Cybersecurity News

Multi-source correlated threat intelligence, updated hourly.

61
Total Articles
17
Critical
11
High
Browse by: Categories · Entities · Severity
Vulnerability Data Breach Malware Threat Actor Policy

Critical Threats

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

Apr 17, 2026

Vulnerability
Critical

CISA warned that attackers are now exploiting a high-severity Apache ActiveMQ vulnerability, which was patched earlier this month after going undetected for 13 years. [...]

Read Article

Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw

Apr 13, 2026

Vulnerability
Critical

Adobe has released an emergency security update for Acrobat Reader to fix a vulnerability, tracked as CVE-2026-34621, that has been exploited in zero-day attacks since at least December. [...]

Read Article

Weekly Threat Roundup: 2026-04-06 to 2026-04-12

Apr 12, 2026

roundup Trending
Critical

Cybersecurity roundup for 2026-04-06 to 2026-04-12. 10 CVE advisories, 2 breach reports, 4 threat news stories.

Read Article

Hackers exploit React2Shell in automated credential theft campaign

Apr 5, 2026

Vulnerability
Critical

Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable Next.js apps. [...]

Read Article

Critical Citrix NetScaler memory flaw actively exploited in attacks

Mar 30, 2026

Vulnerability
Critical

Hackers are exploiting a critical severity vulnerability, tracked as CVE-2026-3055, in Citrix NetScaler ADC and NetScaler Gateway appliances to obtain sensitive data. [...]

Read Article

CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

Mar 28, 2026

Vulnerability
Critical

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting F5 BIG-IP Access Policy Manager (APM) to its Known Exploited Vulnerabilities (KEV) c

Read Article

LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks

Mar 26, 2026

Vulnerability
Critical

The Cybersecurity and Infrastructure Security Agency (CISA) is warning that hackers are actively exploiting a critical vulnerability identified as CVE-2026-33017, which affects the Langflow framework

Read Article

CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026

Mar 21, 2026

Vulnerability
Critical

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five security flaws impacting Apple, Craft CMS, and Laravel Livewire to its Known Exploited Vulnerabilities (KEV) catal

Read Article

CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware Attacks

Mar 19, 2026

Vulnerability
Critical

A critical Microsoft SharePoint vulnerability patched in January is now being exploited in attacks, the Cybersecurity and Infrastructure Security Agency (CISA) warned. [...]

Read Article

CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths

Mar 16, 2026

Vulnerability
Critical

CISA warned U.S. government agencies to secure their Wing FTP Server instances against an actively exploited vulnerability that may be chained in remote code execution attacks. [...]

Read Article

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

Mar 12, 2026

Vulnerability
Critical

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of ac

Read Article

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

Mar 10, 2026

Vulnerability
Critical

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. Th

Read Article

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

Mar 6, 2026

Vulnerability
Critical

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities (KEV)

Read Article

Bruteforce Scans for CrushFTP , (Tue, Mar 3rd)

Mar 3, 2026

Vulnerability
Critical

CrushFTP is a Java-based open source file transfer system. It is offered for multiple operating systems. If you run a CrushFTP instance, you may remember that the software has had some serious vulnera

Read Article

CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

Mar 3, 2026

Vulnerability
Critical

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a VMware Aria Operations vulnerability tracked as CVE-2026-22719 to its Known Exploited Vulnerabilities catalog, flagging the

Read Article

APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday

Mar 2, 2026

Vulnerability
Critical

A Florida woman was sentenced to 22 months in prison for running a massive years-long scheme to traffic thousands of stolen Microsoft Certificate of Authenticity (COA) labels. [...]

Read Article

BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

Feb 20, 2026

Vulnerability
Critical

Hackers are actively exploiting the CVE-2026-1731 vulnerability in the BeyondTrust Remote Support product, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns. [...]

Read Article

High Severity

Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign

Apr 7, 2026

Threat Actor
High

An international operation from law enforcement authorities in partnership with private companies has disrupted FrostArmada, an APT28 campaign hijacking local traffic from MikroTik and TP-Link routers

Read Article

China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware

Apr 6, 2026

Malware
High

Microsoft says that Storm-1175, a China-based financially motivated cybercriminal group known for deploying Medusa ransomware payloads, has been deploying n-day and zero-day exploits in high-velocity

Read Article

Windows 11 KB5079391 update rolls out Smart App Control improvements

Mar 27, 2026

Malware
High

​Microsoft has released the KB5079391 preview cumulative update for Windows 11 24H2 and 25H2, which includes 29 changes, such as Smart App Control and Display improvements. [...]

Read Article

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

Mar 24, 2026

Breach
High

The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular 'LiteLLM' Python package on PyPI and claiming to have stolen data from hundreds of thousands of dev

Read Article

Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks

Mar 12, 2026

Malware
High

A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware a

Read Article

Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

Mar 10, 2026

Vulnerability Trending
High

Microsoft has released the Windows 10 KB5078885 extended security update to fix the March 2026 Patch Tuesday vulnerabilities, including 2 zero-days and an issue that prevent some devices from shutting

Read Article

New 'LeakyLooker' Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

Mar 10, 2026

Malware
High

A new Android malware named BeatBanker can hijack devices and tricks users into installing it by posing as a Starlink app on websites masquerading as the official Google Play Store. [...]

Read Article

Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

Mar 10, 2026

Threat Actor
High

The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations. [...]

Read Article

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

Mar 5, 2026

Malware
High

A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge de

Read Article

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

Mar 3, 2026

Malware
High

Google Chrome will shift from a four-week to a two-week release cycle to roll out new features, bug fixes, and performance improvements more frequently. [...]

Read Article

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

Mar 3, 2026

Vulnerability
High

Google has released security updates to patch 129 Android security vulnerabilities, including an actively exploited zero-day flaw in a Qualcomm display component. [...]

Read Article

Medium Severity

Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers

Apr 9, 2026

Vulnerability
Medium

Hackers hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla, and pushed a malicious version with multiple backdoors. [...]

Read Article

New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips

Apr 6, 2026

Vulnerability
Medium

A new attack, dubbed GPUBreach, can induce Rowhammer bit-flips on GPU GDDR6 memories to escalate privileges and lead to a full system compromise. [...]

Read Article

Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms

Apr 1, 2026

Breach
Medium

Anthropic says it accidentally leaked the source code for Claude Code, which is closed source, but the company says no customer data or credentials were exposed. [...]

Read Article

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

Mar 30, 2026

Breach
Medium

Healthcare IT firm CareCloud has disclosed a data breach incident that exposed sensitive data and caused a network disruption lasting approximately eight hours. [...]

Read Article

How to Evaluate AI SOC Agents: 7 Questions Gartner Says You Should Be Asking

Mar 30, 2026

Vulnerability
Medium

AI SOC agents can reduce alert fatigue, but most teams fail to measure real outcomes. Prophet Security breaks down Gartner's questions for evaluating AI SOC agents and separating real impact from hype

Read Article

Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels

Mar 30, 2026

Vulnerability
Medium

Microsoft has pulled a buggy Windows 11 non-security preview update to investigate a known issue that triggers 0x80073712 errors during installation. [...]

Read Article

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

Mar 27, 2026

Vulnerability
Medium

TeamPCP hackers compromised the Telnyx package on the Python Package Index today, uploading malicious versions that deliver credential-stealing malware hidden inside a WAV file. [...]

Read Article

Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

Mar 25, 2026

Vulnerability
Medium

Threat actors are evading phishing detection in campaigns targeting Microsoft accounts by abusing the no-code app-building platform Bubble to generate and host malicious web apps. [...]

Read Article

PolyShell attacks target 56% of all vulnerable Magento stores

Mar 25, 2026

Vulnerability
Medium

Attacks leveraging the 'PolyShell' vulnerability in version 2 of Magento Open Source and Adobe Commerce installations are underway, targeting more than half of all vulnerable stores. [...]

Read Article

FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns

Mar 24, 2026

Vulnerability
Medium

The Federal Communications Commission has updated its Covered List to include all consumer routers made in foreign countries, banning the sale of new models in the U.S. [...]

Read Article

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware

Mar 23, 2026

Vulnerability
Medium

Microsoft is working to address an ongoing service issue that has intermittently prevented some users from accessing their cloud-based Exchange Online mailboxes via Outlook mobile and Mac desktop clie

Read Article

The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills

Mar 23, 2026

Breach
Medium

Mazda Motor Corporation (Mazda) announced that information belonging to its employees and business partners had been exposed in a security incident detected last December. [...]

Read Article

U.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware Damage

Mar 23, 2026

Vulnerability
Medium

Popular anime streaming platform Crunchyroll is investigating a breach after hackers claimed to have stolen personal information for approximately 6.8 million people. [...]

Read Article

Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams

Mar 20, 2026

Vulnerability
Medium

Oracle has released an out-of-band security update to fix a critical unauthenticated remote code execution vulnerability in Identity Manager and Web Services Manager tracked as CVE-2026-21992. [...]

Read Article

The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks

Mar 20, 2026

Vulnerability
Medium

Geopolitical tensions are driving destructive cyberattacks designed to disrupt operations, not demand ransom. CISOs must limit lateral movement and contain breaches to reduce the impact of wiper campa

Read Article

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

Mar 19, 2026

Vulnerability
Medium

A new Android malware called Perseus is checking user-curated notes to steal sensitive information, like passwords, recovery phrases, or financial data. [...]

Read Article

Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS

Mar 18, 2026

Vulnerability
Medium

Apple has released its first Background Security Improvements update to fix a WebKit flaw tracked as CVE-2026-20643 on iPhones, iPads, and Macs without requiring a full operating system upgrade. [...]

Read Article

DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover

Mar 18, 2026

Vulnerability
Medium

The Interlock ransomware gang has been exploiting a maximum severity remote code execution (RCE) vulnerability in Cisco's Secure Firewall Management Center (FMC) software in zero-day attacks since lat

Read Article

LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader

Mar 17, 2026

Vulnerability
Medium

The LeakNet ransomware gang is now using the ClickFix technique for initial access into corporate environments and deploys a malware loader based on the open-source Deno runtime for JavaScript and Typ

Read Article

GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos

Mar 16, 2026

Vulnerability
Medium

Last week's cyberattack on medical technology giant Stryker was limited to its internal Microsoft environment and remotely wiped tens of thousands of employee devices. [...]

Read Article

Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8

Mar 13, 2026

Vulnerability
Medium

Google has released emergency security updates to patch two high-severity Chrome vulnerabilities exploited in zero-day attacks. [...]

Read Article

INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime

Mar 13, 2026

Vulnerability
Medium

An international law enforcement action codenamed 'Operation Synergia III' has sinkholed tens of thousands of IP addresses and seized servers linked to cybercrime operations worldwide. [...]

Read Article

Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

Mar 13, 2026

Vulnerability
Medium

Microsoft is investigating a new issue affecting some Samsung laptops running Windows 11 after installing the February 2026 security updates, in which users lose access to their C:\ drive and are

Read Article

Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

Mar 12, 2026

Vulnerability
Medium

​Apple has released security updates to patch older iPhones and iPads against a set of vulnerabilities targeted in cyberespionage and crypto-theft attacks using the Coruna exploit kit. [...]

Read Article

Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation

Mar 12, 2026

Vulnerability
Medium

Law enforcement agencies in the U.S. and Europe along with private partners have disrupted the SocksEscort cybercrime proxy network that used only edge devices compromised via the AVRecon malware for

Read Article

Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution

Mar 12, 2026

Vulnerability
Medium

Data protection company Veeam Software has patched multiple flaws in its Backup & Replication solution, including four critical remote code execution (RCE) vulnerabilities. [...]

Read Article

How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

Mar 10, 2026

Vulnerability
Medium

For more than a year, a Russian-speaking threat actor targeted human resource (HR) departments with malware that delivers a new EDR killer named BlackSanta. [...]

Read Article

KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet

Mar 10, 2026

Vulnerability
Medium

A newly discovered botnet malware called KadNap is targeting ASUS routers and other edge networking devices to turn them into proxies for malicious traffic. [...]

Read Article

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

Mar 9, 2026

Vulnerability
Medium

Hackers are increasingly exploiting newly disclosed vulnerabilities in third-party software to gain initial access to cloud environments, with the window for attacks shrinking from weeks to just days.

Read Article

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

Mar 4, 2026

Vulnerability
Medium

A previously undocumented set of 23 iOS exploits named 'Coruna' has been deployed by multiple threat actors in targeted espionage campaigns and financially motivated attacks. [...]

Read Article

FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials

Mar 4, 2026

Breach
Medium

The FBI has seized the LeakBase cybercrime forum, a major online forum used by cybercriminals buy and sell hacking tools and stolen data. [...]

Read Article

CyberStrikeAI tool adopted by hackers for AI-powered attacks

Mar 3, 2026

Vulnerability
Medium

Researchers warn that a newly identified open-source AI security testing platform called CyberStrikeAI was used by the same threat actor behind a recent campaign that breached hundreds of Fortinet For

Read Article

Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens

Feb 16, 2026

Vulnerability
Medium

With the massive adoption of the OpenClaw agentic AI assistant, information-stealing malware has been spotted stealing files associated with the framework that contain API keys, authentication tokens,

Read Article

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.