No Arrests, But Virtual Servers, IP Addresses Seized and Residencies Searched U.S. authorities seized KimWolf - the attack infrastructure responsible for the largest distributed denial of service attack yet recorded in an international police operation that swept up servers underpinning four botnets.
Contec and Epsimed Monitors Containing 'Backdoors' Are at the Center of Order Texas Gov. Abbott has ordered agencies to review foreign-made connected medical devices - especially those from Chinese manufacturers - used in state-owned facilities for cybersecurity issues that could pose security and privacy risks to patients and healthcare infrastructure.
Also: CISA Protocol Concerns, AI Agents Push Past Cybersecurity Controls In this week's panel, four ISMG editors unpacked the cyber dimensions of the Stryker attack amid the escalating Iran-Israel-U.S. tensions, the growing controversy around CISA leadership and alleged protocol breaches, and a new set of concerns related to AI agents bypassing security controls.
New Handala Site Is Also Available U.S. federal agents seized four web domains associated with Iranian hacking operations days after a threat actor going by Handala posted screenshots it said came from inside the IT systems of medical device manufacturer Stryker. The registrars used to create them are located in the United States.
A vulnerability was found in systemsrtk Ricerca Plugin up to 1.1.12 on WordPress. It has been rated as problematic. Affected is an unknown function of the component Setting Handler. This manipulation causes cross site scripting.
The identification of this vulnerability is CVE-2026-2837. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in frankkoenen login_register Plugin up to 1.2.0 on WordPress. It has been declared as problematic. This impacts an unknown function of the component Setting Handler. The manipulation of the argument login_register_login_post results in cross-site request forgery.
This vulnerability was named CVE-2026-1503. The attack may be performed from remote. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability was found in waianaeboy702 Eds Font Awesome Plugin up to 2.0 on WordPress. It has been classified as problematic. This affects the function eds_font_awesome of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2026-2496. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in OpenClaw up to 2026.2.24 and classified as critical. The impacted element is an unknown function. Executing a manipulation can lead to link following.
This vulnerability is handled as CVE-2026-32054. It is possible to launch the attack on the local host. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in waianaeboy702 Ed's Social Share Plugin up to 2.0 on WordPress and classified as problematic. The affected element is the function social_share of the component Shortcode Handler. Performing a manipulation results in cross site scripting.
This vulnerability is known as CVE-2026-2501. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in devsoftbaltic SurveyJS Plugin up to 2.5.3 on WordPress. Impacted is an unknown function. Such manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2026-2440. The attack may be launched remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in OpenClaw up to 2026.3.1. This issue affects some unknown processing of the component Archive Extraction Handler. This manipulation causes highly compressed data.
This vulnerability appears as CVE-2026-32044. The attack requires local access. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in phy9pas Post Snippits Plugin up to 1.0 on WordPress. This vulnerability affects unknown code of the component Setting Handler. The manipulation results in cross-site request forgery.
This vulnerability is reported as CVE-2026-2723. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability classified as problematic has been found in kazunii itsukaita Plugin up to 0.1.2 on WordPress. This affects an unknown part of the component Parameters Handler. The manipulation of the argument day_from/day_to leads to cross site scripting.
This vulnerability is documented as CVE-2026-2427. The attack can be initiated remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in applixir Reward Video Ad for WordPress Plugin up to 1.6 on WordPress. Affected by this issue is some unknown functionality of the component Setting Handler. Executing a manipulation can lead to cross site scripting.
This vulnerability is registered as CVE-2026-2424. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in viaviwebtech Twitter Feeds Plugin up to 1.0.0 on WordPress. Affected by this vulnerability is the function TwitterFeeds of the component Shortcode Handler. Performing a manipulation of the argument tweet_title results in cross site scripting.
This vulnerability is cataloged as CVE-2026-1911. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.