DJBSEC's CyberNews 2026-04-15
Fortinet Patches 11 Vulnerabilities Across Products
Fortinet has released patches addressing 11 vulnerabilities affecting multiple products in its portfolio. The flaws range in severity and could allow attackers to execute code, access sensitive data, or disrupt services. Given Fortinet’s widespread use in enterprise security environments, the potential impact is significant. Organizations that delay patching may be exposed to active threats. Security teams are urged to prioritize updates and review affected systems.
Read More
Black Basta Affiliates Target Senior Executives
Affiliates of the Black Basta ransomware group are increasingly targeting senior executives in their campaigns. By focusing on high-level individuals, attackers aim to gain access to sensitive corporate systems and data. This approach often involves tailored phishing and social engineering techniques. The strategy increases the likelihood of successful compromise and larger payouts. Organizations should implement stronger protections for executive accounts.
Read More
APT Activity Highlights Growing Cyber Espionage Tensions
Recent reports detail escalating activity among advanced persistent threat groups, reflecting growing geopolitical tensions. These groups are engaging in cyber espionage campaigns targeting critical sectors. The activity underscores the increasing role of cyber operations in global conflicts. Organizations in targeted industries face heightened risk. Enhanced monitoring and threat intelligence are essential defenses.
Read More
Fortinet SQL Injection Vulnerability Actively Exploited
A Fortinet SQL injection vulnerability is being actively exploited by attackers in the wild. The flaw could allow unauthorized access to databases and sensitive information. Exploitation may lead to further compromise of affected systems. Security experts warn that unpatched devices are at immediate risk. Organizations should apply patches and monitor for suspicious activity.
Read More
Hackers Weaponize Obsidian Shell Commands Plugin
Attackers are weaponizing the Obsidian Shell Commands plugin to execute malicious commands on user systems. By exploiting plugin functionality, they can run unauthorized scripts without detection. This highlights risks associated with third-party plugins and extensions. Users may unknowingly expose their systems by installing unverified tools. Security best practices include limiting plugin use and verifying sources.
Read More
Attackers Bypass Phishing Email Protections
Cybercriminals are developing new techniques to bypass phishing email protections. These methods allow malicious emails to evade detection by security filters. As a result, more phishing attempts are reaching end users. This increases the likelihood of credential theft and malware infections. Organizations should enhance email security and user awareness training.
Read More
Analysis of 216 Million Security Findings Reveals Trends
A large-scale analysis of 216 million security findings has revealed key trends in vulnerabilities and threats. The data highlights common weaknesses and patterns exploited by attackers. Insights from the analysis can help organizations prioritize security efforts. It also underscores the scale of the cybersecurity challenge. Continuous monitoring and improvement are critical.
Read More
APT41 Targets Linux Cloud Servers for Credential Theft
APT41 is targeting Linux cloud servers to steal credentials and gain persistent access. The campaign focuses on cloud environments where valuable data and access tokens are stored. By compromising servers, attackers can expand their reach within organizations. This reflects the growing importance of cloud security. Organizations should strengthen protections and monitor for anomalies.
Read More
Zero-Day Exploit Disables CrowdStrike EDR
A zero-day vulnerability has been identified that can disable CrowdStrike’s endpoint detection and response (EDR) tool. This allows attackers to bypass critical security defenses. Such exploits significantly increase the risk of undetected attacks. Security teams must remain vigilant for signs of tampering. Updates and mitigations are expected to address the issue.
Read More
Malicious Chrome Extensions Steal User Data
Researchers have identified 108 malicious Chrome extensions designed to steal user data. These extensions can capture credentials, browsing activity, and sensitive information. Many appear legitimate, making them difficult to detect. The campaign highlights risks within browser extension ecosystems. Users should review installed extensions and remove suspicious ones.
Read More
CISA Adds New Exploited Vulnerabilities to KEV List
CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. These flaws are actively being targeted by attackers. Inclusion in the KEV list signals the urgency of patching affected systems. Organizations are required to address these vulnerabilities promptly. The update highlights ongoing threats to widely used technologies.
Read More
FortiSandbox Vulnerability Enables Command Execution
A vulnerability in FortiSandbox could allow attackers to execute arbitrary commands on affected systems. The flaw poses significant risk to environments using the sandbox for threat analysis. Exploitation could undermine security operations and expose systems. Fortinet has released patches to address the issue. Organizations should update systems and review configurations.
Read More
Enjoy Reading This Article?
Here are some more articles you might like to read next: