24h | 7d | 30d

Overview

  • F5
  • NGINX Plus

13 May 2026
Published
14 May 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.15%

KEV

Description

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Statistics

  • 16 Posts
  • 4 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

@GossiTheDog I’ve noticed today that many media outlets are mentioning this VulnCheck research where they say NGINX CVE-2026-42945 is being actively exploited because they detected honeypot activity. Thoughts on this Kevin? Here’s an example article…. helpnetsecurity.com/2026/05/18

  • 2
  • 1
  • 0
  • 13h ago
Profile picture fallback

🚨 NGINX bug (CVE-2026-42945) now under active exploitation.

Critical heap overflow in rewrite module. Attackers can crash workers with one request (possible RCE).

Patch now if using NGINX ≤1.30.0. Check rewrite/if/set rules.

Full details: thehackernews.com/2026/05/ngin

  • 0
  • 1
  • 0
  • 19h ago
Profile picture fallback

🚨 CRITICAL: Active exploitation of NGINX heap buffer overflow (CVE-2026-42945) in ngx_http_rewrite_module. Remote DoS on default, RCE possible if ASLR is off. Patch now! Official fix by F5. radar.offseq.com/threat/exploi

  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback

📰 Critical 18-Year-Old 'NGINX Rift' Vulnerability (CVE-2026-42945) Under Active Attack

🚨 CRITICAL NGINX FLAW! An 18-year-old bug 'NGINX Rift' (CVE-2026-42945) is actively exploited for DoS & RCE. Affects millions of web servers. Patch immediately! #NGINX #CVE #Infosec #PatchNow

🌐 cyber[.]netsecops[.]io

🔗 cyber.netsecops.io/articles/ng

  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback

Scan for possible exposure indicators related to NGINX Rift, CVE-2026-42945, with the SecPoint Penetrator.

This is a serious NGINX rewrite module vulnerability that may lead to worker crashes and, under specific conditions, potential code execution.

Our detection helps organizations identify systems that show remote indicators associated with this vulnerability, enabling faster prioritization and remediation.

#SecPoint #NGINX #CyberSecurity #VulnerabilityScanning #Penetrator

  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback

Geopolitical: US-China held cyber discussions, Iran seized a vessel near the Strait of Hormuz, and Ukraine experienced drone attacks on Moscow. Tech: Microsoft Edge enhanced password security; Colorado and Georgia enacted new AI legislation. Cybersecurity: Instructure paid hackers' ransom after a breach, and a critical NGINX vulnerability (CVE-2026-42945) is under active exploitation.

#AnonNews_irc #Cybersecurity #News

  • 0
  • 0
  • 0
  • 3h ago

Bluesky

Profile picture fallback
CVE-2026-42945 enables remote heap buffer overflow exploitation in NGINX rewrite, with DoS on default setups and possible RCE when ASLR is disabled.
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
Experts warn of active exploitation of critical NGINX flaw CVE-2026-42945 https://securityaffairs.com/192289/uncategorized/experts-warn-of-active-exploitation-of-critical-nginx-flaw-cve-2026-42945.html
  • 0
  • 0
  • 2
  • 18h ago
Profile picture fallback
NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE https://thehackernews.com/2026/05/nginx-cve-2026-42945-exploited-in-wild.html
  • 0
  • 0
  • 2
  • 18h ago
Profile picture fallback
Attackers are exploiting critical NGINX vulnerability (CVE-2026-42945) 📖 Read more: www.helpnetsecurity.com/2026/05/18/n... #cybersecurity #cybersecuritynews #exploit #PoC #vulnerability #NGINX #vulnerability @vulncheck.bsky.social @doublepulsar.com
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
nginxで18年間潜伏したヒープバッファオーバーフローが可能な脆弱性 NGINX Rift(CVE-2026-42945)-即時アップデート推奨 rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #security #securitynews
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
nginxの脆弱性 NGINX Rift(CVE-2026-42945)が公開3日でサイバー攻撃に悪用 rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #security #securitynews
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Microsoft
  • Windows 10 Version 20H2

09 Dec 2020
Published
18 May 2026
Updated

CVSS v3.1
HIGH (7.0)
EPSS
0.35%

KEV

Description

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Statistics

  • 4 Posts
  • 3 Interactions

Last activity: 11 hours ago

Fediverse

Profile picture fallback

winbuzzer.com/2026/05/18/new-w

MiniPlasma is a newly released proof-of-concept exploit that reportedly turns a standard Windows user into SYSTEM on fully patched Windows 11 systems, reviving doubts about a flaw Microsoft marked fixed in 2020.

#Cybersecurity #MiniPlasma #Microsoft #Windows11 #CVE202017103 #ChaoticEclipse #MicrosoftWindows #Windows11

  • 1
  • 1
  • 0
  • 13h ago

Bluesky

Profile picture fallback
MiniPlasma exploits CVE-2020-17103 in the Windows Cloud Filter driver to gain a System shell, indicating the vulnerability may remain unpatched on Windows 11.
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
Security researcher Chaotic Eclipse released a proof-of-concept showing the Cloud Filter driver flaw (CVE-2020-17103) can still escalate a standard user account to SYSTEM privileges six years after Microsoft's original fix. Source: BleepingComputer
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 5 Posts
  • 8 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture fallback

The Register quoted Wiz putting it plainly: “The Linux networking stack is starting to look less like infrastructure and more like a root exploit vending machine.”

byteiota.com/fragnesia-cve-202

#copyfail #dirtyfrag #fragnesia #linux

  • 1
  • 1
  • 0
  • 17h ago
Profile picture fallback

Fragnesia (CVE-2026-46300) i DirtyDecrypt (CVE-2026-31635) ( nfsec.pl/security/6722 )

youtube.com/watch?v=dWAPcXh8UEE

  • 1
  • 0
  • 0
  • 12h ago
Profile picture fallback

Security updates: Debian vs Ubuntu, AlmaLinux vs Rocky Linux

The last couple of weeks were turbulent for the Linux kernel: several critical security problems were disclosed . Three of them are local privilege escalation bugs: they allow any local user to become root. The vulnerabilities are named Copy Fail (CVE-2026-31431), Dirty Frag (CVE-2026-43284, CVE-2026-43500), Fragnesia (CVE-2026-46300). The fourth vulnerability, named ssh-keysign-pwn (CVE-2026-46333) allows a user to read root owned files, such as host SSH keys. There are exploits publicly […]

blog.frehi.be/2026/05/18/secur

  • 3
  • 1
  • 0
  • 7h ago

Bluesky

Profile picture fallback
Linux カーネルの脆弱性 Fragnesia(CVE-2026-46300)でroot権限奪取が可能 rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #security #securitynews
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Linux
  • Linux

15 May 2026
Published
18 May 2026
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: ptrace: slightly saner 'get_dumpable()' logic The 'dumpability' of a task is fundamentally about the memory image of the task - the concept comes from whether it can core dump or not - and makes no sense when you don't have an associated mm. And almost all users do in fact use it only for the case where the task has a mm pointer. But we have one odd special case: ptrace_may_access() uses 'dumpable' to check various other things entirely independently of the MM (typically explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for threads that no longer have a VM (and maybe never did, like most kernel threads). It's not what this flag was designed for, but it is what it is. The ptrace code does check that the uid/gid matches, so you do have to be uid-0 to see kernel thread details, but this means that the traditional "drop capabilities" model doesn't make any difference for this all. Make it all make a *bit* more sense by saying that if you don't have a MM pointer, we'll use a cached "last dumpability" flag if the thread ever had a MM (it will be zero for kernel threads since it is never set), and require a proper CAP_SYS_PTRACE capability to override.

Statistics

  • 4 Posts
  • 8 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

Linux Kernel 7.0.8 is released with patches to fix the ssh-keysign-pwn (CVE-2026-46333) root exploit flaw. Update your Linux system today.

More details here: ostechnix.com/linux-kernel-7-0

#Linux #Kernel708 #ssh_keysign_pwn #CVE_2026_46333 #Rootexploit #Security #Kernelpatch

  • 1
  • 1
  • 0
  • 15h ago
Profile picture fallback

CVE-2026-46333 - War wohl 6 jahre lang bekannt ohne das gehandelt wurde - gotekky.com/guides/security/cv

  • 1
  • 1
  • 0
  • 11h ago
Profile picture fallback

Security updates: Debian vs Ubuntu, AlmaLinux vs Rocky Linux

The last couple of weeks were turbulent for the Linux kernel: several critical security problems were disclosed . Three of them are local privilege escalation bugs: they allow any local user to become root. The vulnerabilities are named Copy Fail (CVE-2026-31431), Dirty Frag (CVE-2026-43284, CVE-2026-43500), Fragnesia (CVE-2026-46300). The fourth vulnerability, named ssh-keysign-pwn (CVE-2026-46333) allows a user to read root owned files, such as host SSH keys. There are exploits publicly […]

blog.frehi.be/2026/05/18/secur

  • 3
  • 1
  • 0
  • 7h ago

Overview

  • Microsoft
  • Microsoft Exchange Server 2016 Cumulative Update 23

14 May 2026
Published
18 May 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
12.34%

Description

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 2 Posts
  • 7 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture fallback

CVE-2026-42897: vulnerabilità critica XSS in Exchange Server OWA — mitigazione di emergenza disponibile
#tech
spcnet.it/cve-2026-42897-vulne
@informatica

  • 7
  • 0
  • 0
  • 7h ago
Profile picture fallback

Here's a professional summary of recent developments:

Fast16 malware, predating Stuxnet, is confirmed as a nuclear weapons simulation sabotage tool (May 18). A Microsoft Exchange vulnerability (CVE-2026-42897) is actively exploited. US-Iran tensions heighten after Trump's warnings of military action (May 18). Malta becomes the first country to offer ChatGPT Plus nationwide as a public service (May 17).

#Cybersecurity #Geopolitics #TechNews

  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Cisco
  • Cisco Catalyst SD-WAN Manager

14 May 2026
Published
15 May 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
25.94%

Description

May 2026: This security advisory provides the details and fix information for a vulnerability that was discovered and fixed after the was disclosed in February 2026. This new advisory is for a new vulnerability in the control connection handshaking. The section of this advisory includes Show Control Connections guidance to help with system checks.  A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to the affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.

Statistics

  • 5 Posts
  • 2 Interactions

Last activity: 11 hours ago

Fediverse

Profile picture fallback

UAT-8616: il gruppo d’élite sfrutta il sesto zero-day Cisco SD-WAN e prende di mira governi europei e asiatici

Un threat actor altamente sofisticato, UAT-8616, sfrutta CVE-2026-20182 — vulnerabilità critica CVSS 10.0 nel Cisco Catalyst SD-WAN — per compromettere organizzazioni governative, diplomatiche e della difesa in Europa e Asia Centrale. È la sesta zero-day sulla piattaforma SD-WAN nel 2026. La CISA ha aggiunto il CVE al catalogo KEV il 15 maggio.

insicurezzadigitale.com/uat-86

  • 0
  • 0
  • 1
  • 11h ago
Profile picture fallback

Cisco: Noch ein Zero-Day mit „perfekter 10“

Im Februar wurde eine weltweite Warnung verbreitet, weil Cisco SD-WAN Produkte Sicherheitslücken enthielten, die bereits seit mindestens 2023 für Angriffe ausgenutzt wurden (Zero-Day). Cisco hat Updates veröffentlicht, mit denen diese Sicherheitslücken geschlossen werden sollten. Jetzt kommt der Witz. Forscher des Sicherheitsunternehmens Rapid7 haben die Sicherheitslücke CVE-2026-20127 weiter untersucht und dabei eine weitere Sicherheitslücke gefunden! Sie hat die Nummer CVE-2026-20182 und die Risiko-Einstufung 10 von 10 bekommen. Auch diese Sicherheitslücke wird bereits für Angriffe ausgenutzt

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Warnung #0day #cybercrime #exploits #hersteller #hintertr #spionage #UnplugTrump #backdoor

  • 2
  • 0
  • 0
  • 20h ago

Bluesky

Profile picture fallback
🛡️ #Alerta Zero-Day: Cisco Advierte #Hackeos Activos en SD-WAN Controller (CVE-2026-20182) www.newstecnicas.com/2026/05/aler...
  • 0
  • 0
  • 1
  • 11h ago

Overview

  • PHP Group
  • PHP
  • php

27 Dec 2025
Published
29 Dec 2025
Updated

CVSS v4.0
MEDIUM (6.3)
EPSS
0.08%

KEV

Description

In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, the getimagesize() function may leak uninitialized heap memory into the APPn segments (e.g., APP1) when reading images in multi-chunk mode (such as via php://filter). This occurs due to a bug in php_read_stream_all_chunks() that overwrites the buffer without advancing the pointer, leaving tail bytes uninitialized. This may lead to information disclosure of sensitive heap data and affect the confidentiality of the target server.

Statistics

  • 2 Posts
  • 5 Interactions

Last activity: 17 hours ago

Fediverse

Profile picture fallback

CVE-2025-14177: Malicious JPEG Files Expose PHP Heap Memory — Critical Flaws in getimagesize() and iptcembed() Patched
#CyberSecurity
securebulletin.com/cve-2025-14

  • 5
  • 0
  • 0
  • 17h ago

Bluesky

Profile picture fallback
New JPEG Image Attack Exposes Critical PHP Memory Bugs: CVE-2025-14177 & iptcembed Heap Overflow + Video Introduction: Two critical memory-safety vulnerabilities have been discovered in PHP’s core image-processing functions, `getimagesize` and iptcembed, which could allow attackers to leak…
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • Four-Faith
  • F3x36

04 Feb 2025
Published
22 Nov 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
26.25%

KEV

Description

The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to authentication bypass due to hard-coded credentials in the administrative web server. An attacker with knowledge of the credentials can gain administrative access via crafted HTTP requests. This issue appears similar to CVE-2023-32645.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 14 hours ago

Fediverse

Profile picture fallback

🚨 In this week’s newsletter, we cover CVE-2024-9643, a Four-Faith router authentication bypass now moving into mass exploitation.
We break down how attackers are turning exposed industrial routers into botnet infrastructure and what defenders should do next.

Read the full analysis and protect your systems 👉 crowdsec.net/vulntracking-repo

  • 0
  • 1
  • 0
  • 14h ago

Bluesky

Profile picture fallback
🚨 In this week’s newsletter, we cover CVE-2024-9643, a Four-Faith router authentication bypass now moving into mass exploitation. Read the full analysis and protect your systems 👉 www.crowdsec.net/vulntracking...
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Cisco
  • Cisco Secure Firewall Management Center (FMC)

04 Mar 2026
Published
25 Mar 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
1.72%

Description

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root. Note: If the FMC management interface does not have public internet access, the attack surface that is associated with this vulnerability is reduced.

Statistics

  • 2 Posts

Last activity: 14 hours ago

Fediverse

Profile picture fallback

IT threat evolution in Q1 2026. Non-mobile statistics

IT threat evolution in Q1 2026. Non-mobile statistics
IT threat evolution in Q1 2026. Mobile statistics

The statistics in this report are based on detection verdicts returned by Kaspersky products unless otherwise stated. The information was provided by Kaspersky users who consented to sharing statistical data.

Quarterly figures


In Q1 2026:

  • Kaspersky products blocked more than 343 million attacks that originated with various online resources.
  • Web Anti-Virus responded to 50 million unique links.
  • File Anti-Virus blocked nearly 15 million malicious and potentially unwanted objects.
  • 2938 new ransomware variants were detected.
  • More than 77,000 users experienced ransomware attacks.
  • 14% of all ransomware victims whose data was published on threat actors’ data leak sites (DLS) were victims of Clop.
  • More than 260,000 users were targeted by miners.


Ransomware

Quarterly trends and highlights

Law enforcement success


In January 2026, it was reported that the FBI had seized the domains of the RAMP cybercrime forum, a major platform used extensively by ransomware developers to advertise their RaaS programs and to recruit affiliates. There has been no official statement from the FBI, nor is it clear if RAMP servers were seized. In a post on an external website, a RAMP moderator mentioned law enforcement agencies gaining control over the forum. The takedown disrupted a key element of the RaaS ecosystem, creating ripple effects for ransomware operators, affiliates, and initial access brokers.

A man suspected of links to the Phobos group was apprehended in Poland. He was charged with the creation, acquisition, and distribution of software designed for unlawfully obtaining information, including data that facilitates unauthorized access to information stored within a computer system.

In March, a Phobos ransomware administrator pleaded guilty to the creation and distribution of the Trojan, which had been used in international attacks dating back to at least November 2020.

In March, the U.S. Department of Justice charged a man who had acted as a negotiator for ransomware groups. The company he worked for specializes in cyberincident investigations. The prosecution alleges the suspect colluded with the BlackCat threat actor to share privileged insights into the ongoing progress of negotiations. Additionally, the suspect is alleged to have had a prior direct role in BlackCat attacks, serving as an affiliate for the RaaS operation.

In a separate development this March, a U.S. court sentenced an initial access broker associated with the Yanluowang ransomware group to 81 months of imprisonment. According to the U.S. Department of Justice, the convict facilitated dozens of ransomware attacks across the United States, resulting in over $9 million in actual loss and more than $24 million in intended loss.

Vulnerabilities and attacks


The Interlock group has been heavily exploiting the CVE-2026-20131 zero-day vulnerability in Cisco Secure FMC firewall management software since at least January 26, 2026. The vulnerability enabled arbitrary Java code execution with root privileges on the affected device. This campaign demonstrates the ongoing reliance on zero-day vulnerabilities for initial access, a focus on network appliances as high-value entry points, and the rapid weaponization of new vulnerabilities within the ransomware ecosystem.

The most prolific groups


This section highlights the most prolific ransomware gangs by number of victims added to each group’s DLS. This quarter, the Clop ransomware (14.42%) returned to the top of the rankings, displacing Qilin (12.34%), which had held the leading position in the previous reporting period. Following closely is a new threat actor, The Gentlemen (9.25%). Emerging no later than July 2025, the group had already surpassed the activity levels of mainstays such as Akira (7.25%) and INC Ransom (6.13%).

Number of each group’s victims according to its DLS as a percentage of all groups’ victims published on all the DLSs under review during the reporting period (download)

Number of new variants


In Q1 2026, Kaspersky solutions detected six new ransomware families and 2938 new modifications. Volumes have returned to Q3 2025 levels following a surge in Q4 2025.

Number of new ransomware modifications, Q1 2025 — Q1 2026 (download)

Number of users attacked by ransomware Trojans


Throughout Q1, our solutions protected 77,319 unique users from ransomware. Ransomware activity was highest in March, with 35,056 unique users encountering such attacks during the month.

Number of unique users attacked by ransomware Trojans, Q1 2026 (download)

Attack geography

TOP 10 countries and territories attacked by ransomware Trojans

Country/territory*%**1Pakistan0.792South Korea0.643China0.524Tajikistan0.405Libya0.386Turkmenistan0.367Iraq0.358Bangladesh0.339Rwanda0.3010Cameroon0.28

* Excluded are countries and territories with relatively few (under 50,000) Kaspersky users.
** Unique users whose computers were attacked by ransomware Trojans as a percentage of all unique users of Kaspersky products in the country/territory.

TOP 10 most common families of ransomware Trojans

NameVerdict%*1(generic verdict)Trojan-Ransom.Win32.Gen33.902(generic verdict)Trojan-Ransom.Win32.Crypren6.383WannaCryTrojan-Ransom.Win32.Wanna5.874(generic verdict)Trojan-Ransom.Win32.Encoder4.685(generic verdict)Trojan-Ransom.Win32.Agent3.806LockBitTrojan-Ransom.Win32.Lockbit2.807(generic verdict)Trojan-Ransom.Win32.Phny1.998(generic verdict)Trojan-Ransom.MSIL.Agent1.969(generic verdict)Trojan-Ransom.Python.Agent1.9310(generic verdict)Trojan-Ransom.Win32.Crypmod1.89

* Unique Kaspersky users attacked by the specific ransomware Trojan family as a percentage of all unique users attacked by this type of threat.

Miners

Number of new variants


In Q1 2026, Kaspersky solutions detected 3485 new modifications of miners.

Number of new miner modifications, Q1 2026 (download)

Number of users attacked by miners


In Q1, we detected attacks using miner programs on the computers of 260,588 unique Kaspersky users worldwide.

Number of unique users attacked by miners, Q1 2026 (download)

Attack geography

TOP 10 countries and territories attacked by miners

Country/territory*%**1Senegal3.192Turkmenistan3.063Mali2.634Tanzania1.625Bangladesh1.066Ethiopia0.957Panama0.888Afghanistan0.799Kazakhstan0.7710Bolivia0.75

* Excluded are countries and territories with relatively few (under 50,000) Kaspersky users.
** Unique users whose computers were attacked by miners as a percentage of all unique users of Kaspersky products in the country/territory.

Attacks on macOS


In Q1 2026, Google uncovered a new cryptocurrency theft campaign. The scammers directed victims to a fraudulent video call, prompting them to execute malicious scripts under the guise of technical support fixes for connection problems.

In March, researchers with GTIG and iVerify reported the discovery of an in-the-wild exploit chain targeting both iOS and macOS devices. The exploit kit was apparently marketed on the dark web, providing threat actors with a suite of spyware capabilities alongside specialized cryptocurrency exfiltration modules. The exploit was delivered via drive-by downloads when victims visited various compromised websites. Our analysis confirmed that the toolkit included an updated version of a component previously identified in the Operation Triangulation attack chain.

Devices running macOS were similarly impacted by the high-profile supply chain attack targeting the Axios npm package, a widely used HTTP client for JavaScript. The installation of the infected package led to the deployment of a backdoor on macOS devices.

TOP 20 threats to macOS

Unique users* who encountered this malware as a percentage of all attacked users of Kaspersky security solutions for macOS (download)

* Data for the previous quarter may differ slightly from previously published data due to some verdicts being retrospectively revised.

The share of PasivRobber spyware attacks is beginning to decline, giving way to more traditional adware and Monitor-class software capable of tracking user activity. The popular Amos stealer also maintains its presence within the TOP 20.

Geography of threats to macOS

TOP 10 countries and territories by share of attacked users

Country/territory%* Q4 2025%* Q1 2026China1.281.97France1.181.07Brazil1.130.98Mexico0.720.52Germany0.710.45The Netherlands0.620.75Hong Kong0.490.53India0.420.48Russian Federation0.340.37Thailand0.240.27

* Unique users who encountered threats to macOS as a percentage of all unique Kaspersky users in the country/territory.

IoT threat statistics


This section presents statistics on attacks targeting Kaspersky IoT honeypots. The geographic data on attack sources is based on the IP addresses of attacking devices.

In Q1 2026, the share of devices attacking Kaspersky honeypots via the SSH protocol saw a significant increase compared to the previous reporting period.

Distribution of attacked services by number of unique IP addresses of attacking devices (download)

The distribution of attacks between Telnet and SSH maintained the ratio observed in Q4 2025.

Distribution of attackers’ sessions in Kaspersky honeypots (download)

TOP 10 threats delivered to IoT devices

Share of each threat delivered to an infected device as a result of a successful attack, out of the total number of threats delivered (download)

The primary shifts in the IoT threat distribution are linked to the activity of various Mirai botnet variants, although members of this family continue to account for the majority of the list. Furthermore, a new variant, Mirai.kl, surfaced in the rankings. We also observed a significant decline in NyaDrop botnet activity during Q1.

Attacks on IoT honeypots


The United States, the Netherlands, and Germany accounted for the highest proportions of SSH-based attacks during this period.

Country/territoryQ4 2025Q1 2026United States16.10%23.74%The Netherlands15.78%17.57%Germany12.07%10.34%Panama7.72%6.34%India5.32%6.05%Romania4.05%5.82%Australia1.62%4.61%Vietnam4.21%3.50%Russian Federation3.79%2.35%Sweden2.25%2.09%

China continues to account for the largest proportion of Telnet attacks, though there was a marked increase in activity originating from Pakistan.

Country/territoryQ4 2025Q1 2026China53.64%39.54%Pakistan14.27%27.31%Russian Federation8.20%8.25%Indonesia8.58%6.71%India4.85%4.66%Brazil0.06%3.30%Argentina0.02%2.51%Nigeria1.22%1.38%Thailand0.01%0.55%Sweden0.54%0.55%

Attacks via web resources


The statistics in this section are based on detection verdicts by Web Anti-Virus, which protects users when suspicious objects are downloaded from malicious or infected web pages. These malicious pages are purposefully created by cybercriminals. Websites that host user-generated content, such as message boards, as well as compromised legitimate sites, can become infected.

TOP 10 countries and territories that served as sources of web-based attacks


The following statistics show the distribution by country/territory of the sources of internet attacks blocked by Kaspersky products on user computers (web pages redirecting to exploits, sites containing exploits and other malicious programs, botnet C&C centers, and so on). One or more web-based attacks could originate from each unique host.

To determine the geographic source of web attacks, we matched the domain name with the real IP address where the domain is hosted, then identified the geographic location of that IP address (GeoIP).

In Q1 2026, Kaspersky solutions blocked 343,823,407 attacks launched from internet resources worldwide. Web Anti-Virus was triggered by 49,983,611 unique URLs.

Web-based attacks by country/territory, Q1 2026 (download)

Countries and territories where users faced the greatest risk of online infection


To assess the risk of malware infection via the internet for users’ computers in different countries and territories, we calculated the share of Kaspersky users in each location on whose computers Web Anti-Virus was triggered during the reporting period. The resulting data provides an indication of the aggressiveness of the environment in which computers operate in different countries and territories.

This ranked list includes only attacks by malicious objects classified as Malware. Our calculations leave out Web Anti-Virus detections of potentially dangerous or unwanted programs, such as RiskTool or adware.

Country/territory*%**1Venezuela9.332Hungary8.163Italy7.584Tajikistan7.485India7.216Greece7.137Portugal7.108France7.059Belgium6.8310Slovakia6.8011Vietnam6.6212Bosnia and Herzegovina6.5713Canada6.5614Serbia6.5015Tunisia6.3616Qatar6.0117Spain5.9518Germany5.9519Sri Lanka5.8920Brazil5.88

* Excluded are countries and territories with relatively few (under 10,000) Kaspersky users.
** Unique users targeted by web-based Malware attacks as a percentage of all unique users of Kaspersky products in the country/territory.

On average during the quarter, 4.73% of users’ computers worldwide were subjected to at least one Malware web attack.

Local threats


Statistics on local infections of user computers are an important indicator. They include objects that penetrated the target computer by infecting files or removable media, or initially made their way onto the computer in non-open form. Examples of the latter are programs in complex installers and encrypted files.

Data in this section is based on analyzing statistics produced by anti-virus scans of files on the hard drive at the moment they were created or accessed, and the results of scanning removable storage media. The statistics are based on detection verdicts from the On-Access Scan (OAS) and On-Demand Scan (ODS) modules of File Anti-Virus and include detections of malicious programs located on user computers or removable media connected to the computers, such as flash drives, camera memory cards, phones, or external hard drives.

In Q1 2026, our File Anti-Virus detected 15,831,319 malicious and potentially unwanted objects.

Countries and territories where users faced the highest risk of local infection


For each country and territory, we calculated the percentage of Kaspersky users whose computers had the File Anti-Virus triggered at least once during the reporting period. This statistic reflects the level of personal computer infection in different countries and territories around the world.

Note that this ranked list includes only attacks by malicious objects classified as Malware. Our calculations leave out File Anti-Virus detections of potentially dangerous or unwanted programs, such as RiskTool or adware.

Country/territory*%**1Turkmenistan47.962Tajikistan31.483Cuba31.034Yemen29.595Afghanistan28.476Burundi26.937Uzbekistan24.818Syria23.089Nicaragua21.9710Cameroon21.6011China21.0912Mozambique21.0213Algeria20.6414Democratic Republic of the Congo20.6315Bangladesh20.4416Mali20.3517Republic of the Congo20.2318Madagascar20.0019Belarus19.7820Tanzania19.52

* Excluded are countries and territories with relatively few (under 10,000) Kaspersky users.
** Unique users on whose computers local Malware threats were blocked, as a percentage of all unique users of Kaspersky products in the country/territory.

On average worldwide, Malware local threats were detected at least once on 11.55% of users’ computers during Q1.

Russia scored 11.92% in these rankings.

securelist.com/malware-report-…

  • 0
  • 0
  • 0
  • 15h ago

Bluesky

Profile picture fallback
~Kaspersky~ Kaspersky's Q1 2026 report highlights a surge in Clop ransomware, Mirai IoT botnets, and Interlock's exploitation of Cisco zero-day CVE-2026-20131. - IOCs: CVE-2026-20131 - #CVE202620131 #Ransomware #ThreatIntel
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Linux
  • Linux

08 May 2026
Published
14 May 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.01%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(), so later paths that may modify packet data can first make a private copy. The IPv4/IPv6 datagram append paths did not set this flag when splicing pages into UDP skbs. That leaves an ESP-in-UDP packet made from shared pipe pages looking like an ordinary uncloned nonlinear skb. ESP input then takes the no-COW fast path for uncloned skbs without a frag_list and decrypts in place over data that is not owned privately by the skb. Mark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching TCP. Also make ESP input fall back to skb_cow_data() when the flag is present, so ESP does not decrypt externally backed frags in place. Private nonlinear skb frags still use the existing fast path. This intentionally does not change ESP output. In esp_output_head(), the path that appends the ESP trailer to existing skb tailroom without calling skb_cow_data() is not reachable for nonlinear skbs: skb_tailroom() returns zero when skb->data_len is nonzero, while ESP tailen is positive. Thus ESP output will either use the separate destination-frag path or fall back to skb_cow_data().

Statistics

  • 4 Posts
  • 4 Interactions

Last activity: 5 hours ago

Fediverse

Profile picture fallback

Security updates: Debian vs Ubuntu, AlmaLinux vs Rocky Linux

The last couple of weeks were turbulent for the Linux kernel: several critical security problems were disclosed . Three of them are local privilege escalation bugs: they allow any local user to become root. The vulnerabilities are named Copy Fail (CVE-2026-31431), Dirty Frag (CVE-2026-43284, CVE-2026-43500), Fragnesia (CVE-2026-46300). The fourth vulnerability, named ssh-keysign-pwn (CVE-2026-46333) allows a user to read root owned files, such as host SSH keys. There are exploits publicly […]

blog.frehi.be/2026/05/18/secur

  • 3
  • 1
  • 0
  • 7h ago

Bluesky

Profile picture fallback
The new "Dirty Frag" CVE (CVE-2026-43284) is another reminder: patches fix 1 problem. Learning to automate your response fixes ALL of them. Read more -> tinyurl.com/ms2nbcy6 #SUSE #Security
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
Patch CVE-2026-43284? That fixes one hole. But attackers don't send malformed IPs—they deliver malware that persists. Read more -> tinyurl.com/hwmc7u97 #security #openSUSE
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
⚠️ Critical "Dirty Frag" Linux kernel vulnerability (CVE-2026-43284, CVE-2026-43500) disclosed May 7. Local privilege escalation via IPsec/RxRPC—patch now! #LinuxSecurity #DirtyFrag
  • 0
  • 0
  • 0
  • 5h ago
Showing 1 to 10 of 36 CVEs