Aggregator
Medical Device Maker Reports Data Theft Hack to SEC
1 month 2 weeks ago
Attack Spotlights Threats, Risks Facing Healthcare Supply Chain
UFP Technologies, a Massachusetts-based maker of single-use medical devices and other healthcare supplies, has notified the U.S. Securities and Exchange Commission of a cyber incident discovered on Valentine's Day that involved the theft or destruction of company data.
UFP Technologies, a Massachusetts-based maker of single-use medical devices and other healthcare supplies, has notified the U.S. Securities and Exchange Commission of a cyber incident discovered on Valentine's Day that involved the theft or destruction of company data.
Conduent Says Hack Now Affects at Least 25 Million Patients
1 month 2 weeks ago
State Officials Investigating Breach of Back-Office Services Provider Found in 2025
The victim count in the 2024 hack on back-office support services vendor Conduent Business Services has just ballooned again, with the Xerox-spinoff now reporting to Wisconsin regulators that the incident affected "25 million-plus" people nationwide.
The victim count in the 2024 hack on back-office support services vendor Conduent Business Services has just ballooned again, with the Xerox-spinoff now reporting to Wisconsin regulators that the incident affected "25 million-plus" people nationwide.
Feds Scramble Amid Shutdown to Secure Cisco SD-WAN Systems
1 month 2 weeks ago
Emergency CISA Directive Lands as DHS Shutdown Strains Cyber Operations
The Cybersecurity and Infrastructure Security Agency issued a directive Wednesday ordering civilian agencies to secure and hunt for compromise in vulnerable Cisco SD-WAN systems after officials observed active exploitation - while warning that shutdown-related disruptions heighten operational risk.
The Cybersecurity and Infrastructure Security Agency issued a directive Wednesday ordering civilian agencies to secure and hunt for compromise in vulnerable Cisco SD-WAN systems after officials observed active exploitation - while warning that shutdown-related disruptions heighten operational risk.
Marquis Sues SonicWall Over 2025 Firewall Data Breach
1 month 2 weeks ago
Lawsuit Claims SonicWall Cloud Backup Flaw Led to Ransomware Attack Against Marquis
Marquis Software Solutions has sued SonicWall alleging a cloud backup data breach exposed firewall configuration files, including credentials and multifactor authentication scratch codes. The firm says the breach enabled an August 2025 ransomware attack and triggered dozens of class action lawsuits.
Marquis Software Solutions has sued SonicWall alleging a cloud backup data breach exposed firewall configuration files, including credentials and multifactor authentication scratch codes. The firm says the breach enabled an August 2025 ransomware attack and triggered dozens of class action lawsuits.
Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks Intensify
1 month 2 weeks ago
2025 saw 32M phishing emails, with identity threats surpassing vulnerabilities
CVE-2026-3265 | go2ismail Free-CRM up to b83c40a90726d5e58f0cc680ffdcaa28a03fb5d1 Security API /api/Security/ improper authorization (EUVD-2026-8925)
1 month 2 weeks ago
A vulnerability has been found in go2ismail Free-CRM up to b83c40a90726d5e58f0cc680ffdcaa28a03fb5d1 and classified as critical. This affects an unknown part of the file /api/Security/ of the component Security API. The manipulation leads to improper authorization.
This vulnerability is uniquely identified as CVE-2026-3265. The attack is possible to be carried out remotely. Moreover, an exploit is present.
This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2026-3264 | go2ismail Free-CRM up to b83c40a90726d5e58f0cc680ffdcaa28a03fb5d1 Administrative Interface redirect
1 month 2 weeks ago
A vulnerability, which was classified as critical, was found in go2ismail Free-CRM up to b83c40a90726d5e58f0cc680ffdcaa28a03fb5d1. Affected by this issue is some unknown functionality of the component Administrative Interface. Executing a manipulation can lead to execution after redirect.
This vulnerability is handled as CVE-2026-3264. The attack can be executed remotely. Additionally, an exploit exists.
This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
Pear
1 month 2 weeks ago
You must login to view this content
cohenido
Pear
1 month 2 weeks ago
You must login to view this content
cohenido
CVE-2026-3263 | go2ismail Asp.Net-Core-Inventory-Order-Management-System up to 9.20250118 Security API /api/Security/ improper authorization
1 month 2 weeks ago
A vulnerability, which was classified as critical, has been found in go2ismail Asp.Net-Core-Inventory-Order-Management-System up to 9.20250118. Affected by this vulnerability is an unknown functionality of the file /api/Security/ of the component Security API. Performing a manipulation results in improper authorization.
This vulnerability is known as CVE-2026-3263. Remote exploitation of the attack is possible. No exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2026-3262 | go2ismail Asp.Net-Core-Inventory-Order-Management-System up to 9.20250118 Administrative Interface redirect
1 month 2 weeks ago
A vulnerability classified as critical was found in go2ismail Asp.Net-Core-Inventory-Order-Management-System up to 9.20250118. Affected is an unknown function of the component Administrative Interface. Such manipulation leads to execution after redirect.
This vulnerability is traded as CVE-2026-3262. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
Submit #758338: Indotalent Free-CRM v1.0 commit: b83c40a90726d5e58f0cc680ffdcaa28a03fb5d1 Improper Authorization [Accepted]
1 month 2 weeks ago
Submit #758338 / VDB-347988
Ghufran Khan
Submit #758337: Indotalent Free-CRM v1.0 commit: b83c40a90726d5e58f0cc680ffdcaa28a03fb5d1 Improper Access Controls [Accepted]
1 month 2 weeks ago
Submit #758337 / VDB-347987
Ghufran Khan
DarkCloud Infostealer Emerges as Major Threat With Scalable Credential Theft Targeting Enterprises
1 month 2 weeks ago
The cybersecurity threat landscape is facing a growing challenge as infostealers continue to dominate the initial access ecosystem in 2026. Among the latest threats drawing serious attention is DarkCloud, a commercially available credential-harvesting malware that proves even low-cost tools can deliver devastating results against enterprise environments. DarkCloud was first observed in 2022 and is attributed […]
The post DarkCloud Infostealer Emerges as Major Threat With Scalable Credential Theft Targeting Enterprises appeared first on Cyber Security News.
Tushar Subhra Dutta
Submit #758335: Indotalent Asp.Net-Core-Inventory-Order-Management-System v9.20250118 Improper Authorization [Accepted]
1 month 2 weeks ago
Submit #758335 / VDB-347986
Ghufran Khan
Submit #758333: Indotalent Asp.Net-Core-Inventory-Order-Management-System v9.20250118 Improper Access Controls [Accepted]
1 month 2 weeks ago
Submit #758333 / VDB-347985
Ghufran Khan
Как заглянуть в 7 тысяч спален, не вставая с дивана. Мастер-класс по случайному взлому от испанского разработчика
1 month 2 weeks ago
Контроллер от PS5 внезапно превратился в универсальный ключ к чужим тайнам.
Entra ID OAuth Consent Can Grant ChatGPT Access to Emails
1 month 2 weeks ago
OAuth consent in Entra ID can grant apps like ChatGPT email access after approval, exposing hidden risks that may bypass MFA and enable persistent access.
Deeba Ahmed
ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories
1 month 2 weeks ago
Nothing here looks dramatic at first glance. That’s the point. Many of this week’s threats begin with something ordinary, like an ad, a meeting invite, or a software update.
Behind the scenes, the tactics are sharper. Access happens faster. Control is established sooner. Cleanup becomes harder.
Here is a quick look at the signals worth paying attention to.
AI-powered command
The Hacker News