Cybersecurity
- Schneider Electric Plant iT/Brewmaxx
<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-083-03.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities could risk privilege escalation, which could result in remote code executio…
- Pharos Controls Mosaic Show Controller
<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-083-01.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could allow an unauthenticated attacker to execute arbitrary commands with roo…
- Schneider Electric EcoStruxure Foxboro DCS
View CSAF Summary Schneider Electric is aware of a vulnerability in its EcoStruxure Foxboro DCS Control Software on Foxboro DCS workstations and servers. Control Core Services and all runtime software, like FCPs, FDCs, and FBMs, are not affected. The EcoStruxure Foxboro DCS ([https://www.se.com/ww/en/product-range/63680-ecostruxure-foxboro-dcs/](https://www.se.com/ww/en/product-range/63680-ecostruxure-foxboro-dcs/)) product is an innovative family of fault-tolerant, highly available control comp…
- Schneider Electric Plant iT/Brewmaxx
View CSAF Summary Successful exploitation of these vulnerabilities could risk privilege escalation, which could result in remote code execution. The following versions of Schneider Electric Plant iT/Brewmaxx are affected: Plant iT/Brewmaxx 9.60_and_above (CVE-2025-49844, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819) CVSS Vendor Equipment Vulnerabilities v3 9.9 Schneider Electric Schneider Electric Plant iT/Brewmaxx Use After Free, Integer Overflow or Wraparound, Improper Control of Generation …
- Pharos Controls Mosaic Show Controller
View CSAF Summary Successful exploitation of this vulnerability could allow an unauthenticated attacker to execute arbitrary commands with root privileges. The following versions of Pharos Controls Mosaic Show Controller are affected: Mosaic Show Controller Firmware 2.15.3 (CVE-2026-2417) CVSS Vendor Equipment Vulnerabilities v3 9.8 Pharos Controls Pharos Controls Mosaic Show Controller Missing Authentication for Critical Function Background Critical Infrastructure Sectors: Commercial Facilities…
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran
A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or have Farsi set as the default language.
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran
A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or have Farsi set as the default language.
- Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets -- named Aisuru, Ki…
- Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets -- named Aisuru, Kimwolf, JackSkid and Mossad -- are responsible for a series of recent record-smashing distributed denial-of-service (DDoS) attacks capable of knocking nearly any target offline.
- Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,…
- Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.
- Microsoft Patch Tuesday, March 2026 Edition
Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing "zero-day" flaws this month (compared to February's five zero-day treat), but as usual some patches may deserve more rapid attention from organizatio…
- Microsoft Patch Tuesday, March 2026 Edition
Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing "zero-day" flaws this month (compared to February's five zero-day treat), but as usual some patches may deserve more rapid attention from organizations using Windows. Here are a few highlights from this month's Patch Tuesday.
- How AI Assistants are Moving the Security Goalposts
AI-based assistants or "agents" -- autonomous programs that have access to the user's computer, files, online services and can automate virtually any task -- are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlines over the past few weeks have shown, these…
- How AI Assistants are Moving the Security Goalposts
AI-based assistants or "agents" -- autonomous programs that have access to the user's computer, files, online services and can automate virtually any task -- are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlines over the past few weeks have shown, these powerful and assertive new tools are rapidly shifting the security priorities for organizations, while blurring the lines between data and code, trusted co-worker and insider threat, ninja hacker and n…
- [webapps] WordPress Backup Migration 1.3.7 - Remote Command Execution
WordPress Backup Migration 1.3.7 - Remote Command Execution
- [webapps] mailcow 2025-01a - Host Header Password Reset Poisoning
mailcow 2025-01a - Host Header Password Reset Poisoning
- [webapps] Easy File Sharing Web Server v7.2 - Buffer Overflow
Easy File Sharing Web Server v7.2 - Buffer Overflow
- [webapps] WeGIA 3.5.0 - SQL Injection
WeGIA 3.5.0 - SQL Injection
- [webapps] Boss Mini v1.4.0 - Local File Inclusion (LFI)
Boss Mini v1.4.0 - Local File Inclusion (LFI)
- Who is the Kimwolf Botmaster “Dort”?
In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world's largest and most disruptive botnet. Since then, the person in control of Kimwolf -- who goes by the handle "Dort" -- has coordinated a barrage of dist…
- Who is the Kimwolf Botmaster “Dort”?
In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world's largest and most disruptive botnet. Since then, the person in control of Kimwolf -- who goes by the handle "Dort" -- has coordinated a barrage of distributed denial-of-service (DDoS), doxing and email flooding attacks against the researcher and this author, and more recently caused a SWAT team to be sent to the researcher's home. This post examines wh…
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised lin…
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the target and the legitimate site -- forwarding the victim's username, password and multi-factor authentic…
- [webapps] motionEye 0.43.1b4 - RCE
motionEye 0.43.1b4 - RCE
- [remote] Windows 10.0.17763.7009 - spoofing vulnerability
Windows 10.0.17763.7009 - spoofing vulnerability
- [local] glibc 2.38 - Buffer Overflow
glibc 2.38 - Buffer Overflow
- Top 10 web hacking techniques of 2025
Welcome to the Top 10 Web Hacking Techniques of 2025, the 19th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year
- [remote] windows 10/11 - NTLM Hash Disclosure Spoofing
windows 10/11 - NTLM Hash Disclosure Spoofing
- [remote] Redis 8.0.2 - RCE
Redis 8.0.2 - RCE
- [webapps] OctoPrint 1.11.2 - File Upload
OctoPrint 1.11.2 - File Upload
- [remote] Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE
Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE
- [webapps] aiohttp 3.9.1 - directory traversal PoC
aiohttp 3.9.1 - directory traversal PoC
- [webapps] FortiWeb Fabric Connector 7.6.x - SQL Injection to Remote Code Execution
FortiWeb Fabric Connector 7.6.x - SQL Injection to Remote Code Execution
- [local] Docker Desktop 4.44.3 - Unauthenticated API Exposure
Docker Desktop 4.44.3 - Unauthenticated API Exposure
- [webapps] Piranha CMS 12.0 - Stored XSS in Text Block
Piranha CMS 12.0 - Stored XSS in Text Block
- [webapps] RPi-Jukebox-RFID 2.8.0 - Stored Cross-Site Scripting (XSS)
RPi-Jukebox-RFID 2.8.0 - Stored Cross-Site Scripting (XSS)
- [hardware] D-Link DIR-825 Rev.B 2.10 - Stack Buffer Overflow (DoS)
D-Link DIR-825 Rev.B 2.10 - Stack Buffer Overflow (DoS)
- /r/netsec's Q1 2026 Information Security Hiring Thread
<!-- SC_OFF --><div class="md"><p><strong>Overview</strong></p> <p>If you have open positions at your company for information security professionals and would like to hire from the <a href="/r/netsec">/r/netsec</a> user base, please leave a comment detailing any…
- /r/netsec's Q1 2026 Information Security Hiring Thread
Overview If you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company. We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education. Please reserve top level comments for those posting open positions. Rules & Guidelines Include the company name in the post. If…
- [webapps] RPi-Jukebox-RFID 2.8.0 - Remote Command Execution
RPi-Jukebox-RFID 2.8.0 - Remote Command Execution
- [webapps] Siklu EtherHaul Series EH-8010 - Arbitrary File Upload
Siklu EtherHaul Series EH-8010 - Arbitrary File Upload
- [webapps] Siklu EtherHaul Series EH-8010 - Remote Command Execution
Siklu EtherHaul Series EH-8010 - Remote Command Execution
- Top 10 web hacking techniques of 2025: call for nominations
Update: nominations are now closed, and voting is live! Cast your vote here Over the last year, security researchers have shared a huge amount of work with the community through blog posts, presentati
- [webapps] WordPress Quiz Maker 6.7.0.56 - SQL Injection
WordPress Quiz Maker 6.7.0.56 - SQL Injection
- [webapps] Chained Quiz 1.3.5 - Unauthenticated Insecure Direct Object Reference via Cookie
Chained Quiz 1.3.5 - Unauthenticated Insecure Direct Object Reference via Cookie
- [webapps] FreeBSD rtsold 15.x - Remote Code Execution via DNSSL
FreeBSD rtsold 15.x - Remote Code Execution via DNSSL
- [webapps] Summar Employee Portal 3.98.0 - Authenticated SQL Injection
Summar Employee Portal 3.98.0 - Authenticated SQL Injection
- [webapps] esm-dev 136 - Path Traversal
esm-dev 136 - Path Traversal
- The Fragile Lock: Novel Bypasses For SAML Authentication
TLDR This post shows how to achieve a full authentication bypass in the Ruby and PHP SAML ecosystem by exploiting several parser-level inconsistencies: including attribute pollution, namespace confusi