← Back to Monitor

Daily Report — 2026-03-02

63 relevant threats from 63 items across 7 sources.

0
Critical
0
High
63
Medium
0
Low

Medium (63)

medium ClawJacked attack let malicious websites hijack OpenClaw to steal data
BleepingComputer uncategorized

Security researchers have disclosed a high-severity vulnerability dubbed "ClawJacked" in the popular AI agent OpenClaw that allowed a malicious website to silently bruteforce access to a locally runni

medium Samsung TVs to stop collecting Texans’ data without express consent
BleepingComputer uncategorized

Samsung and the State of Texas have reached a settlement agreement over the alleged unlawful collection of content-viewing information through its smart TVs [...]

medium QuickLens Chrome extension steals crypto, shows ClickFix attack
BleepingComputer uncategorized

A Chrome extension named "QuickLens - Search Screen with Google Lens" has been removed from the Chrome Web Store after it was compromised to push malware and attempt to steal crypto from thousands of

medium $4.8M in crypto stolen after Korean tax agency exposes wallet seed
BleepingComputer uncategorized

South Korea's National Tax Service accidentally exposed the mnemonic recovery phrase of a seized cryptocurrency wallet in an official press release, allowing hackers to steal 6.4 billion won ($4.8M) w

medium Microsoft testing Windows 11 batch file security improvements
BleepingComputer uncategorized

Microsoft is rolling out new Windows 11 Insider Preview builds that improve security and performance during batch file or CMD script execution. [...]

medium APT37 hackers use new malware to breach air-gapped networks
BleepingComputer uncategorized

North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance. [...]

medium Europol-led crackdown on The Com hackers leads to 30 arrests
BleepingComputer uncategorized

A yearlong Europol-coordinated operation dubbed "Project Compass" has led to 30 arrests and 179 suspects being tied to "The Com," an online cybercrime collective that targets children and teenagers. [

medium CISA warns that RESURGE malware can be dormant on Ivanti devices
BleepingComputer uncategorized

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day attacks exploiting CVE-2025-0282 to breach Ivanti Connect

medium Third-Party Patching and the Business Footprint We All Share
BleepingComputer uncategorized

Everyday tools like PDF readers, email clients, and archive utilities quietly define the real attack surface. Action1 explains how third-party software drift increases exploit risk and why consistent

medium Ukrainian man pleads guilty to running AI-powered fake ID site
BleepingComputer uncategorized

A Ukrainian man has pleaded guilty to operating OnlyFake, an AI-powered website that generated and sold more than 10,000 photos of fake identification documents to customers worldwide. [...]

medium Previously harmless Google API keys now expose Gemini AI data
BleepingComputer uncategorized

Google API keys for services like Maps embedded in accessible client-side code could be used to authenticate to the Gemini AI assistant and access private data. [...]

medium Trend Micro warns of critical Apex One code execution flaws
BleepingComputer uncategorized

Trend Micro has patched two critical Apex One vulnerabilities that allow attackers to gain remote code execution (RCE) on vulnerable Windows systems. [...]

medium European DYI chain ManoMano data breach impacts 38 million customers
BleepingComputer uncategorized

DIY store chain ManoMano is notifying customers of a data breach personal data, which was caused by hackers compromising a third-party service provider. [...]

medium Critical Juniper Networks PTX flaw allows full router takeover
BleepingComputer uncategorized

A critical vulnerability in the Junos OS Evolved network operating system running on PTX Series routers from Juniper Networks could allow an unauthenticated attacker to execute code remotely with root

medium Olympique Marseille confirms 'attempted' cyberattack after data leak
BleepingComputer uncategorized

French professional football club Olympique de Marseille has confirmed a cyberattack after a threat actor claimed on Monday that it breached the club's systems earlier this month. [...]

medium CVE-2022-20775: Cisco SD-WAN Path Traversal Vulnerability
CISA KEV uncategorized

Cisco SD-WAN CLI contains a path traversal vulnerability that could allow an authenticated local attacker to gain elevated privileges via improper access controls on commands within the application CL

medium CVE-2026-20127: Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability
CISA KEV uncategorized

Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, contain an authentication bypass vulnerability could allow an unauthenticated, rem

medium CVE-2026-25108: Soliton Systems K.K FileZen OS Command Injection Vulnerability
CISA KEV uncategorized

Soliton Systems K.K FileZen contains an OS command injection vulnerability when an user logs-in to the affected product and sends a specially crafted HTTP request.. Product: FileZen. Vendor: Soliton S

medium CVE-2026-1367: Zohocorp ManageEngine ADSelfService Plus versions 6522 and below are vulnerable to authenticated SQL
NVD uncategorized

Zohocorp ManageEngine ADSelfService Plus versions 6522 and below are vulnerable to authenticated SQL Injection in the search report option.

medium CVE-2026-2977: A security vulnerability has been detected in FastApiAdmin up to 2.2.0. This affects the function up
NVD uncategorized

A security vulnerability has been detected in FastApiAdmin up to 2.2.0. This affects the function upload_controller of the file /backend/app/api/v1/module_common/file/controller.py of the component Sc

medium CVE-2026-2978: A vulnerability was detected in FastApiAdmin up to 2.2.0. This vulnerability affects the function up
NVD uncategorized

A vulnerability was detected in FastApiAdmin up to 2.2.0. This vulnerability affects the function upload_file_controller of the file /backend/app/api/v1/module_system/params/controller.py of the compo

medium CVE-2026-23552: Cross-Realm Token Acceptance Bypass in KeycloakSecurityPolicy Apache Camel Keycloak component.  The
NVD uncategorized

Cross-Realm Token Acceptance Bypass in KeycloakSecurityPolicy Apache Camel Keycloak component.  The Camel-Keycloak KeycloakSecurityPolicy does not validate the iss (issuer) claim of JWT tokens agains

medium CVE-2026-25747: Deserialization of Untrusted Data vulnerability in Apache Camel LevelDB component. The Camel-LevelD
NVD uncategorized

Deserialization of Untrusted Data vulnerability in Apache Camel LevelDB component. The Camel-LevelDB DefaultLevelDBSerializer class deserializes data read from the LevelDB aggregation repository usin

medium CVE-2026-26365: Akamai Ghost on Akamai CDN edge servers before 2026-02-06 mishandles processing of custom hop-by-hop
NVD uncategorized

Akamai Ghost on Akamai CDN edge servers before 2026-02-06 mishandles processing of custom hop-by-hop HTTP headers, where an incoming request containing the header "Connection: Transfer-Encoding" could

medium CVE-2026-2979: A flaw has been found in FastApiAdmin up to 2.2.0. This issue affects the function user_avatar_uploa
NVD uncategorized

A flaw has been found in FastApiAdmin up to 2.2.0. This issue affects the function user_avatar_upload_controller of the file /backend/app/api/v1/module_system/user/controller.py of the component Sched

medium CVE-2026-2980: A vulnerability has been found in UTT HiPER 810G up to 1.7.7-1711. Impacted is the function strcpy o
NVD uncategorized

A vulnerability has been found in UTT HiPER 810G up to 1.7.7-1711. Impacted is the function strcpy of the file /goform/setSysAdm. The manipulation of the argument passwd1 leads to buffer overflow. The

medium CVE-2026-2981: A vulnerability was found in UTT HiPER 810G up to 1.7.7-1711. The affected element is the function s
NVD uncategorized

A vulnerability was found in UTT HiPER 810G up to 1.7.7-1711. The affected element is the function strcpy of the file /goform/formTaskEdit_ap. The manipulation of the argument txtMin2 results in buffe

medium CVE-2025-41002: SQL injection vulnerability in Infoticketing. This vulnerability allows an unauthenticated attacker
NVD uncategorized

SQL injection vulnerability in Infoticketing. This vulnerability allows an unauthenticated attacker to retrieve, create, update, and delete the database by sending a POST request using the 'code' pa

medium CVE-2026-2983: A vulnerability was determined in SourceCodester Student Result Management System 1.0. The impacted
NVD uncategorized

A vulnerability was determined in SourceCodester Student Result Management System 1.0. The impacted element is an unknown function of the file /admin/core/import_users.php of the component Bulk Import

medium CVE-2025-40701: Reflected Cross-Site Scripting vulnerability in SOTESHOP, version 8.3.4. THis vulnerability allows a
NVD uncategorized

Reflected Cross-Site Scripting vulnerability in SOTESHOP, version 8.3.4. THis vulnerability allows an attacker execute JavaScript code in the victim's browser when a malicious URL with the 'id' parame

medium CVE-2025-40986: Reflected Cross-Site Scripting (XSS) vulnerability in PideTuCita. This vulnerability allows an attac
NVD uncategorized

Reflected Cross-Site Scripting (XSS) vulnerability in PideTuCita. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending him/her a malicious URL using the

medium CVE-2025-59873: An information exposure vulnerability exists in Vulnerability in HCL Software ZIE for Web. The app
NVD uncategorized

An information exposure vulnerability exists in Vulnerability in HCL Software ZIE for Web. The application transmits sensitive session tokens and authentication identifiers within the URL query para

medium CVE-2026-2984: A vulnerability was identified in SourceCodester Student Result Management System 1.0. This affects
NVD uncategorized

A vulnerability was identified in SourceCodester Student Result Management System 1.0. This affects an unknown function of the file /admin/core/drop_user.php. Such manipulation of the argument ID lead

medium CVE-2026-2985: A security flaw has been discovered in Tiandy Video Surveillance System 视频监控平台 7.17.0. This impacts
NVD uncategorized

A security flaw has been discovered in Tiandy Video Surveillance System 视频监控平台 7.17.0. This impacts the function downloadImage of the file /com/tiandy/easy7/core/bo/CLSBODownLoad.java. Performing a ma

medium CVE-2025-69700: Tenda FH1203 V2.0.1.6 contains a stack-based buffer overflow vulnerability in the modify_add_client_
NVD uncategorized

Tenda FH1203 V2.0.1.6 contains a stack-based buffer overflow vulnerability in the modify_add_client_prio function, which is reachable via the formSetClientPrio CGI handler.

medium CVE-2026-21420: Dell Repository Manager (DRM), versions prior to 3.4.8, contains an Uncontrolled Search Path Element
NVD uncategorized

Dell Repository Manager (DRM), versions prior to 3.4.8, contains an Uncontrolled Search Path Element vulnerability. A low privileged attacker with local access could potentially exploit this vulnerabi

medium CVE-2025-14905: A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `sche
NVD uncategorized

A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly

medium CVE-2025-70043: An issue pertaining to CWE-295: Improper Certificate Validation was discovered in Ayms node-To maste
NVD uncategorized

An issue pertaining to CWE-295: Improper Certificate Validation was discovered in Ayms node-To master. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in

medium CVE-2025-70044: An issue pertaining to CWE-295: Improper Certificate Validation was discovered in fofolee uTools-qui
NVD uncategorized

An issue pertaining to CWE-295: Improper Certificate Validation was discovered in fofolee uTools-quickcommand 5.0.3.

medium CVE-2025-70045: An issue pertaining to CWE-295: Improper Certificate Validation was discovered in jxcore jxm master.
NVD uncategorized

An issue pertaining to CWE-295: Improper Certificate Validation was discovered in jxcore jxm master. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in H

medium CVE-2025-70058: An issue pertaining to CWE-295: Improper Certificate Validation was discovered in YMFE yapi v1.12.0.
NVD uncategorized

An issue pertaining to CWE-295: Improper Certificate Validation was discovered in YMFE yapi v1.12.0. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in t

medium CVE-2026-2697: An Indirect Object Reference (IDOR) in Security Center allows an authenticated remote attacker to es
NVD uncategorized

An Indirect Object Reference (IDOR) in Security Center allows an authenticated remote attacker to escalate privileges via the 'owner' parameter.

medium CVE-2026-3015: A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Impacted is the function strcpy
NVD uncategorized

A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/formPolicyRouteConf. Executing a manipulation of the argument GroupName can lea

medium NSHEDB: Noise-Sensitive Homomorphic Encrypted Database Query Engine
arXiv cs.CR uncategorized

Homomorphic encryption (HE) enables computations directly on encrypted data, offering strong cryptographic guarantees for secure and privacy-preserving data storage and query execution. However, despi

medium Anansi: Scalable Characterization of Message-Based Job Scams
arXiv cs.CR uncategorized

Job-based smishing scams, where victims are recruited under the guise of remote job opportunities, represent a rapidly growing and understudied threat within the broader landscape of online fraud. In

medium SAILOR: A Scalable and Energy-Efficient Ultra-Lightweight RISC-V for IoT Security
arXiv cs.CR uncategorized

Recently, RISC-V has contributed to the development of IoT devices, requiring architectures that balance energy efficiency, compact area, and integrated security. However, most recent RISC-V cores for

medium Unsupervised Baseline Clustering and Incremental Adaptation for IoT Device Traffic Profiling
arXiv cs.CR uncategorized

The growth and heterogeneity of IoT devices create security challenges where static identification models can degrade as traffic evolves. This paper presents a two-stage, flow-feature-based pipeline f

medium Jailbreak Foundry: From Papers to Runnable Attacks for Reproducible Benchmarking
arXiv cs.CR uncategorized

Jailbreak techniques for large language models (LLMs) evolve faster than benchmarks, making robustness estimates stale and difficult to compare across papers due to drift in datasets, harnesses, and j

medium Exploring Robust Intrusion Detection: A Benchmark Study of Feature Transferability in IoT Botnet Attack Detection
arXiv cs.CR uncategorized

Cross-domain intrusion detection remains a critical challenge due to significant variability in network traffic characteristics and feature distributions across environments. This study evaluates the

medium MI$^2$DAS: A Multi-Layer Intrusion Detection Framework with Incremental Learning for Securing Industrial IoT Networks
arXiv cs.CR uncategorized

The rapid expansion of Industrial IoT (IIoT) systems has amplified security challenges, as heterogeneous devices and dynamic traffic patterns increase exposure to sophisticated and previously unseen c

medium Enhancing Continual Learning for Software Vulnerability Prediction: Addressing Catastrophic Forgetting via Hybrid-Confidence-Aware Selective Replay for Temporal LLM Fine-Tuning
arXiv cs.CR uncategorized

Recent work applies Large Language Models (LLMs) to source-code vulnerability detection, but most evaluations still rely on random train-test splits that ignore time and overestimate real-world perfor

medium MPU: Towards Secure and Privacy-Preserving Knowledge Unlearning for Large Language Models
arXiv cs.CR uncategorized

Machine unlearning for large language models often faces a privacy dilemma in which strict constraints prohibit sharing either the server's parameters or the client's forget set. To address this dual

medium Tilewise Domain-Separated Selective Encryption for Remote Sensing Imagery under Chosen-Plaintext Attacks
arXiv cs.CR uncategorized

Selective image encryption is common in remote sensing systems because it protects sensitive regions of interest (ROI) while limiting computational cost. However, many selective designs enable cross-t

medium PLA for Drone RID Frames via Motion Estimation and Consistency Verification
arXiv cs.CR uncategorized

Drone Remote Identification (RID) plays a critical role in low-altitude airspace supervision, yet its broadcast nature and lack of cryptographic protection make it vulnerable to spoofing and replay at

medium Privacy-Preserving Local Energy Trading Considering Network Fees
arXiv cs.CR uncategorized

Driven by the widespread deployment of distributed energy resources, local energy markets (LEMs) have emerged as a promising approach for enabling direct trades among prosumers and consumers to balanc

medium Central Bank Digital Currencies: Where is the Privacy, Technology, and Anonymity?
arXiv cs.CR uncategorized

In an age of financial system digitisation and the increasing adoption of digital currencies, Central Bank Digital Currencies (CBDCs) have emerged as a focal point for technological innovation. Privac

medium PDF: PUF-based DNN Fingerprinting for Knowledge Distillation Traceability
arXiv cs.CR uncategorized

Knowledge distillation transfers large teacher models to compact student models, enabling deployment on resource-limited platforms while suffering minimal performance degradation. However, this paradi

medium CLOAQ: Combined Logic and Angle Obfuscation for Quantum Circuits
arXiv cs.CR uncategorized

In the realm of quantum computing, quantum circuits serve as essential depictions of quantum algorithms, which are then compiled into executable operations for quantum computations. Quantum compilers

medium I've Seen This IP: A Practical Intersection Attack Against Tor Introduction Circuits and Hidden Services
arXiv cs.CR uncategorized

Tor onion services rely on long-lived introduction circuits to support anonymous rendezvous between clients and services. Although Tor includes some defenses against traffic analysis, the introduction

medium Lap2: Revisiting Laplace DP-SGD for High Dimensions via Majorization Theory
arXiv cs.CR uncategorized

Differentially Private Stochastic Gradient Descent (DP-SGD) is a cornerstone technique for ensuring privacy in deep learning, widely used in both training from scratch and fine-tuning large-scale lang

medium A Software-Defined Testbed for Quantifying Deauthentication Resilience in Modern Wi-Fi Networks
arXiv cs.CR uncategorized

Wi-Fi deauthentication attacks remain a practical denial-of-service (DoS) threat by exploiting unprotected management frames to disrupt client connectivity. In this work, we introduce a software-defin

medium 2G2T: Constant-Size, Statistically Sound MSM Outsourcing
arXiv cs.CR uncategorized

Multi-scalar multiplication (MSM), defined as MSM(P, x) = sum_{i=1}^n x_i P_i, is a dominant computational kernel in discrete-logarithm-based cryptography and often becomes a bottleneck for verifiers

medium LLM Novice Uplift on Dual-Use, In Silico Biology Tasks
arXiv cs.CR uncategorized

Large language models (LLMs) perform increasingly well on biology benchmarks, but it remains unclear whether they uplift novice users -- i.e., enable humans to perform better than with internet-only r

Sources

Hacker News 0 items
BleepingComputer 15 items
CISA KEV 3 items
GitHub Advisories 0 items
NVD 25 items
arXiv cs.CR 20 items
Hugging Face 0 items