Loading…

Whats The Hax?

Daily intelligence on threats, breaches, and defenders

Latest
Help Net SecurityHelping North Korean IT remote workers is becoming a fast track to prisonFor [Blue|Purple] Teams in Cyber DefenceMassive Cyber Attack Exposes Millions 🚨 || starting my cybersecurity jou...cybersecurityDevastating 'Dirty Frag' exploit leaks out, gives immediate root access on most Linux machines since 2017, no patches available, no warning given — Copy Fail-like vulnerability had its embargo brokenBleepingComputerFormer govt contractor convicted for wiping dozens of federal databasesMSRC Security Update GuideCVE-2025-71289 fs/ntfs3: handle attr_set_size() errors when truncating filesMSRC Security Update GuideCVE-2026-43274 mailbox: mchp-ipc-sbi: fix out-of-bounds access in mchp_ipc_get_cluster_aggr_irq()MSRC Security Update GuideCVE-2026-43116 netfilter: ctnetlink: ensure safe access to master conntrackMSRC Security Update GuideCVE-2026-43153 xfs: remove xfs_attr_leaf_hasnameMSRC Security Update GuideCVE-2025-71273 wifi: rtw88: Use devm_kmemdup() in rtw_set_supported_band()MSRC Security Update GuideCVE-2026-43172 wifi: iwlwifi: fix 22000 series SMEM parsingMSRC Security Update GuideCVE-2026-43245 ntfs: ->d_compare() must not blockMSRC Security Update GuideCVE-2026-43198 tcp: fix potential race in tcp_v6_syn_recv_sock()MSRC Security Update GuideCVE-2026-43161 iommu/vt-d: Skip dev-iotlb flush for inaccessible PCIe device without scalable modeMSRC Security Update GuideCVE-2026-43248 vhost: move vdpa group bound check to vhost_vdpaMSRC Security Update GuideCVE-2026-43125 dlm: validate length in dlm_search_rsb_treeMSRC Security Update GuideCVE-2026-37457MSRC Security Update GuideCVE-2026-6843 Nano: nano: format string vulnerability leads to denial of serviceMSRC Security Update GuideCVE-2026-6842 Nano: nano: local attacker can inject malicious .desktop launcher due to insecure directory permissionsMSRC Security Update GuideCVE-2026-3219 pip doesn't reject concatenated ZIP and tar archivescybersecurityWhat the **** is happening in cybersecurity space ?Help Net SecurityHelping North Korean IT remote workers is becoming a fast track to prisonFor [Blue|Purple] Teams in Cyber DefenceMassive Cyber Attack Exposes Millions 🚨 || starting my cybersecurity jou...cybersecurityDevastating 'Dirty Frag' exploit leaks out, gives immediate root access on most Linux machines since 2017, no patches available, no warning given — Copy Fail-like vulnerability had its embargo brokenBleepingComputerFormer govt contractor convicted for wiping dozens of federal databasesMSRC Security Update GuideCVE-2025-71289 fs/ntfs3: handle attr_set_size() errors when truncating filesMSRC Security Update GuideCVE-2026-43274 mailbox: mchp-ipc-sbi: fix out-of-bounds access in mchp_ipc_get_cluster_aggr_irq()MSRC Security Update GuideCVE-2026-43116 netfilter: ctnetlink: ensure safe access to master conntrackMSRC Security Update GuideCVE-2026-43153 xfs: remove xfs_attr_leaf_hasnameMSRC Security Update GuideCVE-2025-71273 wifi: rtw88: Use devm_kmemdup() in rtw_set_supported_band()MSRC Security Update GuideCVE-2026-43172 wifi: iwlwifi: fix 22000 series SMEM parsingMSRC Security Update GuideCVE-2026-43245 ntfs: ->d_compare() must not blockMSRC Security Update GuideCVE-2026-43198 tcp: fix potential race in tcp_v6_syn_recv_sock()MSRC Security Update GuideCVE-2026-43161 iommu/vt-d: Skip dev-iotlb flush for inaccessible PCIe device without scalable modeMSRC Security Update GuideCVE-2026-43248 vhost: move vdpa group bound check to vhost_vdpaMSRC Security Update GuideCVE-2026-43125 dlm: validate length in dlm_search_rsb_treeMSRC Security Update GuideCVE-2026-37457MSRC Security Update GuideCVE-2026-6843 Nano: nano: format string vulnerability leads to denial of serviceMSRC Security Update GuideCVE-2026-6842 Nano: nano: local attacker can inject malicious .desktop launcher due to insecure directory permissionsMSRC Security Update GuideCVE-2026-3219 pip doesn't reject concatenated ZIP and tar archivescybersecurityWhat the **** is happening in cybersecurity space ?

By Source

Feeds organized so you can skim by site.

Density Sort
HN
Help Net Security
1h ago · 10 items
Helping North Korean IT remote workers is becoming a fast track to prison 1h ago Two U.S. nationals were sentenced for helping North Korean IT workers obtain remote jobs at 70 American companies in laptop farm operations. Snyk integrates Claude to advance AI-native application security 1h ago Snyk integrates Claude into its AI Security Platform to automate vulnerability detection, prioritization, and fixes. Avantra’s new AI can diagnose SAP failures in seconds 1h ago Avantra 26 introduces the Automation Runner, bringing workflow execution and monitoring into a single, modern interface. Securonix launches AI threat research agent and ThreatWatch validation tool 2h ago Securonix announced the Securonix Threat Research Agent and ThreatWatch for ThreatQ, expanding how security teams research threats. OpenAI tunes GPT-5.5-Cyber for more permissive security workflows 2h ago OpenAI’s GPT-5.5-Cyber supports specialized cybersecurity workflows for verified defenders under Trusted Access for Cyber. Transilience AI unveils Security Operating System for cloud remediation 2h ago Transilience AI launches Full Stack Security Operating System to eliminate detection to remediation gap in cloud security. Object First Fleet Manager simplifies distributed backup storage 2h ago Object First Fleet Manager enables enterprises and service providers to centrally monitor complex environments. May 2026 Patch Tuesday forecast: AI starts driving security industry changes 3h ago Todd Schell from Ivanti gives his overview of April 2026 and forecast for May 2026 Patch Tuesday. Are you ready to get patching? Roblox chat moderation gets bypassed by leet speak and code words 4h ago An audit of 2 million messages shows Roblox chat moderation misses grooming, threats, and harassment as users learn to bypass filters. Mental health apps are collecting more than emotional conversations 4h ago Mental health apps privacy concerns grow after researchers found hidden trackers, AI data sharing, and weak data protections.
Massive Cyber Attack Exposes Millions 🚨 || starting my cybersecurity jou... 1h ago Student Arrested in Taiwan for using SDR and Handheld Radios to Halt Four High Speed Trains with TETRA Hack 4h ago Dirty Frag: Universal Linux LPE 5h ago Ivanti: We are aware of a very limited number of customers exploited with CVE-2026-6973. Successful exploitation requires Admin authentication. 5h ago Two U.S. Nationals Sentenced for Facilitating Fraudulent Remote Information Technology Worker Schemes to Generate Revenue for the Democratic People’s Republic of Korea 5h ago Revealed: Russia’s top secret spy school teaching hacking and election meddling | Russia 10h ago OceanLotus suspected of distributing ZiChatBot malware via wheel packages in PyPI 11h ago Searching for bulletproof detections in cPanel Land: Hunting for CVE-2026-41940: Building Detections for the exploit, not the PoC 12h ago Detecting BEC Persistence with KQL 1d ago Unpacking Russian-Iranian Private-Sector Cyber Connections 1d ago
20 loaded
CY
cybersecurity
1h ago · 20 items
Devastating 'Dirty Frag' exploit leaks out, gives immediate root access on most Linux machines since 2017, no patches available, no warning given — Copy Fail-like vulnerability had its embargo broken 1h ago What the **** is happening in cybersecurity space ? 1h ago Canvas is back up, but now what? 3h ago New “Dirty Frag” Linux Kernel Vulnerability Could Lead to Root Escalation 5h ago Reported a Broken Access Control bug to Instructure via bugcrowd 11 months ago, and also sent directly to canvas and instructure since I didn’t really care about the bounty. It was deemed "not applicable". 6h ago Egnyte potential ransomware attack 8h ago /Why/ is Shinyhunters targeting Canvas? 9h ago Canvas Hack - Any Guesses How? 9h ago Instructure (Canvas) Breached by Shiny Hunters — 275M Records from ~9,000 Schools/Universities, Ransom Deadline May 12 10h ago Issues removing Trellix (and specifically solidifier) 10h ago
20 loaded
BL
BleepingComputer
1h ago · 15 items
Former govt contractor convicted for wiping dozens of federal databases 1h ago A 34-year-old Virginia man was found guilty of conspiring to destroy dozens of government databases after getting fired from his job as a federal contractor. New Linux 'Dirty Frag' zero-day gives root on all major distros 2h ago A new Linux zero-day vulnerability, named Dirty Frag, allows local attackers to gain root privileges on most major Linux distributions with a single command. Canvas login portals hacked in mass ShinyHunters extortion campaign 11h ago The ShinyHunters extortion gang has breached education technology giant Instructure again, this time exploiting another vulnerability to deface Canvas login portals for hundreds of colleges and universities. New TCLBanker malware self-spreads over WhatsApp and Outlook 12h ago A new trojan named TCLBanker, which targets 59 banking, fintech, and cryptocurrency platforms, uses a trojanized MSI installer for Logitech AI Prompt Builder to infect systems. New PCPJack worm steals credentials, cleans TeamPCP infections 15h ago A new malware framework called PCPJack is stealing credentials from exposed cloud infrastructure while actively removing TeamPCP's access to the systems. Australia warns of ClickFix attacks pushing Vidar Stealer malware 16h ago The Australian Cyber Security Center (ACSC) is warning organizations of an ongoing malware campaign using the ClickFix social engineering technique to distribute the Vidar Stealer info-stealing malware. Ivanti warns of new EPMM flaw exploited in zero-day attacks 18h ago Ivanti warned customers today to patch a high-severity remote code execution vulnerability in Endpoint Manager Mobile (EPMM) exploited in zero-day attacks. The Browser Is Breaking Your DLP: How Data Slips Past Modern Controls 20h ago Your security controls aren't failing, they're missing where most of today's work actually happens. Keep Aware shows how browser activity like copy/paste and AI prompts bypass traditional protections. Americans sentenced for running 'laptop farms' for North Korea 20h ago Two U.S. nationals were sentenced to 18 months in prison each for operating so-called laptop farms that helped North Korean IT workers fraudulently obtain remote employment at nearly 70 American companies. Crypto gang member gets 6.5 years for role in $230 million heist 21h ago A 20-year-old California man was sentenced to 78 months in prison for serving as a home invader and money launderer in a criminal ring that stole over $250 million in cryptocurrency.
15 loaded
MS
MSRC Security Update Guide
1h ago · 20 items
CVE-2025-71289 fs/ntfs3: handle attr_set_size() errors when truncating files 1h ago CVE-2026-43274 mailbox: mchp-ipc-sbi: fix out-of-bounds access in mchp_ipc_get_cluster_aggr_irq() 1h ago CVE-2026-43116 netfilter: ctnetlink: ensure safe access to master conntrack 1h ago CVE-2026-43153 xfs: remove xfs_attr_leaf_hasname 1h ago CVE-2025-71273 wifi: rtw88: Use devm_kmemdup() in rtw_set_supported_band() 1h ago CVE-2026-43172 wifi: iwlwifi: fix 22000 series SMEM parsing 1h ago CVE-2026-43245 ntfs: ->d_compare() must not block 1h ago CVE-2026-43198 tcp: fix potential race in tcp_v6_syn_recv_sock() 1h ago CVE-2026-43161 iommu/vt-d: Skip dev-iotlb flush for inaccessible PCIe device without scalable mode 1h ago CVE-2026-43248 vhost: move vdpa group bound check to vhost_vdpa 1h ago
20 loaded
SE
SecurityWeek
1h ago · 10 items
SL
Security Latest
1h ago · 20 items
20 loaded
SE
Securelist
2h ago · 10 items
CVE-2025-68670: discovering an RCE vulnerability in xrdp 2h ago During a security assessment of Kaspersky USB Redirector, we discovered CVE-2025-68670: a pre-auth RCE in the xrdp server component. Project maintainers promptly patched the vulnerability. Exploits and vulnerabilities in Q1 2026 1d ago This report provides statistical data on published vulnerabilities and exploits we researched during Q1 2026. It also includes summary data on the use of C2 frameworks in APT attacks. OceanLotus suspected of using PyPI to deliver ZiChatBot malware 1d ago Kaspersky researchers uncovered malicious wheel packages in PyPI that targeted both Windows and Linux and contained a dropper delivering malware dubbed ZiChatBot. We attribute this activity to OceanLotus APT. Websites with an undefined trust level: avoiding the trap 2d ago We explain what suspicious websites are and how to distinguish a safe site from a fraudulent one. A new category in Kaspersky solutions: we’re sharing global statistics on untrusted site detection. “Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security 4d ago Kaspersky expert breaks down a new phishing scheme that uses the Amazon SES cloud email service. Let’s look at some examples to see how you can tell a phishing email from a real one. Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India 8d ago The Silver Fox group is targeting companies in Russia and India by impersonating tax authorities to distribute ValleyRAT and the new ABCDoor backdoor. PhantomRPC: A new privilege escalation technique in Windows RPC 14d ago Kaspersky researcher discovered a vulnerability in RPC architecture that enables an attacker to create a fake RPC server and escalate their privileges. FakeWallet crypto stealer spreading through iOS apps in the App Store 18d ago In March 2026, we uncovered more than twenty phishing apps in the Apple App Store masquerading as popular crypto wallets. Threat landscape for industrial automation systems in Q4 2025 22d ago The report contains industrial threat statistics for Q4 2025. It covers various infection vectors and malware types, as well as regional statistics and statistics by industry. JanelaRAT: a financial threat targeting users in Latin America 25d ago Kaspersky GReAT experts describe the latest JanelaRAT campaign detailing infection chain and malware functionality updates.
HS
hacking: security in practice
3h ago · 20 items
20 loaded
TH
The Hacker News
4h ago · 20 items
Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions 4h ago Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access 16h ago PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems 16h ago One Click, Total Shutdown: The "Patient Zero" Webinar on Killing Stealth Breaches 20h ago PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage 20h ago ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories 22h ago Day Zero Readiness: The Operational Gaps That Break Incident Response 23h ago PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux 1d ago vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution 1d ago Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks 1d ago
20 loaded
RE
Reverse Engineering
6h ago · 20 items
SASS King Part 2: reverse-engineering ptxas heuristic decisions and what the compiled binary actually reveals 6h ago I just released a C++ rewrite of **Minecraft rd-20090515** (May 15, 2009 — one of the earliest pre-Classic versions).If you find it interesting, a ⭐ on GitHub would mean a lot and help the project grow! 9h ago The first FREE online WebAssembly Reverse Engineering workbench (and how we built it) 15h ago VLC Media Player MKV Exploit Analysis 21h ago pyghidra-mcp Meets Ghidra GUI: Drive Project-Wide RE with Local AI 1d ago ant4g0nist/pyre: Ghidra decompiler in your browser 2d ago Resident Evil: Code Veronica X is able to play the opening FMV from the decompiled PS2 source! 2d ago Reverse-engineering the 1998 Ultima Online demo server 2d ago Inside Faxanadu series — deep dive into how this NES title works 2d ago EMBA v2.0.1 with interactive firmware dependency map available - Check it out and let us know what you are missing 2d ago
20 loaded
KO
Krebs on Security
7h ago · 10 items
Canvas Breach Disrupts Schools & Colleges Nationwide 7h ago An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the servi... Anti-DDoS Firm Heaped Attacks on Brazilian ISPs 7d ago A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazi... ‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty 16d ago A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phish... Patch Tuesday, April 2026 Edition 23d ago Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dub... Russia Hacked Routers to Steal Microsoft Office Tokens 30d ago Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backe... Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab 32d ago An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gang... ‘CanisterWorm’ Springs Wiper Attack Targeting Iran 45d ago A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or ha... Feds Disrupt IoT Botnets Behind Huge DDoS Attacks 49d ago The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as ro... Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker 57d ago A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub out... Microsoft Patch Tuesday, March 2026 Edition 58d ago Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing "zero-day" flaws this month (compared to February's five zero-day treat), but as usu...
LN
Latest news
9h ago · 20 items
After using Lenovo's $2,600 Yoga, I'm taking premium Windows laptops seriously again 9h ago Lenovo's Pro 9i Aura Edition is a powerful laptop that boasts strong sustained performance, a vivid display, and a robust cooling system. Roku apps loading slow? 9 quick fixes I try before blaming my Wi-Fi 9h ago If your Roku is lagging, with apps struggling to open, it might not be your Wi-Fi. Here's what I do to fix performance. Google Maps vs. Apple Maps: I compared two of the best navigation apps - here's my pick 9h ago Apple Maps has improved over the years, but how does it compare to Google Maps today? Here's the verdict after extended use. I started clearing my Roku cache, and it fixed my biggest TV complaint 15h ago Clearing my Roku cache takes less than a minute. When I remember to do it, my system runs like new. ReMarkable Paper Pure vs. Amazon Kindle Scribe: I've written on both E Ink tablets - this one wins 16h ago I compared two of the best black-and-white e-readers on the market; they look similar but have very different use cases. Lost your Roku remote? Here are four ways you can still control your TV 16h ago You can still watch your favorite shows even if your Roku remote has disappeared. Here's how. This TCL Mini LED TV is one of the best I've tested - and it's up to $2,000 off at Best Buy 16h ago The TCL QM8 is an excellent Mini LED TV that offers high-quality picture and audio. Hundreds of readers bought this E Ink tablet - and I highly recommend it 17h ago ZDNET readers love this E Ink tablet, thanks to its paper-to-pen writing experience and versatile uses. Whoop vs. Fitbit Air: I compared Google's new fitness band to the industry favorite 20h ago Taking on Whoop, Google unveiled its brand new screenless fitness band, the Fitbit Air. Here's which one is better, by the specs. 10 secret Netflix codes I use to find hidden movies (and how to enter them) - it's easy 21h ago Netflix codes make it easy to find buried genres and micro-categories. Here's how to use them - and my favorite ones.
20 loaded
TR
20 loaded
MS
Microsoft Security Blog
13h ago · 10 items
When prompts become shells: RCE vulnerabilities in AI agent frameworks 13h ago New research exposes how prompt injection in AI agent frameworks can lead to remote code execution. Learn how these vulnerabilities work, what’s impacted, and how to secure your agents. World Passkey Day: Advancing passwordless authentication 18h ago This World Passkey Day, read how Microsoft is advancing passkey adoption to replace passwords, cut phishing risk, and deliver simpler, more secure sign-ins. ​​Microsoft named an overall leader in KuppingerCole Analyst’s 2026 Emerging AI Security Operations Center (SOC) report ​​ 1d ago Microsoft is excited to be named an Overall Leader, and the Market Leader in the Kuppinger Cole Analyst’s 2026 Emerging AI Security Operations Center (SOC) report, as we see automation and AI as core components of the future of cybersecurit... ClickFix campaign uses fake macOS utilities lures to deliver infostealers 1d ago Threat actors are targeting macOS users with fake utility fixes that trick them into running malicious Terminal commands. This campaign evades traditional defenses by stealing credentials, wallets, and sensitive data. Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise 3d ago Microsoft Defender Research observed a large-scale credential theft campaign that exemplifies this trend, using code of conduct-themed lures, a multi-step attack chain, and legitimate email services to distribute fully authenticated message... CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments 6d ago A high-severity Linux vulnerability, “Copy Fail” (CVE-2026-31431), enables root privilege escalation across cloud environments and Kubernetes workloads. With a working exploit already in the wild, organizations should act quickly to detect,... Microsoft Agent 365, now generally available, expands capabilities and integrations 6d ago ​We’re announcing the general availability of Agent 365, plus previews of new capabilities to discover and manage shadow AI agents. Learn more. What’s new, updated, or recently released in Microsoft Security 7d ago Stay ahead of emerging threats with Microsoft’s newest security innovations and updates, delivered through the In the Loop series. Email threat landscape: Q1 2026 trends and insights 7d ago In early 2026, email threats increased with a rise in credential phishing, QR code phishing, and CAPTCHA-gated campaigns, highlighted by Microsoft’s disruption of the Tycoon2FA phishing platform which led to a 15% volume decrease and shifts... 8 best practices for CISOs conducting risk reviews 8d ago Read Microsoft expert tips for CISOs on embracing strong proactive security to mitigate increased exposure to security threats.
SA
Security - Ars Technica
14h ago · 20 items
Mozilla says 271 vulnerabilities found by Mythos have "almost no false positives" 14h ago Widely used Daemon Tools disk app backdoored in monthlong supply-chain attack 2d ago Ubuntu infrastructure has been down for more than a day 6d ago GPT-5.5 matches heavily hyped Mythos Preview in new cybersecurity tests 6d ago The most severe Linux threat to surface in years catches the world flat-footed 7d ago Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden 8d ago Open source package with 1 million monthly downloads stole user credentials 10d ago Why are top university websites serving porn? It comes down to shoddy housekeeping. 13d ago In a first, a ransomware family is confirmed to be quantum-safe 14d ago Crypto scam lures ships into Strait of Hormuz, falsely promising safe passage 15d ago
20 loaded
CD
Cyber Defense Magazine
20h ago · 10 items
AL
Alerts
22h ago · 20 items
20 loaded
AC
All CISA Advisories
22h ago · 20 items
20 loaded
WE
WeLiveSecurity
1d ago · 20 items
20 loaded
RF
Recorded Future
1d ago · 20 items
Quantum Risk Explained 1d ago Learn how the "Harvest Now, Decrypt Later" (HNDL) risk exposes long-lived sensitive data today, regardless of when Cryptographically Relevant Quantum Computers (CRQCs) arrive. Recorded Future Named a Leader in the 2026 Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies. And there’s more. 2d ago Recorded Future shares exciting developments since being named a leader. Threat Activity Enablers: The Backbone of Today’s Threat Landscape 2d ago Behind every ransomware demand, botnet, or threat activity group is a server sitting in a data center. Hacking Embodied AI 3d ago Embodied AI, intelligent systems in physical forms such as humanoid and quadruped robots, is moving from spectacle to staffing plans. The Iran War: What You Need to Know 7d ago Insikt Group tracks the cyber, physical, and geopolitical components of the US-Israeli strikes on Iran — with continuously updated threat analysis and scenarios. Risk Scenarios for the US’s Strategic Pivot 8d ago The United States (US) is shifting toward a more force-driven security strategy primarily relying on military operations and economic pressure to counter transnational criminal organizations and limit Chinese, Russian, and Iranian influence... Building with AI: Here's What No Briefing Will Tell You 8d ago What building with AI for three months revealed about four leadership blind spots executives can't afford to ignore: the comprehension gap, eroding competitive moats, deployment complexity, and what "senior" really means now. The Money Mule Solution: What Every Scam Has in Common 10d ago Learn how mule account intelligence — not tactic-tracking — is the most effective lever for preventing APP fraud before funds move. Lazarus Doesn't Need AGI 10d ago Explore the 2026 Claude Mythos breach, supply chain risks, and the $2B+ crypto theft pipeline. From Overwhelmed to Autonomous: Rethinking Threat Intelligence in 2026 14d ago For most security teams today, volume and access to intelligence isn’t the problem. It’s the speed at which they can turn that intelligence into action. .
20 loaded
NE
NetworkChuck
1d ago · 15 items
15 loaded
CS
Cisco Security Advisory
1d ago · 20 items
Cisco Unity Connection Remote Code Execution and Server-Side Request Forgery Vulnerabilities 1d ago Multiple vulnerabilities in Cisco Unity Connection could allow a remote attacker to execute arbitrary code on or conduct server-side request forgery (SSRF) attacks through an affected device. For more information about these vulnerabilities... Cisco Enterprise Chat and Email Lite Agent File Upload Vulnerability 1d ago A vulnerability in the Lite Agent feature of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct browser-based attacks. To exploit this vulnerability, the attacker must have valid credentials for a... Cisco Identity Services Engine Authentication Bypass Vulnerabilities 1d ago Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow a remote attacker to bypass authorization mechanisms or examine error messages to gain access to sensitive information on an affected device. For more information ... Cisco Prime Infrastructure Information Disclosure Vulnerability 1d ago A vulnerability in the log file download functionality of Cisco Prime Infrastructure could allow an authenticated, remote attacker to download arbitrary log files from the server. This vulnerability is due to insufficient authorization chec... Cisco Slido Insecure Direct Object Reference Vulnerability 1d ago A vulnerability in the REST API of Cisco Slido could have allowed an authenticated, remote attacker to access the social profile data of other users or affect quiz and poll results. Cisco has addressed this vulnerability in Cisco Slido and ... Cisco IoT Field Network Director Vulnerabilities 1d ago Multiple vulnerabilities in the web-based management interface of Cisco IoT Field Network Director Software could allow an authenticated, remote attacker to access files, execute commands, and cause denial of service (DoS) conditions on man... Cisco Crosswork Network Controller and Cisco Network Services Orchestrator Connection Exhaustion Denial of Service Vulnerability 1d ago A vulnerability in the connection-handling mechanism of Cisco Crosswork Network Controller (CNC) and Cisco Network Services Orchestrator (NSO) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a... Cisco SG350 and SG350X Series Managed Switches SNMP Denial of Service Vulnerability 1d ago A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco 350 Series Managed Switches (SG350) and Cisco 350X Series Stackable Managed Switches (SG350X) firmware could allow an authenticated, remote attacker to caus... Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities 2d ago Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulner... Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense 7d ago On April 23, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an update to V1: Emergency Directive (ED) 25-03: Identify and Mitigate Potential Compromise of Cisco Devices related to Cisco Secure Firewall Adaptiv...
20 loaded
BH
Black Hat
1d ago · 15 items
15 loaded
MA
Malware Analysis & Reports
2d ago · 20 items
Discord bot C2 infrastructure 2d ago IOCX v0.7.1 — robustness update focused on malformed PEs, hostile strings, and static‑analysis hardening 2d ago Supply chain attack: DAEMON Tools Lite now contains a backdoor. 2d ago Built a PE Malware Analysis Pipeline to Learn Why Most Detection Tools Suck at Correlation 3d ago Anyone wanna learn the CEH or OSCP red teaming free 5d ago Fake Tailscale site on Google Ads uses ClickFix to get you to execute malware yourself 6d ago Minirat malware deployed via NPM targeting macOS machines 8d ago VECT Ransomware Is Actually a Wiper 9d ago The Malware Factory: GLASSWORM Forensics in Open VSX 9d ago Phishing-to-RMM Attacks: The Remote Access Blind Spot Businesses Can't Ignore 9d ago
20 loaded
PN
Proofpoint News Feed
2d ago · 10 items
Proofpoint Establishes Innovation Precedent for Source-Agnostic Modern Enterprise Investigations 2d ago Proofpoint Prism Investigator positioned as first fully autonomous Agentic AI solution to significantly streamline investigations for highly regulated and highly Claude Mythos Fears Startle Japan's Financial Services Sector 8d ago AI-Era Threats Spread Beyond Email Into SaaS, Collaboration Apps, and AI Assistants 9d ago Proofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in Place 10d ago Inaugural global study finds more than half of organizations are not fully confident their AI security controls would detect compromised AI Clear market trend for software providers to help with AI: Proofpoint CEO 14d ago Sumit Dhawan, Proofpoint CEO, joins 'Closing Bell' to discuss ServiceNow's quarterly earnings results, if Anthropic's Mythos makes incumbent players more important and much more. Proofpoint CEO on AI Security Innovations | Nasdaq at RSAC 2026 15d ago Cargo thieving hackers running sophisticated remote access campaigns, researchers find 21d ago Freight Hacker Wields Code-Signing Service to Evade Defenses 21d ago Sumit Dhawan on NYSE Floor Talk | Proofpoint AI Security 22d ago FIFA World Cup 2026: More than One-Third of Official Partners Expose the Public to the Risk of Email Fraud 24d ago Analysis by cybersecurity company Proofpoint reveals that while most partners have implemented baseline email authentication, many are still not proactively blocking fraudulent emails that
Supporting the National Cyber Strategy: How TrendAI™ Helps 2d ago InstallFix and Claude Code: How Fake Install Pages Lead to Real Compromise 3d ago Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities 4d ago Kuse Web App Abused to Host Phishing Document 9d ago Bad actors took advantage of the legitimate name and services of Kuse, a popular AI-based app designed for workplaces. The attackers exploited the users’ trust in Kuse to carry out a phishing attack. Void Dokkaebi Uses Fake Job Interview Lure to Spread Malware via Code Repositories 17d ago The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables 18d ago Identity Protection in the AI Era 25d ago Learn about a proactive, identity-first security approach that integrates visibility, threat detection and response, zero trust enforcement, AI protection, and threat intelligence into a unified model. U.S. Public Sector Under Siege: Threat Intelligence for Q1 2026 29d ago Discover how TrendAI Vision One™ empowers government agencies and educational institutions with advanced visibility, intelligence, and automation to stay ahead of evolving public sector threats. Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do 31d ago Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads 35d ago
20 loaded
TL
The Last Watchdog
2d ago · 10 items
News alert: LuxSci launches HIPAA-compliant email platform for mid-size healthcare market 2d ago CAMBRIDGE, Mass., May 5, 2026, CyberNewswireŌĆöLuxSci, a leading provider of HIPAA compliant secure healthcare communications, today announced the launch of LuxSci Secure High Volume Email for mid-sized healthcare organizations, the industr... SHARED INTEL Q&A: PKI’s unfinished business—’digital passports’ for content, models and agents 7d ago As if keeping track of machine identities wasnŌĆÖt hard enough. AI agents are now arriving by the thousands ŌĆö and most enterprises are just handing them borrowed credentials and hoping for the best. Meanwhile, the cryptographic infrastruc... GUEST ESSAY: How augmented reality (AR) can turn building images into ad space with no control 10d ago Every major building in America has three things: a physical address, a legal owner, and an unmonitored attack surface. Related: Sam Altman's quest to usurp the browswer That surface extends from the ground up through every floor, every fac... FIRESIDE CHAT: Leaked secrets are now the go-to attack vector — and AI is accelerating exposures 10d ago A consequential shift is underway in how enterprise breaches begin. The leaked credential ‚Äî once treated as a hygiene problem ‚Äî has become the primary on-ramp. Related: No easy fixes for AI risk Last August‚Äôs Salesloft campaign was th... News alert: BreachLock’s integrated attack validation platform debuts in Gartner AEV category 15d ago NEW YORK, Apr. 21, 2026, CyberNewswire—BreachLock, a global leader in offensive security, today announced it has been named a representative vendor in the 2026 Gartner Market Guide for Adversarial Exposure Validation. This recognition mar... Fireside Chat: PKI has carried digital trust through every tech advance—now comes the hardest one 17d ago Public key infrastructure -- the authentication and encryption framework that has held digital commerce together through every chaotic leap forward in technology -- is facing a double whammy. Related: Achieveing AI security won't be easy Au... News Alert: NTT Research launches SaltGrain—advanced Attribute-Based Encryption security 22d ago SUNNYVALE, Calif., Apr. 15, 2026 ŌĆō NTT Research, Inc., a division of NTT (TYO:9432), today announced the launch of Scale Academy, a startup incubator responsible for bringing to market products and services based upon technologies studied... GUEST ESSAY: Google’s 2029 deadline exposes readiness gap as move to quantum-safe crypto lags 23d ago For years, quantum risk was easy for most institutions to treat as premature: real in theory, urgent someday, but not yet an operational problem. That is no longer tenable. Related: AI spawns semantic attacks Two developments this month bro... News alert: Mallory launches AI-native platform to cut through alert noise and surface real risk 28d ago AUSTIN, Texas, Apr. 9, 2026, CyberNewswire—Mallory is launching a AI-native threat intelligence platform, purpose-built to answer the questions CISOs and their teams are asking every day: •What are the real threat vectors for our organi... FIRESIDE CHAT: Geopolitical turmoil, rising AI risk add a new layer to enterprise cyber defense 30d ago As if securing the enterprise against a tidal wave of AI tools wasn't hard enough, it turns out the geopolitical instability of the moment is making things worse. That wasn't the headline at RSAC 2026 last week -- agentic AI dominated the a...
BF
Blog – Forter
2d ago · 10 items
DA
darkreading
2d ago · 25 items
How the Story of a USB Penetration Test Went Viral 2d ago RMM Tools Fuel Stealthy Phishing Campaign 3d ago Exploit Cyber-Frenzy Threatens Millions via Critical cPanel Vulnerability 3d ago Silver Fox Springs Tax-Themed Attacks on Orgs in India, Russia 3d ago How Dark Reading Lifted Off the Launchpad in 2006 3d ago 76% of All Crypto Stolen in 2026 Is Now in North Korea 6d ago If AI's So Smart, Why Does It Keep Deleting Production Databases? 6d ago Name That Toon: Mark of (Security) Progress 6d ago 20 Years in Cyber: Dark Reading Marks Milestone With Month of Special Coverage 6d ago TeamPCP Hits SAP Packages With 'Mini Shai-Hulud' Attack 7d ago
25 loaded
WE
WeLiveSecurity
3d ago · 20 items
20 loaded
Azure IaaS: Defense in depth built on secure-by-design principles 3d ago Explore how Azure IaaS uses defense in depth and secure-by-design principles to deliver layered, scalable cloud security across compute, network, and data. Enforcing trust and transparency: Open-sourcing the Azure Integrated HSM 7d ago Learn how Microsoft Azure Integrated HSM delivers hardware‑enforced key protection in the cloud, combining FIPS Level 3 assurances with transparency and open‑source collaboration. Azure IaaS: Keep critical applications running with built-in resiliency at scale 36d ago Learn how Azure IaaS helps organizations start from a resilient platform foundation with availability, continuity, and recovery capabilities. Azure IaaS: Explore new resources for building a stronger, more efficient infrastructure 64d ago Learn how Azure IaaS helps you modernize infrastructure, improve performance and resilience, optimize costs, and prepare for AI workloads. Read more. Azure reliability, resiliency, and recoverability: Build continuity by design 79d ago Learn how Azure reliability, resiliency, and recovery capabilities work together to improve cloud continuity. Read more. Microsoft strengthens sovereign cloud capabilities with new services 184d ago Discover new Microsoft digital sovereignty capabilities and upcoming features across AI, security, and productivity, to address sovereign cloud needs. Enhancing software supply chain security with Microsoft’s Signing Transparency 185d ago Microsoft Signing Transparency delivers verifiable code integrity and tamper-evident software releases for stronger supply chain security. Oracle Database@Azure offers new features, regions, and programs to unlock data and AI innovation 205d ago Migrate Oracle solutions to the cloud with a trusted, enterprise-ready platform from Microsoft and Oracle. Learn more. Building secure, scalable AI in the cloud with Microsoft Azure 310d ago Forrester Research shows how Azure helps enterprises scale generative AI securely, unlocking real business value. Learn more. Enhance AI security with Azure Prompt Shields and Azure AI Content Safety 336d ago Learn how Prompt Shields and Azure AI Content Safety can help guard against direct and indirect threats to your LLM-based solution.
DB
David Bombal
3d ago · 15 items
15 loaded
NA
NahamSec
3d ago · 15 items
15 loaded
JH
John Hammond
6d ago · 15 items
15 loaded
TC
The Cyber Mentor
6d ago · 15 items
15 loaded
HA
Hak5
7d ago · 15 items
15 loaded
DE
DEFCONConference
9d ago · 15 items
15 loaded
IP
IppSec
12d ago · 15 items
15 loaded
M3
Microsoft 365 Blog
15d ago · 10 items
Copilot’s agentic capabilities in Word, Excel, and PowerPoint are generally available 15d ago Copilot's newest features are now generally available as the default experience across all Microsoft 365 subscriptions. Bring your everyday business apps into the flow of work with agents in Microsoft 365 Copilot 24d ago Discover how apps integrate with AI agents to power Copilot experiences, streamline workflows, and turn business context into action. New and improved: Multi-agent orchestration, connected experiences, and faster prompt iteration 36d ago Explore what's new in Copilot Studio: Multi-agent systems now generally available, plus updates to the Prompt Editor and governance controls. Copilot Cowork: Now available in Frontier 38d ago Today, Copilot Cowork—designed for long-running, multi-step work in Microsoft 365—is available via the Frontier program. Copilot Cowork: A new way of getting work done 59d ago Copilot Cowork turns intent into action across Microsoft 365—automating tasks, coordinating workflows, and keeping you in control. See how. Powering Frontier Transformation with Copilot and agents 59d ago Wave 3 of Microsoft 365 Copilot introduces Copilot Cowork, multi‑model intelligence, and enterprise‑ready AI—built to get real work done. SharePoint at 25: How Microsoft is putting knowledge to work in the AI era 66d ago Discover how SharePoint’s 25‑year legacy powers Microsoft 365 Copilot, Work IQ, and AI‑driven knowledge for organizations worldwide. Microsoft Sovereign Cloud adds governance, productivity, and support for large AI models securely running even when completely disconnected 72d ago The ultimate Microsoft 365 community event returns—your front‑row seat to the future of intelligent work 91d ago Join the ultimate Microsoft 365 community event with fresh insights, AI innovations, and a front‑row look at the future of intelligent work. 6 core capabilities to scale agent adoption in 2026 101d ago Learn six capabilities to support agent adoption at scale in 2026 with Microsoft Copilot Studio, from governance and security to operations.
CC
CISA Cybersecurity Advisories
16d ago · 10 items
Defending Against China-Nexus Covert Networks of Compromised Devices 16d ago Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure 31d ago U.S. organizations should review the TTPs and IOCs in this advisory for indications of current or historical activity on their networks, and apply the Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure 153d ago The authoring organizations encourage critical infrastructure organizations to implement the recommendations in this advisory to reduce the likelihood and CISA Shares Lessons Learned from an Incident Response Engagement 227d ago Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System 255d ago The authoring agencies strongly urge network defenders to hunt for malicious activity and to apply the mitigations in this CSA to reduce the threat of Chinese CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization 282d ago #StopRansomware: Interlock 290d ago Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider 329d ago CISA urges software vendors, downstream customers, and end users to immediately implement the Mitigations listed in this advisory based on confirmed compromise Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations 352d ago Russian GRU Targeting Western Logistics Entities and Technology Companies 360d ago Executives and network defenders should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and IOCs
HS
Heimdal Security Blog
17d ago · 15 items
Heimdal Expands AI Strategy with AI Wingman and Third-Party AI Containment 17d ago Heimdal today unveiled the next phase of its AI strategy, expanding AI Wingman with three new layers - Assist, Triage and SOC - alongside the introduction of Third-Party AI Containment. You Only Know What You’ve Got When Its Gone 41d ago Prepare for the expected. Rehearse an action plan in case of technology failure or cyberattacks. We all know they can happen. Nordic MSPs Can Now Access Heimdal’s Unified Security and Compliance Platform Through Elovade 51d ago Heimdal has appointed Elovade as its official distributor in the Nordic region. The move gives MSPs and resellers across Sweden, Norway, Denmark, Iceland, and Finland direct access to Heimdal's consolidated cybersecurity platform through a ... OpenClaw Incidents Show Why AI Adoption Pressure Puts Companies at Risk 63d ago The OpenClaw security failures show how hasty AI adoption can expose businesses and supply chains to major cyber risk. Heimdal Claims Industry First With a Cyber Essentials Control Mapping for PEDM to Help Organisations Prove Least Privilege 88d ago Heimdal is the first vendor to publish a dedicated Cyber Essentials control mapping for PEDM, setting out how privilege management supports Cyber Essentials requirements and what evidence can be produced to support assessment and assurance. Five Predictions for Cyber Security Trends in 2026 93d ago Morten Kjaersgaard, Heimdal’s Founder, and Adam Pilton, a former cybercrime investigator, predict five cyber security trends for 2026. Heimdal Achieves OPSWAT Gold Certification for Anti-Malware 113d ago Heimdal today announced that its Next-Gen Antivirus (NGAV) with Extended Threat Protection (XTP) has achieved OPSWAT Gold Certification for Anti-Malware, validating its compatibility and effectiveness within OPSWAT’s industry-leading Access... How to Avoid Holiday Shopping Scams (From a Former Cyber Detective) 147d ago Worried about holiday scams? Ex-cybercrime detective Adam Pilton breaks down the biggest threats and how to shop safely this festive season. ITDR Best Practices: How to Detect, Prevent, and Contain Critical Identity Threats 161d ago Key takeaways: ITDR solutions monitor identity-based threats that traditional security tools miss, like hackers logging in with stolen credentials Effective ITDR requires integration with privileged access management and automated responses... When Buyers Discount MSPs With One Big Customer 161d ago Your biggest customer loves you. Three years together. They trust you, pay on time, and refer others. From where you sit, that’s loyalty. From where a buyer sits, that’s a $$$ discount on your exit. This perception gap kills more MSP deals ...
15 loaded
13 loaded
LI
LiveOverflow
64d ago · 15 items
15 loaded
SK
STÖK
256d ago · 15 items
15 loaded
HA
HackerSploit
393d ago · 15 items
15 loaded
TH
Threatpost
1345d ago · 10 items
Student Loan Breach Exposes 2.5M Records 1345d ago 2.5 million people were affected, in a breach that could spell more trouble down the line. Watering Hole Attacks Push ScanBox Keylogger 1346d ago Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool. Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms 1347d ago Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system. Ransomware Attacks are on the Rise 1350d ago Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group. Cybercriminals Are Selling Access to Chinese Surveillance Cameras 1351d ago Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed. Twitter Whistleblower Complaint: The TL;DR Version 1352d ago Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk. Firewall Bug Under Active Attack Triggers CISA Warning 1353d ago CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP. Fake Reservation Links Prey on Weary Travelers 1354d ago Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels. iPhone Users Urged to Update to Patch 2 Zero-Days 1357d ago Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack. Google Patches Chrome’s Fifth Zero-Day of the Year 1358d ago An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.

No matching sources found.