24h | 7d | 30d

Overview

  • NetScaler
  • ADC

23 Mar 2026
Published
31 Mar 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
36.74%

Description

Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread

Statistics

  • 12 Posts
  • 7 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

March 31, 2026

Cyber Operations

Axios npm Supply Chain Attack Deploys Cross-Platform RAT

A supply chain attack compromised the widely used Axios HTTP client library on npm, affecting versions 1.14.1 and 0.30.4. The attacker hijacked a maintainer account and injected a malicious dependency called "plain-crypto-js," which delivers a remote access trojan capable of executing arbitrary commands, exfiltrating data, and persisting across Windows, macOS, and Linux systems. Socket's automated detection flagged the package within six minutes of publication. With Axios receiving approximately 100 million weekly downloads, the blast radius is significant. The attack was carefully staged: payloads for three operating systems were pre-built, both release branches were hit within 39 minutes, and every trace was designed to self-destruct.

European Commission Confirms Cloud Data Breach

The European Commission confirmed a cyberattack affecting its cloud infrastructure hosting the Europa.eu platform. The ShinyHunters extortion gang claimed responsibility, posting screenshots suggesting possession of approximately 350 GB of data including mail server contents, databases, and confidential documents. The Commission stated its internal systems were not affected. This marks the second breach of EU institutions this year, following an earlier compromise of the Commission's mobile device management platform.

Citrix NetScaler Vulnerability Under Active Exploitation

CISA added CVE-2026-3055—a critical out-of-bounds read vulnerability (CVSS 9.3) in Citrix NetScaler ADC and Gateway—to its known exploited vulnerabilities list on March 30, based on evidence of active exploitation. The flaw affects systems configured as SAML Identity Providers and can leak sensitive memory contents. Threat actors have been probing honeypots to enumerate vulnerable configurations since at least March 27.

Iran-Linked Cyber Campaigns Escalate Amid Conflict

Iranian-linked groups have mounted nearly 5,800 cyberattacks since hostilities began, according to security firm DigiCert. A recent operation targeted Israeli Android users with texts offering bomb shelter information that instead downloaded spyware granting access to cameras, location data, and all device contents. Palo Alto's Unit 42 has identified 7,381 conflict-themed phishing URLs across 1,881 unique hostnames.

Information Operations & Foreign Influence

Iran's AI Deepfake Campaign Draws Hundreds of Millions of Views

A pro-Iran disinformation campaign has generated over 145 million views and nine million interactions across social media platforms. The New York Times identified more than 110 unique deepfakes conveying pro-Iran messaging in a two-week span. The majority are produced by Iranian government-linked networks and amplified by Russian and Chinese information ecosystems. The campaign uses tens of thousands of fake accounts to portray Iran as victorious and its adversaries as weakened. X announced it would penalize creators who post unlabeled AI war content by removing them from revenue-sharing for 90 days.

Russia–China–Iran Convergence in Cognitive Warfare

A Small Wars Journal analysis published March 18 documents how Russia, Iran, and China are coordinating narrative warfare to erode Western cohesion. Russia's 2026 budget increased information operations funding by 54%, adding $458 million for state-run media. Generative AI allows a single adversary to manage thousands of personas producing unique content at scale, while China uses state-aligned media accounts to echo anti-U.S. narratives.

Espionage

Russia Expels British Diplomat on Espionage Allegations

Russia's FSB ordered the expulsion of British Embassy second secretary Albertus Gerhardus Janse van Rensburg, accusing him of economic espionage and providing false information to obtain entry to Russia. The FSB alleged he attempted to obtain sensitive information during informal meetings with Russian economic experts. The British Embassy dismissed the allegations as "completely unacceptable." Russian state TV reported he is the 16th British diplomat expelled over the past two years.

Pakistan-Linked Spy Network Dismantled in India

Indian police arrested 22 individuals operating a Pakistan-linked espionage network that used solar-powered CCTV cameras and GPS-enabled apps to monitor troop movements and critical infrastructure. The network installed surveillance equipment along the Delhi-Jammu railway corridor, with cameras recovered from Delhi Cantonment and Haryana's Sonipat found actively transmitting footage to Pakistan-based handlers. Nearly 50 such installations were planned nationwide. The Indian government has ordered a nationwide CCTV audit in response.

Russia Shifts to Vulnerable Recruits for European Operations

Following the mass expulsion of Russian intelligence officers from Europe, the GRU and FSB have shifted to recruiting financially vulnerable Europeans—including migrants, criminals, and the unemployed—for low-level sabotage and surveillance. Former Wagner Group operatives have been tasked with identifying recruits willing to carry out arson, assaults, or vandalism for small payments. More than 150 suspected hybrid incidents linked to Russia have been reported across the EU and NATO in early 2026.

Assessments & Reports

ODNI Releases 2026 Annual Threat Assessment

DNI Gabbard released the 2026 Annual Threat Assessment on March 26. The report identifies lone wolf attackers as the most likely terrorist threat to the U.S. homeland, highlights Mexican cartels and Venezuelan organized crime as top domestic concerns, and warns that nuclear-capable adversaries could collectively field more than 16,000 missiles by 2035. The assessment also flags AI and quantum computing as critical emerging technology challenges, alongside cyberthreats from China and North Korea.

  • 2
  • 0
  • 0
  • 9h ago
Profile picture fallback

Comme suite à la publication de la pertinente, agréable et incontournable PART 2 de l'analyse de watchTowr:
les nouveaux scans basés sur la présence de
GET /wsfed/passive?wctx

aka "This is Bad™" 😁

plutôt que sur la version, réduisent considérablement le nombre d'appliances exposées.

On passe à une petite centaine d'appliances potentiellement vulnérables sur les internets publics :gentleblob: , dont quelques-unes en Suisse selon ONYPHE. 📉

(CVE-2026-3055 couvre en réalité au moins deux vulnérabilités distinctes de memory overread — /saml/login et /wsfed/passive?wctx ce qui est, disons… discutable™" de la part de Citrix.)

  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback

The CISA mandates federal patching of Citrix NetScaler flaw by Thursday 

The CISA has added a new Citrix NetScaler appliance vulnerability to its Known Exploited Vulnerabilities catalog and is giving federal agencies till Thursday to remediate the flaw. The vulnerability (CVE-2026-3055) is caused by inadequate input validation and can be exploited by unauthenticated remote attackers to extract sensitive data from Citrix ADC or Citrix Gateway appliances configured as…

itnerd.blog/2026/03/31/the-cis

  • 0
  • 0
  • 1
  • 2h ago

Bluesky

Profile picture fallback
⚠️📢 Update: Version 1.1: #Citrix NetScaler ADC & Gateway – #Schwachstellen gefährden Organisationen. Seit dem Wochenende häufen sich Berichte über Angriffe auf Citrix-Systeme [WAT26], [XCO26] - min. seit 27.03. finden Angriffsversuche mithilfe von CVE-2026-3055 statt. 👉️ www.bsi.bund.de/dok/1195484
  • 3
  • 2
  • 1
  • 15h ago
Profile picture fallback
CISAが既知の悪用された脆弱性を1件カタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (Mar 30) CVE-2026-3055 Citrix NetScalerの境界外読み取りの脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
> 注意喚起: NetScaler ADCおよびNetScaler Gatewayにおける境界外読み取りの脆弱性(CVE-2026-3055)に関する注意喚起 (公開) https://www.jpcert.or.jp/at/2026/at260008.html
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
CISA mandates federal agencies patch Citrix NetScaler ADC vulnerability CVE-2026-3055 by Thursday. The flaw allows sensitive memory disclosure and has a 9.3 severity score. Patched March 23. #CISA #CitrixBug #USA
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
NetScaler ADCおよびNetScaler Gatewayにおける境界外読み取りの脆弱性(CVE-2026-3055)に関する注意喚起 #JPCERTCC (Mar 31) www.jpcert.or.jp/at/2026/at26...
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
The latest update for #CyCognito includes "Emerging Threat: F5 BIG-IP Access Policy Manager Remote Code Execution (CVE-2025-53521)" and "Citrix NetScaler ADC and Gateway Vulnerabilities (CVE-2026-3055 & CVE-2026-4368)". #cybersecurity #AttackSurfaceManagement #EASM https://opsmtrs.com/44Srq0X
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • F5
  • BIG-IP

15 Oct 2025
Published
31 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
19.92%

Description

When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution (RCE).   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Statistics

  • 9 Posts
  • 11 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

📢⚠️ Sicherheitswarnung: Version 1.0: F5 BIG-IP – Aktive Ausnutzung einer #Schwachstelle im Access Policy Manager

Am 27.03.2026 gab der Hersteller F5 ein Advisory heraus, in dem Details zu beobachteten Angriffen auf BIG-IP-Instanzen beschrieben wurden. Im Bericht enthalten waren im Wesentlichen Indicators of Compromise (IoCs), anhand derer eine Ausnutzung von CVE-2025-53521 detektiert werden kann.

Mehr Informationen gibt's hier: bsi.bund.de/dok/1195766

@certbund

  • 6
  • 2
  • 0
  • 11h ago
Profile picture fallback

F5 BIG-IP APM vulnerability (CVE-2025-53521) escalates to critical 9.8 RCE, actively exploited. Patch now, check IoCs, and secure vulnerable systems immediately.

Read: hackread.com/critical-f5-big-i

#CyberSecurity #F5 #Vulnerability #DDoS #RCE

  • 1
  • 0
  • 0
  • 13h ago
Profile picture fallback

⚠️ Alerte CERT-FR ⚠️
La vulnérabilité CVE-2025-53521 est activement exploitée et permet de provoquer une exécution de code arbitraire à distance dans F5 Big-IP APM.

cert.ssi.gouv.fr/alerte/CERTFR

  • 1
  • 0
  • 1
  • 10h ago

Bluesky

Profile picture fallback
my.f5.com/manage/s/art... K000156741: BIG-IP APM vulnerability CVE-2025-53521 Updated 29th of March.
  • 0
  • 1
  • 0
  • 17h ago
Profile picture fallback
F5 BIG-IP APM vulnerability (CVE-2025-53521) escalates to critical 9.8 RCE, actively exploited. Patch now, check IoCs, and secure vulnerable systems immediately. Read: hackread.com/critical-f5-... #CyberSecurity #F5 #Vulnerability #DDoS #RCE
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
The latest update for #CyCognito includes "Emerging Threat: axios npm #SupplyChain Attack Drops Remote Access Trojan" and "Emerging Threat: F5 BIG-IP Access Policy Manager Remote Code Execution (CVE-2025-53521)". #cybersecurity #AttackSurfaceManagement #EASM https://opsmtrs.com/44Srq0X
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
The latest update for #ArcticWolf includes "#SupplyChain Attack Impacts Widely Used Axios npm Package" and "CVE-2025-53521: F5 BIG-IP #APM Vulnerability Reclassified as Unauthenticated RCE and Exploited in the Wild". #cybersecurity #infosec #networks https://opsmtrs.com/2ZFbaTl
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
The latest update for #CyCognito includes "Emerging Threat: F5 BIG-IP Access Policy Manager Remote Code Execution (CVE-2025-53521)" and "Citrix NetScaler ADC and Gateway Vulnerabilities (CVE-2026-3055 & CVE-2026-4368)". #cybersecurity #AttackSurfaceManagement #EASM https://opsmtrs.com/44Srq0X
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Fortinet
  • FortiClientEMS

06 Feb 2026
Published
31 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.05%

KEV

Description

An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

Statistics

  • 3 Posts

Last activity: 9 hours ago

Fediverse

Profile picture fallback

Critical supply chain attack on Axios npm distributed a Remote Access Trojan (RAT) via a `plain-crypto-js` dependency. Fortinet faces active exploitation of a critical SQL injection flaw (CVE-2026-21643). Geopolitically, Iran-US tensions escalate; a Kuwaiti oil tanker was hit, and Yemen launched strikes against Israeli sites.

#AnonNews_irc #Cybersecurity #News

  • 0
  • 0
  • 0
  • 16h ago

Bluesky

Profile picture fallback
Fortinet FortiClient EMSの重大な脆弱性が現在攻撃を受けています(CVE-2026-21643) Critical Fortinet FortiClient EMS bug under active attack (CVE-2026-21643) #HelpNetSecurity (Mar 30) www.helpnetsecurity.com/2026/03/30/f...
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • FreeBSD
  • FreeBSD

26 Mar 2026
Published
27 Mar 2026
Updated

CVSS
Pending
EPSS
0.15%

KEV

Description

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerable, remote code execution in the kernel is possible by an authenticated user that is able to send packets to the kernel's NFS server while kgssapi.ko is loaded into the kernel. In userspace, applications which have librpcgss_sec loaded and run an RPC server are vulnerable to remote code execution from any client able to send it packets. We are not aware of any such applications in the FreeBSD base system.

Statistics

  • 9 Posts
  • 6 Interactions

Last activity: 5 hours ago

Fediverse

Profile picture fallback

Claude Wrote a Full #FreeBSD Remote Kernel #RCE with Root Shell (CVE-2026-4747): blog.calif.io/p/mad-bugs-claud

  • 3
  • 3
  • 4
  • 6h ago
Profile picture fallback

"Claude Wrote a Full FreeBSD Remote Kernel RCE with Root Shell (CVE-2026-4747)"
github.com/califio/publication

  • 0
  • 0
  • 3
  • 5h ago

Overview

  • Microsoft
  • Windows 11 version 21H2

11 Jun 2024
Published
17 Dec 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
60.54%

KEV

Description

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Statistics

  • 3 Posts
  • 3 Interactions

Last activity: 4 hours ago

Bluesky

Profile picture fallback
The eighth article of the Exploiting Reversing Series (ERS) is now live. Titled “Exploitation Techniques | CVE-2024-30085 (Part 02)” this 91-page technical guide offers a comprehensive roadmap for vulnerability exploitation: exploitreversing.com/2026/03/31/e... #exploit #exploitation
  • 1
  • 2
  • 1
  • 4h ago
Profile picture fallback
Mastering the I/O Ring: A Deep Dive into CVE-2024-30085 Exploitation Techniques + Video Introduction: Modern Windows kernel exploitation has evolved beyond traditional methods, leveraging advanced Windows kernel primitives like I/O Ring and WNF (Windows Notification Facility) to achieve reliable…
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • langflow-ai
  • langflow

20 Mar 2026
Published
26 Mar 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
5.65%

Description

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the endpoint uses attacker-controlled flow data (containing arbitrary Python code in node definitions) instead of the stored flow data from the database. This code is passed to exec() with zero sandboxing, resulting in unauthenticated remote code execution. This is distinct from CVE-2025-3248, which fixed /api/v1/validate/code by adding authentication. The build_public_tmp endpoint is designed to be unauthenticated (for public flows) but incorrectly accepts attacker-supplied flow data containing arbitrary executable code. This issue has been fixed in version 1.9.0.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 9 hours ago

Fediverse

Profile picture fallback

Langflow – À peine dévoilée, déjà exploitée : attention à cette faille critique it-connect.fr/langflow-cve-202 #ActuCybersécurité #Cybersécurité

  • 1
  • 0
  • 0
  • 9h ago

Bluesky

Profile picture fallback
Langflow RCE與技術細節CVE-2026-33017
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • WPEverest
  • Everest Forms Pro

31 Mar 2026
Published
31 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.22%

KEV

Description

The Everest Forms Pro plugin for WordPress is vulnerable to Remote Code Execution via PHP Code Injection in all versions up to, and including, 1.9.12. This is due to the Calculation Addon's process_filter() function concatenating user-submitted form field values into a PHP code string without proper escaping before passing it to eval(). The sanitize_text_field() function applied to input does not escape single quotes or other PHP code context characters. This makes it possible for unauthenticated attackers to inject and execute arbitrary PHP code on the server by submitting a crafted value in any string-type form field (text, email, URL, select, radio) when a form uses the "Complex Calculation" feature.

Statistics

  • 2 Posts

Last activity: 15 hours ago

Fediverse

Profile picture fallback

🚨 CRITICAL: CVE-2026-3300 in Everest Forms Pro (all versions) enables unauthenticated RCE via "Complex Calculation" forms. Disable the feature or restrict access ASAP. No patch yet — monitor for updates. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 22h ago

Bluesky

Profile picture fallback
🚨 CVE-2026-3300 (CRITICAL 9.8) Submitting a form can lead to full server compromise. Everest Forms Pro allows unauthenticated RCE via eval() misuse in form calculations. 🔎 basefortify.eu/cve_reports/... #CVE #CyberSecurity #WordPress #RCE
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • OpenOLAT
  • OpenOLAT

30 Mar 2026
Published
31 Mar 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.05%

KEV

Description

OpenOlat is an open source web-based e-learning platform for teaching, learning, assessment and communication. Prior to versions 19.1.31, 20.1.18, and 20.2.5, an authenticated user with the Author role can inject Velocity directives into a reminder email template. When the reminder is processed (either triggered manually or via the daily cron job), the injected directives are evaluated server-side. By chaining Velocity's #set directive with Java reflection, an attacker can instantiate arbitrary Java classes such as java.lang.ProcessBuilder and execute operating system commands with the privileges of the Tomcat process (typically root in containerized deployments). This issue has been patched in versions 19.1.31, 20.1.18, and 20.2.5.

Statistics

  • 1 Post
  • 7 Interactions

Last activity: 12 hours ago

Fediverse

Profile picture fallback

Our colleague @mal had another look at OpenOLAT and found a nice RCE (CVE-2026-28228 and CVE-2026-28228). If you're interested, details can be found on our blog secfault-security.com/blog/ope

  • 4
  • 3
  • 0
  • 12h ago

Overview

  • ruby
  • uri
  • uri

30 Dec 2025
Published
30 Dec 2025
Updated

CVSS v4.0
LOW (2.7)
EPSS
0.06%

KEV

Description

URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. Versions 0.12.5, 0.13.3, and 1.0.4 fix the issue.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: Last hour

Fediverse

Profile picture fallback

#Ubuntu 24.04.4 で #update

ruby3.2 (3.2.3-1ubuntu0.24.04.7)
CVE-2025-61594へのセキュリティ対応
libruby3.2

#Mastodon v4.5 ではruby 3.4.7になっています。これは gem uri (default: 1.0.4)で、今回のCVEは uri 1.0.3 までが影響を受けるので、Mastodon v4.5 なら問題なさそうです。

pollinatee (4.33-3.1ubuntu1.3)
CVEセキュリティ対応ではない。

#prattohome

  • 1
  • 0
  • 0
  • Last hour

Overview

  • micromatch
  • picomatch

26 Mar 2026
Published
27 Mar 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.04%

KEV

Description

Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns. Certain patterns using extglob quantifiers such as `+()` and `*()`, especially when combined with overlapping alternatives or nested extglobs, are compiled into regular expressions that can exhibit catastrophic backtracking on non-matching input. Applications are impacted when they allow untrusted users to supply glob patterns that are passed to `picomatch` for compilation or matching. In those cases, an attacker can cause excessive CPU consumption and block the Node.js event loop, resulting in a denial of service. Applications that only use trusted, developer-controlled glob patterns are much less likely to be exposed in a security-relevant way. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to `picomatch`. Possible mitigations include disabling extglob support for untrusted patterns by using `noextglob: true`, rejecting or sanitizing patterns containing nested extglobs or extglob quantifiers such as `+()` and `*()`, enforcing strict allowlists for accepted pattern syntax, running matching in an isolated worker or separate process with time and resource limits, and applying application-level request throttling and input validation for any endpoint that accepts glob patterns.

Statistics

  • 1 Post

Last activity: 13 hours ago

Bluesky

Profile picture fallback
🚨 New HIGH CVE detected in AWS Lambda 🚨 CVE-2026-33671 impacts picomatch in 3 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/452 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 13h ago
Showing 1 to 10 of 62 CVEs