theinfosecnews
CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634
Allvulnerability70malware15policy14breach5apt3ransomware1
Vvulnerability

CVE-2024-21887 & CVE-2023-46805: Ivanti Connect Secure Chained Exploits Enable Unauthenticated Remote Code Execution

CVE-2023-46805 (CVSS 8.2) and CVE-2024-21887 (CVSS 9.1) in Ivanti Connect Secure are being chained to achieve unauthenticated remote code execution on internet-exposed VPN gateways. China-nexus threat group UNC5221 exploited the pair as a zero-day beginning December 2023, deploying custom implants and harvesting credentials from compromised appliances. Organizations must apply Ivanti's patches, perform factory resets on suspected devices, and rotate all credentials that transited affected gateways.

BleepingComputer·1d ago·3 min read
Bbreach

TeamPCP Supply Chain Campaign: Fifth Intelligence Update Confirms Expanded Targeting Through April 1, 2026

TeamPCP, a threat actor group weaponizing security scanning tooling in supply chain attacks, has expanded its campaign through April 1, 2026, with confirmed victims including Databricks and AstraZeneca across dual ransomware and data exfiltration operations. This fifth intelligence update extends coverage from Update 004 and consolidates two days of new developments. Affected organizations should audit CI/CD and scanner tooling, hunt for lateral movement from build infrastructure, and verify backup isolation immediately.

SANS ISC·1d ago·3 min read
Mmalware

Horabot Dropper Delivers Casbaneiro Banking Trojan to Latin American and European Targets in Brazilian eCrime Campaign

The Horabot dropper, attributed to Brazilian cybercrime group Augmented Marauder (also tracked as Water Saci by Trend Micro), delivers the Casbaneiro banking trojan to Spanish-speaking users across Latin America and Europe via targeted phishing campaigns. Casbaneiro performs credential harvesting through overlay attacks, clipboard hijacking, and keylogging, and abuses compromised Outlook accounts to self-propagate. SOC teams should implement scheduled task creation detections, block newly registered TLD outbound connections, and immediately rotate credentials on any confirmed infected host.

The Hacker News·1d ago·3 min read
Ppolicy

Reality Pentesting: A Technical Framework for Modeling Cognitive Exploits Against Human Perception Systems

Researcher K. Melton has published a cognitive security framework called Reality Pentesting, which maps human perception and decision-making to IT security primitives including attack surfaces, bypass mechanisms, and exploit layers. The most operationally critical element is the NeuroCompiler — the pre-conscious signal interpretation layer that adversaries target in phishing, vishing, and BEC campaigns before deliberate evaluation can occur. Security teams running awareness programs, red team engagements, and insider threat models should apply this taxonomy to identify gaps in controls that only address conscious, deliberate reasoning.

Schneier on Security·2d ago·4 min read
Vvulnerability

CVE-2026-5281: Use-After-Free in Google Dawn Enables Arbitrary Code Execution Across Chromium-Based Browsers

CVE-2026-5281 is a use-after-free vulnerability in Google Dawn, the WebGPU implementation embedded in Chrome, Edge, Opera, and all Chromium-based browsers. An attacker who has compromised the renderer process can exploit the flaw via a crafted HTML page to achieve arbitrary code execution in the GPU process. CISA requires federal agencies to patch by April 15, 2026; all organizations should update affected browsers immediately and audit Electron applications for exposure.

CISA KEV·2d ago·3 min read
Vvulnerability

CVE-2025-XXXX: Unpatched Credential Exposure in Legacy Notebook Management Systems Grants Enterprise Network Access

A high-severity credential exposure vulnerability affects enterprise notebooks lacking proper sanitization, full-disk encryption, and credential management controls. Attackers with physical or remote access can extract domain credentials, VPN keys, SSH keys, and browser-stored passwords using freely available tools including Mimikatz and LaZagne. Organizations must enforce verified wipe-and-reimage policies, full-disk encryption with PIN, and immediate credential rotation for all returned or decommissioned devices.

Dark Reading·2d ago·4 min read
Vvulnerability

Google Cloud Vertex AI Permission Model Flaw Lets Attackers Weaponize AI Agents for Unauthorized Data Access

Palo Alto Networks Unit 42 disclosed a permission model blind spot in Google Cloud Vertex AI that allows attackers to weaponize AI agents for unauthorized access to sensitive cloud data. The flaw involves improper privilege boundaries at the agent execution layer, enabling privilege escalation via misconfigured or over-provisioned service accounts. Organizations should immediately audit Vertex AI service account permissions, apply least-privilege IAM roles, and enable Cloud Audit Log monitoring for anomalous agent activity.

The Hacker News·2d ago·3 min read
Vvulnerability

Google Cloud Vertex AI Permission Model Flaw Enables Unauthorized Data Access and Cloud Compromise

Palo Alto Networks Unit 42 disclosed a security flaw in Google Cloud Vertex AI's permission model that allows attackers to weaponize AI agents for unauthorized data access and cloud environment compromise. The vulnerability stems from over-permissioned service accounts assigned to Vertex AI agents, enabling lateral movement across Google Cloud services without triggering standard security alerts. Organizations should immediately audit Vertex AI service account IAM roles and enforce least-privilege access controls.

The Hacker News·2d ago·3 min read
Vvulnerability

AI-Accelerated Exploitation: How Weaponized Machine Learning Is Shrinking the Patch Window

AI-assisted tooling is compressing exploit development timelines from weeks to hours, reducing the effective patch window for critical CVEs and forcing organizations to accelerate remediation cycles for internet-facing assets. State-sponsored groups and criminal actors are using ML-augmented fuzzing, LLM-assisted shellcode generation, and automated scanning to weaponize vulnerabilities within 24–72 hours of public disclosure. SOC teams and engineers should prioritize perimeter device patching, monitor CISA's KEV catalog, and implement compensating controls during any patch gap.

The Hacker News·2d ago·3 min read
Mmalware

AtlasCross RAT Targets Chinese-Speaking Users via Typosquatted Software Domains

AtlasCross is a newly identified RAT targeting Chinese-speaking users through typosquatted domains impersonating VPN clients, encrypted messengers, video conferencing tools, cryptocurrency trackers, and e-commerce platforms. The malware runs on Windows and macOS, establishes persistence via scheduled tasks and LaunchAgents, and exfiltrates credentials, session cookies, SSH keys, and cryptocurrency wallet data over encrypted C2 channels. SOC teams should monitor for domain-age anomalies, staging behavior in AppData directories, and clipboard access on hosts with crypto software installed.

The Hacker News·2d ago·4 min read
Mmalware

AtlasCross RAT Targets Chinese-Speaking Users via Typosquatted Software Domains

AtlasCross is an undocumented Windows RAT distributed through typosquatted domains impersonating VPN clients, encrypted messengers, video conferencing tools, cryptocurrency trackers, and e-commerce applications targeting Chinese-speaking users. The malware establishes registry-based persistence, harvests credentials and clipboard content, and maintains encrypted C2 communication. Detection relies on registry and network telemetry; affected hosts should be isolated, credentials rotated, and endpoints reimaged.

The Hacker News·2d ago·4 min read