Close Menu

    Stay Ahead with Exclusive Updates!

    Enter your email below and be the first to know what’s happening in the ever-evolving world of technology!

    What's Hot

    Zero-Day Alert: CISA Warns of Active Attacks on Microsoft SharePoint

    March 31, 2026

    Why Jensen Huang is Rebranding Data Centers as “Token Factories”

    March 31, 2026

    Computer Use: Anthropic’s Claude Can Now Literally Run Your Mac

    March 30, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter)
    PhronewsPhronews
    • Home
    • Big Tech & Startups

      Why Jensen Huang is Rebranding Data Centers as “Token Factories”

      March 31, 2026

      Computer Use: Anthropic’s Claude Can Now Literally Run Your Mac

      March 30, 2026

      Toaster on Wheels: Amazon’s Zoox Robotaxis Hit Miami and Austin

      March 30, 2026

      The Arm AGI CPU Threatening Intel and AMD

      March 30, 2026

      Project Sunrise: A Jeff Bezos’ Blue Origin Plan for AI Data Centers in Space

      March 28, 2026
    • Crypto

      Quantum Computing Advances Force Coinbase and Institutional Custodians to Rethink Crypto Security

      March 8, 2026

      AI Assisted Hacking Groups Target Crypto Firms With Multi-Layered Social Engineering

      February 18, 2026

      Global Crypto Regulations Expand as 2026 Begins With New Data Collection Frameworks and National Laws

      January 16, 2026

      Coinbase Bets on Stablecoin and On-Chain Growth as Key Market Drivers in 2026 Strategy

      January 10, 2026

      Tether Faces Ongoing Transparency Questions and Reserve Scrutiny Amid Massive Bitcoin Accumulation

      January 5, 2026
    • Gadgets & Smart Tech
      Featured

      AirPods Max 2: USB-C, Live Translation, and the H2 Upgrade

      By preciousMarch 26, 2026
      Recent

      AirPods Max 2: USB-C, Live Translation, and the H2 Upgrade

      March 26, 2026

      How ABB and Nvidia are Perfecting Industrial Robotics using AI Simulation

      March 20, 2026

      Neura Robotics Reaches €4B Valuation With Tether Backing

      March 12, 2026
    • Cybersecurity & Online Safety

      Zero-Day Alert: CISA Warns of Active Attacks on Microsoft SharePoint

      March 31, 2026

      3 Million Device Botnet Taken Down: What You Need to Know

      March 27, 2026

      Can AI Hack You Before Hackers Do? How RunSybil Is Changing Cyber Defense

      March 25, 2026

      Why Investors Just Put $120M Into Non-Human Identity Security — A Growing Cybersecurity Gap

      March 23, 2026

      Beyond the Firewall: Why Google’s Purchase of Wiz is a Wake-Up Call for Enterprise Security

      March 19, 2026
    PhronewsPhronews
    Home»Cybersecurity & Online Safety»Zero-Day Alert: CISA Warns of Active Attacks on Microsoft SharePoint
    Cybersecurity & Online Safety

    Zero-Day Alert: CISA Warns of Active Attacks on Microsoft SharePoint

    preciousBy preciousMarch 31, 2026No Comments
    Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Photo Credit: Timon Schneider/SOPA Images/LightRocket via Getty Images

    A critical vulnerability in Microsoft SharePoint Server is being actively exploited, and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging organizations to patch their systems immediately. 

    The flaw, tracked as CVE-2026-20963, was recently added to CISA’s Know Exploited Vulnerabilities catalog. It is a critical remote code execution (RCE) vulnerability tied to deserialization of untrusted data in on-premises SharePoint server. 

    What The Vulnerability Does 

    Successful exploitation of CVE-2026-20963 will allow threat actors without any privileges to achieve remote code execution on unpatched servers through a deserialization of untrusted data weakness. 

    In a network-based attack, an unauthenticated attacker can write and execute arbitrary code directly on the SharePoint Server. This means an attacker does not need a username, password, or any prior access to the system to cause serious damage.

    The flaw also works because SharePoint does not properly validate certain incoming data, which allows a remote attacker to inject and run arbitrary code on the server. Once that happens, an attacker can deploy malware, steal sensitive documents, establish persistent access, or even move deeper into the network through connected systems.

    The vulnerability is said to affect SharePoint Enterprises Server 2016, SharePoint Server 2019, and SharePoint Server Subscription Edition. 

    SharePoint Server 2007, 2010, and 2013 are also vulnerable but have reached end-of-support and no longer receive security updates, meaning organizations still running those versions need to upgrade to a supported release to block attacks. 

    Why This Matters

    This is a serious event because Microsoft SharePoint often sits at the center of corporate document sharing, internal workflows, and sensitive files. If attackers were to gain access, they can move from a single server to a wider part of the organization’s data and identity systems, which is why organizations are being told to treat the issue as urgent. 

    CISA’s alert recommends that organizations assess whether their internet-facing SharePoint server may be compromised and isolate the system until patching and threat hunting are complete.

    This alert shows how quickly a server-side flaw can become a broad security incident when attackers find a way around an earlier fix. 

    AI Is Changing Both Sides of the Cybersecurity Fight

    Artificial intelligence (AI) is now a factor in how these vulnerabilities get found, exploited, and defended against, and its influence is growing on both sides of the equation.

    IBM’s 2026 X-Force Threat Intelligence Index found a 44% increase in attacks that began with the exploitation of public-facing applications, driven in part by AI-enabled vulnerability discovery. The report also noted that attackers are using AI to speed up reconnaissance, analyze large datasets, and iterate on attack paths in real time.

    Google’s Threat Intelligence, through its Look What You Made Us Patch: 2025 Zero-Days in Review, has stated that it expects AI to fasten the process of reconnaissance, vulnerability discovery, and exploit development through 2026. This 2025 review tracked 90 zero-day vulnerabilities exploited in the wild, with 43 of those affecting enterprise products. The Microoft SharePoint flaw falls squarely into that enterprise category.

    On the defensive side, AI is also beginning to close some of the gap, although adoption remains slow. Many reports indicate that organizations that have adopted AI-assisted vulnerability management have reduced their remediation time to cyberattacks, otherwise or often measured as Mean Time to Remediate (MTTR).

    However, for most organizations today, AI remains an outside tool to existing processes rather than a default for vulnerability patching, as teams evaluate it cautiously especially given the risks associated with automated remediation.

    The net effect of this is a gap that continues to widen between well-resourced teams that are adopting AI-assisted defenses and organizations that are still running manual patch cycles against attackers who are not.

    AI-enabled vulnerability discovery Artificial Intelligence CISA Critical Infrastructure Protection CVE-2026-20963 flaw Microsoft Microsoft SharePoint Unauthenticated network-based attack Zero-Day Vulnerabilities
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    precious
    • LinkedIn

    I’m Precious Amusat, Phronews’ Content Writer. I conduct in-depth research and write on the latest developments in the tech industry, including trends in big tech, startups, cybersecurity, artificial intelligence and their global impacts. When I’m off the clock, you’ll find me cheering on women’s footy, curled up with a romance novel, or binge-watching crime thrillers.

    Related Posts

    Why Jensen Huang is Rebranding Data Centers as “Token Factories”

    March 31, 2026

    Computer Use: Anthropic’s Claude Can Now Literally Run Your Mac

    March 30, 2026

    The Arm AGI CPU Threatening Intel and AMD

    March 30, 2026

    Comments are closed.

    Top Posts

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 2025

    Coinbase Hack 2025: Everything we know so far.

    May 21, 2025
    Don't Miss
    Cybersecurity & Online Safety

    Zero-Day Alert: CISA Warns of Active Attacks on Microsoft SharePoint

    By preciousMarch 31, 2026

    A critical vulnerability in Microsoft SharePoint Server is being actively exploited, and the U.S. Cybersecurity…

    Why Jensen Huang is Rebranding Data Centers as “Token Factories”

    March 31, 2026

    Computer Use: Anthropic’s Claude Can Now Literally Run Your Mac

    March 30, 2026

    Toaster on Wheels: Amazon’s Zoox Robotaxis Hit Miami and Austin

    March 30, 2026
    Stay In Touch
    • Facebook
    • Twitter
    About Us
    About Us

    Evolving from Phronesis News, Phronews brings deep insight and smart analysis to the world of technology. Stay informed, stay ahead, and navigate tech with wisdom.
    We're accepting new partnerships right now.

    Email Us: info@phronews.com

    Facebook X (Twitter) Pinterest YouTube
    Our Picks
    Most Popular

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 2025
    © 2025. Phronews.
    • Home
    • About Us
    • Get In Touch
    • Privacy Policy
    • Terms and Conditions

    Type above and press Enter to search. Press Esc to cancel.