Author: VanshTheHacker

  • Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials

    Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials

    Cybersecurity researchers have disclosed details of two now-patched security flaws in the n8n workflow automation platform, including two critical bugs that could result in arbitrary command execution.
    The vulnerabilities are listed below –

    CVE-2026-27577 (CVSS score: 9.4) – Expression sandbox escape leading to remote code execution (RCE)
    CVE-2026-27493 (CVSS score: 9.5) – Unauthenticated

  • Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

    Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

    Microsoft on Tuesday released patches for a set of 84 new security vulnerabilities affecting various software components, including two that have been listed as publicly known.
    Of these, eight are rated Critical, and 76 are rated Important in severity. Forty-six of the patched vulnerabilities relate to privilege escalation, followed by 18 remote code execution, 10 information disclosure, four

  • UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

    UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

    A threat actor known as UNC6426 leveraged keys stolen following the supply chain compromise of the nx npm package last year to completely breach a victim’s cloud environment within a span of 72 hours.
    The attack started with the theft of a developer’s GitHub token, which the threat actor then used to gain unauthorized access to the cloud and steal data.
    “The threat actor, UNC6426, then used this

  • Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets

    Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets

    Cybersecurity researchers have discovered five malicious Rust crates that masquerade as time-related utilities to transmit .env file data to the threat actors.
    The Rust packages, published to crates.io, are listed below –

    chrono_anchor
    dnp3times
    time_calibrator
    time_calibrators
    time-sync

    The crates, per Socket, impersonate timeapi.io and were published between late February and early March

  • FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

    FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

    Cybersecurity researchers are calling attention to a new campaign where threat actors are abusing FortiGate Next-Generation Firewall (NGFW) appliances as entry points to breach victim networks. 
    The activity involves the exploitation of recently disclosed security vulnerabilities or weak credentials to extract configuration files containing service account credentials and network topology

  • How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

    How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

    Artificial Intelligence (AI) is no longer just a tool we talk to; it is a tool that does things for us. These are called AI Agents. They can send emails, move data, and even manage software on their own.
    But there is a problem. While these agents make work faster, they also open a new “back door” for hackers.
    The Problem: “The Invisible Employee”
    Think of an AI Agent like a new employee who has

  • Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

    Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

    Salesforce has warned of an increase in threat actor activity that’s aimed at exploiting misconfigurations in publicly accessible Experience Cloud sites by making use of a customized version of an open-source tool called AuraInspector.
    The activity, per the company, involves the exploitation of customers’ overly permissive Experience Cloud guest user configurations to obtain access to sensitive

  • CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

    CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
    The vulnerability list is as follows –

    CVE-2021-22054 (CVSS score: 7.5) – A server-side request forgery (SSRF) vulnerability in Omnissa Workspace One UEM (formerly VMware Workspace One UEM) that

  • Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

    Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

    Cybersecurity researchers have discovered a malicious npm package that masquerades as an OpenClaw installer to deploy a remote access trojan (RAT) and steal sensitive data from compromised hosts.
    The package, named “@openclaw-ai/openclawai,” was uploaded to the registry by a user named “openclaw-ai” on March 3, 2026. It has been downloaded 178 times to date. The library is still available for

  • UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device

    UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device

    The North Korean threat actor known as UNC4899 is suspected to be behind a sophisticated cloud compromise campaign targeting a cryptocurrency organization in 2025 to steal millions of dollars in cryptocurrency.
    The activity has been attributed with moderate confidence to the state-sponsored adversary, which is also tracked under the cryptonyms Jade Sleet, PUKCHONG, Slow Pisces, and