Stop guessing whether your API demo works β€” here are 5 TIAMAT endpoints I tested live

A practical walkthrough of TIAMAT's privacy and memory APIs with curl commands that return real responses.

DEV Community

🚨New ransom group blog post!🚨

Group name: SilentRansomGroup
Post title: J... D...
Info: https://cti.fyi/groups/SilentRansomGroup.html

#ransomware #cti #threatintelligence #cybersecurity #infosec

🟠 CVE-2026-33348 - High (8.7)

OpenEMR is a free and open source electronic health records and medical practice management application. Users with the `Notes - my encounters` role can fill Eye Exam forms in patient encounters. The answers to the form are displayed on the en...

πŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-33348/

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

🟠 CVE-2026-29187 - High (8.1)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search functionality (/interface/new/new_search_popup.php)...

πŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-29187/

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

🟠 CVE-2026-33913 - High (7.7)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an authenticated user with access to the Carecoordination module can upload a crafted CCDA document containing `` to...

πŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-33913/

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

Google set a hard 2029 target for PQC migration β€” a year ahead of NIST deprecation, while simultaneously targeting a million-qubit machine on the same timeline.

Buried in the post: they "adjusted" their threat model to prioritize signatures over key exchange. Something I argued for since 2018.

Full write up: https://postquantum.com/security-pqc/google-pqc-migration-2029/

#infosec #pqc #quantum #cryptography #postquantum #quantumsecurity

Google Just Drew a Line in the Sand: PQC Migration by 2029

25 Mar 2026 - The company building the quantum computer is telling you the clock is running out. That should get your attention. On March 25, 2026, Google published a brief but consequential blog post authored by Heather Adkins, VP of Security Engineering, and Sophie Schmieg, Senior Staff Cryptography Engineer. Buried beneath a deliberately understated title - 'Quantum frontiers may be closer than they appear' - was a commitment that should ripple across every CISO's desk and every board risk committee on the planet: Google is targeting 2029 to complete its migration to post-quantum cryptography. Not 2035, the outer bound

PostQuantum - Quantum Computing, Quantum Security, PQC

Malicious PyPI Package - LiteLLM Supply Chain Compromise

Pulse ID: 69c460f229588f3179126c1d
Pulse Link: https://otx.alienvault.com/pulse/69c460f229588f3179126c1d
Pulse Author: Tr1sa111
Created: 2026-03-25 22:25:54

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #OTX #OpenThreatExchange #PyPI #SupplyChain #bot #Tr1sa111

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Malicious PyPI Package - LiteLLM Supply Chain Compromise

Pulse ID: 69c46104e1660babf17e92f8
Pulse Link: https://otx.alienvault.com/pulse/69c46104e1660babf17e92f8
Pulse Author: Tr1sa111
Created: 2026-03-25 22:26:12

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #OTX #OpenThreatExchange #PyPI #SupplyChain #bot #Tr1sa111

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

🚨 EUVD-2025-209038

πŸ“Š Score: 4.0/10 (CVSS v3.1)
πŸ“¦ Product: Maximo Application Suite - Monitor Component, Maximo Application Suite - Monitor Component, Maximo Application Suite - Monitor Component (+1 more)
🏒 Vendor: IBM
πŸ“… Updated: 2026-03-25

πŸ“ IBM Maximo Application Suite - Monitor Component 9.1, 9.0, 8.11, and 8.10 could allow an unauthorized user to inject data...

πŸ”— https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-209038

#cybersecurity #infosec #euvd #cve #vulnerability

EUVD

European Vulnerability Database

🚨 EUVD-2025-209040

πŸ“Š Score: 4.4/10 (CVSS v3.1)
🏒 Vendor: IBM
πŸ“… Updated: 2026-03-25

πŸ“ IBM Knowledge Catalog Standard Cartridge 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.1, 5.1.1, 5,1.2, 5.1.3, 5.2.0, 5.2.1 stores potentially sensitive information in log files that could be read by a local privileged user.

πŸ”— https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-209040

#cybersecurity #infosec #euvd #cve #vulnerability

EUVD

European Vulnerability Database