March 2026 (30)
Apache CXF Vulnerability Allows DoS and Information Disclosure
2 rules 2 TTPsAn anonymous remote attacker can exploit a vulnerability in Apache CXF to perform a denial of service attack and disclose sensitive information.
Blinko Pre-1.8.4 OS Command Injection Vulnerability
2 rules 1 TTPBlinko versions before 1.8.4 are vulnerable to OS Command Injection (CWE-78), where the MCP server creation function allows specifying arbitrary commands and arguments that are executed when testing the connection, potentially leading to code execution for attackers with high privileges.
CODESYS Control Runtime System Audit Log DoS Vulnerability (CVE-2026-3509)
2 rules 1 TTPAn unauthenticated remote attacker can exploit CVE-2026-3509 in the CODESYS Control runtime system to control the format string of messages processed by the Audit Log, leading to a denial-of-service (DoS) condition.
CPython Zipfile Module Vulnerability Allows File Manipulation
2 rules 1 TTPA remote, anonymous attacker can exploit a vulnerability in the zipfile module of CPython to manipulate files on affected systems.
CVE-2026-4675: Google Chrome WebGL Heap Buffer Overflow Vulnerability
2 rules 2 TTPsA heap buffer overflow vulnerability (CVE-2026-4675) exists in Google Chrome's WebGL implementation prior to version 146.0.7680.165, allowing a remote attacker to perform an out-of-bounds memory read via a specially crafted HTML page, potentially leading to information disclosure or arbitrary code execution.
Device Code Phishing Campaign Targeting Cloud Platforms
2 rules 2 TTPsA phishing campaign abuses Microsoft's Device Code OAuth flow to gain access to cloud-based file storage and document workflow platforms, bypassing traditional credential harvesting.
Firefox and Thunderbird Memory Safety Vulnerability (CVE-2026-4720)
2 rules 2 TTPsA memory safety vulnerability (CVE-2026-4720) in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 could lead to memory corruption and potential arbitrary code execution if successfully exploited.
GoHarbor Harbor v2.15.0 and Below Vulnerable to Hardcoded Credentials
2 rules 1 TTPGoHarbor Harbor version 2.15.0 and below is vulnerable to the use of hard-coded credentials, allowing an attacker to use the default password and gain unauthorized access to the web UI.
Google Chrome WebAudio Heap Buffer Overflow Vulnerability (CVE-2026-4673)
2 rules 1 TTPA remote attacker can exploit a heap buffer overflow vulnerability (CVE-2026-4673) in Google Chrome's WebAudio component before version 146.0.7680.165 by crafting a malicious HTML page, potentially leading to an out-of-bounds memory write and arbitrary code execution.
Langflow GitHub Actions Shell Injection Vulnerability
2 rules 2 TTPs 1 IOCUnauthenticated remote shell injection vulnerability exists in Langflow GitHub Actions workflows prior to version 1.9.0, enabling attackers to execute arbitrary shell commands via malicious branch names or pull request titles due to unsanitized GitHub context variable interpolation, leading to potential secret exfiltration and supply chain compromise.
Langflow Path Traversal Vulnerability (CVE-2026-33497)
2 rules 1 TTPA path traversal vulnerability in Langflow versions before 1.7.1 allows unauthenticated attackers to read sensitive files via the download_profile_picture endpoint due to insufficient filtering of the folder_name and file_name parameters.
LiteLLM Package Compromised with Credential-Stealing Code via Trivy
2 rules 1 TTPThe LiteLLM package was compromised and infected with credential-stealing code through a supply chain attack leveraging the Trivy vulnerability scanner.
Multiple Vulnerabilities in GnuPG and Gpg4win Allow for Arbitrary Code Execution and Denial of Service
2 rules 2 TTPsMultiple vulnerabilities exist in GnuPG and Gpg4win that could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.
Palo Alto Networks Recruiting Impersonation Phishing Campaign
2 rules 2 TTPs 6 IOCsSince August 2025, threat actors have been impersonating Palo Alto Networks talent acquisition staff in a sophisticated phishing campaign targeting senior professionals, using social engineering tactics to solicit fraudulent resume fees.
IBM WebSphere Application Server Liberty Multiple Vulnerabilities
2 rules 3 TTPsA remote, authenticated attacker can exploit multiple vulnerabilities in IBM WebSphere Application Server Liberty to escalate privileges, bypass security measures, and disclose information.
TIBCO ActiveMatrix Vulnerability Allows Information Disclosure and Data Manipulation
2 rules 2 TTPsA remote, authenticated attacker can exploit a vulnerability in TIBCO ActiveMatrix and TIBCO Administrator to disclose information and manipulate data, potentially leading to unauthorized access and control.
Langflow Vulnerability Allows Arbitrary Code Execution
2 rules 1 TTPA vulnerability in Langflow allows an attacker to execute arbitrary code, potentially leading to system compromise.
M-Trends 2026: Evolving Threat Landscape
3 rules 10 TTPsThe M-Trends 2026 report highlights the increasing sophistication of threat actors, including voice phishing attacks targeting SaaS environments, ransomware groups actively destroying recovery capabilities, and espionage groups exploiting edge devices for persistent access, revealing a shift towards faster hand-offs between initial access brokers and ransomware deployers.
NICKEL ALLEY Targeting Developers with Fake Job Opportunities
2 rules 5 TTPs 4 IOCsNICKEL ALLEY, a North Korean threat group, is targeting technology professionals with fake job opportunities and malicious code repositories to deliver malware like PyLangGhost RAT and BeaverTail, aiming to steal cryptocurrency.
Multiple Vulnerabilities in Redis
2 rules 2 TTPsMultiple vulnerabilities in Redis allow an attacker to execute arbitrary program code and perform a denial-of-service attack.
Multiple Vulnerabilities in Red Hat Developer Hub
2 rules 8 TTPsMultiple vulnerabilities in Red Hat Developer Hub allow a remote attacker to perform denial of service, execute arbitrary code, bypass security measures, and manipulate data.
Red Hat JBoss Enterprise Application Platform Multiple Vulnerabilities
2 rules 3 TTPsAn anonymous remote attacker can exploit multiple vulnerabilities in Red Hat JBoss Enterprise Application Platform to cause a denial-of-service condition, manipulate data, and conduct further attacks such as cache poisoning and session hijacking.
Multiple Vulnerabilities in Grub Bootloader
2 rules 2 TTPsMultiple vulnerabilities in the Grub bootloader allow attackers to execute arbitrary code and cause denial-of-service conditions.
RedHat Multicluster Engine for Kubernetes Privilege Escalation Vulnerability
2 rules 1 TTPA local attacker can exploit a vulnerability in RedHat Multicluster Engine for Kubernetes to escalate privileges.
Multiple Vulnerabilities in Apache Tomcat Allow for Remote Code Execution and Data Manipulation
2 rules 3 TTPsMultiple vulnerabilities in Apache Tomcat can be exploited by a remote, authenticated or anonymous attacker to execute arbitrary code, bypass security measures, manipulate data, and cause a denial of service.
Red Hat OpenShift GitOps Multiple Vulnerabilities
2 rules 1 TTPAn anonymous remote attacker can exploit multiple vulnerabilities in Red Hat OpenShift GitOps to manipulate data, misrepresent information, or cause a denial of service.
Asterisk and Digium Certified Asterisk Vulnerabilities
2 rules 8 TTPsAn authenticated remote attacker can exploit vulnerabilities in Asterisk and Digium Certified Asterisk to achieve arbitrary code execution, denial of service, or information disclosure.
IBM Tivoli Netcool/OMNIbus Multiple Vulnerabilities
2 rules 3 TTPsAn anonymous remote attacker can exploit multiple vulnerabilities in IBM Tivoli Netcool/OMNIbus to achieve arbitrary code execution, information disclosure, file manipulation, or denial of service.
Uncontrolled VM Growth Leading to Security Gaps in Cloud Environments
2 rules 7 TTPsUncontrolled growth of virtual machines (VM sprawl) in cloud environments allows attackers to exploit unmonitored VMs with overly permissive access for lateral movement, data exfiltration, and ransomware deployment.
Red Hat Enterprise Linux Vulnerability Leads to Code Execution and Potential DoS
2 rules 3 TTPsA remote, authenticated attacker can exploit a vulnerability in Red Hat Enterprise Linux (specifically 389-ds-base) to achieve arbitrary code execution and potentially cause a denial of service.