Lyrie
Live · 1938 verified advisories · 1588 actively exploited

Threat intelligence that never sleeps.

Critical CVEs, active exploitation, breach forensics, and original research — every story cross-validated by 3+ primary sources before publication. Powered by the same autonomous engine that defends Lyrie.ai customers from rogue-AI and machine-speed attackers.

✓ SOC 2 Type II✓ GDPR✓ PCI DSS✓ OWASP Top 10
Lyrie Cyber Guardian
Pipeline
Autonomous · Machine-speed · Anti-rogue-AI
199
Deep dives
Active ExploitationEXPLOITED IN THE WILDCVSS 8.8

HIGH: CVE-2024-7399 actively exploited — samsung magicinfo 9 server

CVE-2024-7399 path traversal in Samsung MagicINFO 9 Server (<21.1050) enables arbitrary file write as System; actively exploited per CISA KEV.

Lyrie Threat Intelligence·4 min read·4 sources verified
Coverage

Five always-on streams

How it works →
Latest

Fresh advisories

RSS →
CVE Deep DivesCVSS 9.33 sources

CRITICAL: CVE-2026-34615 (CVSS 9.3) — adobe connect

Adobe Connect versions 2025.3, 12.10 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. An attacker could exploit this vulnerability to inject malicious scripts into a web page, potentially gaining elevated access or control over the victim's account or session. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with a compromised web page. Scope is changed.

CVE-2026-34615·4/28/2026·1 min
CVE Deep DivesCVSS 9.63 sources

CRITICAL: CVE-2026-27303 (CVSS 9.6) — adobe connect

Adobe Connect versions 2025.3, 12.10 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with a compromised web page. Scope is changed.

CVE-2026-27303·4/28/2026·1 min
CVE Deep DivesCVSS 9.33 sources

CRITICAL: CVE-2026-27246 (CVSS 9.3) — adobe connect

Adobe Connect versions 2025.3, 12.10 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this vulnerability to inject malicious scripts into a web page, potentially gaining elevated access or control over the victim's account or session. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with a compromised web page. Scope is changed.

CVE-2026-27246·4/28/2026·1 min
CVE Deep DivesCVSS 9.33 sources

CRITICAL: CVE-2026-27245 (CVSS 9.3) — adobe connect

Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this vulnerability to inject malicious scripts into a web page, potentially gaining elevated access or control over the victim's account or session. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with a compromised web page. Scope is changed.

CVE-2026-27245·4/28/2026·1 min
CVE Deep DivesCVSS 9.33 sources

CRITICAL: CVE-2026-27243 (CVSS 9.3) — adobe connect

Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this vulnerability to inject malicious scripts into a web page, potentially gaining elevated access or control over the victim's account or session. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with a compromised web page. Scope is changed.

CVE-2026-27243·4/28/2026·1 min
AI Threats3 sources

GlassWorm escalates: 73 Open VSX sleeper extensions deploy malware to VS Code, Cursor, and every VSIX IDE

73 sleeper extensions on Open VSX tied to GlassWorm: 6 actively deploying malware, 67 dormant, 2 IOC SHA256s confirmed. No patch — manual mitigation required.

glassworm-73-openvsx-2026-04-28·4/28/2026·11 min
AI Threats1 sources

Layerwise Convergence Fingerprints for Runtime Misbehavior Detection in Large Language Models

Large language models deployed at runtime can misbehave in ways that clean-data validation cannot anticipate: training-time backdoors lie dormant until triggered, jailbreaks subvert safety alignment,

agent-threats-layerwise-convergence-fingerprints-for-runtime-mis-moi0dg1o·4/28/2026·1 min
AI Threats1 sources

MAS-SZZ: Multi-Agentic SZZ Algorithm for Vulnerability-Inducing Commit Identification

Accurate vulnerability-inducing commit identification serves as a foundation for a series of software security tasks, such as vulnerability detection and affected version analysis. A straightforward s

agent-threats-mas-szz-multi-agentic-szz-algorithm-for-vulnerabi-moi0dg1o·4/28/2026·1 min
AI Threats1 sources

System-aware contextual digital twin for ICS anomaly diagnosis

Industrial Control Systems (ICS) integrate computing, physical processes, and communication to operate critical infrastructures such as power grids, water treatment plants, and oil and gas facilities.

agent-threats-system-aware-contextual-digital-twin-for-ics-anoma-moi0dg1n·4/28/2026·1 min
AI Threats1 sources

AgentVisor: Defending LLM Agents Against Prompt Injection via Semantic Virtualization

Large Language Model (LLM) agents are increasingly used to automate complex workflows, but integrating untrusted external data with privileged execution exposes them to severe security risks, particul

agent-threats-agentvisor-defending-llm-agents-against-prompt-in-moi0dg1m·4/28/2026·1 min
AI Threats1 sources

Poster: ClawdGo: Endogenous Security Awareness Training for Autonomous AI Agents

Autonomous AI agents deployed on platforms such as OpenClaw face prompt injection, memory poisoning, supply-chain attacks, and social engineering, yet existing defences address only the platform perim

agent-threats-poster-clawdgo-endogenous-security-awareness-tra-moi0dg1l·4/28/2026·1 min
CVE Deep DivesCVSS 9.83 sources

CRITICAL: CVE-2026-1114 (CVSS 9.8) — lollms lollms

In parisneo/lollms version 2.1.0, the application's session management is vulnerable to improper access control due to the use of a weak secret key for signing JSON Web Tokens (JWT). This vulnerability allows an attacker to perform an offline brute-force attack to recover the secret key. Once the secret key is obtained, the attacker can forge administrative tokens by modifying the JWT payload and resigning it with the cracked secret. This enables unauthorized users to escalate privileges, impersonate the administrator, and gain access to restricted endpoints. The issue is resolved in version 2.2.0.

CVE-2026-1114·4/28/2026·1 min
Breaches3 sources

Regulator fines Fidelity Brokerage Services $1.25M over data breach

Melanie Waddell reports: William Galvin, Massachusetts&#8217; top securities regulator, ordered Fidelity Brokerage Services on Monday to pay $1.25 million for failing to enforce appropriate cybersecurity controls that resulted in a data breach affecting about 77,000 customers. &#

breach-databreaches-net-regulator-fines-fidelity-brokerage-servi·4/27/2026·1 min
CVE Deep DivesCVSS 93 sources

CRITICAL: CVE-2026-34989 (CVSS 9) — ci4-cms-erp ci4ms

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 31.0.0.0, the application fails to properly sanitize user-controlled input when users update their profile name (e.g., full name / username). An attacker can inject a malicious JavaScript payload into their profile name, which is then stored server-side. This stored payload is later rendered unsafely in multiple application views without proper output encoding, leading to stored cross-site scripting (XSS). This vulnerability is fixed in 31.0.0.0.

CVE-2026-34989·4/27/2026·1 min
AI Threats1 sources

TraceScope: Interactive URL Triage via Decoupled Checklist Adjudication

Modern phishing campaigns increasingly evade snapshot-based URL classifiers using interaction gates (e.g., checkbox/slider challenges), delayed content rendering, and logo-less credential harvesters.

agent-threats-tracescope-interactive-url-triage-via-decoupled-c-mohtjgqu·4/27/2026·1 min
AI Threats1 sources

Automation-Exploit: Multi‑Agent LLMs weaponized with digital-twin guardrails

arXiv preprint details an autonomous multi‑agent LLM framework that exfiltrates binaries and uses digital twins to mitigate “live fire” exploit risk.

agent-threats-automation-exploit-a-multi-agent-llm-framework-fo-mohtjgqt·4/27/2026·4 min
AI Threats1 sources

OpenClaw: MCP stdio server env could load dangerous startup variables from workspace config

## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `< 2026.4.20` - Patched version: `2026.4.20` ## Impact Workspace MCP stdio configuration could pass dangerous proces

agent-threats-openclaw-mcp-stdio-server-env-could-load-dangerou-mohtjgqs·4/27/2026·1 min
AI Threats1 sources

OpenClaw: Agent gateway config mutations could change protected operator settings

OpenClaw < 2026.4.20 let agent-facing config.patch/apply change operator‑trusted settings; fixed in 2026.4.20. Model-to-operator guard bypass, medium.

agent-threats-openclaw-agent-gateway-config-mutations-could-cha-mohtjgqr·4/27/2026·4 min
AI Threats1 sources

LiteLLM: Authenticated command execution via MCP stdio test endpoints

LiteLLM’s MCP test endpoints let any authenticated key spawn commands via stdio configs; fixed by enforcing admin role.

agent-threats-litellm-authenticated-command-execution-via-mcp-s-mohtjgqq·4/27/2026·4 min
Breaches3 sources

Alleged Silk Typhoon hacker extradited to US

Lawrence Abrams reports: A Chinese national accused of carrying out cyberespionage operations for China&#8217;s intelligence services has been extradited from Italy to the United States to face criminal charges. According to a DOJ announcement, Xu Zewei is alleged to be a contrac

breach-databreaches-net-alleged-silk-typhoon-hacker-extradited-t·4/27/2026·1 min
AI Threats18 sources

11 ways agents get hijacked in 2026 — a defender's field guide

A sourced taxonomy of 11 real-world agent exploitation classes — from prompt injection to poisoned weights — with named CVEs, papers, and Shield coverage.

agent-threats-field-guide-2026-04-27·4/27/2026·12 min
Lyrie Originals6 sources

17 releases, 442 tests, 9 days: how we shipped a multi-channel, multi-backend pentest agent

Day 9 of the lyrie-agent repo: four PRs land covering a Python SDK, a 35-tool vetted catalog with NL-recommend, 7 new channel adapters, and pluggable Local/Daytona/Modal backends. 442 tests, 0 failures, 0 regressions.

original-shipping-velocity-64ee54ed·4/27/2026·11 min
CVE Deep DivesCVSS 9.83 sources

CRITICAL: CVE-2026-7156 (CVSS 9.8) — multiple products

A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. Affected is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument HTTP results in os command injection. The attack may be launched remotely. The exploit is now public and may be used.

CVE-2026-7156·4/27/2026·1 min
CVE Deep DivesCVSS 9.83 sources

CRITICAL: CVE-2026-7155 (CVSS 9.8) — multiple products

A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b20200521. This impacts the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

CVE-2026-7155·4/27/2026·1 min
CVE Deep DivesCVSS 9.83 sources

CRITICAL: CVE-2026-7154 (CVSS 9.8) — multiple products

A weakness has been identified in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setAdvancedInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument tty_server can lead to os command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

CVE-2026-7154·4/27/2026·1 min
Breaches3 sources

Supreme Court signals location data searches should require a warrant

Privacy advocates had worried that the high court would rule that geofencing does not qualify as a constitutionally protected search, opening the door to much broader use of warrantless reverse searches of all types.

breach-the-record-supreme-court-signals-location-data-sear·4/27/2026·1 min
CVE Deep DivesCVSS 9.83 sources

CRITICAL: CVE-2026-7152 (CVSS 9.8) — multiple products

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. The affected element is the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument telnet_enabled leads to os command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.

CVE-2026-7152·4/27/2026·1 min
CVE Deep DivesCVSS 9.83 sources

CRITICAL: CVE-2026-7153 (CVSS 9.8) — multiple products

A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. The impacted element is the function setMiniuiHomeInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument sys_info results in os command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.

CVE-2026-7153·4/27/2026·1 min
CVE Deep DivesCVSS 9.33 sources

CRITICAL: CVE-2025-59557 (CVSS 9.3) — multiple products

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ThemeMove Learts Addons learts-addons allows SQL Injection.This issue affects Learts Addons: from n/a through < 1.7.5.

CVE-2025-59557·4/27/2026·1 min
CVE Deep DivesCVSS 9.83 sources

CRITICAL: CVE-2025-59007 (CVSS 9.8) — multiple products

Deserialization of Untrusted Data vulnerability in themesflat TF Woo Product Grid Addon For Elementor tf-woo-product-grid allows Object Injection.This issue affects TF Woo Product Grid Addon For Elementor: from n/a through <= 1.0.1.

CVE-2025-59007·4/27/2026·1 min