x86.se x86.se

Categories

  • Access Control
  • Access Management
  • Active Directory
  • Ad Fraud
  • AdTech
  • Afghanistan
  • AgentForce
  • Agentic AI
  • Agentic AI control
  • AI
  • AI & ML Security
  • AI adoption metrics
  • AI agents
  • AI Automation
  • AI councils
  • AI firewall
  • AI governance
  • AI identity
  • AI model
  • AI observability and logging
  • AI Safety
  • AI Security
  • AI security frontier
  • AI threat detection
  • AI-driven security
  • AI-native security
  • Airline
  • AitM
  • Akira
  • Altcoin
  • Amatera Stealer
  • Android
  • Anodot
  • Anthropic
  • Anti-Malware Research
  • Antitrust
  • API Security
  • Apple
  • Application Security
  • AppSheet
  • APT
  • APT Groups
  • apt28
  • Archer Health
  • Artificial Intelligence
  • Ascend AI
  • Ascension
  • AsyncRAT
  • ATM Security
  • Attack Surface
  • Authentication
  • Automation
  • AWS
  • Azure
  • backdoor
  • Banking Fraud
  • Banking Malware
  • Banking Security
  • Beagle red teaming
  • Behavioral analytics UBA
  • Binance
  • Bishop Fox
  • Bitcoin
  • Bitwarden
  • Black Basta
  • Black Hat 2025
  • Blackpoint Cyber
  • Blockchain
  • Botnet
  • Botnets
  • Breach
  • Breach and Attack
  • Breach Prevention
  • Breach Simulation
  • BreachForums
  • BRICKSTORM
  • Browser
  • Browser extension security
  • Browser Security
  • Business Continuity
  • C2
  • CA SiteMinder
  • Canada
  • Captcha
  • Carbon Black
  • Censorship
  • Centralized policy enforcement
  • ChatGPT
  • Children
  • ChillyHell
  • China
  • Chrome
  • CIO and CISO alignment
  • Cisco
  • CISO
  • CISO strategies
  • CISO strategy
  • Cl0p
  • ClaimPix
  • Claude
  • Claude Code
  • Claude Mythos Preview
  • ClickFix
  • Clop
  • Cloud
  • Cloud Computing
  • Cloud Security
  • CloudFlare
  • CloudSEK
  • Code Security
  • Coding
  • Cofense
  • command-and-control
  • Compliance
  • Compliance and audit readiness
  • Compliance GDPR HIPAA PCI
  • Conditional Access
  • ConnectWise RAT
  • Container Security
  • conti
  • Continuous Monitoring
  • Continuous Threat Exposure Management
  • Copilot
  • Copyright
  • Corporate Espionage
  • Counterfeiters
  • Credential hygiene
  • Credential Theft
  • Critical Infrastructure
  • CRM
  • CrowdStrike Falcon Fund
  • Crypto
  • Cryptocurrency
  • Cryptojacking
  • CVE-2021-43798
  • CVE-2023-21563
  • cve-2023-24932
  • CVE-2024-50623
  • CVE-2024-55956
  • CVE-2024-58260
  • CVE-2025-10035
  • CVE-2025-10547
  • CVE-2025-10725
  • CVE-2025-27915
  • cve-2025-30247
  • cve-2025-4008
  • CVE-2025-41250
  • CVE-2025-41251
  • CVE-2025-41252
  • CVE-2025-43400
  • cve-2025-49844
  • CVE-2025-52906
  • CVE-2025-57714
  • CVE-2025-59489
  • CVE-2025-59934
  • CVE-2025-59951
  • CVE-2025-61882
  • CVE-2025-9230
  • CVE-2025-9231
  • CVE-2025-9232
  • Cyber Attack
  • Cyber Attacks
  • Cyber Crime
  • Cyber Espionage
  • Cyber Insurance
  • Cyber Resilience
  • Cyber Warfare
  • CyberArk
  • Cybercrime
  • Cybersecurity
  • Cybersecurity News
  • Cyberwarfare
  • Dark Web
  • DarkForums
  • Darwinium
  • Data Breach
  • Data breach prevention
  • Data Breaches
  • Data Exposure
  • Data Integrity
  • Data leak
  • Data leak prevention
  • Data Privacy
  • Data Protection
  • Data Security
  • Data Theft
  • Database Security
  • DDoS
  • DDoS attack
  • DDoS Attacks
  • Defend AI
  • DeFi
  • denial-of-service
  • Detour Dog
  • Developer
  • Developer Security
  • Developer Tools
  • Developers
  • DevOps
  • DevOps Security
  • DevSecOps
  • Digital Advertising
  • Digital Crime
  • Digital Forensics
  • Discord
  • DNS
  • Documents
  • Dubai
  • Economic Espionage
  • Edge
  • Education
  • EggStreme
  • EggStremeAgent
  • Email Security
  • Empire Podcast
  • Employee AI governance
  • Encryption
  • Endpoint Security
  • Enterprise AI
  • Enterprise IT
  • Enterprise model security
  • Enterprise Security
  • Enterprise Software
  • Espionage
  • Ethereum
  • Europol
  • exploit
  • Exploits
  • exposure
  • Exposure Management
  • Exposure Validation
  • Extensions
  • Extortion
  • Facebook
  • Fake ID
  • Featured
  • Federal Security
  • File Transfer
  • Fileless
  • FIN11
  • Financial Crime
  • Financial Security
  • Firebox
  • firewall
  • Firmware Security
  • ForcedLeak
  • ForgeCraft
  • ForgeRock
  • Fortra
  • France
  • Fraud
  • FraudGPT
  • FTC
  • Gaming
  • GDPR
  • Gemini AI
  • Gemini Trifecta
  • Generative AI
  • GitHub
  • GitHub Copilot
  • Global AI risk mapping
  • GoAnywhere
  • GoGra
  • Google
  • Google Cloud
  • Google Workspace
  • Government
  • Great Firewall of China
  • Hacking
  • Hacking News
  • Hacks
  • Hacktivism
  • Hardware
  • Hardware Security
  • Harvester APT
  • Healthcare
  • HexDex
  • Hiddengh0st
  • HIPAA
  • ics
  • ICS Security
  • ICS/OT
  • identity
  • Identity & Access
  • Identity and Access Management
  • Identity and Access Management (IAM)
  • Identity Management
  • Identity Security
  • Identity theft
  • IIServerCore
  • Incident Response
  • India
  • Indirect Prompt Injection
  • Influencers
  • Info Stealer
  • Infostealer
  • Infrastructure Security
  • Insider Threat
  • Insider Threats
  • Internet of Things
  • iOS
  • IoT
  • IoT Research
  • IoT Security
  • IPI
  • IT Compliance
  • IT Operations
  • Jaguar Land Rover
  • Jailbreak attack protection
  • Jeremiah Fowler
  • JPEG
  • Kernel
  • Kido
  • Kubernetes
  • Lapsus$
  • LastPass Secure Access Experiences
  • Lat61
  • Law Enforcement
  • LayerX
  • leak
  • leaked
  • Leaks
  • Legal
  • Linux
  • Linux Security
  • LLM
  • LLM analysis
  • LLM Security
  • LNER
  • Lone None
  • Lone None Stealer
  • Los Pollos
  • Lua
  • machine learning
  • macOS
  • Magecart
  • Malvertising
  • Malware
  • Malware Analysis
  • Mandiant
  • MATANBUCHUS
  • MatrixPDF
  • MCP Server
  • Medusa
  • Meta
  • MFA
  • Mic-E-Mouse
  • Microsoft
  • Microsoft Entra
  • Microsoft Entra ID
  • Mid-sized enterprise cybersecurity
  • Military
  • Military Security
  • Misconfiguration
  • ML
  • Mobile
  • Mobile Security
  • Muck Stealer
  • Multi-Factor Authentication (MFA)
  • Mustang Panda
  • Mythos AI
  • Nation-state
  • National Security
  • National Security,
  • NET-STAR
  • Netherlands
  • Network
  • Network Security
  • NPM
  • Nursery
  • Offensive Security
  • Okta
  • Oleria
  • Online Fraud
  • Online Scam
  • Online Security
  • Open Source
  • OpenAI
  • Operational Technology
  • OWASP Top 10
  • Owen Flowers
  • Pakistan
  • Palo Alto
  • Passkey support
  • Passport
  • Password Management
  • Password manager
  • Password Security
  • Patch Management
  • Patch Tuesday
  • Payment Security
  • PCI-DSS
  • PDF
  • Penetration Testing
  • PhaaS
  • Phantom Taurus
  • Philippine
  • Phishing
  • Phishing Protection
  • Phishing Scam
  • PingFederate
  • PoC
  • Podcast
  • Point Wild
  • Police
  • Popular
  • PowerShell
  • Press Release
  • Privacy
  • Privacy & Compliance
  • privilege escalation
  • Privileged Access Management (PAM)
  • Project Glasswing
  • Prompt injection defense
  • proof-of-concept
  • PropellerAds
  • ProSpy
  • PSF
  • Pure Logs Stealer
  • PureMiner
  • PyPI
  • Python
  • QRadar SIEM
  • Qrator Labs
  • Quantum Computing
  • Quantum Resistance
  • Ransom
  • Ransomware
  • Ransomware Defense
  • Raven AI
  • Raven Stealer
  • rce
  • Real-time policy enforcement
  • Recap
  • Redis
  • RediShell
  • Regulatory Compliance
  • RemoteCOM
  • Renault
  • Report
  • Research
  • Resource-constrained businesses
  • Risk Management
  • Russia
  • SaaS
  • SaaS Monitoring
  • SaaS Protect
  • SaaS Security
  • SailPoint
  • Salesforce
  • Samsung
  • SCADA
  • Scam
  • Scam Research
  • Scams and Fraud
  • Scattered Lapsus$ Hunters
  • Scattered Spider
  • SCOUT
  • ScreenConnect
  • Secrets Management
  • Secure Coding
  • Secure passwordless authentication
  • Security
  • Security Automation
  • Security Culture
  • Security Leadership
  • Security Operations
  • Security Testing
  • Security Training
  • security update
  • Security Validation
  • Senator
  • SentinelOne
  • SEO Poisoning
  • Seraphic Security
  • Server Security
  • Shadow AI detection
  • Shadow AI risks
  • Shadow IT
  • Shadow IT risks
  • Shinobi Security
  • ShinyHunters
  • Shuyal Stealer
  • SIEM and conditional access integration
  • Signal
  • Silverfort
  • SIM Swapping
  • SimpleHelp RAT
  • Single Sign-On (SSO)
  • SMB
  • SMS
  • Snow
  • SOC Operations
  • Social Engineering
  • Software
  • Software Integrity
  • Software Security
  • Software Supply Chain
  • spam
  • SpamGPT
  • Spotlight
  • Spying
  • Spyware
  • SSO
  • state-sponsored
  • Stealer
  • Straiker
  • StreamYard
  • Strela Stealer
  • Supply Chain
  • Supply Chain Attack
  • Supply Chain Security
  • Surveillance
  • SVG
  • Symantec
  • TeamPCP
  • Technology
  • Telegram
  • TFL
  • Thalha Jubair
  • Threat Detection
  • Threat Exposure
  • Threat Hunting
  • Threat Intelligence
  • Threat Intelligence,
  • Threat Mitigation
  • Threat Research
  • ThreatLocker
  • ToSpy
  • ToTok
  • TradingView
  • Training
  • TROJAN
  • Typosquatting
  • UAE
  • Udemy
  • UK
  • Ukraine
  • Unauthorized SaaS applications
  • UNC5221
  • UNC6692
  • Uncategorized
  • United Kingdom
  • United States
  • USA
  • Vane Viper
  • Varun Uppal
  • Venafi
  • Vidar
  • Vietnam
  • VoidProxy
  • VPN
  • VPN Security
  • Vulnerabilities
  • Vulnerability
  • Vulnerability Management
  • WatchGuard
  • Web Browser
  • Web Hosting
  • Web Security
  • Web Services
  • Web3
  • Webinar
  • Website Security
  • WestJet
  • WhatsApp
  • Whitepapers
  • Windoes
  • Windows
  • Windows Security
  • Winnti
  • Winos
  • WitnessAI Secure AI Enablement Platform
  • Workflow Automation
  • WormGPT
  • Xcape
  • XSS
  • Yadi Zhang
  • YoLink
  • YoLink Smart Hub
  • Zara
  • Zero Day
  • Zero Trust
  • Zero-Day
  • Zeroday
  • Zhimin Qian

x86.se x86.se

x86.se x86.se

What are You Looking For?

  • Malware
  • Vulnerabilities
  • Ransomware
  • Security
  • Data Breach
  • Enterprise Security
1 Min Read
Trellix Confirms Source Code Breach With Unauthorized Repository Access
May 2, 2026

Trellix Confirms Source Code Breach With Unauthorized Repository Access

Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a "portion" of its source code. It said it "rece…
3 Min Read
30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign
May 1, 2026

30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign

A newly discovered Vietnamese-linked operation has been observed using a…
  • Malware
  • Threat Intelligence
2 Min Read
Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks
May 1, 2026

Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks

Cybersecurity researchers are warning of two cybercrime groups that are…
  • Malware
  • Social Engineering
4 Min Read
China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists
May 1, 2026

China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists

Cybersecurity researchers have disclosed details of a new China-aligned…
  • Network Security
  • Vulnerability

Explore Trending Topics

Malware
Vulnerabilities
Ransomware
Security
Vulnerability
Windows
  • Compliance
  • Data Protection
5 Min Read
Top Five Sales Challenges Costing MSPs Cybersecurity Revenue
May 1, 2026

Top Five Sales Challenges Costing MSPs Cybersecurity Revenue

The managed security services market is projected to grow from $38.31 billion in 2025 to $69.16 billion by 2030[1], with cybersecurity being…
  • Data Breach
  • Law Enforcement
2 Min Read
Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks
May 1, 2026

Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks

The U.S. Department of Justice (DoJ) on Thursday announced the sentencing of two cybersecurity professionals to four years each in prison for…
  • Malware
  • Supply Chain Attack
2 Min Read
Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft
May 1, 2026

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that…
  • Malware
  • Supply Chain Attack
3 Min Read
PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials
April 30, 2026

PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials

In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two…
  • Cybersecurity News
  • Hacking News
14 Min Read
ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories
April 30, 2026

ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some…
  • Cloud Security
  • Threat Intelligence
3 Min Read
New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials
April 30, 2026

New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities…
  • Enterprise Security
  • Threat Intelligence
16 Min Read
EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades
April 30, 2026

EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades

Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation…
  • Linux
  • Vulnerability
2 Min Read
New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions
April 30, 2026

New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions

Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user…
  • AI Security
  • Vulnerability
4 Min Read
Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution
April 30, 2026

Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution

Google has addressed a maximum severity security flaw in Gemini CLI -- the "@google/gemini-cli" npm package and the…
  • Malware
  • Supply Chain Attack
3 Min Read
SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack
April 29, 2026

SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

Cybersecurity researchers are sounding the alarm about a new supply chain attack campaign targeting SAP-related npm Packages with…
  • Malware
  • Social Engineering
7 Min Read
New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs
April 29, 2026

New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs

Cybersecurity researchers have discovered malicious code in an npm package after a malicious package as a dependency to the project by…
  • Artificial Intelligence
  • Exposure Validation
2 Min Read
Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks
April 29, 2026

Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks

In February 2026, researchers uncovered a shift that completely changed the game: threat actors are now using custom AI setups to automate…
  • Exposure Management
  • Security Operations
5 Min Read
What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)
April 29, 2026

What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)

Every security team has a version of the same story. The quarter ends with hundreds of vulnerabilities closed. The dashboards are bursting…
  • Vulnerability
  • Web Hosting
4 Min Read
Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately
April 29, 2026

Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately

cPanel has released security updates to address a security issue impacting various authentication paths that could allow an attacker to obtain…
  • Network Security
  • Vulnerability
1 Min Read
CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV
April 29, 2026

CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and…
  • Cloud Security
  • Vulnerability
3 Min Read
LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure
April 29, 2026

LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure

In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's…
  • Software Security
  • Vulnerability
3 Min Read
Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push
April 28, 2026

Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push

Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that…
  • Malware
  • Supply Chain Attack
4 Min Read
Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign
April 28, 2026

Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign

A cybercrime group of Brazilian origin has resurfaced after more than three years to orchestrate a campaign that targets Minecraft players…
  • Malware
  • Supply Chain Attack
4 Min Read
VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi
April 28, 2026

VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi

Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw…
  • Data Integrity
  • Operational Technology
4 Min Read
Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About
April 28, 2026

Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About

Every security program is betting on the same assumption: once a system is connected, the problem is solved. Open a ticket, stand up a…
  • Network Security
  • Vulnerability
2 Min Read
Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE
April 28, 2026

Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE

Cybersecurity researchers have disclosed details of a critical security flaw impacting LeRobot, Hugging Face's open-source robotics platform…
  • Artificial Intelligence
  • Enterprise Security
4 Min Read
After Mythos: New Playbooks For a Zero-Window Era
April 28, 2026

After Mythos: New Playbooks For a Zero-Window Era

When patching isn’t fast enough, NDR helps contain the next era of threats. If you’ve been tracking advancements in AI, you know…
  • Cyber Espionage
  • Vulnerability
2 Min Read
Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks
April 28, 2026

Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks

A Chinese national accused of being a member of the Silk Typhoon hacking group has been extradited to the U.S. from Italy.  Xu Zewei, 34,…
  • Identity Management
  • Vulnerability
2 Min Read
Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover
April 28, 2026

Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover

An administrative role meant for artificial intelligence (AI) agents within Microsoft Entra ID could enable privilege escalation and identity…
  • Threat Intelligence
  • Vulnerability
3 Min Read
Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202
April 28, 2026

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

Microsoft on Monday revised its advisory for a now-patched, high-severity security flaw impacting Windows Shell to acknowledge that it has…
  • Linux
  • Malware
  • Ransomware
  • Vulnerabilities
5 Min Read
FIRESTARTER: Cisco ASA Backdoor
April 28, 2026

FIRESTARTER: Cisco ASA Backdoor

The Advisory That Changes EverythingOn April 23, 2026, CISA and the United Kingdom National Cyber Security Centre jointly assessed that…
  • Vulnerabilities
2 Min Read
Unfiltered: The 9.8 CVSS Deserialization Loophole Hijacking Apache MINA
April 28, 2026

Unfiltered: The 9.8 CVSS Deserialization Loophole Hijacking Apache MINA

Apache MINA is widely recognized as a foundational network application framework, designed to help users easily develop high-performance and…
  • Security
2 Min Read
Robinhood account creation flaw abused to send phishing emails
April 27, 2026

Robinhood account creation flaw abused to send phishing emails

Online trading platform Robinhood's account creation process was exploited by threat actors to inject phishing messages into legitimate…
  • Security
2 Min Read
GlassWorm malware attacks return via 73 OpenVSX "sleeper" extensions
April 27, 2026

GlassWorm malware attacks return via 73 OpenVSX "sleeper" extensions

A new wave of the Glassworm campaign is targeting the OpenVSX ecosystem with 73 "sleeper" extensions that turn malicious after an update. Six…
  • Security
2 Min Read
Canada arrests three for operating “SMS blaster” device in Toronto
April 27, 2026

Canada arrests three for operating “SMS blaster” device in Toronto

Canadian authorities have arrested three men for operating an "SMS blaster" device that pretends to be a cellular tower to send phishing texts…
  • Browser
  • Chrome
  • Cybersecurity
  • Data Security
  • Extensions
  • LayerX
  • Privacy
  • Security
  • Surveillance
2 Min Read
82 Chrome Extensions Found Selling User Data, 6.5 Million Users Affected
April 27, 2026

82 Chrome Extensions Found Selling User Data, 6.5 Million Users Affected

Most people install browser extensions without giving them much thought. Recent incidents, along with a new investigation by LayerX Security…
  • Security
2 Min Read
Alleged Silk Typhoon hacker extradited to US for cyberespionage
April 27, 2026

Alleged Silk Typhoon hacker extradited to US for cyberespionage

A Chinese national accused of carrying out cyberespionage operations for China's intelligence services has been extradited from Italy to…
  • Anodot
  • Cyber Attack
  • Cyber Crime
  • Cybersecurity
  • Data Breaches
  • Salesforce
  • ShinyHunters
  • Udemy
  • Zara
3 Min Read
ShinyHunters Leaks Data of Udemy, Zara, 7-Eleven in Salesforce Linked Breach
April 27, 2026

ShinyHunters Leaks Data of Udemy, Zara, 7-Eleven in Salesforce Linked Breach

A series of new data leak listings posted on a dark web site linked to the ShinyHunters hacker group has put three well-known companies in the…
  • Security
2 Min Read
FTC: Americans lost over $2.1 billion to social media scams in 2025
April 27, 2026

FTC: Americans lost over $2.1 billion to social media scams in 2025

The U.S. Federal Trade Commission (FTC) warned of a massive increase in losses from social media scams since 2020, exceeding $2.1 billion in…
  • DDoS
  • Vulnerabilities
2 Min Read
Notepad++ Vulnerability Allows Attackers to Crash Application, Leak Memory Data
April 27, 2026

Notepad++ Vulnerability Allows Attackers to Crash Application, Leak Memory Data

A security vulnerability has been identified in Notepad++, one of the most widely used open-source text editors among developers and IT…
  • Security
2 Min Read
PyPI package with 1.1M monthly downloads hacked to push infostealer
April 27, 2026

PyPI package with 1.1M monthly downloads hacked to push infostealer

An attacker pushed a malicious version of the popular elementary-data package Python Package Index (PyPI) to steal sensitive developer data…
  • Social Engineering
2 Min Read
US Sanctions Target Cambodian Scam Network Leaders
April 27, 2026

US Sanctions Target Cambodian Scam Network Leaders

A Cambodian network accused of orchestrating large-scale cryptocurrency fraud has been hit with US sanctions targeting senior figures and…
  • APT Groups
  • Exploits
  • Vulnerabilities
  • Windows
2 Min Read
The Zero-Click Vulnerability: Akamai Uncovers Incomplete Patch for APT28 Exploit
April 27, 2026

The Zero-Click Vulnerability: Akamai Uncovers Incomplete Patch for APT28 Exploit

Conceptual flow of the original CVE-2026-21510 exploitation | Image: Akamai Researchers at Akamai have discovered that a previous fix for a…
  • Security
2 Min Read
Home security giant ADT data breach affects 5.5 million people
April 27, 2026

Home security giant ADT data breach affects 5.5 million people

The ShinyHunters extortion group stole the personal information of 5.5 million individuals after breaching the systems of home security giant…
  • Exploits
  • Network
  • Ransomware
  • Vulnerabilities
3 Min Read
The CVE Watchtower: Weekly Threat Intelligence Briefing (April 20 – April 26, 2026)
April 27, 2026

The CVE Watchtower: Weekly Threat Intelligence Briefing (April 20 – April 26, 2026)

Welcome to your Monday morning digest. As we close out the final full week of April, the global threat landscape is painting a complex…
  • Data Breach
  • Malware
  • Supply Chain
2 Min Read
Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack
April 27, 2026

Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

Checkmarx has disclosed that its ongoing investigation tied to the supply chain security incident has revealed that a cybercriminal group…
  • Ransomware
2 Min Read
Utilities Tech Supplier Itron Discloses Cyber-Attack, Operations Unaffected
April 27, 2026

Utilities Tech Supplier Itron Discloses Cyber-Attack, Operations Unaffected

Itron, a global technology provider for the utilities industry, has disclosed it suffered a cybersecurity breach. In an 8-K form filed to the…
x86.se x86.se