Cyber Attacks CVE-2026-34091: Critical Palo Alto Networks PAN-OS Authentication Bypass Zero-Day Under Active Exploitation by APT Clusters Palo Alto Networks discloses a critical PAN-OS zero-day (CVE-2026-34091) under active nation-state exploitation, granting unauthenticated root-level RCE on enterprise firewalls worldwide. By Quantnest Radar team | Mar 17, 2026
Cyber Attacks CVE-2026-33187: Critical Apache Tomcat Deserialization Zero-Day Enables Unauthenticated Remote Code Execution — Mass Exploitation Underway A zero-day deserialization flaw in Apache Tomcat is being actively exploited at scale, enabling unauthenticated RCE on all major supported branches. By Quantnest Radar team | Mar 17, 2026
Cyber Attacks CVE-2026-33021: Critical SQL Injection in Fortinet FortiClient EMS Actively Exploited, Allowing Unauthenticated RCE Fortinet's FortiClient EMS is under active attack via a critical SQLi flaw allowing unauthenticated RCE, prompting emergency patching guidance issued March 17, 2026. By Quantnest Radar team | Mar 17, 2026
Cyber Attacks CVE-2026-31337: Critical Ivanti Connect Secure Zero-Day RCE Actively Exploited by Nation-State Actors Ivanti Connect Secure zero-day CVE-2026-31337 is under active nation-state exploitation, enabling unauthenticated RCE on vulnerable VPN appliances worldwide. By Quantnest Radar team | Mar 15, 2026
Research CVE-2025-29927: Critical Next.js Middleware Authentication Bypass Actively Exploited in the Wild CVE-2025-29927 exposes millions of Next.js applications to full authentication bypass via a malicious request header, with active exploitation confirmed in the wild. By Quantnest Radar team | Mar 15, 2026
AI Security CVE-2026-32626: Critical XSS-to-RCE vulnerability in AnythingLLM Desktop gives attackers full system control A CVSS 9.6 XSS vulnerability in AnythingLLM Desktop's chat pipeline escalates to RCE on the host OS through insecure Electron settings. By Quantnest Radar team | Mar 15, 2026
Research CVE-2026-32746: Critical out-of-bounds write in GNU inetutils telnetd allows remote code execution Critical CVSS 9.8 out-of-bounds write in telnetd's LINEMODE SLC handler enables unauthenticated remote code execution on unpatched systems. By Quantnest Radar team | Mar 15, 2026
AI Security New AI-driven phishing campaigns bypass multi-factor authentication Adversaries are leveraging generative AI to dynamically craft localized lure documents that evade traditional email gateways. By Quantnest Radar team | Mar 15, 2026
Research Critical Log4Shell-style zero-day discovered in popular CI/CD pipeline tools A new severe RCE vulnerability dubbed 'PipelineBleed' threatens enterprise deployment nodes globally. By Quantnest Radar team | Mar 14, 2026
Cloud Security Misconfigured AWS buckets leak 3TB of healthcare provider records A major healthcare provider accidentally exposed patient data due to an improperly secured S3 bucket permissions policy. By Quantnest Radar team | Mar 14, 2026
Malware Deep-dive analysis of the new 'BlackBasta' ransomware variant Reverse engineering reveals novel encryption routines and evasion techniques designed to bypass EDR solutions. By Quantnest Radar team | Mar 13, 2026
Cyber Attacks State-sponsored actors target critical infrastructure in Europe An APT group believed to be state-sponsored has initiated a coordinated campaign against energy grid operators. By Quantnest Radar team | Mar 12, 2026
Research QuantNest Q1 Threat Landscape Report Released Our comprehensive quarterly breakdown of emerging threats, CVEs, and the escalating cyber warfare landscape. By Quantnest Radar team | Mar 10, 2026