🛡️ InfoSec Blue Team Briefing

Friday, March 06, 2026

🎧 Audio Briefing

Download MP3

Good morning. This is your security briefing for Thursday, March 05, 2026, covering 8 articles analyzed overnight. All attribution is by the article authors. All article analysis is automated.

WatchTowr reports a critical pre-authentication remote code execution vulnerability in Juniper's Junos OS Evolved platform. CVE-2026-21902 affects PTX Series devices where the On-Box Anomaly Detection Framework, running with root privileges and enabled by default, was found to be externally accessible via REST API on port 8160, allowing unauthenticated attackers to execute arbitrary commands as root.

CodeAnt AI has published a full proof-of-concept for CVE-2026-29000, a critical authentication bypass in the pac4j-jwt Java library with a CVSS score of 10.0. The vulnerability allows attackers to forge JWT tokens using only the server's public RSA key by exploiting JWE handling that bypasses signature verification when unsigned PlainJWT tokens are encrypted. Patches are available for versions 4.5.9 and above, 5.7.9 and above, and 6.3.3 and above.

Cisco Talos reports that China-nexus APT actor UAT-9244, linked to Famous Sparrow, is targeting South American telecommunication providers with three new malware implants. The campaign deploys TernDoor, a Windows backdoor, PeerTime, a Linux peer-to-peer backdoor using BitTorrent, and BruteEntry, a GoLang brute-force scanner that converts compromised devices into operational relay boxes for mass scanning and credential attacks.

According to reports from the Threat Hunter Team at Broadcom and Zscaler, Iranian APT activity is targeting multiple sectors across the Middle East and United States. Seedworm has been actively compromising U.S. organizations including a bank, airport, software company, and NGOs since February 2026, deploying custom backdoors Dindoor and Fakeset and attempting data exfiltration via Rclone to Wasabi cloud storage. Separately, Dust Specter targeted Iraqi government officials in January using previously undocumented .NET-based malware including SPLITDROP dropper, TWINTASK and TWINTALK backdoors, and GHOSTFORM RAT, leveraging compromised Iraqi government infrastructure for command and control.

Christian Papathanasiou reports that North Korea's Lazarus Group conducted a sophisticated social engineering campaign targeting a CEO through fake job interviews on LinkedIn. The attack deployed BeaverTail malware via a Bitbucket repository, using VS Code auto-execute, npm install hooks, and route injection to exfiltrate credentials, cryptocurrency wallets, SSH keys, and establish remote access with advanced capabilities including host fingerprinting and adaptive kill switches.

The Royal United Services Institute analyzes recent cyber operations conducted by US Cyber Command and Israeli forces against Iranian military and intelligence infrastructure. Operations Epic Fury and Roaring Lion disrupted communications and sensor networks as first-strike enablers supporting precision strikes, including the alleged killing of Ayatollah Ali Khamenei. The analysis warns of retaliatory threats from pro-Iranian hacktivist groups and IRGC cyber command, with potential for decentralized proxy-led escalation following disruption of Iran's cyber warfare headquarters.

Mitchell Turner introduces Brainworm, a novel promptware threat concept targeting AI-powered computer-use agents through semantic manipulation rather than binary code execution. The malware injects malicious natural language instructions into agent memory files or specifications, hijacking reasoning capabilities and forcing infected agents to register with an adversarial command-and-control framework called Praxis, bypassing traditional security defenses like signature scanning and EDR by operating entirely through prompts within the agent's context window.

That concludes today's briefing.

📰 Articles Covered