Top Stories by Impact

🏢 Mandiant Threat Intel Critical

Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever

Introduction Advances in AI model-powered exploitation have demonstrated that general-purpose AI models can excel at vulnerability discovery, even without being purpose-built for t…

Read full article →
🏢 Rapid7 Blog Critical

CVE-2026-41940: cPanel & WHM Authentication Bypass

OverviewOn April 28, 2026, cPanel issued a security update to fix a critical vulnerability affecting the cPanel & WHM and WP Squared products. In the cPanel release notes, the bug…

Read full article →
🏢 Mandiant Threat Intel Critical

Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite

Written by: JP Glab, Tufail Ahmed, Josh Kelley, Muhammad Umair Introduction Google Threat Intelligence Group (GTIG) identified a multistage intrusion campaign by a newly tracked th…

Read full article →
🔐 Krebs on Security Critical

Patch Tuesday, April 2026 Edition

Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-d…

Read full article →
🏢 Mandiant Threat Intel Critical

The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape

Written by: Jamie Collier, Robin Grunewald Germany has reclaimed its position as a primary focus for cyber extortion in Europe. While data leak site (DLS) posts rose almost 50% glo…

Read full article →
🔐 The Hacker News Critical

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vul…

Read full article →
🔐 CISA Alerts Critical

ABB AWIN Gateways

View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to remotely reboot the device or complete an unauthenticated query to reveal system confi…

Read full article →
🏢 Rapid7 Blog Critical

Metasploit Wrap-Up 05/01/2026

MCP serverThis release our very own cdelafuente-r7 finished implementing the Metasploit MCP Server (msfmcpd), bringing Model Context Protocol support to Metasploit Framework. MCP l…

Read full article →
🔐

Cybersecurity

Krebs on Security

1

Patch Tuesday, April 2026 Edition

Critical

Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in…

Read full article →
2

Anti-DDoS Firm Heaped Attacks on Brazilian ISPs

High

A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other networ…

Read full article →
3

‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty

A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series o…

Read full article →

The Hacker News

1

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

Critical

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) catalog, citing evide…

Read full article →
2

30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign

High

A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a "phishing relay" to distribute phishing emails with an aim to compromise Facebook accounts. The activity has been codenamed Ac…

Read full article →
3

Trellix Confirms Source Code Breach With Unauthorized Repository Access

Medium

Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a "portion" of its source code. It said it "recently identified" the compromise of its source code repository and…

Read full article →

CISA Alerts

1

ABB AWIN Gateways

Critical

View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to remotely reboot the device or complete an unauthenticated query to reveal system configuration, including sensitive details. T…

Read full article →
2

CISA Adds One Known Exploited Vulnerability to Catalog

Critical

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-31431 Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability T…

Read full article →
3

Careful Adoption of Agentic AI Services

Medium

CISA, in collaboration with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and other international and U.S. partners, released guidance for organizations on adopting agentic artificial…

Read full article →

Schneier on Security

1

Claude Mythos Has Found 271 Zero-Days in Firefox

High

That’s a lot. No, it’s an extraordinary number: Since February, the Firefox team has been working around the clock using frontier AI models to find and fix latent security vulnerabilities in the browser. We wrote previou…

Read full article →
2

A Ransomware Negotiator Was Working for a Ransomware Gang

Medium

Someone pleaded guilty to secretly working for a ransomware gang as he negotiated ransomware payments for clients.

Read full article →
3

Fast16 Malware

Medium

Researchers have reverse-engineered a piece of malware named Fast16. It’s almost certainly state-sponsored, probably US in origin, and was deployed against Iran years before Stuxnet: “…the Fast16 malware was designed to…

Read full article →

Infosecurity Magazine

1

Nine-Year-Old Zero-Day Flaw in Linux Kernel Discovered by AI-Equipped Security Researcher

High

A researcher from offensive security firm Theori has found a nine-year-old flaw in the Linux kernel with the help of AI

Read full article →
2

Two American Cybersecurity Workers Jailed for BlackCat Ransomware Attacks

High

The cybersecurity workers used their knowledge and skills to conduct ransomware attacks for notorious gang, rather than protect victims against them

Read full article →
3

Anthropic Rolls Out Claude Security for AI Vulnerability Scanning

Medium

Claude Security enters public beta, giving enterprises AI driven code scanning with no API integration or custom agents required

Read full article →

BleepingComputer

1

Microsoft Defender wrongly flags DigiCert certs as Trojan:Win32/Cerdigent.A!dha

High

Microsoft Defender is detecting legitimate DigiCert root certificates as Trojan:Win32/Cerdigent.A!dha, resulting in widespread false-positive alerts, and in some cases, removing certificates from Windows. [...]

Read full article →
2

Instructure confirms data breach, ShinyHunters claims attack

High

Educational tech giant Instructure has confirmed that data was stolen in a cyberattack, with the ShinyHunters extortion gang claiming responsibility. [...]

Read full article →
3

Telegram Mini Apps abused for crypto scams, Android malware delivery

Medium

Cybersecurity researchers have uncovered a large-scale fraud operation that uses Telegram's Mini App feature to run crypto scams, impersonate well-known brands, and distribute Android malware. [...]

Read full article →

CyberScoop

1

Former incident responders sentenced to 4 years in prison for committing ransomware attacks

High

Ryan Goldberg and Kevin Martin attacked five companies in 2023 and extorted nearly $1.3 million from one of their victims. The post Former incident responders sentenced to 4 years in prison for committing ransomware atta…

Read full article →
2

US government, allies publish guidance on how to safely deploy AI agents

Medium

The guidance warns that agents capable of taking real-world actions on networks are already inside critical infrastructure, and most organizations are granting them far more access than they can safely monitor or control…

Read full article →
3

FCC tightens KYC rules for telecoms, closes loophole for banned foreign services

The commission wants telecoms to do more to verify their callers and prevent illegal calls and scams from reaching Americans. The post FCC tightens KYC rules for telecoms, closes loophole for banned foreign services appe…

Read full article →

Dark Reading

1

76% of All Crypto Stolen in 2026 Is Now in North Korea

North Korean threat actors are pulling off historic cryptocurrency heists on a yearly, sometimes weekly basis now. AI might be helping them.

Read full article →
2

If AI's So Smart, Why Does It Keep Deleting Production Databases?

The issue isn't artificial intelligence, but rather an industry adding AI agent integrations into production environments before proper security testing.

Read full article →
3

Name That Toon: Mark of (Security) Progress

Feeling creative? Have something to say about the last 20 years of cybersecurity? Our editors will award the best cybersecurity-related caption with a $20 gift card.

Read full article →

SANS Internet Storm Center

1

Wireshark 4.6.5 Released, (Sun, May 3rd)

Wireshark release 4.6.5 fixes 43 vulnerabilities (38 CVEs) and 35 bugs.

Read full article →
2

ISC Stormcast For Monday, May 4th, 2026 https://isc.sans.edu/podcastdetail/9916, (Mon, May 4th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Read full article →
3

Malicious Ad for Homebrew Leads to MacSync Stealer, (Fri, May 1st)

Introduction

Read full article →

Cybercrime Magazine

1

Ethical Hacking Gone Wrong In 1999: French Software Engineer Looks Back

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 1, 2026 – Listen to the podcast A quarter-century old article in The Wall Street Journal reported in 1998 that Serge Humpich, a…

Read full article →
2

Benn Jordan, Musician, Scientist, and YouTuber on Flock Safety Cameras, Privacy & Surveillance

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 30, 2026 – Watch the YouTube video Flock Safety, an Atlanta, Ga.-based surveillance company, is facing increasing community push…

Read full article →
3

VanishID: Agentic AI-Powered Cybersecurity Protects C-Suite Executives

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 29, 2026 – Watch the YouTube video Executive risk management has evolved far beyond physical protection and travel security. Tod…

Read full article →

Ars Technica

1

Research roundup: 6 cool science stories we almost missed

Crushing soda cans for science, why dolphins swim so fast, how urine helps mushrooms communicate, and more

Read full article →
2

Study: AI models that consider user's feeling are more likely to make errors

Overtuning can cause models to "prioritize user satisfaction over truthfulness.”

Read full article →
3

Infrasound waves stop kitchen fires, but can they replace sprinklers?

Acoustic fire suppression goes commercial.

Read full article →
🤖

AI & Technology

VentureBeat AI

1

Railway secures $100 million to challenge AWS with AI-native cloud infrastructure

Critical

Railway, a San Francisco-based cloud platform that has quietly amassed two million developers without spending a dollar on marketing, announced Thursday that it raised $100 million in a Series B funding round, as surging…

Read full article →
2

Listen Labs raises $69M after viral billboard hiring stunt to scale AI customer interviews

High

Alfred Wahlforss was running out of options. His startup, Listen Labs, needed to hire over 100 engineers, but competing against Mark Zuckerberg's $100 million offers seemed impossible. So he spent $5,000 — a fifth of his…

Read full article →
3

Claude Code costs up to $200 a month. Goose does the same thing for free.

Medium

The artificial intelligence coding revolution comes with a catch: it's expensive.Claude Code, Anthropic's terminal-based AI agent that can write, debug, and deploy code autonomously, has captured the imagination of softw…

Read full article →

Synced

1

Which Agent Causes Task Failures and When?Researchers from PSU and Duke explores automated failure attribution of LLM Multi-Agent Systems

High

In recent years, LLM Multi-Agent systems have garnered widespread attention for their collaborative approach to solving complex problems. However, it's a common scenario for these systems to fail at a task despite a flur…

Read full article →
2

MIT Researchers Unveil “SEAL”: A New Step Towards Self-Improving AI

Medium

MIT introduces SEAL, a framework enabling large language models to self-edit and update their weights via reinforcement learning. The post MIT Researchers Unveil “SEAL”: A New Step Towards Self-Improving AI first appeare…

Read full article →
3

ByteDance Introduces Astra: A Dual-Model Architecture for Autonomous Robot Navigation

ByteDance introduces Astra, an innovative dual-model architecture revolutionizing robot navigation in complex indoor environments. The post ByteDance Introduces Astra: A Dual-Model Architecture for Autonomous Robot Navig…

Read full article →

ITNews Australia

1

UK cyber security agency warns of AI-driven 'patch wave'

High

Overhaul software update processes or risk being overwhelmed.

Read full article →
2

Melbourne Airport calls in AI agents for incident response

Aids in checking SOPs and writing reports.

Read full article →
3

Solving legacy modernisation

iTnews 2026 Benchmark Awards proudly sponsored by PhoenixDX. Hear from Pedro Carrilho, Managing Director & Founder at PhoenixDX about Solving Legacy Modernisation.

Read full article →

MIT Technology Review AI

1

Cyber-Insecurity in the AI Era

Medium

Cybersecurity was already under strain before AI entered the stack. Now, as AI expands the attack surface and adds new complexity, the limits of legacy approaches are becoming harder to ignore. This session from MIT Tech…

Read full article →
2

Musk v. Altman week 1: Elon Musk says he was duped, warns AI could kill us all, and admits that xAI distills OpenAI’s models

In the first week of the landmark trial between Elon Musk and OpenAI, Musk took the stand in a crisp black suit and tie and argued that OpenAI CEO Sam Altman and president Greg Brockman had deceived him into bankrolling…

Read full article →
3

Operationalizing AI for Scale and Sovereignty

Companies are taking control of their own data to tailor AI for their needs. The challenge lies in balancing ownership with the safe, trusted flow of high‑quality data needed to power reliable insights. This conversation…

Read full article →

NVIDIA AI Blog

1

It’s Gonna Be May: 16 Games Hit the Cloud This Month, With More NVIDIA GeForce RTX 5080 Power

[Editor’s note] The blog has been updated to note that GeForce RTX 5080-power expansion also extends to the Install-to-Play library. It’s gonna be May — and the cloud’s in full festival mode. 16 games are joining GeForce…

Read full article →
2

NVIDIA Launches Nemotron 3 Nano Omni Model, Unifying Vision, Audio and Language for up to 9x More Efficient AI Agents

AI agent systems today juggle separate models for vision, speech and language — losing time and context as they pass data from one model to the other. Unveiled today, NVIDIA Nemotron 3 Nano Omni is an open multimodal mod…

Read full article →
3

Nemotron Labs: What OpenClaw Agents Mean for Every Organization

By early 2026, the open source project OpenClaw had become a phenomenon. In January, its GitHub star count crossed 100,000 as developer interest surged.

Read full article →

The Guardian Technology

1

Pentagon inks deals with seven AI companies for classified military work

OpenAI, Google, Nvidia and others agreed to ‘any lawful use’ of their tech. Anthropic, feuding with Pentagon over potential AI misuse, was not includedSign up for the Breaking News US email to get newsletter alerts in yo…

Read full article →
2

‘Awkward and humiliating’: UK job hunters share frustration with AI interviews

People describe unnatural process as survey finds nearly half of job seekers have been interviewed by AINearly half (47%) of UK job seekers have had an AI interview, research from the hiring platform Greenhouse has found…

Read full article →
3

‘Temu Range Rover’: what the bestselling Jaecoo 7 says about China’s electric car ascendancy

Loaded with extras and produced at a cut price, the crossover SUV has overtaken rival cars from US, Japanese and Korean firmsThe UK is no stranger to foreign cars. The bestseller lists in recent years have been dominated…

Read full article →

Ars Technica AI

1

Study: AI models that consider user's feeling are more likely to make errors

Overtuning can cause models to "prioritize user satisfaction over truthfulness.”

Read full article →
2

GPT-5.5 matches heavily hyped Mythos Preview in new cybersecurity tests

New results suggest Mythos' cyber threat isn't "a breakthrough specific to one model."

Read full article →
3

Minnesota passes ban on fake AI nudes; app makers risk $500K fines

More evidence of Grok CSAM seen as Minnesota passes nudifying app ban.

Read full article →

Import AI

1

Import AI 454: Automating alignment research; safety study of a Chinese model; HiFloat4

At what point do the financial markets price in the singularity?

Read full article →
2

Import AI 453: Breaking AI agents; MirrorCode; and ten views on gradual disempowerment

Was fire equivalent to a singularity for people at the time?

Read full article →
3

Import AI 452: Scaling laws for cyberwar; rising tides of AI automation; and a puzzle over gDP forecasting

How much could AI revolutionize the economy?

Read full article →

Google DeepMind

1

Enabling a new model for healthcare with AI co-clinician

Researching the path to AI-augmented care and development of an AI co-clinician.

Read full article →
2

Announcing our partnership with the Republic of Korea

Google DeepMind and Korea partner to accelerate scientific breakthroughs using frontier AI models

Read full article →
3

Decoupled DiLoCo: A new frontier for resilient, distributed AI training

Read full article →

The Verge

1

Reggie Fils-Aimé says Amazon once asked Nintendo to break the law

Way back in the DS days, Nintendo decided to stop selling to Amazon. During a recent lecture at NYU, former Nintendo of America President Reggie Fils-Aimé said it was because Amazon was seeking preferential treatment tha…

Read full article →
2

Shokz’s bassy OpenRun Pro 2 are $40 off thanks to a new Mother’s Day promo

If you’re looking to pick up a pair of open-ear headphones for yourself — or your mom — Shokz is running a Mother’s Day sale. Now through May 10th, the company’s best pair of bone conduction headphones, the OpenRun Pro 2…

Read full article →
3

These reusable digital Polaroids are a clever way to cover a fridge in memories

I love when my friends have their fridges covered in Polaroids. It’s often a visual crash course of what’s been going on in their lives chronicling recent adventures, get-togethers, and other fun moments. But I don’t lov…

Read full article →

Wired AI

1

Disneyland Now Uses Face Recognition on Visitors

Plus: The NSA tests Anthropic’s Mythos Preview to find vulnerabilities, a Finnish teen is charged over the Scattered Spider hacking spree, and more.

Read full article →
2

A Dark-Money Campaign Is Paying Influencers to Frame Chinese AI as a Threat

Build American AI, a nonprofit linked to a super PAC bankrolled by executives at OpenAI and Andreessen Horowitz, is funding a campaign to spread pro-AI messaging and stoke fears about China.

Read full article →
3

How Shivon Zilis Operated as Elon Musk’s OpenAI Insider

Messages presented at trial reveal how Zilis, the mother of four of Musk’s children, acted as an intermediary between him and OpenAI.

Read full article →

TechCrunch AI

1

‘This is fine’ creator says AI startup stole his art

The ad comes from Artisan, the AI startup behind billboards urging businesses to "stop hiring humans."

Read full article →
2

In Harvard study, AI offered more accurate emergency room diagnoses than two human doctors

A new study examines how large language models perform in a variety of medical contexts, including real emergency room cases — where at least one model seemed to be more accurate than human doctors.

Read full article →
3

AI-generated actors and scripts are now ineligible for Oscars

Bad news for Tilly Norwood.

Read full article →

AI News

1

SAP: How enterprise AI governance secures profit margins

According to SAP, enterprise AI governance secures profit margins by replacing statistical guesses with deterministic control. Ask a consumer-grade model to count the words in a document, and it will often miss the mark…

Read full article →
2

Per-token AI charges come to GitHub Copilot

As of 1st June 2026, GitHub Copilot will charge its users on the basis of the tokens they use, rather than a flat rate subscription model. The model that’s seeing the shutters closed on it is, or rather was, simple to un…

Read full article →
3

What LG and NVIDIA’s talks reveal about the future of physical AI

LG is currently engaged in exploratory discussions with NVIDIA concerning physical AI, data centres, and mobility. Following a meeting in Seoul between LG CEO Ryu Jae-cheol and Madison Huang, Senior Director of Product M…

Read full article →

ABC Technology (AU)

1

China accused of targeting Port Pirie and Hobart metal smelters

The SA treasurer claims a foreign government is undermining the profitability of the struggling Port Pirie metal smelter.

Read full article →
2

Victorian teachers not to strike, council workers proceed with 'historic' action

The Australian Education Union has suspended part of its industrial campaign, saying negotiations over a new pay offer have been more productive.

Read full article →
3

Small business faces $500,000 bill to go electric amid gas switch-off

ATCO Australia tells 8,000 customers they will need to find new energy sources or switch to bottled gas as it prepares to decommission its Great Southern gas network in WA.

Read full article →

AISI Blog

No articles available.

🏢

Vendor Security

Mandiant Threat Intel

1

Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever

Critical

Introduction Advances in AI model-powered exploitation have demonstrated that general-purpose AI models can excel at vulnerability discovery, even without being purpose-built for the task. Eventually, capabilities such a…

Read full article →
2

Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite

Critical

Written by: JP Glab, Tufail Ahmed, Josh Kelley, Muhammad Umair Introduction Google Threat Intelligence Group (GTIG) identified a multistage intrusion campaign by a newly tracked threat group, UNC6692, that leveraged pers…

Read full article →
3

The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape

Critical

Written by: Jamie Collier, Robin Grunewald Germany has reclaimed its position as a primary focus for cyber extortion in Europe. While data leak site (DLS) posts rose almost 50% globally in 2025, Google Threat Intelligenc…

Read full article →

Rapid7 Blog

1

CVE-2026-41940: cPanel & WHM Authentication Bypass

Critical

OverviewOn April 28, 2026, cPanel issued a security update to fix a critical vulnerability affecting the cPanel & WHM and WP Squared products. In the cPanel release notes, the bug was described as "an issue with session…

Read full article →
2

Metasploit Wrap-Up 05/01/2026

Critical

MCP serverThis release our very own cdelafuente-r7 finished implementing the Metasploit MCP Server (msfmcpd), bringing Model Context Protocol support to Metasploit Framework. MCP lets AI applications like Claude, Cursor,…

Read full article →
3

Five Things we Took Away from Gartner SRM Sydney 2026

High

At this year's Gartner Security and Risk Management Summit in Sydney, Rapid7 CISO Brian Castagna joined industry CISO Nigel Hedges for a fireside chat on the decisions security leaders are actually making right now. They…

Read full article →

GitHub Security Blog

1

Securing the git push pipeline: Responding to a critical remote code execution vulnerability

Critical

How we validated, fixed, and investigated a critical vulnerability in under two hours, and confirmed no exploitation. The post Securing the git push pipeline: Responding to a critical remote code execution vulnerability…

Read full article →
2

Hack the AI agent: Build agentic AI security skills with the GitHub Secure Code Game

Medium

Learn to find and exploit real-world agentic AI vulnerabilities through five progressive challenges in this free, open source game that over 10,000 developers have already used to sharpen their security skills. The post…

Read full article →
3

How exposed is your code? Find out in minutes—for free

Medium

The new Code Security Risk Assessment gives you a one-click view of vulnerabilities across your organization, at no cost. The post How exposed is your code? Find out in minutes—for free appeared first on The GitHub Blog.

Read full article →

Check Point Research

1

VECT: Ransomware by design, Wiper by accident

Critical

Key Takeaways Background VECT Ransomware is a Ransomware-as-a-Service (RaaS) program that made its first appearance in December 2025 on a Russian-language cybercrime forum. After claiming their first two victims in Janua…

Read full article →
2

20th April – Threat Intelligence Report

Critical

For the latest discoveries in cyber research for the week of 20th April, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Booking.com, the Amsterdam-based travel platform, has confirmed a data b…

Read full article →
3

27th April – Threat Intelligence Report

High

For the latest discoveries in cyber research for the week of 27th April, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Vercel, a frontend cloud platform, has disclosed a security incident lin…

Read full article →

Microsoft Security

1

CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments

Critical

A high-severity Linux vulnerability, “Copy Fail” (CVE-2026-31431), enables root privilege escalation across cloud environments and Kubernetes workloads. With a working exploit already in the wild, organizations should ac…

Read full article →
2

What’s new, updated, or recently released in Microsoft Security

Medium

Stay ahead of emerging threats with Microsoft’s newest security innovations and updates, delivered through the In the Loop series. The post What’s new, updated, or recently released in Microsoft Security appeared first o…

Read full article →
3

Microsoft Agent 365, now generally available, expands capabilities and integrations

​Today we’re announcing the general availability of Agent 365, plus previews of new capabilities to discover and manage shadow AI agents, including local agents like OpenClaw and Claude Code. The post Microsoft Agent 365…

Read full article →

Palo Alto Unit 42

1

The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1)

Critical

Unit 42 analyzes npm supply chain evolution post-Shai Hulud. Discover wormable malware, CI/CD persistence, multi-stage attacks and more. The post The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1) a…

Read full article →
2

Essential Data Sources for Detection Beyond the Endpoint

Unit 42 highlights the need for a comprehensive security strategy that spans every IT zone. Explore the full details here. The post Essential Data Sources for Detection Beyond the Endpoint appeared first on Unit 42.

Read full article →
3

That AI Extension Helping You Write Emails? It’s Reading Them First

Unit 42 uncovers high-risk AI browser extensions. Disguised as productivity tools, they steal data, intercept prompts, and exfiltrate passwords. Protect your browser. The post That AI Extension Helping You Write Emails?…

Read full article →

Kaspersky Securelist

1

PhantomRPC: A new privilege escalation technique in Windows RPC

High

Kaspersky researcher discovered a vulnerability in RPC architecture that enables an attacker to create a fake RPC server and escalate their privileges.

Read full article →
2

Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India

Medium

The Silver Fox group is targeting companies in Russia and India by impersonating tax authorities to distribute ValleyRAT and the new ABCDoor backdoor.

Read full article →
3

FakeWallet crypto stealer spreading through iOS apps in the App Store

In March 2026, we uncovered more than twenty phishing apps in the Apple App Store masquerading as popular crypto wallets.

Read full article →

Microsoft Threat Intel

1

Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise

High

The Microsoft Defender Security Research Team uncovered a sophisticated macOS intrusion campaign attributed to the North Korean threat actor Sapphire Sleet that abuses user driven execution and social engineering to bypa…

Read full article →
2

Email threat landscape: Q1 2026 trends and insights

High

In early 2026, email threats increased with a rise in credential phishing, QR code phishing, and CAPTCHA-gated campaigns, highlighted by Microsoft’s disruption of the Tycoon2FA phishing platform which led to a 15% volume…

Read full article →
3

Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees

High

Microsoft Incident Response – Detection and Response Team (DART) researchers observed an emerging, financially motivated threat actor, tracked as Storm-2755, compromising Canadian employee accounts to gain unauthorized a…

Read full article →

SentinelOne Labs

1

LABScon25 Replay | Are Your Chinese Cameras Spying For You Or On You?

High

Marc Rogers and Silas Cutler expose how cheap smart home devices conceal a shadow supply chain of shell companies, firmware flaws, and foreign data routing.

Read full article →
2

Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis

Medium

Single-tool LLM analysis produces reports that look authoritative but aren't. A serial consensus pipeline catches artifacts and hallucinations at source.

Read full article →
3

fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet

A previously unknown 2005 cyber sabotage framework patches high-precision calculation software in memory to silently corrupt results.

Read full article →

Cisco Talos

1

AI-powered honeypots: Turning the tables on malicious AI agents

Just as AI brings time-saving advantages to our lives, it brings similar advantages to threat actors. We can take the advantage back. This blog shows how generative AI can be used to rapidly deploy adaptive honeypot syst…

Read full article →
2

Five defender priorities from the Talos Year in Review

With attackers moving faster than ever, it’s easy to feel overwhelmed. This blog breaks down five practical priorities from the Cisco Talos 2025 Year in Review to help defenders focus and prioritize, amidst all the noise…

Read full article →
3

Great responsibility, without great power

In this week’s newsletter, Hazel uses International Superhero Day as a springboard to explore why empathy — rather than just technical prowess — is the most essential, underrated superpower for navigating the human side…

Read full article →

CrowdStrike Blog

1

Tune In: The Future of AI-Powered Vulnerability Discovery

Read full article →
2

Defending Against CORDIAL SPIDER and SNARKY SPIDER with Falcon Shield

Read full article →
3

CrowdStrike Expands ChatGPT Enterprise Integration with Enhanced Audit Logging and Activity Monitoring

Read full article →

Proofpoint Threat Insight

1

Proofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in Place

Read full article →
2

Claude Mythos Fears Startle Japan's Financial Services Sector

Read full article →
3

AI-Era Threats Spread Beyond Email Into SaaS, Collaboration Apps, and AI Assistants

Read full article →

AWS Security

1

Security posture improvement in the AI era

It’s only been a few weeks since Anthropic announced the Claude Mythos Preview model and launched Project Glasswing with AWS and other leading organizations. This has generated a lot of discussion about the future of cyb…

Read full article →
2

Announcing the ISO 31000:2018 Risk Management on AWS Compliance Guide

AWS Security Assurance Services is announcing the release of our latest compliance guide, ISO 31000:2018 Risk Management on AWS, which provides practical guidance for organizations establishing and operating a risk manag…

Read full article →
3

Designing trust and safety into Amazon Bedrock powered applications

Generative AI brings promising innovation, transforming how individuals and organizations approach everything from customer service to content creation and more. As AI continues to expand its capabilities, organizations…

Read full article →

OpenAI News

1

Introducing Advanced Account Security

Introducing Advanced Account Security: phishing-resistant login, stronger recovery, and enhanced protections to safeguard sensitive data and prevent account takeover.

Read full article →
2

Where the goblins came from

How goblin outputs spread in AI models: timeline, root cause, and fixes behind personality-driven quirks in GPT-5 behavior.

Read full article →
3

Building the compute infrastructure for the Intelligence Age

OpenAI scales Stargate to build the compute infrastructure powering AGI, adding new data center capacity to meet growing AI demand.

Read full article →

Google Cloud Security

No articles available.

Google Threat Analysis (TAG)

1

TAG Bulletin: Q4 2025

An overview of coordinated influence operation campaigns terminated on our platforms in Q4 2025.

Read full article →
2

TAG Bulletin: Q3 2025

Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q3 2025.

Read full article →
3

TAG Bulletin: Q2 2025

Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q2 2025.

Read full article →

IBM Security Intelligence

No articles available.