Top Stories by Impact
Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever
Introduction Advances in AI model-powered exploitation have demonstrated that general-purpose AI models can excel at vulnerability discovery, even without being purpose-built for t…
Read full article →Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite
Written by: JP Glab, Tufail Ahmed, Josh Kelley, Muhammad Umair Introduction Google Threat Intelligence Group (GTIG) identified a multistage intrusion campaign by a newly tracked th…
Read full article →Hitachi Energy PCM600
View CSAF Summary Hitachi Energy is aware of a vulnerability that affects the Hitachi Energy PCM600 product versions listed in this document. An attacker successfully exploiting th…
Read full article →Patch Tuesday, April 2026 Edition
Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-d…
Read full article →ABB B&R Automation Runtime
View CSAF Summary ABB became aware of vulnerability in the product versions listed as affected in the advisory. An update is available that resolves a vulnerability. An attacker wh…
Read full article →The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape
Written by: Jamie Collier, Robin Grunewald Germany has reclaimed its position as a primary focus for cyber extortion in Europe. While data leak site (DLS) posts rose almost 50% glo…
Read full article →ABB B&R Automation Studio
View CSAF Summary ABB became aware of vulnerability in the product versions listed as affected in the advisory. An update is available that resolves a vulnerability. Successful exp…
Read full article →Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE
The Apache Software Foundation (ASF) has released security updates to address several security vulnerabilities in the HTTP Server, including a severe vulnerability that could poten…
Read full article →Cybersecurity
CISA Alerts
Hitachi Energy PCM600
CriticalView CSAF Summary Hitachi Energy is aware of a vulnerability that affects the Hitachi Energy PCM600 product versions listed in this document. An attacker successfully exploiting this vulnerability can impact integrity of…
Read full article →ABB B&R Automation Runtime
CriticalView CSAF Summary ABB became aware of vulnerability in the product versions listed as affected in the advisory. An update is available that resolves a vulnerability. An attacker who successfully exploited this vulnerabil…
Read full article →ABB B&R Automation Studio
CriticalView CSAF Summary ABB became aware of vulnerability in the product versions listed as affected in the advisory. An update is available that resolves a vulnerability. Successful exploitation of this vulnerability may enab…
Read full article →Krebs on Security
Patch Tuesday, April 2026 Edition
CriticalMicrosoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in…
Read full article →Anti-DDoS Firm Heaped Attacks on Brazilian ISPs
HighA Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other networ…
Read full article →‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty
A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series o…
Read full article →The Hacker News
Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE
CriticalThe Apache Software Foundation (ASF) has released security updates to address several security vulnerabilities in the HTTP Server, including a severe vulnerability that could potentially lead to remote code execution (RC…
Read full article →DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware
CriticalA newly identified supply chain attack targeting DAEMON Tools software has compromised its installers to serve a malicious payload, according to findings from Kaspersky. "These installers are distributed from the legitim…
Read full article →China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions
HighA sophisticated China-nexus advanced persistent threat (APT) group has been attributed to attacks targeting government entities in South America since at least late 2024 and government agencies in southeastern Europe in…
Read full article →Schneier on Security
DarkSword Malware
CriticalDarkSword is a sophisticated piece of malware—probably government designed—that targets iOS. Google Threat Intelligence Group (GTIG) has identified a new iOS full-chain exploit that leveraged multiple zero-day vulnerabil…
Read full article →A Ransomware Negotiator Was Working for a Ransomware Gang
MediumSomeone pleaded guilty to secretly working for a ransomware gang as he negotiated ransomware payments for clients.
Read full article →Hacking Polymarket
Polymarket is a platform where people can bet on real-world events, political and otherwise. Leaving the ethical considerations of this aside (for one, it facilitates assassination), one of the issues with making this wo…
Read full article →Dark Reading
Trellix Source Code Breach Highlights Growing Supply Chain Threats
CriticalInfo is scant, but such breaches can reveal where a security product's controls are located and how detections are designed, giving attackers a leg up.
Read full article →Microsoft Edge Stores Passwords in Process Memory, Posing Enterprise Risk
MediumA proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and thus use them to engage in further malicious activity.
Read full article →How the Story of a USB Penetration Test Went Viral
Two decades ago Dark Reading posted its first blockbuster — a column by a pen tester who sprinkled rigged thumb drives around a credit union parking lot and let curious employees do the rest. This episode looks back at t…
Read full article →BleepingComputer
New stealthy Quasar Linux malware targets software developers
HighA previously undocumented Linux implant named Quasar Linux (QLNX) is targeting developers' systems with a mix of rootkit, backdoor, and credential-stealing capabilities. [...]
Read full article →DAEMON Tools trojanized in supply-chain attack to deploy backdoor
HighHackers trojanized installers for the DAEMON Tools software and since April 8, delivered a backdoor to thousands of systems that downloaded the product from the official website. [...]
Read full article →Instructure hacker claims data theft from 8,800 schools, universities
HighThe hacker behind a breach at education technology giant Instructure claims to have stolen 280 million data records for students and staff from 8,809 colleges, school districts, and online education platforms. [...]
Read full article →CyberScoop
CISA wants critical infrastructure to operate ‘weeks to months’ in isolation during conflict
HighThe agency will begin targeted assessments meant to help critical infrastructure entities operate while disconnecting OT networks from IT and third-party vendors. The post CISA wants critical infrastructure to operate ‘w…
Read full article →Latvian national sentenced for ransomware attacks run by former Conti leaders
HighDeniss Zolotarjovs was mostly tasked with putting pressure on the Russia-based crew’s victims, in one case leaking hundreds of children’s health records. The post Latvian national sentenced for ransomware attacks run by…
Read full article →CISA boasts AI automation improvements to threat analysis, mission support
MediumCybersecurity and Infrastructure Security Agency officials said it’s proven a boon in numerous areas, but there are some hurdles to adoption, still. The post CISA boasts AI automation improvements to threat analysis, mis…
Read full article →Infosecurity Magazine
Microsoft Flags Mass Phishing Campaign Using Fake Compliance Emails
HighMicrosoft researchers warn of a large-scale phishing campaign using fake compliance emails to steal credentials, targeting 35,000 users across 13,000 organizations worldwide
Read full article →Fake SSA Emails Drive Venomous#Helper Phishing Campaign
HighVenomous#Helper attackers impersonate the US Social Security Administration to deploy signed RMM software and maintain persistent access across US networks
Read full article →North Korean APT Targets Yanbian Gamers via Trojanized Platform
MediumESET warns that North Korean hackers compromised a Yanbian gaming site in a supply‑chain attack, trojanizing Windows and Android software to spy on users
Read full article →Cybercrime Magazine
QevlarAI: Moving SOC Teams From Reactive Mode To Proactive Defense
HighThis week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 5, 2026 – Watch the YouTube video SOC teams are overwhelmed by the volume of threat alerts they must manage. A Forrester analysi…
Read full article →Ethical Hacking Gone Wrong In 1999: French Software Engineer Looks Back
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 1, 2026 – Listen to the podcast A quarter-century old article in The Wall Street Journal reported in 1998 that Serge Humpich, a…
Read full article →Black Hat USA 2026, Aug. 1-6. Las Vegas. REGISTER & Save with the CODE: CYBERCRIME
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 4, 2026 – Watch the YouTube video Step into the future of cybersecurity at Black Hat USA 2026, Aug. 1-6, in Las Vegas. REGISTER…
Read full article →Ars Technica
Widely used Daemon Tools disk app backdoored in monthlong supply-chain attack
HighDaemon Tools users: It's time to check your machines for stealthy infections, stat.
Read full article →Silicon Valley bets $200M on AI data centers floating in the ocean
Panthalassa aims to test floating AI computing nodes in the Pacific in 2026.
Read full article →Character.AI sued over chatbot that claims to be a real doctor with a license
State says chatbot claimed to practice medicine, gave invalid license number.
Read full article →SANS Internet Storm Center
SSL.com rotates their root certificate today, (Tue, May 5th)
I just got an email from SSL.com last night, they are rotating x26;#;xc2;x26;#;xa0;out their root certificate today (May 5,2026). x26;#;xc2;x26;#;xa0;This is normal, business as usual stuff for a CA, but cert…
Read full article →ISC Stormcast For Tuesday, May 5th, 2026 https://isc.sans.edu/podcastdetail/9918, (Tue, May 5th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Read full article →SANS ISC Diary #32954
No articles available.
AI & Technology
VentureBeat AI
Railway secures $100 million to challenge AWS with AI-native cloud infrastructure
CriticalRailway, a San Francisco-based cloud platform that has quietly amassed two million developers without spending a dollar on marketing, announced Thursday that it raised $100 million in a Series B funding round, as surging…
Read full article →Listen Labs raises $69M after viral billboard hiring stunt to scale AI customer interviews
HighAlfred Wahlforss was running out of options. His startup, Listen Labs, needed to hire over 100 engineers, but competing against Mark Zuckerberg's $100 million offers seemed impossible. So he spent $5,000 — a fifth of his…
Read full article →Claude Code costs up to $200 a month. Goose does the same thing for free.
MediumThe artificial intelligence coding revolution comes with a catch: it's expensive.Claude Code, Anthropic's terminal-based AI agent that can write, debug, and deploy code autonomously, has captured the imagination of softw…
Read full article →Synced
Which Agent Causes Task Failures and When?Researchers from PSU and Duke explores automated failure attribution of LLM Multi-Agent Systems
HighIn recent years, LLM Multi-Agent systems have garnered widespread attention for their collaborative approach to solving complex problems. However, it's a common scenario for these systems to fail at a task despite a flur…
Read full article →MIT Researchers Unveil “SEAL”: A New Step Towards Self-Improving AI
MediumMIT introduces SEAL, a framework enabling large language models to self-edit and update their weights via reinforcement learning. The post MIT Researchers Unveil “SEAL”: A New Step Towards Self-Improving AI first appeare…
Read full article →ByteDance Introduces Astra: A Dual-Model Architecture for Autonomous Robot Navigation
ByteDance introduces Astra, an innovative dual-model architecture revolutionizing robot navigation in complex indoor environments. The post ByteDance Introduces Astra: A Dual-Model Architecture for Autonomous Robot Navig…
Read full article →TechCrunch AI
Apple plans to make iOS 27 a Choose Your Own Adventure of AI models
MediumWith Apple's latest operating system updates, users will reportedly have their pick of which third-party AI models they want to use for a host of tasks.
Read full article →Altara secures $7M to bridge the data gap that’s slowing down physical sciences
Altara’s AI aims to diagnose failures and help speed up R&D by unifying data siloed across spreadsheets and legacy systems.
Read full article →ASML CEO Christophe Fouquet on his company’s monopoly: no one is coming for us
Christophe Fouquet, who became ASML's CEO in 2024 after more than a decade at the company, sat down with this editor on the rooftop deck of his Beverly Hills hotel Tuesday morning ahead of his appearance at the Milken In…
Read full article →The Verge
Google Home’s Gemini AI can handle more complicated requests
Google Home users can now ask Gemini to complete more complex, multi-step tasks and combine multiple tasks in a single command. Google has updated Gemini for Home to Gemini 3.1, which it says will improve the smart home…
Read full article →Apple agrees to pay iPhone owners $250 million for not delivering AI Siri
Apple has agreed to pay $250 million to settle a class action lawsuit that accused it of misleading customers about the availability of its Apple Intelligence features. The proposed settlement would apply to people in th…
Read full article →Microsoft gives up on Xbox Copilot AI
Xbox is "winding down Copilot on mobile" and "will stop development of Copilot on console," new Xbox CEO Asha Sharma announced on Tuesday. The move follows Sharma's reorganization of the Xbox platform team earlier on Tue…
Read full article →NVIDIA AI Blog
It’s Gonna Be May: 16 Games Hit the Cloud This Month, With More NVIDIA GeForce RTX 5080 Power
[Editor’s note] The blog has been updated to note that GeForce RTX 5080-power expansion also extends to the Install-to-Play library. It’s gonna be May — and the cloud’s in full festival mode. 16 games are joining GeForce…
Read full article →NVIDIA and ServiceNow Partner on New Autonomous AI Agents for Enterprises
Enterprise AI has learned to generate. It has learned to reason. Now companies are asking the next question: How should AI act? Early agent systems have shown what’s possible, moving beyond simple prompts to take on more…
Read full article →Nemotron Labs: What OpenClaw Agents Mean for Every Organization
By early 2026, the open source project OpenClaw had become a phenomenon. In January, its GitHub star count crossed 100,000 as developer interest surged.
Read full article →Wired AI
Google DeepMind Workers Vote to Unionize Over Military AI Deals
UK staff of Google’s AI research lab hope to block the use of the company’s artificial intelligence models in military settings.
Read full article →He Couldn’t Land a Job Interview. Was AI to Blame?
Armed with some Python and a white-hot sense of injustice, one medical student spent six months trying to figure out whether an algorithm trashed his job application.
Read full article →Greg Brockman Defends $30B OpenAI Stake: ‘Blood, Sweat, and Tears’
OpenAI’s cofounder and president revealed in federal court on Monday that he’s one of the largest individual stakeholders in the AI lab.
Read full article →Import AI
Import AI 454: Automating alignment research; safety study of a Chinese model; HiFloat4
At what point do the financial markets price in the singularity?
Read full article →Import AI 455: AI systems are about to start building themselves.
The first step towards recursive self improvement
Read full article →Import AI 453: Breaking AI agents; MirrorCode; and ten views on gradual disempowerment
Was fire equivalent to a singularity for people at the time?
Read full article →Google DeepMind
Enabling a new model for healthcare with AI co-clinician
Researching the path to AI-augmented care and development of an AI co-clinician.
Read full article →Announcing our partnership with the Republic of Korea
Google DeepMind and Korea partner to accelerate scientific breakthroughs using frontier AI models
Read full article →Decoupled DiLoCo: A new frontier for resilient, distributed AI training
The Guardian Technology
Google DeepMind workers in UK vote to unionize amid deal with US military
Exclusive: Worker pointed to Iran war and Pentagon’s Anthropic feud as indications the department is ‘not a responsible partner’Workers developing Google’s artificial intelligence products in the UK have voted to unioniz…
Read full article →AI platforms reference Nigel Farage more than other leaders when prompted on UK politics, study shows
Reform UK is ‘doing something right when it comes to visibility’ on multiple AI systems, say researchersAI platforms are more likely to reference Nigel Farage than any other UK leader when prompted about British politics…
Read full article →AI facial recognition oversight lagging far behind technology, watchdogs warn
Exclusive: Biometrics commissioners say face-scanning not as effective as claimed and new laws needed to regulate useHow does live facial recognition work and how many police forces use it? Guilty until proven innocent:…
Read full article →ITNews Australia
Apple to let users choose rival AI models across iOS 27 features
Google and Anthropic integrations tested so far.
Read full article →Top Google scientist says EU data measures pose privacy risk for users
Red team reidentified users from anonymised data in under two hours.
Read full article →Great Southern Bank poised to reveal first AI agents
After massive data modernisation project.
Read full article →MIT Technology Review AI
A blueprint for using AI to strengthen democracy
Every few centuries, changes in how information moves reshape how societies govern themselves. The printing press spread vernacular literacy, helping give rise to the Reformation and, eventually, representative governmen…
Read full article →Week one of the Musk v. Altman trial: What it was like in the room
This story originally appeared in The Algorithm, our weekly newsletter on AI. To get stories like this in your inbox first, sign up here. Two of the most powerful people in AI—Sam Altman and Elon Musk—began their face-of…
Read full article →Musk v. Altman week 1: Elon Musk says he was duped, warns AI could kill us all, and admits that xAI distills OpenAI’s models
In the first week of the landmark trial between Elon Musk and OpenAI, Musk took the stand in a crisp black suit and tie and argued that OpenAI CEO Sam Altman and president Greg Brockman had deceived him into bankrolling…
Read full article →Ars Technica AI
OpenAI president forced to read his personal diary entries to jury
Elon Musk argued the journals show the moment when OpenAI abandoned its mission.
Read full article →Silicon Valley bets $200M on AI data centers floating in the ocean
Panthalassa aims to test floating AI computing nodes in the Pacific in 2026.
Read full article →Character.AI sued over chatbot that claims to be a real doctor with a license
State says chatbot claimed to practice medicine, gave invalid license number.
Read full article →AI News
Physical AI raises governance questions for autonomous systems
Governance around Physical AI is becoming harder as autonomous AI systems move into robots, sensors, and industrial equipment. The issue is not only whether AI agents can complete tasks. It is how their actions are teste…
Read full article →Google made agentic AI governance a product. Enterprises still have to catch up.
Two weeks ago at Google Cloud Next ’26 in Las Vegas, Google did something the enterprise AI industry has been dancing around for the better part of two years: it made agentic AI governance a native product feature, not a…
Read full article →SAP: How enterprise AI governance secures profit margins
According to SAP, enterprise AI governance secures profit margins by replacing statistical guesses with deterministic control. Ask a consumer-grade model to count the words in a document, and it will often miss the mark…
Read full article →ABC Technology (AU)
Fuel price rises in Australia slow as costs soar in the US. Here's why
Fuel prices in Australia have started to moderate just as costs have reached an almost four-year high in the United States.
Read full article →Big new hotel announced for Adelaide but are there enough already?
The latest major hotel project announced for Adelaide adds to a looming accommodation construction boom in the CBD.
Read full article →Save money on groceries with 'relatively little effort'
With grocery prices continuing to bite, more Australians are discovering that home gardening isn't just good for wellbeing — it can also make real financial sense.
Read full article →Vendor Security
Mandiant Threat Intel
Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever
CriticalIntroduction Advances in AI model-powered exploitation have demonstrated that general-purpose AI models can excel at vulnerability discovery, even without being purpose-built for the task. Eventually, capabilities such a…
Read full article →Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite
CriticalWritten by: JP Glab, Tufail Ahmed, Josh Kelley, Muhammad Umair Introduction Google Threat Intelligence Group (GTIG) identified a multistage intrusion campaign by a newly tracked threat group, UNC6692, that leveraged pers…
Read full article →The German Cyber Criminal Überfall: Shifts in Europe's Data Leak Landscape
CriticalWritten by: Jamie Collier, Robin Grunewald Germany has reclaimed its position as a primary focus for cyber extortion in Europe. While data leak site (DLS) posts rose almost 50% globally in 2025, Google Threat Intelligenc…
Read full article →Rapid7 Blog
Metasploit Wrap-Up 05/01/2026
CriticalMCP serverThis release our very own cdelafuente-r7 finished implementing the Metasploit MCP Server (msfmcpd), bringing Model Context Protocol support to Metasploit Framework. MCP lets AI applications like Claude, Cursor,…
Read full article →A Walkthrough of the 2026 Global Cybersecurity Summit Agenda
HighThe full agenda for the Rapid7 2026 Global Cybersecurity Summit is now live, and it gives a clearer sense of how the conversation around security operations is evolving.Across two days, the sessions progress from a share…
Read full article →Five Things we Took Away from Gartner SRM Sydney 2026
HighAt this year's Gartner Security and Risk Management Summit in Sydney, Rapid7 CISO Brian Castagna joined industry CISO Nigel Hedges for a fireside chat on the decisions security leaders are actually making right now. They…
Read full article →GitHub Security Blog
Securing the git push pipeline: Responding to a critical remote code execution vulnerability
CriticalHow we validated, fixed, and investigated a critical vulnerability in under two hours, and confirmed no exploitation. The post Securing the git push pipeline: Responding to a critical remote code execution vulnerability…
Read full article →Hack the AI agent: Build agentic AI security skills with the GitHub Secure Code Game
MediumLearn to find and exploit real-world agentic AI vulnerabilities through five progressive challenges in this free, open source game that over 10,000 developers have already used to sharpen their security skills. The post…
Read full article →How exposed is your code? Find out in minutes—for free
MediumThe new Code Security Risk Assessment gives you a one-click view of vulnerabilities across your organization, at no cost. The post How exposed is your code? Find out in minutes—for free appeared first on The GitHub Blog.
Read full article →Check Point Research
VECT: Ransomware by design, Wiper by accident
CriticalKey Takeaways Background VECT Ransomware is a Ransomware-as-a-Service (RaaS) program that made its first appearance in December 2025 on a Russian-language cybercrime forum. After claiming their first two victims in Janua…
Read full article →27th April – Threat Intelligence Report
HighFor the latest discoveries in cyber research for the week of 27th April, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Vercel, a frontend cloud platform, has disclosed a security incident lin…
Read full article →4th May – Threat Intelligence Report
HighFor the latest discoveries in cyber research for the week of 4th May, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Medtronic, a global medical device maker, has disclosed a cyberattack on it…
Read full article →Microsoft Security
CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments
CriticalA high-severity Linux vulnerability, “Copy Fail” (CVE-2026-31431), enables root privilege escalation across cloud environments and Kubernetes workloads. With a working exploit already in the wild, organizations should ac…
Read full article →Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise
CriticalMicrosoft Defender Research observed a large-scale credential theft campaign that exemplifies this trend, using code of conduct-themed lures, a multi-step attack chain, and legitimate email services to distribute fully a…
Read full article →Microsoft Agent 365, now generally available, expands capabilities and integrations
Today we’re announcing the general availability of Agent 365, plus previews of new capabilities to discover and manage shadow AI agents, including local agents like OpenClaw and Claude Code. The post Microsoft Agent 365…
Read full article →Palo Alto Unit 42
The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1)
CriticalUnit 42 analyzes npm supply chain evolution post-Shai Hulud. Discover wormable malware, CI/CD persistence, multi-stage attacks and more. The post The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1) a…
Read full article →Copy Fail: What You Need to Know About the Most Severe Linux Threat in Years
CriticalCopy Fail (CVE-2026-31431) is a critical Linux kernel LPE that allows stealthy root access. This flaw impacts millions of systems. Read our analysis. The post Copy Fail: What You Need to Know About the Most Severe Linux…
Read full article →Essential Data Sources for Detection Beyond the Endpoint
Unit 42 highlights the need for a comprehensive security strategy that spans every IT zone. Explore the full details here. The post Essential Data Sources for Detection Beyond the Endpoint appeared first on Unit 42.
Read full article →Microsoft Threat Intel
Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise
CriticalMicrosoft Defender Research observed a large-scale credential theft campaign that exemplifies this trend, using code of conduct-themed lures, a multi-step attack chain, and legitimate email services to distribute fully a…
Read full article →Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise
HighThe Microsoft Defender Security Research Team uncovered a sophisticated macOS intrusion campaign attributed to the North Korean threat actor Sapphire Sleet that abuses user driven execution and social engineering to bypa…
Read full article →Email threat landscape: Q1 2026 trends and insights
HighIn early 2026, email threats increased with a rise in credential phishing, QR code phishing, and CAPTCHA-gated campaigns, highlighted by Microsoft’s disruption of the Tycoon2FA phishing platform which led to a 15% volume…
Read full article →Kaspersky Securelist
PhantomRPC: A new privilege escalation technique in Windows RPC
HighKaspersky researcher discovered a vulnerability in RPC architecture that enables an attacker to create a fake RPC server and escalate their privileges.
Read full article →“Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security
MediumKaspersky expert breaks down a new phishing scheme that uses the Amazon SES cloud email service. Let's look at some examples to see how you can tell a phishing email from a real one.
Read full article →Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India
MediumThe Silver Fox group is targeting companies in Russia and India by impersonating tax authorities to distribute ValleyRAT and the new ABCDoor backdoor.
Read full article →SentinelOne Labs
LABScon25 Replay | Are Your Chinese Cameras Spying For You Or On You?
HighMarc Rogers and Silas Cutler expose how cheap smart home devices conceal a shadow supply chain of shell companies, firmware flaws, and foreign data routing.
Read full article →Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
MediumSingle-tool LLM analysis produces reports that look authoritative but aren't. A serial consensus pipeline catches artifacts and hallucinations at source.
Read full article →fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet
A previously unknown 2005 cyber sabotage framework patches high-precision calculation software in memory to silently corrupt results.
Read full article →AWS Security
Five ways to use Kiro and Amazon Q to strengthen your security posture
MediumA Monday morning security alert flags unauthorized access attempts, security group misconfigurations, and AWS Identity and Access Management (IAM) policy violations. Your team needs answers fast. Security teams are using…
Read full article →Introducing AI traffic analysis dashboards for AWS WAF
As AI agents, bots, and programmatic access become an increasingly significant portion of web traffic, organizations need better tools to understand, analyze, and manage this activity. Today, we’re excited to announce AI…
Read full article →Securing open proxies in your AWS environment
This article shows you how to identify and secure open proxies in your AWS environment to prevent abuse, protect your IP address reputation, and control costs. An open proxy is a server that forwards traffic on behalf of…
Read full article →Cisco Talos
UAT-8302 and its box full of malware
Cisco Talos is disclosing UAT-8302, a sophisticated, China-nexus advanced persistent threat (APT) group targeting government entities in South America since at least late 2024 and government agencies in southeastern Euro…
Read full article →CloudZ RAT potentially steals OTP messages using Pheno plugin
Cisco Talos discovered an intrusion, active since at least January 2026, where an unknown attacker implanted a CloudZ remote access tool (RAT) and a previously undocumented plugin called “Pheno.”
Read full article →Great responsibility, without great power
In this week’s newsletter, Hazel uses International Superhero Day as a springboard to explore why empathy — rather than just technical prowess — is the most essential, underrated superpower for navigating the human side…
Read full article →CrowdStrike Blog
Tune In: The Future of AI-Powered Vulnerability Discovery
CrowdStrike Launches Falcon OverWatch for Defender
CrowdStrike Technical Risk Assessments Reveal Common Exposure Patterns
OpenAI News
GPT-5.5 Instant: smarter, clearer, and more personalized
GPT-5.5 Instant updates ChatGPT’s default model with smarter, more accurate answers, reduced hallucinations, and improved personalization controls.
Read full article →GPT-5.5 Instant System Card
New ways to buy ChatGPT ads
OpenAI expands ChatGPT ads with a beta self-serve Ads Manager, CPC bidding, and enhanced measurement tools—built to protect privacy and keep conversations separate from ads.
Read full article →Proofpoint Threat Insight
Proofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in Place
Claude Mythos Fears Startle Japan's Financial Services Sector
AI-Era Threats Spread Beyond Email Into SaaS, Collaboration Apps, and AI Assistants
Google Cloud Security
No articles available.
Google Threat Analysis (TAG)
TAG Bulletin: Q4 2025
An overview of coordinated influence operation campaigns terminated on our platforms in Q4 2025.
Read full article →TAG Bulletin: Q3 2025
Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q3 2025.
Read full article →TAG Bulletin: Q2 2025
Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q2 2025.
Read full article →IBM Security Intelligence
No articles available.