CTI Swarm
Zurück zu allen Deep Dives
CHECK POINT RESEARCH

23rd March – Threat Intelligence Report

Strategische Zusammenfassung

Ubiquiti UniFi critical vulnerability directly affects company's network infrastructure; ScreenConnect flaw relevant to remote access security posture across managed IT services.

Volltext

Title: 23rd March – Threat Intelligence Report

URL Source: https://research.checkpoint.com/2026/23rd-march-threat-intelligence-report/

Published Time: 2026-03-23T13:38:09+00:00

Markdown Content: # 23rd March – Threat Intelligence Report - Check Point Research

* [CONTACT US](https://research.checkpoint.com/contact/) * [DISCLOSURE POLICY](https://research.checkpoint.com/disclosure-policy/) * [CHECKPOINT.COM](https://www.checkpoint.com/) * [UNDER ATTACK?](https://www.checkpoint.com/about-us/contact-incident-response/)

* [Latest Publications](https://research.checkpoint.com/latest-publications/) * [CPR Podcast Channel](https://research.checkpoint.com/cpr-podcast-channel/) * [AI Research](https://research.checkpoint.com/ai-research/) * [Web 3.0 Security](https://research.checkpoint.com/category/web3/) * [Intelligence Reports](https://research.checkpoint.com/intelligence-reports/) * [Resources](https://research.checkpoint.com/2026/23rd-march-threat-intelligence-report/) * [ThreatCloud AI](https://www.checkpoint.com/ai/) * [Threat Intelligence & Research](https://www.checkpoint.com/solutions/threat-intelligence-research/) * [Zero Day Protection](https://www.checkpoint.com/infinity/zero-day-protection/) * [Sandblast File Analysis](http://threatemulation.checkpoint.com/)

* [About Us](https://research.checkpoint.com/about-us/) * [SUBSCRIBE](https://research.checkpoint.com/subscription/)

SUBSCRIBE

## FILTER BY YEAR

* [2026](https://research.checkpoint.com/2026/) * [2025](https://research.checkpoint.com/2025/) * [2024](https://research.checkpoint.com/2024/) * [2023](https://research.checkpoint.com/2023/) * [2022](https://research.checkpoint.com/2022/) * [2021](https://research.checkpoint.com/2021/) * [2020](https://research.checkpoint.com/2020/) * [2019](https://research.checkpoint.com/2019/) * [2018](https://research.checkpoint.com/2018/) * [2017](https://research.checkpoint.com/2017/) * [2016](https://research.checkpoint.com/2016/)

# 23rd March – Threat Intelligence Report

March 23, 2026

https://research.checkpoint.com/2026/23rd-march-threat-intelligence-report/

For the latest discoveries in cyber research for the week of 23rd March, please download […]

[… 12,081 Zeichen — nächste Zone: keyword-dense paragraphs …]

* ConnectWise has[patched](https://www.bleepingcomputer.com/news/security/connectwise-patches-new-flaw-allowing-screenconnect-hijacking/) CVE-2026-3564, a critical cryptographic signature verification flaw in ScreenConnect, its remote access platform used by managed service providers and IT teams. The issue could let attackers use extracted machine keys to authenticate sessions without authorization and gain elevated privileges on affected instances * Ubiquiti has[addressed](https://cybernews.com/security/ubiquiti-unifi-network-application-critical-vulnerability/) CVE-2026-22557, a maximum-severity flaw in the UniFi Network Application used to manage access points, switches, and gateways. The unauthenticated path traversal bug affects version 10.1.85 and earlier and can let attackers access files, compromise accounts, and potentially seize control of underlying systems. * Zimbra [warns](https://cybersecuritynews.com/zimbra-vulnerability-exploited-attacks/) of active exploitation of CVE-2025-66376, a stored cross-site scripting flaw in Zimbra Collaboration Suite that was recently patched. Malicious emails can execute code when viewed in the Classic UI, exposing session cookies and mailbox data, while patched versions include 10.1.13 and 10.0.18, following warnings about real-world abuse. * GNU InetUtils telnetd is[affected](https://securityaffairs.com/189620/hacking/researchers-warn-of-unpatched-critical-telnetd-flaw-affecting-all-versions.html)by CVE-2026-32746, a CVSS 9.8 remote code execution flaw impacting all versions up to 2.7. Attackers can trigger the issue with a single Telnet connection without logging in, potentially gaining root control on exposed Linux, IoT, and industrial systems before a patch arrives.

* Check Point researchers have [analyzed](https://blog.checkpoint.com/research/telegrams-crackdown-in-2026-and-why-cyber-criminals-are-still-winning/) recent developments in the Telegram cybercrime scene, after the company had bolstered its moderation tools due to extensive criticism of allowing criminal behavior. Data shows that despite Telegram’s efforts, it is still the primary platform for cybercrime communication, with activity only growing.

* Check Point Research [highlighted](https://blog.checkpoint.com/research/the-agentic-era-arrives-how-ai-is-transforming-the-cyber-threat-landscape/) the key developments and major trends in […]

[… 11,359 Zeichen — nächste Zone: tail …]

#### Functional Cookies

- [x] Functional Cookies

These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers (such as service providers supporting website functionality or content) whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.

#### Targeting Cookies

- [x] Targeting Cookies

These cookies may be set through our site by our advertising partners. They may be used to help deliver content and advertisements that are more relevant to your interests, including across different online services. They may use identifiers associated with your browser or device for this purpose. If you do not allow these cookies, you may receive less relevant advertising.

### Performance Cookies

Clear

- [x] checkbox label label

Apply Cancel

Consent Leg.Interest

- [x] checkbox label label

- [x] checkbox label label

- [x] checkbox label label

Reject All Confirm My Choices