theinfosecnews
CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634
Allvulnerability70malware15policy14breach5apt3ransomware1
Mmalware

Axios npm Package Compromised: Supply Chain Attack Drops Cross-Platform Trojan via Fake Dependency

Axios npm versions 1.14.1 and 0.30.4 were tampered to inject the malicious package plain-crypto-js 4.2.1, delivering a cross-platform trojan affecting Windows, macOS, and Linux. The malware targets developer credentials, cloud tokens, and SSH keys stored on infected hosts and establishes persistence via OS-native mechanisms. Organizations should audit installed Axios versions, remove plain-crypto-js, rotate all secrets from exposed environments, and rebuild affected CI/CD runners from clean images.

The Hacker News·3d ago·3 min read
Mmalware

AI-Generated Junk Code Used to Obfuscate Malware Logic, Evade Static Analysis

Researchers identified a malware campaign using large volumes of AI-generated junk code to inflate binary size and evade static analysis, obscuring credential-harvesting and C2 functionality targeting Windows endpoints. The technique leverages LLM output to produce syntactically valid but functionally inert code at scale, degrading signature-based detection without requiring manual obfuscation expertise. SOC teams should prioritize behavioral detection, ASR rule enforcement, and full credential rotation on affected systems.

Dark Reading·3d ago·3 min read
Ppolicy

Black Duck CEO: AI Is Rewriting the Rules of Application Security Testing

Black Duck CEO Jason Schmitt argues that AI-assisted development tools like GitHub Copilot and Amazon CodeWhisperer are introducing vulnerability patterns and dependency risks that traditional SAST and SCA pipelines are not equipped to detect. Existing regulations including NIST SSDF, OMB M-22-18, and PCI DSS v4.0 create direct compliance exposure for organizations that have not updated their application security testing programs to account for LLM-generated code. Security teams must audit AI tool usage across the SDLC, update SBOM generation, and revise secure coding policies before their next compliance attestation cycle.

Dark Reading·3d ago·4 min read
Vvulnerability

CVE Pending: Check Point Discloses ChatGPT Prompt Injection Flaw Enabling Silent Data Exfiltration

Check Point Research disclosed a prompt injection vulnerability in OpenAI ChatGPT that allowed a single malicious prompt to silently exfiltrate user messages, uploaded files, and other session data without user knowledge. The flaw requires no authentication beyond a standard ChatGPT session and carries low attack complexity. Organizations should restrict file uploads, avoid using ChatGPT for sensitive data processing, and monitor OpenAI's security advisories for patch confirmation.

The Hacker News·3d ago·3 min read
Mmalware

DeepLoad Malware Loader Uses ClickFix Delivery and AI-Assisted Obfuscation to Steal Credentials Before Detection

DeepLoad is a new malware loader delivered via the ClickFix social engineering tactic, identified by ReliaQuest researchers. It uses likely AI-assisted obfuscation and process injection to evade static detection, and begins stealing credentials and session tokens immediately upon execution — before the primary loader can be blocked. Windows endpoints without PowerShell restrictions or application control policies are the primary targets.

The Hacker News·3d ago·4 min read
Vvulnerability

CVE-2024-7014: Critical Telegram RCE Vulnerability Scores 9.8 CVSS — Vendor Disputes Existence

CVE-2024-7014 is a reported critical remote code execution vulnerability in the Telegram messaging application, carrying a CVSS score of 9.8, allegedly triggered by a maliciously crafted sticker file with no user interaction required. Telegram disputes the vulnerability's existence and has not issued a patch or security advisory. Security teams should update Telegram clients, disable automatic media downloads, and monitor endpoint behavior pending vendor resolution.

Dark Reading·3d ago·3 min read
Vvulnerability

CVE-2026-3055: Critical Citrix NetScaler Memory Overread Flaw Under Active Reconnaissance

CVE-2026-3055 is a critical (CVSS 9.3) memory overread vulnerability in Citrix NetScaler ADC and NetScaler Gateway caused by insufficient input validation. An unauthenticated remote attacker can exploit the flaw to leak sensitive memory contents including session tokens and credentials. Defused Cyber and watchTowr have confirmed active reconnaissance activity targeting affected deployments.

The Hacker News·6d ago·3 min read
Vvulnerability

CVE-2025-53521: F5 BIG-IP APM Stack-Based Buffer Overflow Enables Unauthenticated Remote Code Execution

CVE-2025-53521 is a stack-based buffer overflow in F5 BIG-IP Access Policy Manager (APM) that allows unauthenticated remote attackers to execute arbitrary code on affected systems. Successful exploitation can lead to full system compromise, session interception, and lateral movement through protected networks. CISA has added the vulnerability to the KEV catalog with a federal patch deadline of March 30, 2026.

CISA KEV·7d ago·3 min read
Vvulnerability

CVE-2015-5611: The Jeep Cherokee Remote Code Execution Flaw That Redefined Automotive Cybersecurity

CVE-2015-5611 is a CVSS 10.0 remote code execution vulnerability in Fiat Chrysler's Uconnect telematics system affecting 1.4 million vehicles across Jeep, Dodge, Ram, and Chrysler brands. Researchers Charlie Miller and Chris Valasek demonstrated unauthenticated remote exploitation over the Sprint cellular network, gaining full control of steering, braking, and transmission via CAN bus message injection. FCA issued a mandatory recall under NHTSA 15V-461 and the case directly shaped subsequent automotive cybersecurity regulation including UNECE WP.29 R155 and ISO/SAE 21434.

Dark Reading·7d ago·3 min read
Vvulnerability

CVE-2025-XXXX: Code Injection Vulnerability Exploited Within Hours of Disclosure

A critical code injection vulnerability was actively exploited within hours of public disclosure, giving organizations almost no remediation window before attacks began. The flaw enables remote code execution and affects internet-facing deployments of the targeted product. Organizations should apply vendor patches immediately, isolate unpatched systems, and treat any exposed instance as potentially compromised.

Dark Reading·7d ago·3 min read