108Articles
8Categories
2026-04-28Date
🐛
Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202
KEV
🐛
Critical LiteLLM Flaw Enables Database Attacks Through SQL Injection
🐛
Notepad++ Vulnerability Lets Attackers Crash App and Expose Memory Data
🐛
Infected Cisco firewalls need cold start to clear persistent Firestarter backdoor
🐛
Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE
🐛
Hugging Face LeRobot Flaw Opens Door to Remote Code Execution Attacks
🐛
Critical Cursor bug could turn routine Git into RCE
🐛
Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push
🐛
CVE-2026-3854 GitHub flaw enables remote code execution
⚠️
Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover
⚠️
ClickUp Security Flaw Exposes 959 Emails Linked to Major Fortune 500 Firms
⚠️
Claude Opus 4.6-Powered AI Coding Agent Wipes Production Database in 9 Seconds
⚠️
What CISOs need to get right as identity enters the agentic era
⚠️
Stopping AiTM attacks: The defenses that actually work after authentication succeeds
⚠️
Top 10 Web Hacking Techniques of 2025 and a Hint for 2026 - James Kettle - ASW #380
⚠️
Building Resilience in a World of Constant Threats
⚠️
Vimeo suffers 3rd-party breach exposing user data, hackers threaten leak
⚠️
MDR Selection is a Partnership Decision
⚠️
After Mythos: New Playbooks For a Zero-Window Era
⚠️
Securing RAG pipelines in enterprise SaaS
⚠️
What Anthropic’s Mythos Means for the Future of Cybersecurity
⚠️
Microsoft fixes Entra ID flaw enabling privilege escalation
⚠️
HTTP Requests with X-Vercel-Set-Bypass-Cookie Header, (Tue, Apr 28th)
⚠️
Securing the git push pipeline: Responding to a critical remote code execution vulnerability
⚠️
Signal Phishing Campaign Targets German Officials in Suspected Russian Operation
⚠️
Get Motivated: What to Expect from Our Keynote at Rapid7's Global Cybersecurity Summit
⚠️
Access control with IAM Identity Center session tags
⚠️
A Vulnerability in OpenSSH Could Allow for Authentication Bypass
⚠️
Why Sharing a Screenshot Can Get You Jailed in the UAE
⚠️
Pitney Bowes confirms Salesforce breach after hacker leaks 25 million records
⚠️
Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
⚠️
Oracle Quarterly Critical Patches Issued April 21, 2026
⚠️
Vidar Rises to Top of Chaotic Infostealer Market
⚠️
Spy agency officials say job loss anxiety, moving fast ‘safely’ among top challenges in AI workforce overhaul
📋
Fake Tax Audits and Updates Fuel Silver Fox Malware Campaign
📢
French police arrest 21-year-old “HexDex” hacker over 100 alleged data breaches
📢
No Metrics Are Better Than Bad Metrics in the SOC, Says NCSC
📢
NCSC launches SilentGlass, a plug-in device to secure HDMI and DisplayPort links
📢
Signal to roll out anti-phishing safeguards following account takeovers
📢
War hits where it hurts.
🔥
Weekly Update 501
🔥
Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks
🔥
Proofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in Place
🔥
Checkmarx Confirms Security Incident Involving GitHub Repository Exposure
🔥
Ransomware Turf War as 0APT and KryBit Groups Trade Blows
🔥
VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi
🔥
Iran war updates.
🔥
Medtronic Confirms Data Breach After ShinyHunters Claims
🔥
VECT: Ransomware by design, Wiper by accident
🔥
Video site Vimeo blames security incident on Anodot breach
🔥
ADT Confirms Major Data Breach Exposing Millions of Names, Partial SSNs
🔥
What the March 2026 Threat Technique Catalog update means for your AWS environment
🔥
Feuding Ransomware Groups Leak Each Other's Data
🕵️
Chinese national extradited to US for pandemic-era Silk Typhoon attacks
🕵️
ISC Stormcast For Tuesday, April 28th, 2026 https://isc.sans.edu/podcastdetail/9908, (Tue, Apr 28th)
🕵️
Microsoft Expands Copilot Agent Mode for Outlook Inbox and Calendar Tasks
🕵️
Chinese-Backed Smishing Rings Scale Credential Theft via SMS and OTT Apps
🕵️
Sandworm Uses SSH-over-Tor Tunnel for Stealthy Long-Term Persistence
🕵️
WhatsApp Tests Encrypted Cloud Backup Service for Safer Message Storage
🕵️
OilRig Hides C2 Config in Google Drive Image via LSB Steganography
🕵️
Fake KYC Android Malware Spreads via WhatsApp to Hijack Bank Accounts
🕵️
GUEST ESSAY: How augmented reality (AR) can turn building images into ad space with no control
🕵️
U.S. companies hit with record fines for privacy in 2025
🕵️
North Korean Hackers Target Crypto Firms with ClickFix and AI-Made Zoom Lures
🕵️
Google Cloud Next AI Keynote: 5 Takeaways for IT Leaders
🕵️
Best Legal Project Management Software in 2026
🕵️
Fake CAPTCHA scam turns a quick click into a costly phone bill
🕵️
Silk Typhoon Hacker Extradited to U.S. from Italy
🕵️
Phishing-to-RMM Attacks: The Remote Access Blind Spot CISOs Can’t Ignore
🕵️
Chinese National Extradited Over Silk Typhoon Cyber Campaign
🕵️
5 Stages of The Threat Intelligence Lifecycle
🕵️
CyberheistNews Vol 16 #17 [Heads Up] This Sophisticated Scam Should Be a Warning to All Companies
🕵️
AI’s False Novelty Trap
🕵️
Rep. Delia Ramirez takes over as top House cybersecurity Dem
🕵️
‘Fundamental tension’ undermines manufacturers’ cybersecurity
🕵️
Stop Juggling AI Tools — This Lifetime Deal Puts GPT‑4o and More in One Place
🕵️
Visual Studio 2026 Brings AI Deeper Into Development and It’s 90% Off Right Now
🕵️
50k on YouTube!
🕵️
50K Subscribers. This is Security Weekly.
🕵️
Apple’s $599 Mac mini Sells Out, Resurfaces on eBay Above Retail
🕵️
Google, Kaggle Relaunch Free AI Course Focused on ‘Vibe Coding’
🕵️
Samsung Galaxy Glasses Leak: Pricing, Specs, and Launch Timeline Revealed
🕵️
‘Windows K2’ Could Be Microsoft’s Answer to Years of Windows 11 Frustration
🕵️
Xpeng Flying Car Deliveries Target 2027 as Certification Gaps Remain
🕵️
ORMs Reopened Injection Risks
🕵️
Police arrest 10 suspected members of Black Axe cybercrime gang
🕵️
Federal CIO cautious on Anthropic’s Mythos despite planned rollout
🕵️
Elfsmasher, PYPI, Facebook, Glassworm, Medtronic, OpenSSH, Sararimen, Aaran Leyland - SWN #576
🕵️
ClickUp Data Leak Exposes Enterprise Emails for Over a Year
🕵️
BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
🕵️
Play-to-Earn Collapse Risk
🕵️
FIDO Alliance wants to keep AI agents from going rogue on online payments
🌐
New Android spyware Morpheus linked to Italian surveillance firm
🌐
Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About
🌐
Fresh Wave of GlassWorm VS Code Extensions Slices Through Supply Chain
🌐
Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign
🌐
Paragon is not collaborating with Italian authorities probing spyware attacks, report says
📡
Chinese engineer stole US military and NASA software for years
📡
From DMV to Wallet: Understanding Verifiable Digital Credential Issuance
📡
The Hunt for American Turncoats in World War II Europe
📡
From the Kaiser to the Führer: Inside the World of Lothar Witzke
📡
A practical guide to secure vibe-coding for small businesses | Kaspersky official blog
📡
Five defender priorities from the Talos Year in Review
📡
Ukrainian police detain hackers suspected of stealing thousands of Roblox accounts for resale
📡
The Race Is on to Keep AI Agents From Running Wild With Your Credit Cards
📡
US Supreme Court appears split over controversial use of ‘geofence’ search warrants
📡
Cyber Command, NSA chief warns foreign adversaries likely to target midterms
📡
NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later