CISA to allow researchers to report vulnerabilities to exploited bugs catalog
Why the Supreme Court's Chatrie case could change the meaning of privacy in America
Canadian man arrested, charged for running KimWolf DDos botnet
Belarus-linked hackers use fake training certificates to target Ukrainian officials
Hackers steal patient and billing data from German hospitals via third-party provider
What's New
Top 5 Across All Sources-
CISA to allow researchers to report vulnerabilities to exploited bugs catalog
The Record from Recorded Future News · 1h ago -
AI security CTF from a CNCF project - useful for understanding LLM/agent attack patterns from the defense side (June 17-22)
For [Blue|Purple] Teams in Cyber Defence · 1h ago -
AI Security CTF (free, open) - prompt injection, agent workflow hijacking, guardrail bypass - June 17-22
Technical Information Security Content & Discussion · 1h ago -
Feedback needed
cybersecurity · 1h ago
Latest
The Record from Recorded Future NewsCISA to allow researchers to report vulnerabilities to exploited bugs catalogFor [Blue|Purple] Teams in Cyber DefenceAI security CTF from a CNCF project - useful for understanding LLM/agent attack patterns from the defense side (June 17-22)Reverse EngineeringCTF with AI/LLM reverse engineering angles - intercepting streamed responses, replaying tokens, finding hidden endpoints (June 17-22)Technical Information Security Content & DiscussionAI Security CTF (free, open) - prompt injection, agent workflow hijacking, guardrail bypass - June 17-22cybersecurityFeedback neededFor [Blue|Purple] Teams in Cyber DefenceGitHub - perplexityai/bumblebee: Read-only inventory collector for package, extension, and developer-tool metadata on macOS and Linux developer endpoints, built for fast supply-chain exposure checks.cybersecurityHandoff TransitionSecurity - Ars TechnicaPolice boast of hacking VPN where criminals "believed themselves to be safe"hacking: security in practiceWhere to learn the ins and outs of the computer itselfSecurity - Ars TechnicaTexas AG sues Meta over claims that WhatsApp doesn't provide end-to-end encryptionBlack HatSecTor 2025 | Exploiting Multi Agent SystemsTechnical Information Security Content & DiscussionJust added an interactive security map to my project NoEyes showing exactly what the server sees (and doesn't)cybersecurityJust added an interactive security map showing exactly what the server sees (and doesn't)Latest newsYes, you need a smart bird feeder in your life - and this one's on sale for Memorial DayDavid BombalIs this a Flipper Zero replacement?Latest newsThese are my favorite gadgets to add ambiance to your home, and they're all on saleThe Hacker NewsFirst VPN Dismantled in Global Takedown Over Use by 25 Ransomware GroupsBleepingComputerNetherlands seizes 800 servers of hosting firm enabling cyberattacksFor [Blue|Purple] Teams in Cyber DefenceTracking Iranian APT Screening Serpens’ 2026 Espionage CampaignsSecurityWeekDrupal Vulnerability in Hacker Crosshairs Shortly After DisclosureThe Record from Recorded Future NewsCISA to allow researchers to report vulnerabilities to exploited bugs catalogFor [Blue|Purple] Teams in Cyber DefenceAI security CTF from a CNCF project - useful for understanding LLM/agent attack patterns from the defense side (June 17-22)Reverse EngineeringCTF with AI/LLM reverse engineering angles - intercepting streamed responses, replaying tokens, finding hidden endpoints (June 17-22)Technical Information Security Content & DiscussionAI Security CTF (free, open) - prompt injection, agent workflow hijacking, guardrail bypass - June 17-22cybersecurityFeedback neededFor [Blue|Purple] Teams in Cyber DefenceGitHub - perplexityai/bumblebee: Read-only inventory collector for package, extension, and developer-tool metadata on macOS and Linux developer endpoints, built for fast supply-chain exposure checks.cybersecurityHandoff TransitionSecurity - Ars TechnicaPolice boast of hacking VPN where criminals "believed themselves to be safe"hacking: security in practiceWhere to learn the ins and outs of the computer itselfSecurity - Ars TechnicaTexas AG sues Meta over claims that WhatsApp doesn't provide end-to-end encryptionBlack HatSecTor 2025 | Exploiting Multi Agent SystemsTechnical Information Security Content & DiscussionJust added an interactive security map to my project NoEyes showing exactly what the server sees (and doesn't)cybersecurityJust added an interactive security map showing exactly what the server sees (and doesn't)Latest newsYes, you need a smart bird feeder in your life - and this one's on sale for Memorial DayDavid BombalIs this a Flipper Zero replacement?Latest newsThese are my favorite gadgets to add ambiance to your home, and they're all on saleThe Hacker NewsFirst VPN Dismantled in Global Takedown Over Use by 25 Ransomware GroupsBleepingComputerNetherlands seizes 800 servers of hosting firm enabling cyberattacksFor [Blue|Purple] Teams in Cyber DefenceTracking Iranian APT Screening Serpens’ 2026 Espionage CampaignsSecurityWeekDrupal Vulnerability in Hacker Crosshairs Shortly After Disclosure
By Source
Feeds organized so you can skim by site.
Density
Sort
AI security CTF from a CNCF project - useful for understanding LLM/agent attack patterns from the defense side (June 17-22)
GitHub - perplexityai/bumblebee: Read-only inventory collector for package, extension, and developer-tool metadata on macOS and Linux developer endpoints, built for fast supply-chain exposure checks.
Tracking Iranian APT Screening Serpens’ 2026 Espionage Campaigns
Tired of searching different websites, blogs, Reddit posts, and docs just to learn KQL?
I got tired of guessing which LOLBAS binaries exist on a host at my privilege level, so I wrote a small Go scanner
AI-generated reporting: Lessons learned from Cisco Talos Incident Response
CrabLoader: A PoC Cobalt Strike UDRL written in Rust
The 429 Microsoft Graph Mystery
GhostTree: Unveiling Path Manipulation Techniques to Bypass Windows Security
Azure Tenant Enumeration is Dead
20 loaded
CTF with AI/LLM reverse engineering angles - intercepting streamed responses, replaying tokens, finding hidden endpoints (June 17-22)
Rebuilding Zyxel’s super-admin password flow in HTML from firmware/runtime notes
qslcl.bin v0.6.8: minor fixes to improve size stability to avoid useless zero fill in EOF (Actually i trim it from 128 kb to 80 kb)
Reverse Engineered Google reCAPTCHA
Post-Quantum Cryptographic Algorithm Examined in Developmental Ransomware
I got so sick of Android taking forever to calculate folder sizes, I built a custom C++/Rust storage visualizer to bypass MTP
CVE-2026-40369: Twelve Bytes to Escape the Browser Sandbox
I built 99 adversarial PE fixtures to stress‑test parsers — here’s what they reveal about malformed binaries
GeoHelper - Tauri + Chrome DevTools Protocol (CDP) for GeoGuessr (Steam)
AI Agents defeat obfuscated JavaScript in 10 minutes
20 loaded
AI Security CTF (free, open) - prompt injection, agent workflow hijacking, guardrail bypass - June 17-22
Just added an interactive security map to my project NoEyes showing exactly what the server sees (and doesn't)
Restoring Testability: Handling Complex Scenarios in Burp Suite with a Custom Extension
Zyxel low-priv account leaked super-admin, FTPS, and TR-069 secrets across router fleets
durabletask (Microsoft's Python Durable Task client) compromised by TeamPCP | same Mini Shai-Hulud payload as last week's TanStack wave
[Analysis] CISA contractor left AWS GovCloud admin keys, plaintext passwords, SAML certs, and Kubernetes configs on a public GitHub repo for 183 days — with secret scanning deliberately disabled
GitHub Actions Cache Poisoning is eating open source
CVE-2026-40369: Twelve Bytes to Escape the Browser Sandbox
CVE-2026-34474: Pre-auth credential disclosure in ZTE H298A / H108N via ETHCheat
FatGid - FreeBSD 14.x kernel LPE
20 loaded
Feedback needed
Handoff Transition
Just added an interactive security map showing exactly what the server sees (and doesn't)
Trend Micro warns of Apex One zero-day exploited in the wild
Lawmakers Demand Answers as CISA Tries to Contain Data Leak
Harvard and 140 other legitimate websites compromised
5,561 GitHub repos got malicious CI/CD commits injected in 6 hours. The commits looked exactly like routine bot maintenance. Here is what happened and how to check if you were hit.
US states urge Congress to renew cybersecurity grants
Watching AI Brain Drain on Attackers in Real Time
Does Security Implement Fixes?
20 loaded
Police boast of hacking VPN where criminals "believed themselves to be safe"
Texas AG sues Meta over claims that WhatsApp doesn't provide end-to-end encryption
A hacker group is poisoning open source code at an unprecedented scale
Google publishes exploit code threatening millions of Chromium users
In stunning display of stupid, secret CISA credentials found in public GitHub repo
Bug bounty businesses bombarded with AI slop
Zero-day exploit completely defeats default Windows 11 BitLocker protections
Linux bitten by second severe vulnerability in as many weeks
Chaos erupts as cyberattack disrupts learning platform Canvas amid finals
Mozilla says 271 vulnerabilities found by Mythos have "almost no false positives"
20 loaded
Where to learn the ins and outs of the computer itself
Zyxel super-admin password leak across CPE/ONT/LTE routers + rebuilt password generator
CVE-2026-34474: ZTE H298A / H108N credential exposure through ETHCheat
SeekYou — one input, 15 recon sources, one report.
The Open Source USB Drive Built for Privacy
cpu backdoor
Technical analysis of CVE-2026-34472 in ZTE H188A router firmware
Ongoing development
For cybersecurity folks working remotely, do you end up working the entire shift, or do you get time to relax and take breaks?
Hackers found a way around Intel CET—PLaTypus locks down library jumps
20 loaded
BH
SecTor 2025 | Exploiting Multi Agent Systems
What It’s Like to Speak at Black Hat | Yaara Shriki, Threat Researcher at Wiz
SecTor 2025 | Signature of Destruction: Outlook RCE Strikes Again
SecTor 2025 | How Secure is Your Base Image? A Live Security Test of Popular OSS Containers
SecTor 2025 | Why Phish if it Doesn't Work? A No BS Take on Why We Need to Phish
SecTor 2025 | How a Mobile Drivers License App Became a Boarding Pass
SecTor 2025 | When Hackers Meet Burglars
Black Hat Stories Episode 4 | Yaara Shriki, Threat Researcher at Wiz
Black Hat Stories | Yaara Shriki, Threat Researcher at Wiz
Connecting at Black Hat | Hear from the CEO & Founder of FuzzingLabs
15 loaded
LN
Yes, you need a smart bird feeder in your life - and this one's on sale for Memorial Day
Offering insight into which birds are visiting your feeder this summer, the Birdfy smart feeder is 35% off for Memorial Day weekend.
These are my favorite gadgets to add ambiance to your home, and they're all on sale
Looking to add more coziness to your home's interior? These are my go-to products and devices.
5 iPad accessories I'll never regret buying (including a $35 Apple Pencil alternative)
I've been using an iPad Air M2 for over two years, and these are my go-to essentials to get the most out of the tablet.
AT&T will give you the new Razr+ flip phone for under $5 a month - no trade-in required
With this Memorial Day deal, AT&T is offering new and existing customers the 2026 Razr+ flip phone for just $4.43 per month. Here's what to know.
Hundreds of readers preordered the Fitbit Air with this deal - here's why
Our readers are loving this Fitbit Air preorder deal. We break down the details - and where you can grab the best offers.
Amazon just slashed the price of Meta Ray-Ban smart glasses - up to 25% off
These Memorial Day deals on Meta smart glasses include the second-gen Ray-Bans and the Oakley HSTN models at some of the lowest prices we've seen.
7 WFH gadgets that are huge quality of life improvements
These gadgets aren't going to make or break your home office, but they're huge upgrades for my workflow - and most are on sale for Memorial Day.
This Costco deal cuts the price of membership to $45 - here's how to get it
If you've been thinking about joining Costco, the wholesale retailer is offering a gift card of up to $40 for new members, effectively dropping the price of your membership.
Lowe's just dropped its Memorial Day deals - I found the best ones
Lowe's has everything you need for home, lawn, and garden projects with these Memorial Day deals on appliances, grills, and more.
Thinking about plug-in solar? It may be coming to your state soon
Here's what you should know if you have plug-in solar on your mind, especially if you're in the US.
20 loaded
DB
Is this a Flipper Zero replacement?
Your Fancy DNS Tricks Won’t Give You Privacy
VS Code WARNING: 3800 repos hacked
Mouse disappearing in Kali? Fix it 2026 (VMWare Workstation Pro)
1000x More Powerful Than an RTX 5090
My Dream "home lab"
Warning: AI can give your passwords to hackers. Prompt injection demo
Is this laptop any good? (Real World Use cases)
3 risks of using clear DNS
May the force help you troubleshoot ...
15 loaded
First VPN Dismantled in Global Takedown Over Use by 25 Ransomware Groups
Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware
Megalodon GitHub Attack Targets 5,561 Repos with Malicious CI/CD Workflows
Making Vulnerable Drivers Exploitable Without Hardware - The BYOVD Perspective
Kimwolf DDoS Botnet Operator Arrested in Canada Over DDoS-for-Hire Attacks
CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV
Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access
Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor
ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories
Microsoft Warns of Two Actively Exploited Defender Vulnerabilities
20 loaded
Netherlands seizes 800 servers of hosting firm enabling cyberattacks
Financial crime investigators in the Netherlands (FIOD) arrested two men and seized 800 servers linked to a web hosting company that enabled cyberattacks, interference operations, and disinformation campaigns.
Former US execs plead guilty to aiding tech support scammers
Two former executives of a call-tracking and analytics company pleaded guilty to concealing a years-long tech support fraud scheme that victimized individuals worldwide.
Trend Micro warns of Apex One zero-day exploited in the wild
Japanese cybersecurity software company Trend Micro has addressed an Apex One zero-day vulnerability exploited in attacks targeting Windows systems.
Drupal: Critical SQL injection flaw now targeted in attacks
Drupal is warning that hackers are attempting to exploit a
Why Chargebacks are Just One Piece of the Fraud Puzzle
Fraud losses don't stop at chargebacks. False declines, account takeovers, and abuse also damage revenue and trust. IPQS breaks down why fraud teams need broader visibility into risk and customer impact.
Ubiquiti patches three max severity UniFi OS vulnerabilities
Ubiquiti has released security updates to patch three maximum severity vulnerabilities in Unify OS that can be exploited by remote attackers without privileges.
US and Canada arrest and charge suspected Kimwolf botnet admin
U.S. and Canadian authorities arrested and charged a Canadian man with operating the KimWolf distributed denial-of-service (DDoS) botnet, which infected nearly two million devices worldwide.
Google accidentally exposed details of unfixed Chromium flaw
Google has accidentally leaked details about an unfixed issue in Chromium that keeps JavaScript running in the background even when the browser is closed, allowing remote code execution on the device.
Apple blocked over $11 billion in App Store fraud in 6 years
Apple revealed that it blocked over $11 billion in fraudulent App Store transactions over the last six years, more than $2.2 billion in potentially fraudulent App Store transactions in 2025 alone.
Inside a Crypto Drainer: How to Spot it Before it Empties Your Wallet
Modern crypto drainers don't hack wallets. They trick users into approving malicious transactions. Flare explores how the Lucifer DaaS platform scales wallet theft through phishing and automation.
15 loaded
SE
Drupal Vulnerability in Hacker Crosshairs Shortly After Disclosure
In Other News: Industrial Router Exploitation, CISA KEV Nomination Form, Gas Station Hacking
Canadian Man Arrested for Operating Kimwolf Botnet
‘First VPN’ Cybercrime Service Disrupted, Administrator Arrested
TrendAI Patches Apex One Zero-Day Exploited in the Wild
Grafana Says Codebase and Other Data Stolen via TanStack Supply Chain Attack
Cisco Patches Critical Vulnerability in Secure Workload
Ocean Emerges From Stealth With $28M for Agentic Email Security Platform
Apple Rejected 2 Million App Store Submissions in 2025 for Security and Fraud Prevention
Drupal Patches Highly Critical Vulnerability Exposing Websites to Hacking
Microsoft recognized as a Leader in The Forrester Wave™ for Workforce Identity Security Platforms
Microsoft has been recognized as a Leader in The Forrester Wave™: Workforce Identity Security Platforms, Q2 2026, receiving the highest scores in both the current offering and strategy categories.
From edge appliance to enterprise compromise: Multi-stage Linux intrusion via F5 and Confluence
A multi-stage attack on Linux devices began with an exposed F5 BIG-IP edge appliance and pivoted to an internal Confluence server for credential theft and identity compromise. Learn how the threat actor attempted Kerberos relay and lateral ...
Microsoft Security success stories: How St. Luke’s and ManpowerGroup are securing AI foundations
Read how Microsoft customers embed governance, identity, and cloud security to make protection an enabler of AI growth.
What’s new in Microsoft Security: May 2026
Microsoft Security’s latest updates extend visibility, control, and protection across expanding ecosystems as organizations accelerate AI adoption.
Mini Shai Hulud: Compromised @antv npm packages enable CI/CD credential theft
Compromised @antv npm packages deploy the Mini Shai-Hulud payload to steal CI/CD secrets from Linux-based automation environments. The malware executes during npm install and targets credentials across GitHub, AWS, Kubernetes, Vault, npm, a...
Securing the gaming culture of cultures
Read about the unique challenges and rewards of securing gaming platforms and how to better protect gaming communities.
Introducing RAMPART and Clarity: Open source tools to bring safety into Agent development workflow
The AI systems shipping inside enterprises today are fundamentally different from the ones we were building even two years ago, because they have moved well past answering questions and into accessing your email, retrieving records from you...
Exposing Fox Tempest: A malware-signing service operation
Fox Tempest is a financially motivated threat actor operating a malware‑signing‑as‑a‑service (MSaaS) used by other cybercriminals, including Vanilla Tempest and Storm groups, to more effectively distribute malicious code, including ransomwa...
How Storm-2949 turned a compromised identity into a cloud-wide breach
Storm-2949 turned stolen credentials into a cloud-wide breach, moving from identity compromise to large-scale data theft without using malware. This incident shows how threat actors can exploit trusted systems to operate undetected.
How to better protect your growing business in an AI-powered world
Read how built-in security helps keep small and medium businesses running, protect customer trust, and support growth in a new Microsoft whitepaper.
Lawmakers Demand Answers as CISA Tries to Contain Data Leak
Lawmakers in both houses of Congress are demanding answers from the U.S. Cybersecurity & Infrastructure Security Agency (CISA) after KrebsOnSecurity reported this week that a CISA contractor intentionally published AWS GovCloud keys and a v...
Alleged Kimwolf Botmaster ‘Dort’ Arrested, Charged in U.S. and Canada
Canadian authorities on Wednesday arrested a 23-year-old Ottawa man on suspicion of building and operating Kimwolf, a fast spreading Internet-of-Things botnet that enslaved millions of devices for use in a series of massive distributed deni...
CISA Admin Leaked AWS GovCloud Keys on Github
Until this past weekend, a contractor for the Cybersecurity & Infrastructure Security Agency (CISA) maintained a public GitHub repository that exposed credentials to several highly privileged AWS GovCloud accounts and a large number of inte...
Patch Tuesday, May 2026 Edition
Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer code. That reality is on full display this m...
Canvas Breach Disrupts Schools & Colleges Nationwide
An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the servi...
Anti-DDoS Firm Heaped Attacks on Brazilian ISPs
A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazi...
‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty
A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phish...
Patch Tuesday, April 2026 Edition
Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dub...
Russia Hacked Routers to Steal Microsoft Office Tokens
Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backe...
Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gang...
Harvard and 140 other legitimate websites compromised
Browser session theft is quietly becoming more dangerous than password theft
Megalodon Malware Compromised 5,500+ GitHub Repos Within 6 Hours
Database of Malicious Browser Extensions
I’ve got 99 problems, and IOCX isn’t one.
Benchmarking LLMs for malware triage and static unpacking with Malcat
Netmirror exposed - The Free Movie App That Was Robbing You Blind
Malware learning
Brovan: Binary user-mode emulator for x86_64
npm supply chain compromise on a Next.js app — XMRig miner bundled into webpack output
20 loaded
Soft Skills for the Job Market: Communication
LIVE: 🕵️ HTB Sherlocks! | Cybersecurity | Blue Team
A Quick Way to Prove Your Cybersecurity Skillset!
A Guide to LNK File Forensics
Josh Mason | Real Folks of Cyber | DITL
Use BLUR-IT to Increase Your OPSEC
How to Investigate with Windows Prefetch Files
Cybersecurity Books to Read: DFIR Investigative Mindset
Bye Bye Bellini! | Andrew Bellini's Farewell Stream | Cybersecurity | AMA
Getting Started With The Windows Registry
15 loaded
$20 per zero-day is already the WordPress plugin reality
An AI pipeline surfaced 300+ WordPress plugin vulnerabilities in three days at about $20 each, straining global disclosure programs.
Deleted Google API keys keep working for up to 23 minutes, researchers warn
Security researchers found that deleted Google API keys remain valid for up to 23 minutes, leaving a window for attackers to exploit them.
Kore.ai unveils AI-native platform for enterprise multiagent systems
Kore.ai launched the Artemis Agent Platform, a native system for building and managing enterprise agents on Azure first at launch.
Suspected KimWolf botnet admin arrested over DDoS-for-hire operation
U.S. and Canadian authorities arrested the alleged KimWolf DDoS botnet administrator linked to over 1 million infected devices.
Versa extends zero trust principles to AI agents and MCP workflows
Versa introduced a Zero Trust MCP architecture to validate AI agent actions and strengthen security controls.
GitLab 19.0 adds AI workflows, secrets management, and self-hosted model support
GitLab 19.0 adds agentic workflows, secrets management, CI visibility, and self-hosted AI support plus supply chain insights.
Proton Pass adds monitored credential sharing for AI agents
Proton Pass added AI access tokens for credential sharing, letting users grant AI agents monitored access to selected vault items.
Keepnet contributes voice and SMS phishing data to the 2026 Verizon DBIR
Keepnet data in Verizon’s 2026 DBIR shows voice and SMS phishing raise click rates and security risk.
CISA’s new KEV nomination form opens reporting to vendors and researchers
The Cybersecurity and Infrastructure Security Agency launched a new nomination form that lets researchers, vendors, and industry partners report known
Microsoft 365 users targeted by new phishing threat that bypasses MFA
Kali365 is targeting Microsoft 365 users through device code phishing, using OAuth token theft and Telegram-based distribution.
CVE-2026-33117 Azure SDK for Java Security Feature Bypass Vulnerability
CVE-2026-43298 drm/amdgpu: Skip vcn poison irq release on VF
CVE-2026-23346 arm64: io: Extract user memory type in ioremap_prot()
CVE-2026-43303 mm/page_alloc: clear page->private in free_pages_prepare()
CVE-2026-23383 bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing
CVE-2026-43319 spi: spidev: fix lock inversion between spi_lock and buf_lock
CVE-2026-23377 ice: change XDP RxQ frag_size from DMA write length to xdp.frame_sz
CVE-2025-39810 bnxt_en: Fix memory corruption when FW resources change during ifdown
CVE-2026-43331 x86/kexec: Disable KCOV instrumentation after load_segments()
CVE-2026-23361 PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry
20 loaded
HA
The Hacker Group Turning Supply Chain Attacks Into a Sport | Threat Wire
A TL;DR on Dirty Frag #cybersecurity #threatwire @endingwithali
Google’s Silent AI Install: What They’re Hiding in Your Files #cybersecurity @endi
🔴 [PAYLOAD REVIEW] WiFi Pineapple Pager 📟🍍
🔴 [LIVE] Payload Review & 1M Subs!
🔴 [LIVE] Hak5 Hits 1 MILLION SUBSCRIBERS
Why Google’s Silent AI Install is Dangerous | Threat Wire
The Fatal 4-Byte Error That Just Broke Linux | Threat Wire
The Worst-Case Scenario for Password Managers | THREAT WIRE
NIST Is Scaling Back CVEs — And That’s a Problem | THREAT WIRE
15 loaded
CISA Adds One Known Exploited Vulnerability to Catalog
ABB B&R Automation Studio
ABB Terra AC Wallbox
ABB B&R PCs
CISA Adds Two Known Exploited Vulnerabilities to Catalog
ABB B&R Automation Runtime
Hitachi Energy GMS600
CISA Adds Seven Known Exploited Vulnerabilities to Catalog
Siemens RUGGEDCOM APE1808 Devices
ABB CoreSense HM and CoreSense M10
20 loaded
SE
Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload
The experienced Cloud Atlas group remains active, continuing to target government sectors and diplomatic entities in Russia and Belarus, employing both new and established techniques.
How an image could compromise your Mac: understanding an ExifTool vulnerability (CVE-2026-3102)
We explain how a flaw in ExifTool allows attackers to compromise macOS systems via a malicious image (CVE-2026-3102).
IT threat evolution in Q1 2026. Mobile statistics
This report contains mobile threat statistics for Q1 2026, along with noteworthy discoveries and quarterly trends: new versions of SparkCat and Triada.
IT threat evolution in Q1 2026. Non-mobile statistics
The report presents key trends and statistics on malware that targeted personal computers running Windows and macOS, as well as Internet of Things (IoT) devices, during Q1 2026.
Kimsuky targets organizations with PebbleDash-based tools
Kaspersky researchers analyze a range of new PebbleDash-based tools used in recent Kimsuky campaigns and reveal their connection to the AppleSeed malware cluster.
State of ransomware in 2026
Kaspersky researchers are sharing insights into the main ransomware trends for 2026: EDR killers on the rise, switching from data encryption to data leaks, and more.
CVE-2025-68670: discovering an RCE vulnerability in xrdp
During a security assessment of Kaspersky USB Redirector, we discovered CVE-2025-68670: a pre-auth RCE in the xrdp server component. Project maintainers promptly patched the vulnerability.
Exploits and vulnerabilities in Q1 2026
This report provides statistical data on published vulnerabilities and exploits we researched during Q1 2026. It also includes summary data on the use of C2 frameworks in APT attacks.
OceanLotus suspected of using PyPI to deliver ZiChatBot malware
Kaspersky researchers uncovered malicious wheel packages in PyPI that targeted both Windows and Linux and contained a dropper delivering malware dubbed ZiChatBot. We attribute this activity to OceanLotus APT.
Websites with an undefined trust level: avoiding the trap
We explain what suspicious websites are and how to distinguish a safe site from a fraudulent one. A new category in Kaspersky solutions: we’re sharing global statistics on untrusted site detection.
Analyzing Void Dokkaebi’s Cython-Compiled InvisibleFerret Malware
Inside SHADOW-WATER-063’s Banana RAT: From Build Server to Banking Fraud
Agentic Governance: Why It Matters Now
AI agents now act inside the trust boundary with real credentials, and agentic governance is what keeps them from quietly breaking things at machine speed.
Analyzing TeamPCP’s Supply Chain Attacks: Checkmarx KICS and elementary-data in CI/CD Credential Theft
Vibe Hacking: Two AI-Augmented Campaigns Target Government and Financial Sectors in Latin America
What Is the Instructure Canvas Breach? Impact, Risks, and What Institutions Should Do
Supporting the National Cyber Strategy: How TrendAI™ Helps
InstallFix and Claude Code: How Fake Install Pages Lead to Real Compromise
Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities
Inside Shadow-Earth-053: A China-Aligned Cyberespionage Campaign Against Government and Defense Sectors in Asia
20 loaded
CY
Alleged leader of Kimwolf, a sweeping botnet for cybercriminals, arrested in Canada
Lawmakers from both parties say CISA cuts have gone too far
Trump postpones executive order focused on AI security
CISA chief frets about open-source vulnerabilities, delayed security improvements
European authorities take down prolific cybercrime VPN service
The readiness paradox: Why a false sense of cyber confidence is becoming a liability
Meet Rampart and Clarity, Microsoft’s new red team combo AI agents
GitHub says internal repositories were impacted in poisoned VS Code extension attack
CISA credential leak raises alarms, and Capitol Hill demands answers
Attackers hit vulnerabilities hard last year, making exploits the top entry point for breaches
44 loaded
NE
Summer of CCNA - 90 Minute - Session 2
you need to use Hermes RIGHT NOW!! (goodbye OpenClaw!!)
Compliance can be frustrating. But....CALMpliance........that's a whole different thing.
Summer of CCNA LIVE Launch Party
Learn networking with REAL labs 👉 Join the Summer of CCNA
Most AI coding tools don’t sandbox on Windows (except one)
I built a network with gachapon machines
i didn't want to like this....
Milla Jovovich made an AI memory tool…..it’s pretty good
Gemma 4 on the iPhone (local AI, no internet required)
15 loaded
‘Creepy’ Listening Tool for Targeted Ads Didn’t Actually Work, FTC Says
A Hacker Group Is Poisoning Open Source Code at an Unprecedented Scale
The EU Is Going Through a Trump-Fueled Breakup With Big Tech
A Bipartisan Amendment Would End Police License Plate Tracking Nationwide
A New York Cop Got Injured at a Boxing Match. Now Madison Square Garden Is Banning His Lawyer
Data Brokers’ and AI Firms’ Opt-Out Forms Are Built to Fail, Report Finds
You Can Get Some of Your Nudes Removed From the Internet Under a New Law
An ICE Firearms Trainer Was Involved in At Least 4 Deadly Shootings
Cybercriminal Twins Caught After They Forgot to Turn Off Microsoft Teams Recording
Your iPhone Gets Stolen. Then the Hacking Begins
20 loaded
Proofpoint Integrates with the Claude Compliance API to Extend Data Security and Governance to Claude
New product integrations bring data protection, insider risk detection, and governance into Claude Enterprise and Claude Platform activity Organizations gain unified visibility across
Proofpoint Launches Dedicated MSP Business Unit and Introduces 365 Total Protection for North America
New MSP Platform business unit, AI-powered all-in-one Microsoft 365 protection, and Marketplace partnership with Pax8 strengthen Proofpoint’s commitment to channel and small and mid-size
The spy who logged me in.
Mark Kelly, Staff Threat Researcher at Proofpoint, is discussing their work on "I’d come running back to EU again: TA416 resumes European government espionage campaigns." China-linked threat group TA416 has resumed large-scale phishing ...
Proofpoint Establishes Innovation Precedent for Source-Agnostic Modern Enterprise Investigations
Proofpoint Prism Investigator positioned as first fully autonomous Agentic AI solution to significantly streamline investigations for highly regulated and highly
AI and the New Threat Landscape | Sumit Dhawan with NightDragon | RSAC 2026
The Most Powerful Women Of The Channel 2026: Power 100
The Power 100 is culled from the ranks of CRN’s 2026 Women of the Channel and spotlights the female executives at vendors and distributors whose insight and influence help drive channel success.
AI Security Gaps Create New MSSP Opportunity: Proofpoint
Claude Mythos Fears Startle Japan's Financial Services Sector
AI-Era Threats Spread Beyond Email Into SaaS, Collaboration Apps, and AI Assistants
Proofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in Place
Inaugural global study finds more than half of organizations are not fully confident their AI security controls would detect compromised AI
AL
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA Adds Seven Known Exploited Vulnerabilities to Catalog
CISA Adds One Known Exploited Vulnerability to Catalog
CISA Adds One Known Exploited Vulnerability to Catalog
CISA Adds One Known Exploited Vulnerability to Catalog
CISA Adds One Known Exploited Vulnerability to Catalog
CISA Adds One Known Exploited Vulnerability to Catalog
CISA Adds One Known Exploited Vulnerability to Catalog
CISA Adds One Known Exploited Vulnerability to Catalog
CISA Adds Two Known Exploited Vulnerabilities to Catalog
20 loaded
The Vulnerability Flood Is Now a Board Conversation. Here's How to Lead It.
Boards are asking about AI-driven vulnerability discovery. The leaders who answer that question well will come out with more credibility and more resources. Here's how to be one of them.
At Mythos Speed: A Defender's Playbook for the AI Vulnerability Surge in 2026
Frontier AI models like Mythos are making vulnerability discovery fast and cheap. Here's how defenders use threat intelligence and agentic processing to prioritize and act at the same speed.
April 2026 CVE Landscape
In April 2026, Insikt Group® identified 37 high-impact vulnerabilities that should be prioritized for remediation, 35 of which had a Very Critical Recorded Future Risk Score. This represents a 19% increase from last month.
NIST NVD Enrichment Policy Change: Prioritizing Vulnerabilities with Attacker Behavior Signals
NVD enrichment now covers only 15–20% of CVEs. Learn how Recorded Future Vulnerability Intelligence prioritizes risk using real attacker behavior signals.
Beyond Acceleration and Automation: How AI + Intelligence Changes Cyber Defense
The real question in modern cyber defense isn't who has more technology. It's who uses their resources more efficiently. Here's how AI fused with threat intelligence tips that balance.
Working in London at the World’s Largest Intelligence Company
See what it is like to work at the Recorded Future London office.
Quantum Risk Explained
Learn how the "Harvest Now, Decrypt Later" (HNDL) risk exposes long-lived sensitive data today, regardless of when Cryptographically Relevant Quantum Computers (CRQCs) arrive.
Recorded Future Named a Leader in the 2026 Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies. And there’s more.
Recorded Future shares exciting developments since being named a leader.
Threat Activity Enablers: The Backbone of Today’s Threat Landscape
Behind every ransomware demand, botnet, or threat activity group is a server sitting in a data center.
Hacking Embodied AI
Embodied AI, intelligent systems in physical forms such as humanoid and quadruped robots, is moving from spectacle to staffing plans.
20 loaded
Cisco Nexus 3000 and 9000 Series Switches Border Gateway Protocol Denial of Service Vulnerability
A vulnerability in the Border Gateway Protocol (BGP) enforce-first-as feature of Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, remote attacker to trigger BGP p...
Cisco Secure Workload Unauthorized API Access Vulnerability
A vulnerability in the access validation of internal REST APIs of Cisco Secure Workload could allow an unauthenticated, remote attacker to access site resources with the privileges of the Site Admin role. This vulnerability is due to insuff...
Cisco ThousandEyes Virtual Appliance Authenticated Remote Code Execution Vulnerability
A vulnerability in the SSL certificate handling of Cisco ThousandEyes Virtual Appliance could allow an authenticated, remote attacker to execute commands on the underlying operating system as the root user. This vulnerability is due to insu...
Cisco ThousandEyes Enterprise Agent BrowserBot Command Injection Vulnerability
A vulnerability in the BrowserBot component of Cisco ThousandEyes Enterprise Agent could have allowed an authenticated, remote attacker to execute arbitrary commands on Agents on behalf of the BrowserBot synthetics orchestration process. Ci...
Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense
On April 23, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an update to V1: Emergency Directive (ED) 25-03: Identify and Mitigate Potential Compromise of Cisco Devices related to Cisco Secure Firewall Adaptiv...
Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability
May 2026: This security advisory provides the details and fix information for a vulnerability that was discovered and fixed after the Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability was disclosed in February 2026. This ...
Cisco Catalyst SD-WAN Manager Vulnerabilities
Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow a remote attacker to gain access to sensitive information, elevate privileges, or gain unauthorized access to the application. For more informat...
Cisco Crosswork Network Controller and Cisco Network Services Orchestrator Advisory
Following the initial publication of the Security Advisory about a denial of service (DoS) condition in Cisco Crosswork Network Controller and Cisco Network Services Orchestrator (NSO), additional information has been made available to the ...
Cisco Unity Connection Remote Code Execution and Server-Side Request Forgery Vulnerabilities
Multiple vulnerabilities in Cisco Unity Connection could allow a remote attacker to execute arbitrary code on or conduct server-side request forgery (SSRF) attacks through an affected device. For more information about these vulnerabilities...
Cisco Enterprise Chat and Email Lite Agent File Upload Vulnerability
A vulnerability in the Lite Agent feature of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct browser-based attacks. To exploit this vulnerability, the attacker must have valid credentials for a...
20 loaded
Webworm: New burrowing techniques
The quest for greater tech independence
Why geopolitical turmoil is a gift for scammers, and how to stay safe
FrostyNeighbor: Fresh mischief and digital shenanigans
Eyes wide open: How to mitigate the security and privacy risks of smart glasses
Fake call logs, real payments: How CallPhantom tricks Android users
Fixing the password problem is as easy as 123456
A rigged game: ScarCruft compromises gaming platform in a supply-chain attack
This month in security with Tony Anscombe – April 2026 edition
The calm before the ransom: What you see is not all there is
20 loaded
JH
I Built an AI Cybersecurity Research Factory (for CTFs & Vulnerabilities)
Hack a Drug Lord's Smart Toilet!
The Payload Podcast 006
Hackers are Using AI (much scary, very wow)
JHT Course Launch: Web App Junior Analyst!
FAKE Zoom Taxes MALWARE
the WORST phishing email i've ever seen
Hackers Stole Your Account (for free)
The Dawn of AI Warfare (with Katrina Manson)
The Payload Podcast #005 - Casey Smith
15 loaded
DA
The Boring Stuff is Dangerous Now
Can Laws Stop Deepfakes? South Korea Aims to Find Out
Congress Puts Heat on Instructure After Canvas Outage
Cyber Pioneers Ponder Past as Prologue
Taiwan Bullet Train Hack Highlights Cybersecurity Gaps in Rail Systems
SecurityScorecard Snags Driftnet to Level Up Threat Intelligence
Maximum Severity Cisco SD-WAN Bug Exploited in the Wild
'FrostyNeighbor' APT Carefully Targets Govt Orgs in Poland, Ukraine
AI Drives Cybersecurity Investments, Widening 'Valley of Death'
Foxconn Attack Highlights Manufacturing's Cyber Crisis
45 loaded
NA
This GitHub README Hijacks Your AI and Spreads Like a Virus
New video: hacking AI coding assistants and IDEs. #bugbounty #ai
The Bug Bounty Roadmap I'd Follow If I Started Over (With AI)
Is the AI hype helping or killing your bug bounty dreams? #hacking #bugbounty
Stop Using AI Connectors Until You Watch This
One ChatGPT connector. One email. Full AI agent hijack. #BugBounty #PromptInjection #ai #hacking
This hacker made $40,000 using Claude #ai #hacking #bugbounty
My Friend Made $40,000 Using Claude Code (Here's How)
I Learned How to Jailbreak AI Chatbots
Here’s everything I have learned from making $2M in bounties. #bugbounty
15 loaded
Why Is Cybersecurity Now A Business Priority, Not Just An IT Function?
The Security Mistakes Being Repeated With Ai
The Hidden Risk For IT Subcontractors: When Insurance, Not Security, Costs You The Contract
Innovator Spotlight: Klever Compliance
Innovator Spotlight: Radware
Innovator Spotlight: JScrambler
Innovators Spotlight: OPSWAT
The Board Is Asking The Wrong Security Question
Synthetic Identity Fraud Requires An Equal Focus On Biometrics And Document Verification
Innovator Spotlight: Iru
35 loaded
IP
HackTheBox - Pterodactyl
HackTheBox - Overwatch
HackTheBox - Sorcery
HackTheBox - AirTouch
HackThebox - Eighteen
HackTheBox - DarkZero
HackTheBox - Browsed
HackTheBox - Conversor
HackTheBox - Gavel
HackTheBox - Principal
15 loaded
Japan’s 3DS Mandate: One Year In
One-Click Refunds Are Not as Hard as You Think
Toys“R”Us Japan Implements Forter’s Fraud Management and Payment Optimization Solutions
More of What Matters: Forter’s April Product Release
If AI Agents Can’t Find You, Do You Even Exist?
Return Policy Abuse Is Theft. It’s Time to Treat It That Way.
What Is Return Abuse and Why Is It Getting Harder to Stop?
Return Abuse Prevention Starts with the Person, Not the Policy
Shoptalk 2026: Retail in the Age of AI
Visa’s Updated VAMP Program: What Merchants Need to Know
AI Will Absorb 99.98% of SOC Triage Within a Year, as 79% of IT teams brace for AI-driven workload shift
Morten Kjaersgaard expects fewer than 500 of three million monthly alerts to need a human analyst in the year ahead. The role is being rebuilt around cases that warrant judgement.
Top 10 Cybersecurity Companies in Europe
Over the last 10-15 years, the cybersecurity scene has gotten increasingly complex, as organizations adopt new technology and hackers evolve more innovative ways to target them. At the same time, data protection and compliance have become m...
Heimdal Expands AI Strategy with AI Wingman and Third-Party AI Containment
Heimdal today unveiled the next phase of its AI strategy, expanding AI Wingman with three new layers - Assist, Triage and SOC - alongside the introduction of Third-Party AI Containment.
You Only Know What You’ve Got When Its Gone
Prepare for the expected. Rehearse an action plan in case of technology failure or cyberattacks. We all know they can happen.
Nordic MSPs Can Now Access Heimdal’s Unified Security and Compliance Platform Through Elovade
Heimdal has appointed Elovade as its official distributor in the Nordic region. The move gives MSPs and resellers across Sweden, Norway, Denmark, Iceland, and Finland direct access to Heimdal's consolidated cybersecurity platform through a ...
OpenClaw Incidents Show Why AI Adoption Pressure Puts Companies at Risk
The OpenClaw security failures show how hasty AI adoption can expose businesses and supply chains to major cyber risk.
Heimdal Claims Industry First With a Cyber Essentials Control Mapping for PEDM to Help Organisations Prove Least Privilege
Heimdal is the first vendor to publish a dedicated Cyber Essentials control mapping for PEDM, setting out how privilege management supports Cyber Essentials requirements and what evidence can be produced to support assessment and assurance.
Five Predictions for Cyber Security Trends in 2026
Morten Kjaersgaard, Heimdal’s Founder, and Adam Pilton, a former cybercrime investigator, predict five cyber security trends for 2026.
Heimdal Achieves OPSWAT Gold Certification for Anti-Malware
Heimdal today announced that its Next-Gen Antivirus (NGAV) with Extended Threat Protection (XTP) has achieved OPSWAT Gold Certification for Anti-Malware, validating its compatibility and effectiveness within OPSWAT’s industry-leading Access...
How to Avoid Holiday Shopping Scams (From a Former Cyber Detective)
Worried about holiday scams? Ex-cybercrime detective Adam Pilton breaks down the biggest threats and how to shop safely this festive season.
15 loaded
New and improved: Agent governance, intelligent workflows, and connected app experiences
See what's new in Copilot Studio, April 2026: updates to workflows, more control over agent operations, and an expanded agent usage estimator.
Copilot Cowork: From conversation to action across skills, integrations, and devices
Today, we’re announcing additional capabilities in Cowork to expand on what it can make possible for you.
Microsoft 365 Copilot, human agency, and the opportunity for every organization
Empower your organization with Microsoft 365 Copilot—AI that bridges human potential and business outcomes for the future of work.
Microsoft Agent 365, now generally available, expands capabilities and integrations
We’re announcing the general availability of Agent 365, plus previews of new capabilities to discover and manage shadow AI agents. Learn more.
Copilot’s agentic capabilities in Word, Excel, and PowerPoint are generally available
Copilot's newest features are now generally available as the default experience across all Microsoft 365 subscriptions.
Bring your everyday business apps into the flow of work with agents in Microsoft 365 Copilot
Discover how apps integrate with AI agents to power Copilot experiences, streamline workflows, and turn business context into action.
New and improved: Multi-agent orchestration, connected experiences, and faster prompt iteration
Explore what's new in Copilot Studio: Multi-agent systems now generally available, plus updates to the Prompt Editor and governance controls.
Copilot Cowork: Now available in Frontier
Today, Copilot Cowork—designed for long-running, multi-step work in Microsoft 365—is available via the Frontier program.
Copilot Cowork: A new way of getting work done
Copilot Cowork turns intent into action across Microsoft 365—automating tasks, coordinating workflows, and keeping you in control. See how.
Powering Frontier Transformation with Copilot and agents
Wave 3 of Microsoft 365 Copilot introduces Copilot Cowork, multi‑model intelligence, and enterprise‑ready AI—built to get real work done.
News alert: LuxSci launches HIPAA-compliant email platform for mid-size healthcare market
CAMBRIDGE, Mass., May 5, 2026, CyberNewswireŌĆöLuxSci, a leading provider of HIPAA compliant secure healthcare communications, today announced the launch of LuxSci Secure High Volume Email for mid-sized healthcare organizations, the industr...
SHARED INTEL Q&A: PKI’s unfinished business—’digital passports’ for content, models and agents
As if keeping track of machine identities wasnŌĆÖt hard enough. AI agents are now arriving by the thousands ŌĆö and most enterprises are just handing them borrowed credentials and hoping for the best. Meanwhile, the cryptographic infrastruc...
GUEST ESSAY: How augmented reality (AR) can turn building images into ad space with no control
Every major building in America has three things: a physical address, a legal owner, and an unmonitored attack surface. Related: Sam Altman's quest to usurp the browswer That surface extends from the ground up through every floor, every fac...
FIRESIDE CHAT: Leaked secrets are now the go-to attack vector — and AI is accelerating exposures
A consequential shift is underway in how enterprise breaches begin. The leaked credential — once treated as a hygiene problem — has become the primary on-ramp. Related: No easy fixes for AI risk Last August’s Salesloft campaign was th...
News alert: BreachLock’s integrated attack validation platform debuts in Gartner AEV category
NEW YORK, Apr. 21, 2026, CyberNewswire—BreachLock, a global leader in offensive security, today announced it has been named a representative vendor in the 2026 Gartner Market Guide for Adversarial Exposure Validation. This recognition mar...
Fireside Chat: PKI has carried digital trust through every tech advance—now comes the hardest one
Public key infrastructure -- the authentication and encryption framework that has held digital commerce together through every chaotic leap forward in technology -- is facing a double whammy. Related: Achieveing AI security won't be easy Au...
News Alert: NTT Research launches SaltGrain—advanced Attribute-Based Encryption security
SUNNYVALE, Calif., Apr. 15, 2026 ŌĆō NTT Research, Inc., a division of NTT (TYO:9432), today announced the launch of Scale Academy, a startup incubator responsible for bringing to market products and services based upon technologies studied...
GUEST ESSAY: Google’s 2029 deadline exposes readiness gap as move to quantum-safe crypto lags
For years, quantum risk was easy for most institutions to treat as premature: real in theory, urgent someday, but not yet an operational problem. That is no longer tenable. Related: AI spawns semantic attacks Two developments this month bro...
News alert: Mallory launches AI-native platform to cut through alert noise and surface real risk
AUSTIN, Texas, Apr. 9, 2026, CyberNewswire—Mallory is launching a AI-native threat intelligence platform, purpose-built to answer the questions CISOs and their teams are asking every day: •What are the real threat vectors for our organi...
FIRESIDE CHAT: Geopolitical turmoil, rising AI risk add a new layer to enterprise cyber defense
As if securing the enterprise against a tidal wave of AI tools wasn't hard enough, it turns out the geopolitical instability of the moment is making things worse. That wasn't the headline at RSAC 2026 last week -- agentic AI dominated the a...
A rigged game: ScarCruft compromises gaming platform in a supply-chain attack
This month in security with Tony Anscombe – April 2026 edition
The calm before the ransom: What you see is not all there is
GopherWhisper: A burrow full of malware
New NGate variant hides in a trojanized NFC payment app
What the ransom note won’t say
That data breach alert might be a trap
Supply chain dependencies: Have you checked your blind spot?
Recovery scammers hit you when you’re down: Here’s how to avoid a second strike
As breakout time accelerates, prevention-first cybersecurity takes center stage
20 loaded
Azure IaaS: Defense in depth built on secure-by-design principles
Explore how Azure IaaS uses defense in depth and secure-by-design principles to deliver layered, scalable cloud security across compute, network, and data.
Enforcing trust and transparency: Open-sourcing the Azure Integrated HSM
Learn how Microsoft Azure Integrated HSM delivers hardware‑enforced key protection in the cloud, combining FIPS Level 3 assurances with transparency and open‑source collaboration.
Azure IaaS: Keep critical applications running with built-in resiliency at scale
Learn how Azure IaaS helps organizations start from a resilient platform foundation with availability, continuity, and recovery capabilities.
Azure IaaS: Explore new resources for building a stronger, more efficient infrastructure
Learn how Azure IaaS helps you modernize infrastructure, improve performance and resilience, optimize costs, and prepare for AI workloads. Read more.
Azure reliability, resiliency, and recoverability: Build continuity by design
Learn how Azure reliability, resiliency, and recovery capabilities work together to improve cloud continuity. Read more.
Microsoft strengthens sovereign cloud capabilities with new services
Discover new Microsoft digital sovereignty capabilities and upcoming features across AI, security, and productivity, to address sovereign cloud needs.
Enhancing software supply chain security with Microsoft’s Signing Transparency
Microsoft Signing Transparency delivers verifiable code integrity and tamper-evident software releases for stronger supply chain security.
Oracle Database@Azure offers new features, regions, and programs to unlock data and AI innovation
Migrate Oracle solutions to the cloud with a trusted, enterprise-ready platform from Microsoft and Oracle. Learn more.
Building secure, scalable AI in the cloud with Microsoft Azure
Forrester Research shows how Azure helps enterprises scale generative AI securely, unlocking real business value. Learn more.
Enhance AI security with Azure Prompt Shields and Azure AI Content Safety
Learn how Prompt Shields and Azure AI Content Safety can help guard against direct and indirect threats to your LLM-based solution.
DEF CON 34 - DEF CON Policy Announcement - Katie Noble, Heather West
DEF CON 33 - DisguiseDelimit: Exploiting Synology NAS with Delimiters and Novel Tricks - Ryan Emmon
DEF CON 33 - Browser Extension Clickjacking: One Click and Your Credit Card Is Stolen - Marek Tóth
DEF CON 33 - Can't Stop the ROP: Automating Universal ASLR Bypasses - Bramwell Brizendine
DEF CON 33 Recon Village - How to Become One of Them: Deep Cover Ops - Sean Jones, Kaloyan Ivanov
DEF CON 33 Recon Village - Inside the Shadows Tracking RaaS Groups, Cyber Threats - John Dilgen
DEF CON 33 Recon Village - Autonomous Video Hunter AI Agents for Real Time OSINT - Kevin Dela Rosa
DEF CON 33 Recon Village - A Playbook for Integration Servers - Ryan Bonner, Guðmundur Karlsson
DEF CON 33 Recon Village - Mapping the Shadow War From Estonia to Ukraine - Evgueni Erchov
DEF CON 33 Recon Village - Building Local Knowledge Graphs for OSINT - Donald Pellegrino
15 loaded
Defending Against China-Nexus Covert Networks of Compromised Devices
Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure
U.S. organizations should review the TTPs and IOCs in this advisory for indications of current or historical activity on their networks, and apply the
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure
The authoring organizations encourage critical infrastructure organizations to implement the recommendations in this advisory to reduce the likelihood and
CISA Shares Lessons Learned from an Incident Response Engagement
Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System
The authoring agencies strongly urge network defenders to hunt for malicious activity and to apply the mitigations in this CSA to reduce the threat of Chinese
CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization
#StopRansomware: Interlock
Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider
CISA urges software vendors, downstream customers, and end users to immediately implement the Mitigations listed in this advisory based on confirmed compromise
Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations
Russian GRU Targeting Western Logistics Entities and Technology Companies
Executives and network defenders should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and IOCs
Business Fraud at Network Scale: What the $3.5B Medicare Hospice Crisis Reveals About Know Your Business
What is Customer Due Diligence (CDD)
Why Legacy Identity Verification Can’t Stop AI-Enabled Fraud
AML, KYC and Identity Verification in Australia
When Fraud Becomes Background Noise: The Industrialization of Digital Deception
The Efficiency Era of KYC: Reverification and Reusable Identity Take Center Stage
The End of Static KYB: Business Identity in Constant Motion
Know Your Agent: The Next Chapter in Digital Trust
When Rules Move Faster Than Readiness: Regulatory Adaptability as a Competitive Advantage
Digital Identity Trends 2026: AI Fraud, Compliance, and Orchestration
13 loaded
LI
Security-driven Rapid Release - Pwn2Own Documentary (Part 4)
Firefox JIT Bug - Pwn2Own Documentary (Part 3)
The First Exploit - Pwn2Own Documentary (Part 2)
The World's Hardest Hacking Competition - Pwn2Own Documentary (Part 1)
From Zero to Zero Day (and beyond) - Life of a Hacker: Jonathan Jacobi
The German Hacking Championship
Do you know this common Go vulnerability?
Google's Mobile VRP Behind the Scenes with Kristoffer Blasiak (Hextree Podcast Ep.1)
My theory on how the webp 0day was discovered #short
My theory on how the webp 0day was discovered (BLASTPASS)
15 loaded
SK
Life in the Nordics 🌲 | Foraging Blueberries, Mushrooms & Nosework Training with Our Dogs
Winter vanlife = good times
What an experience! Getting a Christmas tree from our own piece of land. #movingupnorth!
Had to much GLÖGG and lost my camera during - 13371122 - Intigriti + Visma
IS THIS THE END?
Escaping the grind and decompiling python 3.9 pyc files to find vulnerabilites
How to turn bugs into a "passive" income stream! ft Detectify's Almroot
HOW DID THIS HAPPEN!? (13370822 LHE VLOG)
Q: How to write a BUG BOUNTY report that actually gets paid?
facts: Bug Bounty hunters has made ridiculous amounts of $$ from known DNS techniques..
15 loaded
HA
How FIN6 Exfiltrates Files Over FTP
Emulating FIN6 - Active Directory Enumeration Made EASY
The SECRET to Embedding Metasploit Payloads in VBA Macros
Offensive VBA 0x4 - Reverse Shell Macro with Powercat
Offensive VBA 0x3 - Developing PowerShell Droppers
Offensive VBA 0x2 - Program & Command Execution
Offensive VBA 0x1 - Your First Macro
Emulating FIN6 - Gaining Initial Access (Office Word Macro)
FIN6 Adversary Emulation Plan (TTPs & Tooling)
Developing An Adversary Emulation Plan
15 loaded
TH
Student Loan Breach Exposes 2.5M Records
2.5 million people were affected, in a breach that could spell more trouble down the line.
Watering Hole Attacks Push ScanBox Keylogger
Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.
Ransomware Attacks are on the Rise
Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.
Twitter Whistleblower Complaint: The TL;DR Version
Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk.
Firewall Bug Under Active Attack Triggers CISA Warning
CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.
Fake Reservation Links Prey on Weary Travelers
Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.
iPhone Users Urged to Update to Patch 2 Zero-Days
Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack.
Google Patches Chrome’s Fifth Zero-Day of the Year
An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.
No matching sources found.