Update Bug

• Threat Actor Uses Microsoft Teams to Deploy New 'Snow' Malware

• KongTuke Hackers Now Use Microsoft Teams for Corporate Breaches

View all
#Business Continuity3 articles

• The Backup Myth That Is Putting Businesses at Risk

• BridgePay Payment Gateway Knocked Offline by Ransomware

• Backup & Disaster Recovery Checklist

View all
#RMM3 articles

• Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk

• NinjaOne Scripting: PowerShell Automation Library

• NinjaOne RMM Platform Setup

View all
#VMware3 articles

• Kyber Ransomware Gang Uses Post-Quantum Encryption to Target Windows and ESXi

• CISA Adds Actively Exploited VMware Aria Operations RCE

• China-Linked Hackers Exploit VMware ESXi Zero-Days to

View all
#ADT3 articles

• ADT Confirms Data Breach After ShinyHunters Leak Threat

• ADT Says Customer Data Stolen in Cyber Intrusion

• Home Security Giant ADT Data Breach Affects 5.5 Million People

View all
#Retail3 articles

• New BlackFile Extortion Group Linked to Surge of Vishing Attacks

• Zara Data Breach Exposed Personal Information of 197,000 People

• ShinyHunters Dumps 600K+ Canada Goose Customer Records on

View all
#Bitwarden3 articles

• Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

• ETH Zurich Finds 25 Password Recovery Attacks Against

• Self-Hosted Password Manager with Vaultwarden

View all
#Copilot3 articles

• Microsoft Now Lets Admins Uninstall Copilot on Enterprise Devices

• Microsoft Announces Major Security Features for Copilot

• UK Brings AI Chatbots Under Online Safety Act — Fines Up to

View all
#Crypto Fraud3 articles

• Money Launderer Linked to $230M Crypto Heist Gets 70 Months in Prison

• European Police Dismantles €50 Million Crypto Investment Fraud Ring

• US & China Partner on Scam Center Takedown in Dubai

View all
#ConnectWise3 articles

• CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

• CVE-2024-1708: ConnectWise ScreenConnect Path Traversal Vulnerability

• CVE-2026-3564: ConnectWise ScreenConnect Auth Bypass via Server Cryptographic Material

View all
#OT Security3 articles

• EnOcean SmartServer Flaws Expose Buildings to Remote Hacking

• Cyberattacks on Critical Infrastructure Double in Q1 2026

• CVE-2017-20237: Hirschmann HiVision Auth Bypass Enables Unauthenticated RCE

View all
#Instructure3 articles

• Edu-Tech Firm Instructure Discloses Cyber Incident, Probes Impact on Canvas LMS

• Multiple Universities Forced to Reschedule Final Exams After Canvas Cyber Incident

• Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65 TB Canvas Leak

View all
#Trellix3 articles

• Trellix Confirms Source Code Breach With Unauthorized Repository Access

• Trellix Source Code Breach Claimed by RansomHouse Hackers

• Trellix Source Code Breach Highlights Growing Supply Chain Threats

View all
#CCPA3 articles

• GM to Pay Over $12 Million in Largest-Ever CCPA Fine Over Driver Data

• GM to Pay Over $12 Million in California Privacy Settlement Involving Driver Data

• GM Agrees to $12.75M California Settlement Over Sale of Drivers' Data

View all
#2FA3 articles

• Google Detects First AI-Generated Zero-Day Exploit in the Wild

• Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation

• Malicious Chrome Extension 'CL Suite' Steals Meta Business

View all
#UK3 articles

• UK Water Utility Fined £963,900 After Cl0p Lurked Undetected for Nearly Two Years

• UK Fines Water Supplier $1.3M for Exposing Data of 664K Customers

• UK Brings AI Chatbots Under Online Safety Act — Fines Up to

View all
#Windows Security3 articles

• Why Changing Passwords Doesn't End an Active Directory Breach

• Configuring Windows LAPS: Automated Local Admin Password

• Group Policy Security Hardening for Windows Environments

View all
#Critical Vulnerability3 articles

• Fortinet Warns of Critical RCE Flaws in FortiSandbox and FortiAuthenticator

• Cisco Patches Critical Webex Vulnerability Allowing Remote

• CVE-2026-42569: phpVMS Critical Unauthenticated Legacy Import Access

View all
#Security Update3 articles

• Microsoft May 2026 Patch Tuesday Fixes 120 Flaws, No Zero-Days

• Apple Releases Critical Security Updates Across All

• Google Chrome Critical Update Patches High-Severity Code

View all
#Web Server3 articles

• 18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE

• CVE-2018-25169: Denial of Service Vulnerability Catalogued

• CVE-2026-35392: Critical Path Traversal in goshs Go HTTP Server

View all
#PraisonAI3 articles

• PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure

• CVE-2026-39888: PraisonAI Sandbox Escape Enables Remote Code Execution

• CVE-2026-39890: PraisonAI YAML Injection Achieves Remote Code Execution

View all
#Outage3 articles

• Cloudflare BGP Routing Error Cascades Across AWS, X, and

• Microsoft Hit by Back-to-Back Outages: M365 Admin Center

• YouTube Suffers Major Global Outage Affecting 300,000+ Users

View all
#Statistics3 articles

• 2026 Vulnerability Forecast: Up to 117,000 CVEs Expected

• Ransomware Costs Projected to Hit $74 Billion in 2026, 30%

• Ransomware Attacks Surge 49% Year-Over-Year: BlackFog 2026

View all
#Google TAG3 articles

• Russian-Linked CANFAIL Malware Targets Ukrainian Defense

• Apple Patches Actively Exploited iOS Zero-Day Used in

• Apple Patches Actively Exploited Zero-Day in dyld

View all
#CVE-2026-17313 articles

• BeyondTrust Remote Support and PRA Critical RCE Under

• BeyondTrust Remote Support Pre-Authentication RCE Under

• BeyondTrust Zero-Day Allows Unauthenticated Command

View all
#Stored XSS3 articles

• CVE-2015-20115: RealtyScript 4.0.2 Stored XSS via File Upload in Admin Panel

• CVE-2026-29192: ZITADEL Stored XSS via Default Redirect URI

• Hackage Haskell Repository Stored XSS Enables Credential Theft (CVE-2026-40470)

View all
#ZKTeco3 articles

• CVE-2016-20024: ZKTeco ZKTime.Net Insecure File Permissions Allow Privilege Escalation

• CVE-2016-20026: ZKTeco ZKBioSecurity 3.0 Hardcoded Tomcat Credentials Allow Unauthenticated RCE

• CVE-2016-20030: ZKTeco ZKBioSecurity 3.0 Username Enumeration via Login Endpoint

View all
#Stack Overflow3 articles

• CVE-2016-20049: JAD Java Decompiler Stack-Based Buffer Overflow Enables Arbitrary Code Execution

• CVE-2017-20225: TiEmu TI Calculator Emulator Stack Buffer Overflow Allows Arbitrary Code Execution via Command-Line Arguments

• CVE-2017-20230: Perl Storable Stack Overflow — CVSS 10.0

View all
#CWE-1213 articles

• CVE-2016-20049: JAD Java Decompiler Stack-Based Buffer Overflow Enables Arbitrary Code Execution

• CVE-2017-20225: TiEmu TI Calculator Emulator Stack Buffer Overflow Allows Arbitrary Code Execution via Command-Line Arguments

• CVE-2026-3038: FreeBSD Kernel Stack Buffer Overflow in

View all
#Denial of Service3 articles

• CVE-2018-25169: Denial of Service Vulnerability Catalogued

• CVE-2026-26477: DokuWiki media_upload_xhr() Denial of Service

• CVE-2026-35547: FreeBSD libnv Heap Buffer Overflow Allows Out-of-Bounds Write

View all
#Database Security3 articles

• CVE-2018-25272: ELBA5 5.8.0 RCE via Default Database Credentials and xp_cmdshell

• CVE-2026-2993: SQL Injection in AIWU AI Chatbot WordPress Plugin

• CVE-2026-34260 — SAP S/4HANA SQL Injection via ABAP Enterprise Search

View all
#Plugin3 articles

• CVE-2025-12886: Oxygen Theme SSRF Allows Unauthenticated Web Requests

• CVE-2026-6518: WordPress CMP Plugin Arbitrary File Upload and Remote Code Execution (CVSS 8.8)

• WordPress Plugin Vulnerability (CVSS 10.0) Under Active

View all
#MLflow3 articles

• CVE-2025-15036: MLflow Path Traversal in Archive Extraction

• CVE-2025-15379: MLflow Command Injection in Model Serving (CVSS 10.0)

• CVE-2026-0596: MLflow Command Injection via Unsanitized model_uri (CVSS 9.6)

View all
#JWT3 articles

• CVE-2025-57735: Apache Airflow JWT Token Not Invalidated on Logout

• CVE-2026-1114: lollms JWT Weak Secret Key Allows Admin Takeover

• CVE-2026-31946: Critical JWT Signature Verification Bypass in OpenOlat E-Learning Platform

View all
#CWE-943 articles

• CVE-2026-1540: Spam Protect CF7 WordPress Plugin PHP Log RCE

• CVE-2026-22679: Weaver E-cology 10.0 Unauthenticated Remote Code Execution

• CVE-2026-27876 — Grafana Critical RCE via SQL Expression Chain

View all
#LibRaw3 articles

• CVE-2026-20889: LibRaw x3f_thumb_loader Heap Buffer Overflow (CVSS 9.8)

• CVE-2026-20911: LibRaw HuffTable::initval Heap Buffer Overflow (CVSS 9.8)

• CVE-2026-21413: LibRaw lossless_jpeg_load_raw Heap Buffer Overflow (CVSS 9.8)

View all
#RAW Image3 articles

• CVE-2026-20889: LibRaw x3f_thumb_loader Heap Buffer Overflow (CVSS 9.8)

• CVE-2026-20911: LibRaw HuffTable::initval Heap Buffer Overflow (CVSS 9.8)

• CVE-2026-21413: LibRaw lossless_jpeg_load_raw Heap Buffer Overflow (CVSS 9.8)

View all
#Domain User3 articles

• Critical RCE in Veeam Backup & Replication — Authenticated

• Critical RCE in Veeam Backup & Replication — Authenticated

• Critical RCE in Veeam Backup & Replication — Third Domain

View all
#CWE-2843 articles

• CVE-2026-21994: Critical Unauthenticated RCE in Oracle Edge Cloud Infrastructure Designer v0.3.0

• CVE-2026-25199: Apache CloudStack Proxmox Extension Allows Unauthorized Cross-Tenant Instance Access

• CVE-2026-34162: FastGPT Unauthenticated HTTP Proxy Enables Full SSRF (CVSS 10.0)

View all
#Spinnaker3 articles

• CVE-2026-25534: Spinnaker SSRF via URL Validation Bypass Using Java Underscore Parsing Bug

• CVE-2026-32604: Spinnaker Clouddriver Remote Code Execution (CVSS 9.9)

• CVE-2026-32613: Spinnaker Echo Spring Expression Language Injection (CVSS 9.9)

View all
#CWE-2693 articles

• CVE-2026-25770: Wazuh Privilege Escalation to Root via Cluster Protocol File Write

• CVE-2026-32922: OpenClaw Privilege Escalation via Token Scope Bypass

• CVE-2026-3629: WordPress User Import Plugin Privilege Escalation

View all
#DoS3 articles

• CVE-2026-27651 — NGINX ngx_mail_auth_http_module NULL Pointer Dereference

• CVE-2026-28872: Apple iOS & iPadOS Remote Denial-of-Service via Resource Exhaustion

• CVE-2026-41309: OSSN Resource Exhaustion via Crafted Pixel Bomb Image Upload

View all
#Grafana3 articles

• CVE-2026-27876 — Grafana Critical RCE via SQL Expression Chain

• Build a Production Monitoring Stack with Prometheus and Grafana

• Build a Centralized Log Management System with Loki and

View all
#Unauthenticated Access3 articles

• CVE-2026-28766: Gardyn Smart Garden API Exposes All User Accounts Without Authentication

• CVE-2026-34162: FastGPT Unauthenticated HTTP Proxy Enables Full SSRF (CVSS 10.0)

• CVE-2026-42569: phpVMS Critical Unauthenticated Legacy Import Access

View all
#ZITADEL3 articles

• CVE-2026-29067: ZITADEL Password Reset Poisoned by

• ZITADEL Critical XSS in SAML Endpoint Enables 1-Click

• CVE-2026-29192: ZITADEL Stored XSS via Default Redirect URI

View all
#Identity Provider3 articles

• CVE-2026-29067: ZITADEL Password Reset Poisoned by

• ZITADEL Critical XSS in SAML Endpoint Enables 1-Click

• CVE-2026-29192: ZITADEL Stored XSS via Default Redirect URI

View all
#PKI3 articles

• CVE-2026-30836: Step CA SCEP UpdateReq Allows Unauthenticated Certificate Issuance (CVSS 10)

• HashiCorp Vault: Centralized Secrets Management for Modern Infrastructure

• HashiCorp Vault: Secrets Management for Your Homelab and

View all
#Network Device3 articles

• CVE-2026-31027: TOTOlink A3600R Buffer Overflow in setAppEasyWizardConfig

• CVE-2026-32956: Critical Heap Buffer Overflow in silex SD-330AC and AMC Manager

• CVE-2026-7136: Totolink A8000RU OS Command Injection via CGI Handler wanIdx Argument (CVSS 9.8)

View all
#Canonical3 articles

• CVE-2026-34177: Canonical LXD Incomplete VM Restriction Denylist

• CVE-2026-34178: Canonical LXD Backup Import Path Restriction Bypass

• CVE-2026-5412: Juju Controller Facade Allows Low-Privilege Cloud Credential Theft

View all
#Remote Access3 articles

• CVE-2026-3564: ConnectWise ScreenConnect Auth Bypass via Server Cryptographic Material

• FortiGate SSL VPN Setup: Secure Remote Access Configuration

• WireGuard VPN Setup: Secure Remote Access

View all
#CVSS Critical3 articles

• CVE-2026-37431: Beauty Parlour Management System SQL Injection (CVSS 9.8)

• CVE-2026-41583: ZEBRA Zcash Node Consensus Rule Bypass (CVSS 9.1)

• CVE-2026-41588: RELATE Courseware Timing Attack in Authentication (CVSS 9.0)

View all
#Image Processing3 articles

• CVE-2026-40492: SAIL XWD Codec Heap Buffer Overflow (CVSS 9.8)

• CVE-2026-40493: SAIL PSD Codec Buffer Overflow via channels * depth Miscalculation (CVSS 9.8)

• CVE-2026-40494: SAIL TGA Codec RLE Decoder Asymmetric Bounds Check (CVSS 9.8)

View all
#SAIL3 articles

• CVE-2026-40492: SAIL XWD Codec Heap Buffer Overflow (CVSS 9.8)

• CVE-2026-40493: SAIL PSD Codec Buffer Overflow via channels * depth Miscalculation (CVSS 9.8)

• CVE-2026-40494: SAIL TGA Codec RLE Decoder Asymmetric Bounds Check (CVSS 9.8)

View all
#Server Administration3 articles

• CVE-2026-41228 — Froxlor Path Traversal via def_language Parameter

• CVE-2026-41229 — Froxlor PHP Code Injection via MySQL Server Settings

• SSH Hardening Best Practices

View all
#Apache MINA3 articles

• CVE-2026-41635: Apache MINA Class Allowlist Bypass Enables Arbitrary Code Execution (CVSS 9.8)

• Apache MINA Incomplete Deserialization Patch Leaves 2.1.X and 2.2.X Branches Vulnerable

• CVE-2026-42779: Critical Apache MINA Deserialization Class Bypass

View all
#GitOps3 articles

• CVE-2026-43824: Argo CD ServerSideDiff Exposes Cleartext Kubernetes Secrets

• Kubernetes Secrets Management with External Secrets Operator

• Kubernetes Homelab Cluster with K3s

View all
#End of Life Software3 articles

• CVE-2026-6885: Borg SPM 2007 Arbitrary File Upload Enables Remote Code Execution

• CVE-2026-6886: Borg SPM 2007 Authentication Bypass Allows Login as Any User

• CVE-2026-6887: Borg SPM 2007 SQL Injection Exposes Full Database Access Without Authentication

View all
#FortiOS3 articles

• Fortinet FortiOS SSL VPN Heap Overflow Enables Pre-Auth RCE

• FortiGate Performance Optimization: Tuning Guide for

• FortiGate Security Hardening: Best Practices for Enterprise

View all
#Containers3 articles

• Container Security Scanning with Trivy: Images, IaC, and CI/CD

• Docker Security Fundamentals: Protecting Your Containers

• Docker Windows Containers: Native Engine Setup Guide

View all
#IDS3 articles

• Suricata IDS/IPS Deployment: From Install to Active Threat Detection

• Network Monitoring Basics: Detect Threats Before They Spread

• Network Traffic Analysis with Zeek and Suricata

View all
#XDR3 articles

• How to Deploy Wazuh SIEM/XDR for Unified Security Monitoring

• Microsoft Defender for Endpoint: Configuration and

• SentinelOne Complete Deployment Guide

View all
#Conditional Access3 articles

• Conditional Access Policies: Zero Trust with Entra ID

• Microsoft 365 Security and Compliance Configuration Guide

• Microsoft 365 Tenant Security Checklist

View all
#Threat Hunting3 articles

• SentinelOne Threat Hunting with Deep Visibility

• Velociraptor DFIR: Endpoint Forensics and Incident Response at Scale

• Network Traffic Analysis with Zeek and Suricata

View all

All Tags

#Vulnerability(189)
#Data Breach(133)
#CVE(132)
#RCE(121)
#Supply Chain(111)
#BleepingComputer(100)
#Ransomware(95)
#Zero-Day(86)
#Cybercrime(78)
#NVD(61)
#Security(61)
#Threat Intelligence(60)
#Microsoft(56)
#The Hacker News(55)
#Malware(54)
#Critical(52)
#Remote Code Execution(47)
#Cloud Security(44)
#AI Security(42)
#Security Updates(42)
#Windows(42)
#SQL Injection(40)
#Privilege Escalation(38)
#automation(38)
#Healthcare(35)
#APT(35)
#sentinelone(35)
#Nation-State(34)
#edr(34)
#Critical Infrastructure(32)
#AI(32)
#Russia(30)
#CISA KEV(30)
#PHP(29)
#Privacy(28)
#Authentication Bypass(28)
#deployment(27)
#detection-rules(27)
#Google(26)
#Phishing(26)
#npm(26)
#Web Security(26)
#WordPress(26)
#threat-hunting(26)
#China(25)
#Social Engineering(25)
#policy(25)
#Credential Theft(25)
#Law Enforcement(25)
#Patch Tuesday(25)
#api(25)
#Espionage(24)
#firewall(24)
#CISA(22)
#Cryptocurrency(22)
#Open Source(21)
#Linux(20)
#Unauthenticated(20)
#CWE-89(20)
#Command Injection(20)
#Fortinet(19)
#North Korea(19)
#Active Exploitation(19)
#incident-response(19)
#ShinyHunters(18)
#IoT(18)
#Router(17)
#Government(16)
#Python(16)
#AWS(15)
#Network Security(15)
#Cisco(15)
#Docker(15)
#TeamPCP(15)
#Azure(15)
#DevSecOps(14)
#PowerShell(14)
#forensics(14)
#DOJ(13)
#Incident Response(13)
#SecurityWeek(13)
#mitre-attack(13)
#FBI(12)
#ClickFix(12)
#Infostealer(12)
#DeFi(12)
#Compliance(12)
#File Upload(12)
#Android(11)
#Anthropic(11)
#Botnet(11)
#iOS(11)
#Kubernetes(11)
#macOS(11)
#Code Injection(11)
#Totolink(11)
#CI/CD(10)
#GitHub(10)
#Apple(10)
#Chrome(10)
#Deserialization(10)
#The Record(10)
#Web Application(10)
#Path Traversal(10)
#Homelab(10)
#Education(9)
#Mobile Security(9)
#DDoS(9)
#Dark Web(9)
#FortiGate(9)
#Iran(9)
#Ukraine(9)
#Developer Security(9)
#Vercel(9)
#SSRF(9)
#XSS(9)
#Buffer Overflow(9)
#CWE-78(9)
#SIEM(9)
#OS Command Injection(9)
#OpenClaw(8)
#DevOps(8)
#KEV(8)
#GitHub Actions(8)
#Identity Security(8)
#Fraud(8)
#Next.js(8)
#Account Takeover(8)
#Zero Trust(8)
#Ivanti(8)
#Memory Corruption(8)
#VPN(8)
#code-projects(8)
#Hardening(8)
#CIS Benchmarks(8)
#Telecom(7)
#Cybersecurity(7)
#OpenAI(7)
#APT28(7)
#Enterprise Security(7)
#Patch(7)
#Blockchain(7)
#France(7)
#Automotive(7)
#PyPI(7)
#Patch Now(7)
#Claude(7)
#Container Security(7)
#Microsoft 365(7)
#Endpoint Security(7)
#Extortion(7)
#Entra ID(7)
#authentication(7)
#SOC(7)
#DNS(7)
#CVSS 9.8(7)
#Authorization Bypass(7)
#Networking(7)
#EU(6)
#Insider Threat(6)
#Deepfake(6)
#PII(6)
#Enterprise(6)
#Identity Theft(6)
#Infrastructure(6)
#HIPAA(6)
#Third-Party Risk(6)
#Vulnerability Management(6)
#n8n(6)
#Actively Exploited(6)
#Workflow Automation(6)
#Veeam(6)
#Backup & Replication(6)
#Enterprise Backup(6)
#Weekly Recap(6)
#OAuth(6)
#General(6)
#LiteLLM(6)
#Data Protection(6)
#Axios(6)
#Netherlands(6)
#Browser Security(6)
#IoT Security(6)
#Artificial Intelligence(6)
#Backup(6)
#cPanel(6)
#Web Hosting(6)
#SAP(6)
#EPMM(6)
#Active Directory(6)
#Java(6)
#Perl(6)
#CVSS 10(6)
#Heap Buffer Overflow(6)
#Plugin Vulnerability(6)
#Traefik(6)
#Threat Detection(6)
#Monitoring(6)
#Agentic AI(5)
#Geopolitics(5)
#JavaScript(5)
#Windows 11(5)
#ChatGPT(5)
#Dark Reading(5)
#BEC(5)
#E-Commerce(5)
#F5(5)
#BIG-IP(5)
#RAT(5)
#Claude Code(5)
#Cryptography(5)
#Backdoor(5)
#Use-After-Free(5)
#Open Source Security(5)
#Security Research(5)
#Apache ActiveMQ(5)
#Virtualization(5)
#Disaster Recovery(5)
#NGINX(5)
#MCP(5)
#Windows Server(5)
#D-Link(5)
#Email Security(5)
#Firefox(5)
#Mozilla(5)
#ICS(5)
#BitLocker(5)
#Heap Overflow(5)
#TLS(5)
#SD-WAN(5)
#Information Disclosure(5)
#High(5)
#API Security(5)
#Financial Crime(4)
#Gemini(4)
#Hacktivism(4)
#Telecommunications(4)
#Europol(4)
#RaaS(4)
#Spyware(4)
#Vulnerability Research(4)
#Money Laundering(4)
#Federal(4)
#Sandbox Escape(4)
#Solana(4)
#Prompt Injection(4)
#Samsung(4)
#Regulatory(4)
#Funding(4)
#Oracle(4)
#Qilin(4)
#Citrix(4)
#NetScaler(4)
#CVE-2026-3055(4)
#AI Regulation(4)
#GDPR(4)
#Encryption(4)
#European Commission(4)
#Source Code(4)
#Post-Quantum(4)
#Wiper(4)
#Physical Security(4)
#Pre-Auth(4)
#Penetration Testing(4)
#KrebsOnSecurity(4)
#CyberScoop(4)
#Adobe(4)
#Weekly Roundup(4)
#SharePoint(4)
#NIST(4)
#BeyondTrust(4)
#Checkmarx(4)
#Identity(4)
#Sentencing(4)
#MSP(4)
#Canvas(4)
#Security Operations(4)
#Manufacturing(4)
#Google Chrome(4)
#Database(4)
#CMS(4)
#Dell(4)
#Unauthenticated RCE(4)
#Access Control(4)
#Wazuh(4)
#SiYuan(4)
#Knowledge Management(4)
#itsourcecode(4)
#SourceCodester(4)
#Thunderbird(4)
#Memory Safety(4)
#Intune(4)
#device-control(4)
#Trends(3)
#Lapsus$(3)
#Deepfakes(3)
#Vishing(3)
#Surveillance(3)
#Developer Tools(3)
#Europe(3)
#Israel(3)
#BlackCat(3)
#Cloudflare(3)
#Spain(3)
#PHI(3)
#CRM(3)
#GlassWorm(3)
#Data Exfiltration(3)
#SaaS Security(3)
#CVE-2026-2441(3)
#Trivy(3)
#Streaming(3)
#Unauthorized Access(3)
#Worm(3)
#DarkSword(3)
#Magento(3)
#Steganography(3)
#CVE-2025-53521(3)
#Nation State(3)
#FCC(3)
#Plugin Security(3)
#Regulation(3)
#UNC1069(3)
#TrueConf(3)
#Crypto Heist(3)
#Drift Protocol(3)
#Lazarus Group(3)
#Patient Data(3)
#Germany(3)
#Supply Chain Attack(3)
#Zendesk(3)
#REvil(3)
#GandCrab(3)
#US Government(3)
#Unpatched(3)
#Storm-1175(3)
#IAM(3)
#Risk Management(3)
#Acrobat Reader(3)
#PDF(3)
#Patch Management(3)
#Microsoft Teams(3)
#Business Continuity(3)
#RMM(3)
#VMware(3)
#ADT(3)
#Retail(3)
#Bitwarden(3)
#Copilot(3)
#Crypto Fraud(3)
#ConnectWise(3)
#OT Security(3)
#Instructure(3)
#Trellix(3)
#CCPA(3)
#2FA(3)
#UK(3)
#Windows Security(3)
#Critical Vulnerability(3)
#Security Update(3)
#Web Server(3)
#PraisonAI(3)
#Outage(3)
#Statistics(3)
#Google TAG(3)
#CVE-2026-1731(3)
#Stored XSS(3)
#ZKTeco(3)
#Stack Overflow(3)
#CWE-121(3)
#Denial of Service(3)
#Database Security(3)
#Plugin(3)
#MLflow(3)
#JWT(3)
#CWE-94(3)
#LibRaw(3)
#RAW Image(3)
#Domain User(3)
#CWE-284(3)
#Spinnaker(3)
#CWE-269(3)
#DoS(3)
#Grafana(3)
#Unauthenticated Access(3)
#ZITADEL(3)
#Identity Provider(3)
#PKI(3)
#Network Device(3)
#Canonical(3)
#Remote Access(3)
#CVSS Critical(3)
#Image Processing(3)
#SAIL(3)
#Server Administration(3)
#Apache MINA(3)
#GitOps(3)
#End of Life Software(3)
#FortiOS(3)
#Containers(3)
#IDS(3)
#XDR(3)
#Conditional Access(3)
#Threat Hunting(3)