Live Threats
[CVE-2026-1234]Windows CLFS Driver zero-day — active exploitation in the wild, patch immediately|
[CVE-2026-0891]Fortinet FortiOS auth bypass — unauthenticated RCE on SSL-VPN appliances|
[CVE-2026-2201]Palo Alto PAN-OS command injection — CVSS 9.8, firewall management interfaces exposed|
[PATCH]Microsoft April 2026 Patch Tuesday — 147 CVEs addressed, 12 rated Critical|
[BREACH]Healthcare provider data breach exposes 2.3M patient records — HIPAA enforcement expected|
[CVE-2026-1887]Chrome V8 engine type confusion — remote code execution via malicious web pages|
[COMPLIANCE]PCI DSS 4.0.1 deadline approaching — multi-factor authentication now mandatory for all access|
[CVE-2026-3310]Cisco IOS XE privilege escalation — network devices running 17.x firmware at risk|
[RANSOMWARE]LockBit 4.0 variant targeting SMBs via exposed RDP — San Antonio businesses at elevated risk|
[ADVISORY]Adobe Acrobat Reader critical update — PDF-based phishing campaigns exploiting unpatched installs|
[CVE-2026-1234]Windows CLFS Driver zero-day — active exploitation in the wild, patch immediately|
[CVE-2026-0891]Fortinet FortiOS auth bypass — unauthenticated RCE on SSL-VPN appliances|
[CVE-2026-2201]Palo Alto PAN-OS command injection — CVSS 9.8, firewall management interfaces exposed|
[PATCH]Microsoft April 2026 Patch Tuesday — 147 CVEs addressed, 12 rated Critical|
[BREACH]Healthcare provider data breach exposes 2.3M patient records — HIPAA enforcement expected|
[CVE-2026-1887]Chrome V8 engine type confusion — remote code execution via malicious web pages|
[COMPLIANCE]PCI DSS 4.0.1 deadline approaching — multi-factor authentication now mandatory for all access|
[CVE-2026-3310]Cisco IOS XE privilege escalation — network devices running 17.x firmware at risk|
[RANSOMWARE]LockBit 4.0 variant targeting SMBs via exposed RDP — San Antonio businesses at elevated risk|
[ADVISORY]Adobe Acrobat Reader critical update — PDF-based phishing campaigns exploiting unpatched installs|
View All
Windows NTLM Relay Attacks Resurge, CMMC 2.0 Updates & Google Chrome Emergency Patch
All Security News|ISSUE #15March 31 – April 6, 2026

Windows NTLM Relay Attacks Resurge, CMMC 2.0 Updates & Google Chrome Emergency Patch

End of Q1 brings a wave of critical security events. Here's your essential briefing.

#NTLM#CMMC#Chrome#DoD#Zero-Day
2
Critical
2
High Severity
1
Patch Updates
1
Breach Alerts
TL;DR — This Week's Key Takeaways

NTLM relay attacks are surging — disable NTLM where possible. CMMC 2.0 Level 2 assessments are now required for DoD contractors. Google patched a critical Chrome zero-day being used in targeted attacks.

SEVERITY:CRITICALHIGHMEDIUMLOWINFO

CLICK ANY ARTICLE TO READ THE FULL STORY

THREAT INTELCRITICAL

NTLM Relay Attacks Surge 300% — Microsoft Issues Urgent Guidance

Microsoft's threat intelligence team reported a 300% increase in NTLM relay attacks targeting Windows environments in Q1 2026. SMBs using on-premises Active Directory are particularly at risk.

Read Full Article
5 min read
COMPLIANCEHIGH

CMMC 2.0 Level 2 Assessments Now Required for DoD Contractors

The Department of Defense has begun requiring CMMC 2.0 Level 2 third-party assessments for contractors handling Controlled Unclassified Information (CUI). Self-attestation is no longer sufficient for Level 2.

Read Full Article
6 min read
PATCH UPDATECRITICAL

Google Chrome Emergency Patch: CVE-2026-1891 Zero-Day Used in Targeted Attacks

Google released an emergency update for Chrome addressing CVE-2026-1891, a type confusion vulnerability in the V8 JavaScript engine being actively exploited in targeted attacks. Update to version 134.0.6998.177 or later immediately.

Read Full Article
3 min read
ADVISORYMEDIUM

NSA & CISA Release Top 10 Cybersecurity Misconfigurations Found in SMB Environments

The NSA and CISA jointly published a report detailing the top 10 cybersecurity misconfigurations most commonly found during red team assessments of small business environments, with remediation guidance.

Read Full Article
5 min read
BREACHHIGH

Law Firm Data Breach: Ransomware via Phishing Email Exposes Client Records

A mid-sized law firm suffered a ransomware attack that encrypted client files and exfiltrated sensitive legal documents. The attack originated from a phishing email that bypassed legacy email filters.

Read Full Article
4 min read

Need Help Addressing These Threats?

Our team monitors these vulnerabilities and can help you patch, assess, and protect your business before attackers strike.

Talk with Us