Loading…

Whats The Hax?

Daily intelligence on threats, breaches, and defenders

Latest
Securelist“Legitimate” phishing: how attackers weaponize Amazon SES to bypass email securityRecorded FutureThe Iran War: What You Need to KnowWeLiveSecurityThis month in security with Tony Anscombe – April 2026 editionSecurelistSilver Fox uses the new ABCDoor backdoor to target organizations in Russia and IndiaRecorded FutureRisk Scenarios for the US’s Strategic PivotRecorded FutureBuilding with AI: Here's What No Briefing Will Tell YouProofpoint News FeedClaude Mythos Fears Startle Japan's Financial Services SectorTrend Micro Research, News, PerspectivesKuse Web App Abused to Host Phishing DocumentProofpoint News FeedAI-Era Threats Spread Beyond Email Into SaaS, Collaboration Apps, and AI AssistantsProofpoint News FeedProofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in PlaceRecorded FutureThe Money Mule Solution: What Every Scam Has in CommonRecorded FutureLazarus Doesn't Need AGIWeLiveSecurityThe calm before the ransom: What you see is not all there isSecurelistPhantomRPC: A new privilege escalation technique in Windows RPCRecorded FutureFrom Overwhelmed to Autonomous: Rethinking Threat Intelligence in 2026Proofpoint News FeedClear market trend for software providers to help with AI: Proofpoint CEOWeLiveSecurityGopherWhisper: A burrow full of malwareRecorded FutureCritical minerals and cyber operationsRecorded FutureToday, trust is the superpower that makes innovation possibleProofpoint News FeedProofpoint CEO on AI Security Innovations | Nasdaq at RSAC 2026Securelist“Legitimate” phishing: how attackers weaponize Amazon SES to bypass email securityRecorded FutureThe Iran War: What You Need to KnowWeLiveSecurityThis month in security with Tony Anscombe – April 2026 editionSecurelistSilver Fox uses the new ABCDoor backdoor to target organizations in Russia and IndiaRecorded FutureRisk Scenarios for the US’s Strategic PivotRecorded FutureBuilding with AI: Here's What No Briefing Will Tell YouProofpoint News FeedClaude Mythos Fears Startle Japan's Financial Services SectorTrend Micro Research, News, PerspectivesKuse Web App Abused to Host Phishing DocumentProofpoint News FeedAI-Era Threats Spread Beyond Email Into SaaS, Collaboration Apps, and AI AssistantsProofpoint News FeedProofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in PlaceRecorded FutureThe Money Mule Solution: What Every Scam Has in CommonRecorded FutureLazarus Doesn't Need AGIWeLiveSecurityThe calm before the ransom: What you see is not all there isSecurelistPhantomRPC: A new privilege escalation technique in Windows RPCRecorded FutureFrom Overwhelmed to Autonomous: Rethinking Threat Intelligence in 2026Proofpoint News FeedClear market trend for software providers to help with AI: Proofpoint CEOWeLiveSecurityGopherWhisper: A burrow full of malwareRecorded FutureCritical minerals and cyber operationsRecorded FutureToday, trust is the superpower that makes innovation possibleProofpoint News FeedProofpoint CEO on AI Security Innovations | Nasdaq at RSAC 2026

By Source

Feeds organized so you can skim by site.

Density Sort
SE
Securelist
2h ago · 10 items
“Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security 2h ago Kaspersky expert breaks down a new phishing scheme that uses the Amazon SES cloud email service. Let’s look at some examples to see how you can tell a phishing email from a real one. Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India 4d ago The Silver Fox group is targeting companies in Russia and India by impersonating tax authorities to distribute ValleyRAT and the new ABCDoor backdoor. PhantomRPC: A new privilege escalation technique in Windows RPC 10d ago Kaspersky researcher discovered a vulnerability in RPC architecture that enables an attacker to create a fake RPC server and escalate their privileges. FakeWallet crypto stealer spreading through iOS apps in the App Store 14d ago In March 2026, we uncovered more than twenty phishing apps in the Apple App Store masquerading as popular crypto wallets. Threat landscape for industrial automation systems in Q4 2025 18d ago The report contains industrial threat statistics for Q4 2025. It covers various infection vectors and malware types, as well as regional statistics and statistics by industry. JanelaRAT: a financial threat targeting users in Latin America 21d ago Kaspersky GReAT experts describe the latest JanelaRAT campaign detailing infection chain and malware functionality updates. The long road to your crypto: ClipBanker and its marathon infection chain 25d ago Threat actors are distributing a Trojan disguised as Proxifier software; through a multi-stage infection chain, it delivers ClipBanker – malware that replaces cryptocurrency wallet addresses in the clipboard. Financial cyberthreats in 2025 and the outlook for 2026 26d ago In this report, Kaspersky experts share their insights into the 2025 financial threat landscape, including regional statistics and trends in phishing, PC malware, and infostealers. A laughing RAT: CrystalX combines spyware, stealer, and prankware features 33d ago Kaspersky researchers analyze a new CrystalX RAT distributed as MaaS and featuring extensive spyware, stealer, and prankware capabilities. An AI gateway designed to steal your data 39d ago Dissecting the supply chain attack on LiteLLM, a multifunctional gateway used in many AI agents. Explaining the dangers of the malicious code and how to protect yourself.
RF
Recorded Future
3d ago · 20 items
The Iran War: What You Need to Know 3d ago Insikt Group tracks the cyber, physical, and geopolitical components of the US-Israeli strikes on Iran — with continuously updated threat analysis and scenarios. Risk Scenarios for the US’s Strategic Pivot 4d ago The United States (US) is shifting toward a more force-driven security strategy primarily relying on military operations and economic pressure to counter transnational criminal organizations and limit Chinese, Russian, and Iranian influence... Building with AI: Here's What No Briefing Will Tell You 4d ago What building with AI for three months revealed about four leadership blind spots executives can't afford to ignore: the comprehension gap, eroding competitive moats, deployment complexity, and what "senior" really means now. The Money Mule Solution: What Every Scam Has in Common 6d ago Learn how mule account intelligence — not tactic-tracking — is the most effective lever for preventing APP fraud before funds move. Lazarus Doesn't Need AGI 6d ago Explore the 2026 Claude Mythos breach, supply chain risks, and the $2B+ crypto theft pipeline. From Overwhelmed to Autonomous: Rethinking Threat Intelligence in 2026 10d ago For most security teams today, volume and access to intelligence isn’t the problem. It’s the speed at which they can turn that intelligence into action. . Critical minerals and cyber operations 11d ago Learn how critical minerals and rare earth elements (REEs) are evolving from commodities into strategic flashpoints. Explore the geopolitical risks of China’s refining dominance, the race for resources in the Arctic and space, and the risin... Today, trust is the superpower that makes innovation possible 11d ago How better intelligence and collaboration can unlock new opportunities for growth and greater financial health for more people. Evolution of Chinese-Language Guarantee Telegram Marketplaces 12d ago Chinese-language, Telegram-based “guarantee” marketplaces are increasingly popular among Chinese-speaking criminal groups despite the widely publicized shutdown of Huione Guarantee in 2025. AI Hype vs. Reality: Is AI Really Rewriting the Vulnerability Equation? 12d ago AI vulnerability research and discovery capabilities are improving, but they have not changed the fundamentals of vulnerability management.
20 loaded
WE
WeLiveSecurity
4d ago · 20 items
20 loaded
PN
Proofpoint News Feed
5d ago · 10 items
Kuse Web App Abused to Host Phishing Document 5d ago Bad actors took advantage of the legitimate name and services of Kuse, a popular AI-based app designed for workplaces. The attackers exploited the users’ trust in Kuse to carry out a phishing attack. Void Dokkaebi Uses Fake Job Interview Lure to Spread Malware via Code Repositories 13d ago The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables 14d ago Identity Protection in the AI Era 21d ago Learn about a proactive, identity-first security approach that integrates visibility, threat detection and response, zero trust enforcement, AI protection, and threat intelligence into a unified model. U.S. Public Sector Under Siege: Threat Intelligence for Q1 2026 25d ago Discover how TrendAI Vision One™ empowers government agencies and educational institutions with advanced visibility, intelligence, and automation to stay ahead of evolving public sector threats. Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do 27d ago Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads 31d ago TrendAI Insight: New U.S. National Cyber Strategy 33d ago Explore the White House National Cyber Strategy and its six pillars to strengthen U.S. cybersecurity—covering deterrence, regulation, federal modernization, critical infrastructure protection, AI leadership, and workforce development. The Real Risk of Vibecoding 34d ago Axios NPM Package Compromised: Supply Chain Attack Hits JavaScript HTTP Client with 100M+ Weekly Downloads 34d ago
20 loaded
TH
Threatpost
1341d ago · 10 items
Student Loan Breach Exposes 2.5M Records 1341d ago 2.5 million people were affected, in a breach that could spell more trouble down the line. Watering Hole Attacks Push ScanBox Keylogger 1342d ago Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool. Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms 1343d ago Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system. Ransomware Attacks are on the Rise 1346d ago Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group. Cybercriminals Are Selling Access to Chinese Surveillance Cameras 1347d ago Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed. Twitter Whistleblower Complaint: The TL;DR Version 1348d ago Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk. Firewall Bug Under Active Attack Triggers CISA Warning 1349d ago CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP. Fake Reservation Links Prey on Weary Travelers 1350d ago Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels. iPhone Users Urged to Update to Patch 2 Zero-Days 1353d ago Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack. Google Patches Chrome’s Fifth Zero-Day of the Year 1354d ago An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.

No matching sources found.