Stop guessing whether your API demo works β here are 5 TIAMAT endpoints I tested live
Stop guessing whether your API demo works β here are 5 TIAMAT endpoints I tested live
π¨New ransom group blog post!π¨
Group name: SilentRansomGroup
Post title: J... D...
Info: https://cti.fyi/groups/SilentRansomGroup.html
#ransomware #cti #threatintelligence #cybersecurity #infosec
π CVE-2026-33348 - High (8.7)
OpenEMR is a free and open source electronic health records and medical practice management application. Users with the `Notes - my encounters` role can fill Eye Exam forms in patient encounters. The answers to the form are displayed on the en...
π https://www.thehackerwire.com/vulnerability/CVE-2026-33348/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
π CVE-2026-29187 - High (8.1)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search functionality (/interface/new/new_search_popup.php)...
π https://www.thehackerwire.com/vulnerability/CVE-2026-29187/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
π CVE-2026-33913 - High (7.7)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an authenticated user with access to the Carecoordination module can upload a crafted CCDA document containing `` to...
π https://www.thehackerwire.com/vulnerability/CVE-2026-33913/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Google set a hard 2029 target for PQC migration β a year ahead of NIST deprecation, while simultaneously targeting a million-qubit machine on the same timeline.
Buried in the post: they "adjusted" their threat model to prioritize signatures over key exchange. Something I argued for since 2018.
Full write up: https://postquantum.com/security-pqc/google-pqc-migration-2029/
#infosec #pqc #quantum #cryptography #postquantum #quantumsecurity

25 Mar 2026 - The company building the quantum computer is telling you the clock is running out. That should get your attention. On March 25, 2026, Google published a brief but consequential blog post authored by Heather Adkins, VP of Security Engineering, and Sophie Schmieg, Senior Staff Cryptography Engineer. Buried beneath a deliberately understated title - 'Quantum frontiers may be closer than they appear' - was a commitment that should ripple across every CISO's desk and every board risk committee on the planet: Google is targeting 2029 to complete its migration to post-quantum cryptography. Not 2035, the outer bound
Malicious PyPI Package - LiteLLM Supply Chain Compromise
Pulse ID: 69c460f229588f3179126c1d
Pulse Link: https://otx.alienvault.com/pulse/69c460f229588f3179126c1d
Pulse Author: Tr1sa111
Created: 2026-03-25 22:25:54
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #InfoSec #OTX #OpenThreatExchange #PyPI #SupplyChain #bot #Tr1sa111
Malicious PyPI Package - LiteLLM Supply Chain Compromise
Pulse ID: 69c46104e1660babf17e92f8
Pulse Link: https://otx.alienvault.com/pulse/69c46104e1660babf17e92f8
Pulse Author: Tr1sa111
Created: 2026-03-25 22:26:12
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #InfoSec #OTX #OpenThreatExchange #PyPI #SupplyChain #bot #Tr1sa111
π¨ EUVD-2025-209038
π Score: 4.0/10 (CVSS v3.1)
π¦ Product: Maximo Application Suite - Monitor Component, Maximo Application Suite - Monitor Component, Maximo Application Suite - Monitor Component (+1 more)
π’ Vendor: IBM
π
Updated: 2026-03-25
π IBM Maximo Application Suite - Monitor Component 9.1, 9.0, 8.11, and 8.10 could allow an unauthorized user to inject data...
π https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-209038
π¨ EUVD-2025-209040
π Score: 4.4/10 (CVSS v3.1)
π’ Vendor: IBM
π
Updated: 2026-03-25
π IBM Knowledge Catalog Standard Cartridge 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.1, 5.1.1, 5,1.2, 5.1.3, 5.2.0, 5.2.1 stores potentially sensitive information in log files that could be read by a local privileged user.
π https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-209040