Post

Cybersecurity Newsfeed - 03/04/26

Daily cybersecurity news covering vulnerabilities, adversaries, trends, breaches, and other notable security developments.

Cybersecurity Newsfeed - 03/04/26

Cybersecurity Newsfeed

📅 03/04/26

🛡️ Vulnerabilities

  • Active Exploitation of CVE-2025-55182: Attackers are weaponizing a critical vulnerability in widely used web frameworks to achieve remote code execution. The flaw allows unauthorized users to bypass authentication and execute commands with administrative privileges. More info

  • CISA Adds New Flaw to KEV Catalog: CISA has updated its Known Exploited Vulnerabilities catalog with a new flaw being leveraged in the wild. Federal agencies are mandated to remediate this vulnerability within a set deadline to secure their networks. More info

  • Progress ShareFile Pre-Auth RCE: Researchers discovered that multiple vulnerabilities in Progress ShareFile can be chained to achieve pre-authentication remote code execution, potentially leading to full system compromise. More info

  • 14,000 F5 BIG-IP Instances Exposed: Despite available patches, thousands of F5 BIG-IP APM instances remain vulnerable to a critical RCE flaw that allows unauthenticated attackers to execute arbitrary commands via the management interface. More info

  • Fourth Google Chrome Zero-Day of 2026: Google released an emergency update for a high-severity flaw in the V8 JavaScript engine (exploited in the wild) that allows arbitrary code execution within the browser sandbox. More info

  • Windows WhatsApp Attachment Backdoor: A critical flaw in how Windows handles WhatsApp attachments could allow attackers to establish backdoors on PCs through specifically crafted media files. More info

  • Apple Expands iOS 18 Security Patches: Critical updates have been extended to more iPhone models to block “Darksword” attacks that bypass standard protections. More info

🎯 Adversaries

  • ShinyHunters Claims Cisco Breach: The notorious group claims to have leaked internal Cisco records, including employee credentials and project documentation, posing a risk to the firm’s operational security. More info

  • Akira Ransomware Accelerates Attack Chain: The group has optimized its tactics to move from initial access to full data encryption in just a few hours by leveraging compromised VPN credentials and unpatched flaws. More info

  • UAC-0255 Impersonates CERT-UA: Threat actors are using phishing emails disguised as urgent security updates from the Ukrainian CERT to distribute “AgeWheeze” malware for data exfiltration. More info

  • Qilin Ransomware’s EDR Killer: A new variant of Qilin ransomware specifically targets and disables Endpoint Detection and Response (EDR) software to operate without interference. More info

  • Italian Spyware Vendor Fakes WhatsApp: A targeted surveillance campaign in the Mediterranean utilized a fake WhatsApp application to monitor calls and messages of approximately 200 users. More info

  • CrystalRAT Hybrid Malware: This new threat combines traditional Remote Access Trojan features with “prankware” capabilities to manipulate desktop environments and cause distress. More info

  • Yurei Ransomware’s “Stranger Things” Theme: A new strain of ransomware uses pop-culture references while employing sophisticated evasion techniques to terminate security processes. More info

  • Trojanized Claude Code on GitHub: Attackers are distributing a malicious version of Anthropic’s Claude Code tool embedded with infostealers, targeting developers’ credentials and session tokens. More infoAdditional info
  • Google Workspace Continuous Security: Google Cloud has introduced a dynamic, AI-driven security approach for Workspace to move away from static configurations and provide real-time threat detection. More info

  • Cookie-Controlled PHP Webshells: Microsoft detailed new tradecraft where attackers use HTTP cookies to trigger execution of webshells in Linux environments, making them harder to detect than traditional scripts. More info

  • The Rise of Storm and Venom Infostealers: New Malware-as-a-Service (MaaS) platforms like Storm and Venom Stealer are automating the theft of browser credentials and crypto wallets at scale. Storm InfoVenom Info
  • UAT-10608 Credential Harvesting: A large-scale automated operation is using a distributed bot network to perform credential stuffing and brute-force attacks across various industries. More info

  • Defending Encryption in the Post-Quantum Era: The security community is shifting focus toward post-quantum cryptography (PQC) to protect against future quantum-enabled decryption of RSA and ECC. More info

💥 Breaches & Leaks

  • Hasbro Discloses Cybersecurity Incident: The toy giant reported an attack that disrupted operations, necessitating system isolation and the involvement of forensic experts to investigate potential data exposure. More info

  • Drift DeFi Protocol Loses $280M: Hackers seized control of the platform’s Security Council governance powers, allowing them to bypass protocols and authorize massive unauthorized withdrawals. More info

📚 Others

  • Undocumented BitLocker FVE APIs: Research into Windows disk encryption revealed hidden functions that allow deeper interaction with the encryption engine, relevant for both forensics and potential exploitation. More info

  • Red Hat Launching ELS Premium: A new service provides security patches for legacy Linux distributions, targeting organizations unable to migrate immediately from aging systems. More info

  • FBI Warning on Chinese Mobile Apps: The Bureau issued an advisory regarding data security risks and excessive permissions in Chinese-developed apps that could facilitate unauthorized data collection. More info

  • Google Drive Ransomware Detection: Paid Google Drive users now have ransomware detection enabled by default, using machine learning to identify and block suspicious file modification patterns. More info


⬅ Back to Archive

This post is licensed under CC BY 4.0 by the author.