Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2026-23918: Apache HTTP/2 Double-Free Vulnerability with Possible RCE

A high-severity double-free vulnerability in Apache HTTP Server 2.4.66 allows low-privileged attackers to remotely crash vulnerable servers through a crafted HTTP/2 request sequence, with a demonstrated path to remote code execution on common Linux deployments. Tracked as CVE-2026-23918, the vulnerability exists in Apache’s mod_http2 module and affects deployments using multi-threaded MPMs such as worker and event.

CVE-2026-42208: Pre-Authentication SQL Injection in LiteLLM Exposes API Credentials

A critical vulnerability in LiteLLM is turning AI infrastructure into an open vault; no login required. Tracked as CVE-2026-42208, this vulnerability allows attackers to extract API keys, cloud credentials, and provider authentication tokens without any credentials or prior access to the system. The root cause is fundamental lapse in input handling. LiteLLM’s API key validation blindly injects the Bearer token from the Authorization header into a SQL query without sanitization.

CVE-2026-32201: SharePoint Spoofing Vulnerability Enabling Unauthenticated Impersonation

Over 1,300 Microsoft SharePoint servers exposed online remain unpatched against a spoofing vulnerability that was exploited as a zero-day. The vulnerability in question, CVE-2026-32201, is a spoofing vulnerability rooted in improper input validation that requires no login, no user interaction, and no special conditions to exploit. The vulnerability allows unauthenticated attackers to influence how content is rendered, making attacker-controlled data appear as legitimate output.

CVE-2026-34197: Apache ActiveMQ Jolokia RCE Vulnerability

Apache ActiveMQ Classic, widely used as a messaging backbone in enterprise environments, carries a high-severity vulnerability tracked as CVE-2026-34197. What makes this particularly alarming is its roots. The underlying behavior enabling this vulnerability has existed for nearly 13 years, silently present across countless enterprise deployments.

Exposed LLM Infrastructure: How Attackers Find and Exploit Misconfigured AI Deployments

Someone is scanning your LLM infrastructure right now. They are not waiting for you to finish your security review. Between October 2025 and January 2026, GreyNoise’s honeypot infrastructure captured 91,403 attack sessions targeting exposed LLM endpoints. These were two distinct campaigns systematically mapping the expanding attack surface of misconfigured AI deployments. Your team is moving fast on AI. LLM servers are going live, inference APIs are being connected, MCP endpoints are being spun up.

Is Your Patch Management Strategy Ready for AI-Powered Attacks? | Nishith Datta | Titan

In this Episode of Guardians of the Enterprise, Ashish Tandon, Founder & CEO, Indusface and Nishith Datta, Head of Cybersecurity at Titan, discusses one of the most pressing challenges in modern security, vulnerability patching in the age of AI. As AI accelerates both the scale and sophistication of attacks, traditional patching cycles are no longer enough. Nishith shares his frontline perspective on how enterprises securing omnichannel consumers must rethink their approach to exposure management.

Busting the Biggest Myth in Retail Cybersecurity | Nishith Datta | Titan

In this Episode of Guardians of the Enterprise, Ashish Tandon, Founder & CEO, Indusface, and Nishith Datta, Head of Cybersecurity at Titan, breaks down one of the biggest myths in retail cybersecurity, especially in the era of omnichannel distribution channels. As digital and physical experiences evolve, securing consumer journeys is no longer straightforward. Nishith shares his frontline perspective on why traditional assumptions around retail security fall short, and what organizations must rethink to stay resilient.

46 Vulnerability Statistics 2026: Key Trends in Discovery, Exploitation, and Risk

Vulnerabilities remain one of the most exploited entry points for cyberattacks. According to the Indusface State of Application Security Report 2026, attacks targeting website vulnerabilities reached 6.29 billion in 2025, up from 4 billion in 2024, a 56% year-over-year increase. That number is not just a trend line. It means attackers are finding, weaponizing, and exploiting vulnerabilities faster than most security teams can respond.

Cloudflare WAF vs AppTrana: Which Platform Is Right for You?

You started evaluating Cloudflare or already deployed it, because it offered the fastest path to CDN, DDoS resilience, and baseline WAF coverage without heavy engineering effort. Teams that find their way to this comparison typically share one of three experiences: This guide covers what Cloudflare does well and where AppTrana changes the model. By the end, you will be able to determine whether the gap you are hitting is something an upgrade solves, or whether the operating model itself needs to change.