Medium Threats

33 articles

Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers

Apr 9, 2026

Vulnerability
Medium

Hackers hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla, and pushed a malicious version with multiple backdoors. [...]

Read Article

New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips

Apr 6, 2026

Vulnerability
Medium

A new attack, dubbed GPUBreach, can induce Rowhammer bit-flips on GPU GDDR6 memories to escalate privileges and lead to a full system compromise. [...]

Read Article

Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms

Apr 1, 2026

Breach
Medium

Anthropic says it accidentally leaked the source code for Claude Code, which is closed source, but the company says no customer data or credentials were exposed. [...]

Read Article

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

Mar 30, 2026

Breach
Medium

Healthcare IT firm CareCloud has disclosed a data breach incident that exposed sensitive data and caused a network disruption lasting approximately eight hours. [...]

Read Article

How to Evaluate AI SOC Agents: 7 Questions Gartner Says You Should Be Asking

Mar 30, 2026

Vulnerability
Medium

AI SOC agents can reduce alert fatigue, but most teams fail to measure real outcomes. Prophet Security breaks down Gartner's questions for evaluating AI SOC agents and separating real impact from hype

Read Article

Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels

Mar 30, 2026

Vulnerability
Medium

Microsoft has pulled a buggy Windows 11 non-security preview update to investigate a known issue that triggers 0x80073712 errors during installation. [...]

Read Article

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

Mar 27, 2026

Vulnerability
Medium

TeamPCP hackers compromised the Telnyx package on the Python Package Index today, uploading malicious versions that deliver credential-stealing malware hidden inside a WAV file. [...]

Read Article

Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

Mar 25, 2026

Vulnerability
Medium

Threat actors are evading phishing detection in campaigns targeting Microsoft accounts by abusing the no-code app-building platform Bubble to generate and host malicious web apps. [...]

Read Article

PolyShell attacks target 56% of all vulnerable Magento stores

Mar 25, 2026

Vulnerability
Medium

Attacks leveraging the 'PolyShell' vulnerability in version 2 of Magento Open Source and Adobe Commerce installations are underway, targeting more than half of all vulnerable stores. [...]

Read Article

FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns

Mar 24, 2026

Vulnerability
Medium

The Federal Communications Commission has updated its Covered List to include all consumer routers made in foreign countries, banning the sale of new models in the U.S. [...]

Read Article

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware

Mar 23, 2026

Vulnerability
Medium

Microsoft is working to address an ongoing service issue that has intermittently prevented some users from accessing their cloud-based Exchange Online mailboxes via Outlook mobile and Mac desktop clie

Read Article

The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills

Mar 23, 2026

Breach
Medium

Mazda Motor Corporation (Mazda) announced that information belonging to its employees and business partners had been exposed in a security incident detected last December. [...]

Read Article

U.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware Damage

Mar 23, 2026

Vulnerability
Medium

Popular anime streaming platform Crunchyroll is investigating a breach after hackers claimed to have stolen personal information for approximately 6.8 million people. [...]

Read Article

Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams

Mar 20, 2026

Vulnerability
Medium

Oracle has released an out-of-band security update to fix a critical unauthenticated remote code execution vulnerability in Identity Manager and Web Services Manager tracked as CVE-2026-21992. [...]

Read Article

The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks

Mar 20, 2026

Vulnerability
Medium

Geopolitical tensions are driving destructive cyberattacks designed to disrupt operations, not demand ransom. CISOs must limit lateral movement and contain breaches to reduce the impact of wiper campa

Read Article

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

Mar 19, 2026

Vulnerability
Medium

A new Android malware called Perseus is checking user-curated notes to steal sensitive information, like passwords, recovery phrases, or financial data. [...]

Read Article

Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS

Mar 18, 2026

Vulnerability
Medium

Apple has released its first Background Security Improvements update to fix a WebKit flaw tracked as CVE-2026-20643 on iPhones, iPads, and Macs without requiring a full operating system upgrade. [...]

Read Article

DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover

Mar 18, 2026

Vulnerability
Medium

The Interlock ransomware gang has been exploiting a maximum severity remote code execution (RCE) vulnerability in Cisco's Secure Firewall Management Center (FMC) software in zero-day attacks since lat

Read Article

LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader

Mar 17, 2026

Vulnerability
Medium

The LeakNet ransomware gang is now using the ClickFix technique for initial access into corporate environments and deploys a malware loader based on the open-source Deno runtime for JavaScript and Typ

Read Article

GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos

Mar 16, 2026

Vulnerability
Medium

Last week's cyberattack on medical technology giant Stryker was limited to its internal Microsoft environment and remotely wiped tens of thousands of employee devices. [...]

Read Article

Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8

Mar 13, 2026

Vulnerability
Medium

Google has released emergency security updates to patch two high-severity Chrome vulnerabilities exploited in zero-day attacks. [...]

Read Article

INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime

Mar 13, 2026

Vulnerability
Medium

An international law enforcement action codenamed 'Operation Synergia III' has sinkholed tens of thousands of IP addresses and seized servers linked to cybercrime operations worldwide. [...]

Read Article

Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

Mar 13, 2026

Vulnerability
Medium

Microsoft is investigating a new issue affecting some Samsung laptops running Windows 11 after installing the February 2026 security updates, in which users lose access to their C:\ drive and are

Read Article

Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

Mar 12, 2026

Vulnerability
Medium

​Apple has released security updates to patch older iPhones and iPads against a set of vulnerabilities targeted in cyberespionage and crypto-theft attacks using the Coruna exploit kit. [...]

Read Article

Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation

Mar 12, 2026

Vulnerability
Medium

Law enforcement agencies in the U.S. and Europe along with private partners have disrupted the SocksEscort cybercrime proxy network that used only edge devices compromised via the AVRecon malware for

Read Article

Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution

Mar 12, 2026

Vulnerability
Medium

Data protection company Veeam Software has patched multiple flaws in its Backup & Replication solution, including four critical remote code execution (RCE) vulnerabilities. [...]

Read Article

How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

Mar 10, 2026

Vulnerability
Medium

For more than a year, a Russian-speaking threat actor targeted human resource (HR) departments with malware that delivers a new EDR killer named BlackSanta. [...]

Read Article

KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet

Mar 10, 2026

Vulnerability
Medium

A newly discovered botnet malware called KadNap is targeting ASUS routers and other edge networking devices to turn them into proxies for malicious traffic. [...]

Read Article

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

Mar 9, 2026

Vulnerability
Medium

Hackers are increasingly exploiting newly disclosed vulnerabilities in third-party software to gain initial access to cloud environments, with the window for attacks shrinking from weeks to just days.

Read Article

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

Mar 4, 2026

Vulnerability
Medium

A previously undocumented set of 23 iOS exploits named 'Coruna' has been deployed by multiple threat actors in targeted espionage campaigns and financially motivated attacks. [...]

Read Article

FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials

Mar 4, 2026

Breach
Medium

The FBI has seized the LeakBase cybercrime forum, a major online forum used by cybercriminals buy and sell hacking tools and stolen data. [...]

Read Article

CyberStrikeAI tool adopted by hackers for AI-powered attacks

Mar 3, 2026

Vulnerability
Medium

Researchers warn that a newly identified open-source AI security testing platform called CyberStrikeAI was used by the same threat actor behind a recent campaign that breached hundreds of Fortinet For

Read Article

Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens

Feb 16, 2026

Vulnerability
Medium

With the massive adoption of the OpenClaw agentic AI assistant, information-stealing malware has been spotted stealing files associated with the framework that contain API keys, authentication tokens,

Read Article

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.