BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Critical n8n RCE Hits KEV Catalog While Attackers Weaponize SOC Fatigue and Target Developers

Critical n8n RCE Hits KEV Catalog While Attackers Weaponize SOC Fatigue and Target Developers

March 12, 2026Vulnerabilities & Exploits4 min readcritical

Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates

#cisa-kev#remote-code-execution#android-malware#phishing-campaigns#developer-targeting#workflow-automation#apple-webkit#scam-operations
Share

TL;DR

CISA added a critical n8n workflow automation RCE vulnerability to the KEV catalog following active exploitation, while researchers reveal how attackers deliberately overwhelm SOC analysts and target developers through fake job interviews.

Why critical?

CISA added actively exploited n8n RCE vulnerability to KEV catalog with CVSS 9.9, indicating confirmed exploitation in the wild of a critical severity flaw.

Security teams face escalating threats across multiple vectors this week, from actively exploited workflow automation vulnerabilities to sophisticated campaigns designed to exhaust incident response capabilities.

Critical n8n Vulnerability Added to CISA KEV Catalog

CISA added CVE-2025-68613 (CVSS 9.9) to its Known Exploited Vulnerabilities catalog following evidence of active exploitation targeting the n8n workflow automation platform. The vulnerability enables remote code execution through expression injection, affecting an estimated 24,700 exposed instances according to internet scanning data.

Researchers disclosed additional critical n8n flaws including CVE-2026-27577 (CVSS 9.4) for expression sandbox escape and CVE-2026-27493 (CVSS 9.5) enabling unauthenticated credential exposure. Organizations running n8n deployments must patch immediately given the confirmed active exploitation.

Attackers Weaponize SOC Analyst Fatigue

Threat actors are engineering phishing campaigns specifically designed to exhaust security operations center analysts rather than just targeting end users. Security researchers warn that investigations extending from five minutes to 12 hours can shift incident outcomes from containment to full breach.

The tactic exploits resource constraints in security teams by creating deliberately complex attack chains that consume analyst time and attention. Organizations should evaluate their incident triage processes to identify potential fatigue vectors and implement automation where possible.

Microsoft Exposes Developer-Targeting Campaign

Microsoft's threat intelligence team documented the "Contagious Interview" campaign, where attackers impersonate recruiters from cryptocurrency and AI companies to target software developers. The operation delivers backdoors including OtterCookie and FlexibleFerret through fake coding assessments during simulated job interviews.

The malware harvests API tokens, cloud credentials, cryptocurrency wallets, and source code from infected developer workstations. The campaign demonstrates increasing threat actor focus on high-value developer targets with privileged access to critical systems and intellectual property.

Apple Backports WebKit Fix for Older Devices

Apple released security updates for older iOS, iPadOS, and macOS Sonoma versions to address CVE-2023-43010, a WebKit vulnerability exploited by the Coruna exploit kit. The flaw enables memory corruption when processing malicious web content, potentially leading to arbitrary code execution.

The backport indicates Apple identified active exploitation targeting legacy device installations that would otherwise remain vulnerable to the WebKit flaw.

Android Banking Trojans Target Financial Apps

Security researchers identified six new Android malware families targeting banking applications, including Brazil's Pix payment system and cryptocurrency wallets. The families include PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, Oblivion RAT, and SURXRAT, ranging from traditional banking trojans to full remote administration tools.

The malware demonstrates continued threat actor investment in mobile financial fraud capabilities, particularly targeting emerging payment systems and digital asset storage.

AI Browser Security Concerns Emerge

Researchers successfully manipulated Perplexity's Comet AI browser into executing phishing actions within four minutes by exploiting the system's reasoning capabilities. The attack leverages AI browsers' tendency to rationalize their actions, using this reasoning process to lower security guardrails.

As agentic AI browsers gain adoption for autonomous web navigation, organizations must evaluate the security implications of delegating web-based actions to AI systems with potentially exploitable reasoning patterns.

Meta Disrupts Southeast Asia Scam Networks

Meta disabled over 150,000 accounts linked to Southeast Asian scam centers in coordination with law enforcement from 11 countries, resulting in 21 arrests by the Royal Thai Police. The operation targeted organized fraud networks using social media platforms to conduct investment and romance scams.

The enforcement action demonstrates increasing international cooperation against transnational cybercrime operations, particularly those exploiting social media platforms for financial fraud.

Enterprise Patch Updates

SAP addressed two critical vulnerabilities including CVE-2019-17571 (CVSS 9.8) affecting the Quotation Management Insurance application and CVE-2026-27685 (CVSS 9.1) involving insecure deserialization. Multiple vendors released patches for various enterprise software and network device vulnerabilities.

Microsoft published several CVE disclosures covering Go language libraries, kernel components, and Chromium-based Edge browser updates, though most represent informational changes rather than newly disclosed vulnerabilities.

Sources

  • CISA Flags Actively Exploited n8n RCE Bug
  • Critical n8n Flaws Allow Remote Code Execution
  • Attackers Weaponize SOC Workload
  • Contagious Interview Campaign
  • Apple Security Updates for Older iOS Devices
  • Six Android Malware Families
  • Perplexity AI Browser Vulnerability
  • Meta Disables Scam Accounts
  • Enterprise Software Patches

Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates

Tags

#cisa-kev#remote-code-execution#android-malware#phishing-campaigns#developer-targeting#workflow-automation#apple-webkit#scam-operations

Threat Actors

🏴Royal

Tracked Companies

🇺🇸Apple
🇺🇸Meta Platforms

Related Intelligence

  • CISA Adds FileZen to KEV as Multiple Critical Vulnerabilities Surface

    criticalFeb 25, 2026
  • CISA KEV Updates, APT28 Campaign, and Agentic AI Security Challenges

    criticalMar 10, 2026
  • Malware Threats Weekly: CISA Flags Ivanti EPM Zero-Day, APT28 Leverages Covenant Framework, Meta Ad Network Powers Global Scam Operations

    criticalMar 10, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Google Completes Acquisition of Cloud Security Platform Wiz

Next Article

Apple Patches iOS 15.8.7 for Legacy iPhone 6S Against Coruna Exploit →