Container Security Vulnerability3 Min Read May 3, 2026 CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux…
Network Security Vulnerability4 Min Read May 1, 2026 China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists Cybersecurity researchers have disclosed details of a new China-aligned espionage campaign targeting government and defense sectors across…
Cybersecurity News Hacking News14 Min Read April 30, 2026 ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some…
Linux Vulnerability2 Min Read April 30, 2026 New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user…
Identity Management Vulnerability2 Min Read April 28, 2026 Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover An administrative role meant for artificial intelligence (AI) agents within Microsoft Entra ID could enable privilege escalation and identity…
Agentic AI AI Cyber Attack Cybersecurity Identity theft Microsoft Microsoft Entra Security Silverfort Vulnerability2 Min Read April 26, 2026 Microsoft Entra Agent ID Flaw Enabled Tenant Takeover via Privilege Escalation Cybersecurity researchers at the identity protection firm Silverfort found a vulnerability in a Microsoft platform built to manage AI. The…
Malware Phishing Ransomware Vulnerabilities3 Min Read April 26, 2026 CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog with four new…
Apple Linux Vulnerabilities Windows2 Min Read April 24, 2026 Python Vulnerability Allows Out-of-Bounds Write on Windows Systems A security vulnerability has been discovered in Python’s Windows asyncio implementation, allowing attackers to trigger out-of-bounds…
Cloud Security Malware4 Min Read April 23, 2026 UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware A previously undocumented threat activity cluster known as UNC6692 has been observed leveraging social engineering tactics via Microsoft Teams…
Artificial Intelligence Exposure Management6 Min Read April 23, 2026 Project Glasswing Proved AI Can Find the Bugs. Who's Going to Fix Them? Last week, Anthropic announced Project Glasswing, an AI model so effective at discovering software vulnerabilities that they took the…
Cybersecurity Hacking17 Min Read March 30, 2026 ⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More Some weeks are loud. This one was quieter but not in a good way. Long-running operations are finally hitting courtrooms, old attack methods…
Artificial Intelligence SaaS Security5 Min Read March 25, 2026 The Kill Chain Is Obsolete When Your AI Agent Is the Threat In September 2025, Anthropic disclosed that a state-sponsored threat actor used an AI coding agent to execute an autonomous cyber espionage…
Cybersecurity Hacking14 Min Read March 23, 2026 ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing…
Cyber Espionage Vulnerability6 Min Read March 19, 2026 DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover A new exploit kit for Apple iOS devices designed to steal sensitive data from is being wielded by multiple threat actors since at least…
Linux Vulnerability2 Min Read March 13, 2026 Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation Cybersecurity researchers have disclosed multiple security vulnerabilities within the Linux kernel's AppArmor module that could be exploited…
Enterprise Security Vulnerability2 Min Read March 13, 2026 Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution Veeam has released security updates to address multiple critical vulnerabilities in its Backup & Replication software that, if…
Enterprise Security Vulnerability2 Min Read March 11, 2026 Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices SAP has released security updates to address two critical security flaws that could be exploited to achieve arbitrary code execution on…
Patch Tuesday Vulnerability3 Min Read March 11, 2026 Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days Microsoft on Tuesday released patches for a set of 84 new security vulnerabilities affecting various software components, including two that…
Cybersecurity Hacking20 Min Read March 9, 2026 ⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware Another week in cybersecurity. Another week of "you've got to be kidding me." Attackers were busy. Defenders were busy. And somewhere in the…
Cloud Security Phishing Ransomware Vulnerabilities5 Min Read March 9, 2026 Behind the console: Active phishing campaign targeting AWS console credentials Key points and observations Datadog Security Research identified an active adversary-in-the-middle (AiTM) phishing campaign targeting AWS…
Threat Intelligence Windows Security3 Min Read March 6, 2026 Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various…
Cloud Security Social Engineering3 Min Read February 25, 2026 SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women…
Cybersecurity Hacking15 Min Read February 23, 2026 ⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some happening quietly in the…
Cyber Insurance Password Security4 Min Read February 20, 2026 Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026 With one in three cyber-attacks now involving compromised employee accounts, insurers and regulators are placing far greater emphasis on…
Network Security Vulnerability1 Min Read February 19, 2026 Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their privileges. Windows…
Cybersecurity Hacking News15 Min Read February 19, 2026 ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories The cyber threat space doesn’t pause, and this week makes that clear. New risks, new tactics, and new security gaps are showing up…
Data Breach Phishing Ransomware Vulnerabilities13 Min Read February 16, 2026 Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware This week’s recap shows how small gaps are turning into big entry points. Not always through new exploits, often through tools, add-ons,…
Cybersecurity Hacking News18 Min Read February 12, 2026 ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories Threat activity this week shows one consistent signal — attackers are leaning harder on what already works. Instead of flashy new…
Vulnerability Windows Security5 Min Read February 11, 2026 Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days Microsoft on Tuesday released security updates to address a set of 59 flaws across its software, including six vulnerabilities that it said…
Identity Security Threat Intelligence6 Min Read February 10, 2026 From Ransomware to Residency: Inside the Rise of the Digital Parasite Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise while missing a…
Application Security Artificial Intelligence3 Min Read February 10, 2026 ZAST.AI Raises $6M Pre-A to Scale "Zero False Positive" AI-Powered Code Security January 5, 2026, Seattle, USA — ZAST.AI announced the completion of a $6 million Pre-A funding round. This investment came from the…
Cybersecurity Hacking News11 Min Read February 9, 2026 ⚡ Weekly Recap: AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More Cyber threats are no longer coming from just malware or exploits. They’re showing up inside the tools, platforms, and ecosystems…
Cybersecurity Hacking News19 Min Read February 2, 2026 ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others…
Cybersecurity Hacking News19 Min Read January 29, 2026 ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories This week's updates show how small changes can create real problems. Not loud incidents, but quiet shifts that are easy to miss until they add…
Linux Ransomware Vulnerabilities Windows7 Min Read January 26, 2026 Introducing IDE-SHEPHERD: Your shield against threat actors lurking in your IDE In recent years, Integrated Development Environments (IDEs) have become a pivotal component in modern software development, providing…
Cybersecurity Hacking News17 Min Read December 22, 2025 ⚡ Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More Cyber threats last week showed how attackers no longer need big hacks to cause big damage. They're going after the everyday tools we trust…
Malware Mobile Security4 Min Read December 18, 2025 Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App The North Korean threat actor known as Kimsuky has been linked to a new campaign that distributes a new variant of Android malware called…
Network Security Vulnerability1 Min Read December 17, 2025 SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances SonicWall has rolled out fixes to address a security flaw in Secure Mobile Access (SMA) 100 series appliances that it said has been actively…
Cloud Security Exploits Ransomware Vulnerabilities9 Min Read December 17, 2025 Introducing Pathfinding.cloud Today we’re releasing pathfinding.cloud, an extensive knowledge base that documents the IAM permissions and permission sets that allow…
Cybersecurity Hacking News17 Min Read December 15, 2025 ⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More If you use a smartphone, browse the web, or unzip files on your computer, you are in the crosshairs this week. Hackers are currently…
Automation Compliance4 Min Read December 11, 2025 The Impact of Robotic Process Automation (RPA) on Identity and Access Management As enterprises refine their strategies for handling Non-Human Identities (NHIs), Robotic Process Automation (RPA) has become a powerful tool…
Patch Tuesday Vulnerability4 Min Read December 10, 2025 Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that…