BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Critical VMware RCE Exploited, Major Breaches Hit LexisNexis and AkzoNobel

Critical VMware RCE Exploited, Major Breaches Hit LexisNexis and AkzoNobel

March 4, 2026Malware & Threats4 min readcritical

Originally reported by BleepingComputer, Graham Cluley, Checkpoint Research, Malwarebytes Labs, SecureList (Kaspersky)

#vmware#cisa-kev#data-breach#oauth-abuse#mobile-malware#ip-cameras#chrome-vulnerability#cryptocurrency
Share

TL;DR

CISA confirmed active exploitation of a VMware Aria Operations RCE vulnerability, adding it to the KEV catalog. Major data breaches impacted LexisNexis and AkzoNobel, while threat actors continue leveraging OAuth flows and compromised infrastructure for attacks.

Why critical?

CISA added CVE-2026-22719 to the Known Exploited Vulnerabilities catalog, confirming active exploitation of a critical VMware Aria Operations RCE flaw. This meets the threshold for critical severity.

VMware Aria Operations RCE Added to CISA KEV Catalog

CISA has flagged CVE-2026-22719, a VMware Aria Operations remote code execution vulnerability, as actively exploited in the wild. The vulnerability has been added to the Known Exploited Vulnerabilities catalog, indicating confirmed exploitation by threat actors. Federal agencies must patch affected systems by the mandated deadline, while private organizations should treat this as an immediate priority given the active threat landscape.

Major Corporate Breaches Impact Multiple Sectors

Two significant data breaches emerged this week across different industries. LexisNexis Legal & Professional confirmed that attackers breached their servers and accessed customer and business information, with hackers subsequently leaking stolen files. Meanwhile, Dutch paint manufacturer AkzoNobel disclosed a cyberattack on one of its U.S. facilities, though the full scope of data exposure remains under investigation.

Threat Actors Weaponize OAuth Error Flows

Microsoft researchers documented a campaign where attackers abuse legitimate OAuth redirection mechanisms to bypass email and browser phishing protections. The technique leverages OAuth error flows to redirect users to malicious pages while appearing to originate from trusted sources, highlighting the continued evolution of social engineering tactics that exploit trusted authentication protocols.

Underground Markets Commoditize Compromised Infrastructure

Flare's analysis of 200,000 underground forum posts revealed a thriving market for compromised cPanel credentials and site management panels. These compromised assets are being packaged as plug-and-play infrastructure for phishing and scam operations, demonstrating how legitimate web hosting tools become weaponized in cybercriminal ecosystems.

Chrome Extension Vulnerability Exposed Gemini Permissions

Security researchers identified a now-patched vulnerability in Chrome's "Live in Chrome" feature that allowed malicious extensions to inherit Google Gemini's camera, microphone, and file access permissions. The flaw demonstrates the complex permission inheritance challenges in modern browser architectures, particularly when AI services integrate deeply with browser functionality.

Iranian Actors Target IP Cameras for Physical Warfare Intelligence

Check Point Research documented Iranian targeting of IP cameras during the June 2025 conflict with Israel, illustrating how cyber operations increasingly support kinetic warfare through battle damage assessment and reconnaissance. The campaign highlights the convergence of digital intrusion capabilities with traditional military intelligence gathering.

Mobile Threat Landscape Evolution

Kaspersky's 2025 mobile threat report identified several notable developments, including the Keenadu and Triada preinstalled backdoors, advanced spyware Trojans, the Kimwolf IoT botnet, and Mamont banking Trojans. The research underscores the persistent threat to Android devices from both sophisticated nation-state actors and financially motivated cybercriminals.

South Korean Cryptocurrency Seizure Backfires

South Korea's National Tax Service experienced a costly operational security failure when they accidentally exposed the private key to a seized cryptocurrency wallet worth $4.8 million. The blunder resulted in the immediate theft of the funds, highlighting the technical challenges government agencies face when handling digital assets in law enforcement operations.

Infrastructure Updates and Policy Changes

Google announced Chrome will shift from a four-week to two-week release cycle to accelerate security updates and feature deployments. Meanwhile, the Pentagon terminated its contract with Anthropic AI over security concerns, transitioning to OpenAI for military AI applications amid ongoing debates about AI safety in defense contexts.

Sources

  • CISA flags VMware Aria Operations RCE flaw as exploited in attacks
  • Paint maker giant AkzoNobel confirms cyberattack on U.S. site
  • Facebook accounts unavailable in worldwide outage
  • Microsoft: Hackers abuse OAuth error flows to spread malware
  • Google Chrome shifts to two-week release cycle for increased stability
  • LexisNexis confirms data breach as hackers leak stolen files
  • Compromised Site Management Panels are a Hot Item in Cybercrime Markets
  • They seized $4.8m in crypto… then gave the master key to the internet
  • Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East
  • Pentagon ditches Anthropic AI over "security risk" and OpenAI takes over
  • Chrome flaw let extensions hijack Gemini's camera, mic, and file access
  • Mobile malware evolution in 2025

Originally reported by BleepingComputer, Graham Cluley, Checkpoint Research, Malwarebytes Labs, SecureList (Kaspersky)

Tags

#vmware#cisa-kev#data-breach#oauth-abuse#mobile-malware#ip-cameras#chrome-vulnerability#cryptocurrency

Threat Actors

🏴Play

Tracked Companies

🇺🇸LexisNexis
🇺🇸Meta Platforms
🇺🇸Google

Related Intelligence

  • Active RoundCube Exploitation, AI-Generated Stealers, and France's FICOBA Breach

    criticalFeb 23, 2026
  • Critical Infrastructure Under Fire: AWS Drone Strikes, Android Zero-Day, and AI-Powered Attack Tools

    criticalMar 3, 2026
  • Week in Malware: CISA Adds n8n to KEV, Iran-Linked Wiper Hits Medical Giant

    criticalMar 12, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Multi-Platform RATs, AI-Driven Attacks, and Certificate Abuse: Weekly Vulnerability Roundup

Next Article

Congress Demands TEMPEST Investigation as 80-Year-Old Side-Channel Attacks Threaten Modern Systems →