Vulnerability Zero-Day4 Min Read May 14, 2026 Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation An anonymous cybersecurity researcher who disclosed three Microsoft Defender vulnerabilities has returned with two more zero-days involving a BitLocker by…
2 Min Read May 14, 2026 New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption Details have emerged about a new variant of the recent Dirty Frag Linux… Linux Vulnerability
3 Min Read May 14, 2026 18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE Cybersecurity researchers have disclosed multiple security… Vulnerability Web Server
2 Min Read May 13, 2026 Microsoft's MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday Microsoft has unveiled a new multi-model artificial intelligence… Artificial Intelligence Vulnerability
Data Exfiltration Software Supply Chain2 Min Read May 13, 2026 GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data Cybersecurity researchers are calling attention to a new campaign dubbed GemStuffer that has targeted the RubyGems repository with more than…
Encryption Spyware5 Min Read May 13, 2026 Android Adds Intrusion Logging for Sophisticated Spyware Forensics Google on Tuesday unveiled a new opt-in Android feature called Intrusion Logging for storing forensic logs to better analyze sophisticated…
Email Security Vulnerability2 Min Read May 12, 2026 New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution Exim has released security updates to address a severe security issue affecting certain configurations that could enable memory corruption and…
Software Security Supply Chain Attack1 Min Read May 12, 2026 RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded RubyGems, the standard package manager for the Ruby programming language, has temporarily paused account sign ups following what has been…
Malware Mobile Security3 Min Read May 12, 2026 New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots Cybersecurity researchers have flagged a new version of the TrickMo Android banking trojan that uses The Open Network (TON) for…
AI Security Threat Detection2 Min Read May 12, 2026 Webinar: What the Riskiest SOC Alerts Go Unanswered – and How Radiant Security Can Help Why do the Riskiest SOC Alerts Go Unanswered? Security operations teams are drowning in alerts. But the real problem isn't always alert…
Artificial Intelligence Threat Detection6 Min Read May 12, 2026 Why Agentic AI Is Security's Next Blind Spot Agentic AI is already running in production environments across many organizations today. It is executing tasks, consuming data, and taking…
Malware Supply Chain Attack3 Min Read May 12, 2026 Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages TeamPCP, the threat actor behind the recent supply chain attack spree, has been linked to the compromise of the npm and PyPI packages…
Network Security Vulnerability2 Min Read May 12, 2026 Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak American educational technology company Instructure, the parent company of Canvas, said it reached an "agreement" with a decentralized…
AI Security Vulnerability3 Min Read May 12, 2026 OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation OpenAI has launched Daybreak, a new cybersecurity initiative that brings together frontier artificial intelligence (AI) model capabilities and…
Encryption Mobile Security2 Min Read May 12, 2026 iOS 26.5 Brings Default End-to-End Encrypted RCS Messaging Between iPhone and Android Apple on Monday officially released iOS 26.5 with support for end-to-end encryption (E2EE) to Rich Communication Services (RCS) in beta as…
DevSecOps Supply Chain Attack2 Min Read May 11, 2026 TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack Checkmarx has confirmed that a modified version of the Jenkins AST plugin was published to the Jenkins Marketplace. "If you are using…
Ransomware Vulnerability2 Min Read May 11, 2026 cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor A threat actor named Mr_Rot13 has been attributed to the exploitation of a recently disclosed critical cPanel flaw to deploy a backdoor…
Artificial Intelligence Vulnerability6 Min Read May 11, 2026 Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation Google on Monday disclosed that it identified an unknown threat actor using a zero-day exploit that it said was likely developed with an…
Cybersecurity Hacking17 Min Read May 11, 2026 ⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More Rough Monday. Somebody poisoned a trusted download again, somebody else turned cloud servers into public housing, and a few crews are still…
Artificial Intelligence Penetration Testing6 Min Read May 11, 2026 Your Purple Team Isn't Purple — It's Just Red and Blue in the Same Room Defending a network at 2 am looks a lot like this: an analyst copy-pasting a hash from a PDF into a SIEM query. A red team script is being…
Supply Chain Attack Threat Intelligence3 Min Read May 11, 2026 Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads A malicious Hugging Face repository managed to take a spot in the platform's trending list by impersonating OpenAI's Privacy Filter…
Data Breach Vulnerability5 Min Read May 10, 2026 Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak Cybersecurity researchers have disclosed a critical security vulnerability in Ollama that, if successfully exploited, could allow a remote,…
Vulnerability Web Hosting1 Min Read May 9, 2026 cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now cPanel has released updates to address three vulnerabilities in cPanel and Web Host Manager (WHM) that could be exploited to achieve privilege…
Malware Threat Intelligence3 Min Read May 8, 2026 TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms Threat hunters have flagged a previously undocumented Brazilian banking trojan dubbed TCLBANKER that's capable of targeting 59 banking,…
Android Mobile Security4 Min Read May 8, 2026 Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads Cybersecurity researchers have discovered fraudulent apps on the official Google Play Store for Android that falsely claimed to offer access…
Artificial Intelligence Threat Detection2 Min Read May 8, 2026 One Click, Total Shutdown: The "Patient Zero" Webinar on Killing Stealth Breaches The hardest part of cybersecurity isn't the technology, it’s the people. Every major breach you’ve read about lately usually…
DevOps Linux2 Min Read May 8, 2026 Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise A previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) is targeting developers' systems to establish a silent foothold as…
AI Security Threat Detection5 Min Read May 8, 2026 One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk The dark secret of enterprise security operations is that defenders have quietly institutionalized the practice of not looking. This is not…
Malware Threat Intelligence2 Min Read May 8, 2026 New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials Cybersecurity researchers have disclosed details of a new Linux backdoor named PamDOORa that's being advertised on the Rehub Russian…
Linux Vulnerability3 Min Read May 8, 2026 Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions Details have emerged about a new, unpatched local privilege escalation (LPE) vulnerability impacting the Linux kernel. Dubbed Dirty Frag, it…
Network Security Vulnerability2 Min Read May 7, 2026 Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access Ivanti is warning that a new security flaw impacting Endpoint Manager Mobile (EPMM) has been explored in limited attacks in the wild. The…
Cloud Security Threat Intelligence3 Min Read May 7, 2026 PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems Cybersecurity researchers have disclosed details of a new credential theft framework dubbed PCPJack that targets exposed cloud infrastructure…
Cyber Espionage Vulnerability2 Min Read May 7, 2026 PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage Palo Alto Networks has disclosed that threat actors may have attempted to unsuccessfully exploit a recently disclosed critical security flaw…
Cybersecurity News Hacking News16 Min Read May 7, 2026 ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories Bad week. Turns out the easiest way to get hacked in 2026 is still the same old garbage: shady packages, fake apps, forgotten DNS junk, scam…
Identity Management Incident Response11 Min Read May 7, 2026 Day Zero Readiness: The Operational Gaps That Break Incident Response Having an incident response retainer, or even a pre-approved external incident response firm, is not the same as being ready for an incident.…
Malware Threat Intelligence2 Min Read May 7, 2026 PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux Cybersecurity researchers have discovered three packages on the Python Package Index (PyPI) repository that are designed to stealthily deliver…
Software Security Vulnerability3 Min Read May 7, 2026 vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution A dozen critical security vulnerabilities have been disclosed in the vm2 Node.js library that could be exploited by bad actors to break out of…
IoT Security Malware3 Min Read May 6, 2026 Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks Cybersecurity researchers have exposed a new Mirai-derived botnet that self-identifies as xlabs_v1 and targets internet-exposed devices…
Cybercrime Ransomware6 Min Read May 6, 2026 MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and Static Kitten) has been attributed to a…
Industry Recognition Security Leadership3 Min Read May 6, 2026 The Hacker News Launches 'Cybersecurity Stars Awards 2026' — Submissions Now Open For nearly 20 years, we at The Hacker News have mostly told scary stories about cyberspace — big hacks, broken systems, and new threats.…
Compliance Data Security6 Min Read May 6, 2026 Your AI Agents Are Already Inside the Perimeter. Do You Know What They're Doing? Analysts recently confirmed what identity security teams have quietly feared: AI agents are being deployed faster than enterprises can govern…
Android Data Security3 Min Read May 6, 2026 Google's Android Apps Get Public Verification to Stop Supply Chain Attacks Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks. "This new public…
Endpoint Security Threat Intelligence3 Min Read May 6, 2026 Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs Cybersecurity researchers have disclosed details of an intrusion that involved the use of a CloudZ remote access tool (RAT) and a previous…
Network Security Vulnerability2 Min Read May 6, 2026 Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in…
Server Security Vulnerability2 Min Read May 5, 2026 Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE The Apache Software Foundation (ASF) has released security updates to address several security vulnerabilities in the HTTP Server, including a…
Endpoint Security Software Security3 Min Read May 5, 2026 DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware A newly identified supply chain attack targeting DAEMON Tools software has compromised its installers to serve a malicious payload, according…