Cybersecurity Daily — Mar 11, 2026
Tuesday, March 11, 2026
The Big Picture
Patch Tuesday dropped alongside active exploitation of everything from FortiGate firewalls to Qualcomm phone chips, and a Russian intelligence unit debuted a shiny new spy toolkit — so "patch your stuff" doesn't begin to cover it. Meanwhile, AI crossed a quiet threshold: Anthropic's Claude found 22 Firefox vulnerabilities and wrote a working exploit for one, which is either the best news defenders have gotten in years or the worst, depending on who points it at your codebase next. If you act on one thing today, make it this: patch SQL Server, update your Android fleet, and check whether your FortiGate is already someone else's front door.
Today's Stories
Your SQL Server Just Got Very Interesting to Attackers
Every Patch Tuesday has a buried headline, and this month it's CVE-2026-21262 — a privilege escalation flaw affecting SQL Server versions from 2016 SP3 through 2025. An attacker with a low-level database login can promote themselves to sysadmin over the network, which is the database equivalent of a janitor handing themselves the CEO's keycard. It's one of two publicly disclosed zero-days in Microsoft's 79-fix batch, alongside CVE-2026-26127, a .NET denial-of-service bug that lets unauthenticated attackers crash services remotely.
Also worth flagging while you're triaging: CVE-2026-21536, a remote-code-execution flaw in Microsoft's Devices Pricing Program that CrowdStrike and Malwarebytes both flag as deserving immediate attention, and CVE-2026-26144, a cross-site scripting bug in Excel that could let attackers weaponize Copilot to exfiltrate data — a preview of how embedded AI features create attack surfaces that didn't exist two years ago.
As of March 11, 2026, neither zero-day has confirmed active exploitation yet, but the reverse-engineering clock is ticking. Patch CVE-2026-21262 now, especially if your SQL Server is reachable from anything other than localhost.
Someone Turned 14,000 Home Routers Into a Hidden Criminal Highway
A newly discovered botnet called KadNap is hijacking ASUS routers and other edge devices, converting them into proxies that route criminal traffic through your internet connection — making attacks look like they originate from legitimate homes and businesses. Lumen's Black Lotus Labs team says the malware has infected over 14,000 devices since first appearing in August 2025 (as of March 11, 2026).
KadNap uses the DHT protocol — the same peer-to-peer technology behind BitTorrent — to locate command-and-control servers, which can make traditional blocklists largely useless. If you have an ASUS router at home or in a branch office, update its firmware today and disable remote management — that's the most common entry point, and this one is flying under the mainstream radar.
Your FortiGate Firewall May Already Be Someone's Front Door
The device whose entire job is keeping attackers out is increasingly the thing they walk through first. SentinelOne's DFIR team reports that throughout early 2026, they responded to multiple incidents where FortiGate firewalls were compromised as initial footholds — attackers were already moving laterally through internal networks before anyone noticed.
The attack paths include CVE-2025-59718 and CVE-2025-59719 (SSO signature validation flaws granting unauthenticated admin access), CVE-2026-24858 (FortiCloud SSO bypass), and plain old weak credentials. The real prize in each case: extracted service account credentials that become direct keys to Active Directory, the system controlling who can access what inside most corporate networks. Fortinet has issued patches. Apply them, rotate service account credentials, and audit your SSO configuration today.
Claude Found 22 Firefox Bugs — Then Wrote a Working Exploit for One
Anthropic's Frontier Red Team pointed Claude at Firefox's codebase, and it found its first serious vulnerability within about 20 minutes. The final count: over 100 bugs flagged, 22 receiving CVE assignments, 14 classified as high severity by Mozilla. Then the team tested whether Claude could go further — and it successfully wrote a working exploit for CVE-2026-2796 (now patched). The exploit only worked in a stripped-down environment without a sandbox, so this isn't evidence that AI is hacking browsers in the wild. But the trajectory is the signal.
Anthropic notes Claude's success rate on the Cybench security evaluation doubled in six months, then doubled again in four months on Cybergym. That's not linear improvement. Mozilla's engineers drew the implication explicitly: "there is likely a substantial backlog of now-discoverable bugs across widely deployed software." The question isn't whether this capability helps defenders — it clearly does. The question is what happens when it's pointed at codebases with fewer resources than Mozilla's.
⚡ What Most People Missed
- The AI agent plugin store is already a supply-chain attack surface. The ClawHavoc campaign infiltrated over 1,200 malicious skills into the OpenClaw marketplace in January–February 2026. If your organization lets employees connect third-party plugins to AI agents with internal system access, that's an active attack surface today — think npm supply-chain attacks, but the malicious package can autonomously take actions.
- A senior DFIR professional just published their first forensic audit of an AI system — and walked through exactly what logs didn't exist. The core problem: AI systems don't leave the audit trails incident responders are trained to look for. They had to preserve and hash model weights, audit platform code, and reconstruct decision pathways in a sandbox. No patch for this one — it's a gap in institutional practice.
- CISA added SolarWinds, Ivanti, and Workspace ONE flaws to the KEV catalog — all actively exploited right now. The Ivanti EPM bug (CVE-2026-1603) has a March 23 federal remediation deadline set by CISA. If you run any of these platforms, treat them like they're already being probed in your environment.
- Diffusion models can now generate attack traffic that's statistically indistinguishable from legitimate traffic to ML-based intrusion detection systems. A new arXiv paper called NetDiffuser reported worrying success rates against lab-tested detectors. If your confidence rests on "we moved to ML-based detection," that assumption needs revisiting.
- Ericsson disclosed a third-party breach exposing employee and customer contact details. Core telecom operations weren't impacted, but names and contact info are perfect raw material for targeted phishing and SIM-swap campaigns. Good prompt to re-check which vendors hold your data and how fast they're required to tell you about a breach.
📅 What to Watch
- If CVE-2026-21262 (SQL Server privilege escalation) hits CISA's KEV catalog this week, it means exploitation is confirmed in the wild and emergency patching timelines replace standard cycles — expect automated scanning to follow within days.
- If FortiGate compromise reports expand beyond Ukraine and defense contractors, the campaign has gone opportunistic — expect harvested credentials and extracted service-account tokens to be replayed against Active Directory and cloud services in unrelated sectors.
- If Google issues a follow-up advisory specifically for CVE-2026-21385 (the Qualcomm display chip zero-day), it indicates exploitation is expanding — expect OEM firmware updates and carrier pushes, and prioritize devices with vendor-signed bootloaders.
- If Ericsson or regulators later reveal that telecom network data (not just HR/CRM records) were touched, the risk shifts from phishing to potential compromise of call metadata and customer authentication.
- If proof-of-concepts like BlackMamba or NetDiffuser show up in criminal toolkits, expect a surge in polymorphic network-stage payloads that bypass signature and ML detectors, forcing defenders to rely on endpoint telemetry and anomalous credential-use detection.
A Russian spy unit wrapping decade-old code in cloud infrastructure like a Cold War artifact in a Supreme hoodie; 14,000 home routers quietly moonlighting as criminal getaway cars; and an AI that found its first browser bug faster than most people find their morning coffee. Somewhere, a DFIR analyst is staring at an AI system's empty log files the way a detective stares at a crime scene that's been wiped clean — except nobody told them the building doesn't have security cameras.
Stay patched, stay skeptical. ✌️