Breaking News
New and updated threat intelligence stories from the last 48 hours, tracked and analyzed by Mallory.
New
Vercel Confirms Breach After Threat Actor Offers Alleged Stolen Data for Sale
8
Vercel confirmed a security incident involving unauthorized access to certain internal systems after a threat actor using the name **ShinyHunters** claimed to be selling allegedly stolen company data on a hacking forum. The company said only a limited subset of customers was affected, its services remain operational, and it has engaged incident response experts, notified law enforcement, and is working directly with impacted customers. The actor claimed the stolen data included access keys, source code, database data, internal deployment access, and API keys, and shared a text file with 580 employee-related records along with a screenshot purportedly showing an internal Vercel Enterprise dashboard. Vercel advised customers to review environment variables and rotate secrets if necessary, while the authenticity of the leaked materials and the attribution to **ShinyHunters** remained unverified; the actor also claimed on Telegram that a **$2 million** ransom demand had been discussed with the company.
- Apr 20, 2026Vercel links breach to compromised OAuth app and Context.ai account access
- Apr 19, 2026Vercel confirms security incident affecting internal systems
Arbitrary JavaScript Execution Flaw in protobufjs via Malicious Protobuf Definitions
7
A vulnerability in the npm package **`protobufjs`** allows arbitrary JavaScript execution when an application processes attacker-controlled protobuf definition files. The flaw, tracked as **`GHSA-xq3m-2v4x-88gg`**, stems from unsafe handling of protobuf **`type`** fields, which can be compiled into executable JavaScript and triggered during object decoding, creating a path to remote code execution in affected deployments. The issue affects **`protobufjs`** versions up to **`8.0.0`** and **`7.5.4`**, and has been fixed in **`8.0.1`** and **`7.5.5`**. A published proof of concept shows a malicious JSON descriptor invoking Node.js **`child_process`** during decode, underscoring the risk for applications that ingest untrusted schema or descriptor data. Organizations using `protobufjs` should upgrade to the patched releases and review whether external parties can supply protobuf definitions.
- Apr 16, 2026protobufjs fixes released in versions 8.0.1 and 7.5.5
- Apr 16, 2026Arbitrary code execution flaw disclosed in protobufjs
RCE in Sagredo qmail Fork via MX Hostname Shell Injection
7
A high-severity vulnerability tracked as **CVE-2026-41113** allows remote code execution in the `sagredo-dev/qmail` fork by injecting shell metacharacters into MX hostnames processed by `qmail-remote`. The flaw is in the `tls_quit()` path, where the `notlshosts_auto` feature added in 2024 builds a shell command from attacker-controlled DNS data and executes it with `popen()`. If a target server sends mail to a domain whose DNS is controlled by an attacker, a malicious MX record can trigger command execution as the `qmailr` user when `control/notlshosts_auto` is enabled. The issue affects `sagredo-dev/qmail` versions **v2024.10.26 through v2026.04.02** and was fixed in **v2026.04.07** in commit `749f607`. Public disclosures describe proof-of-concept exploitation using crafted MX values such as `x'\`id>/tmp/pwned\`'y.evil.com`, and the flaw has been assigned a **CVSS 3.1 score of 8.2**. Advisories and follow-on reporting say technical details and exploit code were published alongside the disclosure, increasing the urgency for operators of the Sagredo fork to upgrade immediately.
- Apr 7, 2026Public disclosure and PoC details published for CVE-2026-41113
- Apr 7, 2026Fix released for CVE-2026-41113 in qmail v2026.04.07
Critical RCE and Default Password Flaws Disclosed in Silex SD-330AC and AMC Manager
4
Silex Technology's **SD-330AC** and **AMC Manager** were disclosed with two serious vulnerabilities that expose devices to remote compromise and unauthorized reconfiguration. The most severe issue, `CVE-2026-32956`, is a **heap-based buffer overflow** in redirect URL processing that can enable **arbitrary code execution** over the network without authentication or user interaction. The flaw is tracked as `CWE-122` and carries a critical `CVSS v3.1` vector of `AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`, indicating full compromise of confidentiality, integrity, and availability is possible. A second flaw, `CVE-2026-32965`, affects devices left in their **factory-default state** and allows them to be configured with a **null string password**, creating an insecure initialization condition. Classified as `CWE-1188`, the vulnerability is network-accessible and primarily threatens device integrity, with a `CVSS v3.1` vector of `AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`. The issues were reported through **JPCERT/CC** and published via **JVN** and Silex security advisories in Japanese and English, putting administrators on notice to review exposed deployments and initialization practices.
- Apr 20, 2026CVE-2026-32959 recorded for Silex SD-330AC and AMC Manager
- Apr 20, 2026JVN and Silex advisories publish details for the two vulnerabilities
Edge Regression Breaks Right-Click Paste in Microsoft Teams Desktop
3
Microsoft confirmed that a recent **Microsoft Edge** update introduced a regression that disables the right-click **Paste** option in the **Microsoft Teams desktop client**, leaving the context-menu entry greyed out for URLs, text, and images. The issue affects **Windows and macOS** systems running Teams desktop version `26072.519.4556.7438`, which relies on an Electron-based framework and the **Edge WebView2** runtime; **Teams for Web** is not affected. Users reported the problem across enterprise and personal accounts, including Teams Free and Insider builds, and Microsoft said reinstalling Teams or clearing its cache does not fix it. The company has identified the cause and is deploying a staged fix while monitoring telemetry, but has not given a firm timeline for full remediation. Until the update reaches affected users, Microsoft is advising use of keyboard shortcuts such as ```Ctrl+V``` on Windows and ```Cmd+V``` on macOS and encouraging feedback or service health reports from impacted tenants.
- Apr 16, 2026Microsoft begins staged rollout of a fix
- Apr 16, 2026Microsoft acknowledges Edge-related Teams paste bug
Microsoft Reverts Teams Update After Desktop Client Launch Failures
2
Microsoft reverted a service update after it caused some **Microsoft Teams desktop client** users to become stuck on the loading screen with the error, “We’re having trouble loading your message. Try refreshing.” The company tracked the disruption as incident `TM1283300`, initially describing it as a transient service infrastructure issue before identifying the root cause as a regression in the Teams client build-caching system that pushed some older desktop builds into an unhealthy state. Microsoft said the impact appears limited to the **desktop client**, with no indication that web or mobile users were affected. The company reported that its automated recovery system helped remediate the issue, then fully rolled back the problematic update and monitored telemetry and customer feedback to confirm recovery. Impacted users were instructed to fully quit and restart Teams so the reverted configuration could propagate, though Microsoft did not disclose how many customers or regions were affected.
- Apr 20, 2026Microsoft reverts problematic Teams update and issues restart guidance
- Apr 20, 2026Microsoft identifies issue and begins automated remediation
Remote Buffer Overflows Disclosed in H3C Magic B1 `/goform/aspForm` Functions
2
Two high-severity vulnerabilities, **`CVE-2026-6563`** and **`CVE-2026-6581`**, were disclosed in **H3C Magic B1** devices running versions up to **`100R004`**, exposing the products to remotely exploitable buffer overflows. Both flaws reside in the **`/goform/aspForm`** component and are triggered by crafted manipulation of the **`param`** argument, with `CVE-2026-6563` affecting the **`SetAPWifiorLedInfoById`** function and `CVE-2026-6581` affecting **`SetMobileAPInfoById`**.
- Apr 19, 2026CVE-2026-6563 disclosed for H3C Magic B1 buffer overflow
- Apr 19, 2026CVE-2026-6581 disclosed for H3C Magic B1 buffer overflow
Updated
TeamPCP Supply Chain Breaches Expand Into Ransomware-Linked OSS Campaign
35
TeamPCP has expanded a multi-ecosystem software supply chain campaign that compromised open-source security and developer tools including **Trivy**, **Checkmarx KICS**, **LiteLLM**, **Telnyx**, GitHub Actions, OpenVSX extensions, Docker images, and packages published through **PyPI** and **npm**. Reporting indicates the attackers used stolen developer and publishing credentials to push malicious releases through trusted channels, harvest environment variables, shell histories, cloud credentials, and GitHub tokens, and move laterally across CI/CD environments. In the Telnyx incident, valid credentials were reportedly used to publish malicious PyPI releases, with a second-stage payload hidden in a WAV file and code triggered on import. The campaign is now being linked to follow-on ransomware activity through an alleged partnership between TeamPCP and the **Vect** ransomware group, which has been advertised on BreachForums as an emerging ransomware-as-a-service operation. Researchers say the supply chain compromises may serve as initial access for extortion campaigns against downstream organizations, with TeamPCP reportedly recruiting negotiators after the Trivy breach and previously exfiltrating roughly **300 GB** of compressed credentials; the LiteLLM compromise alone was tied to hundreds of thousands of stolen credentials. The incidents underscore how compromised open-source tooling and CI/CD infrastructure can give attackers privileged enterprise access and create a path from package poisoning to ransomware deployment.
- Apr 15, 2026Vect leak site publishes first victim from TeamPCP-linked extortion campaign
- Apr 8, 2026CISA KEV deadline for CVE-2026-33634 passes without standalone TeamPCP advisory
North Korea-Linked Threat Activity and Reporting on Lazarus, IT Worker Schemes, and Related Malware
17
Multiple reports and threat-intel posts highlighted **North Korea-linked cyber activity** spanning social engineering, malware, and broader ecosystem analysis. AllSecure described an attempted compromise of a CEO via a **fake LinkedIn job interview** attributed to **Lazarus** tradecraft (tagged *BeaverTail* / *Contagious Interview*), indicating continued use of recruiter-style lures and developer tooling themes (e.g., *VSCode*) to gain execution on target systems. Separately, eSentire published technical analysis on the **DEV#POPPER remote access trojan** and associated **OmniStealer** activity, framing it as DPRK-linked malware and providing defensive guidance for organizations facing this threat class. Additional DPRK-focused intelligence covered both strategic and operational dimensions. Google’s *Cloud Threat Horizons Report H1 2026* discussed cloud-focused threat activity and tracked DPRK-linked clusters (including **UNC4899** and **UNC5267**), while Logpresso published an OSINT report on **DPRK remote IT worker** infiltration tactics (fraudulent employment/contractor placement). NKInternet released a catalog-style overview of **North Korea’s software export ecosystem**, and RedAsgard’s “Hunting Lazarus” series contributed hands-on investigative detail into Lazarus operator artifacts. A separate Lazarus threat-actor profile page aggregated historical reporting and statistics, but did not add a discrete new incident beyond compilation.
- Apr 20, 2026FalconFeeds reports UNC1069 deepfake campaign targeting crypto and supply chains
- Apr 17, 2026Researcher claims DPRK-linked IT worker cell infiltrated Tokamak Network
Iran-Linked Hybrid Threats to Middle East Digital and Maritime Infrastructure
16
Escalation in the **Iran-US-Israel conflict** is disrupting regional digital and communications infrastructure through both direct threats and indirect operational impacts. Iran-linked activity has reportedly expanded from military retaliation rhetoric to threats against major U.S. technology companies' facilities in the Middle East, including sites associated with **Microsoft, Amazon, Google, Oracle, IBM, and Nvidia**, while earlier attacks were said to have caused outages at **AWS** datacenters in the UAE and Bahrain. In parallel, maritime traffic near the **Strait of Hormuz** has experienced anomalies consistent with **GNSS spoofing** and other electronic warfare techniques, with vessels reporting false positions and receiving radio warnings that could be used to shape shipping behavior without a formal blockade. The same regional instability is also affecting subsea connectivity projects. Meta's **2Africa** cable build has been delayed after **Alcatel Submarine Networks** declared force majeure and said it could no longer safely operate in the Persian Gulf, leaving the *Pearls* segment incomplete despite most cable having already been laid. Together, the reporting indicates a broader pattern in which conflict around Iran is creating cyber-physical risk across **cloud infrastructure, maritime navigation, and undersea communications**, increasing the likelihood of service disruption, delayed repairs, higher operating costs, and reduced confidence in critical regional infrastructure.
- Apr 19, 2026Reported U.S. interdiction expands to Gulf of Oman near Chabahar
- Apr 18, 2026Reported attack on SANMAR HERALD triggers renewed Hormuz reversals
Pentagon–Anthropic Dispute Over Military AI Use and Provider Baselines
12
The U.S. Department of Defense has escalated a dispute with **Anthropic** over the conditions under which its AI models could be used by the military, after Anthropic reportedly insisted on limits including *no mass surveillance of Americans* and *no fully autonomous weapons*. Reporting cited in both accounts indicates Pentagon officials have discussed potentially designating Anthropic a **“supply chain risk”**—a step that could bar the company from government work and pressure defense contractors to sever ties—while at least one senior official was quoted as saying the department would “make sure they pay a price” for non-cooperation. At the same time, the Pentagon is engaging **Anthropic, OpenAI, Google, and xAI** to align all major U.S. AI providers on a common “baseline” of expectations, after contracts were signed with limited specificity and the department now wants to deploy models into DoD environments to enable broader development of AI agents with minimal human oversight. The coverage also describes the policy vacuum driving the standoff: key rules for military AI use are being shaped through ad hoc negotiations between the Pentagon and private AI firms, prompting calls for **Congress** to set durable, democratically accountable constraints rather than leaving governance to bilateral bargaining.
- Apr 19, 2026Axios reports NSA actively using Anthropic Mythos despite blacklist
- Apr 10, 2026Courts let Anthropic blacklist stand but narrow parts of its application
Multiple Vulnerabilities Disclosed in OpenClaw
11
dCERT published advisories **2026-0836** and **2026-0866** covering **multiple vulnerabilities in OpenClaw**, indicating that the product is affected by more than one security flaw and that the issue set warranted repeated or updated notification. The advisories identify OpenClaw as the impacted technology but do not provide a public synopsis in the referenced notices. Organizations using **OpenClaw** should review both dCERT advisories to determine affected versions, vulnerability details, and available mitigations or patches. The paired notices suggest ongoing vulnerability handling around the product, making prompt validation of exposure, patch status, and any vendor remediation guidance a priority.
- Apr 20, 2026dCERT publishes OpenClaw security bypass advisory 2026-1155
- Apr 17, 2026dCERT publishes OpenClaw vulnerabilities advisory 2026-1139
European Push for Digital Sovereignty in Cloud Infrastructure
11
European governments and organizations are intensifying efforts to achieve digital sovereignty in cloud infrastructure, driven by geopolitical uncertainties and concerns over reliance on American hyperscalers such as Microsoft, Google, and Amazon Web Services. With U.S. policy shifts and potential transatlantic tensions, European leaders are prioritizing the development of domestic alternatives and strategies to ensure control over sensitive data and critical workloads. Despite these ambitions, local cloud providers currently hold only a small share of the market, and experts suggest that a new European hyperscaler is unlikely to emerge soon, with existing players like SAP and Deutsche Telekom each controlling only about 2% of the market. In response to these sovereignty concerns, cloud providers are expanding offerings tailored to regulatory and data residency requirements. Amazon Web Services, for example, has introduced Dedicated Local Zones to provide customers with greater control over data location, security, and compliance, supporting sensitive workloads for public sector and regulated industries. These initiatives reflect a broader trend of cloud service adaptation to meet the evolving needs of European customers seeking to balance operational flexibility with strict sovereignty and compliance mandates.
- Apr 17, 2026European Commission awards €180M sovereign cloud contract to four providers
- Apr 16, 2026Four European firms launch sovereign disaster recovery package
Scattered Spider Member Pleads Guilty in $8 Million SMS Phishing and Crypto Theft Scheme
11
Tyler Robert Buchanan, a 24-year-old British national from Dundee, Scotland, pleaded guilty in U.S. federal court in California to **conspiracy to commit wire fraud** and **aggravated identity theft** for his role in Scattered Spider’s large-scale social-engineering operation. Prosecutors said Buchanan and co-conspirators ran SMS phishing campaigns from September 2021 to April 2023 that impersonated corporate IT help desks and labor providers, used fake login pages and stolen credentials, and carried out SIM swapping to breach companies and individuals. The Justice Department said the scheme stole at least **$8 million in virtual currency** from U.S. victims across telecommunications, technology, cloud communications, outsourcing, gaming, and cryptocurrency sectors. Investigators tied Buchanan to the 2022 **0ktapus** campaign, which used fake Okta login pages to compromise more than 130 organizations, including **Twilio** and **Cloudflare**, and enabled downstream attacks affecting other major brands. Authorities said stolen credentials were funneled into a Telegram channel administered by Buchanan and an associate, and searches of his residence in Scotland uncovered victim company files, personal data, and roughly 20 devices. Buchanan was arrested in Palma de Mallorca by Spanish authorities, extradited to the United States, and has been in federal custody since April 2025; he now faces up to 22 years in prison, underscoring continued law-enforcement pressure on the loosely organized Scattered Spider group, an offshoot of **The Com**.
- Apr 17, 2026DOJ announces guilty plea and August sentencing date
- Apr 17, 2026Buchanan pleads guilty in U.S. federal court
Active Exploitation of Flowise CustomMCP RCE Exposes Thousands of Internet-Facing Instances
10
Threat actors are actively exploiting **CVE-2025-59528**, a **CVSS 10.0** remote code execution flaw in the open-source AI platform **Flowise**. The bug affects Flowise versions through **3.0.5** and stems from the `CustomMCP` node unsafely passing user-controlled input into JavaScript execution, allowing attackers with an API token to run arbitrary code with full **Node.js** runtime privileges. Researchers said the issue can be triggered remotely via a crafted HTTP `POST` request without user interaction, leading to operating system command execution, filesystem access, sensitive data theft, and full system compromise. Security researchers observed in-the-wild exploitation originating from a single **Starlink IP address**, while warning that roughly **12,000 to 15,000** internet-exposed Flowise instances sharply expand the attack surface for opportunistic attacks. Flowise disclosed the vulnerability in 2025, credited researcher **Kim SooHyun**, and patched the flaw in **version 3.0.6**. The incident marks the third Flowise vulnerability reported as exploited in the wild after **CVE-2025-8943** and **CVE-2025-26319**, increasing pressure on organizations to upgrade immediately and limit public exposure of Flowise APIs.
- Apr 20, 2026OX Security discloses broader MCP design flaw impacting Flowise and AI tools
- Apr 8, 2026VulnCheck flags two more Flowise flaws under active exploitation
Apache Airflow Flaws Enable Security Bypass and Multiple Additional Vulnerabilities
7
German authorities issued advisories for **Apache Airflow** covering a vulnerability that can bypass security measures and a separate notice for **multiple vulnerabilities** affecting the workflow orchestration platform. The alerts indicate that Airflow deployments may be exposed to weaknesses that undermine intended protections and introduce additional security risk across affected environments. Organizations using Apache Airflow should review the referenced advisories, identify affected versions, and prioritize vendor-recommended updates or mitigations. Because Airflow is commonly used to manage automated data pipelines and scheduled jobs, successful exploitation could weaken access controls or expose connected systems and workflows to further compromise.
- Apr 20, 2026dCERT publishes Apache Airflow and Keycloak Provider advisory 2026-1146
- Apr 17, 2026dCERT publishes Apache Airflow information disclosure advisory 2026-1137
+ 34 more updated
6Model Context Protocol (MCP) Security Risks From Untrusted Tool Servers and Verifiability GapsSecurity researchers warned that the *Model Context Protocol (MCP)*—used to let AI assistants connect to local tools and enterprise SaaS data—creates a significant attack surface when organizations install or authorize MCP “servers” and tool integrations. Praetorian highlighted that **locally hosted MCP servers run with the user’s privileges** and can therefore execute arbitrary commands, access local files, install malware, and exfiltrate data while masquerading as legitimate productivity tooling; it also described **“MCP server chaining,”** where a malicious local MCP server abuses data and actions flowing through a trusted remote integration (e.g., Slack/Google Drive) without needing to compromise the official provider. Separately, Gopher Security emphasized a **trust and auditability gap** in MCP deployments: standard logging for remote tool execution can be incomplete or tampered with, and organizations often cannot prove what code ran or what parameters were used inside a remote “black box” execution environment. The post described “puppet”/interception-style scenarios where an attacker could alter an MCP request (e.g., changing tool-call parameters to trigger data exfiltration or unauthorized actions) while returning plausible “success” responses, and proposed cryptographic approaches (e.g., **zero-knowledge proofs**) to make MCP tool execution verifiable rather than relying on mutable logs.CVE-2025-49596 disclosed affecting MCP InspectorApr 20, 2026
6ZionSiphon Malware Targets Israeli Water and Desalination SystemsDarktrace reported that a malware sample dubbed **ZionSiphon** was built to target Israeli water and desalination infrastructure, combining standard Windows malware features with operational technology-specific discovery and sabotage logic. The sample includes privilege escalation, persistence through a hidden `svchost.exe` copy in `LocalApplicationData`, self-deletion, USB propagation via hidden executables and malicious shortcuts, and hardcoded Israeli IP ranges and facility references tied to water, wastewater, and desalination operations. Embedded anti-Israel and propaganda-style strings referencing locations including Tel Aviv, Haifa, and Dimona, along with references to Mekorot and other facilities, indicate politically motivated targeting. On systems it identifies as relevant, ZionSiphon checks for OT-related processes, directories, and configuration files associated with reverse osmosis, chlorine control, and plant operations, then attempts local configuration tampering to raise chlorine-related settings. It also scans the local `/24` subnet for **Modbus**, **DNP3**, and **S7comm** services, with the Modbus branch the most mature and capable of reading holding registers and attempting chlorine-dosing-related writes, while the DNP3 and S7comm routines appear incomplete. Darktrace said the analyzed build is currently dysfunctional because a flawed country-validation routine prevents activation and causes the malware to self-destruct, but the code still shows clear sabotage intent against Israeli critical water infrastructure.Darktrace finds ZionSiphon build is dysfunctional and self-destructsApr 16, 2026
5Ubuntu Issues Linux Kernel Security Updates Across Supported ReleasesUbuntu published multiple security notices to fix **Linux kernel vulnerabilities** affecting a broad range of releases, including Ubuntu `14.04 LTS`, `16.04 LTS`, `18.04 LTS`, `20.04 LTS`, `22.04 LTS`, `24.04 LTS`, and `25.10`. The Canadian Centre for Cyber Security highlighted the advisories in notices `AV26-264` and `AV26-296`, covering Ubuntu security updates released over consecutive weekly periods. The Cyber Centre urged users and administrators to review the referenced Ubuntu Security Notices and apply the required updates to affected systems. The advisories describe defensive patching activity for kernel flaws across supported Ubuntu versions and do not report a named threat actor, ransomware operation, or confirmed active exploitation campaign.Cyber Centre issues advisory AV26-367 for new Ubuntu kernel fixesApr 20, 2026
5Apple Pay Phishing Using Fake Apple Support Calls to Steal Payment DetailsA phishing campaign targeting **Apple Pay** users is using realistic-looking emails to push victims into calling a fraudulent “Apple Support” phone number, shifting the attack from link-clicking to **vishing** (voice phishing). The lure commonly claims a high-value Apple Store charge was attempted or stopped, and includes plausible details (e.g., **case ID**, timestamp, and an “appointment” to review the activity) to create urgency and legitimacy. Malwarebytes reported the operation’s objective is to extract **login/verification codes** and **payment data** during the phone interaction, enabling attackers to take over the victim’s Apple account and potentially access associated data and linked payment methods. Follow-on reporting highlighted the use of Apple branding and invoice-style formatting (including high-ticket purchase claims) to increase conversion, and emphasized the potential impact of account compromise beyond payment theft (e.g., access to stored personal data and connected services).Attackers abuse Apple account alerts to send authenticated callback phishing emailsApr 19, 2026
5Critical Zebra Flaws Enable Zcash Node Crashes and Consensus SplitsTwo high-severity vulnerabilities in **Zebra**, the Rust-based Zcash node implementation, could let attackers disrupt node availability and network consensus. **`CVE-2026-34202`** allows a remote, unauthenticated attacker to crash vulnerable nodes by sending a specially crafted **V5 transaction** that passes deserialization but triggers a panic during transaction ID calculation. The bug affects versions before **`zebrad 4.3.0`** and **`zebra-chain 6.0.1`**, creating a P2P-reachable denial-of-service condition with high availability impact. A second flaw, **`CVE-2026-34377`**, stems from improper verification in Zebra's transaction verification cache and could allow a malicious miner to cause a **consensus split**. By reusing a valid transaction ID with invalid authorization data, an attacker could make vulnerable Zebra nodes accept an invalid block while **invulnerable Zebra and Zcashd nodes** stay on the correct chain. The issue affects versions before **`zebrad 4.3.0`** and **`zebra-consensus 5.0.1`**; patches are available in **`zebrad 4.3.0`**, **`zebra-chain 6.0.1`**, and **`zebra-consensus 5.0.1`**.Zebra Orchard signature verification DoS vulnerability is disclosedApr 18, 2026
5AI Workflow and Agent Security Risks: Prompt Injection, Credential Leakage, and Recommendation PoisoningMultiple reports warn that the most immediate AI security risk is **attackers hijacking trusted workflows**—AI copilots/agents, CI pipelines, SaaS admin planes, and identity control points—rather than “AI” being a standalone threat category. Commentary and research highlight how prompt-injection-style techniques can turn normal user actions (e.g., clicking a legitimate-looking link) into **silent data exfiltration** or unsafe tool use, and how autonomous agents can still complete scams even when they can correctly label a page as phishing. 1Password introduced an open-source benchmark, **Security Comprehension and Awareness Measure (SCAM)**, to test whether AI agents behave safely in realistic workplace tasks (email triage, link clicking, retrieving credentials from a vault, and form-filling) using production-like APIs; in testing, models that could identify phishing when asked still proceeded to **retrieve and submit real credentials** during routine workflows. Microsoft research described **AI recommendation poisoning** affecting 31 companies across 14 industries, where hidden instructions embedded in “*Summarize with AI*” links attempt to inject persistent directives into an assistant’s memory via URL prompt parameters, biasing future recommendations (e.g., prioritizing a specific domain/company). Separately, identity-focused analysis argues that as AI increases automation and API-driven decisioning, **identity becomes the enterprise control plane**, making IAM architecture and resilience (including where policy evaluation and authorization live) a central security concern at “AI scale.” Two SC Media opinion pieces broaden the theme: one ties recent supply-chain and developer-workflow compromises (e.g., malicious packages/actions and token theft) to the same “trusted workflow” abuse pattern, while another discusses mobile apps as an early-warning surface for supply-chain risk (including AI arriving via third-party SDKs), but it is more forward-looking guidance than incident reporting.Researchers disclose AI agent integration flaws and vendors dispute severityApr 19, 2026
5Silver Fox Targets Japanese Firms With Tax-Season Phishing and ValleyRATSilver Fox is running a targeted spearphishing campaign against Japanese manufacturers and other businesses by exploiting the annual tax filing period and March organizational changes. The attacker is sending localized emails that spoof real employees or senior executives, often include the victim company’s name in the subject line, and use believable HR and finance pretexts such as tax compliance violations, salary adjustments, and personnel changes. The messages push recipients to open malicious attachments or download files from public hosting services including `gofile[.]io` and WeTransfer, commonly delivered in ZIP or RAR archives. The campaign delivers **ValleyRAT** (`Win64/Valley`), a remote access trojan that enables remote control, persistence, information theft, user monitoring, and possible lateral movement inside compromised environments. ESET said it observed examples of the phishing emails in mid-March and linked the activity to a broader Silver Fox operation active since at least 2023, which has expanded from Chinese-speaking targets into Southeast Asia, Japan, and possibly North America. Researchers said the timing mirrors activity seen during the same seasonal window last year, suggesting the group deliberately aligns attacks with predictable business cycles to improve success rates.Technical details published on Silver Fox Rakuten invoice ValleyRAT chainApr 19, 2026
5Microsoft Teams Social Engineering Abuses Quick Assist to Deploy A0BackdoorA social-engineering campaign targeting employees at **financial and healthcare** organizations is abusing **Microsoft Teams** chats/calls to trick users into granting remote access via *Windows Quick Assist*, enabling deployment of a newly identified malware family dubbed **A0Backdoor**. The activity begins with **email bombing** (flooding inboxes with spam) followed by an attacker impersonating internal IT over Teams, offering help and then persuading the victim to start a Quick Assist session; the tradecraft overlaps with tactics previously attributed to **Blitz Brigantine / Storm-1811**, which Microsoft has linked to **Black Basta**-associated operations. Post-access, the actor deploys **digitally signed MSI installers** masquerading as Teams-related components and *CrossDeviceService* (associated with Windows *Phone Link*), sometimes delivered via **tokenized links** from Microsoft personal cloud storage to appear trustworthy and hinder collection. BlueVoyant reported the installers drop files into user `AppData` paths that mimic legitimate Microsoft locations and use **DLL sideloading** (e.g., a malicious `hostfxr.dll`) to execute an in-memory loader that decrypts shellcode, performs sandbox checks, and ultimately extracts and runs **A0Backdoor** (using **AES**-encrypted payloads and a **SHA-256**-derived key), with anti-analysis behavior including excessive thread creation intended to disrupt debugging.Microsoft details lateral movement and Rclone data exfiltration in the intrusion playbookApr 18, 2026
4Emergence and Operations of The Gentlemen Ransomware-as-a-Service GroupThe Gentlemen ransomware group has rapidly established itself as a significant threat actor since its emergence around July 2025, leveraging a Ransomware-as-a-Service (RaaS) model and advanced dual-extortion tactics. The group has claimed at least 48 victims within a three-month period, utilizing the XChaCha20 encryption algorithm to lock files and exfiltrating sensitive business data to pressure organizations into paying ransoms. Their operations are characterized by a combination of established ransomware techniques and innovative strategies, including the development of their own RaaS platform after experimenting with various affiliate models, which has enabled them to quickly adapt to new attack vectors and maintain persistence against targeted organizations. Threat intelligence reports highlight that The Gentlemen's data leak site is active, and the group has demonstrated a willingness to publish stolen data if ransom demands are not met. Their evolution from testing other ransomware platforms to building a proprietary service underscores their technical sophistication and intent to scale operations. Security professionals are advised to monitor for indicators of compromise related to The Gentlemen and to ensure robust data protection and incident response measures are in place to mitigate the risk posed by this rapidly evolving ransomware group.The Gentlemen surpasses 320 claimed victimsApr 20, 2026
4Phishing Campaigns Deliver Remcos RAT via Obfuscated Scripts and Trusted ServicesResearchers reported multiple **Remcos RAT** campaigns using phishing emails and trusted infrastructure to infect victims while evading detection. In one intrusion chain, a ZIP attachment named `MV MERKET COOPER SPECIFICATION.zip` delivered an obfuscated JavaScript file that fetched a PowerShell loader from `almacensantangel[.]com`; the loader then reconstructed and decrypted payloads in memory, including `ALTERNATE.dll` and `Cqeqpvzeia.exe`. The malware injected into the legitimate Microsoft .NET utility `aspnet_compiler.exe`, communicated with `192[.]3[.]27[.]141:8087`, and stored captured keystrokes and other data in `C:\ProgramData\remcos\logs.dat`, leaving few disk artifacts. A separate campaign used phishing emails that linked to a fake Google Drive sharing page hosted through **Google Cloud Storage** and the trusted `googleapis.com` domain, helping the attack bypass email and web filtering. After user interaction, the infection chain used staged JavaScript redirects or downloads, followed by VBScript or PowerShell execution to retrieve the final Remcos payload, which was then injected into a legitimate Windows process through **process hollowing**, persisted via Windows Registry entries, and opened encrypted command-and-control channels. The activity underscores how attackers are combining living-off-the-land techniques, trusted cloud services, obfuscated scripting, and legitimate Windows binaries to deploy Remcos for surveillance and data theft.Researchers detail purchase-order Remcos RAT phishing chainApr 20, 2026
4Research Warns AI Agents Are Rapidly Improving at Vulnerability Discovery and ExploitationRecent research and evaluations indicate **AI agents are becoming capable of finding and exploiting vulnerabilities with high success rates using standard offensive tooling**, lowering the barrier to semi-autonomous attacks. A study by Irregular in collaboration with **Wiz** reported that leading models (Anthropic *Claude Sonnet 4.5*, OpenAI *GPT-5*, and Google *Gemini 2.5 Pro*) solved **9 of 10** web security CTF challenges modeled on real-world incident patterns, including **authentication bypass**, **exposed secrets**, **stored XSS**, and **SSRF** (including **AWS Instance Metadata Service (IMDS)**-style SSRF). Researchers noted that even when success required multiple stochastic runs, the **low per-run cost (~$2) and limited repeats** could make exploitation practical without necessarily triggering monitoring, with most challenge successes costing **under $1** and multi-run cases totaling roughly **$1–$10**. Separate evaluation results highlighted by Bruce Schneier, citing an Anthropic post, describe *Claude Sonnet 4.5* successfully executing **multistage attacks across simulated networks** using only **standard open-source tools** rather than custom cyber toolkits, including exfiltrating all simulated PII in a high-fidelity **Equifax-breach** simulation by recognizing and exploiting a known **publicized CVE**. In parallel, Dark Reading reported security concerns around the rapid adoption of an open-source autonomous assistant, **OpenClaw** (formerly *MoltBot/ClawdBot*), which can connect to email, files, messaging, and system tools, execute terminal commands and scripts, and maintain memory across sessions—creating **persistent non-human identities and access paths** that may fall outside traditional **IAM** and secrets controls, increasing enterprise risk as “bring-your-own-AI” agents gain privileged access.Hacktron demonstrates Claude Opus 4.6 building Discord Chromium exploit chainApr 20, 2026
4April Windows Server Update Triggers Domain Controller Reboot LoopsMicrosoft said the Windows security update `KB5082063` can cause some Windows domain controllers to enter continuous reboot loops after `LSASS` crashes during startup. The issue affects non-Global Catalog domain controllers in environments using Privileged Access Management, disrupting Active Directory authentication and directory services and potentially making affected domains unavailable. Impacted platforms include Windows Server 2016, 2019, 2022, 23H2, and 2025, while consumer systems and devices outside IT-managed domains are not affected. Microsoft has not yet released a fix and is advising affected organizations to contact Microsoft Support for Business for mitigation guidance. The company also acknowledged two other known issues tied to `KB5082063`: installation failures on some Windows Server 2025 systems and BitLocker recovery key prompts on some Windows Server 2025 devices. The incident adds to a string of recent Windows Server update problems that have affected domain controllers and authentication services in enterprise environments.Microsoft releases emergency OOB updates for KB5082063 server issuesApr 20, 2026
3Red Hat Linux Kernel Vulnerabilities Prompt Broad Update AdvisoryThe Canadian Centre for Cyber Security issued two notices warning that Red Hat had published multiple security advisories for vulnerabilities affecting several products, with a particular focus on **Linux kernel** updates. The affected offerings include **Red Hat CodeReady Linux Builder**, **Red Hat Enterprise Linux**, **Red Hat Enterprise Linux Server**, and **Red Hat Enterprise Linux for Real Time** across multiple versions and platforms. The first notice, `AV26-318`, covered Red Hat advisories released between March 30 and April 5, while the second, `AV26-341`, covered advisories published between April 6 and 12. In both cases, the Cyber Centre urged users and administrators to review the referenced Red Hat advisories and apply the necessary updates to address the disclosed vulnerabilities.Canadian Centre for Cyber Security issues notice AV26-369Apr 20, 2026
3Critical RCE Vulnerabilities in AI Inference Frameworks via Insecure Code ReuseCybersecurity researchers have identified a chain of critical remote code execution (RCE) vulnerabilities affecting major AI inference server frameworks, including those from Meta, Nvidia, Microsoft, and open-source projects such as vLLM and SGLang. The root cause of these vulnerabilities is the unsafe use of ZeroMQ (ZMQ) in combination with Python's pickle deserialization, which was propagated across multiple projects due to direct code copying. This insecure pattern, first observed in Meta's Llama Stack, allowed arbitrary code execution over unauthenticated sockets and was subsequently found in other frameworks, exposing enterprise AI stacks to systemic risk. The vulnerabilities have been assigned CVE-2024-50050 and have been patched in affected projects, but the incident highlights the dangers of code reuse without proper security review. Oligo Security's investigation revealed that the same vulnerable logic was copied line-for-line between projects, perpetuating the flaw across different ecosystems and maintainers. The issue underscores a systemic security gap in the rapidly evolving AI inference ecosystem, where insecure patterns can quickly become widespread through open-source collaboration and code sharing. Security experts emphasize the need for rigorous security audits and caution when reusing code, especially in critical infrastructure like AI frameworks, to prevent similar vulnerabilities from proliferating in the future.CERT/CC discloses SGLang RCE via model chat template renderingApr 20, 2026
3Zerion and KelpDAO link security incidents to DPRK TraderTraitor activityZerion published a **security incident post-mortem**, and LayerZero later issued a **KelpDAO incident statement**, with both incidents being publicly tied in threat-intelligence discussion to **DPRK** activity. Social-media reporting around the disclosures specifically associated the KelpDAO case with **TraderTraitor**, the North Korean cluster known for targeting cryptocurrency and Web3 organizations through social engineering and wallet compromise. The available references do not provide technical indicators, loss figures, or a detailed attack chain, but they place both disclosures in the context of crypto-focused intrusions attributed to North Korean operators. For CISOs in digital-asset, DeFi, and wallet ecosystems, the incidents reinforce the ongoing risk from DPRK-linked campaigns that exploit trusted workflows, third-party relationships, and user-facing transaction processes to gain access and move funds.LayerZero publishes KelpDAO incident statementApr 20, 2026
3German and EU Civil Society Warn Against Weakened AI Surveillance and Safety RulesCivil society groups in Germany, including Amnesty International and the Chaos Computer Club, urged the government to withdraw draft laws that would expand digital policing powers through **biometric internet searches** and automated analysis of large police datasets using systems such as **Palantir**. Critics said the proposals from the justice and interior ministries lack judicial oversight, transparency, documentation requirements, and clear limits on data scope and analytical methods, creating risks of mass surveillance, discriminatory profiling, and intrusive scrutiny of victims, witnesses, and uninvolved people. Germany’s independent data protection authorities also concluded that the measures, as drafted, are incompatible with constitutional requirements and could effectively sidestep the EU AI Act’s ban on mass facial-image processing into biometric databases. At the EU level, a coalition led by **BEUC** and 31 other organizations warned that the proposed **AI Omnibus** could dilute safeguards by exempting sectors such as medical devices, radio equipment, toys, and machinery from the AI regulation’s direct scope. The groups argued that existing sector-specific product rules do not address AI-specific harms including discrimination, opacity, and the evolving behavior of AI systems, and said the change would create regulatory gaps, fragmentation, and legal uncertainty rather than simplification. They warned that weakening the framework would undermine consumer protection, fundamental rights, and trust in European AI governance as trilogue negotiations continue.Germany publishes 2025 police crime statisticsApr 20, 2026
3TWCERT discloses unauthenticated flaws in Openfind MailGates and Digiwin EasyFlow .NETTWCERT published two high-severity vulnerability entries affecting enterprise software from Taiwanese vendors. **Openfind MailGates/MailAudit** is affected by `CVE-2026-6351`, a `CWE-93` **CRLF injection** flaw that can be exploited by an unauthenticated remote attacker to read system files, creating a significant confidentiality risk. The issue was documented with CVSS v3.1 and v4.0 scoring and linked to TWCERT advisory references. TWCERT also disclosed `CVE-2026-5964` in **Digiwin EasyFlow .NET**, a `CWE-89` **SQL injection** vulnerability that allows unauthenticated remote attackers to execute arbitrary SQL commands. Successful exploitation could let attackers read, modify, or delete database contents, affecting confidentiality, integrity, and availability. Both disclosures highlight externally reachable attack paths requiring no authentication and raise immediate patching and exposure-review concerns for organizations using the affected products.TWCERT receives CVE-2026-5963 report for Digiwin EasyFlow .NETApr 20, 2026
3Critical Cisco ISE Flaws Enable Authenticated RCE and File ExposureCisco disclosed two vulnerabilities in **Identity Services Engine (ISE)** and **ISE Passive Identity Connector (ISE-PIC)** that can allow authenticated attackers to execute malicious code and access sensitive files. The most severe flaw, **`CVE-2026-20147`** with a **CVSS 9.9**, is an authenticated remote code execution issue that can provide user-level operating system access and may be escalated to **root**. A second flaw, **`CVE-2026-20148`** with a **CVSS 4.9**, is an authenticated path traversal vulnerability that can expose files from the underlying operating system.Cisco discloses additional ISE and Webex flaws with security updatesApr 20, 2026
3Microsoft Pushes Windows 11 Reliability Improvements Amid TPM 2.0 Upgrade FrictionMicrosoft is reportedly shifting Windows 11 engineering toward improving **performance, reliability, and overall user experience** in an effort to rebuild trust after ongoing complaints about buggy updates and UI issues. Reporting cites an internal focus on “**swarming**” to address core problems, following high-visibility failures such as **boot issues after a January 2026 security update** and prior updates that disrupted recovery and reinstall workflows. In parallel, user-facing friction around Windows 11’s **TPM 2.0** hardware requirement continues to drive “unsupported” upgrade behavior. Guidance circulated on how to bypass Microsoft’s compatibility checks to install Windows 11 on otherwise capable Windows 10-era systems that lack TPM 2.0, framed against Microsoft’s end of Windows 10 support and upgrade prompts encouraging users to buy new hardware; the article also reiterates TPM’s role as a security component for protecting keys and mitigating certain risks.
3Microsoft ships Windows 11 KB5083769 and KB5082052 with RDP and BitLocker fixesMicrosoft released mandatory Windows 11 cumulative updates **KB5083769** for versions **25H2/24H2** and **KB5082052** for **23H2**, delivering April Patch Tuesday security fixes alongside reliability and feature improvements. The `25H2` and `24H2` releases share the same changes because both are based on `24H2`, and the update moves those branches to builds **26200.8246** and **26100.8246**. Microsoft said the packages include protections against phishing through malicious **`.rdp`** files, Secure Boot certificate management improvements, and a fix for an issue that had pushed some systems into **BitLocker Recovery** after Secure Boot updates; the release also bundles servicing stack update **KB5088467**.Microsoft deploys server-side fix for KB5083769 BitLocker recovery issueApr 19, 2026
3Microsoft discloses Chromium and jq memory-handling vulnerabilitiesMicrosoft added three vulnerabilities to its Security Update Guide, including **`CVE-2026-5874`** affecting Chromium and two flaws in **`jq`**. The Chromium issue is described as a **use-after-free in PrivateAI**, a class of memory-safety bug that can lead to crashes or potentially arbitrary code execution depending on exploitability and surrounding mitigations. The two `jq` entries, **`CVE-2026-39979`** and **`CVE-2026-33948`**, describe input-handling weaknesses in the JSON processor: an **out-of-bounds read** in `jv_parse_sized()` error formatting for non-NUL-terminated counted buffers, and an **embedded-NUL truncation** issue in the CLI JSON input path that can cause **prefix-only validation of malformed input**. Together, the disclosures highlight memory and parsing risks in widely used software components that may affect systems relying on Chromium-based software or `jq` for JSON processing.Microsoft publishes advisory for CVE-2026-33948 in jqApr 17, 2026
3Attackers Use QEMU Hidden VMs to Steal Data and Deliver PayoutsKing RansomwareSophos reported that threat actors are increasingly abusing **QEMU** to launch hidden virtual machines on compromised systems, allowing credential theft, reconnaissance, covert access, data exfiltration, and ransomware staging to occur outside the visibility of many endpoint security tools. The activity was tied to two campaigns, `STAC4713` and `STAC3725`, in which attackers deployed lightweight Alpine Linux VMs that left minimal forensic evidence on the host while supporting tools such as AdaptixC2, Chisel, Rclone, `wg-obfuscator`, Impacket, BloodHound.py, Kerbrute, and Metasploit. `STAC4713` was linked to the **GOLD ENCOUNTER / PayoutsKing** ransomware operation and used scheduled tasks, reverse SSH tunnels, and QEMU-hosted tooling after gaining access through exposed SonicWall VPNs without MFA and exploitation of SolarWinds Web Help Desk `CVE-2025-26399`; Sophos said the group later also used phishing and fake Microsoft Teams IT support, and in some intrusions shifted from QEMU to Havoc C2 sideloading via `ADNotificationManager.exe` with exfiltration through Rclone. In `STAC3725`, attackers exploited **CitrixBleed2** (`CVE-2025-5777`), installed a malicious ScreenConnect client, created a rogue local administrator account, and used a QEMU VM to manually assemble an attack toolkit, underscoring a broader trend of adversaries using virtualization platforms including QEMU, Hyper-V, and VMware to evade detection and complicate incident response.Sophos publishes report on QEMU abuse for evasion and ransomware deliveryApr 16, 2026
2Dell Issues Security Advisories for PowerEdge, PowerProtect, Connectrix, and Networking ProductsDell released multiple security advisories covering vulnerabilities across a broad set of enterprise infrastructure products, and the Canadian Centre for Cyber Security urged organizations to review the notices and apply updates. The affected technologies span storage, networking, data protection, and server platforms, including **Connectrix Switches and Directors**, **AMD-based PowerEdge Servers**, **Dell Command | Update** versions prior to `5.7.0`, **PowerProtect Data Domain**, and **Dell Storage Manager - Replay Manager for Microsoft Servers** versions prior to `8.0.3`. Additional advisories also affected **Data Protection Advisor**, **Dell EMC Isilon OneFS**, **Dell EMC PowerScale**, **Dell Networking OS10**, **PowerProtect DP Series Appliance**, **Elastic Cloud Storage**, **ObjectScale**, and several **PowerSwitch** models. The Canadian notice linked Dell advisories including `DSA-2026-041`, `DSA-2026-171`, `DSA-2026-058`, and `DSA-2026-190`, and characterized the activity as a vendor patch and mitigation effort rather than evidence of active exploitation.Canadian Centre for Cyber Security issues Dell advisory AV26-366Apr 20, 2026
2MiningDropper Android Framework Delivers Infostealers, RATs, and Banking MalwareResearchers reported a large-scale Android malware campaign built around **MiningDropper**, a modular multi-stage framework used to distribute cryptocurrency miners alongside more dangerous payloads including infostealers, banking malware, and remote access trojans. The operation used phishing pages, social media links, and fraudulent websites to trick users into installing malicious APKs disguised as legitimate apps, and was linked to campaigns targeting users in India, Europe, Latin America, and Asia. Investigators observed more than **1,500 samples** in a month, with many showing very low antivirus detection, indicating broad scale and effective evasion. Technical analysis showed the infection chain began with a trojanized version of the open-source **LumoLight** Android project and progressed through staged loaders using XOR-obfuscated native code, AES-encrypted payloads, dynamic DEX loading, split-APK reconstruction, and anti-emulation checks. One analyzed sample, distributed as **`Free Secure – Annulation.apk`**, displayed a fake Google Play update screen before activating a miner path or installing a final payload such as **BTMOB RAT**. The delivered malware enabled credential theft, keylogging, Accessibility abuse, remote device control, audio recording, file management, and financial fraud, underscoring MiningDropper’s role as a reusable malware delivery framework rather than a simple crypto-mining dropper.Cyble publishes technical analysis of the MiningDropper frameworkApr 15, 2026
2Moxa Product Flaws Enable Privilege Escalation and Security Policy BypassCERT-FR published two advisories covering vulnerabilities in **Moxa** products, warning that the flaws could let attackers **escalate privileges** and undermine core security controls. One notice said successful exploitation could also affect **data confidentiality** and **data integrity**, raising concern for industrial and networked environments where Moxa equipment is commonly deployed. A separate CERT-FR notice reported another Moxa vulnerability that could allow an attacker to **bypass the security policy**. The advisories did not provide further technical details in the referenced content, including affected models, `CVE` identifiers, or specific remediation steps, leaving organizations to monitor vendor and national CERT guidance closely for product impact and patch information.CERT-FR publishes second Moxa vulnerability notice for security-policy bypassApr 20, 2026
2Kimsuky Uses Malicious LNK Files to Deliver Python BackdoorNorth Korea-linked threat group **Kimsuky** has been reported using malicious Windows shortcut (`.LNK`) files to initiate a **multi-stage infection chain** that ends with deployment of a **Python-based backdoor**. Reporting shared from both AhnLab and Excalibra indicates the campaign relies on weaponized LNK files as the initial access vector, with the malware delivery process evolving from earlier distribution patterns. The activity was attributed to Kimsuky in threat-intelligence reporting and social media amplification, with references also linking the cluster to **DPRK** operations and possible overlap or comparison with **Konni** tracking. While the cited summaries did not include victimology or technical indicators, they consistently described a shift in how the group distributes malware and highlighted the use of LNK-based social engineering to stage follow-on payloads.Excalibra details Kimsuky multi-stage LNK-to-Python backdoor attackApr 20, 2026
2Anthropic MCP STDIO Design Flaw Enables RCE Across AI ToolingResearchers at **OX Security** disclosed a design-level weakness in Anthropic’s **Model Context Protocol (MCP)** that can allow **arbitrary OS command execution** through unsafe `STDIO` transport behavior, creating a broad AI supply-chain risk. The flaw is reported to propagate through Anthropic’s official MCP SDKs into downstream tools and agents, with researchers linking it to at least **10 high- and critical-severity vulnerabilities** across widely used projects. Reported impacts include exposure of sensitive data such as API keys, chat histories, internal databases, and developer workstations, while estimates of exposure range from more than **7,000 publicly accessible servers** to as many as **200,000 servers** potentially at risk. Affected or cited projects include **LangFlow, Flowise, GPT Researcher, Upsonic, Windsurf, Claude Code, Cursor, Gemini-CLI, GitHub Copilot, LiteLLM,** and **LettaAI**. OX Security said it began reporting the issue to Anthropic in late 2025, but Anthropic reportedly treated the behavior as expected and responded by updating security guidance rather than changing the protocol architecture. Researchers described four main abuse paths: direct command injection, hardening bypass, zero-click or near-zero-click prompt injection in AI IDEs and coding assistants, and malicious MCP marketplace submissions that can execute commands on developer machines; they urged organizations to restrict public exposure, sandbox MCP-enabled services, treat external MCP configurations as untrusted, monitor MCP tool use, and install MCP servers only from verified sources.Public disclosure warns MCP flaw threatens AI supply chainApr 20, 2026
2Multiple Vulnerabilities Reported in LangflowGerman security advisories reported **multiple vulnerabilities** in **Langflow**, with separate notices identifying the product as affected and indicating that more than one security issue required attention. The advisories, `2026-0806` and `2026-1154`, both classify the matter as a set of vulnerabilities rather than a single flaw, pointing to an ongoing security issue affecting the Langflow platform. The available notices do not include public technical synopses, but the repeated publication of advisories for the same product indicates continued vulnerability management activity and the likelihood of updated findings or remediation guidance. Organizations using Langflow should review the referenced advisories, validate their deployed versions, and apply vendor or maintainer fixes and mitigations as they become available.dCERT publishes advisory 2026-1154 on Langflow vulnerabilitiesApr 20, 2026
2Unauthenticated RCE in FortiClient EMS Is Being Actively ExploitedA critical vulnerability in **FortiClient EMS**, Fortinet’s endpoint management platform, allows **unauthenticated remote code execution** on affected servers. The issue impacts **FortiClient EMS 7.4.5 and 7.4.6**, exposing organizations that use the product to potential full compromise of the management system. Fortinet has reported **active exploitation in the wild**, and Finland’s National Cyber Security Centre has urged organizations to apply the available **hotfix immediately**. Because the flaw can be exploited without authentication, exposed FortiClient EMS instances should be treated as high priority for emergency remediation and compromise assessment.Fortinet releases hotfix for vulnerable FortiClient EMS versionsApr 4, 2026
2SQL Injection Flaws in Saltcorn and Dagster Enable Data Theft and Privilege EscalationTwo disclosed SQL injection vulnerabilities affect **Saltcorn** and **Dagster**, allowing authenticated users to execute unintended database queries and access data beyond their assigned privileges. In Saltcorn, the flaw in mobile sync endpoints can bypass application-level authorization controls to extract arbitrary table contents, including sensitive records from `_sc_config` and bcrypt password hashes from the `users` table. The exposure can also include active administrative session identifiers in some deployments, creating a direct path to account takeover. The impact extends beyond data exposure in several configurations. Saltcorn deployments using PostgreSQL may permit stacked queries, enabling attackers to run DML or DDL statements that delete tables, alter configuration, and escalate from a low-privileged account to full administrative control. In Dagster, injected SQL runs with the privileges assigned to the platform's database credentials, which often include broad read, write, and delete access to warehouse data. The risk is particularly acute in Dagster OSS, where limited RBAC means users with API access may be able to trigger the flaw, while Dagster+ reduces default exposure but can still permit privilege escalation under custom RBAC settings.Dagster dynamic partitions SQL injection vulnerability disclosedApr 18, 2026
2Mount Option Injection Flaw in Amazon EFS CSI DriverAWS disclosed **CVE-2026-6437**, a mount option injection vulnerability in the Amazon EFS CSI Driver that stems from insufficient input validation before user-controlled values are passed to the operating system's mount helper. In affected versions prior to `3.0.1`, Kubernetes `PersistentVolume` attributes including `mounttargetip` and `volumeHandle` can be crafted with injected comma-separated values that the Linux mount process interprets as additional mount options. Because the driver builds the mount option string directly from those fields and executes with elevated privileges on Kubernetes nodes, an attacker could cause unauthorized mount flags to be applied to the target EFS filesystem during the CSI driver's mount operation. The flaw affects environments using vulnerable EFS CSI Driver releases, and the reported remediation is to upgrade to version `3.0.1` or later.Technical details published for mount option injection flawApr 18, 2026
2Nuclei Templates Added for Axios and MCP Atlassian SSRF FlawsProjectDiscovery's `nuclei-templates` repository received pull requests adding detection coverage for two server-side request forgery issues: **CVE-2026-27826**, described as an MCP Atlassian SSRF reachable via HTTP headers, and **CVE-2025-62718**, an Axios SSRF vulnerability tied to a hostname normalization and `NO_PROXY` bypass. The updates indicate that public detection content is being prepared for defenders to identify exposed systems affected by both flaws. The GitHub activity shows the templates were submitted through separate bounty-related pull requests and routed through the project's normal review workflow, including automated assignment and reviewer requests. While the referenced discussions expose few technical specifics beyond the vulnerability names and high-level attack paths, the additions signal active security community attention on SSRF risks affecting both Atlassian-related MCP deployments and applications using vulnerable Axios proxy-handling logic.Nuclei template PR opened for Axios SSRF / NO_PROXY bypass CVE-2025-62718Apr 19, 2026
2Apple Fixes Broad Set of iOS, macOS, and visionOS VulnerabilitiesApple released a wide-ranging set of security updates across **iOS**, **iPadOS**, **macOS Tahoe**, **watchOS**, **tvOS**, **visionOS**, **Safari**, and **Xcode**, addressing more than 85 vulnerabilities across core components including the kernel, WebKit, AirPlay, Keychain, and open-source libraries. The updates fix issues that could enable traffic interception, kernel state disclosure, user fingerprinting, installed-app enumeration, Mail privacy bypasses, exposure of deleted Notes content, and crashes from out-of-bounds writes. Apple said it had no reports of in-the-wild exploitation for the vulnerabilities listed in the release notes, but urged users to update, with particular importance for older devices and managed macOS environments. Among the patched flaws is **`CVE-2024-27828`**, a high-severity memory-handling bug in **IOSurfaceRoot** that could let a local app trigger a kernel panic or execute arbitrary code with kernel privileges. STAR Labs said the issue stemmed from a reference count leak in `IOSurfaceRootUserClient::s_create_shared_event`, where repeated calls with crafted input could corrupt memory handling; the flaw affected iOS and iPadOS before 17.5, tvOS before 17.5, watchOS before 10.5, and visionOS before 1.2. Apple addressed the bug through improved memory handling, adding it to a broader pattern of fixes spanning both current and legacy Apple platforms.Apple releases broad security update wave fixing 85+ vulnerabilitiesMar 26, 2026
2JavaScript Library Flaws Enable Sandbox Escape and Code ExecutionTwo high-severity flaws were disclosed in widely used JavaScript libraries, exposing applications to sandbox bypass and arbitrary code execution. **CVE-2026-34208** affects SandboxJS before `0.8.36` and allows attacker-supplied code to evade protections on direct assignment to global objects by abusing an exposed constructor path. The bypass uses `this.constructor.call(target, attackerObject)` to reach the internal `SandboxGlobal` function while `Function.prototype.call` remains permitted, enabling arbitrary properties to be written into host global objects and persist across sandbox instances in the same process. A separate issue, **CVE-2026-41242**, impacts `protobufjs` before `8.0.1` and `7.5.5`, where attackers can inject arbitrary code into Protocol Buffers definition `type` fields and trigger execution during object decoding with a malicious schema. The flaw is tracked as **CWE-94** and carries a CVSS v4 rating reflecting network-reachable exploitation with high impact to confidentiality, integrity, availability, and downstream systems. Maintainers released fixes in SandboxJS `0.8.36` and protobufjs `8.0.1` and `7.5.5`.protobufjs releases 8.0.1 and 7.5.5 to patch CVE-2026-41242Apr 18, 2026
Want to go back further? Create an account to access the full archive, custom alerts, and deeper analysis.
Prefer RSS? Grab any topic — or the full firehose — from the feeds page