Take action on the latest cybersecurity events

Cybersecurity advisories and events as they happen, with a clear action you can take.

Protobuf.js patched a critical remote code execution vulnerability (CVE-2026-41242) caused by unsafe dynamic code generation when processing malicious protobuf schemas. The flaw allows attackers to execute arbitrary JavaScript code on servers or developer machines, potentially exposing sensitive credentials and enabling lateral movement.
A systemic design flaw in Model Context Protocol (MCP) allows remote command execution across multiple AI frameworks, including Flowise, affecting over 200,000 instances. The vulnerability enables attackers to bypass security controls and gain full system access through malicious prompts or marketplace poisoning.
Mailcow patched three XSS vulnerabilities, including a critical flaw in Autodiscover logs, that allow unauthenticated attackers to take over administrator accounts and exfiltrate sensitive emails. The flaws were fixed in version 2026-03b after researchers demonstrated how to chain them with Login CSRF to steal user data.
Microsoft Defender is vulnerable to a new zero-day exploit named "RedSun" that allows unprivileged users to gain SYSTEM privileges by abusing the Cloud Files API. The flaw enables attackers to overwrite critical system binaries by manipulating how the antivirus handles malicious files with cloud tags.
Cisco patched four critical vulnerabilities in Identity Services Engine and Webex Services that allow for remote code execution, root privilege escalation, and unauthenticated user impersonation.
Anthropic's Claude Code CLI contains three critical command injection vulnerabilities that allow attackers to execute arbitrary code and exfiltrate cloud credentials via environment variables, file paths, and authentication helpers. These flaws bypass the tool's internal sandbox and are particularly dangerous in CI/CD environments where trust dialogs are disabled.
Google released security updates for Chrome to fix 31 vulnerabilities, including five critical flaws that allow attackers to bypass the browser sandbox and execute malicious code.
A bug in GitHub's new webhook delivery platform (active Sept 2025–Jan 2026) inadvertently exposed webhook secrets in an HTTP header, potentially allowing attackers who obtained them to forge GitHub webhook payloads. GitHub has notified affected owners and urged them to immediately rotate their webhook secrets, purge any logs containing the exposed headers, and verify HMAC signature validation.
wolfSSL version 5.9.1 patched a critical flaw (CVE-2026-5194) that allows attackers to use forged certificates to impersonate trusted servers.
Fortinet reports two critical vulnerabilities in FortiSandbox (CVE-2026-39808 and CVE-2026-39813) that allow unauthenticated remote attackers to execute commands or bypass authentication via crafted HTTP requests.