🟠 New security advisory:

CVE-2026-4529 affects multiple systems.

• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-4529-d-link-dhp-1320-buffer-overflow-isolate-device

#CVE #ZeroDay #ThreatIntel

High: D-Link DHP-1320 Buffer Overflow (CVE-2026-4529) - Isolate Device | Yazoul Security

A high-severity stack-based buffer overflow in the D-Link DHP-1320 allows remote attackers to execute code. CVSS 8.8. Exploit is public. Isolate affected devices immediately.

Yazoul Security

🔴 New security advisory:

CVE-2019-25568 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2019-25568-memu-play-privilege-escalation

#CVE #ZeroDay #ThreatIntel

Critical: MEmu Play Privilege Escalation (CVE-2019-25568) - Update Required | Yazoul Security

Critical privilege escalation vulnerability in MEmu Play 6.0.7 allows local attackers to gain SYSTEM privileges by replacing a service executable. CVSS 9.8. Immediate remediation is required.

Yazoul Security

🚨 New security advisory:

CVE-2026-33136 affects Wegia Wegia.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-33136-wegia-reflected-xss-vulnerability

#CVE #ZeroDay #ThreatIntel

Critical: WeGIA Reflected XSS Vulnerability (CVE-2026-33136) - Update Required | Yazoul Security

Critical reflected XSS vulnerability in WeGIA versions 3.6.6 and below allows attackers to inject malicious scripts via a GET parameter. CVSS 9.3. Upgrade to version 3.6.7 immediately.

Yazoul Security

🚨 New security advisory:

CVE-2026-33057 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-33057-mesop-framework-rce-vulnerability-update-now

#CVE #ZeroDay #ThreatIntel

Critical: Mesop Framework RCE Vulnerability (CVE-2026-33057) - Update Now | Yazoul Security

Critical RCE flaw in Mesop UI framework versions <=1.2.2 allows unauthenticated attackers to execute arbitrary code via a debug endpoint. CVSS 9.8. Immediate upgrade required.

Yazoul Security
Apple patched it, but DarkSword already hit Ukraine, Saudi Arabia, Turkey & Malaysia. 6 iOS flaws, 3 zero-days, full device takeover via normal website visit. No clicks needed, can't just say 'I don't click suspicious links'. https://zurl.co/MFwh2 #CyberSecurity #iOS #ZeroDay

⛔ New security advisory:

CVE-2026-32194 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-32194-microsoft-bing-images-command-injection

#CVE #ZeroDay #ThreatIntel

Critical: Microsoft Bing Images Command Injection (CVE-2026-32194) - Critical Update | Yazoul Security

Critical command injection vulnerability in Microsoft Bing Images (CVE-2026-32194) allows remote attackers to execute arbitrary code. CVSS 9.8. Apply updates immediately.

Yazoul Security

Google says 90 Zero-Days were exploited in Attacks last Year — 47 of them targeted End-User Platforms, and 43 targeted Enterprise Products.

The figure is a 15% increase compared to 2024, when 78 zero-days were exploited in the wild, but lower than the record 100 zero days tracked in 2023.

⁉️The type of exploited flaws includes remote code execution, privilege escalation, injection and deserialization flaws, authorization bypasses, and memory corruption [use-after-free] bugs. Google reports that memory safety issues accounted for 35% of all exploited zero-day vulnerabilities last year.⁉️

https://cloud.google.com/blog/topics/threat-intelligence/2025-zero-day-review

#google #zeroday #review2025 #it #security #privacy #engineer #media #infosec #tech #news

Darksword exploit kit chains 6 iOS flaws to achieve full device compromise.
• RCE → kernel access
• Used by multiple threat actors
• High-risk data exfiltration

Patch immediately 👇
https://www.technadu.com/darksword-exploit-kit-deploying-ios-spyware-on-iphones-adopted-by-multiple-threat-actors/623708/

#InfoSec #iOSSecurity #ZeroDay

Zero-Day-Lücke in Cisco-Firewall: Interlock-Ransomware nutzte Schwachstelle 36 Tage vor Bekanntgabe aus

Cisco-Schwachstelle CVE-2026-20131 – was steckt dahinter?

https://www.all-about-security.de/zero-day-luecke-in-cisco-firewall-interlock-ransomware-nutzte-schwachstelle-36-tage-vor-bekanntgabe-aus/

#cisco #firewall #zeroday #itsecurity

Zero-Day-Lücke in Cisco-Firewall: Interlock-Ransomware nutzte Schwachstelle 36 Tage vor Bekanntgabe aus

Amazon Threat Intelligence deckt auf: Interlock-Ransomware nutzte Cisco-FMC-Schwachstelle CVE-2026-20131 als Zero-Day – inklusive vollem Toolkit-Einblick.

All About Security Das Online-Magazin zu Cybersecurity (Cybersicherheit). Ransomware, Phishing, IT-Sicherheit, Netzwerksicherheit, KI, Threats, DDoS, Identity & Access, Plattformsicherheit

Interlock ransomware exploited Cisco firewall zero-day (CVE-2026-20131) before disclosure.
• Unauth RCE → root
• Memory webshells
• WebSocket C2
https://www.technadu.com/interlock-ransomware-campaign-exploited-cisco-firewall-vulnerability-cve-2026-20131-weeks-before-disclosure/623700/

#Cybersecurity #ZeroDay #Ransomware