Take action on the latest cybersecurity events

Cybersecurity advisories and events as they happen, with a clear action you can take.

CISA has confirmed the active exploitation of three Cisco Catalyst SD-WAN Manager vulnerabilities (CVE-2026-20122, CVE-2026-20128, and CVE-2026-20133) that allow attackers to overwrite system files, steal credentials, and access sensitive data. Federal agencies are required to patch these flaws by April 23, 2026, to mitigate risks of unauthorized system takeover.
CISA added a high-severity Apache ActiveMQ vulnerability (CVE-2026-34197) to its KEV catalog due to active exploitation that allows attackers to run arbitrary OS commands via the Jolokia API. The flaw is particularly dangerous when chained with CVE-2024-32114, which enables unauthenticated remote code execution in certain versions.
nginx-ui patched a critical authentication bypass (CVE-2026-33032) in its MCP integration that allows unauthenticated attackers to take over Nginx services and intercept traffic. The flaw is actively exploited in the wild and affects over 2,600 internet-exposed instances.
ShowDoc is facing active exploitation of a critical unauthenticated remote code execution vulnerability (CVE-2025-0520) caused by improper file upload validation. Attackers are using this flaw to deploy web shells and gain full control over unpatched servers.
CPUID's official website was compromised to distribute the STX RAT infostealer through poisoned download links for popular tools like CPU-Z and HWMonitor. The attack used DLL sideloading and masquerading to bypass security defenses and target organizations across multiple global sectors.
Marimo patched a critical RCE vulnerability (CVE-2026-39987) that was exploited within 10 hours of disclosure to steal cloud credentials and SSH keys. The flaw allows unauthenticated attackers to gain full interactive shell access via a WebSocket authentication bypass.
A zero-day actively exploited vulnerability in Adobe Reader's JavaScript engine allows attackers to exfiltrate system data and potentially execute remote code via malicious PDF files.
Flowise is facing active exploitation of CVE-2025-59528, a critical vulnerability that allows attackers to execute arbitrary JavaScript and take full control of AI workflow servers.
A coordinated supply chain attack involving 36 malicious npm packages targeted the cryptocurrency platform Guardarian to steal database credentials and wallet keys. The campaign exploited Redis and Docker vulnerabilities to deploy persistent, fileless backdoors on production Strapi CMS servers.
Fortinet has released emergency hotfix for an actively exploited critical zero-day vulnerability (CVE-2026-35616) in FortiClient EMS that allows unauthenticated attackers to bypass API security and run arbitrary commands.