Skip to content
Threat Feed

March 2026 (30)

high threat

China-Nexus Campaign Using Google Calendar as C2

A China-nexus threat actor is utilizing Google Calendar as a command and control (C2) infrastructure to conduct stealthy operations.

China-nexus actor google-calendar c2 china-nexus
2r 4t
critical advisory

Active Exploitation of SharePoint Deserialization Vulnerability (CVE-2026-20963)

CVE-2026-20963, a SharePoint deserialization vulnerability, is under active exploitation and has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog, requiring immediate patching and auditing of potentially compromised data.

CVE-2026-20963 sharepoint deserialization cisa-kev
2r 1t
high advisory

Potential snap-confine Privilege Escalation via CVE-2026-3888

An unprivileged user may exploit CVE-2026-3888 to escalate privileges to root by creating malicious files in the /tmp/.snap directory.

privilege-escalation linux cve-2026-3888
2r 1t
high advisory

Disruption of Large IoT DDoS Botnets

Law enforcement has disrupted significant IoT botnets responsible for launching record-breaking distributed denial-of-service (DDoS) attacks, impacting the availability of targeted systems.

iot ddos botnet disruption
2r 1t
high threat

VoidStealer Steals Secrets by Debugging Chrome

VoidStealer leverages Chrome debugging capabilities to extract sensitive information, such as credentials and session cookies, directly from the browser's memory.

VoidStealer credential-theft chrome debugging
2r 1t
high threat

Operation GhostMail: Russian APT Exploiting Zimbra XSS to Target Ukraine Government

A Russian APT group is exploiting a Zimbra XSS vulnerability (details unspecified) to target the Ukrainian government in an operation dubbed 'GhostMail'.

Russian APT zimbra xss ukraine apt
2r 1t
high advisory

SnappyClient Malware Delivered via HijackLoader

SnappyClient is a multi-functional malware delivered via HijackLoader that steals data from browsers, takes screenshots, logs keystrokes, and establishes a remote terminal for attacker command and control.

snappyclient hijackloader malware infostealer keylogger
2r 3t
high advisory

Vulnerabilities in Paxton Net2 Access Control Units

Vulnerabilities in Paxton Net2 Access Control Units (ACUs) could allow unauthorized remote access and control of secured doors, potentially affecting prisons and other high-security facilities.

access-control physical-security vulnerability
2r 8t 1i
high advisory

CISA Urges Endpoint Management System Hardening After Cyberattack

CISA is urging hardening of endpoint management systems following a cyberattack against a US organization, highlighting the potential for significant impact via compromised management infrastructure.

endpoint-management supply-chain cisa
2r 5t
high advisory

DarkSword iOS Exploit Used in Infostealer Attack

A new exploit dubbed 'DarkSword' is being actively exploited in infostealer campaigns targeting iPhones, potentially leading to unauthorized data access and device compromise.

ios exploit infostealer darksword
2r 3t
high advisory

Memory Exhaustion Vulnerability in Widely Used Python Library

A memory exhaustion vulnerability (CVE-2026-33155) exists in a widely used Python library, affecting services like SageMaker, DataHub, and acryl-datahub due to an incomplete patch for CVE-2025-58367, requiring pinning to version 8.6.2.

memory-exhaustion vulnerability denial-of-service python supply-chain
2r 1t
high threat

North Korean IT Worker Operation Infiltration Techniques

Analysis of North Korean IT workers reveals techniques for infiltrating Western tech companies, including fake identity creation, internal training, and recruitment of collaborators.

DPRK IT Workers dprk itw infiltration remote-work
2r 2t 1i
high advisory

MOTW Bypass via CAB, TAR, and 7-Zip Chaining

A newly discovered Mark of the Web (MOTW) bypass technique utilizes a chain of CAB, TAR, and 7-Zip archives to circumvent SmartScreen and execute files without security warnings.

motw bypass phishing defense-evasion archive 7-zip cab tar
2r 2t 1i
high advisory

Vulnerabilities Disclosed in IP KVM Devices from Multiple Vendors

Researchers have disclosed unspecified vulnerabilities in IP KVM devices from four manufacturers, potentially allowing attackers to gain unauthorized access to connected systems.

ip-kvm vulnerability remote-access
2r 2t
high advisory

CVE-2026-22729: JSONPath Injection Vulnerability in Spring AI's PgVectorStore

CVE-2026-22729 is a JSONPath Injection vulnerability found in Spring AI's PgVectorStore, potentially allowing for unauthorized data access or modification.

cve-2026-22729 jsonpath-injection spring-ai
2r 1t
critical advisory

Critical XSS Vulnerabilities in AFFiNE

Two critical XSS vulnerabilities, Reflected XSS in the /image-proxy endpoint and Stored XSS in bookmark cards, were discovered in AFFiNE, a self-hosted alternative to Notion, with the vendor being unresponsive.

xss vulnerability affine
2r 1t 2i
high advisory

CISA Urges Securing Microsoft Intune Systems Following Stryker Breach

CISA is urging US organizations to secure their Microsoft Intune systems due to a breach at Stryker, highlighting potential vulnerabilities in cloud-based device management that could lead to unauthorized access and control over managed devices.

microsoft-intune cloud-security device-management cisa-alert
2r 6t
high advisory

DarkSword iOS Exploit Chain Proliferation

The DarkSword exploit chain targets iOS versions 18 and under by exploiting a WebKit vulnerability, and is being adopted by multiple threat actors for initial access and execution.

ios exploit webkit darksword
1r 2t
high threat

Kimsuky Malware Using Dropbox API for Command and Control

Kimsuky is using malware that leverages the Dropbox API for command and control, enabling file exfiltration and remote code execution.

Kimsuky +4 dropbox api command-and-control exfiltration
2r 2t
critical threat

Unpatched GNU Inetutils Telnet Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the GNU Inetutils Telnet server, potentially allowing unauthenticated attackers to execute arbitrary code on vulnerable systems.

telnet rce inetutils
2r 2t
high advisory

CrowdStrike Falcon AIDR Supports NVIDIA NeMo Guardrails for AI Agent Protection

CrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails (v0.20.0) to protect AI agents from prompt injection, data exposure, and unauthorized actions, enabling safer deployment of AI applications.

ai-security prompt-injection data-protection guardrails agentic-ai
2r 6t
medium advisory

StoatWaffle Malware Used by WaterPlum Actor

StoatWaffle is malware employed by the WaterPlum threat actor, used for an unknown purpose.

WaterPlum stoatwaffle malware
2r 1t
high advisory

Interlock Ransomware Campaign Targeting Enterprise Firewalls

The Interlock ransomware campaign is targeting enterprise firewalls to encrypt sensitive data and demand ransom payment.

ransomware firewall network
2r 3t
high advisory

ScreenConnect 26.1 Cryptographic Material Protection Vulnerability

ScreenConnect version 26.1 has a vulnerability related to the insufficient protection of server-level cryptographic material, potentially allowing unauthorized access and data compromise.

screenconnect vulnerability cryptographic-material
2r 1t
critical threat

Warlock Group Deploys Web Shells, Tunnels, and Ransomware

The Warlock group utilizes web shells and tunneling to deploy ransomware within compromised environments, impacting victim data confidentiality and availability.

Warlock webshell ransomware tunneling
2r 4t
high advisory

RegPwnBOF Registry Symlink Race Condition Exploit

RegPwnBOF exploits a registry symlink race condition in the Windows Accessibility ATConfig mechanism, enabling a normal user to write arbitrary values to protected HKLM registry keys for persistence and privilege escalation.

registry symlink race-condition accessibility privilege-escalation persistence windows
2r 2t
critical threat

QEMU Hypervisor Escape via virtio-snd 0-Day

An unpatched vulnerability in QEMU's virtio-snd component allows for a hypervisor escape due to an uncontrolled heap overflow.

virtualization hypervisor qemu virtio-snd heap overflow hypervisor escape
2r 2t
critical advisory

Ubuntu 24.04 Snapd Local Privilege Escalation (CVE-2026-3888)

CVE-2026-3888 allows a local attacker to escalate privileges to root on Ubuntu 24.04 systems due to a vulnerability in the snapd service.

privilege-escalation snapd ubuntu CVE-2026-3888
2r 1t
high advisory

EmEditor Supply Chain Compromise Delivering Infostealer

A trojanized EmEditor installer was distributed through a trusted source, delivering an infostealer, highlighting how attackers exploit legitimate software distribution channels to bypass user trust and security controls.

supply-chain infostealer windows
2r 1t
high advisory

Entra ID Federated Identity Credential Issuer Modified

Modification of the issuer URL of a federated identity credential in Entra ID can allow an attacker to authenticate as the application's service principal, granting persistent access to Azure resources by pointing to an attacker-controlled identity provider and bypassing normal authentication.

azure entra_id federated_identity persistence privilege_escalation
2r 2t