Your Security Knowledge Base

Guides, frameworks, and practical resources for security managers, GRC professionals, and compliance teams. No vendor pitch - just the knowledge you need.

Today's News

Full summary โ†’
Krebs on Security

Russian Hackers Compromise Routers to Steal Microsoft Office Authentication Tokens

Russian military intelligence is exploiting known router vulnerabilities to harvest Microsoft Office authentication tokens. CISOs should immediately patch network devices and implement robust MFA to protect against credential theft.

Krebs on Security

Iran-Backed Group Claims Wiper Attack on Global Medtech Firm Stryker

An Iran-linked hacktivist group claims responsibility for a data-wiping attack against medical technology company Stryker. Organizations, especially in critical sectors, must enhance their data backup and recovery strategies and monitor for nation-state-backed wiper activity.

Krebs on Security

Microsoft Releases March 2026 Patch Tuesday Updates Addressing 77 Vulnerabilities

Microsoft has released security updates for 77 vulnerabilities across its products, with no zero-day flaws reported this month. CISOs must ensure timely patching of all affected Microsoft systems to mitigate potential exploitation.

BleepingComputer

Thousands of US Industrial Devices Exposed to Iranian Cyberattacks

Thousands of internet-exposed US industrial control systems (ICS) are vulnerable to Iranian-linked cyberattacks. CISOs with OT environments must conduct urgent asset discovery, reduce internet exposure, and implement robust segmentation and monitoring.

BleepingComputer

CPUID Supply Chain Attack Delivers Malware via CPU-Z and HWMonitor Downloads

Hackers compromised CPUID's API to distribute malicious versions of popular CPU-Z and HWMonitor tools via official download links. Organizations should verify software integrity, use trusted sources, and monitor for indicators of compromise related to these utilities.

BleepingComputer

Adobe Acrobat Reader Zero-Day Actively Exploited Since December

A zero-day vulnerability in Adobe Acrobat Reader has been actively exploited since December via malicious PDF documents. CISOs should ensure all Adobe Reader installations are updated immediately and educate users on suspicious attachments.

Updated 2026-04-11T06:49:08.469Z ยท Sources: CISA, Krebs, BleepingComputer, DarkReading, The Hacker News, SecurityWeek, The Record, NIST NVD, SANS ISC, HackerOne

Community Feed

Telegram channels
@CyberSecurityILื—ื•ืงืจ ืื‘ื˜"ืž, ืฉืœื ื”ื™ื” ืžืจื•ืฆื” ืžื”ืชื’ื•ื‘ื” ืฉืœ ืžื™ื™ืงืจื•ืกื•ืคื˜ ืœื“ื™ื•ื•ื— ืฉืœื•, ื”ื—ืœื™ื˜ ืœืฉื—ืจืจ ื—ื•ืœืฉืช Zero-Day ื‘ืื•ืคืŸ ืฆื™ื‘ื•ืจื™. ื”ื—ื•ืœืฉื” ืฉืงื™ื‘ืœื” ...@CyberSecurityIL- ืชื•ื›ืŸ ืฉื™ื•ื•ืงื™ - ื—ื’ ืคืกื— ืฉื ื™ ืฉืžื— ืž-CyberSafe ๐ŸŒฟ ื”ื™ื•ื ื–ื” OpIsrael ื•ืชื–ื›ื•ืจืช ื˜ื•ื‘ื” ืœื›ืš ื‘ืกื™ื™ื‘ืจ, ืœื ืชืžื™ื“ ื ื•ืคืœื™ื ืžืžื›ื” ืื—ืช ื’ื“ื•ืœื”. ืœ...@CyberSecurityILืื™ืš ืœื–ื”ื•ืช ื‘ืงืœื•ืช ื”ืืงืจ ืฆืคื•ืŸ ืงื•ืจื™ืื ื™ ืฉืžื ืกื” ืœื”ืกืชื ืŸ ืืœื™ื›ื ืœื—ื‘ืจื”. ืงืจื“ื™ื˜ ืœ-International Cyber Digest. https://t.me/CyberSecuri...@CyberSecurityILื™ื“ืขืชื ืฉืœืื™ืจืืŸ ื™ืฉ ืžืจื›ื– AI? ืื– ื›ื‘ืจ ืื™ืŸ. ืžื•ืงื“ื ื™ื•ืชืจ ื”ืฉื‘ื•ืข ืชืงืคื” ื™ืฉืจืืœ ืืช ืžืชืงืŸ ื”-AI ืฉืœ ื”ืžืฉื˜ืจ ื”ืื™ืจืื ื™ ื‘ืื•ื ื™ื‘ืจืกื™ื˜ืช ืฉืืจื™ืฃ ืฉื‘ื˜ื”ืจืŸ...@CyberSecurityIL"ื”ืฉืœื›ื•ืช ื—ืžื•ืจื•ืช": ืื ืช'ืจื•ืคื™ืง ื—ื•ืฉืคืช ืืช Mythos, ืžื•ื“ืœ ืฉืขื“ื™ื™ืŸ ืžืกื•ื›ืŸ ืžื“ื™ ืœืฉื™ืžื•ืฉ https://www.geektime.co.il/anthro...@CyberSecurityIL"ื”ืฉืœื›ื•ืช ื—ืžื•ืจื•ืช": ืื ืช'ืจื•ืคื™ืง ื—ื•ืฉืคืช ืืช Mythos, ืžื•ื“ืœ ืฉืขื“ื™ื™ืŸ ืžืกื•ื›ืŸ ืžื“ื™ ืœืฉื™ืžื•ืฉ https://www.geektime.co.il/anthro...@CyberSecurityILืžืชื•ืš ื”ื›ืชื‘ื”: ืœืคื™ Anthropic, ื™ื›ื•ืœื•ืช ื”ืกื™ื™ื‘ืจ ื”ื—ืจื™ื’ื•ืช ืฉืœื• ืฆืžื—ื• ื›ื—ืœืง ืžืื™ืžื•ืŸ ืจื—ื‘ ืขืœ ืžืฉื™ืžื•ืช ืชื›ื ื•ืช ื•ื ื™ืชื•ื— ืžืขืจื›ื•ืช ื‘ืกืงื™ื™ืœ, ื•ืœื ืžืื™ืž...@CyberSecurityILืงื‘ื•ืฆืช ShinyHunters ื˜ื•ืขื ืช ื›ื™ ืชืงืคื” ืืช ื—ื‘ืจืช Anodot ื”ื™ืฉืจืืœื™ืช (ื ื™ื˜ื•ืจ ื•ื–ื™ื”ื•ื™ ืื ื•ืžืœื™ื•ืช). ื—ื‘ืจืช Anodot ื ืจื›ืฉื” ืœืคื ื™ ืžืกืคืจ ื—ื•ื“ืฉื™ื ืข&q...

Top Vulnerabilities

Latest CVEs
HIGH 8.8
CVE-2026-35638

OpenClaw Control UI Unauthenticated Privilege Escalation

An unauthenticated privilege escalation vulnerability in OpenClaw's Control UI allows attackers to gain elevated access. Immediately patch OpenClaw to version 2026.3.22 or later to mitigate this critical risk.

HIGH 8.8
CVE-2026-39911

Hashgraph Guardian Unsandboxed JavaScript Execution

Hashgraph Guardian is vulnerable to unsandboxed JavaScript execution in its Custom Logic policy block worker, potentially leading to arbitrary code execution. Update Hashgraph Guardian to a patched version beyond 3.5.0 to prevent exploitation.

HIGH 8.8
CVE-2026-33785

Juniper Junos OS MX Series Missing Authorization Privilege Escalation

A missing authorization vulnerability in Juniper Junos OS on MX Series allows local, low-privileged users to escalate privileges. Apply the latest security patches to all affected Juniper MX Series devices to prevent unauthorized access.

HIGH 8.7
CVE-2025-13914

Juniper Apstra SSH Key Exchange Without Entity Authentication

Juniper Networks Apstra's SSH implementation is vulnerable to a Key Exchange without Entity Authentication, enabling unauthenticated Man-in-the-Middle attacks. Ensure Apstra is updated to a version that addresses this SSH vulnerability to protect against network interception.

HIGH 8.2
CVE-2023-54359

WordPress adivaha Travel Plugin Time-Based Blind SQL Injection

The WordPress adivaha Travel Plugin contains a time-based blind SQL injection vulnerability, allowing unauthenticated attackers to manipulate database content. Disable or remove the plugin immediately if in use, and update to a patched version as soon as available.

Browse by Topic

View all โ†’

Featured Articles

View all โ†’

Latest Posts

View all โ†’
Governance

Building a Security Program from Scratch: A Practical 90-Day Plan

Regulations

NIS2 Enforcement Starts Now - Are You Ready?

Risk Management

Third-Party Risk: How to Build a Vendor Assessment That Actually Works

AI Security

The AI Act Is Here: What Security Managers Need to Know

Crisis Management

Your BCP Is Probably Outdated: 5 Gaps to Fix Before the Next Incident

Tools We Recommend

View all โ†’
๐Ÿ”’

NordVPN

VPN & Privacy
From $3.39/mo
Our Review โ†’
๐Ÿ“ง

Proton

Encrypted Email & VPN
Free tier available
Our Review โ†’
๐Ÿ”‘

Bitwarden

Password Management
Free / $10/year
Our Review โ†’
๐ŸŽ“

TryHackMe

Security Training
From $10/mo
Our Review โ†’
๐Ÿ’€

HackTheBox

Pentesting Labs
Free / from $14/mo
Our Review โ†’
โ˜๏ธ

Prowler

Cloud Security Posture
Open source
Our Review โ†’
๐Ÿ”

Shodan

Attack Surface Discovery
Free / from $69/mo
Our Review โ†’
๐Ÿ›ก๏ธ

NordPass

Team Password Mgmt
From $1.49/mo
Our Review โ†’