130Articles
9Categories
2026-04-29Date
🚨
U.S. CISA adds Microsoft Windows Shell and ConnectWise ScreenConnect flaws to its Known Exploited Vulnerabilities catalogU.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Windows Shell and ConnectWise ScreenConnect flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Windows Shell and ConnectWise ScreenConnect f…
KEV
🚨
CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEVThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities are l…
KEV
🚨
CISA adds Microsoft, ConnectWise vulnerabilities to active exploitation catalogRussia has used one of the flaws, security experts said, while North Korea has used the other.
πŸ›
LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure
πŸ›
GitHub.com and Enterprise Server Vulnerability Allows Remote Code Execution
πŸ›
CISA Warns of Windows Shell Zero-Day Exploited in Attacks
KEV
πŸ›
CVE-2026-24051 OpenTelemetry-Go Affected by Arbitrary Code Execution via PATH Hijacking
πŸ›
CVE-2017-3735
πŸ›
CVE-2017-3736
πŸ›
CVE-2019-1547 ECDSA remote timing attack
πŸ›
CVE-2019-1549 Fork Protection
πŸ›
CVE-2019-1563 Padding Oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey
πŸ›
CVE-2026-31686 mm/kasan: fix double free for kasan pXds
πŸ›
CVE-2026-41898 rust-openssl: Unchecked callback-returned length in PSK and cookie generate trampolines can cause OpenSSL to leak adjacent memory to the network peer
πŸ›
CVE-2026-33999 Xorg: xwayland: x.org x server: denial of service via integer underflow in xkb compatibility map handling
πŸ›
CVE-2026-31689 EDAC/mc: Fix error path ordering in edac_mc_alloc()
πŸ›
CVE-2026-31688 driver core: enforce device_lock for driver_match_device()
πŸ›
CVE-2026-31548 wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down
πŸ›
CVE-2026-31549 i2c: cp2615: fix serial string NULL-deref at probe
πŸ›
CVE-2026-31550 pmdomain: bcm: bcm2835-power: Increase ASB control timeout
πŸ›
CVE-2026-31551 wifi: mac80211: Fix static_branch_dec() underflow for aql_disable.
πŸ›
CVE-2026-31552 wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom
πŸ›
CVE-2026-31584 media: mediatek: vcodec: fix use-after-free in encoder release path
πŸ›
CVE-2026-31661 wifi: brcmsmac: Fix dma_free_coherent() size
πŸ›
CVE-2026-31563 net: macb: Use dev_consume_skb_any() to free TX SKBs
πŸ›
CVE-2026-31648 mm: filemap: fix nr_pages calculation overflow in filemap_map_pages()
πŸ›
CVE-2026-40225
πŸ›
CVE-2026-5435 Potential buffer overflow in ns_sprintrrf TSIG handling path
πŸ›
CVE-2026-40556 Insecure Directory Permissions in GNU nano Leading to Privilege Abuse
πŸ›
CVE-2026-6861 Emacs: emacs: memory corruption vulnerability when processing svg css
πŸ›
CVE-2026-2708 Libsoup: libsoup: http request smuggling via duplicate content-length headers
πŸ›
CVE-2026-6732 Libxml2: libxml2: denial of service via crafted xsd-validated document
πŸ›
CVE-2026-6019 BaseCookie.js_output() does not neutralize embedded characters
πŸ›
CVE-2026-34001 Xorg: xwayland: x.org x server: use-after-free vulnerability leads to server crash and potential memory corruption
πŸ›
CVE-2026-34003 Xorg: xwayland: x.org x server: information exposure and denial of service via out-of-bounds memory access
πŸ›
CISA, Microsoft warn of active exploitation of Windows Shell vulnerability (CVE-2026-32202)
πŸ›
CVE-2026-3854 Exposes a Critical Weak Point in GitHub’s Git Push Pipeline
πŸ›
CISA Warns of ConnectWise ScreenConnect Flaw Exploited in Attacks
KEV
πŸ›
Critical GitHub RCE bug exposed millions of repositories
πŸ›
CVE-2026-42208: LiteLLM bug exploited 36 hours after its disclosure
πŸ›
CVE-2026-41940: cPanel & WHM Authentication Bypass
KEV
⚠️
CI/CD pipeline abuse: the problem no one is watching
⚠️
More fake extensions linked to GlassWorm found in Open VSX code marketplace
⚠️
Product showcase: SimpleX Chat removes user identifiers from messaging
⚠️
Massive Python Supply Chain Hack, $2.1B Scam Losses, North Korea Targets Crypto Execs
⚠️
cPanel Releases Emergency Patch for Critical Authentication Flaw
⚠️
Risky Business #835 -- Why the Fast16 malware is badass
⚠️
Vimeo Confirms Data Breach After Hackers Access User Database
⚠️
ShinyHunters exploit Anodot incident to target Vimeo
⚠️
Virtue AI PolicyGuard turns AI policies into enforceable runtime guardrails
⚠️
SLOTAGENT Malware Hides API Calls and Strings to Thwart Analysis
⚠️
DigitalOcean AI-Native Cloud unifies infrastructure, inference, and agents for production AI
⚠️
Claude Mythos Has Found 271 Zero-Days in Firefox
⚠️
Critical cPanel Authentication Vulnerability Identified β€” Update Your Server Immediately
⚠️
AWS leans on prior ingenuity to face future AI and quantum threats
⚠️
The Next Frontier: Autonomous Security and RSAC Interviews from Quantro & SandboxAQ - BSW #445
⚠️
Cursor AI Coding Agent Vulnerability Lets Attackers Run Code on Developers’ Machines
⚠️
U.S. Charges Suspected Scattered Spider Member Over Cyber Intrusions
⚠️
Extending Ruzzy with LibAFL
⚠️
Cursor AI Extension Flaw Exposes Developer Tokens to Credential Theft
⚠️
Mastering agentic AI security through exposure management
⚠️
Experts on Experts: The 2026 Threat Landscape is Moving Faster than Defenders Expect
⚠️
Microsoft won’t patch PhantomRPC: Feature or bug?
⚠️
All supported cPanel versions hit by critical auth bug, now patched
⚠️
Swiss police arrest 10 suspected members of Nigeria-linked crime group Black Axe
⚠️
AI Speeds Up Cyber Attacks
⚠️
AI Finds 38 Security Flaws in Electronic Health Record Platform
⚠️
What It Takes to Run Marketing Solo with Sara Ceballos, Director of Marketing at BreachRx
⚠️
A wake-up call on frontier AI.
⚠️
Reverse Engineering With AI Unearths High-Severity GitHub Bug
⚠️
Five Things we Took Away from Gartner SRM Sydney 2026
πŸ“‹
Microsoft Confirms Remote Desktop Warning Issue After April Update
πŸ“’
amazee.ai’s amazeeClaw simplifies production deployment of AI agents with regional control
πŸ“’
Alleged Silk Typhoon hacker extradited to the United States to face charges
πŸ“’
Sri Lanka discloses another missing payment, days after hackers stole $2.5M from its finance ministry
πŸ”₯
BlueNoroff Deploys Fileless PowerShell in AI-Generated Zoom Lure Campaign
πŸ”₯
Vect 2.0 RaaS Expands Attacks Across Windows, Linux, and ESXi
πŸ”₯
LofyStealer Targets Minecraft Players via Node.js Loader and Browser Injection
πŸ”₯
VECT 2.0 Ransomware Wipes Large Files Across Windows, Linux & ESXi
πŸ”₯
Critical Flaw Turns Vect Ransomware into Data Destroying Wiper
πŸ”₯
Researchers Track 2.9 Billion Compromised Credentials
πŸ”₯
OpenAI and Anthropic brief Congress on cyber-capable AI models.
πŸ”₯
European Commission accuses Meta of breaching child safety rules
πŸ”₯
Vect 2.0 Ransomware Acts as Wiper, Thanks to Design Error
πŸ”₯
SAP npm Packages Compromised by β€œMini Shai-Hulud” Credential-Stealing Malware
πŸ”₯
Google AppSheet abused to compromise 30,000 Facebook accounts
πŸ”₯
Smashing Security podcast #465: This developer wanted to cheat at Roblox. It cost millions
πŸ•΅οΈ
ISC Stormcast For Wednesday, April 29th, 2026 https://isc.sans.edu/podcastdetail/9910, (Wed, Apr 29th)
πŸ•΅οΈ
The Exchange Online security controls organizations keep getting wrong
πŸ•΅οΈ
AI prompt confidentiality and false citations worry researchers
πŸ•΅οΈ
Identity discovery: The overlooked lever in strategic risk reduction
πŸ•΅οΈ
Fedora Linux 44 ships with GNOME 50 and KDE Plasma 6.6
πŸ•΅οΈ
Margin vs. Madness: Fixing MSSP Top 5 Operational Nightmares
πŸ•΅οΈ
Eino’s agentic network observability platform enables real-time, AI-driven network insights
πŸ•΅οΈ
Microchip expands Trust Shield with PQC-ready root of trust and secure boot controllers
πŸ•΅οΈ
Kaseya agentic IT management unifies data and automates ticketing, security and backups
πŸ•΅οΈ
At Machine Speed
πŸ•΅οΈ
AI-powered honeypots: Turning the tables on malicious AI agents
πŸ•΅οΈ
Scam-checking just got a lot easier: Malwarebytes is now in Claude
πŸ•΅οΈ
9 Best Project Management Software in 2026
πŸ•΅οΈ
State CISOs losing confidence in ability to manage cyber risks
πŸ•΅οΈ
Apple removes AdGuard’s TrustTunnel iOS app from Russian App Store
πŸ•΅οΈ
Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks
πŸ•΅οΈ
Phishing Attacks Target Executives via Microsoft Teams
πŸ•΅οΈ
Lazarus Targets macOS Users With New β€œMach-O Man” Malware Kit
πŸ•΅οΈ
A Practical Guide to BloodHound Data Collection
πŸ•΅οΈ
Set AI Security Red Lines Now
πŸ•΅οΈ
This $30 Subscription Will Bring AI Into Your Business
πŸ•΅οΈ
Congress, industry ponder government posture for protecting data centers
πŸ•΅οΈ
SAS Launches AI Governance Tools to Tame Agentic AI in the Enterprise
πŸ•΅οΈ
AWS to Resell OpenAI Products After Microsoft Loses Exclusive License
πŸ•΅οΈ
New Apple Rumor: iOS 27 Could Add AI Editing Tools to Photos
πŸ•΅οΈ
Hackers Abuse Robinhood Signup Process to Deliver Phishing Emails
πŸ•΅οΈ
CISOs Step Into the Boardroom
🌐
Lotus Wiper Attack Targeted Venezuelan Energy Firms, Utilities
🌐
New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs
πŸ“‘
Weekly Threat Bulletin – April 29th, 2026
πŸ“‘
A Quarter of Healthcare Organizations Report Medical Device Cyber-Attacks
πŸ“‘
What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)
πŸ“‘
Today's Odd Web Requests, (Wed, Apr 29th)
πŸ“‘
Malicious npm Dependency Linked to AI Assisted Commit Targets Crypto Wallets
πŸ“‘
What Is Dark Web Monitoring?
πŸ“‘
Cursor Extension Flaw Exposes Developer API Keys
πŸ“‘
Internet censorship index reveals Russia’s lead and widespread content blocking
πŸ“‘
Vehicle-based surveillance tools | Kaspersky official blog
πŸ“‘
Designing trust and safety into Amazon Bedrock powered applications
πŸ“‘
Cloudsmith raises $72 million in Series C funding.
πŸ“‘
US, China partner on scam center takedown in Dubai
πŸ“‘
Researchers built a chatbot that only knows the world before 1931
πŸ“‘
House approves spy program on second attempt, Senate fate murky