Your Antivirus Is Harvesting Passwords Now: BlueHammer Hits CISA KEV

The BlueHammer flaw has moved from a research curiosity to an active threat. This Windows Defender zero-day turns your security software into a password harvester by exploiting a race condition to steal credentials. CISA says patch now.

Read More

Patch This Week: Two Fortinet CVEs Due Tomorrow, Six More Due April 27, and NIST Changed How NVD Works

Two Fortinet CVEs have a federal remediation deadline of April 16. A separate six-CVE batch is due April 27. NIST restructured NVD prioritization because CVE volume is up 30%. And 2,000+ ShowDoc servers are still unpatched.

Read More

165 CVEs in One Day. Two Zero-Days. One Kerberos Bug That Should Have Your Full Attention.

Microsoft dropped 165 CVEs today including two zero-days, a critical Kerberos credential relay vulnerability, and a FortiClient EMS flaw with a 48-hour CISA deadline. Here's how to prioritize.

Read More

The Math Does Not Work Anymore: Why Patching Faster Is No Longer Enough

Qualys analyzed a billion CISA KEV remediation records and found attackers are weaponizing critical vulns an average of seven days before patches exist. The human-scale remediation model has hit a structural ceiling.

Read More

Ivanti Just Got Its 33rd CISA Exploited Vulnerability Entry

CVE-2026-1340 is a pre-auth RCE in Ivanti EPMM, CVSS 9.8, exploited since January. It's the 33rd Ivanti entry on the CISA KEV catalog. At some point that number has to become a procurement conversation.

Read More

Update Chrome Now. Update FortiClient Now. Here's Why.

Two critical vulnerabilities are being actively exploited right now: a Chrome WebGPU zero-day and a Fortinet pre-auth privilege escalation, and both have patches available today.

Read More

Three Vendors, Three Critical Bugs, All Exploited This Week: The Edge Device Emergency

F5 BIG-IP, Citrix NetScaler, and Fortinet FortiClient EMS all have critical vulnerabilities under active exploitation this week. Here's what happened and what you need to do right now.

Read More

AI Tools Are Now Both the Target and the Weapon, And Security Teams Haven't Caught Up

A CVSS 10.0 flaw in Langflow was exploited within 20 hours. The Claude Chrome extension let any website hijack your AI assistant. And a state-sponsored actor used autonomous AI to run 80-90% of a cyber espionage campaign. Three stories, one picture.

Read More

48 Hours to Patch or Get Owned: The New Enterprise Reality

Vulnerability exploitation just passed stolen credentials as the #1 way attackers break into cloud environments. And you've got about 48 hours before they're at your door.

Read More