134Articles
9Categories
2026-05-19Date
๐Ÿšจ
Key findings from the Verizon DBIR 2026: Slower vulnerability remediation meets faster exploitationThe 2026 Verizon Data Breach Investigations Report (DBIR) reveals a troubling trend: vulnerability exploitation has surged to become the number one initial access vector while remediation rates have worsened. Key takeaways Vulnerability exploitation has surged to become the leadiโ€ฆ
KEV
๐Ÿ›
Exchange Zero-Day Under Attack, Ransomware Gets Smarter, Fortinet Critical Flaws
KEV
๐Ÿ›
CVE-2026-7246 Pallets Click contains a command injection via Unsanitized Filename "click.edit()"
๐Ÿ›
CVE-2026-31721 usb: gadget: f_hid: move list and spinlock inits from bind to alloc
๐Ÿ›
CVE-2026-31704 ksmbd: use check_add_overflow() to prevent u16 DACL size overflow
๐Ÿ›
CVE-2026-31702 f2fs: fix use-after-free of sbi in f2fs_compress_write_end_io()
๐Ÿ›
CVE-2026-37458 Missing input validation in the MP_REACH_NLRI component of FRRouting (FRR) stable/10.0 to stable/10.6 allows authenticated attackers to cause a Denial of Service (DoS) via supplying a crafted UPDATE message.
๐Ÿ›
CVE-2026-4873 connection reuse ignores TLS requirement
๐Ÿ›
CVE-2026-6429 netrc credential leak with reused proxy connection
๐Ÿ›
CVE-2026-5545 wrong reuse of HTTP Negotiate connection
๐Ÿ›
CVE-2026-6253 proxy credentials leak over redirect-to proxy
๐Ÿ›
CVE-2026-5773 wrong reuse of SMB connection
๐Ÿ›
CVE-2026-37459 An integer underflow in FRRouting (FRR) stable/10.0 to stable/10.6 allows attackers to cause a Denial of Service (DoS) via supplying a crafted BGP UPDATE message.
๐Ÿ›
CVE-2026-6276 stale custom cookie host causes cookie leak
๐Ÿ›
CVE-2026-7168 cross-proxy Digest auth state leak
๐Ÿ›
CVE-2025-1176 GNU Binutils ld elflink.c _bfd_elf_gc_mark_rsec heap-based overflow
๐Ÿ›
CVE-2025-1178 GNU Binutils ld libbfd.c bfd_putl64 memory corruption
๐Ÿ›
CVE-2025-0665 eventfd double close
๐Ÿ›
Four-Faith Industrial Routers Targeted in Botnet Hijacking Campaign
๐Ÿ›
20-Year-Old PostgreSQL Flaw Gets Public PoC Exploit for Remote Code Execution
๐Ÿ›
DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability
๐Ÿ›
macOS flaw allowed rogue apps to access chat and browser data
๐Ÿ›
Contractorโ€™s public GitHub account exposed GovCloud and CISA credentials
โš ๏ธ
CTT - 468,124 breached accounts
โš ๏ธ
GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials
โš ๏ธ
CISA Admin Reportedly Exposes AWS GovCloud Credentials in Public GitHub Repository
โš ๏ธ
SEPPmail Gateway Flaws Expose Organizations to RCE and Email Traffic Interception
โš ๏ธ
Mythos Preview Automates PoC Exploit Creation for Vulnerability Research
โš ๏ธ
Public Instagram posts provide raw material for AI phishing campaigns
โš ๏ธ
Earbud sensors can authenticate users by their heartbeat, study finds
โš ๏ธ
Compromised GitHub Action Steals Workflow Credentials
โš ๏ธ
Hackers Exploit Entra ID Accounts to Steal Microsoft 365, Azure Data
โš ๏ธ
Protecting the Neglected: Measuring County Cyber Risk with Dr. Ido Sivan Sevilla
โš ๏ธ
iProov brings identity verification to video meetings to reduce fraud risks
โš ๏ธ
PostgreSQL Flaws Expose Databases to Remote Code Execution and SQL Injection
โš ๏ธ
Shai-Hulud worm copycats emerge after source code leak
โš ๏ธ
7 tips for accelerating cyber incident recovery
โš ๏ธ
Grafana Labs Confirms Hackers Stole Source Code
โš ๏ธ
SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access
โš ๏ธ
Operation Ramz Dismantles 53 Servers Used in Scam and Malware Campaigns
โš ๏ธ
Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare
โš ๏ธ
UAC-0184 Uses Bitsadmin and HTA Files to Deliver Gated Malware
โš ๏ธ
AI Raises the Bar on Vulnerability Awareness and Secure-by-Design Software
โš ๏ธ
Phishing Campaign Exploits Google AppSheets to Target Facebook Accounts
โš ๏ธ
Internet Explorer may be dead, but its ghost still runs malware
โš ๏ธ
PureLogs infostealer is stealing credentials worldwide
โš ๏ธ
Hackers have compromised dozens of popular open source packages in an ongoing supply chain attack
โš ๏ธ
GitHub scales back bug bounties, reminds users security is their responsibility too
โš ๏ธ
Mini Shai-Hulud returns, compromising hundreds of npm packages
โš ๏ธ
Patch bypass allows hackers to exploit prior flaw in SonicWall SSL-VPN
โš ๏ธ
Rapid7โ€™s 2026 Global Cybersecurity Summit: Key Takeaways for Security Leaders
โš ๏ธ
TP-Link, Photoshop, OpenVPN, Norton VPN vulnerabilities
โš ๏ธ
Governing infrastructure as code using pattern-based policy as code
โš ๏ธ
Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps
โš ๏ธ
Microsoft dismantled malware-signing network Fox Tempest
โš ๏ธ
News alert: Orchid Security study finds invisible identities now outnumber managed accounts
โš ๏ธ
AntV data visualization tool the latest to be hit by ongoing npm supply chain attacks
โš ๏ธ
Huawei zero-day attack behind last yearโ€™s crash of Luxembourg's entire telecoms network
โš ๏ธ
CISA secrets left sitting on GitHub.
โš ๏ธ
Attackers hit vulnerabilities hard last year, making exploits the top entry point for breaches
โš ๏ธ
Windows Zero-Day Barrage Continues After Patch Tuesday
โš ๏ธ
AI Spam Is Breaking Bug Bounties
โš ๏ธ
Verizon DBIR: Enterprises Face a Dangerous Vulnerability Glut
๐Ÿ“‹
macOS Malware Abuses Fake Google Update for Persistence
๐Ÿ“‹
Drupal is rolling out an emergency security update on May 20. You cannot miss it
๐Ÿ“ข
Cybersecurity jobs available right now: May 19, 2026
๐Ÿ“ข
AI infrastructure is cracking under sovereignty demands
๐Ÿ“ข
Kimsuky Uses LNK, JSE Lures to Target Recruiters, Crypto Users, Defense Officials
๐Ÿ“ข
US cyber agency CISA exposed reams of passwords and cloud keys to the open web
๐Ÿ“ข
CISA contractor exposed AWS GovCloud keys on GitHub.
๐Ÿ“ข
CISA Exposes Secrets, Credentials in 'Private' Repo
๐Ÿ“ข
CISA credential leak raises alarms, and Capitol Hill demands answers
๐Ÿ”ฅ
Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account
๐Ÿ”ฅ
Compromised Nx Console VS Code Extension Steals Developer and Cloud Secrets
๐Ÿ”ฅ
Mini Shai-Hulud Attack Hits @antv npm Packages
๐Ÿ”ฅ
Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer
๐Ÿ”ฅ
Gentlemen Ransomware Targets Windows, Linux, NAS, BSD, and ESXi Systems
๐Ÿ”ฅ
Poland shifts away from Signal following cyberattacks on officialsโ€™ accounts
๐Ÿ”ฅ
ShinyHunters Takes Responsibility for Attack on Learning Management Platform
๐Ÿ”ฅ
The New Phishing Click: How OAuth Consent Bypasses MFA
๐Ÿ”ฅ
CyberheistNews Vol 16 #20 [Heads Up] Today You Have Only 60 Seconds to Stop That Breach. Are You Ready?
๐Ÿ”ฅ
Looking Back, Looking Forward: Digesting a Dynamic Bouillabaisse of Cyber Evolution
๐Ÿ”ฅ
Selector extends AI-driven observability into multi-cloud environments
๐Ÿ”ฅ
When AI Starts Acting Malicious
๐Ÿ”ฅ
Microsoft Takes Down Fox Tempest for Providing Ransomware-Enabling Signing Tool
๐Ÿ”ฅ
Microsoft disrupts cybercrime service that abused software verification systems en masse
๐Ÿ”ฅ
Biometrics, diagnoses, and bank details exposed in major healthcare breach
๐Ÿ”ฅ
Microsoft disrupts Fox Tempest malware-signing-as-a-service platform tied to ransomware gangs
๐Ÿ”ฅ
CIRT insights: How to help prevent unauthorized account removals from AWS Organizations
๐Ÿ•ต๏ธ
ISC Stormcast For Tuesday, May 19th, 2026 https://isc.sans.edu/podcastdetail/9936, (Tue, May 19th)
๐Ÿ•ต๏ธ
Microsoft to Retire Teams Together Mode to Improve Performance
๐Ÿ•ต๏ธ
JavaScript Malware Campaign Drops Crypto Clipper via PowerShell
๐Ÿ•ต๏ธ
Babel Street targets AI-driven threats with new agentic investigation capabilities
๐Ÿ•ต๏ธ
Egnyte unveils Email Capture and AI features to unify fragmented data
๐Ÿ•ต๏ธ
The State of AI & AppSec - Keith Hoodlet - ASW #383
๐Ÿ•ต๏ธ
Discord enables E2EE by default for all voice and video communications
๐Ÿ•ต๏ธ
Laurie Anderson Is Quoting Me
๐Ÿ•ต๏ธ
Microsoft Edge Enhances Security by Preventing Password Loading at Startup
๐Ÿ•ต๏ธ
Top 5 Phishing-Driven Social Engineering Attacks on Companies in 2026
๐Ÿ•ต๏ธ
Anthropic Denies EU Access to Claude Mythos, ChatGPT 5.5 Comes to Rescue
๐Ÿ•ต๏ธ
VoidStealer Malware Targets Chrome Data Despite Built-In Browser Protections
๐Ÿ•ต๏ธ
LaunchDarkly adds real-time controls for AI agents in production
๐Ÿ•ต๏ธ
Canonical ships Ubuntu Core 26 with 15 years of security maintenance
๐Ÿ•ต๏ธ
New macOS infostealer impersonates Apple, Microsoft, and Google in a single attack chain
๐Ÿ•ต๏ธ
The end of unencrypted Discord calls is here
๐Ÿ•ต๏ธ
Microsoftโ€™s legacy MSHTA tool heavily abused in malware attacks
๐Ÿ•ต๏ธ
Two-Thirds of Nonhuman Accounts Are Unseen and Unmanaged, According to Orchid Securityโ€™s Identity Gap Report
๐Ÿ•ต๏ธ
Warning: Phishing Attacks Are Abusing the Kuse AI App
๐Ÿ•ต๏ธ
Mozilla hardens Firefox against fingerprinting, adds one-click session wipe
๐Ÿ•ต๏ธ
Criminal IP Returns to Infosecurity Europe 2026 with Advanced AI-Driven TI & ASM
๐Ÿ•ต๏ธ
AI Isnโ€™t Finding Novel Bugs
๐Ÿ•ต๏ธ
Microsoft Launches New Surface AI PCs for Business Buyers
๐Ÿ•ต๏ธ
Anthropic Just Bought a Developer Tool Used by OpenAI, Google
๐Ÿ•ต๏ธ
Agentic AI, Strong Racks, Weak Fabric: Inside Dellโ€™s AI Bet
๐Ÿ•ต๏ธ
Mac Users Face New Malware Threat Spoofing Apple, Google, and Microsoft
๐Ÿ•ต๏ธ
Appleโ€™s Siri Could Get a Grammarly-Like AI Writing Tool at WWDC
๐Ÿ•ต๏ธ
Apple Intelligence Powers New Accessibility Features for iPhone, Mac
๐Ÿ•ต๏ธ
Microsoft Confirms Windows Update Bug Blocking Security Fixes
๐Ÿ•ต๏ธ
My Mother the Car, AI Slop, Nginx, Polyscope, Drupal, , GitHub, Aaran Leyland - SWN #582
๐ŸŒ
From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat
๐ŸŒ
From Ivory Tower to Iron Curtain: The Academics Who Reshaped the CIA
๐ŸŒ
Stealer Spoofs Google, Microsoft & Apple, Then Backdoors macOS
๐Ÿ“ก
Hackers Bypass Security Tools to Target Users Directly
๐Ÿ“ก
How to Make Apps and Websites Remove Your Nonconsensual Nudes
๐Ÿ“ก
Massive MENA cybercrime Operation Ramz disrupts infrastructure and arrests 201 suspects
๐Ÿ“ก
YouTube wants your face to fight deepfakes
๐Ÿ“ก
Agentic AI Accelerates Software Builds and Mobile App Attacks
๐Ÿ“ก
Facebook scam promises cheap Aldi meat boxes, steals payment info instead
๐Ÿ“ก
Tools for spotting and disabling AI systems in an enterprise
๐Ÿ“ก
Telecom sector launches its own private ISAC
๐Ÿ“ก
UK regulator to require tech firms to tackle deepfakes, non-consensual intimate images
๐Ÿ“ก
Discord enables end-to-end encrypted voice and video calling for every user
๐Ÿ“ก
From teen hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing
๐Ÿ“ก
Microsoft Exchange ProxyShell Scanning Doubles in April 2026 as Two Distinct Campaign Clusters Emerge