X
Google says 90 zero-days were exploited in attacks last year
Mark Anderson | Security | March 6, 2026

Euclid Security Newsletter

March 6, 2026 

Google says 90 zero-days were exploited in attacks last year

Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances.

 

Security News

WordPress membership plugin bug exploited to create admin accounts

Hackers are exploiting a critical vulnerability in the User Registration & Membership plugin, which is installed on more than 60,000 WordPress sites.

The Coruna exploit: Why iPhone users should be concerned

Revealed by Google's Threat Intelligence Group (GTIG) and iVerify, the Coruna exploit can compromise iPhones running iOS 13 through to iOS 17.2.1, though Apple has secured its systems against this threat in iOS 26.

Wikipedia hit by self-propagating JavaScript worm that vandalized pages

The Wikimedia Foundation suffered a security incident today after a self-propagating JavaScript worm began modifying user scripts and vandalizing Meta-Wiki pages.

Backup strategies are working, and ransomware gangs are responding with data theft

Business email compromise (BEC) and funds transfer fraud combined for 58% of all cyber insurance claims filed in 2025.

FBI investigates breach of surveillance and wiretap systems

The U.S. Federal Bureau of Investigation (FBI) confirmed on Thursday that it's investigating a breach that affected systems used to manage surveillance and wiretap warrants.

Fake CleanMyMac site installs SHub Stealer and backdoors crypto wallets

The site instructs visitors to paste a command into Terminal. If they do, it installs SHub Stealer, macOS malware designed to steal sensitive data including saved passwords, browser data, Apple Keychain contents, cryptocurrency wallets, and Telegram sessions.

 

Important Updates & Patches

Cisco Releases Critical Security Updates

Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an attacker to access an affected system, elevate privileges to root, gain access to sensitive information, and overwrite arbitrary files.

 

Dan's Corner

The Pitt Finally Offers a Stark Warning on AI in Medicine

The show demonstrates that AI may be an efficient way to conquer some of modern medicine's more tedious tasks, but doctors and nurses can't vibe code their way into healing patients.

 

An archive of Euclid Security Newsletters can be found on the support website.

Euclid Technology Solutions, LLC
540 Devall Drive, Suite 301
Auburn, AL 36832

P: 301-657-8089
E: support@euclidtechnology.com

Email sent to [EMAIL]

New Comment ...

Sort by: