Author: VanshTheHacker

  • Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems

    Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems

    Threat actors are suspected to be exploiting a maximum-severity security flaw impacting Quest KACE Systems Management Appliance (SMA), according to Arctic Wolf.
    The cybersecurity company said it observed malicious activity starting the week of March 9, 2026, in customer environments that’s consistent with the exploitation of CVE-2025-32975 on unpatched SMA systems exposed to the internet. It’s

  • FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

    FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

    Threat actors affiliated with Russian Intelligence Services are conducting phishing campaigns to compromise commercial messaging applications (CMAs) like WhatsApp and Signal to seize control of accounts belonging to individuals with high intelligence value, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) said Friday.
    “The campaign

  • Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

    Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

    Oracle has released security updates to address a critical security flaw impacting Identity Manager and Web Services Manager that could be exploited to achieve remote code execution.
    The vulnerability, tracked as CVE-2026-21992, carries a CVSS score of 9.8 out of a maximum of 10.0.
    “This vulnerability is remotely exploitable without authentication,” Oracle said in an advisory. “If successfully

  • Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages

    Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages

    The threat actors behind the supply chain attack targeting the popular Trivy scanner are suspected to be conducting follow-on attacks that have led to the compromise of a large number of npm packages with a previously undocumented self-propagating worm dubbed CanisterWorm.
    The name is a reference to the fact that the malware uses an ICP canister, which refers to tamperproof smart contracts on

  • CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026

    CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five security flaws impacting Apple, Craft CMS, and Laravel Livewire to its Known Exploited Vulnerabilities (KEV) catalog, urging federal agencies to patch them by April 3, 2026.
    The vulnerabilities that have come under exploitation are listed below –

    CVE-2025-31277 (CVSS score: 8.8) – A vulnerability in Apple

  • Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

    Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

    Trivy, a popular open-source vulnerability scanner maintained by Aqua Security, was compromised a second time within the span of a month to deliver malware that stole sensitive CI/CD secrets.
    The latest incident impacted GitHub Actions “aquasecurity/trivy-action” and “aquasecurity/setup-trivy,” which are used to scan Docker container images for vulnerabilities and set up GitHub Actions workflow

  • Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure

    Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure

    A critical security flaw impacting Langflow has come under active exploitation within 20 hours of public disclosure, highlighting the speed at which threat actors weaponize newly published vulnerabilities.
    The security defect, tracked as CVE-2026-33017 (CVSS score: 9.3), is a case of missing authentication combined with code injection that could result in remote code execution.
    “The POST /api/v1

  • Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams

    Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams

    Google on Thursday announced a new “advanced flow” for Android sideloading that requires a mandatory 24-hour wait period to install apps from unverified developers in an attempt to balance openness with safety.
    The new changes come against the backdrop of a developer verification mandate the tech giant announced last year that requires all Android apps to be registered by verified developers to

  • The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks

    The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks

    Artificial Intelligence (AI) is changing how individuals and organizations conduct many activities, including how cybercriminals carry out phishing attacks and iterate on malware. Now, cybercriminals are using AI to generate personalized phishing emails, deepfakes and malware that evade traditional detection by impersonating normal user activity and bypassing legacy security models. As a result,

  • DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks

    DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks

    The U.S. Department of Justice (DoJ) on Thursday announced the disruption of command-and-control (C2) infrastructure used by several Internet of Things (IoT) botnets like AISURU, Kimwolf, JackSkid, and Mossad as part of a court-authorized law enforcement operation.
    The effort also saw authorities from Canada and Germany targeting the operators behind these botnets, with a number of private