Daily Recap, WordPress ACF plugin vulnerabilities put thousands of sites at risk, with one add-on affecting 100,000 sites and another flaw giving admins access on 50,000 sites. The roundup also notes patches for Zoom and GitLab addressing RCE and a high-severity 2FA bypass, a Cloudflare WAF bypass via the ACME path, AI-generated threats like VoidLink, and malware campaigns such as PDFSider and LinkedIn RAT. #VoidLink #PDFSider
WordPress
- ACF plugin vulnerabilities put thousands of sites at risk β researchers say one add-on affects 100,000 sites while another bug gives admins on 50,000 sites β ACF Flaw, ACF Flaw
Vulnerabilities & Patches
- Zoom and GitLab released security updates addressing RCE, DoS and a high-severity 2FA bypass β admins should patch immediately β Zoom/GitLab, Zoom/GitLab
- Microsoft offers a workaround for Outlook freezes caused by a recent Windows update while users await a full fix β Outlook Freeze
- A Cloudflare zero-day allowed WAF bypass via the ACME certificate validation path, enabling potential bypasses of web protections β Cloudflare WAF
- Three flaws in Anthropicβs MCP Git server can enable file access and code execution, exposing source and build artifacts β Anthropic Flaws
Malware & Campaigns
- The APT-grade PDFSider tool is being reused by ransomware groups to deliver malicious payloads via weaponized PDFs β PDFSider
- Cloud-based VoidLink malware shows signs of being AI-generated, signaling evolving adversary tooling in cloud environments β VoidLink
- Threat actors are spreading RATs via LinkedIn messages using DLL sideloading techniques to bypass detections and deliver remote access payloads β LinkedIn RAT
AI & LLM Security
- Flaws in the Chainlit AI framework (file-read and SSRF bugs) can enable data theft and sensitive information leaks from model deployments β Chainlit Flaws, Chainlit Flaws
- Researchers tricked Googleβs Gemini assistant into leaking Google Calendar data, highlighting how language prompts can become an attack surface β Gemini Leak, Gemini Leak
Developer & DevTools Attacks
- North Korea-linked groups are targeting developers with malicious VS Code projects to supply malware through dev tooling ecosystems β Malicious VS Code
- Attackers exploited security-testing apps and exposure assessment platforms to breach Fortune 500 firms, signaling abuse of security tooling and shift in emphasis toward attack surface management risks β Testing Apps, Exposure Platforms
Identity & Authentication
- Experts urge moving beyond password+MFA: organizations should adopt phishing-resistant methods and identity threat detection (e.g., FIDO2, YubiKey) as MFA alone is insufficient against modern social engineering β Beyond MFA, Identity Strategy
Phishing & Fraud
- LastPass users are being targeted with backup-themed phishing emails designed to steal credentials and account data β users should verify links and enable phishing-resistant auth β LastPass Phish
- Behavioral research and reporting remind defenders that humans remain highly susceptible to phishing, reinforcing training and technical controls as complementary defenses β You Got Phished
- Greek police arrested scammers using a hidden cell-tower rig (IMSI-catcher) in a car trunk to intercept and defraud victims, highlighting physical-layer mobile fraud β Fake Cell Tower
Policy & Regulation
- The EU unveiled proposals to phase out and restrict high-risk telecom suppliers like Huawei and ZTE, prompting China to allege protectionism as member states push network security reforms β EU Telecom, EU Telecom, EU Telecom
- The UK is considering a social-media ban for children, drawing on the Australian model as ministers weigh tighter youth protections online β UK Ban, UK Ban
- The U.S. Supreme Court will consider whether geofence warrants are constitutional, a key privacy ruling that could shape law enforcement digital search practices β Geofence Case
- Lawmakers moved to extend two federal cyber programs in a funding proposal, continuing short-term extensions of critical cybersecurity initiatives β Congress Funding
Events & Research
- At Pwn2Own Automotive 2026 researchers demonstrated exploits on Tesla and revealed 37 zero-days, underscoring automotive attack surface risks β Pwn2Own Auto
- SecurityWeekβs Cyber Insights warns that API security will be harder to secure in 2026 and impossible to ignore as APIs remain a primary attack vector β API Insights
- Webinars highlight operational topics: MSSPs using AI to boost margins and aligning cybersecurity purchases with SOC needs to improve buying decisions β MSSP Webinar, SOC Webinar
<liMITRE published a new security framework for embedded systems to guide secure design and testing across IoT and industrial devices β MITRE Embedded
Tools & Industry
- Two security startups emerged from stealth: aiFWall unveiled an AI firewall while Asymmetric Security announced $4.2 million in seed funding, signaling investor appetite for AI-driven security tooling β aiFWall, Asymmetric Security
- Microsoft PowerToys added a new CursorWrap mouse βteleportβ tool for improved desktop navigation and productivity β PowerToys
Industry Trends
- UK corporate leaders cite cyber breaches, compliance and reputational risk as top concerns for the year, influencing board priorities and security investment plans β UK Concerns