❌

Reading view

CVE-2026-21509: Actively Exploited Microsoft Office Security Feature Bypass β€” PoC Public, CISA KEV Listed

A high-severity (CVSS 7.8) security feature bypass in Microsoft Office is being actively exploited in the wild, with a public PoC already available and the vuln now on CISA's KEV catalog. Root cause is unvalidated input handling (CWE-807) that allows malicious OLE/COM objects in crafted documents to bypass built-in protections. Attack vector is local with no privileges required β€” just a user opening a phishing-delivered Office file. Affects Office 2016, 2019, LTSC 2021/2024, and Microsoft 365 Apps on x86/x64. Microsoft dropped an out-of-band emergency patch on January 26, 2026. Office 2016/2019 also require a registry-based mitigation. Confirmed targeting of government agencies, critical infrastructure, and maritime/transport sectors.

submitted by /u/Sarah_Cross
[link] [comments]
  •  

MicroStealer Analysis: A Fast-Spreading Infostealer with Limited Detection

  • MicroStealer exposes a broader business risk by stealing browser credentials, active sessions, and other sensitive data tied to corporate access.
  • The malware uses a layered NSIS β†’ Electron β†’ JAR chain that helps it stay unclear longer and slows confident detection.
  • Distribution through compromised or impersonated accounts makes the initial infection look more trustworthy to victims.
submitted by /u/malwaredetector
[link] [comments]
  •  

Alipay (1B+ users) DeepLink+JSBridge Attack Chain: Silent GPS Exfiltration, 6 CVEs (CVSS 9.3)

Update (March 13, 2026):

Several major developments since this was posted:

  1. Packet Storm Security β€” Advisory published: https://packetstorm.news/files/id/217089

  2. Apple Product Security β€” Confirmed forwarding to investigation team (Ticket OE01052449093014). Apple is actively investigating Alipay iOS app.

  3. Google Play β€” Policy violation investigation confirmed (Case #9-7515000040640).

  4. Singapore PDPC β€” Formal investigation opened (Case #00629724).

  5. HKCERT β€” Forwarded report to CNCERT (China National CERT).

  6. MITRE CVE β€” 6 CVEs pending (Ticket #2005801), CVSS 7.4–9.3.

Vendor (Ant Group) continues to maintain these are "normal functionality" and has issued no patch.

Full report: https://innora.ai/zfb/

submitted by /u/feng_sg
[link] [comments]
  •  

China’s CERT warns OpenClaw can inflict nasty wounds

Like deleting data, exposing keys, and loading malicious content - which may be why Beijing has reportedly banned it

China’s National Computer Network Emergency Response Technical Team has warned locals that the OpenClaw agentic AI tool poses significant security risks.…

  •  

Iran plots 'infrastructure warfare' against US tech giants

State news published a list of nearly 30 sites that could be targeted

Iran has reportedly designated Amazon, Google, IBM, Microsoft, Nvidia, Oracle, and Palantir facilities as legitimate targets of retaliatory strikes, according to an Al Jazeera report citing Iran’s state-affiliated Tasnim news agency.…

  •  

Iran-linked cyber crew says they hit US med-tech firm

Meanwhile, Verifone says 'no evidence' to support the digital intruders' claims

A hacking crew with ties to Iran's intelligence agency claimed to be behind a global network outage at med-tech firm Stryker on Wednesday, and said the cyberattack was in response to the US-Israel airstrikes.…

  •  

Researchers Trick Perplexity's Comet AI Browser Into Phishing Scam in Under Four Minutes

Agentic web browsers that leverage artificial intelligence (AI) capabilities to autonomously execute actions across multiple websites on behalf of a user could be trained and tricked into falling prey to phishing and scam traps. The attack, at its core, takes advantage of AI browsers' tendency to reason their actions and use it against the model itself to lower their security guardrails, Guardio

  •  
❌