{"vulnerability": "CVE-2026-3502", "sightings": [{"uuid": "c007a705-09e5-4b4e-8a3f-dba378f79107", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3micjhllsy32t", "content": "", "creation_timestamp": "2026-03-30T20:40:07.409205Z"}, {"uuid": "c36ba7ad-f283-4ed5-b2b0-78c3db44bca2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3micevjrc4m2d", "content": "", "creation_timestamp": "2026-03-30T19:18:26.563417Z"}, {"uuid": "834043a6-bab0-4060-8b51-706dc9a34d9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mienptdvmoh2", "content": "", "creation_timestamp": "2026-03-31T17:01:46.735553Z"}, {"uuid": "3a4a644b-0363-40f2-a2ff-bf3ac65ee052", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mietwkajkv2y", "content": "", "creation_timestamp": "2026-03-31T18:52:46.060292Z"}, {"uuid": "ac136b58-ba85-450a-9f14-767e12ca028e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://thehackernews.com/2026/03/trueconf-zero-day-exploited-in-attacks.html", "content": "", "creation_timestamp": "2026-03-31T14:03:00.000000Z"}, {"uuid": "e7fc2474-e92a-4e40-bfbe-e0771c7c2c6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3miexvl32aq2t", "content": "", "creation_timestamp": "2026-03-31T20:03:47.778875Z"}, {"uuid": "28a53f4d-92d7-4567-a4f1-3744b336effc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/kotosecurity.bsky.social/post/3migubelr5c27", "content": "", "creation_timestamp": "2026-04-01T14:04:08.191122Z"}, {"uuid": "7c740401-8bfa-4b8b-a750-e94f4e681b6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3miff4q4qvw2i", "content": "", "creation_timestamp": "2026-04-01T00:00:27.779902Z"}, {"uuid": "326d4743-535d-4ec7-a9cf-cfe4f418b212", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/clankussy.abu.guru/post/3mift5k7b7x2e", "content": "", "creation_timestamp": "2026-04-01T04:11:26.697867Z"}, {"uuid": "b63eade0-e6ea-4d72-bb6f-b80a87cff677", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mihlnn4pnk2g", "content": "", "creation_timestamp": "2026-04-01T21:02:41.015844Z"}, {"uuid": "12dec9e8-dbc1-4221-bce1-ca9f6c52ae67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://research.checkpoint.com/2026/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets/", "content": "", "creation_timestamp": "2026-04-01T02:00:13.000000Z"}, {"uuid": "635e513f-0c3d-44eb-ba91-851005128454", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3mifzadt2wm2s", "content": "", "creation_timestamp": "2026-04-01T06:00:23.002403Z"}, {"uuid": "00cc66b7-2c01-4bb4-94bd-22b95befbbeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/mikayla-adams.technodon.org.ap.brid.gy/post/3miggkczzxxf2", "content": "", "creation_timestamp": "2026-04-01T09:58:41.138691Z"}, {"uuid": "a8fed8d6-7e2c-4316-ab9d-c8b91840db8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3mii5fukzex2g", "content": "", "creation_timestamp": "2026-04-02T02:20:23.464277Z"}, {"uuid": "e0820824-e9cd-4498-9468-be4d2fd14e54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/geoeconorbit.bsky.social/post/3miggrfeetu2y", "content": "", "creation_timestamp": "2026-04-01T10:02:33.834113Z"}, {"uuid": "9074a905-8649-4bf8-9efe-d634ebdc759e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/concisecyber.bsky.social/post/3miiqiuu3gl2c", "content": "", "creation_timestamp": "2026-04-02T08:02:04.654506Z"}, {"uuid": "ec611ae4-23de-49e7-adba-293e07fbfe46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "MISP/eb8e0abf-8462-48f7-8955-6f7b3d3c9413", "content": "", "creation_timestamp": "2026-04-01T16:10:17.000000Z"}, {"uuid": "c10a2725-8b58-450c-909e-f1b63f098ee2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3mikubpagakjv", "content": "", "creation_timestamp": "2026-04-03T04:15:00.072399Z"}, {"uuid": "3c238529-6bde-4874-9e23-2a03d517e021", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mikvfg437k2d", "content": "", "creation_timestamp": "2026-04-03T04:34:56.809837Z"}, {"uuid": "7efdac40-123b-4a28-ba5e-2e6e05efb686", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://mastodon.social/ap/users/115426718704364579/statuses/116335749015584752", "content": "", "creation_timestamp": "2026-04-02T15:10:55.372294Z"}, {"uuid": "381c0c49-2f0a-4ce5-85a1-de95c1857298", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/netsecio.bsky.social/post/3mijiien3ff2p", "content": "", "creation_timestamp": "2026-04-02T15:11:17.590737Z"}, {"uuid": "f82cd4e5-70d9-407d-9b4f-0bdb3d9a849f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/zettawire.com/post/3mijoql5qgm2t", "content": "", "creation_timestamp": "2026-04-02T17:03:15.066544Z"}, {"uuid": "f876f006-496d-42df-b446-678d579c503c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://infosec.exchange/users/AAKL/statuses/116336268253150164", "content": "", "creation_timestamp": "2026-04-02T17:22:58.119270Z"}, {"uuid": "76625c18-1403-4bfd-beff-7ca090484d6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/geoeconorbit.bsky.social/post/3mimvl6wk542x", "content": "", "creation_timestamp": "2026-04-03T23:43:29.853720Z"}, {"uuid": "87203a95-77fd-4574-977c-eca170278bec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3mijyp6u4sq2p", "content": "", "creation_timestamp": "2026-04-02T20:01:26.273433Z"}, {"uuid": "b2737720-a163-4361-922b-9b4dd0bc539d", "vulnerability_lookup_origin": "405284c2-e461-4670-8979-7fd2c9755a60", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2026-3502", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/85bccd1e-c096-4f3a-a360-7e4220654ac0", "content": "", "creation_timestamp": "2026-04-02T21:00:02.407973Z"}, {"uuid": "f7043102-c003-4e54-bcb6-31de48b4475e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/geoeconorbit.bsky.social/post/3mio7goyl422y", "content": "", "creation_timestamp": "2026-04-04T12:12:36.248062Z"}, {"uuid": "84c0a9c3-c24b-420a-a09d-466de9c3332b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/6166065", "content": "", "creation_timestamp": "2026-04-02T21:06:35.091228Z"}, {"uuid": "42e9a77b-4296-4a37-b6c4-898f63e4b25e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3mikflcy2mi26", "content": "", "creation_timestamp": "2026-04-02T23:51:54.814885Z"}, {"uuid": "2d573e97-f275-4298-a5af-ca2bdc465c41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3miqrhchbn326", "content": "", "creation_timestamp": "2026-04-05T12:40:24.071502Z"}, {"uuid": "07032cd4-d025-4f52-b520-43ab146a9aa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3miqvwdztzi26", "content": "", "creation_timestamp": "2026-04-05T14:00:24.321918Z"}, {"uuid": "dd31ac07-d884-4d4c-a1f4-7153b9dd97df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/kotosecurity.bsky.social/post/3mirxs2eytm2a", "content": "", "creation_timestamp": "2026-04-06T00:06:26.040024Z"}, {"uuid": "6b5414c5-b9d0-4471-8d78-c4a38d99be65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mis65kofhn2r", "content": "", "creation_timestamp": "2026-04-06T02:00:15.498634Z"}, {"uuid": "e283516a-0d12-4e5b-9852-3e5caed4697f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://www.acn.gov.it/portale/w/trueconf-rilevato-sfruttamento-in-rete-della-cve-2026-3502", "content": "", "creation_timestamp": "2026-04-03T06:48:21.000000Z"}, {"uuid": "3247059f-4031-4182-a19a-0f06a2a14394", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35029", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mitvlluyaz24", "content": "", "creation_timestamp": "2026-04-06T18:32:22.236151Z"}, {"uuid": "1347e880-f62f-4906-8bc5-b22860694c9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/kotosecurity.bsky.social/post/3milv4bsd5x2a", "content": "", "creation_timestamp": "2026-04-03T14:02:29.694301Z"}, {"uuid": "14d65127-c1cb-43e8-89c5-48cf8ee46f34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3miopdmtoioa2", "content": "", "creation_timestamp": "2026-04-04T16:57:18.363315Z"}, {"uuid": "86b7d18e-d40b-45fb-9ced-38cc18cc872c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3miopobxbvk2a", "content": "", "creation_timestamp": "2026-04-04T17:03:11.346535Z"}, {"uuid": "621f4319-40e5-48ae-ace6-1cf4d9a982d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35022", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/81827", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a malicious_test\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a pjordann\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-04-27 10:26:45\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nEste es un repositorio para hacer pruebas de seguridad sobre la vulnerabilidad conocida CVE-2026-35022.\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-04-27T11:00:04.000000Z"}, {"uuid": "bf5542b0-5a3e-466f-b5d0-f482b768fa65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3mitl2vgybu2m", "content": "", "creation_timestamp": "2026-04-06T15:24:04.670085Z"}, {"uuid": "cf0e5675-7c5a-4246-82d9-3cc3d8ca038c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/78809", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-3502-Scanner---TrueConf-Vulnerability-Detection-Tool\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a fevar54\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-04-04 22:55:09\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nHerramienta de detecci\u00f3n para CVE-2026-3502. Escanea servidores TrueConf sin verificaci\u00f3n de actualizaciones, detecta clientes Windows vulnerables (\u22648.5.3.884) y busca IOCs de TrueChaos: PowerISO, persistencia en registro y tareas programadas. Reportes JSON, HTML o CSV.\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-04-04T23:00:04.000000Z"}, {"uuid": "c038c4d6-c7c8-4240-b3d2-8e7f47ffccc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-3502", "type": "seen", "source": "https://bsky.app/profile/cyberveille-ch.bsky.social/post/3mivl4rc6ql2b", "content": "", "creation_timestamp": "2026-04-07T10:30:26.283282Z"}, {"uuid": "286f558d-a800-4247-b692-cb29e68d5e0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://www.cisa.gov/news-events/alerts/2026/04/02/cisa-adds-one-known-exploited-vulnerability-catalog", "content": "", "creation_timestamp": "2026-04-02T05:00:00.000000Z"}, {"uuid": "8a8dcfb9-a087-4902-acf6-7ce472989c3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35023", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3miyinnt2sx2i", "content": "", "creation_timestamp": "2026-04-08T14:24:10.942449Z"}, {"uuid": "69e7cfbd-1668-4461-93f1-8fb267d46ec0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35022", "type": "seen", "source": "https://bsky.app/profile/crustytldr.bsky.social/post/3mjsuf4rblk25", "content": "", "creation_timestamp": "2026-04-19T02:03:22.999986Z"}, {"uuid": "e5af0de6-8c53-4806-a4c0-1711347dc5a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35029", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mk6vwujlwp2z", "content": "", "creation_timestamp": "2026-04-23T21:03:17.647831Z"}, {"uuid": "96ed3434-e3dd-4617-b47b-343a83ad1105", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "exploited", "source": "Telegram/oE94v46owQZKqbgA5T54a8dMRe1hYb9gx4pdHgBoRjlRFg", "content": "", "creation_timestamp": "2026-03-31T23:58:01.000000Z"}, {"uuid": "ef789dbc-5951-4de4-aae6-bd43e6697860", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35022", "type": "seen", "source": "Telegram/8Tvza3k4qy2IjH2O3f59isxEIVitW69EvgGBkLG1GZexI3E", "content": "", "creation_timestamp": "2026-04-06T21:20:59.000000Z"}, {"uuid": "c44fb16e-5016-459b-980e-82407b9d1024", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35020", "type": "seen", "source": "Telegram/8Tvza3k4qy2IjH2O3f59isxEIVitW69EvgGBkLG1GZexI3E", "content": "", "creation_timestamp": "2026-04-06T21:20:59.000000Z"}, {"uuid": "97751657-8dfa-41ae-a8e6-9b64d5371119", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35021", "type": "seen", "source": "Telegram/8Tvza3k4qy2IjH2O3f59isxEIVitW69EvgGBkLG1GZexI3E", "content": "", "creation_timestamp": "2026-04-06T21:20:59.000000Z"}, {"uuid": "566d7460-e58b-4533-901c-2403b2722a86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3miuq7wokg52m", "content": "", "creation_timestamp": "2026-04-07T02:29:02.961387Z"}, {"uuid": "6f3002da-296f-41d4-9f26-4c9e31469a24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-35022", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116361542195290387", "content": "", "creation_timestamp": "2026-04-07T04:30:28.205715Z"}, {"uuid": "9c4c3733-3aa4-4e6a-9439-bbfded15b95f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-35022", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3miuwz5eh2v26", "content": "", "creation_timestamp": "2026-04-07T04:30:30.318771Z"}, {"uuid": "8f60d848-2de7-4aea-8dfb-230df8767aca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35022", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3miv42ceude2r", "content": "", "creation_timestamp": "2026-04-07T06:00:37.530701Z"}, {"uuid": "c9d19eea-758a-4a76-b22a-324adc448db6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35020", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3miv42qcohd27", "content": "", "creation_timestamp": "2026-04-07T06:00:52.134040Z"}, {"uuid": "81c031c3-8fc2-4d9f-944f-d87ba652e820", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mj6jlejqsc2v", "content": "", "creation_timestamp": "2026-04-10T23:56:46.730427Z"}, {"uuid": "1d143896-31ce-4fd9-9e59-f046333a0e85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mj6k423oz22v", "content": "", "creation_timestamp": "2026-04-11T00:06:06.594588Z"}, {"uuid": "c6b9caf4-563f-4dab-95ba-ac0e2886596b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mj7gw5qou22v", "content": "", "creation_timestamp": "2026-04-11T08:41:47.324130Z"}, {"uuid": "ef055b0a-2fdb-4acb-b7af-5ddc8a40dcb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35029", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3mjl4iyk2bk2t", "content": "", "creation_timestamp": "2026-04-16T00:07:28.569362Z"}, {"uuid": "4f3b058e-85f0-45dc-9249-58240c1b2461", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "MISP/eb8e0abf-8462-48f7-8955-6f7b3d3c9413", "content": "", "creation_timestamp": "2026-04-18T03:50:55.000000Z"}, {"uuid": "7885a46f-d8c6-4d48-bc4b-172fc7c49d8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35029", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2026/CVE-2026-35029.yaml", "content": "", "creation_timestamp": "2026-04-22T07:35:47.000000Z"}, {"uuid": "5981ff5f-f812-42a7-adf1-a332d8077dc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "exploited", "source": "https://t.me/thehackernews/8711", "content": "\u26a0\ufe0f A zero-day in TrueConf let attackers spread malware through its own update system.\n\nCVE-2026-3502 (CVSS 7.8) was exploited by compromising on-prem servers, pushing tampered updates to all connected clients in government networks across Southeast Asia.\n\n\ud83d\udd17 How the TrueChaos campaign weaponized software updates \u2192 https://thehackernews.com/2026/03/trueconf-zero-day-exploited-in-attacks.html", "creation_timestamp": "2026-03-31T16:29:03.000000Z"}, {"uuid": "10c9842f-d987-4a87-8176-4ea0d68a97c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "exploited", "source": "https://t.me/cyberguerre/4043", "content": "\u041a\u043b\u0438\u0435\u043d\u0442\u0441\u043a\u0438\u0439 \u043f\u0443\u0442\u044c\n\n\u041f\u043e\u043a\u0430 Head Mare \u043f\u0440\u043e\u043d\u0438\u043a\u0430\u0435\u0442 \u0432 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u0432\u0435\u0434\u043e\u043c\u0441\u0442\u0432\u0430 \u0447\u0435\u0440\u0435\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 TrueConf Server, \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0435 \u0445\u0430\u043a\u0435\u0440\u044b \u0430\u0442\u0430\u043a\u0443\u044e\u0442 \u0433\u043e\u0441\u043e\u0440\u0433\u0430\u043d\u044b \u043e\u0434\u043d\u043e\u0439 \u0438\u0437 \u0441\u0442\u0440\u0430\u043d \u042e\u0433\u043e-\u0412\u043e\u0441\u0442\u043e\u0447\u043d\u043e\u0439 \u0410\u0437\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u0437\u0438\u0440\u043e\u0434\u0435\u0439 \u0432 TrueConf Client.\n\n\u0410\u043a\u0442\u0438\u0432\u043d\u0443\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u0440\u0430\u043d\u0435\u0435 \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 CheckPoint \u0438 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u043e \u043d\u0435\u0439 \u0432\u0435\u043d\u0434\u043e\u0440\u0443. \u0412 \u0431\u0430\u0437\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 \u0424\u0421\u0422\u042d\u041a \u0435\u0451 \u0435\u0449\u0451 \u043d\u0435\u0442, \u043d\u043e \u0435\u0441\u0442\u044c \u0432 CVE (CVE-2026-3502). \u0422\u0430\u043a\u0436\u0435 \u0432 \u043f\u044f\u0442\u043d\u0438\u0446\u0443 \u0432\u044b\u0448\u0435\u043b \u043f\u0430\u0442\u0447.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u043f\u0440\u0438 \u043d\u0430\u043b\u0438\u0447\u0438\u0438 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0433\u043e (on-premise) \u0441\u0435\u0440\u0432\u0435\u0440\u0430 TrueConf \u043a\u043b\u0438\u0435\u043d\u0442 \u043f\u0440\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0435 \u0441\u0432\u044f\u0437\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0441 \u043d\u0438\u043c \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043d\u0430\u043b\u0438\u0447\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439. \u0415\u0441\u043b\u0438 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0435\u0441\u0442\u044c \u043d\u043e\u0432\u0430\u044f \u0432\u0435\u0440\u0441\u0438\u044f, \u0442\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u0435\u0442\u0441\u044f \u0435\u0451 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c. \u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u043d\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442\u0441\u044f \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f, \u0438 \u0435\u0441\u043b\u0438 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043f\u043e\u043b\u0443\u0447\u0438\u043b \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0435\u0440\u0432\u0435\u0440\u0443, \u0442\u043e \u043e\u043d \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u043e\u0442 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a \u0434\u043b\u044f \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u043f\u043e \u0432\u0441\u0435\u043c \u043a\u043b\u0438\u0435\u043d\u0442\u0430\u043c \u043e\u0434\u043d\u043e\u0433\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u0430.\n\n\u0418\u043c\u0435\u043d\u043d\u043e \u044d\u0442\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0432 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438-\u0436\u0435\u0440\u0442\u0432\u0435. \u041a\u0430\u043a \u0438\u043c\u0435\u043d\u043d\u043e \u0431\u044b\u043b \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d \u0441\u0435\u0440\u0432\u0435\u0440, \u043d\u0435 \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442\u0441\u044f, \u043d\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e, \u0447\u0442\u043e \u043e\u043d \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043b\u0441\u044f \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u043c IT-\u0434\u0435\u043f\u0430\u0440\u0442\u0430\u043c\u0435\u043d\u0442\u043e\u043c \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0441\u044f \u0434\u043b\u044f \u0432\u0438\u0434\u0435\u043e\u043a\u043e\u043d\u0444\u0435\u0440\u0435\u043d\u0446\u0441\u0432\u044f\u0437\u0438 \u0434\u0435\u0441\u044f\u0442\u043a\u0430\u043c\u0438 \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0445 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439.\n\n\u0417\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u0435 \u043d\u0430\u0447\u0438\u043d\u0430\u043b\u043e\u0441\u044c \u0441 \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u0430, \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e, \u043f\u043e \u0441\u0441\u044b\u043b\u043a\u0435 \u043e\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432. \u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u043b\u043e\u0441\u044c \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c TrueConf Client, \u043d\u043e \u0432\u043c\u0435\u0441\u0442\u0435 \u0441 \u043d\u043e\u0432\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0435\u0439 \u043d\u0430 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440 \u043f\u043e\u043f\u0430\u0434\u0430\u043b \u0431\u0435\u0437\u0432\u0440\u0435\u0434\u043d\u044b\u0439 \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u044b\u0439 \u0444\u0430\u0439\u043b \u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0430\u044f DLL-\u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0430 (\u0441\u043f\u043e\u0441\u043e\u0431 \u043f\u043e\u0445\u043e\u0436 \u043d\u0430 \u0430\u0442\u0430\u043a\u0443 \u043d\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 ViPNet), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u043b\u0430\u0441\u044c \u043f\u0443\u0442\u0451\u043c \u043f\u043e\u0434\u043c\u0435\u043d\u044b.  \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u043b\u0438 \u0440\u0430\u0437\u0432\u0435\u0434\u043a\u0443 \u0438 \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u043b\u0438 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b. \u0418\u0442\u043e\u0433\u043e\u0432\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043d\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438, \u043d\u043e \u043f\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u043c \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u0430\u043c \u0441\u0434\u0435\u043b\u0430\u043b\u0438 \u0432\u044b\u0432\u043e\u0434, \u0447\u0442\u043e \u044d\u0442\u043e \u0431\u044b\u043b \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 Havoc, \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044b\u0439 \u0434\u043b\u044f \u043f\u0435\u043d\u0442\u0435\u0441\u0442\u0430, \u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0439 \u0438 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u043c\u0438 \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u0438\u043c\u0438 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430\u043c\u0438, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u043c\u0438.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u043e\u0442\u0447\u0451\u0442\u0430 \u043d\u0435\u043b\u044c\u0437\u044f \u043d\u0435 \u043e\u0431\u0440\u0430\u0442\u0438\u0442\u044c \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u0438 \u043d\u0430 \u0440\u0430\u0437\u0440\u043e\u0437\u043d\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 TrueConf. \u041a\u0430\u043a \u044f \u043e\u0442\u043c\u0435\u0442\u0438\u043b, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 TrueConf Client \u043d\u0435\u0442 \u0432 \u0411\u0414\u0423 \u0424\u0421\u0422\u042d\u041a, \u043d\u043e \u0438 \u0432 CVE \u043d\u0435\u0442 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 Head Mare \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 TrueConf Server. \u0411\u043e\u043b\u0435\u0435 \u0442\u043e\u0433\u043e, \u0432 \u0411\u0414\u0423 \u0424\u0421\u0422\u042d\u041a \u0437\u0430 2025 \u0433\u043e\u0434 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u044b 8 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 TrueConf Server, \u0430 \u0432 CVE \u2014 3. \u0418, \u0435\u0441\u043b\u0438 \u044f \u043d\u0435 \u043e\u0448\u0438\u0431\u0430\u044e\u0441\u044c, \u043e\u043d\u0438 \u043d\u0435 \u043f\u0435\u0440\u0435\u0441\u0435\u043a\u0430\u044e\u0442\u0441\u044f. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0411\u0414\u0423 \u0424\u0421\u0422\u042d\u041a \u043d\u0430\u0448\u043b\u0438 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 Positive Technologies \u0438 \u00ab\u0421\u0430\u0439\u0431\u0435\u0440 \u041e\u041a\u00bb, \u0430 \u0432 CVE \u2014 \u0438\u0440\u0430\u043d\u0441\u043a\u0438\u0439 \u043f\u0435\u043d\u0442\u0435\u0441\u0442\u0435\u0440 \u041c\u043e\u0440\u0442\u0435\u0437\u0430 \u041c\u0430\u043b\u0435\u043a\u0438 (Morteza Maleki).", "creation_timestamp": "2026-04-03T07:50:43.000000Z"}, {"uuid": "6a784a2f-4674-4596-9e16-59c31f1d5c58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "published-proof-of-concept", "source": "Telegram/LjSTrv-Iu2X1pwZwEm6tW7erIQPbnSZRqnOkapEQyNwszBE", "content": "", "creation_timestamp": "2026-04-05T03:00:05.000000Z"}, {"uuid": "45d9f119-f8dd-4dec-9591-8106b9109dc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35029", "type": "published-proof-of-concept", "source": "Telegram/ECjdy8s76GZ_Bal_wnIB79ij56tbajMepr_VumTyCn-zmzM", "content": "", "creation_timestamp": "2026-04-06T19:28:45.000000Z"}, {"uuid": "c9a8afbd-b281-408e-b267-eb73c36d78fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "exploited", "source": "https://t.me/true_secator/8060", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 CheckPoint \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442 \u043e\u0431 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0438 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u043e\u0439 \u043d\u0430 TrueConf \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c 0-day, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0435\u0439 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u043d\u0430 \u0432\u0441\u0435\u0445 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2026-3502 \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u0441\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438. \u041e\u043d\u0430 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u0438 \u0432 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u041f\u041e, \u0447\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u043e \u0434\u043b\u044f \u0437\u0430\u043c\u0435\u043d\u044b \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u043e\u043c.\n\nTrueConf - \u044d\u0442\u043e \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 \u0434\u043b\u044f \u0432\u0438\u0434\u0435\u043e\u043a\u043e\u043d\u0444\u0435\u0440\u0435\u043d\u0446\u0438\u0439, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u043a\u0430\u043a \u0441\u0435\u0440\u0432\u0435\u0440 \u0441 \u0441\u0430\u043c\u043e\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u044b\u043c \u0440\u0430\u0437\u043c\u0435\u0449\u0435\u043d\u0438\u0435\u043c. \u0425\u043e\u0442\u044f \u043e\u043d\u0430 \u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0435 \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f, \u0432 \u0446\u0435\u043b\u043e\u043c \u043e\u043d\u0430 \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u0430 \u0434\u043b\u044f \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0445, \u0430\u0432\u0442\u043e\u043d\u043e\u043c\u043d\u044b\u0445 \u0441\u0440\u0435\u0434.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0430, c\u0440\u0435\u0434\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 TrueConf - \u0432\u043e\u043e\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u0441\u0438\u043b\u044b, \u0433\u043e\u0441\u0443\u0447\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f, \u043d\u0435\u0444\u0442\u0435\u0433\u0430\u0437\u043e\u0432\u044b\u0435 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0446\u0438\u0438 \u0438 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u043f\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044e \u0432\u043e\u0437\u0434\u0443\u0448\u043d\u044b\u043c \u0434\u0432\u0438\u0436\u0435\u043d\u0438\u0435\u043c.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u044e\u0442 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044e \u043a\u0430\u043a TrueChaos \u0441 \u043d\u0430\u0447\u0430\u043b\u0430 \u0433\u043e\u0434\u0430 \u0438 \u0444\u0438\u043a\u0441\u0438\u0440\u0443\u044e\u0442 \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u0439 \u0442\u0430\u0440\u0433\u0435\u0442 \u043d\u0430 \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0432 \u042e\u0433\u043e-\u0412\u043e\u0441\u0442\u043e\u0447\u043d\u043e\u0439 \u0410\u0437\u0438\u0438.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c CheckPoint, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0438\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u043c TrueConf, \u043c\u043e\u0436\u0435\u0442 \u0437\u0430\u043c\u0435\u043d\u0438\u0442\u044c \u043e\u0436\u0438\u0434\u0430\u0435\u043c\u044b\u0439 \u043f\u0430\u043a\u0435\u0442 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u043c \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u044b\u043c \u0444\u0430\u0439\u043b\u043e\u043c, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u043c \u043a\u0430\u043a \u0442\u0435\u043a\u0443\u0449\u0430\u044f \u0432\u0435\u0440\u0441\u0438\u044f \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f, \u0438 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c \u0435\u0433\u043e \u0441\u0440\u0435\u0434\u0438 \u0432\u0441\u0435\u0445 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u0445 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432.\n\n\u041f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043a\u043b\u0438\u0435\u043d\u0442 \u0434\u043e\u0432\u0435\u0440\u044f\u0435\u0442 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u043c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044e \u0431\u0435\u0437 \u043d\u0430\u0434\u043b\u0435\u0436\u0430\u0449\u0435\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438, \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0444\u0430\u0439\u043b \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0434\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d \u0438 \u0437\u0430\u043f\u0443\u0449\u0435\u043d \u043f\u043e\u0434 \u0432\u0438\u0434\u043e\u043c \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f TrueConf.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442\u00a0\u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 TrueConf \u043e\u0442 8.1.0 \u0434\u043e 8.5.2. \u041f\u043e\u0441\u043b\u0435 \u0443\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u0438\u044f CheckPoint \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 8.5.3 \u0432 \u043c\u0430\u0440\u0442\u0435 2026 \u0433\u043e\u0434\u0430.\n\nCheckPoint \u0441 \u0443\u043c\u0435\u0440\u0435\u043d\u043d\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u044c\u044e \u0443\u0432\u0435\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u0438\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442 TrueChaos \u043d\u0435\u0439\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u043e\u0439 APT, \u043e\u0441\u043d\u043e\u0432\u044b\u0432\u0430\u044f\u0441\u044c \u043d\u0430 TTPs, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 Alibaba Cloud \u0438 Tencent \u0434\u043b\u044f \u0440\u0430\u0437\u043c\u0435\u0449\u0435\u043d\u0438\u044f \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b C2, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 \u043e \u0436\u0435\u0440\u0442\u0432\u0430\u0445.\n\n\u0410\u0442\u0430\u043a\u0438 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0438\u0441\u044c \u0447\u0435\u0440\u0435\u0437 \u0446\u0435\u043d\u0442\u0440\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u044b\u0439 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0439 \u0441\u0435\u0440\u0432\u0435\u0440 TrueConf, \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0432 \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u0432\u0435\u0434\u043e\u043c\u0441\u0442\u0432 \u0438 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e\u043c \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0445 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0432\u0441\u0435\u043c \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u043c \u043a\u043b\u0438\u0435\u043d\u0442\u0430\u043c TrueConf.\n\n\u0426\u0435\u043f\u043e\u0447\u043a\u0430 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0443 DLL-\u0444\u0430\u0439\u043b\u043e\u0432 \u0438 \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0440\u0430\u0437\u0432\u0435\u0434\u043a\u0438 (tasklist, tracert), \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 (\u043e\u0431\u0445\u043e\u0434 UAC \u0447\u0435\u0440\u0435\u0437 iscicpl.exe) \u0438 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043d\u0435 \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0444\u0438\u043d\u0430\u043b\u044c\u043d\u0443\u044e \u043f\u043e\u043b\u0435\u0437\u043d\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443, \u043d\u043e \u043e\u043d\u0438 \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0438, \u0447\u0442\u043e \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0442\u0440\u0430\u0444\u0438\u043a \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u043b \u043d\u0430 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f Havoc.\n\nHavoc \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439\u00a0\u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0443 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c,\u00a0\u0441\u043f\u043e\u0441\u043e\u0431\u043d\u0443\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u044b, \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430\u043c\u0438, \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0442\u043e\u043a\u0435\u043d\u0430\u043c\u0438 Windows, \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0448\u0435\u043b\u043b-\u043a\u043e\u0434 \u0438 \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u043f\u043e\u043b\u0435\u0437\u043d\u044b\u0435 \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0438.\n\n\u0420\u0430\u043d\u0435\u0435 Havoc \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u043e\u0439 Amaranth-Dragon,\u00a0\u043f\u043e\u0434\u0440\u0430\u0437\u0434\u0435\u043b\u0435\u043d\u0438\u0435\u043c APT-41 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u0441 \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u044b\u043c \u0446\u0435\u043b\u0435\u0432\u044b\u043c \u043e\u0445\u0432\u0430\u0442\u043e\u043c.\n\n\u0412 \u043e\u0442\u0447\u0435\u0442\u0435 CheckPoint \u043e\u0442\u043c\u0435\u0447\u0435\u043d\u044b IOCs&amp; \u041a \u044f\u0432\u043d\u044b\u043c \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u0430\u043c \u0432\u0437\u043b\u043e\u043c\u0430 \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043d\u0430\u043b\u0438\u0447\u0438\u0435 poweriso.exe \u0438\u043b\u0438 7z-x64.dll, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u043e\u0434\u043e\u0437\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0430\u0440\u0442\u0435\u0444\u0430\u043a\u0442\u044b, \u0442\u0430\u043a\u0438\u0435 \u043a\u0430\u043a %AppData%\\Roaming\\Adobe\\update.7z \u0438\u043b\u0438 iscsiexe.dll.", "creation_timestamp": "2026-04-02T16:00:06.000000Z"}, {"uuid": "6cbe4e62-5703-49f8-a231-3879ac5c5b82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "Telegram/3uob0OgNXCPySF5ZgiHiYbQAvLr6RIUarGC854yFCH2MAgQ", "content": "", "creation_timestamp": "2026-03-30T21:21:40.000000Z"}, {"uuid": "a3718c29-be46-45b9-a89e-962433932e13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3502", "type": "seen", "source": "https://t.me/bdufstecru/3056", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f TrueConf Client \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u043e\u0439 \u043a\u043e\u0434\u0430 \u0431\u0435\u0437 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0435\u0433\u043e \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043f\u0443\u0442\u0435\u043c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e DLL-\u0444\u0430\u0439\u043b\u0430\n\nBDU:2026-04546\nCVE-2026-3502\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 8.5.3.884;\nhttps://trueconf.com/blog/update/trueconf-8-5", "creation_timestamp": "2026-04-03T13:02:11.000000Z"}, {"uuid": "d9d5b96e-79a7-4405-85e9-52cf9d17cbf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35022", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mknxbunmum2y", "content": "\ud83d\udccc CVE-2026-35022 - Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in authentication helper execution where helper configura... https://www.cyberhub.blog/cves/CVE-2026-35022", "creation_timestamp": "2026-04-29T20:37:07.440374Z"}, {"uuid": "997dbd9a-df24-4a80-9106-6cba4891848a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35022", "type": "published-proof-of-concept", "source": "Telegram/SPdUhd4HVoLIToB8DVWG5b4lXjNZTDUUT7OIICRBagRYmDU", "content": "", "creation_timestamp": "2026-04-27T15:00:08.000000Z"}, {"uuid": "691c2fbb-e467-48f9-9223-84791b1b4fa3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35029", "type": "published-proof-of-concept", "source": "Telegram/SM41ZgDjE5GCx8_K5BndOjKQZfdnq7khstyXQtIQ9aWd83s", "content": "", "creation_timestamp": "2026-05-19T21:00:04.000000Z"}, {"uuid": "8882f3f2-837e-4afc-bf0f-97bca9eb9cdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-350234", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/82846", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a Bili-cracker\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a HOMOonly9\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-05 02:59:38\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\n\u901a\u8fc7CVE-2026-350234\u7684\u6f0f\u6d1e\u83b7\u53d6bilibili \u5927\u4f1a\u5458\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-05-05T03:00:04.000000Z"}, {"uuid": "b76daf96-0f2b-441b-a887-1f4e71d4d94a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-350234", "type": "seen", "source": "Telegram/YNBAQ7wY3nDaf6oW9SS_pET1W5P-GdTLvm9dgaO_EDkfw4Y", "content": "", "creation_timestamp": "2026-05-05T09:00:04.000000Z"}, {"uuid": "bcd8b5e8-01e9-4fc0-8e07-c2b5ff4ddb7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35020", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mkos46asun2v", "content": "\ud83d\udccc CVE-2026-35020 - Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the command lookup helper and deep-link terminal launc... https://www.cyberhub.blog/cves/CVE-2026-35020", "creation_timestamp": "2026-04-30T04:37:07.450706Z"}]}