Top Stories by Impact
Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever
Introduction Advances in AI model-powered exploitation have demonstrated that general-purpose AI models can excel at vulnerability discovery, even without being purpose-built for t…
Read full article →CVE-2026-41940: cPanel & WHM Authentication Bypass
OverviewOn April 28, 2026, cPanel issued a security update to fix a critical vulnerability affecting the cPanel & WHM and WP Squared products. In the cPanel release notes, the bug…
Read full article →Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite
Written by: JP Glab, Tufail Ahmed, Josh Kelley, Muhammad Umair Introduction Google Threat Intelligence Group (GTIG) identified a multistage intrusion campaign by a newly tracked th…
Read full article →Patch Tuesday, April 2026 Edition
Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-d…
Read full article →The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape
Written by: Jamie Collier, Robin Grunewald Germany has reclaimed its position as a primary focus for cyber extortion in Europe. While data leak site (DLS) posts rose almost 50% glo…
Read full article →CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vul…
Read full article →ABB AWIN Gateways
View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to remotely reboot the device or complete an unauthenticated query to reveal system confi…
Read full article →Metasploit Wrap-Up 05/01/2026
MCP serverThis release our very own cdelafuente-r7 finished implementing the Metasploit MCP Server (msfmcpd), bringing Model Context Protocol support to Metasploit Framework. MCP l…
Read full article →Cybersecurity
Krebs on Security
Patch Tuesday, April 2026 Edition
CriticalMicrosoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in…
Read full article →Anti-DDoS Firm Heaped Attacks on Brazilian ISPs
HighA Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other networ…
Read full article →‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty
A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series o…
Read full article →The Hacker News
CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV
CriticalThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) catalog, citing evide…
Read full article →30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign
HighA newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a "phishing relay" to distribute phishing emails with an aim to compromise Facebook accounts. The activity has been codenamed Ac…
Read full article →Trellix Confirms Source Code Breach With Unauthorized Repository Access
MediumCybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a "portion" of its source code. It said it "recently identified" the compromise of its source code repository and…
Read full article →CISA Alerts
ABB AWIN Gateways
CriticalView CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to remotely reboot the device or complete an unauthenticated query to reveal system configuration, including sensitive details. T…
Read full article →CISA Adds One Known Exploited Vulnerability to Catalog
CriticalCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-31431 Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability T…
Read full article →Careful Adoption of Agentic AI Services
MediumCISA, in collaboration with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and other international and U.S. partners, released guidance for organizations on adopting agentic artificial…
Read full article →Schneier on Security
Claude Mythos Has Found 271 Zero-Days in Firefox
HighThat’s a lot. No, it’s an extraordinary number: Since February, the Firefox team has been working around the clock using frontier AI models to find and fix latent security vulnerabilities in the browser. We wrote previou…
Read full article →A Ransomware Negotiator Was Working for a Ransomware Gang
MediumSomeone pleaded guilty to secretly working for a ransomware gang as he negotiated ransomware payments for clients.
Read full article →Fast16 Malware
MediumResearchers have reverse-engineered a piece of malware named Fast16. It’s almost certainly state-sponsored, probably US in origin, and was deployed against Iran years before Stuxnet: “…the Fast16 malware was designed to…
Read full article →Infosecurity Magazine
Nine-Year-Old Zero-Day Flaw in Linux Kernel Discovered by AI-Equipped Security Researcher
HighA researcher from offensive security firm Theori has found a nine-year-old flaw in the Linux kernel with the help of AI
Read full article →Two American Cybersecurity Workers Jailed for BlackCat Ransomware Attacks
HighThe cybersecurity workers used their knowledge and skills to conduct ransomware attacks for notorious gang, rather than protect victims against them
Read full article →Anthropic Rolls Out Claude Security for AI Vulnerability Scanning
MediumClaude Security enters public beta, giving enterprises AI driven code scanning with no API integration or custom agents required
Read full article →BleepingComputer
Microsoft Defender wrongly flags DigiCert certs as Trojan:Win32/Cerdigent.A!dha
HighMicrosoft Defender is detecting legitimate DigiCert root certificates as Trojan:Win32/Cerdigent.A!dha, resulting in widespread false-positive alerts, and in some cases, removing certificates from Windows. [...]
Read full article →Instructure confirms data breach, ShinyHunters claims attack
HighEducational tech giant Instructure has confirmed that data was stolen in a cyberattack, with the ShinyHunters extortion gang claiming responsibility. [...]
Read full article →Telegram Mini Apps abused for crypto scams, Android malware delivery
MediumCybersecurity researchers have uncovered a large-scale fraud operation that uses Telegram's Mini App feature to run crypto scams, impersonate well-known brands, and distribute Android malware. [...]
Read full article →CyberScoop
Former incident responders sentenced to 4 years in prison for committing ransomware attacks
HighRyan Goldberg and Kevin Martin attacked five companies in 2023 and extorted nearly $1.3 million from one of their victims. The post Former incident responders sentenced to 4 years in prison for committing ransomware atta…
Read full article →US government, allies publish guidance on how to safely deploy AI agents
MediumThe guidance warns that agents capable of taking real-world actions on networks are already inside critical infrastructure, and most organizations are granting them far more access than they can safely monitor or control…
Read full article →FCC tightens KYC rules for telecoms, closes loophole for banned foreign services
The commission wants telecoms to do more to verify their callers and prevent illegal calls and scams from reaching Americans. The post FCC tightens KYC rules for telecoms, closes loophole for banned foreign services appe…
Read full article →Dark Reading
76% of All Crypto Stolen in 2026 Is Now in North Korea
North Korean threat actors are pulling off historic cryptocurrency heists on a yearly, sometimes weekly basis now. AI might be helping them.
Read full article →If AI's So Smart, Why Does It Keep Deleting Production Databases?
The issue isn't artificial intelligence, but rather an industry adding AI agent integrations into production environments before proper security testing.
Read full article →Name That Toon: Mark of (Security) Progress
Feeling creative? Have something to say about the last 20 years of cybersecurity? Our editors will award the best cybersecurity-related caption with a $20 gift card.
Read full article →SANS Internet Storm Center
Wireshark 4.6.5 Released, (Sun, May 3rd)
Wireshark release 4.6.5 fixes 43 vulnerabilities (38 CVEs) and 35 bugs.
Read full article →ISC Stormcast For Monday, May 4th, 2026 https://isc.sans.edu/podcastdetail/9916, (Mon, May 4th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Read full article →Cybercrime Magazine
Ethical Hacking Gone Wrong In 1999: French Software Engineer Looks Back
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 1, 2026 – Listen to the podcast A quarter-century old article in The Wall Street Journal reported in 1998 that Serge Humpich, a…
Read full article →Benn Jordan, Musician, Scientist, and YouTuber on Flock Safety Cameras, Privacy & Surveillance
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 30, 2026 – Watch the YouTube video Flock Safety, an Atlanta, Ga.-based surveillance company, is facing increasing community push…
Read full article →VanishID: Agentic AI-Powered Cybersecurity Protects C-Suite Executives
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 29, 2026 – Watch the YouTube video Executive risk management has evolved far beyond physical protection and travel security. Tod…
Read full article →Ars Technica
Research roundup: 6 cool science stories we almost missed
Crushing soda cans for science, why dolphins swim so fast, how urine helps mushrooms communicate, and more
Read full article →Study: AI models that consider user's feeling are more likely to make errors
Overtuning can cause models to "prioritize user satisfaction over truthfulness.”
Read full article →Infrasound waves stop kitchen fires, but can they replace sprinklers?
Acoustic fire suppression goes commercial.
Read full article →AI & Technology
VentureBeat AI
Railway secures $100 million to challenge AWS with AI-native cloud infrastructure
CriticalRailway, a San Francisco-based cloud platform that has quietly amassed two million developers without spending a dollar on marketing, announced Thursday that it raised $100 million in a Series B funding round, as surging…
Read full article →Listen Labs raises $69M after viral billboard hiring stunt to scale AI customer interviews
HighAlfred Wahlforss was running out of options. His startup, Listen Labs, needed to hire over 100 engineers, but competing against Mark Zuckerberg's $100 million offers seemed impossible. So he spent $5,000 — a fifth of his…
Read full article →Claude Code costs up to $200 a month. Goose does the same thing for free.
MediumThe artificial intelligence coding revolution comes with a catch: it's expensive.Claude Code, Anthropic's terminal-based AI agent that can write, debug, and deploy code autonomously, has captured the imagination of softw…
Read full article →Synced
Which Agent Causes Task Failures and When?Researchers from PSU and Duke explores automated failure attribution of LLM Multi-Agent Systems
HighIn recent years, LLM Multi-Agent systems have garnered widespread attention for their collaborative approach to solving complex problems. However, it's a common scenario for these systems to fail at a task despite a flur…
Read full article →MIT Researchers Unveil “SEAL”: A New Step Towards Self-Improving AI
MediumMIT introduces SEAL, a framework enabling large language models to self-edit and update their weights via reinforcement learning. The post MIT Researchers Unveil “SEAL”: A New Step Towards Self-Improving AI first appeare…
Read full article →ByteDance Introduces Astra: A Dual-Model Architecture for Autonomous Robot Navigation
ByteDance introduces Astra, an innovative dual-model architecture revolutionizing robot navigation in complex indoor environments. The post ByteDance Introduces Astra: A Dual-Model Architecture for Autonomous Robot Navig…
Read full article →ITNews Australia
UK cyber security agency warns of AI-driven 'patch wave'
HighOverhaul software update processes or risk being overwhelmed.
Read full article →Melbourne Airport calls in AI agents for incident response
Aids in checking SOPs and writing reports.
Read full article →Solving legacy modernisation
iTnews 2026 Benchmark Awards proudly sponsored by PhoenixDX. Hear from Pedro Carrilho, Managing Director & Founder at PhoenixDX about Solving Legacy Modernisation.
Read full article →MIT Technology Review AI
Cyber-Insecurity in the AI Era
MediumCybersecurity was already under strain before AI entered the stack. Now, as AI expands the attack surface and adds new complexity, the limits of legacy approaches are becoming harder to ignore. This session from MIT Tech…
Read full article →Musk v. Altman week 1: Elon Musk says he was duped, warns AI could kill us all, and admits that xAI distills OpenAI’s models
In the first week of the landmark trial between Elon Musk and OpenAI, Musk took the stand in a crisp black suit and tie and argued that OpenAI CEO Sam Altman and president Greg Brockman had deceived him into bankrolling…
Read full article →Operationalizing AI for Scale and Sovereignty
Companies are taking control of their own data to tailor AI for their needs. The challenge lies in balancing ownership with the safe, trusted flow of high‑quality data needed to power reliable insights. This conversation…
Read full article →NVIDIA AI Blog
It’s Gonna Be May: 16 Games Hit the Cloud This Month, With More NVIDIA GeForce RTX 5080 Power
[Editor’s note] The blog has been updated to note that GeForce RTX 5080-power expansion also extends to the Install-to-Play library. It’s gonna be May — and the cloud’s in full festival mode. 16 games are joining GeForce…
Read full article →NVIDIA Launches Nemotron 3 Nano Omni Model, Unifying Vision, Audio and Language for up to 9x More Efficient AI Agents
AI agent systems today juggle separate models for vision, speech and language — losing time and context as they pass data from one model to the other. Unveiled today, NVIDIA Nemotron 3 Nano Omni is an open multimodal mod…
Read full article →Nemotron Labs: What OpenClaw Agents Mean for Every Organization
By early 2026, the open source project OpenClaw had become a phenomenon. In January, its GitHub star count crossed 100,000 as developer interest surged.
Read full article →The Guardian Technology
Pentagon inks deals with seven AI companies for classified military work
OpenAI, Google, Nvidia and others agreed to ‘any lawful use’ of their tech. Anthropic, feuding with Pentagon over potential AI misuse, was not includedSign up for the Breaking News US email to get newsletter alerts in yo…
Read full article →‘Awkward and humiliating’: UK job hunters share frustration with AI interviews
People describe unnatural process as survey finds nearly half of job seekers have been interviewed by AINearly half (47%) of UK job seekers have had an AI interview, research from the hiring platform Greenhouse has found…
Read full article →‘Temu Range Rover’: what the bestselling Jaecoo 7 says about China’s electric car ascendancy
Loaded with extras and produced at a cut price, the crossover SUV has overtaken rival cars from US, Japanese and Korean firmsThe UK is no stranger to foreign cars. The bestseller lists in recent years have been dominated…
Read full article →Ars Technica AI
Study: AI models that consider user's feeling are more likely to make errors
Overtuning can cause models to "prioritize user satisfaction over truthfulness.”
Read full article →GPT-5.5 matches heavily hyped Mythos Preview in new cybersecurity tests
New results suggest Mythos' cyber threat isn't "a breakthrough specific to one model."
Read full article →Minnesota passes ban on fake AI nudes; app makers risk $500K fines
More evidence of Grok CSAM seen as Minnesota passes nudifying app ban.
Read full article →Import AI
Import AI 454: Automating alignment research; safety study of a Chinese model; HiFloat4
At what point do the financial markets price in the singularity?
Read full article →Import AI 453: Breaking AI agents; MirrorCode; and ten views on gradual disempowerment
Was fire equivalent to a singularity for people at the time?
Read full article →Import AI 452: Scaling laws for cyberwar; rising tides of AI automation; and a puzzle over gDP forecasting
How much could AI revolutionize the economy?
Read full article →Google DeepMind
Enabling a new model for healthcare with AI co-clinician
Researching the path to AI-augmented care and development of an AI co-clinician.
Read full article →Announcing our partnership with the Republic of Korea
Google DeepMind and Korea partner to accelerate scientific breakthroughs using frontier AI models
Read full article →Decoupled DiLoCo: A new frontier for resilient, distributed AI training
The Verge
Reggie Fils-Aimé says Amazon once asked Nintendo to break the law
Way back in the DS days, Nintendo decided to stop selling to Amazon. During a recent lecture at NYU, former Nintendo of America President Reggie Fils-Aimé said it was because Amazon was seeking preferential treatment tha…
Read full article →Shokz’s bassy OpenRun Pro 2 are $40 off thanks to a new Mother’s Day promo
If you’re looking to pick up a pair of open-ear headphones for yourself — or your mom — Shokz is running a Mother’s Day sale. Now through May 10th, the company’s best pair of bone conduction headphones, the OpenRun Pro 2…
Read full article →These reusable digital Polaroids are a clever way to cover a fridge in memories
I love when my friends have their fridges covered in Polaroids. It’s often a visual crash course of what’s been going on in their lives chronicling recent adventures, get-togethers, and other fun moments. But I don’t lov…
Read full article →Wired AI
Disneyland Now Uses Face Recognition on Visitors
Plus: The NSA tests Anthropic’s Mythos Preview to find vulnerabilities, a Finnish teen is charged over the Scattered Spider hacking spree, and more.
Read full article →A Dark-Money Campaign Is Paying Influencers to Frame Chinese AI as a Threat
Build American AI, a nonprofit linked to a super PAC bankrolled by executives at OpenAI and Andreessen Horowitz, is funding a campaign to spread pro-AI messaging and stoke fears about China.
Read full article →How Shivon Zilis Operated as Elon Musk’s OpenAI Insider
Messages presented at trial reveal how Zilis, the mother of four of Musk’s children, acted as an intermediary between him and OpenAI.
Read full article →TechCrunch AI
‘This is fine’ creator says AI startup stole his art
The ad comes from Artisan, the AI startup behind billboards urging businesses to "stop hiring humans."
Read full article →In Harvard study, AI offered more accurate emergency room diagnoses than two human doctors
A new study examines how large language models perform in a variety of medical contexts, including real emergency room cases — where at least one model seemed to be more accurate than human doctors.
Read full article →AI-generated actors and scripts are now ineligible for Oscars
Bad news for Tilly Norwood.
Read full article →AI News
SAP: How enterprise AI governance secures profit margins
According to SAP, enterprise AI governance secures profit margins by replacing statistical guesses with deterministic control. Ask a consumer-grade model to count the words in a document, and it will often miss the mark…
Read full article →Per-token AI charges come to GitHub Copilot
As of 1st June 2026, GitHub Copilot will charge its users on the basis of the tokens they use, rather than a flat rate subscription model. The model that’s seeing the shutters closed on it is, or rather was, simple to un…
Read full article →What LG and NVIDIA’s talks reveal about the future of physical AI
LG is currently engaged in exploratory discussions with NVIDIA concerning physical AI, data centres, and mobility. Following a meeting in Seoul between LG CEO Ryu Jae-cheol and Madison Huang, Senior Director of Product M…
Read full article →ABC Technology (AU)
China accused of targeting Port Pirie and Hobart metal smelters
The SA treasurer claims a foreign government is undermining the profitability of the struggling Port Pirie metal smelter.
Read full article →Victorian teachers not to strike, council workers proceed with 'historic' action
The Australian Education Union has suspended part of its industrial campaign, saying negotiations over a new pay offer have been more productive.
Read full article →Small business faces $500,000 bill to go electric amid gas switch-off
ATCO Australia tells 8,000 customers they will need to find new energy sources or switch to bottled gas as it prepares to decommission its Great Southern gas network in WA.
Read full article →AISI Blog
No articles available.
Vendor Security
Mandiant Threat Intel
Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever
CriticalIntroduction Advances in AI model-powered exploitation have demonstrated that general-purpose AI models can excel at vulnerability discovery, even without being purpose-built for the task. Eventually, capabilities such a…
Read full article →Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite
CriticalWritten by: JP Glab, Tufail Ahmed, Josh Kelley, Muhammad Umair Introduction Google Threat Intelligence Group (GTIG) identified a multistage intrusion campaign by a newly tracked threat group, UNC6692, that leveraged pers…
Read full article →The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape
CriticalWritten by: Jamie Collier, Robin Grunewald Germany has reclaimed its position as a primary focus for cyber extortion in Europe. While data leak site (DLS) posts rose almost 50% globally in 2025, Google Threat Intelligenc…
Read full article →Rapid7 Blog
CVE-2026-41940: cPanel & WHM Authentication Bypass
CriticalOverviewOn April 28, 2026, cPanel issued a security update to fix a critical vulnerability affecting the cPanel & WHM and WP Squared products. In the cPanel release notes, the bug was described as "an issue with session…
Read full article →Metasploit Wrap-Up 05/01/2026
CriticalMCP serverThis release our very own cdelafuente-r7 finished implementing the Metasploit MCP Server (msfmcpd), bringing Model Context Protocol support to Metasploit Framework. MCP lets AI applications like Claude, Cursor,…
Read full article →Five Things we Took Away from Gartner SRM Sydney 2026
HighAt this year's Gartner Security and Risk Management Summit in Sydney, Rapid7 CISO Brian Castagna joined industry CISO Nigel Hedges for a fireside chat on the decisions security leaders are actually making right now. They…
Read full article →GitHub Security Blog
Securing the git push pipeline: Responding to a critical remote code execution vulnerability
CriticalHow we validated, fixed, and investigated a critical vulnerability in under two hours, and confirmed no exploitation. The post Securing the git push pipeline: Responding to a critical remote code execution vulnerability…
Read full article →Hack the AI agent: Build agentic AI security skills with the GitHub Secure Code Game
MediumLearn to find and exploit real-world agentic AI vulnerabilities through five progressive challenges in this free, open source game that over 10,000 developers have already used to sharpen their security skills. The post…
Read full article →How exposed is your code? Find out in minutes—for free
MediumThe new Code Security Risk Assessment gives you a one-click view of vulnerabilities across your organization, at no cost. The post How exposed is your code? Find out in minutes—for free appeared first on The GitHub Blog.
Read full article →Check Point Research
VECT: Ransomware by design, Wiper by accident
CriticalKey Takeaways Background VECT Ransomware is a Ransomware-as-a-Service (RaaS) program that made its first appearance in December 2025 on a Russian-language cybercrime forum. After claiming their first two victims in Janua…
Read full article →20th April – Threat Intelligence Report
CriticalFor the latest discoveries in cyber research for the week of 20th April, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Booking.com, the Amsterdam-based travel platform, has confirmed a data b…
Read full article →27th April – Threat Intelligence Report
HighFor the latest discoveries in cyber research for the week of 27th April, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Vercel, a frontend cloud platform, has disclosed a security incident lin…
Read full article →Microsoft Security
CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments
CriticalA high-severity Linux vulnerability, “Copy Fail” (CVE-2026-31431), enables root privilege escalation across cloud environments and Kubernetes workloads. With a working exploit already in the wild, organizations should ac…
Read full article →What’s new, updated, or recently released in Microsoft Security
MediumStay ahead of emerging threats with Microsoft’s newest security innovations and updates, delivered through the In the Loop series. The post What’s new, updated, or recently released in Microsoft Security appeared first o…
Read full article →Microsoft Agent 365, now generally available, expands capabilities and integrations
Today we’re announcing the general availability of Agent 365, plus previews of new capabilities to discover and manage shadow AI agents, including local agents like OpenClaw and Claude Code. The post Microsoft Agent 365…
Read full article →Palo Alto Unit 42
The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1)
CriticalUnit 42 analyzes npm supply chain evolution post-Shai Hulud. Discover wormable malware, CI/CD persistence, multi-stage attacks and more. The post The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1) a…
Read full article →Essential Data Sources for Detection Beyond the Endpoint
Unit 42 highlights the need for a comprehensive security strategy that spans every IT zone. Explore the full details here. The post Essential Data Sources for Detection Beyond the Endpoint appeared first on Unit 42.
Read full article →That AI Extension Helping You Write Emails? It’s Reading Them First
Unit 42 uncovers high-risk AI browser extensions. Disguised as productivity tools, they steal data, intercept prompts, and exfiltrate passwords. Protect your browser. The post That AI Extension Helping You Write Emails?…
Read full article →Kaspersky Securelist
PhantomRPC: A new privilege escalation technique in Windows RPC
HighKaspersky researcher discovered a vulnerability in RPC architecture that enables an attacker to create a fake RPC server and escalate their privileges.
Read full article →Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India
MediumThe Silver Fox group is targeting companies in Russia and India by impersonating tax authorities to distribute ValleyRAT and the new ABCDoor backdoor.
Read full article →FakeWallet crypto stealer spreading through iOS apps in the App Store
In March 2026, we uncovered more than twenty phishing apps in the Apple App Store masquerading as popular crypto wallets.
Read full article →Microsoft Threat Intel
Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise
HighThe Microsoft Defender Security Research Team uncovered a sophisticated macOS intrusion campaign attributed to the North Korean threat actor Sapphire Sleet that abuses user driven execution and social engineering to bypa…
Read full article →Email threat landscape: Q1 2026 trends and insights
HighIn early 2026, email threats increased with a rise in credential phishing, QR code phishing, and CAPTCHA-gated campaigns, highlighted by Microsoft’s disruption of the Tycoon2FA phishing platform which led to a 15% volume…
Read full article →Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees
HighMicrosoft Incident Response – Detection and Response Team (DART) researchers observed an emerging, financially motivated threat actor, tracked as Storm-2755, compromising Canadian employee accounts to gain unauthorized a…
Read full article →SentinelOne Labs
LABScon25 Replay | Are Your Chinese Cameras Spying For You Or On You?
HighMarc Rogers and Silas Cutler expose how cheap smart home devices conceal a shadow supply chain of shell companies, firmware flaws, and foreign data routing.
Read full article →Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
MediumSingle-tool LLM analysis produces reports that look authoritative but aren't. A serial consensus pipeline catches artifacts and hallucinations at source.
Read full article →fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet
A previously unknown 2005 cyber sabotage framework patches high-precision calculation software in memory to silently corrupt results.
Read full article →Cisco Talos
AI-powered honeypots: Turning the tables on malicious AI agents
Just as AI brings time-saving advantages to our lives, it brings similar advantages to threat actors. We can take the advantage back. This blog shows how generative AI can be used to rapidly deploy adaptive honeypot syst…
Read full article →Five defender priorities from the Talos Year in Review
With attackers moving faster than ever, it’s easy to feel overwhelmed. This blog breaks down five practical priorities from the Cisco Talos 2025 Year in Review to help defenders focus and prioritize, amidst all the noise…
Read full article →Great responsibility, without great power
In this week’s newsletter, Hazel uses International Superhero Day as a springboard to explore why empathy — rather than just technical prowess — is the most essential, underrated superpower for navigating the human side…
Read full article →CrowdStrike Blog
Tune In: The Future of AI-Powered Vulnerability Discovery
Defending Against CORDIAL SPIDER and SNARKY SPIDER with Falcon Shield
CrowdStrike Expands ChatGPT Enterprise Integration with Enhanced Audit Logging and Activity Monitoring
Proofpoint Threat Insight
Proofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in Place
Claude Mythos Fears Startle Japan's Financial Services Sector
AI-Era Threats Spread Beyond Email Into SaaS, Collaboration Apps, and AI Assistants
AWS Security
Security posture improvement in the AI era
It’s only been a few weeks since Anthropic announced the Claude Mythos Preview model and launched Project Glasswing with AWS and other leading organizations. This has generated a lot of discussion about the future of cyb…
Read full article →Announcing the ISO 31000:2018 Risk Management on AWS Compliance Guide
AWS Security Assurance Services is announcing the release of our latest compliance guide, ISO 31000:2018 Risk Management on AWS, which provides practical guidance for organizations establishing and operating a risk manag…
Read full article →Designing trust and safety into Amazon Bedrock powered applications
Generative AI brings promising innovation, transforming how individuals and organizations approach everything from customer service to content creation and more. As AI continues to expand its capabilities, organizations…
Read full article →OpenAI News
Introducing Advanced Account Security
Introducing Advanced Account Security: phishing-resistant login, stronger recovery, and enhanced protections to safeguard sensitive data and prevent account takeover.
Read full article →Where the goblins came from
How goblin outputs spread in AI models: timeline, root cause, and fixes behind personality-driven quirks in GPT-5 behavior.
Read full article →Building the compute infrastructure for the Intelligence Age
OpenAI scales Stargate to build the compute infrastructure powering AGI, adding new data center capacity to meet growing AI demand.
Read full article →Google Cloud Security
No articles available.
Google Threat Analysis (TAG)
TAG Bulletin: Q4 2025
An overview of coordinated influence operation campaigns terminated on our platforms in Q4 2025.
Read full article →TAG Bulletin: Q3 2025
Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q3 2025.
Read full article →TAG Bulletin: Q2 2025
Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q2 2025.
Read full article →IBM Security Intelligence
No articles available.