Threat intelligence that never sleeps.
Critical CVEs, active exploitation, breach forensics, and original research — every story cross-validated by 3+ primary sources before publication. Powered by the same autonomous engine that defends Lyrie.ai customers from rogue-AI and machine-speed attackers.

HIGH: CVE-2024-7399 actively exploited — samsung magicinfo 9 server
CVE-2024-7399 path traversal in Samsung MagicINFO 9 Server (<21.1050) enables arbitrary file write as System; actively exploited per CISA KEV.
Five always-on streams
Fresh advisories
CRITICAL: CVE-2026-34615 (CVSS 9.3) — adobe connect
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. An attacker could exploit this vulnerability to inject malicious scripts into a web page, potentially gaining elevated access or control over the victim's account or session. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with a compromised web page. Scope is changed.
CRITICAL: CVE-2026-27303 (CVSS 9.6) — adobe connect
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with a compromised web page. Scope is changed.
CRITICAL: CVE-2026-27246 (CVSS 9.3) — adobe connect
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this vulnerability to inject malicious scripts into a web page, potentially gaining elevated access or control over the victim's account or session. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with a compromised web page. Scope is changed.
CRITICAL: CVE-2026-27245 (CVSS 9.3) — adobe connect
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this vulnerability to inject malicious scripts into a web page, potentially gaining elevated access or control over the victim's account or session. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with a compromised web page. Scope is changed.
CRITICAL: CVE-2026-27243 (CVSS 9.3) — adobe connect
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this vulnerability to inject malicious scripts into a web page, potentially gaining elevated access or control over the victim's account or session. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with a compromised web page. Scope is changed.
GlassWorm escalates: 73 Open VSX sleeper extensions deploy malware to VS Code, Cursor, and every VSIX IDE
73 sleeper extensions on Open VSX tied to GlassWorm: 6 actively deploying malware, 67 dormant, 2 IOC SHA256s confirmed. No patch — manual mitigation required.
Layerwise Convergence Fingerprints for Runtime Misbehavior Detection in Large Language Models
Large language models deployed at runtime can misbehave in ways that clean-data validation cannot anticipate: training-time backdoors lie dormant until triggered, jailbreaks subvert safety alignment,
MAS-SZZ: Multi-Agentic SZZ Algorithm for Vulnerability-Inducing Commit Identification
Accurate vulnerability-inducing commit identification serves as a foundation for a series of software security tasks, such as vulnerability detection and affected version analysis. A straightforward s
System-aware contextual digital twin for ICS anomaly diagnosis
Industrial Control Systems (ICS) integrate computing, physical processes, and communication to operate critical infrastructures such as power grids, water treatment plants, and oil and gas facilities.
AgentVisor: Defending LLM Agents Against Prompt Injection via Semantic Virtualization
Large Language Model (LLM) agents are increasingly used to automate complex workflows, but integrating untrusted external data with privileged execution exposes them to severe security risks, particul
Poster: ClawdGo: Endogenous Security Awareness Training for Autonomous AI Agents
Autonomous AI agents deployed on platforms such as OpenClaw face prompt injection, memory poisoning, supply-chain attacks, and social engineering, yet existing defences address only the platform perim
CRITICAL: CVE-2026-1114 (CVSS 9.8) — lollms lollms
In parisneo/lollms version 2.1.0, the application's session management is vulnerable to improper access control due to the use of a weak secret key for signing JSON Web Tokens (JWT). This vulnerability allows an attacker to perform an offline brute-force attack to recover the secret key. Once the secret key is obtained, the attacker can forge administrative tokens by modifying the JWT payload and resigning it with the cracked secret. This enables unauthorized users to escalate privileges, impersonate the administrator, and gain access to restricted endpoints. The issue is resolved in version 2.2.0.
Regulator fines Fidelity Brokerage Services $1.25M over data breach
Melanie Waddell reports: William Galvin, Massachusetts’ top securities regulator, ordered Fidelity Brokerage Services on Monday to pay $1.25 million for failing to enforce appropriate cybersecurity controls that resulted in a data breach affecting about 77,000 customers. &#
CRITICAL: CVE-2026-34989 (CVSS 9) — ci4-cms-erp ci4ms
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 31.0.0.0, the application fails to properly sanitize user-controlled input when users update their profile name (e.g., full name / username). An attacker can inject a malicious JavaScript payload into their profile name, which is then stored server-side. This stored payload is later rendered unsafely in multiple application views without proper output encoding, leading to stored cross-site scripting (XSS). This vulnerability is fixed in 31.0.0.0.
TraceScope: Interactive URL Triage via Decoupled Checklist Adjudication
Modern phishing campaigns increasingly evade snapshot-based URL classifiers using interaction gates (e.g., checkbox/slider challenges), delayed content rendering, and logo-less credential harvesters.
Automation-Exploit: Multi‑Agent LLMs weaponized with digital-twin guardrails
arXiv preprint details an autonomous multi‑agent LLM framework that exfiltrates binaries and uses digital twins to mitigate “live fire” exploit risk.
OpenClaw: MCP stdio server env could load dangerous startup variables from workspace config
## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `< 2026.4.20` - Patched version: `2026.4.20` ## Impact Workspace MCP stdio configuration could pass dangerous proces
OpenClaw: Agent gateway config mutations could change protected operator settings
OpenClaw < 2026.4.20 let agent-facing config.patch/apply change operator‑trusted settings; fixed in 2026.4.20. Model-to-operator guard bypass, medium.
LiteLLM: Authenticated command execution via MCP stdio test endpoints
LiteLLM’s MCP test endpoints let any authenticated key spawn commands via stdio configs; fixed by enforcing admin role.
Alleged Silk Typhoon hacker extradited to US
Lawrence Abrams reports: A Chinese national accused of carrying out cyberespionage operations for China’s intelligence services has been extradited from Italy to the United States to face criminal charges. According to a DOJ announcement, Xu Zewei is alleged to be a contrac
11 ways agents get hijacked in 2026 — a defender's field guide
A sourced taxonomy of 11 real-world agent exploitation classes — from prompt injection to poisoned weights — with named CVEs, papers, and Shield coverage.
17 releases, 442 tests, 9 days: how we shipped a multi-channel, multi-backend pentest agent
Day 9 of the lyrie-agent repo: four PRs land covering a Python SDK, a 35-tool vetted catalog with NL-recommend, 7 new channel adapters, and pluggable Local/Daytona/Modal backends. 442 tests, 0 failures, 0 regressions.
CRITICAL: CVE-2026-7156 (CVSS 9.8) — multiple products
A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. Affected is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument HTTP results in os command injection. The attack may be launched remotely. The exploit is now public and may be used.
CRITICAL: CVE-2026-7155 (CVSS 9.8) — multiple products
A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b20200521. This impacts the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
CRITICAL: CVE-2026-7154 (CVSS 9.8) — multiple products
A weakness has been identified in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setAdvancedInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument tty_server can lead to os command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
Supreme Court signals location data searches should require a warrant
Privacy advocates had worried that the high court would rule that geofencing does not qualify as a constitutionally protected search, opening the door to much broader use of warrantless reverse searches of all types.
CRITICAL: CVE-2026-7152 (CVSS 9.8) — multiple products
A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. The affected element is the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument telnet_enabled leads to os command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
CRITICAL: CVE-2026-7153 (CVSS 9.8) — multiple products
A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. The impacted element is the function setMiniuiHomeInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument sys_info results in os command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.
CRITICAL: CVE-2025-59557 (CVSS 9.3) — multiple products
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ThemeMove Learts Addons learts-addons allows SQL Injection.This issue affects Learts Addons: from n/a through < 1.7.5.
CRITICAL: CVE-2025-59007 (CVSS 9.8) — multiple products
Deserialization of Untrusted Data vulnerability in themesflat TF Woo Product Grid Addon For Elementor tf-woo-product-grid allows Object Injection.This issue affects TF Woo Product Grid Addon For Elementor: from n/a through <= 1.0.1.