103Articles
9Categories
2026-04-27Date
🚨
As the NVD scales back CVE enrichment, here’s what Tenable customers need to knowNIST’s shift toward selective CVE enrichment creates significant visibility gaps for teams relying solely on the National Vulnerability Database. As AI accelerates vulnerability disclosure rates, organizations need independent, high-fidelity intelligence to prioritize risks that …
KEV
🚨
TeamPCP Supply Chain Campaign: Update 008 - 26-Day Pause Ends with Three Concurrent Compromises (Checkmarx KICS, Bitwarden CLI Cascade, xinference PyPI), CanisterSprawl npm Worm Identified, and Tier 1 Coverage Returns, (Mon, Apr 27th)This update succeeds&#;x26;#;xc2;&#;x26;#;xa0; TeamPCP Supply Chain Campaign Update 007 , published April 8, 2026, which left the campaign in credential-monetization mode following the Cisco source code theft via Trivy-linke…
KEV
🐛
CVE-2018-0734 Timing attack against DSA
🐛
CVE-2018-0735 Timing attack against ECDSA signature generation
🐛
Nessus Agent Windows Flaw Enables SYSTEM-Level Code Execution
🐛
Metabase Enterprise RCE Flaw Now Has Public Proof-of-Concept Exploit
🐛
AI is reshaping DevSecOps to bring security closer to the code
🐛
Firefox bug CVE-2026-6770 enabled cross-site tracking and Tor fingerprinting
⚠️
Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud
⚠️
Critical Gemini CLI Flaw Raises Supply Chain Security Concerns
⚠️
Attackers Chain CODESYS Vulnerabilities to Backdoor Applications
⚠️
ADT - 5,488,888 breached accounts
⚠️
U.S. utility giant Itron discloses a security breach
⚠️
25 open-source cybersecurity tools that don’t care about your budget
⚠️
Product showcase: LuLu reveals unauthorized outbound connections from Mac apps
⚠️
OpenClaw Flaws Expose Systems to Policy Bypass Attacks
⚠️
The ‘manager of agents’: How AI evolves the SOC analyst role
⚠️
Rethinking Security from the OS Up in the Age of AI and more RSAC 2026 Interviews - ESW #456
⚠️
Fake Income Tax Notices Used to Spread Malware
⚠️
Itron Discloses Data Breach After Hackers Access Internal Systems
⚠️
Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side
⚠️
PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks
⚠️
Microsoft patched an ‘agent-only’ role that was not
⚠️
27th April – Threat Intelligence Report
⚠️
EU Proposes Forcing Google to Share Search Data With Rivals Under DMA
⚠️
US, UK authorities warn that Firestarter backdoor malware survives patching
⚠️
Medical device giant Medtronic confirms data breach incident
⚠️
Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack
⚠️
Unpatched 'PhantomRPC' Flaw in Windows Enables Privilege Escalation
⚠️
Optimize security operations through an AWS Security Hub POC
⚠️
Open source package with 1 million monthly downloads stole user credentials
📋
Microsoft Releases Enterprise Policy Option to Disable Windows 11 Copilot
📢
TLS Connect gives SMBs a right-sized automated tool to manage TLS certificates
🔥
Cyber Weapon in Toronto, Grid Attack, Stuxnet Lie Exposed
🔥
Critical infrastructure giant Itron says it was hacked
🔥
Hackers impersonate Microsoft Teams help desk to breach corporate networks
🔥
Utilities Tech Supplier Itron Discloses Cyber-Attack, Operations Unaffected
🔥
LINKEDIN BROWSERGATE
🔥
FIRESIDE CHAT: Leaked secrets are now the go-to attack vector — and AI is accelerating exposures
🔥
Ransomware Uses Your Own Permissions
🔥
Major critical infrastructure supplier reports cyberattack
🔥
Senators seek answers about hackers obtaining sensitive student data from ostensibly anonymous tip line
🔥
Hacker who allegedly carried out cyberattacks for China is extradited to U.S.
🔥
Simplicity Stops Data Exfiltration
🔥
Medtronic discloses security incident after ShinyHunters claimed theft of 9M+ records
🔥
The Supreme Court sits on the geofence.
🔥
Pitney Bowes - 8,243,989 breached accounts
🕵️
NPM Worm Hits Namastex Packages, Steals Secrets Across Registries
🕵️
ClickFix Attack Swaps PowerShell for Cmdkey, Remote Regsvr32 Payloads
🕵️
Vidar Malware Conceals Payloads in JPEG, TXT Files to Evade Detection
🕵️
Fast16 Malware Targets High-Value Systems With Sabotage Capabilities
🕵️
Suspicious Microsoft Store App Vibing.exe Allegedly Harvests Screens and Audio
🕵️
Italy moves to extradite Chinese national to the U.S. over hacking charges
🕵️
Aptori expands its platform with autonomous offensive testing to reduce security bottlenecks
🕵️
Your IAM was built for humans, AI agents don’t care
🕵️
The AI criminal mastermind is already hiring on gig platforms
🕵️
North Korean Hackers Target Pharma Firms with Malware-Laced Excel Attacks
🕵️
Why I Chose This $19.97 Lifetime Deal Over MasterClass
🕵️
7 Best Project Budgeting Software in 2026
🕵️
Linux ELF Malware Generator Evades ML Detection With Semantic-Preserving Changes
🕵️
Researchers Warn macOS textutil, KeePassXC Can Fuel Automation Attacks
🕵️
Medieval Encrypted Letter Decoded
🕵️
Price Drop: Upgrade to Windows 11 Pro for Only $10
🕵️
New Malware Hides Behind Obfuscation and Staged Payloads
🕵️
Fake YouTube Downloads Spread Vidar Malware to Steal Corporate Logins
🕵️
Anthropic Draws Google’s $40B Bet in Latest AI Megadeal
🕵️
Get Lifetime Access to Microsoft Office 2021 for Just $30
🕵️
BlackFile actively extorting data-theft victims in retail and hospitality sector
🕵️
New Hack Lets 30-Year-Old Windows PCs Run Modern Linux
🕵️
China’s Honor Just Launched an iPhone Lookalike in Europe
🕵️
Apple Watch Blood Oxygen Monitoring Gets Major Breakthrough
🕵️
EU’s proposed Google data access rule could enable large-scale surveillance
🕵️
EU Funds Sovereign Cloud Infrastructure with €180 Million Contract
🕵️
China Startup Secures $8.4B in Credit Lines for Orbital Data Center Push
🕵️
The Prompt Engineering Cheat Sheet: How to Write Better AI Prompts
🕵️
China Shuts Down Meta’s $2.5B Bid for AI Startup Manus
🕵️
Apple ‘Ultra’ 2026: A New iPhone, MacBook Tier May Be Coming
🕵️
Truecaller Faces New Pressure in India as Growth Matures
🕵️
WhatsApp to End Support for Millions of Older Android Phones in 2026
🕵️
UNC6692 Combines Social Engineering, Malware, Cloud Abuse
🕵️
Supreme Court justices skeptically question both sides in geofence surveillance case
🌐
A week in security (April 20 – April 26)
🌐
Fast16: Pre-Stuxnet malware that targeted precision engineering software
🌐
Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet
🌐
Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware
🌐
20-Year-Old Malware Rewrites History of Cyber Sabotage
🌐
⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More
🌐
Phishing crypto-wallet clones in the App Store and other attacks on iOS and macOS crypto owners | Kaspersky official blog
📡
When security becomes the attack surface: Why endpoint protection must evolve
📡
BlackFile Group Targets Retail and Hospitality with Vishing Attacks
📡
Most Cybersecurity Professionals Feel Undervalued and Underpaid
📡
Parsing Agentic Offensive Security's Existential Threat
📡
Widely Used Browser Extensions Selling User Data
📡
Chinese spy posed as researcher in spear-phishing campaign targeting NASA to steal defense software
📡
US Sanctions Target Cambodian Scam Network Leaders
📡
Disinformation campaign targeted Tibetan parliament-in-exile elections
📡
Italy extradites alleged Chinese state hacker to US
📡
Can I do that with policy? Understanding the AWS Service Authorization Reference
📡
US Supreme Court weighs legality of geofence warrants.
📡
Money launderer for crypto thieves given 5-year sentence
📡
Cole Allen Charged With Attempting to Assassinate Trump
📡
Supreme Court signals location data searches should require a warrant
📡
Tennessee becomes second state to ban cryptocurrency ATMs over scam concerns