This update window shows a sharper emphasis on exploited browser flaws, exposed workflow automation, and privileged cloud administration abuse. The most operationally relevant items were CISA's March 11 addition of n8n RCE to KEV, CISA's March 13 addition of two actively exploited Google Chrome flaws to KEV, continued financial-sector relevance of BeyondTrust Remote Support exploitation, and Unit 42 reporting that destructive actors are increasingly abusing identities and Microsoft Intune rather than relying only on custom wipers.
|
Threat level |
Most relevant risk |
Immediate management ask |
|
Date |
Theme |
What changed |
Bank relevance |
|
Mar 11 |
n8n added to KEV |
CISA added CVE-2025-68613, a critical n8n remote code execution issue, to the KEV catalog after evidence of active exploitation. |
Review any self-hosted or vendor-embedded workflow automation platforms tied to data movement, AI workflows, or internal APIs. |
|
Mar 13 |
Chrome zero-days |
CISA added CVE-2026-3909 and CVE-2026-3910 to KEV. Google issued emergency Chrome updates and noted exploitation in the wild. |
Prioritize browser patching and restart enforcement because browser access underpins Microsoft 365, admin portals, and vendor SaaS sessions. |
|
Window active |
BeyondTrust exploitation |
Unit 42 reported ongoing exploitation of CVE-2026-1731 in BeyondTrust Remote Support, including reconnaissance, account creation, webshell activity, C2, lateral movement, and data theft. |
Remote support and privileged access tooling remain management-plane risk; verify exposure and remediation status with urgency. |
|
Mar 12 / 16 |
Identity weaponization |
Unit 42 warned that Iran-aligned destructive operations are using phishing and Microsoft Intune administrative abuse, then described a broader shift from custom wipers to identity weaponization. |
Treat Entra, Intune, and privileged cloud administration as Tier 0 infrastructure and monitor for authenticated destructive actions. |
|
Mar 13 |
INTERPOL disruption |
Operation Synergia III removed more than 45,000 malicious IPs/servers and led to 94 arrests across 72 countries and territories. |
The scale confirms that phishing, malware, and ransomware infrastructure remains abundant even after public disruptions. |