BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Critical Week: CVSS 10.0 Flowise RCE Under Active Attack, GPU RowHammer Breakthroughs, and China-Linked Zero-Day Campaigns

Critical Week: CVSS 10.0 Flowise RCE Under Active Attack, GPU RowHammer Breakthroughs, and China-Linked Zero-Day Campaigns

criticalVulnerabilities & Exploits|April 7, 20264 min read

Originally reported by The Hacker News, Microsoft Security, Qualys, SANS ISC, MSRC Security Updates

#active-exploitation#zero-day#rowhammer#ransomware#rce#gpu-security#ai-security#nation-state
Share

TL;DR

Security researchers disclosed breakthrough GPU RowHammer attacks enabling full CPU privilege escalation, while threat actors actively exploit a CVSS 10.0 RCE in Flowise AI platforms and China-linked groups deploy Medusa ransomware via zero-day vulnerabilities. Additional campaigns target Microsoft 365 environments across multiple sectors.

Why critical?

Multiple critical vulnerabilities under active exploitation, including a CVSS 10.0 RCE in Flowise with 12,000+ exposed instances and China-linked Storm-1175 using zero-days to deploy ransomware at high velocity.

Active Exploitation Campaign Targets AI Platform

Flowise AI Under Maximum-Severity Attack

VulnCheck researchers report active exploitation of CVE-2025-59528, a code injection vulnerability in Flowise AI agent builder platform scoring CVSS 10.0. The flaw enables remote code execution through the CustomMCP node, which allows arbitrary configuration input for connecting to external systems.

Over 12,000 Flowise instances remain exposed across the internet, presenting a significant attack surface. The vulnerability stems from insufficient input validation in configuration settings, allowing attackers to inject malicious code that executes with platform privileges.

China-Linked Ransomware Deploys Zero-Days at Scale

Microsoft tracks Storm-1175, a China-based threat actor, exploiting both zero-day and N-day vulnerabilities to deploy Medusa ransomware in "high-velocity" attacks against internet-facing systems. The group demonstrates exceptional operational tempo in identifying and exploiting exposed perimeter assets.

The campaign represents a shift toward rapid weaponization of fresh vulnerabilities, with threat actors maintaining persistence through multiple attack vectors simultaneously. Organizations face compressed response windows as exploit development accelerates.

GPU Security Breakthrough Reveals New Attack Surface

RowHammer Attacks Achieve CPU Privilege Escalation

Academic researchers unveiled GPUBreach, GDDRHammer, and GeForge attacks targeting high-performance GPU memory systems. The research demonstrates the first successful RowHammer attacks against GDDR6 memory that achieve full CPU privilege escalation.

GPUBreach advances beyond previous GPUHammer techniques by exploiting bit-flips in GPU memory to compromise host system security boundaries. The attack leverages shared memory architectures between GPU and CPU systems to escalate from GPU-limited access to full system control.

These findings expand the RowHammer attack surface beyond traditional DDR memory to high-bandwidth GPU memory systems, potentially affecting machine learning workloads and high-performance computing environments.

Nation-State Campaigns Target Cloud Infrastructure

Iran-Linked Password Spraying Hits 300+ Organizations

Check Point identified an Iran-nexus threat actor conducting password-spraying campaigns against Microsoft 365 environments in Israel and UAE. The ongoing campaign executed in three waves on March 3, 13, and 23, 2026, amid regional conflicts.

The attacks primarily target cloud-based email and collaboration platforms, leveraging credential stuffing techniques against weakly protected accounts. The campaign demonstrates sustained focus on regional targets with geopolitical motivations.

DPRK Groups Weaponize GitHub for Command and Control

Fortinet FortiGuard Labs tracked DPRK-linked threat actors using GitHub repositories as command-and-control infrastructure in attacks against South Korean organizations. The multi-stage campaign begins with obfuscated Windows shortcut files delivering decoy PDF documents.

The technique exploits legitimate platforms to bypass network security controls, demonstrating continued innovation in living-off-the-land tactics by state-sponsored groups.

AI-Enhanced Phishing Operations Scale Account Compromise

Device Code Phishing Achieves End-to-End Automation

Microsoft Security documented a new device code phishing campaign incorporating AI-driven automation for real-time authentication code generation. The approach moves beyond traditional phishing by creating live authentication codes on demand, significantly improving success rates.

The campaign demonstrates how threat actors integrate AI capabilities to scale social engineering operations and maintain persistent access to compromised accounts through automated techniques.

Enterprise Security Framework Evolution

Risk Operations Centers Address Prevention Gap

Qualys research advocates for Risk Operations Centers (ROC) to complement traditional Security Operations Centers. The framework addresses enterprise security's historical optimization for incident response over risk prevention.

SOCs continue struggling with multi-OS attack campaigns that traverse Windows endpoints, macOS executive devices, Linux infrastructure, and mobile platforms. Current security workflows remain fragmented by platform, creating visibility gaps that attackers exploit.

Microsoft Security Updates Address Multiple CVEs

Microsoft published updates for several CVEs including:

  • CVE-2026-35386 and CVE-2026-34743 addressing XZ Utils buffer overflow in lzma_index_append()
  • CVE-2026-27447 fixing OpenPrinting CUPS authorization bypass via case-insensitive group lookups
  • CVE-2026-31410 and CVE-2026-31407 patching Linux kernel vulnerabilities in ksmbd and netfilter conntrack
  • CVE-2026-34591 resolving Poetry wheel path traversal leading to arbitrary file write
  • CVE-2026-23444 addressing mac80211 WiFi stack memory management issues

Sources

  • New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips
  • China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware
  • Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation
  • Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations
  • DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks
  • Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps
  • Inside an AI‑enabled device code phishing campaign
  • Why Every Enterprise Needs a Risk Operations Center (ROC)
  • Microsoft Security Update Guide CVE listings

Originally reported by The Hacker News, Microsoft Security, Qualys, SANS ISC, MSRC Security Updates

Tags

#active-exploitation#zero-day#rowhammer#ransomware#rce#gpu-security#ai-security#nation-state

Threat Actors

🏴Medusa

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Geopolitical Phishing Campaign Exploits Middle East Tensions to Harvest Microsoft Credentials

Next Article

Critical GPU Memory Exploit and REvil Arrests Highlight Evolving Attack Landscape→