Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Citrix NetScaler ADC and Gateway Vulnerabilities (CVE-2026-3055 & CVE-2026-4368)

On March 23, 2026, Cloud Software Group (Citrix) published a security bulletin disclosing two vulnerabilities in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway). Both affect customer-managed on-premises deployments; Citrix-managed cloud services and Adaptive Authentication instances have been updated automatically. CVE-2026-3055 is an out-of-bounds read resulting from insufficient input validation in NetScaler ADC and NetScaler Gateway.

Emerging Threat: Ubiquiti UniFi Network Application Path Traversal (CVE-2026-22557)

CVE-2026-22557 is a path traversal vulnerability in the Ubiquiti UniFi Network Application caused by improper limitation of a pathname to a restricted directory (CWE-22). A malicious actor with network access can exploit the flaw to traverse directory boundaries, access files on the underlying operating system, and manipulate those files to gain unauthorized access to system accounts.

Emerging Threat: GNU Inetutils telnetd LINEMODE SLC Buffer Overflow (CVE-2026-32746)

CVE-2026-32746 is a critical out-of-bounds write in GNU Inetutils telnetd caused by insufficient bounds checking in the LINEMODE SLC (Set Local Characters) suboption handler. Public advisories attribute the issue to the add_slc logic not verifying whether the destination buffer is already full before writing additional data. The published CVSS v3.1 score is 9.8, with network attack vector, no required privileges, and no user interaction.

Emerging Threat: Microsoft SQL Server Elevation of Privilege Vulnerability (CVE-2026-21262)

CVE-2026-21262 is an elevation of privilege vulnerability affecting Microsoft SQL Server. The issue is caused by improper access control within SQL Server components, allowing an authenticated attacker to elevate privileges over a network.

CyCognito Named a Leader and Outperformer in the 2026 GigaOm Radar for ASM

In 2026, the ASM scorecard has moved well past discovery. The market is shifting from visibility to validated proof: what’s exploitable, what connects to critical systems, and what requires immediate action. The latest GigaOm Radar for Attack Surface Management is anchored to that bar. Across 32 vendors, it highlights the platforms that have moved beyond inventory into contextual prioritization and actionable validation. This is the turning point CyCognito is built for.

Mapping and Managing AI Supply Chain Risk (Featuring Panorays)

-Recent breaches show AI risk is already present in many environments, often entering through suppliers, data flows, and integrations. But awareness alone is not enough. CISOs and security leaders must actively manage the expanded attack surface AI creates. In this session, experts from CyCognito and Panorays help you understand how to identify AI relationships, assess the risks they pose, and remediate vulnerabilities before they lead to an incident. You’ll learn.

Emerging Threat: Cisco Catalyst SD-WAN Authentication Bypass (CVE-2026-20127)

CVE-2026-20127 is a critical authentication bypass vulnerability affecting Cisco Catalyst SD-WAN Controller (vSmart) and Cisco Catalyst SD-WAN Manager (vManage). The flaw stems from improper validation within the control plane and management plane authentication mechanisms, allowing a remote, unauthenticated attacker to submit crafted requests that bypass standard authentication controls. Successful exploitation results in access to the system as a high-privileged internal user account.

Emerging Threat - Dell RecoverPoint for VMs Hardcoded Credential (CVE-2026-22769)

CVE-2026-22769 is a hardcoded credential vulnerability affecting Dell RecoverPoint for VMs, a disaster recovery orchestration platform used to manage replication and failover of virtualized workloads. The issue stems from static authentication credentials embedded within a product component. Because these credentials are not uniquely generated per deployment and cannot be changed by administrators, they introduce a structural authentication weakness.

Permission to Ignore: Leveraging the CTEM Framework to Focus on Real Risk

Security frameworks have always had a gap. They tell you to find vulnerabilities and fix them, but they’ve rarely provided a system to determine which ones actually matter before you tap into your most expensive resource: engineering time. CTEM changes the game by treating security as a continuous lifecycle rather than a series of silos.

Emerging Threat: CVE-2026-1731 - BeyondTrust Privileged Access Exposure Risk

CVE-2026-1731 is a vulnerability disclosed in products developed by BeyondTrust. At the time of writing, publicly available technical details regarding the root cause, vulnerable code paths, and exploitation prerequisites remain limited. Based on initial advisory information, the issue affects components involved in privileged access or remote access workflows, which are typically deployed to manage high-value credentials, session brokering, or secure administrative access to enterprise systems.