CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

04/02/2026 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) to its Known Exploited Vulnerabilities (KEV) catalog, flagging it

Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

04/02/2026 0 Comments 0 tags

The Eclipse Foundation, which maintains the Open VSX Registry, has announced plans to enforce security checks before Microsoft Visual Studio Code (VS Code) extensions are published to the open-source repository

Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata

03/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a now-patched security flaw impacting Ask Gordon, an artificial intelligence (AI) assistant built into Docker Desktop and the Docker Command-Line Interface (CLI), that could

Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

03/02/2026 0 Comments 0 tags

Threat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular “@react-native-community/cli” npm package. Cybersecurity company VulnCheck said it first observed exploitation of

[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate

03/02/2026 0 Comments 0 tags

Most security teams today are buried under tools. Too many dashboards. Too much noise. Not enough real progress. Every vendor promises “complete coverage” or “AI-powered automation,” but inside most SOCs,

When Cloud Outages Ripple Across the Internet

03/02/2026 0 Comments 0 tags

Recent major cloud service outages have been hard to miss. High-profile incidents affecting providers such as AWS, Azure, and Cloudflare have disrupted large parts of the internet, taking down websites

APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks

03/02/2026 0 Comments 0 tags

The Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office as part of a campaign codenamed

Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox

03/02/2026 0 Comments 0 tags

Mozilla on Monday announced a new controls section in its Firefox desktop browser settings that allows users to completely turn off generative artificial intelligence (GenAI) features. “It provides a single

Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group

03/02/2026 0 Comments 0 tags

A China-linked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the infrastructure hosting Notepad++. The attack enabled the state-sponsored hacking

Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

02/02/2026 0 Comments 0 tags

A security audit of 2,857 skills on ClawHub has found 341 malicious skills across multiple campaigns, according to new findings from Koi Security, exposing users to new supply chain risks.