Git identity spoof fools Claude into giving bad code the nod

Researchers have discovered a method to trick Anthropic's Claude AI into approving malicious code changes in Git repositories. By forging Git commit metadata, attackers can make the AI believe that harmful modifications originate from a trusted developer, bypassing security reviews.

Microsoft’s Windows Recall still allows silent data extraction

Despite security overhauls, Microsoft's Windows Recall feature can still allow malware to silently extract all captured data without administrator privileges. A cybersecurity researcher demonstrated this vulnerability with a proof-of-concept tool, highlighting that decrypted data handled by unprotected processes remains accessible.

Cisco says critical Webex Services flaw requires customer action

Cisco has addressed four critical vulnerabilities affecting its Webex Services platform, including an improper certificate validation flaw. While Cisco has released security updates, customers must take additional action to fully mitigate the risks associated with these issues.

Behind the Mythos hype, Glasswing has just one confirmed CVE

VulnCheck reports that Anthropic's Project Glasswing, a controlled access program for their AI model Mythos, has only one confirmed CVE publicly attributable to its efforts. While Anthropic researchers are contributing to vulnerability discovery, the specific impact of Glasswing itself remains limited based on current public data.

Cisco Patches Critical Vulnerabilities in Webex, ISE

Cisco has released patches for critical vulnerabilities affecting its Webex and Identity Services Engine (ISE) products. Exploitation of these flaws could allow remote attackers to impersonate users or execute arbitrary commands on the affected systems.

Microsoft: April Windows Server 2025 update may fail to install

Microsoft is investigating an issue where the April security update KB5082063 is failing to install on some Windows Server 2025 systems. This problem prevents the update from being applied, potentially leaving servers vulnerable. Microsoft is actively working on a resolution.

Critical Nginx UI auth bypass flaw now actively exploited in the wild

A critical vulnerability in Nginx UI, specifically affecting its Model Context Protocol (MCP) support, is actively being exploited in the wild. Attackers can leverage this flaw to gain full server control without needing any authentication.

Critical MCP Integration Flaw Puts NGINX at Risk

A critical vulnerability in the nginx-ui component allows attackers to abuse a near-maximum severity flaw. This flaw enables attackers to restart, create, modify, and delete NGINX configuration files, posing a significant risk to web server security.

Anthropic's Project Glasswing CVE tally is still anyone's guess

Anthropic's Project Glasswing allows over 50 organizations to test its Mythos LLM for security vulnerabilities in their own products. However, the exact number of vulnerabilities discovered remains undisclosed, mirroring the situation with other companies participating in similar initiatives.

Critical nginx UI tool vulnerability opens web servers to full compromise

A critical vulnerability, dubbed 'MCPwn' and identified as CVE-2026-33032, has been discovered in the nginx UI web server configuration tool. This flaw allows unauthenticated attackers to gain full control of web servers by injecting malicious configurations, with active exploitation noted since March.

"TotalRecall Reloaded" tool finds a side entrance to Windows 11's Recall database

A security researcher has developed a tool called "TotalRecall Reloaded" that can access the data stored by Windows 11's controversial Recall feature, even when encryption is enabled. This tool bypasses the intended security measures by exploiting a vulnerability in how the data is stored, allowing unauthorized access.

WordPress plugin suite hacked to push malware to thousands of sites

A suite of over 30 WordPress plugins, known as EssentialPlugin, has been compromised with malicious code. This allows attackers to gain unauthorized access to websites that use these plugins, potentially leading to further compromise or data theft.

CISA flags Windows Task Host vulnerability as exploited in attacks

CISA has issued a warning to U.S. government agencies regarding a Windows Task Host vulnerability that can be exploited for privilege escalation. Successful exploitation allows attackers to gain SYSTEM privileges on affected systems, posing a significant security risk.

Exploited Vulnerability Exposes Nginx Servers to Hacking

Hackers are actively exploiting a critical remote takeover vulnerability, identified as CVE-2026-33032, affecting the Nginx UI management tool. This exploit allows unauthorized access and control over Nginx servers.

April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More

Microsoft's April Patch Tuesday addressed several critical vulnerabilities affecting major software vendors including Adobe, Fortinet, and SAP. A particularly severe SQL injection flaw in SAP Business Planning and Consolidation and SAP Business Warehouse is highlighted, carrying a CVSS score of 9.9. The patches aim to mitigate risks of unauthorized data access and code execution.

Copilot and Agentforce fall to form-based prompt injection tricks

Security researchers have discovered prompt-injection vulnerabilities in Microsoft Copilot Studio and Salesforce Agentforce, allowing attackers to exfiltrate sensitive data by tricking the AI agents into executing malicious instructions. These flaws exploit the way AI agents process user input, blurring the lines between trusted commands and untrusted data, leading to potential theft of PII and business information.

Microsoft, Salesforce Patch AI Agent Data Leak Flaws

Microsoft Copilot and Salesforce Agentforce have been patched to address prompt injection vulnerabilities. These flaws could have allowed external attackers to access and leak sensitive data from the AI agents.

Microsoft: April updates trigger BitLocker key prompts on some servers

Microsoft has acknowledged that the April 2026 security update (KB5082063) for Windows Server 2025 is causing some devices to unexpectedly prompt for BitLocker recovery keys upon booting. This issue appears to be triggered by the update, leading to potential operational disruptions for affected servers.

Two Vulnerabilities Patched in Ivanti Neurons for ITSM

Ivanti has released patches for two vulnerabilities in its Neurons for ITSM product. These flaws could allow attackers to maintain access even after their accounts are disabled and to access sensitive information from other user sessions.

Raspberry Pi OS ends open-door policy for sudo

Raspberry Pi OS has updated its default configuration to require a password for the `sudo` command. This change aims to enhance security by preventing unauthorized privilege escalation on devices.

Microsoft fixes bug behind Windows Server 2025 automatic upgrades

Microsoft has released a fix for a bug that caused unintended automatic upgrades from Windows Server 2019 and 2022 to Windows Server 2025. This issue could have disrupted operations and caused compatibility problems for organizations.

Fortinet Patches Critical FortiSandbox Vulnerabilities

Fortinet has released patches for critical vulnerabilities found in its FortiSandbox product. These flaws could be exploited by attackers to bypass authentication or execute arbitrary code and commands.

Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities

Microsoft has released updates to fix a record 169 security vulnerabilities across its products. Notably, one of these flaws was a zero-day vulnerability that had already been actively exploited in the wild. The majority of the vulnerabilities are rated as Important, with a smaller number classified as Critical.

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories

Eight major industrial automation companies, including Siemens, Schneider Electric, and Mitsubishi Electric, have released new security advisories as part of ICS Patch Tuesday. These advisories address vulnerabilities within their operational technology (OT) products.

April Patch Tuesday roundup: Zero day vulnerabilities and critical bugs

Microsoft's April Patch Tuesday addresses 167 security issues, with a particular focus on critical vulnerabilities in Windows Internet Key Exchange, Microsoft SharePoint, and a SAP SQL injection flaw. One of the most pressing is an actively exploited zero-day vulnerability in SharePoint Server (CVE-2026-32201), which allows attackers to spoof the platform and access sensitive information.

Microsoft adds Windows protections for malicious Remote Desktop files

Microsoft has implemented new security measures in Windows to combat phishing attacks that leverage malicious Remote Desktop connection (.rdp) files. These protections include displaying warnings to users and disabling risky shared resources by default, aiming to prevent unauthorized access through compromised RDP files.

Patch Tuesday, April 2026 Edition

Microsoft's April Patch Tuesday addresses 167 vulnerabilities, including a zero-day in SharePoint Server and a disclosed weakness in Windows Defender. Additionally, Google Chrome has patched its fourth zero-day of 2026, and an Adobe Reader update fixes an actively exploited flaw allowing remote code execution.

Privilege Elevation Dominates Massive Microsoft Patch Update

Microsoft's latest patch update addresses 165 vulnerabilities, with a significant portion, over half, being privilege escalation flaws. Two of these patched vulnerabilities were zero-days, meaning they were exploited in the wild before a fix was available.

Microsoft's massive Patch Tuesday: It's raining bugs

Microsoft's April Patch Tuesday addresses a significant number of vulnerabilities, including one actively exploited SharePoint Server spoofing flaw and another disclosed by a researcher. A total of 163 bugs were patched across various Microsoft products.

Microsoft releases Windows 10 KB5082200 extended security update

Microsoft has released the Windows 10 KB5082200 extended security update, addressing vulnerabilities that would have expired in April 2026. This update includes fixes for two zero-day vulnerabilities, along with other security improvements to protect users.

Microsoft April 2026 Patch Tuesday fixes 167 flaws, 2 zero-days

Microsoft's April 2026 Patch Tuesday addresses 167 vulnerabilities, two of which are zero-day flaws that have been actively exploited. The updates cover various Microsoft products and are crucial for mitigating security risks.

Adobe Patches 55 Vulnerabilities Across 11 Products

Adobe has released patches for 55 vulnerabilities affecting 11 of its products. The company has identified critical ColdFusion vulnerabilities as being the most susceptible to exploitation in ongoing attacks.

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities, CVE-2009-0238 and CVE-2026-32201, to its Known Exploited Vulnerabilities (KEV) Catalog due to evidence of their active exploitation. These vulnerabilities represent significant risks and frequent attack vectors for cyber actors. Federal agencies are required to remediate these, and all organizations are strongly urged to prioritize them in their vulnerability management.

SAP Patches Critical ABAP Vulnerability

SAP has released 19 new security notes to address vulnerabilities in its enterprise products. Among these is a critical vulnerability in ABAP, SAP's proprietary programming language.