Aggregator
Designing Proactive IT: How Agentic AI Enables Autonomous Digital Workflows
1 month 1 week ago
Amazon Says Drone Strikes Disrupted Middle East Data Centers
1 month 1 week ago
Iranian Cyberespionage Group MuddyWater Goes Dark
Physical effects rather than cyber strikes are triggering Middle Eastern connectivity problems during day four of a sustained U.S. and Israeli bombing campaign against Iran. Iran is responding with drone and missile attacks targeting U.S. military as well as British bases in Bahrain, Cyprus.
Physical effects rather than cyber strikes are triggering Middle Eastern connectivity problems during day four of a sustained U.S. and Israeli bombing campaign against Iran. Iran is responding with drone and missile attacks targeting U.S. military as well as British bases in Bahrain, Cyprus.
Cybersecurity Leadership: Identity, Access, Complexity
1 month 1 week ago
CEOs and CISOs on Dealing With the ‘Work From Anywhere’ Challenge
In this era of "work from anywhere," identity and access management solutions are challenged more than ever. What are the strategies and solutions recommended by top CEOs and CISOs in the cybersecurity sector? An expert panel weighs in.
In this era of "work from anywhere," identity and access management solutions are challenged more than ever. What are the strategies and solutions recommended by top CEOs and CISOs in the cybersecurity sector? An expert panel weighs in.
Microsoft: Hackers abuse OAuth error flows to spread malware
1 month 1 week ago
Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take users to malicious pages. [...]
Bill Toulas
Safepay
1 month 1 week ago
You must login to view this content
cohenido
Researchers discover suite of agentic AI browser vulnerabilities
1 month 1 week ago
Through a simple calendar invite, AI browsers like Comet can be directed to access local file systems, browse directories, open and read files, and exfiltrate data.
The post Researchers discover suite of agentic AI browser vulnerabilities appeared first on CyberScoop.
djohnson
Vehicle Tire Pressure Sensors Enable Silent Tracking
1 month 1 week ago
Like many other features and systems in modern cars, tire pressure sensors leak sensitive data that can be abused by threat actors.
Jai Vijayan
CISA CIO Robert Costello exits agency
1 month 1 week ago
His nearly five-year tenure had recently been marked by turmoil.
The post CISA CIO Robert Costello exits agency appeared first on CyberScoop.
Tim Starks
CVE-2026-25004 | CreativeMindsSolutions CM Business Directory Plugin up to 1.5.3 on WordPress cross site scripting
1 month 1 week ago
A vulnerability classified as problematic has been found in CreativeMindsSolutions CM Business Directory Plugin up to 1.5.3 on WordPress. Impacted is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is referenced as CVE-2026-25004. Remote exploitation of the attack is possible. No exploit is available.
vuldb.com
CVE-2026-3269 | psi-probe PSI Probe up to 5.3.0 Session ExpireSessionsController.java handleRequestInternal denial of service
1 month 1 week ago
A vulnerability categorized as problematic has been discovered in psi-probe PSI Probe up to 5.3.0. The impacted element is the function handleRequestInternal of the file psi-probe-core/src/main/java/psiprobe/controllers/sessions/ExpireSessionsController.java of the component Session Handler. Executing a manipulation can lead to denial of service.
This vulnerability is tracked as CVE-2026-3269. The attack can be launched remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2026-3270 | psi-probe PSI Probe up to 5.3.0 Whois Whois.java lookup server-side request forgery
1 month 1 week ago
A vulnerability identified as critical has been detected in psi-probe PSI Probe up to 5.3.0. This affects the function lookup of the file psi-probe-core/src/main/java/psiprobe/tools/Whois.java of the component Whois. The manipulation leads to server-side request forgery.
This vulnerability is listed as CVE-2026-3270. The attack may be initiated remotely. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2026-26682 | fastCMS up to 0.1.5 PluginController.java code injection
1 month 1 week ago
A vulnerability was found in fastCMS up to 0.1.5 and classified as problematic. Affected by this issue is some unknown functionality of the file PluginController.java. The manipulation results in code injection.
This vulnerability is known as CVE-2026-26682. Attacking locally is a requirement. No exploit is available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2026-27757 | Shenzhen Hongyavision Technology SODOLA SL902-SWTGW124AS up to 200.1.20 Management Interface unverified password change (EUVD-2026-9047)
1 month 1 week ago
A vulnerability categorized as critical has been discovered in Shenzhen Hongyavision Technology SODOLA SL902-SWTGW124AS up to 200.1.20. Affected by this vulnerability is an unknown functionality of the component Management Interface. The manipulation results in unverified password change.
This vulnerability is identified as CVE-2026-27757. The attack can be executed remotely. There is not any exploit available.
vuldb.com
CVE-2026-27758 | Shenzhen Hongyavision Technology SODOLA SL902-SWTGW124AS up to 200.1.20 Management Interface cross-site request forgery (EUVD-2026-9048)
1 month 1 week ago
A vulnerability, which was classified as problematic, was found in Shenzhen Hongyavision Technology SODOLA SL902-SWTGW124AS up to 200.1.20. This affects an unknown function of the component Management Interface. Such manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2026-27758. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2026-26997 | MacWarrior clipbucket-v5 up to 5.5.3 cross site scripting (GHSA-97r6-4hmx-hcrh / EUVD-2026-9051)
1 month 1 week ago
A vulnerability classified as problematic has been found in MacWarrior clipbucket-v5 up to 5.5.3. Impacted is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is documented as CVE-2026-26997. The attack can be initiated remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2026-28338 | PMD up to 7.21.x String cross site scripting (EUVD-2026-9069)
1 month 1 week ago
A vulnerability was found in PMD up to 7.21.x and classified as problematic. The impacted element is an unknown function of the component String Handler. Such manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2026-28338. The attack can be launched remotely. No exploit exists.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2026-28407 | chainguard-dev malcontent up to 1.20.x improper check or handling of exceptional conditions (GHSA-945p-3jhm-6rcp / EUVD-2026-9078)
1 month 1 week ago
A vulnerability described as problematic has been identified in chainguard-dev malcontent up to 1.20.x. Affected is an unknown function. Such manipulation leads to improper check or handling of exceptional conditions.
This vulnerability is listed as CVE-2026-28407. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-28351 | py-pdf pypdf up to 6.7.3 resource consumption (EUVD-2026-9070 / Nessus ID 300281)
1 month 1 week ago
A vulnerability has been found in py-pdf pypdf up to 6.7.3 and classified as problematic. The affected element is an unknown function. This manipulation causes resource consumption.
This vulnerability is handled as CVE-2026-28351. The attack can be initiated remotely. There is not any exploit available.
The affected component should be upgraded.
vuldb.com
Qualcomm Zero-Day Exploited in Targeted Android Attacks
1 month 1 week ago
The exploitation activity against CVE-2026-21385, a high-severity memory corruption flaw, could be tied to commercial spyware or nation-state threat groups.
Alexander Culafi