Aggregator
Phishing-to-RMM Attacks: The Remote Access Blind Spot CISOs Can’t Ignore
CISOs are under pressure to prove that their security programs can detect threats early, reduce business risk, and support fast, confident response. But that becomes harder when attackers stop relying on obviously malicious tools. In recent phishing-to-RMM campaigns observed by ANY.RUN analysts, threat actors are using fake Microsoft, Adobe, and OneDrive pages to deliver legitimate […]
The post Phishing-to-RMM Attacks: The Remote Access Blind Spot CISOs Can’t Ignore appeared first on ANY.RUN's Cybersecurity Blog.
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2024-1708 ConnectWise ScreenConnect Path Traversal Vulnerability
- CVE-2026-32202 Microsoft Windows Protection Mechanism Failure Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
From DMV to Wallet: Understanding Verifiable Digital Credential Issuance
Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About
New Windows 0-Click Vulnerability Exploited to Bypass Defender SmartScreen
A critical zero-click authentication coercion vulnerability, tracked as CVE-2026-32202, stemming from an incomplete patch for a Windows Shell security feature bypass actively weaponized by the Russian APT28 threat group. Microsoft confirmed active exploitation of the flaw and released a fix as part of its April 2026 Patch Tuesday update. According to CERT-UA, the APT28 threat actor, also known […]
The post New Windows 0-Click Vulnerability Exploited to Bypass Defender SmartScreen appeared first on Cyber Security News.
New Silver Fox Campaign Uses Fake Tax Audit Alerts and Software Updates to Deliver Malware
Silver Fox, a China-based threat group has launched a new wave of attacks targeting businesses and individuals across Asia, using fake tax audit notifications and counterfeit software update alerts to install dangerous malware on victim systems. The campaign reflects a sharp rise in socially engineered attacks that exploit the trust people place in official-looking messages […]
The post New Silver Fox Campaign Uses Fake Tax Audit Alerts and Software Updates to Deliver Malware appeared first on Cyber Security News.
CVE-2026-7306 | Xuxueli xxl-job up to 3.3.2 OpenAPI Endpoint OpenApiController.java default_token hard-coded key (Issue 3938)
CVE-2026-7305 | Xuxueli xxl-job up to 3.3.2 trigger Endpoint XxlJobServiceImpl.java triggerJob addressList server-side request forgery (Issue 3935)
CVE-2026-7303 | Xuxueli xxl-job up to 3.3.2 Execution Log JobLogController.java logDetailCat logId resource injection (Issue 3936)
OpenAI 硬件负责人的闭门分享,向我们揭示了为什么硬件「终点」仍是智能手机
Submit #803077: xuxueli https://github.com/xuxueli/xxl-job v3.3.2 Authorization Bypass [Accepted]
Submit #803076: xuxueli https://github.com/xuxueli/xxl-job v3.3.2 Server-Side Request Forgery [Accepted]
Submit #803075: xuxueli https://github.com/xuxueli/xxl-job v3.3.2 Authorization Bypass [Accepted]
New Linux FIRESTARTER Backdoor Targets Cisco Firepower Devices
Касперский поймал троянца — правда, тот успел погулять на свободе и попасть в топ-200 Google Play
Chinese-Backed Smishing Services Use OTT Messaging and SMS to Scale Credential Theft
A wave of large-scale phishing campaigns backed by Chinese-language services is quietly targeting people around the world, using everyday messaging apps to steal personal and financial credentials. These operations have grown well beyond regional limits, making them one of the most organized and active threats in the current cyber threat landscape. Phishing-as-a-service, commonly known as […]
The post Chinese-Backed Smishing Services Use OTT Messaging and SMS to Scale Credential Theft appeared first on Cyber Security News.