$ cipherwatch --feed live --domains all β–ˆ

Decoding Threats.
Watching the Wire.

Daily security intelligence curated from the world's leading sources, mapped across 8 core security disciplines β€” from threat intelligence to application security.

8

Security Domains

Daily

Updates

CVEs

Tracked Live

Latest Intelligence

Recent Articles

🌐Network

Public Exploit Released for Critical FortiSandbox RCE (CVE-2026-39808, CVSS 9.1) β€” Unauthenticated Root Access

A public proof-of-concept exploit has been released for CVE-2026-39808, a critical OS command injection vulnerability in Fortinet FortiSandbox that allows unauthenticated attackers to execute arbitrary commands as root via a single HTTP request. A companion authentication bypass flaw (CVE-2026-39813) affects the same versions. Patch to FortiSandbox 4.4.9 or 5.0.6 immediately.

#fortinet +8
πŸ›‘οΈSecOps

Two Unpatched Windows Defender Zero-Days (RedSun + UnDefend) Actively Exploited β€” No Fix Available

A security researcher released two additional Windows Defender zero-days β€” RedSun and UnDefend β€” after Microsoft failed to patch them. RedSun exploits Defender's cloud file rollback mechanism to achieve SYSTEM privileges on all supported Windows versions. UnDefend silently prevents Defender from updating its threat signatures. Both are confirmed exploited in the wild, and neither has a patch or assigned CVE.

#windows-defender +9
πŸ’»AppSec

Vercel Confirms Breach via Compromised AI Tool β€” Developer Environment Variables and Credentials Exposed

Cloud deployment platform Vercel has confirmed a breach traced to a Lumma infostealer infection at Context.ai, a third-party AI tool used by a Vercel employee. Attackers used the stolen Google Workspace OAuth access to reach Vercel's internal environments, exposing environment variables and a limited set of customer credentials. ShinyHunters is claiming responsibility and demanding $2 million for the stolen data.

#vercel +9
πŸ—„οΈAssets

McGraw Hill Confirms 13.5 Million Account Breach After ShinyHunters Exploits Salesforce Misconfiguration

Education publisher McGraw Hill has confirmed a data breach affecting 13.5 million accounts after the ShinyHunters cybercriminal group threatened to publish 45 million Salesforce records. The breach stemmed from a misconfiguration within Salesforce's environment β€” one McGraw Hill acknowledges is part of a broader issue affecting multiple organisations. Over 100GB of data has been publicly released.

#data-breach +7
πŸ›‘οΈSecOps

Payouts King Ransomware Deploys Hidden QEMU VMs to Blind Endpoint Security β€” New EDR Evasion Technique

The Payouts King ransomware operation, linked to former BlackBasta affiliates, has introduced a novel EDR bypass: deploying a legitimate QEMU virtual machine running Alpine Linux on compromised Windows hosts. Because endpoint security agents cannot inspect inside the VM, attackers operate the full intrusion β€” credential theft, lateral movement, and data exfiltration β€” completely invisible to host-level detection.

#ransomware +8
πŸ’»AppSec

Five-Year-Old ShowDoc RCE Flaw CVE-2025-0520 (CVSS 9.4) Now Under Active Exploitation β€” Over 2,000 Instances Exposed

Threat actors are actively exploiting CVE-2025-0520, a critical unauthenticated remote code execution vulnerability in ShowDoc β€” an IT documentation tool used by developers and operations teams. The flaw, patched in October 2020 but present in thousands of unupgraded installations, allows file upload exploitation to deploy web shells. More than 2,000 publicly accessible ShowDoc instances remain vulnerable.

#rce +7

For CISOs, CIOs & Board Members

CIO Briefings

Security events translated into business language β€” financial exposure, regulatory obligations, and board-ready summaries.

Critical Impact

Two Unpatched Windows Defender Zero-Days Actively Exploited β€” No Microsoft Fix Available

RedSun and UnDefend are two unpatched zero-day vulnerabilities in Windows Defender that are actively exploited in real attacks. RedSun escalates any local user to SYSTEM; UnDefend silently prevents Defender from receiving threat intelligence updates. Both affect all supported Windows versions and remain fully exploitable after April Patch Tuesday.

Read briefing β†’
High Impact

Ransomware Group Uses Virtual Machines to Operate Invisibly Inside Enterprise Networks

The Payouts King ransomware operation, linked to former BlackBasta affiliates, deploys a legitimate QEMU virtual machine on compromised Windows hosts to conduct credential theft and data exfiltration in a zone where endpoint security cannot see. The technique directly defeats EDR investment and is now actively used in attacks. Organisations must extend detection beyond endpoint telemetry.

all NIS2
Critical Impact

April Patch Tuesday Defect Triggers Authentication Outage on PAM Domain Controllers

KB5082063 causes LSASS to crash on non-Global Catalog domain controllers in PAM-enabled environments, creating unrecoverable reboot loops that take Active Directory authentication offline. No corrected update is available. All organisations with PAM-enabled AD must immediately pause KB5082063 deployment on domain controllers and engage Microsoft Support if affected DCs are already looping.

all NIS2
View all CIO Briefings β†’

Stay Vigilant

Intelligence is your first line of defence.

CipherWatch compiles and synthesises security news daily from Krebs on Security, The Hacker News, BleepingComputer, CISA advisories, and more β€” so you stay ahead of the threat curve.

Learn how it works β†’