Loading…

Whats The Hax?

Daily intelligence on threats, breaches, and defenders

Latest
The Record from Recorded Future NewsNorth Korean hackers targeted ethnic Koreans in China with Android ‘BirdCall’ malwareLatest news10 trillion downloads are crushing open-source repositories - here's what they're doing about itLatest newsGet Amazon Prime for 6 months totally free if you're age 18-24 - here's howSecurityWeekSophisticated Quasar Linux RAT Targets Software DeveloperscybersecurityI was hacked due to sim card spoofingSecurelistWebsites with an undefined trust level: avoiding the trapBleepingComputerPalo Alto Networks warns of firewall RCE zero-day exploited in attackscybersecurityChrome is quietly installing a 4GB AI model on your deviceThe Hacker NewsGoogle's Android Apps Get Public Verification to Stop Supply Chain AttacksLatest newsThe best 40-inch TVs of 2026: Expert tested and reviewedMalware Analysis & ReportsDiscord bot C2 infrastructureMSRC Security Update GuideCVE-2026-7598 libssh2 userauth.c userauth_password integer overflowMSRC Security Update GuideCVE-2026-34003 Xorg: xwayland: x.org x server: information exposure and denial of service via out-of-bounds memory accessMSRC Security Update GuideCVE-2026-33999 Xorg: xwayland: x.org x server: denial of service via integer underflow in xkb compatibility map handlingMSRC Security Update GuideCVE-2026-34001 Xorg: xwayland: x.org x server: use-after-free vulnerability leads to server crash and potential memory corruptionMSRC Security Update GuideCVE-2026-41066 lxml: Default configuration of iterparse() and ETCompatXMLParser() allows XXE to local filesMSRC Security Update GuideCVE-2026-41205 Mako: Path traversal via double-slash URI prefix in TemplateLookupThe Hacker NewsWindows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPsSecurityWeekGovernment, Scientific Entities Hit via Daemon Tools Supply Chain AttackFor [Blue|Purple] Teams in Cyber DefenceIranian-Nexus Operation Against Oman's Government: 12 Ministries Hit and 26,000 Citizen Records ExposedThe Record from Recorded Future NewsNorth Korean hackers targeted ethnic Koreans in China with Android ‘BirdCall’ malwareLatest news10 trillion downloads are crushing open-source repositories - here's what they're doing about itLatest newsGet Amazon Prime for 6 months totally free if you're age 18-24 - here's howSecurityWeekSophisticated Quasar Linux RAT Targets Software DeveloperscybersecurityI was hacked due to sim card spoofingSecurelistWebsites with an undefined trust level: avoiding the trapBleepingComputerPalo Alto Networks warns of firewall RCE zero-day exploited in attackscybersecurityChrome is quietly installing a 4GB AI model on your deviceThe Hacker NewsGoogle's Android Apps Get Public Verification to Stop Supply Chain AttacksLatest newsThe best 40-inch TVs of 2026: Expert tested and reviewedMalware Analysis & ReportsDiscord bot C2 infrastructureMSRC Security Update GuideCVE-2026-7598 libssh2 userauth.c userauth_password integer overflowMSRC Security Update GuideCVE-2026-34003 Xorg: xwayland: x.org x server: information exposure and denial of service via out-of-bounds memory accessMSRC Security Update GuideCVE-2026-33999 Xorg: xwayland: x.org x server: denial of service via integer underflow in xkb compatibility map handlingMSRC Security Update GuideCVE-2026-34001 Xorg: xwayland: x.org x server: use-after-free vulnerability leads to server crash and potential memory corruptionMSRC Security Update GuideCVE-2026-41066 lxml: Default configuration of iterparse() and ETCompatXMLParser() allows XXE to local filesMSRC Security Update GuideCVE-2026-41205 Mako: Path traversal via double-slash URI prefix in TemplateLookupThe Hacker NewsWindows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPsSecurityWeekGovernment, Scientific Entities Hit via Daemon Tools Supply Chain AttackFor [Blue|Purple] Teams in Cyber DefenceIranian-Nexus Operation Against Oman's Government: 12 Ministries Hit and 26,000 Citizen Records Exposed

By Source

Feeds organized so you can skim by site.

Density Sort
LN
Latest news
1h ago · 20 items
10 trillion downloads are crushing open-source repositories - here's what they're doing about it 1h ago Companies are treating these repositories like content delivery networks - now the Linux Foundation and colleagues are saying enough is enough. Here's the plan. Get Amazon Prime for 6 months totally free if you're age 18-24 - here's how 1h ago Amazon's Prime for Young Adults plan gets college students and other young people a big break on the membership. Here's what to know. The best 40-inch TVs of 2026: Expert tested and reviewed 1h ago We tested and compared the best 40-inch class TVs from brands like Samsung, Hisense, and more to help you find the right fit for your space. Your job search is getting riskier, says LinkedIn - 9 ways to tell real listings from scams 6h ago One in three job recruiters has been impersonated by scammers, according to a new LinkedIn survey. Here's what to look out for and how to stay safe in your search. All Linux gamers should take the latest Bazzite release seriously - here's why 8h ago Want the best possible out-of-the-box gaming experience on Linux? The latest Bazzite distro delivers. Fedora 44 made me forget I was using Linux - in the best way 9h ago The latest release from the Fedora Project is now available, and it includes a long list of refinements that make this one of the best versions yet. This weird Pixel feature is one of my favorite tools - too bad Google may remove it soon 13h ago Leaks hint that the next Pixel lineup will lose the thermometer for "Pixel Glow" LEDs I'm backing up my Samsung Messages before it's too late - 2 free and easy methods 15h ago Your texts don't have to disappear when the app gets shut down in July. Here's how to back them up. Kindles are on sale right now - these are the models I recommend most 15h ago Amazon has some sneaky Kindle deals live ahead of Mother's Day weekend, including the Kindle Paperwhite and Colorsoft. Here are our favorites. Samsung Galaxy S26 Ultra vs. iPhone 17 Pro Max: I use both phones daily, and this one's better 16h ago Samsung's latest flagship phone offers some impressive and unique features, but how does it compare to Apple's finest?
20 loaded
SE
SecurityWeek
1h ago · 10 items
CY
cybersecurity
1h ago · 20 items
20 loaded
SE
Securelist
1h ago · 10 items
Websites with an undefined trust level: avoiding the trap 1h ago We explain what suspicious websites are and how to distinguish a safe site from a fraudulent one. A new category in Kaspersky solutions: we’re sharing global statistics on untrusted site detection. “Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security 2d ago Kaspersky expert breaks down a new phishing scheme that uses the Amazon SES cloud email service. Let’s look at some examples to see how you can tell a phishing email from a real one. Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India 6d ago The Silver Fox group is targeting companies in Russia and India by impersonating tax authorities to distribute ValleyRAT and the new ABCDoor backdoor. PhantomRPC: A new privilege escalation technique in Windows RPC 12d ago Kaspersky researcher discovered a vulnerability in RPC architecture that enables an attacker to create a fake RPC server and escalate their privileges. FakeWallet crypto stealer spreading through iOS apps in the App Store 16d ago In March 2026, we uncovered more than twenty phishing apps in the Apple App Store masquerading as popular crypto wallets. Threat landscape for industrial automation systems in Q4 2025 20d ago The report contains industrial threat statistics for Q4 2025. It covers various infection vectors and malware types, as well as regional statistics and statistics by industry. JanelaRAT: a financial threat targeting users in Latin America 23d ago Kaspersky GReAT experts describe the latest JanelaRAT campaign detailing infection chain and malware functionality updates. The long road to your crypto: ClipBanker and its marathon infection chain 27d ago Threat actors are distributing a Trojan disguised as Proxifier software; through a multi-stage infection chain, it delivers ClipBanker – malware that replaces cryptocurrency wallet addresses in the clipboard. Financial cyberthreats in 2025 and the outlook for 2026 28d ago In this report, Kaspersky experts share their insights into the 2025 financial threat landscape, including regional statistics and trends in phishing, PC malware, and infostealers. A laughing RAT: CrystalX combines spyware, stealer, and prankware features 35d ago Kaspersky researchers analyze a new CrystalX RAT distributed as MaaS and featuring extensive spyware, stealer, and prankware capabilities.
BL
BleepingComputer
1h ago · 15 items
Palo Alto Networks warns of firewall RCE zero-day exploited in attacks 1h ago Palo Alto Networks warned customers today that a critical-severity unpatched vulnerability in the PAN-OS User-ID Authentication Portal is being exploited in attacks. New stealthy Quasar Linux malware targets software developers 12h ago A previously undocumented Linux implant named Quasar Linux (QLNX) is targeting developers' systems with a mix of rootkit, backdoor, and credential-stealing capabilities. Instructure hacker claims data theft from 8,800 schools, universities 12h ago The hacker behind a breach at education technology giant Instructure claims to have stolen 280 million data records for students and staff from 8,809 colleges, school districts, and online education platforms. DAEMON Tools trojanized in supply-chain attack to deploy backdoor 14h ago Hackers trojanized installers for the DAEMON Tools software and since April 8, delivered a backdoor to thousands of systems that downloaded the product from the official website. Student hacked Taiwan high-speed rail to trigger emergency brakes 16h ago A 23-year-old university student in Taiwan was arrested for interfering with the TETRA communication system used by the country's high-speed railway network (THSR). FTC to ban data broker Kochava from selling Americans’ location data 19h ago The FTC will ban data broker Kochava and its subsidiary, Collective Data Solutions (CDS), from selling location data without consumers' explicit consent to settle charges alleging that it sold precise geolocation data collected from hundred... The EOL Blind Spot in Your CVE Feed: What SCA Tools Miss 20h ago Critical vulnerabilities can exist in open source software your scanners don't check. HeroDevs reveals how EOL software creates blind spots in CVE feeds and SCA tools, and how you can receive a free end-of-life scan for your projects. Vimeo data breach exposes personal information of 119,000 people 21h ago The ShinyHunters extortion gang stole personal information belonging to over 119,000 people after hacking the Vimeo online video platform in April, according to data breach notification service Have I Been Pwned. Google now offers up to $1.5 million for some Android exploits 22h ago Google overhauls its Android and Chrome vulnerability rewards programs, offering bounties of up to $1.5 million for the most difficult exploits while scaling back payouts for flaws that artificial intelligence (AI) has made easier to find. Karakurt extortion gang ‘cold case’ negotiator gets 8.5 years in prison 23h ago A Latvian national extradited to the United States was sentenced to 8.5 years in prison for his
15 loaded
TH
The Hacker News
1h ago · 20 items
Google's Android Apps Get Public Verification to Stop Supply Chain Attacks 1h ago Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs 1h ago Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution 3h ago Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE 17h ago DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware 18h ago China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions 19h ago The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed 22h ago MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks 22h ago We Scanned 1 Million Exposed AI Services. Here's How Bad the Security Actually Is 23h ago ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows 1d ago
20 loaded
MA
Malware Analysis & Reports
1h ago · 20 items
Discord bot C2 infrastructure 1h ago IOCX v0.7.1 — robustness update focused on malformed PEs, hostile strings, and static‑analysis hardening 21h ago Supply chain attack: DAEMON Tools Lite now contains a backdoor. 23h ago Built a PE Malware Analysis Pipeline to Learn Why Most Detection Tools Suck at Correlation 1d ago Anyone wanna learn the CEH or OSCP red teaming free 3d ago Fake Tailscale site on Google Ads uses ClickFix to get you to execute malware yourself 4d ago Minirat malware deployed via NPM targeting macOS machines 6d ago VECT Ransomware Is Actually a Wiper 7d ago The Malware Factory: GLASSWORM Forensics in Open VSX 7d ago Phishing-to-RMM Attacks: The Remote Access Blind Spot Businesses Can't Ignore 7d ago
20 loaded
MS
MSRC Security Update Guide
1h ago · 20 items
CVE-2026-7598 libssh2 userauth.c userauth_password integer overflow 1h ago CVE-2026-34003 Xorg: xwayland: x.org x server: information exposure and denial of service via out-of-bounds memory access 1h ago CVE-2026-33999 Xorg: xwayland: x.org x server: denial of service via integer underflow in xkb compatibility map handling 1h ago CVE-2026-34001 Xorg: xwayland: x.org x server: use-after-free vulnerability leads to server crash and potential memory corruption 1h ago CVE-2026-41066 lxml: Default configuration of iterparse() and ETCompatXMLParser() allows XXE to local files 1h ago CVE-2026-41205 Mako: Path traversal via double-slash URI prefix in TemplateLookup 1h ago CVE-2026-43037 ip6_tunnel: clear skb2->cb[] in ip4ip6_err() 2h ago CVE-2026-43964 2h ago CVE-2026-6842 Nano: nano: local attacker can inject malicious .desktop launcher due to insecure directory permissions 1d ago CVE-2025-11083 GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow 1d ago
20 loaded
Iranian-Nexus Operation Against Oman's Government: 12 Ministries Hit and 26,000 Citizen Records Exposed 1h ago A rigged game: ScarCruft compromises gaming platform in a supply-chain attack 1h ago UAT-8302 and its box full of malware 1h ago CVE-2026-0073 Android adbd TLS client-authentication bypass 4h ago One KQL query you should have saved in your toolkit (most don’t) 4h ago Built a Cowboy Bebop-themed threat hunting lab with Splunk and Sysmon — writeup inside 8h ago 🇮🇷 Iranian-Nexus Campaign Against Oman's Government: 12 Ministries, 26,000 Records 16h ago Popular DAEMON Tools software compromised 19h ago A rigged game: ScarCruft compromises gaming platform in a supply-chain attack 19h ago Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise 19h ago
20 loaded
PN
Proofpoint News Feed
3h ago · 10 items
Proofpoint Establishes Innovation Precedent for Source-Agnostic Modern Enterprise Investigations 3h ago Proofpoint Prism Investigator positioned as first fully autonomous Agentic AI solution to significantly streamline investigations for highly regulated and highly Claude Mythos Fears Startle Japan's Financial Services Sector 6d ago AI-Era Threats Spread Beyond Email Into SaaS, Collaboration Apps, and AI Assistants 7d ago Proofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in Place 8d ago Inaugural global study finds more than half of organizations are not fully confident their AI security controls would detect compromised AI Clear market trend for software providers to help with AI: Proofpoint CEO 12d ago Sumit Dhawan, Proofpoint CEO, joins 'Closing Bell' to discuss ServiceNow's quarterly earnings results, if Anthropic's Mythos makes incumbent players more important and much more. Proofpoint CEO on AI Security Innovations | Nasdaq at RSAC 2026 13d ago Cargo thieving hackers running sophisticated remote access campaigns, researchers find 19d ago Freight Hacker Wields Code-Signing Service to Evade Defenses 19d ago Sumit Dhawan on NYSE Floor Talk | Proofpoint AI Security 20d ago FIFA World Cup 2026: More than One-Third of Official Partners Expose the Public to the Risk of Email Fraud 22d ago Analysis by cybersecurity company Proofpoint reveals that while most partners have implemented baseline email authentication, many are still not proactively blocking fraudulent emails that
RE
Reverse Engineering
5h ago · 20 items
ant4g0nist/pyre: Ghidra decompiler in your browser 5h ago Resident Evil: Code Veronica X is able to play the opening FMV from the decompiled PS2 source! 10h ago HyperVenom: Using Hyper-V for Ring -1 Control from Usermode 11h ago Reverse-engineering the 1998 Ultima Online demo server 16h ago Inside Faxanadu series — deep dive into how this NES title works 18h ago EMBA v2.0.1 with interactive firmware dependency map available - Check it out and let us know what you are missing 18h ago Copy.fail: Why Internal LLMs Are Non-Negotiable for Security 1d ago Reverse-engineering Final Fantasy X (PS3) trophy system with Ghidra 1d ago [CrackMe] PyVMP v6 : The Fortress. I dare you to break it (again x2). 1d ago [WIP] Resolve indirect calls in Binary Ninja with DynamoRIO instrumentation 1d ago
20 loaded
HS
hacking: security in practice
7h ago · 20 items
20 loaded
Supporting the National Cyber Strategy: How TrendAI™ Helps 10h ago InstallFix and Claude Code: How Fake Install Pages Lead to Real Compromise 1d ago Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities 2d ago Kuse Web App Abused to Host Phishing Document 7d ago Bad actors took advantage of the legitimate name and services of Kuse, a popular AI-based app designed for workplaces. The attackers exploited the users’ trust in Kuse to carry out a phishing attack. Void Dokkaebi Uses Fake Job Interview Lure to Spread Malware via Code Repositories 15d ago The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables 16d ago Identity Protection in the AI Era 23d ago Learn about a proactive, identity-first security approach that integrates visibility, threat detection and response, zero trust enforcement, AI protection, and threat intelligence into a unified model. U.S. Public Sector Under Siege: Threat Intelligence for Q1 2026 27d ago Discover how TrendAI Vision One™ empowers government agencies and educational institutions with advanced visibility, intelligence, and automation to stay ahead of evolving public sector threats. Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do 29d ago Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads 33d ago
20 loaded
Bleeding Llama: Critical Unauthenticated Memory Leak in Ollama (CVE-2026–7482) 14h ago Salesforce pentesting novel techniques- how to be an apex predator 14h ago DigiCert: Misissued code signing certificates 16h ago Major AI Clients Shipping With Broken OAuth Implementations 18h ago HN Security - Extending Burp Suite for fun and profit – The Montoya way – Part 10 21h ago Ghosts of Encryption Past – How we Read All Your Emails in Salesforce Marketing Cloud 23h ago The Danger of Multi-SSO AWS Cognito User Pools 23h ago Popular DAEMON Tools software infected – supply chain attack ongoing since April 8, 2026 1d ago Proton Pass: Second-Password Bypass Through Emergency Access 1d ago We probed 6,000 web apps for Stripe webhook signature checks. 1,542 don't bother 1d ago
20 loaded
SA
Security - Ars Technica
14h ago · 20 items
Widely used Daemon Tools disk app backdoored in monthlong supply-chain attack 14h ago Ubuntu infrastructure has been down for more than a day 4d ago GPT-5.5 matches heavily hyped Mythos Preview in new cybersecurity tests 4d ago The most severe Linux threat to surface in years catches the world flat-footed 5d ago Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden 6d ago Open source package with 1 million monthly downloads stole user credentials 8d ago Why are top university websites serving porn? It comes down to shoddy housekeeping. 11d ago In a first, a ransomware family is confirmed to be quantum-safe 12d ago Crypto scam lures ships into Strait of Hormuz, falsely promising safe passage 13d ago Microsoft issues emergency update for macOS and Linux ASP.NET threat 13d ago
20 loaded
CS
Cisco Security Advisory
15h ago · 20 items
Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities 15h ago Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulner... Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense 5d ago On April 23, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an update to V1: Emergency Directive (ED) 25-03: Identify and Mitigate Potential Compromise of Cisco Devices related to Cisco Secure Firewall Adaptiv... Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities 7d ago Multiple vulnerabilities in Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker to achieve remote code execution or conduct path traversal attacks on an affec... Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability 11d ago A vulnerability in the Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, remote attacker to read or modify intersite encrypted traffic. This vulnerability... Cisco Integrated Management Controller Cross-Site Scripting Vulnerabilities 13d ago Multiple vulnerabilities in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more informatio... Cisco Integrated Management Controller Command Injection and Remote Code Execution Vulnerabilities 13d ago Multiple vulnerabilities in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to execute arbitrary code or commands on the underlying operating system of an affe... Cisco Catalyst SD-WAN Vulnerabilities 13d ago Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an attacker to access an affected system, elevate privileges to root, gain access to sensitive information, and overwrite arbitrary files. For m... Cisco Webex Services Certificate Validation Vulnerability 19d ago A vulnerability in the integration of single sign-on (SSO) with Control Hub in Cisco Webex Services could have allowed an unauthenticated, remote attacker to impersonate any user within the service. This vulnerability existed because of imp... Cisco Secure Web Appliance Authentication Bypass Vulnerability 19d ago A vulnerability in the authentication service feature of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass authentication policy requirements. This vulnerability is due to improp... Cisco Identity Services Engine Remote Code Execution Vulnerabilities 20d ago Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit these vulnerabilities, the att...
20 loaded
BF
Blog – Forter
16h ago · 10 items
HN
Help Net Security
17h ago · 41 items
Tanium Atlas aims to accelerate threat response in the AI era 17h ago Tanium Atlas is an AI-driven autonomous OS for IT and security, delivering real-time endpoint data and automation to speed up threat response. Unpatched flaws turn Ollama’s auto-updater into a persistent RCE vector, researchers say 18h ago Two flaws (CVE-2026-42248, CVE-2026-42249) in Ollama's Windows auto-updater may allow an attacker to covertly plant a persistent executable. LastPass Mobile Smart Scanner improves password security 18h ago LastPass Mobile Smart Scanner converts photographs of typed or handwritten credentials into structured, ready-to-use password entries. Google to pay up to $1.5 million for zero-click Pixel Titan M exploits 19h ago Google Vulnerability Reward Program changes raise bounties to $1.5 million and target high-impact flaws harder for automated tools to detect. Download: Secure Foundations for AI Workloads on AWS 21h ago Deploy AI workloads from a CIS Benchmark-hardened OS baseline. CIS Hardened Images help reduce risk, support compliance, and speed deployment. Conti ransomware gang member sentenced to 102 months in prison 21h ago A Latvian member of a Russian-linked ransomware group tied to Conti was sentenced to 102 months for attacks on more than 54 companies. VIAVI CyberFlood CF1000 pushes 400G validation for multi-terabit AI data centers 22h ago VIAVI CyberFlood CF1000 delivers 400G testing for security and application performance in multi-terabit AI data centers at scale. Oracle rolls out monthly security patch updates 22h ago Oracle is using AI to improve vulnerability detection and response across environments, and is rolling out monthly security updates. Microsoft: Phishing campaign used fake compliance notices to compromise employee accounts 23h ago Phishers have been using fake workplace compliance notices to try to trick Microsoft account owners into signing in via a fake sign-in page. Anomali ThreatStream Next-Gen speeds threat response across workflows 23h ago Anomali launches ThreatStream Next-Gen, turning threat intelligence into a decision layer to speed investigations and response.
41 loaded
CD
Cyber Defense Magazine
21h ago · 10 items
AC
All CISA Advisories
22h ago · 20 items
20 loaded
DA
darkreading
22h ago · 25 items
How the Story of a USB Penetration Test Went Viral 22h ago RMM Tools Fuel Stealthy Phishing Campaign 1d ago Exploit Cyber-Frenzy Threatens Millions via Critical cPanel Vulnerability 1d ago Silver Fox Springs Tax-Themed Attacks on Orgs in India, Russia 1d ago How Dark Reading Lifted Off the Launchpad in 2006 1d ago 76% of All Crypto Stolen in 2026 Is Now in North Korea 4d ago If AI's So Smart, Why Does It Keep Deleting Production Databases? 4d ago Name That Toon: Mark of (Security) Progress 4d ago 20 Years in Cyber: Dark Reading Marks Milestone With Month of Special Coverage 4d ago TeamPCP Hits SAP Packages With 'Mini Shai-Hulud' Attack 5d ago
25 loaded
WE
WeLiveSecurity
1d ago · 20 items
20 loaded
RF
Recorded Future
1d ago · 20 items
Hacking Embodied AI 1d ago Embodied AI, intelligent systems in physical forms such as humanoid and quadruped robots, is moving from spectacle to staffing plans. The Iran War: What You Need to Know 5d ago Insikt Group tracks the cyber, physical, and geopolitical components of the US-Israeli strikes on Iran — with continuously updated threat analysis and scenarios. Risk Scenarios for the US’s Strategic Pivot 6d ago The United States (US) is shifting toward a more force-driven security strategy primarily relying on military operations and economic pressure to counter transnational criminal organizations and limit Chinese, Russian, and Iranian influence... Building with AI: Here's What No Briefing Will Tell You 6d ago What building with AI for three months revealed about four leadership blind spots executives can't afford to ignore: the comprehension gap, eroding competitive moats, deployment complexity, and what "senior" really means now. The Money Mule Solution: What Every Scam Has in Common 8d ago Learn how mule account intelligence — not tactic-tracking — is the most effective lever for preventing APP fraud before funds move. Lazarus Doesn't Need AGI 8d ago Explore the 2026 Claude Mythos breach, supply chain risks, and the $2B+ crypto theft pipeline. From Overwhelmed to Autonomous: Rethinking Threat Intelligence in 2026 12d ago For most security teams today, volume and access to intelligence isn’t the problem. It’s the speed at which they can turn that intelligence into action. . Critical minerals and cyber operations 13d ago Learn how critical minerals and rare earth elements (REEs) are evolving from commodities into strategic flashpoints. Explore the geopolitical risks of China’s refining dominance, the race for resources in the Arctic and space, and the risin... Today, trust is the superpower that makes innovation possible 13d ago How better intelligence and collaboration can unlock new opportunities for growth and greater financial health for more people. Evolution of Chinese-Language Guarantee Telegram Marketplaces 14d ago Chinese-language, Telegram-based “guarantee” marketplaces are increasingly popular among Chinese-speaking criminal groups despite the widely publicized shutdown of Huione Guarantee in 2025.
20 loaded
NE
NetworkChuck
1d ago · 15 items
15 loaded
BH
Black Hat
1d ago · 15 items
15 loaded
MS
Microsoft Security Blog
1d ago · 10 items
Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise 1d ago Microsoft Defender Research observed a large-scale credential theft campaign that exemplifies this trend, using code of conduct-themed lures, a multi-step attack chain, and legitimate email services to distribute fully authenticated message... CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments 4d ago A high-severity Linux vulnerability, “Copy Fail” (CVE-2026-31431), enables root privilege escalation across cloud environments and Kubernetes workloads. With a working exploit already in the wild, organizations should act quickly to detect,... Microsoft Agent 365, now generally available, expands capabilities and integrations 4d ago ​We’re announcing the general availability of Agent 365, plus previews of new capabilities to discover and manage shadow AI agents. Learn more. What’s new, updated, or recently released in Microsoft Security 5d ago Stay ahead of emerging threats with Microsoft’s newest security innovations and updates, delivered through the In the Loop series. Email threat landscape: Q1 2026 trends and insights 5d ago In early 2026, email threats increased with a rise in credential phishing, QR code phishing, and CAPTCHA-gated campaigns, highlighted by Microsoft’s disruption of the Tycoon2FA phishing platform which led to a 15% volume decrease and shifts... 8 best practices for CISOs conducting risk reviews 6d ago Read Microsoft expert tips for CISOs on embracing strong proactive security to mitigate increased exposure to security threats. Simplifying AWS defense with Microsoft Sentinel UEBA 7d ago Learn how Microsoft Sentinel UEBA helps defenders distinguish benign AWS activity from attacker behavior by enriching raw CloudTrail logs with clear, binary behavioral signals derived from baseline user, peer, and device behavior patterns. AI-powered defense for an AI-accelerated threat landscape 13d ago Read how Microsoft is partnering with Anthropic and broader industry to use leading models, paired with our platforms and expertise, to turn AI-driven discovery into protection at scale. Detection strategies across cloud and identities against infiltrating IT workers 14d ago The shift to remote and hybrid work since the pandemic expanded global hiring and accelerated digital onboarding, increasing reliance on online identity verification and remote access. Making opportunistic cyberattacks harder by design 15d ago How Microsoft secures Dynamics 365 and Power Platform by removing credentials, reducing attack surfaces, and using platform engineering to block opportunistic threats.
SL
Security Latest
1d ago · 20 items
DHS Demanded Google Surrender Data on Canadian’s Activity, Location Over Anti-ICE Posts 1d ago Disneyland Now Uses Face Recognition on Visitors 3d ago Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers 4d ago OpenAI Rolls Out ‘Advanced’ Security Mode for At-Risk Accounts 5d ago 90,000 Screenshots of One Celebrity's Phone Were Exposed Online 6d ago Why Sharing a Screenshot Can Get You Jailed in the UAE 7d ago The Race Is on to Keep AI Agents From Running Wild With Your Credit Cards 7d ago Cole Allen Charged With Attempting to Assassinate Trump 8d ago California Engineer Identified in Suspected Shooting at White House Correspondents’ Dinner 10d ago Discord Sleuths Gained Unauthorized Access to Anthropic’s Mythos 10d ago
20 loaded
DB
David Bombal
1d ago · 15 items
15 loaded
NA
NahamSec
1d ago · 15 items
15 loaded
JH
John Hammond
4d ago · 15 items
15 loaded
TC
The Cyber Mentor
4d ago · 15 items
15 loaded
AL
Alerts
4d ago · 20 items
20 loaded
HA
Hak5
5d ago · 15 items
15 loaded
KO
Krebs on Security
5d ago · 10 items
Anti-DDoS Firm Heaped Attacks on Brazilian ISPs 5d ago A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazi... ‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty 14d ago A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phish... Patch Tuesday, April 2026 Edition 21d ago Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dub... Russia Hacked Routers to Steal Microsoft Office Tokens 28d ago Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backe... Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab 30d ago An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gang... ‘CanisterWorm’ Springs Wiper Attack Targeting Iran 43d ago A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or ha... Feds Disrupt IoT Botnets Behind Huge DDoS Attacks 47d ago The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as ro... Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker 55d ago A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub out... Microsoft Patch Tuesday, March 2026 Edition 56d ago Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing "zero-day" flaws this month (compared to February's five zero-day treat), but as usu... How AI Assistants are Moving the Security Goalposts 58d ago AI-based assistants or "agents" -- autonomous programs that have access to the user's computer, files, online services and can automate virtually any task -- are growing in popularity with developers and IT workers. But as so many eyebrow-r...
DE
DEFCONConference
7d ago · 15 items
15 loaded
IP
IppSec
10d ago · 15 items
15 loaded
M3
Microsoft 365 Blog
13d ago · 10 items
Copilot’s agentic capabilities in Word, Excel, and PowerPoint are generally available 13d ago Copilot's newest features are now generally available as the default experience across all Microsoft 365 subscriptions. Bring your everyday business apps into the flow of work with agents in Microsoft 365 Copilot 22d ago Discover how apps integrate with AI agents to power Copilot experiences, streamline workflows, and turn business context into action. New and improved: Multi-agent orchestration, connected experiences, and faster prompt iteration 34d ago Explore what's new in Copilot Studio: Multi-agent systems now generally available, plus updates to the Prompt Editor and governance controls. Copilot Cowork: Now available in Frontier 36d ago Today, Copilot Cowork—designed for long-running, multi-step work in Microsoft 365—is available via the Frontier program. Copilot Cowork: A new way of getting work done 57d ago Copilot Cowork turns intent into action across Microsoft 365—automating tasks, coordinating workflows, and keeping you in control. See how. Powering Frontier Transformation with Copilot and agents 57d ago Wave 3 of Microsoft 365 Copilot introduces Copilot Cowork, multi‑model intelligence, and enterprise‑ready AI—built to get real work done. SharePoint at 25: How Microsoft is putting knowledge to work in the AI era 64d ago Discover how SharePoint’s 25‑year legacy powers Microsoft 365 Copilot, Work IQ, and AI‑driven knowledge for organizations worldwide. Microsoft Sovereign Cloud adds governance, productivity, and support for large AI models securely running even when completely disconnected 70d ago The ultimate Microsoft 365 community event returns—your front‑row seat to the future of intelligent work 89d ago Join the ultimate Microsoft 365 community event with fresh insights, AI innovations, and a front‑row look at the future of intelligent work. 6 core capabilities to scale agent adoption in 2026 99d ago Learn six capabilities to support agent adoption at scale in 2026 with Microsoft Copilot Studio, from governance and security to operations.
CC
CISA Cybersecurity Advisories
14d ago · 10 items
Defending Against China-Nexus Covert Networks of Compromised Devices 14d ago Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure 29d ago U.S. organizations should review the TTPs and IOCs in this advisory for indications of current or historical activity on their networks, and apply the Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure 151d ago The authoring organizations encourage critical infrastructure organizations to implement the recommendations in this advisory to reduce the likelihood and CISA Shares Lessons Learned from an Incident Response Engagement 225d ago Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System 253d ago The authoring agencies strongly urge network defenders to hunt for malicious activity and to apply the mitigations in this CSA to reduce the threat of Chinese CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization 280d ago #StopRansomware: Interlock 288d ago Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider 327d ago CISA urges software vendors, downstream customers, and end users to immediately implement the Mitigations listed in this advisory based on confirmed compromise Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations 350d ago Russian GRU Targeting Western Logistics Entities and Technology Companies 358d ago Executives and network defenders should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and IOCs
HS
Heimdal Security Blog
15d ago · 15 items
Heimdal Expands AI Strategy with AI Wingman and Third-Party AI Containment 15d ago Heimdal today unveiled the next phase of its AI strategy, expanding AI Wingman with three new layers - Assist, Triage and SOC - alongside the introduction of Third-Party AI Containment. You Only Know What You’ve Got When Its Gone 39d ago Prepare for the expected. Rehearse an action plan in case of technology failure or cyberattacks. We all know they can happen. Nordic MSPs Can Now Access Heimdal’s Unified Security and Compliance Platform Through Elovade 49d ago Heimdal has appointed Elovade as its official distributor in the Nordic region. The move gives MSPs and resellers across Sweden, Norway, Denmark, Iceland, and Finland direct access to Heimdal's consolidated cybersecurity platform through a ... OpenClaw Incidents Show Why AI Adoption Pressure Puts Companies at Risk 61d ago The OpenClaw security failures show how hasty AI adoption can expose businesses and supply chains to major cyber risk. Heimdal Claims Industry First With a Cyber Essentials Control Mapping for PEDM to Help Organisations Prove Least Privilege 86d ago Heimdal is the first vendor to publish a dedicated Cyber Essentials control mapping for PEDM, setting out how privilege management supports Cyber Essentials requirements and what evidence can be produced to support assessment and assurance. Five Predictions for Cyber Security Trends in 2026 91d ago Morten Kjaersgaard, Heimdal’s Founder, and Adam Pilton, a former cybercrime investigator, predict five cyber security trends for 2026. Heimdal Achieves OPSWAT Gold Certification for Anti-Malware 111d ago Heimdal today announced that its Next-Gen Antivirus (NGAV) with Extended Threat Protection (XTP) has achieved OPSWAT Gold Certification for Anti-Malware, validating its compatibility and effectiveness within OPSWAT’s industry-leading Access... How to Avoid Holiday Shopping Scams (From a Former Cyber Detective) 145d ago Worried about holiday scams? Ex-cybercrime detective Adam Pilton breaks down the biggest threats and how to shop safely this festive season. ITDR Best Practices: How to Detect, Prevent, and Contain Critical Identity Threats 159d ago Key takeaways: ITDR solutions monitor identity-based threats that traditional security tools miss, like hackers logging in with stolen credentials Effective ITDR requires integration with privileged access management and automated responses... When Buyers Discount MSPs With One Big Customer 159d ago Your biggest customer loves you. Three years together. They trust you, pay on time, and refer others. From where you sit, that’s loyalty. From where a buyer sits, that’s a $$$ discount on your exit. This perception gap kills more MSP deals ...
15 loaded
13 loaded
Azure IaaS: Keep critical applications running with built-in resiliency at scale 34d ago Learn how Azure IaaS helps organizations start from a resilient platform foundation with availability, continuity, and recovery capabilities. Azure IaaS: Explore new resources for building a stronger, more efficient infrastructure 62d ago Learn how Azure IaaS helps you modernize infrastructure, improve performance and resilience, optimize costs, and prepare for AI workloads. Read more. Azure reliability, resiliency, and recoverability: Build continuity by design 77d ago Learn how Azure reliability, resiliency, and recovery capabilities work together to improve cloud continuity. Read more. Microsoft strengthens sovereign cloud capabilities with new services 182d ago Discover new Microsoft digital sovereignty capabilities and upcoming features across AI, security, and productivity, to address sovereign cloud needs. Enhancing software supply chain security with Microsoft’s Signing Transparency 183d ago Microsoft Signing Transparency delivers verifiable code integrity and tamper-evident software releases for stronger supply chain security. Oracle Database@Azure offers new features, regions, and programs to unlock data and AI innovation 203d ago Migrate Oracle solutions to the cloud with a trusted, enterprise-ready platform from Microsoft and Oracle. Learn more. Building secure, scalable AI in the cloud with Microsoft Azure 308d ago Forrester Research shows how Azure helps enterprises scale generative AI securely, unlocking real business value. Learn more. Enhance AI security with Azure Prompt Shields and Azure AI Content Safety 334d ago Learn how Prompt Shields and Azure AI Content Safety can help guard against direct and indirect threats to your LLM-based solution. Navigating the 2024 holiday season: Insights into Azure’s DDoS defense 463d ago Learn more on how Azure DDoS is keeping you prepared for this years trends in advanced attack tactics to keep your data secure. 6 insights to make your data AI-ready, with Accenture’s Teresa Tung 544d ago Learn more about the changing nature of data and its value to an AI strategy with Teresa Tung.
LI
LiveOverflow
62d ago · 15 items
15 loaded
SK
STÖK
254d ago · 15 items
15 loaded
HA
HackerSploit
391d ago · 15 items
15 loaded
TH
Threatpost
1343d ago · 10 items
Student Loan Breach Exposes 2.5M Records 1343d ago 2.5 million people were affected, in a breach that could spell more trouble down the line. Watering Hole Attacks Push ScanBox Keylogger 1344d ago Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool. Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms 1345d ago Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system. Ransomware Attacks are on the Rise 1348d ago Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group. Cybercriminals Are Selling Access to Chinese Surveillance Cameras 1349d ago Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed. Twitter Whistleblower Complaint: The TL;DR Version 1350d ago Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk. Firewall Bug Under Active Attack Triggers CISA Warning 1351d ago CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP. Fake Reservation Links Prey on Weary Travelers 1352d ago Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels. iPhone Users Urged to Update to Patch 2 Zero-Days 1355d ago Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack. Google Patches Chrome’s Fifth Zero-Day of the Year 1356d ago An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.

No matching sources found.