Secciones
- Vulnerabilidades y CVEs
- Exploits y pruebas de concepto
- Noticias de seguridad / hacking / malware
- Malware y análisis de amenazas
- Fabricantes de hardware
CERTs / Gobiernos
Fabricantes/ Vendors
- Adobe Security Bulletins
- Oracle Critical Patch Updates
- VMware Security Advisories
- Apple Security Updates
- Google Chrome Releases / Security
- Microsoft Security Bulletins (HTML)
Otros fabricantes y plataformas
Fabricantes de hardware
Vulnerabilidades y CVEs
- [webapps] motionEye 0.43.1b4 – RCEen 11 de febrero de 2026 a las 00:00
motionEye 0.43.1b4 – RCE
- [remote] Windows 10.0.17763.7009 – spoofing vulnerabilityen 11 de febrero de 2026 a las 00:00
Windows 10.0.17763.7009 – spoofing vulnerability
- [local] glibc 2.38 – Buffer Overflowen 11 de febrero de 2026 a las 00:00
glibc 2.38 – Buffer Overflow
- [remote] Redis 8.0.2 – RCEen 4 de febrero de 2026 a las 00:00
Redis 8.0.2 – RCE
- [remote] windows 10/11 – NTLM Hash Disclosure Spoofingen 4 de febrero de 2026 a las 00:00
windows 10/11 – NTLM Hash Disclosure Spoofing
- [webapps] OctoPrint 1.11.2 – File Uploaden 4 de febrero de 2026 a las 00:00
OctoPrint 1.11.2 – File Upload
- [remote] Ingress-NGINX Admission Controller v1.11.1 – FD Injection to RCEen 4 de febrero de 2026 a las 00:00
Ingress-NGINX Admission Controller v1.11.1 – FD Injection to RCE
- [webapps] aiohttp 3.9.1 – directory traversal PoCen 4 de febrero de 2026 a las 00:00
aiohttp 3.9.1 – directory traversal PoC
- [local] Docker Desktop 4.44.3 – Unauthenticated API Exposureen 4 de febrero de 2026 a las 00:00
Docker Desktop 4.44.3 – Unauthenticated API Exposure
- [webapps] FortiWeb Fabric Connector 7.6.x – SQL Injection to Remote Code Executionen 4 de febrero de 2026 a las 00:00
FortiWeb Fabric Connector 7.6.x – SQL Injection to Remote Code Execution
Exploits y pruebas de concepto
- [webapps] motionEye 0.43.1b4 – RCEen 11 de febrero de 2026 a las 00:00
motionEye 0.43.1b4 – RCE
- [remote] Windows 10.0.17763.7009 – spoofing vulnerabilityen 11 de febrero de 2026 a las 00:00
Windows 10.0.17763.7009 – spoofing vulnerability
- [local] glibc 2.38 – Buffer Overflowen 11 de febrero de 2026 a las 00:00
glibc 2.38 – Buffer Overflow
- [remote] Redis 8.0.2 – RCEen 4 de febrero de 2026 a las 00:00
Redis 8.0.2 – RCE
- [remote] windows 10/11 – NTLM Hash Disclosure Spoofingen 4 de febrero de 2026 a las 00:00
windows 10/11 – NTLM Hash Disclosure Spoofing
- [webapps] OctoPrint 1.11.2 – File Uploaden 4 de febrero de 2026 a las 00:00
OctoPrint 1.11.2 – File Upload
- [remote] Ingress-NGINX Admission Controller v1.11.1 – FD Injection to RCEen 4 de febrero de 2026 a las 00:00
Ingress-NGINX Admission Controller v1.11.1 – FD Injection to RCE
- [webapps] aiohttp 3.9.1 – directory traversal PoCen 4 de febrero de 2026 a las 00:00
aiohttp 3.9.1 – directory traversal PoC
- [local] Docker Desktop 4.44.3 – Unauthenticated API Exposureen 4 de febrero de 2026 a las 00:00
Docker Desktop 4.44.3 – Unauthenticated API Exposure
- [webapps] FortiWeb Fabric Connector 7.6.x – SQL Injection to Remote Code Executionen 4 de febrero de 2026 a las 00:00
FortiWeb Fabric Connector 7.6.x – SQL Injection to Remote Code Execution
- [webapps] Piranha CMS 12.0 – Stored XSS in Text Blocken 2 de febrero de 2026 a las 00:00
Piranha CMS 12.0 – Stored XSS in Text Block
- [webapps] RPi-Jukebox-RFID 2.8.0 – Stored Cross-Site Scripting (XSS)en 2 de febrero de 2026 a las 00:00
RPi-Jukebox-RFID 2.8.0 – Stored Cross-Site Scripting (XSS)
- [hardware] D-Link DIR-825 Rev.B 2.10 – Stack Buffer Overflow (DoS)en 2 de febrero de 2026 a las 00:00
D-Link DIR-825 Rev.B 2.10 – Stack Buffer Overflow (DoS)
- [webapps] RPi-Jukebox-RFID 2.8.0 – Remote Command Executionen 17 de enero de 2026 a las 00:00
RPi-Jukebox-RFID 2.8.0 – Remote Command Execution
- [webapps] Siklu EtherHaul Series EH-8010 – Arbitrary File Uploaden 17 de enero de 2026 a las 00:00
Siklu EtherHaul Series EH-8010 – Arbitrary File Upload
- [webapps] Siklu EtherHaul Series EH-8010 – Remote Command Executionen 17 de enero de 2026 a las 00:00
Siklu EtherHaul Series EH-8010 – Remote Command Execution
- [webapps] WordPress Quiz Maker 6.7.0.56 – SQL Injectionen 25 de diciembre de 2025 a las 00:00
WordPress Quiz Maker 6.7.0.56 – SQL Injection
- [webapps] Chained Quiz 1.3.5 – Unauthenticated Insecure Direct Object Reference via Cookieen 25 de diciembre de 2025 a las 00:00
Chained Quiz 1.3.5 – Unauthenticated Insecure Direct Object Reference via Cookie
- [webapps] FreeBSD rtsold 15.x – Remote Code Execution via DNSSLen 25 de diciembre de 2025 a las 00:00
FreeBSD rtsold 15.x – Remote Code Execution via DNSSL
- [webapps] Summar Employee Portal 3.98.0 – Authenticated SQL Injectionen 16 de diciembre de 2025 a las 00:00
Summar Employee Portal 3.98.0 – Authenticated SQL Injection
Noticias de seguridad / hacking / malware
- Samsung TVs to stop collecting Texans’ data without express consentpor Bill Toulas en 1 de marzo de 2026 a las 15:23
Samsung and the State of Texas have reached a settlement agreement over the alleged unlawful collection of content-viewing information through its smart TVs […]
- Hackers Weaponize Claude Code in Mexican Government Cyberattackpor Ionut Arghire en 1 de marzo de 2026 a las 12:30
The AI was abused to write exploits, create tools, and automatically exfiltrate over 150GB of data. The post Hackers Weaponize Claude Code in Mexican Government Cyberattack appeared first on SecurityWeek.
- QuickLens Chrome extension steals crypto, shows ClickFix attackpor Lawrence Abrams en 28 de febrero de 2026 a las 19:18
A Chrome extension named «QuickLens – Search Screen with Google Lens» has been removed from the Chrome Web Store after it was compromised to push malware and attempt to steal crypto from thousands of users. […]
- ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocketpor info@thehackernews.com (The Hacker News) en 28 de febrero de 2026 a las 17:21
OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to a locally running artificial intelligence (AI) agent and take over control. «Our vulnerability lives in the core system itself – no plugins, no marketplace, no user-installed extensions – just the bare OpenClaw gateway, running exactly as documented,» Oasis
- $4.8M in crypto stolen after Korean tax agency exposes wallet seedpor Bill Toulas en 28 de febrero de 2026 a las 15:17
South Korea’s National Tax Service accidentally exposed the mnemonic recovery phrase of a seized cryptocurrency wallet in an official press release, allowing hackers to steal 6.4 billion won ($4.8M) worth in cryptocurrency. […]
- Who is the Kimwolf Botmaster “Dort”?por BrianKrebs en 28 de febrero de 2026 a las 12:01
In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world’s largest and most disruptive botnet. Since then, the person in control of Kimwolf — who goes by the handle «Dort» — has coordinated a barrage of distributed denial-of-service (DDoS), doxing and email flooding attacks against the researcher and this author, and more recently caused a SWAT team to be sent to the researcher’s home. This post examines what is knowable about Dort based on public information.
- Canadian Tire Data Breach Impacts 38 Million Accountspor Ionut Arghire en 28 de febrero de 2026 a las 11:50
Names, addresses, email addresses, phone numbers, and encrypted passwords were compromised in the attack. The post Canadian Tire Data Breach Impacts 38 Million Accounts appeared first on SecurityWeek.
- Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablementpor info@thehackernews.com (The Hacker News) en 28 de febrero de 2026 a las 09:56
New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to authenticate to sensitive Gemini endpoints and access private data. The findings come from Truffle Security, which discovered nearly 3,000 Google API keys (identified by the prefix «AIza») embedded in client-side code to provide Google-related services like
- Pentagon Designates Anthropic Supply Chain Risk Over AI Military Disputepor info@thehackernews.com (The Hacker News) en 28 de febrero de 2026 a las 04:57
Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence (AI) upstart as a «supply chain risk.» «This action follows months of negotiations that reached an impasse over two exceptions we requested to the lawful use of our AI model, Claude: the mass domestic surveillance of Americans and fully autonomous weapons,» the
- Friday Squid Blogging: Squid Fishing in Perupor Bruce Schneier en 27 de febrero de 2026 a las 22:04
Peru has increased its squid catch limit. The article says “giant squid,” but they can’t possibly mean that. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.
Malware y análisis de amenazas
- Public Google API keys can be used to expose Gemini AI dataen 27 de febrero de 2026 a las 12:33
Researchers found that Google API keys long treated as harmless can now unlock access to Gemini.
- Fake Fedex Email Delivers Donuts!, (Fri, Feb 27th)en 27 de febrero de 2026 a las 12:22
It’s Friday, let’s have a look at another simple piece of malware to close a busy week! I received a Fedex notification about a delivery. Usually, such emails are simple phishing attacks that redirect you to a fake login page to collect your credentials. Here, it was a bit different:
- Inside a fake Google security check that becomes a browser RATen 27 de febrero de 2026 a las 11:29
Disguised as a security check, this fake Google alert uses browser permissions to harvest contacts, location data, and more.
- ISC Stormcast For Friday, February 27th, 2026 https://isc.sans.edu/podcastdetail/9828, (Fri, Feb 27th)en 27 de febrero de 2026 a las 02:00
- Fake Zoom and Google Meet scams install Teramind: A technical deep diveen 26 de febrero de 2026 a las 22:40
Attackers don’t always need custom malware. Sometimes they just need a trusted brand and a legitimate tool.
- How to understand and avoid Advanced Persistent Threatsen 26 de febrero de 2026 a las 18:52
APT stands for Advanced Persistent Threat. But what does that actually mean, and how does it translate into the kind of threat you’re facing?
- Finding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)en 26 de febrero de 2026 a las 12:21
[This is a Guest Diary by Austin Bodolay, an ISC intern as part of the SANS.edu BACS program]
- The CLAIR Model: A Synthesized Conceptual Framework for Mapping Critical Infrastructure Interdependencies [Guest Diary], (Wed, Feb 25th)en 26 de febrero de 2026 a las 12:21
- The Conduent breach; from 10 million to 25 million (and counting)en 26 de febrero de 2026 a las 11:16
A third-party breach at Conduent now affects 25 million Americans—many never knew their data flowed through its systems.
- Instagram flagged explicit messages to minors in 2018. Image-blurring arrived six years lateren 26 de febrero de 2026 a las 10:34
Unsealed court records reveal Instagram executives discussed explicit messages to teens years before a blur feature was introduced.
