theinfosecnews
CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634
Allvulnerability71malware15policy14breach5apt4ransomware1
Vvulnerability

CVE-2025-XXXX: Code Injection Vulnerability Exploited Within Hours of Disclosure

A critical code injection vulnerability was actively exploited within hours of public disclosure, giving organizations almost no remediation window before attacks began. The flaw enables remote code execution and affects internet-facing deployments of the targeted product. Organizations should apply vendor patches immediately, isolate unpatched systems, and treat any exposed instance as potentially compromised.

Dark Reading·7d ago·3 min read
Aapt

Third-Party Resellers Undermine Government Efforts to Restrict Spyware Distribution

A recent study reveals that third-party resellers and brokers undermine government restrictions on spyware distribution by exploiting opaque supply chains and enabling continued proliferation. This activity complicates detection, attribution, and enforcement efforts, highlighting the need for enhanced supply chain risk management and international regulatory cooperation.

Dark Reading·8d ago·2 min read
Ppolicy

Trump’s 2025 Executive Order Blocks State AI Regulation, Reshaping U.S. Political Landscape

The Trump administration's December 2025 executive order blocks states from regulating AI by threatening legal action and withholding funds, favoring big tech interests over voter preferences. This action disrupts traditional political alignments, fuels local opposition to AI data centers, and sets the stage for AI regulation as a key issue in upcoming midterm elections.

Schneier on Security·8d ago·3 min read
Vvulnerability

CVE-2026-33634: Aqua Security Trivy Contains Embedded Malicious Code Targeting CI/CD Secrets

CVE-2026-33634 is an embedded malicious code vulnerability in Aqua Security's Trivy scanner that exfiltrates CI/CD secrets—including cloud credentials, SSH keys, API tokens, and database passwords—from any pipeline where affected versions execute. The flaw operates with the permissions Trivy already holds during normal pipeline execution, requiring no privilege escalation. CISA has added this to the Known Exploited Vulnerabilities catalog with a federal remediation deadline of April 9, 2026.

CISA KEV·8d ago·4 min read
Ppolicy

Sen. Wyden Flags Classified Section 702 Abuse Ahead of Reauthorization Deadline

Sen. Ron Wyden warned on March 12, 2026, that a classified legal interpretation of Section 702 FISA authority has been withheld from Congress during multiple reauthorization votes, and that public disclosure will reveal surveillance practices broader than currently understood. The warning comes directly ahead of Section 702's April 2026 reauthorization deadline. Security teams should audit data residency, monitor vendor transparency reports, and treat Section 702's legal scope as an unresolved variable in cloud vendor risk assessments.

Schneier on Security·9d ago·4 min read
Vvulnerability

CVE-2026-33017: Unauthenticated Code Injection in Langflow Exposes AI Pipeline Infrastructure

CVE-2026-33017 is an unauthenticated code injection vulnerability in Langflow that allows a remote attacker to execute arbitrary code through the public flow-building interface without credentials. Successful exploitation can result in credential theft, data exfiltration, and lateral movement into connected infrastructure. CISA has added the vulnerability to its Known Exploited Vulnerabilities catalog with a federal agency patch deadline of April 8, 2026.

CISA KEV·9d ago·3 min read
Aapt

TeamPCP Conducts Targeted Attacks on DevSec Tools and AI Libraries

TeamPCP has orchestrated targeted supply chain attacks against developer security tools such as Trivy, Checkmarx's KICS, VS Code plug-ins, and the LiteLLM AI library. These attacks aim to compromise software development environments, enabling espionage and data theft. Security teams should enhance supply chain protections, apply timely patches, and monitor for indicators of compromise related to TeamPCP activity.

Dark Reading·9d ago·2 min read
Mmalware

AI-Assisted Campaign Distributes Over 300 Poisoned Packages Targeting Developer Tools and Game Cheats

The PoisonPackage malware family is distributed via an AI-assisted campaign spreading over 300 poisoned packages targeting developer tools and game cheats. The malware persists through startup modifications, exfiltrates sensitive data, and communicates with encrypted C2 servers on Windows and Linux platforms. Detection and removal require auditing package installations, blocking C2 communications, and leveraging updated security signatures from vendors like CrowdStrike.

Dark Reading·10d ago·2 min read