Live Threat Pulse
0 Critical CVEs
50 KEV Entries
16 Threat Feeds
3 Active Actors
Updated: 16 Apr 2026, 19:08 UTC

AI Daily Brief

Today's Threat Summary

April's Patch Tuesday delivered a massive 167 Microsoft vulnerabilities, including a critical Windows Defender zero-day. Separately, a threat actor spent $100k to backdoor a trove of WordPress plugins in a major supply chain attack. Russian and Iranian state actors are actively exploiting legacy network devices and PLCs, while a novel PowMix botnet targets Czech workers.

  • Immediately deploy patches for the Windows Defender 'BlueHammer' zero-day (CVE-2026-XXXXX) and SharePoint Server zero-day before any other updates.
  • Conduct an emergency audit of all WordPress plugins for recent purchases or updates and initiate incident response procedures.
  • Apply available firmware updates to legacy internet-facing routers and segment operational technology networks from corporate IT.

Immediate Attention

Known Exploited Vulns

50 total
CVE-2026-34197 Apache · ActiveMQ
EXPLOITED 2026-04-16

Apache ActiveMQ contains an improper input validation vulnerability that allows for code injection.

Due Date 2026-04-30
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-32201 Microsoft · SharePoint Server
EXPLOITED 2026-04-14

Microsoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network.

Due Date 2026-04-28
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2009-0238 Microsoft · Office
EXPLOITED 2026-04-14

Microsoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object.

Due Date 2026-04-28
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-34621 Adobe · Acrobat and Reader
EXPLOITED 2026-04-13

Adobe Acrobat and Reader contain a prototype pollution vulnerability that allows for arbitrary code execution.

Due Date 2026-04-27
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-21643 Fortinet · FortiClient EMS
EXPLOITED 2026-04-13

Fortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

Due Date 2026-04-16
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2025-60710 Microsoft · Windows
EXPLOITED 2026-04-13

Microsoft Windows contains a link following vulnerability that allows for privilege escalation

Due Date 2026-04-27
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2023-36424 Microsoft · Windows
EXPLOITED 2026-04-13

Microsoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation

Due Date 2026-04-27
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2023-21529 Microsoft · Exchange Server
EXPLOITED 2026-04-13

Microsoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution.

Due Date 2026-04-27
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2020-9715 Adobe · Acrobat
EXPLOITED 2026-04-13

Adobe Acrobat contains a use-after-free vulnerability that allows for code execution

Due Date 2026-04-27
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2012-1854 Microsoft · Visual Basic for Applications (VBA)
EXPLOITED 2026-04-13

Microsoft Visual Basic for Applications (VBA) contains an insecure library loading vulnerability that could allow for remote code execution.

Due Date 2026-04-27
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-1340 Ivanti · Endpoint Manager Mobile (EPMM)
EXPLOITED 2026-04-08

Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.

Due Date 2026-04-11
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-35616 Fortinet · FortiClient EMS
EXPLOITED 2026-04-06

Fortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

Due Date 2026-04-09
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-3502 TrueConf · Client
EXPLOITED 2026-04-02

TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.

Due Date 2026-04-16
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-5281 Google · Dawn
EXPLOITED 2026-04-01

Google Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Due Date 2026-04-15
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-3055 Citrix · NetScaler
EXPLOITED 2026-03-30

Citrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread.

Due Date 2026-04-02
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2025-53521 F5 · BIG-IP
EXPLOITED 2026-03-27

F5 BIG-IP APM contains a stack-based buffer overflow vulnerability that could allow a threat actor to achieve remote code execution.

Due Date 2026-03-30
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-33634 Aquasecurity · Trivy
EXPLOITED 2026-03-26

Aquasecurity Trivy contains an embedded malicious code vulnerability that could allow an attacker to gain access to everything in the CI/CD environment, including all tokens, SSH keys, cloud credentials, database passwords, and any sensitive configuration in memory.

Due Date 2026-04-09
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-33017 Langflow · Langflow
EXPLOITED 2026-03-25

Langflow contains a code injection vulnerability that could allow building public flows without requiring authentication.

Due Date 2026-04-08
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2025-54068 Laravel · Livewire
EXPLOITED 2026-03-20

Laravel Livewire contain a code injection vulnerability that could allow unauthenticated attackers to achieve remote command execution in specific scenarios.

Due Date 2026-04-03
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2025-43520 Apple · Multiple Products
EXPLOITED 2026-03-20

Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain a classic buffer overflow vulnerability which could allow a malicious application to cause unexpected system termination or write kernel memory.

Due Date 2026-04-03
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2025-43510 Apple · Multiple Products
EXPLOITED 2026-03-20

Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability that could allow a malicious application to cause unexpected changes in memory shared between processes.

Due Date 2026-04-03
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2025-32432 Craft CMS · Craft CMS
EXPLOITED 2026-03-20

Craft CMS contains a code injection vulnerability that allows a remote attacker to execute arbitrary code.

Due Date 2026-04-03
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2025-31277 Apple · Multiple Products
EXPLOITED 2026-03-20

Apple Safari, iOS, watchOS, visionOS, iPadOS, macOS, and tvOS contain a buffer overflow vulnerability that could allow the processing of maliciously crafted web content which may lead to memory corruption.

Due Date 2026-04-03
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-20131 Cisco · Secure Firewall Management Center (FMC)
EXPLOITED 2026-03-19

Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in the web-based management interface that could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device.

Due Date 2026-03-22
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-20963 Microsoft · SharePoint
EXPLOITED 2026-03-18

Microsoft SharePoint contains a deserialization of untrusted data vulnerability that allows an unauthorized attacker to execute code over a network.

Due Date 2026-03-21
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2025-66376 Synacor · Zimbra Collaboration Suite (ZCS)
EXPLOITED 2026-03-18

Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability in the Classic UI where attackers could abuse Cascading Style Sheets (CSS) @import directives in email HTML.

Due Date 2026-04-01
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2025-47813 Wing FTP Server · Wing FTP Server
EXPLOITED 2026-03-16

Wing FTP Server contains a generation of error message containing sensitive information vulnerability when using a long value in the UID cookie.

Due Date 2026-03-30
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-3910 Google · Chromium V8
EXPLOITED 2026-03-13

Google Chromium V8 contains an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Due Date 2026-03-27
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-3909 Google · Skia
EXPLOITED 2026-03-13

Google Skia contains an out-of-bounds write vulnerability that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.

Due Date 2026-03-27
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2025-68613 n8n · n8n
EXPLOITED 2026-03-11

n8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for remote code execution.

Due Date 2026-03-25
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-1603 Ivanti · Endpoint Manager (EPM)
EXPLOITED 2026-03-09

Ivanti Endpoint Manager (EPM) contains an authentication bypass using an alternate path or channel vulnerability that could allow a remote unauthenticated attacker to leak specific stored credential data.

Due Date 2026-03-23
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2025-26399 SolarWinds · Web Help Desk
EXPLOITED 2026-03-09

SolarWinds Web Help Desk contain a deserialization of untrusted data vulnerability in AjaxProxy that could allow an attacker to run commands on the host machine.

Due Date 2026-03-12
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2021-22054 Omnissa · Workspace One UEM
EXPLOITED 2026-03-09

Omnissa Workspace One UEM formerly known as VMware Workspace One UEM contains a server-side request forgery (SSRF) vulnerability that could allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information.

Due Date 2026-03-23
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2023-43000 Apple · Multiple Products
EXPLOITED 2026-03-05

Apple macOS, iOS, iPadOS, and Safari 16.6 contain a use-after-free vulnerability due to the processing of maliciously crafted web content that may lead to memory corruption.

Due Date 2026-03-26
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2023-41974 Apple · iOS and iPadOS
EXPLOITED 2026-03-05

Apple iOS and iPadOS contain a use-after-free vulnerability. An app may be able to execute arbitrary code with kernel privileges.

Due Date 2026-03-26
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2021-30952 Apple · Multiple Products
EXPLOITED 2026-03-05

Apple tvOS, macOS, Safari, iPadOS and watchOS contain an integer overflow or wraparound vulnerability due to the processing of maliciously crafted web content that may lead to arbitrary code execution.

Due Date 2026-03-26
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2021-22681 Rockwell · Multiple Products
EXPLOITED 2026-03-05

Multiple Rockwell products contain an insufficient protected credentials vulnerability. Studio 5000 Logix Designer software may allow a key to be discovered. This key is used to verify Logix controllers are communicating with Rockwell Automation design software. If successfully exploited, this vulnerability could allow an unauthorized application to connect with Logix controllers. To leverage this vulnerability, an unauthorized user would require network access to the controller.

Due Date 2026-03-26
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2017-7921 Hikvision · Multiple Products
EXPLOITED 2026-03-05

Multiple Hikvision products contain an improper authentication vulnerability that could allow a malicious user to escalate privileges on the system and gain access to sensitive information.

Due Date 2026-03-26
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-22719 Broadcom · VMware Aria Operations
EXPLOITED 2026-03-03

Broadcom VMware Aria Operations formerly known as vRealize Operations (vROps) contains a command injection vulnerability that allows an unauthenticated attacker to execute arbitrary commands, potentially leading to remote code execution during support‑assisted product migration.

Due Date 2026-03-24
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-21385 Qualcomm · Multiple Chipsets
EXPLOITED 2026-03-03

Multiple Qualcomm chipsets contain a memory corruption vulnerability while using alignments for memory allocation.

Due Date 2026-03-24
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-20127 Cisco · Catalyst SD-WAN Controller and Manager
EXPLOITED 2026-02-25

Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, contain an authentication bypass vulnerability could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.

Due Date 2026-02-27
Required Action Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
View on NVD →
CVE-2022-20775 Cisco · SD-WAN
EXPLOITED 2026-02-25

Cisco SD-WAN CLI contains a path traversal vulnerability that could allow an authenticated local attacker to gain elevated privileges via improper access controls on commands within the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.

Due Date 2026-02-27
Required Action Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
View on NVD →
CVE-2026-25108 Soliton Systems K.K · FileZen
EXPLOITED 2026-02-24

Soliton Systems K.K FileZen contains an OS command injection vulnerability when an user logs-in to the affected product and sends a specially crafted HTTP request.

Due Date 2026-03-17
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2025-68461 Roundcube · Webmail
EXPLOITED 2026-02-20

RoundCube Webmail contains a cross-site scripting vulnerability via the animate tag in an SVG document.

Due Date 2026-03-13
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2025-49113 Roundcube · Webmail
EXPLOITED 2026-02-20

RoundCube Webmail contains a deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php.

Due Date 2026-03-13
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-22769 Dell · RecoverPoint for Virtual Machines (RP4VMs)
EXPLOITED 2026-02-18

Dell RecoverPoint for Virtual Machines (RP4VMs) contains an use of hard-coded credentials vulnerability that could allow an unauthenticated remote attacker to gain unauthorized access to the underlying operating system and root-level persistence.

Due Date 2026-02-21
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2021-22175 GitLab · GitLab
EXPLOITED 2026-02-18

GitLab contains a server-side request forgery (SSRF) vulnerability when requests to the internal network for webhooks are enabled.

Due Date 2026-03-11
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2026-2441 Google · Chromium
EXPLOITED 2026-02-17

Google Chromium CSS contains a use-after-free vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Due Date 2026-03-10
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2024-7694 TeamT5 · ThreatSonar Anti-Ransomware
EXPLOITED 2026-02-17

TeamT5 ThreatSonar Anti-Ransomware contains an unrestricted upload of file with dangerous type vulnerability. ThreatSonar Anti-Ransomware does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system commands on the server.

Due Date 2026-03-10
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →
CVE-2020-7796 Synacor · Zimbra Collaboration Suite
EXPLOITED 2026-02-17

Synacor Zimbra Collaboration Suite (ZCS) contains a server-side request forgery vulnerability if WebEx zimlet installed and zimlet JSP is enabled.

Due Date 2026-03-10
Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
View on NVD →

Latest CVEs

Top by Severity

10 total
CVE-1999-1162 Vulnerability in passwd in SCO UNIX 4.0 and earlier allows …
6.4

Vulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by preventing users from being able to log into the system.

CVSS Score 6.4
Published 1993-05-24T04:00:00.000
CVE-1999-1216 Cisco routers 9.17 and earlier allow remote attackers to …
7.5

Cisco routers 9.17 and earlier allow remote attackers to bypass security restrictions via certain IP source routed packets that should normally be denied using the "no ip source-route" command.

CVSS Score 7.5
Published 1993-04-22T04:00:00.000
CVE-1999-1312 Vulnerability in DEC OpenVMS VAX 5.5-2 through 5.0, and …
7.2

Vulnerability in DEC OpenVMS VAX 5.5-2 through 5.0, and OpenVMS AXP 1.0, allows local users to gain system privileges.

CVSS Score 7.2
Published 1993-02-24T05:00:00.000
CVE-1999-1218 Vulnerability in finger in Commodore Amiga UNIX 2.1p2a and …
2.1

Vulnerability in finger in Commodore Amiga UNIX 2.1p2a and earlier allows local users to read arbitrary files.

CVSS Score 2.1
Published 1993-02-18T05:00:00.000
CVE-1999-1507 Sun SunOS 4.1 through 4.1.3 allows local attackers to gain …
7.2

Sun SunOS 4.1 through 4.1.3 allows local attackers to gain root access via insecure permissions on files and directories such as crash.

CVSS Score 7.2
Published 1993-02-03T05:00:00.000
CVE-1999-0312 HP ypbind allows attackers with root privileges to modify …
5.0

HP ypbind allows attackers with root privileges to modify NIS data.

CVSS Score 5.0
Published 1993-01-13T05:00:00.000
CVE-1999-1021 NFS on SunOS 4.1 through 4.1.2 ignores the high order 16 …
7.2

NFS on SunOS 4.1 through 4.1.2 ignores the high order 16 bits in a 32 bit UID, which allows a local user to gain root access if the lower 16 bits are set to 0, as fixed by the NFS jumbo patch upgrade.

CVSS Score 7.2
Published 1992-12-30T05:00:00.000
CVE-1999-1306 Cisco IOS 9.1 and earlier does not properly handle extended …
7.5

Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the "established" keyword is set, which could allow attackers to bypass filters.

CVSS Score 7.5
Published 1992-12-10T05:00:00.000
CVE-1999-1466 Vulnerability in Cisco routers versions 8.2 through 9.1 …
7.5

Vulnerability in Cisco routers versions 8.2 through 9.1 allows remote attackers to bypass access control lists when extended IP access lists are used on certain interfaces, the IP route cache is enabled, and the access list uses the "established" keyword.

CVSS Score 7.5
Published 1992-12-10T05:00:00.000
CVE-1999-1395 Vulnerability in Monitor utility (SYS$SHARE:SPISHR.EXE) in …
7.2

Vulnerability in Monitor utility (SYS$SHARE:SPISHR.EXE) in VMS 5.0 through 5.4-2 allows local users to gain privileges.

CVSS Score 7.2
Published 1992-11-17T05:00:00.000

Fresh from Feeds

Threat Intel Updates

16 items
Cisco Talos The Q1 vulnerability pulse
16 Apr

Thor provides an overview of the Q1 2026 vulnerability statistics, highlighting key trends in legacy CVEs and the evolving impact of AI on the threat landscape.

Read full story →
The Hacker News Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic
16 Apr

Cybersecurity researchers have warned of an active malicious campaign that's targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025. "PowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections," Cisco Talos

Read full story →
BleepingComputer Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face
16 Apr

Hackers are exploiting a critical vulnerability in Marimo reactive Python notebook to deploy a new variant of NKAbuse malware hosted on Hugging Face Spaces. [...]

Read full story →
Microsoft Security Building your cryptographic inventory: A customer strategy for cryptographic posture management
16 Apr

Learn how to build a comprehensive cryptographic inventory and strengthen quantum‑safe readiness using Microsoft Security tools, best‑practice lifecycle models, and partner solutions. The post Building your cryptographic inventory: A customer strategy for cryptographic posture management appeared first on Microsoft Security Blog.

Read full story →
BleepingComputer Google expands Gemini AI use to fight malicious ads on its platform
16 Apr

Google says it is increasingly using its Gemini AI models to detect and block harmful ads on its advertising platforms, as scammers and threat actors continue to evolve their tactics to evade detection. [...]

Read full story →
Microsoft Security Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise
16 Apr

The Microsoft Defender Security Research Team uncovered a sophisticated macOS intrusion campaign attributed to the North Korean threat actor Sapphire Sleet that abuses user driven execution and social engineering to bypass macOS security protections and steal credentials, cryptocurrency assets, and sensitive data. The post Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise appeared first on Microsoft Security Blog.

Read full story →
The Hacker News ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories
16 Apr

You know that feeling when you open your feed on a Thursday morning and it's just... a lot? Yeah. This week delivered. We've got hackers getting creative in ways that are almost impressive if you ignore the whole "crime" part, ancient vulnerabilities somehow still ruining people's days, and enough supply chain drama to fill a season of television nobody asked for. Not 

Read full story →
Rapid7 ClickFix Phishing Campaign Masquerading as a Claude Installer
16 Apr

OverviewIt is no secret that phishing campaigns utilizing various ClickFix techniques have been a commonly used method of social engineering. One of the main reasons for this is simply because they work. You know this and Rapid7 does as well. As a company offering managed detection and response (MDR), our customers expect us to be knowledgeable about and able to detect attacks as common as ClickFix campaigns. Recently, Rapid7 observed a small grouping of ClickFix events across customers in...

Read full story →
Cisco Talos PowMix botnet targets Czech workforce
16 Apr

Cisco Talos discovered an ongoing malicious campaign, operating since at least December 2025, affecting a broader workforce in the Czech Republic with a previously undocumented botnet we call “PowMix.”

Read full story →
SANS ISC SANS Stormcast Thursday, April 16th, 2026: AI Credential Scans; Microsoft Update Issues; RDP Warnings; GitHub Action Vulns;
16 Apr

Scanning for AI Models https://isc.sans.edu/diary/Scanning%20for%20AI%20Models/32896 Microsoft Update Problems https://support.microsoft.com/en-us/topic/april-14-2026-kb5082063-os-build-26100-32690-c57e289d-27c9-47cd-a183-72fabc62c5d7#:~:text=Known%20issues%20in%20this%20update Microsoft RDP File Warnings https://learn.microsoft.com/en-us/windows-server/remote/remote-desktop-services/remotepc/understanding-security-warnings AI GitHub Action Vulnerabilities...

Read full story →
Rapid7 A Clearer Path from Prioritized Exposures to Remediation Progress
15 Apr

Security leaders know that reducing risk is not just about finding the right exposures, but helping the organization act on them before known issues turn into real incidents. That is often where remediation gets harder. Security teams may know which actions matter most, but progress can slow when infrastructure, cloud, endpoint, and IT teams do not have the context needed to execute. Teams need clear asset detail to scope the work, trusted status signals to validate remediation, and usable...

Read full story →
SANS ISC SANS Stormcast Wednesday, April 15th, 2026: Microsoft, Adobe, Fortinet and others Patches
15 Apr

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS Stormcast Wednesday, April 15th, 2026: Microsoft, Adobe, Fortinet and others Patches

Read full story →
KrebsOnSecurity Patch Tuesday, April 2026 Edition
14 Apr

Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dubbed "BlueHammer." Separately, Google Chrome fixed its fourth zero-day of 2026, and an emergency update for Adobe Reader nixes an actively exploited flaw that can lead to remote code execution.

Read full story →
KrebsOnSecurity Russia Hacked Routers to Steal Microsoft Office Tokens
7 Apr

Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks without deploying any malicious software or code.

Read full story →
CISA Alerts Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure
6 Apr

Advisory at a Glance Title Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure Original Publication April 7, 2026 Executive Summary Iran-affiliated advanced persistent threat (APT) actors are conducting exploitation activity targeting internet-facing operational technology (OT) devices, including programmable logic controllers (PLCs) manufactured by Rockwell Automation/Allen-Bradley. This activity has led to PLC disruptions across several...

Read full story →
CISA Alerts Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure
5 Dec

Summary Note: This joint Cybersecurity Advisory is being published as an addition to the Cybersecurity and Infrastructure Security Agency (CISA) May 6, 2025, joint fact sheet Primary Mitigations to Reduce Cyber Threats to Operational Technology and European Cybercrime Centre’s (EC3) Operation Eastwood, in which CISA, Federal Bureau of Investigation (FBI), Department of Energy (DOE), Environmental Protection Agency (EPA), and EC3 shared information about cyber incidents affecting the...

Read full story →

Activity Pulse

Threat Actor Mentions

Top 3
Lazarus Group
3

Since 2009, HIDDEN COBRA actors have leveraged their capabilities to target and compromise a range of victims; some intrusions have resulted in the exfiltration of data while others have been disrupti

STARDUST CHOLLIMA
3

Open-source reporting has claimed that the Hermes ransomware was developed by the North Korean group STARDUST CHOLLIMA (activities of which have been public reported as part of the “Lazarus Group”), b

APT41
1

APT41 is a prolific cyber threat group that carries out Chinese state-sponsored espionage activity in addition to financially motivated activity potentially outside of state control.

Dark Web Pulse

OTX Threat Pulses

10 pulses
Beyond the breach: inside a cargo theft actor's post-compromise playbook
22 IOCs 16 Apr

A cargo theft threat actor maintained access to a decoy environment for over a month, providing extensive visibility into post-compromise operations. The attacker established redundant persistence using multiple remote access tools, including four ScreenConnect instances, Pulseway RMM, and SimpleHel

View pulse →
CVE-2026-39987 update: How attackers weaponized marimo to deploy a blockchain botnet via HuggingFace
19 IOCs 16 Apr

Three days after disclosure of a critical pre-authorization remote code execution vulnerability in the marimo Python notebook platform, multiple threat actors deployed malware hosted on HuggingFace Spaces. A previously undocumented NKAbuse variant was delivered through a typosquatted HuggingFace Spa

View pulse →
Silent Crypto Wallet Takeover Unlimited USDT Approval Exploitation via Trust Wallet QR Code Phishing
4 IOCs 15 Apr

An active campaign targets Trust Wallet users through malicious QR codes distributed via Telegram, exploiting deep link mechanisms to redirect victims to Netlify-hosted phishing domains. The attack masquerades as a legitimate USDT transfer interface but covertly triggers an ERC-20 approve() transact

View pulse →
Fake YouTube copyright notices can steal your Google login
5 IOCs 15 Apr

A sophisticated phishing campaign is targeting YouTube creators using convincing fake copyright strike notifications. The attack dynamically pulls real channel data including profile pictures, subscriber counts, and recent videos to create personalized scare pages. Victims are funneled through a Bro

View pulse →
From fake Proton VPN sites to gaming mods, this Windows infostealer is everywhere
8 IOCs 15 Apr

Multiple campaigns are distributing NWHStealer through diverse platforms including fake VPN downloads, hardware utilities, and gaming modifications. The infostealer collects browser data, saved passwords, and cryptocurrency wallet information. Distribution occurs via fake websites impersonating legi

View pulse →
The n8n n8mare: How threat actors are misusing AI workflow automation
15 IOCs 15 Apr

Investigation reveals widespread abuse of n8n, an AI workflow automation platform, in sophisticated phishing campaigns from October 2025 through March 2026. Attackers exploit the platform's webhook functionality to deliver malware and fingerprint devices while bypassing security filters through trus

View pulse →
New ransomware targets Turkey via Adwind RAT
5 IOCs 15 Apr

A threat cluster has been identified leveraging a customized Adwind (Java RAT) variant with polymorphic characteristics to deliver JanaWare ransomware. The campaign specifically targets Turkish users through geofencing mechanisms that check system locale and external IP geolocation. Active since at

View pulse →
A new Mac stealer targeting $10K+ crypto wallets
15 IOCs 15 Apr

A sophisticated macOS stealer called notnullOSX emerged in March 2026, developed by threat actor alh1mik (formerly 0xFFF) who returned after a 2023 exit from underground forums. This Go-written modular stealer exclusively targets macOS users with cryptocurrency holdings exceeding $10,000. Distributi

View pulse →
Chasing an Angry Spark
17 IOCs 15 Apr

In spring 2022, a highly sophisticated backdoor named AngrySpark was discovered on a single machine in the United Kingdom. The malware employed a three-stage architecture: a DLL masquerading as a Windows Task Scheduler component, a custom virtual machine interpreter running bytecode instructions, an

View pulse →
108 Chrome Extensions Linked to Data Exfiltration and Session Theft via Shared C2 Infrastructure
44 IOCs 14 Apr

A coordinated campaign of 108 malicious Chrome extensions operated through shared command-and-control infrastructure at cloudapi[.]stream has been identified, collectively accounting for approximately 20,000 installations. The campaign spans multiple threat categories: 54 extensions steal Google acc

View pulse →