Latest security news
- Cisco FMC flaw was exploited by Interlock weeks before patch (CVE-2026-20131)
- Google slows Android sideloading to trip up scammers
- Terminated contract led to $2.5 million cyber extortion scheme
- Hackers Exploit Critical Langflow Bug in Just 20 Hours
- Fake AI songs streamed billions of times, netting fraudster $10 million
- NCA Boss Warns That Teens Are Being “Radicalized” Into Cybercrime Online
- Unpatched ScreenConnect servers open to attack (CVE-2026-3564)
- Ransomware Affiliate Exposes Details of 'The Gentlemen' Operation
- Financial Brands Targeted in Global Mobile Banking Malware Surge
- FCA Updates Cyber Incident and Third-Party Reporting Rules
- AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January
- UK: Regulation Drives Cyber Spending for Critical Infrastructure Orgs
- New Ubuntu Flaw Enables Local Attackers to Gain Root Access
- Crypto Scam "ShieldGuard" Dismantled After Malware Discovery
- AI-Enabled Adversaries Compress Time-to-Exploit Following Vulnerability Disclosure
- Vidar Stealer 2.0 Exploits GitHub, Reddit to Deliver Malware via Fake Game Cheats
- AI Issues Will Drive Half of Incident Response Efforts by 2028, Says Gartner
- Android OS-Level Attack Bypasses Mobile Payment Security
- 'CursorJack’ Attack Path Exposes Code Execution Risk in AI Development Environment
- Surge in Nation State Attacks on UK Firms Amid Cyber Warfare Fears
A critical vulnerability (CVE-2026-20131) in Cisco Secure Firewall Management Center (FMC) that Cisco disclosed and patched in early March 2026 has been exploited as a zero-day by the Interlock ransomware gang, Amazon CISO and VP of Security Engineering CJ Moses revealed. “Our research [using Amazon’s MadPot system of honeypots] found that Interlock was exploiting this vulnerability 36 days before its public disclosure, beginning January 26, 2026,” he said on Wednesday. CVE-2026-20131 exploited as zero-day for …
(C) Do-Know.com (http://do-know.com/). Do not copy without permission from info at do-know.com.