Chrome zero-day CVE-2026-5281 is actively exploited in the wild—a use-after-free in Dawn (WebGPU implementation) that gives attackers arbitrary code execution. This is Chrome's FOURTH zero-day fix in 2026.

Two were just last week (CVE-2026-3909/3910), plus the CSS one in February. The WebGPU attack surface is fresh and attackers are probing it hard. CISA already added it to KEV. Update Chrome now.

#CyberSecurity #Chrome #ZeroDay #CISA #InfoSec

Source: https://thehackernews.com/2026/04/new-chrome-zero-day-cve-2026-5281-under.html

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

Chrome patches 21 flaws including exploited CVE-2026-5281 in Dawn, marking fourth zero-day fixed in 2026, reducing active attack risk.

The Hacker News

🔶 New security advisory:

CVE-2026-28228 affects multiple systems.

• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-28228-openolat-server-side-template-injection

#CVE #ZeroDay #ThreatIntel

Software RCE Flaw (CVE-2026-28228) - Update Required

A high-severity SSTI flaw in OpenOlat allows authenticated attackers to execute OS commands. Affects versions before 19.1.31, 20.1.18, and 20.2.5. Immediate patching is required.

Yazoul Security

Google patched some vulnerabilities yesterday, if you missed the release.

Google: Stable Channel Update for Desktop https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html

Security Week: Exploited Zero-Day Among 21 Vulnerabilities Patched in Chrome https://www.securityweek.com/exploited-zero-day-among-21-vulnerabilities-patched-in-chrome/ @SecurityWeek #Google #vulnerability #Chrome #zeroday

Stable Channel Update for Desktop

The Stable channel has been updated to 146.0.7680.177/178 for Windows/Mac  and  146.0.7680.177 for Linux, which will roll out over the comin...

Chrome Releases

⛔ New security advisory:

CVE-2026-34449 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-34449-siyuan-rce-vulnerability

#CVE #ZeroDay #ThreatIntel

SiYuan RCE Vulnerability (CVE-2026-34449) - Patch Now

CVE-2026-34449 is a critical RCE flaw in SiYuan personal knowledge software (CVSS 9.6). A malicious website can execute arbitrary code on the desktop app. Update to version 3.6.2 immediately.

Yazoul Security

Critical #ImageMagick zero-day allows RCE via simple image uploads, impacting Ubuntu, Amazon Linux, and WordPress - millions still exposed.

Read: https://hackread.com/imagemagick-zero-day-rce-linux-wordpress-servers/

#CyberSecurity #ZeroDay #RCE #Linux #WordPress #Vulnerability

ImageMagick Zero-Day Enables RCE on Linux and WordPress Servers

A zero-day ImageMagick vulnerability allows Remote Code Execution (RCE) via simple image uploads affecting Ubuntu, Amazon Linux and WordPress.

Hackread - Cybersecurity News, Data Breaches, AI and More

«Ausgerechnet eine KI findet #ZeroDay's in den Editoren Vim und Emacs:
Unter #Hacker'n und Sicherheitsexperten scheiden sich seit Jahrzehnten die Geister, ob nun #Vim oder #Emacs der bessere Editor ist. Klar ist nun allerdings, dass beiden der zweifelhafte Ruhm zukommt, von einer #KI eigenständig für unsicher erklärt zu werden»

Ich bin ein Vim Fanboy aber welcher #Editor der bessere ist muss jeder für sich selbst enscheiden. Lücken kann es in jeglicher #Sofware geben.

🧑‍💻 https://winfuture.de/news,157867.html

Ausgerechnet eine KI findet Zero-Days in den Editoren Vim und Emacs

Unter Hackern und Sicherheitsexperten scheiden sich seit Jahrzehnten die Geister, ob nun Vim oder Emacs der bessere Editor ist. Klar ist nun allerdings, dass beiden der zweifelhafte Ruhm zukommt, von einer KI eigenständig für unsicher erklärt zu werden.

WinFuture.de

Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets

A zero-day vulnerability in the TrueConf client application, CVE-2026-3502, was exploited in a targeted campaign against government entities in Southeast Asia. The flaw allows attackers controlling an on-premises TrueConf server to distribute and execute arbitrary files across connected endpoints. The campaign, dubbed 'TrueChaos', abused the trusted update channel to deliver malware to multiple government agencies. The attack likely involved a Chinese-nexus threat actor and utilized the Havoc post-exploitation framework. The vulnerability stems from inadequate validation in the update process, enabling malicious updates to be distributed through a centrally managed server. TrueConf has since released a fix in version 8.5.3 of their Windows client.

Pulse ID: 69cbf7d955b9ee7f5f7ddfef
Pulse Link: https://otx.alienvault.com/pulse/69cbf7d955b9ee7f5f7ddfef
Pulse Author: AlienVault
Created: 2026-03-31 16:35:37

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#0Day #Asia #Chinese #CyberSecurity #Endpoint #Government #InfoSec #Malware #OTX #OpenThreatExchange #RAT #Rust #Troll #Vulnerability #Windows #ZeroDay #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
l+f: Claude serviert Zero-Day-Exploits frei Haus

Dass sich Guardrails umgehen lassen, war eigentlich klar. Dass das so einfach gehen könnte, überrascht dann doch.

heise online