📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global apt Government and Intelligence HIGH 6h Global supply_chain Software Development / Technology HIGH 2h Global general Multiple sectors HIGH 3h Global supply_chain Software Development and Supply Chain Security LOW 3h Global vulnerability Artificial Intelligence and Technology HIGH 4h Global data_breach Retail/E-commerce HIGH 4h Global social_engineering General/Cross-sector HIGH 4h Global apt Enterprise/Multi-sector CRITICAL 4h Global supply_chain Software Development / Cybersecurity Tools CRITICAL 5h Global vulnerability Information Technology HIGH 5h Global apt Government and Intelligence HIGH 6h Global supply_chain Software Development / Technology HIGH 2h Global general Multiple sectors HIGH 3h Global supply_chain Software Development and Supply Chain Security LOW 3h Global vulnerability Artificial Intelligence and Technology HIGH 4h Global data_breach Retail/E-commerce HIGH 4h Global social_engineering General/Cross-sector HIGH 4h Global apt Enterprise/Multi-sector CRITICAL 4h Global supply_chain Software Development / Cybersecurity Tools CRITICAL 5h Global vulnerability Information Technology HIGH 5h Global apt Government and Intelligence HIGH 6h Global supply_chain Software Development / Technology HIGH 2h Global general Multiple sectors HIGH 3h Global supply_chain Software Development and Supply Chain Security LOW 3h Global vulnerability Artificial Intelligence and Technology HIGH 4h Global data_breach Retail/E-commerce HIGH 4h Global social_engineering General/Cross-sector HIGH 4h Global apt Enterprise/Multi-sector CRITICAL 4h Global supply_chain Software Development / Cybersecurity Tools CRITICAL 5h Global vulnerability Information Technology HIGH 5h
📅 Daily Security Digest — Thursday, March 26, 2026

🇸🇦 Saudi Cyber Daily Digest

All security vulnerabilities, threats, and news aggregated today from trusted sources — continuously updated

Thursday, March 26, 2026 Today
84 CVEs
42 Threats
1 News
3 Critical
🛡 Security Vulnerabilities (CVE)
84 vulnerabilities
CVE-2026-33670
SiYuan Directory Traversal Vulnerability in File API (CVE-2024)
03:24 KSA
CRITICAL CVSS 9.8 CWE-22
SiYuan is a personal knowledge management system. Prior to version 3.6.2, the /api/file/readDir interface was used to traverse and retrieve the file names of all documents under a notebook. Version 3.6.2 patches the issue.
CVE-2026-33669
SiYuan Unauthorized Document Access via API Enumeration
03:24 KSA
CRITICAL CVSS 9.8 CWE-125
SiYuan is a personal knowledge management system. Prior to version 3.6.2, document IDs were retrieved via the /api/file/readDir interface, and then the /api/block/getChildBlocks interface was used to view the content of all documents. Version 3.6.2 patches the issue.
CVE-2026-33152
Tandoor Recipes BasicAuthentication Brute Force via Unrated API Endpoints
03:24 KSA
CRITICAL CVSS 9.1 CWE-307
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, Tandoor Recipes configures Django REST Framework with BasicAuthentication as one of the default authentication backends. The AllAuth rate limiting conf…
CVE-2026-4903
A flaw has been found in Tenda AC5 15.03.06.47. This vulnerability affects the function formQuickIndex of the file /gofo
03:24 KSA
HIGH CVSS 8.8 CWE-119
A flaw has been found in Tenda AC5 15.03.06.47. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. This manipulation of the argument PPPOEPassword causes stack-based buffer overflow. The attack may be initi…
CVE-2025-15101
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in the Web management interface of certain ASUS ro
03:24 KSA
HIGH CVSS 8.8 CWE-78
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in the Web management interface of certain ASUS router models. This vulnerability potentially allows actions to be performed with the existing privileges of an authenticated user on the affected device, includi…
CVE-2026-2931
The Amelia Booking plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and includ
03:24 KSA
HIGH CVSS 8.8 CWE-269
The Amelia Booking plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 9.1.2. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes i…
CVE-2026-33413
etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.42, 3.5.28, and 3.6.9,
03:24 KSA
HIGH CVSS 8.8 CWE-862
etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.42, 3.5.28, and 3.6.9, unauthorized users may bypass authentication or authorization checks and call certain etcd functions in clusters that expose the gRPC API to untrusted or parti…
CVE-2026-33622
PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab `v0.8.3` throug
03:24 KSA
HIGH CVSS 8.8 CWE-94
PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab `v0.8.3` through `v0.8.5` allow arbitrary JavaScript execution through `POST /wait` and `POST /tabs/{id}/wait` when the request uses `fn` mode, even if `security.allowEvaluate…
CVE-2026-4840
A security flaw has been discovered in Netcore Power 15AX up to 3.0.0.6938. Affected by this issue is the function setTo
03:24 KSA
HIGH CVSS 8.8 CWE-77
A security flaw has been discovered in Netcore Power 15AX up to 3.0.0.6938. Affected by this issue is the function setTools of the file /bin/netis.cgi of the component Diagnostic Tool Interface. Performing a manipulation of the argument IpAddr results in os command injection. Rem…
CVE-2026-4861
A weakness has been identified in Wavlink WL-NU516U1 260227. This vulnerability affects the function ftext of the file /
03:24 KSA
HIGH CVSS 8.8 CWE-119
A weakness has been identified in Wavlink WL-NU516U1 260227. This vulnerability affects the function ftext of the file /cgi-bin/nas.cgi. This manipulation of the argument Content-Length causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been…
CVE-2026-4862
A security vulnerability has been detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This issue affects the functio
03:24 KSA
HIGH CVSS 8.8 CWE-119
A security vulnerability has been detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This issue affects the function strcpy of the file /goform/formConfigDnsFilterGlobal of the component Parameter Handler. Such manipulation of the argument GroupName leads to buffer overflow.…
CVE-2026-4902
A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function fromAddressNat of the file /goform/addr
03:24 KSA
HIGH CVSS 8.8 CWE-119
A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely.…
CVE-2026-33661
Pay is an open-source payment SDK extension package for various Chinese payment services. Prior to version 3.7.20, the `
03:24 KSA
HIGH CVSS 8.6 CWE-290
Pay is an open-source payment SDK extension package for various Chinese payment services. Prior to version 3.7.20, the `verify_wechat_sign()` function in `src/Functions.php` unconditionally skips all signature verification when the PSR-7 request reports `localhost` as the host. A…
CVE-2026-32857
Firecrawl version 2.8.0 and prior contain a server-side request forgery (SSRF) protection bypass vulnerability in the Pl
03:24 KSA
HIGH CVSS 8.6 CWE-918
Firecrawl version 2.8.0 and prior contain a server-side request forgery (SSRF) protection bypass vulnerability in the Playwright scraping service where network policy validation is applied only to the initial user-supplied URL and not to subsequent redirect destinations. Attacker…
CVE-2018-25212
Boxoft wav-wma Converter 1.0 contains a local buffer overflow vulnerability in structured exception handling that allows
03:24 KSA
HIGH CVSS 8.4 CWE-787
Boxoft wav-wma Converter 1.0 contains a local buffer overflow vulnerability in structured exception handling that allows attackers to execute arbitrary code by crafting malicious WAV files. Attackers can create a specially crafted WAV file with excessive data and ROP gadgets to o…
CVE-2018-25213
Nsauditor 3.0.28.0 contains a structured exception handling buffer overflow vulnerability that allows local attackers to
03:24 KSA
HIGH CVSS 8.4 CWE-787
Nsauditor 3.0.28.0 contains a structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying malicious input to the DNS Lookup tool. Attackers can craft a payload with SEH chain overwrite and inject shellcode through…
CVE-2018-25217
PDF Explorer 1.5.66.2 contains a structured exception handler (SEH) overflow vulnerability that allows local attackers t
03:24 KSA
HIGH CVSS 8.4 CWE-787
PDF Explorer 1.5.66.2 contains a structured exception handler (SEH) overflow vulnerability that allows local attackers to execute arbitrary code by overwriting SEH records with malicious data. Attackers can craft a payload with buffer overflow, NSEH jump, and ROP gadget chains th…
CVE-2018-25218
PassFab RAR Password Recovery 9.3.2 contains a structured exception handler (SEH) buffer overflow vulnerability that all
03:24 KSA
HIGH CVSS 8.4 CWE-787
PassFab RAR Password Recovery 9.3.2 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious payload. Attackers can craft a payload with a buffer overflow, NSEH jump, and shellcode, …
CVE-2018-25219
PassFab Excel Password Recovery 8.3.1 contains a structured exception handling buffer overflow vulnerability that allows
03:24 KSA
HIGH CVSS 8.4 CWE-787
PassFab Excel Password Recovery 8.3.1 contains a structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious payload in the registration code field. Attackers can craft a buffer overflow payload with a…
CVE-2019-25650
River Past CamDo 3.7.6 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local att
03:24 KSA
HIGH CVSS 8.4 CWE-787
River Past CamDo 3.7.6 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious string in the Lame_enc.dll name field. Attackers can craft a payload with a 280-byte buffer, NSEH jump…
CVE-2026-23995
EVerest is an EV charging software stack. Prior to version 2026.02.0, stack-based buffer overflow in CAN interface initi
03:24 KSA
HIGH CVSS 8.4 CWE-121
EVerest is an EV charging software stack. Prior to version 2026.02.0, stack-based buffer overflow in CAN interface initialization: passing an interface name longer than IFNAMSIZ (16) to CAN open routines overflows `ifreq.ifr_name`, corrupting adjacent stack data and enabling pote…
CVE-2026-22593
EVerest is an EV charging software stack. Prior to version 2026.02.0, an off-by-one check in IsoMux certificate filename
03:24 KSA
HIGH CVSS 8.4 CWE-193
EVerest is an EV charging software stack. Prior to version 2026.02.0, an off-by-one check in IsoMux certificate filename handling causes a stack-based buffer overflow when a filename length equals `MAX_FILE_NAME_LENGTH` (100). A crafted filename in the certificate directory can o…
CVE-2025-55262
HCL Aftermarket DPC is affected by SQL Injection which allows attacker to exploit this vulnerability to retrieve sensiti
03:24 KSA
HIGH CVSS 8.3 CWE-798
HCL Aftermarket DPC is affected by SQL Injection which allows attacker to exploit this vulnerability to retrieve sensitive information from the database.
CVE-2018-25203
Online Store System CMS 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate
03:24 KSA
HIGH CVSS 8.2 CWE-89
Online Store System CMS 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the email parameter. Attackers can send POST requests to index.php with the action=clientaccess parameter using b…
CVE-2018-25202
SAT CFDI 3.3 contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting S
03:24 KSA
HIGH CVSS 8.2 CWE-89
SAT CFDI 3.3 contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the 'id' parameter in the signIn endpoint. Attackers can submit POST requests with boolean-based blind, stacked queries, or time-based blind SQL…
CVE-2018-25205
ASP.NET jVideo Kit 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to inject SQL comma
03:24 KSA
HIGH CVSS 8.2 CWE-89
ASP.NET jVideo Kit 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to inject SQL commands through the 'query' parameter in the search functionality. Attackers can submit malicious SQL payloads via GET or POST requests to the /search endpoint to e…
CVE-2018-25206
KomSeo Cart 1.3 contains an SQL injection vulnerability that allows attackers to inject SQL commands through the 'my_ite
03:24 KSA
HIGH CVSS 8.2 CWE-89
KomSeo Cart 1.3 contains an SQL injection vulnerability that allows attackers to inject SQL commands through the 'my_item_search' parameter in edit.php. Attackers can submit POST requests with malicious SQL payloads to extract sensitive database information using boolean-based bl…
CVE-2018-25208
qdPM 9.1 contains an SQL injection vulnerability that allows unauthenticated attackers to extract database information b
03:24 KSA
HIGH CVSS 8.2 CWE-89
qdPM 9.1 contains an SQL injection vulnerability that allows unauthenticated attackers to extract database information by injecting SQL code through filter_by parameters. Attackers can submit malicious POST requests to the timeReport endpoint with crafted filter_by[CommentCreated…
CVE-2018-25209
OpenBiz Cubi Lite 3.0.8 contains a SQL injection vulnerability in the login form that allows unauthenticated attackers t
03:24 KSA
HIGH CVSS 8.2 CWE-89
OpenBiz Cubi Lite 3.0.8 contains a SQL injection vulnerability in the login form that allows unauthenticated attackers to manipulate database queries through the username parameter. Attackers can submit POST requests to /bin/controller.php with malicious SQL code in the username …
CVE-2018-25210
WebOfisi E-Ticaret 4.0 contains an SQL injection vulnerability in the 'urun' GET parameter of the endpoint that allows u
11:08 KSA
HIGH CVSS 8.2 CWE-79
WebOfisi E-Ticaret 4.0 contains an SQL injection vulnerability in the 'urun' GET parameter of the endpoint that allows unauthenticated attackers to manipulate database queries. Attackers can inject SQL payloads through the 'urun' parameter to execute boolean-based blind, error-ba…
CVE-2025-41368
Problem in the Small HTTP Server v3.06.36 service. An authenticated path traversal vulnerability in '/' allows remote us
03:24 KSA
HIGH CVSS 8.1 CWE-22
Problem in the Small HTTP Server v3.06.36 service. An authenticated path traversal vulnerability in '/' allows remote users to bypass the intended restrictions of SecurityManager and display any file if they have the appropriate permissions outside the document root configured on…
CVE-2026-34055
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to versio
11:08 KSA
HIGH CVSS 8.1 CWE-639
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the legacy patient notes functions in `library/pnotes.inc.php` perform updates and deletes using `WHERE id = ?` without verifying that the note belon…
CVE-2025-12805
A flaw was found in Red Hat OpenShift AI (RHOAI) llama-stack-operator. This vulnerability allows unauthorized access to
03:24 KSA
HIGH CVSS 8.1 CWE-653
A flaw was found in Red Hat OpenShift AI (RHOAI) llama-stack-operator. This vulnerability allows unauthorized access to Llama Stack services deployed in other namespaces via direct network requests, because no NetworkPolicy restricts access to the llama-stack service endpoint. As…
CVE-2026-3108
Mattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11.3.x <= 11.3.1 fail to sanitize user-cont
03:24 KSA
HIGH CVSS 8.0 CWE-150
Mattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11.3.x <= 11.3.1 fail to sanitize user-controlled post content in the mmctl commands terminal output which allows attackers to manipulate administrator terminals via crafted messages containing ANSI and …
CVE-2018-25211
Allok Video Splitter 3.1.1217 contains a buffer overflow vulnerability that allows local attackers to cause a denial of
03:24 KSA
HIGH CVSS 7.8 CWE-787
Allok Video Splitter 3.1.1217 contains a buffer overflow vulnerability that allows local attackers to cause a denial of service or execute arbitrary code by supplying an oversized string in the License Name field. Attackers can craft a malicious payload exceeding 780 bytes, paste…
CVE-2026-33711
Incus is a system container and virtual machine manager. Incus provides an API to retrieve VM screenshots. That API reli
03:24 KSA
HIGH CVSS 7.8 CWE-61
Incus is a system container and virtual machine manager. Incus provides an API to retrieve VM screenshots. That API relies on the use of a temporary file for QEMU to write the screenshot to which is then picked up and sent to the user prior to deletion. As versions prior to 6.23.…
CVE-2025-41359
Vulnerability related to an unquoted service path in Small HTTP Server 3.06.36, specifically affecting the executable lo
03:24 KSA
HIGH CVSS 7.8 CWE-428
Vulnerability related to an unquoted service path in Small HTTP Server 3.06.36, specifically affecting the executable located at 'C:\Program Files (x86)\shttps_mg\http.exe service'. This misconfiguration allows a local attacker to place a malicious executable with the same name i…
CVE-2026-34056
OpenEMR is a free and open source electronic health records and medical practice management application. A Broken Access
11:08 KSA
HIGH CVSS 7.7 CWE-285
OpenEMR is a free and open source electronic health records and medical practice management application. A Broken Access Control vulnerability in OpenEMR up to and including version 8.0.0.3 allows low-privilege users to view and download Ensora eRx error logs without proper autho…
CVE-2026-33932
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to versio
11:08 KSA
HIGH CVSS 7.6 CWE-79
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a stored cross-site scripting vulnerability in the CCDA document preview allows an attacker who can upload or send a CCDA document to execute arbitra…
CVE-2026-27664
A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V26.10), SICORE Base syst
03:24 KSA
HIGH CVSS 7.5 CWE-787
A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V26.10), SICORE Base system (All versions < V26.10.0). The affected application contains an out-of-bounds write vulnerability while parsing specially crafted XML inputs. This could allo…
CVE-2026-3622
The vulnerability exists in the UPnP component of TL-WR841N v14, where improper input validation leads to an out-of-boun
03:24 KSA
HIGH CVSS 7.5 CWE-125
The vulnerability exists in the UPnP component of TL-WR841N v14, where improper input validation leads to an out-of-bounds read, potentially causing a crash of the UPnP service. Successful exploitation can cause the UPnP service to crash, resulting in a Denial-of-Service condi…
CVE-2023-7338
Ruckus Unleashed contains a remote code execution vulnerability in the web-based management interface that allows authen
03:24 KSA
HIGH CVSS 7.5 CWE-78
Ruckus Unleashed contains a remote code execution vulnerability in the web-based management interface that allows authenticated remote attackers to execute arbitrary code on the system when gateway mode is enabled. Attackers can exploit this vulnerability by sending specially cra…
CVE-2026-2511
The JS Help Desk – AI-Powered Support & Ticketing System plugin for WordPress is vulnerable to SQL Injection via the `mu
03:24 KSA
HIGH CVSS 7.5 CWE-89
The JS Help Desk – AI-Powered Support & Ticketing System plugin for WordPress is vulnerable to SQL Injection via the `multiformid` parameter in the `storeTickets()` function in all versions up to, and including, 3.0.4. This is due to the user-supplied `multiformid` value being pa…
CVE-2026-33526
Squid is a caching proxy for the Web. Prior to version 7.5, due to heap Use-After-Free, Squid is vulnerable to Denial of
03:24 KSA
HIGH CVSS 7.5 CWE-416
Squid is a caching proxy for the Web. Prior to version 7.5, due to heap Use-After-Free, Squid is vulnerable to Denial of Service when handling ICP traffic. This problem allows a remote attacker to perform a reliable and repeatable Denial of Service attack against the Squid servic…
CVE-2026-33182
Saloon is a PHP library that gives users tools to build API integrations and SDKs. Prior to version 4.0.0, when building
03:24 KSA
HIGH CVSS 7.5 CWE-522
Saloon is a PHP library that gives users tools to build API integrations and SDKs. Prior to version 4.0.0, when building the request URL, Saloon combined the connector's base URL with the request endpoint. If the endpoint was a valid absolute URL, the code used that URL as-is and…
CVE-2026-27828
EVerest is an EV charging software stack. Prior to version 2026.02.0, ISO15118_chargerImpl::handle_session_setup uses v2
03:24 KSA
HIGH CVSS 7.5 CWE-416
EVerest is an EV charging software stack. Prior to version 2026.02.0, ISO15118_chargerImpl::handle_session_setup uses v2g_ctx after it has been freed when ISO15118 initialization fails (e.g., no IPv6 link-local address). The EVSE process can be crashed remotely by an attacker wit…
CVE-2026-32846
OpenClaw through 2026.3.23 (fixed in commit 4797bbc) contains a path traversal vulnerability in media parsing that allow
03:24 KSA
HIGH CVSS 7.5 CWE-22
OpenClaw through 2026.3.23 (fixed in commit 4797bbc) contains a path traversal vulnerability in media parsing that allows attackers to read arbitrary files by bypassing path validation in the isLikelyLocalPath() and isValidMedia() functions. Attackers can exploit incomplete valid…
CVE-2026-32748
Squid is a caching proxy for the Web. Prior to version 7.5, due to premature release of resource during expected lifetim
03:24 KSA
HIGH CVSS 7.5 CWE-413
Squid is a caching proxy for the Web. Prior to version 7.5, due to premature release of resource during expected lifetime and heap Use-After-Free bugs, Squid is vulnerable to Denial of Service when handling ICP traffic. This problem allows a remote attacker to perform a reliable …
CVE-2026-26008
EVerest is an EV charging software stack. Versions prior to 2026.02.0 have an out-of-bounds access (std::vector) that le
03:24 KSA
HIGH CVSS 7.5 CWE-125
EVerest is an EV charging software stack. Versions prior to 2026.02.0 have an out-of-bounds access (std::vector) that leads to possible remote crash/memory corruption. This is because the CSMS sends UpdateAllowedEnergyTransferModes over the network. Version 2026.2.0 contains a pa…
CVE-2026-4850
A security flaw has been discovered in code-projects Simple Laundry System 1.0. Affected is an unknown function of the f
03:24 KSA
HIGH CVSS 7.3 CWE-74
A security flaw has been discovered in code-projects Simple Laundry System 1.0. Affected is an unknown function of the file /checkregisitem.php of the component Parameter Handler. The manipulation of the argument Long-arm-shirtVol results in sql injection. The attack may be launc…
CVE-2026-4839
A vulnerability has been found in SourceCodester Food Ordering System 1.0. This affects an unknown function of the file
03:24 KSA
HIGH CVSS 7.3 CWE-74
A vulnerability has been found in SourceCodester Food Ordering System 1.0. This affects an unknown function of the file /purchase.php of the component Parameter Handler. The manipulation of the argument custom leads to sql injection. The attack can be initiated remotely. The expl…
CVE-2026-4841
A weakness has been identified in code-projects Online Food Ordering System 1.0. This affects an unknown part of the fil
03:24 KSA
HIGH CVSS 7.3 CWE-74
A weakness has been identified in code-projects Online Food Ordering System 1.0. This affects an unknown part of the file form/cart.php of the component Shopping Cart Module. Executing a manipulation of the argument del can lead to sql injection. The attack can be executed remote…
CVE-2026-4860
A security flaw has been discovered in 648540858 wvp-GB28181-pro up to 2.7.4. This affects the function GenericFastJsonR
03:24 KSA
HIGH CVSS 7.3 CWE-20
A security flaw has been discovered in 648540858 wvp-GB28181-pro up to 2.7.4. This affects the function GenericFastJsonRedisSerializer of the file src/main/java/com/genersoft/iot/vmp/conf/redis/RedisTemplateConfig.java of the component API Endpoint. The manipulation results in de…
CVE-2025-55263
HCL Aftermarket DPC is affected by Hardcoded Sensitive Data which allows attacker to gain access to the source code or i
03:24 KSA
HIGH CVSS 7.3 CWE-798
HCL Aftermarket DPC is affected by Hardcoded Sensitive Data which allows attacker to gain access to the source code or if it is stored in insecure repositories, they can easily retrieve these hardcoded secrets.
CVE-2026-2231
The Fluent Booking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in all vers
03:24 KSA
HIGH CVSS 7.2 CWE-79
The Fluent Booking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in all versions up to, and including, 2.0.01 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arb…
CVE-2026-3328
The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to PHP Object Injection via deserialization of the '
03:24 KSA
HIGH CVSS 7.2 CWE-502
The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to PHP Object Injection via deserialization of the 'post_content' of admin_form posts in all versions up to, and including, 3.28.31. This is due to the use of WordPress's `maybe_unserialize()` function without cl…
CVE-2026-4329
The Blackhole for Bad Bots plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the User-Agent HTTP hea
03:24 KSA
HIGH CVSS 7.2 CWE-79
The Blackhole for Bad Bots plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the User-Agent HTTP header in all versions up to and including 3.8. This is due to insufficient input sanitization and output escaping. The plugin uses sanitize_text_field() when capt…
CVE-2026-33645
Fireshare facilitates self-hosted media and link sharing. In version 1.5.1, an authenticated path traversal vulnerabilit
03:24 KSA
HIGH CVSS 7.1 CWE-22
Fireshare facilitates self-hosted media and link sharing. In version 1.5.1, an authenticated path traversal vulnerability in Fireshare’s chunked upload endpoint allows an attacker to write arbitrary files outside the intended upload directory. The `checkSum` multipart field is us…
CVE-2018-25207
Online Quiz Maker 1.0 contains SQL injection vulnerabilities in the catid and usern parameters that allow authenticated
03:24 KSA
HIGH CVSS 7.1 CWE-89
Online Quiz Maker 1.0 contains SQL injection vulnerabilities in the catid and usern parameters that allow authenticated attackers to execute arbitrary SQL commands. Attackers can submit malicious POST requests to quiz-system.php or add-category.php with crafted SQL payloads in PO…
CVE-2026-3121
A flaw was found in Keycloak. An administrator with `manage-clients` permission can exploit a misconfiguration where thi
11:08 KSA
MEDIUM CVSS 6.5 CWE-266
A flaw was found in Keycloak. An administrator with `manage-clients` permission can exploit a misconfiguration where this permission is equivalent to `manage-permissions`. This allows the administrator to escalate privileges and gain control over roles, users, or other administra…
CVE-2026-27663
A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V26.10), RTUM85 RTU Base
11:08 KSA
MEDIUM CVSS 6.5 CWE-770
A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V26.10), RTUM85 RTU Base (All versions < V26.10). The affected application contains denial-of-service (DoS) vulnerability. The remote operation mode is susceptible to a resource exhaust…
CVE-2026-4278
The Simple Download Counter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'sdc_menu' shortco
11:08 KSA
MEDIUM CVSS 6.4 CWE-79
The Simple Download Counter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'sdc_menu' shortcode in all versions up to, and including, 2.3. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes, specific…
CVE-2026-4389
The DSGVO snippet for Leaflet Map and its Extensions plugin for WordPress is vulnerable to Stored Cross-Site Scripting v
11:08 KSA
MEDIUM CVSS 6.4 CWE-79
The DSGVO snippet for Leaflet Map and its Extensions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `leafext-cookie-time` and `leafext-delete-cookie` shortcodes in all versions up to, and including, 3.1. This is due to insufficient input sanitization an…
CVE-2026-4075
The BWL Advanced FAQ Manager Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'baf_sbox' s
11:08 KSA
MEDIUM CVSS 6.4 CWE-79
The BWL Advanced FAQ Manager Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'baf_sbox' shortcode in all versions up to and including 1.1.1. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes suc…
CVE-2026-4876
A vulnerability was identified in itsourcecode Free Hotel Reservation System 1.0. The impacted element is an unknown fun
11:08 KSA
MEDIUM CVSS 6.3 CWE-74
A vulnerability was identified in itsourcecode Free Hotel Reservation System 1.0. The impacted element is an unknown function of the file /admin/mod_amenities/index.php?view=editpic. Such manipulation of the argument ID leads to sql injection. The attack may be performed from rem…
CVE-2026-4836
A vulnerability was detected in code-projects Accounting System 1.0. The affected element is an unknown function of the
11:08 KSA
MEDIUM CVSS 6.3 CWE-74
A vulnerability was detected in code-projects Accounting System 1.0. The affected element is an unknown function of the file /my_account/delete.php. Performing a manipulation of the argument cos_id results in sql injection. It is possible to initiate the attack remotely. The expl…
CVE-2019-25648
MyVideoConverter Pro 3.14 contains a local buffer overflow vulnerability that allows attackers to crash the application
11:08 KSA
MEDIUM CVSS 6.2 CWE-787
MyVideoConverter Pro 3.14 contains a local buffer overflow vulnerability that allows attackers to crash the application by supplying an excessively long string to the registration code input field. Attackers can paste a malicious payload containing 10000 bytes into the 'Copy and …
CVE-2018-25216
AnyBurn 4.3 contains a local buffer overflow vulnerability that allows local attackers to crash the application by suppl
11:08 KSA
MEDIUM CVSS 6.2 CWE-787
AnyBurn 4.3 contains a local buffer overflow vulnerability that allows local attackers to crash the application by supplying an excessively long string in the image file name field. Attackers can paste a 10000-byte payload into the 'Image file name' parameter during the 'Copy dis…
CVE-2018-25214
MegaPing contains a local buffer overflow vulnerability that allows local attackers to crash the application by supplyin
11:08 KSA
MEDIUM CVSS 6.2 CWE-787
MegaPing contains a local buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized payload to the Destination Address List field in the Finger function. Attackers can paste a crafted buffer exceeding expected input limits into t…
CVE-2026-28297
SolarWinds Observability Self-Hosted was found to be affected by a stored cross-site scripting vulnerability, which when
11:08 KSA
MEDIUM CVSS 6.1 CWE-79
SolarWinds Observability Self-Hosted was found to be affected by a stored cross-site scripting vulnerability, which when exploited, can lead to unintended script execution.
CVE-2025-41026
Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerabilities allows an attacker execute JavaS
11:08 KSA
MEDIUM CVSS 6.1 CWE-79
Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerabilities allows an attacker execute JavaScript code in the victim's browser by sending a malicious URL in 'site' parameter in 'app_login.php'.
CVE-2026-4887
A flaw was found in GIMP. This issue is a heap buffer over-read in GIMP PCX file loader due to an off-by-one error. A re
11:08 KSA
MEDIUM CVSS 6.1 CWE-193
A flaw was found in GIMP. This issue is a heap buffer over-read in GIMP PCX file loader due to an off-by-one error. A remote attacker could exploit this by convincing a user to open a specially crafted PCX image. Successful exploitation could lead to out-of-bounds memory disclosu…
CVE-2025-41027
Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerabilities allows an attacker execute JavaS
11:08 KSA
MEDIUM CVSS 6.1 CWE-79
Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerabilities allows an attacker execute JavaScript code in the victim's browser by sending a malicious URL in 'site' parameter in 'app_recuperarclave.php'.
CVE-2026-1986
The FloristPress for Woo – Customize your eCommerce store for your Florist plugin for WordPress is vulnerable to Reflect
11:08 KSA
MEDIUM CVSS 6.1 CWE-79
The FloristPress for Woo – Customize your eCommerce store for your Florist plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'noresults' parameter in all versions up to, and including, 7.8.2 due to insufficient input sanitization and output escaping on …
CVE-2025-55266
HCL Aftermarket DPC is affected by Session Fixation which allows attacker to takeover the user's session and use it carr
11:08 KSA
MEDIUM CVSS 5.9 CWE-384
HCL Aftermarket DPC is affected by Session Fixation which allows attacker to takeover the user's session and use it carry out unauthorized transaction behalf of the user.
CVE-2026-28298
SolarWinds Observability Self-Hosted was found to be affected by a stored cross-site scripting vulnerability, which when
11:08 KSA
MEDIUM CVSS 5.9 CWE-79
SolarWinds Observability Self-Hosted was found to be affected by a stored cross-site scripting vulnerability, which when exploited, can lead to unintended script execution.
CVE-2026-4830
A vulnerability was identified in kalcaddle kodbox 1.64. This issue affects the function Add of the file app/controller/
11:08 KSA
MEDIUM CVSS 5.6 CWE-284
A vulnerability was identified in kalcaddle kodbox 1.64. This issue affects the function Add of the file app/controller/explorer/userShare.class.php of the component Public Share Handler. Such manipulation leads to unrestricted upload. The attack can be executed remotely. This at…
CVE-2019-25649
River Past Audio Converter 7.7.16 contains a local buffer overflow vulnerability in the activation code field that allow
11:08 KSA
MEDIUM CVSS 5.5 CWE-787
River Past Audio Converter 7.7.16 contains a local buffer overflow vulnerability in the activation code field that allows local attackers to crash the application by supplying an oversized input string. Attackers can paste a large payload of repeated characters into the 'E-Mail a…
CVE-2018-25215
Excel Password Recovery Professional 8.2.0.0 contains a local buffer overflow vulnerability that allows attackers to cau
11:08 KSA
MEDIUM CVSS 5.5 CWE-787
Excel Password Recovery Professional 8.2.0.0 contains a local buffer overflow vulnerability that allows attackers to cause a denial of service by supplying an excessively long string to the 'E-Mail and Registrations Code' field. Attackers can paste a crafted payload containing 50…
CVE-2026-4897
A flaw was found in polkit. A local user can exploit this by providing a specially crafted, excessively long input to th
11:08 KSA
MEDIUM CVSS 5.5 CWE-770
A flaw was found in polkit. A local user can exploit this by providing a specially crafted, excessively long input to the `polkit-agent-helper-1` setuid binary via standard input (stdin). This unbounded input can lead to an out-of-memory (OOM) condition, resulting in a Denial of …
CVE-2026-33915
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to versio
11:08 KSA
MEDIUM CVSS 5.4 CWE-862
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, five insurance company REST API routes are missing the `RestConfig::request_authorization_check()` call that every other data-modifying route in the …
CVE-2026-4335
The ShortPixel Image Optimizer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the attachment post
11:08 KSA
MEDIUM CVSS 5.4 CWE-79
The ShortPixel Image Optimizer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the attachment post_title in all versions up to, and including, 6.4.3. This is due to insufficient output escaping in the getEditorPopup() function and its corresponding media-pop…
CVE-2026-4900
A weakness has been identified in code-projects Online Food Ordering System 1.0. This affects an unknown part of the fil
02:36 KSA
MEDIUM CVSS 5.3 CWE-425
A weakness has been identified in code-projects Online Food Ordering System 1.0. This affects an unknown part of the file /dbfood/localhost.sql. This manipulation causes files or directories accessible. The attack can be initiated remotely. The exploit has been made available to …
CVE-2026-4281
The FormLift for Infusionsoft Web Forms plugin for WordPress is vulnerable to Missing Authorization in all versions up t
11:08 KSA
MEDIUM CVSS 5.3 CWE-862
The FormLift for Infusionsoft Web Forms plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 7.5.21. This is due to missing capability checks on the connect() and listen_for_tokens() methods of the FormLift_Infusionsoft_Manager class, …
⚠️ Threat Intelligence
42 threats
rss:The Hacker News
19:00 KSA
HIGH malware
<strong>WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites</strong> A new payment skimmer malware uses WebRTC data channels to receive payloads and exfiltrate stolen payment data, bypassing Content Security Policy (CSP) protections. This technique avoids tra…
rss:The Hacker News
19:00 KSA
CRITICAL apt
<strong>Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks</strong> Kaspersky discovered that the Coruna iOS exploit kit reuses kernel exploit code from the 2023 Operation Triangulation campaign, targeting two Apple iOS security vulnerabilities in new mass…
rss:The Hacker News
17:58 KSA
MEDIUM general
<strong>ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits &amp; 20 More Stories</strong> Weekly security bulletin covering multiple emerging threats including post-quantum cryptography developments, AI vulnerability hunting techniques, pirated software…
rss:The Hacker News
17:58 KSA
CRITICAL apt
<strong>China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks</strong> Chinese state-sponsored threat actor Red Menshen has conducted long-term espionage operations by embedding stealthy BPFDoor implants within telecommunications networks to spy on …
rss:Dark Reading
16:54 KSA
LOW general
<strong>At RSAC, the EU Leads While US Officials Are Sidelined</strong> At RSA Conference, EU officials are leading cybersecurity policy discussions while US government representatives are notably absent. This shift reflects changing dynamics in global cybersecurity governance a…
rss:Dark Reading
16:54 KSA
CRITICAL vulnerability
<strong>Critical Flaw in Langflow AI Platform Under Attack</strong> Threat actors exploited a code injection vulnerability in Langflow AI platform within hours of public disclosure. The rapid exploitation demonstrates organizations have minimal time to patch critical vulnerabili…
rss:Dark Reading
15:53 KSA
HIGH vulnerability
<strong>Automotive Cybersecurity Threats Grow in Era of Connected, Autonomous Vehicles</strong> Despite nearly a decade since the landmark 2015 Jeep hack demonstration, automotive cybersecurity remains a critical concern as vehicles become increasingly connected and autonomous. …
rss:Dark Reading
15:53 KSA
MEDIUM supply_chain
<strong>Is the FCC&#039;s Router Ban the Wrong Fix?</strong> The FCC has banned foreign-manufactured consumer routers by adding them to its prohibited communications devices list. Critics argue this regulatory approach may create supply chain complications and unintended securit…
rss:Dark Reading
15:53 KSA
CRITICAL apt
<strong>Coruna, DarkSword &amp;amp; Democratizing Nation-State Exploit Kits</strong> Nation-state malware toolkits are being commercialized through Dark Web sales and GitHub leaks, making advanced persistent threat capabilities accessible to less sophisticated actors. This democ…
rss:BleepingComputer
06:54 KSA
CRITICAL vulnerability
<strong>PolyShell attacks target 56% of all vulnerable Magento stores</strong> Active attacks exploiting the PolyShell vulnerability are targeting over half of all vulnerable Magento 2 and Adobe Commerce installations. E-commerce platforms using these systems face immediate risk…
rss:BleepingComputer
06:54 KSA
HIGH malware
<strong>Suspected RedLine infostealer malware admin extradited to US</strong> An Armenian national was extradited to the US for allegedly managing RedLine infostealer malware operations. RedLine is a widely-used credential and data theft malware that has compromised millions of …
rss:BleepingComputer
06:54 KSA
MEDIUM vulnerability
<strong>GitHub adds AI-powered bug detection to expand security coverage</strong> GitHub is integrating AI-powered vulnerability scanning into its Code Security tool to enhance detection capabilities beyond traditional static analysis. This expansion will cover more programming …
rss:BleepingComputer
05:48 KSA
MEDIUM data_breach
<strong>Russia arrests suspected owner of LeakBase cybercrime forum</strong> Russian authorities arrested a Taganrog resident suspected of operating LeakBase, a major cybercrime forum for trading stolen data and hacking tools. The takedown disrupts a significant underground mark…
rss:BleepingComputer
05:48 KSA
CRITICAL apt
<strong>Coruna iOS exploit framework linked to Triangulation attacks</strong> Coruna exploit kit represents an evolution of the Operation Triangulation framework that targeted iPhones through zero-click iMessage exploits in 2023. This sophisticated espionage tool demonstrates ad…
rss:BleepingComputer
05:48 KSA
HIGH data_breach
<strong>UK sanctions Xinbi marketplace linked to Asian scam centers</strong> UK sanctions Xinbi, a Chinese cryptocurrency marketplace selling stolen data and satellite equipment to Southeast Asian scam networks. The platform facilitates cybercrime operations by providing tools a…
rss:BleepingComputer
04:36 KSA
CRITICAL vulnerability
<strong>CISA: New Langflow flaw actively exploited to hijack AI workflows</strong> CISA warns of active exploitation of critical vulnerability CVE-2026-33017 in Langflow AI framework. Attackers are hijacking AI workflows, representing emerging threats to artificial intelligence …
rss:BleepingComputer
04:36 KSA
MEDIUM data_breach
<strong>Ajax football club hack exposed fan data, enabled ticket hijack</strong> AFC Ajax Amsterdam disclosed that hackers exploited IT system vulnerabilities to access data of hundreds of individuals. The breach enabled potential ticket hijacking, highlighting security risks in…
rss:SecurityWeek
03:33 KSA
MEDIUM general
<strong>Dell and HP Roll Out Quantum-Resistant Device Security and AI-Era Cyber Resilience</strong> Dell and HP have introduced quantum-resistant security features for PCs and printers to protect against future quantum computing threats. These capabilities aim to enhance device …
rss:SecurityWeek
03:33 KSA
HIGH malware
<strong>Alleged RedLine Malware Administrator Extradited to US</strong> Armenian national Hambardzum Minasyan has been extradited to the US for alleged involvement in developing and administering RedLine infostealer malware. This malware is widely used to steal credentials, fina…
rss:CISA Advisories
03:32 KSA
CRITICAL vulnerability
<strong>WAGO GmbH &amp; Co. KG Industrial Managed Switches</strong> WAGO industrial managed switches contain a critical vulnerability allowing unauthenticated remote attackers to exploit a hidden CLI function to escape restricted interfaces and fully compromise devices. All firm…
rss:SecurityWeek
02:28 KSA
HIGH vulnerability
<strong>Cisco Patches Multiple Vulnerabilities in IOS Software</strong> Cisco released patches for multiple high and medium-severity vulnerabilities in IOS Software that could enable denial-of-service attacks, secure boot bypass, information disclosure, and privilege escalation.…
rss:CISA Advisories
02:26 KSA
CRITICAL vulnerability
<strong>PTC Windchill Product Lifecycle Management</strong> Critical remote code execution vulnerability (CVE-2026-4681) affects multiple versions of PTC Windchill PDMLink (11.0_M030, 11.1_M020). Successful exploitation allows attackers to execute arbitrary code remotely, threat…
rss:Malwarebytes Lab
06:01 KSA
MEDIUM malware
<strong>Infiniti Stealer: a new macOS infostealer using ClickFix and Python/Nuitka</strong> A new macOS infostealer called Infiniti Stealer (formerly NukeChain) uses fake CAPTCHA pages to deceive users into executing malicious commands. The malware is built using Python/Nuitka a…
rss:CISA Advisories
06:01 KSA
MEDIUM vulnerability
<strong>OpenCode Systems OC Messaging and USSD Gateway</strong> A vulnerability in OpenCode Systems OC Messaging and USSD Gateway allows authenticated low-privileged users to access SMS messages outside their authorized tenant scope through crafted parameters. This represents an…
rss:The Hacker News
12:39 KSA
LOW general
<strong>Masters of Imitation: How Hackers and Art Forgers Perfect the Art of Deception</strong> The article draws parallels between art forgery techniques used by Elmyr de Hory in the 1960s and modern cybersecurity deception tactics. Lessons from detecting art forgeries can be a…
rss:The Hacker News
12:39 KSA
HIGH vulnerability
<strong>Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website</strong> A vulnerability in Anthropic's Claude Chrome Extension allowed malicious prompt injection attacks through simple website visits without user interaction. Any website could silently inj…
rss:The Hacker News
12:39 KSA
MEDIUM general
<strong>[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks</strong> Organizations often have security tools and monitoring in place but lack validation that their defenses would actually stop real attacks. The webinar addresses the gap between having s…
rss:SecurityWeek
12:39 KSA
CRITICAL apt
<strong>Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure</strong> State-sponsored Chinese threat actors were discovered deeply embedded in telecommunications backbone infrastructure. The attackers deployed kernel-level implants and passive backdoors designed fo…
rss:SecurityWeek
12:39 KSA
HIGH vulnerability
<strong>BIND Updates Patch High-Severity Vulnerabilities</strong> BIND DNS software released security updates to patch high-severity vulnerabilities. Specially crafted domain names could trigger out-of-memory conditions and memory leaks in BIND resolvers, potentially causing ser…
rss:SecurityWeek
12:39 KSA
HIGH data_breach
<strong>Hightower Holding Data Breach Impacts 130,000</strong> Hightower Holding suffered a data breach affecting 130,000 individuals. Hackers stole sensitive personal information including names, Social Security numbers, and driver's license numbers from the company's systems. …
rss:Recorded Future
12:39 KSA
HIGH apt
<strong>Cyber on the Geopolitical, Battlefield: Beyond the, “Big Fourˮ</strong> Analysis reveals expansion of offensive cyber operations beyond traditional Big Four nations, with regional conflicts driving emergence of new state-linked threat actors. This trend indicates increas…
rss:Recorded Future
12:39 KSA
MEDIUM general
<strong>Digital Threat Detection Tools &amp; Best Practices</strong> Article provides comprehensive guidance on digital threat detection tools and methodologies for identifying, analyzing, and mitigating cyber threats. Focuses on proactive security measures and best practices fo…
rss:Recorded Future
12:39 KSA
HIGH apt
<strong>BlueDelta’s Persistent Campaign Against UKR.NET</strong> Russian APT group BlueDelta conducts sophisticated credential-harvesting campaign targeting UKR.NET users through multi-stage phishing attacks. The threat actor demonstrates evolving tradecraft and persistent targe…
rss:Malwarebytes Lab
12:38 KSA
CRITICAL data_breach
<strong>Hackers claim to have accessed data tied to millions of crime tipsters</strong> A hacktivist group claims unauthorized access to sensitive information about crime tipsters and reported individuals spanning from 1987 to present. The breach exposes personally identifiable …
rss:Malwarebytes Lab
12:38 KSA
MEDIUM general
<strong>Landmark verdicts put Meta’s “addiction machine” platforms on trial</strong> Legal proceedings are increasingly scrutinizing the fundamental design and architecture of Meta's platforms rather than just content moderation. This shift represents a potential regulatory chan…
rss:Malwarebytes Lab
12:38 KSA
HIGH supply_chain
<strong>GlassWorm attack installs fake browser extension for surveillance</strong> GlassWorm malware conceals itself within developer tools to monitor user activity and exfiltrate sensitive data. The attack poses significant supply chain risks as a single infection can propagate…
rss:Dark Reading
12:38 KSA
CRITICAL apt
<strong>Intermediaries Driving Global Spyware Market Expansion</strong> Research reveals third-party resellers and brokers are circumventing transparency measures and government restrictions to expand the global spyware market. These intermediaries enable continued proliferation…
rss:Dark Reading
12:38 KSA
HIGH vulnerability
<strong>AI-Powered Dependency Decisions Introduce, Ignore Security Bugs</strong> AI models demonstrate significant reliability issues when recommending software dependencies, version upgrades, and security patches. These AI hallucinations and errors create substantial technical …
rss:Dark Reading
12:38 KSA
MEDIUM general
<strong>How Organizations Can Use Blunders to Level Up Their Security Programs</strong> Security industry experts identify recurring common security mistakes made by organizations. RSAC session provides practical strategies and frameworks for learning from these blunders to stre…
rss:BleepingComputer
12:37 KSA
HIGH phishing
<strong>TikTok for Business accounts targeted in new phishing campaign</strong> Cybercriminals are launching sophisticated phishing attacks against TikTok for Business accounts, employing anti-bot techniques to evade security detection systems. The campaign specifically targets …
rss:BleepingComputer
12:37 KSA
HIGH phishing
<strong>Inside a Modern Fraud Attack: From Bot Signups to Account Takeovers</strong> Advanced fraud operations utilize multi-stage attacks combining automated bots, proxy networks, and stolen credentials to compromise accounts from initial signup through complete takeover. Effec…
rss:BleepingComputer
12:37 KSA
LOW general
<strong>WhatsApp rolls out more AI features, iOS multi-account support</strong> WhatsApp introduces new AI-powered features including automated message replies and photo editing, multi-account support for iOS, and cross-platform chat migration. While enhancing user experience, t…
📰 Cybersecurity News
1 articles
USA vs Iran: The Invisible Cyber Warfare Behind the Geopolitical Tensions
21:29 KSA
Beyond conventional military posturing, the USA-Iran conflict has evolved into a sophisticated cyber warfare theater. This analysis explores the hidden digital battleground, examining state-sponsored …

This digest is updated automatically every day — Last updated: Thursday, March 26, 2026
CVE Archive · Threats · News

📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.