cve
CVE-2026-39987
Unauthenticated RCE in Marimo /terminal/ws WebSocket endpoint; CVSS 9.3
malware
Remote Access Trojan (RAT)
Deployed via fake security update messages for remote system control
cve
CVE-2025-55182
React2Shell remote code execution vulnerability exploited in active attacks
malware
W3LL phishing kit
Phishing-as-a-service toolkit sold for ~$500 used to create fake login pages and steal credentials
cve
CVE-2026-34621
Critical Adobe Reader/Acrobat zero-day, CVSS 9.6, arbitrary code execution, exploited in wild since November 2025
hash_sha256
3d91f442ddc055e19e3710482e1605836c799249dacd43d99843257a3affd2d2
Portable HWMonitor Installer (v1.63) — trojanized malware sample
hash_sha256
a27df06c7167eced1ddaeb8adccaa5f60500f52bc7030389eed2a0903cdf8286
Fake CRYPTBASE.dll — malicious Windows library component
url
https://t.co/YGp90bQ0ck
Direct link to trojanized HWMonitor sample (Twitter shortened URL)
malware
EngageLab EngageSDK (vulnerable versions before 5.2.1)
Third-party Android SDK with intent redirection vulnerability affecting crypto wallets
domain
wpjs1.com
Command-and-control (C2) domain used by Smart Slider 3 Pro backdoor to exfiltrate site credentials, configuration, and persistence method details.
malware
Smart Slider 3 Pro v3.5.1.35 (backdoored)
Trojaned plugin version distributed via compromised update servers; contains multi-layered remote access toolkit with credential theft and persistence capabilities.
domain
bluegraintours[.]com
Malicious domain hosting fake Microsoft 365 sign-in page used in AiTM attacks
cve
CVE-2026-5437
Out-of-bounds read in meta-header parser
domain
cpuid.com
Compromised domain used to distribute malicious downloads
mitre_attack
T1059.001
Command and scripting interpreter (use of legitimate PLC programming software)