Top Stories by Impact
Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever
Introduction Advances in AI model-powered exploitation have demonstrated that general-purpose AI models can excel at vulnerability discovery, even without being purpose-built for t…
Read full article →Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite
Written by: JP Glab, Tufail Ahmed, Josh Kelley, Muhammad Umair Introduction Google Threat Intelligence Group (GTIG) identified a multistage intrusion campaign by a newly tracked th…
Read full article →Patch Tuesday, April 2026 Edition
Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-d…
Read full article →Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push
Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an authenticated user to ob…
Read full article →The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape
Written by: Jamie Collier, Robin Grunewald Germany has reclaimed its position as a primary focus for cyber extortion in Europe. While data leak site (DLS) posts rose almost 50% glo…
Read full article →NSA GRASSMARLIN
View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to disclose sensitive information. The following versions of NSA GRASSMARLIN are affected: G…
Read full article →LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure
In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's LiteLLM Python package has come under…
Read full article →GitHub rushed to fix a critical vulnerability in less than six hours
GitHub employees fixed a critical remote code execution vulnerability in less than six hours last month. Wiz Research used AI models to uncover a vulnerability in GitHub's internal…
Read full article →Cybersecurity
Krebs on Security
Patch Tuesday, April 2026 Edition
CriticalMicrosoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in…
Read full article →Russia Hacked Routers to Steal Microsoft Office Tokens
HighHackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign…
Read full article →‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty
A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series o…
Read full article →The Hacker News
Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push
CriticalCybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an authenticated user to obtain remote code execution with a single…
Read full article →LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure
CriticalIn yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's LiteLLM Python package has come under active exploitation in the wild within 3…
Read full article →CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV
CriticalThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, based o…
Read full article →CISA Alerts
NSA GRASSMARLIN
CriticalView CSAF Summary Successful exploitation of this vulnerability could allow an attacker to disclose sensitive information. The following versions of NSA GRASSMARLIN are affected: GRASSMARLIN vers:all/* CVSS Vendor Equipm…
Read full article →CISA Adds Two Known Exploited Vulnerabilities to Catalog
CriticalCISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2024-1708 ConnectWise ScreenConnect Path Traversal Vulnerability CVE-2026-32202 M…
Read full article →CISA Adds Four Known Exploited Vulnerabilities to Catalog
CriticalCISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2024-7399 Samsung MagicINFO 9 Server Path Traversal Vulnerability CVE-2024-57726…
Read full article →BleepingComputer
Hackers are exploiting a critical LiteLLM pre-auth SQLi flaw
CriticalHackers are targeting sensitive information stored in the LiteLLM open-source large-language model (LLM) gateway by exploiting a critical vulnerability tracked as CVE-2026-42208. [...]
Read full article →Broken VECT 2.0 ransomware acts as a data wiper for large files
CriticalResearchers are warning that the VECT 2.0 ransomware has a problem in the way it handles encryption nonces that leads to permanently destroying larger files rather than encrypt them. [...]
Read full article →Microsoft says backend change broke Teams Free chat and calls
Microsoft is working to resolve a known issue that prevents some Microsoft Teams Free users from chatting and calling others. [...]
Read full article →Dark Reading
Feuding Ransomware Groups Leak Each Other's Data
CriticalWhen 0APT and KryBit attacked each other, they exposed infrastructure and operational data, giving defenders rare insight into ransomware operations.
Read full article →BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
MediumThe North Korean group is using stolen victim videos, AI-generated avatars, and fake Zoom calls to scale malware attacks against cryptocurrency executives.
Read full article →NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later
Chris Inglis was the head civilian in charge at the NSA when the Snowden leak exploded. He gets candid about mistakes the organization made, and what CISOs need to know about spotting potential threats, media disclosures…
Read full article →Cybercrime Magazine
CISO Gap: SMBs Exposed; MSSPs To The Rescue
MediumThis week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 28, 2026 – Read the report Media outlets globally have been covering the 2026 CISO Report from Cybersecurity Ventures in collabo…
Read full article →One CISO For 10,000 companies: Cybersecurity On Too Few Shoulders
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 24, 2026 – Read the full story in it-daily.net According to the 2026 CISO Report, published by Cybersecurity Ventures in collabo…
Read full article →Cybercrime Magazine YouTube Shorts On The History of Hacking
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 27, 2026 – Cybercrime Magazine YouTube Shorts The award-winning Cybercrime Magazine YouTube Channel, which has more than 1.2 mil…
Read full article →Infosecurity Magazine
Ransomware Turf War as 0APT and KryBit Groups Trade Blows
MediumRansomware groups 0APT and KryBit have doxxed each other online
Read full article →A Quarter of Healthcare Organizations Report Medical Device Cyber-Attacks
MediumRunSafe report reveals most attacks on medical devices disrupt patient care
Read full article →Medtronic Confirms Data Breach After ShinyHunters Claims
MediumMedtronic confirms IT breach as ShinyHunters claims millions of records accesseda
Read full article →Schneier on Security
What Anthropic’s Mythos Means for the Future of Cybersecurity
MediumTwo weeks ago, Anthropic announced that its new model, Claude Mythos Preview, can autonomously find and weaponize software vulnerabilities, turning them into working exploits without expert guidance. These were vulnerabi…
Read full article →Friday Squid Blogging: How Squid Survived Extinction Events
Science news: Scientists have finally cracked a long-standing mystery about squid and cuttlefish evolution by analyzing newly sequenced genomes alongside global datasets. The research reveals that these bizarre, intellig…
Read full article →Medieval Encrypted Letter Decoded
Sent by a Spanish diplomat. Apparently people have been working on it since it was rediscovered in 1860.
Read full article →CyberScoop
Rep. Delia Ramirez takes over as top House cybersecurity Dem
She replaces Rep. Eric Swalwell following his resignation, giving her the position of ranking member of the Subcommittee on Cybersecurity and Infrastructure Protection. The post Rep. Delia Ramirez takes over as top House…
Read full article →Spy agency officials say job loss anxiety, moving fast ‘safely’ among top challenges in AI workforce overhaul
While tech leaders think about how to strategically deploy AI tools to support human intelligence needs, rank and filers express concerns about their livelihoods. The post Spy agency officials say job loss anxiety, movin…
Read full article →Federal CIO cautious on Anthropic’s Mythos despite planned rollout
Greg Barbaccia told CyberScoop that Anthropic's Mythos shows real promise for federal cyber defense, but warns that laboratory results and live network conditions are two very different things. The post Federal CIO cauti…
Read full article →SANS Internet Storm Center
ISC Stormcast For Wednesday, April 29th, 2026 https://isc.sans.edu/podcastdetail/9910, (Wed, Apr 29th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Read full article →HTTP Requests with X-Vercel-Set-Bypass-Cookie Header, (Tue, Apr 28th)
This weekend, we saw a few requests to our honeypot that included an "X-Vercel-Set-Bypass-Cookie" header. A sample request:
Read full article →ISC Stormcast For Tuesday, April 28th, 2026 https://isc.sans.edu/podcastdetail/9908, (Tue, Apr 28th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Read full article →AI & Technology
The Verge
GitHub rushed to fix a critical vulnerability in less than six hours
CriticalGitHub employees fixed a critical remote code execution vulnerability in less than six hours last month. Wiz Research used AI models to uncover a vulnerability in GitHub's internal git infrastructure that could have allo…
Read full article →General Motors is adding Gemini to four million cars
General Motors is planning to bring Google's Gemini AI assistant to around four million vehicles across the US. Model year 2022 and newer Cadillac, Chevrolet, Buick, and GMC vehicles with Google built-in will be eligible…
Read full article →It’s primetime for conspiracy theorist video creators
In the days since this year's White House Correspondents' Dinner was cut short when shots were fired at the event, there has been a boom of conspiracy theory videos created by people who insist that the entire situation…
Read full article →VentureBeat AI
Railway secures $100 million to challenge AWS with AI-native cloud infrastructure
CriticalRailway, a San Francisco-based cloud platform that has quietly amassed two million developers without spending a dollar on marketing, announced Thursday that it raised $100 million in a Series B funding round, as surging…
Read full article →Listen Labs raises $69M after viral billboard hiring stunt to scale AI customer interviews
HighAlfred Wahlforss was running out of options. His startup, Listen Labs, needed to hire over 100 engineers, but competing against Mark Zuckerberg's $100 million offers seemed impossible. So he spent $5,000 — a fifth of his…
Read full article →Claude Code costs up to $200 a month. Goose does the same thing for free.
MediumThe artificial intelligence coding revolution comes with a catch: it's expensive.Claude Code, Anthropic's terminal-based AI agent that can write, debug, and deploy code autonomously, has captured the imagination of softw…
Read full article →Synced
Which Agent Causes Task Failures and When?Researchers from PSU and Duke explores automated failure attribution of LLM Multi-Agent Systems
HighIn recent years, LLM Multi-Agent systems have garnered widespread attention for their collaborative approach to solving complex problems. However, it's a common scenario for these systems to fail at a task despite a flur…
Read full article →MIT Researchers Unveil “SEAL”: A New Step Towards Self-Improving AI
MediumMIT introduces SEAL, a framework enabling large language models to self-edit and update their weights via reinforcement learning. The post MIT Researchers Unveil “SEAL”: A New Step Towards Self-Improving AI first appeare…
Read full article →ByteDance Introduces Astra: A Dual-Model Architecture for Autonomous Robot Navigation
ByteDance introduces Astra, an innovative dual-model architecture revolutionizing robot navigation in complex indoor environments. The post ByteDance Introduces Astra: A Dual-Model Architecture for Autonomous Robot Navig…
Read full article →ITNews Australia
Incomplete fix for Fancy Bear exploit opens zero-click hole in Windows
MediumNo interaction needed.
Read full article →In Pictures: Data sovereignty in the AI era - Synology roundtable
A selection of photos from a recent iTnews roundtable lunch at Aria restaurant in Sydney.
Read full article →ABA says big tech tax gap putting payments at risk
While digital giants get a free ride.
Read full article →ABC Technology (AU)
More women come forward after sepsis case linked to pedicure
More Perth women share their experience of needing surgery after having an adverse reaction to nail salon services, triggering a warning from the consumer watchdog.
Read full article →High fuel costs a 'kick in the guts' for country clubs, but the game must go on
Country sporting clubs are rallying to help families keep coming to fixtures as fuel prices double, with some travelling up to 640 kilometres. But it's a cost many regional families are prepared to take on if it means ma…
Read full article →Australia's richest woman gifts plane to Pauline Hanson
One Nation leader Pauline Hanson banks more than $3 million worth of donations, including a brand-new plane gifted by Australia's richest person, Gina Rinehart.
Read full article →TechCrunch AI
Amazon is already offering new OpenAI products on AWS
A day after OpenAI got Microsoft to agree to end exclusive rights, AWS announced a slate of OpenAI model offerings, including a new agent service.
Read full article →Amazon launches an AI-powered audio Q&A experience on product pages
Amazon's new "Join the chat" feature lets you ask questions about products and receive AI-powered audio responses.
Read full article →At his OpenAI trial, Musk relitigates an old friendship
It's a story Musk has told before -- in interviews and to author Walter Isaacson for his bestselling biography of Musk -- but Tuesday was the first time he said it under oath.
Read full article →AI News
GPT-5.5 is OpenAI’s most capable agentic AI model yet–at twice the API price
OpenAI launched GPT-5.5 on April 23 as what it calls “a new class of intelligence for real work and powering agents,” and the framing is deliberate. OpenAI says it’s the most capable agentic AI model to date, built from…
Read full article →IBM launches AI platform Bob to regulate SDLC costs
To regulate software delivery costs and SDLC governance, IBM is launching Bob, an AI platform built to anchor enterprise engineering. Accumulated technical debt, hybrid cloud structures, and rigid compliance requirements…
Read full article →The evolution of encoders: From simple models to multimodal AI
When people talk about artificial intelligence, they usually focus on what it produces: Human-like text, stunning images, or eerily accurate recommendations. What rarely gets attention is how AI understands anything in t…
Read full article →Import AI
Import AI 454: Automating alignment research; safety study of a Chinese model; HiFloat4
At what point do the financial markets price in the singularity?
Read full article →Import AI 453: Breaking AI agents; MirrorCode; and ten views on gradual disempowerment
Was fire equivalent to a singularity for people at the time?
Read full article →Import AI 452: Scaling laws for cyberwar; rising tides of AI automation; and a puzzle over gDP forecasting
How much could AI revolutionize the economy?
Read full article →Google DeepMind
Announcing our partnership with the Republic of Korea
Google DeepMind and Korea partner to accelerate scientific breakthroughs using frontier AI models
Read full article →Decoupled DiLoCo: A new frontier for resilient, distributed AI training
Partnering with industry leaders to accelerate AI transformation
Google DeepMind partners with global consultancies to bring the power of frontier AI to organizations around the world.
Read full article →NVIDIA AI Blog
NVIDIA Launches Nemotron 3 Nano Omni Model, Unifying Vision, Audio and Language for up to 9x More Efficient AI Agents
AI agent systems today juggle separate models for vision, speech and language — losing time and context as they pass data from one model to the other. Unveiled today, NVIDIA Nemotron 3 Nano Omni is an open multimodal mod…
Read full article →Into the Omniverse: Manufacturing’s Simulation-First Era Has Arrived
Manufacturing’s traditional design-build-test cycle rested on a single assumption: Real-world testing was the only reliable test environment.
Read full article →OpenAI’s New GPT-5.5 Powers Codex on NVIDIA Infrastructure — and NVIDIA Is Already Putting It to Work
AI agents have revolutionized developer workflows, and their next frontier is knowledge work: processing information, solving complex problems, coming up with new ideas and driving innovation. Codex, OpenAI’s agentic cod…
Read full article →MIT Technology Review AI
Elon Musk and Sam Altman are going to court over OpenAI’s future
After a yearslong legal feud, Elon Musk and OpenAI CEO Sam Altman are heading to trial this week in Northern California in a case that could have sweeping consequences. Ahead of OpenAI’s highly anticipated IPO, the court…
Read full article →The missing step between hype and profit
This story originally appeared in The Algorithm, our weekly newsletter on AI. To get stories like this in your inbox first, sign up here. In February, I picked up a flyer at an anti-AI march in London. I can’t say for su…
Read full article →Rebuilding the data stack for AI
Artificial intelligence may be dominating boardroom agendas, but many enterprises are discovering that the biggest obstacle to meaningful adoption is the state of their data. While consumer-facing AI tools have dazzled u…
Read full article →Wired AI
When Robots Have Their ChatGPT Moment, Remember These Pincers
From sorting chicken nuggets to screwing in light bulbs, Eka’s robots are eerily lifelike. But do they have real physical smarts?
Read full article →How AI Could Help Combat Antibiotic Resistance
At WIRED Health, British surgeon Ara Darzi said AI is set to transform the diagnosis and treatment of drug-resistant infections. But a lack of incentives means innovation may not reach patients.
Read full article →OpenAI Really Wants Codex to Shut Up About Goblins
“Never talk about goblins, gremlins, raccoons, trolls, ogres, pigeons, or other animals or creatures unless it is absolutely and unambiguously relevant,” reads OpenAI’s coding agent instructions.
Read full article →Ars Technica AI
Humanoid robots start sorting luggage in Tokyo airport test amid labor shortage
Humanoid robots could load cargo and clean aircraft cabins at Haneda Airport.
Read full article →GitHub will start charging Copilot users based on their actual AI usage
GitHub says it can no longer absorb "escalating inference cost" from it heaviest AI users.
Read full article →The great American data center divide
Many rural communities are viscerally opposed to AI infrastructure.
Read full article →The Guardian Technology
‘They’re supposed to be handmade’: zine creators fight to resist AI influence
Artists and writers argue scrappy nature of self-published booklets is incompatible with artificial intelligenceThe self-published zine has long been central to cultural revolutions, from queer activism to Black feminism…
Read full article →MacBook Pro M5 review: serious power, still long battery life
Apple laptop sets new performance bar with more storage, new chips and plenty of options, but now has two-tier specs depending on processorApple’s Macs have been on a roll this year with the brand new budget MacBook Neo…
Read full article →Humanoid robots to become baggage handlers in Japan airport experiment
Japan Airlines will introduce the robots for trial run at a Tokyo airport amid country’s surge in inbound tourism and worsening labour shortagesJapan’s famously conscientious but overburdened baggage handlers will soon b…
Read full article →Vendor Security
Mandiant Threat Intel
Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever
CriticalIntroduction Advances in AI model-powered exploitation have demonstrated that general-purpose AI models can excel at vulnerability discovery, even without being purpose-built for the task. Eventually, capabilities such a…
Read full article →Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite
CriticalWritten by: JP Glab, Tufail Ahmed, Josh Kelley, Muhammad Umair Introduction Google Threat Intelligence Group (GTIG) identified a multistage intrusion campaign by a newly tracked threat group, UNC6692, that leveraged pers…
Read full article →The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape
CriticalWritten by: Jamie Collier, Robin Grunewald Germany has reclaimed its position as a primary focus for cyber extortion in Europe. While data leak site (DLS) posts rose almost 50% globally in 2025, Google Threat Intelligenc…
Read full article →Rapid7 Blog
Metasploit Wrap-Up 04/25/2026
CriticalCheck Method VisibilityMetasploit has supported check methods for many years now. It’s not always desirable to jump straight into exploiting a vulnerability but instead to determine if the target is vulnerable. Metasploi…
Read full article →MDR Selection is a Partnership Decision
CriticalManaged Detection and Response (MDR) is a cybersecurity service that combines human expertise and technology to detect, investigate, and respond to threats 24/7.I write this as a Field CISO at Rapid7, but also as someone…
Read full article →Get Motivated: What to Expect from Our Keynote at Rapid7's Global Cybersecurity Summit
MediumSecurity teams prepare for incidents every day. Alerts are tuned, playbooks are built, and processes are tested. But when something actually happens, the challenge shifts. It becomes not just about making decisions under…
Read full article →GitHub Security Blog
Securing the git push pipeline: Responding to a critical remote code execution vulnerability
CriticalHow we validated, fixed, and investigated a critical vulnerability in under two hours, and confirmed no exploitation. The post Securing the git push pipeline: Responding to a critical remote code execution vulnerability…
Read full article →Hack the AI agent: Build agentic AI security skills with the GitHub Secure Code Game
MediumLearn to find and exploit real-world agentic AI vulnerabilities through five progressive challenges in this free, open source game that over 10,000 developers have already used to sharpen their security skills. The post…
Read full article →How exposed is your code? Find out in minutes—for free
MediumThe new Code Security Risk Assessment gives you a one-click view of vulnerabilities across your organization, at no cost. The post How exposed is your code? Find out in minutes—for free appeared first on The GitHub Blog.
Read full article →Check Point Research
VECT: Ransomware by design, Wiper by accident
CriticalKey Takeaways Background VECT Ransomware is a Ransomware-as-a-Service (RaaS) program that made its first appearance in December 2025 on a Russian-language cybercrime forum. After claiming their first two victims in Janua…
Read full article →20th April – Threat Intelligence Report
CriticalFor the latest discoveries in cyber research for the week of 20th April, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Booking.com, the Amsterdam-based travel platform, has confirmed a data b…
Read full article →27th April – Threat Intelligence Report
HighFor the latest discoveries in cyber research for the week of 27th April, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Vercel, a frontend cloud platform, has disclosed a security incident lin…
Read full article →Palo Alto Unit 42
The npm Threat Landscape: Attack Surface and Mitigations
CriticalUnit 42 analyzes npm supply chain evolution post-Shai Hulud. Discover wormable malware, CI/CD persistence, multi-stage attacks and more. The post The npm Threat Landscape: Attack Surface and Mitigations appeared first on…
Read full article →TGR-STA-1030: New Activity in Central and South America
Unit 42 research reports that TGR-STA-1030 remains an active threat, particularly in Central and South America. The post TGR-STA-1030: New Activity in Central and South America appeared first on Unit 42.
Read full article →Frontier AI and the Future of Defense: Your Top Questions Answered
What are the next steps for security leaders in this new age of frontier AI? We answer the top 10 questions customers are asking. The post Frontier AI and the Future of Defense: Your Top Questions Answered appeared first…
Read full article →Kaspersky Securelist
PhantomRPC: A new privilege escalation technique in Windows RPC
HighKaspersky researcher discovered a vulnerability in RPC architecture that enables an attacker to create a fake RPC server and escalate their privileges.
Read full article →Threat landscape for industrial automation systems in Q4 2025
MediumThe report contains industrial threat statistics for Q4 2025. It covers various infection vectors and malware types, as well as regional statistics and statistics by industry.
Read full article →FakeWallet crypto stealer spreading through iOS apps in the App Store
In March 2026, we uncovered more than twenty phishing apps in the Apple App Store masquerading as popular crypto wallets.
Read full article →AWS Security
Optimize security operations through an AWS Security Hub POC
HighApril 27, 2026: This post was first published in September 2025 when the enhanced AWS Security Hub was in public preview. It has since been updated to reflect the general availability of Security Hub. This revision also…
Read full article →What the March 2026 Threat Technique Catalog update means for your AWS environment
MediumThe AWS Customer Incident Response Team (AWS CIRT) regularly encounters patterns that repeat across their engagements when helping customers respond to security incidents. We’re passionate about making sure that informat…
Read full article →Access control with IAM Identity Center session tags
As organizations expand their Amazon Web Services (AWS) footprint, managing secure, scalable, and cost-efficient access across multiple accounts becomes increasingly important. AWS IAM Identity Center offers a centralize…
Read full article →Microsoft Threat Intel
Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise
HighThe Microsoft Defender Security Research Team uncovered a sophisticated macOS intrusion campaign attributed to the North Korean threat actor Sapphire Sleet that abuses user driven execution and social engineering to bypa…
Read full article →Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees
HighMicrosoft Incident Response – Detection and Response Team (DART) researchers observed an emerging, financially motivated threat actor, tracked as Storm-2755, compromising Canadian employee accounts to gain unauthorized a…
Read full article →SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks
HighExecutive summary Forest Blizzard, a threat actor linked to the Russian military, has been compromising insecure home and small-office internet equipment like routers, then modifying their settings in ways that turn them…
Read full article →SentinelOne Labs
LABScon25 Replay | Are Your Chinese Cameras Spying For You Or On You?
HighMarc Rogers and Silas Cutler expose how cheap smart home devices conceal a shadow supply chain of shell companies, firmware flaws, and foreign data routing.
Read full article →Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
MediumSingle-tool LLM analysis produces reports that look authoritative but aren't. A serial consensus pipeline catches artifacts and hallucinations at source.
Read full article →fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet
A previously unknown 2005 cyber sabotage framework patches high-precision calculation software in memory to silently corrupt results.
Read full article →Microsoft Security
Simplifying AWS defense with Microsoft Sentinel UEBA
MediumLearn how Microsoft Sentinel UEBA helps defenders distinguish benign AWS activity from attacker behavior by enriching raw CloudTrail logs with clear, binary behavioral signals derived from baseline user, peer, and device…
Read full article →AI-powered defense for an AI-accelerated threat landscape
Read how Microsoft is partnering with Anthropic and broader industry to use leading models, paired with our platforms and expertise, to turn AI-driven discovery into protection at scale. The post AI-powered defense for a…
Read full article →Detection strategies across cloud and identities against infiltrating IT workers
The shift to remote and hybrid work since the pandemic expanded global hiring and accelerated digital onboarding, increasing reliance on online identity verification and remote access. The post Detection strategies acros…
Read full article →Cisco Talos
AI-powered honeypots: Turning the tables on malicious AI agents
Just as AI brings time-saving advantages to our lives, it brings similar advantages to threat actors. We can take the advantage back. This blog shows how generative AI can be used to rapidly deploy adaptive honeypot syst…
Read full article →Five defender priorities from the Talos Year in Review
With attackers moving faster than ever, it’s easy to feel overwhelmed. This blog breaks down five practical priorities from the Cisco Talos 2025 Year in Review to help defenders focus and prioritize, amidst all the noise…
Read full article →It pays to be a forever student
In this newsletter, Joe discusses why understanding other disciplines can often flow back into the macro and micro of cybersecurity, especially in a world of AI.
Read full article →Proofpoint Threat Insight
Proofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in Place
Proofpoint CEO on AI Security Innovations | Nasdaq at RSAC 2026
Clear market trend for software providers to help with AI: Proofpoint CEO
OpenAI News
OpenAI models, Codex, and Managed Agents come to AWS
OpenAI GPT models, Codex, and Managed Agents are now available on AWS, enabling enterprises to build secure AI in their AWS environments.
Read full article →Our commitment to community safety
Learn how OpenAI protects community safety in ChatGPT through model safeguards, misuse detection, policy enforcement, and collaboration with safety experts.
Read full article →OpenAI available at FedRAMP Moderate
OpenAI is available at FedRAMP Moderate authorization for ChatGPT Enterprise and the OpenAI API, enabling secure AI adoption for U.S. federal agencies.
Read full article →Google Cloud Security
No articles available.
Google Threat Analysis (TAG)
TAG Bulletin: Q4 2025
An overview of coordinated influence operation campaigns terminated on our platforms in Q4 2025.
Read full article →TAG Bulletin: Q3 2025
Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q3 2025.
Read full article →TAG Bulletin: Q2 2025
Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q2 2025.
Read full article →CrowdStrike Blog
CrowdStrike Expands ChatGPT Enterprise Integration with Enhanced Audit Logging and Activity Monitoring
CrowdStrike Named a Leader in Frost & Sullivan 2026 Radar for Cloud-Native Application Protection Platforms
CrowdStrike Expands Real-Time Cloud Detection and Response to Google Cloud
IBM Security Intelligence
No articles available.