Secciones
- Vulnerabilidades y CVEs
- Exploits y pruebas de concepto
- Noticias de seguridad / hacking / malware
- Malware y análisis de amenazas
- Fabricantes de hardware
CERTs / Gobiernos
Fabricantes/ Vendors
- Adobe Security Bulletins
- Oracle Critical Patch Updates
- VMware Security Advisories
- Apple Security Updates
- Google Chrome Releases / Security
- Microsoft Security Bulletins (HTML)
Otros fabricantes y plataformas
Fabricantes de hardware
Vulnerabilidades y CVEs
- [local] NetBT e-Fatura – Privilege Escalationen 10 de abril de 2026 a las 00:00
NetBT e-Fatura – Privilege Escalation
- [webapps] D-Link DIR-650IN – Authenticated Command Injectionen 10 de abril de 2026 a las 00:00
D-Link DIR-650IN – Authenticated Command Injection
- [webapps] React Server 19.2.0 – Remote Code Executionen 9 de abril de 2026 a las 00:00
React Server 19.2.0 – Remote Code Execution
- [webapps] RomM 4.4.0 – XSS_CSRF Chainen 9 de abril de 2026 a las 00:00
RomM 4.4.0 – XSS_CSRF Chain
- [webapps] Jumbo Website Manager – Remote Code Executionen 9 de abril de 2026 a las 00:00
Jumbo Website Manager – Remote Code Execution
- [local] ZSH 5.9 – RCEen 9 de abril de 2026 a las 00:00
ZSH 5.9 – RCE
- [webapps] FortiWeb 8.0.2 – Remote Code Executionen 8 de abril de 2026 a las 00:00
FortiWeb 8.0.2 – Remote Code Execution
- [local] 7-Zip 24.00 – Directory Traversalen 8 de abril de 2026 a las 00:00
7-Zip 24.00 – Directory Traversal
- [webapps] xibocms 3.3.4 – RCEen 8 de abril de 2026 a las 00:00
xibocms 3.3.4 – RCE
- [local] SQLite 3.50.1 – Heap Overflowen 8 de abril de 2026 a las 00:00
SQLite 3.50.1 – Heap Overflow
Exploits y pruebas de concepto
- [local] NetBT e-Fatura – Privilege Escalationen 10 de abril de 2026 a las 00:00
NetBT e-Fatura – Privilege Escalation
- [webapps] D-Link DIR-650IN – Authenticated Command Injectionen 10 de abril de 2026 a las 00:00
D-Link DIR-650IN – Authenticated Command Injection
- [webapps] React Server 19.2.0 – Remote Code Executionen 9 de abril de 2026 a las 00:00
React Server 19.2.0 – Remote Code Execution
- [webapps] RomM 4.4.0 – XSS_CSRF Chainen 9 de abril de 2026 a las 00:00
RomM 4.4.0 – XSS_CSRF Chain
- [webapps] Jumbo Website Manager – Remote Code Executionen 9 de abril de 2026 a las 00:00
Jumbo Website Manager – Remote Code Execution
- [local] ZSH 5.9 – RCEen 9 de abril de 2026 a las 00:00
ZSH 5.9 – RCE
- [webapps] FortiWeb 8.0.2 – Remote Code Executionen 8 de abril de 2026 a las 00:00
FortiWeb 8.0.2 – Remote Code Execution
- [local] 7-Zip 24.00 – Directory Traversalen 8 de abril de 2026 a las 00:00
7-Zip 24.00 – Directory Traversal
- [webapps] xibocms 3.3.4 – RCEen 8 de abril de 2026 a las 00:00
xibocms 3.3.4 – RCE
- [local] SQLite 3.50.1 – Heap Overflowen 8 de abril de 2026 a las 00:00
SQLite 3.50.1 – Heap Overflow
- [local] Microsoft MMC MSC EvilTwin – Local Admin Creationen 8 de abril de 2026 a las 00:00
Microsoft MMC MSC EvilTwin – Local Admin Creation
- [webapps] Horilla v1.3 – RCEen 8 de abril de 2026 a las 00:00
Horilla v1.3 – RCE
- [local] is-localhost-ip 2.0.0 – SSRFen 6 de abril de 2026 a las 00:00
is-localhost-ip 2.0.0 – SSRF
- [webapps] Fortinet FortiWeb v8.0.1 – Auth Bypassen 6 de abril de 2026 a las 00:00
Fortinet FortiWeb v8.0.1 – Auth Bypass
- [local] Windows Kernel – Elevation of Privilegeen 6 de abril de 2026 a las 00:00
Windows Kernel – Elevation of Privilege
- [local] Desktop Window Manager Core Library 10.0.10240.0 – Privilege Escalationen 6 de abril de 2026 a las 00:00
Desktop Window Manager Core Library 10.0.10240.0 – Privilege Escalation
- [webapps] Grafana 11.6.0 – SSRFen 6 de abril de 2026 a las 00:00
Grafana 11.6.0 – SSRF
- [webapps] ASP.net 8.0.10 – Bypassen 6 de abril de 2026 a las 00:00
ASP.net 8.0.10 – Bypass
- [webapps] Zhiyuan OA – arbitrary file upload leadingen 6 de abril de 2026 a las 00:00
Zhiyuan OA – arbitrary file upload leading
- [webapps] RiteCMS 3.1.0 – Authenticated Remote Code Executionen 6 de abril de 2026 a las 00:00
RiteCMS 3.1.0 – Authenticated Remote Code Execution
Noticias de seguridad / hacking / malware
- Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Trafficpor info@thehackernews.com (The Hacker News) en 16 de abril de 2026 a las 17:52
Cybersecurity researchers have warned of an active malicious campaign that’s targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025. «PowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections,» Cisco Talos
- Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Facepor Bill Toulas en 16 de abril de 2026 a las 16:58
Hackers are exploiting a critical vulnerability in Marimo reactive Python notebook to deploy a new variant of NKAbuse malware hosted on Hugging Face Spaces. […]
- Google expands Gemini AI use to fight malicious ads on its platformpor Lawrence Abrams en 16 de abril de 2026 a las 15:24
Google says it is increasingly using its Gemini AI models to detect and block harmful ads on its advertising platforms, as scammers and threat actors continue to evolve their tactics to evade detection. […]
- New ATHR vishing platform uses AI voice agents for automated attackspor Bill Toulas en 16 de abril de 2026 a las 14:09
A new cybercrime platform called ATHR can harvest credentials via fully automated voice phishing attacks that use both human operators and AI agents for the social engineering phase. […]
- Most «AI SOCs» Are Just Faster Triage. That’s Not Enough.por Sponsored by Tines en 16 de abril de 2026 a las 14:02
AI-powered SOC tools promise automation, but most only speed up triage instead of reducing real workload. Tines shows how real gains come from end-to-end workflows that execute actions across systems, not just summarize alerts. […]
- ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Storiespor info@thehackernews.com (The Hacker News) en 16 de abril de 2026 a las 13:05
You know that feeling when you open your feed on a Thursday morning and it’s just… a lot? Yeah. This week delivered. We’ve got hackers getting creative in ways that are almost impressive if you ignore the whole «crime» part, ancient vulnerabilities somehow still ruining people’s days, and enough supply chain drama to fill a season of television nobody asked for. Not
- Cisco says critical Webex Services flaw requires customer actionpor Sergiu Gatlan en 16 de abril de 2026 a las 12:01
Cisco has released security updates to patch four critical vulnerabilities, including a fixed improper certificate validation flaw in the company’s cloud-based Webex Services platform that requires further customer action. […]
- [Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environmentpor info@thehackernews.com (The Hacker News) en 16 de abril de 2026 a las 11:55
In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials: service accounts, API tokens, AI agent connections, andOAuth grants. When projects end or employees leave, most
- Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Executionpor info@thehackernews.com (The Hacker News) en 16 de abril de 2026 a las 11:27
Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the service. The details of the vulnerabilities are below – CVE-2026-20184 (CVSS score: 9.8) – An improper certificate validation in the integration of single sign-on (SSO)
- Data breach at edtech giant McGraw Hill affects 13.5 million accountspor Sergiu Gatlan en 16 de abril de 2026 a las 10:35
The ShinyHunters extortion group has leaked data from 13.5 million McGraw Hill user accounts, stolen after breaching the company’s Salesforce environment earlier this month. […]
Malware y análisis de amenazas
- [Guest Diary] Compromised DVRs and Finding Them in the Wild, (Thu, Apr 16th)en 16 de abril de 2026 a las 19:20
&#;x26;#;x5b;This is a Guest Diary by Alec Jaffe, an ISC intern as part of the SANS.edu Bachelor&#;x26;#;39;s Degree in Applied Cybersecurity (BACS) program &#;x26;#;x5b;1].
- ISC Stormcast For Thursday, April 16th, 2026 https://isc.sans.edu/podcastdetail/9894, (Thu, Apr 16th)en 16 de abril de 2026 a las 02:00
- ISC Stormcast For Wednesday, April 15th, 2026 https://isc.sans.edu/podcastdetail/9892, (Wed, Apr 15th)en 15 de abril de 2026 a las 02:00
- Scanning for AI Models, (Tue, Apr 14th)en 15 de abril de 2026 a las 00:19
Starting March 10, 2026, my DShield sensor started getting probe for various AI models such as claude, openclaw, huggingface, etc. Reviewing the data already reported by other DShield sensors to ISC, the DShield database shows reporting of these probes started that day and has been active ever since.
- Microsoft Patch Tuesday April 2026., (Tue, Apr 14th)en 14 de abril de 2026 a las 17:46
This month&#;x26;#;39;s Microsoft Patch Tuesday looks like a record one, but let&#;x26;#;39;s look at it a bit closer to understand what is happening
- ISC Stormcast For Tuesday, April 14th, 2026 https://isc.sans.edu/podcastdetail/9890, (Tue, Apr 14th)en 14 de abril de 2026 a las 02:00
- Scans for EncystPHP Webshell, (Mon, Apr 13th)en 13 de abril de 2026 a las 13:02
Last week, I wrote about attackers scanning for various webshells, hoping to find some that do not require authentication or others that use well-known credentials. But some attackers are paying attention and are deploying webshells with more difficult-to-guess credentials. Today, I noticed some scans for what appears to be the «EncystPHP» web shell. Fortinet wrote about this webshell back in January. It appears to be a favorite among attackers compromising vulnerable FreePBX systems.
- ISC Stormcast For Monday, April 13th, 2026 https://isc.sans.edu/podcastdetail/9888, (Mon, Apr 13th)en 13 de abril de 2026 a las 02:00
- Obfuscated JavaScript or Nothing, (Thu, Apr 9th)en 10 de abril de 2026 a las 06:40
I spotted an interesting piece of JavaScript code that was delivered via a phishing email in a RAR archive. The file was called âcbmjlzan.JSâ (SHA256:a8ba9ba93b4509a86e3d7dd40fd0652c2743e32277760c5f7942b788b74c5285) and is only identified as malicious by 15 AV’s on VirusTotal[1].
- ISC Stormcast For Thursday, April 9th, 2026 https://isc.sans.edu/podcastdetail/9886, (Thu, Apr 9th)en 9 de abril de 2026 a las 02:00
