Loading…

Whats The Hax?

Daily intelligence on threats, breaches, and defenders

What's New

Top 5 Across All Sources
  1. Interview Assessments

    cybersecurity · 1h ago
  2. Questions about data blockers

    cybersecurity · 2h ago
  3. A Tale of Two File Names

    Reverse Engineering · 2h ago
  4. PE reconstruction

    Reverse Engineering · 2h ago
Latest
cybersecurityInterview AssessmentscybersecurityWe built a blue-team mode for AI security training — you write a defensive prompt, we throw 12 attack probes at itcybersecurityQuestions about data blockersReverse EngineeringA Tale of Two File NamesReverse EngineeringPE reconstructionFor [Blue|Purple] Teams in Cyber DefenceOtterCookie: JavaScript RAT shifting fake-interview campaigns from credential theft to live surveillancecybersecurityPost Implementation taskFor [Blue|Purple] Teams in Cyber DefenceThe Gentlemen Ransomware Group — Leak AnalysiscybersecurityCyber security jobs in AustriaBleepingComputerMicrosoft rejects critical Azure vulnerability report, no CVE issuedhacking: security in practiceLeader of Ukrainian Hacking Group: GRU Bribed Kyivstar Employee to Hack Company’s NetworkcybersecurityPersonal favorite deception layer.cybersecurityLearning wayReverse EngineeringA File Format Uncracked for 20 Years: Part 2cybersecurityHow do you report large volume detections to a CISO without making the BPA report a SOC story?For [Blue|Purple] Teams in Cyber DefenceHDD Firmware Hacking Part 1For [Blue|Purple] Teams in Cyber Defencessh-keysign-pwn: Steal SSH host private keys and /etc/shadow via the ptrace_may_access mm-NULL bypass + pidfd_getfd. Pre-31e62c2ebbfd kernels.For [Blue|Purple] Teams in Cyber DefenceCTO at NCSC Summary: week ending May 17thcybersecurityCTO at NCSC Summary: week ending May 17thhacking: security in practiceGZDoom in the browsercybersecurityInterview AssessmentscybersecurityWe built a blue-team mode for AI security training — you write a defensive prompt, we throw 12 attack probes at itcybersecurityQuestions about data blockersReverse EngineeringA Tale of Two File NamesReverse EngineeringPE reconstructionFor [Blue|Purple] Teams in Cyber DefenceOtterCookie: JavaScript RAT shifting fake-interview campaigns from credential theft to live surveillancecybersecurityPost Implementation taskFor [Blue|Purple] Teams in Cyber DefenceThe Gentlemen Ransomware Group — Leak AnalysiscybersecurityCyber security jobs in AustriaBleepingComputerMicrosoft rejects critical Azure vulnerability report, no CVE issuedhacking: security in practiceLeader of Ukrainian Hacking Group: GRU Bribed Kyivstar Employee to Hack Company’s NetworkcybersecurityPersonal favorite deception layer.cybersecurityLearning wayReverse EngineeringA File Format Uncracked for 20 Years: Part 2cybersecurityHow do you report large volume detections to a CISO without making the BPA report a SOC story?For [Blue|Purple] Teams in Cyber DefenceHDD Firmware Hacking Part 1For [Blue|Purple] Teams in Cyber Defencessh-keysign-pwn: Steal SSH host private keys and /etc/shadow via the ptrace_may_access mm-NULL bypass + pidfd_getfd. Pre-31e62c2ebbfd kernels.For [Blue|Purple] Teams in Cyber DefenceCTO at NCSC Summary: week ending May 17thcybersecurityCTO at NCSC Summary: week ending May 17thhacking: security in practiceGZDoom in the browser

By Source

Feeds organized so you can skim by site.

Density Sort
CY
cybersecurity
1h ago · 20 items
20 loaded
RE
Reverse Engineering
2h ago · 20 items
A Tale of Two File Names 2h ago PE reconstruction 2h ago A File Format Uncracked for 20 Years: Part 2 8h ago Resident Evil: Code Veronica X is able to use inventory and view files from the decompiled PS2 source! 11h ago [CrackMe] PyVMP v7 : The vault. Important info : the server is now live, take a look inside the gofile link. 17h ago Exploiting Toshiba Qiomem.sys vulnerable driver 19h ago HDD Firmware Hacking Part 1 20h ago Region-based binary diff tool for firmware analysis 21h ago A 0-click exploit chain for the Pixel 10: When a Door Closes, a Window Opens 1d ago แก้ไขปัญหา Frida 17.9.10 บน Termux (Android ARM64) - ไม่มีข้อผิดพลาด Toolchain 404 และ _Py_NoneStruct อีกต่อไป! 1d ago
20 loaded
OtterCookie: JavaScript RAT shifting fake-interview campaigns from credential theft to live surveillance 2h ago The Gentlemen Ransomware Group — Leak Analysis 5h ago HDD Firmware Hacking Part 1 8h ago ssh-keysign-pwn: Steal SSH host private keys and /etc/shadow via the ptrace_may_access mm-NULL bypass + pidfd_getfd. Pre-31e62c2ebbfd kernels. 8h ago CTO at NCSC Summary: week ending May 17th 8h ago Vidar v1.5 in Go: same family, new language, heavy sandbox checks 10h ago Help-Desk Lures Drop KongTuke's Evolved ModeloRAT 11h ago Welcome to BlackFile: Inside a Vishing Extortion Operation 11h ago DoublePulsar: A User-Defined Reflective Loader in the Crystal Palace and Tradecraft Garden Era 12h ago Stop Being Weird — Life After Call Stack Spoofing Under CET 12h ago
20 loaded
BL
BleepingComputer
6h ago · 15 items
Microsoft rejects critical Azure vulnerability report, no CVE issued 6h ago A security researcher claims Microsoft quietly fixed an Azure Backup for AKS vulnerability after rejecting his report, and without issuing a CVE. Microsoft disputes the claim, telling BleepingComputer the behavior was expected and that Russian hackers turn Kazuar backdoor into modular P2P botnet 12h ago The Russian hacker group Secret Blizzard has developed its long-running Kazuar backdoor into a modular peer-to-peer (P2P) botnet designed for long-term persistence, stealth, and data collection. Funnel Builder WordPress plugin bug exploited to steal credit cards 1d ago A critical vulnerability in the Funnel Builder plugin for WordPress is being actively exploited to inject malicious JavaScript snippets into WooCommerce checkout pages. Microsoft Exchange, Windows 11 hacked on second day of Pwn2Own 1d ago ​During the second day of Pwn2Own Berlin 2026, competitors collected $385,750 in cash awards after exploiting 15 unique zero-day vulnerabilities in multiple products, including Windows 11, Microsoft Exchange, and Red Hat Enterprise Linux fo... Popular node-ipc npm package compromised to steal credentials 1d ago Hackers have injected credential-stealing malware into newly published versions of node-ipc, a popular inter-process communication package, in a new supply chain attack targeting npm. Avada Builder WordPress plugin flaws allow site credential theft 1d ago Two vulnerabilities in the Avada Builder plugin for WordPress, with an estimated one million active installations, allow hackers to read arbitrary files and extract sensitive information from the database. Microsoft backpedals: Edge to stop loading passwords into memory 1d ago Microsoft is updating the Edge web browser to ensure it no longer loads saved passwords into process memory in clear text at startup after previously stating it was Inside the REMUS Infostealer: Session Theft, MaaS, and Rapid Evolution 1d ago Stolen browser sessions and authentication tokens are becoming more valuable than stolen passwords. Flare explains how the REMUS infostealer evolved around session theft and operational scalability. Microsoft to automatically roll back faulty Windows drivers 1d ago Microsoft is introducing a new capability that will allow it to remotely roll back problematic Windows drivers delivered through Windows Update. Microsoft warns of Exchange zero-day flaw exploited in attacks 1d ago On Thursday, Microsoft shared mitigations for a high-severity Exchange Server vulnerability exploited in attacks that allow threat actors to execute arbitrary code via cross-site scripting (XSS) while targeting Outlook on the web users.
15 loaded
HS
hacking: security in practice
6h ago · 20 items
20 loaded
TH
The Hacker News
11h ago · 20 items
Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming 11h ago Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access 1d ago Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence 1d ago What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface 1d ago TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates 1d ago On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email 1d ago CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits 1d ago Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access 2d ago Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets 2d ago ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories 2d ago
20 loaded
IP
IppSec
12h ago · 15 items
15 loaded
LN
Latest news
16h ago · 20 items
I didn't expect Bose's new lifestyle speaker to coexist with my Sonos Era 100 like this 16h ago Months after sunsetting the SoundTouch lineup, Bose's Lifestyle Ultra proves that it can still make versatile and great-sounding speaker. Amazon's discounted Fitbit Air deal comes with a free band - but I'd act quick 17h ago The latest Fitbit is here, and you can save 26% on it when you preorder on Amazon today. The best external hard drives of 2026: Expert tested and reviewed 18h ago The best external hard drives available today provide ample storage, reliability, and security for different price points. We went hands-on to find the best hardware available in 2026. The 4th Linux kernel flaw this month can lead to stolen SSH host keys 1d ago The good news is there's already a patch. The bad news is that the fix isn't available for all Linux distributions yet. Here's what you can do in the meantime. Why this metal detector is a smart buy in 2026 - especially at $60 off on Amazon 1d ago Search for treasures on the beach or in your own backyard with this metal detector bundle at Amazon. The best early Memorial Day laptop deals: Save on Apple, Dell, Lenovo, and more 1d ago I've rounded up the best laptop deals live right now so you don't have to. Android Auto runs faster and smoother now thanks to my 4 easy tweaks 1d ago These simple changes can make an immediate impact on your in-car experience. I found the best early Memorial Day phones deals: Save big on Samsung, Google, Apple and more 1d ago For Memorial Day, I've rounded up the best smartphone deals. Discounts are already live, so now is a great time to save. Switch to plug-in solar? My advice after testing the DIY energy tech at home 1d ago One big hurdle to harvesting power with this new solar technology is government red tape. Here's where you can and can't take advantage of plug-in solar systems. I found the best early Memorial Day outdoor deals: Lawn mowers, power banks, and more 1d ago You can already find great Memorial Day deals on everything you need to upgrade your outdoor space.
20 loaded
SL
Security Latest
16h ago · 20 items
20 loaded
SE
SecurityWeek
17h ago · 10 items
MS
MSRC Security Update Guide
19h ago · 20 items
CVE-2026-43490 ksmbd: validate inherited ACE SID length 19h ago CVE-2026-46333 ptrace: slightly saner 'get_dumpable()' logic 19h ago CVE-2026-44662 rust-openssl: Heap buffer overflow when encrypting with AES key-wrap-with-padding 19h ago CVE-2026-44431 urllib3: Sensitive headers forwarded across origins in proxied low-level redirects 19h ago CVE-2026-42946 NGINX ngx_http_scgi_module and ngx_http_uwsgi_module vulnerability 19h ago CVE-2026-42945 NGINX ngx_http_rewrite_module vulnerability 19h ago CVE-2026-42934 NGINX ngx_http_charset_module vulnerability 19h ago CVE-2026-40701 NGINX ngx_http_ssl_module vulnerability 19h ago CVE-2026-40460 NGINX ngx_quic_module vulnerability 19h ago CVE-2026-6479 PostgreSQL SSL/GSS init causes denial of service, via uncontrolled recursion 19h ago
20 loaded
JH
John Hammond
19h ago · 15 items
15 loaded
MA
Malware Analysis & Reports
1d ago · 20 items
20 loaded
CY
CyberScoop
1d ago · 28 items
Colorado governor commutes prison sentence for election denier Tina Peters 1d ago Here’s how the FTC plans to enforce the Take It Down Act 1d ago Cisco zero-day under ongoing attack by persistent threat group 1d ago Pentagon cyber official calls advanced AI ‘revolutionary warfare’ 2d ago White House cyber official: identity security matters more than ever in the age of AI 2d ago Major tech manufacturer Foxconn confirms cyberattack hit North American factories 2d ago Researchers say AI just broke every benchmark for autonomous cyber capability 3d ago Closed briefing sets stage for House hearing on Anthropic’s Mythos and cyber risks 3d ago DOJ releases legal rationale for nationwide voter data collection 3d ago Weaponized AI: The new frontier of fraud and identity spoofing 3d ago
28 loaded
BH
Black Hat
1d ago · 15 items
15 loaded
DB
David Bombal
1d ago · 15 items
15 loaded
HN
Help Net Security
1d ago · 10 items
Google lets Workspace admins apply one policy across all SAML apps 1d ago Google Workspace now supports a default Context-Aware Access policy for SAML apps, reducing admin overhead and improving security for SaaS. Cisco patches another actively exploited SD-WAN zero-day (CVE-2026-20182) 1d ago A Cisco Catalyst SD-WAN Controller authentication bypass vulnerability (CVE-2026-20182) has been exploited in zero-day attacks. Akamai to acquire LayerX for $205 million 1d ago Akamai acquires LayerX for $205 million to strengthen browser-based AI security and zero trust protection. Thieves unlock stolen iPhones using cheap tools sold on Telegram 1d ago Telegram groups are selling phishing kits, smishing templates, and unlocking tools used to access stolen iPhones. Unpatched Microsoft Exchange Server vulnerability exploited (CVE-2026-42897) 1d ago A critical XSS vulnerability (CVE-2026-42897) in Microsoft Exchange Server is being exploited by attackers, Microsoft warned on Thursday. Rocky Linux launches opt-in security repository for urgent fixes 1d ago The Rocky Linux security repository ships urgent fixes ahead of upstream when public exploits exist before patches are available. Keycard helps developers secure autonomous AI agents with scoped access 1d ago Keycard for Multi-Agent Apps secures autonomous AI agents with scoped access, delegated sessions, and attribution. Deepfake detection is losing ground to generative models 1d ago Deepfake detection has been built around a single question for close to a decade. Given a video or audio clip, is it real or synthetic? Commercial Zombie linkages are keeping expired domains trusted for years 1d ago Expired domains can create security risks by leaving HTTPS certificates, Maven namespaces, and ENS records active. The AI oversight paradox: Is the investment worth the cost of watching it? 1d ago The impact of AI on the business grows in 2026 as companies increase oversight and compete for specialized talent.
AL
Alerts
1d ago · 20 items
20 loaded
AC
All CISA Advisories
1d ago · 20 items
20 loaded
WE
WeLiveSecurity
1d ago · 20 items
20 loaded
Instrumenting QT6 desktop apps with Frida - Part 1 1d ago From Vercel Typosquatting to an Obfuscated macOS Malware Loader 1d ago Detecting Exploitation of CrushFTP Vulnerability (CVE-2025-31161) With PacketSmith Yara Detection Module - Using track_state and flow_state 2d ago VELVET CHOLLIMA Infostealer Campaign Using Trading App as Lure 2d ago CVE-2026-42945 : NGINX Heap Buffer Overflow in rewrite module - Writeup and PoC 2d ago WaSteal: 126 Chrome extensions, 148K installs, one Brazilian operator silently sending WhatsApp user data and ad cookies to its servers 3d ago /sbin/ping -G sweepmax has no bounds check on macOS: deterministic BSS out-of-bounds write, confirmed by Apple 3d ago A stealth approach to Process Injection - EntryPoint Hijacking 3d ago Dead.Letter (CVE-2026-45185) How XBOW found an unauthenticated RCE on Exim 4d ago Curl lead developer Daniel Stenberg provides insightful feedbacks from Mythos analysis results 4d ago
20 loaded
RF
Recorded Future
2d ago · 20 items
April 2026 CVE Landscape 2d ago In April 2026, Insikt Group® identified 37 high-impact vulnerabilities that should be prioritized for remediation, 35 of which had a Very Critical Recorded Future Risk Score. This represents a 19% increase from last month. NIST NVD Enrichment Policy Change: Prioritizing Vulnerabilities with Attacker Behavior Signals 3d ago NVD enrichment now covers only 15–20% of CVEs. Learn how Recorded Future Vulnerability Intelligence prioritizes risk using real attacker behavior signals. Beyond Acceleration and Automation: How AI + Intelligence Changes Cyber Defense 3d ago The real question in modern cyber defense isn't who has more technology. It's who uses their resources more efficiently. Here's how AI fused with threat intelligence tips that balance. Working in London at the World’s Largest Intelligence Company 9d ago See what it is like to work at the Recorded Future London office. Quantum Risk Explained 10d ago Learn how the "Harvest Now, Decrypt Later" (HNDL) risk exposes long-lived sensitive data today, regardless of when Cryptographically Relevant Quantum Computers (CRQCs) arrive. Recorded Future Named a Leader in the 2026 Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies. And there’s more. 11d ago Recorded Future shares exciting developments since being named a leader. Threat Activity Enablers: The Backbone of Today’s Threat Landscape 11d ago Behind every ransomware demand, botnet, or threat activity group is a server sitting in a data center. Hacking Embodied AI 12d ago Embodied AI, intelligent systems in physical forms such as humanoid and quadruped robots, is moving from spectacle to staffing plans. The Iran War: What You Need to Know 16d ago Insikt Group tracks the cyber, physical, and geopolitical components of the US-Israeli strikes on Iran — with continuously updated threat analysis and scenarios. Risk Scenarios for the US’s Strategic Pivot 17d ago The United States (US) is shifting toward a more force-driven security strategy primarily relying on military operations and economic pressure to counter transnational criminal organizations and limit Chinese, Russian, and Iranian influence...
20 loaded
SA
Security - Ars Technica
2d ago · 20 items
Zero-day exploit completely defeats default Windows 11 BitLocker protections 2d ago Linux bitten by second severe vulnerability in as many weeks 5d ago Chaos erupts as cyberattack disrupts learning platform Canvas amid finals 8d ago Mozilla says 271 vulnerabilities found by Mythos have "almost no false positives" 9d ago Widely used Daemon Tools disk app backdoored in monthlong supply-chain attack 11d ago Ubuntu infrastructure has been down for more than a day 15d ago GPT-5.5 matches heavily hyped Mythos Preview in new cybersecurity tests 15d ago The most severe Linux threat to surface in years catches the world flat-footed 16d ago Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden 17d ago Open source package with 1 million monthly downloads stole user credentials 19d ago
20 loaded
MS
Microsoft Security Blog
2d ago · 10 items
Defense in depth for autonomous AI agents 2d ago As AI agents gain autonomy, defense in depth must evolve, with application-layer design, identity, and human oversight at the center. Kazuar: Anatomy of a nation-state botnet 2d ago Kazuar, a sophisticated malware family attributed to the Russian state actor Secret Blizzard, has been under constant development for years and continues to evolve in support of espionage-focused operations. Over time, Kazuar has expanded f... When configuration becomes a vulnerability: Exploitable misconfigurations in AI apps 2d ago Exposed UIs, weak authentication, and risky defaults could turn cloud-native AI apps on Kubernetes into potential targets by threat actors. Learn how exploitable misconfigurations lead to RCE and data leaks. Accelerating detection engineering using AI-assisted synthetic attack logs generation 4d ago What if you could generate realistic attack telemetry on demand? Explore research methods that translate attacker behaviors (TTPs) into synthetic logs that can trigger detections at scale and without sensitive data. Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark 4d ago Today Microsoft is announcing a major step forward in AI-powered cyber defense: a new multi-model agentic scanning harness (codenamed MDASH). Defending consumer web properties against modern DDoS attacks 4d ago Learn how to protect consumer websites and defend against modern DDoS attacks with layered security, resilient architecture, and graceful service degradation. Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise 4d ago Microsoft Incident Response investigated an attack operated through legitimate and trusted administrative mechanisms to blend seamlessly into routine operations and remain undetected demonstrating that intrusions have increasingly avoided u... Active attack: Dirty Frag Linux vulnerability expands post-compromise risk 8d ago Dirty Frag is a newly disclosed Linux local privilege escalation vulnerability affecting kernel networking and memory-fragment handling components including esp4, esp6, and rxrpc. The vulnerability enables reliable escalation from an unpriv... When prompts become shells: RCE vulnerabilities in AI agent frameworks 9d ago New research exposes how prompt injection in AI agent frameworks can lead to remote code execution. Learn how these vulnerabilities work, what’s impacted, and how to secure your agents. World Passkey Day: Advancing passwordless authentication 9d ago This World Passkey Day, read how Microsoft is advancing passkey adoption to replace passwords, cut phishing risk, and deliver simpler, more secure sign-ins.
CS
Cisco Security Advisory
2d ago · 20 items
Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability 2d ago May 2026: This security advisory provides the details and fix information for a vulnerability that was discovered and fixed after the Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability was disclosed in February 2026. This ... Cisco Catalyst SD-WAN Manager Vulnerabilities 2d ago Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow a remote attacker to gain access to sensitive information, elevate privileges, or gain unauthorized access to the application. For more informat... Cisco Crosswork Network Controller and Cisco Network Services Orchestrator Advisory 2d ago Following the initial publication of the Security Advisory about a denial of service (DoS) condition in Cisco Crosswork Network Controller and Cisco Network Services Orchestrator (NSO), additional information has been made available to the ... Cisco Unity Connection Remote Code Execution and Server-Side Request Forgery Vulnerabilities 10d ago Multiple vulnerabilities in Cisco Unity Connection could allow a remote attacker to execute arbitrary code on or conduct server-side request forgery (SSRF) attacks through an affected device. For more information about these vulnerabilities... Cisco Enterprise Chat and Email Lite Agent File Upload Vulnerability 10d ago A vulnerability in the Lite Agent feature of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct browser-based attacks. To exploit this vulnerability, the attacker must have valid credentials for a... Cisco Identity Services Engine Authentication Bypass Vulnerabilities 10d ago Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow a remote attacker to bypass authorization mechanisms or examine error messages to gain access to sensitive information on an affected device. For more information ... Cisco Prime Infrastructure Information Disclosure Vulnerability 10d ago A vulnerability in the log file download functionality of Cisco Prime Infrastructure could allow an authenticated, remote attacker to download arbitrary log files from the server. This vulnerability is due to insufficient authorization chec... Cisco Slido Insecure Direct Object Reference Vulnerability 10d ago A vulnerability in the REST API of Cisco Slido could have allowed an authenticated, remote attacker to access the social profile data of other users or affect quiz and poll results. Cisco has addressed this vulnerability in Cisco Slido and ... Cisco IoT Field Network Director Vulnerabilities 10d ago Multiple vulnerabilities in the web-based management interface of Cisco IoT Field Network Director Software could allow an authenticated, remote attacker to access files, execute commands, and cause denial of service (DoS) conditions on man... Cisco SG350 and SG350X Series Managed Switches SNMP Denial of Service Vulnerability 10d ago A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco 350 Series Managed Switches (SG350) and Cisco 350X Series Stackable Managed Switches (SG350X) firmware could allow an authenticated, remote attacker to caus...
20 loaded
BF
Blog – Forter
2d ago · 10 items
HA
Hak5
2d ago · 15 items
15 loaded
SE
Securelist
2d ago · 10 items
Kimsuky targets organizations with PebbleDash-based tools 2d ago Kaspersky researchers analyze a range of new PebbleDash-based tools used in recent Kimsuky campaigns and reveal their connection to the AppleSeed malware cluster. State of ransomware in 2026 4d ago Kaspersky researchers are sharing insights into the main ransomware trends for 2026: EDR killers on the rise, switching from data encryption to data leaks, and more. CVE-2025-68670: discovering an RCE vulnerability in xrdp 8d ago During a security assessment of Kaspersky USB Redirector, we discovered CVE-2025-68670: a pre-auth RCE in the xrdp server component. Project maintainers promptly patched the vulnerability. Exploits and vulnerabilities in Q1 2026 9d ago This report provides statistical data on published vulnerabilities and exploits we researched during Q1 2026. It also includes summary data on the use of C2 frameworks in APT attacks. OceanLotus suspected of using PyPI to deliver ZiChatBot malware 10d ago Kaspersky researchers uncovered malicious wheel packages in PyPI that targeted both Windows and Linux and contained a dropper delivering malware dubbed ZiChatBot. We attribute this activity to OceanLotus APT. Websites with an undefined trust level: avoiding the trap 10d ago We explain what suspicious websites are and how to distinguish a safe site from a fraudulent one. A new category in Kaspersky solutions: we’re sharing global statistics on untrusted site detection. “Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security 12d ago Kaspersky expert breaks down a new phishing scheme that uses the Amazon SES cloud email service. Let’s look at some examples to see how you can tell a phishing email from a real one. Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India 16d ago The Silver Fox group is targeting companies in Russia and India by impersonating tax authorities to distribute ValleyRAT and the new ABCDoor backdoor. PhantomRPC: A new privilege escalation technique in Windows RPC 22d ago Kaspersky researcher discovered a vulnerability in RPC architecture that enables an attacker to create a fake RPC server and escalate their privileges. FakeWallet crypto stealer spreading through iOS apps in the App Store 26d ago In March 2026, we uncovered more than twenty phishing apps in the Apple App Store masquerading as popular crypto wallets.
TC
The Cyber Mentor
2d ago · 15 items
15 loaded
Analyzing TeamPCP’s Supply Chain Attacks: Checkmarx KICS and elementary-data in CI/CD Credential Theft 4d ago Vibe Hacking: Two AI-Augmented Campaigns Target Government and Financial Sectors in Latin America 6d ago Supporting the National Cyber Strategy: How TrendAI™ Helps 11d ago InstallFix and Claude Code: How Fake Install Pages Lead to Real Compromise 12d ago Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities 13d ago Inside Shadow-Earth-053: A China-Aligned Cyberespionage Campaign Against Government and Defense Sectors in Asia 17d ago Kuse Web App Abused to Host Phishing Document 18d ago Bad actors took advantage of the legitimate name and services of Kuse, a popular AI-based app designed for workplaces. The attackers exploited the users’ trust in Kuse to carry out a phishing attack. Void Dokkaebi Uses Fake Job Interview Lure to Spread Malware via Code Repositories 26d ago The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables 27d ago Identity Protection in the AI Era 34d ago Learn about a proactive, identity-first security approach that integrates visibility, threat detection and response, zero trust enforcement, AI protection, and threat intelligence into a unified model.
20 loaded
PN
Proofpoint News Feed
4d ago · 10 items
Proofpoint Launches Dedicated MSP Business Unit and Introduces 365 Total Protection for North America 4d ago New MSP Platform business unit, AI-powered all-in-one Microsoft 365 protection, and Marketplace partnership with Pax8 strengthen Proofpoint’s commitment to channel and small and mid-size The spy who logged me in. 7d ago ⁠Mark Kelly⁠, Staff Threat Researcher at ⁠Proofpoint⁠, is discussing their work on "I’d come running back to EU again: TA416 resumes European government espionage campaigns." China-linked threat group TA416 has resumed large-scale phishing ... Proofpoint Establishes Innovation Precedent for Source-Agnostic Modern Enterprise Investigations 10d ago Proofpoint Prism Investigator positioned as first fully autonomous Agentic AI solution to significantly streamline investigations for highly regulated and highly AI and the New Threat Landscape | Sumit Dhawan with NightDragon | RSAC 2026 11d ago The Most Powerful Women Of The Channel 2026: Power 100 12d ago The Power 100 is culled from the ranks of CRN’s 2026 Women of the Channel and spotlights the female executives at vendors and distributors whose insight and influence help drive channel success. AI Security Gaps Create New MSSP Opportunity: Proofpoint 16d ago Claude Mythos Fears Startle Japan's Financial Services Sector 17d ago AI-Era Threats Spread Beyond Email Into SaaS, Collaboration Apps, and AI Assistants 18d ago Proofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in Place 18d ago Inaugural global study finds more than half of organizations are not fully confident their AI security controls would detect compromised AI Clear market trend for software providers to help with AI: Proofpoint CEO 23d ago Sumit Dhawan, Proofpoint CEO, joins 'Closing Bell' to discuss ServiceNow's quarterly earnings results, if Anthropic's Mythos makes incumbent players more important and much more.
KO
Krebs on Security
4d ago · 10 items
Patch Tuesday, May 2026 Edition 4d ago Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer code. That reality is on full display this m... Canvas Breach Disrupts Schools & Colleges Nationwide 9d ago An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the servi... Anti-DDoS Firm Heaped Attacks on Brazilian ISPs 16d ago A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazi... ‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty 25d ago A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phish... Patch Tuesday, April 2026 Edition 32d ago Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dub... Russia Hacked Routers to Steal Microsoft Office Tokens 39d ago Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backe... Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab 41d ago An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gang... ‘CanisterWorm’ Springs Wiper Attack Targeting Iran 54d ago A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or ha... Feds Disrupt IoT Botnets Behind Huge DDoS Attacks 58d ago The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as ro... Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker 66d ago A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub out...
HS
Heimdal Security Blog
4d ago · 15 items
AI Will Absorb 99.98% of SOC Triage Within a Year, as 79% of IT teams brace for AI-driven workload shift 4d ago Morten Kjaersgaard expects fewer than 500 of three million monthly alerts to need a human analyst in the year ahead. The role is being rebuilt around cases that warrant judgement. Top 10 Cybersecurity Companies in Europe 11d ago Over the last 10-15 years, the cybersecurity scene has gotten increasingly complex, as organizations adopt new technology and hackers evolve more innovative ways to target them. At the same time, data protection and compliance have become m... Heimdal Expands AI Strategy with AI Wingman and Third-Party AI Containment 25d ago Heimdal today unveiled the next phase of its AI strategy, expanding AI Wingman with three new layers - Assist, Triage and SOC - alongside the introduction of Third-Party AI Containment. You Only Know What You’ve Got When Its Gone 50d ago Prepare for the expected. Rehearse an action plan in case of technology failure or cyberattacks. We all know they can happen. Nordic MSPs Can Now Access Heimdal’s Unified Security and Compliance Platform Through Elovade 59d ago Heimdal has appointed Elovade as its official distributor in the Nordic region. The move gives MSPs and resellers across Sweden, Norway, Denmark, Iceland, and Finland direct access to Heimdal's consolidated cybersecurity platform through a ... OpenClaw Incidents Show Why AI Adoption Pressure Puts Companies at Risk 72d ago The OpenClaw security failures show how hasty AI adoption can expose businesses and supply chains to major cyber risk. Heimdal Claims Industry First With a Cyber Essentials Control Mapping for PEDM to Help Organisations Prove Least Privilege 96d ago Heimdal is the first vendor to publish a dedicated Cyber Essentials control mapping for PEDM, setting out how privilege management supports Cyber Essentials requirements and what evidence can be produced to support assessment and assurance. Five Predictions for Cyber Security Trends in 2026 101d ago Morten Kjaersgaard, Heimdal’s Founder, and Adam Pilton, a former cybercrime investigator, predict five cyber security trends for 2026. Heimdal Achieves OPSWAT Gold Certification for Anti-Malware 121d ago Heimdal today announced that its Next-Gen Antivirus (NGAV) with Extended Threat Protection (XTP) has achieved OPSWAT Gold Certification for Anti-Malware, validating its compatibility and effectiveness within OPSWAT’s industry-leading Access... How to Avoid Holiday Shopping Scams (From a Former Cyber Detective) 156d ago Worried about holiday scams? Ex-cybercrime detective Adam Pilton breaks down the biggest threats and how to shop safely this festive season.
15 loaded
M3
Microsoft 365 Blog
5d ago · 10 items
New and improved: Agent governance, intelligent workflows, and connected app experiences 5d ago See what's new in Copilot Studio, April 2026: updates to workflows, more control over agent operations, and an expanded agent usage estimator. Copilot Cowork: From conversation to action across skills, integrations, and devices 11d ago Today, we’re announcing additional capabilities in Cowork to expand on what it can make possible for you. Microsoft 365 Copilot, human agency, and the opportunity for every organization 11d ago Empower your organization with Microsoft 365 Copilot—AI that bridges human potential and business outcomes for the future of work. Microsoft Agent 365, now generally available, expands capabilities and integrations 15d ago ​We’re announcing the general availability of Agent 365, plus previews of new capabilities to discover and manage shadow AI agents. Learn more. Copilot’s agentic capabilities in Word, Excel, and PowerPoint are generally available 24d ago Copilot's newest features are now generally available as the default experience across all Microsoft 365 subscriptions. Bring your everyday business apps into the flow of work with agents in Microsoft 365 Copilot 33d ago Discover how apps integrate with AI agents to power Copilot experiences, streamline workflows, and turn business context into action. New and improved: Multi-agent orchestration, connected experiences, and faster prompt iteration 45d ago Explore what's new in Copilot Studio: Multi-agent systems now generally available, plus updates to the Prompt Editor and governance controls. Copilot Cowork: Now available in Frontier 47d ago Today, Copilot Cowork—designed for long-running, multi-step work in Microsoft 365—is available via the Frontier program. Copilot Cowork: A new way of getting work done 68d ago Copilot Cowork turns intent into action across Microsoft 365—automating tasks, coordinating workflows, and keeping you in control. See how. Powering Frontier Transformation with Copilot and agents 68d ago Wave 3 of Microsoft 365 Copilot introduces Copilot Cowork, multi‑model intelligence, and enterprise‑ready AI—built to get real work done.
NA
NahamSec
5d ago · 15 items
15 loaded
NE
NetworkChuck
10d ago · 15 items
15 loaded
TL
The Last Watchdog
11d ago · 10 items
News alert: LuxSci launches HIPAA-compliant email platform for mid-size healthcare market 11d ago CAMBRIDGE, Mass., May 5, 2026, CyberNewswireŌĆöLuxSci, a leading provider of HIPAA compliant secure healthcare communications, today announced the launch of LuxSci Secure High Volume Email for mid-sized healthcare organizations, the industr... SHARED INTEL Q&A: PKI’s unfinished business—’digital passports’ for content, models and agents 16d ago As if keeping track of machine identities wasnŌĆÖt hard enough. AI agents are now arriving by the thousands ŌĆö and most enterprises are just handing them borrowed credentials and hoping for the best. Meanwhile, the cryptographic infrastruc... GUEST ESSAY: How augmented reality (AR) can turn building images into ad space with no control 18d ago Every major building in America has three things: a physical address, a legal owner, and an unmonitored attack surface. Related: Sam Altman's quest to usurp the browswer That surface extends from the ground up through every floor, every fac... FIRESIDE CHAT: Leaked secrets are now the go-to attack vector — and AI is accelerating exposures 19d ago A consequential shift is underway in how enterprise breaches begin. The leaked credential ‚Äî once treated as a hygiene problem ‚Äî has become the primary on-ramp. Related: No easy fixes for AI risk Last August‚Äôs Salesloft campaign was th... News alert: BreachLock’s integrated attack validation platform debuts in Gartner AEV category 24d ago NEW YORK, Apr. 21, 2026, CyberNewswire—BreachLock, a global leader in offensive security, today announced it has been named a representative vendor in the 2026 Gartner Market Guide for Adversarial Exposure Validation. This recognition mar... Fireside Chat: PKI has carried digital trust through every tech advance—now comes the hardest one 26d ago Public key infrastructure -- the authentication and encryption framework that has held digital commerce together through every chaotic leap forward in technology -- is facing a double whammy. Related: Achieveing AI security won't be easy Au... News Alert: NTT Research launches SaltGrain—advanced Attribute-Based Encryption security 31d ago SUNNYVALE, Calif., Apr. 15, 2026 ŌĆō NTT Research, Inc., a division of NTT (TYO:9432), today announced the launch of Scale Academy, a startup incubator responsible for bringing to market products and services based upon technologies studied... GUEST ESSAY: Google’s 2029 deadline exposes readiness gap as move to quantum-safe crypto lags 32d ago For years, quantum risk was easy for most institutions to treat as premature: real in theory, urgent someday, but not yet an operational problem. That is no longer tenable. Related: AI spawns semantic attacks Two developments this month bro... News alert: Mallory launches AI-native platform to cut through alert noise and surface real risk 36d ago AUSTIN, Texas, Apr. 9, 2026, CyberNewswire—Mallory is launching a AI-native threat intelligence platform, purpose-built to answer the questions CISOs and their teams are asking every day: •What are the real threat vectors for our organi... FIRESIDE CHAT: Geopolitical turmoil, rising AI risk add a new layer to enterprise cyber defense 39d ago As if securing the enterprise against a tidal wave of AI tools wasn't hard enough, it turns out the geopolitical instability of the moment is making things worse. That wasn't the headline at RSAC 2026 last week -- agentic AI dominated the a...
DA
darkreading
11d ago · 25 items
How the Story of a USB Penetration Test Went Viral 11d ago RMM Tools Fuel Stealthy Phishing Campaign 12d ago Exploit Cyber-Frenzy Threatens Millions via Critical cPanel Vulnerability 12d ago Silver Fox Springs Tax-Themed Attacks on Orgs in India, Russia 12d ago How Dark Reading Lifted Off the Launchpad in 2006 12d ago 76% of All Crypto Stolen in 2026 Is Now in North Korea 15d ago If AI's So Smart, Why Does It Keep Deleting Production Databases? 15d ago Name That Toon: Mark of (Security) Progress 15d ago 20 Years in Cyber: Dark Reading Marks Milestone With Month of Special Coverage 15d ago TeamPCP Hits SAP Packages With 'Mini Shai-Hulud' Attack 16d ago
25 loaded
WE
WeLiveSecurity
11d ago · 20 items
20 loaded
Azure IaaS: Defense in depth built on secure-by-design principles 12d ago Explore how Azure IaaS uses defense in depth and secure-by-design principles to deliver layered, scalable cloud security across compute, network, and data. Enforcing trust and transparency: Open-sourcing the Azure Integrated HSM 16d ago Learn how Microsoft Azure Integrated HSM delivers hardware‑enforced key protection in the cloud, combining FIPS Level 3 assurances with transparency and open‑source collaboration. Azure IaaS: Keep critical applications running with built-in resiliency at scale 45d ago Learn how Azure IaaS helps organizations start from a resilient platform foundation with availability, continuity, and recovery capabilities. Azure IaaS: Explore new resources for building a stronger, more efficient infrastructure 73d ago Learn how Azure IaaS helps you modernize infrastructure, improve performance and resilience, optimize costs, and prepare for AI workloads. Read more. Azure reliability, resiliency, and recoverability: Build continuity by design 88d ago Learn how Azure reliability, resiliency, and recovery capabilities work together to improve cloud continuity. Read more. Microsoft strengthens sovereign cloud capabilities with new services 192d ago Discover new Microsoft digital sovereignty capabilities and upcoming features across AI, security, and productivity, to address sovereign cloud needs. Enhancing software supply chain security with Microsoft’s Signing Transparency 194d ago Microsoft Signing Transparency delivers verifiable code integrity and tamper-evident software releases for stronger supply chain security. Oracle Database@Azure offers new features, regions, and programs to unlock data and AI innovation 214d ago Migrate Oracle solutions to the cloud with a trusted, enterprise-ready platform from Microsoft and Oracle. Learn more. Building secure, scalable AI in the cloud with Microsoft Azure 319d ago Forrester Research shows how Azure helps enterprises scale generative AI securely, unlocking real business value. Learn more. Enhance AI security with Azure Prompt Shields and Azure AI Content Safety 345d ago Learn how Prompt Shields and Azure AI Content Safety can help guard against direct and indirect threats to your LLM-based solution.
DE
DEFCONConference
18d ago · 15 items
15 loaded
CC
CISA Cybersecurity Advisories
25d ago · 10 items
Defending Against China-Nexus Covert Networks of Compromised Devices 25d ago Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure 40d ago U.S. organizations should review the TTPs and IOCs in this advisory for indications of current or historical activity on their networks, and apply the Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure 162d ago The authoring organizations encourage critical infrastructure organizations to implement the recommendations in this advisory to reduce the likelihood and CISA Shares Lessons Learned from an Incident Response Engagement 236d ago Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System 264d ago The authoring agencies strongly urge network defenders to hunt for malicious activity and to apply the mitigations in this CSA to reduce the threat of Chinese CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization 291d ago #StopRansomware: Interlock 299d ago Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider 338d ago CISA urges software vendors, downstream customers, and end users to immediately implement the Mitigations listed in this advisory based on confirmed compromise Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations 361d ago Russian GRU Targeting Western Logistics Entities and Technology Companies 369d ago Executives and network defenders should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and IOCs
13 loaded
LI
LiveOverflow
73d ago · 15 items
15 loaded
SK
STÖK
265d ago · 15 items
15 loaded
HA
HackerSploit
402d ago · 15 items
15 loaded
TH
Threatpost
1354d ago · 10 items
Student Loan Breach Exposes 2.5M Records 1354d ago 2.5 million people were affected, in a breach that could spell more trouble down the line. Watering Hole Attacks Push ScanBox Keylogger 1355d ago Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool. Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms 1356d ago Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system. Ransomware Attacks are on the Rise 1359d ago Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group. Cybercriminals Are Selling Access to Chinese Surveillance Cameras 1360d ago Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed. Twitter Whistleblower Complaint: The TL;DR Version 1361d ago Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk. Firewall Bug Under Active Attack Triggers CISA Warning 1362d ago CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP. Fake Reservation Links Prey on Weary Travelers 1363d ago Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels. iPhone Users Urged to Update to Patch 2 Zero-Days 1366d ago Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack. Google Patches Chrome’s Fifth Zero-Day of the Year 1367d ago An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.

No matching sources found.