Skip to content
Threat Feed

Type

Threat

103 briefs RSS
critical threat

Critical Authentication Bypass Vulnerability in MOVEit Automation (CVE-2026-4670)

A critical authentication bypass vulnerability (CVE-2026-4670) in Progress MOVEit Automation allows an unauthenticated remote attacker to gain administrative access, potentially leading to full control over the application and sensitive file transfer workflows.

exploited MOVEit Automation +3 authentication-bypass privilege-escalation cve-2026-4670 cve-2026-5174 webserver
2r 2t 2c
medium threat

Multiple Vulnerabilities in Mutt Email Client Lead to Potential DoS

A remote, anonymous attacker can exploit multiple vulnerabilities in mutt to bypass security measures and cause a denial-of-service condition.

exploited mutt denial-of-service email
2r 3t
critical threat

Totolink WA300 Buffer Overflow Vulnerability in UploadCustomModule

A remote buffer overflow vulnerability exists in the UploadCustomModule function of the /cgi-bin/cstecgi.cgi file in the POST Request Handler component of Totolink WA300 version 5.2cu.7112_B20190227, which can be exploited by manipulating the File argument.

WA300 5.2cu.7112_B20190227 buffer-overflow remote-code-execution router
2r 1t 1c
critical threat

Shenzhen Libituo Technology LBT-T300-HW1 Buffer Overflow Vulnerability

A buffer overflow vulnerability exists in Shenzhen Libituo Technology LBT-T300-HW1 version 1.2.8 and earlier, allowing remote attackers to execute arbitrary code by manipulating the Channel/ApCliSsid argument in the start_lan function of the /apply.cgi file.

LBT-T300-HW1 buffer overflow remote code execution web application vulnerability
2r 1t 1c
critical threat

Shenzhen Libituo Technology LBT-T300-HW1 Buffer Overflow Vulnerability

A buffer overflow vulnerability (CVE-2026-7674) exists in the Web Management Interface of Shenzhen Libituo Technology LBT-T300-HW1 devices, allowing remote attackers to execute arbitrary code by manipulating the vpn_pptp_server or vpn_l2tp_server arguments in the start_single_service function.

LBT-T300-HW1 buffer-overflow web-management-interface cve-2026-7674
2r 1t 1c
high threat

Jinher OA 1.0 SQL Injection Vulnerability (CVE-2026-7670)

Jinher OA 1.0 is vulnerable to remote SQL injection via the DeptIDList parameter in the /C6/JHSoft.Web.PlanSummarize/UserSel.aspx file, potentially allowing attackers to execute arbitrary SQL queries.

OA 1.0 sql-injection cve-2026-7670 web-application
2r 1t 1c
high threat

InnoShop Improper Authentication Vulnerability (CVE-2026-7630)

InnoShop version 0.7.8 and earlier contains an improper authentication vulnerability in the InstallServiceProvider::boot function (CVE-2026-7630) that allows remote attackers to bypass authentication and gain unauthorized access to the installation endpoint.

exploited InnoShop cve authentication bypass web application
2r 1t 1c
high threat

PixelYourSite Pro WordPress Plugin SSRF Vulnerability (CVE-2026-7049)

The PixelYourSite Pro WordPress plugin is vulnerable to server-side request forgery (SSRF), allowing unauthenticated attackers to make arbitrary web requests from the server, potentially querying or modifying internal services.

PixelYourSite Pro – Your smart PIXEL ssrf wordpress plugin
2r 1t 1c
critical threat

WordPress User Verification Plugin Authentication Bypass Vulnerability

The User Verification by PickPlugins plugin for WordPress is vulnerable to authentication bypass in versions up to 2.0.46 due to a loose PHP comparison, allowing unauthenticated attackers to log in as any verified user by submitting a 'true' OTP value.

User Verification by PickPlugins plugin for WordPress <= 2.0.46 wordpress authentication bypass cve-2026-7458
2r 1t 1c
high threat

Increased npm Supply Chain Attacks Targeting SAP Developers

Threat actors are compromising npm packages, including those targeting SAP developers, to steal credentials, embed themselves in CI/CD pipelines, and deploy multi-stage payloads using techniques like wormable propagation and covert C2 channels on GitHub.

@bitwarden/cli +6 TeamPCP npm supply-chain credential-theft github
2r 5t 3i
critical threat

Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7333)

CVE-2026-7333 is a use-after-free vulnerability in the GPU component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.

Chrome +1 use-after-free chromium gpu cve-2026-7333 remote code execution
2r 1c
critical threat

UTT HiPER 1200GW Buffer Overflow Vulnerability

A buffer overflow vulnerability exists in UTT HiPER 1200GW devices up to version 2.5.3-170306, stemming from manipulation of the `strcpy` function in the `/goform/formRemoteControl` file, which allows remote attackers to execute arbitrary code.

HiPER 1200GW buffer-overflow iot router cve
2r 1t 1c
critical threat

IBM Langflow Desktop Vulnerable to Remote Command Execution (CVE-2026-6543)

IBM Langflow Desktop versions 1.0.0 through 1.8.4 are vulnerable to remote command execution, allowing an attacker to execute arbitrary commands with the privileges of the Langflow process, potentially leading to sensitive data exposure and lateral movement.

Langflow Desktop cve-2026-6543 command execution code injection ibm langflow
3r 1t 1c
high threat

Q1 2026 Email Threat Landscape: Rise in Phishing Techniques and Tycoon2FA Disruption

In Q1 2026, email threats increased, including credential phishing, QR code phishing, and CAPTCHA-gated campaigns, with Microsoft's disruption of the Tycoon2FA phishing platform leading to a 15% volume decrease and shifts in threat actor tactics; BEC activity remained prevalent at 10.7 million attacks.

Microsoft Defender Storm-1747 email phishing credential-theft Tycoon2FA BEC
2r 1t
critical threat

Mini Shai-Hulud Supply Chain Attack Targets SAP NPM Packages

The Mini Shai-Hulud campaign injected malicious code into SAP NPM packages, targeting credentials and cloud secrets related to SAP Cloud Application Programming (CAP) and SAP cloud deployment workflows, exfiltrating data through public GitHub repositories.

Cloud Application Programming +5 TeamPCP supply-chain npm sap credential-theft
2r 1t
critical threat

Local Privilege Escalation Vulnerability 'Copy Fail' in Linux Kernel

A local privilege escalation vulnerability, dubbed 'Copy Fail' (CVE-2026-31431), affects Linux kernels released since 2017, allowing an unprivileged local attacker to gain root permissions by exploiting a logic bug in the authencesn cryptographic template.

Linux kernel +4 Theori privilege-escalation linux vulnerability
2r 1t 1c
critical threat

Critical Authentication Bypass Vulnerability in cPanel & WHM (CVE-2026-41940)

CVE-2026-41940 is a critical authentication bypass vulnerability in cPanel & WHM, allowing unauthenticated remote attackers to gain administrative access by manipulating session data.

exploited cPanel & WHM authentication bypass cPanel web hosting vulnerability
2r 1t 1c
high threat

Unpatched Microsoft Windows RPC Vulnerability Allows Privilege Escalation

A local attacker can exploit an unpatched vulnerability in Microsoft Windows RPC to escalate privileges.

Windows RPC privilege-escalation windows unpatched-vulnerability
2r 1t
high threat

Multiple Vulnerabilities in SonicWall SonicOS Allow Privilege Escalation and DoS

Multiple vulnerabilities in SonicWall SonicOS allow a remote attacker to escalate privileges, bypass security measures, or cause a denial-of-service condition.

exploited SonicOS sonicwall vulnerability privilege-escalation denial-of-service
2r 3t 3c
critical threat

Compromised SAP npm Packages Steal Developer Credentials

Multiple official SAP npm packages were compromised via a supply chain attack, likely by TeamPCP, to steal credentials and authentication tokens from developers' systems.

Cloud Application Programming Model +1 TeamPCP supply-chain credential-theft npm
2r 5t
high threat

Elinsky execution-system-mcp Path Traversal Vulnerability

Elinsky execution-system-mcp 0.1.0 is vulnerable to path traversal via manipulation of the context argument in the _get_context_file_path function, allowing remote attackers to access sensitive files.

exploited execution-system-mcp 0.1.0 path-traversal web-application cve-2026-7319
2r 1t 1c
high threat

UNC6692 Combines Social Engineering, Malware, and Cloud Abuse

UNC6692 is a newly discovered, financially motivated threat actor that combines social engineering via Microsoft Teams, custom malware named SNOWBELT, and abuse of legitimate AWS S3 cloud infrastructure in its attack campaigns to steal credentials and prepare for data exfiltration.

Microsoft Teams +1 UNC6692 social-engineering malware cloud-abuse credential-theft lateral-movement
2r 12t
high threat

dvladimirov MCP Git Search API Command Injection Vulnerability

A command injection vulnerability (CVE-2026-7211) exists in the GitSearchRequest function of dvladimirov MCP up to version 0.1.0, allowing a remote attacker to execute arbitrary commands by manipulating the repo_url or pattern argument.

exploited MCP command-injection vulnerability git-search-api
2r 1t 1c
high threat

dubydu sqlite-mcp SQL Injection Vulnerability (CVE-2026-7206)

A SQL injection vulnerability exists in dubydu sqlite-mcp version 0.1.0 and earlier within the extract_to_json function allowing remote exploitation through manipulation of the output_filename argument.

exploited sqlite-mcp sql-injection cve-2026-7206 web-application
2r 1c
high threat

BlueNoroff Targeting Web3 Sector via Spear Phishing

BlueNoroff, a subgroup of the Lazarus Group, is targeting North American Web3 companies through spear-phishing campaigns, impersonating Fintech legal professionals.

BlueNoroff +3 spear-phishing web3 cryptocurrency fintech
2r 1t
critical threat

Rclone Unauthenticated Remote Code Execution Vulnerabilities

Rclone versions prior to 1.73.5 are vulnerable to two critical unauthenticated remote code execution vulnerabilities (CVE-2026-41176 and CVE-2026-41179) when the remote control API is enabled without authentication, potentially allowing attackers to execute arbitrary commands and compromise the system.

exploited Rclone vulnerability rce cloud
2r 2t 2c
high threat

Trigona Ransomware Employing Custom Data Exfiltration Tool

Trigona ransomware is using a custom data exfiltration tool named 'uploader_client.exe' to steal data from compromised environments, enhancing speed and evasion.

Windows +3 Trigona ransomware data exfiltration custom tool
2r 4t 1i
critical threat

UAT-4356 FIRESTARTER Backdoor Targeting Cisco Firepower Devices

UAT-4356 is actively targeting Cisco Firepower devices running FXOS, exploiting CVE-2025-20333 and CVE-2025-20362 to deploy the FIRESTARTER backdoor which allows remote access and control by injecting malicious shellcode into the LINA process.

Firepower eXtensible Operating System +2 UAT-4356 firestarter cisco backdoor network espionage
2r 2t 2c 2i
high threat

China-Nexus Cyber Actors Using Covert Networks of Compromised Devices

China-nexus cyber actors are increasingly using large-scale networks of compromised devices, including SOHO routers and IoT devices, to obscure the origin of their attacks and conduct various malicious activities, from reconnaissance to data exfiltration.

SOHO Routers +5 China-nexus cyber actors covert-network botnet china-nexus compromised-devices
2r 4t
medium threat

NVIDIA KAI Scheduler Authentication Bypass Vulnerability

CVE-2026-24177 describes an authentication bypass vulnerability in NVIDIA KAI Scheduler that could allow unauthorized access to API endpoints, leading to information disclosure.

exploited vulnerability authentication-bypass nvidia
2r 2t 1c
critical threat

JetBrains TeamCity Authentication Bypass and Path Traversal Vulnerabilities

Unpatched JetBrains TeamCity servers are being actively exploited via an authentication bypass (CVE-2024-27198) and path traversal vulnerability (CVE-2024-27199), allowing attackers to perform administrative actions and potentially conduct supply-chain attacks.

exploited teamcity vulnerability authentication bypass path traversal supply-chain
2r 1t 2c
critical threat

Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability

Cisco Catalyst SD-WAN Manager contains an incorrect use of privileged APIs vulnerability due to improper file handling on the API interface, allowing an attacker to upload a malicious file and overwrite arbitrary files to gain vmanage user privileges.

exploited Catalyst SD-WAN Manger cve-2026-20122 privilege-escalation sd-wan
2r 2t 1c
high threat

KodExplorer Path Traversal Vulnerability (CVE-2026-6568)

KodExplorer up to version 4.52 is vulnerable to a path traversal attack via manipulation of the path argument in the share.class.php::initShareOld function, potentially allowing remote attackers to access sensitive files.

exploited path-traversal kodexplorer cve-2026-6568
2r 1t 1c 5i
critical threat

Payouts King Ransomware Abusing QEMU VMs for Defense Evasion

The Payouts King ransomware is leveraging QEMU VMs as a reverse SSH backdoor to execute payloads, store malicious files, and establish covert remote access tunnels, bypassing endpoint security measures.

GOLD ENCOUNTER payouts-king ransomware qemu vm defense-evasion
2r 8t 1c 1i
critical threat

Sagredo qmail Remote Code Execution Vulnerability (CVE-2026-41113)

A remote code execution vulnerability exists in Sagredo qmail versions prior to 2026.04.07 due to the use of `popen` in the `notlshosts_auto` function within `qmail-remote.c`, potentially leading to OS command injection.

exploited qmail rce command-injection CVE-2026-41113
2r 3t 1c 1i
critical threat

Microsoft April 2026 Patch Tuesday Addresses 163 Vulnerabilities

Microsoft's April 2026 Patch Tuesday addresses 163 vulnerabilities, including 8 critical ones, ranging from Tampering to Remote Code Execution and Privilege Escalation, affecting various Microsoft products; it is recommended to apply patches immediately.

exploited patch-tuesday vulnerability remote-code-execution privilege-escalation windows
2r 4t 6c
high threat

Windows SSDP Service Race Condition Privilege Escalation (CVE-2026-32068)

CVE-2026-32068 is a race condition vulnerability in the Windows SSDP Service that allows an authorized attacker to elevate privileges locally.

exploited cve-2026-32068 privilege-escalation windows
2r 1t 1c
high threat

Microsoft Office Word Use-After-Free Vulnerability (CVE-2026-33095)

A use-after-free vulnerability in Microsoft Office Word (CVE-2026-33095) could allow a local attacker to execute arbitrary code by opening a specially crafted document.

exploited cve-2026-33095 use-after-free microsoft-office word code-execution
2r 1t 1c 1i
high threat

CVE-2026-27917: Windows WFP NDIS Lightweight Filter Driver Use-After-Free Vulnerability

CVE-2026-27917 is a use-after-free vulnerability in the Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) that allows a locally authorized attacker to elevate privileges.

exploited cve-2026-27917 use-after-free privilege-escalation windows
2r 1t 1c
critical threat

NocoBase plugin-workflow-javascript Sandbox Escape Vulnerability

A remote code execution vulnerability exists in NocoBase plugin-workflow-javascript versions up to 2.0.23 due to a sandbox escape in the createSafeConsole function, allowing unauthenticated attackers to potentially execute arbitrary code on the server.

exploited nocobase rce sandbox-escape cve-2026-6224
2r 1t 1c
critical threat

Adobe Acrobat and Reader CVE-2026-34621 Zero-Day Exploitation

Adobe patched CVE-2026-34621, a zero-day vulnerability in Acrobat and Reader exploited since December, allowing malicious PDFs to bypass sandboxes and execute arbitrary code, potentially leading to local file theft.

exploited adobe acrobat reader rce vulnerability
2r 2t 1c 1i
medium threat

Azure Service Principal Sign-In Followed by Arc Cluster Credential Access

Detects a service principal authenticating to Azure AD followed by listing credentials for an Azure Arc-connected Kubernetes cluster, indicating potential adversary activity with stolen service principal secrets to establish a proxy tunnel into Kubernetes clusters.

exploited azure azure-arc credential-access initial-access
2r 3t
critical threat

Tenda F451 Router Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability in the Tenda F451 router (version 1.0.0.7) allows remote attackers to execute arbitrary code by manipulating the 'page' argument in the fromRouteStatic function of the /goform/RouteStatic file.

exploited tenda router buffer_overflow rce
2r 3t 1c
high threat

WordPress adivaha Travel Plugin SQL Injection Vulnerability (CVE-2023-54359)

The WordPress adivaha Travel Plugin version 2.3 is vulnerable to time-based blind SQL injection via the 'pid' GET parameter, allowing unauthenticated attackers to inject SQL code through the /mobile-app/v3/ endpoint for potential data extraction or denial of service.

exploited wordpress sql-injection cve-2023-54359
2r 1t 1c 2i
high threat

PHPGurukul News Portal Project SQL Injection Vulnerability (CVE-2026-5837)

PHPGurukul News Portal Project version 4.1 is vulnerable to SQL injection via the Comment parameter in /news-details.php, potentially allowing remote attackers to execute arbitrary SQL queries.

exploited sql-injection web-application php CVE-2026-5837
2r 1t 1c
critical threat

Fortinet FortiClient EMS Unauthenticated Remote Code Execution via CVE-2026-35616

A critical vulnerability, CVE-2026-35616, exists in Fortinet FortiClient EMS (Endpoint Management Server) allowing unauthenticated attackers to bypass API authentication and authorization checks to execute arbitrary code or commands, potentially leading to full compromise of the EMS infrastructure.

exploited fortinet forticlient ems rce cve-2026-35616
2r 2t 1c
critical threat

Critical Vulnerability CVE-2026-35616 Exploited in FortiClient EMS

CVE-2026-35616, a critical vulnerability in FortiClient EMS, allows unauthenticated remote attackers to execute arbitrary code or commands via crafted API requests due to improper access control, with Fortinet confirming active exploitation.

exploited fortinet forticlient ems cve-2026-35616 vulnerability
2r 1t 1c
critical threat

Drift Protocol $280M Crypto Theft Linked to North Korean Hackers

The Drift Protocol suffered a $280 million crypto theft orchestrated by North Korean hackers who spent six months building an in-person operational presence within the Drift ecosystem, engaging with contributors at crypto conferences and via Telegram.

UNC4736 (Lazarus Group) drift-protocol crypto-theft north-korea unc4736 lazarus-group social-engineering supply-chain
2r 1t
high threat

Qualcomm IOCTL Memory Corruption Vulnerability

A memory corruption vulnerability (CVE-2026-21372) exists when processing IOCTL requests with invalid buffer sizes leading to a heap-based buffer overflow, reported by Qualcomm with a CVSS v3.1 score of 7.8.

Qualcomm cve-2026-21372 memory-corruption heap-overflow ioctl
2r 1t 1c 1i
critical threat

Fosowl agenticSeek 0.1.0 Code Injection Vulnerability (CVE-2026-5584)

A code injection vulnerability (CVE-2026-5584) exists in Fosowl agenticSeek 0.1.0, allowing remote attackers to execute arbitrary code by manipulating the query endpoint through the PyInterpreter.execute function.

exploited code-injection vulnerability fosowl cve-2026-5584
2r 1t 1c
high threat

SQL Injection Vulnerability in Concert Ticket Reservation System

A remote attacker can exploit CVE-2026-5554 in code-projects Concert Ticket Reservation System 1.0 to perform SQL injection by manipulating the searching argument in the process_search.php file.

exploited sql-injection web-application vulnerability
2r 1t 1c
critical threat

Axios npm Package Compromised via Social Engineering

North Korean threat actors (UNC1069) compromised the Axios npm package by socially engineering a maintainer with a fake Microsoft Teams update delivering a RAT, leading to the injection of a malicious dependency and a supply chain attack.

UNC1069 supply chain attack npm social engineering rat
2r 7t
high threat

Rise in Software Supply Chain Attacks Targeting Open-Source Libraries

Multiple supply chain attacks, including the compromise of Axios and Trivy via hijacked GitHub repositories by TeamPCP, demonstrate the increasing threat to open-source software.

TeamPCP supply-chain software-compromise github
3r 1t
high threat

SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0

A SQL injection vulnerability exists in itsourcecode Online Enrollment System 1.0 within the Parameter Handler component at /enrollment/index.php, where manipulating the deptid argument can lead to remote code execution, with public exploits available.

exploited sql-injection web-application cve-2026-5334
2r 1t 1c
critical threat

BRICKSTORM Malware Targeting VMware vSphere Environments

The BRICKSTORM malware targets VMware vSphere environments, specifically vCenter Server Appliance (VCSA) and ESXi hypervisors, by exploiting weak security configurations to establish persistence at the virtualization layer, leading to administrative control and potential data exfiltration.

BRICKSTORM vsphere virtualization persistence lateral-movement
2r 2t
high threat

TrueConf Zero-Day Exploitation Leading to Arbitrary Code Execution

Hackers exploited a zero-day vulnerability (CVE-2026-3502) in TrueConf conference servers to execute arbitrary files on connected endpoints, potentially deploying the Havoc C2 framework.

exploited TrueChaos trueconf zero-day cve-2026-3502 supply-chain attack
2r 3t 1c 4i
critical threat

Qilin Ransomware EDR Killer Infection Chain

Qilin ransomware employs a malicious msimg32.dll in a multi-stage infection chain to disable endpoint detection and response (EDR) solutions by evading detection and terminating EDR processes.

Qilin Ransomware qilin edr-killer ransomware defense-evasion windows
2r 3t 1i
high threat

Potential JAVA/JNDI Exploitation Attempt

This rule detects a potential JAVA/JNDI exploitation attempt by identifying outbound network connections by JAVA to LDAP, RMI, or DNS standard ports followed by suspicious JAVA child processes such as shell interpreters and scripting languages, which may indicate a Java Naming and Directory Interface (JNDI) injection vulnerability exploitation attempt.

exploited jndi java log4shell rce exploitation
2r 5t 1c
critical threat

F5 BIG-IP APM CVE-2025-53521 Reclassified as Actively Exploited Unauthenticated RCE

F5 has reclassified CVE-2025-53521, a vulnerability in BIG-IP APM, as a critical unauthenticated remote code execution vulnerability and reports it is being actively exploited in the wild.

exploited f5 big-ip apm cve-2025-53521 rce vulnerability
2r 1t 1c
critical threat

Critical Vulnerabilities in NetScaler ADC and Gateway Allow Sensitive Data Exposure and Session Hijacking

Unauthenticated attackers can exploit CVE-2026-3055 (out-of-bounds read) to exfiltrate sensitive data from NetScaler ADC and Gateway, while CVE-2026-4368 (race condition) enables user session hijacking, necessitating immediate patching and enhanced monitoring.

exploited netscaler cve-2026-3055 cve-2026-4368 out-of-bounds read race condition memory corruption session hijacking
2r 1t 2c
critical threat

Citrix NetScaler ADC and Gateway CVE-2026-3055 Exploitation

Threat actors are actively exploiting CVE-2026-3055, a critical memory overread vulnerability in Citrix NetScaler ADC and NetScaler Gateway appliances configured as a SAML identity provider (IDP), to extract sensitive information, including authenticated administrative session IDs, potentially leading to full system takeover.

citrix netscaler cve-2026-3055 memory-overread information-disclosure
2r 3t
critical threat

Compromised Telnyx PyPI Package Distributes Credential-Stealing Malware

A threat actor compromised the PyPI package `telnyx`, uploading malicious versions 4.87.1 and 4.87.2 containing credential-stealing malware that exfiltrates data to a C2 server.

TeamPCP supply-chain pypi credential-theft
2r 7t 7i
high threat

CrowdStrike CNAPP Enhanced with Adversary-Informed Risk Prioritization

CrowdStrike enhances its CNAPP capabilities by incorporating adversary intelligence for risk prioritization, application-layer visibility, and runtime analysis, addressing critical gaps in cloud security and enabling faster remediation based on threat actor behavior like LABYRINTH CHOLLIMA and SCATTERED SPIDER.

Lazarus Group +10 cloud_security cnapp threat_intelligence
3r 3t
high threat

CrowdStrike CNAPP Enhancements Prioritize Risk Based on Adversary Behavior

CrowdStrike's CNAPP enhancements prioritize cloud risk based on adversary behavior, correlating application insights with cloud infrastructure telemetry to identify and address critical exposures targeted by specific threat actors like LABYRINTH CHOLLIMA and SCATTERED SPIDER.

Lazarus Group +10 cloud-security cnapp threat-intelligence
2r 8t
critical threat

TeamPCP Backdoors Telnyx PyPI Package with Steganographic Malware

The TeamPCP threat actor compromised the Telnyx PyPI package, injecting credential-stealing malware hidden within WAV audio files to target Linux, macOS, and Windows systems.

TeamPCP supply chain attack pypi credential theft steganography
2r 5t
high threat

Silver Fox Spearphishing Campaign Targeting Japanese Firms During Tax Season

The Silver Fox threat actor is conducting a targeted spearphishing campaign against Japanese manufacturers and other businesses, exploiting the annual tax filing and organizational change season by sending emails containing malicious attachments that deploy ValleyRAT, leading to remote access, data theft, and persistence.

Silver Fox silverfox spearphishing valleyrat japan taxseason remoteaccesstrojan
2r 5t
high threat

TeamPCP Supply Chain Attack via CI/CD Compromise

TeamPCP compromised CI/CD pipelines and GitHub accounts of multiple companies by deploying an infostealer to extract credentials from CI environments, .env files, and cloud tokens, impacting projects like Trivy, KICS, and LiteLLM.

TeamPCP supply-chain ci/cd infostealer
2r 1t
high threat

M-Trends 2026: Evolving Threat Landscape

The M-Trends 2026 report highlights the increasing sophistication of threat actors, including voice phishing attacks targeting SaaS environments, ransomware groups actively destroying recovery capabilities, and espionage groups exploiting edge devices for persistent access, revealing a shift towards faster hand-offs between initial access brokers and ransomware deployers.

Scattered Spider +10 threat-report ransomware phishing saas
3r 10t
high threat

NICKEL ALLEY Targeting Developers with Fake Job Opportunities

NICKEL ALLEY, a North Korean threat group, is targeting technology professionals with fake job opportunities and malicious code repositories to deliver malware like PyLangGhost RAT and BeaverTail, aiming to steal cryptocurrency.

NICKEL ALLEY North Korea cryptocurrency supply-chain
2r 5t 4i
high threat

TeamPCP Compromise of KICS GitHub Action Supply Chain

TeamPCP conducted a supply chain attack compromising the KICS GitHub Action, impacting users who integrated the compromised version into their CI/CD pipelines.

TeamPCP supply-chain github-actions ci/cd
2r 4t
critical threat

TeamPCP's CanisterWorm Kubernetes Wiper Targeting Iran

TeamPCP's CanisterWorm is a newly identified Kubernetes wiper targeting Iranian infrastructure, indicating a politically motivated destructive attack.

TeamPCP kubernetes wiper iran canisterworm destructive-attack
2r 1t
high threat

TeamPCP Deploys CanisterWorm on NPM After Trivy Compromise

TeamPCP deployed the CanisterWorm malware on the NPM package registry following a compromise of the Trivy scanning tool.

TeamPCP supply-chain malware npm canisterworm
2r 3t
high threat

China-Nexus Campaign Using Google Calendar as C2

A China-nexus threat actor is utilizing Google Calendar as a command and control (C2) infrastructure to conduct stealthy operations.

China-nexus actor google-calendar c2 china-nexus
2r 4t
high threat

VoidStealer Steals Secrets by Debugging Chrome

VoidStealer leverages Chrome debugging capabilities to extract sensitive information, such as credentials and session cookies, directly from the browser's memory.

VoidStealer credential-theft chrome debugging
2r 1t
high threat

Operation GhostMail: Russian APT Exploiting Zimbra XSS to Target Ukraine Government

A Russian APT group is exploiting a Zimbra XSS vulnerability (details unspecified) to target the Ukrainian government in an operation dubbed 'GhostMail'.

Russian APT zimbra xss ukraine apt
2r 1t
high threat

North Korean IT Worker Operation Infiltration Techniques

Analysis of North Korean IT workers reveals techniques for infiltrating Western tech companies, including fake identity creation, internal training, and recruitment of collaborators.

DPRK IT Workers dprk itw infiltration remote-work
2r 2t 1i
high threat

Kimsuky Malware Using Dropbox API for Command and Control

Kimsuky is using malware that leverages the Dropbox API for command and control, enabling file exfiltration and remote code execution.

Kimsuky +4 dropbox api command-and-control exfiltration
2r 2t
critical threat

Unpatched GNU Inetutils Telnet Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the GNU Inetutils Telnet server, potentially allowing unauthenticated attackers to execute arbitrary code on vulnerable systems.

telnet rce inetutils
2r 2t
critical threat

Warlock Group Deploys Web Shells, Tunnels, and Ransomware

The Warlock group utilizes web shells and tunneling to deploy ransomware within compromised environments, impacting victim data confidentiality and availability.

Warlock webshell ransomware tunneling
2r 4t
critical threat

QEMU Hypervisor Escape via virtio-snd 0-Day

An unpatched vulnerability in QEMU's virtio-snd component allows for a hypervisor escape due to an uncontrolled heap overflow.

virtualization hypervisor qemu virtio-snd heap overflow hypervisor escape
2r 2t
high threat

CISA Adds Google Skia and Chromium V8 Vulnerabilities to KEV Catalog

CISA added CVE-2026-3909, an out-of-bounds write vulnerability in Google Skia, and CVE-2026-3910, an unspecified vulnerability in Google Chromium V8 to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation, highlighting the need for timely remediation.

vulnerability chrome skia cve-2026-3909 cve-2026-3910
2r 3t
critical threat

Active Exploitation of Apache ActiveMQ RCE Vulnerability (CVE-2023-46604)

CVE-2023-46604 is a remote code execution vulnerability affecting Apache ActiveMQ that is actively exploited in the wild by ransomware operators, allowing remote attackers to execute arbitrary shell commands.

LockBit +2 activemq rce cve-2023-46604 ransomware
2r 2t
medium threat

Potential Web Shell ASPX File Creation

The creation of ASPX files in web server directories, excluding legitimate processes, indicates potential web shell deployment for persistence on Windows systems.

exploited SharePoint web-shell persistence windows
2r 1t
critical threat

Samsung MagicINFO 9 Server Path Traversal Vulnerability (CVE-2024-7399)

A path traversal vulnerability in Samsung MagicINFO 9 Server could allow an attacker to write arbitrary files with system privileges, potentially leading to code execution or system compromise.

exploited MagicINFO 9 Server path-traversal cve-2024-7399 samsung
2r 1t 1c
critical threat

JetBrains TeamCity Relative Path Traversal Vulnerability (CVE-2024-27199)

A relative path traversal vulnerability in JetBrains TeamCity (CVE-2024-27199) could allow limited administrative actions and has been linked to ransomware attacks.

exploited TeamCity cve-2024-27199 path-traversal ransomware jetbrains
2r 1t 1c
high threat

Suspicious Microsoft Diagnostics Wizard Execution

This rule detects potential abuse of the Microsoft Diagnostics Troubleshooting Wizard (MSDT) to proxy malicious command or binary execution via malicious process arguments on Windows systems.

Elastic Defend +2 defense-evasion msdt windows
3r 1t
critical threat

Totolink A8000RU OS Command Injection Vulnerability (CVE-2026-7154)

A remote OS command injection vulnerability exists in the Totolink A8000RU router version 7.1cu.643_b20200521, allowing attackers to execute arbitrary commands by manipulating the 'tty_server' argument in the 'setAdvancedInfoShow' function.

exploited A8000RU 7.1cu.643_b20200521 cve-2026-7154 command-injection network-device
2r 2t 1c
medium threat

Potential Command and Control via Internet Explorer COM Abuse

This rule detects potential command and control activity where Internet Explorer (iexplore.exe) is started via the Component Object Model (COM) and makes unusual network connections, indicating adversaries might exploit Internet Explorer via COM to evade detection and bypass host-based firewall restrictions.

Internet Explorer command-and-control com iexplore windows
2r 4t
high threat

Windows AutoLogger Session Tampering Detection

Attackers may disable AutoLogger sessions by modifying specific registry values to evade detection and prevent security monitoring of early boot activities and system events, a technique observed in intrusions involving IcedID and XingLocker ransomware.

exploited Windows attack.defense-evasion attack.t1562.002
3r 1t
high threat

Suspicious Process Accessing Browser Password Store

Detection of non-browser processes accessing browser user data folders, a tactic used by malware such as Snake Keylogger to steal credentials and sensitive information.

Splunk Enterprise +2 Snake Keylogger credential-access stealer windows
2r 1t
medium threat

Kerberos Traffic from Unusual Process

Detects network connections to the standard Kerberos port from an unusual process other than lsass.exe, potentially indicating Kerberoasting or Pass-the-Ticket activity on Windows systems.

Elastic Defend +22 kerberoasting credential-access lateral-movement windows
2r 2t
critical threat

Weaver E-cology Arbitrary File Read Vulnerability (CVE-2022-50992)

Unauthenticated remote attackers can exploit an arbitrary file read vulnerability (CVE-2022-50992) in Weaver E-cology 9.5 versions prior to 10.52 via the XML-RPC endpoint to access sensitive files.

exploited E-cology 9.5 cve-2022-50992 file-read vulnerability webserver
2r 1t 1c
low threat

Suspicious SMTP Activity on Port 26/TCP

This rule detects SMTP traffic on TCP port 26, an alternative to the standard port 25 that the BadPatch malware family has used for command and control of Windows systems.

BadPatch command-and-control exfiltration network-traffic
2r 3t
high threat

Regsvr32 Silent and Install Parameter DLL Loading

Detection of regsvr32.exe being used with the silent and DLL install parameter to load a DLL, a technique used by RATs like Remcos and njRAT to execute arbitrary code.

Splunk Enterprise +2 Remcos +1 lolbin dll-loading regsvr32
2r 2t
high threat

Potential Vcruntime140 DLL Sideloading

Detects potential DLL sideloading of vcruntime140.dll, a common C++ runtime library, often used by threat actors like APT29 (via WinELOADER) to load malicious payloads under the guise of legitimate applications, leading to defense evasion, persistence, and privilege escalation.

Visual C++ Redistributable APT29 +5 dll-sideloading vcruntime140.dll wineloader defense-evasion persistence privilege-escalation
2r 3t
medium threat

Potential Lateral Tool Transfer via SMB Share

The rule identifies the creation or change of a Windows executable file over network shares, indicating potential lateral tool transfer via SMB, which adversaries may use to move tools between systems in a compromised environment.

Elastic Defend +1 lateral-movement smb file-transfer windows
2r 2t
critical threat

PaperCut NG/MF Improper Authentication Vulnerability (CVE-2023-27351)

CVE-2023-27351 is an improper authentication vulnerability in PaperCut NG/MF that allows remote attackers to bypass authentication via the SecurityRequestFilter class, leading to potential ransomware deployment.

exploited NG/MF papercut authentication-bypass ransomware cve-2023-27351
2r 1t 1c
medium threat

MSSQL xp_cmdshell Stored Procedure Abuse for Persistence

Attackers may leverage the xp_cmdshell stored procedure in Microsoft SQL Server to execute arbitrary commands for privilege escalation and persistence, often bypassing default security configurations.

SQL Server persistence sql-server xp_cmdshell windows
2r 2t
high threat

ChatGPTNextWeb NextChat SSRF Vulnerability (CVE-2026-7178)

ChatGPTNextWeb NextChat versions up to 2.16.1 are vulnerable to server-side request forgery (SSRF) due to improper input validation in the storeUrl function, allowing remote attackers to potentially access internal resources or conduct other malicious activities.

exploited NextChat ssrf cve vulnerability web-application
2r 1t 1c
high threat

Non-Chrome Process Accessing Chrome Default Directory

Detection of non-Chrome processes accessing the Chrome user data directory, potentially indicating credential theft or data exfiltration attempts by malware such as RATs or APT groups.

Splunk Enterprise +2 FIN7 +2 credential-access threat-type windows
2r 1t
high threat

Braodo Stealer Screen Capture in TEMP Directory

This analytic detects the creation of screen capture files in the TEMP directory, specifically targeting activity associated with the Braodo stealer malware, which captures screenshots of the victim's desktop as part of its data theft activities.

Splunk Enterprise +2 Braodo Stealer stealc-stealer crypto-stealer braodo-stealer apt37 hellcat-ransomware vip-keylogger screen-capture malware
2r 1t
high threat

Suspicious Script Execution from Temporary Directory

This brief covers a detection for suspicious script execution, such as PowerShell, WScript, or MSHTA, originating from common temporary directories, potentially indicating malware activity.

exploited Windows execution script temp
2r 1t
low threat

AdFind Tool Used for Active Directory Reconnaissance

The execution of AdFind.exe, an Active Directory query tool, is often used by threat actors for post-exploitation Active Directory reconnaissance, as observed in campaigns involving Trickbot, Ryuk, Maze, and FIN6.

Elastic Defend FIN6 adfind active-directory reconnaissance windows
2r 5t