March 2026 (30)
Agent Skill Marketplace Supply Chain Attack via GitHub Account Hijacking
2 rules 1 TTP 2 IOCsA supply chain attack targets agent skill marketplaces by exploiting GitHub username hijacking, allowing threat actors to intercept skill downloads from vulnerable repositories, with scanners showing significant disagreement on malicious skill identification and embedded live API credentials discovered.
Axessh 4.2 Stack-Based Buffer Overflow Vulnerability
2 rules 2 TTPs 1 IOCAxessh 4.2 is vulnerable to a stack-based buffer overflow in the log file name field, allowing local attackers to execute arbitrary code by supplying an excessively long filename.
DVDXPlayer Pro 5.5 Local Buffer Overflow Vulnerability (CVE-2019-25604)
2 rules 2 TTPsDVDXPlayer Pro 5.5 is vulnerable to a local buffer overflow, allowing local attackers to execute arbitrary code by crafting malicious playlist files.
Xenstore Crash Vulnerability via Malicious Node Path Access (CVE-2026-23555)
2 rules 1 TTPA guest VM issuing a Xenstore command with the node path '/local/domain/' can crash xenstored (CVE-2026-23555), or, if NDEBUG is defined, cause denial of service by consuming all CPU resources.
Jsrsasign < 11.1.1 Incorrect Conversion Vulnerability (CVE-2026-4602)
2 rules 1 TTPJsrsasign versions before 11.1.1 are vulnerable to an incorrect conversion between numeric types vulnerability, where an attacker can force the computation of incorrect modular inverses and break signature verification by calling modPow with a negative exponent.
jsrsasign DSA Signing Vulnerability (CVE-2026-4601)
2 rules 1 TTPjsrsasign versions before 11.1.1 are vulnerable to a missing cryptographic step in the DSA signing implementation, allowing an attacker to recover the private key by manipulating the signature generation process.
Jsrsasign Infinite Loop Vulnerability (CVE-2026-4598)
2 rules 1 TTPJsrsasign versions before 11.1.1 are vulnerable to an infinite loop via the bnModInverse function when processing zero or negative inputs, potentially leading to a denial of service.
Belkin F9K1122 Router Stack-Based Buffer Overflow
2 rules 1 TTPA stack-based buffer overflow vulnerability exists in Belkin F9K1122 version 1.00.33, allowing remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the 'formWISP5G' function.
Tenda A15 Router Stack-Based Buffer Overflow (CVE-2026-4567)
2 rules 1 TTPA stack-based buffer overflow vulnerability (CVE-2026-4567) exists in the UploadCfg function of the /cgi-bin/UploadCfg file in Tenda A15 firmware version 15.13.07.13, allowing remote attackers to execute arbitrary code by manipulating the File argument.
Tenda AC21 Router Buffer Overflow Vulnerability
2 rules 1 TTPA buffer overflow vulnerability exists in Tenda AC21 firmware version 16.03.08.16, allowing remote attackers to execute arbitrary code by manipulating arguments to the formSetQosBand function.
WP Maps WordPress Plugin Time-Based SQL Injection Vulnerability (CVE-2026-2580)
2 rules 1 TTPThe WP Maps WordPress plugin before version 4.9.2 is vulnerable to time-based SQL Injection via the 'orderby' parameter, allowing unauthenticated attackers to extract sensitive information from the database.
Inner Warden Security Agent Capabilities
2 rules 1 TTPThe open-source Inner Warden project is a security agent leveraging eBPF for kernel-level monitoring and autonomous response actions like IP blocking and process termination, aiming to create a distributed security mesh.
TeamPCP Deploys CanisterWorm on NPM After Trivy Compromise
2 rules 3 TTPsTeamPCP deployed the CanisterWorm malware on the NPM package registry following a compromise of the Trivy scanning tool.
Trivy Scanner Compromised in Supply Chain Attack
2 rules 3 TTPsThe widely used Trivy scanner has been compromised in an ongoing supply chain attack, potentially impacting numerous organizations using the tool for vulnerability management.
GhostLoader Malware Targeting macOS via GitHub and AI Workflows
2 rules 1 TTPGhostLoader malware leverages GitHub repositories and AI-assisted development workflows to distribute credential-stealing payloads targeting macOS systems.
Claude Code Workspace Trust Dialog Bypass via Settings Loading Order (CVE-2026-33068)
2 rules 1 TTPA maliciously crafted `.claude/settings.json` file in a Claude Code repository (versions prior to 2.1.53) can bypass the workspace trust confirmation dialog by exploiting a configuration loading order defect, allowing for arbitrary code execution within a supposedly untrusted workspace.
Critical Vulnerabilities in Quest KACE SMA Allow System Takeover
2 rules 4 TTPsMultiple critical vulnerabilities in Quest KACE Systems Management Appliance (SMA), including authentication bypass and 2FA bypass, allow unauthenticated attackers to achieve system takeover and cause denial of service; active exploitation is reported.
RagaSerpent 'Tax Audit' Campaign Targeting Multiple Countries
2 rules 1 TTPThe RagaSerpent cluster, also known as SideWinder-Adjacent, is conducting targeted attacks across multiple countries between 2025 and 2026, associated with a 'Tax Audit' themed campaign.
Trivy Security Scanner GitHub Actions Tag Hijacking for CI/CD Secret Theft
2 rules 4 TTPsAttackers hijacked 75 tags associated with the Trivy Security Scanner GitHub Actions to steal CI/CD secrets from users of the compromised tags.
UniFi Network Application Vulnerabilities CVE-2026-22557 and CVE-2026-22558
2 rules 2 TTPsA combination of path traversal (CVE-2026-22557) and NoSQL injection (CVE-2026-22558) vulnerabilities in the UniFi Network Application allows attackers to access files, escalate privileges, and potentially compromise the entire system.
Speagle Malware Hijacks Cobra DocGuard for Data Exfiltration
2 rules 1 TTPThe Speagle malware hijacks the Cobra DocGuard application to exfiltrate sensitive data from infected machines to attacker-controlled Cobra DocGuard servers, effectively masking malicious traffic as legitimate DocGuard communication.
China-Nexus Campaign Using Google Calendar as C2
2 rules 4 TTPsA China-nexus threat actor is utilizing Google Calendar as a command and control (C2) infrastructure to conduct stealthy operations.
Active Exploitation of SharePoint Deserialization Vulnerability (CVE-2026-20963)
2 rules 1 TTPCVE-2026-20963, a SharePoint deserialization vulnerability, is under active exploitation and has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog, requiring immediate patching and auditing of potentially compromised data.
Potential snap-confine Privilege Escalation via CVE-2026-3888
2 rules 1 TTPAn unprivileged user may exploit CVE-2026-3888 to escalate privileges to root by creating malicious files in the /tmp/.snap directory.
Disruption of Large IoT DDoS Botnets
2 rules 1 TTPLaw enforcement has disrupted significant IoT botnets responsible for launching record-breaking distributed denial-of-service (DDoS) attacks, impacting the availability of targeted systems.
VoidStealer Steals Secrets by Debugging Chrome
2 rules 1 TTPVoidStealer leverages Chrome debugging capabilities to extract sensitive information, such as credentials and session cookies, directly from the browser's memory.
Operation GhostMail: Russian APT Exploiting Zimbra XSS to Target Ukraine Government
2 rules 1 TTPA Russian APT group is exploiting a Zimbra XSS vulnerability (details unspecified) to target the Ukrainian government in an operation dubbed 'GhostMail'.
SnappyClient Malware Delivered via HijackLoader
2 rules 3 TTPsSnappyClient is a multi-functional malware delivered via HijackLoader that steals data from browsers, takes screenshots, logs keystrokes, and establishes a remote terminal for attacker command and control.
Vulnerabilities in Paxton Net2 Access Control Units
2 rules 8 TTPs 1 IOCVulnerabilities in Paxton Net2 Access Control Units (ACUs) could allow unauthorized remote access and control of secured doors, potentially affecting prisons and other high-security facilities.
CISA Urges Endpoint Management System Hardening After Cyberattack
2 rules 5 TTPsCISA is urging hardening of endpoint management systems following a cyberattack against a US organization, highlighting the potential for significant impact via compromised management infrastructure.