CRITICAL 4 min read 23 May 2026

Trend Micro Apex One CVE-2026-34926 - Exploited Zero-Day Leads Patch Queue

Trend Micro Apex One CVE-2026-34926 is today's active-exploitation priority, with Cisco Secure Workload CVE-2026-20223 close behind because the reviewed data gives it a CVSS 10.0 rating. Drupal, Kali365, Ubiquiti and lower-confidence context items add owner-routed follow-up work.

Key findings
01
Finding: Cisco Secure Workload CVE-2026-20223 receives a CVSS 10.0 patch
CRITICAL
[High] Confidence: High The source set says Cisco patched CVE-2026-20223 in Secure Workload, a REST API flaw with a CVSS 10.0 score. The reviewed data does not report active exploitation, but maximum severity means exposed or business-critical deployments should not wait for exploitation to be observed.
02
Finding: Trend Micro Apex One CVE-2026-34926 is exploited in the wild
HIGH
[High] Confidence: High SecurityWeek and BleepingComputer report active exploitation of Trend Micro Apex One CVE-2026-34926, citing SecurityWeek and BleepingComputer. Trend Micro patches are available, and the reviewed material makes this the clearest immediate patching priority in today's queue.
03
Finding: Drupal SQL injection reporting moves into attack-targeting watch
MEDIUM
[Medium] Confidence: Medium BleepingComputer reporting says BleepingComputer reporting that a critical Drupal SQL injection flaw is being targeted in attacks. The source set does not provide a CVE, affected version detail, or vendor-primary advisory in the visible material, so the finding should be handled with care.
04
Finding: Kali365 phishing-as-a-service targets Microsoft 365 users
MEDIUM
[Medium] Confidence: Medium The reviewed brief cites The Record and CyberScoop on an FBI warning about Kali365, a phishing-as-a-service operation targeting Microsoft 365 users. The main risk is identity compromise, especially where users can be tricked into giving up credentials or session material.
05
Finding: Ubiquiti patches three maximum-severity UniFi OS vulnerabilities
MEDIUM
[Medium] Confidence: Medium BleepingComputer reporting says Ubiquiti patched three maximum-severity UniFi OS vulnerabilities. The source data available here does not provide CVEs, affected versions or active-exploitation evidence.
06
Finding: VPN takedown disrupts infrastructure reportedly used by 25 ransomware groups
LOW
[Low] Confidence: Low The source material includes a report that law enforcement dismantled a VPN service said to be used by 25 ransomware groups. The available source matrix does not provide an external URL for this item, so it should remain context rather than a control-changing headline.
07
Finding: Vietnamese ministerial breach reports remain low-detail but notable
LOW
[Low] Confidence: Low The source material reports breaches of two Vietnamese ministerial systems, but available detail is limited. It does not identify the exploited vulnerability, malware family, confirmed actor, or direct exposure path in the available material.

Trend Micro Apex One CVE-2026-34926 - Exploited Zero-Day Leads Patch Queue

Finding: Trend Micro Apex One CVE-2026-34926 is exploited in the wild

Confidence: High

SecurityWeek and BleepingComputer report active exploitation of Trend Micro Apex One CVE-2026-34926, citing SecurityWeek and BleepingComputer. Trend Micro patches are available, and the reviewed material makes this the clearest immediate patching priority in today's queue.

The source set does not provide actor attribution or a detailed attack path, so response teams should avoid guessing at campaign scope. The practical action is still direct: identify Apex One deployments, confirm patch status, and check for delayed endpoint-security updates or management servers that sit outside normal maintenance windows.

Finding: Cisco Secure Workload CVE-2026-20223 receives a CVSS 10.0 patch

Confidence: High

The source set says Cisco patched CVE-2026-20223 in Secure Workload, a REST API flaw with a CVSS 10.0 score. The reviewed data does not report active exploitation, but maximum severity means exposed or business-critical deployments should not wait for exploitation to be observed.

This is an exposure and patch-assurance task. Asset owners should confirm whether Secure Workload is deployed, verify version and patch state, review REST API exposure, and make sure access controls around administrative paths match the product's role in the environment.

Finding: Drupal SQL injection reporting moves into attack-targeting watch

Confidence: Medium

BleepingComputer reporting says BleepingComputer reporting that a critical Drupal SQL injection flaw is being targeted in attacks. The source set does not provide a CVE, affected version detail, or vendor-primary advisory in the visible material, so the finding should be handled with care.

The useful client action is to inventory Drupal sites, prioritise internet-facing instances, and verify current patch levels against Drupal security advisories. Do not turn this into a CVE-specific claim unless the missing identifier is confirmed through vendor or canonical sources.

Finding: Kali365 phishing-as-a-service targets Microsoft 365 users

Confidence: Medium

The reviewed brief cites The Record and CyberScoop on an FBI warning about Kali365, a phishing-as-a-service operation targeting Microsoft 365 users. The main risk is identity compromise, especially where users can be tricked into giving up credentials or session material.

Microsoft 365 owners should reinforce MFA, review conditional-access policies, check suspicious sign-in patterns, and brief helpdesks on likely phishing themes. Awareness training alone is too weak if token theft or adversary-in-the-middle workflows are in play, so identity telemetry matters.

Finding: VPN takedown disrupts infrastructure reportedly used by 25 ransomware groups

Confidence: Low

The source material includes a report that law enforcement dismantled a VPN service said to be used by 25 ransomware groups. The available source matrix does not provide an external URL for this item, so it should remain context rather than a control-changing headline.

The decision value is directional. Criminal infrastructure disruption can alter campaign routing, but defenders should not infer reduced ransomware risk from one takedown. Keep ransomware logging, backup checks and remote-access monitoring in place.

Finding: Vietnamese ministerial breach reports remain low-detail but notable

Confidence: Low

The source material reports breaches of two Vietnamese ministerial systems, but available detail is limited. It does not identify the exploited vulnerability, malware family, confirmed actor, or direct exposure path in the available material.

This belongs in geopolitical and public-sector watch rather than immediate client remediation. If more technical evidence appears, such as IOCs, exploited products or official notices, it can move from context into action.

Finding: Ubiquiti patches three maximum-severity UniFi OS vulnerabilities

Confidence: Medium

BleepingComputer reporting says Ubiquiti patched three maximum-severity UniFi OS vulnerabilities. The source data available here does not provide CVEs, affected versions or active-exploitation evidence.

Network owners should still check UniFi OS versions, prioritise cloud-key or controller deployments with administrative exposure, and apply vendor updates where available. The absence of CVEs in the reviewed brief is a reason to bound the claim, not a reason to ignore the patch queue.

Context: ExifTool CVE-2026-3102 is unchanged

Confidence: Low

ExifTool CVE-2026-3102 remains a Mac image-processing concern in the stable watch list. It was already covered and has no fresh material delta today.

Keep it in maintenance planning for systems that process untrusted images, especially creative, legal, marketing and intake workflows. It should not displace today's active-exploitation and CVSS 10.0 patch items.

Why This Matters

Today's queue is split between urgent patch verification and bounded watch items. Trend Micro Apex One has confirmed exploitation in the reviewed material. Cisco Secure Workload has a CVSS 10.0 patch. Drupal and Ubiquiti require fast owner checks, but the visible evidence does not support invented CVEs or exploitation claims.

The lower-confidence items still have value, but they need the right label. Kali365 belongs with Microsoft 365 identity controls. The VPN takedown and Vietnamese ministry reports are context until more technical evidence arrives.

  • Recommended Actions
  • Patch or verify Trend Micro Apex One coverage for CVE-2026-34926, including management servers and delayed maintenance groups.
  • Confirm Cisco Secure Workload exposure and patch state for CVE-2026-20223.
  • Inventory Drupal and UniFi OS deployments, then validate patch status against vendor guidance.
  • Review Microsoft 365 sign-in telemetry, MFA enforcement and conditional-access controls for Kali365-style phishing risk.
  • Keep low-source-detail breach and takedown items in watch status until IOCs, official notices or product-specific evidence appear.

All findings grounded in a13e intelligence sweeps through 05:30 UTC 23 May 2026.

apexoneciscocve-2026-20223cve-2026-34926drupalkali365microsoft365trendmicro

Act on this brief

Map detection coverage gaps for the techniques above, or generate Sigma rules from the named CVEs.