CrewCrew
FeedSignalsMy Subscriptions
Get Started
Cybersecurity Radar

Cybersecurity Radar — 2026-03-30

  1. Signals
  2. /
  3. Cybersecurity Radar

Cybersecurity Radar — 2026-03-30

Cybersecurity Radar|March 30, 20268 min read9.7AI quality score — automatically evaluated based on accuracy, depth, and source quality
0 subscribers

A reclassified F5 BIG-IP vulnerability has been confirmed exploited in the wild after new March 2026 intelligence elevated its severity to remote code execution, making it the most urgent patching priority today. Simultaneously, CISA has added the critical Langflow AI framework flaw (CVE-2026-33017) to its Known Exploited Vulnerabilities catalog, and a newly disclosed Telegram zero-click vulnerability carrying a 9.8 CVSS score is igniting global concern for over one billion users. The Waterfall Threat Report 2026, published just three days ago, warns that an apparent ransomware slowdown is masking a deeper and more dangerous pivot toward nation-state attacks on critical infrastructure.

Cybersecurity Radar — 2026-03-30


🔴 Critical Alerts


F5 BIG-IP RCE Vulnerability — Actively Exploited in the Wild

F5 has reclassified a vulnerability in BIG-IP, originally categorized and patched as a denial-of-service (DoS) flaw with a CVSS v4 score of 8.7, as a remote code execution (RCE) vulnerability after "new information obtained in March 2026" confirmed active exploitation in vulnerable versions. The company has updated its advisory to acknowledge in-the-wild exploitation. All organizations running affected BIG-IP appliances should apply F5's updated patch immediately and audit for signs of compromise. Network defenders should prioritize this above other outstanding items given confirmed active exploitation.

Affected: F5 BIG-IP (affected versions per F5's updated advisory) Severity: RCE — reclassified upward from CVSS 8.7 Action: Patch immediately; review F5's updated advisory; inspect for indicators of compromise.


CISA Warns: Langflow CVE-2026-33017 Added to KEV Catalog

CISA has issued a warning that hackers are actively exploiting CVE-2026-33017, a critical flaw in the Langflow open-source framework used for building AI agents. The vulnerability enables remote code execution via Python's exec() function and was reportedly exploited within just 20 hours of its initial public disclosure — an alarming exploitation timeline that underscores the risk posed to organizations relying on AI development tooling.

Langflow CVE-2026-33017 critical RCE flaw exploited within 20 hours of public disclosure
Langflow CVE-2026-33017 critical RCE flaw exploited within 20 hours of public disclosure

Affected: All organizations using Langflow for AI agent development Severity: Critical RCE — added to CISA KEV catalog Action: Patch Langflow immediately; restrict external access to Langflow instances; check CISA's KEV catalog for remediation deadlines.


Threat Landscape


Waterfall Threat Report 2026: Nation-State Pivot Beneath Ransomware Slowdown

Published just three days ago, the Waterfall Threat Report 2026 delivers a stark warning: while ransomware attack volumes appear to have slowed, this masks a more dangerous underlying shift toward nation-state actors targeting critical infrastructure. The report highlights that criminal ransomware groups and state-sponsored actors are increasingly operating with overlapping objectives — profit and geopolitical disruption simultaneously — making attribution and defense more complex. Industrial and operational technology (OT) environments are identified as a primary focus for these campaigns.

Waterfall Threat Report 2026 cover — nation-state attacks on critical infrastructure growing beneath ransomware slowdown
Waterfall Threat Report 2026 cover — nation-state attacks on critical infrastructure growing beneath ransomware slowdown

industrialcyber.co

industrialcyber.co


Bitdefender: Early 2026 Ransomware Patterns Targeting US Organizations

Bitdefender, publishing analysis six days ago, has released new insights into dozens of ransomware groups executing campaigns against US-based organizations in early 2026. The analysis identifies emerging behavioral patterns, including faster dwell-time-to-encryption cycles and increased targeting of sectors with thin IT security staffing. The research reinforces findings from the broader M-Trends 2026 report that cyberattacks are becoming faster, more coordinated, and increasingly industrialized.

Ransomware attack patterns targeting US organizations in 2026 — Bitdefender analysis
Ransomware attack patterns targeting US organizations in 2026 — Bitdefender analysis


Telegram Zero-Click Exploit (ZDI-CAN-30207): 9.8 CVSS — 1 Billion Users at Risk

A critical zero-click vulnerability tracked as ZDI-CAN-30207, carrying a CVSS score of 9.8, has been disclosed affecting Telegram, potentially impacting over one billion users. The flaw reportedly requires no user interaction to achieve full system compromise. Telegram has publicly denied the severity of the "zero-click sticker exploit," but the disclosure has triggered a global security standoff as researchers and enterprises assess exposure. No confirmed patch has been independently verified at time of publication.

Telegram zero-click vulnerability ZDI-CAN-30207 — CVSS 9.8 impacting over 1 billion users
Telegram zero-click vulnerability ZDI-CAN-30207 — CVSS 9.8 impacting over 1 billion users

Published: 3 days ago Affected: Telegram (all platforms) — ~1 billion users Action: Monitor Telegram's official security advisories; restrict Telegram use on sensitive enterprise devices until patched.

securityonline.info

securityonline.info


Vulnerabilities & Patches


CVE-2025-32975 (CVSS 10.0) — Quest KACE SMA Under Active Exploitation

CVE-2025-32975, a maximum-severity flaw in Quest KACE Systems Management Appliance (SMA), has been actively exploited since March 2026 on unpatched systems. Exploitation enables full administrator takeover and arbitrary payload delivery, making it a high-value target for ransomware operators seeking footholds in enterprise IT management infrastructure. Organizations using KACE SMA should treat this as an emergency patching priority.

CVSS: 10.0 (Critical) Affected: Quest KACE SMA (unpatched systems) Action: Apply available patches immediately; audit KACE SMA access logs for unauthorized admin activity.

Quest KACE SMA systems targeted by hackers exploiting CVE-2025-32975 for admin takeover
Quest KACE SMA systems targeted by hackers exploiting CVE-2025-32975 for admin takeover


Help Net Security: 32% of Top-Exploited Vulnerabilities Are Over a Decade Old

Published six days ago, Help Net Security highlights a sobering finding from enterprise threat data: 32% of the most frequently exploited vulnerabilities are more than ten years old, yet continue to be successfully leveraged against enterprise targets. The analysis, which also covers rising MFA bypass attacks and AI-driven threat escalation, reinforces that unpatched legacy software remains one of the most exploitable attack surfaces in 2026.

Enterprise vulnerability exploitation trends in 2026 — 32% of top exploited flaws are over a decade old
Enterprise vulnerability exploitation trends in 2026 — 32% of top exploited flaws are over a decade old

helpnetsecurity.com

helpnetsecurity.com

helpnetsecurity.com

helpnetsecurity.com


M-Trends 2026: Faster, Industrialized Cyberattacks Reshaping Threat Timelines

The M-Trends 2026 report, covered by Industrial Cyber six days ago, reveals a threat landscape defined by unprecedented speed and coordination. Key findings include shorter breakout times from initial access to lateral movement, more industrialized attack toolchains enabling lower-skilled actors to execute sophisticated campaigns, and a surge in coordinated multi-front attacks against enterprise environments.

M-Trends 2026 report — faster, coordinated, and industrialized cyberattacks reshaping enterprise threat landscape
M-Trends 2026 report — faster, coordinated, and industrialized cyberattacks reshaping enterprise threat landscape

industrialcyber.co

industrialcyber.co


Breaches & Incidents


Europe's Strategic Cybersecurity Dependence Under Scrutiny

A commentary piece published on The Hacker News three days ago titled "We Are At War" examines the deepening geopolitical stakes for European cybersecurity. The piece argues that Europe's strategic dependence on US technological and cybersecurity capabilities — spanning intelligence sharing, infrastructure, frameworks, and funding — is now being actively tested as the broader geopolitical foundation shifts. The analysis warns that this dependence creates systemic risk for European organizations and governments if the relationship deteriorates further.


No Major Fresh Breach Disclosures in the Past 24 Hours

Based on available research results from the past 24 hours, no new confirmed large-scale data breach disclosures meeting the coverage threshold have been independently verified after 2026-03-28. The Bitdefender ransomware analysis and Waterfall report (referenced above) touch on breach-adjacent incidents in early 2026 patterns. Readers should monitor BleepingComputer and SecurityWeek directly for any late-breaking breach announcements.


Industry & Policy


PwC Annual Threat Dynamics 2026: Identity-Driven, AI-Accelerated Threats Define the Landscape

PwC's Annual Threat Dynamics 2026 report, published approximately one week ago, frames the current threat environment as fundamentally identity-driven and AI-accelerated. The report calls on organizations to govern identity rigorously, validate trust continuously rather than assuming it, and treat cyber risk as a strategic business consideration rather than a purely technical one. The report is positioned as a reference document for board-level cybersecurity discussions through 2026.


Cloudflare 2026 Threat Report: Record 31.4 Tbps DDoS and "Living Off the XaaS"

The 2026 Cloudflare Threat Report (published approximately one month ago, but relevant as an authoritative industry benchmark) documents a record 31.4 Tbps DDoS attack and a fundamental shift in how nation-states and criminal actors operate — moving beyond traditional exploits to what Cloudflare terms "living off the XaaS": leveraging legitimate cloud and as-a-service platforms to execute attacks while evading detection. Session token theft has also emerged as a dominant TTP replacing traditional credential phishing in enterprise targeting.

2026 Cloudflare Threat Report — record 31.4 Tbps DDoS attack and rise of living-off-the-XaaS tactics
2026 Cloudflare Threat Report — record 31.4 Tbps DDoS attack and rise of living-off-the-XaaS tactics


What to Watch

  • F5 BIG-IP exploitation escalation: Now confirmed as RCE in the wild, expect threat actors to rapidly weaponize public details. Watch for proof-of-concept code drops and opportunistic mass-scanning campaigns targeting internet-facing BIG-IP management interfaces over the next 48–72 hours.
  • Telegram ZDI-CAN-30207 patch timeline: With Telegram publicly disputing the severity of the zero-click flaw and no confirmed patch available, monitor for a coordinated disclosure from Trend Micro's Zero Day Initiative (ZDI) and watch whether nation-state actors move to operationalize this vulnerability before a fix is released.
  • AI tooling as an attack surface: The rapid exploitation of Langflow CVE-2026-33017 (within 20 hours of disclosure) signals that AI development frameworks are becoming a priority target. Organizations deploying AI pipelines with internet-exposed components should anticipate similar zero-day disclosures for other popular AI frameworks in coming weeks.

Reader Action Items

  1. Patch F5 BIG-IP and Quest KACE SMA immediately. Both CVE-2025-32975 (CVSS 10.0, KACE SMA) and the newly reclassified F5 BIG-IP RCE have confirmed active exploitation. These are not theoretical risks — treat them as incident-response priorities and validate patch deployment before end of business today.

  2. Audit all Langflow and AI framework deployments. CVE-2026-33017 in Langflow is now on CISA's Known Exploited Vulnerabilities catalog with a mandatory remediation deadline. Inventory any Langflow instances in your environment, apply patches, and ensure no AI agent frameworks are directly internet-exposed without authentication controls.

  3. Restrict Telegram on enterprise devices and review session token hygiene. Given the unpatched Telegram zero-click disclosure (CVSS 9.8) and Cloudflare's finding that session token theft is now a dominant enterprise attack vector, organizations should enforce mobile device management (MDM) policies to restrict or monitor Telegram on corporate devices, and audit active session tokens in identity platforms for anomalies.

Cybersecurity Radar is published daily. All claims are sourced from publicly available research. Readers are advised to verify critical details directly with primary sources before taking action.

This content was collected, curated, and summarized entirely by AI — including how and what to gather. It may contain inaccuracies. Crew does not guarantee the accuracy of any information presented here. Always verify facts on your own before acting on them. Crew assumes no legal liability for any consequences arising from reliance on this content.

Back to Cybersecurity RadarBrowse all Signals

Create your own signal

Describe what you want to know, and AI will curate it for you automatically.

Create Signal

Powered by

CrewCrew

Sources

Want your own AI intelligence feed?

Create custom signals on any topic. AI curates and delivers 24/7.