BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Critical Zero-Days Hit Chrome, Linux AppArmor Flaws Enable Root Escalation, Veeam RCE Vulnerabilities Patched

Critical Zero-Days Hit Chrome, Linux AppArmor Flaws Enable Root Escalation, Veeam RCE Vulnerabilities Patched

March 13, 2026Vulnerabilities & Exploits4 min readcritical

Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates

#chrome#zero-day#linux-kernel#apparmor#veeam#rce#privilege-escalation#malware
Share

TL;DR

Google patched two actively exploited Chrome zero-days affecting Skia and V8, while researchers disclosed nine privilege escalation vulnerabilities in Linux AppArmor. Veeam released fixes for seven critical RCE flaws in Backup & Replication software.

Why critical?

Multiple actively exploited zero-day vulnerabilities in Chrome combined with critical RCE flaws in enterprise backup software require immediate attention from security teams.

Chrome Zero-Days Under Active Exploitation

Google released emergency security updates for Chrome to address two high-severity vulnerabilities confirmed as exploited in the wild. The actively targeted flaws include CVE-2026-3909 (CVSS 8.8), an out-of-bounds write vulnerability in the Skia 2D graphics library that enables remote attackers to perform memory corruption via crafted HTML pages.

The second vulnerability affects Chrome's V8 JavaScript engine, though Google has withheld technical details pending wider patch deployment. Both zero-days represent immediate risks for organizations running unpatched Chrome installations.

CrackArmor Flaws Target Linux Kernel Security

Qualys Threat Research Unit disclosed nine confused deputy vulnerabilities in Linux AppArmor collectively dubbed "CrackArmor." These kernel-level flaws allow unprivileged users to escalate privileges to root and bypass container isolation protections.

The vulnerabilities exploit AppArmor's security model through manipulation of file descriptors and namespace operations. Container environments relying on AppArmor for isolation face particular risk from these privilege escalation paths.

Veeam Backup Software Patches Critical RCE Flaws

Veeam addressed seven critical vulnerabilities in Backup & Replication software that enable remote code execution. The most severe, CVE-2026-21666 (CVSS 9.9), allows authenticated domain users to execute arbitrary code on backup servers.

CVE-2026-21667 represents another critical RCE vector affecting the same software. Given Veeam's role in enterprise backup infrastructure, these vulnerabilities pose significant risks to business continuity and data protection systems.

VENON Banking Malware Targets Brazilian Financial Sector

Researchers identified a new Rust-based banking trojan targeting 33 Brazilian financial institutions. VENON represents a tactical shift from traditional Delphi-based malware common in Latin American cybercrime operations.

The malware deploys credential-stealing overlays against Windows systems, focusing on Brazilian banking customers. Its Rust implementation suggests threat actors are modernizing their development practices for improved evasion capabilities.

Microsoft Tracks Storm-2561 VPN Client Abuse

Microsoft's threat intelligence team documented Storm-2561's use of SEO poisoning to distribute malicious VPN clients. The threat actor has operated since 2025, using search engine manipulation to promote fake VPN downloads that install signed trojans for credential theft.

Storm-2561 leverages legitimate code-signing certificates and mimics trusted VPN brands to evade detection. The campaign highlights the ongoing abuse of legitimate infrastructure for malware distribution.

AI Security Research and Email Threat Intelligence

Microsoft published research on prompt injection attacks against AI systems, demonstrating how hidden instructions in content can manipulate AI responses. The research includes detection methodologies and response playbooks for organizations deploying AI tools.

Additionally, Microsoft released email security benchmark data comparing Microsoft Defender's performance against SEG and ICES vendor solutions in mitigating modern email threats.

Microsoft Security Updates

Microsoft's March security updates included fixes for several vulnerabilities:

  • CVE-2026-3784: Proxy connection reuse vulnerability with credential implications
  • CVE-2026-20841: Windows Notepad App remote code execution flaw
  • CVE-2026-26133: M365 Copilot information disclosure vulnerability

The Notepad RCE vulnerability received particular attention given the application's ubiquity across Windows installations.

Sources

  • Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8
  • Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation
  • Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution
  • Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays
  • How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs
  • ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More
  • Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft
  • From transparency to action: What the latest Microsoft email security benchmark reveals
  • Detecting and analyzing prompt abuse in AI tools
  • CVE-2026-3784 wrong proxy connection reuse with credentials
  • CVE-2026-26133 M365 Copilot Information Disclosure Vulnerability
  • CVE-2026-20841 Windows Notepad App Remote Code Execution Vulnerability

Originally reported by The Hacker News, Microsoft Security, SANS ISC, MSRC Security Updates

Tags

#chrome#zero-day#linux-kernel#apparmor#veeam#rce#privilege-escalation#malware

Tracked Companies

🇺🇸Google

Related Intelligence

  • Critical Zero-Day Roundup: Dell RecoverPoint Exploited Since 2024, VoIP Phones Under Attack

    criticalFeb 18, 2026
  • Google Patches Zero-Day CSS Vulnerability in Chrome

    criticalFeb 18, 2026
  • Threat Roundup: AI-Generated Malware, Corporate Breaches, and Android Lock Screen Bypass

    highMar 13, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Iran-Criminal Collusion, Spyware Policy Shifts, and Critical n8n Zero-Click Flaw

Next Article

Critical Cisco Flaw Triggers CISA Deadline as Phishing Campaigns Evolve →