Aggregator
Компании боятся хакеров, Касперский считает прибыль. Почему корпоративные продажи подскочили сразу на четверть
30th March – Threat Intelligence Report
For the latest discoveries in cyber research for the week of 30th March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Iranian state-affiliated threat group Handala Hack has breached FBI director’s Patel’s personal Gmail account and leaked many personal photos and documents. This follows the FBI’s seizure of domains related to Handala Hack’s […]
The post 30th March – Threat Intelligence Report appeared first on Check Point Research.
Healthcare software firm CareCloud informs SEC of potential patient data leak
Stored XSS Bug in Jira Work Management Could Lead to Full Organization Takeover
A popular collaboration tool within the Atlassian ecosystem is widely used by organizations to track projects, manage approvals, and manage daily tasks. Recently, security researchers at Snapsec uncovered a critical Stored Cross-Site Scripting (XSS) vulnerability within the platform. By exploiting a seemingly low-risk configuration field, the team demonstrated how a low-privileged user could achieve a full […]
The post Stored XSS Bug in Jira Work Management Could Lead to Full Organization Takeover appeared first on Cyber Security News.
— «Ты зашифровал файлы?» — «Да» — «А где ключ?» — «В папке Temp» — «Упс…». Вот почему вымогатель Pay2Key не так страшен, как его рисуют
CanisterWorm Malware Attacking Docker/K8s/Redis to Gain Access and Steal Secrets
A financially motivated cybercrime group has been quietly compromising cloud environments since late 2025, and its activities are now drawing serious concern across the security community. The group, known as TeamPCP, operates a self-propagating worm called CanisterWorm that hunts for poorly secured Docker APIs, Kubernetes clusters, Redis servers, and systems vulnerable to the React2Shell flaw. […]
The post CanisterWorm Malware Attacking Docker/K8s/Redis to Gain Access and Steal Secrets appeared first on Cyber Security News.
Critical Fortinet FortiClient EMS bug under active attack (CVE-2026-21643)
A critical SQL injection vulnerability (CVE-2026-21643) in Fortinet FortiClient Endpoint Management Server (EMS), a management server for FortiClient endpoint agents on various platforms, is under active exploitation. The warning comes from Defused Cyber, which helps organizations deploy honeypots/fake assets, and uses them as well to capture real attack attempts and exploits and provide early warning threat intelligence. “Currently marked as not exploited on CISA and other Known Exploited Vulnerabilities (KEV) lists, [CVE-2026-21643] has seen first … More →
The post Critical Fortinet FortiClient EMS bug under active attack (CVE-2026-21643) appeared first on Help Net Security.
Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels
微软 Copilot 在修改 PR 中的拼写错误时添加了广告
State Department reissues $10 million reward for info on Iranian hackers
Vim Vulnerability Let Attackers Execute Arbitrary Command Via Weaponized Files
A high-severity security flaw has been discovered in Vim, one of the most widely used text editors among developers. This vulnerability allows attackers to execute arbitrary operating system commands simply by tricking a user into opening a specially crafted file. Discovered by security researcher Hung Nguyen, the bug chain highlights the persistent risks associated with how […]
The post Vim Vulnerability Let Attackers Execute Arbitrary Command Via Weaponized Files appeared first on Cyber Security News.
木星闪电释放的能量相当于原子弹爆炸
【工具】EditHttpMsg For Burp UI Demo
7 tabletop exercise scenarios every cybersecurity team should practice in 2026
Overview As cybersecurity threats continue to evolve and become more sophisticated, the need for comprehensive preparedness has never been more critical. Tabletop exercises are essential for testing and refining incident response plans, enhancing coordination between departments, and staying ahead of malicious actors. In this article, we outline seven tabletop exercise scenarios that cybersecurity teams should […]
The post 7 tabletop exercise scenarios every cybersecurity team should practice in 2026 first appeared on TrustCloud.
The post 7 tabletop exercise scenarios every cybersecurity team should practice in 2026 appeared first on Security Boulevard.
В Китай теперь со своим нельзя. Евродепутаты перешли на кнопочные одноразовые телефоны
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2026-3055 Citrix NetScaler Out-of-Bounds Read Vulnerability
This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.