Top Stories by Impact

🏢 Mandiant Threat Intel Critical

Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever

Introduction Advances in AI model-powered exploitation have demonstrated that general-purpose AI models can excel at vulnerability discovery, even without being purpose-built for t…

Read full article →
🏢 Rapid7 Blog Critical

CVE-2026-41940: cPanel & WHM Authentication Bypass

OverviewOn April 28, 2026, cPanel issued a security update to fix a critical vulnerability affecting the cPanel & WHM and WP Squared products. In the cPanel release notes, the bug…

Read full article →
🏢 Mandiant Threat Intel Critical

Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite

Written by: JP Glab, Tufail Ahmed, Josh Kelley, Muhammad Umair Introduction Google Threat Intelligence Group (GTIG) identified a multistage intrusion campaign by a newly tracked th…

Read full article →
🔐 Krebs on Security Critical

Patch Tuesday, April 2026 Edition

Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-d…

Read full article →
🏢 Mandiant Threat Intel Critical

The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape

Written by: Jamie Collier, Robin Grunewald Germany has reclaimed its position as a primary focus for cyber extortion in Europe. While data leak site (DLS) posts rose almost 50% glo…

Read full article →
🔐 CISA Alerts Critical

ABB AWIN Gateways

View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to remotely reboot the device or complete an unauthenticated query to reveal system confi…

Read full article →
🔐 CISA Alerts Critical

ABB Ability OPTIMAX

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to bypass user authentication on OPTIMAX installations that make use of the Azure Active Dir…

Read full article →
🔐 CISA Alerts Critical

ABB PCM600

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to send specially crafted messages to the system node resulting in execution of arbitrary co…

Read full article →
🔐

Cybersecurity

Krebs on Security

1

Patch Tuesday, April 2026 Edition

Critical

Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in…

Read full article →
2

Anti-DDoS Firm Heaped Attacks on Brazilian ISPs

High

A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other networ…

Read full article →
3

‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty

A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series o…

Read full article →

CISA Alerts

1

ABB AWIN Gateways

Critical

View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to remotely reboot the device or complete an unauthenticated query to reveal system configuration, including sensitive details. T…

Read full article →
2

ABB Ability OPTIMAX

Critical

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to bypass user authentication on OPTIMAX installations that make use of the Azure Active Directory Single-Sign On integration. The f…

Read full article →
3

ABB PCM600

Critical

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to send specially crafted messages to the system node resulting in execution of arbitrary code. The following versions of ABB PCM600…

Read full article →

CyberScoop

1

cPanel’s authentication bypass bug is being exploited in the wild, CISA warns

Critical

The agency added the flaw to the KEV list days after hosting providers confirmed active, ongoing attacks. The post cPanel’s authentication bypass bug is being exploited in the wild, CISA warns appeared first on CyberScoo…

Read full article →
2

FCC tightens KYC rules for telecoms, closes loophole for banned foreign services

The commission wants telecoms to do more to verify their callers and prevent illegal calls and scams from reaching Americans. The post FCC tightens KYC rules for telecoms, closes loophole for banned foreign services appe…

Read full article →
3

Congress kicks the can down the road on surveillance law (again)

It’s the second extension of Section 702 of the Foreign Intelligence Surveillance Act in 10 days, and a regular ritual for the Hill. The post Congress kicks the can down the road on surveillance law (again) appeared firs…

Read full article →

The Hacker News

1

PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials

Critical

In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct credential theft. According to Aikido Security, OX Secu…

Read full article →
2

New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

High

Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities to establish persistent access and harvest a wide range of sensitive informatio…

Read full article →
3

ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

Medium

The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some developers are accidentally downloading tools that peek into their private files dur…

Read full article →

Schneier on Security

1

Claude Mythos Has Found 271 Zero-Days in Firefox

High

That’s a lot. No, it’s an extraordinary number: Since February, the Firefox team has been working around the clock using frontier AI models to find and fix latent security vulnerabilities in the browser. We wrote previou…

Read full article →
2

What Anthropic’s Mythos Means for the Future of Cybersecurity

Medium

Two weeks ago, Anthropic announced that its new model, Claude Mythos Preview, can autonomously find and weaponize software vulnerabilities, turning them into working exploits without expert guidance. These were vulnerabi…

Read full article →
3

Fast16 Malware

Medium

Researchers have reverse-engineered a piece of malware named Fast16. It’s almost certainly state-sponsored, probably US in origin, and was deployed against Iran years before Stuxnet: “…the Fast16 malware was designed to…

Read full article →

Dark Reading

1

Another AI-Assisted Software Scan Yields 9-Year-Old Linux Bug

High

The proof-of-concept exploit code runs only 10 lines long, but luckily, a patch is already available.

Read full article →
2

TeamPCP Hits SAP Packages With 'Mini Shai-Hulud' Attack

High

Several npm packages for SAP's cloud application development ecosystem have been compromised as TeamPCP's supply chain attacks broaden.

Read full article →
3

Anthropic's Mythos Has Landed: Here's What Comes Next for Cyber

Medium

In this latest installment of the Reporters' Notebook video series, we discuss how the new AI model threatens to completely upend cybersecurity, and what industry leaders are telling the press.

Read full article →

Infosecurity Magazine

1

Deep#Door Python Backdoor Evades Detection On Windows

High

Deep#Door Python RAT uses tunneling and obfuscation to evade detection and steal credentials

Read full article →
2

CISA and Partners Publish Zero Trust Guidance For OT Security

Medium

A new CISA‑led guide explains how zero‑trust security can be applied to operational technology, balancing cyber defence with safety and system availability

Read full article →
3

Three Arrested for Hacking Over 610,000 Roblox Accounts

Suspects accused of distributing malware and selling access to stolen Roblox accounts on Russian marketplaces

Read full article →

Cybercrime Magazine

1

CISO Gap: SMBs Exposed; MSSPs To The Rescue

Medium

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 28, 2026 – Read the report Media outlets globally have been covering the 2026 CISO Report from Cybersecurity Ventures in collabo…

Read full article →
2

Benn Jordan, Musician, Scientist, and YouTuber on Flock Safety Cameras, Privacy & Surveillance

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 30, 2026 – Watch the YouTube video Flock Safety, an Atlanta, Ga.-based surveillance company, is facing increasing community push…

Read full article →
3

VanishID: Agentic AI-Powered Cybersecurity Protects C-Suite Executives

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 29, 2026 – Watch the YouTube video Executive risk management has evolved far beyond physical protection and travel security. Tod…

Read full article →

BleepingComputer

1

FBI links cybercriminals to sharp surge in cargo theft attacks

The U.S. Federal Bureau of Investigation (FBI) warned the transportation and logistics industry of a sharp rise in cyber-enabled cargo theft, with estimated losses in the United States and Canada reaching nearly $725 mil…

Read full article →
2

New Bluekit phishing service includes an AI assistant, 40 templates

A new phishing kit named Bluekit offers more than 40 templates targeting popular services and includes basic AI features for generating campaign drafts. [...]

Read full article →
3

Romanian leader of online swatting ring gets 4 years in prison

A Romanian national who led an online swatting ring that targeted more than 75 public officials, multiple journalists, and four religious institutions was sentenced to 4 years in federal prison. [...]

Read full article →

SANS Internet Storm Center

1

ISC Stormcast For Thursday, April 30th, 2026 https://isc.sans.edu/podcastdetail/9912, (Thu, Apr 30th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Read full article →
2

Danger of Libredtail [Guest Diary], (Wed, Apr 29th)

[This is a Guest Diary by James Roberts, an ISC intern as part of the SANS.edu BACS program]

Read full article →
3

Today's Odd Web Requests, (Wed, Apr 29th)

Today, two different "new" requests hit our honeypots. Both appear to be recon requests and not associated with specific vulnerabilities. But as always, please let me know if you have additional information

Read full article →
🤖

AI & Technology

ITNews Australia

1

cPanel drops patches for exploited authentication bypass zero-day

Critical

Detection script released to identify compromised systems.

Read full article →
2

Fed gov faces major M365 licensing change

As previously pooled arrangements cease under VSA6.

Read full article →
3

Bunnings' tech capability "incredibly underestimated"

Retailer's boss applauds the work of its CIOs.

Read full article →

VentureBeat AI

1

Railway secures $100 million to challenge AWS with AI-native cloud infrastructure

Critical

Railway, a San Francisco-based cloud platform that has quietly amassed two million developers without spending a dollar on marketing, announced Thursday that it raised $100 million in a Series B funding round, as surging…

Read full article →
2

Listen Labs raises $69M after viral billboard hiring stunt to scale AI customer interviews

High

Alfred Wahlforss was running out of options. His startup, Listen Labs, needed to hire over 100 engineers, but competing against Mark Zuckerberg's $100 million offers seemed impossible. So he spent $5,000 — a fifth of his…

Read full article →
3

Claude Code costs up to $200 a month. Goose does the same thing for free.

Medium

The artificial intelligence coding revolution comes with a catch: it's expensive.Claude Code, Anthropic's terminal-based AI agent that can write, debug, and deploy code autonomously, has captured the imagination of softw…

Read full article →

The Verge

1

Apple’s iPhone revenue jumps to $57 billion despite chip shortages

High

Apple's iPhone revenue jumped 22 percent to $57 billion over the past few months, despite supply chain issues impacting the device's processor. In an interview with Reuters, Apple CEO Tim Cook said iPhone "demand was off…

Read full article →
2

Roblox’s daily users continue to drop as age-checks slow growth

Roblox's daily active users continued to slip last quarter due in part to its rollout of age checks on its platform. According to its latest earnings report, Roblox currently has 132 million daily active users globally,…

Read full article →
3

Congress keeps kicking surveillance reform down the road

Congress has reauthorized Section 702 of the Foreign Intelligence Surveillance Act - but only for another 45 days. The extension is meant to give legislators more time to negotiate reforms to the controversial wiretappin…

Read full article →

TechCrunch AI

1

After dissing Anthropic for limiting Mythos, OpenAI restricts access to Cyber, too

High

OpenAI will begin rolling out its cybersecurity testing tool, GPT-5.5 Cyber only "to critical cyber defenders" at first.

Read full article →
2

OpenAI announces new advanced security for ChatGPT accounts, including a partnership with Yubico

OpenAI is launching additional opt-in protections for ChatGPT accounts. The new security initiative includes a new partnership with security key provider Yubico.

Read full article →
3

Legal AI startup Legora hits $5.6B valuation and its battle with Harvey just got hotter

The two wildly fast-growing rivals have raised massive sums, pushed into each other's home turf, and now have dueling ad campaigns.

Read full article →

Synced

1

Which Agent Causes Task Failures and When?Researchers from PSU and Duke explores automated failure attribution of LLM Multi-Agent Systems

High

In recent years, LLM Multi-Agent systems have garnered widespread attention for their collaborative approach to solving complex problems. However, it's a common scenario for these systems to fail at a task despite a flur…

Read full article →
2

MIT Researchers Unveil “SEAL”: A New Step Towards Self-Improving AI

Medium

MIT introduces SEAL, a framework enabling large language models to self-edit and update their weights via reinforcement learning. The post MIT Researchers Unveil “SEAL”: A New Step Towards Self-Improving AI first appeare…

Read full article →
3

ByteDance Introduces Astra: A Dual-Model Architecture for Autonomous Robot Navigation

ByteDance introduces Astra, an innovative dual-model architecture revolutionizing robot navigation in complex indoor environments. The post ByteDance Introduces Astra: A Dual-Model Architecture for Autonomous Robot Navig…

Read full article →

The Guardian Technology

1

Meet the AI jailbreakers: ‘I see the worst things humanity has produced’

High

To test the safety and security of AI, hackers have to trick large language models into breaking their own rules. It requires ingenuity and manipulation – and can come at a deep emotional costA few months ago, Valen Tagl…

Read full article →
2

‘They’re supposed to be handmade’: zine creators fight to resist AI influence

Artists and writers argue scrappy nature of self-published booklets is incompatible with artificial intelligenceThe self-published zine has long been central to cultural revolutions, from queer activism to Black feminism…

Read full article →
3

In the coming AI future, Britain must not end up at the mercy of US tech giants | Rafael Behr

Trump is volatile, capricious and unreasonable – but he belongs to the old world of analogue power. What comes next will be harder to manageDonald Trump is not impressed by soft power. He respects hard men with military…

Read full article →

MIT Technology Review AI

1

This startup’s new mechanistic interpretability tool lets you debug LLMs

Medium

The San Francisco–based startup Goodfire just released a new tool, called Silico, that lets researchers and engineers peer inside an AI model and adjust its parameters—the settings that determine a model’s behavior—durin…

Read full article →
2

Elon Musk and Sam Altman are going to court over OpenAI’s future

After a yearslong legal feud, Elon Musk and OpenAI CEO Sam Altman are heading to trial this week in Northern California in a case that could have sweeping consequences. Ahead of OpenAI’s highly anticipated IPO, the court…

Read full article →
3

The missing step between hype and profit

This story originally appeared in The Algorithm, our weekly newsletter on AI. To get stories like this in your inbox first, sign up here. In February, I picked up a flyer at an anti-AI march in London. I can’t say for su…

Read full article →

Wired AI

1

OpenAI Rolls Out ‘Advanced’ Security Mode for At-Risk Accounts

Medium

OpenAI is rolling out Advanced Account Security for people concerned that their ChatGPT or Codex accounts could be potential targets of phishing attacks.

Read full article →
2

Musk v. Altman Kicks Off, DOJ Guts Voting Rights Unit, and Is the AI Job Apocalypse Overhyped?

In this episode of Uncanny Valley, we get into how the Elon Musk-Sam Altman trial goes way beyond their rivalry and could have major implications both for OpenAI and also the AI industry at large.

Read full article →
3

Elon Musk Seemingly Admits xAI Has Used OpenAI’s Models to Train Its Own

While answering questions under oath, Musk argued it’s standard practice for AI labs to use their competitors’ models.

Read full article →

AI News

1

AI agent governance takes focus as regulators flag control gaps

Australia’s financial regulator has warned financial firms that AI agent governance and assurance practices are poorly governed. The warning comes as banks and superannuation trustees expand AI in internal and customer-f…

Read full article →
2

What LG and NVIDIA’s talks reveal about the future of physical AI

LG is currently engaged in exploratory discussions with NVIDIA concerning physical AI, data centres, and mobility. Following a meeting in Seoul between LG CEO Ryu Jae-cheol and Madison Huang, Senior Director of Product M…

Read full article →
3

A guide to APIs, MCPs, and MCP Gateways

APIs and MCPs are often mentioned in the same breath as ways that systems can exchange information, but they are designed differently and have different purposes. This article hopes to explain the differences and how sof…

Read full article →

NVIDIA AI Blog

1

It’s Gonna Be May: 16 Games Hit the Cloud This Month, With More NVIDIA GeForce RTX 5080 Power

[Editor’s note] The blog has been updated to note that GeForce RTX 5080-power expansion also extends to the Install-to-Play library. It’s gonna be May — and the cloud’s in full festival mode. 16 games are joining GeForce…

Read full article →
2

NVIDIA Launches Nemotron 3 Nano Omni Model, Unifying Vision, Audio and Language for up to 9x More Efficient AI Agents

AI agent systems today juggle separate models for vision, speech and language — losing time and context as they pass data from one model to the other. Unveiled today, NVIDIA Nemotron 3 Nano Omni is an open multimodal mod…

Read full article →
3

Nemotron Labs: What OpenClaw Agents Mean for Every Organization

By early 2026, the open source project OpenClaw had become a phenomenon. In January, its GitHub star count crossed 100,000 as developer interest surged.

Read full article →

Ars Technica AI

1

Meta cuts contractors who reported seeing Ray-Ban Meta users have sex

Meta said the Kenyan workers didn't "meet our standards."

Read full article →
2

Researchers try to cut the genetic code from 20 to 19 amino acids

Using AI tools, the team reworked part of the ribosome to need one less amino acid.

Read full article →
3

Elon Musk's 7 biggest stumbles on the stand at OpenAI trial

Elon Musk spent three days testifying as the first witness in his trial against OpenAI.

Read full article →

Import AI

1

Import AI 454: Automating alignment research; safety study of a Chinese model; HiFloat4

At what point do the financial markets price in the singularity?

Read full article →
2

Import AI 453: Breaking AI agents; MirrorCode; and ten views on gradual disempowerment

Was fire equivalent to a singularity for people at the time?

Read full article →
3

Import AI 452: Scaling laws for cyberwar; rising tides of AI automation; and a puzzle over gDP forecasting

How much could AI revolutionize the economy?

Read full article →

Google DeepMind

1

Enabling a new model for healthcare with AI co-clinician

Researching the path to AI-augmented care and development of an AI co-clinician.

Read full article →
2

Announcing our partnership with the Republic of Korea

Google DeepMind and Korea partner to accelerate scientific breakthroughs using frontier AI models

Read full article →
3

Decoupled DiLoCo: A new frontier for resilient, distributed AI training

Read full article →

ABC Technology (AU)

1

'Haven't taken it seriously': Calls for action on Australia's most deadly natural disaster

The agency set up by the Minns government just two years ago says extreme heat is the most deadly yet most preventable natural hazard facing Australians.

Read full article →
2

Abandoned homes and rising debt could force sales in outback mining city

In Mount Isa, nearly 50 properties, some abandoned, have accrued years of unpaid rates and could be forced to sale.

Read full article →
3

The algal bloom may be 'gone', but many are still grappling with the fall-out

While testing has shown a dramatic improvement in South Australia's algal bloom situation, industry and experts fear it won't be a quick recovery.

Read full article →
🏢

Vendor Security

Mandiant Threat Intel

1

Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever

Critical

Introduction Advances in AI model-powered exploitation have demonstrated that general-purpose AI models can excel at vulnerability discovery, even without being purpose-built for the task. Eventually, capabilities such a…

Read full article →
2

Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite

Critical

Written by: JP Glab, Tufail Ahmed, Josh Kelley, Muhammad Umair Introduction Google Threat Intelligence Group (GTIG) identified a multistage intrusion campaign by a newly tracked threat group, UNC6692, that leveraged pers…

Read full article →
3

The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape

Critical

Written by: Jamie Collier, Robin Grunewald Germany has reclaimed its position as a primary focus for cyber extortion in Europe. While data leak site (DLS) posts rose almost 50% globally in 2025, Google Threat Intelligenc…

Read full article →

Rapid7 Blog

1

CVE-2026-41940: cPanel & WHM Authentication Bypass

Critical

OverviewOn April 28, 2026, cPanel issued a security update to fix a critical vulnerability affecting the cPanel & WHM and WP Squared products. In the cPanel release notes, the bug was described as "an issue with session…

Read full article →
2

Experts on Experts: The 2026 Threat Landscape is Moving Faster than Defenders Expect

Critical

This week on Experts on Experts, I’m joined by Christiaan Beek, Rapid7’s VP of Threat Analytics, to talk through what we’re seeing in the 2026 threat landscape and how it connects to recent research coming out of Rapid7…

Read full article →
3

Five Things we Took Away from Gartner SRM Sydney 2026

High

At this year's Gartner Security and Risk Management Summit in Sydney, Rapid7 CISO Brian Castagna joined industry CISO Nigel Hedges for a fireside chat on the decisions security leaders are actually making right now. They…

Read full article →

GitHub Security Blog

1

Securing the git push pipeline: Responding to a critical remote code execution vulnerability

Critical

How we validated, fixed, and investigated a critical vulnerability in under two hours, and confirmed no exploitation. The post Securing the git push pipeline: Responding to a critical remote code execution vulnerability…

Read full article →
2

Hack the AI agent: Build agentic AI security skills with the GitHub Secure Code Game

Medium

Learn to find and exploit real-world agentic AI vulnerabilities through five progressive challenges in this free, open source game that over 10,000 developers have already used to sharpen their security skills. The post…

Read full article →
3

How exposed is your code? Find out in minutes—for free

Medium

The new Code Security Risk Assessment gives you a one-click view of vulnerabilities across your organization, at no cost. The post How exposed is your code? Find out in minutes—for free appeared first on The GitHub Blog.

Read full article →

Check Point Research

1

VECT: Ransomware by design, Wiper by accident

Critical

Key Takeaways Background VECT Ransomware is a Ransomware-as-a-Service (RaaS) program that made its first appearance in December 2025 on a Russian-language cybercrime forum. After claiming their first two victims in Janua…

Read full article →
2

20th April – Threat Intelligence Report

Critical

For the latest discoveries in cyber research for the week of 20th April, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Booking.com, the Amsterdam-based travel platform, has confirmed a data b…

Read full article →
3

27th April – Threat Intelligence Report

High

For the latest discoveries in cyber research for the week of 27th April, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Vercel, a frontend cloud platform, has disclosed a security incident lin…

Read full article →

Palo Alto Unit 42

1

The npm Threat Landscape: Attack Surface and Mitigations

Critical

Unit 42 analyzes npm supply chain evolution post-Shai Hulud. Discover wormable malware, CI/CD persistence, multi-stage attacks and more. The post The npm Threat Landscape: Attack Surface and Mitigations appeared first on…

Read full article →
2

TGR-STA-1030: New Activity in Central and South America

Unit 42 research reports that TGR-STA-1030 remains an active threat, particularly in Central and South America. The post TGR-STA-1030: New Activity in Central and South America appeared first on Unit 42.

Read full article →
3

Frontier AI and the Future of Defense: Your Top Questions Answered

What are the next steps for security leaders in this new age of frontier AI? We answer the top 10 questions customers are asking. The post Frontier AI and the Future of Defense: Your Top Questions Answered appeared first…

Read full article →

Kaspersky Securelist

1

PhantomRPC: A new privilege escalation technique in Windows RPC

High

Kaspersky researcher discovered a vulnerability in RPC architecture that enables an attacker to create a fake RPC server and escalate their privileges.

Read full article →
2

Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India

Medium

The Silver Fox group is targeting companies in Russia and India by impersonating tax authorities to distribute ValleyRAT and the new ABCDoor backdoor.

Read full article →
3

FakeWallet crypto stealer spreading through iOS apps in the App Store

In March 2026, we uncovered more than twenty phishing apps in the Apple App Store masquerading as popular crypto wallets.

Read full article →

Microsoft Threat Intel

1

Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise

High

The Microsoft Defender Security Research Team uncovered a sophisticated macOS intrusion campaign attributed to the North Korean threat actor Sapphire Sleet that abuses user driven execution and social engineering to bypa…

Read full article →
2

Email threat landscape: Q1 2026 trends and insights

High

In early 2026, email threats increased with a rise in credential phishing, QR code phishing, and CAPTCHA-gated campaigns, highlighted by Microsoft’s disruption of the Tycoon2FA phishing platform which led to a 15% volume…

Read full article →
3

Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees

High

Microsoft Incident Response – Detection and Response Team (DART) researchers observed an emerging, financially motivated threat actor, tracked as Storm-2755, compromising Canadian employee accounts to gain unauthorized a…

Read full article →

SentinelOne Labs

1

LABScon25 Replay | Are Your Chinese Cameras Spying For You Or On You?

High

Marc Rogers and Silas Cutler expose how cheap smart home devices conceal a shadow supply chain of shell companies, firmware flaws, and foreign data routing.

Read full article →
2

Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis

Medium

Single-tool LLM analysis produces reports that look authoritative but aren't. A serial consensus pipeline catches artifacts and hallucinations at source.

Read full article →
3

fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet

A previously unknown 2005 cyber sabotage framework patches high-precision calculation software in memory to silently corrupt results.

Read full article →

Microsoft Security

1

Email threat landscape: Q1 2026 trends and insights

High

In early 2026, email threats increased with a rise in credential phishing, QR code phishing, and CAPTCHA-gated campaigns, highlighted by Microsoft’s disruption of the Tycoon2FA phishing platform which led to a 15% volume…

Read full article →
2

What’s new, updated, or recently released in Microsoft Security

Medium

Stay ahead of emerging threats with Microsoft’s newest security innovations and updates, delivered through the In the Loop series. The post What’s new, updated, or recently released in Microsoft Security appeared first o…

Read full article →
3

8 best practices for CISOs conducting risk reviews

Embracing strong proactive security is something we can all do to mitigate our increased exposure to security threats. The post 8 best practices for CISOs conducting risk reviews appeared first on Microsoft Security Blog…

Read full article →

AWS Security

1

What the March 2026 Threat Technique Catalog update means for your AWS environment

Medium

The AWS Customer Incident Response Team (AWS CIRT) regularly encounters patterns that repeat across their engagements when helping customers respond to security incidents. We’re passionate about making sure that informat…

Read full article →
2

Designing trust and safety into Amazon Bedrock powered applications

Generative AI brings promising innovation, transforming how individuals and organizations approach everything from customer service to content creation and more. As AI continues to expand its capabilities, organizations…

Read full article →
3

Access control with IAM Identity Center session tags

As organizations expand their Amazon Web Services (AWS) footprint, managing secure, scalable, and cost-efficient access across multiple accounts becomes increasingly important. AWS IAM Identity Center offers a centralize…

Read full article →

Cisco Talos

1

AI-powered honeypots: Turning the tables on malicious AI agents

Just as AI brings time-saving advantages to our lives, it brings similar advantages to threat actors. We can take the advantage back. This blog shows how generative AI can be used to rapidly deploy adaptive honeypot syst…

Read full article →
2

Five defender priorities from the Talos Year in Review

With attackers moving faster than ever, it’s easy to feel overwhelmed. This blog breaks down five practical priorities from the Cisco Talos 2025 Year in Review to help defenders focus and prioritize, amidst all the noise…

Read full article →
3

Great responsibility, without great power

In this week’s newsletter, Hazel uses International Superhero Day as a springboard to explore why empathy — rather than just technical prowess — is the most essential, underrated superpower for navigating the human side…

Read full article →

Proofpoint Threat Insight

1

Proofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in Place

Read full article →
2

Proofpoint CEO on AI Security Innovations | Nasdaq at RSAC 2026

Read full article →
3

Clear market trend for software providers to help with AI: Proofpoint CEO

Read full article →

OpenAI News

1

Introducing Advanced Account Security

Introducing Advanced Account Security: phishing-resistant login, stronger recovery, and enhanced protections to safeguard sensitive data and prevent account takeover.

Read full article →
2

Where the goblins came from

How goblin outputs spread in AI models: timeline, root cause, and fixes behind personality-driven quirks in GPT-5 behavior.

Read full article →
3

Building the compute infrastructure for the Intelligence Age

OpenAI scales Stargate to build the compute infrastructure powering AGI, adding new data center capacity to meet growing AI demand.

Read full article →

Google Cloud Security

No articles available.

Google Threat Analysis (TAG)

1

TAG Bulletin: Q4 2025

An overview of coordinated influence operation campaigns terminated on our platforms in Q4 2025.

Read full article →
2

TAG Bulletin: Q3 2025

Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q3 2025.

Read full article →
3

TAG Bulletin: Q2 2025

Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q2 2025.

Read full article →

CrowdStrike Blog

1

CrowdStrike Expands ChatGPT Enterprise Integration with Enhanced Audit Logging and Activity Monitoring

Read full article →
2

CrowdStrike Named a Leader in Frost & Sullivan 2026 Radar for Cloud-Native Application Protection Platforms

Read full article →
3

CrowdStrike Expands Real-Time Cloud Detection and Response to Google Cloud

Read full article →

IBM Security Intelligence

No articles available.