Yesterday's security developments from Saturday, March 28, 2026. We analyzed 15 articles covering threat campaigns, vulnerabilities, and security tooling. All attribution is by the article authors. All article analysis is automated.
ESET research reports on Silver Fox, a threat actor conducting targeted spearphishing campaigns against Japanese manufacturers and businesses during tax season. The campaign deploys ValleyRAT remote access trojan through convincing phishing emails related to tax compliance, salary adjustments, and employee stock ownership plans to achieve remote control, harvest sensitive information, and maintain persistence in targeted environments.
Researchers at arXiv conducted systematic forensic analysis of local LLM runners including Ollama, LM Studio, and llama.cpp on Windows and Linux. The study reveals that offline AI deployment creates evidentiary blind spots for digital forensics investigators, as malicious actors can generate phishing content, process stolen data, or conduct social engineering without leaving network traces inherent to cloud services.
A research team has proposed a Policy-Guided Threat Hunting framework that integrates Agentic AI with Splunk to automate SOC threat detection and response. The framework combines autoencoders for anomaly detection, deep reinforcement learning for decision-making, and LLMs for multi-agent contextual analysis to help SOC analysts identify sophisticated threats like APTs while reducing analyst workload.
qriousec disclosed CVE-2025-14325, a type confusion vulnerability in Mozilla's SpiderMonkey JavaScript engine affecting Firefox and applications embedding SpiderMonkey. The flaw exists in Baseline JIT inline caches during property lookups, allowing arbitrary code execution through a re-entrancy window, and was discovered via AI-assisted fuzzing. The vulnerability enables remote code execution, arbitrary memory read/write, and ASLR bypass through a multi-stage exploitation process.
The Cyber Security Agency of Singapore reports that multiple critical vulnerabilities have been discovered in TP-Link Archer router models NX200, NX210, NX500, and NX600. The flaws include authentication bypass allowing unauthenticated attackers to perform privileged actions, command injection vulnerabilities enabling arbitrary OS command execution, and a configuration file encryption weakness. TP-Link has released security updates to address these issues.
SEC Consult disclosed CVE-2026-24068, a local privilege escalation vulnerability in Vienna Assistant software version 1.2.542 for macOS. The vulnerability allows any process to connect to a privileged helper without validation and execute arbitrary commands or write files with elevated permissions. The vendor has not responded and no patch is currently available.
strongSwan has disclosed CVE-2026-25075, a vulnerability in the eap-ttls plugin affecting all versions since 4.5.0. The flaw allows unauthenticated attackers to cause a denial of service through integer underflow when processing malformed EAP-TTLS AVP headers. A fix is available in strongSwan version 6.0.5 and as a patch for older versions.
squid-cache reported SQUID-2026:3, CVE-2026-33515, an out-of-bounds read vulnerability in Squid caching proxy versions 3.0 through 7.4 when ICP support is enabled. The flaw stems from improper input validation in ICP message handling, allowing remote attackers to trigger memory leaks that could expose sensitive information. The vulnerability is fixed in Squid version 7.5, and can be mitigated by disabling ICP or setting icp_port to 0.
Grafana Labs released security updates addressing two vulnerabilities: CVE-2026-27876, a critical SQL expressions flaw enabling arbitrary file write and remote code execution in versions 11.6.0 and later, and CVE-2026-27880, a high-severity unauthenticated denial-of-service vulnerability in OpenFeature endpoints affecting versions 12.1.0 and later. Patches are available in Grafana 12.4.2 and backported versions.
Researchers developed an Environment-Grounded Multi-Agent Workflow using Large Language Models to automate penetration testing of robotic systems running ROS and ROS2 middleware. The system employs a Planner, Executor, and Memory Agent architecture built on LangGraph to conduct security assessments, achieving 100% success rate in robotics CTF scenarios and targeting vulnerabilities in robotic and OT environments that commonly use unencrypted TCP/IP communication.
A Cobalt Strike Beacon Object File named trustme has been publicly released that enables attackers to impersonate the NT AUTHORITY TrustedInstaller service through DISM API triggers and thread impersonation. The tool bypasses Service Control Manager logging by leveraging dismapi.dll and uses less-monitored API calls like NtImpersonateThread to achieve privileges beyond SYSTEM access, requiring an already elevated administrative beacon with SeDebugPrivilege.
F5 reports that CVE-2025-53521, a critical RCE vulnerability with CVSS score 9.8, is being actively exploited in the wild against BIG-IP APM systems with access policies configured on virtual servers. The vulnerability allows unauthenticated attackers to execute arbitrary code via the apmd process. F5 recommends immediate upgrade to fixed versions and IOC review, warning that UCS backups from compromised systems may contain persistent malware.
CloudSEK conducted a honeypot study analyzing attacks targeting Oracle WebLogic Server vulnerabilities between January 22 and February 3, 2026. The research revealed immediate widespread exploitation of CVE-2026-21962, a CVSS 10.0 vulnerability, following public exploit release, alongside continued attacks targeting older critical RCE vulnerabilities from 2017 and 2020. Attackers primarily used rented VPS infrastructure and common tools like libredtail-http and Nmap NSE to exploit these unauthenticated RCE flaws.
reajason released MemShellParty, a publicly available tool that automates the generation of in-memory shells for mainstream Java web middleware. The tool supports various JDK versions 6 through 21, integrates with popular post-exploitation frameworks like Godzilla and AntSword, and enables one-click generation of shells for common vulnerabilities including deserialization and SSTI. It poses detection challenges for defenders due to its fileless, memory-resident nature.
BridgeHead, a C++20 static library, has been released providing native C++ access to Active Directory Web Services over TCP port 9389, bypassing .NET, WCF, and HTTP stacks. The library implements the complete ADWS protocol stack including NegotiateStream encryption, .NET Message Framing, and SOAP binary format, with support for NTLM and Kerberos authentication and includes security features like LDAP injection prevention through automatic character escaping.
That concludes today's briefing.