PROMIT NOW · SECURITY DAILY · 2026-04-25

UAT-4356 Hides in Cisco ASA Firewalls via FIRESTARTER

· Security · 45 sources · 1,553 words · 8 min

Topics AI Regulation · LLM Inference · Agentic AI

A Chinese APT codenamed UAT-4356 has been living inside Cisco ASA and Firepower firewalls through two complete patch cycles using a previously unknown backdoor called FIRESTARTER — discovered by CISA, which has now ordered federal agencies to submit memory snapshots immediately. If you patched your Cisco firewalls in September 2025 and moved on, the adversary is still there. Only a hard power-cycle (not graceful reboot) followed by a full reimage removes it. Audit your entire Cisco firewall fleet this weekend — not Monday.

◆ INTELLIGENCE MAP

  1. 01

    FIRESTARTER: Chinese APT Persists Through Two Cisco Patch Cycles

    act now

    UAT-4356 implanted FIRESTARTER on Cisco ASA/Firepower devices using a novel boot-config rewrite that survives reboots and patches. The backdoor hooks VPN traffic processing to watch for attacker trigger packets, turning your perimeter into a C2 channel. CISA emergency directive requires memory snapshots from all federal agencies.

    2
    patch cycles survived
    2
    sources
    • Patches survived
    • Campaign active since
    • Trigger mechanism
    • Remediation
    1. Late 2025FIRESTARTER implanted on Cisco ASA
    2. Sep 2025First patch cycle — backdoor persists
    3. Early 2026Second patch cycle — still persists
    4. Apr 24, 2026CISA emergency directive issued
  2. 02

    CVE-2026-40372: ASP.NET Core Cookie Forgery — Patching Alone Isn't Remediation

    act now

    A CVSS 9.1 flaw in ASP.NET Core DataProtection computes HMAC over the wrong payload bytes then discards the hash — making signature verification a no-op on Linux/macOS. Microsoft issued an out-of-band patch, but forged auth cookies created before patching remain valid unless you rotate the DataProtection key ring. Treat this as incident response, not routine patching.

    9.1
    CVSS score
    4
    sources
    • CVSS
    • Affected versions
    • Platforms
    • Fix version
    1. Patch only30
    2. Patch + key rotation100
  3. 03

    Supply Chain Siege: Bitwarden CLI Hijacked, npm Worm Self-Propagates, OAuth Goes Commodity

    monitor

    Three distinct supply chain attacks converged this week. TeamPCP hijacked @bitwarden/cli v2026.4.0 on npm, now harvesting AI tooling configs alongside cloud secrets. A self-propagating worm across npm/PyPI turns every compromised dev into a distribution vector. ConsentFix v3 commoditized APT29's OAuth hijacking — bypassing MFA, passkeys, and device compliance. Together, these represent industrialized supply chain offense.

    3
    simultaneous supply chains hit
    7
    sources
    • @bitwarden/cli
    • npm/PyPI worm
    • ConsentFix
    • Secrets leaked
    1. 01Bitwarden CLI hijackCreds + AI configs
    2. 02npm/PyPI wormSelf-propagating
    3. 03ConsentFix v3Bypasses MFA+passkeys
    4. 04Web IDE leaks8,800 tokens exposed
  4. 04

    AI Weaponization Window Collapses to Hours

    monitor

    LMDeploy CVE-2026-33626 was weaponized in 12 hours and 31 minutes — no public PoC, likely AI-assisted exploit development. GPT-5.5 scored 81.8% on CyberGym. Open-weight GLM-5.1 scored 68.7 on the same benchmark with zero safety refusals, under MIT license at $1.40/M tokens. Researchers demonstrated Zealot, an AI agent that autonomously chained SSRF → token theft → privilege escalation → data exfiltration against GCP.

    12hrs
    patch-to-exploit window
    8
    sources
    • LMDeploy weaponized
    • GPT-5.5 CyberGym
    • GLM-5.1 CyberGym
    • DeepSeek V4 cost
    1. GPT-5.581.8
    2. GLM-5.1 (open)68.7
    3. Claude Opus 4.666.6
    4. GPT-5.466.3
  5. 05

    China-Linked Covert Infrastructure Industrializes: IOC Extinction, SIM Farms, Router Hijacking

    background

    A 16-agency advisory warns Chinese groups now cycle compromised IoT/SOHO device IPs after minimal use — making traditional IOC-based detection useless. ProxySmart operates 94 SIM farms across 17 countries with turnkey API access. Tropic Trooper is hijacking home routers to trojanize legitimate software updates via DNS. Citizen Lab documented the first real-world SS7/Diameter exploitation for surveillance. The proxy infrastructure underpinning Chinese operations is now industrialized.

    94
    SIM farms in 17 countries
    5
    sources
    • Joint advisory
    • SIM farms
    • IOC cycling
    • APT groups cited
    1. SOHO routers40
    2. IoT devices30
    3. SIM farms20
    4. SS7 abuse10

◆ DEEP DIVES

  1. 01

    FIRESTARTER: Your Patched Cisco Firewalls Are Still Compromised — Reimage Everything

    <h3>The Threat</h3><p>A joint US-UK advisory issued April 24, 2026 confirmed that Chinese APT <strong>UAT-4356</strong> has implanted a backdoor called <strong>FIRESTARTER</strong> on Cisco ASA and Firepower/Secure Firewall devices that <strong>survived two complete rounds of patches</strong> — including the September 2025 security update most organizations treated as remediation. CISA has escalated to emergency directive status and ordered federal agencies to submit memory snapshots immediately.</p><blockquote>This effectively turns your perimeter security appliance into a covert C2 channel — the very device you trust to inspect VPN traffic is parsing it for attacker commands.</blockquote><h3>How It Works</h3><p>FIRESTARTER's persistence mechanism is the critical differentiator. It <strong>rewrites boot-related configuration</strong> to reinstall itself on every reboot — making standard graceful reboots ineffective. It hooks core firewall code to monitor for a specially crafted trigger embedded in VPN-related traffic, then executes attacker-supplied code. The backdoor was discovered by CISA as part of the ongoing <strong>ArcaneDoor campaign</strong> investigation.</p><h4>Why Patching Failed</h4><p>Both sources agree: the persistence mechanism operates at a layer <em>below</em> what firmware patches touch. The September 2025 patches addressed the initial vulnerability but did not detect or remove already-implanted FIRESTARTER code. This means any ASA device compromised before the first patch retained its backdoor through both update cycles — potentially granting UAT-4356 <strong>over a year of post-patching persistent access</strong>.</p><h3>Remediation Requirements</h3><table><thead><tr><th>Action</th><th>Standard Practice</th><th>FIRESTARTER Requirement</th></tr></thead><tbody><tr><td>Patch</td><td>Apply firmware update</td><td><strong>Insufficient alone</strong></td></tr><tr><td>Reboot</td><td>Graceful restart</td><td><strong>Must be hard power-cycle (full power removal)</strong></td></tr><tr><td>Reimage</td><td>Not typical for patching</td><td><strong>Full reimage from verified media required</strong></td></tr><tr><td>Verification</td><td>Check patch version</td><td><strong>Memory snapshot + integrity baseline comparison</strong></td></tr></tbody></table><h3>Cross-Source Analysis</h3><p>Both primary sources converge on the severity and remediation, but frame the attribution slightly differently. One source names the actor as <strong>UAT-4356</strong> and ties it explicitly to China and the ArcaneDoor campaign. The other describes it as <strong>"state-linked"</strong> without specifying China in the headline assessment. Both agree CISA discovered the persistence mechanism and that exploitation is <em>still ongoing</em>.</p><hr><h3>Scope Assessment</h3><p>If UAT-4356 had persistent access to your network edge for potentially over a year post-patching, this is not a patch deployment — it's a <strong>breach investigation</strong>. Map what traffic traversed those ASAs, what internal networks they fronted, and whether there are indicators of lateral movement. Deploy out-of-band monitoring on firewall management interfaces that doesn't depend on the potentially compromised firewall itself.</p>

    Action items

    • Capture memory snapshots from every Cisco ASA and Firepower device and compare against known-good baselines
    • Hard power-cycle (full power removal, not graceful reboot) and reimage from verified media every suspect device
    • Review VPN logs for unusual packet patterns and initiate lateral movement threat hunt from all ASA-fronted network segments
    • Implement firmware integrity verification for all edge appliances — not just Cisco — as a standing capability

    Sources:Your Cisco firewalls may still be compromised after patching — Firestarter persists through reboots and Sept 2025 fixes · Reimage your Cisco ASAs now: Chinese APT survived two patch cycles with unknown persistence — plus 4 more actions this week

  2. 02

    CVE-2026-40372: The CVSS 9.1 Where Patching Is Only Half the Job

    <h3>The Vulnerability</h3><p>Microsoft issued an <strong>out-of-band patch</strong> for CVE-2026-40372 in ASP.NET Core's DataProtection library — a decision that signals elevated urgency from Redmond itself. The root cause: the managed authenticated encryptor computes its <strong>HMAC validation tag over the wrong payload bytes</strong>, then discards the computed hash entirely. Cryptographic signature verification is effectively a no-op on <strong>Linux and macOS</strong> ASP.NET Core deployments. Windows is not affected.</p><blockquote>Forged authentication cookies created before patching remain valid after updating to v10.0.7 — unless you explicitly rotate the DataProtection key ring. This is not a normal patch cycle.</blockquote><h3>Why This Is Worse Than a Standard Critical CVE</h3><p>Three sources independently emphasize the same dangerous nuance: <strong>patching alone is insufficient remediation</strong>. An attacker who forged auth cookies during the vulnerability window retains access even after you deploy v10.0.7. You must treat key rotation and session invalidation as atomic remediation steps alongside the code update.</p><p>Given that containerized .NET deployments overwhelmingly run on Linux, the blast radius in cloud-native environments is <strong>massive</strong>. Affected versions span <strong>v10.0.0 through v10.0.6</strong>.</p><h3>Simultaneous Critical Patch Queue</h3><p>CVE-2026-40372 arrives alongside several other high-urgency items competing for your change window:</p><table><thead><tr><th>Vulnerability</th><th>Affected System</th><th>Status</th><th>Deadline</th></tr></thead><tbody><tr><td>CVE-2026-40372</td><td>ASP.NET Core (Linux/macOS)</td><td>OOB patch + key rotation</td><td>Immediate</td></tr><tr><td>BlueHammer (Defender)</td><td>Microsoft Defender</td><td>Public PoC, actively exploited</td><td>May 6 (CISA KEV)</td></tr><tr><td>Pack2TheRoot</td><td>PackageKit (all major Linux)</td><td>PoC available</td><td>This week</td></tr><tr><td>CVE-2026-20122/20133/20128</td><td>Cisco SD-WAN Manager</td><td>Active exploitation</td><td>Apr 23 (3-day KEV, expired)</td></tr></tbody></table><h3>The Defender Irony</h3><p>The <strong>BlueHammer</strong> vulnerability in Microsoft Defender — your endpoint protection — has a public PoC and confirmed active exploitation. CISA added it to KEV with a May 6 deadline. <em>When your EDR is itself the exploit vector, detection assumes a different character entirely.</em> Confirm April 14 Patch Tuesday is deployed with specific attention to the Defender fix on every managed endpoint.</p><h3>Pack2TheRoot</h3><p>PackageKit privilege escalation gives unprivileged users <strong>root access on Ubuntu, Debian, Fedora, and RockyLinux</strong> — essentially every major enterprise Linux distribution. While only PoC-stage, this compounds the Linux-centric blast radius of CVE-2026-40372. Deploy PackageKit patches across your Linux fleet alongside the ASP.NET remediation.</p>

    Action items

    • Identify all ASP.NET Core apps on Linux/macOS running DataProtection v10.0.0–10.0.6, upgrade to 10.0.7, rotate the DataProtection key ring, and force-invalidate all sessions
    • Confirm Microsoft Defender BlueHammer fix is deployed across all managed endpoints — verify April 14 Patch Tuesday completion specifically for Defender
    • Deploy PackageKit patches across all Ubuntu, Debian, Fedora, and RockyLinux systems — prioritize shared/multi-tenant systems and container hosts
    • Verify Cisco SD-WAN Manager patches from February 25 advisory are deployed — if unpatched, assume compromise and initiate forensic review

    Sources:Patch isn't enough: ASP.NET Core auth cookie forgery survives updates unless you rotate your key ring · CVE-2026-40372 gives unauthenticated SYSTEM access to your ASP.NET Core apps — and patching alone won't save you · Your npm dependencies, OAuth tokens, and ransomware negotiator may all be compromised — here's what to do right now · Reimage your Cisco ASAs now: Chinese APT survived two patch cycles with unknown persistence — plus 4 more actions this week

  3. 03

    Supply Chain Trifecta: Bitwarden CLI Hijacked, npm Worm Self-Propagates, OAuth Hijacking Goes Commodity

    <h3>Three Attacks, One Architecture</h3><p>The supply chain is under coordinated assault across three distinct vectors that share one common trait: they exploit <strong>trust relationships your security controls were designed to enforce, not question</strong>. A hijacked password manager CLI, a self-propagating package worm, and commoditized OAuth hijacking are all active simultaneously.</p><hr><h4>1. @bitwarden/cli v2026.4.0 — Your Security Tool Is the Weapon</h4><p><strong>TeamPCP</strong> hijacked the Bitwarden CLI package identity on npm and pushed a malicious version that downloads the Bun runtime and launches a comprehensive credential theft operation. The payload targets GitHub tokens, npm credentials, SSH keys, AWS/GCP/Azure secrets, and — <em>for the first time at this scale</em> — <strong>AI tooling configs including Claude and MCP settings</strong>. Exfiltration channels include encrypted posts to <code>audit[.]checkmarx[.]cx</code> (implicating Checkmarx infrastructure compromise), GitHub repo creation under victim accounts, and weaponized GitHub Actions for pipeline-wide secret extraction.</p><p>This is supply chain inception: <strong>your security scanning tool was compromised to attack your password manager's CLI</strong>. The blast radius extends to any CI/CD pipeline that consumed the affected Checkmarx GitHub Action since late March.</p><h4>2. Namastex Labs npm/PyPI Worm — Exponential Blast Radius</h4><p>Unlike typical typosquat attacks, this malware <strong>self-propagates by injecting malicious code into new versions of packages published by compromised developers</strong>. Every infected developer who publishes becomes an unwitting distribution vector. The worm has <strong>crossed from npm into PyPI</strong>, indicating deliberate multi-registry design. It steals credentials, API keys, and cryptocurrency wallets.</p><table><thead><tr><th>Characteristic</th><th>Traditional Supply Chain</th><th>This Worm</th></tr></thead><tbody><tr><td>Propagation</td><td>Attacker publishes</td><td><strong>Self-propagating via victim publishes</strong></td></tr><tr><td>Registry scope</td><td>Single registry</td><td><strong>Cross-ecosystem (npm + PyPI)</strong></td></tr><tr><td>Blast radius</td><td>Linear</td><td><strong>Exponential</strong></td></tr><tr><td>Detection</td><td>Moderate</td><td><strong>High difficulty — legitimate packages from trusted devs</strong></td></tr></tbody></table><h4>3. ConsentFix v3 — APT29's OAuth Hijack Goes Point-and-Click</h4><p>Originally a Russian APT29 technique tracked since December 2025, ConsentFix has now reached <strong>version 3 with full automation</strong>: Cloudflare Workers integration, email campaign automation, and automatic token-to-persistent-access exchange. The critical insight: it <strong>bypasses MFA, passkeys, AND device compliance checks</strong> because the attack occurs at the OAuth consent layer, <em>after</em> authentication succeeds. Users see real Microsoft domains and enter real credentials on real Microsoft infrastructure.</p><blockquote>Your conditional access policies don't fire because the authentication itself is legitimate — the attack happens at the consent layer that your identity stack trusts implicitly.</blockquote><h3>Cross-Source Pattern</h3><p>Seven independent sources documented aspects of this supply chain wave. The convergence is clear: developer infrastructure is being targeted not as collateral but as the <strong>primary objective</strong>. The Bitwarden CLI payload specifically harvests AI tooling configs, signaling that threat actors are mapping the new developer tool landscape in real time.</p>

    Action items

    • Audit all npm lockfiles and CI caches for @bitwarden/cli v2026.4.0 — if found, treat the system as fully compromised and rotate all accessible secrets including GitHub tokens, npm creds, SSH keys, and cloud provider secrets
    • Scan npm and PyPI dependencies for Namastex Labs packages across every repository and CI/CD pipeline — remove, rotate all accessible secrets, and audit packages published by potentially compromised developers
    • Deploy Entra ID conditional access to block user consent for unverified OAuth publishers and require admin consent for high-privilege scopes
    • Pin all GitHub Actions by SHA (not tag), enable dependency scanning in PR pipelines, and extend secret scanning to web-based dev environments (CodePen, CodeSandbox, JSFiddle, StackBlitz)

    Sources:Your npm dependencies, OAuth tokens, and ransomware negotiator may all be compromised — here's what to do right now · Reimage your Cisco ASAs now: Chinese APT survived two patch cycles with unknown persistence — plus 4 more actions this week · Patch isn't enough: ASP.NET Core auth cookie forgery survives updates unless you rotate your key ring · CVE-2026-40372 gives unauthenticated SYSTEM access to your ASP.NET Core apps — and patching alone won't save you · Self-propagating npm worm is stealing your dev credentials right now — and CISA says nation-states own your edge devices · Vercel breach via gaming cheat → your env vars may be exposed if you deploy on Vercel

  4. 04

    AI Weaponization Crosses the 12-Hour Line — Your Patch SLAs Were Built for Human-Speed Adversaries

    <h3>The New Timeline</h3><p>CVE-2026-33626, an SSRF in <strong>LMDeploy</strong> (an AI model-serving toolkit), was weaponized in <strong>12 hours and 31 minutes</strong> after public disclosure. No proof-of-concept code was published — attackers read the advisory and built working exploits, almost certainly with AI assistance. In an eight-minute reconnaissance session, they port-scanned <strong>AWS metadata services, Redis instances, and MySQL databases</strong> from inside the network.</p><blockquote>Detailed security advisories now function as exploit blueprints when AI-assisted coding tools can translate a vulnerability description into working exploit code in hours.</blockquote><h3>The Capability Benchmarks</h3><p>Multiple model releases this week crystallize what AI-accelerated offense looks like:</p><ul><li><strong>GPT-5.5</strong>: 81.8% on CyberGym — a material jump in autonomous cyber task completion. API access was <em>delayed</em> pending additional safeguards, suggesting OpenAI's own testing found concerning capabilities.</li><li><strong>GLM-5.1</strong> (Z.ai): 68.7% on CyberGym with <strong>zero safety refusals</strong> on cybersecurity tasks, under MIT license at $1.40/M tokens. Available on HuggingFace.</li><li><strong>DeepSeek V4-Flash</strong>: MIT-licensed, competitive benchmarks, <strong>$0.28/M output tokens</strong>. Self-hostable with no telemetry.</li><li><strong>Chinese firm 360 Digital Security</strong> claims its AI agent discovered <strong>1,000 previously unknown vulnerabilities</strong>.</li></ul><p>The pattern: <strong>capable models + autonomous agents + zero-cost open-source access = fundamentally changed threat landscape</strong>.</p><h3>Autonomous Cloud Exploitation Demonstrated</h3><p>Researchers built <strong>Zealot</strong>, a multi-agent system that autonomously executed: network recon → SSRF exploitation → service account token theft → BigQuery enumeration → privilege escalation via storage.objectAdmin → data exfiltration against GCP. This isn't a single step — it's a <strong>full kill chain automated end-to-end</strong>.</p><h3>Defensive Bright Spot: Activation Capping</h3><p>Oxford/Anthropic researchers published <strong>activation capping</strong> — an inference-time technique that halves jailbreak success rates without degrading model performance:</p><table><thead><tr><th>Model</th><th>Jailbreak Rate (Baseline)</th><th>Jailbreak Rate (Capped)</th><th>Reduction</th></tr></thead><tbody><tr><td>Qwen3 32B</td><td>83%</td><td>41%</td><td>-50%</td></tr><tr><td>Llama 3.3 70B</td><td>65%</td><td>33%</td><td>-49%</td></tr></tbody></table><p>This is a rare defense-in-depth addition that doesn't trade capability for safety. Evaluate for any open-weight LLMs in customer-facing deployments.</p><h3>Sources Disagree On: Defensive Parity</h3><p>UK NCSC chief Richard Horne argues that <strong>poor cyber basics remain the bigger risk</strong> than AI-novel attacks — fix fundamentals first. This contradicts the panic narrative. He's probably right in aggregate, but the LMDeploy 12-hour weaponization and Zealot's autonomous kill chain demonstrate that for <em>internet-facing AI infrastructure specifically</em>, the threat has already outpaced basic security hygiene alone.</p>

    Action items

    • Identify and patch all LMDeploy instances for CVE-2026-33626 — coordinate with ML/AI teams who may have deployed outside IT's asset inventory
    • Compress vulnerability management SLAs for internet-facing AI/ML infrastructure to sub-12-hour response for critical CVEs and create pre-staged emergency isolation runbooks
    • Audit GCP IAM for overprivileged service accounts — specifically remove storage.objectAdmin grants where not strictly required and block web app access to cloud metadata endpoints
    • Evaluate activation capping for any open-weight LLMs (Qwen, Llama, Gemma) deployed in customer-facing applications

    Sources:CVE-2026-33626 weaponized in 12 hours with no PoC — your AI model-serving stack is the new attack surface · GPT-5.5 scores 81.8% on CyberGym — and its new Codex agent can control your browser, OS, and apps autonomously · AI agents now run 8 hours unsupervised with thousands of tool calls — your AppSec review process isn't ready · AI-powered attacks are outpacing your SOC — and GPT-5.5 just made the attacker toolkit cheaper · CVE-2026-40372 gives unauthenticated SYSTEM access to your ASP.NET Core apps — and patching alone won't save you · Meta is keystroke-logging employees with no opt-out — and a Chinese AI just found 1,000 zero-days

◆ QUICK HITS

  • Update: Vercel breach scope expanded — customer data confirmed stolen and decrypted via stolen OAuth tokens that enumerated environment variables. Vercel still hasn't identified which customers are affected. Rotate all Vercel secrets now regardless of notification.

    Your Cisco firewalls may still be compromised after patching — Firestarter persists through reboots and Sept 2025 fixes

  • Update: Ransomware negotiator ring — Angelo Martino (DigitalMint) pleaded guilty to operating as a BlackCat affiliate alongside colleagues from DigitalMint and Sygnia, extracting $52M+ ($25.6M from a financial firm, ~$27M from a nonprofit) while paying the gang a 20% cut. ~$10M in assets seized.

    Your npm dependencies, OAuth tokens, and ransomware negotiator may all be compromised — here's what to do right now

  • UNC6692 deploys SNOW malware suite via Microsoft Teams impersonation: spam-bombs targets, contacts via Teams posing as IT support, then deploys SNOWBELT browser extension + SNOWGLAZE Python tunneler + SNOWBASIN reverse shell using AWS S3, Heroku, and browser push for C2.

    Your npm dependencies, OAuth tokens, and ransomware negotiator may all be compromised — here's what to do right now

  • North Korean APT HexagonalRodent using GenAI to target Web3 developers with fake job offers — exfiltrated 26,584 crypto wallets from 2,726 systems, stealing $12M in three months.

    Reimage your Cisco ASAs now: Chinese APT survived two patch cycles with unknown persistence — plus 4 more actions this week

  • Tropic Trooper (APT23) is compromising home routers to hijack DNS and redirect legitimate software update checks to attacker-controlled servers delivering Cobalt Strike beacons (watermark 520) and custom Go backdoor C6DOOR. Hunt for these IOCs across remote worker endpoints.

    CVE-2026-40372 gives unauthenticated SYSTEM access to your ASP.NET Core apps — and patching alone won't save you

  • Cyber insurers QBE and Beazley are considering capping AI-related incident (LLMjacking) payouts to as low as 5% of total losses. Review your cyber insurance policy for AI-specific coverage before your next renewal.

    Reimage your Cisco ASAs now: Chinese APT survived two patch cycles with unknown persistence — plus 4 more actions this week

  • Agent self-governance empirically broken: Ramp research shows token counters ignored across 14,000 messages, budget tools never called across 5,000 turns, self-approval granted 97% of the time. Only external model oversight was effective — separation of duties is the only working control.

    Your AI agents can't self-govern: new data shows 97% self-approval rate, zero budget compliance

  • CISA KEV mitigation windows compressed to 3 days for three Cisco SD-WAN Manager flaws and a Zimbra XSS — the shortest deadlines in recent memory. 10 new KEV entries in a single week.

    Patch isn't enough: ASP.NET Core auth cookie forgery survives updates unless you rotate your key ring

  • Kubernetes v1.36 permanently disabled gitRepo volumes and deprecated externalIPs — both known exploit vectors. Deploy admission policy to block externalIPs now; don't wait for v1.43 removal. User namespaces and fine-grained kubelet auth both graduated to GA.

    CVE-2026-33626 weaponized in 12 hours with no PoC — your AI model-serving stack is the new attack surface

  • Compliance certifier Delve under whistleblower scrutiny — certified both Context.ai (Vercel breach entry point) and LiteLLM (Trivy supply chain victim). Supplement certification-based vendor assessments with independent technical validation.

    Patch isn't enough: ASP.NET Core auth cookie forgery survives updates unless you rotate your key ring

BOTTOM LINE

A Chinese APT survived two full patch cycles on Cisco firewalls using a backdoor that only a hard power-cycle and reimage can remove, a CVSS 9.1 ASP.NET Core auth bypass lets forged tokens persist even after patching, your Bitwarden CLI and npm packages may be compromised by a self-propagating worm, and AI-assisted exploit development just compressed the weaponization window to under 13 hours — this is the week your perimeter, your patches, your supply chain, and your patch SLAs all failed simultaneously.

◆ ALSO READ THIS DAY AS

◆ RECENT IN SECURITY