theinfosecnews
CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634
Allvulnerability70malware14policy11breach5apt1ransomware1
Vvulnerability

CVE Roundup: Chained Vulnerabilities, Legacy Flaw Exploitation, and Active Patch Gaps Demanding Immediate Action

Researchers are documenting active exploitation of chained vulnerabilities where multiple medium-severity flaws combine to enable full system compromise, alongside continued targeting of legacy software past end-of-life support. Security teams must cross-reference CVE IDs against shared product versions, treat vulnerability chains as elevated-priority findings, and apply vendor patches within tightened SLA windows for internet-exposed assets.

The Hacker News·20h ago·3 min read
Vvulnerability

Cisco Patches Critical and High-Severity Flaws Enabling Auth Bypass, RCE, and Privilege Escalation

Cisco has patched multiple critical and high-severity vulnerabilities affecting enterprise networking and security products, covering authentication bypass, remote code execution, information disclosure, and privilege escalation. These flaws expose widely deployed Cisco infrastructure to unauthenticated remote exploitation and full device compromise. Administrators should apply patches immediately and restrict management plane access to trusted networks.

SecurityWeek·20h ago·3 min read
Mmalware

REF1695: Fake Installers Deliver RATs and Cryptominers in CPA Fraud Operation Active Since November 2023

REF1695 is a financially motivated campaign tracked by Elastic Security Labs that has deployed RATs and cryptocurrency miners via fake software installers since November 2023. The operation monetizes infections through both passive cryptomining and CPA fraud, redirecting victims to content locker pages disguised as software registration flows. Windows endpoints are the confirmed target, and Elastic has released EQL detection rules to support identification and response.

The Hacker News·21h ago·3 min read
Vvulnerability

Incomplete Source Material: No CVE Advisory Can Be Generated Without Vulnerability Data

The submitted source material is a truncated excerpt from a vendor report on open source consumption trends and does not contain a CVE ID, affected product, vulnerability class, CVSS data, or remediation guidance. A factual vulnerability advisory cannot be produced without these elements. Resubmit with a complete vulnerability disclosure containing a CVE assignment, affected product versions, and patch details.

The Hacker News·21h ago·3 min read
Aapt

Coruna iOS Exploit Kit: US-Origin iPhone Hacking Toolkit Now Deployed by Russian Intelligence

Google Threat Intelligence identified Coruna, a sophisticated iOS exploit kit leveraging 23 vulnerabilities across five complete exploit chains to silently install malware via drive-by web delivery. Former L3Harris Trenchant employees confirmed the toolkit originated within the US defense contractor's offensive cyber division before being sold to Russian intelligence, which has deployed it against targets in Ukraine. Organizations should enforce iOS Lockdown Mode on high-risk devices, deploy mobile threat defense tooling, and immediately ingest Google's published IOCs.

Schneier on Security·23h ago·4 min read
Vvulnerability

CVE-2026-3502: TrueConf Client Update Mechanism Allows Arbitrary Code Execution via Unsigned Payload Injection

CVE-2026-3502 is a CWE-494 vulnerability in TrueConf Client where the update mechanism downloads and executes code without verifying integrity or authenticity. An attacker who can intercept or redirect update traffic via MITM, DNS hijacking, or a compromised update server can inject a malicious payload and achieve arbitrary code execution on affected endpoints. CISA has added this vulnerability to the KEV catalog with a federal agency patch deadline of April 16, 2026.

CISA KEV·1d ago·3 min read
Vvulnerability

CVE-2025-XXXX: Zero-Day in TrueConf Server Enables Arbitrary File Execution Across All Connected Endpoints

A zero-day vulnerability in TrueConf Server is under active exploitation, allowing attackers to execute arbitrary files on the server and propagate malicious payloads to all connected client endpoints. The flaw is remotely exploitable and does not require valid server credentials, placing all unpatched TrueConf Server deployments at critical risk. Organizations should patch immediately, isolate the server from untrusted networks, and conduct forensic triage on all endpoints with active sessions.

BleepingComputer·1d ago·3 min read
Mmalware

NoVoice Android Malware Exploits Known Vulnerabilities to Gain Root Access, Found in 50+ Google Play Apps

NoVoice is a newly discovered Android malware exploiting known privilege escalation vulnerabilities to gain root access. Distributed through over 50 malicious apps on Google Play with 2.3 million downloads, it collects user data and communicates with encrypted C2 servers. Detection requires monitoring root-level activity and network anomalies, while removal demands a factory reset and patching affected devices.

BleepingComputer·1d ago·2 min read
Ppolicy

Trump's 2026 Cyber Strategy Hints at Authorizing Private Sector Hackback Operations

The White House's 2026 Cyber Strategy for America contains language suggesting the administration may authorize private companies to conduct offensive operations against adversary networks. No implementing guidance or statutory change has followed, meaning the Computer Fraud and Abuse Act remains the operative legal constraint. Security teams should not treat the strategy document as legal authorization and should review their active defense practices against current law.

Schneier on Security·1d ago·4 min read
Mmalware

Automated Service Enables Persistent Information-Stealing Social Engineering Attacks

A new cybercrime service automates persistent social engineering attacks aimed at stealing sensitive information. Targeting primarily Windows and mobile platforms, the service uses phishing techniques combined with encrypted exfiltration and adaptive persistence. Detection relies on monitoring phishing indicators and network anomalies, while removal requires credential resets and endpoint remediation.

Dark Reading·1d ago·2 min read
Vvulnerability

CVE-2024-21887 & CVE-2023-46805: Ivanti Connect Secure Chained Exploits Enable Unauthenticated Remote Code Execution

CVE-2023-46805 (CVSS 8.2) and CVE-2024-21887 (CVSS 9.1) in Ivanti Connect Secure are being chained to achieve unauthenticated remote code execution on internet-exposed VPN gateways. China-nexus threat group UNC5221 exploited the pair as a zero-day beginning December 2023, deploying custom implants and harvesting credentials from compromised appliances. Organizations must apply Ivanti's patches, perform factory resets on suspected devices, and rotate all credentials that transited affected gateways.

BleepingComputer·1d ago·3 min read