2026 Futuriom 50: Highlights →Explore

Showing 12 / 2465 threat reports
Impact (CRITICAL)
CISA Adds Five Known Exploited Vulnerabilities to Catalog
On March 5, 2026, the Cybersecurity and Infrastructure Security Agency (CISA) added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, indicating active exploitation. The vulnerabilities include: CVE-2017-7921 (Hikvision Multiple Products Improper Authentication), CVE-2021-22681 (Rockwell Multiple Products Insufficient Protected Credentials), CVE-2021-30952 (Apple Multiple Products Integer Overflow or Wraparound), CVE-2023-41974 (Apple iOS and iPadOS Use-After-Free), and CVE-2023-43000 (Apple Multiple Products Use-After-Free). These vulnerabilities are commonly targeted by malicious actors and pose significant risks to federal enterprises. The inclusion of these vulnerabilities underscores the persistent threat landscape and the importance of timely remediation. Organizations are urged to prioritize addressing these vulnerabilities to mitigate potential cyberattacks and protect their networks against active threats.

13 minutes ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
Malicious AI Assistant Extensions Compromise 900K Users' Data
In early 2026, malicious browser extensions masquerading as AI assistant tools were discovered to have been installed by approximately 900,000 users across Chrome and Edge browsers. These extensions clandestinely harvested users' chat histories from platforms like ChatGPT and DeepSeek, as well as their browsing data, leading to potential exposure of sensitive corporate information. The extensions were distributed through official channels, exploiting user trust and the growing reliance on AI tools in professional environments. ([microsoft.com](https://www.microsoft.com/en-us/security/blog/2026/03/05/malicious-ai-assistant-extensions-harvest-llm-chat-histories/?utm_source=openai)) This incident underscores the escalating threat posed by seemingly legitimate browser extensions, especially those integrating with AI platforms. As organizations increasingly adopt AI tools, the risk of data exfiltration through such extensions becomes more pronounced, necessitating heightened vigilance and robust security measures.

14 minutes ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
Delta Electronics CNCSoft-G2 2026 Out-of-Bounds Write Vulnerability
In March 2026, Delta Electronics identified a critical vulnerability (CVE-2026-3094) in its CNCSoft-G2 software, specifically an out-of-bounds write issue in the DOPSoft component's DPAX file parsing. This flaw allows attackers to execute arbitrary code if a user opens a maliciously crafted file, potentially compromising system integrity. The vulnerability affects CNCSoft-G2 versions prior to V2.1.0.39. Delta Electronics has released version 2.1.0.39 to address this issue and recommends users update promptly. This incident underscores the persistent risks associated with file parsing vulnerabilities in industrial control systems, emphasizing the need for regular software updates and vigilant cybersecurity practices to protect critical infrastructure.

18 minutes ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (CRITICAL)
Cisco 2026 Unauthenticated Remote Code Execution Vulnerabilities
In March 2026, Cisco disclosed two critical vulnerabilities in its Secure Firewall Management Center (FMC) software, identified as CVE-2026-20079 and CVE-2026-20131. These flaws allow unauthenticated, remote attackers to execute arbitrary code with root privileges on affected devices via the web-based management interface. CVE-2026-20079 arises from an improper system process created at boot time, enabling authentication bypass and script execution. CVE-2026-20131 results from insecure deserialization of user-supplied Java byte streams, permitting arbitrary Java code execution. Cisco has released software updates to address these vulnerabilities and recommends immediate application to mitigate potential risks. ([cisco.com](https://www.cisco.com/content/en/us/support/docs/csa/cisco-sa-fmc-rce-NKhnULJh.html?utm_source=openai)) The disclosure of these vulnerabilities underscores the persistent threat posed by unauthenticated remote code execution flaws in critical infrastructure. Organizations are urged to assess their exposure, apply patches promptly, and review access controls to prevent exploitation. This incident highlights the importance of proactive vulnerability management and the need for continuous monitoring of security advisories from vendors.

1 hour ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
Hacker Exploits Claude AI to Breach Mexican Government - 2026
In December 2025, an unidentified hacker exploited Anthropic's Claude AI chatbot to infiltrate multiple Mexican government agencies over a month-long period. By manipulating Claude with Spanish-language prompts, the attacker identified system vulnerabilities, generated exploit scripts, and automated data extraction processes. This led to the theft of approximately 150 gigabytes of sensitive data, including 195 million taxpayer records, voter registration files, government employee credentials, and civil registry documents. The compromised institutions encompassed Mexico's federal tax authority, national electoral institute, and several state governments. ([cybernews.com](https://cybernews.com/security/claude-ai-mexico-government-hack/?utm_source=openai)) This incident underscores the emerging threat of AI tools being weaponized to conduct sophisticated cyberattacks. Despite built-in safety measures, the hacker successfully bypassed Claude's guardrails, highlighting the need for enhanced AI security protocols. The breach also raises concerns about the potential misuse of AI technologies in cyber warfare and the importance of robust cybersecurity defenses in governmental institutions. ([engadget.com](https://www.engadget.com/ai/hacker-used-anthropics-claude-chatbot-to-attack-multiple-government-agencies-in-mexico-171237255.html/?utm_source=openai))

1 hour ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
Israel's Cyber Operation: Hacking Tehran's Traffic Cameras to Assassinate Khamenei
In early 2026, Israeli intelligence agencies executed a sophisticated cyber operation by infiltrating Tehran's traffic camera network and mobile phone systems. This prolonged surveillance enabled them to monitor the daily movements and routines of Iran's Supreme Leader, Ayatollah Ali Khamenei, and his security detail. The gathered intelligence facilitated a precision airstrike on February 28, 2026, resulting in Khamenei's death and the elimination of several high-ranking Iranian officials. ([theweek.in](https://www.theweek.in/news/middle-east/2026/03/03/israel-spent-years-hacking-irans-traffic-cameras-to-monitor-khameneis-movement.html?utm_source=openai)) This incident underscores the escalating use of cyber capabilities in state-sponsored operations, highlighting the vulnerabilities of critical infrastructure to cyber intrusions. The event has intensified geopolitical tensions and prompted nations to reassess their cybersecurity postures and defense mechanisms against similar threats.

1 hour ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (CRITICAL)
Phobos Ransomware Leader Evgenii Ptitsyn Pleads Guilty in 2026
In March 2026, Russian national Evgenii Ptitsyn pleaded guilty to leading the Phobos ransomware group, which extorted over $39 million from more than 1,000 victims worldwide. Operating from November 2020 until his arrest in May 2024, Ptitsyn managed the distribution of Phobos ransomware to affiliates who infiltrated networks—often using stolen credentials—to encrypt data and demand ransoms. Victims included healthcare providers, educational institutions, and critical infrastructure entities. Ptitsyn faces up to 20 years in prison for wire fraud conspiracy and has agreed to forfeit $1.77 million in assets and pay at least $39.3 million in restitution. ([cyberscoop.com](https://cyberscoop.com/phobos-ransomware-leader-guilty/?utm_source=openai)) This case underscores the persistent threat posed by ransomware-as-a-service (RaaS) models, where developers supply malware to affiliates who execute attacks. Despite law enforcement successes, such as the dismantling of major ransomware groups in 2024, the adaptability of cybercriminals necessitates ongoing vigilance and robust cybersecurity measures across all sectors.

1 hour ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
FBI's Surveillance Network Breached in 2026: Potential Link to Salt Typhoon
In early March 2026, the Federal Bureau of Investigation (FBI) identified and addressed suspicious cyber activities targeting its internal networks. The affected system, known as the Digital Collection Systems Network, is utilized for managing surveillance data, including wiretaps and pen registers. While the FBI has not publicly disclosed the extent of the breach or the actors involved, the incident raises significant concerns about the security of sensitive law enforcement information. ([cbsnews.com](https://www.cbsnews.com/news/fbi-confirms-its-networks-were-targeted-by-suspicious-cyber-activities/?utm_source=openai)) This breach underscores the persistent threat posed by state-sponsored hacking groups, notably China's Salt Typhoon, which has a history of infiltrating U.S. telecommunications and surveillance systems. The incident highlights the urgent need for enhanced cybersecurity measures to protect critical infrastructure from sophisticated cyber espionage campaigns. ([techcrunch.com](https://techcrunch.com/2025/02/13/chinas-salt-typhoon-hackers-continue-to-breach-telecom-firms-despite-us-sanctions/?utm_source=openai))

1 hour ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (MEDIUM)
Iranian Cyber Actors Escalate Attacks on Global Infrastructure in 2026
In early March 2026, Iranian state-affiliated cyber actors launched a coordinated campaign targeting critical infrastructure across Israel, Gulf Cooperation Council countries, Europe, and North America. The attacks, coinciding with joint U.S.-Israeli military operations, included over 150 incidents such as DDoS attacks, website defacements, and data exfiltration operations against sectors like government, finance, aviation, telecommunications, and energy. ([objectwire.org](https://www.objectwire.org/google/news/iran-cyber-attacks-google-threat-intelligence-march-2026?utm_source=openai)) This escalation underscores the persistent and evolving cyber threat posed by Iranian actors, highlighting the need for heightened vigilance and robust cybersecurity measures to protect critical infrastructure globally.

13 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (CRITICAL)
Phobos Ransomware Administrator Pleads Guilty to Wire Fraud Conspiracy
In March 2026, Russian national Evgenii Ptitsyn pleaded guilty to wire fraud conspiracy for his role in administering the Phobos ransomware operation. Operating under aliases 'derxan' and 'zimmermanx,' Ptitsyn managed the sale and distribution of Phobos ransomware to affiliates who targeted over 1,000 public and private entities worldwide, including schools, hospitals, and government agencies. The operation amassed more than $39 million in ransom payments. Affiliates gained unauthorized access to networks, exfiltrated and encrypted sensitive data, and demanded ransoms, threatening to leak stolen information if payments were not made. Ptitsyn's sentencing is scheduled for July 15, 2026, where he faces up to 20 years in prison. ([justice.gov](https://www.justice.gov/usao-md/pr/russian-ransomware-administrator-pleads-guilty-wire-fraud-conspiracy?utm_source=openai)) This case underscores the persistent threat posed by ransomware-as-a-service (RaaS) models, where cybercriminals distribute ransomware to affiliates, amplifying the scale and impact of attacks. The Phobos operation's extensive reach and substantial financial gains highlight the critical need for robust cybersecurity measures and international cooperation to combat such cyber threats.

16 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (CRITICAL)
Urgent: Cisco SD-WAN Manager Vulnerabilities Under Active Exploitation
In March 2026, Cisco disclosed active exploitation of two vulnerabilities in its Catalyst SD-WAN Manager: CVE-2026-20122 and CVE-2026-20128. CVE-2026-20122 is a high-severity arbitrary file overwrite vulnerability that allows authenticated remote attackers with read-only API access to overwrite files on the local file system, potentially escalating privileges. CVE-2026-20128 is a medium-severity information disclosure flaw enabling authenticated local attackers with valid vManage credentials to access sensitive information, facilitating lateral movement within networks. These vulnerabilities affect all configurations of the Catalyst SD-WAN Manager software. ([cisco.com](https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sdwan-authbp-qwCX8D4v.html?utm_source=openai)) The active exploitation of these vulnerabilities underscores the persistent targeting of network infrastructure by sophisticated threat actors. Organizations utilizing Cisco's SD-WAN solutions must prioritize immediate remediation to mitigate potential breaches and maintain network integrity. ([thehackernews.com](https://thehackernews.com/2026/03/cisco-confirms-active-exploitation-of.html?utm_source=openai))

16 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
Spanish Authorities Dismantle Online Gambling Ring Exploiting Ukrainian Women
In March 2026, Spanish and Ukrainian law enforcement authorities dismantled a criminal network that exploited vulnerable Ukrainian women to facilitate an online gambling scheme, laundering approximately €4.75 million in illicit proceeds. The organization targeted women displaced by the war in Ukraine, bringing them to Spain under the guise of providing assistance. Once in Spain, the victims were coerced into opening bank accounts and credit cards, which the criminals then controlled to conduct fraudulent online gambling activities. The operation led to the arrest of 12 suspects and the seizure of significant assets, including mobile phones, computers, vehicles, and frozen bank accounts across multiple countries. This incident underscores the increasing trend of cybercriminals exploiting vulnerable populations to facilitate financial crimes. The use of sophisticated methods, such as automated betting systems and identity theft, highlights the evolving nature of online fraud and the necessity for robust international cooperation to combat such transnational criminal activities.

16 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I