Top stories.
- CISA warns of critical flaws affecting PTC and Langflow products.
- Phishing activity surges amid war in Iran.
- Alleged RedLine infostealer developer faces thirty years in a US prison.
CISA warns of critical flaws affecting PTC and Langflow products.
The US Cybersecurity and Infrastructure Security Agency (CISA) has flagged a critical remote code execution vulnerability (CVE-2026-4681) affecting PTC’s Windchill product lifecycle management software. The industrial software maker says it hasn't observed exploitation affecting its customers, although a patch is not yet available.
In Germany, Heise reports that the Federal Criminal Police Office (BKA) sent officers to visit companies in person to warn them about the vulnerability. In some cases, officers woke up administrators at their private residences in the middle of the night. While the vulnerability is serious, it's unclear what prompted such an urgent response from the police, which Heise describes as "unprecedented." PTC urges customers to immediately implement mitigations until patches are available, prioritizing publicly accessible systems.
Separately, CISA has also warned of active exploitation of a critical flaw affecting the Langflow framework for building AI agents, BleepingComputer reports. The vulnerability (CVE-2026-33017) is a code injection flaw that can lead to remote code execution. Researchers at Sysdig observed exploitation of the flaw about twenty hours after its disclosure on March 17th. The researchers state, "Attackers built working exploits directly from the advisory description and began scanning the internet for vulnerable instances. Exfiltrated information included keys and credentials, which provided access to connected databases and potential software supply chain compromise." Users are advised to update Langflow as soon as possible and audit their systems for compromise.

