Back to Feed

Tag

Zero-day

Zero-day exploits and active exploitation

50 items tagged #zero-day

Articles

APT-C-23 is back to targeting in Israel using Micropsia? 🤔 Found a possible interesting sample f...

APT-C-23 resurfaces targeting Israel with Micropsia malware.

‼️ M6Plus Proof of Concept (POC) CVE-2026-4583 (Missing Replay Protection) The M6PLUS Bluetooth...

M6PLUS Bluetooth protocol lacks replay protection; POC released for CVE-2026-4583.

CISA orders feds to patch exploited Ivanti EPMM flaw by Sunday

CISA orders U.S. federal agencies to patch exploited Ivanti EPMM flaw by Sunday.

13-year-old bug in ActiveMQ lets hackers remotely execute commands

13-year-old RCE vulnerability in Apache ActiveMQ Classic discovered via AI analysis.

CISA Adds One Known Exploited Vulnerability to Catalog

CISA adds CVE-2026-1340 Ivanti EPMM code injection to Known Exploited Vulnerabilities Catalog.

Hackers Targeting Ninja Forms Vulnerability That Exposes WordPress Sites to Takeover

Critical Ninja Forms File Uploads addon vulnerability enables unauthenticated remote code execution on 50,000 WordPress

Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

Anthropic's Claude Mythos AI model discovers thousands of zero-day vulnerabilities across major systems.

New ClickFix Attack Uses Node.js Malware via Tor to Steal Crypto

ClickFix campaign uses fake CAPTCHAs to deploy Node.js RAT malware via Tor to steal crypto.

Hackers exploit critical flaw in Ninja Forms WordPress plugin

Critical RCE flaw in Ninja Forms File Upload WordPress plugin exploited in active attacks.

Justice Department Conducts Court-Authorized Disruption of DNS Hijacking Network Controlled by a Russian Military Intelligence Unit

DOJ and FBI conduct court-authorized disruption of GRU-controlled DNS hijacking network using compromised TP-Link

‼️ CVE-2026-28286: ZimaOS Privilege Escalation Vulnerability PoC: https://t.co/9p04Qud3BT A pri...

CVE-2026-28286 privilege escalation in ZimaOS allows API restriction bypass and unauthorized write access.

Storm-1175 Deploys Medusa Ransomware at 'High Velocity'

Microsoft attributes Medusa ransomware deployments to Storm-1175 exploiting N-day and zero-day vulnerabilities.

‼️ CVE-2026-23398: Linux Kernel ICMP DoS Vulnerability PoC: https://t.co/qD3Vo8jHAF

CVE-2026-23398 Linux kernel ICMP DoS vulnerability disclosed with public PoC.

GrafanaGhost Vulnerability Allows Silent Data Theft via AI Injection

GrafanaGhost vulnerability in Grafana AI components enables silent data exfiltration via prompt injection.

Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins

Law enforcement disrupts FrostArmada, APT28 campaign hijacking routers to steal Microsoft 365 credentials.

Critical Flowise Vulnerability in Attacker Crosshairs

Critical Flowise RCE vulnerability CVE-2025-59528 exploited in the wild, affects 12,000+ instances.

Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access

Docker CVE-2026-34040 allows attackers to bypass authorization plugins and gain host access.

‘GrafanaGhost’ bypasses Grafana’s AI defenses without leaving a trace

GrafanaGhost exploits Grafana's AI defenses via prompt injection to exfiltrate sensitive data undetected.

Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems

Medusa ransomware group exploits zero-days and fresh vulnerabilities to breach 300+ organizations within days.

Inside an AI‑enabled device code phishing campaign

AI-driven device code phishing campaign scales account compromise using automation and dynamic token generation.

CISA orders feds to patch exploited Fortinet EMS flaw by Friday

CISA orders federal agencies to patch actively exploited Fortinet EMS vulnerability by Friday.

CISA Adds One Known Exploited Vulnerability to Catalog

CISA adds Fortinet FortiClient EMS improper access control flaw to KEV catalog.

Apple Breaks Precedent, Patches DarkSword for iOS 18

Apple releases security patch for DarkSword vulnerability affecting iOS 18.

Critical ShareFile Flaws Lead to Unauthenticated RCE

Two critical ShareFile flaws chain for unauthenticated RCE via authentication bypass and arbitrary file upload.

‼️ CVE-2026-5027: Langflow Path Traversal to Remote Code Execution PoC CVSS: 8.8 GitHub: https:...

CVE-2026-5027: Langflow path traversal vulnerability enables remote code execution.

‼️ CVE-2026-4698: JIT miscompilation in Firefox's JavaScript Engine CVSS: 8.8 Affected versions...

CVE-2026-4698: Critical JIT miscompilation flaw in Firefox JavaScript engine (CVSS 8.8)

‼️ CVE-2026-3775: DLL Hijacking in Foxit PDF Editor/Reader Update Service https://t.co/iBTYFe6nTU

CVE-2026-3775 DLL hijacking vulnerability discovered in Foxit PDF Editor/Reader update service.

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

Hackers exploit CVE-2025-55182 in Next.js to breach 766 hosts and steal credentials via NEXUS Listener.

‼️ A "Pegasus-Like" zero-click RAT spyware targeting Android and iOS is being sold on a popular c...

Pegasus-like zero-click RAT spyware being sold on cybercrime forum by xone9to1

Critical Vulnerability in Claude Code Emerges Days After Source Leak

Critical vulnerability discovered in Claude Code allows bypass of permission system via prompt injection.

Apple Rolls Out DarkSword Exploit Protection to More Devices

Apple rolls out iOS 18.7.7 patches to protect 200M devices against DarkSword exploit kit.

New Progress ShareFile flaws can be chained in pre-auth RCE attacks

Two chained Progress ShareFile flaws enable unauthenticated RCE and file exfiltration.

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

ThreatsDay Bulletin covers pre-auth RCE chains, Android rootkits, CloudTrail evasion, and 10+ security threats.

CISA Adds One Known Exploited Vulnerability to Catalog

CISA adds CVE-2026-3502 TrueConf Client code integrity vulnerability to KEV Catalog.

Hitachi Energy Ellipse

Hitachi Energy Ellipse RCE vulnerability via Jasper Report deserialization flaw affects critical manufacturing systems

Critical Cisco IMC auth bypass gives attackers Admin access

Cisco patches critical IMC authentication bypass enabling unauthenticated Admin access.

Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit

Apple expands iOS 18.7.7 patch to block DarkSword exploit kit targeting older iPhones.

‼️🇺🇸 Threat actor "FulcrumSec" claims breach of Unique Computing LLC / https://t.co/Rs6arKdl2E...

Threat actor FulcrumSec claims breach of Unique Computing LLC via unpatched CVE-2025-55182.

CISA Adds One Known Exploited Vulnerability to Catalog

CISA adds CVE-2026-5281 Google Dawn use-after-free vulnerability to Known Exploited Vulnerabilities Catalog.

Axios NPM Package Breached in North Korean Supply Chain Attack

North Korean hackers compromised Axios NPM package, distributing backdoored versions to millions.

Claude AI finds Vim, Emacs RCE bugs that trigger on file open

Claude AI discovers RCE vulnerabilities in Vim and GNU Emacs triggered by file open.

How SentinelOne’s AI-powered EDR autonomously discovered and stopped Anthropic’s Claude from exec...

SentinelOne's AI-EDR detected trojanized LiteLLM targeting Anthropic's Claude in supply chain attack.

CrewAI Vulnerabilities Expose Devices to Hacking

Four chained vulnerabilities in CrewAI allow sandbox escape and arbitrary code execution via prompt injection.

Anritsu Remote Spectrum Monitor

Anritsu Remote Spectrum Monitor critical authentication bypass affecting all versions worldwide.

Exploitation of Critical Fortinet FortiClient EMS Flaw Begins

Fortinet FortiClient EMS SQL injection vulnerability CVE-2026-21643 actively exploited in the wild.

CISA orders feds to patch actively exploited Citrix flaw by Thursday

CISA orders federal agencies to patch actively exploited Citrix NetScaler flaw CVE-2026-3055 by Thursday.

OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability

OpenAI patches ChatGPT data exfiltration and Codex GitHub token theft vulnerabilities.

15-Year-Old strongSwan Flaw Lets Attackers Crash VPNs via Integer Underflow

15-year-old strongSwan integer underflow bug lets attackers crash VPNs via EAP-TTLS.

Storm Brews Over Critical, No-Click Telegram Flaw

Critical 9.8 CVSS Telegram vulnerability allegedly exploitable via corrupted sticker; vendor denies existence.

CISA Adds One Known Exploited Vulnerability to Catalog

CISA adds CVE-2026-3055 Citrix NetScaler out-of-bounds read to known exploited vulnerabilities catalog.