Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers
Apr 9, 2026
Vulnerability Medium Hackers hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla, and pushed a malicious version with multiple backdoors. [...]
New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips
Apr 6, 2026
Vulnerability Medium A new attack, dubbed GPUBreach, can induce Rowhammer bit-flips on GPU GDDR6 memories to escalate privileges and lead to a full system compromise. [...]
Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms
Medium Anthropic says it accidentally leaked the source code for Claude Code, which is closed source, but the company says no customer data or credentials were exposed. [...]
DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials
Medium Healthcare IT firm CareCloud has disclosed a data breach incident that exposed sensitive data and caused a network disruption lasting approximately eight hours. [...]
How to Evaluate AI SOC Agents: 7 Questions Gartner Says You Should Be Asking
Mar 30, 2026
Vulnerability Medium AI SOC agents can reduce alert fatigue, but most teams fail to measure real outcomes. Prophet Security breaks down Gartner's questions for evaluating AI SOC agents and separating real impact from hype
Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels
Mar 30, 2026
Vulnerability Medium Microsoft has pulled a buggy Windows 11 non-security preview update to investigate a known issue that triggers 0x80073712 errors during installation. [...]
TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files
Mar 27, 2026
Vulnerability Medium TeamPCP hackers compromised the Telnyx package on the Python Package Index today, uploading malicious versions that deliver credential-stealing malware hidden inside a WAV file. [...]
Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse
Mar 25, 2026
Vulnerability Medium Threat actors are evading phishing detection in campaigns targeting Microsoft accounts by abusing the no-code app-building platform Bubble to generate and host malicious web apps. [...]
PolyShell attacks target 56% of all vulnerable Magento stores
Mar 25, 2026
Vulnerability Medium Attacks leveraging the 'PolyShell' vulnerability in version 2 of Magento Open Source and Adobe Commerce installations are underway, targeting more than half of all vulnerable stores. [...]
FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns
Mar 24, 2026
Vulnerability Medium The Federal Communications Commission has updated its Covered List to include all consumer routers made in foreign countries, banning the sale of new models in the U.S. [...]
North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware
Mar 23, 2026
Vulnerability Medium Microsoft is working to address an ongoing service issue that has intermittently prevented some users from accessing their cloud-based Exchange Online mailboxes via Outlook mobile and Mac desktop clie
The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills
Medium Mazda Motor Corporation (Mazda) announced that information belonging to its employees and business partners had been exposed in a security incident detected last December. [...]
U.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware Damage
Mar 23, 2026
Vulnerability Medium Popular anime streaming platform Crunchyroll is investigating a breach after hackers claimed to have stolen personal information for approximately 6.8 million people. [...]
Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams
Mar 20, 2026
Vulnerability Medium Oracle has released an out-of-band security update to fix a critical unauthenticated remote code execution vulnerability in Identity Manager and Web Services Manager tracked as CVE-2026-21992. [...]
The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks
Mar 20, 2026
Vulnerability Medium Geopolitical tensions are driving destructive cyberattacks designed to disrupt operations, not demand ransom. CISOs must limit lateral movement and contain breaches to reduce the impact of wiper campa
Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access
Mar 19, 2026
Vulnerability Medium A new Android malware called Perseus is checking user-curated notes to steal sensitive information, like passwords, recovery phrases, or financial data. [...]
Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS
Mar 18, 2026
Vulnerability Medium Apple has released its first Background Security Improvements update to fix a WebKit flaw tracked as CVE-2026-20643 on iPhones, iPads, and Macs without requiring a full operating system upgrade. [...]
DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover
Mar 18, 2026
Vulnerability Medium The Interlock ransomware gang has been exploiting a maximum severity remote code execution (RCE) vulnerability in Cisco's Secure Firewall Management Center (FMC) software in zero-day attacks since lat
LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader
Mar 17, 2026
Vulnerability Medium The LeakNet ransomware gang is now using the ClickFix technique for initial access into corporate environments and deploys a malware loader based on the open-source Deno runtime for JavaScript and Typ
GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos
Mar 16, 2026
Vulnerability Medium Last week's cyberattack on medical technology giant Stryker was limited to its internal Microsoft environment and remotely wiped tens of thousands of employee devices. [...]
Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8
Mar 13, 2026
Vulnerability Medium Google has released emergency security updates to patch two high-severity Chrome vulnerabilities exploited in zero-day attacks. [...]
INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
Mar 13, 2026
Vulnerability Medium An international law enforcement action codenamed 'Operation Synergia III' has sinkholed tens of thousands of IP addresses and seized servers linked to cybercrime operations worldwide. [...]
Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials
Mar 13, 2026
Vulnerability Medium Microsoft is investigating a new issue affecting some Samsung laptops running Windows 11 after installing the February 2026 security updates, in which users lose access to their C:\ drive and are
Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit
Mar 12, 2026
Vulnerability Medium Apple has released security updates to patch older iPhones and iPads against a set of vulnerabilities targeted in cyberespionage and crypto-theft attacks using the Coruna exploit kit. [...]
Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation
Mar 12, 2026
Vulnerability Medium Law enforcement agencies in the U.S. and Europe along with private partners have disrupted the SocksEscort cybercrime proxy network that used only edge devices compromised via the AVRecon malware for
Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution
Mar 12, 2026
Vulnerability Medium Data protection company Veeam Software has patched multiple flaws in its Backup & Replication solution, including four critical remote code execution (RCE) vulnerabilities. [...]
How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows
Mar 10, 2026
Vulnerability Medium For more than a year, a Russian-speaking threat actor targeted human resource (HR) departments with malware that delivers a new EDR killer named BlackSanta. [...]
KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet
Mar 10, 2026
Vulnerability Medium A newly discovered botnet malware called KadNap is targeting ASUS routers and other edge networking devices to turn them into proxies for malicious traffic. [...]
Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials
Mar 9, 2026
Vulnerability Medium Hackers are increasingly exploiting newly disclosed vulnerabilities in third-party software to gain initial access to cloud environments, with the window for attacks shrinking from weeks to just days.
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
Mar 4, 2026
Vulnerability Medium A previously undocumented set of 23 iOS exploits named 'Coruna' has been deployed by multiple threat actors in targeted espionage campaigns and financially motivated attacks. [...]
FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials
Medium The FBI has seized the LeakBase cybercrime forum, a major online forum used by cybercriminals buy and sell hacking tools and stolen data. [...]
CyberStrikeAI tool adopted by hackers for AI-powered attacks
Mar 3, 2026
Vulnerability Medium Researchers warn that a newly identified open-source AI security testing platform called CyberStrikeAI was used by the same threat actor behind a recent campaign that breached hundreds of Fortinet For
Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens
Feb 16, 2026
Vulnerability Medium With the massive adoption of the OpenClaw agentic AI assistant, information-stealing malware has been spotted stealing files associated with the framework that contain API keys, authentication tokens,