Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CISA flags Apple, Craft CMS, KEV’s Laravel bug and orders patching by April 3, 2026

Trivy supply chain attack causes CanisterWorm to self-spread across 47 npm packages

Microsoft rolls back some of its Copilot AI bloat on Windows

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA flags Apple, Craft CMS, KEV’s Laravel bug and orders patching by April 3, 2026
Identity

CISA flags Apple, Craft CMS, KEV’s Laravel bug and orders patching by April 3, 2026

By March 21, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 21, 2026Vulnerability/Threat Intelligence

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five security flaws affecting Apple, Craft CMS, and Laravel Livewire to its Known Exploited Vulnerabilities (KEV) catalog, requiring federal agencies to patch them by April 3, 2026.

The vulnerabilities being exploited are as follows:

CVE-2025-31277 (CVSS Score: 8.8) – A vulnerability in Apple WebKit could lead to memory corruption when processing maliciously crafted web content. (Fixed in July 2025) CVE-2025-43510 (CVSS Score: 7.8) – A memory corruption vulnerability in Apple’s kernel component could allow a malicious application to cause unexpected changes to memory shared between processes. (Fixed in December 2025) CVE-2025-43520 (CVSS Score: 8.8) – A memory corruption vulnerability in Apple’s kernel component could allow a malicious application to cause an unexpected system termination or write to kernel memory. (Fixed in December 2025) CVE-2025-32432 (CVSS Score: 10.0) – A code injection vulnerability in Craft CMS could allow a remote attacker to execute arbitrary code. (Fixed in April 2025) CVE-2025-54068 (CVSS Score: 9.8) – A code injection vulnerability in Laravel Livewire could allow an unauthenticated attacker to execute remote commands in certain scenarios. (revised July 2025)

The addition of the three Apple vulnerabilities to the KEV catalog follows reports from the Google Threat Intelligence Group (GTIG), iVerify, and Lookout about an iOS exploit kit codenamed DarkSword that leverages these flaws and three bugs to deploy various malware families, including GHOSTBLADE, GHOSTKNIFE, and GHOSTSABRE, to steal data.

According to Orange Cyberdefense SensePost, CVE-2025-32432 has been assessed as a zero-day exploit by unknown attackers since February 2025. Since then, an intrusion set tracked as Mimo (also known as Hezb) has also been observed exploiting this vulnerability to deploy cryptocurrency miners and residential proxyware.

Rounding out the list is CVE-2025-54068. This exploit was recently reported by the Ctrl-Alt-Intel Threat Research Team as part of an attack by the Iranian state-sponsored hacking group MuddyWater (also known as Boggy Serpens).

Palo Alto Networks’ 42nd Unit, in a report released earlier this week, accused adversaries of consistently targeting diplomatic and critical infrastructure, including energy, maritime, and financial, across the Middle East and other strategic targets around the world.

“While social engineering remains its hallmark, the group has also improved its technical capabilities,” Unit 42 said. “Its diverse toolset includes AI-enhanced malware implants that incorporate anti-analysis techniques for long-term persistence. This combination of social engineering and rapidly developed tools creates a powerful threat profile.”

“To support large-scale social engineering campaigns, Boggy Serpens uses a custom-built web-based orchestration platform,” Unit 42 said. “This tool allows operators to automate high-volume email distribution with granular control over sender identities and target lists.”

The group, which belongs to Iran’s Ministry of Intelligence and Security (MOIS), primarily focuses on cyber espionage, but is also said to have been involved in a destructive operation targeting the Technion-Israel Institute of Technology by adopting the DarkBit ransomware persona.

One of the defining features of MuddyWater’s trading methods is the use of compromised accounts belonging to government agencies and corporations in spear-phishing attacks, as well as the exploitation of trust relationships to circumvent reputation-based blocking systems and distribute malware.

In an ongoing campaign targeting an unnamed national marine and energy company in the United Arab Emirates between August 16, 2025 and February 11, 2026, threat actors allegedly carried out four different attack waves, leading to the deployment of various malware families, including GhostBackDoor and Nuso (also known as HTTP_VIP). Other notable tools in threat actors’ arsenals include UDPGangster and LampoRAT (also known as CHAR).

“Bogie Serpens’ recent activities exemplify a maturing threat profile as the group integrates established methodologies and sophisticated mechanisms for continued operations,” Unit 42 said. “By diversifying its development pipeline to include modern coding languages ​​like Rust and AI-assisted workflows, the group is creating parallel tracks and ensuring the redundancy needed to maintain a high operational tempo.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTrivy supply chain attack causes CanisterWorm to self-spread across 47 npm packages

Related Posts

Trivy supply chain attack causes CanisterWorm to self-spread across 47 npm packages

March 21, 2026

Trivy Security Scanner GitHub Actions Compromised, Hijacks 75 Tags and Steals CI/CD Secrets

March 20, 2026

Langflow critical flaw CVE-2026-33017 triggers attacks within 20 hours of publication

March 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CISA flags Apple, Craft CMS, KEV’s Laravel bug and orders patching by April 3, 2026

Trivy supply chain attack causes CanisterWorm to self-spread across 47 npm packages

Microsoft rolls back some of its Copilot AI bloat on Windows

Karsi temporarily banned in Nevada amid legal turmoil

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.