Cybersecurity Newsfeed - 08/04/26
Daily cybersecurity news covering vulnerabilities, adversaries, trends, breaches, and other notable security developments.
Cybersecurity Newsfeed
📅 08/04/26
🛡️ Vulnerabilities
Max-Severity Flowise RCE (CVE-2025-59528): A critical remote code execution vulnerability in Flowise, a popular open-source UI for LLM apps, is being actively exploited. The flaw allows unauthenticated attackers to execute commands on the underlying server via specific API requests, risking data exfiltration and complete system compromise. More info More info GPUBreach Cross-Component Attack: Researchers discovered a new class of attack enabling full CPU compromise through integrated graphics processors. By exploiting shared memory spaces, attackers can bypass hardware security boundaries via malicious web content. More info
Ninja Forms Critical Flaw: A vulnerability in the Ninja Forms WordPress plugin is being targeted by automated scans. The flaw allows unauthenticated arbitrary code execution or administrative access, threatening millions of sites. More info
AWS Sandbox Network Isolation Bypass: Unit 42 identified a flaw in the AWS Sandbox isolation layer that allowed unauthorized data egress or lateral movement. AWS has addressed the oversight in network protocol handling. More info
- GrafanaGhost AI Injection: A new vulnerability enables data theft through manipulation of data inputs processed by AI-driven analytics tools within Grafana, forcing the system to leak sensitive information. More info
🎯 Adversaries
- Monero Mining Targets Non-Profits: Cybercriminals are using trojanized development tools and social engineering to hijack the system resources of non-profit developers for cryptocurrency mining. More info
📈 Trends
💥 Breaches & Leaks
- Snowflake Customers Hit via SaaS Integrator: A breach at a major SaaS integrator led to compromised credentials, allowing attackers to exfiltrate massive datasets from numerous Snowflake environments. Many affected accounts lacked multi-factor authentication. More info
🛡️ Law Enforcement Actions
- Authorities Disrupt Microsoft 365 Phishing Ring: International law enforcement successfully dismantled a DNS hijacking operation that redirected users to fraudulent Microsoft 365 login pages by compromising SOHO routers. More info
