theinfosecnews
CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634
Allvulnerability78policy17malware17breach7apt6ransomware2
Ppolicy

Sen. Wyden Flags Classified Section 702 Abuse Ahead of Reauthorization Deadline

Sen. Ron Wyden warned on March 12, 2026, that a classified legal interpretation of Section 702 FISA authority has been withheld from Congress during multiple reauthorization votes, and that public disclosure will reveal surveillance practices broader than currently understood. The warning comes directly ahead of Section 702's April 2026 reauthorization deadline. Security teams should audit data residency, monitor vendor transparency reports, and treat Section 702's legal scope as an unresolved variable in cloud vendor risk assessments.

Schneier on Security·11d ago·4 min read
Vvulnerability

CVE-2026-33017: Unauthenticated Code Injection in Langflow Exposes AI Pipeline Infrastructure

CVE-2026-33017 is an unauthenticated code injection vulnerability in Langflow that allows a remote attacker to execute arbitrary code through the public flow-building interface without credentials. Successful exploitation can result in credential theft, data exfiltration, and lateral movement into connected infrastructure. CISA has added the vulnerability to its Known Exploited Vulnerabilities catalog with a federal agency patch deadline of April 8, 2026.

CISA KEV·11d ago·3 min read
Aapt

TeamPCP Conducts Targeted Attacks on DevSec Tools and AI Libraries

TeamPCP has orchestrated targeted supply chain attacks against developer security tools such as Trivy, Checkmarx's KICS, VS Code plug-ins, and the LiteLLM AI library. These attacks aim to compromise software development environments, enabling espionage and data theft. Security teams should enhance supply chain protections, apply timely patches, and monitor for indicators of compromise related to TeamPCP activity.

Dark Reading·11d ago·2 min read
Mmalware

AI-Assisted Campaign Distributes Over 300 Poisoned Packages Targeting Developer Tools and Game Cheats

The PoisonPackage malware family is distributed via an AI-assisted campaign spreading over 300 poisoned packages targeting developer tools and game cheats. The malware persists through startup modifications, exfiltrates sensitive data, and communicates with encrypted C2 servers on Windows and Linux platforms. Detection and removal require auditing package installations, blocking C2 communications, and leveraging updated security signatures from vendors like CrowdStrike.

Dark Reading·11d ago·2 min read
Ppolicy

Japan’s Team Mirai Integrates AI to Revolutionize Democratic Engagement and Policy Making

Japan’s Team Mirai party has integrated AI tools for direct voter engagement, policy formation, and transparency, winning eleven proportional representation seats in 2026. Their open-source platforms, including Gikai and Mirumae, offer scalable models for digital democracy and anti-corruption efforts. This case provides critical insights for cybersecurity professionals monitoring AI’s role in political systems.

Schneier on Security·12d ago·3 min read
Ppolicy

Six-Month AI Integration in SOCs Reveals Operational Impacts and Challenges

After a six-month trial integrating AI tools like Splunk Phantom and IBM QRadar Advisor, two cybersecurity leaders observed improved threat detection and reduced response times in their SOCs. Challenges included alert fatigue, model tuning, and compliance with regulations such as NIST SP 800-53 and NIS2.

Dark Reading·12d ago·2 min read
Mmalware

TeamPCP Deploys CanisterWorm Wiper Targeting Iranian Cloud Systems via Supply Chain Attack

TeamPCP, a financially motivated cybercrime group, has launched a supply chain attack delivering the CanisterWorm wiper targeting cloud systems configured for Iran. Leveraging exposed Docker, Kubernetes, and Redis services, the worm destroys data on infected nodes and steals credentials for extortion. Detection involves monitoring cloud control plane exploits and malicious Trivy versions, with removal focusing on credential rotation and securing cloud environments.

Krebs on Security·12d ago·3 min read
Bbreach

US Justice Department, Canada, and Germany Dismantle Four Major IoT Botnets Behind Record DDoS Attacks

The U.S. DOJ, alongside Canadian and German authorities, dismantled four major IoT botnets—Aisuru, Kimwolf, JackSkid, and Mossad—that compromised over three million devices and launched hundreds of thousands of DDoS attacks. The disruption targeted infrastructure used to attack Department of Defense IPs and aimed to prevent further infections and attacks. Users should audit and update IoT devices and monitor for suspicious activity.

Krebs on Security·16d ago·2 min read
Vvulnerability

CVE-2025-43520: Apple Multi-Platform Kernel Buffer Overflow Allows Memory Corruption Across Six Operating Systems

CVE-2025-43520 is a classic buffer overflow vulnerability affecting Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS that allows a malicious application to write to kernel memory or crash the system. Exploitation requires local code execution via a malicious app and cannot be triggered remotely without a separate delivery vector. CISA has added this flaw to its Known Exploited Vulnerabilities catalog with a federal patch deadline of April 3, 2026; all organizations should apply Apple's latest OS updates immediately.

CISA KEV·16d ago·3 min read
Vvulnerability

CVE-2025-43510: Apple Improper Locking Flaw Exposes Shared Memory Across Six Platforms

CVE-2025-43510 is an improper locking vulnerability in Apple's shared memory subsystem affecting iOS, iPadOS, macOS, watchOS, tvOS, and visionOS. A malicious local application can exploit the flaw to corrupt inter-process shared memory, enabling privilege escalation or system service disruption. CISA has added the vulnerability to its KEV catalog with a mandatory federal patch deadline of April 3, 2026.

CISA KEV·16d ago·3 min read
Vvulnerability

CVE-2025-31277: Buffer Overflow in Apple Safari and OS Platforms Enables Remote Code Execution via Malicious Web Content

CVE-2025-31277 is a buffer overflow vulnerability in Apple Safari and across iOS, iPadOS, macOS, watchOS, visionOS, and tvOS that allows an attacker to corrupt memory and achieve remote code execution when a user processes maliciously crafted web content. No authentication or user interaction beyond visiting a malicious URL is required. CISA has added the flaw to its Known Exploited Vulnerabilities catalog with a federal patch deadline of April 3, 2026; all organizations should apply Apple security updates immediately.

CISA KEV·16d ago·3 min read