security

📅 Kalender

< March 2026 >
Mo
Di
Mi
Do
Fr
Sa
So
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
1718192021222324
25
26
27
28
29
30
31
Gefiltert nach: 18. März 2026
soc

Cyprus and Israel Under DDoS Siege: Weekly DDoS Threat Intelligence Analysis

Cyprus and Israel Under DDoS Siege: Weekly DDoS Threat Intelligence Analysis Analysis Period: March 9 – 16, 2026 Between March 9 and 16, 2026, SOCRadar identified an extensive coordinated DDoS campaign conducted by the pro-Russian threat actor NoName057(16) using their DDoSia attack tool. The campaign resulted in 5,828 recorded attack entries, targeting 143 unique domains […]

Mehr lesen →
security

Scans for „adminer“, (Wed, Mar 18th)

A very popular target of attackers scanning our honeypots is „phpmyadmin“. phpMyAdmin is a script first released in the late 90s, before many security concepts had&&#x23;x26;&#x23;xc2;&&#x23;x26;&#x23;xa0;been discovered. It&&#x23;x26;&#x23;39;s rich history of vulnerabilities made it a favorite target. Its alternative, „adminer“, began appearing about a decade later (https://www.adminer.org). One of its main „selling“ points was simplicity. Adminer is just a single PHP file. It requires no configuration. Copy it to your server, and you are ready to go. „adminer“ has a much better security record&&#x23;x26;&#x23;xc2;&&#x23;x26;&#x23;xa0;and claims to prioritize security in its development.

Mehr lesen →
soc

CVE-2026-20643: Vulnerability in WebKit Navigation API May Bypass Same Origin Policy

CVE-2026-20643 in WebKit Navigation API fixed by Apple

Just a little over a month after fixing the actively exploited CVE-2026-20700 zero-day, Apple has now issued its first Background Security Improvements release to address CVE-2026-20643, a WebKit vulnerability that could allow maliciously crafted web content to bypass the Same Origin Policy, one of the browser’s core security boundaries. The issue in the limelight adds […]

The post CVE-2026-20643: Vulnerability in WebKit Navigation API May Bypass Same Origin Policy appeared first on SOC Prime.

Mehr lesen →
soc

Financial Crime in 2026: How Organized Threat Ecosystems Are Outsmarting AML Controls

Financial Crime in 2026: How Organized Threat Ecosystems Are Outsmarting AML ControlsFinancial crime has changed dramatically over the last few years. Fraud is no longer driven primarily by isolated attackers or opportunistic scams. Instead, it has evolved into a coordinated ecosystem where identity theft, account takeover, money laundering, and infrastructure services operate as interconnected criminal […]

Mehr lesen →
soc

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2026-20963 Microsoft SharePoint Deserialization of Untrusted Data Vulnerability

This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria

Mehr lesen →
soc

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2025-66376 Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability

This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

Mehr lesen →
soc

CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization

CISA is aware of malicious cyber activity targeting endpoint management systems of U.S. organizations based on the March 11, 2026 cyberattack against U.S.-based medical technology firm Stryker Corporation, which affected their Microsoft environment.1 To defend against similar malicious cyber activity, CISA urges organizations to harden endpoint management system configurations using the recommendations and resources provided in this alert. CISA is conducting enhanced coordination with federal partners, including the Federal Bureau of Investigation (FBI), to identify additional threats and determine mitigation actions.

To defend against similar malicious activity that misuses legitimate endpoint management software, CISA urges organizations to implement Microsoft’s newly released best practices for securing Microsoft Intune; the principles of these recommendations can be applied to Intune and more broadly to other endpoint management software: 

  • Use principles of least privilege when designing administrative roles.
    • Leverage Microsoft Intune’s role-based access control (RBAC) to assign the minimum permissions necessary to each role for completing day-to-day operations—permissions include what actions the role can take, and what users and devices it can apply that action to.
  • Enforce phishing-resistant multi-factor authentication (MFA) and privileged access hygiene.
    • Use Microsoft Entra ID capabilities (including Conditional Access, MFA, risk signals, and privileged access controls) to block unauthorized access to privileged actions in Microsoft Intune.
  • Configure access policies to require Multi Admin Approval in Microsoft Intune.
    • Set up policies that require a second administrative account’s approval to allow changes to sensitive or high-impact actions (such as device wiping), applications, scripts, RBAC, configurations, etc.  

Additionally, CISA recommends reviewing the following resources to strengthen defenses against similar malicious cyber activity:

Disclaimer

The information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA.  

Acknowledgements

Microsoft and Stryker contributed to this alert. 

Notes

1 For updates from Stryker on the incident, see “Customer Updates: Stryker Network Disruption,” Stryker, last modified March 15, 2026, https://www.stryker.com/us/en/about/news/2026/a-message-to-our-customers-03-2026.html.

Mehr lesen →