March 2026 (30)
CrowdStrike Falcon Cloud Security CNAPP with Adversary-Informed Risk Prioritization
2 rules 3 TTPsCrowdStrike Falcon Cloud Security enhances CNAPP capabilities with application-layer visibility and adversary-informed risk prioritization, enabling security teams to focus on attacker-aligned risks and known threat actors.
CrowdStrike Falcon Cloud Security Introduces Adversary-Informed Risk Prioritization
2 rules 8 TTPsCrowdStrike's Falcon Cloud Security enhances CNAPP capabilities by introducing adversary-informed risk prioritization, application layer visibility, and root cause analysis of configuration changes, enabling security teams to better understand and remediate cloud risks.
CrowdStrike Agentic MDR and SOC Transformation Services
2 rules 2 TTPsCrowdStrike introduces agentic MDR and SOC Transformation Services to enhance breach prevention through machine-speed execution and expert oversight, while SOC Transformation Services aim to modernize security operations by focusing on SIEM, data pipelines, workflows, talent models, and governance.
CrowdStrike Falcon Enhancements Secure AI Agents and Govern Shadow AI
2 rules 3 TTPsCrowdStrike is enhancing its Falcon platform with AI Detection and Response (AIDR) to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud, addressing threats like prompt injection attacks, data leaks, and policy violations.
CrowdStrike Charlotte AI AgentWorks and Agentic SOAR for Automated Security Operations
2 rulesCrowdStrike introduces Charlotte AI AgentWorks and Agentic SOAR to enhance security operations through AI-driven automation and orchestration, reducing manual workloads and improving decision accuracy.
CrowdStrike Charlotte AI AgentWorks for Agentic SOC Transformation
2 rules 2 TTPsCrowdStrike's Charlotte AI AgentWorks facilitates the development and deployment of AI-driven security agents within the SOC, aiming to enhance analyst capabilities through automated and orchestrated responses to threats.
CrowdStrike Falcon Next-Gen SIEM Supports Third-Party EDR Tools
2 rulesCrowdStrike Falcon Next-Gen SIEM is expanding to support third-party EDR solutions, starting with Microsoft Defender, enabling organizations to extend their AI-native SOC across their ecosystem by unifying detection, investigation, and response.
CrowdStrike Charlotte AI AgentWorks and Agentic SOAR for Agentic Security Operations
2 rulesCrowdStrike's Charlotte AI AgentWorks and Agentic SOAR aim to revolutionize security operations by enabling the creation and orchestration of AI-powered agents, enhancing analyst capabilities and automating tasks to combat AI-accelerated adversaries.
CrowdStrike Agentic MDR and SOC Transformation Services
2 rules 2 TTPsCrowdStrike's Agentic MDR combines machine-speed execution with expert oversight, leveraging deterministic automation and adaptive AI agents to enhance breach prevention and SOC modernization.
CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails Secure AI Agents
2 rules 1 TTPCrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails (v0.20.0), providing enterprise-grade protection for AI agents by managing data access, controlling responses, ensuring policy compliance, and blocking prompt injection attacks.
Tycoon2FA PhaaS Platform Resurgence After Takedown
2 rules 2 TTPs 1 IOCThe Tycoon2FA phishing-as-a-service (PhaaS) platform, disrupted in March 2026, has resurged with consistent tactics, employing adversary-in-the-middle (AITM) techniques to bypass MFA and compromise email accounts through phishing campaigns, credential theft, and session cookie hijacking.
Tycoon2FA Phishing-as-a-Service Resurgence After Takedown
2 rules 2 TTPs 1 IOCThe Tycoon2FA Phishing-as-a-Service platform, used to bypass multifactor authentication (MFA), has resurged to pre-takedown levels of activity following a disruption effort in March 2026, maintaining its original tactics, techniques, and procedures (TTPs) for credential harvesting and cloud compromise.
CrowdStrike Falcon Cloud Security CNAPP with Adversary-Informed Risk Prioritization
3 rules 2 TTPsCrowdStrike's new CNAPP capabilities in Falcon Cloud Security focus on adversary-informed risk prioritization by correlating application-layer visibility with threat actor profiles and techniques, enabling security teams to understand cloud risk, prioritize remediation, and accelerate response.
CrowdStrike Flex for Services Expands Access to Incident Response Expertise
2 rules 2 TTPsCrowdStrike is expanding its Falcon Flex model to its services offering, providing flexible access to incident response, proactive security services, advisory, platform services, and training.
CrowdStrike Falcon Flex for Services Expansion
3 rules 2 TTPsCrowdStrike is expanding its Falcon Flex model to include its services, offering flexible consumption of expert-led cybersecurity services including incident response and proactive security measures.
Compromised trivy-action GitHub Action Enables Credential Theft
2 rules 1 TTPThe trivy-action GitHub Action was compromised via git tag repointing, with attackers poisoning 76 of 77 release tags to inject a multi-stage credential stealer before the legitimate scanner runs, granting attackers access to CI/CD pipeline secrets.
CrowdStrike Agentic MDR and SOC Transformation Services
3 rulesCrowdStrike's agentic MDR combines automation, AI agents, and human oversight for rapid breach response, while SOC Transformation Services modernize security operations for an agentic SOC approach.
CrowdStrike Falcon Data Security Introduction
2 rules 2 TTPsCrowdStrike's Falcon Data Security aims to protect sensitive data by providing visibility into data movement across various environments and preventing data theft.
CrowdStrike Falcon Enhancements for Securing AI Agents and Governing Shadow AI
2 rulesCrowdStrike is enhancing its Falcon platform with new AI detection and response capabilities to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud environments, addressing threats like prompt injection and data leaks.
CrowdStrike Falcon Next-Gen SIEM Integrates with Microsoft Defender
2 rules 1 TTPCrowdStrike Falcon Next-Gen SIEM now supports third-party EDR solutions, beginning with Microsoft Defender, enabling organizations to extend their AI-native SOC and unify detection across heterogeneous environments.
Oxygen Theme WordPress Plugin Vulnerable to Server-Side Request Forgery (CVE-2025-12886)
2 rules 1 TTPThe Oxygen Theme for WordPress is vulnerable to Server-Side Request Forgery (SSRF) in versions up to 6.0.8, allowing unauthenticated attackers to make arbitrary web requests via the laborator_calc_route AJAX action.
eswifi Socket Offload Driver Buffer Overflow Vulnerability (CVE-2026-1679)
2 rules 2 TTPsCVE-2026-1679 describes a vulnerability in the eswifi socket offload driver where user-provided payloads are copied into a fixed buffer without proper size checking, leading to a buffer overflow and kernel memory corruption.
WeGIA Web Manager SQL Injection Vulnerability (CVE-2026-33991)
2 rules 1 TTPWeGIA web manager prior to version 3.6.7 is vulnerable to SQL injection via the `id_tag` parameter in the `deletar_tag.php` script due to unsanitized input and direct concatenation into SQL queries, potentially allowing attackers to read, modify, or delete data.
OpenClaw Gateway Plugin Grants Unrestricted operator.admin Runtime Scope
2 rules 1 TTPThe openclaw gateway plugin versions 2026.3.24 and earlier incorrectly grants operator.admin runtime scope to all callers, regardless of their granted scopes, potentially allowing unauthorized actions.
MinIO SSE Metadata Injection via Replication Headers Leads to Data Unreadability
2 rules 1 TTPA vulnerability in MinIO allows authenticated users with `s3:PutObject` permission to inject internal server-side encryption metadata into objects via crafted replication headers, leading to permanent data unreadability.
Giskard-agents ChatWorkflow.chat() Server-Side Template Injection
2 rules 1 TTPGiskard-agents versions 0.3.3 and earlier, and versions 1.0.1a1 through 1.0.2a1 are vulnerable to remote code execution via server-side template injection where the ChatWorkflow.chat() method passes user-supplied strings directly to a non-sandboxed Jinja2 Environment, allowing attackers to execute arbitrary code on the server.
LinkAce Server-Side Request Forgery Vulnerability (CVE-2026-33953)
2 rules 1 TTPLinkAce versions prior to 2.5.3 are vulnerable to server-side request forgery (SSRF), allowing an authenticated user to trigger server-side requests to internal services by referencing internal hostnames.
UniFi Network Controller Improper Certificate Verification Vulnerability (CVE-2019-25652)
2 rules 2 TTPsUniFi Network Controller versions before 5.10.22 and 5.11.x before 5.11.18 contain an improper certificate verification vulnerability, enabling adjacent network attackers to perform man-in-the-middle attacks by presenting a fraudulent SSL certificate during SMTP connections to intercept traffic and steal credentials.
Totolink LR350 Remote Buffer Overflow Vulnerability (CVE-2026-4976)
2 rules 1 TTPA buffer overflow vulnerability in Totolink LR350 version 9.3.5u.6369_B20220309 allows a remote attacker to execute arbitrary code by manipulating the 'ssid' argument in the setWiFiGuestCfg function.
Gematik Authenticator Authentication Flow Hijacking Vulnerability (CVE-2026-33875)
2 rules 2 TTPsGematik Authenticator versions prior to 4.16.0 are vulnerable to authentication flow hijacking via malicious deep links, potentially allowing attackers to authenticate with victim user identities.