HomeOSINTNewsSignals

๐Ÿšจ Falcon Signals

Live cybersecurity signals from public OSINT sources

๐Ÿ“ก Sources

BleepingComputer (7)
CISA Alerts (10)
Dark Reading (8)
Krebs on Security (5)
Recorded Future (4)
SANS ISC (2)
The Hacker News (7)
Threatpost (7)
US-CERT (10)
HIGH๐Ÿ”ด Attacks2026-04-22 16:04

New Mirai campaign exploits RCE flaw in EoL D-Link routers

A new Mirai-based malware campaign is actively exploiting CVE-2025-29635, a high-severity command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet. [...]

HIGH๐Ÿ”ด Attacks2026-04-22 14:52

Kyber ransomware gang toys with post-quantum encryption on Windows

A new Kyber ransomware operation is targeting Windows systems and VMware ESXi endpoints in recent attacks, with one variant implementing Kyber1024 post-quantum encryption. [...]

HIGH๐Ÿ”ด Attacks2026-04-22 08:24

Microsoft Teams to get efficiency mode on PCs with limited resources

Microsoft is preparing to roll out a new Efficiency Mode for Microsoft Teams for systems with limited CPU and memory resources to improve app responsiveness. [...]

HIGH๐Ÿ”ด Attacks2026-04-22 04:08

Microsoft releases emergency patches for critical ASP.NET flaw

Microsoft has released out-of-band (OOB) security updates to patch a critical ASP.NET Core privilege escalation vulnerability. [...]

HIGH๐Ÿ”ด Attacks2026-04-23 14:10

Vercel Finds More Compromised Accounts in Context.ai-Linked Breach

Vercel on Wednesday revealed that it has identified an additional set of customer accounts that were compromised as part of a security incident that enabled unauthorized access to its internal systems. The company said it made the discovery after expanding its investigation to include an extra set o

HIGH๐Ÿ”ด Attacks2026-04-22 14:59

Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug

Microsoft has released out-of-band updates to address a security vulnerability in ASP.NET Core that could allow an attacker to escalate privileges. The vulnerability, tracked as CVE-2026-40372, carries a CVSS score of 9.1 out of 10.0. It's rated Important in severity. An anonymous researcher has bee

HIGH๐Ÿ” Investigations2026-04-14 21:47

Patch Tuesday, April 2026 Edition

Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dubbed "BlueHammer." Separately, Google Chrome fixed its fourth

HIGH๐Ÿ” Investigations2026-04-06 02:07

Germany Doxes โ€œUNKN,โ€ Head of RU Ransomware Gangs REvil, GandCrab

An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gangs and helped carry out at least 130 acts of computer sabotag

HIGH๐Ÿ” Investigations2026-03-11 00:32

Microsoft Patch Tuesday, March 2026 Edition

Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing "zero-day" flaws this month (compared to February's five zero-day treat), but as usual some patches may deserve more rapid attention from organi

HIGH๐ŸŸ  Threats2026-04-22 20:51

'The Gentlemen' Rapidly Rises to Ransomware Prominence

Not nearly as polite as the name suggests, the ransomware gang has impressed researchers with its speed in scaling up operations โ€” and its sophistication.

HIGH๐ŸŸ  Threats2026-04-21 21:12

Ransomware Negotiator Pleads Guilty to BlackCat Scheme

A cautionary tale illustrates why the person negotiating should never be involved with any part of the ransom payment process.

HIGH๐ŸŸ  Threats2026-04-21 15:29

Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk

The critical remote code execution flaw (CVE-2026-1731) in the remote monitoring and management tool can be exploited to spread ransomware and compromise supply chains.

HIGH๐ŸŸ  Threats2026-04-21 15:00

Google Fixes Critical RCE Flaw in AI-Based 'Antigravity' Tool

The prompt-injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that allowed for sandbox escape and arbitrary code execution.

HIGH๐ŸŸ  Threats2026-04-20 21:01

Vercel Employee's AI Tool Access Led to Data Breach

Stolen OAuth tokens, which are at the root of these breaches, "are the new attack surface, the new lateral movement," a researcher notes.

HIGH๐ŸŸ  Threats2022-08-31 12:57

Student Loan Breach Exposes 2.5M Records

2.5 million people were affected, in a breach that could spell more trouble down the line.

HIGH๐ŸŸ  Threats2022-08-26 16:44

Ransomware Attacks are on the Rise

Lockbit is by far this summerโ€™s most prolific ransomware group, trailed by two offshoots of the Conti group.

HIGH๐ŸŸ  Threats2022-08-25 18:47

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.

HIGH๐ŸŸ  Threats2022-08-19 15:25

iPhone Users Urged to Update to Patch 2 Zero-Days

Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack.

HIGH๐ŸŸ  Threats2022-08-18 14:31

Google Patches Chromeโ€™s Fifth Zero-Day of the Year

An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.

HIGH๐ŸŸก Advisory2026-04-21 12:00

Silex Technology SD-330AC and AMC Manager

View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, cause a denial-of-service, or configuration information may be altered without authentication. The following versions of Silex Technology SD-330AC and AMC Manager are affected: SD-3

HIGH๐ŸŸก Advisory2026-04-21 12:00

Siemens RUGGEDCOM CROSSBOW Secure Access Manager Primary

View CSAF Summary RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) contains a vulnerability that could allow an attacker to escalate their own privileges. Siemens has released a new version for RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) and recommends to update to the latest ve

HIGH๐ŸŸก Advisory2026-04-21 12:00

Siemens TPM 2.0

View CSAF Summary The products listed below contain a vulnerability that could allow an attacker to perform an out-of-bound read, potentially leading to information disclosure or denial of service of the TPM. Siemens has released new versions for several affected products and recommends to update to

HIGH๐ŸŸก Advisory2026-04-21 12:00

SenseLive X3050

View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to take complete control of the device. The following versions of SenseLive X3050 are affected: X3050 V1.523 (CVE-2026-40630, CVE-2026-25720, CVE-2026-35503, CVE-2026-39462, CVE-2026-27843, CVE-2026-40431, CV

HIGH๐ŸŸก Advisory2026-04-21 12:00

Siemens Analytics Toolkit

View CSAF Summary Multiple Siemens applications are affected by improper certificate validation in Siemens Analytics Toolkit. This could allow an unauthenticated remote attacker to perform man in the middle attacks. Siemens has released new versions for the affected products and recommends to update

HIGH๐ŸŸก Advisory2026-04-21 12:00

Siemens SCALANCE

View CSAF Summary SCALANCE W-700 IEEE 802.11n family before V6.6.0 are affected by multiple vulnerabilities. Siemens has released a new version for SCALANCE W-700 IEEE 802.11n family and recommends to update to the latest version. The following versions of Siemens SCALANCE are affected: SCALANCE W7

HIGH๐ŸŸก Advisory2026-04-21 12:00

Hardy Barth Salia EV Charge Controller

View CSAF Summary Successful exploitation of these vulnerabilities could crash the device being accessed; a buffer overflow condition may allow remote code execution. The following versions of Hardy Barth Salia EV Charge Controller are affected: Salia Board Firmware <=2.3.81 (CVE-2025-5873, CVE-

HIGH๐ŸŸก Advisory2026-04-21 12:00

Siemens SINEC NMS

View CSAF Summary Siemens SINEC NMS when used with User Management Component (UMC) contains an authentication bypass vulnerability due to insufficient validation of user identity. This could allow an unauthenticated remote attacker to bypass authentication and gain unauthorized access to the applica

HIGH๐ŸŸก Advisory2026-04-21 12:00

Zero Motorcycles Firmware

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to pair via Bluetooth with a motorcycle, gaining unauthorized access to all Bluetooth functions, including changing the firmware. The following versions of Zero Motorcycles Firmware are affected: Zero Motorcycle

HIGH๐ŸŸก Advisory2026-04-06 07:03

Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure

Advisory at a Glance Title Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure Original Publication April 7, 2026 Executive Summary Iran-affiliated advanced persistent threat (APT) actors are conducting exploitation activity targeting inte

HIGH๐ŸŸก Advisory2025-12-05 14:35

Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure

Summary Note: This joint Cybersecurity Advisory is being published as an addition to the Cybersecurity and Infrastructure Security Agency (CISA) May 6, 2025, joint fact sheet Primary Mitigations to Reduce Cyber Threats to Operational Technology and European Cybercrime Centreโ€™s (EC3) Operation Eastwo

HIGH๐ŸŸก Advisory2025-09-22 11:12

CISA Shares Lessons Learned from an Incident Response Engagement

Advisory at a Glance Executive Summary CISA began incident response efforts at a U.S. federal civilian executive branch (FCEB) agency following the detection of potential malicious activity identified through security alerts generated by the agencyโ€™s endpoint detection and response (EDR) tool. CI

HIGH๐ŸŸก Advisory2025-08-25 09:36

Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System

Executive summary Peopleโ€™s Republic of China (PRC) state-sponsored cyber threat actors are targeting networks globally, including, but not limited to, telecommunications, government, transportation, lodging, and military infrastructure networks. While these actors focus on large backbone routers of

HIGH๐ŸŸก Advisory2025-07-29 13:53

CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization

Summary The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) are issuing this Cybersecurity Advisory to present findings from a recent CISA and USCG hunt engagement. The purpose of this advisory is to highlight identified cybersecurity issues, thereby informing sec

HIGH๐ŸŸก Advisory2025-07-21 10:11

#StopRansomware: Interlock

Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniqu

HIGH๐ŸŸก Advisory2025-06-12 10:29

Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider

Summary The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this advisory in response to ransomware actors leveraging unpatched instances of a vulnerability in SimpleHelp Remote Monitoring and Management (RMM) to compromise customers of a utility billing software provider. This

HIGH๐ŸŸก Advisory2025-05-20 15:20

Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations

Summary The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint advisory to disseminate known tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with threat actors deploying the LummaC2

HIGH๐ŸŸก Advisory2025-05-12 12:49

Russian GRU Targeting Western Logistics Entities and Technology Companies

Executive Summary This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western

HIGH๐ŸŸก Advisory2025-04-01 15:00

Fast Flux: A National Security Threat

Executive summary Many networks have a gap in their defenses for detecting and blocking a malicious technique known as โ€œfast flux.โ€ This technique poses a significant threat to national security, enabling malicious cyber actors to consistently evade detection. Malicious cyber actors, including cyber

HIGH๐ŸŸฃ Intel2026-04-15 00:00

Your Supply Chain Breach Is Someone Else's Payday

A supply chain attack by TeamPCP compromised trusted software tools to harvest credentials at scale, enabling payroll fraud, logistics theft, and ransomware extortion.

HIGH๐ŸŸฃ Intel2026-04-13 00:00

March 2026 CVE Landscape: 31 High-Impact Vulnerabilities Identified, Interlock Ransomware Group Exploits Cisco FMC Zero-Day

March 2026 saw a 139% increase in high-impact vulnerabilities, with Recorded Future's Insikt Groupยฎ identifying 31 vulnerabilities requiring immediate remediation, up from 13 in February 2026.

MED๐Ÿ”ด Attacks2026-04-22 06:00

New GoGra malware for Linux uses Microsoft Graph API for comms

A Linux variant of the GoGra backdoor uses legitimate Microsoft infrastructure, relying on an Outlook inbox for stealthy payload delivery. [...]

MED๐Ÿ”ด Attacks2026-04-23 14:34

China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors

Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT) group tracked as GopherWhisper. "The group wields a wide array of tools mostly written in Go, using injectors and loaders to deploy and execute various backdoors

MED๐Ÿ”ด Attacks2026-04-23 13:36

Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case

Apple has rolled out a software fix for iOS and iPadOS to address a Notification Services flaw that stored notifications marked for deletion on the device. The vulnerability, tracked as CVE-2026-28950 (CVSS score: N/A), has been described as a logging issue that has been addressed with improved data

MED๐Ÿ”ด Attacks2026-04-22 20:58

Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API

The threat actor known as Harvester has been attributed to a new Linux version of its GoGra backdoor deployed as part of attacks likely targeting entities in South Asia. "The malware uses the legitimate Microsoft Graph API and Outlook mailboxes as a covert command-and-control (C2) channel, allowing

MED๐Ÿ”ด Attacks2026-04-22 16:25

Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack

Cybersecurity researchers have discovered a previously undocumented data wiper that has been used in attacks targeting Venezuela at the end of last year and the start of 2026. Dubbed Lotus Wiper, the novel file wiper has been used in a destructive campaign targeting the energy and utilities sector i

MED๐Ÿ”ด Attacks2026-04-22 13:28

Mustang Pandaโ€™s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles

Cybersecurity researchers have discovered a new variant of a known malware called LOTUSLITE that's distributed via a theme related to India's banking sector. "The backdoor communicates with a dynamic DNS-based command-and-control server over HTTPS and supports remote shell access, file operations, a

MED๐Ÿ” Investigations2026-04-21 14:53

โ€˜Scattered Spiderโ€™ Member โ€˜Tylerbโ€™ Pleads Guilty

A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phishing attacks in the summer of 2022 that allowed the group to

MED๐Ÿ” Investigations2026-02-28 12:01

Who is the Kimwolf Botmaster โ€œDortโ€?

In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world's largest and most disruptive botnet. Since then, the person in control of Kimwolf -- who goes by the handle "Dort" -- has coordinated a barrage of distrib

MED๐ŸŸ  Threats2026-04-22 14:48

DPRK Fake Job Scams Self-Propagate in 'Contagious Interview'

A compromised developer's repository serves as a worm-like infection vector to spread remote access Trojans (RATs) and other malware.

MED๐ŸŸ  Threats2026-04-21 19:12

Exploits Turn Windows Defender Into Attacker Tool

Three proof-of-concept exploits are being used in active attacks against Microsoft's built-in security platform; two are unpatched.

MED๐ŸŸ  Threats2026-04-21 12:00

Chinese APT Targets Indian Banks, Korean Policy Circles

China is spying on India's financial sector, for some reason, and it's not putting much effort into it, judging by some stale TTPs.

MED๐ŸŸ  Threats2022-08-30 16:00

Watering Hole Attacks Push ScanBox Keylogger

Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.

MED๐ŸŸ  Threats2022-08-29 14:56

Tentacles of โ€˜0ktapusโ€™ Threat Group Victimize 130 Firms

Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.

MED๐ŸŸก Advisory2026-04-22 12:00

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-33825 Microsoft Defender Insufficient Granularity of Access Control Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber

MED๐Ÿ”ต Technical2026-04-21 07:14

A .WAV With A Payload, (Tue, Apr 21st)

There have been reports of threat actors using a .wav file as a vector for malware.

MED๐Ÿ”ต Technical2026-04-20 06:43

Handling the CVE Flood With EPSS, (Mon, Apr 20th)

Every morning, security people around the world face the same ritual: opening their vulnerability feed to find a lot of new CVE entries that appeared overnight. Over the past decade, this flood has become a defining challenge of modern defensive security. Some numbers[1]:

MED๐ŸŸฃ Intel2026-04-22 00:00

AI Hype vs. Reality: Is AI Really Rewriting the Vulnerability Equation?

AI vulnerability research and discovery capabilities are improving, but they have not changed the fundamentals of vulnerability management.

MED๐ŸŸฃ Intel2026-04-16 00:00

From Bazooka to Fake Nikes

A deep dive into business impersonation fraud โ€” from fake companies cashing stolen checks to AI-powered shopping scams โ€” and why the same vulnerability enables both.

LOW๐Ÿ”ด Attacks2026-04-22 16:58

Apple fixes bug that let the FBI recover deleted Signal messages

Apple has released out-of-band security updates for iPhone and iPad devices to fix a Notification Services flaw that could allow notifications marked for deletion to remain stored on the device. [...]

LOW๐Ÿ”ด Attacks2026-04-22 11:06

Spain dismantles major $4.7M manga piracy platform, arrests four

The Spanish police have dismantled the largest Spanish-language manga piracy platform, operating since 2014, with millions of monthly users from around the globe. [...]

Updated: 2026-04-23 10:15 UTC