RADICL Raises $31 Million for vSOC

The company will use the investment to accelerate development of its autonomous virtual security operations center (vSOC).

The post RADICL Raises $31 Million for vSOC appeared first on SecurityWeek.

SecurityWeek – ​Read More

Dyson’s latest stick vacuum is impossibly thin and lightweight – but is it worth it at $599?

The PencilVac’s cleaning head replaces the traditional roller brush with hair-detangling cones, and it’s available starting today.

Latest news – ​Read More

The top 5 Presidents’ Day deals I’d buy right now (including a free Samsung TV offer)

Presidents’ Day 2026 is coming soon, but there’s already tech savings to be had. Here are my favorite offers I’ve seen scouring the sales so far, including great deals on TVs ahead of the Super Bowl.

Latest news – ​Read More

The 10 most popular products ZDNET readers bought last month

From Bluetooth trackers to power banks, these are the top tech gadgets and useful items our readers actually purchased last month.

Latest news – ​Read More

Vulnerability Allows Hackers to Hijack OpenClaw AI Assistant 

OpenClaw (aka Moltbot and Clawdbot) is vulnerable to one-click remote code execution attacks.

The post Vulnerability Allows Hackers to Hijack OpenClaw AI Assistant  appeared first on SecurityWeek.

SecurityWeek – ​Read More

Critical React Native Vulnerability Exploited in the Wild

Albeit mainly considered a theoretical risk, the flaw has been exploited to disable protections and deliver malware.

The post Critical React Native Vulnerability Exploited in the Wild appeared first on SecurityWeek.

SecurityWeek – ​Read More

Meet Moltbook, the Social Platform Where AI Agents Talk and Humans Watch

Moltbook is a new social platform where AI agents post and interact while humans observe, raising questions about autonomy, security, and agent behavior.

Hackread – Cybersecurity News, Data Breaches, AI, and More – ​Read More

Hackers Leak 5.1 Million Panera Bread Records

ShinyHunters has claimed the theft of 14 million records from the US bakery-cafe chain’s systems.

The post Hackers Leak 5.1 Million Panera Bread Records appeared first on SecurityWeek.

SecurityWeek – ​Read More

Everest Ransomware Claims 90GB Data Theft Involving Legacy Polycom Systems

Everest ransomware claims a breach involving legacy Polycom systems later acquired by HP Inc., alleging the theft of 90GB of internal data.

Hackread – Cybersecurity News, Data Breaches, AI, and More – ​Read More

The Week in Vulnerabilities: Open-Sources Fixes Urged by Cyble

Top IT vulnerabilities this week

Cyble Vulnerability Intelligence researchers tracked 1,147 vulnerabilities in the last week, and more than 128 of the disclosed vulnerabilities already have a publicly available Proof-of-Concept (PoC), significantly increasing the likelihood of real-world attacks. 

A total of 108 vulnerabilities were rated as critical under the CVSS v3.1 scoring system, while 54 received a critical severity rating based on the newer CVSS v4.0 scoring system. 

Below are some of the IT vulnerabilities flagged by Cyble threat intelligence researchers for prioritization by security teams in recent reports to clients. 

The Week’s Top IT Vulnerabilities 

Cyble’s network of honeypot sensors detected attack attempts on CVE-2025-68613, a critical remote code execution flaw in the n8n open-source workflow automation platform. Workflow expressions supplied by authenticated users could execute in an insufficiently isolated context under the Improper Control of Dynamically-Managed Code Resources flaw, potentially enabling arbitrary code execution with n8n privileges and potential full system compromise. The issue is fixed in versions 1.120.4, 1.121.1, and 1.122.0. 

Vulnerabilities generating discussion in open-source communities included CVE-2025-8088, a high-severity path traversal vulnerability in WinRAR that exploits Alternate Data Streams (ADS) in crafted RAR archives. The vulnerability was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog last August, but recent reports reveal that multiple actors, including nation-state adversaries and financially motivated groups, are exploiting the flaw to establish initial access and deploy a diverse array of payloads. 

Also under active discussion is CVE-2025-15467, a critical stack buffer overflow in OpenSSL’s CMS (Cryptographic Message Syntax) AuthEnvelopedData parsing when using AEAD ciphers like AES-GCM. OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to the issue, while FIPS modules and OpenSSL 1.1.1 and 1.0.2 are not. 

Among the recent additions to CISA’s Known Exploited Vulnerabilities (KEV) catalog were CVE-2026-24858, an authentication bypass vulnerability in Fortinet products; CVE-2025-68645, a Local File Inclusion (LFI) vulnerability in the Webmail Classic UI of Zimbra Collaboration Suite (ZCS); and CVE-2026-1281, an Ivanti Endpoint Manager Mobile (EPMM) Code Injection vulnerability. 

CVE-2026-24061 is another recent CISA KEV addition, a critical authentication bypass vulnerability in GNU Inetutils telnetd. The flaw lies in the improper neutralization of argument delimiters, specifically allowing an attacker to inject the “-f root” value into the USER environment variable. After successful exploitation, a remote unauthenticated attacker can bypass authentication mechanisms to gain immediate root-level access to the system over the network. Cyble dark web researchers have observed threat actors on underground forums discussing weaponizing the vulnerability. 

Another vulnerability under discussion by threat actors on the dark web is CVE-2025-27237, a high-severity local privilege escalation vulnerability affecting Zabbix Agent and Agent 2 on Windows. The vulnerability is caused by an uncontrolled search path that loads the OpenSSL configuration file from a directory writable by low-privileged users. By modifying this configuration file and injecting a malicious DLL, a local attacker could elevate their privileges to the SYSTEM level on the affected Windows host. 

CVE-2026-22794, a critical authentication bypass vulnerability in Appsmith, is also under active discussion by threat actors. The flaw occurs because the application trusts a user-controlled HTTP “Origin” header during security-sensitive workflows, such as password resets. An attacker could use this to generate fraudulent links that, when clicked by a victim, send secret authentication tokens to an attacker-controlled domain, enabling full account takeover of any user, including administrators. 

Among industrial control system (ICS) vulnerabilities of note, Festo Didactic SE MES PCs shipped with Windows 10 include a copy of XAMPP that contains around 140 vulnerabilities from third-party open-source applications, CISA said in a recent advisory. The issues can be fixed by replacing XAMPP with Festo Didactic’s Factory Control Panel application. 

Conclusion 

The high number of number of open-source vulnerabilities this week highlights the ever-present threat of software supply chain attacks, requiring constant vigilance by both security and development teams. Best practices aimed at reducing cyber risk and improving resilience include: 

  • Protecting web-facing assets.  

  • Segmenting networks and critical assets.  

  • Hardening endpoints and infrastructure.  

  • Strong access controls, allowing no more access than is required, with frequent verification.  

  • A strong source of user identity and authentication, including multi-factor authentication and biometrics, as well as machine authentication with device compliance and health checks.  

  • Encryption of data at rest and in transit.  

  • Ransomware-resistant backups that are immutable, air-gapped, and isolated as much as possible.  

  • Honeypots that lure attackers to fake assets for early breach detection.  

  • Proper configuration of APIs and cloud service connections.  

  • Monitoring for unusual and anomalous activity with SIEM, Active Directory monitoring, endpoint security, and data loss prevention (DLP) tools.  

  • Routinely assessing and confirming controls through audits, vulnerability scanning, and penetration tests.  

Cyble’s comprehensive attack surface management solutions can help by scanning network and cloud assets for exposures and prioritizing fixes, in addition to monitoring for leaked credentials and other early warning signs of major cyberattacks.  

Additionally, Cyble’s third-party risk intelligence can help organizations carefully vet partners and suppliers, providing an early warning of potential risks. 

The post The Week in Vulnerabilities: Open-Sources Fixes Urged by Cyble appeared first on Cyble.

Cyble – ​Read More