📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Cloud Services / Email HIGH 28m Global general Cybersecurity Technology LOW 40m Global vulnerability Cloud Services and Identity Management HIGH 2h Global data_breach Healthcare CRITICAL 2h Global vulnerability Operating Systems and Software HIGH 3h Global phishing Financial Services HIGH 9h Global supply_chain Software Development and Technology CRITICAL 11h Global apt Multiple sectors HIGH 12h Global phishing Telecommunications and General Public HIGH 13h Global apt Government and Critical Infrastructure CRITICAL 13h Global vulnerability Cloud Services / Email HIGH 28m Global general Cybersecurity Technology LOW 40m Global vulnerability Cloud Services and Identity Management HIGH 2h Global data_breach Healthcare CRITICAL 2h Global vulnerability Operating Systems and Software HIGH 3h Global phishing Financial Services HIGH 9h Global supply_chain Software Development and Technology CRITICAL 11h Global apt Multiple sectors HIGH 12h Global phishing Telecommunications and General Public HIGH 13h Global apt Government and Critical Infrastructure CRITICAL 13h Global vulnerability Cloud Services / Email HIGH 28m Global general Cybersecurity Technology LOW 40m Global vulnerability Cloud Services and Identity Management HIGH 2h Global data_breach Healthcare CRITICAL 2h Global vulnerability Operating Systems and Software HIGH 3h Global phishing Financial Services HIGH 9h Global supply_chain Software Development and Technology CRITICAL 11h Global apt Multiple sectors HIGH 12h Global phishing Telecommunications and General Public HIGH 13h Global apt Government and Critical Infrastructure CRITICAL 13h
📅 Daily Security Digest — Thursday, March 19, 2026

🇸🇦 Saudi Cyber Daily Digest

All security vulnerabilities, threats, and news aggregated today from trusted sources — continuously updated

Thursday, March 19, 2026 Today
1 CVEs
25 Threats
0 News
1 Critical
1 CISA KEV
🛡 Security Vulnerabilities (CVE)
1 vulnerabilities
CVE-2026-20131
Cisco Secure Firewall Management Center Unauthenticated RCE via Deserialization
01:52 KSA
CRITICAL CVSS 9.8 ⚠ CISA KEV
Cisco Secure Firewall Management Center (FMC) — CVE-2026-20131 Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in the web-based management interface that co…
⚠️ Threat Intelligence
25 threats
rss:The Hacker News
02:16 KSA
CRITICAL ransomware
<strong>CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware Attacks</strong> CISA has issued urgent warnings to government agencies regarding active exploitation of vulnerabilities in Synacor Zimbra Collaboration Suite and Microsoft SharePoint. Addit…
rss:The Hacker News
02:16 KSA
CRITICAL apt
<strong>DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover</strong> A sophisticated iOS exploit kit called DarkSword has been actively used by multiple threat actors since November 2025, leveraging six vulnerabilities including three zero-days to achiev…
rss:The Hacker News
01:00 KSA
MEDIUM insider
<strong>How Ceros Gives Security Teams Visibility and Control in Claude Code</strong> Security teams face new challenges with AI coding agents like Claude Code operating outside traditional identity and access controls in enterprise environments. Organizations need visibility an…
rss:The Hacker News
01:00 KSA
HIGH malware
<strong>New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data</strong> New Android banking malware called Perseus discovered actively targeting mobile devices for device takeover and financial fraud. Built on Cerberus and Phoenix malware foundations, …
rss:The Hacker News
01:00 KSA
HIGH general
<strong>ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish &amp; More</strong> Multiple cybersecurity threats identified including FortiGate ransomware-as-a-service operations, Citrix vulnerabilities being exploited, and LiveChat-based phishing campa…
rss:The Hacker News
23:54 KSA
CRITICAL ransomware
<strong>54 EDR Killers Use BYOVD to Exploit 35 Signed Vulnerable Drivers and Disable Security</strong> Analysis reveals 54 EDR killer programs exploit 35 vulnerable signed drivers using BYOVD technique to disable security systems. These tools are commonly deployed in ransomware …
rss:The Hacker News
23:54 KSA
HIGH malware
<strong>Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers</strong> New Speagle malware hijacks legitimate Cobra DocGuard software infrastructure to steal sensitive data from infected systems. The malware exploits the trusted program's functionality to …
rss:Dark Reading
06:57 KSA
CRITICAL apt
<strong>DarkSword: iPhone Exploit Kit Serves Spies &amp;amp; Thieves Alike</strong> A sophisticated iOS exploit kit called DarkSword is actively targeting users in Saudi Arabia, Turkey, Malaysia, and Ukraine using multiple zero-day vulnerabilities. This advanced threat poses sig…
rss:Dark Reading
06:30 KSA
HIGH malware
<strong>C2 Implant &#039;SnappyClient&#039; Targets Crypto Wallets</strong> A sophisticated C2 implant named SnappyClient has been discovered targeting cryptocurrency wallets with capabilities for remote access, data exfiltration, and surveillance. The malware poses significant …
rss:Dark Reading
06:30 KSA
HIGH apt
<strong>EU Sanctions Companies in China, Iran for Cyberattacks</strong> The European Union has imposed sanctions on entities in China and Iran for conducting cyberattacks, prohibiting them from entering or conducting business within EU territories. This represents escalating int…
rss:Dark Reading
06:30 KSA
MEDIUM general
<strong>Post-Quantum Web Could be Safer, Faster</strong> Major technology providers are implementing quantum-resistant HTTPS protocols that reduce certificate sizes by 90%, improving both security against future quantum computing threats and network performance. This advancement…
rss:Dark Reading
06:29 KSA
MEDIUM phishing
<strong>With Government&#039;s Role Uncertain, Businesses Unite to Combat Fraud</strong> Major industry leaders are forming collaborative partnerships to share threat intelligence and strengthen defenses against increasing online fraud and scams. This private sector initiative e…
rss:Dark Reading
06:29 KSA
LOW general
<strong>Native Launches With Security Control Plane for Multicloud</strong> Cloud security startup Native launches a unified security control plane that translates and enforces consistent security policies across multiple cloud providers including AWS, Azure, Google Cloud, and O…
rss:Malwarebytes Lab
06:11 KSA
HIGH data_breach
<strong>Your tax forms sell for $20 on the dark web</strong> Cybercriminals are actively trading stolen tax records on dark web forums for as little as $20 during tax season. This represents significant identity theft risk for individuals and potential fraud exposure for financi…
rss:Malwarebytes Lab
06:11 KSA
CRITICAL apt
<strong>A DarkSword hangs over unpatched iPhones</strong> State-sponsored attackers are exploiting DarkSword, a vulnerability chain targeting unpatched iPhones. Organizations using iOS devices face critical risk from these advanced persistent threats requiring immediate patching…
rss:CISA Advisories
05:40 KSA
HIGH vulnerability
<strong>CTEK Chargeportal</strong> Multiple vulnerabilities in CTEK Chargeportal could allow attackers to gain unauthorized administrative control over electric vehicle charging stations or launch denial-of-service attacks. This threatens the availability and security of EV char…
rss:CISA Advisories
05:40 KSA
HIGH vulnerability
<strong>Schneider Electric EcoStruxure PME and EPO</strong> Schneider Electric disclosed vulnerabilities in EcoStruxure Power Monitoring Expert (PME) and Power Operation (EPO) products. These on-premises software solutions are used in power-critical and energy-intensive faciliti…
rss:CISA Advisories
05:40 KSA
CRITICAL vulnerability
<strong>Automated Logic WebCTRL Premium Server</strong> Critical vulnerabilities discovered in Automated Logic WebCTRL Premium Server that could allow attackers to read, intercept, or modify communications. The vulnerabilities pose significant risks to building automation and HV…
rss:CISA Advisories
05:39 KSA
HIGH vulnerability
<strong>IGL-Technologies eParking.fi</strong> Multiple vulnerabilities in IGL-Technologies eParking.fi charging station systems allow attackers to gain unauthorized administrative control or launch denial-of-service attacks. This threatens electric vehicle charging infrastructur…
rss:CISA Advisories
05:39 KSA
HIGH vulnerability
<strong>Schneider Electric Modicon Controllers M241, M251, M258, and LMC058</strong> Cross-site scripting and open redirect vulnerabilities in Schneider Electric Modicon controllers (M241, M251, M258, LMC058) could lead to account takeover or code execution in user browsers. Thi…
rss:CISA Advisories
05:39 KSA
HIGH vulnerability
<strong>Schneider Electric Modicon M241, M251, and M262</strong> Critical vulnerability in Schneider Electric Modicon controllers (M241, M251, M262) versions prior to 5.4.13.12 allows attackers to cause denial-of-service conditions. This affects industrial control systems used i…
rss:CISA Advisories
05:20 KSA
CRITICAL vulnerability
<strong>CISA Adds One Known Exploited Vulnerability to Catalog</strong> CISA added CVE-2026-20131 to its Known Exploited Vulnerabilities Catalog due to active exploitation. The vulnerability affects Cisco Secure Firewall Management Center and Cisco Security Cloud Control, involv…
rss:CISA Advisories
05:20 KSA
MEDIUM vulnerability
<strong>Mitsubishi Electric CNC Series</strong> Mitsubishi Electric CNC Series contains a vulnerability that allows remote attackers to cause an out-of-bounds read, resulting in denial-of-service conditions. Affected versions include M800VW and M80 series used in computer numeri…
rss:CISA Advisories
05:20 KSA
HIGH vulnerability
<strong>Schneider Electric EcoStruxure Automation Expert</strong> Schneider Electric disclosed a vulnerability in its EcoStruxure Automation Expert plant automation software used for digital control systems in industrial processes. The vulnerability affects critical infrastructu…
rss:Recorded Future
05:09 KSA
HIGH malware
<strong>2025 Year in Review: Malicious, Infrastructure</strong> Insikt Group's 2025 report analyzes malicious infrastructure trends including Cobalt Strike abuse, Vidar infostealer campaigns, and emerging AI-driven threats. The findings provide strategic insights for organizatio…
📰 Cybersecurity News
0 articles
📰 No news aggregated today yet

This digest is updated automatically every day — Last updated: Thursday, March 19, 2026
CVE Archive · Threats · News

📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.