Top Stories by Impact

🏢 Mandiant Threat Intel Critical

Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever

Introduction Advances in AI model-powered exploitation have demonstrated that general-purpose AI models can excel at vulnerability discovery, even without being purpose-built for t…

Read full article →
🏢 Mandiant Threat Intel Critical

Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite

Written by: JP Glab, Tufail Ahmed, Josh Kelley, Muhammad Umair Introduction Google Threat Intelligence Group (GTIG) identified a multistage intrusion campaign by a newly tracked th…

Read full article →
🔐 Krebs on Security Critical

Patch Tuesday, April 2026 Edition

Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-d…

Read full article →
🔐 The Hacker News Critical

Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push

Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an authenticated user to ob…

Read full article →
🏢 Mandiant Threat Intel Critical

The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape

Written by: Jamie Collier, Robin Grunewald Germany has reclaimed its position as a primary focus for cyber extortion in Europe. While data leak site (DLS) posts rose almost 50% glo…

Read full article →
🔐 CISA Alerts Critical

NSA GRASSMARLIN

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to disclose sensitive information. The following versions of NSA GRASSMARLIN are affected: G…

Read full article →
🔐 The Hacker News Critical

LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure

In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's LiteLLM Python package has come under…

Read full article →
🤖 The Verge Critical

GitHub rushed to fix a critical vulnerability in less than six hours

GitHub employees fixed a critical remote code execution vulnerability in less than six hours last month. Wiz Research used AI models to uncover a vulnerability in GitHub's internal…

Read full article →
🔐

Cybersecurity

Krebs on Security

1

Patch Tuesday, April 2026 Edition

Critical

Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in…

Read full article →
2

Russia Hacked Routers to Steal Microsoft Office Tokens

High

Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign…

Read full article →
3

‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty

A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series o…

Read full article →

The Hacker News

1

Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push

Critical

Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an authenticated user to obtain remote code execution with a single…

Read full article →
2

LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure

Critical

In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's LiteLLM Python package has come under active exploitation in the wild within 3…

Read full article →
3

CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

Critical

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, based o…

Read full article →

CISA Alerts

1

NSA GRASSMARLIN

Critical

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to disclose sensitive information. The following versions of NSA GRASSMARLIN are affected: GRASSMARLIN vers:all/* CVSS Vendor Equipm…

Read full article →
2

CISA Adds Two Known Exploited Vulnerabilities to Catalog

Critical

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2024-1708 ConnectWise ScreenConnect Path Traversal Vulnerability CVE-2026-32202 M…

Read full article →
3

CISA Adds Four Known Exploited Vulnerabilities to Catalog

Critical

CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2024-7399 Samsung MagicINFO 9 Server Path Traversal Vulnerability CVE-2024-57726…

Read full article →

BleepingComputer

1

Hackers are exploiting a critical LiteLLM pre-auth SQLi flaw

Critical

Hackers are targeting sensitive information stored in the LiteLLM open-source large-language model (LLM) gateway by exploiting a critical vulnerability tracked as CVE-2026-42208. [...]

Read full article →
2

Broken VECT 2.0 ransomware acts as a data wiper for large files

Critical

Researchers are warning that the VECT 2.0 ransomware has a problem in the way it handles encryption nonces that leads to permanently destroying larger files rather than encrypt them. [...]

Read full article →
3

Microsoft says backend change broke Teams Free chat and calls

Microsoft is working to resolve a known issue that prevents some Microsoft Teams Free users from chatting and calling others. [...]

Read full article →

Dark Reading

1

Feuding Ransomware Groups Leak Each Other's Data

Critical

When 0APT and KryBit attacked each other, they exposed infrastructure and operational data, giving defenders rare insight into ransomware operations.

Read full article →
2

BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures

Medium

The North Korean group is using stolen victim videos, AI-generated avatars, and fake Zoom calls to scale malware attacks against cryptocurrency executives.

Read full article →
3

NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later

Chris Inglis was the head civilian in charge at the NSA when the Snowden leak exploded. He gets candid about mistakes the organization made, and what CISOs need to know about spotting potential threats, media disclosures…

Read full article →

Cybercrime Magazine

1

CISO Gap: SMBs Exposed; MSSPs To The Rescue

Medium

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 28, 2026 – Read the report Media outlets globally have been covering the 2026 CISO Report from Cybersecurity Ventures in collabo…

Read full article →
2

One CISO For 10,000 companies: Cybersecurity On Too Few Shoulders

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 24, 2026 – Read the full story in it-daily.net According to the 2026 CISO Report, published by Cybersecurity Ventures in collabo…

Read full article →
3

Cybercrime Magazine YouTube Shorts On The History of Hacking

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 27, 2026 – Cybercrime Magazine YouTube Shorts The award-winning Cybercrime Magazine YouTube Channel, which has more than 1.2 mil…

Read full article →

Infosecurity Magazine

1

Ransomware Turf War as 0APT and KryBit Groups Trade Blows

Medium

Ransomware groups 0APT and KryBit have doxxed each other online

Read full article →
2

A Quarter of Healthcare Organizations Report Medical Device Cyber-Attacks

Medium

RunSafe report reveals most attacks on medical devices disrupt patient care

Read full article →
3

Medtronic Confirms Data Breach After ShinyHunters Claims

Medium

Medtronic confirms IT breach as ShinyHunters claims millions of records accesseda

Read full article →

Schneier on Security

1

What Anthropic’s Mythos Means for the Future of Cybersecurity

Medium

Two weeks ago, Anthropic announced that its new model, Claude Mythos Preview, can autonomously find and weaponize software vulnerabilities, turning them into working exploits without expert guidance. These were vulnerabi…

Read full article →
2

Friday Squid Blogging: How Squid Survived Extinction Events

Science news: Scientists have finally cracked a long-standing mystery about squid and cuttlefish evolution by analyzing newly sequenced genomes alongside global datasets. The research reveals that these bizarre, intellig…

Read full article →
3

Medieval Encrypted Letter Decoded

Sent by a Spanish diplomat. Apparently people have been working on it since it was rediscovered in 1860.

Read full article →

CyberScoop

1

Rep. Delia Ramirez takes over as top House cybersecurity Dem

She replaces Rep. Eric Swalwell following his resignation, giving her the position of ranking member of the Subcommittee on Cybersecurity and Infrastructure Protection. The post Rep. Delia Ramirez takes over as top House…

Read full article →
2

Spy agency officials say job loss anxiety, moving fast ‘safely’ among top challenges in AI workforce overhaul

While tech leaders think about how to strategically deploy AI tools to support human intelligence needs, rank and filers express concerns about their livelihoods. The post Spy agency officials say job loss anxiety, movin…

Read full article →
3

Federal CIO cautious on Anthropic’s Mythos despite planned rollout

Greg Barbaccia told CyberScoop that Anthropic's Mythos shows real promise for federal cyber defense, but warns that laboratory results and live network conditions are two very different things. The post Federal CIO cauti…

Read full article →

SANS Internet Storm Center

1

ISC Stormcast For Wednesday, April 29th, 2026 https://isc.sans.edu/podcastdetail/9910, (Wed, Apr 29th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Read full article →
2

HTTP Requests with X-Vercel-Set-Bypass-Cookie Header, (Tue, Apr 28th)

This weekend, we saw a few requests to our honeypot that included an "X-Vercel-Set-Bypass-Cookie" header. A sample request:

Read full article →
3

ISC Stormcast For Tuesday, April 28th, 2026 https://isc.sans.edu/podcastdetail/9908, (Tue, Apr 28th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Read full article →
🤖

AI & Technology

The Verge

1

GitHub rushed to fix a critical vulnerability in less than six hours

Critical

GitHub employees fixed a critical remote code execution vulnerability in less than six hours last month. Wiz Research used AI models to uncover a vulnerability in GitHub's internal git infrastructure that could have allo…

Read full article →
2

General Motors is adding Gemini to four million cars

General Motors is planning to bring Google's Gemini AI assistant to around four million vehicles across the US. Model year 2022 and newer Cadillac, Chevrolet, Buick, and GMC vehicles with Google built-in will be eligible…

Read full article →
3

It’s primetime for conspiracy theorist video creators

In the days since this year's White House Correspondents' Dinner was cut short when shots were fired at the event, there has been a boom of conspiracy theory videos created by people who insist that the entire situation…

Read full article →

VentureBeat AI

1

Railway secures $100 million to challenge AWS with AI-native cloud infrastructure

Critical

Railway, a San Francisco-based cloud platform that has quietly amassed two million developers without spending a dollar on marketing, announced Thursday that it raised $100 million in a Series B funding round, as surging…

Read full article →
2

Listen Labs raises $69M after viral billboard hiring stunt to scale AI customer interviews

High

Alfred Wahlforss was running out of options. His startup, Listen Labs, needed to hire over 100 engineers, but competing against Mark Zuckerberg's $100 million offers seemed impossible. So he spent $5,000 — a fifth of his…

Read full article →
3

Claude Code costs up to $200 a month. Goose does the same thing for free.

Medium

The artificial intelligence coding revolution comes with a catch: it's expensive.Claude Code, Anthropic's terminal-based AI agent that can write, debug, and deploy code autonomously, has captured the imagination of softw…

Read full article →

Synced

1

Which Agent Causes Task Failures and When?Researchers from PSU and Duke explores automated failure attribution of LLM Multi-Agent Systems

High

In recent years, LLM Multi-Agent systems have garnered widespread attention for their collaborative approach to solving complex problems. However, it's a common scenario for these systems to fail at a task despite a flur…

Read full article →
2

MIT Researchers Unveil “SEAL”: A New Step Towards Self-Improving AI

Medium

MIT introduces SEAL, a framework enabling large language models to self-edit and update their weights via reinforcement learning. The post MIT Researchers Unveil “SEAL”: A New Step Towards Self-Improving AI first appeare…

Read full article →
3

ByteDance Introduces Astra: A Dual-Model Architecture for Autonomous Robot Navigation

ByteDance introduces Astra, an innovative dual-model architecture revolutionizing robot navigation in complex indoor environments. The post ByteDance Introduces Astra: A Dual-Model Architecture for Autonomous Robot Navig…

Read full article →

ITNews Australia

1

Incomplete fix for Fancy Bear exploit opens zero-click hole in Windows

Medium

No interaction needed.

Read full article →
2

In Pictures: Data sovereignty in the AI era - Synology roundtable

A selection of photos from a recent iTnews roundtable lunch at Aria restaurant in Sydney.

Read full article →
3

ABA says big tech tax gap putting payments at risk

While digital giants get a free ride.

Read full article →

ABC Technology (AU)

1

More women come forward after sepsis case linked to pedicure

More Perth women share their experience of needing surgery after having an adverse reaction to nail salon services, triggering a warning from the consumer watchdog.

Read full article →
2

High fuel costs a 'kick in the guts' for country clubs, but the game must go on

Country sporting clubs are rallying to help families keep coming to fixtures as fuel prices double, with some travelling up to 640 kilometres. But it's a cost many regional families are prepared to take on if it means ma…

Read full article →
3

Australia's richest woman gifts plane to Pauline Hanson

One Nation leader Pauline Hanson banks more than $3 million worth of donations, including a brand-new plane gifted by Australia's richest person, Gina Rinehart.

Read full article →

TechCrunch AI

1

Amazon is already offering new OpenAI products on AWS

A day after OpenAI got Microsoft to agree to end exclusive rights, AWS announced a slate of OpenAI model offerings, including a new agent service.

Read full article →
2

Amazon launches an AI-powered audio Q&A experience on product pages

Amazon's new "Join the chat" feature lets you ask questions about products and receive AI-powered audio responses.

Read full article →
3

At his OpenAI trial, Musk relitigates an old friendship

It's a story Musk has told before -- in interviews and to author Walter Isaacson for his bestselling biography of Musk -- but Tuesday was the first time he said it under oath.

Read full article →

AI News

1

GPT-5.5 is OpenAI’s most capable agentic AI model yet–at twice the API price

OpenAI launched GPT-5.5 on April 23 as what it calls “a new class of intelligence for real work and powering agents,” and the framing is deliberate. OpenAI says it’s the most capable agentic AI model to date, built from…

Read full article →
2

IBM launches AI platform Bob to regulate SDLC costs

To regulate software delivery costs and SDLC governance, IBM is launching Bob, an AI platform built to anchor enterprise engineering. Accumulated technical debt, hybrid cloud structures, and rigid compliance requirements…

Read full article →
3

The evolution of encoders: From simple models to multimodal AI

When people talk about artificial intelligence, they usually focus on what it produces: Human-like text, stunning images, or eerily accurate recommendations. What rarely gets attention is how AI understands anything in t…

Read full article →

Import AI

1

Import AI 454: Automating alignment research; safety study of a Chinese model; HiFloat4

At what point do the financial markets price in the singularity?

Read full article →
2

Import AI 453: Breaking AI agents; MirrorCode; and ten views on gradual disempowerment

Was fire equivalent to a singularity for people at the time?

Read full article →
3

Import AI 452: Scaling laws for cyberwar; rising tides of AI automation; and a puzzle over gDP forecasting

How much could AI revolutionize the economy?

Read full article →

Google DeepMind

1

Announcing our partnership with the Republic of Korea

Google DeepMind and Korea partner to accelerate scientific breakthroughs using frontier AI models

Read full article →
2

Decoupled DiLoCo: A new frontier for resilient, distributed AI training

Read full article →
3

Partnering with industry leaders to accelerate AI transformation

Google DeepMind partners with global consultancies to bring the power of frontier AI to organizations around the world.

Read full article →

NVIDIA AI Blog

1

NVIDIA Launches Nemotron 3 Nano Omni Model, Unifying Vision, Audio and Language for up to 9x More Efficient AI Agents

AI agent systems today juggle separate models for vision, speech and language — losing time and context as they pass data from one model to the other. Unveiled today, NVIDIA Nemotron 3 Nano Omni is an open multimodal mod…

Read full article →
2

Into the Omniverse: Manufacturing’s Simulation-First Era Has Arrived

Manufacturing’s traditional design-build-test cycle rested on a single assumption: Real-world testing was the only reliable test environment.

Read full article →
3

OpenAI’s New GPT-5.5 Powers Codex on NVIDIA Infrastructure — and NVIDIA Is Already Putting It to Work

AI agents have revolutionized developer workflows, and their next frontier is knowledge work: processing information, solving complex problems, coming up with new ideas and driving innovation. Codex, OpenAI’s agentic cod…

Read full article →

MIT Technology Review AI

1

Elon Musk and Sam Altman are going to court over OpenAI’s future

After a yearslong legal feud, Elon Musk and OpenAI CEO Sam Altman are heading to trial this week in Northern California in a case that could have sweeping consequences. Ahead of OpenAI’s highly anticipated IPO, the court…

Read full article →
2

The missing step between hype and profit

This story originally appeared in The Algorithm, our weekly newsletter on AI. To get stories like this in your inbox first, sign up here. In February, I picked up a flyer at an anti-AI march in London. I can’t say for su…

Read full article →
3

Rebuilding the data stack for AI

Artificial intelligence may be dominating boardroom agendas, but many enterprises are discovering that the biggest obstacle to meaningful adoption is the state of their data. While consumer-facing AI tools have dazzled u…

Read full article →

Wired AI

1

When Robots Have Their ChatGPT Moment, Remember These Pincers

From sorting chicken nuggets to screwing in light bulbs, Eka’s robots are eerily lifelike. But do they have real physical smarts?

Read full article →
2

How AI Could Help Combat Antibiotic Resistance

At WIRED Health, British surgeon Ara Darzi said AI is set to transform the diagnosis and treatment of drug-resistant infections. But a lack of incentives means innovation may not reach patients.

Read full article →
3

OpenAI Really Wants Codex to Shut Up About Goblins

“Never talk about goblins, gremlins, raccoons, trolls, ogres, pigeons, or other animals or creatures unless it is absolutely and unambiguously relevant,” reads OpenAI’s coding agent instructions.

Read full article →

Ars Technica AI

1

Humanoid robots start sorting luggage in Tokyo airport test amid labor shortage

Humanoid robots could load cargo and clean aircraft cabins at Haneda Airport.

Read full article →
2

GitHub will start charging Copilot users based on their actual AI usage

GitHub says it can no longer absorb "escalating inference cost" from it heaviest AI users.

Read full article →
3

The great American data center divide

Many rural communities are viscerally opposed to AI infrastructure.

Read full article →

The Guardian Technology

1

‘They’re supposed to be handmade’: zine creators fight to resist AI influence

Artists and writers argue scrappy nature of self-published booklets is incompatible with artificial intelligenceThe self-published zine has long been central to cultural revolutions, from queer activism to Black feminism…

Read full article →
2

MacBook Pro M5 review: serious power, still long battery life

Apple laptop sets new performance bar with more storage, new chips and plenty of options, but now has two-tier specs depending on processorApple’s Macs have been on a roll this year with the brand new budget MacBook Neo…

Read full article →
3

Humanoid robots to become baggage handlers in Japan airport experiment

Japan Airlines will introduce the robots for trial run at a Tokyo airport amid country’s surge in inbound tourism and worsening labour shortagesJapan’s famously conscientious but overburdened baggage handlers will soon b…

Read full article →
🏢

Vendor Security

Mandiant Threat Intel

1

Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever

Critical

Introduction Advances in AI model-powered exploitation have demonstrated that general-purpose AI models can excel at vulnerability discovery, even without being purpose-built for the task. Eventually, capabilities such a…

Read full article →
2

Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite

Critical

Written by: JP Glab, Tufail Ahmed, Josh Kelley, Muhammad Umair Introduction Google Threat Intelligence Group (GTIG) identified a multistage intrusion campaign by a newly tracked threat group, UNC6692, that leveraged pers…

Read full article →
3

The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape

Critical

Written by: Jamie Collier, Robin Grunewald Germany has reclaimed its position as a primary focus for cyber extortion in Europe. While data leak site (DLS) posts rose almost 50% globally in 2025, Google Threat Intelligenc…

Read full article →

Rapid7 Blog

1

Metasploit Wrap-Up 04/25/2026

Critical

Check Method VisibilityMetasploit has supported check methods for many years now. It’s not always desirable to jump straight into exploiting a vulnerability but instead to determine if the target is vulnerable. Metasploi…

Read full article →
2

MDR Selection is a Partnership Decision

Critical

Managed Detection and Response (MDR) is a cybersecurity service that combines human expertise and technology to detect, investigate, and respond to threats 24/7.I write this as a Field CISO at Rapid7, but also as someone…

Read full article →
3

Get Motivated: What to Expect from Our Keynote at Rapid7's Global Cybersecurity Summit

Medium

Security teams prepare for incidents every day. Alerts are tuned, playbooks are built, and processes are tested. But when something actually happens, the challenge shifts. It becomes not just about making decisions under…

Read full article →

GitHub Security Blog

1

Securing the git push pipeline: Responding to a critical remote code execution vulnerability

Critical

How we validated, fixed, and investigated a critical vulnerability in under two hours, and confirmed no exploitation. The post Securing the git push pipeline: Responding to a critical remote code execution vulnerability…

Read full article →
2

Hack the AI agent: Build agentic AI security skills with the GitHub Secure Code Game

Medium

Learn to find and exploit real-world agentic AI vulnerabilities through five progressive challenges in this free, open source game that over 10,000 developers have already used to sharpen their security skills. The post…

Read full article →
3

How exposed is your code? Find out in minutes—for free

Medium

The new Code Security Risk Assessment gives you a one-click view of vulnerabilities across your organization, at no cost. The post How exposed is your code? Find out in minutes—for free appeared first on The GitHub Blog.

Read full article →

Check Point Research

1

VECT: Ransomware by design, Wiper by accident

Critical

Key Takeaways Background VECT Ransomware is a Ransomware-as-a-Service (RaaS) program that made its first appearance in December 2025 on a Russian-language cybercrime forum. After claiming their first two victims in Janua…

Read full article →
2

20th April – Threat Intelligence Report

Critical

For the latest discoveries in cyber research for the week of 20th April, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Booking.com, the Amsterdam-based travel platform, has confirmed a data b…

Read full article →
3

27th April – Threat Intelligence Report

High

For the latest discoveries in cyber research for the week of 27th April, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Vercel, a frontend cloud platform, has disclosed a security incident lin…

Read full article →

Palo Alto Unit 42

1

The npm Threat Landscape: Attack Surface and Mitigations

Critical

Unit 42 analyzes npm supply chain evolution post-Shai Hulud. Discover wormable malware, CI/CD persistence, multi-stage attacks and more. The post The npm Threat Landscape: Attack Surface and Mitigations appeared first on…

Read full article →
2

TGR-STA-1030: New Activity in Central and South America

Unit 42 research reports that TGR-STA-1030 remains an active threat, particularly in Central and South America. The post TGR-STA-1030: New Activity in Central and South America appeared first on Unit 42.

Read full article →
3

Frontier AI and the Future of Defense: Your Top Questions Answered

What are the next steps for security leaders in this new age of frontier AI? We answer the top 10 questions customers are asking. The post Frontier AI and the Future of Defense: Your Top Questions Answered appeared first…

Read full article →

Kaspersky Securelist

1

PhantomRPC: A new privilege escalation technique in Windows RPC

High

Kaspersky researcher discovered a vulnerability in RPC architecture that enables an attacker to create a fake RPC server and escalate their privileges.

Read full article →
2

Threat landscape for industrial automation systems in Q4 2025

Medium

The report contains industrial threat statistics for Q4 2025. It covers various infection vectors and malware types, as well as regional statistics and statistics by industry.

Read full article →
3

FakeWallet crypto stealer spreading through iOS apps in the App Store

In March 2026, we uncovered more than twenty phishing apps in the Apple App Store masquerading as popular crypto wallets.

Read full article →

AWS Security

1

Optimize security operations through an AWS Security Hub POC

High

April 27, 2026: This post was first published in September 2025 when the enhanced AWS Security Hub was in public preview. It has since been updated to reflect the general availability of Security Hub. This revision also…

Read full article →
2

What the March 2026 Threat Technique Catalog update means for your AWS environment

Medium

The AWS Customer Incident Response Team (AWS CIRT) regularly encounters patterns that repeat across their engagements when helping customers respond to security incidents. We’re passionate about making sure that informat…

Read full article →
3

Access control with IAM Identity Center session tags

As organizations expand their Amazon Web Services (AWS) footprint, managing secure, scalable, and cost-efficient access across multiple accounts becomes increasingly important. AWS IAM Identity Center offers a centralize…

Read full article →

Microsoft Threat Intel

1

Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise

High

The Microsoft Defender Security Research Team uncovered a sophisticated macOS intrusion campaign attributed to the North Korean threat actor Sapphire Sleet that abuses user driven execution and social engineering to bypa…

Read full article →
2

Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees

High

Microsoft Incident Response – Detection and Response Team (DART) researchers observed an emerging, financially motivated threat actor, tracked as Storm-2755, compromising Canadian employee accounts to gain unauthorized a…

Read full article →
3

SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks

High

Executive summary Forest Blizzard, a threat actor linked to the Russian military, has been compromising insecure home and small-office internet equipment like routers, then modifying their settings in ways that turn them…

Read full article →

SentinelOne Labs

1

LABScon25 Replay | Are Your Chinese Cameras Spying For You Or On You?

High

Marc Rogers and Silas Cutler expose how cheap smart home devices conceal a shadow supply chain of shell companies, firmware flaws, and foreign data routing.

Read full article →
2

Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis

Medium

Single-tool LLM analysis produces reports that look authoritative but aren't. A serial consensus pipeline catches artifacts and hallucinations at source.

Read full article →
3

fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet

A previously unknown 2005 cyber sabotage framework patches high-precision calculation software in memory to silently corrupt results.

Read full article →

Microsoft Security

1

Simplifying AWS defense with Microsoft Sentinel UEBA

Medium

Learn how Microsoft Sentinel UEBA helps defenders distinguish benign AWS activity from attacker behavior by enriching raw CloudTrail logs with clear, binary behavioral signals derived from baseline user, peer, and device…

Read full article →
2

AI-powered defense for an AI-accelerated threat landscape

Read how Microsoft is partnering with Anthropic and broader industry to use leading models, paired with our platforms and expertise, to turn AI-driven discovery into protection at scale. The post AI-powered defense for a…

Read full article →
3

Detection strategies across cloud and identities against infiltrating IT workers

The shift to remote and hybrid work since the pandemic expanded global hiring and accelerated digital onboarding, increasing reliance on online identity verification and remote access. The post Detection strategies acros…

Read full article →

Cisco Talos

1

AI-powered honeypots: Turning the tables on malicious AI agents

Just as AI brings time-saving advantages to our lives, it brings similar advantages to threat actors. We can take the advantage back. This blog shows how generative AI can be used to rapidly deploy adaptive honeypot syst…

Read full article →
2

Five defender priorities from the Talos Year in Review

With attackers moving faster than ever, it’s easy to feel overwhelmed. This blog breaks down five practical priorities from the Cisco Talos 2025 Year in Review to help defenders focus and prioritize, amidst all the noise…

Read full article →
3

It pays to be a forever student

In this newsletter, Joe discusses why understanding other disciplines can often flow back into the macro and micro of cybersecurity, especially in a world of AI.

Read full article →

Proofpoint Threat Insight

1

Proofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in Place

Read full article →
2

Proofpoint CEO on AI Security Innovations | Nasdaq at RSAC 2026

Read full article →
3

Clear market trend for software providers to help with AI: Proofpoint CEO

Read full article →

OpenAI News

1

OpenAI models, Codex, and Managed Agents come to AWS

OpenAI GPT models, Codex, and Managed Agents are now available on AWS, enabling enterprises to build secure AI in their AWS environments.

Read full article →
2

Our commitment to community safety

Learn how OpenAI protects community safety in ChatGPT through model safeguards, misuse detection, policy enforcement, and collaboration with safety experts.

Read full article →
3

OpenAI available at FedRAMP Moderate

OpenAI is available at FedRAMP Moderate authorization for ChatGPT Enterprise and the OpenAI API, enabling secure AI adoption for U.S. federal agencies.

Read full article →

Google Cloud Security

No articles available.

Google Threat Analysis (TAG)

1

TAG Bulletin: Q4 2025

An overview of coordinated influence operation campaigns terminated on our platforms in Q4 2025.

Read full article →
2

TAG Bulletin: Q3 2025

Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q3 2025.

Read full article →
3

TAG Bulletin: Q2 2025

Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q2 2025.

Read full article →

CrowdStrike Blog

1

CrowdStrike Expands ChatGPT Enterprise Integration with Enhanced Audit Logging and Activity Monitoring

Read full article →
2

CrowdStrike Named a Leader in Frost & Sullivan 2026 Radar for Cloud-Native Application Protection Platforms

Read full article →
3

CrowdStrike Expands Real-Time Cloud Detection and Response to Google Cloud

Read full article →

IBM Security Intelligence

No articles available.