This week’s threat landscape reveals attackers pressing on multiple simultaneous fronts — actively exploited Chrome zero-days, a 72-extension supply chain compromise targeting developers, CISA’s latest KEV additions, and emerging AI agent vulnerabilities. The pattern is not coincidental: adversaries are targeting the tools developers and security teams depend on daily, compressing the window between disclosure and exploitation. Organizations that treat these as separate incidents miss the operational picture.
Two actively exploited Chrome vulnerabilities dominate the browser threat surface this week. CVE-2026-3909 is an out-of-bounds write in Chrome’s Skia 2D graphics library, and CVE-2026-3910 is an inappropriate implementation flaw in the V8 JavaScript and WebAssembly engine, both rated high-severity by Google (The Hacker News). CISA’s concurrent KEV update flagging four additional flaws under active exploitation reinforces a recurring pattern: disclosure and weaponization now happen in parallel, not sequentially. Security teams still treating patch cycles as planned maintenance windows are working on attacker timelines, not their own.
The GlassWorm campaign represents a more structurally dangerous threat than a standard malware distribution. Attackers compromised 72 Open VSX extensions by abusing extensionPack and extensionDependencies metadata fields — packaging relationships developers trust — to transform benign-looking extensions into transitive delivery vehicles (Socket). A package can appear clean at install time and begin pulling malicious payloads only after trust is established through later updates. This means signature-based detection at install time is insufficient. Developer workstations are an underdefended network entry point, and this campaign explicitly targets that gap by mimicking linters, formatters, code runners, and AI coding assistant integrations like those for Clade Code and Google products.
The ClickFix macOS vector adds a social engineering layer that bypasses technical controls entirely. Three distinct campaigns used fake AI tool installers — including an OpenAI Atlas browser lure — to convince users to copy and execute obfuscated terminal commands, deploying the MacSync infostealer (Sophos, Jamf Threat Labs). No exploit required. The attack chain terminates with user execution, which means endpoint detection must catch post-execution behavior, not pre-execution indicators. MacOS environments in enterprise settings are frequently less instrumented than Windows endpoints, and threat actors know it.
AI agent security moves from theoretical concern to active advisory. China’s CNCERT issued a warning about OpenClaw (formerly Clawdbot and Moltbot), an open-source autonomous AI agent with weak default security configurations and privileged system access. The specific risk is indirect prompt injection (IDPI) — also called cross-domain prompt injection (XPIA) — where malicious instructions embedded in a web page cause the agent to exfiltrate sensitive data without any direct interaction with the LLM by the attacker (The Hacker News). Organizations deploying autonomous AI agents for security operations, code review, or workflow automation should treat any agent with system-level access as a high-value target requiring explicit trust boundaries and output validation.
INTERPOL’s takedown of 45,000 malicious IPs across 72 countries, resulting in 94 arrests, demonstrates that infrastructure disruption operations can scale globally (INTERPOL via The Hacker News). However, the Storm-2561 VPN credential theft campaign — using SEO poisoning to distribute trojanized VPN clients — illustrates that attacker infrastructure regenerates quickly and that initial access via trusted-looking software remains a durable technique. The Android 17 Advanced Protection Mode update restricting Accessibility API access to non-accessibility apps is a meaningful platform-level countermeasure against a class of Android malware that has persisted for years, but it is opt-in and targets high-risk users — enterprise mobile device policy should evaluate whether AAPM enrollment makes sense for privileged user devices.
- Patch Chrome immediately: CVE-2026-3909 (Skia out-of-bounds write) and CVE-2026-3910 (V8 inappropriate implementation) are both actively exploited — verify browser versions across managed endpoints and confirm auto-update policies are enforced.
- Audit Open VSX extension installations: 72 malicious extensions identified since January 31, 2026 — review installed extensions on developer workstations, restrict extension installation to approved sources, and monitor for unexpected network calls from IDE processes.
- Treat macOS endpoints as active targets: ClickFix campaigns require no exploit — detection must focus on terminal command execution patterns, unexpected process spawning from browser-launched processes, and MacSync IOCs from Sophos and Jamf Threat Labs.
- Evaluate AI agent deployments for prompt injection exposure: any autonomous agent with system access and web browsing capability is a potential IDPI vector — implement output validation, restrict agent permissions to least-privilege, and monitor for unexpected data exfiltration.
- Enable Android Advanced Protection Mode on high-risk devices: AAPM in Android 17 Beta 2 blocks Accessibility API misuse by non-accessibility apps — assess enrollment for executive, IT admin, and security team devices as a risk reduction measure.
- Verify KEV remediation coverage: CISA’s latest KEV additions require tracking against internal asset inventory — confirm all four newly flagged CVEs are remediated or mitigated within the required federal timeline, and treat those timelines as ceiling, not floor, for enterprise response.