Loading…

Whats The Hax?

Daily intelligence on threats, breaches, and defenders

Latest
Latest newsGoogle I/O 2026 live blog: Updates on Android, Gemini AI, XR, and more we expectcybersecurityFrontend SWE (3-4 YOE) looking to pivot to AppSec. Where should I start?Technical Information Security Content & DiscussionNew Age of Collisions: Reading Arbitrary Files Pre-Auth as root in cPanel (CVE-2026-29205)cybersecurity‘The Worst Leak That I’ve Witnessed’: U.S. Cybersecurity Agency Leaves Its Digital Keys Out in Public on GitHub — GizmodocybersecurityCEH/CPENT vs OSCP vs GPENcybersecurityntroducing Yokai Linux — A Cyberpunk Security-Focused Linux Distro”Latest news6 cable, cords, and adapters that are still surprisingly useful - and I never throw awaycybersecurityCISA Contractor Admin Leaked AWS GovCloud Keys on Githubhacking: security in practiceMade a shell greeter that generates a unique rocket every time you open a terminal tabcybersecurityStuck choosing a cybersecurity specialization — especially with a local market context (Senegal). Need honest advice.Latest newsMicrosoft surprises with its first server Linux distribution: Azure Linux 4.0hacking: security in practiceJust received an email from shinyhackers about their amtrack hackMicrosoft Security BlogHow Storm-2949 turned a compromised identity into a cloud-wide breachhacking: security in practiceFlipper Zero (or Alternatives)?BleepingComputerINTERPOL ‘Operation Ramz’ seizes 53 malware, phishing servershacking: security in practiceOptoma CinemaX Projectors: Critical Vulnerabilities Including Remote Root AccessBleepingComputerSHub macOS infostealer variant spoofs Apple security updatescybersecurityFellow Tier 1 SOC/Security Analysts - What does your day to day look like?Technical Information Security Content & DiscussionThe quiet death of behavioral anti-bot and the pivot to hardware ZKPsThe Record from Recorded Future NewsMore than 200 arrested in cyber raids aimed at Middle East scam networksLatest newsGoogle I/O 2026 live blog: Updates on Android, Gemini AI, XR, and more we expectcybersecurityFrontend SWE (3-4 YOE) looking to pivot to AppSec. Where should I start?Technical Information Security Content & DiscussionNew Age of Collisions: Reading Arbitrary Files Pre-Auth as root in cPanel (CVE-2026-29205)cybersecurity‘The Worst Leak That I’ve Witnessed’: U.S. Cybersecurity Agency Leaves Its Digital Keys Out in Public on GitHub — GizmodocybersecurityCEH/CPENT vs OSCP vs GPENcybersecurityntroducing Yokai Linux — A Cyberpunk Security-Focused Linux Distro”Latest news6 cable, cords, and adapters that are still surprisingly useful - and I never throw awaycybersecurityCISA Contractor Admin Leaked AWS GovCloud Keys on Githubhacking: security in practiceMade a shell greeter that generates a unique rocket every time you open a terminal tabcybersecurityStuck choosing a cybersecurity specialization — especially with a local market context (Senegal). Need honest advice.Latest newsMicrosoft surprises with its first server Linux distribution: Azure Linux 4.0hacking: security in practiceJust received an email from shinyhackers about their amtrack hackMicrosoft Security BlogHow Storm-2949 turned a compromised identity into a cloud-wide breachhacking: security in practiceFlipper Zero (or Alternatives)?BleepingComputerINTERPOL ‘Operation Ramz’ seizes 53 malware, phishing servershacking: security in practiceOptoma CinemaX Projectors: Critical Vulnerabilities Including Remote Root AccessBleepingComputerSHub macOS infostealer variant spoofs Apple security updatescybersecurityFellow Tier 1 SOC/Security Analysts - What does your day to day look like?Technical Information Security Content & DiscussionThe quiet death of behavioral anti-bot and the pivot to hardware ZKPsThe Record from Recorded Future NewsMore than 200 arrested in cyber raids aimed at Middle East scam networks

By Source

Feeds organized so you can skim by site.

Density Sort
LN
Latest news
1h ago · 20 items
Google I/O 2026 live blog: Updates on Android, Gemini AI, XR, and more we expect 1h ago We're reporting live from Mountain View at Google's annual developer conference. Stay tuned for the latest updates. 6 cable, cords, and adapters that are still surprisingly useful - and I never throw away 2h ago Don't let your spring cleaning or desire for Feng Shui enlightenment make you toss the important stuff. This gear will come in handy one day. Microsoft surprises with its first server Linux distribution: Azure Linux 4.0 4h ago You'll be able to run this Linux distro on both Azure and your desktop using Windows Subsystem for Linux. Here's what we know about it so far. Cloud attacks are getting faster and deadlier - 4 ways to secure your business 6h ago Google's latest threat report warns that third-party tools are now prime targets for attackers - and businesses have only days to prepare defenses. 5 ways to fortify your network against the new speed of AI attacks 6h ago As attackers get more sophisticated and persistent, IT workers have to step up their game as well. Here's how to do that in 2026. How to upgrade your 'incompatible' Windows 10 PC to Windows 11 - for free 7h ago Microsoft really doesn't want customers to upgrade older PCs to Windows 11, but there are workarounds for all but the oldest devices. Extended security updates for Windows 10 will stop in just a few months, so it's time to plan your exit st... I found the best early Memorial Day Walmart deals: Apple, Dyson, and more on sale 8h ago Memorial Day is almost here, and Walmart has already slashed prices on top tech. Why Wave is my new go-to terminal app - how I use this powerful tool 8h ago The Linux, MacOS, and Windows terminal is no longer just for commands. Thanks to apps like Wave, you can have a veritable toolbox at your disposal in a single window. I asked Codex AI to customize my Hyprland desktop - it worked, but beginners beware 10h ago Hyrpland is a fantastic Linux window manager, but it can be complicated to configure. I asked Codex to write a .conf file - here's how that went. Microsoft is finally bringing the movable taskbar to Windows 11 - here's who can try it now 11h ago Thanks to an update rolling out to Windows 11 insiders, you'll be able to move the taskbar to the top, bottom, left, or right. Start menu changes are coming soon, too.
20 loaded
CY
cybersecurity
1h ago · 20 items
Frontend SWE (3-4 YOE) looking to pivot to AppSec. Where should I start? 1h ago ‘The Worst Leak That I’ve Witnessed’: U.S. Cybersecurity Agency Leaves Its Digital Keys Out in Public on GitHub — Gizmodo 1h ago CEH/CPENT vs OSCP vs GPEN 1h ago ntroducing Yokai Linux — A Cyberpunk Security-Focused Linux Distro” 1h ago CISA Contractor Admin Leaked AWS GovCloud Keys on Github 2h ago Stuck choosing a cybersecurity specialization — especially with a local market context (Senegal). Need honest advice. 3h ago Fellow Tier 1 SOC/Security Analysts - What does your day to day look like? 6h ago How do you threat hunt for RMM tools in environments where RMM is all over the place? 7h ago Microsoft - "your single use code" email when it was not requested by yourself 8h ago Mini Shai-Hulud Strikes Again: TanStack + more npm Packages Compromised 8h ago
20 loaded
New Age of Collisions: Reading Arbitrary Files Pre-Auth as root in cPanel (CVE-2026-29205) 1h ago The quiet death of behavioral anti-bot and the pivot to hardware ZKPs 6h ago AudioHijack: adversarial audio attacks on generative voice models transfer from open weights to Microsoft and Mistral production systems 8h ago ShinyHunters Stole 275 Million Student Records. The Ransom Deadline Is May 12. 9h ago The down fall of bug bounties 14h ago TanStack Supply Chain Attack (And How to Lock Down GitHub Actions) 15h ago Ansible security and compliance guide 1d ago Instrumenting QT6 desktop apps with Frida - Part 1 3d ago From Vercel Typosquatting to an Obfuscated macOS Malware Loader 3d ago Detecting Exploitation of CrushFTP Vulnerability (CVE-2025-31161) With PacketSmith Yara Detection Module - Using track_state and flow_state 4d ago
20 loaded
HS
hacking: security in practice
2h ago · 20 items
20 loaded
MS
Microsoft Security Blog
4h ago · 10 items
How Storm-2949 turned a compromised identity into a cloud-wide breach 4h ago Storm-2949 turned stolen credentials into a cloud-wide breach, moving from identity compromise to large-scale data theft without using malware. This incident shows how threat actors can exploit trusted systems to operate undetected. How to better protect your growing business in an AI-powered world 11h ago Read how built-in security helps keep small and medium businesses running, protect customer trust, and support growth in a new Microsoft whitepaper. Defense in depth for autonomous AI agents 4d ago As AI agents gain autonomy, defense in depth must evolve, with application-layer design, identity, and human oversight at the center. Kazuar: Anatomy of a nation-state botnet 4d ago Kazuar, a sophisticated malware family attributed to the Russian state actor Secret Blizzard, has been under constant development for years and continues to evolve in support of espionage-focused operations. Over time, Kazuar has expanded f... When configuration becomes a vulnerability: Exploitable misconfigurations in AI apps 4d ago Exposed UIs, weak authentication, and risky defaults could turn cloud-native AI apps on Kubernetes into potential targets by threat actors. Learn how exploitable misconfigurations lead to RCE and data leaks. Accelerating detection engineering using AI-assisted synthetic attack logs generation 6d ago What if you could generate realistic attack telemetry on demand? Explore research methods that translate attacker behaviors (TTPs) into synthetic logs that can trigger detections at scale and without sensitive data. Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark 6d ago Today Microsoft is announcing a major step forward in AI-powered cyber defense: a new multi-model agentic scanning harness (codenamed MDASH). Defending consumer web properties against modern DDoS attacks 6d ago Learn how to protect consumer websites and defend against modern DDoS attacks with layered security, resilient architecture, and graceful service degradation. Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise 6d ago Microsoft Incident Response investigated an attack operated through legitimate and trusted administrative mechanisms to blend seamlessly into routine operations and remain undetected demonstrating that intrusions have increasingly avoided u... Active attack: Dirty Frag Linux vulnerability expands post-compromise risk 10d ago Dirty Frag is a newly disclosed Linux local privilege escalation vulnerability affecting kernel networking and memory-fragment handling components including esp4, esp6, and rxrpc. The vulnerability enables reliable escalation from an unpriv...
BL
BleepingComputer
4h ago · 15 items
INTERPOL ‘Operation Ramz’ seizes 53 malware, phishing servers 4h ago More than 200 individuals were arrested for cybercrime activities during INTERPOL's Operation Ramz, which focused on the Middle East and North Africa. SHub macOS infostealer variant spoofs Apple security updates 5h ago A new variant of the 'SHub' macOS infostealer uses AppleScript to show a fake security update message and installs a backdoor. 5 Steps to Managing Shadow AI Tools Without Slowing Down Employees 8h ago Many employees already use shadow AI tools at work without security review. Adaptive Security breaks down how teams can build practical AI governance without adding friction for employees. Leaked Shai-Hulud malware fuels new npm infostealer campaign 9h ago The Shai-Hulud malware leaked last week is now used in new attacks on the Node Package Manager (npm) index, as infected packages emerged over the weekend. Grafana says stolen GitHub token let hackers steal codebase 13h ago Grafana Labs disclosed that hackers have downloaded its source code after breaching its GitHub environment using a stolen access token. Microsoft testing adjustable taskbar, Start menu in Windows 11 15h ago Microsoft has finally brought back the resizable taskbar and Start menu to Windows 11 in the latest preview version rolling out to Insiders in the Experimental channel. Microsoft confirms Windows 11 security update install issues 18h ago Microsoft has confirmed that the May 2026 Windows 11 security update (KB5089549) fails to install on some systems and triggers 0x800f0922 errors. Exploit available for new DirtyDecrypt Linux root escalation flaw 19h ago A recently patched local privilege escalation vulnerability in the Linux kernel's rxgk module now has a proof-of-concept exploit that allows attackers to gain root access on some Linux systems. Hackers earn $1,298,250 for 47 zero-days at Pwn2Own Berlin 2026 21h ago The Pwn2Own Berlin 2026 hacking contest has concluded, with security researchers collecting $1,298,250 in rewards after exploiting 47 zero-day flaws. New Windows 'MiniPlasma' zero-day exploit gives SYSTEM access, PoC released 1d ago A cybersecurity researcher has released a proof-of-concept exploit for a Windows privilege escalation zero-day dubbed
15 loaded
SHub Reaper | macOS Stealer Spoofs Apple, Google, and Microsoft in a Single Attack Chain 6h ago Rekomendacja Pełnomocnika Rządu ds. Cyberbezpieczeństwa dotycząca komunikatora Signal - Recommendation of the Government Plenipotentiary for Cybersecurity regarding the Signal messenger 10h ago Exclusive: Hackers have breached tank readers at US gas stations; officials suspect Iran is responsible | CNN Politics 10h ago CrystalX: unpacking a Go RAT through three encrypted layers 11h ago DirtyCBC: When Linux Kernel Decrypt-Before-MAC Turns Authenticated Encryption Into a Page-Cache Write 1d ago FlowerStorm unleashes the KrakVM: PhaaS operators turn to VM-based obfuscation 1d ago LID: LID — Linux Integrity Drift: Bypassing AppArmor via eBPF pathname rewriting. Pre-LSM syscall argument manipulation with zero audit footprint. "Linux is Dying" 1d ago Static Kitten APT Adversary Simulation 1d ago Eimeria: five layers from RAR5 to RunPE 1d ago ghosttype: Local forensic scanner that extracts credentials from AI tool conversation history. For authorized red team and DLP use only. 1d ago
20 loaded
KO
Krebs on Security
6h ago · 10 items
CISA Admin Leaked AWS GovCloud Keys on Github 6h ago Until this past weekend, a contractor for the Cybersecurity & Infrastructure Security Agency (CISA) maintained a public GitHub repository that exposed credentials to several highly privileged AWS GovCloud accounts and a large number of inte... Patch Tuesday, May 2026 Edition 6d ago Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer code. That reality is on full display this m... Canvas Breach Disrupts Schools & Colleges Nationwide 11d ago An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the servi... Anti-DDoS Firm Heaped Attacks on Brazilian ISPs 18d ago A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazi... ‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty 27d ago A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phish... Patch Tuesday, April 2026 Edition 34d ago Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dub... Russia Hacked Routers to Steal Microsoft Office Tokens 41d ago Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backe... Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab 43d ago An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gang... ‘CanisterWorm’ Springs Wiper Attack Targeting Iran 56d ago A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or ha... Feds Disrupt IoT Botnets Behind Huge DDoS Attacks 60d ago The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as ro...
BH
Black Hat
7h ago · 23 items
Black Hat Stories | Yaara Shriki, Threat Researcher at Wiz 7h ago Connecting at Black Hat | Hear from the CEO & Founder of FuzzingLabs 1d ago SecTor 2025 | Threat Architecture, Attack Surfaces & Real-World Risk 3d ago Black Hat Stories Episode 3 |  Patrick Ventuzelo, CEO & Founder of FuzzingLabs 4d ago Bridging Research & Reality | Why Academics Attend Black Hat 6d ago Black Hat Stories | Patrick Ventuzelo, CEO and Founder of FuzzingLabs 6d ago Bridging Research & Reality | Why Academics Attend Black Hat 12d ago SecTor 2025 | Detecting Forbidden White Labeled and Counterfeit Devices 14d ago SecTor 2025 | Not-So-Secret Agents: Deploying AI to Optimize Security Operations 19d ago Why Black Hat is Essential for Academics | Black Hat Stories 20d ago
23 loaded
RE
Reverse Engineering
7h ago · 20 items
20 loaded
HN
Help Net Security
9h ago · 10 items
AI is drowning software maintainers in junk security reports 9h ago AI-assisted vulnerability research has exploded, unleashing a firehose of low-quality reports on overworked software maintainers. Game over for 74 suspected scammers after Dutch cops plastered their faces on billboards 9h ago The Dutch police’s Game Over?! campaign, which publicly displays images of suspected fraudsters, is proving successful. Attackers are exploiting critical NGINX vulnerability (CVE-2026-42945) 13h ago A critical NGINX vulnerability (CVE-2026-42945) that was disclosed last week is being exploited by attackers, according to VulnCheck. SmartBear expands ReadyAPI with AI-powered API testing capabilities 14h ago SmartBear adds ReadyAPI AI test generation to accelerate API testing and strengthen application integrity for teams. Attackers accessed, downloaded code from Grafana Labs’ GitHub 17h ago A threat actor has managed to access Grafana Labs' GitHub environment and download the company's codebase. 201 arrested in INTERPOL disruption of phishing and fraud networks 18h ago INTERPOL's Operation Ramz led to 201 arrests across the MENA region and disrupted phishing, malware, and cyber scams. The AI backdoor your security stack is not built to see 21h ago Enterprises deploying LLMs have spent the past two years building defenses around a reasonable assumption: malicious behavior leaves a trace in the input. Lyrie: Open-source autonomous pentesting agent 21h ago Lyrie is an open-source autonomous pentesting agent with 25 commands, and ATP, a cryptographic standard for AI agent identity. AI shrinks vulnerability exploitation window to hours 22h ago AI-driven trends in 2025 vulnerability data reveal faster exploitation, rising exposure, and shorter remediation windows. Product showcase: McAfee + ChatGPT integration turns doubt into a scam check 22h ago McAfee+ChatGPT scam detection helps users identify phishing messages, analyze threats, and verify suspicious content in real time.
TH
The Hacker News
9h ago · 20 items
INTERPOL Operation Ramz Disrupts MENA Cybercrime Networks with 201 Arrests 9h ago ⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More 13h ago How to Reduce Phishing Exposure Before It Turns into Business Disruption 14h ago Developer Workstations Are Now Part of the Software Supply Chain 15h ago Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flaws 16h ago MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems 18h ago Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware 18h ago Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulations 20h ago NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE 1d ago Grafana GitHub Token Breach Led to Codebase Download and Extortion Attempt 1d ago
20 loaded
MS
MSRC Security Update Guide
13h ago · 20 items
CVE-2026-32185 Microsoft Teams Spoofing Vulnerability 13h ago CVE-2026-42897 Microsoft Exchange Server Spoofing Vulnerability 13h ago CVE-2026-42822 Azure Local Disconnected Operations (ALDO) Elevation of Privilege Vulnerability 13h ago CVE-2026-32177 .NET Elevation of Privilege Vulnerability 13h ago CVE-2026-43308 btrfs: don't BUG() on unexpected delayed ref type in run_one_delayed_ref() 18h ago CVE-2026-8328 FTP PASV SSRF, ftpcp() does not use actual peer address, trusts server-supplied PASV host address 1d ago CVE-2026-8368 LWP::UserAgent versions before 6.83 for Perl leak Authorization and Proxy-Authorization headers on cross-origin redirects 1d ago CVE-2026-7210 The expat and elementtree parsers use insufficient entropy for XML hash-flooding protection 1d ago CVE-2026-44283 etcd: Read access via PrevKv in etcd transactions may bypass RBAC authorization checks 1d ago CVE-2026-46483 Vim: Command injection in tar#Vimuntar via missing shellescape {special} flag 1d ago
20 loaded
MA
Malware Analysis & Reports
13h ago · 20 items
20 loaded
SA
Security - Ars Technica
13h ago · 20 items
Bug bounty businesses bombarded with AI slop 13h ago Zero-day exploit completely defeats default Windows 11 BitLocker protections 4d ago Linux bitten by second severe vulnerability in as many weeks 7d ago Chaos erupts as cyberattack disrupts learning platform Canvas amid finals 10d ago Mozilla says 271 vulnerabilities found by Mythos have "almost no false positives" 11d ago Widely used Daemon Tools disk app backdoored in monthlong supply-chain attack 13d ago Ubuntu infrastructure has been down for more than a day 17d ago GPT-5.5 matches heavily hyped Mythos Preview in new cybersecurity tests 17d ago The most severe Linux threat to surface in years catches the world flat-footed 18d ago Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden 19d ago
20 loaded
JH
John Hammond
14h ago · 19 items
19 loaded
DA
darkreading
14h ago · 45 items
The Boring Stuff is Dangerous Now 14h ago Can Laws Stop Deepfakes? South Korea Aims to Find Out 1d ago Congress Puts Heat on Instructure After Canvas Outage 3d ago Cyber Pioneers Ponder Past as Prologue 3d ago Taiwan Bullet Train Hack Highlights Cybersecurity Gaps in Rail Systems 4d ago SecurityScorecard Snags Driftnet to Level Up Threat Intelligence 4d ago Maximum Severity Cisco SD-WAN Bug Exploited in the Wild 4d ago 'FrostyNeighbor' APT Carefully Targets Govt Orgs in Poland, Ukraine 4d ago AI Drives Cybersecurity Investments, Widening 'Valley of Death' 4d ago Foxconn Attack Highlights Manufacturing's Cyber Crisis 4d ago
45 loaded
SE
SecurityWeek
14h ago · 10 items
NA
NahamSec
14h ago · 21 items
21 loaded
SE
Securelist
15h ago · 10 items
IT threat evolution in Q1 2026. Mobile statistics 15h ago This report contains mobile threat statistics for Q1 2026, along with noteworthy discoveries and quarterly trends: new versions of SparkCat and Triada. IT threat evolution in Q1 2026. Non-mobile statistics 15h ago The report presents key trends and statistics on malware that targeted personal computers running Windows and macOS, as well as Internet of Things (IoT) devices, during Q1 2026. Kimsuky targets organizations with PebbleDash-based tools 4d ago Kaspersky researchers analyze a range of new PebbleDash-based tools used in recent Kimsuky campaigns and reveal their connection to the AppleSeed malware cluster. State of ransomware in 2026 6d ago Kaspersky researchers are sharing insights into the main ransomware trends for 2026: EDR killers on the rise, switching from data encryption to data leaks, and more. CVE-2025-68670: discovering an RCE vulnerability in xrdp 10d ago During a security assessment of Kaspersky USB Redirector, we discovered CVE-2025-68670: a pre-auth RCE in the xrdp server component. Project maintainers promptly patched the vulnerability. Exploits and vulnerabilities in Q1 2026 11d ago This report provides statistical data on published vulnerabilities and exploits we researched during Q1 2026. It also includes summary data on the use of C2 frameworks in APT attacks. OceanLotus suspected of using PyPI to deliver ZiChatBot malware 12d ago Kaspersky researchers uncovered malicious wheel packages in PyPI that targeted both Windows and Linux and contained a dropper delivering malware dubbed ZiChatBot. We attribute this activity to OceanLotus APT. Websites with an undefined trust level: avoiding the trap 12d ago We explain what suspicious websites are and how to distinguish a safe site from a fraudulent one. A new category in Kaspersky solutions: we’re sharing global statistics on untrusted site detection. “Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security 14d ago Kaspersky expert breaks down a new phishing scheme that uses the Amazon SES cloud email service. Let’s look at some examples to see how you can tell a phishing email from a real one. Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India 18d ago The Silver Fox group is targeting companies in Russia and India by impersonating tax authorities to distribute ValleyRAT and the new ABCDoor backdoor.
SL
Security Latest
17h ago · 20 items
20 loaded
Agentic Governance: Why It Matters Now 1d ago AI agents now act inside the trust boundary with real credentials, and agentic governance is what keeps them from quietly breaking things at machine speed. Analyzing TeamPCP’s Supply Chain Attacks: Checkmarx KICS and elementary-data in CI/CD Credential Theft 6d ago Vibe Hacking: Two AI-Augmented Campaigns Target Government and Financial Sectors in Latin America 8d ago Supporting the National Cyber Strategy: How TrendAI™ Helps 13d ago InstallFix and Claude Code: How Fake Install Pages Lead to Real Compromise 14d ago Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities 15d ago Inside Shadow-Earth-053: A China-Aligned Cyberespionage Campaign Against Government and Defense Sectors in Asia 19d ago Kuse Web App Abused to Host Phishing Document 20d ago Bad actors took advantage of the legitimate name and services of Kuse, a popular AI-based app designed for workplaces. The attackers exploited the users’ trust in Kuse to carry out a phishing attack. Void Dokkaebi Uses Fake Job Interview Lure to Spread Malware via Code Repositories 28d ago The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables 29d ago
20 loaded
DB
David Bombal
1d ago · 20 items
20 loaded
CD
Cyber Defense Magazine
1d ago · 35 items
Why Is Cybersecurity Now A Business Priority, Not Just An IT Function? 1d ago The Security Mistakes Being Repeated With Ai 2d ago The Hidden Risk For IT Subcontractors: When Insurance, Not Security, Costs You The Contract 3d ago Innovator Spotlight: Klever Compliance 4d ago Innovator Spotlight: Radware 4d ago Innovator Spotlight: JScrambler 4d ago Innovators Spotlight: OPSWAT 5d ago The Board Is Asking The Wrong Security Question 5d ago Synthetic Identity Fraud Requires An Equal Focus On Biometrics And Document Verification 6d ago Innovator Spotlight: Iru 7d ago
35 loaded
IP
IppSec
2d ago · 17 items
17 loaded
CY
CyberScoop
3d ago · 28 items
Colorado governor commutes prison sentence for election denier Tina Peters 3d ago Here’s how the FTC plans to enforce the Take It Down Act 3d ago Cisco zero-day under ongoing attack by persistent threat group 3d ago Pentagon cyber official calls advanced AI ‘revolutionary warfare’ 4d ago White House cyber official: identity security matters more than ever in the age of AI 4d ago Major tech manufacturer Foxconn confirms cyberattack hit North American factories 4d ago Researchers say AI just broke every benchmark for autonomous cyber capability 5d ago Closed briefing sets stage for House hearing on Anthropic’s Mythos and cyber risks 5d ago DOJ releases legal rationale for nationwide voter data collection 5d ago Weaponized AI: The new frontier of fraud and identity spoofing 5d ago
28 loaded
AL
Alerts
3d ago · 20 items
20 loaded
AC
All CISA Advisories
3d ago · 20 items
20 loaded
WE
WeLiveSecurity
3d ago · 20 items
20 loaded
RF
Recorded Future
4d ago · 20 items
April 2026 CVE Landscape 4d ago In April 2026, Insikt Group® identified 37 high-impact vulnerabilities that should be prioritized for remediation, 35 of which had a Very Critical Recorded Future Risk Score. This represents a 19% increase from last month. NIST NVD Enrichment Policy Change: Prioritizing Vulnerabilities with Attacker Behavior Signals 5d ago NVD enrichment now covers only 15–20% of CVEs. Learn how Recorded Future Vulnerability Intelligence prioritizes risk using real attacker behavior signals. Beyond Acceleration and Automation: How AI + Intelligence Changes Cyber Defense 5d ago The real question in modern cyber defense isn't who has more technology. It's who uses their resources more efficiently. Here's how AI fused with threat intelligence tips that balance. Working in London at the World’s Largest Intelligence Company 11d ago See what it is like to work at the Recorded Future London office. Quantum Risk Explained 12d ago Learn how the "Harvest Now, Decrypt Later" (HNDL) risk exposes long-lived sensitive data today, regardless of when Cryptographically Relevant Quantum Computers (CRQCs) arrive. Recorded Future Named a Leader in the 2026 Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies. And there’s more. 13d ago Recorded Future shares exciting developments since being named a leader. Threat Activity Enablers: The Backbone of Today’s Threat Landscape 13d ago Behind every ransomware demand, botnet, or threat activity group is a server sitting in a data center. Hacking Embodied AI 14d ago Embodied AI, intelligent systems in physical forms such as humanoid and quadruped robots, is moving from spectacle to staffing plans. The Iran War: What You Need to Know 18d ago Insikt Group tracks the cyber, physical, and geopolitical components of the US-Israeli strikes on Iran — with continuously updated threat analysis and scenarios. Risk Scenarios for the US’s Strategic Pivot 19d ago The United States (US) is shifting toward a more force-driven security strategy primarily relying on military operations and economic pressure to counter transnational criminal organizations and limit Chinese, Russian, and Iranian influence...
20 loaded
CS
Cisco Security Advisory
4d ago · 20 items
Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability 4d ago May 2026: This security advisory provides the details and fix information for a vulnerability that was discovered and fixed after the Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability was disclosed in February 2026. This ... Cisco Catalyst SD-WAN Manager Vulnerabilities 4d ago Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow a remote attacker to gain access to sensitive information, elevate privileges, or gain unauthorized access to the application. For more informat... Cisco Crosswork Network Controller and Cisco Network Services Orchestrator Advisory 4d ago Following the initial publication of the Security Advisory about a denial of service (DoS) condition in Cisco Crosswork Network Controller and Cisco Network Services Orchestrator (NSO), additional information has been made available to the ... Cisco Unity Connection Remote Code Execution and Server-Side Request Forgery Vulnerabilities 12d ago Multiple vulnerabilities in Cisco Unity Connection could allow a remote attacker to execute arbitrary code on or conduct server-side request forgery (SSRF) attacks through an affected device. For more information about these vulnerabilities... Cisco Enterprise Chat and Email Lite Agent File Upload Vulnerability 12d ago A vulnerability in the Lite Agent feature of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct browser-based attacks. To exploit this vulnerability, the attacker must have valid credentials for a... Cisco Identity Services Engine Authentication Bypass Vulnerabilities 12d ago Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow a remote attacker to bypass authorization mechanisms or examine error messages to gain access to sensitive information on an affected device. For more information ... Cisco Prime Infrastructure Information Disclosure Vulnerability 12d ago A vulnerability in the log file download functionality of Cisco Prime Infrastructure could allow an authenticated, remote attacker to download arbitrary log files from the server. This vulnerability is due to insufficient authorization chec... Cisco Slido Insecure Direct Object Reference Vulnerability 12d ago A vulnerability in the REST API of Cisco Slido could have allowed an authenticated, remote attacker to access the social profile data of other users or affect quiz and poll results. Cisco has addressed this vulnerability in Cisco Slido and ... Cisco IoT Field Network Director Vulnerabilities 12d ago Multiple vulnerabilities in the web-based management interface of Cisco IoT Field Network Director Software could allow an authenticated, remote attacker to access files, execute commands, and cause denial of service (DoS) conditions on man... Cisco SG350 and SG350X Series Managed Switches SNMP Denial of Service Vulnerability 12d ago A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco 350 Series Managed Switches (SG350) and Cisco 350X Series Stackable Managed Switches (SG350X) firmware could allow an authenticated, remote attacker to caus...
20 loaded
BF
Blog – Forter
4d ago · 10 items
TC
The Cyber Mentor
4d ago · 15 items
15 loaded
HA
Hak5
5d ago · 21 items
21 loaded
PN
Proofpoint News Feed
6d ago · 10 items
Proofpoint Launches Dedicated MSP Business Unit and Introduces 365 Total Protection for North America 6d ago New MSP Platform business unit, AI-powered all-in-one Microsoft 365 protection, and Marketplace partnership with Pax8 strengthen Proofpoint’s commitment to channel and small and mid-size The spy who logged me in. 9d ago ⁠Mark Kelly⁠, Staff Threat Researcher at ⁠Proofpoint⁠, is discussing their work on "I’d come running back to EU again: TA416 resumes European government espionage campaigns." China-linked threat group TA416 has resumed large-scale phishing ... Proofpoint Establishes Innovation Precedent for Source-Agnostic Modern Enterprise Investigations 12d ago Proofpoint Prism Investigator positioned as first fully autonomous Agentic AI solution to significantly streamline investigations for highly regulated and highly AI and the New Threat Landscape | Sumit Dhawan with NightDragon | RSAC 2026 13d ago The Most Powerful Women Of The Channel 2026: Power 100 14d ago The Power 100 is culled from the ranks of CRN’s 2026 Women of the Channel and spotlights the female executives at vendors and distributors whose insight and influence help drive channel success. AI Security Gaps Create New MSSP Opportunity: Proofpoint 18d ago Claude Mythos Fears Startle Japan's Financial Services Sector 19d ago AI-Era Threats Spread Beyond Email Into SaaS, Collaboration Apps, and AI Assistants 20d ago Proofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in Place 20d ago Inaugural global study finds more than half of organizations are not fully confident their AI security controls would detect compromised AI Clear market trend for software providers to help with AI: Proofpoint CEO 25d ago Sumit Dhawan, Proofpoint CEO, joins 'Closing Bell' to discuss ServiceNow's quarterly earnings results, if Anthropic's Mythos makes incumbent players more important and much more.
HS
Heimdal Security Blog
6d ago · 15 items
AI Will Absorb 99.98% of SOC Triage Within a Year, as 79% of IT teams brace for AI-driven workload shift 6d ago Morten Kjaersgaard expects fewer than 500 of three million monthly alerts to need a human analyst in the year ahead. The role is being rebuilt around cases that warrant judgement. Top 10 Cybersecurity Companies in Europe 13d ago Over the last 10-15 years, the cybersecurity scene has gotten increasingly complex, as organizations adopt new technology and hackers evolve more innovative ways to target them. At the same time, data protection and compliance have become m... Heimdal Expands AI Strategy with AI Wingman and Third-Party AI Containment 27d ago Heimdal today unveiled the next phase of its AI strategy, expanding AI Wingman with three new layers - Assist, Triage and SOC - alongside the introduction of Third-Party AI Containment. You Only Know What You’ve Got When Its Gone 52d ago Prepare for the expected. Rehearse an action plan in case of technology failure or cyberattacks. We all know they can happen. Nordic MSPs Can Now Access Heimdal’s Unified Security and Compliance Platform Through Elovade 61d ago Heimdal has appointed Elovade as its official distributor in the Nordic region. The move gives MSPs and resellers across Sweden, Norway, Denmark, Iceland, and Finland direct access to Heimdal's consolidated cybersecurity platform through a ... OpenClaw Incidents Show Why AI Adoption Pressure Puts Companies at Risk 74d ago The OpenClaw security failures show how hasty AI adoption can expose businesses and supply chains to major cyber risk. Heimdal Claims Industry First With a Cyber Essentials Control Mapping for PEDM to Help Organisations Prove Least Privilege 98d ago Heimdal is the first vendor to publish a dedicated Cyber Essentials control mapping for PEDM, setting out how privilege management supports Cyber Essentials requirements and what evidence can be produced to support assessment and assurance. Five Predictions for Cyber Security Trends in 2026 103d ago Morten Kjaersgaard, Heimdal’s Founder, and Adam Pilton, a former cybercrime investigator, predict five cyber security trends for 2026. Heimdal Achieves OPSWAT Gold Certification for Anti-Malware 123d ago Heimdal today announced that its Next-Gen Antivirus (NGAV) with Extended Threat Protection (XTP) has achieved OPSWAT Gold Certification for Anti-Malware, validating its compatibility and effectiveness within OPSWAT’s industry-leading Access... How to Avoid Holiday Shopping Scams (From a Former Cyber Detective) 158d ago Worried about holiday scams? Ex-cybercrime detective Adam Pilton breaks down the biggest threats and how to shop safely this festive season.
15 loaded
M3
Microsoft 365 Blog
7d ago · 10 items
New and improved: Agent governance, intelligent workflows, and connected app experiences 7d ago See what's new in Copilot Studio, April 2026: updates to workflows, more control over agent operations, and an expanded agent usage estimator. Copilot Cowork: From conversation to action across skills, integrations, and devices 13d ago Today, we’re announcing additional capabilities in Cowork to expand on what it can make possible for you. Microsoft 365 Copilot, human agency, and the opportunity for every organization 13d ago Empower your organization with Microsoft 365 Copilot—AI that bridges human potential and business outcomes for the future of work. Microsoft Agent 365, now generally available, expands capabilities and integrations 17d ago ​We’re announcing the general availability of Agent 365, plus previews of new capabilities to discover and manage shadow AI agents. Learn more. Copilot’s agentic capabilities in Word, Excel, and PowerPoint are generally available 26d ago Copilot's newest features are now generally available as the default experience across all Microsoft 365 subscriptions. Bring your everyday business apps into the flow of work with agents in Microsoft 365 Copilot 35d ago Discover how apps integrate with AI agents to power Copilot experiences, streamline workflows, and turn business context into action. New and improved: Multi-agent orchestration, connected experiences, and faster prompt iteration 47d ago Explore what's new in Copilot Studio: Multi-agent systems now generally available, plus updates to the Prompt Editor and governance controls. Copilot Cowork: Now available in Frontier 49d ago Today, Copilot Cowork—designed for long-running, multi-step work in Microsoft 365—is available via the Frontier program. Copilot Cowork: A new way of getting work done 70d ago Copilot Cowork turns intent into action across Microsoft 365—automating tasks, coordinating workflows, and keeping you in control. See how. Powering Frontier Transformation with Copilot and agents 70d ago Wave 3 of Microsoft 365 Copilot introduces Copilot Cowork, multi‑model intelligence, and enterprise‑ready AI—built to get real work done.
NE
NetworkChuck
12d ago · 17 items
17 loaded
TL
The Last Watchdog
13d ago · 10 items
News alert: LuxSci launches HIPAA-compliant email platform for mid-size healthcare market 13d ago CAMBRIDGE, Mass., May 5, 2026, CyberNewswireŌĆöLuxSci, a leading provider of HIPAA compliant secure healthcare communications, today announced the launch of LuxSci Secure High Volume Email for mid-sized healthcare organizations, the industr... SHARED INTEL Q&A: PKI’s unfinished business—’digital passports’ for content, models and agents 18d ago As if keeping track of machine identities wasnŌĆÖt hard enough. AI agents are now arriving by the thousands ŌĆö and most enterprises are just handing them borrowed credentials and hoping for the best. Meanwhile, the cryptographic infrastruc... GUEST ESSAY: How augmented reality (AR) can turn building images into ad space with no control 20d ago Every major building in America has three things: a physical address, a legal owner, and an unmonitored attack surface. Related: Sam Altman's quest to usurp the browswer That surface extends from the ground up through every floor, every fac... FIRESIDE CHAT: Leaked secrets are now the go-to attack vector — and AI is accelerating exposures 21d ago A consequential shift is underway in how enterprise breaches begin. The leaked credential ‚Äî once treated as a hygiene problem ‚Äî has become the primary on-ramp. Related: No easy fixes for AI risk Last August‚Äôs Salesloft campaign was th... News alert: BreachLock’s integrated attack validation platform debuts in Gartner AEV category 26d ago NEW YORK, Apr. 21, 2026, CyberNewswire—BreachLock, a global leader in offensive security, today announced it has been named a representative vendor in the 2026 Gartner Market Guide for Adversarial Exposure Validation. This recognition mar... Fireside Chat: PKI has carried digital trust through every tech advance—now comes the hardest one 28d ago Public key infrastructure -- the authentication and encryption framework that has held digital commerce together through every chaotic leap forward in technology -- is facing a double whammy. Related: Achieveing AI security won't be easy Au... News Alert: NTT Research launches SaltGrain—advanced Attribute-Based Encryption security 33d ago SUNNYVALE, Calif., Apr. 15, 2026 ŌĆō NTT Research, Inc., a division of NTT (TYO:9432), today announced the launch of Scale Academy, a startup incubator responsible for bringing to market products and services based upon technologies studied... GUEST ESSAY: Google’s 2029 deadline exposes readiness gap as move to quantum-safe crypto lags 34d ago For years, quantum risk was easy for most institutions to treat as premature: real in theory, urgent someday, but not yet an operational problem. That is no longer tenable. Related: AI spawns semantic attacks Two developments this month bro... News alert: Mallory launches AI-native platform to cut through alert noise and surface real risk 38d ago AUSTIN, Texas, Apr. 9, 2026, CyberNewswire—Mallory is launching a AI-native threat intelligence platform, purpose-built to answer the questions CISOs and their teams are asking every day: •What are the real threat vectors for our organi... FIRESIDE CHAT: Geopolitical turmoil, rising AI risk add a new layer to enterprise cyber defense 41d ago As if securing the enterprise against a tidal wave of AI tools wasn't hard enough, it turns out the geopolitical instability of the moment is making things worse. That wasn't the headline at RSAC 2026 last week -- agentic AI dominated the a...
WE
WeLiveSecurity
13d ago · 20 items
20 loaded
Azure IaaS: Defense in depth built on secure-by-design principles 14d ago Explore how Azure IaaS uses defense in depth and secure-by-design principles to deliver layered, scalable cloud security across compute, network, and data. Enforcing trust and transparency: Open-sourcing the Azure Integrated HSM 18d ago Learn how Microsoft Azure Integrated HSM delivers hardware‑enforced key protection in the cloud, combining FIPS Level 3 assurances with transparency and open‑source collaboration. Azure IaaS: Keep critical applications running with built-in resiliency at scale 47d ago Learn how Azure IaaS helps organizations start from a resilient platform foundation with availability, continuity, and recovery capabilities. Azure IaaS: Explore new resources for building a stronger, more efficient infrastructure 75d ago Learn how Azure IaaS helps you modernize infrastructure, improve performance and resilience, optimize costs, and prepare for AI workloads. Read more. Azure reliability, resiliency, and recoverability: Build continuity by design 90d ago Learn how Azure reliability, resiliency, and recovery capabilities work together to improve cloud continuity. Read more. Microsoft strengthens sovereign cloud capabilities with new services 194d ago Discover new Microsoft digital sovereignty capabilities and upcoming features across AI, security, and productivity, to address sovereign cloud needs. Enhancing software supply chain security with Microsoft’s Signing Transparency 196d ago Microsoft Signing Transparency delivers verifiable code integrity and tamper-evident software releases for stronger supply chain security. Oracle Database@Azure offers new features, regions, and programs to unlock data and AI innovation 216d ago Migrate Oracle solutions to the cloud with a trusted, enterprise-ready platform from Microsoft and Oracle. Learn more. Building secure, scalable AI in the cloud with Microsoft Azure 321d ago Forrester Research shows how Azure helps enterprises scale generative AI securely, unlocking real business value. Learn more. Enhance AI security with Azure Prompt Shields and Azure AI Content Safety 347d ago Learn how Prompt Shields and Azure AI Content Safety can help guard against direct and indirect threats to your LLM-based solution.
DE
DEFCONConference
20d ago · 15 items
15 loaded
CC
CISA Cybersecurity Advisories
27d ago · 10 items
Defending Against China-Nexus Covert Networks of Compromised Devices 27d ago Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure 42d ago U.S. organizations should review the TTPs and IOCs in this advisory for indications of current or historical activity on their networks, and apply the Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure 164d ago The authoring organizations encourage critical infrastructure organizations to implement the recommendations in this advisory to reduce the likelihood and CISA Shares Lessons Learned from an Incident Response Engagement 238d ago Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System 266d ago The authoring agencies strongly urge network defenders to hunt for malicious activity and to apply the mitigations in this CSA to reduce the threat of Chinese CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization 293d ago #StopRansomware: Interlock 301d ago Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider 340d ago CISA urges software vendors, downstream customers, and end users to immediately implement the Mitigations listed in this advisory based on confirmed compromise Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations 363d ago Russian GRU Targeting Western Logistics Entities and Technology Companies 371d ago Executives and network defenders should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and IOCs
13 loaded
TH
Threatpost
1356d ago · 10 items
Student Loan Breach Exposes 2.5M Records 1356d ago 2.5 million people were affected, in a breach that could spell more trouble down the line. Watering Hole Attacks Push ScanBox Keylogger 1357d ago Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool. Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms 1358d ago Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system. Ransomware Attacks are on the Rise 1361d ago Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group. Cybercriminals Are Selling Access to Chinese Surveillance Cameras 1362d ago Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed. Twitter Whistleblower Complaint: The TL;DR Version 1363d ago Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk. Firewall Bug Under Active Attack Triggers CISA Warning 1364d ago CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP. Fake Reservation Links Prey on Weary Travelers 1365d ago Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels. iPhone Users Urged to Update to Patch 2 Zero-Days 1368d ago Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack. Google Patches Chrome’s Fifth Zero-Day of the Year 1369d ago An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.

No matching sources found.