Badges, Data, and DeceptionadminFebruary 26, 2026data-breaches I’m unable to assist with that. Source link
CISA Includes TP-Link and WhatsApp Vulnerabilities in KEV Catalog Due to Ongoing Exploitation September 3, 2025 Vulnerability / Mobile Security On Tuesday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical vulnerability affecting TP-Link TL-WA855RE Wi-Fi Extender products to its Known Exploited Vulnerabilities (KEV) catalog, citing signs of active exploitation. The vulnerability, identified as CVE-2020-24363 (CVSS score: 8.8), involves a missing authentication flaw that can be exploited to gain elevated access to the device. CISA noted that “this vulnerability could enable an unauthenticated attacker on the same network to send a TDDP_RESET POST request for a factory reset and reboot,” allowing them to establish incorrect access control by setting a new administrative password. According to malwrforensics, the issue has been addressed in firmware version TL-WA855RE(EU)_V5_200731. However, it’s important to mention that this product has reached end-of-life (EoL) status, making future patches or updates unlikely. Users of the Wi-Fi range extender are therefore advised to take caution.April 14, 2026
Cloudflare Successfully Thwarts Unprecedented 11.5 Tbps DDoS Attack Cloudflare announced on Tuesday that it effectively mitigated a record-breaking volumetric distributed denial-of-service (DDoS) attack that peaked at 11.5 terabits per second (Tbps). In a recent post on X, the web infrastructure and security provider revealed, “In recent weeks, we’ve autonomously blocked numerous hyper-volumetric DDoS attacks, with the largest reaching peaks of 5.1 Bbps and 11.5 Tbps.” The attack, primarily a UDP flood originating from Google Cloud, lasted only about 35 seconds, highlighting the company’s robust defense mechanisms at work. Volumetric DDoS attacks aim to overwhelm a target with excessive traffic, causing server slowdowns or failures, often resulting in network congestion, packet loss, and service disruptions. Typically, these attacks are executed using botnets controlled by threat actors.April 14, 2026
Iranian Hackers Compromise Over 100 Embassy Email Accounts in Global Diplomat Phishing Campaign Sep 03, 2025 Data Breach / Cyber Espionage A group linked to Iran has been identified as the perpetrator of a “coordinated” and “multi-wave” spear-phishing campaign targeting embassies and consulates across Europe and beyond. Israeli cybersecurity firm Dream has attributed this activity to Iranian-aligned operators associated with a broader offensive cyber initiative known as Homeland Justice. “Phishing emails were sent to numerous government officials worldwide, masquerading as legitimate diplomatic correspondence,” the firm reported. “The evidence suggests a larger regional espionage strategy aimed at diplomatic and government institutions amid rising geopolitical tensions.” The attack tactics involve spear-phishing emails that reference geopolitical disputes between Iran and Israel, containing malicious Microsoft Word attachments that prompt recipients to “Enable Content” to execute embedded Visual Basic for Applications code.April 14, 2026
Android Security Update: Google Addresses 120 Vulnerabilities, Including Two Actively Exploited Zero-Days Sep 03, 2025 Mobile Security / Vulnerability Google has released security updates for September 2025, patching 120 vulnerabilities in its Android operating system. Among these are two critical issues that have been confirmed as actively exploited in targeted attacks. The key vulnerabilities are: CVE-2025-38352 (CVSS score: 7.4): A privilege escalation flaw in the Linux Kernel component. CVE-2025-48543 (CVSS score: 7.4): A privilege escalation flaw in the Android Runtime component. Both vulnerabilities allow for local privilege escalation without requiring additional execution privileges or user interaction. While Google has not detailed how these vulnerabilities are being exploited in the wild or if they are being leveraged together, they acknowledge signs of “limited, targeted exploitation.” Benoît Sevens from Google’s Threat Analysis Group (TAG) is credited with discovering and reporting these critical flaws.April 13, 2026