91Articles
7Categories
2026-04-24Date
🐛
Hackers Track 900+ React2Shell Exploits via Telegram Bots
🐛
Hackers Exploit Ollama Model Uploads to Leak Server Data
🐛
CVE-2026-5958 Race Condition in GNU Sed
🐛
CVE-2026-31531 ipv4: nexthop: allocate skb dynamically in rtm_get_nexthop()
🐛
CVE-2026-41989
🐛
CVE-2026-41988
🐛
CVE-2026-31532 can: raw: fix ro->uniq use-after-free in raw_rcv()
🐛
Python Vulnerability Enables Out-of-Bounds Write on Windows
🐛
LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure
🐛
Hackers Exploit Cisco Firepower N-Day Flaws for Unauthorized Access
🐛
12-year-old Pack2TheRoot bug lets Linux users gain root privileges
🐛
Metasploit Wrap-Up 04/25/2026
⚠️
Inside The Vercel Supply Chain Exploit
⚠️
Hackers Exploit SS7 and Diameter Flaws to Track Mobile Users Globally
⚠️
PhantomRPC: A new privilege escalation technique in Windows RPC
⚠️
Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2
⚠️
Xiongmai IP Camera Flaw Lets Attackers Bypass Authentication
⚠️
Hackers Exploit Pastebin PowerShell Script to Hijack Telegram Sessions
⚠️
Firefox flaw enables cross-site tracking, undermines Tor Browser defenses
⚠️
Hackers Exploit Agent ID Administrator Role to Hijack Service Principals
⚠️
UK Biobank Data Breach: Health Data of 500,000 Listed for Sale in China
⚠️
3 Reasons to Attend our Global Cybersecurity Summit if you’re Focused on AI, Threats, and CTEM
⚠️
CIS Control Becomes Law
⚠️
FIRESTARTER malware remained on Cisco devices after patches were applied.
⚠️
Meta’s Biggest Layoff of 2026 Is Confirmed to Start Next Month
⚠️
CISA last in line for access to Anthropic Mythos
⚠️
New US House privacy bills raise hard questions about enterprise data collection
⚠️
When Updates Turn Into Malware
📢
Chinese attackers are pwning your infrastructure to use in attacks, 10 countries warn
📢
Chinese attackers are pwning your infrastructure to use in attacks, 10 countries warn
📢
China-linked threat actors use consumer device botnets to evade detection, warn UK and partners
📢
Compromised everyday devices power Chinese cyber espionage operations
📢
New Cisco firewall malware can only be killed by pulling the plug
📢
Norway's prime minister proposes ban on social media access for young teens
📢
NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software
📢
FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches
📢
Iran’s cyber threat may be less ‘shock and awe’ than ‘low and slow,’ officials say
📢
A digital battlefield in practice.
📢
Latest spy power reauthorization bill leaves critics unimpressed
🔥
Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Attack
🔥
Carnival - 7,531,359 breached accounts
🔥
Ransomware Gang Unveils Custom Data-Theft Tool
🔥
Hackers Impersonate IT Helpdesk Staff to Breach Firms via Microsoft Teams
🔥
Bitwarden CLI Compromised After Malicious GitHub Actions Workflow
🔥
China-Linked Hackers Hide Behind Compromised Routers
🔥
AI is speeding up nation-state cyber programs
🔥
Checkmarx supply chain attack impacts Bitwarden npm distribution path
🔥
AI Phishing Is No. 1 With a Bullet for Cyberattackers
🔥
Signal phishing campaign targets Germany’s Bundestag President Julia Klöckner
🔥
Hasbro expects March cyberattack to impact second-quarter revenue
🔥
Scattered Spider co-conspirator pleads guilty
🔥
ADT says customer data stolen in cyber intrusion
🔥
ADT confirms data breach after hacker claims 10 million records stolen
🕵️
ISC Stormcast For Friday, April 24th, 2026 https://isc.sans.edu/podcastdetail/9906, (Fri, Apr 24th)
🕵️
PLC Cybersecurity — Securing Industrial Control Systems
🕵️
Turn Your iPad Into a Work Machine While This Keyboard Case Is $30 Off
🕵️
Sign, Send, and Manage Documents Online for Just $79
🕵️
Ubuntu 26.04 LTS delivers memory-safe system tools and live patching for Arm servers
🕵️
OpenAI’s GPT-5.5 is out with expanded cybersecurity safeguards
🕵️
Void Dokkaebi Hackers Spread Malware Through Fake Job Interviews
🕵️
Covert telecom spying campaign “Ghost Operators” tracks users worldwide
🕵️
Meta is overhauling how you sign in, manage settings, and protect your accounts
🕵️
Fake CAPTCHA Scam Triggers Costly SMS Fraud
🕵️
Hiding Bluetooth Trackers in Mail
🕵️
GPT-5.5 Bio Bug Bounty Program Aims to Improve AI Safety and Performance
🕵️
Claude Desktop Reportedly Adds Browser Access Bridge for Chromium Browsers
🕵️
Mythos Mystery in Mozilla Numbers: How 22 Vulns Became 271 or Maybe 3 in April
🕵️
Inside agenteV2: How Brazilian Attackers Use Fake Court Summons to Steal Banking Credentials in Real Time
🕵️
Off-Topic Friday
🕵️
North Korea's Lazarus Targets macOS Users via ClickFix
🕵️
Windows 10 Support Is Over. Here Are 6 Options for Users
🕵️
US lawmakers introduce bill to require warrants for government data searches
🕵️
Health Records of 500,000 UK Biobank Volunteers Listed Online in China
🕵️
TGR-STA-1030: New Activity in Central and South America
🕵️
Friday Squid Blogging: How Squid Survived Extinction Events
🕵️
Scylla &Charybdis, Kyber, Trigonia, Namastex, GitHub, Crypto, Cables, Aaran Leyland - SWN #575
🕵️
The npm Threat Landscape: Attack Surface and Mitigations
🕵️
DeepSeek Drops Cheaper V4 AI as Huawei Jumps In
🌐
Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation
🌐
26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases
🌐
Another spyware maker caught distributing fake Android snooping apps
📡
Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine
📡
Medical data of 500,000 UK volunteers listed for sale on Alibaba
📡
AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns
📡
Toronto police arrest three in Canada’s first mobile SMS blaster case
📡
The Latest Push to Extend Key US Spy Powers Is Still a Mess
📡
Glasswing Secured the Code. The Rest of Your Stack Is Still on You
📡
Pentagon grapples with securing AI as it moves toward autonomous warfare
📡
Protecting your secrets from tomorrow’s quantum risks
📡
US Busts Myanmar Ring Targeting US Citizens in Financial Fraud
📡
Eavesdropping via fiber-optic cables | Kaspersky official blog