Secciones
- Vulnerabilidades y CVEs
- Exploits y pruebas de concepto
- Noticias de seguridad / hacking / malware
- Malware y análisis de amenazas
- Fabricantes de hardware
CERTs / Gobiernos
Fabricantes/ Vendors
- Adobe Security Bulletins
- Oracle Critical Patch Updates
- VMware Security Advisories
- Apple Security Updates
- Google Chrome Releases / Security
- Microsoft Security Bulletins (HTML)
Otros fabricantes y plataformas
Fabricantes de hardware
Vulnerabilidades y CVEs
- [local] NetBT e-Fatura – Privilege Escalationen 10 de abril de 2026 a las 00:00
NetBT e-Fatura – Privilege Escalation
- [webapps] D-Link DIR-650IN – Authenticated Command Injectionen 10 de abril de 2026 a las 00:00
D-Link DIR-650IN – Authenticated Command Injection
- [webapps] React Server 19.2.0 – Remote Code Executionen 9 de abril de 2026 a las 00:00
React Server 19.2.0 – Remote Code Execution
- [webapps] RomM 4.4.0 – XSS_CSRF Chainen 9 de abril de 2026 a las 00:00
RomM 4.4.0 – XSS_CSRF Chain
- [webapps] Jumbo Website Manager – Remote Code Executionen 9 de abril de 2026 a las 00:00
Jumbo Website Manager – Remote Code Execution
- [local] ZSH 5.9 – RCEen 9 de abril de 2026 a las 00:00
ZSH 5.9 – RCE
- [webapps] FortiWeb 8.0.2 – Remote Code Executionen 8 de abril de 2026 a las 00:00
FortiWeb 8.0.2 – Remote Code Execution
- [local] 7-Zip 24.00 – Directory Traversalen 8 de abril de 2026 a las 00:00
7-Zip 24.00 – Directory Traversal
- [webapps] xibocms 3.3.4 – RCEen 8 de abril de 2026 a las 00:00
xibocms 3.3.4 – RCE
- [local] SQLite 3.50.1 – Heap Overflowen 8 de abril de 2026 a las 00:00
SQLite 3.50.1 – Heap Overflow
Exploits y pruebas de concepto
- [local] NetBT e-Fatura – Privilege Escalationen 10 de abril de 2026 a las 00:00
NetBT e-Fatura – Privilege Escalation
- [webapps] D-Link DIR-650IN – Authenticated Command Injectionen 10 de abril de 2026 a las 00:00
D-Link DIR-650IN – Authenticated Command Injection
- [webapps] React Server 19.2.0 – Remote Code Executionen 9 de abril de 2026 a las 00:00
React Server 19.2.0 – Remote Code Execution
- [webapps] RomM 4.4.0 – XSS_CSRF Chainen 9 de abril de 2026 a las 00:00
RomM 4.4.0 – XSS_CSRF Chain
- [webapps] Jumbo Website Manager – Remote Code Executionen 9 de abril de 2026 a las 00:00
Jumbo Website Manager – Remote Code Execution
- [local] ZSH 5.9 – RCEen 9 de abril de 2026 a las 00:00
ZSH 5.9 – RCE
- [webapps] FortiWeb 8.0.2 – Remote Code Executionen 8 de abril de 2026 a las 00:00
FortiWeb 8.0.2 – Remote Code Execution
- [local] 7-Zip 24.00 – Directory Traversalen 8 de abril de 2026 a las 00:00
7-Zip 24.00 – Directory Traversal
- [webapps] xibocms 3.3.4 – RCEen 8 de abril de 2026 a las 00:00
xibocms 3.3.4 – RCE
- [local] SQLite 3.50.1 – Heap Overflowen 8 de abril de 2026 a las 00:00
SQLite 3.50.1 – Heap Overflow
- [local] Microsoft MMC MSC EvilTwin – Local Admin Creationen 8 de abril de 2026 a las 00:00
Microsoft MMC MSC EvilTwin – Local Admin Creation
- [webapps] Horilla v1.3 – RCEen 8 de abril de 2026 a las 00:00
Horilla v1.3 – RCE
- [local] is-localhost-ip 2.0.0 – SSRFen 6 de abril de 2026 a las 00:00
is-localhost-ip 2.0.0 – SSRF
- [webapps] Fortinet FortiWeb v8.0.1 – Auth Bypassen 6 de abril de 2026 a las 00:00
Fortinet FortiWeb v8.0.1 – Auth Bypass
- [local] Windows Kernel – Elevation of Privilegeen 6 de abril de 2026 a las 00:00
Windows Kernel – Elevation of Privilege
- [local] Desktop Window Manager Core Library 10.0.10240.0 – Privilege Escalationen 6 de abril de 2026 a las 00:00
Desktop Window Manager Core Library 10.0.10240.0 – Privilege Escalation
- [webapps] Grafana 11.6.0 – SSRFen 6 de abril de 2026 a las 00:00
Grafana 11.6.0 – SSRF
- [webapps] ASP.net 8.0.10 – Bypassen 6 de abril de 2026 a las 00:00
ASP.net 8.0.10 – Bypass
- [webapps] Zhiyuan OA – arbitrary file upload leadingen 6 de abril de 2026 a las 00:00
Zhiyuan OA – arbitrary file upload leading
- [webapps] RiteCMS 3.1.0 – Authenticated Remote Code Executionen 6 de abril de 2026 a las 00:00
RiteCMS 3.1.0 – Authenticated Remote Code Execution
Noticias de seguridad / hacking / malware
- Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attackspor Ionut Arghire en 18 de abril de 2026 a las 10:30
Threat actors are reusing Tycoon 2FA tools across other phishing kits following the platform’s disruption. The post Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks appeared first on SecurityWeek.
- [Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Datapor info@thehackernews.com (The Hacker News) en 18 de abril de 2026 a las 08:07
In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials: service accounts, API tokens, AI agent connections, and OAuth grants. When projects end or employees leave, most
- $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claimspor info@thehackernews.com (The Hacker News) en 18 de abril de 2026 a las 07:59
Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it’s suspending operations after it blamed Western intelligence agencies for a $13.74 million hack. The exchange said it fell victim to what it described as a large-scale cyber attack that bore hallmarks of foreign intelligence agency involvement. This attack led to the theft of over 1
- Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnetpor info@thehackernews.com (The Hacker News) en 18 de abril de 2026 a las 06:01
Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet FortiGuard Labs and Palo Alto Networks Unit 42. The attack targeting TBK DVR devices has been found to exploit CVE-2024-3721 (CVSS score: 6.3), a medium-severity command injection vulnerability affecting
- Friday Squid Blogging: New Giant Squid Videopor Bruce Schneier en 17 de abril de 2026 a las 21:05
Pretty fantastic video from Japan of a giant squid eating another squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.
- Payouts King ransomware uses QEMU VMs to bypass endpoint securitypor Bill Toulas en 17 de abril de 2026 a las 19:10
The Payouts King ransomware is using the QEMU emulator as a reverse SSH backdoor to run hidden virtual machines on compromised systems and bypass endpoint security. […]
- White House Chief of Staff to Meet With Anthropic CEO Over Its New AI Technologypor Associated Press en 17 de abril de 2026 a las 19:00
A White House official said the administration is engaging with advanced AI labs about their models and the security of software. The post White House Chief of Staff to Meet With Anthropic CEO Over Its New AI Technology appeared first on SecurityWeek.
- Grinex exchange blames «Western intelligence» for $13.7M crypto hackpor Bill Toulas en 17 de abril de 2026 a las 15:08
Kyrgyzstan-based cryptocurrency exchange Grinex has suspended its operations after suffering a $13.7 million hack attributed to Western intelligence agencies. […]
- CoChat Launches AI Collaboration Platform to Combat Shadow AIpor Kevin Townsend en 17 de abril de 2026 a las 15:00
CoChat is fundamentally an AI collaboration platform designed for teamwork and to bring visibility and governance into enterprise AI shadows. The post CoChat Launches AI Collaboration Platform to Combat Shadow AI appeared first on SecurityWeek.
- Inside an Underground Guide: How Threat Actors Vet Stolen Credit Card Shopspor Sponsored by Flare en 17 de abril de 2026 a las 14:01
In cybercrime markets, trust isn’t assumed, it’s verified. Flare reveals how underground guides teach actors to evaluate carding shops based on data quality, reputation, and survivability. […]
Malware y análisis de amenazas
- ISC Stormcast For Friday, April 17th, 2026 https://isc.sans.edu/podcastdetail/9896, (Fri, Apr 17th)en 17 de abril de 2026 a las 02:00
- Lumma Stealer infection with Sectop RAT (ArechClient2), (Fri, Apr 17th)en 17 de abril de 2026 a las 00:30
Introduction
- [Guest Diary] Compromised DVRs and Finding Them in the Wild, (Thu, Apr 16th)en 16 de abril de 2026 a las 19:20
&#;x26;#;x5b;This is a Guest Diary by Alec Jaffe, an ISC intern as part of the SANS.edu Bachelor&#;x26;#;39;s Degree in Applied Cybersecurity (BACS) program &#;x26;#;x5b;1].
- ISC Stormcast For Thursday, April 16th, 2026 https://isc.sans.edu/podcastdetail/9894, (Thu, Apr 16th)en 16 de abril de 2026 a las 02:00
- ISC Stormcast For Wednesday, April 15th, 2026 https://isc.sans.edu/podcastdetail/9892, (Wed, Apr 15th)en 15 de abril de 2026 a las 02:00
- Scanning for AI Models, (Tue, Apr 14th)en 15 de abril de 2026 a las 00:19
Starting March 10, 2026, my DShield sensor started getting probe for various AI models such as claude, openclaw, huggingface, etc. Reviewing the data already reported by other DShield sensors to ISC, the DShield database shows reporting of these probes started that day and has been active ever since.
- Microsoft Patch Tuesday April 2026., (Tue, Apr 14th)en 14 de abril de 2026 a las 17:46
This month&#;x26;#;39;s Microsoft Patch Tuesday looks like a record one, but let&#;x26;#;39;s look at it a bit closer to understand what is happening
- ISC Stormcast For Tuesday, April 14th, 2026 https://isc.sans.edu/podcastdetail/9890, (Tue, Apr 14th)en 14 de abril de 2026 a las 02:00
- Scans for EncystPHP Webshell, (Mon, Apr 13th)en 13 de abril de 2026 a las 13:02
Last week, I wrote about attackers scanning for various webshells, hoping to find some that do not require authentication or others that use well-known credentials. But some attackers are paying attention and are deploying webshells with more difficult-to-guess credentials. Today, I noticed some scans for what appears to be the «EncystPHP» web shell. Fortinet wrote about this webshell back in January. It appears to be a favorite among attackers compromising vulnerable FreePBX systems.
- ISC Stormcast For Monday, April 13th, 2026 https://isc.sans.edu/podcastdetail/9888, (Mon, Apr 13th)en 13 de abril de 2026 a las 02:00
