Cybercrime Law Enforcement2 Min Read May 22, 2026 Kimwolf DDoS Botnet Operator Arrested in Canada Over DDoS-for-Hire Attacks The U.S. Department of Justice (DoJ) on Thursday announced the arrest of a Canadian man in connection with allegedly operating a distributed denial-of-ser…
2 Min Read May 22, 2026 CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on… Cyber Attack Vulnerability
1 Min Read May 22, 2026 Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access Cisco has rolled out updates for a maximum-severity security flaw… Network Security Vulnerability
3 Min Read May 21, 2026 Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor Cybersecurity researchers have disclosed details of a new Linux malware… Cyber Espionage Threat Intelligence
Cybersecurity News Hacking News18 Min Read May 21, 2026 ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories This week starts small. A token leaks. A bad package slips in. A login trick works. An old tool shows up again. At first, it feels like the…
Endpoint Security Vulnerability2 Min Read May 21, 2026 Microsoft Warns of Two Actively Exploited Defender Vulnerabilities Microsoft has disclosed that a privilege escalation and a denial-of-service flaw in Defender has come under active exploitation in the wild.…
AI Security Identity Security4 Min Read May 21, 2026 When Identity is the Attack Path Consider a cached access key on a single Windows machine. It got there the way most cached credentials do - a user logged in, and the key…
Linux Vulnerability2 Min Read May 21, 2026 9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros Cybersecurity researchers have disclosed details of a vulnerability in the Linux kernel that remained undetected for nine years. The…
Developer Tools Supply Chain Attack3 Min Read May 21, 2026 GitHub Internal Repositories Breached via Malicious Nx Console VS Code Extension GitHub on Wednesday officially confirmed that the breach of its internal repositories was the result of a compromise of an employee device…
Artificial Intelligence Security Testing2 Min Read May 20, 2026 Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development Microsoft has unveiled two new open-source tools called RAMPART and Clarity to assist developers in better testing the security of artificial…
Cybercrime Malware3 Min Read May 20, 2026 Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks Microsoft on Tuesday said it disrupted a malware-signing-as-a-service (MSaaS) operation that weaponized the company's Artifact Signing system…
Cybercrime Malware3 Min Read May 20, 2026 Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API Cybersecurity researchers have flagged fresh activity from a China-aligned threat actor known as Webworm in 2025, deploying custom backdoors…
Enterprise Security Identity Security3 Min Read May 20, 2026 Agent AI is Coming. Are You Ready? New Industry Data Just Released Suggests Not. On May 19th, 2026, Orchid Security released the results of our Identity Gap: Snapshot 2026.…
Browser Security Supply Chain Attack6 Min Read May 20, 2026 Typosquatting Is No Longer a User Problem. It's a Supply Chain Problem AI-generated lookalike domains are now embedded inside the third-party scripts running on your web properties. Here's why your current stack…
Encryption Vulnerability2 Min Read May 20, 2026 Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit Microsoft on Tuesday released a mitigation for a BitLocker bypass vulnerability named YellowKey following its public disclosure last week. The…
Cloud Security Supply Chain Attack2 Min Read May 20, 2026 Grafana GitHub Breach Exposes Source Code via TanStack npm Attack Grafana Labs, on May 19, 2026, said an investigation into its recent breach found no evidence of customer production systems or operations…
Cloud Security Malware4 Min Read May 20, 2026 GitHub Breached — Employee Device Hack Led to Exfiltration of 3,800+ Internal Repos GitHub on Tuesday said it's investigating unauthorized access to its internal repositories after the notorious threat actor known as TeamPCP…
Malvertising Mobile Security3 Min Read May 19, 2026 Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps Cybersecurity researchers have disclosed details of a new ad fraud and malvertising operation dubbed Trapdoor targeting Android device users.…
Linux Vulnerability4 Min Read May 19, 2026 DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability Proof-of-concept (PoC) exploit code has now been released for a recently patched security flaw in the Linux kernel that could allow for local…
AI Security Identity Security5 Min Read May 19, 2026 The New Phishing Click: How OAuth Consent Bypasses MFA In February 2026, a phishing-as-a-service (PhaaS) platform called EvilTokens went live. Within five weeks, it had compromised more than 340…
Vulnerability Website Security2 Min Read May 19, 2026 Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare Drupal has issued an alert stating that it intends to release a "core security release" for all supported branches on May 20, 2026, from 5-9…
Email Security Vulnerability3 Min Read May 19, 2026 SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access Critical security vulnerabilities have been disclosed in SEPPMail Secure E-Mail Gateway, an enterprise-grade email security solution, that…
Developer Security Supply Chain Attack4 Min Read May 19, 2026 Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer Cybersecurity researchers have flagged a compromised version of the Nx Console extension that was published to the Microsoft Visual Studio…
Malware Software Security2 Min Read May 19, 2026 Popular GitHub Action Tags Redirected to Imposter Commit to Steal CI/CD Credentials In yet another software supply chain attack, threat actors have compromised the popular GitHub Actions workflow, actions-cool/issues-helper,…
Malware Supply Chain Attack4 Min Read May 19, 2026 Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account Cybersecurity researchers have discovered a fresh software supply chain attack campaign that has compromised various npm packages associated…
Cybercrime Malware4 Min Read May 18, 2026 INTERPOL Operation Ramz Disrupts MENA Cybercrime Networks with 201 Arrests INTERPOL has coordinated a first-of-its-kind cybercrime crackdown across the Middle East and North Africa (MENA) that led to 201 arrests and…
Cybersecurity Hacking11 Min Read May 18, 2026 ⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More Monday opens with a trust problem. A mail server flaw is under active use. A network control system was targeted. Trusted packages were…
Malware Analysis Threat Intelligence6 Min Read May 18, 2026 How to Reduce Phishing Exposure Before It Turns into Business Disruption What happens when a phishing email looks clean enough to pass through security, but dangerous enough to expose the business after one click?…
Artificial Intelligence Developer Security5 Min Read May 18, 2026 Developer Workstations Are Now Part of the Software Supply Chain Supply chain attackers are not only trying to slip malicious code into trusted software. They are trying to steal the access that makes…
Software Security Vulnerability4 Min Read May 18, 2026 Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flaws Ivanti, Fortinet, n8n, SAP, and VMware have released security fixes for various vulnerabilities that could be exploited by bad actors to…
Vulnerability Zero Day2 Min Read May 18, 2026 MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems Chaotic Eclipse, the security researcher behind the recently disclosed Windows flaws, YellowKey and GreenPlasma, has released a…
Botnet Supply Chain Attack2 Min Read May 18, 2026 Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware Cybersecurity researchers have discovered four new npm packages containing information-stealing malware, one of which is a clone of the…
Industrial Sabotage Malware3 Min Read May 18, 2026 Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulations A new analysis of the Lua-based fast16 malware has confirmed that it was a cyber sabotage tool designed to tamper with nuclear weapons testing…
Server Security Vulnerability2 Min Read May 17, 2026 NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE A newly disclosed security flaw impacting NGINX Plus and NGINX Open has come under active exploitation in the wild, days after its public…
Cybercrime Data Breach2 Min Read May 17, 2026 Grafana GitHub Token Breach Led to Codebase Download and Extortion Attempt Grafana has disclosed that an "unauthorized party" obtained a token that granted them the ability to access the company's GitHub environment…
Vulnerability Website Security3 Min Read May 16, 2026 Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming A critical security vulnerability impacting the Funnel Builder plugin for WordPress has come under active exploitation in the wild to inject…
Botnet Threat Intelligence3 Min Read May 15, 2026 Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access The Russian state-sponsored hacking group known as Turla has transformed its custom backdoor Kazuar into a modular peer-to-peer (P2P) botnet…
AI Security Vulnerability2 Min Read May 15, 2026 Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence Cybersecurity researchers have disclosed a set of four security flaws in OpenClaw that could be chained to achieve data theft, privilege…
Endpoint Security Threat Detection3 Min Read May 15, 2026 What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface In Your Biggest Security Risk Isn't Malware — It's What You Already Trust, we made a simple argument: the most dangerous activity inside…
Malware Supply Chain Attack5 Min Read May 15, 2026 TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates OpenAI has disclosed that two of its employee devices in its corporate environment were impacted via the Mini Shai-Hulud supply chain attack…
Microsoft Vulnerability2 Min Read May 15, 2026 On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email Microsoft has disclosed a new security vulnerability impacting on-premise versions of Exchange Server that it said has come under active…
Credential Theft Vulnerability3 Min Read May 15, 2026 CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits The U.S.Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a newly disclosed vulnerability impacting Cisco Catalyst…
Network Security Vulnerability2 Min Read May 14, 2026 Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access Cisco has released updates to address a maximum-severity authentication bypass flaw in Catalyst SD-WAN Controller that it said has been…
Developer Security Supply Chain Attack4 Min Read May 14, 2026 Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets Cybersecurity researchers are sounding the alarm about what has been described as "malicious activity" in newly published versions of…
Cybersecurity News Hacking News9 Min Read May 14, 2026 ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories Everything is still on fire. This week feels dumb in the worst way — bad links, weak checks, fake help desks, shady forum posts, and…
Data Theft Hacktivism4 Min Read May 14, 2026 Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike The Belarus-aligned threat group known as Ghostwriter has been attributed to a fresh set of attacks targeting governmental organizations in…