Loading…

Whats The Hax?

Daily intelligence on threats, breaches, and defenders

Latest
BleepingComputerWindows 11 KB5083631 update released with 34 changes and fixesLatest newsMoving from AI pilots to business-wide value requires a superhighway - how to ramp upFor [Blue|Purple] Teams in Cyber DefencePreparing for a ‘vulnerability patch wave’For [Blue|Purple] Teams in Cyber DefenceAnalyzing the Silver Fox tax campaign and the new ABCDoor backdoorThe Hacker NewsPoisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential TheftcybersecurityConfirming (potential) malware distribution attemptTechnical Information Security Content & DiscussionBillions of meals at risk due to Iran war, says fertiliser bossLatest news4 interior designers told us what smart tech you should actually buyLatest newsForget productivity: Here are 5 strategic shifts that drive real AI valueSecurityWeekHugging Face, ClawHub Abused for Malware DistributionMSRC Security Update GuideCVE-2026-3184 Util-linux: util-linux: access control bypass due to improper hostname canonicalizationMSRC Security Update GuideCVE-2026-27456 util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device SetupMSRC Security Update GuideCVE-2026-31478 ksmbd: replace hardcoded hdr2_len with offsetof() in smb2_calc_max_out_buf_len()MSRC Security Update GuideCVE-2026-0964 Libssh: improper sanitation of paths received from scp serversMSRC Security Update GuideCVE-2026-0966 Libssh: buffer underflow in ssh_get_hexa() on invalid inputMSRC Security Update GuideCVE-2026-0967 Libssh: libssh: denial of service via inefficient regular expression processingMSRC Security Update GuideCVE-2026-0965 Libssh: libssh: denial of service via improper configuration file handlingMSRC Security Update GuideCVE-2026-25645 Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility functionMSRC Security Update GuideCVE-2026-3731 libssh SFTP Extension Name sftp.c sftp_extensions_get_data out-of-boundscybersecurityHandled, Not Hosted: Administrative Activity Inside a Bulletproof HosterBleepingComputerWindows 11 KB5083631 update released with 34 changes and fixesLatest newsMoving from AI pilots to business-wide value requires a superhighway - how to ramp upFor [Blue|Purple] Teams in Cyber DefencePreparing for a ‘vulnerability patch wave’For [Blue|Purple] Teams in Cyber DefenceAnalyzing the Silver Fox tax campaign and the new ABCDoor backdoorThe Hacker NewsPoisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential TheftcybersecurityConfirming (potential) malware distribution attemptTechnical Information Security Content & DiscussionBillions of meals at risk due to Iran war, says fertiliser bossLatest news4 interior designers told us what smart tech you should actually buyLatest newsForget productivity: Here are 5 strategic shifts that drive real AI valueSecurityWeekHugging Face, ClawHub Abused for Malware DistributionMSRC Security Update GuideCVE-2026-3184 Util-linux: util-linux: access control bypass due to improper hostname canonicalizationMSRC Security Update GuideCVE-2026-27456 util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device SetupMSRC Security Update GuideCVE-2026-31478 ksmbd: replace hardcoded hdr2_len with offsetof() in smb2_calc_max_out_buf_len()MSRC Security Update GuideCVE-2026-0964 Libssh: improper sanitation of paths received from scp serversMSRC Security Update GuideCVE-2026-0966 Libssh: buffer underflow in ssh_get_hexa() on invalid inputMSRC Security Update GuideCVE-2026-0967 Libssh: libssh: denial of service via inefficient regular expression processingMSRC Security Update GuideCVE-2026-0965 Libssh: libssh: denial of service via improper configuration file handlingMSRC Security Update GuideCVE-2026-25645 Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility functionMSRC Security Update GuideCVE-2026-3731 libssh SFTP Extension Name sftp.c sftp_extensions_get_data out-of-boundscybersecurityHandled, Not Hosted: Administrative Activity Inside a Bulletproof Hoster

By Source

Feeds organized so you can skim by site.

Density Sort
BL
BleepingComputer
1h ago · 15 items
Windows 11 KB5083631 update released with 34 changes and fixes 1h ago Microsoft has released the KB5083631 optional cumulative update for Windows 11, which includes 34 changes, such as a new Xbox mode for Windows PCs, enhanced security and performance for batch files, and performance improvements for launchin... US ransomware negotiators get 4 years in prison over BlackCat attacks 2h ago Two former employees of cybersecurity incident response companies Sygnia and DigitalMint were sentenced to four years in prison each for targeting U.S. companies in BlackCat (ALPHV) ransomware attacks. New Bluekit phishing service includes an AI assistant, 40 templates 15h ago A new phishing kit named Bluekit offers more than 40 templates targeting popular services and includes basic AI features for generating campaign drafts. Romanian leader of online swatting ring gets 4 years in prison 16h ago A Romanian national who led an online swatting ring that targeted more than 75 public officials, multiple journalists, and four religious institutions was sentenced to 4 years in federal prison. FBI links cybercriminals to sharp surge in cargo theft attacks 17h ago The U.S. Federal Bureau of Investigation (FBI) warned the transportation and logistics industry of a sharp rise in cyber-enabled cargo theft, with estimated losses in the United States and Canada reaching nearly $725 million in 2025. April KB5083769 Windows 11 update causes backup software failures 18h ago The April 2026 KB5083769 security update breaks third-party backup applications from multiple vendors on systems running Windows 11 24H2 and 25H2. What Happens in the First 24 Hours After a New Asset Goes Live 20h ago When a new asset goes live, attackers start scanning within minutes. Sprocket Security shows how automated attacks move from discovery to compromise in under 24 hours. New Linux ‘Copy Fail’ flaw gives hackers root on major distros 20h ago An exploit has been published for a local privilege escalation vulnerability dubbed Critical cPanel and WHM bug exploited as a zero-day, PoC now available 22h ago Police dismantles 9 crypto scam centers, arrests 276 suspects 22h ago A joint international operation involving U.S. and Chinese authorities arrested at least 276 suspects and shut down nine cryptocurrency investment fraud centers.
15 loaded
LN
Latest news
1h ago · 20 items
Moving from AI pilots to business-wide value requires a superhighway - how to ramp up 1h ago Accenture's latest research finds that companies must demonstrate sustained early wins from AI investments to build momentum. The key is shifting from siloed AI to systemic AI. 4 interior designers told us what smart tech you should actually buy 1h ago Interior designers and decorators share their picks for the best smart home products that both look sleek and offer useful features. Forget productivity: Here are 5 strategic shifts that drive real AI value 1h ago Everyone talks about increasing productivity with AI tools. Here's how to deliver actual value. Your TV can sound a lot better: 7 easy but unexpected ways to improve audio quality 8h ago Getting great sound from your TV doesn't have to cost a fortune. These are my tried-and-true TV audio tricks. I tested ChatGPT and Perplexity AI as my CarPlay voice assistants - this model was better 8h ago When you're driving, both ChatGPT and Perplexity can answer questions and provide help that's well beyond Siri's modest abilities. Here's which one is better. My dad needed a new desktop PC - here's why this Dell was the smartest choice 9h ago Dell's new 24-inch AiO is a compact, easy-to-use desktop with reliable performance and great speakers, but some expected limitations. Amazon confirmed Prime Day 2026 is coming earlier. Here's everything to know now 13h ago Amazon's summer Prime Day event will officially be held in June this year, not July. Here's what to know so far. Thousands of readers bought these 10 useful tools and gadgets (No. 5 gets weird) 16h ago From Bluetooth trackers to (checks notes) a smart insect bite healer, these are the top gadgets our readers have actually purchased in 2026 so far. After testing this Linux laptop, I understand why MacBooks are the superior choice 16h ago The new Tuxedo InfinityBook Max 15 is an impressive Linux laptop for everyday use, with a few concerns. Motorola Razr Ultra (2026) vs. Samsung Galaxy Z Flip 7: I tried both, and there's a clear winner 16h ago Samsung focuses on durability and AI, while the new Motorola phone is all about the hardware. Here's which one I think is better.
20 loaded
Preparing for a ‘vulnerability patch wave’ 1h ago Analyzing the Silver Fox tax campaign and the new ABCDoor backdoor 1h ago CVE-2026-42167 Allows Auth Bypass And RCE In ProFTPD - in an extension, not core 3h ago Security Advisory: Firmware Update Required — Gen 6, Gen 7, and Gen 8 Firewalls 3h ago New Vulnerabilities in NVIDIA NeMo and Meta PyTorch Enable Full System Compromise 3h ago WordPress Plugin Hijacked in 2020 Hid a Dormant Backdoor for Years 3h ago In-circuit NAND acquisition for edge devices (Raspberry Pi GPIO, no chip-off) 12h ago 2033170 - DigiCert: Misissued code signing certificates 13h ago The Federal Bureau of Investigation is publishing this Public Service Announcement (PSA) to warn the public of cyber threat actors increasingly using sophisticated, cyber-enabled tactics to impersonate legitimate businesses to hijack freight, steal high-value shipments, and reroute deliveries etc. 14h ago Built a Python Active Defense tool to eliminate DLP reporting latency 17h ago
20 loaded
TH
The Hacker News
1h ago · 20 items
Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft 1h ago PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials 17h ago ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories 20h ago New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials 21h ago EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades 22h ago New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions 1d ago Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution 1d ago SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack 1d ago New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs 1d ago Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks 1d ago
20 loaded
CY
cybersecurity
1h ago · 20 items
Confirming (potential) malware distribution attempt 1h ago Handled, Not Hosted: Administrative Activity Inside a Bulletproof Hoster 1h ago Anyone have suggestions for how to set up a vpn (in the USA) that I can use when I’m in Iran? 1h ago Why is losing encrypted data considered risky if it's got a strong password? 2h ago AI Finds 38 Security Flaws in Electronic Health Record Platform 2h ago Just Graduated and Already Stuck… Networking or Cybersecurity? 2h ago How do you actually get comfortable with a tool vs just knowing how to run it? 2h ago Hospitality frauds and chargebacks 2h ago Advice from graduates or industry experts 3h ago Need Referral / Guidance for Cybersecurity / SecOps Engineering roles 3h ago
20 loaded
Billions of meals at risk due to Iran war, says fertiliser boss 1h ago Handled, Not Hosted: Administrative Activity Inside a Bulletproof Hoster 1h ago Seventeen vulnerabilities in Omi, fourteen days of silence 22h ago High Fidelity Check for the cPanel Authentication Bypass (CVE-2026-41940) 1d ago Copy Fail exploit lets 732 bytes hijack Linux systems and quietly grab root 1d ago The Internet Is Falling Down, Falling Down, Falling Down (cPanel & WHM Authentication Bypass CVE-2026-41940) - watchTowr Labs 1d ago The Thymeleaf Template Injection That Only Hurts If You Let It 1d ago Set up automated dependency scanning after the recent npm/PyPI supply chain attacks 1d ago A Route to Root in a 4G Industrial Router 2d ago [Research] Full-chain RCE in Microsoft Semantic Kernel & Agent Framework 1.0 (6 Bypasses) 2d ago
20 loaded
SE
SecurityWeek
1h ago · 10 items
MS
MSRC Security Update Guide
1h ago · 20 items
CVE-2026-3184 Util-linux: util-linux: access control bypass due to improper hostname canonicalization 1h ago CVE-2026-27456 util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup 1h ago CVE-2026-31478 ksmbd: replace hardcoded hdr2_len with offsetof() in smb2_calc_max_out_buf_len() 1h ago CVE-2026-0964 Libssh: improper sanitation of paths received from scp servers 1h ago CVE-2026-0966 Libssh: buffer underflow in ssh_get_hexa() on invalid input 1h ago CVE-2026-0967 Libssh: libssh: denial of service via inefficient regular expression processing 1h ago CVE-2026-0965 Libssh: libssh: denial of service via improper configuration file handling 1h ago CVE-2026-25645 Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility function 1h ago CVE-2026-3731 libssh SFTP Extension Name sftp.c sftp_extensions_get_data out-of-bounds 1h ago CVE-2026-3087 shutil.unpack_archive() doesn't check for Windows absolute paths in ZIPs 2h ago
20 loaded
RE
Reverse Engineering
3h ago · 20 items
/r/ReverseEngineering's Triannual Hiring Thread 3h ago In-circuit NAND acquisition for edge devices (Raspberry Pi GPIO, no chip-off) 3h ago Revealing NVIDIA Closed-Source Driver Command Streams for CPU-GPU Runtime Behavior Insight 17h ago HexDig 1.0.0 a lightweight binwalk alternative working both on Windows and Linux, written in C++, give it a try! 1d ago GitHub - iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail: Rust implementation Exploit/PoC of CVE-2026-31431-Linux-Copy-Fail, allow executing customized shellcode (such as Meterpreter). 1d ago I built a free open-source CAN bus reverse engineering workstation in Python — 15 tabs, offline ML, dual AI engines, MitM gateway 1d ago Building a perfect clone of 1993 game SimTower (via RE) 2d ago How I reverse-engineered a SQLite WAL database inside a VS Code extension - custom merge engine, header byte patching, and protobuf decoding without a schema 2d ago AI solved our CTF in 6min 2d ago Example structure for evidence-based vulnerability reports 3d ago
20 loaded
HN
Help Net Security
4h ago · 10 items
Open-source privacy proxy masks PII before prompts reach external AI services 4h ago This open-source PII privacy proxy masks emails, SSNs, and credit cards in prompts before they reach OpenAI, Anthropic, and other AI APIs. Shadow AI risks deepen as 31% of users get no employer training 4h ago Shadow AI risks grow as 1 in 3 employees use AI without IT oversight, Lenovo's survey of 6,000 enterprise workers finds. Identity is the control plane for distributed infrastructure 5h ago Teleport CEO makes the case that distributed infrastructure can’t be secured by layering more tools on top of fragmented identity systems. AI traffic is getting bigger, louder, and less predictable 5h ago AI network traffic trends show shifts in data flow, with neocloud and hyperscaler activity driving changes in global infrastructure patterns. New infosec products of the month: April 2026 6h ago The featured infosec products this month are from Advenica, Aptori, Axonius, Broadcom, GlobalSign, Intruder, IP Fabric, Mallory, and more. cPanel zero-day exploited for months before patch release (CVE-2026-41940) 20h ago A critical vulnerability (CVE-2026-41940) in the cPanel control panel for managing web hosting accounts, is being exploited by attackers. Cisco releases open-source toolkit for verifying AI model lineage 21h ago Cisco has released an open source AI model provenance toolkit that verifies whether two transformer models share a common training origin. Met Police face criticism for using AI to spy on their own officers 21h ago London police officers warned by the Metropolitan Police Federation after AI monitoring was deployed to investigate misconduct. Nine-year-old Linux kernel flaw enables reliable local privilege escalation (CVE-2026-31431) 22h ago Security researchers have disclosed CopyFail, a local privilege escalation (LPE) vulnerability (CVE-2026-31431) in the Linux kernel. Researchers develop tool to expose GPS signal spoofing in transit networks 1d ago ORNL develops a real-time GPS spoofing detector for transportation systems, improving security against signal manipulation and cargo risks.
HS
hacking: security in practice
13h ago · 20 items
20 loaded
SA
Security - Ars Technica
13h ago · 20 items
The most severe Linux threat to surface in years catches the world flat-footed 13h ago Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden 1d ago Open source package with 1 million monthly downloads stole user credentials 3d ago Why are top university websites serving porn? It comes down to shoddy housekeeping. 6d ago In a first, a ransomware family is confirmed to be quantum-safe 7d ago Crypto scam lures ships into Strait of Hormuz, falsely promising safe passage 8d ago Microsoft issues emergency update for macOS and Linux ASP.NET threat 8d ago Mozilla: Anthropic's Mythos found 271 security vulnerabilities in Firefox 150 9d ago Contrary to popular superstition, AES 128 is just fine in a post-quantum world 9d ago US-sanctioned currency exchange says $15 million heist done by "unfriendly states" 13d ago
20 loaded
CS
Cisco Security Advisory
15h ago · 20 items
Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense 15h ago On April 23, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an update to V1: Emergency Directive (ED) 25-03: Identify and Mitigate Potential Compromise of Cisco Devices related to Cisco Secure Firewall Adaptiv... Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities 2d ago Multiple vulnerabilities in Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker to achieve remote code execution or conduct path traversal attacks on an affec... Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability 6d ago A vulnerability in the Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, remote attacker to read or modify intersite encrypted traffic. This vulnerability... Cisco Integrated Management Controller Cross-Site Scripting Vulnerabilities 8d ago Multiple vulnerabilities in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more informatio... Cisco Integrated Management Controller Command Injection and Remote Code Execution Vulnerabilities 8d ago Multiple vulnerabilities in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to execute arbitrary code or commands on the underlying operating system of an affe... Cisco Catalyst SD-WAN Vulnerabilities 8d ago Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an attacker to access an affected system, elevate privileges to root, gain access to sensitive information, and overwrite arbitrary files. For m... Cisco Webex Services Certificate Validation Vulnerability 14d ago A vulnerability in the integration of single sign-on (SSO) with Control Hub in Cisco Webex Services could have allowed an unauthenticated, remote attacker to impersonate any user within the service. This vulnerability existed because of imp... Cisco Secure Web Appliance Authentication Bypass Vulnerability 14d ago A vulnerability in the authentication service feature of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass authentication policy requirements. This vulnerability is due to improp... Cisco Identity Services Engine Remote Code Execution Vulnerabilities 15d ago Cisco Identity Services Engine Authenticated Privilege Escalation Vulnerability 15d ago
20 loaded
SL
Security Latest
16h ago · 20 items
OpenAI Rolls Out ‘Advanced’ Security Mode for At-Risk Accounts 16h ago 90,000 Screenshots of One Celebrity's Phone Were Exposed Online 1d ago Why Sharing a Screenshot Can Get You Jailed in the UAE 2d ago The Race Is on to Keep AI Agents From Running Wild With Your Credit Cards 2d ago Cole Allen Charged With Attempting to Assassinate Trump 3d ago California Engineer Identified in Suspected Shooting at White House Correspondents’ Dinner 5d ago Discord Sleuths Gained Unauthorized Access to Anthropic’s Mythos 5d ago The Latest Push to Extend Key US Spy Powers Is Still a Mess 6d ago Newly Deciphered Sabotage Malware May Have Targeted Iran’s Nuclear Program—and Predates Stuxnet 7d ago AI Tools Are Helping Mediocre North Korean Hackers Steal Millions 8d ago
20 loaded
MS
Microsoft Security Blog
18h ago · 10 items
What’s new, updated, or recently released in Microsoft Security 18h ago Stay ahead of emerging threats with Microsoft’s newest security innovations and updates, delivered through the In the Loop series. Email threat landscape: Q1 2026 trends and insights 19h ago In early 2026, email threats increased with a rise in credential phishing, QR code phishing, and CAPTCHA-gated campaigns, highlighted by Microsoft’s disruption of the Tycoon2FA phishing platform which led to a 15% volume decrease and shifts... 8 best practices for CISOs conducting risk reviews 1d ago Read Microsoft expert tips for CISOs on embracing strong proactive security to mitigate increased exposure to security threats. Simplifying AWS defense with Microsoft Sentinel UEBA 2d ago Learn how Microsoft Sentinel UEBA helps defenders distinguish benign AWS activity from attacker behavior by enriching raw CloudTrail logs with clear, binary behavioral signals derived from baseline user, peer, and device behavior patterns. AI-powered defense for an AI-accelerated threat landscape 8d ago Read how Microsoft is partnering with Anthropic and broader industry to use leading models, paired with our platforms and expertise, to turn AI-driven discovery into protection at scale. Detection strategies across cloud and identities against infiltrating IT workers 9d ago The shift to remote and hybrid work since the pandemic expanded global hiring and accelerated digital onboarding, increasing reliance on online identity verification and remote access. Making opportunistic cyberattacks harder by design 10d ago How Microsoft secures Dynamics 365 and Power Platform by removing credentials, reducing attack surfaces, and using platform engineering to block opportunistic threats. Cross‑tenant helpdesk impersonation to data exfiltration: A human-operated intrusion playbook 12d ago Threat actors are abusing external Microsoft Teams collaboration to impersonate IT helpdesk staff and convince users to grant remote access. Once inside, attackers can abuse legitimate tools and standard admin protocols to move laterally an... Containing a domain compromise: How predictive shielding shut down lateral movement 13d ago Domain compromise accelerates fast. Predictive shielding slowed it down. This real-world attack shows how exposure-based containment stopped credential abuse and broke the threat actor's momentum. Building your cryptographic inventory: A customer strategy for cryptographic posture management 14d ago Learn how to build a comprehensive cryptographic inventory and strengthen quantum‑safe readiness using Microsoft Security tools, best‑practice lifecycle models, and partner solutions.
KO
Krebs on Security
20h ago · 10 items
Anti-DDoS Firm Heaped Attacks on Brazilian ISPs 20h ago A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazi... ‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty 9d ago A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phish... Patch Tuesday, April 2026 Edition 16d ago Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dub... Russia Hacked Routers to Steal Microsoft Office Tokens 23d ago Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backe... Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab 25d ago An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gang... ‘CanisterWorm’ Springs Wiper Attack Targeting Iran 38d ago A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or ha... Feds Disrupt IoT Botnets Behind Huge DDoS Attacks 42d ago The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as ro... Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker 50d ago A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub out... Microsoft Patch Tuesday, March 2026 Edition 51d ago Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing "zero-day" flaws this month (compared to February's five zero-day treat), but as usu... How AI Assistants are Moving the Security Goalposts 53d ago AI-based assistants or "agents" -- autonomous programs that have access to the user's computer, files, online services and can automate virtually any task -- are growing in popularity with developers and IT workers. But as so many eyebrow-r...
AL
Alerts
22h ago · 20 items
20 loaded
AC
All CISA Advisories
22h ago · 20 items
20 loaded
WE
WeLiveSecurity
1d ago · 20 items
20 loaded
SE
Securelist
1d ago · 10 items
Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India 1d ago The Silver Fox group is targeting companies in Russia and India by impersonating tax authorities to distribute ValleyRAT and the new ABCDoor backdoor. PhantomRPC: A new privilege escalation technique in Windows RPC 7d ago Kaspersky researcher discovered a vulnerability in RPC architecture that enables an attacker to create a fake RPC server and escalate their privileges. FakeWallet crypto stealer spreading through iOS apps in the App Store 11d ago In March 2026, we uncovered more than twenty phishing apps in the Apple App Store masquerading as popular crypto wallets. Threat landscape for industrial automation systems in Q4 2025 15d ago The report contains industrial threat statistics for Q4 2025. It covers various infection vectors and malware types, as well as regional statistics and statistics by industry. JanelaRAT: a financial threat targeting users in Latin America 18d ago Kaspersky GReAT experts describe the latest JanelaRAT campaign detailing infection chain and malware functionality updates. The long road to your crypto: ClipBanker and its marathon infection chain 22d ago Threat actors are distributing a Trojan disguised as Proxifier software; through a multi-stage infection chain, it delivers ClipBanker – malware that replaces cryptocurrency wallet addresses in the clipboard. Financial cyberthreats in 2025 and the outlook for 2026 23d ago In this report, Kaspersky experts share their insights into the 2025 financial threat landscape, including regional statistics and trends in phishing, PC malware, and infostealers. A laughing RAT: CrystalX combines spyware, stealer, and prankware features 30d ago Kaspersky researchers analyze a new CrystalX RAT distributed as MaaS and featuring extensive spyware, stealer, and prankware capabilities. An AI gateway designed to steal your data 35d ago Dissecting the supply chain attack on LiteLLM, a multifunctional gateway used in many AI agents. Explaining the dangers of the malicious code and how to protect yourself. Coruna: the framework used in Operation Triangulation 36d ago Kaspersky GReAT experts look into the Coruna exploit kit targeting iPhones. We discovered that the kernel exploit for CVE-2023-32434 and CVE-2023-38606 is an updated version of the Operation Triangulation exploit.
ZU
ZDI: Upcoming Advisories
1d ago · 20 items
20 loaded
RF
Recorded Future
1d ago · 20 items
Risk Scenarios for the US’s Strategic Pivot 1d ago The United States (US) is shifting toward a more force-driven security strategy primarily relying on military operations and economic pressure to counter transnational criminal organizations and limit Chinese, Russian, and Iranian influence... Building with AI: Here's What No Briefing Will Tell You 1d ago What building with AI for three months revealed about four leadership blind spots executives can't afford to ignore: the comprehension gap, eroding competitive moats, deployment complexity, and what "senior" really means now. The Money Mule Solution: What Every Scam Has in Common 3d ago Learn how mule account intelligence — not tactic-tracking — is the most effective lever for preventing APP fraud before funds move. Lazarus Doesn't Need AGI 3d ago Explore the 2026 Claude Mythos breach, supply chain risks, and the $2B+ crypto theft pipeline. From Overwhelmed to Autonomous: Rethinking Threat Intelligence in 2026 7d ago For most security teams today, volume and access to intelligence isn’t the problem. It’s the speed at which they can turn that intelligence into action. . The Iran War: What You Need to Know 7d ago Insikt Group tracks the cyber, physical, and geopolitical components of the US-Israeli strikes on Iran — with continuously updated threat analysis and scenarios. Critical minerals and cyber operations 8d ago Learn how critical minerals and rare earth elements (REEs) are evolving from commodities into strategic flashpoints. Explore the geopolitical risks of China’s refining dominance, the race for resources in the Arctic and space, and the risin... Today, trust is the superpower that makes innovation possible 8d ago How better intelligence and collaboration can unlock new opportunities for growth and greater financial health for more people. Evolution of Chinese-Language Guarantee Telegram Marketplaces 9d ago Chinese-language, Telegram-based “guarantee” marketplaces are increasingly popular among Chinese-speaking criminal groups despite the widely publicized shutdown of Huione Guarantee in 2025. AI Hype vs. Reality: Is AI Really Rewriting the Vulnerability Equation? 9d ago AI vulnerability research and discovery capabilities are improving, but they have not changed the fundamentals of vulnerability management.
20 loaded
MA
Malware Analysis & Reports
1d ago · 20 items
20 loaded
BF
Blog – Forter
2d ago · 10 items
Kuse Web App Abused to Host Phishing Document 2d ago Void Dokkaebi Uses Fake Job Interview Lure to Spread Malware via Code Repositories 10d ago The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables 11d ago Identity Protection in the AI Era 18d ago U.S. Public Sector Under Siege: Threat Intelligence for Q1 2026 22d ago Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do 24d ago Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads 28d ago TrendAI Insight: New U.S. National Cyber Strategy 30d ago The Real Risk of Vibecoding 31d ago Axios NPM Package Compromised: Supply Chain Attack Hits JavaScript HTTP Client with 100M+ Weekly Downloads 31d ago
20 loaded
PN
Proofpoint News Feed
3d ago · 10 items
Proofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in Place 3d ago Inaugural global study finds more than half of organizations are not fully confident their AI security controls would detect compromised AI Clear market trend for software providers to help with AI: Proofpoint CEO 7d ago Sumit Dhawan, Proofpoint CEO, joins 'Closing Bell' to discuss ServiceNow's quarterly earnings results, if Anthropic's Mythos makes incumbent players more important and much more. Proofpoint CEO on AI Security Innovations | Nasdaq at RSAC 2026 8d ago Cargo thieving hackers running sophisticated remote access campaigns, researchers find 14d ago Freight Hacker Wields Code-Signing Service to Evade Defenses 14d ago Sumit Dhawan on NYSE Floor Talk | Proofpoint AI Security 15d ago FIFA World Cup 2026: More than One-Third of Official Partners Expose the Public to the Risk of Email Fraud 17d ago Analysis by cybersecurity company Proofpoint reveals that while most partners have implemented baseline email authentication, many are still not proactively blocking fraudulent emails that Microsoft 365 mailbox rules abused for exfiltration, persistence 17d ago How AI is getting better at finding security holes 19d ago Anthropic announced this week that its new model found security flaws in "every major operating system and web browser." Even before the news, AI models had gotten dramatically better at finding bugs. AI Security Risks: Proofpoint CSO Ryan Kalember, Live at RSAC 2026 29d ago Watch the Fireside Below, or Click HERE: Tech Edge hosted a fireside chat on March 25 at RSA Conference 2026 in San Francisco with Ryan Kalember, Chief Strategy Officer at Proofpoint. The in-person interview was joined by Editor-in-Chief Jo...
M3
Microsoft 365 Blog
8d ago · 10 items
Copilot’s agentic capabilities in Word, Excel, and PowerPoint are generally available 8d ago Copilot's newest features are now generally available as the default experience across all Microsoft 365 subscriptions. Bring your everyday business apps into the flow of work with agents in Microsoft 365 Copilot 17d ago Discover how apps integrate with AI agents to power Copilot experiences, streamline workflows, and turn business context into action. New and improved: Multi-agent orchestration, connected experiences, and faster prompt iteration 29d ago Explore what's new in Copilot Studio: Multi-agent systems now generally available, plus updates to the Prompt Editor and governance controls. Copilot Cowork: Now available in Frontier 31d ago Today, Copilot Cowork—designed for long-running, multi-step work in Microsoft 365—is available via the Frontier program. Copilot Cowork: A new way of getting work done 52d ago Copilot Cowork turns intent into action across Microsoft 365—automating tasks, coordinating workflows, and keeping you in control. See how. Powering Frontier Transformation with Copilot and agents 52d ago Wave 3 of Microsoft 365 Copilot introduces Copilot Cowork, multi‑model intelligence, and enterprise‑ready AI—built to get real work done. SharePoint at 25: How Microsoft is putting knowledge to work in the AI era 59d ago Discover how SharePoint’s 25‑year legacy powers Microsoft 365 Copilot, Work IQ, and AI‑driven knowledge for organizations worldwide. Microsoft Sovereign Cloud adds governance, productivity, and support for large AI models securely running even when completely disconnected 65d ago The ultimate Microsoft 365 community event returns—your front‑row seat to the future of intelligent work 84d ago Join the ultimate Microsoft 365 community event with fresh insights, AI innovations, and a front‑row look at the future of intelligent work. 6 core capabilities to scale agent adoption in 2026 94d ago Learn six capabilities to support agent adoption at scale in 2026 with Microsoft Copilot Studio, from governance and security to operations.
CC
CISA Cybersecurity Advisories
9d ago · 10 items
HS
Heimdal Security Blog
10d ago · 15 items
Heimdal Expands AI Strategy with AI Wingman and Third-Party AI Containment 10d ago Heimdal today unveiled the next phase of its AI strategy, expanding AI Wingman with three new layers - Assist, Triage and SOC - alongside the introduction of Third-Party AI Containment. You Only Know What You’ve Got When Its Gone 34d ago Prepare for the expected. Rehearse an action plan in case of technology failure or cyberattacks. We all know they can happen. Nordic MSPs Can Now Access Heimdal’s Unified Security and Compliance Platform Through Elovade 44d ago Heimdal has appointed Elovade as its official distributor in the Nordic region. The move gives MSPs and resellers across Sweden, Norway, Denmark, Iceland, and Finland direct access to Heimdal's consolidated cybersecurity platform through a ... OpenClaw Incidents Show Why AI Adoption Pressure Puts Companies at Risk 56d ago The OpenClaw security failures show how hasty AI adoption can expose businesses and supply chains to major cyber risk. Heimdal Claims Industry First With a Cyber Essentials Control Mapping for PEDM to Help Organisations Prove Least Privilege 81d ago Heimdal is the first vendor to publish a dedicated Cyber Essentials control mapping for PEDM, setting out how privilege management supports Cyber Essentials requirements and what evidence can be produced to support assessment and assurance. Five Predictions for Cyber Security Trends in 2026 86d ago Morten Kjaersgaard, Heimdal’s Founder, and Adam Pilton, a former cybercrime investigator, predict five cyber security trends for 2026. Heimdal Achieves OPSWAT Gold Certification for Anti-Malware 106d ago Heimdal today announced that its Next-Gen Antivirus (NGAV) with Extended Threat Protection (XTP) has achieved OPSWAT Gold Certification for Anti-Malware, validating its compatibility and effectiveness within OPSWAT’s industry-leading Access... How to Avoid Holiday Shopping Scams (From a Former Cyber Detective) 140d ago Worried about holiday scams? Ex-cybercrime detective Adam Pilton breaks down the biggest threats and how to shop safely this festive season. ITDR Best Practices: How to Detect, Prevent, and Contain Critical Identity Threats 154d ago Key takeaways: ITDR solutions monitor identity-based threats that traditional security tools miss, like hackers logging in with stolen credentials Effective ITDR requires integration with privileged access management and automated responses... When Buyers Discount MSPs With One Big Customer 154d ago Your biggest customer loves you. Three years together. They trust you, pay on time, and refer others. From where you sit, that’s loyalty. From where a buyer sits, that’s a $$$ discount on your exit. This perception gap kills more MSP deals ...
15 loaded
13 loaded
Azure IaaS: Keep critical applications running with built-in resiliency at scale 29d ago Learn how Azure IaaS helps organizations start from a resilient platform foundation with availability, continuity, and recovery capabilities. Azure IaaS: Explore new resources for building a stronger, more efficient infrastructure 57d ago Learn how Azure IaaS helps you modernize infrastructure, improve performance and resilience, optimize costs, and prepare for AI workloads. Read more. Azure reliability, resiliency, and recoverability: Build continuity by design 72d ago Learn how Azure reliability, resiliency, and recovery capabilities work together to improve cloud continuity. Read more. Microsoft strengthens sovereign cloud capabilities with new services 177d ago Discover new Microsoft digital sovereignty capabilities and upcoming features across AI, security, and productivity, to address sovereign cloud needs. Enhancing software supply chain security with Microsoft’s Signing Transparency 178d ago Microsoft Signing Transparency delivers verifiable code integrity and tamper-evident software releases for stronger supply chain security. Oracle Database@Azure offers new features, regions, and programs to unlock data and AI innovation 198d ago Migrate Oracle solutions to the cloud with a trusted, enterprise-ready platform from Microsoft and Oracle. Learn more. Building secure, scalable AI in the cloud with Microsoft Azure 303d ago Forrester Research shows how Azure helps enterprises scale generative AI securely, unlocking real business value. Learn more. Enhance AI security with Azure Prompt Shields and Azure AI Content Safety 329d ago Learn how Prompt Shields and Azure AI Content Safety can help guard against direct and indirect threats to your LLM-based solution. Navigating the 2024 holiday season: Insights into Azure’s DDoS defense 458d ago Learn more on how Azure DDoS is keeping you prepared for this years trends in advanced attack tactics to keep your data secure. 6 insights to make your data AI-ready, with Accenture’s Teresa Tung 539d ago Learn more about the changing nature of data and its value to an AI strategy with Teresa Tung.
TH
Threatpost
1338d ago · 10 items
Student Loan Breach Exposes 2.5M Records 1338d ago 2.5 million people were affected, in a breach that could spell more trouble down the line. Watering Hole Attacks Push ScanBox Keylogger 1339d ago Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool. Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms 1340d ago Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system. Ransomware Attacks are on the Rise 1343d ago Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group. Cybercriminals Are Selling Access to Chinese Surveillance Cameras 1344d ago Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed. Twitter Whistleblower Complaint: The TL;DR Version 1345d ago Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk. Firewall Bug Under Active Attack Triggers CISA Warning 1346d ago CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP. Fake Reservation Links Prey on Weary Travelers 1347d ago Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels. iPhone Users Urged to Update to Patch 2 Zero-Days 1350d ago Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack. Google Patches Chrome’s Fifth Zero-Day of the Year 1351d ago An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.

No matching sources found.