Enought #gitlab #cve dropped today to get my attention. Catch up if you’re running it. #infosec
Possible Phishing 🎣
on: ⚠️hxxps[:]//oxpainexecu[.]weebly[.]com
🧬 Analysis at: https://urldna.io/scan/69d89ff63b77500007c1ca7e
#cybersecurity #phishing #infosec #urldna #scam #infosec

Официальный сайт CPUID, по всей видимости, был скомпрометирован, а все пользователи, которые пытались загрузить HWMonitor и CPU-Z получали установочные файлы с вредоносным ПО.

CPUID, разработчик HWMonitor и CPU-Z, - французская компания, известная своими инструментами профилирования и мониторинга систем, широко используемыми ИТ-специалистами и производителями оборудования. Только у CPU-Z десятки миллионов пользователей по всему миру.

Первые сообщения о проблема появились (https://www.reddit.com/r/pcmasterrace/comments/1sh4e5l/warning_hwmonitor_163_download_on_the_official/) на Reddit. Один из пользователей, обновлявших HWMonitor до версии 1.63, был перенаправлен с официального сайта CPUID на загрузку подозрительного файла с именем HWiNFO_Monitor_Setup.exe.

Аномалия сразу же привлекла внимание, поскольку HWiNFO - это совершенно отдельный инструмент для мониторинга оборудования, разработанный другим поставщиком.

#infosec #malware #cpuid #hwmonitor #cpuz #hwinfo

A security product becomes harder to displace when each persona finds value in their own view, from SOC analysts to execs to AI agents. Designing for all of them is a stronger advantage than a longer feature list.

https://zeltser.com/designing-for-humans-and-ai

#cybersecurity #productmanagement #AI #infosec

Designing Security Products for Humans and AI Agents

AI agents are quickly joining humans as personas that use enterprise security products. Vendors who understand how to support all their users, from analysts to agents, will build products that fit how teams actually work.

Lenny Zeltser

🚨 EUVD-2026-21494

📊 Score: 4.3/10 (CVSS v3.1)
📦 Product: vikunja
🏢 Vendor: go-vikunja
📅 Updated: 2026-04-10

📝 Vikunja: Scoped API tokens with projects.background permission can delete project backgrounds

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-21494

#cybersecurity #infosec #euvd #cve #vulnerability

EUVD

European Vulnerability Database

🚨 EUVD-2026-21470

📊 Score: 5.3/10 (CVSS v3.1)
📦 Product: OpenClaw, OpenClaw
🏢 Vendor: OpenClaw
📅 Updated: 2026-04-10

📝 OpenClaw before 2026.3.22 fails to enforce controlScope restrictions on the send action, allowing leaf subagents to message controlled child sessions beyond their authorized scope. Attackers can exploit this by using the send action to communicat...

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-21470

#cybersecurity #infosec #euvd #cve #vulnerability

EUVD

European Vulnerability Database

🚨 EUVD-2026-21472

📊 Score: 8.7/10 (CVSS v3.1)
📦 Product: OpenClaw, OpenClaw
🏢 Vendor: OpenClaw
📅 Updated: 2026-04-10

📝 OpenClaw before 2026.3.25 contains a privilege escalation vulnerability allowing non-admin operators to self-request broader scopes during backend reconnect. Attackers can bypass pairing requirements to reconnect as operator.admin, gaining unauth...

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-21472

#cybersecurity #infosec #euvd #cve #vulnerability

EUVD

European Vulnerability Database

🚨 EUVD-2026-21474

📊 Score: 6.9/10 (CVSS v3.1)
📦 Product: OpenClaw, OpenClaw
🏢 Vendor: OpenClaw
📅 Updated: 2026-04-10

📝 OpenClaw before 2026.3.25 contains an authentication bypass vulnerability in raw card send surface that allows unpaired recipients to mint legacy callback payloads. Attackers can send raw card commands to bypass DM pairing restrictions and reach ...

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-21474

#cybersecurity #infosec #euvd #cve #vulnerability

EUVD

European Vulnerability Database

🚨 EUVD-2026-21476

📊 Score: 6.9/10 (CVSS v3.1)
📦 Product: OpenClaw, OpenClaw
🏢 Vendor: OpenClaw
📅 Updated: 2026-04-10

📝 OpenClaw before 2026.3.24 contains an incomplete fix for CVE-2026-32011 where the Feishu webhook handler accepts request bodies with permissive limits of 1MB and 30-second timeout before signature verification. An unauthenticated attacker can exh...

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-21476

#cybersecurity #infosec #euvd #cve #vulnerability

EUVD

European Vulnerability Database