╔════[ DATA_BREACH ]══════════
│ Eurail B.V., a European travel operator that provides digital passes covering 33 national railways, says attackers stole the personal information of over 300,000 individuals in a December 2025 data breach. [...]
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.bleepingcomputer.com
│ Author: Sergiu Gatlan
└────────────────────────────────────┘
╔════[ DATA_BREACH ]══════════
│ L’incidente collegato al gruppo TeamPCP riaccende il dibattito sulla sicurezza del cloud. Dati europei sono esposti in un’infrastruttura cloud compromessa. Tra misconfigurazioni, credenziali deboli e responsabilità condivise, emerge un rischio sistemico
L'articolo Data breach cloud in Europa: TeamPCP svela la fragilità strutturale della sicurezza multi-tenant proviene da Cyber Security 360.
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.cybersecurity360.it
│ Author: Marco Armoni
└────────────────────────────────────┘
╔════[ ITALY_INCIDENT ]══════
│ Le moderne campagne di disinformazione russa sono veloci, scalabili e difficilissime da arginare una volta diffuse. Ecco il caso più emblematico in Francia e come contrastare la disinformazione con un approccio integrato contro reti ibride che fungono da proxy, dove nel mirino è il ruolo di Macron come uno dei più accesi sostenitori dell'Ucraina in ambito europeo
L'articolo Cosa impariamo dal Paese UE più massacrato dalla disinformazione russa proviene da Cyber Security 360.
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.cybersecurity360.it
│ Author: Tommaso Diddi e Laura Teodonno
└────────────────────────────────────┘
╔════[ ITALY_INCIDENT ]══════
│ Il National Supercomputing Center (NSCC) di Tianjin in Cina ha subito la sottrazione di oltre 10 petabyte di dati sensibili. L'esfiltrazione di dati nel settore della ricerca scientifica e militare pone interrogativi sulla sicurezza delle infrastrutture critiche di calcolo ad alte prestazioni. Ecco i quesiti aperti e le implicazioni geopolitiche di simili eventi
L'articolo L’hub cinese del supercomputing colpito da una massiccia violazione di dati: cosa sappiamo proviene da Cyber Security 360.
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.cybersecurity360.it
│ Author: Laura Teodonno e Tommaso Diddi
└────────────────────────────────────┘
╔════[ ITALY_INCIDENT ]══════
│ L’attacco che ha coinvolto Axios rappresenta un cambiamento nel modo in cui le vulnerabilità vengono sfruttate e nel livello a cui gli attacchi si collocano. È quindi necessario ripensare il rapporto tra tecnologia, governance e regolazione, riconoscendo il ruolo centrale della supply chain software e dell’open source. Ecco perché
L'articolo L’attacco invisibile a Axios: quando la sicurezza fallisce nella supply chain del software proviene da Cyber Security 360.
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.cybersecurity360.it
│ Author: Tania Orrù
└────────────────────────────────────┘
╔════[ ITALY_INCIDENT ]══════
│ Solo affrontando congiuntamente i tre pilastri - hardware, persone e standard - sarà possibile passare dall'era sperimentale a quella del robusto vantaggio quantistico resistente agli errori. Ecco cos'è e le prospettive future del calcolo quantistico
L'articolo Calcolo quantistico: caratteristiche, servizi cloud e applicazioni emergenti proviene da Cyber Security 360.
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.cybersecurity360.it
│ Author: Vincenzo Calabrò
└────────────────────────────────────┘
╔════[ CRITICAL_CVE ]═════════
│ CVE ID :CVE-2025-62718
Published : April 9, 2026, 3:16 p.m. | 19 minutes ago
Description :Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0, Axios does not correctly handle hostname normalization when checking NO_PROXY rules. Requests to loopback addresses like localhost. (with a trailing dot) or [::1] (IPv6 literal) skip NO_PROXY matching and go through the configured proxy. This goes against what developers expect and lets attackers force requests through a proxy, even if NO_PROXY is set up to protect loopback or internal services. This issue leads to the possibility of proxy bypass and SSRF vulnerabilities allowing attackers to reach sensitive loopback or internal services despite the configured protections. This vulnerability is fixed in 1.15.0.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
┌─[ METADATA ]───────────────────────┐
│ Source: https://cvefeed.io
| CVE ID :CVE-2025-62718
| Severity: 9.3 | CRITICAL
└────────────────────────────────────┘
╔════[ CRITICAL_CVE ]═════════
│ CVE ID :CVE-2025-57735
Published : April 9, 2026, 11:16 a.m. | 4 hours, 19 minutes ago
Description :When user logged out, the JWT token the user had authtenticated with was not invalidated, which could lead to reuse of that token in case it was intercepted. In Airflow 3.2 we implemented the mechanism that implements token invalidation at logout. Users who are concerned about the logout scenario and possibility of intercepting the tokens, should upgrade to Airflow 3.2+
Users are recommended to upgrade to version 3.2.0, which fixes this issue.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
┌─[ METADATA ]───────────────────────┐
│ Source: https://cvefeed.io
| CVE ID :CVE-2025-57735
| Severity: 9.1 | CRITICAL
└────────────────────────────────────┘
╔════[ CRITICAL_CVE ]═════════
│ CVE ID :CVE-2026-34179
Published : April 9, 2026, 10:16 a.m. | 5 hours, 19 minutes ago
Description :In Canonical LXD versions 4.12 through 6.7, the doCertificateUpdate function in lxd/certificates.go does not validate the Type field when handling PUT/PATCH requests to /1.0/certificates/{fingerprint} for restricted TLS certificate users, allowing a remote authenticated attacker to escalate privileges to cluster admin.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
┌─[ METADATA ]───────────────────────┐
│ Source: https://cvefeed.io
| CVE ID :CVE-2026-34179
| Severity: 9.1 | CRITICAL
└────────────────────────────────────┘
╔════[ CRITICAL_CVE ]═════════
│ CVE ID :CVE-2026-34178
Published : April 9, 2026, 10:16 a.m. | 5 hours, 19 minutes ago
Description :In Canonical LXD before 6.8, the backup import path validates project restrictions against backup/index.yaml in the supplied tar archive but creates the instance from backup/container/backup.yaml, a separate file in the same archive that is never checked against project restrictions. An authenticated remote attacker with instance-creation permission in a restricted project can craft a backup archive where backup.yaml carries restricted settings such as security.privileged=true or raw.lxc directives, bypassing all project restriction enforcement and allowing full host compromise.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
┌─[ METADATA ]───────────────────────┐
│ Source: https://cvefeed.io
| CVE ID :CVE-2026-34178
| Severity: 9.1 | CRITICAL
└──────────────────���─────────────────┘
╔════[ CRITICAL_CVE ]═════════
│ CVE ID :CVE-2026-34177
Published : April 9, 2026, 10:16 a.m. | 5 hours, 19 minutes ago
Description :Canonical LXD versions 4.12 through 6.7 contain an incomplete denylist in isVMLowLevelOptionForbidden (lxd/project/limits/permissions.go), which omits raw.apparmor and raw.qemu.conf from the set of keys blocked under the restricted.virtual-machines.lowlevel=block project restriction. A remote attacker with can_edit permission on a VM instance in a restricted project can inject an AppArmor rule and a QEMU chardev configuration that bridges the LXD Unix socket into the guest VM, enabling privilege escalation to LXD cluster administrator and subsequently to host root.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
┌─[ METADATA ]───────────────────────┐
│ Source: https://cvefeed.io
| CVE ID :CVE-2026-34177
| Severity: 9.1 | CRITICAL
└────────────────────────────────────┘
╔════[ CRITICAL_CVE ]═════════
│ CVE ID :CVE-2026-5854
Published : April 9, 2026, 7:16 a.m. | 8 hours, 19 minutes ago
Description :A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setWiFiEasyCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument merge results in os command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
Severity: 10.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
┌─[ METADATA ]───────────────────────┐
│ Source: https://cvefeed.io
| CVE ID :CVE-2026-5854
| Severity: 10.0 | HIGH
└────────────────────────────────────┘
╔════[ CRITICAL_CVE ]═════════
│ CVE ID :CVE-2026-5853
Published : April 9, 2026, 7:16 a.m. | 8 hours, 19 minutes ago
Description :A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this vulnerability is the function setIpv6LanCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument addrPrefixLen leads to os command injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
Severity: 10.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
┌─[ METADATA ]───────────────────────┐
│ Source: https://cvefeed.io
| CVE ID :CVE-2026-5853
| Severity: 10.0 | HIGH
└────────────────────────────────────┘
╔════[ CRITICAL_CVE ]═════════
│ CVE ID :CVE-2026-5852
Published : April 9, 2026, 7:16 a.m. | 8 hours, 19 minutes ago
Description :A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setIptvCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument igmpVer causes os command injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks.
Severity: 10.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
┌─[ METADATA ]───────────────────────┐
│ Source: https://cvefeed.io
| CVE ID :CVE-2026-5852
| Severity: 10.0 | HIGH
└────────────────────────────────────┘
╔════[ CRITICAL_CVE ]═════════
│ CVE ID :CVE-2026-5851
Published : April 9, 2026, 6:16 a.m. | 9 hours, 19 minutes ago
Description :A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable results in os command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.
Severity: 10.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
┌─[ METADATA ]───────────────────────┐
│ Source: https://cvefeed.io
| CVE ID :CVE-2026-5851
| Severity: 10.0 | HIGH
└────────────────────────────────────┘
╔════[ CRITICAL_CVE ]═════════
│ CVE ID :CVE-2026-5850
Published : April 9, 2026, 6:16 a.m. | 9 hours, 19 minutes ago
Description :A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument pptpPassThru leads to os command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Severity: 10.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
┌─[ METADATA ]───────────────────────┐
│ Source: https://cvefeed.io
| CVE ID :CVE-2026-5850
| Severity: 10.0 | HIGH
└────────────────────────────────────┘
╔════[ CRITICAL_CVE ]═════════
│ CVE ID :CVE-2026-1830
Published : April 9, 2026, 5:16 a.m. | 10 hours, 19 minutes ago
Description :The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.1. This is due to insufficient authorization checks on REST API endpoints that expose a sync code and allow arbitrary file uploads. This makes it possible for unauthenticated attackers to retrieve the sync code, upload PHP files with path traversal, and achieve remote code execution on the server.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
┌─[ METADATA ]───────────────────────┐
│ Source: https://cvefeed.io
| CVE ID :CVE-2026-1830
| Severity: 9.8 | CRITICAL
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ Thursday. Another week, another batch of things that probably should've been caught sooner but weren't.
This one's got some range — old vulnerabilities getting new life, a few "why was that even possible" moments, attackers leaning on platforms and t…
┌─[ METADATA ]───────────────────────┐
│ Source: https://thehackernews.com
│ Author: info@thehackernews.com (The Hacker News)
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ As AI tools become more accessible, employees are adopting them without formal approval from IT and security teams. While these tools may boost productivity, automate tasks, or fill gaps in existing workflows, they also operate outside the visibility…
┌─[ METADATA ]───────────────────────┐
│ Source: https://thehackernews.com
│ Author: info@thehackernews.com (The Hacker News)
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025.
The finding, detailed by EXPMON's Haifei Li, has been described as a highly-sophistic…
┌─[ METADATA ]───────────────────────┐
│ Source: https://thehackernews.com
│ Author: info@thehackernews.com (The Hacker News)
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ An apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and government officials across the Middle East and North Africa (MENA), according to findings from…
┌─[ METADATA ]───────────────────────┐
│ Source: https://thehackernews.com
│ Author: info@thehackernews.com (The Hacker News)
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ Stolen credentials turn authentication systems into the attack surface. Token shows how wearable biometric authentication verifies the user—not the session—blocking phishing relays and MFA bypass. [...]…
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.bleepingcomputer.com
│ Author: Sponsored by Token
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ Threat actors often signal their intentions before launching attacks, from dark web chatter to access-broker listings and credential requests. Join our upcoming webinar with Flare Systems to learn how to turn those early warning signs into proactive …
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.bleepingcomputer.com
│ Author: BleepingComputer
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ Attackers have been exploiting a zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December. [...]…
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.bleepingcomputer.com
│ Author: Sergiu Gatlan
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ Bitcoin Depot, which operates one of the largest Bitcoin ATM networks, says attackers stole .665 million worth of Bitcoin from its crypto wallets after breaching its systems last month. [...]…
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.bleepingcomputer.com
│ Author: Sergiu Gatlan
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ Microsoft has suspended developer accounts used to maintain multiple high-profile open-source projects without proper notification and no way to quickly reinstate them, effectively blocking them from publishing new software builds and security patche…
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.bleepingcomputer.com
│ Author: Sergiu Gatlan
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ RSAC researchers hacked Apple Intelligence using the Neural Exect method and Unicode manipulation.
The post Apple Intelligence AI Guardrails Bypassed in New Attack appeared first on SecurityWeek.…
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.securityweek.com
│ Author: Eduard Kovacs
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ From hallucinations and bias to model collapse and adversarial abuse, today’s AI is built on probability rather than truth, yet enterprises are deploying it at speed without fully understanding the risks.
The post Can we Trust AI? No – But Eventually…
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.securityweek.com
│ Author: Kevin Townsend
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ Dozens of such keys can be extracted from apps’ decompiled code to gain access to all Gemini endpoints.
The post Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access appeared first on SecurityWeek.…
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.securityweek.com
│ Author: Ionut Arghire
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ The bugs could allow attackers to modify protected resources and escalate their privileges to administrator.
The post Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities appeared first on SecurityWeek.…
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.securityweek.com
│ Author: Ionut Arghire
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions.
The post The Hidden ROI of Visibility: Better Decisions, Better Beh…
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.securityweek.com
│ Author: Joshua Goldfarb
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ Tracked as UNC6783, the threat actor is likely linked to Mr. Raccoon, the hacker behind the alleged theft of Adobe data from a BPO.
The post Google Warns of New Campaign Targeting BPOs to Steal Corporate Data appeared first on SecurityWeek.…
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.securityweek.com
│ Author: Ionut Arghire
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ Reputable researcher Haifei Li has come across what appears to be a PDF designed to exploit an unpatched vulnerability.
The post Adobe Reader Zero-Day Exploited for Months: Researcher appeared first on SecurityWeek.…
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.securityweek.com
│ Author: Eduard Kovacs
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ In December 2025, hackers stole names and passport numbers from the European travel company’s network.
The post 300,000 People Impacted by Eurail Data Breach appeared first on SecurityWeek.…
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.securityweek.com
│ Author: Ionut Arghire
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ A hacker transferred more than 50 bitcoin from the Bitcoin ATM operator’s wallets after stealing credentials.
The post .6 Million Stolen in Bitcoin Depot Hack appeared first on SecurityWeek.…
┌─[ METADATA ]───────────────────────┐
│ Source: https://www.securityweek.com
│ Author: Eduard Kovacs
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ LayerX researchers have discovered how to bypass Claude Code’s safety rules using the CLAUDE.md file. This exploit allows……
┌─[ METADATA ]───────────────────────┐
│ Source: https://hackread.com
│ Author: Deeba Ahmed
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ Austin, Texas, United States, 9th April 2026, CyberNewswire…
┌─[ METADATA ]───────────────────────┐
│ Source: https://hackread.com
│ Author: CyberNewswire
└────────────────────────────────────┘
╔════[ THREAT ]══════════════
│ macOS Malware notnullOSX targets crypto wallets over 0K, using fake apps, Terminal tricks, and backdoors to steal funds and sensitive data.…
┌─[ METADATA ]───────────────────────┐
│ Source: https://hackread.com
│ Author: Deeba Ahmed
└────────────────────────────────────┘