Network Security Vulnerability2 Min Read May 6, 2026 Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in…
Cyber Espionage Surveillance3 Min Read May 5, 2026 ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage…
Network Security Vulnerability2 Min Read May 5, 2026 Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come under…
Container Security Vulnerability3 Min Read May 3, 2026 CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux…
Exposure Management Security Operations5 Min Read April 29, 2026 What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong) Every security team has a version of the same story. The quarter ends with hundreds of vulnerabilities closed. The dashboards are bursting…
Vulnerability Web Hosting4 Min Read April 29, 2026 Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately cPanel has released security updates to address a security issue impacting various authentication paths that could allow an attacker to obtain…
Cloud Security Vulnerability3 Min Read April 29, 2026 LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's…
Threat Intelligence Vulnerability3 Min Read April 28, 2026 Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202 Microsoft on Monday revised its advisory for a now-patched, high-severity security flaw impacting Windows Shell to acknowledge that it has…
Exploits Network Ransomware Vulnerabilities3 Min Read April 27, 2026 The CVE Watchtower: Weekly Threat Intelligence Briefing (April 20 – April 26, 2026) Welcome to your Monday morning digest. As we close out the final full week of April, the global threat landscape is painting a complex…
Cybersecurity Hacking10 Min Read April 27, 2026 ⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More Everything is dumb again. This week feels broken in a very familiar way. Old tricks are back. New tools are doing shady crap. Supply chains…
Exploits IoT Security Network Vulnerabilities2 Min Read April 24, 2026 Xiongmai IP Camera Vulnerability Let Attackers Bypass Authentication and have Remote Access Security cameras are designed to keep commercial facilities safe. However, a newly disclosed critical vulnerability in Hangzhou Xiongmai…
Network Security Vulnerability3 Min Read April 24, 2026 LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure A high-severity security flaw in LMDeploy, an open-source toolkit for compressing, deploying, and serving LLMs, has come under active…
Cybersecurity News Hacking News15 Min Read April 23, 2026 ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories You scroll past one incident and see another that feels familiar, like it should have been fixed years ago, but it still works with small…
Artificial Intelligence Claude Code Copilot Cyber Attack Cybersecurity GitHub GitHub Copilot Indirect Prompt Injection IPI Security Vulnerability3 Min Read April 23, 2026 Hackers Use Hidden Website Instructions in New Attacks on AI Assistants Threat actors are now using a method called Indirect Prompt Injection (IPI) to trick Large Language Models (LLMs) by hiding secret commands on…
DDoS Ransomware3 Min Read April 23, 2026 Researchers Uncover 10 In-the-Wild Prompt Injection Payloads Targeting AI Agents Security researchers have discovered 10 new indirect prompt injection (IPI) payloads targeting AI agents with malicious instructions designed…
Browser Security Vulnerability2 Min Read April 1, 2026 New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released Google on Thursday released security updates for its Chrome web browser to address 21 vulnerabilities, including a zero-day flaw that it said…
Cybersecurity Hacking17 Min Read March 30, 2026 ⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More Some weeks are loud. This one was quieter but not in a good way. Long-running operations are finally hitting courtrooms, old attack methods…
Network Security Vulnerability2 Min Read March 28, 2026 Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug A recently disclosed critical security flaw impacting Citrix NetScaler ADC and NetScaler Gateway is witnessing active reconnaissance activity,…
Cybersecurity Hacking14 Min Read March 23, 2026 ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing…
Threat Intelligence Vulnerability1 Min Read March 21, 2026 Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager Oracle has released security updates to address a critical security flaw impacting Identity Manager and Web Services Manager that could be…
Artificial Intelligence Vulnerability4 Min Read March 20, 2026 Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure A critical security flaw impacting Langflow has come under active exploitation within 20 hours of public disclosure, highlighting the speed at…
Data Privacy Mobile Security3 Min Read March 20, 2026 Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams Google on Thursday announced a new "advanced flow" for Android sideloading that requires a mandatory 24-hour wait period to install apps from…
Vulnerability Web Security2 Min Read March 20, 2026 Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover Sansec is warning of a critical security flaw in Magento's REST API that could allow unauthenticated attackers to upload arbitrary executables…
Endpoint Security Threat Detection3 Min Read March 19, 2026 54 EDR Killers Use BYOVD to Exploit 35 Signed Vulnerable Drivers and Disable Security A new analysis of endpoint detection and response (EDR) killers has revealed that 54 of them leverage a technique known as bring your own…
Cybersecurity Hacking News10 Min Read March 19, 2026 ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More ThreatsDay Bulletin is back on The Hacker News, and this week feels off in a familiar way. Nothing loud, nothing breaking everything at once.…
Malware Mobile Security3 Min Read March 19, 2026 New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data Cybersecurity researchers have disclosed a new Android malware family called Perseus that's being actively distributed in the wild with an aim…
Data Protection Vulnerability2 Min Read March 18, 2026 Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE Cybersecurity researchers have disclosed a critical security flaw impacting the GNU InetUtils telnet daemon (telnetd) that could be exploited…
Supply Chain Attack Web Security5 Min Read March 18, 2026 Claude Code Security and Magecart: Getting the Threat Model Right When a Magecart payload hides inside the EXIF data of a dynamically loaded third-party favicon, no repository scanner will catch it –…
Network Security Vulnerability2 Min Read March 17, 2026 CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a medium-severity security flaw impacting Wing FTP to its…
Cybersecurity Hacking13 Min Read March 16, 2026 ⚡ Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More Some weeks in security feel normal. Then you read a few tabs and get that immediate “ah, great, we’re doing this now”…
Malvertising Threat Intelligence6 Min Read March 16, 2026 ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers Three different ClickFix campaigns have been found to act as a delivery vector for the deployment of a macOS information stealer called…
Cyber Espionage Endpoint Security3 Min Read March 16, 2026 DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage Ukrainian entities have emerged as the target of a new campaign likely orchestrated by threat actors linked to Russia, according to a report…
Browser Security Vulnerability2 Min Read March 13, 2026 Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8 Google on Thursday released security updates for its Chrome web browser to address two high-severity vulnerabilities that it said have been…
Application Security Vulnerability3 Min Read March 11, 2026 Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials Cybersecurity researchers have disclosed details of two now-patched security flaws in the n8n workflow automation platform, including two…
Database Security Vulnerability2 Min Read March 10, 2026 New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries Cybersecurity researchers have disclosed nine cross-tenant vulnerabilities in Google Looker Studio that could have permitted attackers to run…
Cyber Espionage Threat Intelligence3 Min Read March 10, 2026 APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military The Russian state-sponsored hacking group tracked as APT28 has been observed using a pair of implants dubbed BEARDSHELL and COVENANT to…
Cybersecurity Hacking20 Min Read March 9, 2026 ⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware Another week in cybersecurity. Another week of "you've got to be kidding me." Attackers were busy. Defenders were busy. And somewhere in the…
Enterprise Security Vulnerability2 Min Read March 5, 2026 Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN vManage) have come under active…
Mobile Security Threat Intelligence4 Min Read March 4, 2026 Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1 Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions…
API Security Generative AI3 Min Read February 28, 2026 Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to…
Network Security Vulnerability2 Min Read February 27, 2026 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks that…
Linux Security Malware2 Min Read February 27, 2026 Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor Cybersecurity researchers have disclosed details of a malicious Go module that's designed to harvest passwords, create persistent access via…