2026-03-15 Daily Vulns
NEW: CVE vendor-product description metric Referenceurl title GithubURL ย CVE-2019-25473 Softwebinternational -...
NEW: CVE vendor-product description metric Referenceurl title GithubURL ย CVE-2019-25473 Softwebinternational -...
AI-Generated Slopoly Malware Used in Interlock Ransomware Attack ๐จ A new malware strain dubbed Slopoly, likely created using generative AI tools, has allowed a threat actor to remain on a compromi...
Hewlett Packard Enterprise Fixes Critical Authentication Bypass in Aruba AOS-CX ๐ Hewlett Packard Enterprise (HPE) has addressed several vulnerabilities in Aruba AOS-CX, including a critical bug t...
Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown ๐จ Meta announced on Wednesday that it has disabled over 150,000 accounts associated with scam centers in South...
INC Ransomware Group Holds Healthcare Hostage in Oceania ๐จ Cybersecurity authorities in Oceania are warning that the INC ransomware operation has been wreaking havoc on healthcare organizations in...
BeatBanker Malware Targets Android Users ๐จ A new Android malware called BeatBanker spreads through fake Starlink apps distributed on websites posing as the Google Play Store. Once installed, it hi...
Alert Regarding Vulnerabilities in Adobe Acrobat and Reader ๐จ JPCERT/CC issued an alert on March 11, 2026, regarding security updates available for Adobe Acrobat Reader, identified as APSB26-26. V...
A Foreign Hacker Accessed FBI Files on Epstein Back in 2023 - Report New reporting claims that some FBI files tied to the Epstein investigation were accessed by a foreign hacker all the way back i...
NEW: CVE vendor-product description metric Referenceurl title GithubURL ย CVE-2025-69644 n/a - n/a An iss...
Vulnerabilities in Lantronix EDS3000PS and EDS5000 Date Published: March 10, 2026 Successful exploitation of these vulnerabilities in Lantronix EDS3000PS and EDS5000 could allow an attacker to by...
Honeywell IQ4x BMS Controller Vulnerability Advisory ๐จ A critical vulnerability has been identified in the Honeywell IQ4x Building Management System (BMS) Controller. Successful exploitation of th...
Sednit Reloaded - Back in the Trenches ๐ Since April 2024, Sednitโs advanced development team has reemerged with a modern toolkit centered on two paired implants, BeardShell and Covenant, each usi...
How We Hacked McKinseyโs AI Platform ๐ McKinsey & Company built an internal AI platform called Lilli for its 43,000+ employees. Lilli is a purpose-built system: chat, document analysis, RAG ov...
DNB Podcast: JWT Cracks, South American Telecom Breaches, and the Kinetic-Cyber Nexus in Iran This week, the Dragon News Bytes team dives into a critical series of high-impact vulnerabilities and ...
APT28 Conducts Long-Term Espionage on Ukrainian Forces Using Custom Malware APT28 has utilized BEARDSHELL and COVENANT malware to spy on Ukrainian military personnel, enabling long-term surveillan...
Quiz Sites and Browser Notifications ๐จ Our support team flagged several customers who suspected their devices might be infected with malware, but Malwarebytes scans came up empty. When the custome...
๐จ Ransomware Attack on ELECQ ELECQ, the manufacturer of smart electric vehicle (EV) chargers, has issued a warning to its customers regarding a recent ransomware attack that may have compromised t...
Ericsson US Discloses Data Breach ๐จ Ericsson Inc., the U.S. subsidiary of the Swedish networking and telecommunications giant Ericsson, has revealed that attackers have stolen data belonging to an...
Improper File Access Permission Settings in Digital Arts Products ๐จ Multiple products provided by Digital Arts Inc. are configured with improper file access permission settings. This vulnerability...
Fixing Request Smuggling Vulnerabilities in Pingora OSS Deployments ๐จ In December 2025, Cloudflare received reports of HTTP/1.x request smuggling vulnerabilities in the Pingora open source framewo...