Top Stories by Impact

🏢 Mandiant Threat Intel Critical

GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access

Yesterday · 14:00 UTC

Executive Summary Since our February 2026 report on AI-related threat activity, Google Threat Intelligence Group (GTIG) has continued to track a maturing transition from nascent AI…

Read full article →
🏢 Rapid7 Blog Critical

How Rapid7 is bringing Cyber GRC closer to security operations

Today · 13:17 UTC

Sabeen Malik is VP, Global Government Affairs and Public Policy at Rapid7.⠀Security teams need a better way to connect what they detect, what they fix, and what they can prove.The…

Read full article →
🔐 CISA Alerts Critical

ABB AC500 V3 Stack Buffer Overflow in Cryptographic Message Syntax

Today · 12:00 UTC

View CSAF Summary ABB became aware of vulnerability in the products versions listed as affected in the advisory. An update is available that resolves publicly reported vulnerabilit…

Read full article →
🔐 CISA Alerts Critical

Subnet Solutions PowerSYSTEM Center

Today · 12:00 UTC

View CSAF Summary Successful exploitation of these vulnerabilities could allow an authenticated attacker to expose sensitive information or cause a CRLF injection. The following ve…

Read full article →
🔐 Dark Reading Critical

It's Patch Tuesday for Microsoft and Not a Zero-Day In Sight

Today · 21:03 UTC

It's the first time in two years with no zero-days. But with 137 flaws to patch, including nine critical ones, admins still have plenty of work to do.

Read full article →
🏢 Cisco Talos Critical

Microsoft Patch Tuesday for May 2026 — Snort rules and prominent vulnerabilities

Today · 19:57 UTC

Microsoft has released its monthly security update for May 2026, which includes 112 vulnerabilities affecting a range of products, including 16 that Microsoft marked as “critical”.

Read full article →
🔐 CISA Alerts Critical

Software Bill of Materials for AI - Minimum Elements

Today · 12:00 UTC

CISA and the Group of Seven (G7) international partners—Germany, Canada, France, Italy, Japan, the United Kingdom, and the European Union—have released joint guidance, Software Bil…

Read full article →
🔐 Schneier on Security Critical

Copy.Fail Linux Vulnerability

Today · 11:06 UTC

This is the worst Linux vulnerability in years. TL;DR copy.fail is a Linux kernel local privilege escalation, not a browser or clipboard attack. Disclosed by Theori on 29 April 202…

Read full article →
🔐

Cybersecurity

CISA Alerts

1

ABB AC500 V3 Stack Buffer Overflow in Cryptographic Message Syntax

Critical

Today · 12:00 UTC

View CSAF Summary ABB became aware of vulnerability in the products versions listed as affected in the advisory. An update is available that resolves publicly reported vulnerability. An attacker who successfully exploite…

Read full article →
2

Subnet Solutions PowerSYSTEM Center

Critical

Today · 12:00 UTC

View CSAF Summary Successful exploitation of these vulnerabilities could allow an authenticated attacker to expose sensitive information or cause a CRLF injection. The following versions of Subnet Solutions PowerSYSTEM C…

Read full article →
3

Software Bill of Materials for AI - Minimum Elements

Critical

Today · 12:00 UTC

CISA and the Group of Seven (G7) international partners—Germany, Canada, France, Italy, Japan, the United Kingdom, and the European Union—have released joint guidance, Software Bill of Materials for AI – Minimum Elements…

Read full article →

Dark Reading

1

It's Patch Tuesday for Microsoft and Not a Zero-Day In Sight

Critical

Today · 21:03 UTC

It's the first time in two years with no zero-days. But with 137 flaws to patch, including nine critical ones, admins still have plenty of work to do.

Read full article →
2

Hugging Face Packages Weaponized With a Single File Tweak

Today · 14:00 UTC

A tokenizer library file present in Hugging Face AI models can be manipulated to hijack the model's outputs and exfiltrate data.

Read full article →
3

20 Leaders Who Built the CISO Era: 2 Decades of Change

Today · 12:00 UTC

As part of Dark Reading's 20th anniversary special coverage, we profile the CISOs, founders, researchers, criminals, and policymakers who rewrote the enterprise risk playbook.

Read full article →

Schneier on Security

1

Copy.Fail Linux Vulnerability

Critical

Today · 11:06 UTC

This is the worst Linux vulnerability in years. TL;DR copy.fail is a Linux kernel local privilege escalation, not a browser or clipboard attack. Disclosed by Theori on 29 April 2026 with a working PoC. It abuses the kern…

Read full article →
2

LLMs and Text-in-Text Steganography

Yesterday · 11:04 UTC

Turns out that LLMs are really good at hiding text messages in other text messages.

Read full article →

CyberScoop

1

Microsoft addresses 137 vulnerabilities in May’s Patch Tuesday, including 13 rated critical

Critical

Today · 21:00 UTC

The high volume of vulnerabilities reflects a growing trend researchers have been anticipating as artificial intelligence models are deployed to find previously uncovered defects in code. The post Microsoft addresses 137…

Read full article →
2

‘Mini Shai-Hulud’ malware compromises hundreds of open-source packages in sprawling supply-chain attack

High

Today · 21:38 UTC

The campaign hit major registries and hid behind legitimate-looking release signatures, showing how attackers can weaponize the software update process itself. The post ‘Mini Shai-Hulud’ malware compromises hundreds of o…

Read full article →
3

Major world economies spell out key elements of AI ‘ingredients list’

Today · 21:09 UTC

Experts on the topic say the G7 guidance is good, but could still use some improvements. The post Major world economies spell out key elements of AI ‘ingredients list’ appeared first on CyberScoop.

Read full article →

Krebs on Security

1

Patch Tuesday, May 2026 Edition

High

Today · 21:46 UTC

Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer code. That reality is on…

Read full article →

The Hacker News

1

New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution

High

Today · 16:44 UTC

Exim has released security updates to address a severe security issue affecting certain configurations that could enable memory corruption and potential code execution. Exim is an open-source Mail Transfer Agent (MTA) de…

Read full article →
2

RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded

High

Today · 14:47 UTC

RubyGems, the standard package manager for the Ruby programming language, has temporarily paused account sign ups following what has been described as a "major malicious attack." "We're dealing with a major malicious att…

Read full article →
3

New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots

Today · 12:50 UTC

Cybersecurity researchers have flagged a new version of the TrickMo Android banking trojan that uses The Open Network (TON) for command-and-control (C2). The new variant, observed by ThreatFabric between January and Febr…

Read full article →

SANS Internet Storm Center

1

Microsoft May 2026 Patch Tuesday, (Tue, May 12th)

High

Today · 18:29 UTC

Today&#;x26;#;39;s Microsoft patch Tuesday fixes 137 different vulnerabilities. In addition, the update addresses 137 Chromium-related issues affecting Microsoft Edge.

Read full article →
2

Apple Patches Everything, (Mon, May 11th)

Medium

Yesterday · 22:19 UTC

Apple today released its typical feature update across it&#;x26;#;39;s operating systems (iOS, iPadOS, macOS, tvOS, watchOS, vision OS). With this update, Apple patched 84 different vulnerabilities. Updates are available…

Read full article →
3

ISC Stormcast For Tuesday, May 12th, 2026 https://isc.sans.edu/podcastdetail/9928, (Tue, May 12th)

Today · 03:15 UTC

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Read full article →

BleepingComputer

1

UK fines water supplier $1.3M for exposing data of 664k customers

High

Today · 20:17 UTC

The Information Commissioner's Office has fined South Staffordshire Water Plc and parent company South Staffordshire Plc £963,900 ($1.3 million) over a cyberattack that exposed the personal data of 663,887 customers and…

Read full article →
2

Signal adds security warnings for social engineering, phishing attacks

High

Today · 19:40 UTC

Signal has introduced new in-app confirmations and warning messages as additional safeguards against phishing and social engineering attempts that could lead to various forms of fraud. [...]

Read full article →
3

Webinar: Fixing the gaps in network incident response

Today · 19:46 UTC

IT teams often struggle to quickly coordinate responses across disparate systems during network incidents. This upcoming webinar explores how automation and AI-assisted workflows can reduce response times and help preven…

Read full article →

Ars Technica

1

Twin brothers wipe 96 gov't databases minutes after being fired

Medium

Today · 19:12 UTC

A case study in why credentials are revoked before firings.

Read full article →
2

FDA chief resigns after Trump admin forced approval of fruity e-cigs

Today · 21:26 UTC

Makary reportedly spent his year bucking Trump admin and making industry enemies.

Read full article →
3

The newest AI boom pitch: Host a mini data center at your home

Today · 21:59 UTC

The plan aims to speed up AI compute deployment while compensating residents.

Read full article →

Infosecurity Magazine

1

OpenAI Launches 'Daybreak' to Help Build Secure By Design Software

Today · 15:15 UTC

With Daybreak, OpenAI wants its frontier AI models to be used to deploy secure by design software from the ground up

Read full article →
2

Mini Shai-Hulud Hits TanStack npm Packages

Today · 14:45 UTC

Mini Shai-Hulud compromises TanStack npm packages and spreads across PyPI

Read full article →
3

End‑to‑End Encrypted RCS Messaging Arrives Across iPhone and Android

Today · 13:00 UTC

Apple begins rolling out end-to-end encrypted RCS messaging between iPhone and Android in iOS 26.5

Read full article →

Cybercrime Magazine

1

Women In Cybersecurity Report, Spring 2026

Today · 13:01 UTC

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 12, 2026 – Watch the YouTube video The Women in Cybersecurity Report, a 7-minute video hosted by Cybercrime Magazine Deputy Edit…

Read full article →
2

The Answer To India’s Cybersecurity Leadership Gap: AI And Managed Services

Yesterday · 12:26 UTC

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 11, 2026 – Read the full story from Enterprise Times The 2026 CISO Report from Cybersecurity Ventures in partnership with Sophos…

Read full article →
🤖

AI & Technology

The Guardian Technology

1

AI-powered hacking has exploded into industrial-scale threat, Google says

Critical

Yesterday · 14:43 UTC

Criminal groups and state-linked actors appear to be using commercial models to refine and scale up attacksBusiness live – latest updatesIn just three months, AI-powered hacking has gone from a nascent problem to an indu…

Read full article →
2

GameStop’s $55.5bn bid for eBay rejected as ‘neither credible nor attractive’

Today · 12:53 UTC

Online marketplace takes into account uncertainty around US video game retailer’s financing proposalThe board of eBay has rejected the US video games retailer GameStop’s surprise $55.5bn bid (£41bn) for the online market…

Read full article →
3

Trump heads to China to spread the gospel of American tech while emulating Xi Jinping on AI

Today · 07:00 UTC

Tim Cook and Elon Musk, among other tech CEOS, will accompany the US president on a trip to ChinaDonald Trump is heading to China this week. If his guest list is any clue, he wants to discuss technology with Xi Jinping,…

Read full article →

AI News

1

Hugging Face hosted malicious software masquerading as OpenAI release

High

Today · 13:52 UTC

A malicious Hugging Face repository that posed as an OpenAI release delivered infostealer malware to Windows machines and recorded about 244,000 downloads before removal, according to research from AI security firm Hidde…

Read full article →
2

Laserfiche unveils AI agents for natural language workflows

Today · 08:57 UTC

Laserfiche has announced the release of AI agents that can help perform tasks through natural language prompts. Intelligent assistants follow Laserfiche’s integrated security rules and compliance requirements, helping en…

Read full article →
3

JBS Dev: On imperfect data and the AI last mile – from model capability to cost sustainability

Today · 15:37 UTC

Joe Rose, president at strategic technology provider JBS Dev, wants to cut through one of the myths of working with generative and agentic AI systems. “It’s a common misconception that your data has to be perfect before…

Read full article →

The Verge

1

iOS 27 might add a lot more customization to the Camera app

Today · 21:36 UTC

Apple's next iOS update could include something phone photographers have been waiting for: a lot more control over the Camera app. According to Bloomberg's Mark Gurman, the Camera app will be "fully customizable" in iOS…

Read full article →
2

Meta won’t let you block its AI account on Threads

Today · 20:35 UTC

Meta announced on Tuesday that it's testing a Threads feature that lets users tag a Meta AI account to get answers to questions or context about a conversation on the platform. If you've spent any time looking at replies…

Read full article →
3

Meta will tell parents when their teens add new interests to their Instagram algorithm

Today · 19:56 UTC

Starting Tuesday, parents can get more details about what their teens are up to on Instagram. Meta is adding a feature to its Teen Accounts that shows parents the "general topics their teens engage with," like "basketbal…

Read full article →

MIT Technology Review AI

1

Fostering breakthrough AI innovation through customer-back engineering

Yesterday · 13:33 UTC

Despite years of digitization, organizations capture less than one-third of the value expected from digital investments, according to McKinsey research. That’s because most big companies begin with technological capabili…

Read full article →
2

Three things in AI to watch, according to a Nobel-winning economist

Yesterday · 17:35 UTC

This story originally appeared in The Algorithm, our weekly newsletter on AI. To get stories like this in your inbox first, sign up here. A few months before he was awarded the Nobel Prize in economics in 2024, Daron Ace…

Read full article →
3

Implementing advanced AI technologies in finance

Yesterday · 13:00 UTC

In finance departments that have long been defined by precision and control, AI has arrived less as a neatly managed upgrade than as a quiet insurgency. Employees are already using it while leadership races to impose str…

Read full article →

TechCrunch AI

1

Report: Google and SpaceX in talks to put data centers into orbit

Today · 17:30 UTC

Google and SpaceX are in talks to build data centers in orbit, pitching space as the future home for AI compute, even as costs today remain far higher than on the ground.

Read full article →
2

Musk mulled handing OpenAI to his children, Altman testifies

Today · 18:05 UTC

Altman said that Musk's focus on controlling the initial for-profit gave him pause because OpenAI was dedicated to keeping advanced AI out of the hands of a single person, and Altman, with his experience running the prom…

Read full article →
3

Anthropic warns investors against secondary platforms offering access to its shares

Today · 17:36 UTC

"Any sale or transfer of Anthropic stock, or any interest in Anthropic stock, offered by these firms is void and will not be recognized on our books and records," the company's support page reads.

Read full article →

NVIDIA AI Blog

1

NVIDIA and SAP Bring Trust to Specialized Agents

Today · 12:30 UTC

Announced today at SAP Sapphire — where NVIDIA founder and CEO Jensen Huang joined SAP CEO Christian Klein’s keynote by video — SAP and NVIDIA’s expanded collaboration helps enterprises run specialized agents with securi…

Read full article →
2

‘Your Career Starts at the Beginning of the AI Revolution,’ NVIDIA CEO Tells Graduates

10 May 2026 · 22:00 UTC

“You are entering the world at an extraordinary moment,” NVIDIA founder and CEO Jensen Huang told graduates as he delivered the keynote address at Carnegie Mellon University’s 128th commencement ceremony on Sunday. “A ne…

Read full article →

ITNews Australia

1

Infrastructure and cyber teams must converge as threats evolve: Infotrust

Today · 22:00 UTC

Cybersecurity is increasingly becoming an infrastructure challenge as organisations struggle to keep pace with rapidly evolving technologies and expanding digital environments.

Read full article →
2

Nokia wins UK appeal to block Acer, Asus video streaming patent lawsuits

Today · 14:08 UTC

As cases are stayed.

Read full article →
3

IAG drives AI more deeply across its operations

Today · 14:06 UTC

Chases three high-level opportunities, uses three methods to grow usage.

Read full article →

Wired AI

1

Ilya Sutskever Stands by His Role in Sam Altman’s OpenAI Ouster: ‘I Didn’t Want It to Be Destroyed’

Yesterday · 23:51 UTC

The former OpenAI chief scientist may be estranged from the company, but he still came to its defense as he testified on Monday.

Read full article →
2

CUDA Proves Nvidia Is a Software Company

Yesterday · 10:00 UTC

There’s a deep, forbidding moat that surrounds Nvidia—and it has nothing to do with hardware.

Read full article →
3

I Work in Hollywood. Everyone Who Used to Make TV Is Now Secretly Training AI

Yesterday · 10:00 UTC

For screenwriters like me—and job seekers all over—AI gig work is the new waiting tables. In eight months, I’ve done 20 of these soul-crushing contracts for five different platforms. It’s bad.

Read full article →

Ars Technica AI

1

The newest AI boom pitch: Host a mini data center at your home

Today · 21:59 UTC

The plan aims to speed up AI compute deployment while compensating residents.

Read full article →
2

“Will I be OK?” Teen died after ChatGPT pushed deadly mix of drugs, lawsuit says

Today · 19:00 UTC

Teen trusted ChatGPT to help him “safely” experiment with drugs, logs show.

Read full article →
3

Google's Android-powered laptops are called Googlebooks, and they're coming this year

Today · 17:00 UTC

Google has revealed its vision for the AI laptop of tomorrow.

Read full article →

Import AI

1

Import AI 456: RSI and economic growth; radical optionality for AI regulation; and a neural computer

Yesterday · 12:46 UTC

What laws does superintelligence demand?

Read full article →

ABC Technology (AU)

1

High Court to hear appeal over 22-year Mount Pleasant coal mine extension

Today · 20:50 UTC

The High Court will hear a major climate change case that could affect mining approvals, as the operator of the Mount Pleasant coal mine seeks to overturn a ruling blocking the project's extension.

Read full article →
2

How fuel prices have impacted car sales

Today · 19:36 UTC

Electric vehicles now represent 16 per cent of new car sales in Australia, in a growing trend coinciding with record fuel prices.

Read full article →
3

Working people to receive extra income tax break in new federal budget

Today · 09:43 UTC

Labor will raise taxes on investment properties and some trust funds, giving the revenue back to workers with a new $250 tax break unveiled in the federal budget.

Read full article →
🏢

Vendor Security

Mandiant Threat Intel

1

GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access

Critical

Yesterday · 14:00 UTC

Executive Summary Since our February 2026 report on AI-related threat activity, Google Threat Intelligence Group (GTIG) has continued to track a maturing transition from nascent AI-enabled operations to the industrial-sc…

Read full article →

Rapid7 Blog

1

How Rapid7 is bringing Cyber GRC closer to security operations

Critical

Today · 13:17 UTC

Sabeen Malik is VP, Global Government Affairs and Public Policy at Rapid7.⠀Security teams need a better way to connect what they detect, what they fix, and what they can prove.The pace of modern security operations no lo…

Read full article →
2

Final Countdown: Last Chance to Join the Rapid7 Global Cybersecurity Summit

High

Yesterday · 12:54 UTC

The Rapid7 2026 Global Cybersecurity Summit is just around the corner, and with it, a final opportunity to join the conversations shaping how security teams are adapting to a rapidly changing landscape.Over the past few…

Read full article →

Cisco Talos

1

Microsoft Patch Tuesday for May 2026 — Snort rules and prominent vulnerabilities

Critical

Today · 19:57 UTC

Microsoft has released its monthly security update for May 2026, which includes 112 vulnerabilities affecting a range of products, including 16 that Microsoft marked as “critical”.

Read full article →
2

State-sponsored actors, better known as the friends you don’t want

Medium

Today · 10:00 UTC

Responding to a state-sponsored threat is nothing like responding to ransomware, and the differences can make or break the outcome. Learn why your IR plan might need revisiting, and the factors you should consider.

Read full article →

Check Point Research

1

11th May – Threat Intelligence Report

Critical

Yesterday · 12:49 UTC

For the latest discoveries in cyber research for the week of 11th May, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Instructure, the US education technology company behind the Canvas learnin…

Read full article →
2

The State of Ransomware – Q1 2026

High

Yesterday · 09:58 UTC

Key Findings Ransomware in Q1 2026: Consolidation at Scale During the first quarter of 2026, we monitored more than 70 active data leak sites (DLS) that collectively listed 2,122 new victims. This figure represents a 12.…

Read full article →

Microsoft Security

1

Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise

High

Today · 15:00 UTC

Microsoft Incident Response investigated an attack operated through legitimate and trusted administrative mechanisms to blend seamlessly into routine operations and remain undetected demonstrating that intrusions have in…

Read full article →
2

Defending consumer web properties against modern DDoS attacks

Medium

Today · 16:00 UTC

Read how to protect consumer websites and defend against modern DDoS attacks with layered security, resilient architecture, and graceful service degradation. The post Defending consumer web properties against modern DDoS…

Read full article →

Microsoft Threat Intel

1

Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise

High

Today · 15:00 UTC

Microsoft Incident Response investigated an attack operated through legitimate and trusted administrative mechanisms to blend seamlessly into routine operations and remain undetected demonstrating that intrusions have in…

Read full article →

Kaspersky Securelist

1

State of ransomware in 2026

High

Today · 07:00 UTC

Kaspersky researchers are sharing insights into the main ransomware trends for 2026: EDR killers on the rise, switching from data encryption to data leaks, and more.

Read full article →

StepSecurity

1

TeamPCP's Mini Shai-Hulud Is Back: A Self-Spreading Supply Chain Attack Compromises TanStack npm Packages

High

Today · 13:58 UTC

The Mini Shai-Hulud worm is actively compromising legitimate npm packages by hijacking CI/CD pipelines and stealing developer secrets. StepSecurity's OSS Package Security Feed first detected the attack in official @tanst…

Read full article →

Palo Alto Unit 42

1

Inside AD CS Escalation: Unpacking Advanced Misuse Techniques and Tools

High

Yesterday · 22:00 UTC

Unit 42 analyzes AD CS exploitation through template misconfigurations and shadow credential misuse while offering behavioral detection for defenders. The post Inside AD CS Escalation: Unpacking Advanced Misuse Technique…

Read full article →

AWS Security

1

AWS Security Agent full repository code scanning feature now available in preview

Medium

Today · 21:34 UTC

Today, we’re excited to announce the preview release of full repository code review, a new capability in AWS Security Agent that performs deep, context-aware security analysis of your entire code base. AI-driven cybersec…

Read full article →
2

Enabling AI sovereignty on AWS

Today · 15:18 UTC

Cloud and AI are transforming industries and societies at unprecedented speed, from accelerating research and enhancing customer experiences to optimizing business processes and enriching public services. At Amazon Web S…

Read full article →
3

Complimentary virtual training: Get hands-on with AWS Security Services

Yesterday · 17:58 UTC

If you’re looking to strengthen your organization’s security posture on Amazon Web Services (AWS) but aren’t sure where to start, then we’re here to help. Security Activation Days are complimentary, virtual, hands-on wor…

Read full article →

OpenAI News

1

How finance teams use Codex

Today · 15:00 UTC

See how finance teams can use Codex to build MBRs, reporting packs, variance bridges, model checks, and planning scenarios from real work inputs.

Read full article →
2

How NVIDIA engineers and researchers build with Codex

Today · 00:00 UTC

Teams use Codex with GPT-5.5 to ship production systems and turn research ideas into runnable experiments.

Read full article →
3

What Parameter Golf taught us about AI-assisted research

Today · 00:00 UTC

Parameter Golf brought together 1,000+ participants and 2,000+ submissions to explore AI-assisted machine learning research, coding agents, quantization, and novel model design under strict constraints.

Read full article →

CrowdStrike Blog

1

Inside CrowdStrike Automated Leads: A Transformative Approach to Threat Detections

Yesterday · 05:00 UTC

Read full article →