Cisco Under Fire: Zero-Day in Secure Firewall Management Center Powers Interlock Ransomware

Cisco Under Fire: Zero-Day in Secure Firewall Management Center Powers Interlock Ransomware

A critical zero-day vulnerability in Cisco Secure Firewall Management Center (FMC) — tracked as CVE-2026-20131 — has been exploited in the wild to deploy Interlock ransomware. The timeline and technical details reported by independent researchers make this a clear, urgent warning for organizations running Cisco FMC: an unauthenticated remote exploit can lead to arbitrary Java code execution with root privileges,

Aura Exposed: When 900,000 Marketing Contacts Turned Into a Security Crisis

Aura Exposed: When 900,000 Marketing Contacts Turned Into a Security Crisis

Aura, the consumer digital safety company known for identity protection and fraud monitoring, recently confirmed a data breach that exposed nearly 900,000 marketing contacts. What seems like a single shocking number actually reveals deeper problems: legacy data inherited through acquisitions, the continued effectiveness of social-engineering attacks, and the tricky line between marketing lists and active customer records. This incident is

Stryker Confirms Massive Wiper Strike — Thousands of Devices Erased in Alleged Iran-Linked Operation

Stryker Confirms Massive Wiper Strike — Thousands of Devices Erased in Alleged Iran-Linked Operation

Stryker, the global medical technology company, confirmed on March 11, 2026, that it suffered a significant, destructive cyberattack that disabled large parts of its corporate Microsoft environment and resulted in the wiping of thousands of devices. The company characterized the incident as a deliberate data-destruction operation rather than a ransomware extortion scheme, and investigators and security firms have pointed to

Hotpatch Alert: Microsoft Fixes Critical RRAS Remote-Execution Flaws in Windows 11

Hotpatch Alert: Microsoft Fixes Critical RRAS Remote-Execution Flaws in Windows 11

Microsoft issued an out-of-band hotpatch on March 13, 2026, to address a set of serious vulnerabilities in the Windows Routing and Remote Access Service (RRAS) management tool that affect Windows 11. The update, tracked as KB5084597 and aimed at OS builds 26200.7982 (25H2) and 26100.7982 (24H2), patches three CVEs that can allow a remote attacker to disrupt RRAS or execute

CrackArmor: Nine AppArmor Flaws Let Local Users Escalate to Root — What Organizations Need to Know

CrackArmor: Nine AppArmor Flaws Let Local Users Escalate to Root — What Organizations Need to Know

AppArmor, a widely deployed Linux Mandatory Access Control (MAC) framework, is at the center of a set of serious vulnerabilities that researchers have dubbed “CrackArmor.” Disclosed on March 12, 2026 by the Qualys Threat Research Unit (TRU), the collection of flaws affects AppArmor’s implementation as a Linux Security Module (LSM) and has been present in the upstream kernel since around

Microsoft Active Directory Domain Services Vulnerability (CVE-2026-25177) — What Administrators Need to Know

Microsoft Active Directory Domain Services Vulnerability (CVE-2026-25177) — What Administrators Need to Know

In early March 2026, Microsoft released an important security update addressing a high-severity vulnerability in Active Directory Domain Services (AD DS) tracked as CVE-2026-25177. The flaw received a CVSS score of 8.8 and can allow an authenticated network actor with limited permissions to escalate privileges to full SYSTEM on a targeted domain controller. Microsoft and third-party researchers coordinated fixes and