Skip to content
Threat Feed

March 2026 (30)

medium advisory

CrowdStrike Falcon Cloud Security CNAPP with Adversary-Informed Risk Prioritization

CrowdStrike Falcon Cloud Security enhances CNAPP capabilities with application-layer visibility and adversary-informed risk prioritization, enabling security teams to focus on attacker-aligned risks and known threat actors.

Lazarus Group +10 cloud-security cnaap risk-prioritization
2r 3t
medium advisory

CrowdStrike Falcon Cloud Security Introduces Adversary-Informed Risk Prioritization

CrowdStrike's Falcon Cloud Security enhances CNAPP capabilities by introducing adversary-informed risk prioritization, application layer visibility, and root cause analysis of configuration changes, enabling security teams to better understand and remediate cloud risks.

Lazarus Group +10 cloud cnapp risk-prioritization
2r 8t
medium advisory

CrowdStrike Agentic MDR and SOC Transformation Services

CrowdStrike introduces agentic MDR and SOC Transformation Services to enhance breach prevention through machine-speed execution and expert oversight, while SOC Transformation Services aim to modernize security operations by focusing on SIEM, data pipelines, workflows, talent models, and governance.

agentic-soc mdr soc ai
2r 2t
high advisory

CrowdStrike Falcon Enhancements Secure AI Agents and Govern Shadow AI

CrowdStrike is enhancing its Falcon platform with AI Detection and Response (AIDR) to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud, addressing threats like prompt injection attacks, data leaks, and policy violations.

ai shadow-ai prompt-injection data-leak endpoint-security
2r 3t
medium advisory

CrowdStrike Charlotte AI AgentWorks and Agentic SOAR for Automated Security Operations

CrowdStrike introduces Charlotte AI AgentWorks and Agentic SOAR to enhance security operations through AI-driven automation and orchestration, reducing manual workloads and improving decision accuracy.

ai automation security operations soar
2r
medium advisory

CrowdStrike Charlotte AI AgentWorks for Agentic SOC Transformation

CrowdStrike's Charlotte AI AgentWorks facilitates the development and deployment of AI-driven security agents within the SOC, aiming to enhance analyst capabilities through automated and orchestrated responses to threats.

agentic-soc ai-security automation
2r 2t
medium advisory

CrowdStrike Falcon Next-Gen SIEM Supports Third-Party EDR Tools

CrowdStrike Falcon Next-Gen SIEM is expanding to support third-party EDR solutions, starting with Microsoft Defender, enabling organizations to extend their AI-native SOC across their ecosystem by unifying detection, investigation, and response.

SIEM EDR Microsoft Defender
2r
medium advisory

CrowdStrike Charlotte AI AgentWorks and Agentic SOAR for Agentic Security Operations

CrowdStrike's Charlotte AI AgentWorks and Agentic SOAR aim to revolutionize security operations by enabling the creation and orchestration of AI-powered agents, enhancing analyst capabilities and automating tasks to combat AI-accelerated adversaries.

agentic-soc ai security-automation
2r
medium advisory

CrowdStrike Agentic MDR and SOC Transformation Services

CrowdStrike's Agentic MDR combines machine-speed execution with expert oversight, leveraging deterministic automation and adaptive AI agents to enhance breach prevention and SOC modernization.

agentic-soc mdr soc-transformation ai
2r 2t
high advisory

CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails Secure AI Agents

CrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails (v0.20.0), providing enterprise-grade protection for AI agents by managing data access, controlling responses, ensuring policy compliance, and blocking prompt injection attacks.

AI-security prompt-injection data-protection
2r 1t
high advisory

Tycoon2FA PhaaS Platform Resurgence After Takedown

The Tycoon2FA phishing-as-a-service (PhaaS) platform, disrupted in March 2026, has resurged with consistent tactics, employing adversary-in-the-middle (AITM) techniques to bypass MFA and compromise email accounts through phishing campaigns, credential theft, and session cookie hijacking.

phishing credential-theft MFA-bypass
2r 2t 1i
high advisory

Tycoon2FA Phishing-as-a-Service Resurgence After Takedown

The Tycoon2FA Phishing-as-a-Service platform, used to bypass multifactor authentication (MFA), has resurged to pre-takedown levels of activity following a disruption effort in March 2026, maintaining its original tactics, techniques, and procedures (TTPs) for credential harvesting and cloud compromise.

phishing credential-theft MFA-bypass phishing-as-a-service
2r 2t 1i
medium advisory

CrowdStrike Falcon Cloud Security CNAPP with Adversary-Informed Risk Prioritization

CrowdStrike's new CNAPP capabilities in Falcon Cloud Security focus on adversary-informed risk prioritization by correlating application-layer visibility with threat actor profiles and techniques, enabling security teams to understand cloud risk, prioritize remediation, and accelerate response.

Lazarus Group +10 cloud-security cnapp threat-intelligence risk-prioritization
3r 2t
medium advisory

CrowdStrike Flex for Services Expands Access to Incident Response Expertise

CrowdStrike is expanding its Falcon Flex model to its services offering, providing flexible access to incident response, proactive security services, advisory, platform services, and training.

incident-response security-services
2r 2t
low advisory

CrowdStrike Falcon Flex for Services Expansion

CrowdStrike is expanding its Falcon Flex model to include its services, offering flexible consumption of expert-led cybersecurity services including incident response and proactive security measures.

incident-response security-services crowdstrike
3r 2t
critical advisory

Compromised trivy-action GitHub Action Enables Credential Theft

The trivy-action GitHub Action was compromised via git tag repointing, with attackers poisoning 76 of 77 release tags to inject a multi-stage credential stealer before the legitimate scanner runs, granting attackers access to CI/CD pipeline secrets.

supply-chain credential-theft github-actions
2r 1t
medium advisory

CrowdStrike Agentic MDR and SOC Transformation Services

CrowdStrike's agentic MDR combines automation, AI agents, and human oversight for rapid breach response, while SOC Transformation Services modernize security operations for an agentic SOC approach.

agentic-soc mdr soc-transformation
3r
medium advisory

CrowdStrike Falcon Data Security Introduction

CrowdStrike's Falcon Data Security aims to protect sensitive data by providing visibility into data movement across various environments and preventing data theft.

data-security data-loss-prevention crowdstrike
2r 2t
medium advisory

CrowdStrike Falcon Enhancements for Securing AI Agents and Governing Shadow AI

CrowdStrike is enhancing its Falcon platform with new AI detection and response capabilities to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud environments, addressing threats like prompt injection and data leaks.

AI-Security Shadow-AI Endpoint-Security
2r
medium advisory

CrowdStrike Falcon Next-Gen SIEM Integrates with Microsoft Defender

CrowdStrike Falcon Next-Gen SIEM now supports third-party EDR solutions, beginning with Microsoft Defender, enabling organizations to extend their AI-native SOC and unify detection across heterogeneous environments.

siem edr microsoft defender crowdstrike falcon
2r 1t
high advisory

Oxygen Theme WordPress Plugin Vulnerable to Server-Side Request Forgery (CVE-2025-12886)

The Oxygen Theme for WordPress is vulnerable to Server-Side Request Forgery (SSRF) in versions up to 6.0.8, allowing unauthenticated attackers to make arbitrary web requests via the laborator_calc_route AJAX action.

ssrf wordpress oxygen-theme cve-2025-12886
2r 1t
high advisory

eswifi Socket Offload Driver Buffer Overflow Vulnerability (CVE-2026-1679)

CVE-2026-1679 describes a vulnerability in the eswifi socket offload driver where user-provided payloads are copied into a fixed buffer without proper size checking, leading to a buffer overflow and kernel memory corruption.

cve-2026-1679 buffer-overflow kernel-memory-corruption
2r 2t
high advisory

WeGIA Web Manager SQL Injection Vulnerability (CVE-2026-33991)

WeGIA web manager prior to version 3.6.7 is vulnerable to SQL injection via the `id_tag` parameter in the `deletar_tag.php` script due to unsanitized input and direct concatenation into SQL queries, potentially allowing attackers to read, modify, or delete data.

cve-2026-33991 sql-injection web-application
2r 1t
high advisory

OpenClaw Gateway Plugin Grants Unrestricted operator.admin Runtime Scope

The openclaw gateway plugin versions 2026.3.24 and earlier incorrectly grants operator.admin runtime scope to all callers, regardless of their granted scopes, potentially allowing unauthorized actions.

openclaw privilege-escalation vulnerability
2r 1t
high advisory

MinIO SSE Metadata Injection via Replication Headers Leads to Data Unreadability

A vulnerability in MinIO allows authenticated users with `s3:PutObject` permission to inject internal server-side encryption metadata into objects via crafted replication headers, leading to permanent data unreadability.

minio s3 metadata-injection denial-of-service
2r 1t
critical advisory

Giskard-agents ChatWorkflow.chat() Server-Side Template Injection

Giskard-agents versions 0.3.3 and earlier, and versions 1.0.1a1 through 1.0.2a1 are vulnerable to remote code execution via server-side template injection where the ChatWorkflow.chat() method passes user-supplied strings directly to a non-sandboxed Jinja2 Environment, allowing attackers to execute arbitrary code on the server.

ssti jinja2 rce giskard-agents vulnerability
2r 1t
high advisory

LinkAce Server-Side Request Forgery Vulnerability (CVE-2026-33953)

LinkAce versions prior to 2.5.3 are vulnerable to server-side request forgery (SSRF), allowing an authenticated user to trigger server-side requests to internal services by referencing internal hostnames.

ssrf linkace vulnerability
2r 1t
high advisory

UniFi Network Controller Improper Certificate Verification Vulnerability (CVE-2019-25652)

UniFi Network Controller versions before 5.10.22 and 5.11.x before 5.11.18 contain an improper certificate verification vulnerability, enabling adjacent network attackers to perform man-in-the-middle attacks by presenting a fraudulent SSL certificate during SMTP connections to intercept traffic and steal credentials.

unifi mitm credential-theft cve-2019-25652
2r 2t
critical advisory

Totolink LR350 Remote Buffer Overflow Vulnerability (CVE-2026-4976)

A buffer overflow vulnerability in Totolink LR350 version 9.3.5u.6369_B20220309 allows a remote attacker to execute arbitrary code by manipulating the 'ssid' argument in the setWiFiGuestCfg function.

cve-2026-4976 buffer-overflow totolink router remote-code-execution
2r 1t
critical advisory

Gematik Authenticator Authentication Flow Hijacking Vulnerability (CVE-2026-33875)

Gematik Authenticator versions prior to 4.16.0 are vulnerable to authentication flow hijacking via malicious deep links, potentially allowing attackers to authenticate with victim user identities.

cve-2026-33875 authentication-hijacking gematik-authenticator deeplink
2r 2t