// Articles

4 articles β€” sorted by date

πŸ›‘οΈSecOps

DPRK-Linked Hackers Steal $285 Million from Drift Protocol in Six-Month Social Engineering Operation

North Korean threat actors attributed to UNC4736 (Citrine Sleet/AppleJeus) stole $285 million from Solana-based Drift Protocol after a six-month infiltration campaign combining social engineering of multisig signers with a novel durable nonce pre-signing technique. The incident reveals social engineering tactics directly transferable to enterprise environments.

#north-korea +9
πŸ”‘IAM

Fortinet FortiClient EMS Zero-Day CVE-2026-35616 Actively Exploited β€” Apply Emergency Hotfix Now

A critical pre-authentication API bypass in Fortinet FortiClient EMS (CVSS 9.1) is being actively exploited in the wild, with CISA adding the vulnerability to its Known Exploited Vulnerabilities catalogue on 6 April. Organisations running FortiClient EMS 7.4.5 or 7.4.6 must apply the emergency hotfix immediately β€” FCEB agencies faced a remediation deadline of 9 April.

#fortinet +7
🌐Network

Iranian-Affiliated Hackers Target US Water, Energy and Government Facilities via Internet-Exposed PLCs

A joint advisory from CISA, FBI, NSA, and the Department of Energy warns that Iranian-affiliated APT actors have been compromising internet-facing programmable logic controllers at water utilities, energy facilities and local government sites since at least March 2026. Operators should treat any internet-exposed OT device as potentially compromised and implement immediate network isolation.

#ics +7
πŸ’»AppSec

Progress ShareFile Pre-Auth RCE Chain Puts 30,000 Exposed Servers at Risk β€” Patch to 5.12.4

Researchers at watchTowr Labs have disclosed a two-vulnerability chain in Progress ShareFile Storage Zones Controller that enables unauthenticated remote code execution via webshell upload. Approximately 30,000 Storage Zone Controller instances are internet-exposed and remain at risk if not patched to version 5.12.4, which was released on 10 March 2026 before full public disclosure of the attack path.

#sharefile +7