📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Government HIGH 8m Global phishing Telecommunications / Financial Services HIGH 17m Global vulnerability Information Technology / Cybersecurity CRITICAL 33m Global vulnerability Information Technology MEDIUM 1h Global supply_chain Defense, Aerospace, Government CRITICAL 1h Global vulnerability Cloud Services / Email HIGH 2h Global general Cybersecurity Technology LOW 2h Global apt Healthcare and Research CRITICAL 3h Global vulnerability Cloud Services and Identity Management HIGH 4h Global data_breach Healthcare CRITICAL 4h Global phishing Government HIGH 8m Global phishing Telecommunications / Financial Services HIGH 17m Global vulnerability Information Technology / Cybersecurity CRITICAL 33m Global vulnerability Information Technology MEDIUM 1h Global supply_chain Defense, Aerospace, Government CRITICAL 1h Global vulnerability Cloud Services / Email HIGH 2h Global general Cybersecurity Technology LOW 2h Global apt Healthcare and Research CRITICAL 3h Global vulnerability Cloud Services and Identity Management HIGH 4h Global data_breach Healthcare CRITICAL 4h Global phishing Government HIGH 8m Global phishing Telecommunications / Financial Services HIGH 17m Global vulnerability Information Technology / Cybersecurity CRITICAL 33m Global vulnerability Information Technology MEDIUM 1h Global supply_chain Defense, Aerospace, Government CRITICAL 1h Global vulnerability Cloud Services / Email HIGH 2h Global general Cybersecurity Technology LOW 2h Global apt Healthcare and Research CRITICAL 3h Global vulnerability Cloud Services and Identity Management HIGH 4h Global data_breach Healthcare CRITICAL 4h
📅 Daily Security Digest — Wednesday, March 18, 2026

🇸🇦 Saudi Cyber Daily Digest

All security vulnerabilities, threats, and news aggregated today from trusted sources — continuously updated

Wednesday, March 18, 2026 Today
1 CVEs
19 Threats
0 News
1 Critical
1 CISA KEV
🛡 Security Vulnerabilities (CVE)
1 vulnerabilities
CVE-2025-66376
Zimbra Collaboration Suite CSS @import XSS Vulnerability in Classic UI
01:52 KSA
CRITICAL CVSS 9.8 ⚠ CISA KEV
Synacor Zimbra Collaboration Suite (ZCS) — CVE-2025-66376 Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability in the Classic UI where attackers could abuse Cascading Style Sheets (CSS) @import directives in email HTML. Required Action: Apply mi…
⚠️ Threat Intelligence
19 threats
rss:The Hacker News
05:48 KSA
HIGH vulnerability
<strong>Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS</strong> Apple patched CVE-2026-20643, a WebKit vulnerability affecting iOS, iPadOS, and macOS that allows cross-origin policy bypass through the Navigation API. This flaw could enable a…
rss:The Hacker News
04:36 KSA
HIGH vulnerability
<strong>Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit</strong> A high-severity privilege escalation vulnerability (CVE-2026-3888, CVSS 7.8) affects default Ubuntu Desktop installations version 24.04 and later, allowing attackers to gain roo…
rss:The Hacker News
04:36 KSA
MEDIUM general
<strong>Product Walkthrough: How Mesh CSMA Reveals and Breaks Attack Paths to Crown Jewels</strong> Mesh CSMA provides security teams with contextual analysis to identify and break attack paths that chain together vulnerabilities, misconfigurations, and exposures leading to crit…
rss:The Hacker News
04:36 KSA
CRITICAL vulnerability
<strong>9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors</strong> Nine critical vulnerabilities discovered in low-cost IP KVM devices from four vendors allow unauthenticated attackers to gain root-level access and extensive control over compromised …
rss:The Hacker News
03:32 KSA
HIGH supply_chain
<strong>Claude Code Security and Magecart: Getting the Threat Model Right</strong> Analysis reveals limitations of static code analysis tools like Claude Code Security against sophisticated Magecart attacks that hide malicious payloads in EXIF data of dynamically loaded third-pa…
rss:The Hacker News
03:32 KSA
CRITICAL vulnerability
<strong>Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE</strong> Critical unpatched vulnerability CVE-2026-32746 discovered in GNU InetUtils telnet daemon allows unauthenticated remote attackers to execute arbitrary code with root privileges. Th…
rss:The Hacker News
03:32 KSA
CRITICAL ransomware
<strong>Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access</strong> Amazon Threat Intelligence warns of active Interlock ransomware campaign exploiting CVE-2026-20131, a critical zero-day vulnerability (CVSS 10.0) in Cisco Secure Firewall Management …
rss:The Hacker News
02:16 KSA
HIGH insider
<strong>OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs</strong> The U.S. Treasury's OFAC has sanctioned six individuals and two entities involved in a North Korean IT worker scheme that uses fake remote job positions to defraud U.S. businesse…
rss:Dark Reading
19:00 KSA
HIGH ransomware
<strong>Less Lucrative Ransomware Market Makes Attackers Alter Methods</strong> Ransomware operators are abandoning Cobalt Strike and shifting to native Windows tools as ransom payment rates reach historic lows. This tactical evolution reflects declining profitability in the ran…
rss:Dark Reading
08:03 KSA
LOW general
<strong>Clear Communication: The Missing Link in Cybersecurity Success</strong> Effective cybersecurity requires bridging the gap between technical expertise and clear communication across teams. Building trust and collaboration through improved communication practices enhances …
rss:Dark Reading
08:03 KSA
HIGH malware
<strong>More Attackers Are Logging In, Not Breaking In</strong> Credential theft surged dramatically in late 2025 driven by industrialized infostealer malware operations and AI-powered social engineering attacks. Attackers increasingly use stolen credentials for initial access r…
rss:Dark Reading
08:03 KSA
HIGH apt
<strong>SideWinder Espionage Campaign Expands Across Southeast Asia</strong> India-linked APT group SideWinder targets government, telecom, and critical infrastructure across Southeast Asia using spear-phishing and exploiting old vulnerabilities. The group maintains persistent a…
rss:Dark Reading
06:57 KSA
HIGH data_breach
<strong>Researchers: Meta, TikTok Steal Personal &amp;amp; Financial Info When Users Click Ads</strong> Research reveals that Meta and TikTok use tracking pixels to collect sensitive user data including credit card information and geolocation even after users navigate to adverti…
rss:Dark Reading
06:57 KSA
HIGH vulnerability
<strong>&#039;Claudy Day’ Trio of Flaws Exposes Claude Users to Data Theft</strong> Three vulnerabilities dubbed 'Claudy Day' affecting Claude AI can be exploited through prompt injection combined with other flaws. A simple Google search can trigger a full attack chain threateni…
rss:Malwarebytes Lab
06:29 KSA
HIGH phishing
<strong>Inside a network of 20,000+ fake shops</strong> Security researchers uncovered a massive network of over 20,000 fake e-commerce websites designed to steal payment card details and personal information from unsuspecting shoppers. The fraudulent operation represents a sign…
rss:Malwarebytes Lab
06:29 KSA
HIGH vulnerability
<strong>Apple patches WebKit bug that could let sites access your data</strong> Apple released a silent security update fixing WebKit vulnerability CVE-2026-20643 that could allow malicious websites to access user data. The patch was deployed as a Background Security Improvement…
rss:Malwarebytes Lab
06:11 KSA
MEDIUM phishing
<strong>Researchers found font-rendering trick to hide malicious commands</strong> Security researchers discovered a font-rendering technique that can deceive AI assistants into overlooking malicious commands embedded in websites. This social engineering method poses risks to or…
rss:CISA Advisories
05:40 KSA
CRITICAL apt
<strong>CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization</strong> CISA issued guidance on hardening endpoint management systems following a March 11, 2026 cyberattack against Stryker Corporation that compromised their Microsoft environmen…
rss:Mandiant Blog
05:09 KSA
CRITICAL vulnerability
<strong>The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors</strong> Google Threat Intelligence Group discovered DarkSword, a new iOS full-chain exploit leveraging multiple zero-day vulnerabilities to fully compromise devices. Multiple threat acto…
📰 Cybersecurity News
0 articles
📰 No news aggregated today yet

This digest is updated automatically every day — Last updated: Wednesday, March 18, 2026
CVE Archive · Threats · News

📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.