eSecurity Planet

eSecurity Planet

Publication
0 followers

Website offering cybersecurity news and IT security strategy guidance.

RSAC 2026: How Zscaler Is Securing the AI Ecosystem
NewsMar 27, 2026

RSAC 2026: How Zscaler Is Securing the AI Ecosystem

At RSAC 2026 Zscaler unveiled an AI Security Suite that moves beyond point‑solution fixes to protect the entire AI ecosystem. The platform delivers an inventory of AI assets, applies zero‑trust controls to AI traffic, and automates lifecycle defenses such as...

By eSecurity Planet
Ransomware’s Opening Play: Target Identity First
NewsMar 17, 2026

Ransomware’s Opening Play: Target Identity First

Ransomware groups are shifting focus from encrypting files to compromising identity infrastructure such as Active Directory, Entra ID, and Okta. Semperis research shows 83% of ransomware attacks involve identity compromise, and 56% of attacks succeed, causing widespread operational disruption. By...

By eSecurity Planet
Surfshark vs NordVPN (2026): Which VPN Wins? Full Breakdown
NewsMar 17, 2026

Surfshark vs NordVPN (2026): Which VPN Wins? Full Breakdown

The 2026 guide pits Surfshark against NordVPN, breaking down pricing, server coverage, connection limits, speed, and security tools. Surfshark’s One plan starts at $2.49 per month, offers unlimited simultaneous devices, and covers 3,200+ servers in 100 countries. NordVPN begins at $3.39 per...

By eSecurity Planet
AiLock Ransomware Claims England Hockey Data Breach
NewsMar 13, 2026

AiLock Ransomware Claims England Hockey Data Breach

England Hockey confirmed a ransomware investigation after the AiLock gang claimed to have stolen roughly 129 GB of internal data and threatened public release. The group, known for its double‑extortion tactics, encrypts files using ChaCha20 and a post‑quantum NTRUEncrypt algorithm. England...

By eSecurity Planet
Hack the AI Brain: LangSmith Vulnerability Could Expose Sensitive AI Data
NewsMar 13, 2026

Hack the AI Brain: LangSmith Vulnerability Could Expose Sensitive AI Data

Researchers at Miggo Security uncovered CVE‑2026‑25750 in LangSmith, an AI observability platform used to monitor LLM applications. The flaw stems from an unvalidated baseUrl parameter in LangSmith Studio, allowing a malicious URL to redirect authenticated API calls to an attacker‑controlled...

By eSecurity Planet
Active Directory Flaw Enables SYSTEM Privilege Escalation
NewsMar 12, 2026

Active Directory Flaw Enables SYSTEM Privilege Escalation

Microsoft disclosed CVE-2026-25177, an Active Directory Domain Services flaw with an 8.8 CVSS rating that lets attackers manipulate Service Principal Names using hidden Unicode characters. The vulnerability enables privilege escalation to SYSTEM level across the domain, even with minimal initial...

By eSecurity Planet
Microsoft .NET Vulnerability Enables Remote DoS Attacks
NewsMar 11, 2026

Microsoft .NET Vulnerability Enables Remote DoS Attacks

Microsoft disclosed CVE‑2026‑26127, an out‑of‑bounds read flaw in the .NET framework that enables unauthenticated attackers to trigger remote denial‑of‑service conditions. The vulnerability affects multiple .NET versions and carries a CVSS rating of 7.5, indicating high severity. Microsoft has released a...

By eSecurity Planet
AVideo Zero-Click Flaw Lets Attackers Hijack Live Streams
NewsMar 9, 2026

AVideo Zero-Click Flaw Lets Attackers Hijack Live Streams

A zero‑click command injection flaw (CVE‑2026‑29058) was found in the open‑source AVideo streaming platform’s objects/getImage.php endpoint. The vulnerability decodes a Base64‑encoded parameter and injects it directly into an ffmpeg shell command, allowing unauthenticated attackers to execute arbitrary code. Exploitation can...

By eSecurity Planet
CleanMyMac Imposter Site Installs SHub Stealer on Macs
NewsMar 9, 2026

CleanMyMac Imposter Site Installs SHub Stealer on Macs

A counterfeit CleanMyMac website (cleanmymacos.org) lures macOS users into pasting a malicious Terminal command, which installs the SHub Stealer infostealer. The script bypasses Gatekeeper, notarization and XProtect by executing directly in the user’s shell. Once installed, the loader checks for...

By eSecurity Planet
AWS-LC Flaws Could Bypass Certificate Verification
NewsMar 6, 2026

AWS-LC Flaws Could Bypass Certificate Verification

Amazon disclosed three critical flaws in its open‑source AWS‑LC cryptographic library, including CVE‑2026‑3336 and CVE‑2026‑3338 that can bypass PKCS7 signature verification and CVE‑2026‑3337 a timing side‑channel in AES‑CCM. The vulnerabilities affect AWS‑LC, AWS‑LC‑FIPS and language bindings such as aws‑lc‑sys. No...

By eSecurity Planet
AI Exploits, Cloud Breaches, and Identity Gaps Define This Week’s Cybersecurity Landscape
NewsMar 6, 2026

AI Exploits, Cloud Breaches, and Identity Gaps Define This Week’s Cybersecurity Landscape

This week’s cybersecurity briefing highlighted a surge of AI‑driven exploits, including the unpatched MS‑Agent flaw in ModelScope and a patched prompt‑injection bug in Perplexity’s Comet browser. Critical infrastructure suffered high‑impact vulnerabilities such as Juniper PTX routers allowing unauthenticated root takeover...

By eSecurity Planet
Alabama Sextortion Case Involved Hundreds of Victims
NewsMar 3, 2026

Alabama Sextortion Case Involved Hundreds of Victims

A 22‑year‑old Alabama man, Jamarcus Mosley, pleaded guilty to federal charges for hijacking the Snapchat and Instagram accounts of hundreds of young women between 2022 and 2025. He used impersonation to obtain recovery codes, seized control of accounts, and extorted...

By eSecurity Planet
$5M Microsoft Activation Key Fraud Ends in Prison Term
NewsMar 3, 2026

$5M Microsoft Activation Key Fraud Ends in Prison Term

Florida court sentenced Heidi Richards, operator of Trinity Software Distribution, to 22 months in federal prison and a $50,000 fine for a multi‑year scheme that trafficked Microsoft Certificate of Authenticity (COA) labels. The operation wired over $5.1 million to a Texas...

By eSecurity Planet
Identity Security Blind Spots Fuel Modern Attacks
NewsMar 3, 2026

Identity Security Blind Spots Fuel Modern Attacks

Permiso’s 2026 State of Identity Security report reveals that organizations are vastly overconfident about identity controls as identity becomes the dominant attack vector in cloud environments. The study finds that 92% of firms run AI agents that create identities without...

By eSecurity Planet
BYOVD Turns Trusted Drivers Against Windows Security
NewsMar 2, 2026

BYOVD Turns Trusted Drivers Against Windows Security

Threat actors are increasingly exploiting the Bring Your Own Vulnerable Driver (BYOVD) technique, loading digitally signed but flawed Windows drivers to obtain Ring 0 kernel privileges. By leveraging legitimate drivers extracted from vendor installers, attackers can bypass endpoint detection and response...

By eSecurity Planet
FreeBSD Jail Escape Flaw Breaks Filesystem Isolation
NewsFeb 27, 2026

FreeBSD Jail Escape Flaw Breaks Filesystem Isolation

A critical vulnerability identified as CVE-2025-15576 compromises FreeBSD 13.5 and 14.3 by allowing a jailed process to escape its chroot through a nullfs‑shared directory and Unix domain socket. The flaw bypasses kernel‑enforced filesystem boundaries, granting full host‑filesystem access to an...

By eSecurity Planet
ServiceNow AI Platform Vulnerability Enables Unauthenticated RCE
NewsFeb 26, 2026

ServiceNow AI Platform Vulnerability Enables Unauthenticated RCE

ServiceNow disclosed and patched a critical vulnerability, CVE-2026-0542, in its AI Platform that could allow unauthenticated remote code execution. The flaw bypasses the ServiceNow Sandbox, affecting web interfaces, API endpoints, and automation modules, and carries a CVSS rating of 9.8....

By eSecurity Planet
ShinyHunters Claims Wynn Resorts Data Theft
NewsFeb 25, 2026

ShinyHunters Claims Wynn Resorts Data Theft

Wynn Resorts disclosed that an unauthorized party accessed employee data after the casino‑hospitality firm appeared on ShinyHunters' extortion leak site. The group claims to have stolen more than 800,000 records, including Social Security numbers, from Wynn's Oracle PeopleSoft HR platform....

By eSecurity Planet
Google Patches Three High-Severity Chrome Flaws
NewsFeb 24, 2026

Google Patches Three High-Severity Chrome Flaws

Google released a Chrome security update that fixes three high‑severity vulnerabilities (CVE‑2026‑3061, CVE‑2026‑3062, CVE‑2026‑3063). Two of the flaws involve out‑of‑bounds memory reads, while the third adds out‑of‑bounds writes in the WebGPU shader compiler. The bugs affect Chrome’s media stack, the...

By eSecurity Planet
Ransomware, Zero-Days, and Data Breaches Shape This Week’s Cybersecurity Landscape
NewsFeb 23, 2026

Ransomware, Zero-Days, and Data Breaches Shape This Week’s Cybersecurity Landscape

This week’s cybersecurity briefing spotlights a Dell RecoverPoint zero‑day that’s actively delivering web shells in VMware environments, alongside critical Ivanti EPMM remote‑code‑execution flaws and an Apache NiFi RBAC bypass. Over 40% of OpenClaw AI skills were found vulnerable, highlighting supply‑chain...

By eSecurity Planet
Apache Tomcat Vulnerability Circumvents Access Rules
NewsFeb 20, 2026

Apache Tomcat Vulnerability Circumvents Access Rules

Apache Tomcat’s CVE‑2026‑24733 vulnerability allows attackers to bypass security constraints that permit HEAD but deny GET requests by sending a malformed HEAD request using the obsolete HTTP/0.9 protocol. The flaw stems from Tomcat’s legacy handling of HTTP/0.9, which does not...

By eSecurity Planet
Better-Auth Flaw Allows Unauthenticated API Key Creation
NewsFeb 19, 2026

Better-Auth Flaw Allows Unauthenticated API Key Creation

A critical flaw (CVE‑2025‑61928) in the better‑auth npm library’s API‑key plugin lets unauthenticated actors mint privileged API keys for arbitrary users. The vulnerability stems from improper authorization checks in the createApiKey and updateApiKey handlers, which accept a userId without a...

By eSecurity Planet
OpenClaw Flaw Enables AI Log Poisoning Risk
NewsFeb 17, 2026

OpenClaw Flaw Enables AI Log Poisoning Risk

A log‑poisoning flaw was discovered in OpenClaw’s gateway server, affecting versions up to 2026.2.12. The vulnerability arises from unsanitized WebSocket headers—such as Origin and User‑Agent—being written directly to structured logs when a handshake is aborted. An unauthenticated attacker could inject...

By eSecurity Planet
CVE-2026-25903 Impacts Apache NiFi Users
NewsFeb 17, 2026

CVE-2026-25903 Impacts Apache NiFi Users

A new vulnerability, CVE‑2026‑25903, affects Apache NiFi versions 1.1.0 through 2.7.2 and was patched in 2.8.0. The flaw allows users with limited privileges to modify the configuration of already‑deployed restricted components, bypassing the platform’s authorization checks. While it does not...

By eSecurity Planet
BeyondTrust RCE Exploited for Domain Control
NewsFeb 16, 2026

BeyondTrust RCE Exploited for Domain Control

Attackers are actively exploiting CVE‑2026‑1731, an unauthenticated OS command injection flaw in self‑hosted BeyondTrust Remote Support and Privileged Remote Access appliances. The vulnerability enables remote code execution, allowing threat actors to run commands as SYSTEM, install the SimpleHelp RMM tool,...

By eSecurity Planet
1,800+ Windows Servers Hit by BADIIS SEO Malware
NewsFeb 13, 2026

1,800+ Windows Servers Hit by BADIIS SEO Malware

Elastic researchers uncovered a large‑scale SEO poisoning campaign that has compromised more than 1,800 Windows servers running Microsoft IIS. The BADIIS malware installs as a native IIS module, intercepting crawler traffic and injecting malicious backlinks to promote illicit gambling and...

By eSecurity Planet
Apple Patches Actively Exploited Zero-Day Flaw
NewsFeb 12, 2026

Apple Patches Actively Exploited Zero-Day Flaw

Apple has issued patches for CVE-2026-20700, a zero‑day vulnerability in the dyld dynamic linker affecting iOS, iPadOS, macOS, tvOS, watchOS and visionOS. The flaw enables arbitrary code execution with memory‑write capability and was actively exploited in highly sophisticated, targeted attacks,...

By eSecurity Planet
Viral AI Caricatures Highlight Shadow AI Dangers
NewsFeb 12, 2026

Viral AI Caricatures Highlight Shadow AI Dangers

A viral Instagram and LinkedIn trend sees millions prompting ChatGPT to generate caricatures that describe their jobs, then posting the images publicly. The practice unintentionally reveals how employees use large language models (LLMs) at work and what data they may...

By eSecurity Planet
CVE-2026-25646: Legacy Libpng Flaw Poses RCE Risk
NewsFeb 11, 2026

CVE-2026-25646: Legacy Libpng Flaw Poses RCE Risk

CVE‑2026‑25646 reveals a heap‑buffer overflow in libpng’s png_set_quantize function, a flaw that has existed for nearly three decades across all historic releases. The bug triggers when a PNG image contains a palette chunk without a histogram and requests color quantization,...

By eSecurity Planet
CVE-2026-21514: Actively Exploited Word Flaw Evades OLE Security
NewsFeb 11, 2026

CVE-2026-21514: Actively Exploited Word Flaw Evades OLE Security

Microsoft disclosed CVE‑2026‑21514, an actively exploited vulnerability in Word that bypasses Object Linking and Embedding (OLE) security controls. The flaw lets specially crafted documents execute code without triggering Protected View or enable‑content prompts, requiring only a user to open the...

By eSecurity Planet
FortiOS Authentication Bypass Exposes VPN and SSO Deployments
NewsFeb 10, 2026

FortiOS Authentication Bypass Exposes VPN and SSO Deployments

Fortinet disclosed CVE‑2026‑22153, an authentication‑bypass flaw in FortiOS versions 7.6.0 through 7.6.4. The bug lets unauthenticated attackers skip LDAP checks for Agentless VPN or FSSO policies when the directory permits anonymous binds, potentially granting access to internal networks via SSL‑VPN....

By eSecurity Planet
OpenClaw Adds VirusTotal Scanning to AI Agent Marketplace
NewsFeb 9, 2026

OpenClaw Adds VirusTotal Scanning to AI Agent Marketplace

OpenClaw has integrated VirusTotal scanning into its ClawHub marketplace to curb malicious AI skills. The workflow hashes each skill, checks VirusTotal signatures, and submits unknown bundles to Code Insight for deeper analysis, flagging or blocking threats. This move follows security...

By eSecurity Planet
TeamPCP and the Rise of Cloud-Native Cybercrime
NewsFeb 6, 2026

TeamPCP and the Rise of Cloud-Native Cybercrime

Flare researchers have uncovered a threat group called TeamPCP that targets cloud‑native environments by abusing exposed Docker, Kubernetes and other orchestration interfaces. First seen in late 2025, the campaign leverages AI‑driven automation and known flaws such as CVE‑2025‑29927 and React2Shell...

By eSecurity Planet
Ingress-Nginx Vulnerability Enables Code Execution in Kubernetes
NewsFeb 4, 2026

Ingress-Nginx Vulnerability Enables Code Execution in Kubernetes

A critical vulnerability (CVE‑2026‑24512) in ingress‑nginx allows authenticated attackers to inject arbitrary Nginx directives via the rules.http.paths.path field, leading to code execution and secret disclosure in Kubernetes clusters. The flaw affects all ingress‑nginx releases before v1.13.7 and v1.14.3. Exploitation requires...

By eSecurity Planet
Chrome Vulnerabilities Allow Code Execution and Browser Crashes
NewsFeb 4, 2026

Chrome Vulnerabilities Allow Code Execution and Browser Crashes

Google released a Chrome update that patches two high‑severity vulnerabilities, CVE‑2026‑1862 and CVE‑2026‑1861, affecting the V8 engine and libvpx video decoder. The V8 type‑confusion flaw can enable arbitrary code execution, while the libvpx heap overflow may cause crashes or be...

By eSecurity Planet
Iconics SCADA Vulnerability Can Render Systems Unbootable
NewsFeb 2, 2026

Iconics SCADA Vulnerability Can Render Systems Unbootable

A newly disclosed flaw (CVE‑2025‑0921) in Iconics Suite’s Pager Agent lets a non‑admin attacker manipulate file‑system permissions to overwrite critical Windows driver files. By redirecting log output via symbolic links, the exploit can corrupt the cng.sys driver, causing the system...

By eSecurity Planet
Chrome Ad Blocker Caught Hijacking Amazon Affiliate Links
NewsFeb 2, 2026

Chrome Ad Blocker Caught Hijacking Amazon Affiliate Links

A Chrome extension called Amazon Ads Blocker, marketed as an ad‑hider, was found to silently replace creator affiliate tags on Amazon product links with its own identifier (10xprofit‑20). Socket researchers discovered the extension injects the tag on page load and...

By eSecurity Planet
Nvidia GPU Driver Flaws Enable Privilege Escalation Across Platforms
NewsJan 30, 2026

Nvidia GPU Driver Flaws Enable Privilege Escalation Across Platforms

Nvidia has released a security update addressing four high‑severity GPU driver vulnerabilities that affect Windows, Linux, virtual GPU, and cloud‑gaming platforms. The flaws—CVE‑2025‑33217 through CVE‑2025‑33220—are use‑after‑free and integer‑overflow bugs with a CVSS rating of 7.8, enabling arbitrary code execution and...

By eSecurity Planet
Fortinet Confirms CVE-2026-24858 SSO Flaw Under Active Attack
NewsJan 28, 2026

Fortinet Confirms CVE-2026-24858 SSO Flaw Under Active Attack

Fortinet has confirmed that the FortiCloud Single Sign‑On (SSO) authentication bypass vulnerability (CVE‑2026‑24858) is being actively exploited in the wild. The flaw, rated 9.4 on the CVSS scale, affects FortiOS, FortiManager, FortiAnalyzer and FortiProxy, allowing attackers with a valid FortiCloud...

By eSecurity Planet
CVE-2025-56005: Python PLY Flaw Enables Remote Code Execution
NewsJan 28, 2026

CVE-2025-56005: Python PLY Flaw Enables Remote Code Execution

A critical vulnerability (CVE‑2025‑56005) has been disclosed in the Python PLY library version 3.11, allowing attackers to execute arbitrary code by loading a crafted pickle file via the undocumented *picklefile* parameter. The flaw triggers during parser initialization, meaning code runs before...

By eSecurity Planet
Living Off the Web: How Fake Captcha Turned Trust Into a Malware Delivery Channel
NewsJan 27, 2026

Living Off the Web: How Fake Captcha Turned Trust Into a Malware Delivery Channel

Researchers at Censys have uncovered a growing ecosystem that weaponizes fake CAPTCHA pages to deliver malware. While the pages visually resemble legitimate verification challenges, they conceal more than 30 distinct payload types, including clipboard‑driven scripts, MSI installers, and server‑controlled, fileless...

By eSecurity Planet
GNU InetUtils Telnetd Flaw Lets Attackers Log In as Root
NewsJan 21, 2026

GNU InetUtils Telnetd Flaw Lets Attackers Log In as Root

A critical vulnerability has been discovered in GNU InetUtils telnetd versions 1.9.3 through 2.7 that allows remote attackers to obtain root privileges without a password. The flaw stems from an unsanitized USER environment variable that can inject the "-f root"...

By eSecurity Planet
Oracle WebLogic Proxy Bug Enables Unauthenticated Remote Compromise
NewsJan 21, 2026

Oracle WebLogic Proxy Bug Enables Unauthenticated Remote Compromise

Oracle has disclosed CVE‑2026‑21962, a critical flaw in its Fusion Middleware WebLogic proxy plug‑ins that permits unauthenticated attackers to compromise Oracle HTTP Server over HTTP. The vulnerability affects Oracle HTTP Server versions 12.2.1.4.0, 14.1.1.0.0 and 14.1.2.0.0, as well as the...

By eSecurity Planet
Azure DNS Behavior Can Turn Private Endpoints Into DoS Risks
NewsJan 21, 2026

Azure DNS Behavior Can Turn Private Endpoints Into DoS Risks

Microsoft Azure’s Private Endpoint design has a DNS flaw that can turn secure Private Link connections into denial‑of‑service conditions. When a Private DNS zone is linked across multiple virtual networks, Azure prefers that zone for name resolution; if the target...

By eSecurity Planet
Windows Admin Center Azure SSO Flaw Risks Tenant-Wide Compromise
NewsJan 16, 2026

Windows Admin Center Azure SSO Flaw Risks Tenant-Wide Compromise

A critical Windows Admin Center Azure SSO vulnerability (CVE‑2026‑20965) enables an attacker with local administrator rights on a single Azure VM or Arc‑connected system to forge a WAC.CheckAccess token and a PoP token, impersonating privileged users across the entire tenant. The...

By eSecurity Planet
FortiOS Vulnerability Allows Remote Code Execution Without Login
NewsJan 13, 2026

FortiOS Vulnerability Allows Remote Code Execution Without Login

Fortinet disclosed a heap‑based buffer overflow in the cw_acd daemon of FortiOS and FortiSwitchManager that allows unauthenticated remote code execution. The flaw can be triggered via crafted network requests, especially on exposed fabric interfaces, and affects versions from 6.4.17 up...

By eSecurity Planet
Why the Start of the Year Is Prime Time for Insider Risk
NewsJan 12, 2026

Why the Start of the Year Is Prime Time for Insider Risk

At the start of each year, security teams face heightened insider risk due to workforce transitions such as departures, role changes, and reorganizations. These shifts often create blind spots in identity and access management, leaving dormant or over‑privileged accounts vulnerable...

By eSecurity Planet
Why DNS Resiliency Is Critical as Outages Surge
NewsJan 12, 2026

Why DNS Resiliency Is Critical as Outages Surge

Service outages are rising, costing Global 2000 firms an estimated $400 billion annually, with DNS failures often at the core of prolonged downtime. The article argues that many organizations lack a true "Plan B" for DNS, relying on slow provider switches that...

By eSecurity Planet
AI Deployments Targeted in 91,000+ Attack Sessions
NewsJan 9, 2026

AI Deployments Targeted in 91,000+ Attack Sessions

Researchers observed more than 91,000 attack sessions targeting AI infrastructure over a four‑month window, highlighting a shift from experimental probing to systematic exploitation. The first campaign leveraged server‑side request forgery against Ollama and Twilio webhooks, using a uniform JA4H TLS...

By eSecurity Planet