{"exported_at":"2026-04-04T17:49:44.679Z","count":111,"iocs":[{"type":"cve","value":"CVE-2026-3502","source":"Security Affairs","article_title":"U.S. CISA adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog","article_url":"https://securityaffairs.com/190341/security/u-s-cisa-adds-a-flaw-in-trueconf-client-to-its-known-exploited-vulnerabilities-catalog.html","published_at":"2026-04-04T16:42:38.000Z"},{"type":"cve","value":"CVE-2026-35616","source":"Help Net Security","article_title":"FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)","article_url":"https://www.helpnetsecurity.com/2026/04/04/forticlient-ems-zero-day-cve-2026-35616/","published_at":"2026-04-04T14:09:54.000Z"},{"type":"cve","value":"CVE-2026-5281","source":"CSO Online","article_title":"Google patches fourth Chrome zero-day so far this year","article_url":"https://www.csoonline.com/article/4154235/google-patches-fourth-chrome-zero-day-so-far-this-year.html","published_at":"2026-04-03T17:29:30.000Z"},{"type":"cve","value":"CVE-2026-2699","source":"SC Media","article_title":"Progress ShareFile vulnerabilities allow unauthenticated file exfiltration","article_url":"https://www.scworld.com/brief/progress-sharefile-vulnerabilities-allow-unauthenticated-file-exfiltration","published_at":"2026-04-03T15:17:56.000Z"},{"type":"cve","value":"CVE-2026-2701","source":"SC Media","article_title":"Progress ShareFile vulnerabilities allow unauthenticated file exfiltration","article_url":"https://www.scworld.com/brief/progress-sharefile-vulnerabilities-allow-unauthenticated-file-exfiltration","published_at":"2026-04-03T15:17:56.000Z"},{"type":"cve","value":"CVE-2026-20093","source":"Help Net Security","article_title":"Cisco IMC auth bypass vulnerability allows attackers to alter user passwords (CVE-2026-20093)","article_url":"https://www.helpnetsecurity.com/2026/04/03/cisco-imc-vulnerability-cve-2026-20093/","published_at":"2026-04-03T12:59:22.000Z"},{"type":"cve","value":"CVE-2026-2699","source":"GBHackers","article_title":"New Progress ShareFile Flaws Expose Servers to Unauthorized Remote Takeover","article_url":"https://gbhackers.com/new-progress-sharefile-flaws-expose-servers/","published_at":"2026-04-03T12:52:55.000Z"},{"type":"cve","value":"CVE-2026-2701","source":"GBHackers","article_title":"New Progress ShareFile Flaws Expose Servers to Unauthorized Remote Takeover","article_url":"https://gbhackers.com/new-progress-sharefile-flaws-expose-servers/","published_at":"2026-04-03T12:52:55.000Z"},{"type":"cve","value":"CVE-2026-3502","source":"GBHackers","article_title":"CISA Includes TrueConf Security Flaw in KEV Catalog After Exploitation in the Wild","article_url":"https://gbhackers.com/cisa-includes-trueconf-security-flaw-in-kev-catalog/","published_at":"2026-04-03T10:49:09.000Z"},{"type":"cve","value":"CVE-2025-53521","source":"GBHackers","article_title":"14,000+ F5 BIG-IP APM Instances Exposed Online as Attackers Exploit RCE Vulnerability","article_url":"https://gbhackers.com/14000-f5-big-ip-apm-instances-exposed-online/","published_at":"2026-04-03T10:40:25.000Z"},{"type":"cve","value":"CVE-2025-55182","source":"GBHackers","article_title":"Attackers Abuse React2Shell Flaw to Compromise 700+ Next.js Hosts","article_url":"https://gbhackers.com/attackers-abuse-react2shell-flaw/","published_at":"2026-04-03T06:49:02.000Z"},{"type":"domain","value":"b2b-contenthub.com","source":"CSO Online","article_title":"Die besten XDR-Tools","article_url":"https://www.csoonline.com/article/3492511/extended-detection-and-response-losungendie-11-besten-xdr-tools.html","published_at":"2026-04-03T04:38:00.000Z"},{"type":"url","value":"https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?quality=50&strip=all","source":"CSO Online","article_title":"Die besten XDR-Tools","article_url":"https://www.csoonline.com/article/3492511/extended-detection-and-response-losungendie-11-besten-xdr-tools.html","published_at":"2026-04-03T04:38:00.000Z"},{"type":"url","value":"https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?resize=300%2C168&quality=50&strip=all","source":"CSO Online","article_title":"Die besten XDR-Tools","article_url":"https://www.csoonline.com/article/3492511/extended-detection-and-response-losungendie-11-besten-xdr-tools.html","published_at":"2026-04-03T04:38:00.000Z"},{"type":"url","value":"https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?resize=768%2C432&quality=50&strip=all","source":"CSO Online","article_title":"Die besten XDR-Tools","article_url":"https://www.csoonline.com/article/3492511/extended-detection-and-response-losungendie-11-besten-xdr-tools.html","published_at":"2026-04-03T04:38:00.000Z"},{"type":"url","value":"https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?resize=1024%2C576&quality=50&strip=all","source":"CSO Online","article_title":"Die besten XDR-Tools","article_url":"https://www.csoonline.com/article/3492511/extended-detection-and-response-losungendie-11-besten-xdr-tools.html","published_at":"2026-04-03T04:38:00.000Z"},{"type":"domain","value":"mend.io","source":"Help Net Security","article_title":"New infosec products of the month: March 2026","article_url":"https://www.helpnetsecurity.com/2026/04/03/new-infosec-products-of-the-month-march-2026/","published_at":"2026-04-03T04:00:58.000Z"},{"type":"url","value":"https://isc.sans.edu/podcastdetail/9878,","source":"SANS ISC","article_title":"ISC Stormcast For Friday, April 3rd, 2026 https://isc.sans.edu/podcastdetail/9878, (Fri, Apr 3rd)","article_url":"https://isc.sans.edu/diary/rss/32862","published_at":"2026-04-03T02:00:02.000Z"},{"type":"cve","value":"CVE-2026-5281","source":"SC Media","article_title":"Actively exploited Chrome zero-day patched","article_url":"https://www.scworld.com/brief/actively-exploited-chrome-zero-day-patched","published_at":"2026-04-02T23:11:21.000Z"},{"type":"cve","value":"CVE-2026-20093","source":"CSO Online","article_title":"Cisco fixes critical IMC auth bypass present in many products","article_url":"https://www.csoonline.com/article/4154052/cisco-fixes-critical-imc-auth-bypass-present-in-many-products.html","published_at":"2026-04-02T22:26:37.000Z"},{"type":"cve","value":"CVE-2025-55182","source":"The Hacker News","article_title":"Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials","article_url":"https://thehackernews.com/2026/04/hackers-exploit-cve-2025-55182-to.html","published_at":"2026-04-02T19:30:00.000Z"},{"type":"cve","value":"CVE-2026-20093","source":"Security Affairs","article_title":"Cisco fixed critical and high-severity flaws","article_url":"https://securityaffairs.com/190295/security/cisco-fixed-critical-and-high-severity-flaws.html","published_at":"2026-04-02T17:04:38.000Z"},{"type":"cve","value":"CVE-2026-20093","source":"The Hacker News","article_title":"Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise","article_url":"https://thehackernews.com/2026/04/cisco-patches-98-cvss-imc-and-ssm-flaws.html","published_at":"2026-04-02T15:21:00.000Z"},{"type":"url","value":"https://github.com/vitejs/vite].","source":"SANS ISC","article_title":"Attempts to Exploit Exposed \"Vite\" Installs (CVE-2025-30208), (Thu, Apr 2nd)","article_url":"https://isc.sans.edu/diary/rss/32860","published_at":"2026-04-02T14:49:00.000Z"},{"type":"cve","value":"CVE-2025-30208","source":"SANS ISC","article_title":"Attempts to Exploit Exposed \"Vite\" Installs (CVE-2025-30208), (Thu, Apr 2nd)","article_url":"https://isc.sans.edu/diary/rss/32860","published_at":"2026-04-02T14:49:00.000Z"},{"type":"cve","value":"CVE-2025-7741","source":"CISA Advisories","article_title":"Yokogawa CENTUM VP","article_url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-092-02","published_at":"2026-04-02T12:00:00.000Z"},{"type":"cve","value":"CVE-2025-10492","source":"CISA Advisories","article_title":"Hitachi Energy Ellipse","article_url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-092-03","published_at":"2026-04-02T12:00:00.000Z"},{"type":"cve","value":"CVE-2026-3502","source":"CISA Advisories","article_title":"CISA Adds One Known Exploited Vulnerability to Catalog","article_url":"https://www.cisa.gov/news-events/alerts/2026/04/02/cisa-adds-one-known-exploited-vulnerability-catalog","published_at":"2026-04-02T12:00:00.000Z"},{"type":"cve","value":"CVE-2026-5281","source":"GBHackers","article_title":"CISA Issues Alert on Chrome Zero-Day Under Active Exploitation","article_url":"https://gbhackers.com/cisa-alert-on-chrome-zero-day/","published_at":"2026-04-02T09:16:35.000Z"},{"type":"domain","value":"outlook.com","source":"BleepingComputer","article_title":"Microsoft links Classic Outlook issue to email delivery problems","article_url":"https://www.bleepingcomputer.com/news/microsoft/microsoft-links-classic-outlook-bug-to-email-delivery-issues/","published_at":"2026-04-02T09:12:12.000Z"},{"type":"cve","value":"CVE-2026-3502","source":"Help Net Security","article_title":"TrueConf zero-day vulnerability turns its own update process into malware delivery channel","article_url":"https://www.helpnetsecurity.com/2026/04/02/trueconf-zero-day-vulnerability-cyber-espionage/","published_at":"2026-04-02T08:57:18.000Z"},{"type":"cve","value":"CVE-2026-20160","source":"GBHackers","article_title":"Cisco Smart Software Manager Flaw Allowed Arbitrary Command Execution","article_url":"https://gbhackers.com/cisco-smart-software-manager-flaw/","published_at":"2026-04-02T06:50:27.000Z"},{"type":"cve","value":"CVE-2026-1579","source":"GBHackers","article_title":"Critical PX4 Autopilot Vulnerability Let Attackers Gain Control of Drones","article_url":"https://gbhackers.com/critical-px4-autopilot-vulnerability/","published_at":"2026-04-02T06:46:42.000Z"},{"type":"cve","value":"CVE-2026-20093","source":"GBHackers","article_title":"Cisco Warns of Critical IMC Vulnerability Enabling Authentication Bypass","article_url":"https://gbhackers.com/cisco-warns-of-critical-imc-vulnerability/","published_at":"2026-04-02T05:26:45.000Z"},{"type":"cve","value":"CVE-2026-3991","source":"GBHackers","article_title":"Symantec DLP Agent Flaw Exposed Systems to Privilege Escalation Attacks","article_url":"https://gbhackers.com/symantec-dlp-agent-flaw/","published_at":"2026-04-02T05:02:39.000Z"},{"type":"cve","value":"CVE-2026-3775","source":"Zero Day Initiative","article_title":"ZDI-26-251: Foxit PDF Reader Update Service Uncontrolled Search Path Element Local Privilege Escalation Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-251/","published_at":"2026-04-02T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-21518","source":"Zero Day Initiative","article_title":"ZDI-26-253: Microsoft Visual Studio Code mcp.json Command Injection Remote Code Execution Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-253/","published_at":"2026-04-02T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-4698","source":"Zero Day Initiative","article_title":"ZDI-26-252: Mozilla Firefox IonMonkey Switch Statement Optimization Type Confusion Remote Code Execution Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-252/","published_at":"2026-04-02T05:00:00.000Z"},{"type":"domain","value":"b2b-contenthub.com","source":"CSO Online","article_title":"Tools, um MCP-Server abzusichern","article_url":"https://www.csoonline.com/article/4093704/tools-um-mcp-server-abzusichern.html","published_at":"2026-04-02T04:00:00.000Z"},{"type":"url","value":"https://b2b-contenthub.com/wp-content/uploads/2025/11/Gorodenkoff_shutterstock_2324952347_16z9.jpg?quality=50&strip=all","source":"CSO Online","article_title":"Tools, um MCP-Server abzusichern","article_url":"https://www.csoonline.com/article/4093704/tools-um-mcp-server-abzusichern.html","published_at":"2026-04-02T04:00:00.000Z"},{"type":"url","value":"https://b2b-contenthub.com/wp-content/uploads/2025/11/Gorodenkoff_shutterstock_2324952347_16z9.jpg?resize=300%2C168&quality=50&strip=all","source":"CSO Online","article_title":"Tools, um MCP-Server abzusichern","article_url":"https://www.csoonline.com/article/4093704/tools-um-mcp-server-abzusichern.html","published_at":"2026-04-02T04:00:00.000Z"},{"type":"url","value":"https://b2b-contenthub.com/wp-content/uploads/2025/11/Gorodenkoff_shutterstock_2324952347_16z9.jpg?resize=768%2C432&quality=50&strip=all","source":"CSO Online","article_title":"Tools, um MCP-Server abzusichern","article_url":"https://www.csoonline.com/article/4093704/tools-um-mcp-server-abzusichern.html","published_at":"2026-04-02T04:00:00.000Z"},{"type":"url","value":"https://b2b-contenthub.com/wp-content/uploads/2025/11/Gorodenkoff_shutterstock_","source":"CSO Online","article_title":"Tools, um MCP-Server abzusichern","article_url":"https://www.csoonline.com/article/4093704/tools-um-mcp-server-abzusichern.html","published_at":"2026-04-02T04:00:00.000Z"},{"type":"url","value":"https://isc.sans.edu/podcastdetail/9876,","source":"SANS ISC","article_title":"ISC Stormcast For Thursday, April 2nd, 2026 https://isc.sans.edu/podcastdetail/9876, (Thu, Apr 2nd)","article_url":"https://isc.sans.edu/diary/rss/32858","published_at":"2026-04-02T02:00:02.000Z"},{"type":"cve","value":"CVE-2026-5281","source":"Security Affairs","article_title":"U.S. CISA adds a flaw in Google Dawn to its Known Exploited Vulnerabilities catalog","article_url":"https://securityaffairs.com/190282/security/u-s-cisa-adds-a-flaw-in-google-dawn-to-its-known-exploited-vulnerabilities-catalog.html","published_at":"2026-04-01T23:30:12.000Z"},{"type":"cve","value":"CVE-2026-5281","source":"Security Affairs","article_title":"Google fixes fourth actively exploited Chrome zero-day of 2026","article_url":"https://securityaffairs.com/190265/hacking/google-fixes-fourth-actively-exploited-chrome-zero-day-of-2026.html","published_at":"2026-04-01T20:41:11.000Z"},{"type":"cve","value":"CVE-2026-3502","source":"SC Media","article_title":"Attacks with TrueConf zero-day hit Southeast Asian governments","article_url":"https://www.scworld.com/brief/attacks-with-trueconf-zero-day-hit-southeast-asian-governments","published_at":"2026-04-01T15:53:54.000Z"},{"type":"cve","value":"CVE-2026-5281","source":"SecurityWeek","article_title":"Exploited Zero-Day Among 21 Vulnerabilities Patched in Chrome","article_url":"https://www.securityweek.com/exploited-zero-day-among-21-vulnerabilities-patched-in-chrome/","published_at":"2026-04-01T14:36:39.000Z"},{"type":"cve","value":"CVE-2026-5281","source":"CISA Advisories","article_title":"CISA Adds One Known Exploited Vulnerability to Catalog","article_url":"https://www.cisa.gov/news-events/alerts/2026/04/01/cisa-adds-one-known-exploited-vulnerability-catalog","published_at":"2026-04-01T12:00:00.000Z"},{"type":"cve","value":"CVE-2026-5281","source":"The Hacker News","article_title":"New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released","article_url":"https://thehackernews.com/2026/04/new-chrome-zero-day-cve-2026-5281-under.html","published_at":"2026-04-01T11:42:00.000Z"},{"type":"cve","value":"CVE-2026-5281","source":"Help Net Security","article_title":"Google fixes Chrome zero-day with in-the-wild exploit (CVE-2026-5281)","article_url":"https://www.helpnetsecurity.com/2026/04/01/google-chrome-zero-day-cve-2026-5281/","published_at":"2026-04-01T11:27:11.000Z"},{"type":"cve","value":"CVE-2026-34982","source":"GBHackers","article_title":"Vim Modeline Vulnerability Opens Door to Arbitrary OS Command Execution","article_url":"https://gbhackers.com/vim-modeline-vulnerability-arbitrary-os-command-execution/","published_at":"2026-04-01T11:15:17.000Z"},{"type":"domain","value":"shutterstock.com","source":"CSO Online","article_title":"Hacker zielen auf Exilportal Iranwire","article_url":"https://www.csoonline.com/article/4153080/hacker-zielen-auf-exilportal-iranwire-2.html","published_at":"2026-04-01T10:56:52.000Z"},{"type":"cve","value":"CVE-2026-33026","source":"GBHackers","article_title":"PoC Exploit Code Published for nginx-ui Backup Restore Security Flaw","article_url":"https://gbhackers.com/poc-exploit-code-published-for-nginx-ui/","published_at":"2026-04-01T08:46:12.000Z"},{"type":"cve","value":"CVE-2026-3502","source":"GBHackers","article_title":"TrueConf Vulnerability Under Active Exploitation in Southeast Asia Government Attacks","article_url":"https://gbhackers.com/trueconf-vulnerability-under-active-exploitation/","published_at":"2026-04-01T06:12:29.000Z"},{"type":"cve","value":"CVE-2026-21962","source":"GBHackers","article_title":"Hackers Actively Exploit Critical WebLogic RCE Vulnerabilities in Ongoing Attacks","article_url":"https://gbhackers.com/hackers-exploit-critical-weblogic-rce-vulnerabilities/","published_at":"2026-04-01T04:48:30.000Z"},{"type":"domain","value":"shutterstock.com","source":"CSO Online","article_title":"Attack Surface Management – ein Kaufratgeber","article_url":"https://www.csoonline.com/article/3492897/attack-surface-management-losungen-9-tools-um-ihre-angriffsflache-zu-managen.html","published_at":"2026-04-01T04:00:00.000Z"},{"type":"url","value":"https://isc.sans.edu/podcastdetail/9874,","source":"SANS ISC","article_title":"ISC Stormcast For Wednesday, April 1st, 2026 https://isc.sans.edu/podcastdetail/9874, (Wed, Apr 1st)","article_url":"https://isc.sans.edu/diary/rss/32852","published_at":"2026-04-01T02:05:11.000Z"},{"type":"domain","value":"gmail.com","source":"BleepingComputer","article_title":"Google now allows you to change your @gmail.com address","article_url":"https://www.bleepingcomputer.com/news/google/google-now-allows-you-to-change-your-gmailcom-address/","published_at":"2026-03-31T23:13:56.000Z"},{"type":"cve","value":"CVE-2026-21643","source":"SC Media","article_title":"Critical Fortinet FortiClient EMS vulnerability under attack","article_url":"https://www.scworld.com/brief/critical-fortinet-forticlient-ems-vulnerability-under-attack","published_at":"2026-03-31T20:35:19.000Z"},{"type":"cve","value":"CVE-2025-53521","source":"CSO Online","article_title":"5-month-old F5 BIG-IP DoS bug becomes critical RCE exploited in the wild","article_url":"https://www.csoonline.com/article/4152658/5-month-old-f5-big-ip-dos-bug-becomes-critical-rce-exploited-in-the-wild.html","published_at":"2026-03-31T18:46:36.000Z"},{"type":"cve","value":"CVE-2025-53521","source":"SC Media","article_title":"F5 BIG-IP APM systems vulnerable to critical remote code execution flaw","article_url":"https://www.scworld.com/brief/f5-big-ip-apm-systems-vulnerable-to-critical-remote-code-execution-flaw","published_at":"2026-03-31T17:46:36.000Z"},{"type":"cve","value":"CVE-2026-3502","source":"The Hacker News","article_title":"TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks","article_url":"https://thehackernews.com/2026/03/trueconf-zero-day-exploited-in-attacks.html","published_at":"2026-03-31T16:03:00.000Z"},{"type":"cve","value":"CVE-2026-3502","source":"Check Point Research","article_title":"Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets","article_url":"https://research.checkpoint.com/2026/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets/","published_at":"2026-03-31T13:16:50.000Z"},{"type":"cve","value":"CVE-2026-3356","source":"CISA Advisories","article_title":"Anritsu Remote Spectrum Monitor","article_url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-090-01","published_at":"2026-03-31T12:00:00.000Z"},{"type":"cve","value":"CVE-2025-53521","source":"HackRead","article_title":"Critical F5 BIG-IP Flaw Upgraded to 9.8 RCE, Exploited in the Wild","article_url":"https://hackread.com/critical-f5-big-ip-flaw-upgrad-to-9-8-rce-exploited/","published_at":"2026-03-31T11:36:21.000Z"},{"type":"cve","value":"CVE-2026-3055","source":"Security Affairs","article_title":"U.S. CISA adds a flaw in Citrix NetScaler to its Known Exploited Vulnerabilities catalog","article_url":"https://securityaffairs.com/190197/security/u-s-cisa-adds-a-flaw-in-citrix-netscaler-to-its-known-exploited-vulnerabilities-catalog.html","published_at":"2026-03-31T09:31:41.000Z"},{"type":"cve","value":"CVE-2025-53521","source":"Infosecurity Magazine","article_title":"NCSC Urges Immediate Patching of F5 BIG-IP Bug","article_url":"https://www.infosecurity-magazine.com/news/ncsc-urges-immediate-patching-f5/","published_at":"2026-03-31T08:45:00.000Z"},{"type":"domain","value":"shutterstock.com","source":"CSO Online","article_title":"Fahndung nach Cyberkriminellen – 130 Firmen attackiert","article_url":"https://www.csoonline.com/article/4152271/fahndung-nach-cyberkriminellen-130-firmen-attackiert-2.html","published_at":"2026-03-31T07:16:58.000Z"},{"type":"cve","value":"CVE-2026-20929","source":"CrowdStrike Blog","article_title":"Detecting CVE-2026-20929: Kerberos Authentication Relay via CNAME Abuse","article_url":"https://www.crowdstrike.com/en-us/blog/detecting-kerberos-relay-attack-via-dns-cname-abuse/","published_at":"2026-03-31T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-23092","source":"Zero Day Initiative","article_title":"ZDI-26-250: Linux Kernel Analog Device Driver Improper Validation of Array Index Local Privilege Escalation Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-250/","published_at":"2026-03-31T05:00:00.000Z"},{"type":"url","value":"https://isc.sans.edu/podcastdetail/9872,","source":"SANS ISC","article_title":"ISC Stormcast For Tuesday, March 31st, 2026 https://isc.sans.edu/podcastdetail/9872, (Tue, Mar 31st)","article_url":"https://isc.sans.edu/diary/rss/32848","published_at":"2026-03-31T02:00:02.000Z"},{"type":"cve","value":"CVE-2026-21643","source":"CSO Online","article_title":"Fortinet hit by another exploited cybersecurity flaw","article_url":"https://www.csoonline.com/article/4152117/fortinet-hit-by-another-exploited-cybersecurity-flaw.html","published_at":"2026-03-30T23:19:24.000Z"},{"type":"cve","value":"CVE-2026-3055","source":"BleepingComputer","article_title":"Critical Citrix NetScaler memory flaw actively exploited in attacks","article_url":"https://www.bleepingcomputer.com/news/security/critical-citrix-netscaler-memory-flaw-actively-exploited-in-attacks/","published_at":"2026-03-30T18:28:37.000Z"},{"type":"cve","value":"CVE-2026-21643","source":"Help Net Security","article_title":"Critical Fortinet FortiClient EMS bug under active attack (CVE-2026-21643)","article_url":"https://www.helpnetsecurity.com/2026/03/30/forticlient-ems-cve-2026-21643-reported-exploitation/","published_at":"2026-03-30T12:19:10.000Z"},{"type":"cve","value":"CVE-2026-3055","source":"CISA Advisories","article_title":"CISA Adds One Known Exploited Vulnerability to Catalog","article_url":"https://www.cisa.gov/news-events/alerts/2026/03/30/cisa-adds-one-known-exploited-vulnerability-catalog","published_at":"2026-03-30T12:00:00.000Z"},{"type":"cve","value":"CVE-2026-3055","source":"Infosecurity Magazine","article_title":"Critical Citrix NetScaler Vulnerability Exploited in the Wild","article_url":"https://www.infosecurity-magazine.com/news/critical-citrix-netscaler/","published_at":"2026-03-30T10:45:00.000Z"},{"type":"cve","value":"CVE-2026-21643","source":"Security Affairs","article_title":"Critical Fortinet FortiClient EMS flaw exploited for Remote Code Execution","article_url":"https://securityaffairs.com/190158/security/critical-fortinet-forticlient-ems-flaw-exploited-for-remote-code-execution.html","published_at":"2026-03-30T10:43:26.000Z"},{"type":"cve","value":"CVE-2026-21643","source":"GBHackers","article_title":"Critical Fortinet FortiClient EMS Vulnerability Actively Exploited in Attacks","article_url":"https://gbhackers.com/critical-fortinet-forticlient-ems-vulnerability-2/","published_at":"2026-03-30T09:38:45.000Z"},{"type":"cve","value":"CVE-2026-3055","source":"GBHackers","article_title":"Hackers Probe Citrix NetScaler Systems Ahead of Suspected CVE-2026-3055 Exploitation","article_url":"https://gbhackers.com/hackers-probe-citrix-netscaler-systems-cve-2026-3055-exploitation/","published_at":"2026-03-30T05:41:24.000Z"},{"type":"cve","value":"CVE-2026-20695","source":"Zero Day Initiative","article_title":"ZDI-26-231: Apple macOS Exposure of Sensitive Information to Unauthorized Sphere Information Disclosure Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-231/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-20690","source":"Zero Day Initiative","article_title":"ZDI-26-230: Apple macOS CoreMedia Framework Out-Of-Bounds Write Remote Code Execution Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-230/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-3691","source":"Zero Day Initiative","article_title":"ZDI-26-229: OpenClaw Client PKCE Verifier Information Disclosure Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-229/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-3690","source":"Zero Day Initiative","article_title":"ZDI-26-228: OpenClaw Canvas Authentication Bypass Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-228/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-3689","source":"Zero Day Initiative","article_title":"ZDI-26-227: OpenClaw Canvas Path Traversal Information Disclosure Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-227/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2024-13088","source":"Zero Day Initiative","article_title":"ZDI-26-244: (Pwn2Own) QNAP QHora-322 miro_webserver_controllers_api_login_singIn Authentication Bypass Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-244/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2025-62842","source":"Zero Day Initiative","article_title":"ZDI-26-243: (Pwn2Own) QNAP TS-453E write_file_to_svr External Control of File Path Remote Code Execution Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-243/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2025-62840","source":"Zero Day Initiative","article_title":"ZDI-26-242: (Pwn2Own) QNAP TS-453E server_handlers.pyc rr2s.kwargs Error Message Information Disclosure Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-242/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2025-62846","source":"Zero Day Initiative","article_title":"ZDI-26-241: (Pwn2Own) QNAP QHora-322 qvpn_db_mgr username SQL Injection Remote Code Execution Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-241/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2025-62845","source":"Zero Day Initiative","article_title":"ZDI-26-240: (Pwn2Own) QNAP QHora-322 qvpn_db_mgr role_type Improper Neutralization of Escape Sequences Authentication Bypass Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-240/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2025-62844","source":"Zero Day Initiative","article_title":"ZDI-26-239: (Pwn2Own) QNAP QHora-322 login.newAuthMiddleware.Authenticator Authentication Bypass Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-239/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2023-6270","source":"Zero Day Initiative","article_title":"ZDI-26-238: Linux Kernel AoE Driver Use-After-Free Local Privilege Escalation Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-238/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2025-62843","source":"Zero Day Initiative","article_title":"ZDI-26-237: (Pwn2Own) QNAP QHora-322  ip6_wanifset Improper Restriction of Communication Channel to Intended Endpoints Firewall Bypass Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-237/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-0954","source":"Zero Day Initiative","article_title":"ZDI-26-236: Digilent DASYLab DSB File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-236/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-0957","source":"Zero Day Initiative","article_title":"ZDI-26-235: Digilent DASYLab DSA File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-235/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-0956","source":"Zero Day Initiative","article_title":"ZDI-26-234: Digilent DASYLab DSA File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-234/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-0955","source":"Zero Day Initiative","article_title":"ZDI-26-233: Digilent DASYLab DSA File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-233/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2025-40277","source":"Zero Day Initiative","article_title":"ZDI-26-232: (Pwn2Own) Red Hat Enterprise Linux vmwgfx Driver Integer Overflow Local Privilege Escalation Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-232/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-5058","source":"Zero Day Initiative","article_title":"ZDI-26-246: (0Day) aws-mcp-server Command Injection Remote Code Execution Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-246/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-5059","source":"Zero Day Initiative","article_title":"ZDI-26-245: (0Day) aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-245/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-5055","source":"Zero Day Initiative","article_title":"ZDI-26-249: NoMachine Uncontrolled Search Path Element Local Privilege Escalation Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-249/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-5054","source":"Zero Day Initiative","article_title":"ZDI-26-248: NoMachine External Control of File Path Local Privilege Escalation Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-248/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"cve","value":"CVE-2026-5053","source":"Zero Day Initiative","article_title":"ZDI-26-247: NoMachine External Control of File Path Arbitrary File Deletion Vulnerability","article_url":"http://www.zerodayinitiative.com/advisories/ZDI-26-247/","published_at":"2026-03-30T05:00:00.000Z"},{"type":"url","value":"https://isc.sans.edu/podcastdetail/9870,","source":"SANS ISC","article_title":"ISC Stormcast For Monday, March 30th, 2026 https://isc.sans.edu/podcastdetail/9870, (Mon, Mar 30th)","article_url":"https://isc.sans.edu/diary/rss/32844","published_at":"2026-03-30T02:00:02.000Z"},{"type":"domain","value":"rawpixel.com","source":"CSO Online","article_title":"Data Security Posture Management: Die besten DSPM-Tools","article_url":"https://www.csoonline.com/article/3493645/data-security-posture-management-die-besten-dspm-tools.html","published_at":"2026-03-30T00:07:00.000Z"},{"type":"domain","value":"shutterstock.com","source":"CSO Online","article_title":"Data Security Posture Management: Die besten DSPM-Tools","article_url":"https://www.csoonline.com/article/3493645/data-security-posture-management-die-besten-dspm-tools.html","published_at":"2026-03-30T00:07:00.000Z"},{"type":"cve","value":"CVE-2026-3055","source":"Security Affairs","article_title":"Urgent Alert: NetScaler bug CVE-2026-3055 probed by attackers could leak sensitive data","article_url":"https://securityaffairs.com/190131/hacking/urgent-alert-netscaler-bug-cve-2026-3055-probed-by-attackers-could-leak-sensitive-data.html","published_at":"2026-03-29T13:33:57.000Z"},{"type":"cve","value":"CVE-2026-3055","source":"The Hacker News","article_title":"Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug","article_url":"https://thehackernews.com/2026/03/citrix-netscaler-under-active-recon-for.html","published_at":"2026-03-28T09:11:00.000Z"},{"type":"cve","value":"CVE-2025-53521","source":"Help Net Security","article_title":"Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521)","article_url":"https://www.helpnetsecurity.com/2026/03/28/big-ip-apm-vulnerability-cve-2025-53521-exploited/","published_at":"2026-03-28T09:02:09.000Z"},{"type":"cve","value":"CVE-2025-53521","source":"Security Affairs","article_title":"U.S. CISA adds a flaw in F5 BIG-IP AMP to its Known Exploited Vulnerabilities catalog","article_url":"https://securityaffairs.com/190076/uncategorized/u-s-cisa-adds-a-flaw-in-f5-big-ip-amp-to-its-known-exploited-vulnerabilities-catalog.html","published_at":"2026-03-28T07:33:15.000Z"},{"type":"cve","value":"CVE-2025-53521","source":"The Hacker News","article_title":"CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation","article_url":"https://thehackernews.com/2026/03/cisa-adds-cve-2025-53521-to-kev-after.html","published_at":"2026-03-28T07:07:00.000Z"}]}