Cyber Security

Cyber Security
Cyber Security

CISA Adds TrueConf Vulnerability to KEV Catalog Following Active Exploitation

cisa-adds-trueconf-vulnerability-to-kev-catalog-following-active-exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has officially added a critical vulnerability affecting TrueConf software to its Known Exploited Vulnerabilities (KEV) catalog. Tracked as CVE-2026-3502, this security flaw is currently facing active exploitation in the wild. The discovery has prompted federal agencies and private organizations to take immediate defensive action to secure their networks. […]

New Progress ShareFile Bugs Let Attackers Take Over Servers Without Logging In

new-progress-sharefile-bugs-let-attackers-take-over-servers-without-logging-in

A dangerous attack chain in Progress ShareFile that can allow attackers to take over exposed on-premises servers without first logging in. The issues affect customer-managed ShareFile Storage Zones Controller 5.x deployments, and Progress says customers should upgrade to version 5.12.4 or move to any 6.x release, which is not impacted. According to Progress and WatchTower, […]

Hackers Weaponize Claude Code Leak to Spread Vidar and GhostSocks Malware

hackers-weaponize-claude-code-leak-to-spread-vidar-and-ghostsocks-malware

The cybersecurity community is on high alert following a massive source code leak from Anthropic. On March 31, 2026, the company accidentally exposed the complete source code for Claude Code, its flagship terminal-based coding assistant. The leak occurred due to a packaging error in a public npm package, which inadvertently included a JavaScript source map […]

Top Node.js Maintainers Targeted in Sophisticated Social Engineering Scheme

top-node.js-maintainers-targeted-in-sophisticated-social-engineering-scheme

A highly coordinated social engineering campaign is actively targeting top open-source developers in the Node.js and npm ecosystem. Following the recent compromise of the popular package Axios, which sees over 100 million weekly downloads, several high-impact software maintainers have reported similar attacks. Security researchers believe this is a strategic shift by advanced threat actors aiming […]

Top 10 Best User Access Management Tools in 2026

top-10-best-user-access-management-tools-in-2026

Best User Access Management Tools User Access Management tools centralize control over user permissions and access, providing a unified platform to enforce consistent security policies across diverse systems and applications. They enhance security by implementing role-based access controls, monitoring user activity, preventing unauthorized access, mitigating potential risks, and safeguarding sensitive information. These tools support compliance […]

14,000+ F5 BIG-IP APM Devices Exposed Online Amid Active RCE Vulnerability Exploits

14,000+-f5-big-ip-apm-devices-exposed-online-amid-active-rce-vulnerability-exploits

A critical security flaw in F5’s BIG-IP Access Policy Manager (APM) is currently under active exploitation, leaving thousands of enterprise networks at risk. The vulnerability, officially tracked as CVE-2025-53521, has sparked urgent warnings across the cybersecurity community after its impact was upgraded from a standard Denial-of-Service (DoS) to a severe Remote Code Execution (RCE) flaw. […]

Malicious Chrome Extension ChatGPT Ad Blocker Steals ChatGPT Conversations

malicious-chrome-extension-chatgpt-ad-blocker-steals-chatgpt-conversations

As OpenAI introduces advertisements to its free tier, cybercriminals are seizing the opportunity to trick users with fake utility tools. Security researchers have discovered a malicious Google Chrome extension named “ChatGPT Ad Blocker.” While it claims to hide unwanted ads, its true purpose is to steal private user conversations and send them to a hidden […]

Adobe Breach Threat Actor Allegedly Claims Leak of 13 Million Support Tickets and Employee Records

adobe-breach-threat-actor-allegedly-claims-leak-of-13-million-support-tickets-and-employee-records

A threat actor identified as “Mr. Raccoon” has allegedly breached Adobe, claiming to have exfiltrated a massive trove of sensitive data, including 13 million support tickets containing personal information, 15,000 employee records, all HackerOne bug bounty submissions, and a range of internal documents, according to a report published by International Cyber Digest. According to details […]

Cisco Smart Software Manager Vulnerability Let Attackers Execute Arbitrary Commands

cisco-smart-software-manager-vulnerability-let-attackers-execute-arbitrary-commands

Cisco has issued an urgent security warning regarding a critical vulnerability in its Smart Software Manager On-Prem (SSM On-Prem) platform. Enterprise organizations widely use this tool to manage their Cisco software licenses locally. Tracked as CVE-2026-20160, the flaw carries a near-perfect CVSS severity score of 9.8 out of 10. If exploited, it allows an unauthenticated, […]

Vim Modeline Bypass Vulnerability Let Attackers Execute Arbitrary OS Commands

vim-modeline-bypass-vulnerability-let-attackers-execute-arbitrary-os-commands

A newly discovered high-severity vulnerability in the popular Vim text editor exposes users to arbitrary command execution on the operating system. Tracked as CVE-2026-34982, the flaw relies on a modeline sandbox bypass that triggers when a victim opens a specially crafted file. Security researchers “dfwjj x” and Avishay Matayev identified a vulnerability chain that affects […]