theinfosecnews
CISA KEVCVE-2026-35616CVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CISA KEVCVE-2026-35616CVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521
Allvulnerability108policy27breach20malware19apt11ransomware11
Vvulnerability

CVE-2025-53521: F5 BIG-IP APM Stack-Based Buffer Overflow Enables Unauthenticated Remote Code Execution

CVE-2025-53521 is a stack-based buffer overflow in F5 BIG-IP Access Policy Manager (APM) that allows unauthenticated remote attackers to execute arbitrary code on affected systems. Successful exploitation can lead to full system compromise, session interception, and lateral movement through protected networks. CISA has added the vulnerability to the KEV catalog with a federal patch deadline of March 30, 2026.

CISA KEV·11d ago·3 min read
Vvulnerability

CVE-2015-5611: The Jeep Cherokee Remote Code Execution Flaw That Redefined Automotive Cybersecurity

CVE-2015-5611 is a CVSS 10.0 remote code execution vulnerability in Fiat Chrysler's Uconnect telematics system affecting 1.4 million vehicles across Jeep, Dodge, Ram, and Chrysler brands. Researchers Charlie Miller and Chris Valasek demonstrated unauthenticated remote exploitation over the Sprint cellular network, gaining full control of steering, braking, and transmission via CAN bus message injection. FCA issued a mandatory recall under NHTSA 15V-461 and the case directly shaped subsequent automotive cybersecurity regulation including UNECE WP.29 R155 and ISO/SAE 21434.

Dark Reading·11d ago·3 min read
Vvulnerability

CVE-2025-XXXX: Code Injection Vulnerability Exploited Within Hours of Disclosure

A critical code injection vulnerability was actively exploited within hours of public disclosure, giving organizations almost no remediation window before attacks began. The flaw enables remote code execution and affects internet-facing deployments of the targeted product. Organizations should apply vendor patches immediately, isolate unpatched systems, and treat any exposed instance as potentially compromised.

Dark Reading·11d ago·3 min read
Aapt

Third-Party Resellers Undermine Government Efforts to Restrict Spyware Distribution

A recent study reveals that third-party resellers and brokers undermine government restrictions on spyware distribution by exploiting opaque supply chains and enabling continued proliferation. This activity complicates detection, attribution, and enforcement efforts, highlighting the need for enhanced supply chain risk management and international regulatory cooperation.

Dark Reading·12d ago·2 min read
Ppolicy

Trump’s 2025 Executive Order Blocks State AI Regulation, Reshaping U.S. Political Landscape

The Trump administration's December 2025 executive order blocks states from regulating AI by threatening legal action and withholding funds, favoring big tech interests over voter preferences. This action disrupts traditional political alignments, fuels local opposition to AI data centers, and sets the stage for AI regulation as a key issue in upcoming midterm elections.

Schneier on Security·12d ago·3 min read
Vvulnerability

CVE-2026-33634: Aqua Security Trivy Contains Embedded Malicious Code Targeting CI/CD Secrets

CVE-2026-33634 is an embedded malicious code vulnerability in Aqua Security's Trivy scanner that exfiltrates CI/CD secrets—including cloud credentials, SSH keys, API tokens, and database passwords—from any pipeline where affected versions execute. The flaw operates with the permissions Trivy already holds during normal pipeline execution, requiring no privilege escalation. CISA has added this to the Known Exploited Vulnerabilities catalog with a federal remediation deadline of April 9, 2026.

CISA KEV·12d ago·4 min read
Ppolicy

Sen. Wyden Flags Classified Section 702 Abuse Ahead of Reauthorization Deadline

Sen. Ron Wyden warned on March 12, 2026, that a classified legal interpretation of Section 702 FISA authority has been withheld from Congress during multiple reauthorization votes, and that public disclosure will reveal surveillance practices broader than currently understood. The warning comes directly ahead of Section 702's April 2026 reauthorization deadline. Security teams should audit data residency, monitor vendor transparency reports, and treat Section 702's legal scope as an unresolved variable in cloud vendor risk assessments.

Schneier on Security·13d ago·4 min read
Vvulnerability

CVE-2026-33017: Unauthenticated Code Injection in Langflow Exposes AI Pipeline Infrastructure

CVE-2026-33017 is an unauthenticated code injection vulnerability in Langflow that allows a remote attacker to execute arbitrary code through the public flow-building interface without credentials. Successful exploitation can result in credential theft, data exfiltration, and lateral movement into connected infrastructure. CISA has added the vulnerability to its Known Exploited Vulnerabilities catalog with a federal agency patch deadline of April 8, 2026.

CISA KEV·13d ago·3 min read