Loading…

Whats The Hax?

Daily intelligence on threats, breaches, and defenders

Latest
Reverse EngineeringPost-Quantum Cryptographic Algorithm Examined in Developmental RansomwareThe Record from Recorded Future NewsTwo Americans plead guilty to assisting India-based tech support scam centerscybersecurityA Hacker Group Is Poisoning Open Source Code at an Unprecedented ScalecybersecuritySecurity Scroll Down?cybersecuritymass github repo backdooring via CI workflows(Megalodon)Latest newsApple, Sony, and Bose headphones are all on sale for Memorial Day - I found the best dealsNetworkChuckSummer of CCNA - 90 Minute - Session 2Reverse EngineeringI got so sick of Android taking forever to calculate folder sizes, I built a custom C++/Rust storage visualizer to bypass MTPFor [Blue|Purple] Teams in Cyber Defence📡 One telecom carrier accounts for 72% of all Middle East-hosted C2 activity.Latest newsSwitch to adaptive chargers? My advice after testing low-power options for a yearLatest newsI found the best early Memorial Day phone deals: Save big on Samsung, Google, Apple and morecybersecurityThreat Modeling Autonomous Dev Agents: How do we cryptographically prove a human actually reviewed a commit?For [Blue|Purple] Teams in Cyber DefenceGhost CMS Mass Compromised via CVE-2026-26980, Now Fueling ClickFix AttacksProofpoint News FeedProofpoint Integrates with the Claude Compliance API to Extend Data Security and Governance to ClaudeLatest newsHome Depot and Lowe's have power tool deals for up to $400 off ahead of Memorial DayTechnical Information Security Content & DiscussionGitHub Actions Cache Poisoning is eating open sourceLatest newsI found the best early Memorial Day outdoor deals: Lawn mowers, power banks, and moreLatest newsBest Buy and Amazon just dropped prices on SSDs ahead of Memorial Day - I found the best dealsLatest newsSamsung's free 32-inch Odyssey monitor deal is back in stock - how to qualifyLatest newsLinus Torvalds on the AI claim that makes him angry, and what security researchers should never doReverse EngineeringPost-Quantum Cryptographic Algorithm Examined in Developmental RansomwareThe Record from Recorded Future NewsTwo Americans plead guilty to assisting India-based tech support scam centerscybersecurityA Hacker Group Is Poisoning Open Source Code at an Unprecedented ScalecybersecuritySecurity Scroll Down?cybersecuritymass github repo backdooring via CI workflows(Megalodon)Latest newsApple, Sony, and Bose headphones are all on sale for Memorial Day - I found the best dealsNetworkChuckSummer of CCNA - 90 Minute - Session 2Reverse EngineeringI got so sick of Android taking forever to calculate folder sizes, I built a custom C++/Rust storage visualizer to bypass MTPFor [Blue|Purple] Teams in Cyber Defence📡 One telecom carrier accounts for 72% of all Middle East-hosted C2 activity.Latest newsSwitch to adaptive chargers? My advice after testing low-power options for a yearLatest newsI found the best early Memorial Day phone deals: Save big on Samsung, Google, Apple and morecybersecurityThreat Modeling Autonomous Dev Agents: How do we cryptographically prove a human actually reviewed a commit?For [Blue|Purple] Teams in Cyber DefenceGhost CMS Mass Compromised via CVE-2026-26980, Now Fueling ClickFix AttacksProofpoint News FeedProofpoint Integrates with the Claude Compliance API to Extend Data Security and Governance to ClaudeLatest newsHome Depot and Lowe's have power tool deals for up to $400 off ahead of Memorial DayTechnical Information Security Content & DiscussionGitHub Actions Cache Poisoning is eating open sourceLatest newsI found the best early Memorial Day outdoor deals: Lawn mowers, power banks, and moreLatest newsBest Buy and Amazon just dropped prices on SSDs ahead of Memorial Day - I found the best dealsLatest newsSamsung's free 32-inch Odyssey monitor deal is back in stock - how to qualifyLatest newsLinus Torvalds on the AI claim that makes him angry, and what security researchers should never do

By Source

Feeds organized so you can skim by site.

Density Sort
RE
Reverse Engineering
1h ago · 20 items
Post-Quantum Cryptographic Algorithm Examined in Developmental Ransomware 1h ago I got so sick of Android taking forever to calculate folder sizes, I built a custom C++/Rust storage visualizer to bypass MTP 1h ago CVE-2026-40369: Twelve Bytes to Escape the Browser Sandbox 2h ago I built 99 adversarial PE fixtures to stress‑test parsers — here’s what they reveal about malformed binaries 7h ago GeoHelper - Tauri + Chrome DevTools Protocol (CDP) for GeoGuessr (Steam) 20h ago AI Agents defeat obfuscated JavaScript in 10 minutes 23h ago What is it Wednesdays: Episode 0002 1d ago TinyLoad v5 - encrypted strings, obfuscated opmap, IAT wiping, payload depends on stub (implemented feedback from last post) 1d ago Tracing CVE-2026-34472 auth bypass through decompiled ZTE H188A firmware and Lua wizard routing 1d ago How to build .NET obfuscator 1d ago
20 loaded
CY
cybersecurity
1h ago · 20 items
A Hacker Group Is Poisoning Open Source Code at an Unprecedented Scale 1h ago Security Scroll Down? 1h ago mass github repo backdooring via CI workflows(Megalodon) 1h ago Threat Modeling Autonomous Dev Agents: How do we cryptographically prove a human actually reviewed a commit? 1h ago CVE-2026-40369: Twelve Bytes to Escape the Browser Sandbox 2h ago DNS blocked by Cisco Umbrella, but symantec EDR & Event Viewer are completely blind 2h ago FaceTec (ID verification) company appears to store user biometrics 2h ago CVE-2026-34474: ZTE H298A / H108N routers expose credentials before authentication 2h ago Two Microsoft Defender vulnerabilities actively exploited. One grants full SYSTEM access. CISA has a June 3 federal deadline. Here is what to check. 3h ago What Questions Do You Ask During SSP Control Interviews? 3h ago
20 loaded
LN
Latest news
1h ago · 20 items
Apple, Sony, and Bose headphones are all on sale for Memorial Day - I found the best deals 1h ago Memorial Day deals on headphones are already live. These are my favorite options so far. Switch to adaptive chargers? My advice after testing low-power options for a year 1h ago Adaptive charging aims to reduce battery wear by keeping speeds low. My favorite model is ideally suited for overnight charges. I found the best early Memorial Day phone deals: Save big on Samsung, Google, Apple and more 1h ago For Memorial Day, I've rounded up the best smartphone deals. Discounts are already live, so now is a great time to save. Home Depot and Lowe's have power tool deals for up to $400 off ahead of Memorial Day 1h ago Save big on everything you need for DIY projects and home repairs with these Memorial Day deals on tools from DeWalt, Milwaukee, and more. I found the best early Memorial Day outdoor deals: Lawn mowers, power banks, and more 1h ago You can already find great Memorial Day deals on everything you need to upgrade your outdoor space. Best Buy and Amazon just dropped prices on SSDs ahead of Memorial Day - I found the best deals 1h ago Retailers like Amazon and Best Buy are offering steep discounts on high-capacity SSDs ahead of Memorial Day. Samsung's free 32-inch Odyssey monitor deal is back in stock - how to qualify 1h ago Samsung's BOGO monitor deal is back. Here's what you need to know. Linus Torvalds on the AI claim that makes him angry, and what security researchers should never do 1h ago Linux's creator sees AI as a double-edged sword for programmers. These are the best early Memorial Day 2026 TV deals I've found so far 1h ago Save hundreds on some of our most highly reviewed TVs from Samsung, LG, and more ahead of Memorial Day. These Marshall ANC headphones might finally pull me away from Bose and Sony - here's why 2h ago I've never been a big on-ear headphones guy, but the new Marshall Milton ANC might change my mind due to their unique connectivity features.
20 loaded
NE
NetworkChuck
1h ago · 15 items
15 loaded
📡 One telecom carrier accounts for 72% of all Middle East-hosted C2 activity. 1h ago Ghost CMS Mass Compromised via CVE-2026-26980, Now Fueling ClickFix Attacks 1h ago CVE-2026-40369: Twelve Bytes to Escape the Browser Sandbox 2h ago beacon-hunter: open source detector for phi-structured C2 beacons that evade RITA 2h ago Fake Microsoft Teams Campaign Delivers ValleyRAT via NSIS Installer and DLL Sideloading 4h ago Tracking TamperedChef Clusters via Certificate and Code Reuse 4h ago Living off the Land with VS Code: Inside a Sophisticated Phishing Campaign 4h ago From Y2K to Patch Tuesday 2025: 25 Years of Bugs in the Windows 2000 Source Tree 9h ago How a single image takes control of a Mac understanding an ExifTool vulnerability (CVE-2026-3102) 9h ago Iran-linked Operators Suspected in ATG Breaches 9h ago
20 loaded
PN
Proofpoint News Feed
1h ago · 10 items
Proofpoint Integrates with the Claude Compliance API to Extend Data Security and Governance to Claude 1h ago New product integrations bring data protection, insider risk detection, and governance into Claude Enterprise and Claude Platform activity Organizations gain unified visibility across Proofpoint Launches Dedicated MSP Business Unit and Introduces 365 Total Protection for North America 8d ago New MSP Platform business unit, AI-powered all-in-one Microsoft 365 protection, and Marketplace partnership with Pax8 strengthen Proofpoint’s commitment to channel and small and mid-size The spy who logged me in. 12d ago ⁠Mark Kelly⁠, Staff Threat Researcher at ⁠Proofpoint⁠, is discussing their work on "I’d come running back to EU again: TA416 resumes European government espionage campaigns." China-linked threat group TA416 has resumed large-scale phishing ... Proofpoint Establishes Innovation Precedent for Source-Agnostic Modern Enterprise Investigations 15d ago Proofpoint Prism Investigator positioned as first fully autonomous Agentic AI solution to significantly streamline investigations for highly regulated and highly AI and the New Threat Landscape | Sumit Dhawan with NightDragon | RSAC 2026 16d ago The Most Powerful Women Of The Channel 2026: Power 100 17d ago The Power 100 is culled from the ranks of CRN’s 2026 Women of the Channel and spotlights the female executives at vendors and distributors whose insight and influence help drive channel success. AI Security Gaps Create New MSSP Opportunity: Proofpoint 21d ago Claude Mythos Fears Startle Japan's Financial Services Sector 22d ago AI-Era Threats Spread Beyond Email Into SaaS, Collaboration Apps, and AI Assistants 23d ago Proofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in Place 23d ago Inaugural global study finds more than half of organizations are not fully confident their AI security controls would detect compromised AI
GitHub Actions Cache Poisoning is eating open source 1h ago CVE-2026-40369: Twelve Bytes to Escape the Browser Sandbox 2h ago CVE-2026-34474: Pre-auth credential disclosure in ZTE H298A / H108N via ETHCheat 2h ago GitHub ~3,800 internal repos compromised through a malicious VS Code extension 8h ago Score by collisions, patch by panic: defensive architecture for the post-90-day-disclosure era 1d ago [ Removed by Reddit ] 1d ago CVE-2026-34472: Pre-auth credential exposure and auth bypass in ZTE H188A V6 routers 1d ago GitHub hit by a compromised VSCode extension 1d ago When Filenames Become Attack Surfaces: Weaponizing NASA's CFITSIO Extended Filename Syntax 1d ago We audited 12K n8n templates: most have critical vulnerabilities 1d ago
20 loaded
HN
Help Net Security
1h ago · 10 items
Microsoft open-sources tools for designing and testing AI agents 1h ago Microsoft open-sourced tools for reviewing the desing choices during AI agent development and continuously testing AI agents. Authorities dismantle First VPN, used by ransomware actors 4h ago Operation Saffron leads to First VPN takedown, disrupting cybercrime infrastructure and exposing users in global police action. GitHub, Grafana Labs breaches traced back to TanStack supply chain compromise 4h ago GitHub CISO Alexis Wales has named the malicious VS Code extension behind the recent breach: Nx Console, a popular developer tool. Microsoft Defender vulnerabilities exploited in the wild (CVE-2026-41091, CVE-2026-45498) 7h ago Attackers are actively exploiting two Microsoft Defender vulnerabilities (CVE-2026-41091 and CVE-2026-45498), Microsoft acknowledged. Virtru centers file collaboration around data-level protection 9h ago Virtru unveils Collaborate, a FedRAMP-authorized workspace with data-centric protection for secure file sharing. ASAPP expands adversarial testing for enterprise AI systems 9h ago ASAPP adds Continuous Red Teaming, integrating adversarial AI testing into its model evaluation framework. Tenable Hexa AI automates remediation across attack surfaces 10h ago Tenable launches Hexa AI, an agentic AI engine for Tenable One that automates workflows and speeds risk reduction. Riverbed introduces new Aternity tools for autonomous IT operations 10h ago Riverbed adds new Aternity capabilities to support autonomous IT operations and prevention-focused workflows. Forward launches Predict to test network changes before deployment 10h ago Forward launches Predict, a capability that tests network changes against a digital twin before deployment. CTERA brings AI insights and automation for unstructured data 10h ago CTERA launches InsightAI, an agentic AI layer that adds intelligence and automation to data management workflows.
MS
Microsoft Security Blog
2h ago · 10 items
What’s new in Microsoft Security: May 2026 2h ago Microsoft Security’s latest updates extend visibility, control, and protection across expanding ecosystems as organizations accelerate AI adoption. Mini Shai Hulud: Compromised @antv npm packages enable CI/CD credential theft 1d ago Compromised @antv npm packages deploy the Mini Shai-Hulud payload to steal CI/CD secrets from Linux-based automation environments. The malware executes during npm install and targets credentials across GitHub, AWS, Kubernetes, Vault, npm, a... Securing the gaming culture of cultures 1d ago Read about the unique challenges and rewards of securing gaming platforms and how to better protect gaming communities. Introducing RAMPART and Clarity: Open source tools to bring safety into Agent development workflow 1d ago The AI systems shipping inside enterprises today are fundamentally different from the ones we were building even two years ago, because they have moved well past answering questions and into accessing your email, retrieving records from you... Exposing Fox Tempest: A malware-signing service operation 2d ago Fox Tempest is a financially motivated threat actor operating a malware‑signing‑as‑a‑service (MSaaS) used by other cybercriminals, including Vanilla Tempest and Storm groups, to more effectively distribute malicious code, including ransomwa... How Storm-2949 turned a compromised identity into a cloud-wide breach 2d ago Storm-2949 turned stolen credentials into a cloud-wide breach, moving from identity compromise to large-scale data theft without using malware. This incident shows how threat actors can exploit trusted systems to operate undetected. How to better protect your growing business in an AI-powered world 3d ago Read how built-in security helps keep small and medium businesses running, protect customer trust, and support growth in a new Microsoft whitepaper. Defense in depth for autonomous AI agents 7d ago As AI agents gain autonomy, defense in depth must evolve, with application-layer design, identity, and human oversight at the center. Kazuar: Anatomy of a nation-state botnet 7d ago Kazuar, a sophisticated malware family attributed to the Russian state actor Secret Blizzard, has been under constant development for years and continues to evolve in support of espionage-focused operations. Over time, Kazuar has expanded f... When configuration becomes a vulnerability: Exploitable misconfigurations in AI apps 7d ago Exposed UIs, weak authentication, and risky defaults could turn cloud-native AI apps on Kubernetes into potential targets by threat actors. Learn how exploitable misconfigurations lead to RCE and data leaks.
BL
BleepingComputer
2h ago · 15 items
Apple blocked over $11 billion in App Store fraud in 6 years 2h ago Apple revealed that it blocked over $11 billion in fraudulent App Store transactions over the last six years, more than $2.2 billion in potentially fraudulent App Store transactions in 2025 alone. Inside a Crypto Drainer: How to Spot it Before it Empties Your Wallet 4h ago Modern crypto drainers don't hack wallets. They trick users into approving malicious transactions. Flare explores how the Lucifer DaaS platform scales wallet theft through phishing and automation. Chinese hackers target telcos with new Linux, Windows malware 4h ago A Chinese cyber-espionage campaign has been targeting telecommunications providers with newly discovered Linux and Windows malware dubbed Showboat and JFMBackdoor, respectively. Max severity Cisco Secure Workload flaw gives Site Admin privileges 4h ago Cisco has released security updates to address a maximum-severity vulnerability in Secure Workload that allows attackers to gain Site Admin privileges. Police seize “First VPN” service used in ransomware, data theft attacks 4h ago A virtual private network service called 'First VPN,' used in ransomware and data theft attacks, has been taken offline in a joint international law enforcement operation. Flipper One project needs community help to build open Linux platform 7h ago Flipper Devices, the maker of the Flipper Zero pentesting tool, is asking the community to help build Flipper One, an open Linux platform for connected devices. Microsoft warns of new Defender zero-days exploited in attacks 10h ago On Wednesday, Microsoft started rolling out security patches for two Defender vulnerabilities that have been exploited in zero-day attacks. GitHub links repo breach to TanStack npm supply-chain attack 11h ago GitHub says the hackers who breached 3,800 internal repositories gained access via a malicious version of the Nx Console VS Code extension, compromised in last week's TanStack npm supply-chain attack. Ukraine identifies infostealer operator tied to 28,000 stolen accounts 20h ago The Ukrainian cyberpolice, working in conjunction with U.S. law enforcement, has identified an 18-year-old man from Odesa suspected of running an infostealer malware operation targeting users of an online store in California. Hackers bypass SonicWall VPN MFA due to incomplete patching 20h ago Threat actors brute-forced VPN credentials and bypassed multi-factor authentication (MFA) on SonicWall Gen6 SSL-VPN appliances to deploy tools used in ransomware attacks.
15 loaded
HS
hacking: security in practice
2h ago · 20 items
20 loaded
TH
The Hacker News
3h ago · 20 items
Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor 3h ago ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories 6h ago Microsoft Warns of Two Actively Exploited Defender Vulnerabilities 7h ago When Identity is the Attack Path 7h ago 9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros 10h ago GitHub Internal Repositories Breached via Malicious Nx Console VS Code Extension 13h ago Highly Critical Drupal Core Flaw Exposes PostgreSQL Sites to RCE Attacks 14h ago Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development 1d ago Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks 1d ago Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API 1d ago
20 loaded
BH
Black Hat
4h ago · 15 items
15 loaded
MS
MSRC Security Update Guide
4h ago · 20 items
CVE-2026-45585 Windows BitLocker Security Feature Bypass Vulnerability 4h ago CVE-2026-45585 Windows BitLocker Security Feature Bypass Vulnerability 4h ago CVE-2026-43491 net: qrtr: ns: Limit the maximum server registration per node 9h ago CVE-2026-43970 Decompression Bomb in cow_spdy:inflate/2 Allows Memory Exhaustion via Crafted SPDY Frame 10h ago CVE-2026-45736 ws: Uninitialized memory disclosure 10h ago CVE-2026-45803 gh: GitHub Actions log output in `gh run view` allows terminal escape sequence injection 10h ago CVE-2026-44390 Unbounded name compression in certain cases causes degradation of service 10h ago CVE-2026-42944 Heap overflow with multiple NSID, COOKIE, PADDING EDNS options 10h ago CVE-2026-42923 Degradation of service with unbounded NSEC3 hash calculations 10h ago CVE-2026-40622 Another 'ghost domain names' attack variant 10h ago
20 loaded
SE
SecurityWeek
6h ago · 10 items
AC
All CISA Advisories
6h ago · 20 items
20 loaded
MA
Malware Analysis & Reports
6h ago · 20 items
20 loaded
SL
Security Latest
9h ago · 20 items
20 loaded
RF
Recorded Future
18h ago · 20 items
The Vulnerability Flood Is Now a Board Conversation. Here's How to Lead It. 18h ago Learn how intelligence-led programs address the "vulnerability flood" and win the board conversation by prioritizing and fixing what actually matters. At Mythos Speed: A Defender's Playbook for the AI Vulnerability Surge in 2026 2d ago Frontier AI models like Mythos are making vulnerability discovery fast and cheap. Here's how defenders use threat intelligence and agentic processing to prioritize and act at the same speed. April 2026 CVE Landscape 6d ago In April 2026, Insikt Group® identified 37 high-impact vulnerabilities that should be prioritized for remediation, 35 of which had a Very Critical Recorded Future Risk Score. This represents a 19% increase from last month. NIST NVD Enrichment Policy Change: Prioritizing Vulnerabilities with Attacker Behavior Signals 7d ago NVD enrichment now covers only 15–20% of CVEs. Learn how Recorded Future Vulnerability Intelligence prioritizes risk using real attacker behavior signals. Beyond Acceleration and Automation: How AI + Intelligence Changes Cyber Defense 7d ago The real question in modern cyber defense isn't who has more technology. It's who uses their resources more efficiently. Here's how AI fused with threat intelligence tips that balance. Working in London at the World’s Largest Intelligence Company 13d ago See what it is like to work at the Recorded Future London office. Quantum Risk Explained 14d ago Learn how the "Harvest Now, Decrypt Later" (HNDL) risk exposes long-lived sensitive data today, regardless of when Cryptographically Relevant Quantum Computers (CRQCs) arrive. Recorded Future Named a Leader in the 2026 Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies. And there’s more. 15d ago Recorded Future shares exciting developments since being named a leader. Threat Activity Enablers: The Backbone of Today’s Threat Landscape 15d ago Behind every ransomware demand, botnet, or threat activity group is a server sitting in a data center. Hacking Embodied AI 16d ago Embodied AI, intelligent systems in physical forms such as humanoid and quadruped robots, is moving from spectacle to staffing plans.
20 loaded
One Man, One AI, One Fake Persona: Inside the 5-Year Influence and Fraud ‘Patriot Bait’ Campaign 18h ago Inside SHADOW-WATER-063’s Banana RAT: From Build Server to Banking Fraud 2d ago Agentic Governance: Why It Matters Now 3d ago AI agents now act inside the trust boundary with real credentials, and agentic governance is what keeps them from quietly breaking things at machine speed. Analyzing TeamPCP’s Supply Chain Attacks: Checkmarx KICS and elementary-data in CI/CD Credential Theft 8d ago Vibe Hacking: Two AI-Augmented Campaigns Target Government and Financial Sectors in Latin America 10d ago Supporting the National Cyber Strategy: How TrendAI™ Helps 15d ago InstallFix and Claude Code: How Fake Install Pages Lead to Real Compromise 16d ago Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities 17d ago Inside Shadow-Earth-053: A China-Aligned Cyberespionage Campaign Against Government and Defense Sectors in Asia 21d ago Kuse Web App Abused to Host Phishing Document 22d ago Bad actors took advantage of the legitimate name and services of Kuse, a popular AI-based app designed for workplaces. The attackers exploited the users’ trust in Kuse to carry out a phishing attack.
20 loaded
DB
David Bombal
22h ago · 15 items
15 loaded
SA
Security - Ars Technica
22h ago · 20 items
Google publishes exploit code threatening millions of Chromium users 22h ago In stunning display of stupid, secret CISA credentials found in public GitHub repo 1d ago Bug bounty businesses bombarded with AI slop 3d ago Zero-day exploit completely defeats default Windows 11 BitLocker protections 6d ago Linux bitten by second severe vulnerability in as many weeks 9d ago Chaos erupts as cyberattack disrupts learning platform Canvas amid finals 12d ago Mozilla says 271 vulnerabilities found by Mythos have "almost no false positives" 13d ago Widely used Daemon Tools disk app backdoored in monthlong supply-chain attack 15d ago Ubuntu infrastructure has been down for more than a day 19d ago GPT-5.5 matches heavily hyped Mythos Preview in new cybersecurity tests 20d ago
20 loaded
CS
Cisco Security Advisory
1d ago · 20 items
Cisco Nexus 3000 and 9000 Series Switches Border Gateway Protocol Denial of Service Vulnerability 1d ago A vulnerability in the Border Gateway Protocol (BGP) enforce-first-as feature of Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, remote attacker to trigger BGP p... Cisco Secure Workload Unauthorized API Access Vulnerability 1d ago A vulnerability in the access validation of internal REST APIs of Cisco Secure Workload could allow an unauthenticated, remote attacker to access site resources with the privileges of the Site Admin role. This vulnerability is due to insuff... Cisco ThousandEyes Virtual Appliance Authenticated Remote Code Execution Vulnerability 1d ago A vulnerability in the SSL certificate handling of Cisco ThousandEyes Virtual Appliance could allow an authenticated, remote attacker to execute commands on the underlying operating system as the root user. This vulnerability is due to insu... Cisco ThousandEyes Enterprise Agent BrowserBot Command Injection Vulnerability 1d ago A vulnerability in the BrowserBot component of Cisco ThousandEyes Enterprise Agent could have allowed an authenticated, remote attacker to execute arbitrary commands on Agents on behalf of the BrowserBot synthetics orchestration process. Ci... Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense 2d ago On April 23, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an update to V1: Emergency Directive (ED) 25-03: Identify and Mitigate Potential Compromise of Cisco Devices related to Cisco Secure Firewall Adaptiv... Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability 7d ago May 2026: This security advisory provides the details and fix information for a vulnerability that was discovered and fixed after the Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability was disclosed in February 2026. This ... Cisco Catalyst SD-WAN Manager Vulnerabilities 7d ago Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow a remote attacker to gain access to sensitive information, elevate privileges, or gain unauthorized access to the application. For more informat... Cisco Crosswork Network Controller and Cisco Network Services Orchestrator Advisory 7d ago Following the initial publication of the Security Advisory about a denial of service (DoS) condition in Cisco Crosswork Network Controller and Cisco Network Services Orchestrator (NSO), additional information has been made available to the ... Cisco Unity Connection Remote Code Execution and Server-Side Request Forgery Vulnerabilities 15d ago Multiple vulnerabilities in Cisco Unity Connection could allow a remote attacker to execute arbitrary code on or conduct server-side request forgery (SSRF) attacks through an affected device. For more information about these vulnerabilities... Cisco Enterprise Chat and Email Lite Agent File Upload Vulnerability 15d ago A vulnerability in the Lite Agent feature of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct browser-based attacks. To exploit this vulnerability, the attacker must have valid credentials for a...
20 loaded
AL
Alerts
1d ago · 20 items
20 loaded
SE
Securelist
1d ago · 10 items
How an image could compromise your Mac: understanding an ExifTool vulnerability (CVE-2026-3102) 1d ago We explain how a flaw in ExifTool allows attackers to compromise macOS systems via a malicious image (CVE-2026-3102). IT threat evolution in Q1 2026. Mobile statistics 3d ago This report contains mobile threat statistics for Q1 2026, along with noteworthy discoveries and quarterly trends: new versions of SparkCat and Triada. IT threat evolution in Q1 2026. Non-mobile statistics 3d ago The report presents key trends and statistics on malware that targeted personal computers running Windows and macOS, as well as Internet of Things (IoT) devices, during Q1 2026. Kimsuky targets organizations with PebbleDash-based tools 7d ago Kaspersky researchers analyze a range of new PebbleDash-based tools used in recent Kimsuky campaigns and reveal their connection to the AppleSeed malware cluster. State of ransomware in 2026 9d ago Kaspersky researchers are sharing insights into the main ransomware trends for 2026: EDR killers on the rise, switching from data encryption to data leaks, and more. CVE-2025-68670: discovering an RCE vulnerability in xrdp 13d ago During a security assessment of Kaspersky USB Redirector, we discovered CVE-2025-68670: a pre-auth RCE in the xrdp server component. Project maintainers promptly patched the vulnerability. Exploits and vulnerabilities in Q1 2026 14d ago This report provides statistical data on published vulnerabilities and exploits we researched during Q1 2026. It also includes summary data on the use of C2 frameworks in APT attacks. OceanLotus suspected of using PyPI to deliver ZiChatBot malware 15d ago Kaspersky researchers uncovered malicious wheel packages in PyPI that targeted both Windows and Linux and contained a dropper delivering malware dubbed ZiChatBot. We attribute this activity to OceanLotus APT. Websites with an undefined trust level: avoiding the trap 15d ago We explain what suspicious websites are and how to distinguish a safe site from a fraudulent one. A new category in Kaspersky solutions: we’re sharing global statistics on untrusted site detection. “Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security 17d ago Kaspersky expert breaks down a new phishing scheme that uses the Amazon SES cloud email service. Let’s look at some examples to see how you can tell a phishing email from a real one.
WE
WeLiveSecurity
1d ago · 20 items
20 loaded
CY
CyberScoop
1d ago · 36 items
CISA credential leak raises alarms, and Capitol Hill demands answers 1d ago Attackers hit vulnerabilities hard last year, making exploits the top entry point for breaches 1d ago Mini Shai-Hulud returns, compromising hundreds of npm packages 2d ago Microsoft disrupts cybercrime service that abused software verification systems en masse 2d ago AI might cut false positives, but it won’t stop the slop 2d ago Interpol leads cybercrime crackdown across 13 countries in Middle East, North Africa 2d ago The Canvas breach proved that prevention is no longer enough 3d ago Former CISA nominee Sean Plankey named US CEO of defense startup 3d ago Colorado governor commutes prison sentence for election denier Tina Peters 5d ago Here’s how the FTC plans to enforce the Take It Down Act 5d ago
36 loaded
KO
Krebs on Security
2d ago · 10 items
CISA Admin Leaked AWS GovCloud Keys on Github 2d ago Until this past weekend, a contractor for the Cybersecurity & Infrastructure Security Agency (CISA) maintained a public GitHub repository that exposed credentials to several highly privileged AWS GovCloud accounts and a large number of inte... Patch Tuesday, May 2026 Edition 8d ago Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer code. That reality is on full display this m... Canvas Breach Disrupts Schools & Colleges Nationwide 13d ago An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the servi... Anti-DDoS Firm Heaped Attacks on Brazilian ISPs 21d ago A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazi... ‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty 30d ago A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phish... Patch Tuesday, April 2026 Edition 36d ago Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dub... Russia Hacked Routers to Steal Microsoft Office Tokens 44d ago Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backe... Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab 45d ago An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gang... ‘CanisterWorm’ Springs Wiper Attack Targeting Iran 59d ago A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or ha... Feds Disrupt IoT Botnets Behind Huge DDoS Attacks 62d ago The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as ro...
JH
John Hammond
3d ago · 15 items
15 loaded
DA
darkreading
3d ago · 45 items
The Boring Stuff is Dangerous Now 3d ago Can Laws Stop Deepfakes? South Korea Aims to Find Out 3d ago Congress Puts Heat on Instructure After Canvas Outage 5d ago Cyber Pioneers Ponder Past as Prologue 6d ago Taiwan Bullet Train Hack Highlights Cybersecurity Gaps in Rail Systems 6d ago SecurityScorecard Snags Driftnet to Level Up Threat Intelligence 6d ago Maximum Severity Cisco SD-WAN Bug Exploited in the Wild 6d ago 'FrostyNeighbor' APT Carefully Targets Govt Orgs in Poland, Ukraine 7d ago AI Drives Cybersecurity Investments, Widening 'Valley of Death' 7d ago Foxconn Attack Highlights Manufacturing's Cyber Crisis 7d ago
45 loaded
NA
NahamSec
3d ago · 15 items
15 loaded
HA
Hak5
4d ago · 15 items
15 loaded
CD
Cyber Defense Magazine
4d ago · 35 items
Why Is Cybersecurity Now A Business Priority, Not Just An IT Function? 4d ago The Security Mistakes Being Repeated With Ai 5d ago The Hidden Risk For IT Subcontractors: When Insurance, Not Security, Costs You The Contract 6d ago Innovator Spotlight: Klever Compliance 6d ago Innovator Spotlight: Radware 6d ago Innovator Spotlight: JScrambler 7d ago Innovators Spotlight: OPSWAT 7d ago The Board Is Asking The Wrong Security Question 8d ago Synthetic Identity Fraud Requires An Equal Focus On Biometrics And Document Verification 9d ago Innovator Spotlight: Iru 9d ago
35 loaded
IP
IppSec
5d ago · 15 items
15 loaded
BF
Blog – Forter
7d ago · 10 items
TC
The Cyber Mentor
7d ago · 15 items
15 loaded
HS
Heimdal Security Blog
9d ago · 15 items
AI Will Absorb 99.98% of SOC Triage Within a Year, as 79% of IT teams brace for AI-driven workload shift 9d ago Morten Kjaersgaard expects fewer than 500 of three million monthly alerts to need a human analyst in the year ahead. The role is being rebuilt around cases that warrant judgement. Top 10 Cybersecurity Companies in Europe 16d ago Over the last 10-15 years, the cybersecurity scene has gotten increasingly complex, as organizations adopt new technology and hackers evolve more innovative ways to target them. At the same time, data protection and compliance have become m... Heimdal Expands AI Strategy with AI Wingman and Third-Party AI Containment 30d ago Heimdal today unveiled the next phase of its AI strategy, expanding AI Wingman with three new layers - Assist, Triage and SOC - alongside the introduction of Third-Party AI Containment. You Only Know What You’ve Got When Its Gone 55d ago Prepare for the expected. Rehearse an action plan in case of technology failure or cyberattacks. We all know they can happen. Nordic MSPs Can Now Access Heimdal’s Unified Security and Compliance Platform Through Elovade 64d ago Heimdal has appointed Elovade as its official distributor in the Nordic region. The move gives MSPs and resellers across Sweden, Norway, Denmark, Iceland, and Finland direct access to Heimdal's consolidated cybersecurity platform through a ... OpenClaw Incidents Show Why AI Adoption Pressure Puts Companies at Risk 77d ago The OpenClaw security failures show how hasty AI adoption can expose businesses and supply chains to major cyber risk. Heimdal Claims Industry First With a Cyber Essentials Control Mapping for PEDM to Help Organisations Prove Least Privilege 101d ago Heimdal is the first vendor to publish a dedicated Cyber Essentials control mapping for PEDM, setting out how privilege management supports Cyber Essentials requirements and what evidence can be produced to support assessment and assurance. Five Predictions for Cyber Security Trends in 2026 106d ago Morten Kjaersgaard, Heimdal’s Founder, and Adam Pilton, a former cybercrime investigator, predict five cyber security trends for 2026. Heimdal Achieves OPSWAT Gold Certification for Anti-Malware 126d ago Heimdal today announced that its Next-Gen Antivirus (NGAV) with Extended Threat Protection (XTP) has achieved OPSWAT Gold Certification for Anti-Malware, validating its compatibility and effectiveness within OPSWAT’s industry-leading Access... How to Avoid Holiday Shopping Scams (From a Former Cyber Detective) 161d ago Worried about holiday scams? Ex-cybercrime detective Adam Pilton breaks down the biggest threats and how to shop safely this festive season.
15 loaded
M3
Microsoft 365 Blog
10d ago · 10 items
New and improved: Agent governance, intelligent workflows, and connected app experiences 10d ago See what's new in Copilot Studio, April 2026: updates to workflows, more control over agent operations, and an expanded agent usage estimator. Copilot Cowork: From conversation to action across skills, integrations, and devices 16d ago Today, we’re announcing additional capabilities in Cowork to expand on what it can make possible for you. Microsoft 365 Copilot, human agency, and the opportunity for every organization 16d ago Empower your organization with Microsoft 365 Copilot—AI that bridges human potential and business outcomes for the future of work. Microsoft Agent 365, now generally available, expands capabilities and integrations 20d ago ​We’re announcing the general availability of Agent 365, plus previews of new capabilities to discover and manage shadow AI agents. Learn more. Copilot’s agentic capabilities in Word, Excel, and PowerPoint are generally available 28d ago Copilot's newest features are now generally available as the default experience across all Microsoft 365 subscriptions. Bring your everyday business apps into the flow of work with agents in Microsoft 365 Copilot 38d ago Discover how apps integrate with AI agents to power Copilot experiences, streamline workflows, and turn business context into action. New and improved: Multi-agent orchestration, connected experiences, and faster prompt iteration 49d ago Explore what's new in Copilot Studio: Multi-agent systems now generally available, plus updates to the Prompt Editor and governance controls. Copilot Cowork: Now available in Frontier 52d ago Today, Copilot Cowork—designed for long-running, multi-step work in Microsoft 365—is available via the Frontier program. Copilot Cowork: A new way of getting work done 73d ago Copilot Cowork turns intent into action across Microsoft 365—automating tasks, coordinating workflows, and keeping you in control. See how. Powering Frontier Transformation with Copilot and agents 73d ago Wave 3 of Microsoft 365 Copilot introduces Copilot Cowork, multi‑model intelligence, and enterprise‑ready AI—built to get real work done.
TL
The Last Watchdog
15d ago · 10 items
News alert: LuxSci launches HIPAA-compliant email platform for mid-size healthcare market 15d ago CAMBRIDGE, Mass., May 5, 2026, CyberNewswireŌĆöLuxSci, a leading provider of HIPAA compliant secure healthcare communications, today announced the launch of LuxSci Secure High Volume Email for mid-sized healthcare organizations, the industr... SHARED INTEL Q&A: PKI’s unfinished business—’digital passports’ for content, models and agents 21d ago As if keeping track of machine identities wasnŌĆÖt hard enough. AI agents are now arriving by the thousands ŌĆö and most enterprises are just handing them borrowed credentials and hoping for the best. Meanwhile, the cryptographic infrastruc... GUEST ESSAY: How augmented reality (AR) can turn building images into ad space with no control 23d ago Every major building in America has three things: a physical address, a legal owner, and an unmonitored attack surface. Related: Sam Altman's quest to usurp the browswer That surface extends from the ground up through every floor, every fac... FIRESIDE CHAT: Leaked secrets are now the go-to attack vector — and AI is accelerating exposures 24d ago A consequential shift is underway in how enterprise breaches begin. The leaked credential ‚Äî once treated as a hygiene problem ‚Äî has become the primary on-ramp. Related: No easy fixes for AI risk Last August‚Äôs Salesloft campaign was th... News alert: BreachLock’s integrated attack validation platform debuts in Gartner AEV category 29d ago NEW YORK, Apr. 21, 2026, CyberNewswire—BreachLock, a global leader in offensive security, today announced it has been named a representative vendor in the 2026 Gartner Market Guide for Adversarial Exposure Validation. This recognition mar... Fireside Chat: PKI has carried digital trust through every tech advance—now comes the hardest one 31d ago Public key infrastructure -- the authentication and encryption framework that has held digital commerce together through every chaotic leap forward in technology -- is facing a double whammy. Related: Achieveing AI security won't be easy Au... News Alert: NTT Research launches SaltGrain—advanced Attribute-Based Encryption security 35d ago SUNNYVALE, Calif., Apr. 15, 2026 ŌĆō NTT Research, Inc., a division of NTT (TYO:9432), today announced the launch of Scale Academy, a startup incubator responsible for bringing to market products and services based upon technologies studied... GUEST ESSAY: Google’s 2029 deadline exposes readiness gap as move to quantum-safe crypto lags 37d ago For years, quantum risk was easy for most institutions to treat as premature: real in theory, urgent someday, but not yet an operational problem. That is no longer tenable. Related: AI spawns semantic attacks Two developments this month bro... News alert: Mallory launches AI-native platform to cut through alert noise and surface real risk 41d ago AUSTIN, Texas, Apr. 9, 2026, CyberNewswire—Mallory is launching a AI-native threat intelligence platform, purpose-built to answer the questions CISOs and their teams are asking every day: •What are the real threat vectors for our organi... FIRESIDE CHAT: Geopolitical turmoil, rising AI risk add a new layer to enterprise cyber defense 44d ago As if securing the enterprise against a tidal wave of AI tools wasn't hard enough, it turns out the geopolitical instability of the moment is making things worse. That wasn't the headline at RSAC 2026 last week -- agentic AI dominated the a...
WE
WeLiveSecurity
16d ago · 20 items
20 loaded
Azure IaaS: Defense in depth built on secure-by-design principles 17d ago Explore how Azure IaaS uses defense in depth and secure-by-design principles to deliver layered, scalable cloud security across compute, network, and data. Enforcing trust and transparency: Open-sourcing the Azure Integrated HSM 21d ago Learn how Microsoft Azure Integrated HSM delivers hardware‑enforced key protection in the cloud, combining FIPS Level 3 assurances with transparency and open‑source collaboration. Azure IaaS: Keep critical applications running with built-in resiliency at scale 50d ago Learn how Azure IaaS helps organizations start from a resilient platform foundation with availability, continuity, and recovery capabilities. Azure IaaS: Explore new resources for building a stronger, more efficient infrastructure 78d ago Learn how Azure IaaS helps you modernize infrastructure, improve performance and resilience, optimize costs, and prepare for AI workloads. Read more. Azure reliability, resiliency, and recoverability: Build continuity by design 93d ago Learn how Azure reliability, resiliency, and recovery capabilities work together to improve cloud continuity. Read more. Microsoft strengthens sovereign cloud capabilities with new services 197d ago Discover new Microsoft digital sovereignty capabilities and upcoming features across AI, security, and productivity, to address sovereign cloud needs. Enhancing software supply chain security with Microsoft’s Signing Transparency 199d ago Microsoft Signing Transparency delivers verifiable code integrity and tamper-evident software releases for stronger supply chain security. Oracle Database@Azure offers new features, regions, and programs to unlock data and AI innovation 219d ago Migrate Oracle solutions to the cloud with a trusted, enterprise-ready platform from Microsoft and Oracle. Learn more. Building secure, scalable AI in the cloud with Microsoft Azure 324d ago Forrester Research shows how Azure helps enterprises scale generative AI securely, unlocking real business value. Learn more. Enhance AI security with Azure Prompt Shields and Azure AI Content Safety 350d ago Learn how Prompt Shields and Azure AI Content Safety can help guard against direct and indirect threats to your LLM-based solution.
DE
DEFCONConference
22d ago · 15 items
15 loaded
CC
CISA Cybersecurity Advisories
30d ago · 10 items
Defending Against China-Nexus Covert Networks of Compromised Devices 30d ago Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure 45d ago U.S. organizations should review the TTPs and IOCs in this advisory for indications of current or historical activity on their networks, and apply the Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure 166d ago The authoring organizations encourage critical infrastructure organizations to implement the recommendations in this advisory to reduce the likelihood and CISA Shares Lessons Learned from an Incident Response Engagement 241d ago Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System 269d ago The authoring agencies strongly urge network defenders to hunt for malicious activity and to apply the mitigations in this CSA to reduce the threat of Chinese CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization 296d ago #StopRansomware: Interlock 304d ago Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider 343d ago CISA urges software vendors, downstream customers, and end users to immediately implement the Mitigations listed in this advisory based on confirmed compromise Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations 365d ago Russian GRU Targeting Western Logistics Entities and Technology Companies 374d ago Executives and network defenders should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and IOCs
13 loaded
LI
LiveOverflow
77d ago · 15 items
15 loaded
SK
STÖK
270d ago · 15 items
15 loaded
HA
HackerSploit
407d ago · 15 items
15 loaded
TH
Threatpost
1359d ago · 10 items
Student Loan Breach Exposes 2.5M Records 1359d ago 2.5 million people were affected, in a breach that could spell more trouble down the line. Watering Hole Attacks Push ScanBox Keylogger 1360d ago Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool. Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms 1361d ago Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system. Ransomware Attacks are on the Rise 1364d ago Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group. Cybercriminals Are Selling Access to Chinese Surveillance Cameras 1364d ago Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed. Twitter Whistleblower Complaint: The TL;DR Version 1366d ago Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk. Firewall Bug Under Active Attack Triggers CISA Warning 1367d ago CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP. Fake Reservation Links Prey on Weary Travelers 1368d ago Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels. iPhone Users Urged to Update to Patch 2 Zero-Days 1371d ago Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack. Google Patches Chrome’s Fifth Zero-Day of the Year 1372d ago An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.

No matching sources found.