Skip to content
  • 0 Votes
    1 Posts
    0 Views
    offseq@infosec.exchangeO
    CRITICAL: CVE-2026-28408 in WeGIA (<3.6.5) lets unauthenticated attackers inject massive unauthorized data via adicionar_tipo_docs_atendido.php. Upgrade to 3.6.5 ASAP. Monitor & restrict access now. https://radar.offseq.com/threat/cve-2026-28408-cwe-862-missing-authorization-in-la-ddacfcff #OffSeq #Vulnerability #WeGIA #CVE202628408
  • 0 Votes
    1 Posts
    3 Views
    beyondmachines1@infosec.exchangeB
    Critical Root RCE Vulnerability Patched in Juniper PTX Series RoutersJuniper Networks patched a critical vulnerability (CVE-2026-21902) in Junos OS Evolved on PTX Series routers that allows unauthenticated attackers to gain root access via a framework that should have been internal but is publicly exposed and not authenticated.**If you are using Junos OS Evolved, this is important. Either immediately patch your PTX Series routers or disable the 'On-Box Anomaly Detection' service. Depending on configuration, review if you can isolate the network devices from the public internet to mitigate the impact.**#cybersecurity #infosec #advisory #vulnerabilityhttps://beyondmachines.net/event_details/critical-root-rce-vulnerability-patched-in-juniper-ptx-series-routers-i-9-2-e-h/gD2P6Ple2L
  • 0 Votes
    1 Posts
    5 Views
    beyondmachines1@infosec.exchangeB
    Critical Authentication and Session Flaws Discovered in Mobility46 EV Charging StationsMobility46's EV charging platform contains four vulnerabilities, including a critical authentication bypass (CVE-2026-27028), that allow attackers to impersonate charging stations and seize administrative control. The vendor has not responded with a patch.**If you operate Mobility46 charging stations, make sure that the systems are isolated from the internet and accessible only from trusted networks or VPN.**#cybersecurity #infosec #advisory #vulnerabilityhttps://beyondmachines.net/event_details/critical-authentication-and-session-flaws-discovered-in-mobility46-ev-charging-stations-h-c-g-0-l/gD2P6Ple2L
  • 0 Votes
    1 Posts
    3 Views
    soc_goulash@infosec.exchangeS
    Good morning, cyber pros! It's been a busy 24 hours with some critical zero-day warnings, new insights into nation-state influence operations, and a few notable breaches. Let's dive into the details:Recent Breaches: Medical, Retail, and Sports Hit - Medical device manufacturer UFP Technologies confirmed a cyber incident on 14 February, leading to data theft and potential destruction, though primary IT systems remain operational.- French football club Olympique de Marseille reported an "attempted cyberattack" after a threat actor leaked samples claiming 400,000 individuals' data and 2,050 Drupal CMS accounts were stolen.- European DIY retailer ManoMano disclosed a data breach affecting 38 million customers, stemming from a compromised third-party customer service provider, exposing names, emails, phone numbers, and communications. Bleeping Computer | https://www.bleepingcomputer.com/news/security/medical-device-maker-ufp-technologies-warns-of-data-stolen-in-cyberattack/ Bleeping Computer | https://www.bleepingcomputer.com/news/security/olympique-marseille-football-club-confirms-cyberattack-after-data-leak/ Bleeping Computer | https://www.bleepingcomputer.com/news/security/european-dyi-chain-manomano-data-breach-impacts-38-million-customers/Critical Zero-Days and RCE Flaws Under the Spotlight ️- Five Eyes agencies and CISA issued urgent warnings about two Cisco Catalyst SD-WAN zero-days (CVE-2026-20127, CVSS 10.0; CVE-2022-20775, CVSS 7.8) actively exploited since 2023 by a "highly sophisticated threat actor" UAT-8616 to gain root access on critical infrastructure.- Check Point discovered multiple RCE and API key theft vulnerabilities in Anthropic's Claude Code, stemming from malicious configuration files in repositories, highlighting new supply chain risks in AI-driven development.- A critical RCE flaw (CVE-2026-21902, CVSS 10.0) in Juniper Networks PTX Series routers allows unauthenticated root code execution due to an exposed internal service; immediate patching or access restriction is advised.- Trend Micro patched two critical RCE path traversal flaws (CVE-2025-71210, CVE-2025-71211) in Apex One management console, allowing unprivileged code execution if the console is externally exposed.- Previously harmless Google API keys, when exposed client-side, can now authenticate to Gemini AI, potentially allowing attackers to access private data and incur significant usage charges.🤫 CyberScoop | https://cyberscoop.com/cisco-zero-days-cisa-emergency-directive-five-eyes/ The Hacker News | https://thehackernews.com/2026/02/cisco-sd-wan-zero-day-cve-2026-20127.html The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/26/five_eyes_cisco_sdwan/ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/26/clade_code_cves/ Bleeping Computer | https://www.bleepingcomputer.com/news/security/critical-juniper-networks-ptx-flaw-allows-full-router-takeover/ Bleeping Computer | https://www.bleepingcomputer.com/news/security/trend-micro-warns-of-critical-apex-one-rce-vulnerabilities/ Bleeping Computer | https://www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/Evolving Threat Actor TTPs: AI, Supply Chain, and Social Engineering ️- A coordinated campaign is targeting software developers with fake Next.js job interview repositories, using multiple execution triggers (VS Code, npm run dev, backend startup) to deliver in-memory JavaScript backdoors for RCE and data exfiltration.- OpenAI reported nation-state actors, including a CCP-linked individual and a Russian group ("Operation No Bell"), are using ChatGPT for politically motivated influence operations, from drafting smear campaigns to generating geopolitical articles.- A malicious NuGet package, StripeApi.Net, was discovered typosquatting the legitimate Stripe.net library, designed to steal Stripe API tokens from unsuspecting developers while maintaining application functionality.- The cybercrime group Scattered Lapsus$ Hunters (SLSH) is actively recruiting women for vishing calls to IT helpdesks, aiming to enhance social engineering effectiveness by leveraging different voice profiles.- Google disrupted a China-linked cyberespionage campaign (UNC2814) active since 2017, targeting telcos and governments in 42 countries, using a new Gridtide backdoor and abusing Google Sheets for C2 communications. Bleeping Computer | https://www.bleepingcomputer.com/news/security/fake-nextjs-job-interview-tests-backdoor-developers-devices/ The Hacker News | https://thehackernews.com/2026/02/fake-nextjs-repos-target-developers.html️ Dark Reading | https://www.darkreading.com/cyberattacks-data-breaches/chinese-police-chatgpt-smear-japan-pm-takaichi The Hacker News | https://thehackernews.com/2026/02/malicious-stripeapi-nuget-package.html The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/26/scattered_lapsus_hunters_female_recruits/️ The Record | https://therecord.media/google-disrupts-china-linked-cyberespionage-campaign-spanning-dozens-of-countriesRansomware Trends and AI's Double-Edged Sword - Despite a 50% surge in ransomware attacks, the payment rate dropped to a record low of 28% in 2025, though the median ransom paid significantly increased to $59,556, indicating a shift in victim behaviour and attacker tactics.- Veracode's report highlights a growing "security debt," with 82% of companies having unresolved vulnerabilities for over a year, suggesting that the rapid pace of AI-driven development is creating more flaws than can be fixed, making comprehensive security "unattainable."- The UK government has implemented a new Vulnerability Monitoring Service, significantly reducing the median fix time for critical public sector vulnerabilities from 50 to 8 days, addressing long-standing issues with digital defences. Bleeping Computer | https://www.bleepingcomputer.com/news/security/ransomware-payment-rate-drops-to-record-low-despite-attack-surge/ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/26/veracode_security_ai/️ The Record | https://therecord.media/united-kingdom-vulnerability-scanning-cyberFTC Clarifies COPPA for Age Verification - The Federal Trade Commission (FTC) issued a policy statement clarifying that it will not enforce COPPA against companies using age verification technologies, provided strict conditions are met regarding data use, retention, notice, and security.- This aims to encourage the adoption of age verification tools without fear of COPPA violations, with the FTC planning a broader review of the COPPA Rule to address this area.️ The Record | https://therecord.media/ftc-says-it-wont-enforce-coppa-age-verification#CyberSecurity #ThreatIntelligence #ZeroDay #RCE #Vulnerability #APT #NationState #SupplyChainAttack #SocialEngineering #AI #Ransomware #DataBreach #DataPrivacy #InfoSec #CyberAttack #IncidentResponse
  • 0 Votes
    1 Posts
    0 Views
    hackerworkspace@infosec.exchangeH
    I Built a Python Packet Sniffer… This Is What Hackers See on Public WiFi https://www.youtube.com/watch?v=YW5e8qAYIgU#cybersecurity #vulnerability #penetrationtesting
  • 0 Votes
    1 Posts
    3 Views
    hackerworkspace@infosec.exchangeH
    WITH THIS $10 Aliexpress Module You can do ANYTHING?https://www.youtube.com/watch?v=krHt08T_aqg#vulnerability #exploit #iotsecurity
  • 0 Votes
    1 Posts
    0 Views
    aakl@infosec.exchangeA
    I sort of expected to see Cisco here. Instead, a Google vulnerability was added yesterday."This flaw enabled a cross-tenant Full Account Takeover by exfiltrating the managed End User Credentials (EUC) of any GCP user with minimal interaction."Tenable: Google Cloud Platform (GCP) Vertex AI Workbench Cross-Tenant Full Account Takeover with Managed End User Credentials https://www.tenable.com/security/research/tra-2026-10 @tenable #infosec #Google #vulnerability
  • 🚨 EUVD-2026-8858

    Uncategorized cybersecurity infosec euvd cve vulnerability
    1
    0 Votes
    1 Posts
    1 Views
    euvd_bot@mastodon.socialE
    EUVD-2026-8858 Score: 2.3/10 (CVSS v3.1) Product: VLC for Android Vendor: VideoLAN Updated: 2026-02-26 VideoLAN VLC for Android prior to version 3.7.0 contains a path traversal vulnerability in the Remote Access Server routing for the authenticated endpoint GET /download. The file query parameter is concatenated into a filesystem path under the configu... https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-8858#cybersecurity #infosec #euvd #cve #vulnerability
  • Updated advisory, low severity.

    Uncategorized infosec vulnerability broadcom
    1
    0 Votes
    1 Posts
    1 Views
    aakl@infosec.exchangeA
    Updated advisory, low severity. Log in for details.Broadcom Gen 8.6 Vulnerabilities in OpenSSL, cURL, Jetty https://support.broadcom.com/web/ecx/security-advisory #infosec #vulnerability #Broadcom
  • 0 Votes
    1 Posts
    0 Views
    aakl@infosec.exchangeA
    Security Week: Cisco Patches Catalyst SD-WAN Zero-Day Exploited by Highly Sophisticated Hackers https://www.securityweek.com/cisco-patches-catalyst-sd-wan-zero-day-exploited-by-highly-sophisticated-hackers/ @SecurityWeek #Cisco #vulnerability #infosec
  • 0 Votes
    1 Posts
    0 Views
    aakl@infosec.exchangeA
    CISA has now added two Cisco vulnerabilities to the KEV catalogue.- CVE-2026-20127: Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-20127- CVE-2022-20775: Cisco SD-WAN Path Traversal Vulnerability https://www.cve.org/CVERecord?id=CVE-2022-20775- CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisco SD-WAN Systems https://www.cisa.gov/news-events/alerts/2026/02/25/cisa-and-partners-release-guidance-ongoing-global-exploitation-cisco-sd-wan-systems #CISA #Cisco #infosec #vulnerability
  • 0 Votes
    1 Posts
    0 Views
    hackerworkspace@infosec.exchangeH
    How to Bypass UAC on Windows 10/11 in 2026 (Windows Defender bypass)https://www.youtube.com/watch?v=IDxoGEWnzIw#cybersecurity #vulnerability #exploit
  • 0 Votes
    1 Posts
    1 Views
    aakl@infosec.exchangeA
    Broadcom has an updated advisory. You'll need to log in for details.IDMS Server - OpenSSL Vulnerability CVE-2025-15467, low severity https://support.broadcom.com/web/ecx/security-advisory #Broadcom Cisco, oh, my!Two critical and four high-severity vulnerabilities. This is a very long list: https://sec.cloudapps.cisco.com/security/center/publicationListing.x @TalosSecurity #infosec #vulnerability #Cisco
  • 0 Votes
    1 Posts
    0 Views
    offseq@infosec.exchangeO
    CRITICAL SQL Injection (CVE-2026-21410) affects all InSAT MasterSCADA BUK-TS versions. Unauthenticated RCE possible — industrial ops at risk. Restrict access & monitor until patched. Details: https://radar.offseq.com/threat/cve-2026-21410-cwe-89-in-insat-masterscada-buk-ts-10cd43d6 #OffSeq #ICS #SCADA #Vulnerability