theinfosecnews
CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634
Allvulnerability71malware15policy14breach5apt4ransomware1
Ppolicy

Japan’s Team Mirai Integrates AI to Revolutionize Democratic Engagement and Policy Making

Japan’s Team Mirai party has integrated AI tools for direct voter engagement, policy formation, and transparency, winning eleven proportional representation seats in 2026. Their open-source platforms, including Gikai and Mirumae, offer scalable models for digital democracy and anti-corruption efforts. This case provides critical insights for cybersecurity professionals monitoring AI’s role in political systems.

Schneier on Security·10d ago·3 min read
Ppolicy

Six-Month AI Integration in SOCs Reveals Operational Impacts and Challenges

After a six-month trial integrating AI tools like Splunk Phantom and IBM QRadar Advisor, two cybersecurity leaders observed improved threat detection and reduced response times in their SOCs. Challenges included alert fatigue, model tuning, and compliance with regulations such as NIST SP 800-53 and NIS2.

Dark Reading·10d ago·2 min read
Mmalware

TeamPCP Deploys CanisterWorm Wiper Targeting Iranian Cloud Systems via Supply Chain Attack

TeamPCP, a financially motivated cybercrime group, has launched a supply chain attack delivering the CanisterWorm wiper targeting cloud systems configured for Iran. Leveraging exposed Docker, Kubernetes, and Redis services, the worm destroys data on infected nodes and steals credentials for extortion. Detection involves monitoring cloud control plane exploits and malicious Trivy versions, with removal focusing on credential rotation and securing cloud environments.

Krebs on Security·11d ago·3 min read
Bbreach

US Justice Department, Canada, and Germany Dismantle Four Major IoT Botnets Behind Record DDoS Attacks

The U.S. DOJ, alongside Canadian and German authorities, dismantled four major IoT botnets—Aisuru, Kimwolf, JackSkid, and Mossad—that compromised over three million devices and launched hundreds of thousands of DDoS attacks. The disruption targeted infrastructure used to attack Department of Defense IPs and aimed to prevent further infections and attacks. Users should audit and update IoT devices and monitor for suspicious activity.

Krebs on Security·14d ago·2 min read
Vvulnerability

CVE-2025-43520: Apple Multi-Platform Kernel Buffer Overflow Allows Memory Corruption Across Six Operating Systems

CVE-2025-43520 is a classic buffer overflow vulnerability affecting Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS that allows a malicious application to write to kernel memory or crash the system. Exploitation requires local code execution via a malicious app and cannot be triggered remotely without a separate delivery vector. CISA has added this flaw to its Known Exploited Vulnerabilities catalog with a federal patch deadline of April 3, 2026; all organizations should apply Apple's latest OS updates immediately.

CISA KEV·14d ago·3 min read
Vvulnerability

CVE-2025-31277: Buffer Overflow in Apple Safari and OS Platforms Enables Remote Code Execution via Malicious Web Content

CVE-2025-31277 is a buffer overflow vulnerability in Apple Safari and across iOS, iPadOS, macOS, watchOS, visionOS, and tvOS that allows an attacker to corrupt memory and achieve remote code execution when a user processes maliciously crafted web content. No authentication or user interaction beyond visiting a malicious URL is required. CISA has added the flaw to its Known Exploited Vulnerabilities catalog with a federal patch deadline of April 3, 2026; all organizations should apply Apple security updates immediately.

CISA KEV·14d ago·3 min read
Vvulnerability

CVE-2025-54068: Unauthenticated Code Injection in Laravel Livewire Enables Remote Command Execution

CVE-2025-54068 is an unauthenticated code injection vulnerability in Laravel Livewire that allows remote attackers to execute arbitrary code on affected servers under specific application configurations. No credentials are required to exploit the flaw, and successful attacks can result in full server compromise, credential theft, and persistent access. CISA has added the vulnerability to its Known Exploited Vulnerabilities catalog with a federal remediation deadline of April 3, 2026.

CISA KEV·14d ago·3 min read
Vvulnerability

CVE-2025-32432: Unauthenticated Remote Code Execution in Craft CMS Demands Immediate Patching

CVE-2025-32432 is an unauthenticated remote code execution vulnerability in Craft CMS that allows attackers to execute arbitrary code on affected servers without any credentials. CISA has added it to the Known Exploited Vulnerabilities catalog with a federal remediation deadline of April 3, 2026. Organizations should update Craft CMS to the patched version immediately and apply WAF rules and network isolation if patching cannot be completed at once.

CISA KEV·14d ago·3 min read
Vvulnerability

CVE-2025-43510: Apple Improper Locking Flaw Exposes Shared Memory Across Six Platforms

CVE-2025-43510 is an improper locking vulnerability in Apple's shared memory subsystem affecting iOS, iPadOS, macOS, watchOS, tvOS, and visionOS. A malicious local application can exploit the flaw to corrupt inter-process shared memory, enabling privilege escalation or system service disruption. CISA has added the vulnerability to its KEV catalog with a mandatory federal patch deadline of April 3, 2026.

CISA KEV·14d ago·3 min read
Vvulnerability

CVE-2026-20131: Unauthenticated RCE via Java Deserialization in Cisco FMC and Security Cloud Control

CVE-2026-20131 is an unauthenticated remote code execution vulnerability in Cisco Secure Firewall Management Center (FMC) and Security Cloud Control (SCC) caused by unsafe deserialization of Java objects in the web management interface. Successful exploitation grants root-level access to the management appliance and full control over all managed firewalls. CISA has mandated federal agency patching by March 22, 2026; organizations should immediately isolate management interfaces and monitor for patches.

CISA KEV·15d ago·4 min read
Vvulnerability

CVE-2025-66376: Zimbra Collaboration Suite Classic UI Vulnerable to CSS @import XSS Attack

CVE-2025-66376 is a cross-site scripting vulnerability in Synacor Zimbra Collaboration Suite's Classic UI that allows unauthenticated attackers to inject JavaScript via CSS @import directives in HTML emails. Successful exploitation enables session hijacking, credential theft, and full mailbox access within the victim's authenticated session. CISA requires federal agencies to apply Synacor's patch by April 1, 2026.

CISA KEV·16d ago·3 min read
Vvulnerability

CVE-2026-20963: Microsoft SharePoint Remote Code Execution via Unsafe Deserialization Demands Immediate Patching

CVE-2026-20963 is a deserialization of untrusted data vulnerability in Microsoft SharePoint that allows unauthenticated remote attackers to execute arbitrary code in the context of the SharePoint service account. Successful exploitation can lead to lateral movement, credential theft, and persistent access across connected Microsoft environments. CISA mandates federal agency patching by March 21, 2026, and all organizations should treat this as a critical priority remediation.

CISA KEV·16d ago·3 min read