<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Yazoul Security - Cyber News</title><description>Multi-source correlated cybersecurity intelligence. Fast, high-signal threat reporting updated hourly.</description><link>https://www.yazoul.net/news/</link><language>en-us</language><copyright>Copyright 2026 Yazoul Security - https://www.yazoul.net/news</copyright><managingEditor>contact@yazoul.net (Yazoul Security)</managingEditor><webMaster>contact@yazoul.net (Yazoul Security)</webMaster><image><url>https://www.yazoul.net/news/icon-128.png</url><title>Yazoul Security - Cyber News</title><link>https://www.yazoul.net/news</link></image><atom:link href="https://www.yazoul.net/news/rss.xml" rel="self" type="application/rss+xml" xmlns:atom="http://www.w3.org/2005/Atom"/><item><title>Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation</title><link>https://www.yazoul.net/news/news/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation</link><guid isPermaLink="true">https://www.yazoul.net/news/news/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation</guid><description>&lt;p&gt;&lt;strong&gt;CRITICAL&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;CISA warned that attackers are now exploiting a high-severity Apache ActiveMQ vulnerability, which was patched earlier this month after going undetected for 13 years. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 17 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw</title><link>https://www.yazoul.net/news/news/adobe-rolls-out-emergency-fix-for-acrobat-reader-zero-day-flaw</link><guid isPermaLink="true">https://www.yazoul.net/news/news/adobe-rolls-out-emergency-fix-for-acrobat-reader-zero-day-flaw</guid><description>&lt;p&gt;&lt;strong&gt;CRITICAL&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Adobe has released an emergency security update for Acrobat Reader to fix a vulnerability, tracked as CVE-2026-34621, that has been exploited in zero-day attacks since at least December. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 1 correlated source&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/adobe-rolls-out-emergency-fix-for-acrobat-reader-zero-day-flaw&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Weekly Threat Roundup: 2026-04-06 to 2026-04-12</title><link>https://www.yazoul.net/news/news/2026-w15-weekly-threat-roundup</link><guid isPermaLink="true">https://www.yazoul.net/news/news/2026-w15-weekly-threat-roundup</guid><description>&lt;p&gt;&lt;strong&gt;CRITICAL&lt;/strong&gt; - roundup&lt;/p&gt;
&lt;p&gt;Cybersecurity roundup for 2026-04-06 to 2026-04-12. 10 CVE advisories, 2 breach reports, 4 threat news stories.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 0 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/2026-w15-weekly-threat-roundup&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>roundup</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers</title><link>https://www.yazoul.net/news/news/backdoored-smart-slider-3-pro-update-distributed-via-compromised-nextend-servers</link><guid isPermaLink="true">https://www.yazoul.net/news/news/backdoored-smart-slider-3-pro-update-distributed-via-compromised-nextend-servers</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Hackers hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla, and pushed a malicious version with multiple backdoors. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/backdoored-smart-slider-3-pro-update-distributed-via-compromised-nextend-servers&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 09 Apr 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign</title><link>https://www.yazoul.net/news/news/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaig</link><guid isPermaLink="true">https://www.yazoul.net/news/news/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaig</guid><description>&lt;p&gt;&lt;strong&gt;HIGH&lt;/strong&gt; - threat-actor&lt;/p&gt;
&lt;p&gt;An international operation from law enforcement authorities in partnership with private companies has disrupted FrostArmada, an APT28 campaign hijacking local traffic from MikroTik and TP-Link routers&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaig&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 07 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>threat-actor</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware</title><link>https://www.yazoul.net/news/news/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware</link><guid isPermaLink="true">https://www.yazoul.net/news/news/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware</guid><description>&lt;p&gt;&lt;strong&gt;HIGH&lt;/strong&gt; - malware&lt;/p&gt;
&lt;p&gt;Microsoft says that Storm-1175, a China-based financially motivated cybercriminal group known for deploying Medusa ransomware payloads, has been deploying n-day and zero-day exploits in high-velocity &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>malware</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips</title><link>https://www.yazoul.net/news/news/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips</link><guid isPermaLink="true">https://www.yazoul.net/news/news/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;A new attack, dubbed GPUBreach, can induce Rowhammer bit-flips on GPU GDDR6 memories to escalate privileges and lead to a full system compromise. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Hackers exploit React2Shell in automated credential theft campaign</title><link>https://www.yazoul.net/news/news/hackers-exploit-react2shell-in-automated-credential-theft-campaign</link><guid isPermaLink="true">https://www.yazoul.net/news/news/hackers-exploit-react2shell-in-automated-credential-theft-campaign</guid><description>&lt;p&gt;&lt;strong&gt;CRITICAL&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable Next.js apps. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 1 correlated source&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/hackers-exploit-react2shell-in-automated-credential-theft-campaign&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Sun, 05 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms</title><link>https://www.yazoul.net/news/news/claude-code-source-leaked-via-npm-packaging-error-anthropic-confirms</link><guid isPermaLink="true">https://www.yazoul.net/news/news/claude-code-source-leaked-via-npm-packaging-error-anthropic-confirms</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - breach&lt;/p&gt;
&lt;p&gt;Anthropic says it accidentally leaked the source code for Claude Code, which is closed source, but the company says no customer data or credentials were exposed. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/claude-code-source-leaked-via-npm-packaging-error-anthropic-confirms&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate><category>medium</category><category>breach</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Critical Citrix NetScaler memory flaw actively exploited in attacks</title><link>https://www.yazoul.net/news/news/critical-citrix-netscaler-memory-flaw-actively-exploited-in-attacks</link><guid isPermaLink="true">https://www.yazoul.net/news/news/critical-citrix-netscaler-memory-flaw-actively-exploited-in-attacks</guid><description>&lt;p&gt;&lt;strong&gt;CRITICAL&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Hackers are exploiting a critical severity vulnerability, tracked as CVE-2026-3055, in Citrix NetScaler ADC and NetScaler Gateway appliances to obtain sensitive data. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 1 correlated source&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/critical-citrix-netscaler-memory-flaw-actively-exploited-in-attacks&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><category>critical</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials</title><link>https://www.yazoul.net/news/news/deepload-malware-uses-clickfix-and-wmi-persistence-to-steal-browser-credentials</link><guid isPermaLink="true">https://www.yazoul.net/news/news/deepload-malware-uses-clickfix-and-wmi-persistence-to-steal-browser-credentials</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - breach&lt;/p&gt;
&lt;p&gt;Healthcare IT firm CareCloud has disclosed a data breach incident that exposed sensitive data and caused a network disruption lasting approximately eight hours. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/deepload-malware-uses-clickfix-and-wmi-persistence-to-steal-browser-credentials&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>breach</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>How to Evaluate AI SOC Agents: 7 Questions Gartner Says You Should Be Asking</title><link>https://www.yazoul.net/news/news/how-to-evaluate-ai-soc-agents-7-questions-gartner-says-you-should-be-asking</link><guid isPermaLink="true">https://www.yazoul.net/news/news/how-to-evaluate-ai-soc-agents-7-questions-gartner-says-you-should-be-asking</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;AI SOC agents can reduce alert fatigue, but most teams fail to measure real outcomes. Prophet Security breaks down Gartner&apos;s questions for evaluating AI SOC agents and separating real impact from hype&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/how-to-evaluate-ai-soc-agents-7-questions-gartner-says-you-should-be-asking&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels</title><link>https://www.yazoul.net/news/news/russian-ctrl-toolkit-delivered-via-malicious-lnk-files-hijacks-rdp-via-frp-tunne</link><guid isPermaLink="true">https://www.yazoul.net/news/news/russian-ctrl-toolkit-delivered-via-malicious-lnk-files-hijacks-rdp-via-frp-tunne</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Microsoft has pulled a buggy Windows 11 non-security preview update to investigate a known issue that triggers 0x80073712 errors during installation. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/russian-ctrl-toolkit-delivered-via-malicious-lnk-files-hijacks-rdp-via-frp-tunne&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation</title><link>https://www.yazoul.net/news/news/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation</link><guid isPermaLink="true">https://www.yazoul.net/news/news/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation</guid><description>&lt;p&gt;&lt;strong&gt;CRITICAL&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting F5 BIG-IP Access Policy Manager (APM) to its Known Exploited Vulnerabilities (KEV) c&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 1 correlated source&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Sat, 28 Mar 2026 00:00:00 GMT</pubDate><category>critical</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files</title><link>https://www.yazoul.net/news/news/teampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files</link><guid isPermaLink="true">https://www.yazoul.net/news/news/teampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;TeamPCP hackers compromised the Telnyx package on the Python Package Index today, uploading malicious versions that deliver credential-stealing malware hidden inside a WAV file. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/teampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 27 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Windows 11 KB5079391 update rolls out Smart App Control improvements</title><link>https://www.yazoul.net/news/news/windows-11-kb5079391-update-rolls-out-smart-app-control-improvements</link><guid isPermaLink="true">https://www.yazoul.net/news/news/windows-11-kb5079391-update-rolls-out-smart-app-control-improvements</guid><description>&lt;p&gt;&lt;strong&gt;HIGH&lt;/strong&gt; - malware&lt;/p&gt;
&lt;p&gt;​Microsoft has released the KB5079391 preview cumulative update for Windows 11 24H2 and 25H2, which includes 29 changes, such as Smart App Control and Display improvements. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/windows-11-kb5079391-update-rolls-out-smart-app-control-improvements&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 27 Mar 2026 00:00:00 GMT</pubDate><category>high</category><category>malware</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks</title><link>https://www.yazoul.net/news/news/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frame</link><guid isPermaLink="true">https://www.yazoul.net/news/news/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frame</guid><description>&lt;p&gt;&lt;strong&gt;CRITICAL&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;The Cybersecurity and Infrastructure Security Agency (CISA) is warning that hackers are actively exploiting a critical vulnerability identified as CVE-2026-33017, which affects the Langflow framework &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 3 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frame&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate><category>critical</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse</title><link>https://www.yazoul.net/news/news/device-code-phishing-hits-340-microsoft-365-orgs-across-five-countries-via-oauth</link><guid isPermaLink="true">https://www.yazoul.net/news/news/device-code-phishing-hits-340-microsoft-365-orgs-across-five-countries-via-oauth</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Threat actors are evading phishing detection in campaigns targeting Microsoft accounts by abusing the no-code app-building platform Bubble to generate and host malicious web apps. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 4 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/device-code-phishing-hits-340-microsoft-365-orgs-across-five-countries-via-oauth&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Wed, 25 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>PolyShell attacks target 56% of all vulnerable Magento stores</title><link>https://www.yazoul.net/news/news/polyshell-attacks-target-56-of-all-vulnerable-magento-stores</link><guid isPermaLink="true">https://www.yazoul.net/news/news/polyshell-attacks-target-56-of-all-vulnerable-magento-stores</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Attacks leveraging the &apos;PolyShell&apos; vulnerability in version 2 of Magento Open Source and Adobe Commerce installations are underway, targeting more than half of all vulnerable stores. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/polyshell-attacks-target-56-of-all-vulnerable-magento-stores&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Wed, 25 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns</title><link>https://www.yazoul.net/news/news/fcc-bans-new-foreign-made-routers-over-supply-chain-and-cyber-risk-concerns</link><guid isPermaLink="true">https://www.yazoul.net/news/news/fcc-bans-new-foreign-made-routers-over-supply-chain-and-cyber-risk-concerns</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;The Federal Communications Commission has updated its Covered List to include all consumer routers made in foreign countries, banning the sale of new models in the U.S. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/fcc-bans-new-foreign-made-routers-over-supply-chain-and-cyber-risk-concerns&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 24 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner</title><link>https://www.yazoul.net/news/news/hackers-use-fake-resumes-to-steal-enterprise-credentials-and-deploy-crypto-miner</link><guid isPermaLink="true">https://www.yazoul.net/news/news/hackers-use-fake-resumes-to-steal-enterprise-credentials-and-deploy-crypto-miner</guid><description>&lt;p&gt;&lt;strong&gt;HIGH&lt;/strong&gt; - breach&lt;/p&gt;
&lt;p&gt;The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular &apos;LiteLLM&apos; Python package on PyPI and claiming to have stolen data from hundreds of thousands of dev&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 3 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/hackers-use-fake-resumes-to-steal-enterprise-credentials-and-deploy-crypto-miner&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 24 Mar 2026 00:00:00 GMT</pubDate><category>high</category><category>breach</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware</title><link>https://www.yazoul.net/news/news/north-korean-hackers-abuse-vs-code-auto-run-tasks-to-deploy-stoatwaffle-malware</link><guid isPermaLink="true">https://www.yazoul.net/news/news/north-korean-hackers-abuse-vs-code-auto-run-tasks-to-deploy-stoatwaffle-malware</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Microsoft is working to address an ongoing service issue that has intermittently prevented some users from accessing their cloud-based Exchange Online mailboxes via Outlook mobile and Mac desktop clie&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 3 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/north-korean-hackers-abuse-vs-code-auto-run-tasks-to-deploy-stoatwaffle-malware&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 23 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills</title><link>https://www.yazoul.net/news/news/the-hidden-cost-of-cybersecurity-specialization-losing-foundational-skills</link><guid isPermaLink="true">https://www.yazoul.net/news/news/the-hidden-cost-of-cybersecurity-specialization-losing-foundational-skills</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - breach&lt;/p&gt;
&lt;p&gt;Mazda Motor Corporation (Mazda) announced that information belonging to its employees and business partners had been exposed in a security incident detected last December. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/the-hidden-cost-of-cybersecurity-specialization-losing-foundational-skills&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 23 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>breach</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>U.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware Damage</title><link>https://www.yazoul.net/news/news/u-s-sentences-russian-hacker-to-6-75-years-for-role-in-9m-ransomware-damage</link><guid isPermaLink="true">https://www.yazoul.net/news/news/u-s-sentences-russian-hacker-to-6-75-years-for-role-in-9m-ransomware-damage</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Popular anime streaming platform Crunchyroll is investigating a breach after hackers claimed to have stolen personal information for approximately 6.8 million people. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/u-s-sentences-russian-hacker-to-6-75-years-for-role-in-9m-ransomware-damage&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 23 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026</title><link>https://www.yazoul.net/news/news/cisa-flags-apple-craft-cms-laravel-bugs-in-kev-orders-patching-by-april-3-2026</link><guid isPermaLink="true">https://www.yazoul.net/news/news/cisa-flags-apple-craft-cms-laravel-bugs-in-kev-orders-patching-by-april-3-2026</guid><description>&lt;p&gt;&lt;strong&gt;CRITICAL&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five security flaws impacting Apple, Craft CMS, and Laravel Livewire to its Known Exploited Vulnerabilities (KEV) catal&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 1 correlated source&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/cisa-flags-apple-craft-cms-laravel-bugs-in-kev-orders-patching-by-april-3-2026&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Sat, 21 Mar 2026 00:00:00 GMT</pubDate><category>critical</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams</title><link>https://www.yazoul.net/news/news/google-adds-24-hour-wait-for-unverified-app-sideloading-to-reduce-malware-and-sc</link><guid isPermaLink="true">https://www.yazoul.net/news/news/google-adds-24-hour-wait-for-unverified-app-sideloading-to-reduce-malware-and-sc</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Oracle has released an out-of-band security update to fix a critical unauthenticated remote code execution vulnerability in Identity Manager and Web Services Manager tracked as CVE-2026-21992. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/google-adds-24-hour-wait-for-unverified-app-sideloading-to-reduce-malware-and-sc&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 20 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks</title><link>https://www.yazoul.net/news/news/the-importance-of-behavioral-analytics-in-ai-enabled-cyber-attacks</link><guid isPermaLink="true">https://www.yazoul.net/news/news/the-importance-of-behavioral-analytics-in-ai-enabled-cyber-attacks</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Geopolitical tensions are driving destructive cyberattacks designed to disrupt operations, not demand ransom. CISOs must limit lateral movement and contain breaches to reduce the impact of wiper campa&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/the-importance-of-behavioral-analytics-in-ai-enabled-cyber-attacks&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 20 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware Attacks</title><link>https://www.yazoul.net/news/news/cisa-warns-of-zimbra-sharepoint-flaw-exploits-cisco-zero-day-hit-in-ransomware-a</link><guid isPermaLink="true">https://www.yazoul.net/news/news/cisa-warns-of-zimbra-sharepoint-flaw-exploits-cisco-zero-day-hit-in-ransomware-a</guid><description>&lt;p&gt;&lt;strong&gt;CRITICAL&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;A critical Microsoft SharePoint vulnerability patched in January is now being exploited in attacks, the Cybersecurity and Infrastructure Security Agency (CISA) warned. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 3 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/cisa-warns-of-zimbra-sharepoint-flaw-exploits-cisco-zero-day-hit-in-ransomware-a&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 19 Mar 2026 00:00:00 GMT</pubDate><category>critical</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access</title><link>https://www.yazoul.net/news/news/interlock-ransomware-exploits-cisco-fmc-zero-day-cve-2026-20131-for-root-access</link><guid isPermaLink="true">https://www.yazoul.net/news/news/interlock-ransomware-exploits-cisco-fmc-zero-day-cve-2026-20131-for-root-access</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;A new Android malware called Perseus is checking user-curated notes to steal sensitive information, like passwords, recovery phrases, or financial data. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/interlock-ransomware-exploits-cisco-fmc-zero-day-cve-2026-20131-for-root-access&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 19 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS</title><link>https://www.yazoul.net/news/news/apple-fixes-webkit-vulnerability-enabling-same-origin-policy-bypass-on-ios-and-m</link><guid isPermaLink="true">https://www.yazoul.net/news/news/apple-fixes-webkit-vulnerability-enabling-same-origin-policy-bypass-on-ios-and-m</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Apple has released its first Background Security Improvements update to fix a WebKit flaw tracked as CVE-2026-20643 on iPhones, iPads, and Macs without requiring a full operating system upgrade. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/apple-fixes-webkit-vulnerability-enabling-same-origin-policy-bypass-on-ios-and-m&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Wed, 18 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover</title><link>https://www.yazoul.net/news/news/darksword-ios-exploit-kit-uses-6-flaws-3-zero-days-for-full-device-takeover</link><guid isPermaLink="true">https://www.yazoul.net/news/news/darksword-ios-exploit-kit-uses-6-flaws-3-zero-days-for-full-device-takeover</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;The Interlock ransomware gang has been exploiting a maximum severity remote code execution (RCE) vulnerability in Cisco&apos;s Secure Firewall Management Center (FMC) software in zero-day attacks since lat&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/darksword-ios-exploit-kit-uses-6-flaws-3-zero-days-for-full-device-takeover&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Wed, 18 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader</title><link>https://www.yazoul.net/news/news/leaknet-ransomware-uses-clickfix-via-hacked-sites-deploys-deno-in-memory-loader</link><guid isPermaLink="true">https://www.yazoul.net/news/news/leaknet-ransomware-uses-clickfix-via-hacked-sites-deploys-deno-in-memory-loader</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;The LeakNet ransomware gang is now using the ClickFix technique for initial access into corporate environments and deploys a malware loader based on the open-source Deno runtime for JavaScript and Typ&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/leaknet-ransomware-uses-clickfix-via-hacked-sites-deploys-deno-in-memory-loader&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 17 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths</title><link>https://www.yazoul.net/news/news/cisa-flags-actively-exploited-wing-ftp-vulnerability-leaking-server-paths</link><guid isPermaLink="true">https://www.yazoul.net/news/news/cisa-flags-actively-exploited-wing-ftp-vulnerability-leaking-server-paths</guid><description>&lt;p&gt;&lt;strong&gt;CRITICAL&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;CISA warned U.S. government agencies to secure their Wing FTP Server instances against an actively exploited vulnerability that may be chained in remote code execution attacks. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/cisa-flags-actively-exploited-wing-ftp-vulnerability-leaking-server-paths&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate><category>critical</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos</title><link>https://www.yazoul.net/news/news/glassworm-attack-uses-stolen-github-tokens-to-force-push-malware-into-python-rep</link><guid isPermaLink="true">https://www.yazoul.net/news/news/glassworm-attack-uses-stolen-github-tokens-to-force-push-malware-into-python-rep</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Last week&apos;s cyberattack on medical technology giant Stryker was limited to its internal Microsoft environment and remotely wiped tens of thousands of employee devices. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/glassworm-attack-uses-stolen-github-tokens-to-force-push-malware-into-python-rep&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8</title><link>https://www.yazoul.net/news/news/google-fixes-two-chrome-zero-days-exploited-in-the-wild-affecting-skia-and-v8</link><guid isPermaLink="true">https://www.yazoul.net/news/news/google-fixes-two-chrome-zero-days-exploited-in-the-wild-affecting-skia-and-v8</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Google has released emergency security updates to patch two high-severity Chrome vulnerabilities exploited in zero-day attacks. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/google-fixes-two-chrome-zero-days-exploited-in-the-wild-affecting-skia-and-v8&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime</title><link>https://www.yazoul.net/news/news/interpol-dismantles-45-000-malicious-ips-arrests-94-in-global-cybercrime</link><guid isPermaLink="true">https://www.yazoul.net/news/news/interpol-dismantles-45-000-malicious-ips-arrests-94-in-global-cybercrime</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;An international law enforcement action codenamed &apos;Operation Synergia III&apos; has sinkholed tens of thousands of IP addresses and seized servers linked to cybercrime operations worldwide. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/interpol-dismantles-45-000-malicious-ips-arrests-94-in-global-cybercrime&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials</title><link>https://www.yazoul.net/news/news/storm-2561-spreads-trojan-vpn-clients-via-seo-poisoning-to-steal-credentials</link><guid isPermaLink="true">https://www.yazoul.net/news/news/storm-2561-spreads-trojan-vpn-clients-via-seo-poisoning-to-steal-credentials</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Microsoft is investigating a new issue affecting some Samsung laptops running Windows 11 after installing the February 2026 security updates, in which users lose access to their C:&amp;#092; drive and are&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/storm-2561-spreads-trojan-vpn-clients-via-seo-poisoning-to-steal-credentials&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit</title><link>https://www.yazoul.net/news/news/apple-issues-security-updates-for-older-ios-devices-targeted-by-coruna-webkit-ex</link><guid isPermaLink="true">https://www.yazoul.net/news/news/apple-issues-security-updates-for-older-ios-devices-targeted-by-coruna-webkit-ex</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;​Apple has released security updates to patch older iPhones and iPads against a set of vulnerabilities targeted in cyberespionage and crypto-theft attacks using the Coruna exploit kit. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/apple-issues-security-updates-for-older-ios-devices-targeted-by-coruna-webkit-ex&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed</title><link>https://www.yazoul.net/news/news/cisa-flags-actively-exploited-n8n-rce-bug-as-24-700-instances-remain-exposed</link><guid isPermaLink="true">https://www.yazoul.net/news/news/cisa-flags-actively-exploited-n8n-rce-bug-as-24-700-instances-remain-exposed</guid><description>&lt;p&gt;&lt;strong&gt;CRITICAL&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of ac&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 1 correlated source&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/cisa-flags-actively-exploited-n8n-rce-bug-as-24-700-instances-remain-exposed&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate><category>critical</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks</title><link>https://www.yazoul.net/news/news/hive0163-uses-ai-assisted-slopoly-malware-for-persistent-access-in-ransomware-at</link><guid isPermaLink="true">https://www.yazoul.net/news/news/hive0163-uses-ai-assisted-slopoly-malware-for-persistent-access-in-ransomware-at</guid><description>&lt;p&gt;&lt;strong&gt;HIGH&lt;/strong&gt; - malware&lt;/p&gt;
&lt;p&gt;A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware a&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/hive0163-uses-ai-assisted-slopoly-malware-for-persistent-access-in-ransomware-at&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate><category>high</category><category>malware</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation</title><link>https://www.yazoul.net/news/news/nine-crackarmor-flaws-in-linux-apparmor-enable-root-escalation-bypass-container-</link><guid isPermaLink="true">https://www.yazoul.net/news/news/nine-crackarmor-flaws-in-linux-apparmor-enable-root-escalation-bypass-container-</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Law enforcement agencies in the U.S. and Europe along with private partners have disrupted the SocksEscort cybercrime proxy network that used only edge devices compromised via the AVRecon malware for &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 3 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/nine-crackarmor-flaws-in-linux-apparmor-enable-root-escalation-bypass-container-&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Veeam Patches 7 Critical Backup &amp; Replication Flaws Allowing Remote Code Execution</title><link>https://www.yazoul.net/news/news/veeam-patches-7-critical-backup-replication-flaws-allowing-remote-code-execution</link><guid isPermaLink="true">https://www.yazoul.net/news/news/veeam-patches-7-critical-backup-replication-flaws-allowing-remote-code-execution</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Data protection company Veeam Software has patched multiple flaws in its Backup &amp; Replication solution, including four critical remote code execution (RCE) vulnerabilities. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/veeam-patches-7-critical-backup-replication-flaws-allowing-remote-code-execution&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited</title><link>https://www.yazoul.net/news/news/cisa-flags-solarwinds-ivanti-and-workspace-one-vulnerabilities-as-actively-explo</link><guid isPermaLink="true">https://www.yazoul.net/news/news/cisa-flags-solarwinds-ivanti-and-workspace-one-vulnerabilities-as-actively-explo</guid><description>&lt;p&gt;&lt;strong&gt;CRITICAL&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. Th&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 1 correlated source&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/cisa-flags-solarwinds-ivanti-and-workspace-one-vulnerabilities-as-actively-explo&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate><category>critical</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows</title><link>https://www.yazoul.net/news/news/how-to-stop-ai-data-leaks-a-webinar-guide-to-auditing-modern-agentic-workflows</link><guid isPermaLink="true">https://www.yazoul.net/news/news/how-to-stop-ai-data-leaks-a-webinar-guide-to-auditing-modern-agentic-workflows</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;For more than a year, a Russian-speaking threat actor targeted human resource (HR) departments with malware that delivers a new EDR killer named BlackSanta. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/how-to-stop-ai-data-leaks-a-webinar-guide-to-auditing-modern-agentic-workflows&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet</title><link>https://www.yazoul.net/news/news/kadnap-malware-infects-14-000-edge-devices-to-power-stealth-proxy-botnet</link><guid isPermaLink="true">https://www.yazoul.net/news/news/kadnap-malware-infects-14-000-edge-devices-to-power-stealth-proxy-botnet</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;A newly discovered botnet malware called KadNap is targeting ASUS routers and other edge networking devices to turn them into proxies for malicious traffic. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/kadnap-malware-infects-14-000-edge-devices-to-power-stealth-proxy-botnet&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days</title><link>https://www.yazoul.net/news/news/microsoft-patches-84-flaws-in-march-patch-tuesday-including-two-public-zero-days</link><guid isPermaLink="true">https://www.yazoul.net/news/news/microsoft-patches-84-flaws-in-march-patch-tuesday-including-two-public-zero-days</guid><description>&lt;p&gt;&lt;strong&gt;HIGH&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Microsoft has released the Windows 10 KB5078885 extended security update to fix the March 2026 Patch Tuesday vulnerabilities, including 2 zero-days and an issue that prevent some devices from shutting&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 3 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/microsoft-patches-84-flaws-in-march-patch-tuesday-including-two-public-zero-days&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate><category>high</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>New &apos;LeakyLooker&apos; Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries</title><link>https://www.yazoul.net/news/news/new-leakylooker-flaws-in-google-looker-studio-could-enable-cross-tenant-sql-quer</link><guid isPermaLink="true">https://www.yazoul.net/news/news/new-leakylooker-flaws-in-google-looker-studio-could-enable-cross-tenant-sql-quer</guid><description>&lt;p&gt;&lt;strong&gt;HIGH&lt;/strong&gt; - malware&lt;/p&gt;
&lt;p&gt;A new Android malware named BeatBanker can hijack devices and tricks users into installing it by posing as a Starlink app on websites masquerading as the official Google Play Store. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/new-leakylooker-flaws-in-google-looker-studio-could-enable-cross-tenant-sql-quer&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate><category>high</category><category>malware</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool</title><link>https://www.yazoul.net/news/news/threat-actors-mass-scan-salesforce-experience-cloud-via-modified-aurainspector-t</link><guid isPermaLink="true">https://www.yazoul.net/news/news/threat-actors-mass-scan-salesforce-experience-cloud-via-modified-aurainspector-t</guid><description>&lt;p&gt;&lt;strong&gt;HIGH&lt;/strong&gt; - threat-actor&lt;/p&gt;
&lt;p&gt;The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations. [...]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/threat-actors-mass-scan-salesforce-experience-cloud-via-modified-aurainspector-t&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate><category>high</category><category>threat-actor</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials</title><link>https://www.yazoul.net/news/news/malicious-npm-package-posing-as-openclaw-installer-deploys-rat-steals-macos-cred</link><guid isPermaLink="true">https://www.yazoul.net/news/news/malicious-npm-package-posing-as-openclaw-installer-deploys-rat-steals-macos-cred</guid><description>&lt;p&gt;&lt;strong&gt;MEDIUM&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;Hackers are increasingly exploiting newly disclosed vulnerabilities in third-party software to gain initial access to cloud environments, with the window for attacks shrinking from weeks to just days.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 2 correlated sources&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/malicious-npm-package-posing-as-openclaw-installer-deploys-rat-steals-macos-cred&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 09 Mar 2026 00:00:00 GMT</pubDate><category>medium</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog</title><link>https://www.yazoul.net/news/news/hikvision-and-rockwell-automation-cvss-9-8-flaws-added-to-cisa-kev-catalog</link><guid isPermaLink="true">https://www.yazoul.net/news/news/hikvision-and-rockwell-automation-cvss-9-8-flaws-added-to-cisa-kev-catalog</guid><description>&lt;p&gt;&lt;strong&gt;CRITICAL&lt;/strong&gt; - vulnerability&lt;/p&gt;
&lt;p&gt;The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities (KEV) &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt; 1 correlated source&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/news/news/hikvision-and-rockwell-automation-cvss-9-8-flaws-added-to-cisa-kev-catalog&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/news&quot;&gt;Yazoul Security - Cyber News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 06 Mar 2026 00:00:00 GMT</pubDate><category>critical</category><category>vulnerability</category><category>Security</category><category>CyberNews</category><author>Yazoul Security (contact@yazoul.net)</author></item></channel></rss>