108Articles
8Categories
2026-05-06Date
πŸ›
QR Phishing Explodes, Ubuntu Under Attack, CISA Warns Critical Infrastructure Prepare for Isolation
πŸ›
Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution
KEV
πŸ›
CVE-2026-43037 ip6_tunnel: clear skb2->cb[] in ip4ip6_err()
πŸ›
CVE-2026-43964
πŸ›
Critical Palo Alto Firewall Vulnerability Enables Attackers to Gain Root Privileges
πŸ›
Argo CD ServerSideDiff Flaw Allows Attackers to Extract Kubernetes Secrets
πŸ›
Palo Alto Networks PAN-OS flaw exploited for remote code execution
KEV
πŸ›
Apache fixes critical HTTP/2 double-free flaw CVE-2026-23918 enabling RCE
πŸ›
WhatsApp warns of Instagram Reels bug that could load risky content
KEV
πŸ›
Root-level RCE vulnerability in Palo Alto firewalls exploited (CVE-2026-0300)
KEV
πŸ›
Critical Buffer Overflow in Palo Alto Networks PAN-OS User-ID Authentication Portal (CVE-2026-0300)
KEV
πŸ›
Palo Alto warns of critical software bug used in firewall attacks
⚠️
Weekly Update 502
⚠️
Zero-Auth Vulnerability Enables Cross-Tenant Access at DoD Contractor
⚠️
Malicious OpenClaw Skill Targets Agentic AI Workflows to Deploy RATs and Stealers
⚠️
Ransomware Gangs Escalate Attacks on Aviation and Aerospace Sector
⚠️
Risky Business #836 -- You can't patch the bugpocalypse
⚠️
Russia’s Forest Blizzard Is Abusing Home + Small Office Routers for Cred Theft
⚠️
Proofpoint Establishes Innovation Precedent for Source-Agnostic Modern Enterprise Investigations
⚠️
Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs
⚠️
Salesforce Marketing Cloud Vulnerability Exposes Email Data Risk
⚠️
Poisoned truth: The quiet security threat inside enterprise AI
⚠️
Train like you fight: Why cyber operations teams need no-notice drills
⚠️
Teach to Sell and Two Interviews from RSAC 2026 from Dropzone AI and Microsoft - BSW #446
⚠️
CloudZ RAT Exploits Microsoft Phone Link to Steal SMS OTPs
⚠️
Intel 471 speeds threat hunting and remediation with Retroactive Threat Detections
⚠️
UiPath adds agentic AI capabilities to Automation Suite for government agencies
⚠️
New Relic advances AI observability with new intelligence layer
⚠️
ServiceNow strengthens enterprise AI security with Autonomous Security & Risk platform
⚠️
Taiwan High Speed Rail Hit by Spoofing Attack That Stops Three Trains
⚠️
New malware turns Linux systems into P2P attack networks
⚠️
Attackers Continue to Pose as Help Desks in Social Engineering Attacks
⚠️
Phishing Attack Weaponizes Calendar Invites to Steal Login Credentials
⚠️
Massive DDoS Attack Generates 2.45 Billion Requests Using 1.2 Million IP Addresses
⚠️
FEMITBOT Network Exploits Telegram Mini Apps to Spread Crypto Scams and Android Malware
⚠️
Anthropic’s CEO warns the β€œmoment of danger” is real. But most are looking in the wrong place.
⚠️
Muddying the Tracks: The State-Sponsored Shadow Behind Chaos Ransomware
⚠️
CloudZ Malware Abuses Phone Link to Steal SMS OTPs
⚠️
GrapheneOS fixes Android VPN leak Google refused to patch
⚠️
CISA warns of CopyFail exploitation.
⚠️
Speed, Not AI, Breaks You
⚠️
A critical Palo Alto PAN-OS zero-day is being exploited in the wild
KEV
⚠️
A Vulnerability in Apache HTTP Server Could Allow for Remote Code Execution
⚠️
The exploit that writes its own story.
⚠️
A Vulnerability in PAN-OS Could Allow for Remote Code Execution
πŸ“’
Iran-Linked Hackers Target Oman Ministries in Webshell and Data Theft Campaign
πŸ“’
Attackers Bypass Azure AD Conditional Access Using Phantom Device Registration
πŸ“’
How CISOs Reduce Cyber Risk with MITRE ATT&CK
πŸ“’
CISA Urges Critical Infrastructure Providers to Make Plans to Remain Operational if hit by Cyber-Attack
πŸ“’
NIST will test three major tech firms’ frontier AI models for cybersecurity risks
πŸ“’
Iranian state-backed spies pose as ransomware slingers in false flag attacks
πŸ“’
New CISA initiative aims for critical infrastructure to operate offline during cyberattacks
πŸ“’
New compliance guide available: ISO/IEC 42001:2023 on AWS
πŸ”₯
QLNX Targets Developers in Supply Chain Credential Theft Campaign
πŸ”₯
Ransomware Gang Member Linked to Russian Cybercrime Group Sentenced to Prison
πŸ”₯
Vimeo Confirms Breach Exposing 119,000 Unique User Email Addresses
πŸ”₯
Middle East Cyber Battle Field Broadens β€” Especially in UAE
πŸ”₯
LegionProxy - 10,144 breached accounts
πŸ”₯
Millions of students’ personal data stolen in major education breach
πŸ”₯
Iran-Linked APT Posed as Chaos Ransomware Member in Espionage Campaign
πŸ”₯
MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack
πŸ”₯
Iran-sponsored threat group behind false flag social engineering campaign
πŸ”₯
Cybercriminals Are Complaining About AI Slop Flooding Their Forums
πŸ”₯
Iranian cyber espionage disguised as a Chaos Ransomware attack
πŸ”₯
DOJ says ransomware gang tapped into Russian government databases
πŸ”₯
AI evaluation startup Braintrust confirms breach, tells every customer to rotate sensitive keys
πŸ”₯
Instructure Breach Exposes Schools' Vendor Dependence
πŸ•΅οΈ
ISC Stormcast For Wednesday, May 6th, 2026 https://isc.sans.edu/podcastdetail/9920, (Wed, May 6th)
πŸ•΅οΈ
Remus Infostealer Adopts Lumma-Style Browser Key Theft to Bypass App-Bound Encryption
πŸ•΅οΈ
Your Container Is Not a Sandbox
πŸ•΅οΈ
Rowhammer Attack Against NVIDIA Chips
πŸ•΅οΈ
Insights into the clustering and reuse of phone numbers in scam emails
πŸ•΅οΈ
Extreme Networks introduces Agent ONE for autonomous enterprise networking
πŸ•΅οΈ
8Γ—8 updates CX platform with AI, analytics, and frontline management capabilities
πŸ•΅οΈ
Proton Mail brings quantum-safe email encryption to all accounts
πŸ•΅οΈ
groundcover expands its observability platform with enhanced Synthetic Monitoring and RUM
πŸ•΅οΈ
Megaport enhances network resilience with integrated DDoS protection
πŸ•΅οΈ
Darkhub Hacking-for-Hire Portal Promotes Crypto Fraud and Spyware Services
πŸ•΅οΈ
Microsoft Teams on Android Now Lets Users Join External Meetings Through SIP
πŸ•΅οΈ
OceanLotus suspected of using PyPI to deliver ZiChatBot malware
πŸ•΅οΈ
Swapper – A Pure Regex Match/Replace Burp Extension
πŸ•΅οΈ
Google Chrome silently installs 4GB Gemini Nano AI model on user devices
πŸ•΅οΈ
Salat Malware Abuses QUIC and WebSockets for Stealthy C2 Control
πŸ•΅οΈ
Belief Comes Before Growth
πŸ•΅οΈ
Businesses eager but unprepared for AI to transform their security strategies
πŸ•΅οΈ
Mozilla, Mullvad, Proton, sign letter opposing UK age verification
πŸ•΅οΈ
Building Trust in Low-Touch Teams
πŸ•΅οΈ
A DOD contractor’s API flaw exposed military course data and service member records
🌐
Malicious PyTorch Lightning update hits AI supply chain security
🌐
Google's Android Apps Get Public Verification to Stop Supply Chain Attacks
🌐
Websites with an undefined trust level: avoiding the trap
🌐
How VoidStealer bypasses Chrome’s protections to hijack sessions and steal data | Kaspersky official blog
🌐
LABScon25 Replay | Please Connect to the Foreign Entity to Enhance Your User Experience
🌐
Attackers adopt JavaScript runtime Bun to spread NWHStealer
🌐
Some kids are bypassing age verification checks with a fake mustache
🌐
Yet Another Way to Bypass Google Chrome's Encryption Protection
πŸŽ™οΈ
Smashing Security podcast #466: Meta sees everything, Copy Fail, and a deepfake gets hired
πŸ“‘
Weekly Threat Bulletin – May 6th, 2026
πŸ“‘
One in Eight Workers Has Sold Their Corporate Logins
πŸ“‘
From Stuxnet to ChatGPT: 20 News Events That Shaped Cyber
πŸ“‘
The Hacker News Launches 'Cybersecurity Stars Awards 2026' β€” Submissions Now Open
πŸ“‘
Your AI Agents Are Already Inside the Perimeter. Do You Know What They're Doing?
πŸ“‘
Hackers compromise Daemon Tools in global supply-chain attack, researchers say
πŸ“‘
Google Chrome’s silent 4GB AI download problem
πŸ“‘
XBOW secures an additional $35 million in Series C funding.
πŸ“‘
A Kid With a Fake Mustache Tricked an Online Age-Verification Tool
πŸ“‘
After 17 years, Gavril Sandu extradited to U.S. for hacking scheme
πŸ“‘
Taiwan High-Speed Rail Emergency Braking Hack: How a Student Stopped the Trains and Exposed a Major Security Gap