Auto-updating • Public sources • Link-out only

Security Intel

Designed for engineers through CISOs: what is being exploited and what deserves attention. Always validate in your environment.

Feed status
CISA KEVOK
Wiz ResearchOK
AquaOK
Palo Alto Unit 42OK
SnykOK
Updated Mar 03, 2026 (auto-refresh ~15 min)
Showing 30 of 50
Palo Alto Unit 42Mar 02, 2026
Open ↗
Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel
A high-severity CVE-2026-0628 in Chrome's Gemini allowed local file access and privacy invasion. Google quickly patched the flaw. The post Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel appeared first on Unit 42.
Wiz ResearchFeb 27, 2026
Open ↗
The Agile FedRAMP Playbook, Part 3: Preventative Risk Management by building Secure by Design
In the third part of our series, we explore Preventative Risk Management. We discuss how shifting security into the development lifecycle helps organizations meet FedRAMP requirements.
CISA KEVFeb 25, 2026High
Open ↗
CVE-2022-20775 — Cisco SD-WAN
Cisco SD-WAN CLI contains a path traversal vulnerability that could allow an authenticated local attacker to gain elevated privileges via improper access controls on commands within the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.
CISA KEVFeb 25, 2026High
Open ↗
CVE-2026-20127 — Cisco Catalyst SD-WAN Controller and Manager
Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, contain an authentication bypass vulnerability could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.
Wiz ResearchFeb 24, 2026
Open ↗
Security Insights Where Work Happens: Notion Custom Agents + Wiz MCP
Bring Wiz cloud security insights into your Notion workspace with Custom Agents — enabling automated reporting, investigation, and security workflows where teams already work.
Palo Alto Unit 42Feb 24, 2026
Open ↗
Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security
Unit 42 research reveals most OT attacks begin in IT. Learn how edge-driven defense stops threats early and turns dwell time into advantage. The post Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security appeared first on Unit 42.
SnykFeb 24, 2026
Open ↗
The Rise of the AI Security Engineer: A New Discipline for an AI-Native World
As autonomous AI systems transform business, a new profession is emerging to protect them: the AI Security Engineer. Discover why this specialized discipline is becoming a survival imperative for organizations in an AI-native world.
SnykFeb 24, 2026
Open ↗
Snyk and uv, Better Together
Snyk and uv have teamed up to provide high-performance package management with native security for Python-based AI development. Build, install, and secure your AI-native applications from inception with Snyk’s native support for the uv ecosystem.
CISA KEVFeb 24, 2026High
Open ↗
CVE-2026-25108 — Soliton Systems K.K FileZen
Soliton Systems K.K FileZen contains an OS command injection vulnerability when an user logs-in to the affected product and sends a specially crafted HTTP request.
Wiz ResearchFeb 23, 2026
Open ↗
Wiz Leads the 2026 Latio Application Security Report with awards in 4 categories
Wiz has been recognized in the 2026 Latio Application Security Report. Wiz was spotlighted and awarded four distinct badges, reflecting our continuous commitment to protecting applications all the way from code to runtime.
SnykFeb 23, 2026
Open ↗
Fetch the Flag CTF 2026: Official Challenge Write-Ups & Community Highlights
Explore official write-ups and community highlights from the Fetch the Flag CTF 2026, featuring over 20 challenges in web security, AI, and crypto. Learn from the experts and dive into the technical details of this year's most intricate binary puzzles and web exploits.
SnykFeb 23, 2026
Open ↗
Claude Code Security: A Welcome Evolution in the Remediation Loop
Anthropic's Claude Code Security marks a major shift in vulnerability discovery, but AI-driven development requires more than just reasoning to remain secure. Learn how Snyk’s AI Security Fabric integrates with Claude to close the loop between finding vulnerabilities and fixing them at scale.
Wiz ResearchFeb 20, 2026
Open ↗
Building an Agentic Cloud Security Ecosystem: A Reference Architecture with Wiz MCP and Infosys Cyber Next
Coordinated Multi-Agent Investigation and Remediation
Wiz ResearchFeb 20, 2026
Open ↗
The Agile FedRAMP Playbook, Part 2: Proactive Risk Management with Continuous Monitoring
In the second part of our series, we dive into Proactive Risk Management. Discover how Wiz for U.S. Government automates visibility and prioritizes risk remediation to meet FedRAMP continuous monitoring requirements without slowing down innovation.
CISA KEVFeb 20, 2026High
Open ↗
CVE-2025-49113 — Roundcube Webmail
RoundCube Webmail contains a deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php.
CISA KEVFeb 20, 2026High
Open ↗
CVE-2025-68461 — Roundcube Webmail
RoundCube Webmail contains a cross-site scripting vulnerability via the animate tag in an SVG document.
Palo Alto Unit 42Feb 19, 2026
Open ↗
VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)
CVE-2026-1731 is an RCE vulnerability in identity platform BeyondTrust. This flaw allows attackers control of systems without login credentials. The post VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731) appeared first on Unit 42.
Wiz ResearchFeb 19, 2026
Open ↗
Cloud-native Security for your Windows environment: Announcing the Wiz Runtime Sensor for Windows
Secure your Windows fleet without sacrificing performance. Wiz pairs real-time threat detection with a memory-safe architecture that scales efficiently to protect your essential cloud infrastructure.
SnykFeb 19, 2026
Open ↗
How “Clinejection” Turned an AI Bot into a Supply Chain Attack
The Clinejection vulnerability chain illustrates a dangerous new era of supply chain attacks where AI agents are turned into exploit vectors. By combining indirect prompt injection with GitHub Actions cache poisoning, attackers successfully pushed unauthorized code to thousands of developers. This incident highlights the critical need for hardened CI/CD pipelines and rigorous security for AI-assisted coding tools.
Wiz ResearchFeb 18, 2026
Open ↗
Would You Click ‘Accept’? Automatically detecting malicious Azure OAuth applications using LLMs
How Wiz Research automates detection of emerging malicious Azure app and consent phishing campaigns.
CISA KEVFeb 18, 2026High
Open ↗
CVE-2021-22175 — GitLab GitLab
GitLab contains a server-side request forgery (SSRF) vulnerability when requests to the internal network for webhooks are enabled.
CISA KEVFeb 18, 2026High
Open ↗
CVE-2026-22769 — Dell RecoverPoint for Virtual Machines (RP4VMs)
Dell RecoverPoint for Virtual Machines (RP4VMs) contains an use of hard-coded credentials vulnerability that could allow an unauthenticated remote attacker to gain unauthorized access to the underlying operating system and root-level persistence.
Palo Alto Unit 42Feb 17, 2026
Open ↗
Critical Vulnerabilities in Ivanti EPMM Exploited
We discuss widespread exploitation of Ivanti EPMM zero-day vulns CVE-2026-1281 and CVE-2026-1340. Attackers are deploying web shells and backdoors. The post Critical Vulnerabilities in Ivanti EPMM Exploited appeared first on Unit 42.
Wiz ResearchFeb 17, 2026
Open ↗
Wiz Named a Leader in The Forrester Wave™: Cloud Native Application Protection Solutions, Q1 2026
Forrester’s CNAPP evaluation rated Wiz with the highest Current Offering category score, which we believe reflects our commitment to protecting everything built and run in the cloud.
CISA KEVFeb 17, 2026High
Open ↗
CVE-2020-7796 — Synacor Zimbra Collaboration Suite
Synacor Zimbra Collaboration Suite (ZCS) contains a server-side request forgery vulnerability if WebEx zimlet installed and zimlet JSP is enabled.
CISA KEVFeb 17, 2026High
Open ↗
CVE-2024-7694 — TeamT5 ThreatSonar Anti-Ransomware
TeamT5 ThreatSonar Anti-Ransomware contains an unrestricted upload of file with dangerous type vulnerability. ThreatSonar Anti-Ransomware does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system commands on the server.
CISA KEVFeb 17, 2026High
Open ↗
CVE-2008-0015 — Microsoft Windows
Microsoft Windows Video ActiveX Control contains a remote code execution vulnerability. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.
CISA KEVFeb 17, 2026High
Open ↗
CVE-2026-2441 — Google Chromium
Google Chromium CSS contains a use-after-free vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Wiz ResearchFeb 16, 2026
Open ↗
From Detection to Remediation: It’s Time to Rethink AppSec Around Exploitability and Root Cause Fixes
Learn how Wiz is fundamentally changing AppSec by using the Security Graph to connect validated runtime vulnerabilities directly back to source code. Stop chasing alerts and fix what’s truly exploitable.
Palo Alto Unit 42Feb 13, 2026
Open ↗
Phishing on the Edge of the Web and Mobile Using QR Codes
We discuss the extensive use of malicious QR codes using URL shorteners, in-app deep links and direct APK downloads to bypass mobile security. The post Phishing on the Edge of the Web and Mobile Using QR Codes appeared first on Unit 42.
Notes
  • • This page aggregates public feeds and links out; it does not scan your environment.
  • • Treat items as signals: verify applicability, exposure, and exploitability before action.
  • • For exec-ready prioritization, pair this with the Reality Assessment.