Tag: exploit
-
Senator launches inquiry into 8 tech giants for failures to adequately report CSAM
The inquiry follows reports from the National Center for Missing and Exploited Children (NCMEC) that allege the tech giants are deficient in their reporting of CSAM and data related to generative AI generally. First seen on therecord.media Jump to article: therecord.media/senator-launches-inquiry-into-tech-giants-csam
-
Third-Party Android Vulnerability Leaves Over 50M Users Exposed
A flaw in the EngageLab SDK exposed 50 million Android users, allowing malicious apps to exploit trusted permissions and access sensitive data. The post Microsoft: Third-Party Android Vulnerability Leaves Over 50M Users Exposed appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-engagelab-sdk-android-vulnerability-malware-bridge/
-
[Video] The TTP Ep. 22: The Collapse of the Patch Window
In this episode of The Talos Threat Perspective, we discuss how vulnerability exploitation is accelerating, and why attacker speed, AI, and exposed systems are affecting the patch window. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/video-the-ttp-ep-22-the-collapse-of-the-patch-window/
-
Analysis of one billion CISA KEV remediation records exposes limits of human-scale security
Analysis of 1 billion CISA KEV remediation records reveal a breaking point for human-scale security. Qualys shows most critical flaws are exploited before defenders can patch them. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/analysis-of-one-billion-cisa-kev-remediation-records-exposes-limits-of-human-scale-security/
-
Hackers Exploit GitHub Copilot Flaw to Exfiltrate Sensitive Data
A high-severity flaw in GitHub Copilot Chat recently allowed attackers to silently steal sensitive data like API keys and private source code. Tracked as CVE-2025-59145 with a critical CVSS score of 9.6, this vulnerability required no malicious code execution. Instead, hackers used a clever prompt injection technique known as >>CamoLeak.<< A security researcher publicly disclosed…
-
Hackers Exploit GitHub Copilot Flaw to Exfiltrate Sensitive Data
A high-severity flaw in GitHub Copilot Chat recently allowed attackers to silently steal sensitive data like API keys and private source code. Tracked as CVE-2025-59145 with a critical CVSS score of 9.6, this vulnerability required no malicious code execution. Instead, hackers used a clever prompt injection technique known as >>CamoLeak.<< A security researcher publicly disclosed…
-
Can Anthropic Keep Its Exploit-Writing AI Out of the Wrong Hands?
Its Mythos Preview model, which can allegedly find and exploit critical zero-days, also comes with certain controls, the vendor said. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/anthropic-exploit-writing-mythos-ai-safe
-
Claude uncovers a 13″‘year”‘old ActiveMQ RCE bug within minutes
AI accelerated discovery: ActiveMQ has been here before. The platform has a track record of high-impact vulnerabilities tied to management surfaces and unsafe assumptions around trusted inputs. From older web console flaws to deserialization bugs and protocol-level RCEs, administrative functionalities have consistently become attack vectors.But none of the previous flaws were found the way CVE-2026-34197…
-
Fake BTS Tour Ticket Scams Target Fans Worldwide
Cybercriminals are exploiting the massive hype around BTS’s return to the global stage by launching a wave of fake ticketing websites targeting fans across multiple countries. The K-pop group recently reunited after nearly four years, during which members completed mandatory military service in South Korea. Their upcoming “ARIRANG” world tour has triggered overwhelming demand and…
-
Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure
A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings from Sysdig.The vulnerability in question is CVE-2026-39987 (CVSS score: 9.3), a pre-authenticated remote code execution vulnerability impacting all versions of Marimo prior to and including First seen on…
-
New React Server Components Flaw Could Let Attackers Trigger DoS
A newly disclosed high-severity vulnerability in React Server Components could allow unauthenticated attackers to trigger a Denial of Service (DoS) condition. Tracked as CVE-2026-23869, this flaw poses a significant risk to web applications using specific server-side rendering packages. Because the exploit requires no privileges and involves low attack complexity, threat actors can easily target vulnerable…
-
GitLab Security Update Fixes High-Severity CVE-2026-5173, 11 Other Flaws
GitLab has rolled out a major security update to address a series of vulnerabilities impacting both its Community Edition (CE) and Enterprise Edition (EE) platforms. The GitLab security update resolves multiple flaws, including high-severity issues that could be exploited to disrupt services or gain unintended access to system functionality. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/gitlab-security-update-cve-2026-5173/
-
ChatGPT, Claude, and Gemini Among 11 AI Models Vulnerable to One-Line Jailbreak
A newly discovered jailbreak technique named >>sockpuppeting<< successfully forces 11 leading artificial intelligence models, including ChatGPT, Claude, and Gemini, to bypass their safety guardrails. By exploiting a standard application programming interface (API) feature with a single line of code, attackers can trick these models into generating malicious outputs without requiring complex mathematical optimisation. When a…
-
Tax Refund Fraud in 2026: How Threat Actors Exploit Identity, Verification, and Cash-Out Channels
How threat actors are executing tax refund fraud schemes, from sourcing identity data to bypassing verification and cashing out fraudulent returns, and what these patterns reveal about evolving fraud ecosystems. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/tax-refund-fraud-in-2026-how-threat-actors-exploit-identity-verification-and-cash-out-channels/
-
What to Know About CyberAv3ngers: The IRGC-Linked Group Targeting Critical Infrastructure
Tags: access, advisory, ai, attack, authentication, automation, backup, cctv, chatgpt, cisa, communications, compliance, control, credentials, crypto, cve, cyber, cybersecurity, data, data-breach, defense, detection, dns, email, exploit, finance, firewall, flaw, government, group, healthcare, infrastructure, intelligence, international, Internet, iot, iran, kev, leak, linux, malicious, malware, mitigation, mitre, monitoring, network, office, openai, password, radius, resilience, risk, router, service, siem, software, strategy, switch, technology, threat, tool, update, vpn, vulnerability, vulnerability-managementAn Iran-affiliated threat group has evolved from defacing water utility displays to deploying custom ICS malware and exploiting Rockwell Automation PLCs across multiple U.S. critical infrastructure sectors. Key takeaways: CyberAv3ngers is a state-directed threat group operating under Iran’s IRGC Cyber-Electronic Command. The U.S. Treasury sanctioned six named officials in February 2024 and the State Department…
-
Hackers have been exploiting an unpatched Adobe Reader vulnerability for months
Tags: access, adobe, attack, ciso, control, data, email, exploit, hacker, incident response, malicious, malware, monitoring, resilience, risk, sans, software, technology, threat, tool, update, vulnerabilityA high risk exploit: Kellman Meghu, chief technology officer at Canadian incident response firm DeepCove Security, called the exploit “a very high risk.”So far it looks as though this particular malware just exfiltrates data, he said. But it implies there is an ability or capability to turn it into a vehicle for remote code execution.…
-
Breach Roundup: German Police Expose REvil, GandCrab Boss
Also, Medusa Ransomware, Grafana Flaw, German Political Party Breach. This week, German police unmasked a REvil leader, a critical Docker flaw, Medusa ransomware surged, DPRK hackers abused GitHub, Grafana AI bugs enabled data theft, scams hit $20B in the United States, Ivanti exploited and attacks hit Northern Ireland schools and a German political party. First…
-
Mythos and Like AI Tools Raise Stakes for Healthcare Cyber
Experts Warn of Faster and Higher Volume Attacks, Rising Patient Safety Worries. Emerging powerful AI tools – such as Anthropic’s new Claude Mythos – that are capable of autonomously identifying and exploiting software bugs in a flash could reshape the healthcare cyber landscape by accelerating attacks and raising the risk of widespread operational disruption, experts…
-
‘BlueHammer’ Windows Zero-Day Exploit Signals Microsoft Bug Disclosure Issues
Under the alias ‘Chaotic Eclipse,’ a researcher released a PoC exploit for a zero-day flaw that allows for system takeover by a local user, citing an undisclosed beef with Microsoft. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/bluehammer-windows-exploit-microsoft-bug-disclosure-issues
-
Bug Management in the Mythos Era: ‘Assume You’re Unpatched’
Start Here: Strong Monitoring, Behavior-Based Controls, Virtual Patching Thanks to Anthropic’s Mythos presaging a world in which zero-day exploits are common, one cybersecurity expert says the new mantra is this: assume you are unpatched. Vendors and customers must focus more than ever on strong monitoring, behavior-based controls and virtual patching. First seen on govinfosecurity.com Jump…
-
Hackers Exploit Adobe PDF Flaw for Months to Steal Data, No Fix Yet
A critical Adobe Acrobat zero-day has been exploited for months via malicious PDFs to steal data and potentially take over systems, with no patch yet available. The post Hackers Exploit Adobe PDF Flaw for Months to Steal Data, No Fix Yet appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-adobe-acrobat-zero-day-pdf-exploit-months/
-
Adobe Reader Zero-Day Exploited to Steal Data via Malicious PDFs
An Adobe Reader zero-day vulnerability is being actively exploited via malicious PDFs, allowing hackers to steal data without user interaction, with no patch available. First seen on hackread.com Jump to article: hackread.com/adobe-reader-zero-day-exploit-data-malicious-pdfs/
-
Adobe Reader Zero-Day Exploited to Steal Data via Malicious PDFs
An Adobe Reader zero-day vulnerability is being actively exploited via malicious PDFs, allowing hackers to steal data without user interaction, with no patch available. First seen on hackread.com Jump to article: hackread.com/adobe-reader-zero-day-exploit-data-malicious-pdfs/
-
Adobe Reader Zero-Day Exploited to Steal Data via Malicious PDFs
An Adobe Reader zero-day vulnerability is being actively exploited via malicious PDFs, allowing hackers to steal data without user interaction, with no patch available. First seen on hackread.com Jump to article: hackread.com/adobe-reader-zero-day-exploit-data-malicious-pdfs/
-
Zero Days for the Masses: Mythos Presages Exploit Tsunami
Asymmetry Between Exploits Wielded by Nation-States and Hackers Will Disappear. Anthropic’s announcement that its Mythos Preview large language model can find serious zero-day flaws across all manner of code bases old and new, and quickly chain vulnerabilities together to build working exploits, promises to democratize access to such capabilities. First seen on govinfosecurity.com Jump to…
-
CISA adds second critical flaw in Ivanti EPMM to exploited vulnerabilities catalog
The code injection flaw is similar to a prior vulnerability that was immediately flagged in January. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-second-critical-flaw-ivanti-epmm-exploited/817080/
-
Adobe Acrobat Reader Zero Day Exploited in Active PDF Attacks
An Adobe Acrobat zero day is being exploited in the wild. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/adobe-acrobat-reader-zero-day-exploited-in-active-pdf-attacks/
-
Claude Code Can Be Manipulated via CLAUDE.md to Run SQL Injection Attacks
LayerX researchers have discovered how to bypass Claude Code’s safety rules using the CLAUDE.md file. This exploit allows… First seen on hackread.com Jump to article: hackread.com/claude-code-claude-md-sql-injection-attacks/
-
Russian Hackers Exploit SOHO Routers for DNS Hijacking Campaign
The rise of SOHO router compromise campaigns has exposed a critical weakness in global network security, particularly as threat actors like Forest Blizzard continue to exploit poorly secured home and small-office devices. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/soho-router-compromise-forest-blizzard/
-
Acrobat Reader zero-day exploited in the wild for many months
Unknown attackers have exploited a zero-day Adobe Acrobat Reader vulnerability since November 2025 and possibly even earlier, security researcher Haifei Li has discovered. PDF … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/09/acrobat-reader-zero-day-exploited/

