Top Stories by Impact
GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access
Yesterday · 14:00 UTC
Executive Summary Since our February 2026 report on AI-related threat activity, Google Threat Intelligence Group (GTIG) has continued to track a maturing transition from nascent AI…
Read full article →How Rapid7 is bringing Cyber GRC closer to security operations
Today · 13:17 UTC
Sabeen Malik is VP, Global Government Affairs and Public Policy at Rapid7.⠀Security teams need a better way to connect what they detect, what they fix, and what they can prove.The…
Read full article →ABB AC500 V3 Stack Buffer Overflow in Cryptographic Message Syntax
Today · 12:00 UTC
View CSAF Summary ABB became aware of vulnerability in the products versions listed as affected in the advisory. An update is available that resolves publicly reported vulnerabilit…
Read full article →Subnet Solutions PowerSYSTEM Center
Today · 12:00 UTC
View CSAF Summary Successful exploitation of these vulnerabilities could allow an authenticated attacker to expose sensitive information or cause a CRLF injection. The following ve…
Read full article →It's Patch Tuesday for Microsoft and Not a Zero-Day In Sight
Today · 21:03 UTC
It's the first time in two years with no zero-days. But with 137 flaws to patch, including nine critical ones, admins still have plenty of work to do.
Read full article →Microsoft Patch Tuesday for May 2026 — Snort rules and prominent vulnerabilities
Today · 19:57 UTC
Microsoft has released its monthly security update for May 2026, which includes 112 vulnerabilities affecting a range of products, including 16 that Microsoft marked as “critical”.
Read full article →Software Bill of Materials for AI - Minimum Elements
Today · 12:00 UTC
CISA and the Group of Seven (G7) international partners—Germany, Canada, France, Italy, Japan, the United Kingdom, and the European Union—have released joint guidance, Software Bil…
Read full article →Copy.Fail Linux Vulnerability
Today · 11:06 UTC
This is the worst Linux vulnerability in years. TL;DR copy.fail is a Linux kernel local privilege escalation, not a browser or clipboard attack. Disclosed by Theori on 29 April 202…
Read full article →Cybersecurity
CISA Alerts
ABB AC500 V3 Stack Buffer Overflow in Cryptographic Message Syntax
CriticalToday · 12:00 UTC
View CSAF Summary ABB became aware of vulnerability in the products versions listed as affected in the advisory. An update is available that resolves publicly reported vulnerability. An attacker who successfully exploite…
Read full article →Subnet Solutions PowerSYSTEM Center
CriticalToday · 12:00 UTC
View CSAF Summary Successful exploitation of these vulnerabilities could allow an authenticated attacker to expose sensitive information or cause a CRLF injection. The following versions of Subnet Solutions PowerSYSTEM C…
Read full article →Software Bill of Materials for AI - Minimum Elements
CriticalToday · 12:00 UTC
CISA and the Group of Seven (G7) international partners—Germany, Canada, France, Italy, Japan, the United Kingdom, and the European Union—have released joint guidance, Software Bill of Materials for AI – Minimum Elements…
Read full article →Dark Reading
It's Patch Tuesday for Microsoft and Not a Zero-Day In Sight
CriticalToday · 21:03 UTC
It's the first time in two years with no zero-days. But with 137 flaws to patch, including nine critical ones, admins still have plenty of work to do.
Read full article →Hugging Face Packages Weaponized With a Single File Tweak
Today · 14:00 UTC
A tokenizer library file present in Hugging Face AI models can be manipulated to hijack the model's outputs and exfiltrate data.
Read full article →20 Leaders Who Built the CISO Era: 2 Decades of Change
Today · 12:00 UTC
As part of Dark Reading's 20th anniversary special coverage, we profile the CISOs, founders, researchers, criminals, and policymakers who rewrote the enterprise risk playbook.
Read full article →Schneier on Security
Copy.Fail Linux Vulnerability
CriticalToday · 11:06 UTC
This is the worst Linux vulnerability in years. TL;DR copy.fail is a Linux kernel local privilege escalation, not a browser or clipboard attack. Disclosed by Theori on 29 April 2026 with a working PoC. It abuses the kern…
Read full article →LLMs and Text-in-Text Steganography
Yesterday · 11:04 UTC
Turns out that LLMs are really good at hiding text messages in other text messages.
Read full article →CyberScoop
Microsoft addresses 137 vulnerabilities in May’s Patch Tuesday, including 13 rated critical
CriticalToday · 21:00 UTC
The high volume of vulnerabilities reflects a growing trend researchers have been anticipating as artificial intelligence models are deployed to find previously uncovered defects in code. The post Microsoft addresses 137…
Read full article →‘Mini Shai-Hulud’ malware compromises hundreds of open-source packages in sprawling supply-chain attack
HighToday · 21:38 UTC
The campaign hit major registries and hid behind legitimate-looking release signatures, showing how attackers can weaponize the software update process itself. The post ‘Mini Shai-Hulud’ malware compromises hundreds of o…
Read full article →Major world economies spell out key elements of AI ‘ingredients list’
Today · 21:09 UTC
Experts on the topic say the G7 guidance is good, but could still use some improvements. The post Major world economies spell out key elements of AI ‘ingredients list’ appeared first on CyberScoop.
Read full article →Krebs on Security
Patch Tuesday, May 2026 Edition
HighToday · 21:46 UTC
Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer code. That reality is on…
Read full article →The Hacker News
New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution
HighToday · 16:44 UTC
Exim has released security updates to address a severe security issue affecting certain configurations that could enable memory corruption and potential code execution. Exim is an open-source Mail Transfer Agent (MTA) de…
Read full article →RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded
HighToday · 14:47 UTC
RubyGems, the standard package manager for the Ruby programming language, has temporarily paused account sign ups following what has been described as a "major malicious attack." "We're dealing with a major malicious att…
Read full article →New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots
Today · 12:50 UTC
Cybersecurity researchers have flagged a new version of the TrickMo Android banking trojan that uses The Open Network (TON) for command-and-control (C2). The new variant, observed by ThreatFabric between January and Febr…
Read full article →SANS Internet Storm Center
Microsoft May 2026 Patch Tuesday, (Tue, May 12th)
HighToday · 18:29 UTC
Todayx26;#;39;s Microsoft patch Tuesday fixes 137 different vulnerabilities. In addition, the update addresses 137 Chromium-related issues affecting Microsoft Edge.
Read full article →Apple Patches Everything, (Mon, May 11th)
MediumYesterday · 22:19 UTC
Apple today released its typical feature update across itx26;#;39;s operating systems (iOS, iPadOS, macOS, tvOS, watchOS, vision OS). With this update, Apple patched 84 different vulnerabilities. Updates are available…
Read full article →ISC Stormcast For Tuesday, May 12th, 2026 https://isc.sans.edu/podcastdetail/9928, (Tue, May 12th)
Today · 03:15 UTC
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Read full article →BleepingComputer
UK fines water supplier $1.3M for exposing data of 664k customers
HighToday · 20:17 UTC
The Information Commissioner's Office has fined South Staffordshire Water Plc and parent company South Staffordshire Plc £963,900 ($1.3 million) over a cyberattack that exposed the personal data of 663,887 customers and…
Read full article →Signal adds security warnings for social engineering, phishing attacks
HighToday · 19:40 UTC
Signal has introduced new in-app confirmations and warning messages as additional safeguards against phishing and social engineering attempts that could lead to various forms of fraud. [...]
Read full article →Webinar: Fixing the gaps in network incident response
Today · 19:46 UTC
IT teams often struggle to quickly coordinate responses across disparate systems during network incidents. This upcoming webinar explores how automation and AI-assisted workflows can reduce response times and help preven…
Read full article →Ars Technica
Twin brothers wipe 96 gov't databases minutes after being fired
MediumToday · 19:12 UTC
A case study in why credentials are revoked before firings.
Read full article →FDA chief resigns after Trump admin forced approval of fruity e-cigs
Today · 21:26 UTC
Makary reportedly spent his year bucking Trump admin and making industry enemies.
Read full article →The newest AI boom pitch: Host a mini data center at your home
Today · 21:59 UTC
The plan aims to speed up AI compute deployment while compensating residents.
Read full article →Infosecurity Magazine
OpenAI Launches 'Daybreak' to Help Build Secure By Design Software
Today · 15:15 UTC
With Daybreak, OpenAI wants its frontier AI models to be used to deploy secure by design software from the ground up
Read full article →Mini Shai-Hulud Hits TanStack npm Packages
Today · 14:45 UTC
Mini Shai-Hulud compromises TanStack npm packages and spreads across PyPI
Read full article →End‑to‑End Encrypted RCS Messaging Arrives Across iPhone and Android
Today · 13:00 UTC
Apple begins rolling out end-to-end encrypted RCS messaging between iPhone and Android in iOS 26.5
Read full article →Cybercrime Magazine
Women In Cybersecurity Report, Spring 2026
Today · 13:01 UTC
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 12, 2026 – Watch the YouTube video The Women in Cybersecurity Report, a 7-minute video hosted by Cybercrime Magazine Deputy Edit…
Read full article →The Answer To India’s Cybersecurity Leadership Gap: AI And Managed Services
Yesterday · 12:26 UTC
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 11, 2026 – Read the full story from Enterprise Times The 2026 CISO Report from Cybersecurity Ventures in partnership with Sophos…
Read full article →AI & Technology
The Guardian Technology
AI-powered hacking has exploded into industrial-scale threat, Google says
CriticalYesterday · 14:43 UTC
Criminal groups and state-linked actors appear to be using commercial models to refine and scale up attacksBusiness live – latest updatesIn just three months, AI-powered hacking has gone from a nascent problem to an indu…
Read full article →GameStop’s $55.5bn bid for eBay rejected as ‘neither credible nor attractive’
Today · 12:53 UTC
Online marketplace takes into account uncertainty around US video game retailer’s financing proposalThe board of eBay has rejected the US video games retailer GameStop’s surprise $55.5bn bid (£41bn) for the online market…
Read full article →Trump heads to China to spread the gospel of American tech while emulating Xi Jinping on AI
Today · 07:00 UTC
Tim Cook and Elon Musk, among other tech CEOS, will accompany the US president on a trip to ChinaDonald Trump is heading to China this week. If his guest list is any clue, he wants to discuss technology with Xi Jinping,…
Read full article →AI News
Hugging Face hosted malicious software masquerading as OpenAI release
HighToday · 13:52 UTC
A malicious Hugging Face repository that posed as an OpenAI release delivered infostealer malware to Windows machines and recorded about 244,000 downloads before removal, according to research from AI security firm Hidde…
Read full article →Laserfiche unveils AI agents for natural language workflows
Today · 08:57 UTC
Laserfiche has announced the release of AI agents that can help perform tasks through natural language prompts. Intelligent assistants follow Laserfiche’s integrated security rules and compliance requirements, helping en…
Read full article →JBS Dev: On imperfect data and the AI last mile – from model capability to cost sustainability
Today · 15:37 UTC
Joe Rose, president at strategic technology provider JBS Dev, wants to cut through one of the myths of working with generative and agentic AI systems. “It’s a common misconception that your data has to be perfect before…
Read full article →The Verge
iOS 27 might add a lot more customization to the Camera app
Today · 21:36 UTC
Apple's next iOS update could include something phone photographers have been waiting for: a lot more control over the Camera app. According to Bloomberg's Mark Gurman, the Camera app will be "fully customizable" in iOS…
Read full article →Meta won’t let you block its AI account on Threads
Today · 20:35 UTC
Meta announced on Tuesday that it's testing a Threads feature that lets users tag a Meta AI account to get answers to questions or context about a conversation on the platform. If you've spent any time looking at replies…
Read full article →Meta will tell parents when their teens add new interests to their Instagram algorithm
Today · 19:56 UTC
Starting Tuesday, parents can get more details about what their teens are up to on Instagram. Meta is adding a feature to its Teen Accounts that shows parents the "general topics their teens engage with," like "basketbal…
Read full article →MIT Technology Review AI
Fostering breakthrough AI innovation through customer-back engineering
Yesterday · 13:33 UTC
Despite years of digitization, organizations capture less than one-third of the value expected from digital investments, according to McKinsey research. That’s because most big companies begin with technological capabili…
Read full article →Three things in AI to watch, according to a Nobel-winning economist
Yesterday · 17:35 UTC
This story originally appeared in The Algorithm, our weekly newsletter on AI. To get stories like this in your inbox first, sign up here. A few months before he was awarded the Nobel Prize in economics in 2024, Daron Ace…
Read full article →Implementing advanced AI technologies in finance
Yesterday · 13:00 UTC
In finance departments that have long been defined by precision and control, AI has arrived less as a neatly managed upgrade than as a quiet insurgency. Employees are already using it while leadership races to impose str…
Read full article →TechCrunch AI
Report: Google and SpaceX in talks to put data centers into orbit
Today · 17:30 UTC
Google and SpaceX are in talks to build data centers in orbit, pitching space as the future home for AI compute, even as costs today remain far higher than on the ground.
Read full article →Musk mulled handing OpenAI to his children, Altman testifies
Today · 18:05 UTC
Altman said that Musk's focus on controlling the initial for-profit gave him pause because OpenAI was dedicated to keeping advanced AI out of the hands of a single person, and Altman, with his experience running the prom…
Read full article →Anthropic warns investors against secondary platforms offering access to its shares
Today · 17:36 UTC
"Any sale or transfer of Anthropic stock, or any interest in Anthropic stock, offered by these firms is void and will not be recognized on our books and records," the company's support page reads.
Read full article →NVIDIA AI Blog
NVIDIA and SAP Bring Trust to Specialized Agents
Today · 12:30 UTC
Announced today at SAP Sapphire — where NVIDIA founder and CEO Jensen Huang joined SAP CEO Christian Klein’s keynote by video — SAP and NVIDIA’s expanded collaboration helps enterprises run specialized agents with securi…
Read full article →‘Your Career Starts at the Beginning of the AI Revolution,’ NVIDIA CEO Tells Graduates
10 May 2026 · 22:00 UTC
“You are entering the world at an extraordinary moment,” NVIDIA founder and CEO Jensen Huang told graduates as he delivered the keynote address at Carnegie Mellon University’s 128th commencement ceremony on Sunday. “A ne…
Read full article →ITNews Australia
Infrastructure and cyber teams must converge as threats evolve: Infotrust
Today · 22:00 UTC
Cybersecurity is increasingly becoming an infrastructure challenge as organisations struggle to keep pace with rapidly evolving technologies and expanding digital environments.
Read full article →Nokia wins UK appeal to block Acer, Asus video streaming patent lawsuits
Today · 14:08 UTC
As cases are stayed.
Read full article →IAG drives AI more deeply across its operations
Today · 14:06 UTC
Chases three high-level opportunities, uses three methods to grow usage.
Read full article →Wired AI
Ilya Sutskever Stands by His Role in Sam Altman’s OpenAI Ouster: ‘I Didn’t Want It to Be Destroyed’
Yesterday · 23:51 UTC
The former OpenAI chief scientist may be estranged from the company, but he still came to its defense as he testified on Monday.
Read full article →CUDA Proves Nvidia Is a Software Company
Yesterday · 10:00 UTC
There’s a deep, forbidding moat that surrounds Nvidia—and it has nothing to do with hardware.
Read full article →I Work in Hollywood. Everyone Who Used to Make TV Is Now Secretly Training AI
Yesterday · 10:00 UTC
For screenwriters like me—and job seekers all over—AI gig work is the new waiting tables. In eight months, I’ve done 20 of these soul-crushing contracts for five different platforms. It’s bad.
Read full article →Ars Technica AI
The newest AI boom pitch: Host a mini data center at your home
Today · 21:59 UTC
The plan aims to speed up AI compute deployment while compensating residents.
Read full article →“Will I be OK?” Teen died after ChatGPT pushed deadly mix of drugs, lawsuit says
Today · 19:00 UTC
Teen trusted ChatGPT to help him “safely” experiment with drugs, logs show.
Read full article →Google's Android-powered laptops are called Googlebooks, and they're coming this year
Today · 17:00 UTC
Google has revealed its vision for the AI laptop of tomorrow.
Read full article →Import AI
Import AI 456: RSI and economic growth; radical optionality for AI regulation; and a neural computer
Yesterday · 12:46 UTC
What laws does superintelligence demand?
Read full article →ABC Technology (AU)
High Court to hear appeal over 22-year Mount Pleasant coal mine extension
Today · 20:50 UTC
The High Court will hear a major climate change case that could affect mining approvals, as the operator of the Mount Pleasant coal mine seeks to overturn a ruling blocking the project's extension.
Read full article →How fuel prices have impacted car sales
Today · 19:36 UTC
Electric vehicles now represent 16 per cent of new car sales in Australia, in a growing trend coinciding with record fuel prices.
Read full article →Working people to receive extra income tax break in new federal budget
Today · 09:43 UTC
Labor will raise taxes on investment properties and some trust funds, giving the revenue back to workers with a new $250 tax break unveiled in the federal budget.
Read full article →Vendor Security
Mandiant Threat Intel
GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access
CriticalYesterday · 14:00 UTC
Executive Summary Since our February 2026 report on AI-related threat activity, Google Threat Intelligence Group (GTIG) has continued to track a maturing transition from nascent AI-enabled operations to the industrial-sc…
Read full article →Rapid7 Blog
How Rapid7 is bringing Cyber GRC closer to security operations
CriticalToday · 13:17 UTC
Sabeen Malik is VP, Global Government Affairs and Public Policy at Rapid7.⠀Security teams need a better way to connect what they detect, what they fix, and what they can prove.The pace of modern security operations no lo…
Read full article →Final Countdown: Last Chance to Join the Rapid7 Global Cybersecurity Summit
HighYesterday · 12:54 UTC
The Rapid7 2026 Global Cybersecurity Summit is just around the corner, and with it, a final opportunity to join the conversations shaping how security teams are adapting to a rapidly changing landscape.Over the past few…
Read full article →Cisco Talos
Microsoft Patch Tuesday for May 2026 — Snort rules and prominent vulnerabilities
CriticalToday · 19:57 UTC
Microsoft has released its monthly security update for May 2026, which includes 112 vulnerabilities affecting a range of products, including 16 that Microsoft marked as “critical”.
Read full article →State-sponsored actors, better known as the friends you don’t want
MediumToday · 10:00 UTC
Responding to a state-sponsored threat is nothing like responding to ransomware, and the differences can make or break the outcome. Learn why your IR plan might need revisiting, and the factors you should consider.
Read full article →Check Point Research
11th May – Threat Intelligence Report
CriticalYesterday · 12:49 UTC
For the latest discoveries in cyber research for the week of 11th May, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Instructure, the US education technology company behind the Canvas learnin…
Read full article →The State of Ransomware – Q1 2026
HighYesterday · 09:58 UTC
Key Findings Ransomware in Q1 2026: Consolidation at Scale During the first quarter of 2026, we monitored more than 70 active data leak sites (DLS) that collectively listed 2,122 new victims. This figure represents a 12.…
Read full article →Microsoft Security
Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise
HighToday · 15:00 UTC
Microsoft Incident Response investigated an attack operated through legitimate and trusted administrative mechanisms to blend seamlessly into routine operations and remain undetected demonstrating that intrusions have in…
Read full article →Defending consumer web properties against modern DDoS attacks
MediumToday · 16:00 UTC
Read how to protect consumer websites and defend against modern DDoS attacks with layered security, resilient architecture, and graceful service degradation. The post Defending consumer web properties against modern DDoS…
Read full article →Microsoft Threat Intel
Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise
HighToday · 15:00 UTC
Microsoft Incident Response investigated an attack operated through legitimate and trusted administrative mechanisms to blend seamlessly into routine operations and remain undetected demonstrating that intrusions have in…
Read full article →Kaspersky Securelist
State of ransomware in 2026
HighToday · 07:00 UTC
Kaspersky researchers are sharing insights into the main ransomware trends for 2026: EDR killers on the rise, switching from data encryption to data leaks, and more.
Read full article →StepSecurity
TeamPCP's Mini Shai-Hulud Is Back: A Self-Spreading Supply Chain Attack Compromises TanStack npm Packages
HighToday · 13:58 UTC
The Mini Shai-Hulud worm is actively compromising legitimate npm packages by hijacking CI/CD pipelines and stealing developer secrets. StepSecurity's OSS Package Security Feed first detected the attack in official @tanst…
Read full article →Palo Alto Unit 42
Inside AD CS Escalation: Unpacking Advanced Misuse Techniques and Tools
HighYesterday · 22:00 UTC
Unit 42 analyzes AD CS exploitation through template misconfigurations and shadow credential misuse while offering behavioral detection for defenders. The post Inside AD CS Escalation: Unpacking Advanced Misuse Technique…
Read full article →AWS Security
AWS Security Agent full repository code scanning feature now available in preview
MediumToday · 21:34 UTC
Today, we’re excited to announce the preview release of full repository code review, a new capability in AWS Security Agent that performs deep, context-aware security analysis of your entire code base. AI-driven cybersec…
Read full article →Enabling AI sovereignty on AWS
Today · 15:18 UTC
Cloud and AI are transforming industries and societies at unprecedented speed, from accelerating research and enhancing customer experiences to optimizing business processes and enriching public services. At Amazon Web S…
Read full article →Complimentary virtual training: Get hands-on with AWS Security Services
Yesterday · 17:58 UTC
If you’re looking to strengthen your organization’s security posture on Amazon Web Services (AWS) but aren’t sure where to start, then we’re here to help. Security Activation Days are complimentary, virtual, hands-on wor…
Read full article →OpenAI News
How finance teams use Codex
Today · 15:00 UTC
See how finance teams can use Codex to build MBRs, reporting packs, variance bridges, model checks, and planning scenarios from real work inputs.
Read full article →How NVIDIA engineers and researchers build with Codex
Today · 00:00 UTC
Teams use Codex with GPT-5.5 to ship production systems and turn research ideas into runnable experiments.
Read full article →What Parameter Golf taught us about AI-assisted research
Today · 00:00 UTC
Parameter Golf brought together 1,000+ participants and 2,000+ submissions to explore AI-assisted machine learning research, coding agents, quantization, and novel model design under strict constraints.
Read full article →CrowdStrike Blog
Inside CrowdStrike Automated Leads: A Transformative Approach to Threat Detections
Yesterday · 05:00 UTC
Read full article →