Aggregator
US: FCC Bans Foreign-Made Routers Over National Security Concerns
AI-Native Security Is a Must to Counter AI-Based Attacks
Fake OpenClaw Token Giveaway Targets GitHub Devs with Wallet-Draining Scam
CVE-2026-23053 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 nfs_release_folio deadlock (Nessus ID 297935 / WID-SEC-2026-0324)
CVE-2026-4349 | Duende IdentityServer4 up to 4.1.2 Token Renewal Endpoint /connect/authorize id_token_hint improper authentication
CVE-2026-4454 | Google Chrome up to 146.0.7680.75 Network use after free (ID 488585 / Nessus ID 303234)
CVE-2026-4455 | Google Chrome up to 146.0.7680.75 PDFium heap-based overflow (ID 488585 / Nessus ID 303234)
CVE-2026-4453 | Google Chrome up to 146.0.7680.75 on macOS Dawn external control of assumed-immutable web parameter (ID 488400 / Nessus ID 303234)
CVE-2026-4456 | Google Chrome up to 146.0.7680.75 HTML Page use after free (ID 488617 / Nessus ID 303234)
CVE-2026-4457 | Google Chrome up to 146.0.7680.75 V8 type confusion (ID 488803 / Nessus ID 303234)
CVE-2026-23244 | Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc2 nvme_pr_read_keys num_keys allocation of resources (EUVD-2026-12805 / Nessus ID 302911)
CVE-2026-23246 | Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc1 wifi ieee80211_ml_reconfiguration link_id out-of-bounds (EUVD-2026-12809 / Nessus ID 302910)
CVE-2026-23245 | Linux Kernel up to 6.18.17/6.19.7/7.0-rc2 call_rcu state issue (EUVD-2026-12808 / Nessus ID 302909)
CVE-2026-23050 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 pNFS open deadlock (Nessus ID 297965 / WID-SEC-2026-0324)
Китай, США и полмиллиона дыр в безопасности. Старые серверы Microsoft превратились в легкую добычу
2026 Cybersecurity Excellence Awards Winners Announced during RSA Conference as AI Security Dominates
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2026-33017 Langflow Code Injection Vulnerability
This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.