Email Security Vulnerability2 Min Read May 12, 2026 New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution Exim has released security updates to address a severe security issue affecting certain configurations that could enable memory corruption and potential c…
1 Min Read May 12, 2026 RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded RubyGems, the standard package manager for the Ruby programming… Software Security Supply Chain Attack
3 Min Read May 12, 2026 New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots Cybersecurity researchers have flagged a new version of the TrickMo… Malware Mobile Security
2 Min Read May 12, 2026 Webinar: What the Riskiest SOC Alerts Go Unanswered – and How Radiant Security Can Help Why do the Riskiest SOC Alerts Go Unanswered? Security operations teams… AI Security Threat Detection
Artificial Intelligence Threat Detection6 Min Read May 12, 2026 Why Agentic AI Is Security's Next Blind Spot Agentic AI is already running in production environments across many organizations today. It is executing tasks, consuming data, and taking…
Malware Supply Chain Attack3 Min Read May 12, 2026 Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages TeamPCP, the threat actor behind the recent supply chain attack spree, has been linked to the compromise of the npm and PyPI packages…
Network Security Vulnerability2 Min Read May 12, 2026 Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak American educational technology company Instructure, the parent company of Canvas, said it reached an "agreement" with a decentralized…
AI Security Vulnerability3 Min Read May 12, 2026 OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation OpenAI has launched Daybreak, a new cybersecurity initiative that brings together frontier artificial intelligence (AI) model capabilities and…
Encryption Mobile Security2 Min Read May 12, 2026 iOS 26.5 Brings Default End-to-End Encrypted RCS Messaging Between iPhone and Android Apple on Monday officially released iOS 26.5 with support for end-to-end encryption (E2EE) to Rich Communication Services (RCS) in beta as…
DevSecOps Supply Chain Attack2 Min Read May 11, 2026 TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack Checkmarx has confirmed that a modified version of the Jenkins AST plugin was published to the Jenkins Marketplace. "If you are using…
Ransomware Vulnerability2 Min Read May 11, 2026 cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor A threat actor named Mr_Rot13 has been attributed to the exploitation of a recently disclosed critical cPanel flaw to deploy a backdoor…
Supply Chain Attack Threat Intelligence3 Min Read May 11, 2026 Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads A malicious Hugging Face repository managed to take a spot in the platform's trending list by impersonating OpenAI's Privacy Filter…
Data Breach Vulnerability5 Min Read May 10, 2026 Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak Cybersecurity researchers have disclosed a critical security vulnerability in Ollama that, if successfully exploited, could allow a remote,…
Vulnerability Web Hosting1 Min Read May 9, 2026 cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now cPanel has released updates to address three vulnerabilities in cPanel and Web Host Manager (WHM) that could be exploited to achieve privilege…
Malware Threat Intelligence3 Min Read May 8, 2026 TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms Threat hunters have flagged a previously undocumented Brazilian banking trojan dubbed TCLBANKER that's capable of targeting 59 banking,…
Android Mobile Security4 Min Read May 8, 2026 Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads Cybersecurity researchers have discovered fraudulent apps on the official Google Play Store for Android that falsely claimed to offer access…
Artificial Intelligence Threat Detection2 Min Read May 8, 2026 One Click, Total Shutdown: The "Patient Zero" Webinar on Killing Stealth Breaches The hardest part of cybersecurity isn't the technology, it’s the people. Every major breach you’ve read about lately usually…
DevOps Linux2 Min Read May 8, 2026 Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise A previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) is targeting developers' systems to establish a silent foothold as…
AI Security Threat Detection5 Min Read May 8, 2026 One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk The dark secret of enterprise security operations is that defenders have quietly institutionalized the practice of not looking. This is not…
Malware Threat Intelligence2 Min Read May 8, 2026 New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials Cybersecurity researchers have disclosed details of a new Linux backdoor named PamDOORa that's being advertised on the Rehub Russian…
Linux Vulnerability3 Min Read May 8, 2026 Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions Details have emerged about a new, unpatched local privilege escalation (LPE) vulnerability impacting the Linux kernel. Dubbed Dirty Frag, it…
Network Security Vulnerability2 Min Read May 7, 2026 Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access Ivanti is warning that a new security flaw impacting Endpoint Manager Mobile (EPMM) has been explored in limited attacks in the wild. The…
Cloud Security Threat Intelligence3 Min Read May 7, 2026 PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems Cybersecurity researchers have disclosed details of a new credential theft framework dubbed PCPJack that targets exposed cloud infrastructure…
Cyber Espionage Vulnerability2 Min Read May 7, 2026 PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage Palo Alto Networks has disclosed that threat actors may have attempted to unsuccessfully exploit a recently disclosed critical security flaw…
Cybersecurity News Hacking News16 Min Read May 7, 2026 ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories Bad week. Turns out the easiest way to get hacked in 2026 is still the same old garbage: shady packages, fake apps, forgotten DNS junk, scam…
Identity Management Incident Response11 Min Read May 7, 2026 Day Zero Readiness: The Operational Gaps That Break Incident Response Having an incident response retainer, or even a pre-approved external incident response firm, is not the same as being ready for an incident.…
Malware Threat Intelligence2 Min Read May 7, 2026 PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux Cybersecurity researchers have discovered three packages on the Python Package Index (PyPI) repository that are designed to stealthily deliver…
Software Security Vulnerability3 Min Read May 7, 2026 vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution A dozen critical security vulnerabilities have been disclosed in the vm2 Node.js library that could be exploited by bad actors to break out of…
IoT Security Malware3 Min Read May 6, 2026 Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks Cybersecurity researchers have exposed a new Mirai-derived botnet that self-identifies as xlabs_v1 and targets internet-exposed devices…
Cybercrime Ransomware6 Min Read May 6, 2026 MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and Static Kitten) has been attributed to a…
Industry Recognition Security Leadership3 Min Read May 6, 2026 The Hacker News Launches 'Cybersecurity Stars Awards 2026' — Submissions Now Open For nearly 20 years, we at The Hacker News have mostly told scary stories about cyberspace — big hacks, broken systems, and new threats.…
Compliance Data Security6 Min Read May 6, 2026 Your AI Agents Are Already Inside the Perimeter. Do You Know What They're Doing? Analysts recently confirmed what identity security teams have quietly feared: AI agents are being deployed faster than enterprises can govern…
Android Data Security3 Min Read May 6, 2026 Google's Android Apps Get Public Verification to Stop Supply Chain Attacks Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks. "This new public…
Endpoint Security Threat Intelligence3 Min Read May 6, 2026 Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs Cybersecurity researchers have disclosed details of an intrusion that involved the use of a CloudZ remote access tool (RAT) and a previous…
Network Security Vulnerability2 Min Read May 6, 2026 Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in…
Server Security Vulnerability2 Min Read May 5, 2026 Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE The Apache Software Foundation (ASF) has released security updates to address several security vulnerabilities in the HTTP Server, including a…
Endpoint Security Software Security3 Min Read May 5, 2026 DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware A newly identified supply chain attack targeting DAEMON Tools software has compromised its installers to serve a malicious payload, according…
Endpoint Security Network Security3 Min Read May 5, 2026 China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions A sophisticated China-nexus advanced persistent threat (APT) group has been attributed to attacks targeting government entities in South…
Enterprise Security SaaS Security5 Min Read May 5, 2026 The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed Every AI tool, workflow automation, and productivity app your employees connected to Google or Microsoft this year left something behind: a…
Network Security Vulnerability2 Min Read May 5, 2026 MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks Threat actors are actively exploiting a critical security flaw impacting an open-source content management system (CMS) known as MetInfo,…
API Security Artificial Intelligence4 Min Read May 5, 2026 We Scanned 1 Million Exposed AI Services. Here's How Bad the Security Actually Is While the software industry has made genuine strides over the past few decades to deliver products securely, the furious pace of AI adoption…
Cyber Espionage Surveillance3 Min Read May 5, 2026 ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage…
Network Security Vulnerability2 Min Read May 5, 2026 Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come under…
Cloud Security Data Breach Malware Phishing4 Min Read May 5, 2026 Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries Microsoft has disclosed details of a large-scale credential theft campaign that has leveraged a combination of code of conduct-themed lures…
Endpoint Security Network Security2 Min Read May 4, 2026 Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools An active phishing campaign has been observed targeting multiple vectors since at least April 2025 with legitimate Remote Monitoring and…
Enterprise Software Vulnerability1 Min Read May 4, 2026 Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass Progress Software has released updates to address two security flaws in MOVEit Automation, including a critical bug that could result in an…