Top Stories by Impact

🏢 Mandiant Threat Intel Critical

Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever

Introduction Advances in AI model-powered exploitation have demonstrated that general-purpose AI models can excel at vulnerability discovery, even without being purpose-built for t…

Read full article →
🏢 Rapid7 Blog Critical

CVE-2026-41940: cPanel & WHM Authentication Bypass

OverviewOn April 28, 2026, cPanel issued a security update to fix a critical vulnerability affecting the cPanel & WHM and WP Squared products. In the cPanel release notes, the bug…

Read full article →
🏢 Mandiant Threat Intel Critical

Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite

Written by: JP Glab, Tufail Ahmed, Josh Kelley, Muhammad Umair Introduction Google Threat Intelligence Group (GTIG) identified a multistage intrusion campaign by a newly tracked th…

Read full article →
🔐 Krebs on Security Critical

Patch Tuesday, April 2026 Edition

Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-d…

Read full article →
🏢 Mandiant Threat Intel Critical

The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape

Written by: Jamie Collier, Robin Grunewald Germany has reclaimed its position as a primary focus for cyber extortion in Europe. While data leak site (DLS) posts rose almost 50% glo…

Read full article →
🔐 CISA Alerts Critical

NSA GRASSMARLIN

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to disclose sensitive information. The following versions of NSA GRASSMARLIN are affected: G…

Read full article →
🏢 Rapid7 Blog Critical

Experts on Experts: The 2026 Threat Landscape is Moving Faster than Defenders Expect

This week on Experts on Experts, I’m joined by Christiaan Beek, Rapid7’s VP of Threat Analytics, to talk through what we’re seeing in the 2026 threat landscape and how it connects…

Read full article →
🔐 CISA Alerts Critical

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2024-1708 ConnectWise ScreenConnect Path…

Read full article →
🔐

Cybersecurity

Krebs on Security

1

Patch Tuesday, April 2026 Edition

Critical

Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in…

Read full article →
2

Russia Hacked Routers to Steal Microsoft Office Tokens

High

Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign…

Read full article →
3

‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty

A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series o…

Read full article →

CISA Alerts

1

NSA GRASSMARLIN

Critical

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to disclose sensitive information. The following versions of NSA GRASSMARLIN are affected: GRASSMARLIN vers:all/* CVSS Vendor Equipm…

Read full article →
2

CISA Adds Two Known Exploited Vulnerabilities to Catalog

Critical

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2024-1708 ConnectWise ScreenConnect Path Traversal Vulnerability CVE-2026-32202 M…

Read full article →
3

Adapting Zero Trust Principles to Operational Technology

Critical

Adapting Zero Trust Principles to Operational Technology CISA, in coordination with the Department of War, Department of Energy, Federal Bureau of Investigation, and Department of State, released Adapting Zero Trust Prin…

Read full article →

Dark Reading

1

Vect 2.0 Ransomware Acts as Wiper, Thanks to Design Error

Critical

The emerging ransomware has been deployed against victims of the TeamPCP supply chain attacks, but organizations should think twice before paying for a decryptor.

Read full article →
2

AI Finds 38 Security Flaws in Electronic Health Record Platform

High

Flaws in OpenEMR's platform — used by more than 100,000 healthcare providers — enabled database compromise, remote code execution, and data theft.

Read full article →
3

Reverse Engineering With AI Unearths High-Severity GitHub Bug

Medium

Wiz used an AI reverse-engineering tool to pinpoint a vulnerability that previously would have been too costly and time-consuming to undertake.

Read full article →

BleepingComputer

1

Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining

Critical

Hackers are exploiting two authentication bypass vulnerabilities in the Qinglong open-source task scheduling tool to deploy cryptominers on developers' servers. [...]

Read full article →
2

Hackers arrested for hijacking and selling 610,000 Roblox accounts

Medium

The Ukrainian police have arrested three individuals who hacked more than 610,000 Roblox gaming accounts and sold them for a profit of $225,000. [...]

Read full article →
3

Popular WordPress redirect plugin hid dormant backdoor for years

Medium

The Quick Page/Post Redirect plugin, installed on more than 70,000 WordPress sites, had a backdoor added five years ago that allows injecting arbitrary code into users' sites. [...]

Read full article →

The Hacker News

1

SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

Critical

Cybersecurity researchers are sounding the alarm about a new supply chain attack campaign targeting SAP-related npm Packages with credential-stealing malware. According to reports from Aikido Security, SafeDep, Socket, S…

Read full article →
2

Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks

High

In February 2026, researchers uncovered a shift that completely changed the game: threat actors are now using custom AI setups to automate attacks directly into the kill chain. We aren't just talking about AI writing bet…

Read full article →
3

New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs

High

Cybersecurity researchers have discovered malicious code in an npm package after a malicious package as a dependency to the project by Anthropic's Claude Opus large language model (LLM). The package in question is "@vali…

Read full article →

Schneier on Security

1

Claude Mythos Has Found 271 Zero-Days in Firefox

High

That’s a lot. No, it’s an extraordinary number: Since February, the Firefox team has been working around the clock using frontier AI models to find and fix latent security vulnerabilities in the browser. We wrote previou…

Read full article →
2

What Anthropic’s Mythos Means for the Future of Cybersecurity

Medium

Two weeks ago, Anthropic announced that its new model, Claude Mythos Preview, can autonomously find and weaponize software vulnerabilities, turning them into working exploits without expert guidance. These were vulnerabi…

Read full article →
3

Medieval Encrypted Letter Decoded

Sent by a Spanish diplomat. Apparently people have been working on it since it was rediscovered in 1860.

Read full article →

Infosecurity Magazine

1

Researchers Track 2.9 Billion Compromised Credentials

High

KELA claims infostealers remained the primary access vector for attacks in 2025

Read full article →
2

Cursor Extension Flaw Exposes Developer API Keys

Medium

Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX

Read full article →
3

Malicious npm Dependency Linked to AI Assisted Commit Targets Crypto Wallets

Researchers uncover a malicious npm dependency linked to an AI‑assisted code commit that steals sensitive data and exposes crypto wallets

Read full article →

CyberScoop

1

Congress, industry ponder government posture for protecting data centers

High

A hearing of the House Homeland Security panel’s cyber subcommittee weighed whether to designate data centers as a standalone critical infrastructure sector. The post Congress, industry ponder government posture for prot…

Read full article →
2

Spy agency officials say job loss anxiety, moving fast ‘safely’ among top challenges in AI workforce overhaul

While tech leaders think about how to strategically deploy AI tools to support human intelligence needs, rank and filers express concerns about their livelihoods. The post Spy agency officials say job loss anxiety, movin…

Read full article →
3

Federal CIO cautious on Anthropic’s Mythos despite planned rollout

Greg Barbaccia told CyberScoop that Anthropic's Mythos shows real promise for federal cyber defense, but warns that laboratory results and live network conditions are two very different things. The post Federal CIO cauti…

Read full article →

Cybercrime Magazine

1

CISO Gap: SMBs Exposed; MSSPs To The Rescue

Medium

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 28, 2026 – Read the report Media outlets globally have been covering the 2026 CISO Report from Cybersecurity Ventures in collabo…

Read full article →
2

VanishID: Agentic AI-Powered Cybersecurity Protects C-Suite Executives

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 29, 2026 – Watch the YouTube video Executive risk management has evolved far beyond physical protection and travel security. Tod…

Read full article →
3

Cybercrime Magazine YouTube Shorts On The History of Hacking

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 27, 2026 – Cybercrime Magazine YouTube Shorts The award-winning Cybercrime Magazine YouTube Channel, which has more than 1.2 mil…

Read full article →

SANS Internet Storm Center

1

Today's Odd Web Requests, (Wed, Apr 29th)

Today, two different "new" requests hit our honeypots. Both appear to be recon requests and not associated with specific vulnerabilities. But as always, please let me know if you have additional information

Read full article →
2

ISC Stormcast For Wednesday, April 29th, 2026 https://isc.sans.edu/podcastdetail/9910, (Wed, Apr 29th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Read full article →
3

HTTP Requests with X-Vercel-Set-Bypass-Cookie Header, (Tue, Apr 28th)

This weekend, we saw a few requests to our honeypot that included an "X-Vercel-Set-Bypass-Cookie" header. A sample request:

Read full article →
🤖

AI & Technology

VentureBeat AI

1

Railway secures $100 million to challenge AWS with AI-native cloud infrastructure

Critical

Railway, a San Francisco-based cloud platform that has quietly amassed two million developers without spending a dollar on marketing, announced Thursday that it raised $100 million in a Series B funding round, as surging…

Read full article →
2

Listen Labs raises $69M after viral billboard hiring stunt to scale AI customer interviews

High

Alfred Wahlforss was running out of options. His startup, Listen Labs, needed to hire over 100 engineers, but competing against Mark Zuckerberg's $100 million offers seemed impossible. So he spent $5,000 — a fifth of his…

Read full article →
3

Claude Code costs up to $200 a month. Goose does the same thing for free.

Medium

The artificial intelligence coding revolution comes with a catch: it's expensive.Claude Code, Anthropic's terminal-based AI agent that can write, debug, and deploy code autonomously, has captured the imagination of softw…

Read full article →

Synced

1

Which Agent Causes Task Failures and When?Researchers from PSU and Duke explores automated failure attribution of LLM Multi-Agent Systems

High

In recent years, LLM Multi-Agent systems have garnered widespread attention for their collaborative approach to solving complex problems. However, it's a common scenario for these systems to fail at a task despite a flur…

Read full article →
2

MIT Researchers Unveil “SEAL”: A New Step Towards Self-Improving AI

Medium

MIT introduces SEAL, a framework enabling large language models to self-edit and update their weights via reinforcement learning. The post MIT Researchers Unveil “SEAL”: A New Step Towards Self-Improving AI first appeare…

Read full article →
3

ByteDance Introduces Astra: A Dual-Model Architecture for Autonomous Robot Navigation

ByteDance introduces Astra, an innovative dual-model architecture revolutionizing robot navigation in complex indoor environments. The post ByteDance Introduces Astra: A Dual-Model Architecture for Autonomous Robot Navig…

Read full article →

The Guardian Technology

1

Meet the AI jailbreakers: ‘I see the worst things humanity has produced’

High

To test the safety and security of AI, hackers have to trick large language models into breaking their own rules. It requires ingenuity and manipulation – and can come at a deep emotional costA few months ago, Valen Tagl…

Read full article →
2

‘They’re supposed to be handmade’: zine creators fight to resist AI influence

Artists and writers argue scrappy nature of self-published booklets is incompatible with artificial intelligenceThe self-published zine has long been central to cultural revolutions, from queer activism to Black feminism…

Read full article →
3

In the coming AI future, Britain must not end up at the mercy of US tech giants | Rafael Behr

Trump is volatile, capricious and unreasonable – but he belongs to the old world of analogue power. What comes next will be harder to manageDonald Trump is not impressed by soft power. He respects hard men with military…

Read full article →

The Verge

1

Microsoft reports sinking Xbox revenue as its cloud business climbs

Medium

Microsoft's Xbox hardware revenue continues to tumble, with the company revealing a 33 percent decline as part of its earnings report released on Wednesday. Even though the rest of Microsoft's consumer-focused division t…

Read full article →
2

Grindr — yes, Grindr — won the WHCD party circuit

Hello and welcome to Regulator, a newsletter for Verge subscribers about technology, politics, and technology learning how to politick. If you're not a subscriber but would like to support our work, please subscribe here…

Read full article →
3

Splatoon Raiders preorders for the Switch 2 are nearly 20 percent off

Nintendo recently announced a new pricing policy, which knocks $10 off the cost of digital versions of future first-party titles exclusive to the Nintendo Switch 2. Splatoon Raiders, for instance, is available for preord…

Read full article →

ITNews Australia

1

Amadeus to buy French biometrics firm Idemia Public Security

Medium

For 1.2 billion euros.

Read full article →
2

Telstra not seeking to lock rivals out of mobile-to-satellite bands

SpaceX fears the carrier is seeking to dominate the remaining allocations.

Read full article →
3

In Pictures: Data sovereignty in the AI era - Synology roundtable

A selection of photos from a recent iTnews roundtable lunch at Aria restaurant in Sydney.

Read full article →

TechCrunch AI

1

Is AI video just a prequel? Runway’s CEO thinks world models are next

AI-generated video has gone from novelty to creative tool almost overnight, and Runway has a front row seat to the shift. The New York-based company has raised close to $860 million at a $5.3 billion valuation, and its m…

Read full article →
2

Google gains 25M subscriptions in Q1, driven by YouTube and Google One

Google added 25M paid subscriptions in Q1, reaching 350M total, as YouTube and Google One grow.

Read full article →
3

Parallel Web Systems hits $2B valuation five months after its last big raise

The AI agent-tool startup founded by former Twitter CEO Parag Agrawal has raised $100 million, led by Sequoia, months after raising a previous $100 million.

Read full article →

ABC Technology (AU)

1

Melbourne rush-hour chaos as hundreds of rail passengers left stranded

A rail equipment fault caused havoc on the V/Line Geelong Line on Wednesday night, with rail operators warning of more delays today.

Read full article →
2

Electrifying your home comes with savings, but conversion costs stopping many

A new report says the money consumers could save by converting from gas to electricity is set to increase over the coming decades, sparking calls for government regulation to encourage the switch.

Read full article →
3

Renewables and batteries drive down fossil fuel use despite record electricity demand

A hot summer saw Australians use record amounts of electricity, but the growing share of renewable energy continued to push fossil fuels out of the grid, driving gas generation to its lowest level in 25 years.

Read full article →

Wired AI

1

Taylor Swift Wants to Trademark Her Likeness. These TikTok Deepfake Ads Show Why

Researchers show scammers are using AI-manipulated footage of celebrity interviews to trick users into sharing their personal data.

Read full article →
2

Emergency First Responders Say Waymos Are Getting Worse

“I believe the technology was deployed too quickly in too vast amounts, with hundreds of vehicles, when it wasn’t really ready,” one police official told federal regulators last month.

Read full article →
3

Sanctioned Chinese AI Firm SenseTime Releases Image Model Built for Speed

With US restrictions limiting its access to advanced tech, SenseTime is doubling down on open source with a new model optimized to run on Chinese-made chips.

Read full article →

Ars Technica AI

1

Sam Altman is “the face of evil” for not reporting school shooter, says lawyer

Lawsuits: OpenAI didn't report ChatGPT user to cops to protect Altman, IPO.

Read full article →
2

OpenAI Codex system prompt includes explicit directive to "never talk about goblins"

Directions also include system instructions to act like "you have a vivid inner life."

Read full article →
3

Drone strikes on data centers spook Big Tech, halting Middle East projects

Uninsurable war damage is forcing tech companies to rethink Middle East plans.

Read full article →

AI News

1

IDC: How EMEA CIOs can jumpstart AI rollouts

Getting stalled enterprise AI rollouts in the EMEA region moving again will require CIOs to aggressively audit their systems. Over the past 18 months, AI deployments across Europe advanced far beyond initial testing. Com…

Read full article →
2

GPT-5.5 is OpenAI’s most capable agentic AI model yet

OpenAI launched GPT-5.5 on April 23 as what it calls “a new class of intelligence for real work and powering agents,” and the framing is deliberate. OpenAI says it’s the most capable agentic AI model to date, built from…

Read full article →
3

IBM launches AI platform Bob to regulate SDLC costs

To regulate software delivery costs and SDLC governance, IBM is launching Bob, an AI platform built to anchor enterprise engineering. Accumulated technical debt, hybrid cloud structures, and rigid compliance requirements…

Read full article →

Import AI

1

Import AI 454: Automating alignment research; safety study of a Chinese model; HiFloat4

At what point do the financial markets price in the singularity?

Read full article →
2

Import AI 453: Breaking AI agents; MirrorCode; and ten views on gradual disempowerment

Was fire equivalent to a singularity for people at the time?

Read full article →
3

Import AI 452: Scaling laws for cyberwar; rising tides of AI automation; and a puzzle over gDP forecasting

How much could AI revolutionize the economy?

Read full article →

Google DeepMind

1

Announcing our partnership with the Republic of Korea

Google DeepMind and Korea partner to accelerate scientific breakthroughs using frontier AI models

Read full article →
2

Decoupled DiLoCo: A new frontier for resilient, distributed AI training

Read full article →
3

Partnering with industry leaders to accelerate AI transformation

Google DeepMind partners with global consultancies to bring the power of frontier AI to organizations around the world.

Read full article →

NVIDIA AI Blog

1

NVIDIA Launches Nemotron 3 Nano Omni Model, Unifying Vision, Audio and Language for up to 9x More Efficient AI Agents

AI agent systems today juggle separate models for vision, speech and language — losing time and context as they pass data from one model to the other. Unveiled today, NVIDIA Nemotron 3 Nano Omni is an open multimodal mod…

Read full article →
2

Into the Omniverse: Manufacturing’s Simulation-First Era Has Arrived

Manufacturing’s traditional design-build-test cycle rested on a single assumption: Real-world testing was the only reliable test environment.

Read full article →
3

OpenAI’s New GPT-5.5 Powers Codex on NVIDIA Infrastructure — and NVIDIA Is Already Putting It to Work

AI agents have revolutionized developer workflows, and their next frontier is knowledge work: processing information, solving complex problems, coming up with new ideas and driving innovation. Codex, OpenAI’s agentic cod…

Read full article →

MIT Technology Review AI

1

Elon Musk and Sam Altman are going to court over OpenAI’s future

After a yearslong legal feud, Elon Musk and OpenAI CEO Sam Altman are heading to trial this week in Northern California in a case that could have sweeping consequences. Ahead of OpenAI’s highly anticipated IPO, the court…

Read full article →
2

The missing step between hype and profit

This story originally appeared in The Algorithm, our weekly newsletter on AI. To get stories like this in your inbox first, sign up here. In February, I picked up a flyer at an anti-AI march in London. I can’t say for su…

Read full article →
3

Rebuilding the data stack for AI

Artificial intelligence may be dominating boardroom agendas, but many enterprises are discovering that the biggest obstacle to meaningful adoption is the state of their data. While consumer-facing AI tools have dazzled u…

Read full article →
🏢

Vendor Security

Mandiant Threat Intel

1

Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever

Critical

Introduction Advances in AI model-powered exploitation have demonstrated that general-purpose AI models can excel at vulnerability discovery, even without being purpose-built for the task. Eventually, capabilities such a…

Read full article →
2

Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite

Critical

Written by: JP Glab, Tufail Ahmed, Josh Kelley, Muhammad Umair Introduction Google Threat Intelligence Group (GTIG) identified a multistage intrusion campaign by a newly tracked threat group, UNC6692, that leveraged pers…

Read full article →
3

The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape

Critical

Written by: Jamie Collier, Robin Grunewald Germany has reclaimed its position as a primary focus for cyber extortion in Europe. While data leak site (DLS) posts rose almost 50% globally in 2025, Google Threat Intelligenc…

Read full article →

Rapid7 Blog

1

CVE-2026-41940: cPanel & WHM Authentication Bypass

Critical

OverviewOn April 28, 2026, cPanel issued a security update to fix a critical vulnerability affecting the cPanel & WHM and WP Squared products. In the cPanel release notes, the bug was described as "an issue with session…

Read full article →
2

Experts on Experts: The 2026 Threat Landscape is Moving Faster than Defenders Expect

Critical

This week on Experts on Experts, I’m joined by Christiaan Beek, Rapid7’s VP of Threat Analytics, to talk through what we’re seeing in the 2026 threat landscape and how it connects to recent research coming out of Rapid7…

Read full article →
3

Get Motivated: What to Expect from Our Keynote at Rapid7's Global Cybersecurity Summit

Medium

Security teams prepare for incidents every day. Alerts are tuned, playbooks are built, and processes are tested. But when something actually happens, the challenge shifts. It becomes not just about making decisions under…

Read full article →

GitHub Security Blog

1

Securing the git push pipeline: Responding to a critical remote code execution vulnerability

Critical

How we validated, fixed, and investigated a critical vulnerability in under two hours, and confirmed no exploitation. The post Securing the git push pipeline: Responding to a critical remote code execution vulnerability…

Read full article →
2

Hack the AI agent: Build agentic AI security skills with the GitHub Secure Code Game

Medium

Learn to find and exploit real-world agentic AI vulnerabilities through five progressive challenges in this free, open source game that over 10,000 developers have already used to sharpen their security skills. The post…

Read full article →
3

How exposed is your code? Find out in minutes—for free

Medium

The new Code Security Risk Assessment gives you a one-click view of vulnerabilities across your organization, at no cost. The post How exposed is your code? Find out in minutes—for free appeared first on The GitHub Blog.

Read full article →

Check Point Research

1

VECT: Ransomware by design, Wiper by accident

Critical

Key Takeaways Background VECT Ransomware is a Ransomware-as-a-Service (RaaS) program that made its first appearance in December 2025 on a Russian-language cybercrime forum. After claiming their first two victims in Janua…

Read full article →
2

20th April – Threat Intelligence Report

Critical

For the latest discoveries in cyber research for the week of 20th April, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Booking.com, the Amsterdam-based travel platform, has confirmed a data b…

Read full article →
3

27th April – Threat Intelligence Report

High

For the latest discoveries in cyber research for the week of 27th April, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Vercel, a frontend cloud platform, has disclosed a security incident lin…

Read full article →

Palo Alto Unit 42

1

The npm Threat Landscape: Attack Surface and Mitigations

Critical

Unit 42 analyzes npm supply chain evolution post-Shai Hulud. Discover wormable malware, CI/CD persistence, multi-stage attacks and more. The post The npm Threat Landscape: Attack Surface and Mitigations appeared first on…

Read full article →
2

TGR-STA-1030: New Activity in Central and South America

Unit 42 research reports that TGR-STA-1030 remains an active threat, particularly in Central and South America. The post TGR-STA-1030: New Activity in Central and South America appeared first on Unit 42.

Read full article →
3

Frontier AI and the Future of Defense: Your Top Questions Answered

What are the next steps for security leaders in this new age of frontier AI? We answer the top 10 questions customers are asking. The post Frontier AI and the Future of Defense: Your Top Questions Answered appeared first…

Read full article →

Kaspersky Securelist

1

PhantomRPC: A new privilege escalation technique in Windows RPC

High

Kaspersky researcher discovered a vulnerability in RPC architecture that enables an attacker to create a fake RPC server and escalate their privileges.

Read full article →
2

Threat landscape for industrial automation systems in Q4 2025

Medium

The report contains industrial threat statistics for Q4 2025. It covers various infection vectors and malware types, as well as regional statistics and statistics by industry.

Read full article →
3

FakeWallet crypto stealer spreading through iOS apps in the App Store

In March 2026, we uncovered more than twenty phishing apps in the Apple App Store masquerading as popular crypto wallets.

Read full article →

Microsoft Threat Intel

1

Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise

High

The Microsoft Defender Security Research Team uncovered a sophisticated macOS intrusion campaign attributed to the North Korean threat actor Sapphire Sleet that abuses user driven execution and social engineering to bypa…

Read full article →
2

Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees

High

Microsoft Incident Response – Detection and Response Team (DART) researchers observed an emerging, financially motivated threat actor, tracked as Storm-2755, compromising Canadian employee accounts to gain unauthorized a…

Read full article →
3

SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks

High

Executive summary Forest Blizzard, a threat actor linked to the Russian military, has been compromising insecure home and small-office internet equipment like routers, then modifying their settings in ways that turn them…

Read full article →

SentinelOne Labs

1

LABScon25 Replay | Are Your Chinese Cameras Spying For You Or On You?

High

Marc Rogers and Silas Cutler expose how cheap smart home devices conceal a shadow supply chain of shell companies, firmware flaws, and foreign data routing.

Read full article →
2

Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis

Medium

Single-tool LLM analysis produces reports that look authoritative but aren't. A serial consensus pipeline catches artifacts and hallucinations at source.

Read full article →
3

fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet

A previously unknown 2005 cyber sabotage framework patches high-precision calculation software in memory to silently corrupt results.

Read full article →

OpenAI News

1

Cybersecurity in the Intelligence Age

High

OpenAI outlines a five-part action plan for strengthening cybersecurity in the Intelligence Age, focused on democratizing AI-powered cyber defense and protecting critical systems.

Read full article →
2

OpenAI models, Codex, and Managed Agents come to AWS

OpenAI GPT models, Codex, and Managed Agents are now available on AWS, enabling enterprises to build secure AI in their AWS environments.

Read full article →
3

Our commitment to community safety

Learn how OpenAI protects community safety in ChatGPT through model safeguards, misuse detection, policy enforcement, and collaboration with safety experts.

Read full article →

Microsoft Security

1

Simplifying AWS defense with Microsoft Sentinel UEBA

Medium

Learn how Microsoft Sentinel UEBA helps defenders distinguish benign AWS activity from attacker behavior by enriching raw CloudTrail logs with clear, binary behavioral signals derived from baseline user, peer, and device…

Read full article →
2

8 best practices for CISOs conducting risk reviews

Embracing strong proactive security is something we can all do to mitigate our increased exposure to security threats. The post 8 best practices for CISOs conducting risk reviews appeared first on Microsoft Security Blog…

Read full article →
3

AI-powered defense for an AI-accelerated threat landscape

Read how Microsoft is partnering with Anthropic and broader industry to use leading models, paired with our platforms and expertise, to turn AI-driven discovery into protection at scale. The post AI-powered defense for a…

Read full article →

AWS Security

1

What the March 2026 Threat Technique Catalog update means for your AWS environment

Medium

The AWS Customer Incident Response Team (AWS CIRT) regularly encounters patterns that repeat across their engagements when helping customers respond to security incidents. We’re passionate about making sure that informat…

Read full article →
2

Designing trust and safety into Amazon Bedrock powered applications

Generative AI brings promising innovation, transforming how individuals and organizations approach everything from customer service to content creation and more. As AI continues to expand its capabilities, organizations…

Read full article →
3

Access control with IAM Identity Center session tags

As organizations expand their Amazon Web Services (AWS) footprint, managing secure, scalable, and cost-efficient access across multiple accounts becomes increasingly important. AWS IAM Identity Center offers a centralize…

Read full article →

Cisco Talos

1

AI-powered honeypots: Turning the tables on malicious AI agents

Just as AI brings time-saving advantages to our lives, it brings similar advantages to threat actors. We can take the advantage back. This blog shows how generative AI can be used to rapidly deploy adaptive honeypot syst…

Read full article →
2

Five defender priorities from the Talos Year in Review

With attackers moving faster than ever, it’s easy to feel overwhelmed. This blog breaks down five practical priorities from the Cisco Talos 2025 Year in Review to help defenders focus and prioritize, amidst all the noise…

Read full article →
3

It pays to be a forever student

In this newsletter, Joe discusses why understanding other disciplines can often flow back into the macro and micro of cybersecurity, especially in a world of AI.

Read full article →

Proofpoint Threat Insight

1

Proofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in Place

Read full article →
2

Proofpoint CEO on AI Security Innovations | Nasdaq at RSAC 2026

Read full article →
3

Clear market trend for software providers to help with AI: Proofpoint CEO

Read full article →

Google Cloud Security

No articles available.

Google Threat Analysis (TAG)

1

TAG Bulletin: Q4 2025

An overview of coordinated influence operation campaigns terminated on our platforms in Q4 2025.

Read full article →
2

TAG Bulletin: Q3 2025

Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q3 2025.

Read full article →
3

TAG Bulletin: Q2 2025

Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q2 2025.

Read full article →

CrowdStrike Blog

1

CrowdStrike Expands ChatGPT Enterprise Integration with Enhanced Audit Logging and Activity Monitoring

Read full article →
2

CrowdStrike Named a Leader in Frost & Sullivan 2026 Radar for Cloud-Native Application Protection Platforms

Read full article →
3

CrowdStrike Expands Real-Time Cloud Detection and Response to Google Cloud

Read full article →

IBM Security Intelligence

No articles available.