23rd March – Threat Intelligence Report
Strategische Zusammenfassung
Ubiquiti UniFi critical vulnerability directly affects company's network infrastructure; ScreenConnect flaw relevant to remote access security posture across managed IT services.
Volltext
Title: 23rd March – Threat Intelligence Report
URL Source: https://research.checkpoint.com/2026/23rd-march-threat-intelligence-report/
Published Time: 2026-03-23T13:38:09+00:00
Markdown Content: # 23rd March – Threat Intelligence Report - Check Point Research
* [CONTACT US](https://research.checkpoint.com/contact/) * [DISCLOSURE POLICY](https://research.checkpoint.com/disclosure-policy/) * [CHECKPOINT.COM](https://www.checkpoint.com/) * [UNDER ATTACK?](https://www.checkpoint.com/about-us/contact-incident-response/)
* [Latest Publications](https://research.checkpoint.com/latest-publications/) * [CPR Podcast Channel](https://research.checkpoint.com/cpr-podcast-channel/) * [AI Research](https://research.checkpoint.com/ai-research/) * [Web 3.0 Security](https://research.checkpoint.com/category/web3/) * [Intelligence Reports](https://research.checkpoint.com/intelligence-reports/) * [Resources](https://research.checkpoint.com/2026/23rd-march-threat-intelligence-report/) * [ThreatCloud AI](https://www.checkpoint.com/ai/) * [Threat Intelligence & Research](https://www.checkpoint.com/solutions/threat-intelligence-research/) * [Zero Day Protection](https://www.checkpoint.com/infinity/zero-day-protection/) * [Sandblast File Analysis](http://threatemulation.checkpoint.com/)
* [About Us](https://research.checkpoint.com/about-us/) * [SUBSCRIBE](https://research.checkpoint.com/subscription/)
SUBSCRIBE
## FILTER BY YEAR
* [2026](https://research.checkpoint.com/2026/) * [2025](https://research.checkpoint.com/2025/) * [2024](https://research.checkpoint.com/2024/) * [2023](https://research.checkpoint.com/2023/) * [2022](https://research.checkpoint.com/2022/) * [2021](https://research.checkpoint.com/2021/) * [2020](https://research.checkpoint.com/2020/) * [2019](https://research.checkpoint.com/2019/) * [2018](https://research.checkpoint.com/2018/) * [2017](https://research.checkpoint.com/2017/) * [2016](https://research.checkpoint.com/2016/)
# 23rd March – Threat Intelligence Report
March 23, 2026
https://research.checkpoint.com/2026/23rd-march-threat-intelligence-report/
For the latest discoveries in cyber research for the week of 23rd March, please download […]
[… 12,081 Zeichen — nächste Zone: keyword-dense paragraphs …]
* ConnectWise has[patched](https://www.bleepingcomputer.com/news/security/connectwise-patches-new-flaw-allowing-screenconnect-hijacking/) CVE-2026-3564, a critical cryptographic signature verification flaw in ScreenConnect, its remote access platform used by managed service providers and IT teams. The issue could let attackers use extracted machine keys to authenticate sessions without authorization and gain elevated privileges on affected instances * Ubiquiti has[addressed](https://cybernews.com/security/ubiquiti-unifi-network-application-critical-vulnerability/) CVE-2026-22557, a maximum-severity flaw in the UniFi Network Application used to manage access points, switches, and gateways. The unauthenticated path traversal bug affects version 10.1.85 and earlier and can let attackers access files, compromise accounts, and potentially seize control of underlying systems. * Zimbra [warns](https://cybersecuritynews.com/zimbra-vulnerability-exploited-attacks/) of active exploitation of CVE-2025-66376, a stored cross-site scripting flaw in Zimbra Collaboration Suite that was recently patched. Malicious emails can execute code when viewed in the Classic UI, exposing session cookies and mailbox data, while patched versions include 10.1.13 and 10.0.18, following warnings about real-world abuse. * GNU InetUtils telnetd is[affected](https://securityaffairs.com/189620/hacking/researchers-warn-of-unpatched-critical-telnetd-flaw-affecting-all-versions.html)by CVE-2026-32746, a CVSS 9.8 remote code execution flaw impacting all versions up to 2.7. Attackers can trigger the issue with a single Telnet connection without logging in, potentially gaining root control on exposed Linux, IoT, and industrial systems before a patch arrives.
* Check Point researchers have [analyzed](https://blog.checkpoint.com/research/telegrams-crackdown-in-2026-and-why-cyber-criminals-are-still-winning/) recent developments in the Telegram cybercrime scene, after the company had bolstered its moderation tools due to extensive criticism of allowing criminal behavior. Data shows that despite Telegram’s efforts, it is still the primary platform for cybercrime communication, with activity only growing.
* Check Point Research [highlighted](https://blog.checkpoint.com/research/the-agentic-era-arrives-how-ai-is-transforming-the-cyber-threat-landscape/) the key developments and major trends in […]
[… 11,359 Zeichen — nächste Zone: tail …]
#### Functional Cookies
- [x] Functional Cookies
These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers (such as service providers supporting website functionality or content) whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
#### Targeting Cookies
- [x] Targeting Cookies
These cookies may be set through our site by our advertising partners. They may be used to help deliver content and advertisements that are more relevant to your interests, including across different online services. They may use identifiers associated with your browser or device for this purpose. If you do not allow these cookies, you may receive less relevant advertising.
### Performance Cookies
Clear
- [x] checkbox label label
Apply Cancel
Consent Leg.Interest
- [x] checkbox label label
- [x] checkbox label label
- [x] checkbox label label
Reject All Confirm My Choices