121Articles
9Categories
2026-05-20Date
๐Ÿ›
FreePBX Security Flaw Lets Attackers Access User Portals
๐Ÿ›
CVE Lite CLI: Open-source dependency vulnerability scanner
๐Ÿ›
CVE-2026-43493 crypto: pcrypt - Fix handling of MAY_BACKLOG requests
๐Ÿ›
CVE-2026-43491 net: qrtr: ns: Limit the maximum server registration per node
๐Ÿ›
CVE-2026-43492 lib/crypto: mpi: Fix integer underflow in mpi_read_raw_from_sgl()
๐Ÿ›
Pardus Linux Vulnerability Lets Local Attackers Gain Silent Root Access
๐Ÿ›
DirtyDecrypt: PoC Released for yet another Linux flaw
๐Ÿ›
Microsoft provides mitigation for โ€œYellowKeyโ€ BitLocker bypass flaw (CVE-2026-45585)
๐Ÿ›
Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit
๐Ÿ›
Why some security fixes never reach your vulnerability dashboard
๐Ÿ›
How an image could compromise your Mac: understanding an ExifTool vulnerability (CVE-2026-3102)
๐Ÿ›
Critical ExifTool Vulnerability Lets Hackers Compromise Macs via Malicious Images
๐Ÿ›
NVIDIA Triton Inference Server Flaw Raises Risk of Unauthorized Access
๐Ÿ›
Microsoft issues YellowKey mitigation, no patch yet
๐Ÿ›
VU#980487: Local privilege escalation in Linux Kernel (Dirty Frag)
๐Ÿ›
Drupal admins rushing to patch maximum severity SQL injection vulnerability
โš ๏ธ
Windows 11 BitLocker Zero-Day, TeamPCP Malware Leak, Iran Gas Station Hacks | Cybersecurity Today
โš ๏ธ
GitHub Investigating TeamPCP Claimed Breach of ~4,000 Internal Repositories
โš ๏ธ
Grafana GitHub Breach Exposes Source Code via TanStack npm Attack
โš ๏ธ
PoC Exploit Released for DirtyDecrypt Linux Kernel Vulnerability
โš ๏ธ
Hackers Exploit MSHTA to Deploy LummaStealer and Amatera Malware
โš ๏ธ
GitHub Source Code Reportedly Compromised, TeamPCP Claims Breach
โš ๏ธ
Risky Business #838 -- GitHub investigates possible breach
โš ๏ธ
New NGINX Vulnerability Exposes Servers to Malicious Code Execution
โš ๏ธ
Alleged Huawei zero-day blamed for the 2025 Luxembourg telecom crash
โš ๏ธ
Interpol's 'Operation Ramz' Pioneers Cross-Region Collabs in Middle East
โš ๏ธ
Verizon DBIR: Vulnerability Exploits Overtake Credentials as Top Access Vector
โš ๏ธ
TeamPCP GitHub Breach: Internal GitHub Repositories Allegedly Accessed
โš ๏ธ
Shift to Prevention and Enforcement as We Repeat Security Mistakes With AI - Rob Allen - BSW #448
โš ๏ธ
GitHub confirms internal repository theft as TeamPCP claims attack
โš ๏ธ
TeamPCP breached GitHubโ€™s internal codebase via poisoned VS Code extension
โš ๏ธ
SHub Reaper impersonates Apple, Google, and Microsoft in one MacOS attack chain
โš ๏ธ
ArmorCode gives security teams AI workers for exposure and remediation
โš ๏ธ
Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development
โš ๏ธ
Grafana GitHub Security Incident Reportedly Connected to TanStack npm Ransomware
โš ๏ธ
Gremlin Stealer Hides C2 and Exfiltration Paths in Encrypted Resources
โš ๏ธ
Old Breaches Resold as New Corporate Data Leaks
โš ๏ธ
GitHub admits major source code leak after 3,800 internal repositories breached
โš ๏ธ
Implement agentic AI in cybersecurity with Tenable Hexa AI: Reduce cyber risk at machine speed
โš ๏ธ
Ukraine probes teen suspect in cyber theft scheme targeting California online shoppers
โš ๏ธ
Compromised coding tool helped hackers breach thousands of GitHub repositories
โš ๏ธ
Carding site B1ackโ€™s Stash dumps 4.6 Million stolen cards for free
โš ๏ธ
Patch Now: Critical Flaw in OT Robot OS Gives Attackers Control
โš ๏ธ
Verizon DBIR: Vulnerability exploitation is the dominant initial access vector
โš ๏ธ
NanoCo lands $12 million seed funding, launches enterprise assistant built on NanoClaw
โš ๏ธ
Operationalizing CTEM Faster: Build Surface Command Dashboards in Minutes
โš ๏ธ
The cost of trusting the extension ecosystem.
โš ๏ธ
GitHub Confirms Breach, 4K Internal Repos Stolen
โš ๏ธ
The AI Kill Switch Problem
โš ๏ธ
PinTheft: Another Linux Privilege Escalation, Another Working Exploit, This Time Targeting Arch
โš ๏ธ
Fake Android Apps Commit Carrier Billing Fraud for Premium Svcs.
๐Ÿ“‹
Smashing Security podcast #468: High-speed train hacks and homicidal lawnmowers
๐Ÿ“ข
Why Policy in Amazon Bedrock AgentCore chose Cedar for securing agentic workflows
๐Ÿ”ฅ
Microsoft disrupts malware code-signing service used by ransomware gangs
๐Ÿ”ฅ
What happens when your identity provider becomes the kill chain
๐Ÿ”ฅ
FBI warns students and staff that ShinyHunters may come knocking after Canvas breach
๐Ÿ”ฅ
A malicious VS code extension just breached GitHub โ€˜s internal repositories
๐Ÿ”ฅ
Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals
๐Ÿ”ฅ
GitHub Confirms Breach of Internal Repositories Via Malicious VS Code Extension
๐Ÿ”ฅ
Fox Tempest Linked to Malware-Signing Service Abusing Microsoft Artifact Signing
๐Ÿ”ฅ
Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks
๐Ÿ”ฅ
Microsoft DurableTask Python Client Targeted in TeamPCP Cyberattack
๐Ÿ”ฅ
Customers say Trump Mobile is leaking their personal information
๐Ÿ”ฅ
GitHub says hackers stole data from thousands of internal repositories
๐Ÿ”ฅ
GitHub discloses breach of 3,800 internal code repositories.
๐Ÿ”ฅ
7-Eleven confirms breach after ShinyHunters claims
๐Ÿ”ฅ
GitHub says internal repositories were impacted in poisoned VS Code extension attack
๐Ÿ”ฅ
7-Eleven hit by data breach
๐Ÿ”ฅ
Microsoft disrupts cybercrime operation that hid behind legitimate software
๐Ÿ”ฅ
Meet Rampart and Clarity, Microsoftโ€™s new red team combo AI agents
๐Ÿ”ฅ
Processes and Culture Top Reasons Behind Data Breaches
๐Ÿ”ฅ
Investigating unauthorized access to GitHubโ€™s internal repositories
๐Ÿ•ต๏ธ
ISC Stormcast For Wednesday, May 20th, 2026 https://isc.sans.edu/podcastdetail/9938, (Wed, May 20th)
๐Ÿ•ต๏ธ
7 hard truths security pros should know: 2026 DevOps Threats Report
๐Ÿ•ต๏ธ
When your AI assistant has the keys to production
๐Ÿ•ต๏ธ
Trapdoor Android Ad Fraud Ring Abuses 455 Apps for Fake Clicks
๐Ÿ•ต๏ธ
DevilNFC Malware Traps Android Users in NFC Relay Attacks
๐Ÿ•ต๏ธ
Mini Shai-Hulud Attack Hits npm Ecosystem, Compromising Over 600 Packages
๐Ÿ•ต๏ธ
Single-Letter Go Module Typosquat Drops DNS-Based Backdoor
๐Ÿ•ต๏ธ
Communicating cyber risk in dollars boards understand
๐Ÿ•ต๏ธ
Void Botnet Leverages Ethereum for Resilient C2
๐Ÿ•ต๏ธ
Eviltokens: A Conversation with Huntress on an AIโ€‘Enabled Device Code Phishing Campaign
๐Ÿ•ต๏ธ
GUEST ESSAY: AI can speed up communication, but it can also weaken human connection
๐Ÿ•ต๏ธ
Darwinium updates mobile SDKs to detect remote access scam activity
๐Ÿ•ต๏ธ
Fake Tax Assessment Pages Spread Windows Malware
๐Ÿ•ต๏ธ
Tracking TamperedChef Clusters via Certificate and Code Reuse
๐Ÿ•ต๏ธ
Trust3 AI focuses on AI agent risks with MCP Security layer
๐Ÿ•ต๏ธ
GraphWorm Malware Abuses Microsoft OneDrive for Stealthy C2 Operations
๐Ÿ•ต๏ธ
China-Linked Webworm APT Evolves Tactics, Expands to European Targets
๐Ÿ•ต๏ธ
FBI: $388 million lost in crypto ATM scams in 2026
๐Ÿ•ต๏ธ
Novata uses AI to map risk across portfolios and supply chains
๐Ÿ•ต๏ธ
On AI Security
๐Ÿ•ต๏ธ
Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API
๐Ÿ•ต๏ธ
Report: Romance Scams Cost UK Victims ยฃ102 Million Last Year
๐Ÿ•ต๏ธ
They Put Industrial Systems On Wi-Fi
๐Ÿ•ต๏ธ
Block Everything By Default
๐Ÿ•ต๏ธ
How Can MSSPs Scale Threat Detection Without Burning Out Their Analysts?
๐Ÿ•ต๏ธ
Same Problem, Different Angles: When Red Team and Blue Team Actually Talk to Each Other
๐Ÿ•ต๏ธ
Tor launches crowdfunding campaign to support internet freedom projects
๐Ÿ•ต๏ธ
AI assistants can be hijacked and manipulated by inaudible sounds
๐Ÿ•ต๏ธ
Steam removes โ€˜Beyond The Darkโ€™ horror game over malware reports
๐Ÿ•ต๏ธ
Webworm APT targets European government organizations with new backdoors
๐ŸŒ
Typosquatting Is No Longer a User Problem. It's a Supply Chain Problem
๐ŸŒ
Malicious TV boxes: how a cheap โ€œSuperBoxโ€ turns your home into a proxy node for cybercriminals | Kaspersky official blog
๐ŸŒ
Fake malware-signing service Fox Tempest dismantled by Microsoft
๐ŸŒ
Android Malware Campaign Used Hundreds of Fake Apps to Silently Charge Users
๐ŸŒ
Mini Shai-Hulud Hits Hundreds of npm Packages in AntV Ecosystem
๐ŸŽ™๏ธ
Building AI Content Systems That Actually Work with David Ebner of Content Workshop
๐Ÿ“ก
Weekly Threat Bulletin โ€“ May 20th, 2026
๐Ÿ“ก
Data Brokersโ€™ and AI Firmsโ€™ Opt-Out Forms Are Built to Fail, Report Finds
๐Ÿ“ก
Researchers Warn CypherLoc Scareware Has Targeted Millions of Users
๐Ÿ“ก
Firefox 151 packs big privacy upgrades into a small update
๐Ÿ“ก
Agent AI is Coming. Are You Ready?
๐Ÿ“ก
AWS Security Hub Extended: Why enterprise security products should sell themselves
๐Ÿ“ก
FTC warns 12 major tech firms of violating Take It Down Act
๐Ÿ“ก
Discord migrates all users to end-to-end encryption by default
๐Ÿ“ก
Texas, Florida top list of states reporting millions of dollars lost through crypto ATMs
๐Ÿ“ก
A New York Cop Got Injured at a Boxing Match. Now Madison Square Garden Is Banning His Lawyer
๐Ÿ“ก
Socket raises $60 million in Series C funding.
๐Ÿ“ก
A Bipartisan Amendment Would End Police License Plate Tracking Nationwide
๐Ÿ“ก
Cyber Pros Can't Decide If AI Is a Good or a Bad Thing