Aggregator
Coruna, DarkSword & Democratizing Nation-State Exploit Kits
Is the FCC's Router Ban the Wrong Fix?
[Control systems] ABB security advisory (AV26-286)
Automotive Cybersecurity Threats Grow in Era of Connected, Autonomous Vehicles
New ClickFix Attack Leverage Windows Run Dialog Box and macOS Terminal to Deploy Malware
A social engineering technique called ClickFix has resurfaced with significant force, tricking users on both Windows and macOS into manually executing malicious commands that quietly install malware on their devices. First documented in late 2023, the method has rapidly grown from a niche tactic into one of the most widely adopted initial access strategies across […]
The post New ClickFix Attack Leverage Windows Run Dialog Box and macOS Terminal to Deploy Malware appeared first on Cyber Security News.
Leak Bazaar Turns Stolen Corporate Data Into a Structured Criminal Marketplace
A threat actor known as “Snow” from SnowTeam posted an advertisement on the Russian-speaking TierOne (T1) cybercrime forum on March 25, 2026, introducing a new criminal service called Leak Bazaar. The platform is not a traditional data leak site. Instead, it presents itself as a post-exfiltration processing service — one that takes raw stolen corporate […]
The post Leak Bazaar Turns Stolen Corporate Data Into a Structured Criminal Marketplace appeared first on Cyber Security News.
CVE-2026-4487 | UTT HiPER 1200GW up to 2.5.3-170306 /goform/websHostFilter strcpy buffer overflow (EUVD-2026-13710)
CVE-2026-4488 | UTT HiPER 1250GW up to 3.2.7-210907-180535 /goform/setSysAdm strcpy GroupName buffer overflow
CVE-2026-4489 | Tenda A18 Pro 02.03.02.28 fast_setting_wifi_set form_fast_setting_wifi_set stack-based overflow
CVE-2026-22172 | OpenClaw up to 2026.3.11 WebSocket Connect Path authorization (GHSA-rqpp-rjj8-7wv8 / EUVD-2026-13704)
CVE-2026-29794 | vikunja up to 2.1.x Header X-Forwarded-For reliance on untrusted inputs in a security decision (GHSA-m547-hp4w-j6jx / EUVD-2026-13706)
CVE-2026-33312 | vikunja up to 2.1.x background authorization (GHSA-564f-wx8x-878h / EUVD-2026-13708)
CVE-2026-4519 | Python CPython up to 3.14.x API webbrowser.open input validation (ID 143930 / EUVD-2026-13712)
CVE-2026-32989 | Precurio Intranet Portal 4.4 cross-site request forgery
CVE-2026-32986 | Textpattern CMS 4.9.0 XML cross site scripting
CVE-2025-67316 | realme Internet Browser 45.13.4.1 HeyTap/ColorOS cross site scripting (EUVD-2026-0829)
Grafana security advisory (AV26-285)
VoidLink Rootkit Uses eBPF and Kernel Modules to Hide Deep Inside Linux Systems
A new and technically advanced rootkit called VoidLink has emerged as a serious threat to Linux systems, blending Loadable Kernel Modules (LKMs) with extended Berkeley Packet Filter (eBPF) programs to hide deep inside the operating system’s core. First documented by Check Point Research in January 2026, VoidLink is a cloud-native Linux malware framework written in […]
The post VoidLink Rootkit Uses eBPF and Kernel Modules to Hide Deep Inside Linux Systems appeared first on Cyber Security News.