Aggregator
CVE-2026-27800 | zed-industries zed up to 0.224.3 ZIP archive.rs extract_zip path traversal (GHSA-v385-xh3h-rrfr / EUVD-2026-8773)
CVE-2026-3389 | Squirrel up to 3.2 sqstdlib/sqstdrex.cpp sqstd_rex_newnode null pointer dereference (Issue 314 / EUVD-2026-9124)
Nation-State Actor Embraces AI Malware Assembly Line
Defending Against Iranian Cyber Threats in the Wake of Operation Epic Fury
On February 28, 2026, the United States and Israel launched Operation Epic Fury (U.S.) and Operation Roaring Lion (Israel), a coordinated military and cyber campaign targeting Iranian military installations, IRGC leadership, and government infrastructure. U.S. Cyber Command was designated the "first mover," with cyber operations beginning before any kinetic weapons were deployed. In the first 48 hours, U.S. and allied forces struck more than 1,250 targets across Iran, while Israel conducted what has been described as the largest cyberattack in history, collapsing Iran's internet connectivity to 1-4% of normal levels through multi-layered attacks on BGP routing, DNS infrastructure, and SCADA/ICS systems.
The post Defending Against Iranian Cyber Threats in the Wake of Operation Epic Fury appeared first on AttackIQ.
The post Defending Against Iranian Cyber Threats in the Wake of Operation Epic Fury appeared first on Security Boulevard.
Tycoon 2FA Goes Boom as Europol, Vendors Bust Phishing Platform
ShinyHunters Claims Woflow Breach: What It Means for SaaS Supply Chain Security
Learn the security risks in SaaS supply chains and about ShinyHunters’ evolving extortion tactics behind the alleged Woflow breach.
The post ShinyHunters Claims Woflow Breach: What It Means for SaaS Supply Chain Security appeared first on AppOmni.
The post ShinyHunters Claims Woflow Breach: What It Means for SaaS Supply Chain Security appeared first on Security Boulevard.