Listen very carefully on this ...

Nicholas Carlini - Black-hat LLMs | [un]prompted 2026

https://www.youtube.com/watch?v=1sd26pWhfmg

#cybersecurity #aisecurity #zeroday

Nicholas Carlini - Black-hat LLMs | [un]prompted 2026

YouTube

⛔ New security advisory:

CVE-2026-30533 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-30533-sourcecodester-food-ordering-system-sql-injection

#InfoSec #ZeroDay #ThreatIntel

Critical: SourceCodester Food Ordering System SQL Injection (CVE-2026-30533) - Critical Update | Yazoul Security

Critical SQL Injection vulnerability in SourceCodester Online Food Ordering System v1.0 allows attackers to compromise admin panels and databases. CVSS 9.8. Apply patches immediately.

Yazoul Security

⛔ New security advisory:

CVE-2026-30532 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-30532-sourcecodester-food-ordering-system-sql-injection

#InfoSec #ZeroDay #ThreatIntel

Critical: SourceCodester Food Ordering System SQL Injection (CVE-2026-30532) - Critical Update | Yazoul Security

Critical SQL Injection vulnerability in SourceCodester Online Food Ordering System v1.0 allows admin panel compromise. CVSS 9.8. Apply patch or mitigation immediately.

Yazoul Security

oh, upcoming #telegram #zeroday looks pretty bad. unauthenticated, remote code execution.

CVSS 9.8 Critical -- AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. Translation: unauthenticated, remotely exploitable, zero user interaction, full CIA compromise. No credentials needed, no special conditions, no victim to trick. The attacker owns your data, can modify anything, and can take the service offline.

#infosec #CVE #vulnerability

https://www.zerodayinitiative.com/advisories/upcoming/

Upcoming | Zero Day Initiative

📰 Russia's Pawn Storm (APT28) Targets Defense Supply Chain with New 'PRISMEX' Malware and Zero-Day

🇷🇺 Russia's APT28 (Pawn Storm) is targeting the defense supply chain with new 'PRISMEX' malware, exploiting a Windows zero-day (CVE-2026-21513). 🛡️ #APT28 #PawnStorm #ZeroDay #CyberWarfare

🔗 https://cyber.netsecops.io/articles/pawn-storm-apt-deploys-new-prismex-malware-against-defense-supply-chain/?utm_source=mastodon&utm_medium=social&utm_campaign=twitter_auto

Russia's Pawn Storm (APT28) Targets Defense Supply Chain with New 'PRISMEX' Malware and Zero-Day

The Russia-aligned APT group Pawn Storm (APT28) is targeting the defense supply chain of Ukraine and its allies with new PRISMEX malware and a Windows zero-day, CVE-2026-21513.

CyberNetSec.io

📰 Police Physically Warn Firms of Critical Unpatched RCE Flaw in PTC Windchill

🚨 CRITICAL FLAW: German police physically warn companies about a 10.0 CVSS RCE bug (CVE-2026-4681) in PTC Windchill & FlexPLM. CISA issues alert. No patch yet! ⚠️ #CVE20264681 #ZeroDay #Manufacturing

🔗 https://cyber.netsecops.io/articles/critical-ptc-windchill-flaw-triggers-unprecedented-police-mobilization-in-germany/?utm_source=mastodon&utm_medium=social&utm_campaign=twitter_auto

Police Physically Warn Firms of Critical Unpatched RCE Flaw in PTC Windchill

A critical RCE vulnerability (CVE-2026-4681) in PTC Windchill and FlexPLM has prompted German police to physically warn companies. CISA has issued an advisory for the 10.0 CVSS flaw.

CyberNetSec.io

🔴 New security advisory:

CVE-2026-33286 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-33286-graphiti-arbitrary-method-execution

#Cybersecurity #ZeroDay #ThreatIntel

Critical: Graphiti Arbitrary Method Execution (CVE-2026-33286) - Critical Patch Required | Yazoul Security

Critical Graphiti vulnerability (CVE-2026-33286) allows attackers to execute arbitrary public methods on models via crafted API payloads. CVSS 9.1. Upgrade to v1.10.2 immediately.

Yazoul Security

🔴 New security advisory:

CVE-2026-4698 affects Mozilla Firefox.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-4698-firefox-jit-compiler-vulnerability

#Cybersecurity #ZeroDay #ThreatIntel

Critical: Firefox JIT Compiler Vulnerability (CVE-2026-4698) - Critical Update Required | Yazoul Security

Critical JIT miscompilation vulnerability in Firefox, Thunderbird, and ESR branches. CVSS 9.8. Allows remote code execution. Update immediately to prevent exploitation.

Yazoul Security

🔴 New security advisory:

CVE-2026-25366 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-25366-woody-ad-snippets-code-injection-update-immediately

#Cybersecurity #ZeroDay #ThreatIntel

Critical: Woody ad snippets Code Injection (CVE-2026-25366) - Update Immediately | Yazoul Security

Critical code injection flaw in Woody ad snippets plugin (<=2.7.1) allows attackers to execute arbitrary PHP code. CVSS 9.9. Update or remove the plugin now to prevent site takeover.

Yazoul Security

🔴 New security advisory:

CVE-2026-25366 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-25366-woody-ad-snippets-code-injection-update-immediately

#Cybersecurity #ZeroDay #ThreatIntel

Critical: Woody ad snippets Code Injection (CVE-2026-25366) - Update Immediately | Yazoul Security

Critical code injection flaw in Woody ad snippets plugin (<=2.7.1) allows attackers to execute arbitrary PHP code. CVSS 9.9. Update or remove the plugin now to prevent site takeover.

Yazoul Security