<?xml version='1.0' encoding='utf-8'?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CSOH - Cloud Security News</title>
    <link>https://csoh.org/news.html</link>
    <description>Latest cloud security news curated by Cloud Security Office Hours. Covers AWS, Azure, GCP, Kubernetes vulnerabilities, breaches, and more.</description>
    <language>en-us</language>
    <managingEditor>admin@csoh.org (CSOH)</managingEditor>
    <webMaster>admin@csoh.org (CSOH)</webMaster>
    <lastBuildDate>Fri, 08 May 2026 20:34:26 +0000</lastBuildDate>
    <ttl>720</ttl>
    <atom:link href="https://csoh.org/feed.xml" rel="self" type="application/rss+xml" />
    <image>
      <url>https://csoh.org/favicon.png</url>
      <title>CSOH - Cloud Security News</title>
      <link>https://csoh.org/news.html</link>
    </image>
    <item>
      <title>RansomHouse says it breached Trellix and exposes internal systems</title>
      <link>https://securityaffairs.com/191879/cyber-crime/ransomhouse-says-it-breached-trellix-and-exposes-internal-systems.html</link>
      <description>RansomHouse claimed responsibility for the Trellix breach, adding the security firm to its Tor data leak site and sharing screenshots of internal systems. The RansomHouse ransomware group has claimed responsibility fo...</description>
      <source url="https://securityaffairs.com/191879/cyber-crime/ransomhouse-says-it-breached-trellix-and-exposes-internal-systems.html">Security Affairs</source>
      <guid isPermaLink="true">https://securityaffairs.com/191879/cyber-crime/ransomhouse-says-it-breached-trellix-and-exposes-internal-systems.html</guid>
      <pubDate>Fri, 08 May 2026 20:34:26 +0000</pubDate>
      <category>Breach</category>
      <category>Ransomware</category>
    </item>
    <item>
      <title>Another Universal Linux Local Privilege Escalation (LPE) Vulnerability: Dirty Frag, (Fri, May 8th)</title>
      <link>https://isc.sans.edu/diary/rss/32968</link>
      <description>Less than two weeks after the public disclosure of the Copy Fail vulnerability (CVE-2026-31431), another local privilege escalation (LPE) vulnerability in the Linux kernel has been revealed. Referred to as "Dirty Frag...</description>
      <source url="https://isc.sans.edu/diary/rss/32968">SANS ISC</source>
      <guid isPermaLink="true">https://isc.sans.edu/diary/rss/32968</guid>
      <pubDate>Fri, 08 May 2026 14:57:03 +0000</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director Frontrunner</title>
      <link>https://www.securityweek.com/in-other-news-train-hacker-arrested-pamdoora-linux-backdoor-new-cisa-director-frontrunner</link>
      <description>Other noteworthy stories that might have slipped under the radar: US gov targets 72-hour patch cycles, malware uses Windows Phone Link to steal OTPs, spy operation targets Eurasian drone industry. The post In Other Ne...</description>
      <source url="https://www.securityweek.com/in-other-news-train-hacker-arrested-pamdoora-linux-backdoor-new-cisa-director-frontrunner">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/in-other-news-train-hacker-arrested-pamdoora-linux-backdoor-new-cisa-director-frontrunner</guid>
      <pubDate>Fri, 08 May 2026 14:30:00 +0000</pubDate>
      <category>CISA</category>
    </item>
    <item>
      <title>Zara Data Breach: 197,000 Customers Exposed in Third-Party Security Incident</title>
      <link>https://securityaffairs.com/191859/cyber-crime/zara-data-breach-197000-customers-exposed-in-third-party-security-incident.html</link>
      <description>Nearly 200,000 Zara customers were exposed in a third-party breach linked to ShinyHunters, revealing emails, purchase history, and support data. Personal data belonging to nearly 197,000 Zara customers has been compro...</description>
      <source url="https://securityaffairs.com/191859/cyber-crime/zara-data-breach-197000-customers-exposed-in-third-party-security-incident.html">Security Affairs</source>
      <guid isPermaLink="true">https://securityaffairs.com/191859/cyber-crime/zara-data-breach-197000-customers-exposed-in-third-party-security-incident.html</guid>
      <pubDate>Fri, 08 May 2026 14:05:51 +0000</pubDate>
      <category>Breach</category>
    </item>
    <item>
      <title>CISA gives feds four days to patch Ivanti flaw exploited as zero-day</title>
      <link>https://www.bleepingcomputer.com/news/security/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day</link>
      <description>CISA has given U.S. federal agencies four days to secure their networks against a high-severity vulnerability in Ivanti Endpoint Manager Mobile (EPMM) exploited in zero-day attacks. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day</guid>
      <pubDate>Fri, 08 May 2026 08:16:32 -0400</pubDate>
      <category>CISA</category>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise</title>
      <link>https://thehackernews.com/2026/05/quasar-linux-rat-steals-developer.html</link>
      <description>A previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) is targeting developers' systems to establish a silent foothold as well as facilitate a broad range of post-compromise functionality, such as c...</description>
      <source url="https://thehackernews.com/2026/05/quasar-linux-rat-steals-developer.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/05/quasar-linux-rat-steals-developer.html</guid>
      <pubDate>Fri, 08 May 2026 16:30:00 +0530</pubDate>
      <category>Supply Chain</category>
      <category>Scam</category>
    </item>
    <item>
      <title>Australian Cyber Security Centre Issues Alert Over ClickFix Attacks</title>
      <link>https://www.infosecurity-magazine.com/news/australian-cyber-security-centre</link>
      <description>ACSC warns over a campaign targeting organizations which uses ClickFix to deliver Vidar infostealer malware</description>
      <source url="https://www.infosecurity-magazine.com/news/australian-cyber-security-centre">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/australian-cyber-security-centre</guid>
      <pubDate>Fri, 08 May 2026 11:00:00 +0000</pubDate>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Friday Squid Blogging: Giant Squid Live in the Waters of Western Australia</title>
      <link>https://www.schneier.com/blog/archives/2026/05/friday-squid-blogging-giant-squid-live-in-the-waters-of-western-australia.html</link>
      <description>Evidence of them has been found by analyzing DNA in the seawater. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.</description>
      <source url="https://www.schneier.com/blog/archives/2026/05/friday-squid-blogging-giant-squid-live-in-the-waters-of-western-australia.html">Schneier on Security</source>
      <guid isPermaLink="true">https://www.schneier.com/blog/archives/2026/05/friday-squid-blogging-giant-squid-live-in-the-waters-of-western-australia.html</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>A Framework for AI Threat Readiness</title>
      <link>https://www.wiz.io/blog/ai-threat-readiness-framework</link>
      <description>AI models now find and exploit zero-days autonomously. This 4-pillar framework accelerates patching, analysis, and threat response.</description>
      <source url="https://www.wiz.io/blog/ai-threat-readiness-framework">Wiz Blog</source>
      <guid isPermaLink="true">https://www.wiz.io/blog/ai-threat-readiness-framework</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Vulnerability</category>
      <category>AI</category>
    </item>
    <item>
      <title>Metasploit Wrap-Up 05/08/2026</title>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-05-08-2026/</link>
      <description>Spring cleanup This week’s Metasploit updates focused on foundational improvements and expanded target reach. Key enhancements were made to the recently released Copy Fail exploit module, which now benefits from paylo...</description>
      <source url="https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-05-08-2026/">Rapid7 Blog</source>
      <guid isPermaLink="true">https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-05-08-2026/</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>Insider Betting on Polymarket</title>
      <link>https://www.schneier.com/blog/archives/2026/05/insider-betting-on-polymarket.html</link>
      <description>Insider trading is rife on Polymarket: Analysis by the Anti-Corruption Data Collective, a non-profit research and advocacy group, found that long-shot bets—­defined as wagers of $2,500 or more at odds of 35 percent or...</description>
      <source url="https://www.schneier.com/blog/archives/2026/05/insider-betting-on-polymarket.html">Schneier on Security</source>
      <guid isPermaLink="true">https://www.schneier.com/blog/archives/2026/05/insider-betting-on-polymarket.html</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Worm rubs out competitor's malware, then takes control</title>
      <link>https://www.theregister.com/security/2026/05/08/worm-rubs-out-competitors-malware-then-takes-control/5237389</link>
      <description>All your compromised credentials are belong to us now instead of the other gang</description>
      <source url="https://www.theregister.com/security/2026/05/08/worm-rubs-out-competitors-malware-then-takes-control/5237389">The Register - Security</source>
      <guid isPermaLink="true">https://www.theregister.com/security/2026/05/08/worm-rubs-out-competitors-malware-then-takes-control/5237389</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Scam</category>
    </item>
    <item>
      <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
      <link>https://www.cisa.gov/news-events/alerts/2026/05/08/cisa-adds-one-known-exploited-vulnerability-catalog</link>
      <description>CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-42208 BerriAI LiteLLM SQL Injection Vulnerability This type of vulnerabili...</description>
      <source url="https://www.cisa.gov/news-events/alerts/2026/05/08/cisa-adds-one-known-exploited-vulnerability-catalog">CISA Current Activity</source>
      <guid isPermaLink="true">https://www.cisa.gov/news-events/alerts/2026/05/08/cisa-adds-one-known-exploited-vulnerability-catalog</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>CISA</category>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>NVIDIA confirms GeForce NOW data breach affecting Armenian users</title>
      <link>https://www.bleepingcomputer.com/news/security/nvidia-confirms-geforce-now-data-breach-affecting-armenian-users</link>
      <description>NVIDIA has confirmed in a statement for BleepingComputer that GeForce NOW user information has been exposed in a data breach. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/nvidia-confirms-geforce-now-data-breach-affecting-armenian-users">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/nvidia-confirms-geforce-now-data-breach-affecting-armenian-users</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Breach</category>
    </item>
    <item>
      <title>Critical Apache HTTP Server HTTP/2 Vulnerability Could Enable Remote Code Execution</title>
      <link>https://orca.security/resources/blog/apache-http-server-http2-vulnerability-cve-2026-23918/</link>
      <description>A high-severity vulnerability (CVE-2026-23918, CVSS 8.8) was disclosed affecting Apache HTTP Server, allowing attackers to potentially achieve remote code execution via specially crafted HTTP/2 requests. Due to the po...</description>
      <source url="https://orca.security/resources/blog/apache-http-server-http2-vulnerability-cve-2026-23918/">Orca Security Blog</source>
      <guid isPermaLink="true">https://orca.security/resources/blog/apache-http-server-http2-vulnerability-cve-2026-23918/</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads</title>
      <link>https://thehackernews.com/2026/05/fake-call-history-apps-stole-payments.html</link>
      <description>Cybersecurity researchers have discovered fraudulent apps on the official Google Play Store for Android that falsely claimed to offer access to call histories for any phone number, only to trick users into joining a s...</description>
      <source url="https://thehackernews.com/2026/05/fake-call-history-apps-stole-payments.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/05/fake-call-history-apps-stole-payments.html</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Scam</category>
    </item>
    <item>
      <title>Why More Analysts Won’t Solve Your SOC’s Alert Problem</title>
      <link>https://www.bleepingcomputer.com/news/security/why-more-analysts-wont-solve-your-socs-alert-problem</link>
      <description>Attackers move faster than overwhelmed SOC teams can realistically investigate alerts. Prophet Security breaks down how AI can help analysts investigate alerts faster and focus on real threats. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/why-more-analysts-wont-solve-your-socs-alert-problem">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/why-more-analysts-wont-solve-your-socs-alert-problem</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>GCSI 2026: AI Readiness in a City Built in Layers</title>
      <link>https://blog.gitguardian.com/gcsi-2026/</link>
      <description>GCSI 2026 showed why cyber readiness depends on visibility into vendors, AI tools, identities, workflows, and hidden business dependencies.</description>
      <source url="https://blog.gitguardian.com/gcsi-2026/">GitGuardian Blog</source>
      <guid isPermaLink="true">https://blog.gitguardian.com/gcsi-2026/</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Trellix source code breach claimed by RansomHouse hackers</title>
      <link>https://www.bleepingcomputer.com/news/security/trellix-source-code-breach-claimed-by-ransomhouse-hackers</link>
      <description>The attack on the Trellix source code repository disclosed last week has been claimed by the RansomHouse threat group, which leaked a small set of images as proof of the intrusion. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/trellix-source-code-breach-claimed-by-ransomhouse-hackers">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/trellix-source-code-breach-claimed-by-ransomhouse-hackers</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Breach</category>
    </item>
    <item>
      <title>Zero Chaos: Scaling Detection Engineering at the Speed of Software, with Detection As Code</title>
      <link>https://www.rapid7.com/blog/post/dr-scaling-engineering-detection-as-code/</link>
      <description>Every engineering team in your organization ships code through a pipeline. They branch, test, review, and deploy. If something breaks, they roll back. If someone asks "what changed?", the answer is in the commit histo...</description>
      <source url="https://www.rapid7.com/blog/post/dr-scaling-engineering-detection-as-code/">Rapid7 Blog</source>
      <guid isPermaLink="true">https://www.rapid7.com/blog/post/dr-scaling-engineering-detection-as-code/</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>See and Secure Everything at the Edge with Wiz and Akamai</title>
      <link>https://www.wiz.io/blog/introducing-wiz-akamai-integration</link>
      <description>Akamai edge configurations are now visible on the Wiz Security Graph, giving teams a single understanding of risk from edge to runtime</description>
      <source url="https://www.wiz.io/blog/introducing-wiz-akamai-integration">Wiz Blog</source>
      <guid isPermaLink="true">https://www.wiz.io/blog/introducing-wiz-akamai-integration</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants</title>
      <link>https://www.securityweek.com/polish-security-agency-reports-ics-breaches-at-five-water-treatment-plants/</link>
      <description>The hackers gained the ability to modify equipment operational parameters, creating a direct risk to the public water supply. The post Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants appeare...</description>
      <source url="https://www.securityweek.com/polish-security-agency-reports-ics-breaches-at-five-water-treatment-plants/">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/polish-security-agency-reports-ics-breaches-at-five-water-treatment-plants/</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Breach</category>
    </item>
    <item>
      <title>AI Firm Braintrust Prompts API Key Rotation After Data Breach</title>
      <link>https://www.securityweek.com/ai-firm-braintrust-prompts-api-key-rotation-after-data-breach/</link>
      <description>Hackers accessed one of the company’s AWS accounts and compromised AI provider secrets stored in Braintrust. The post AI Firm Braintrust Prompts API Key Rotation After Data Breach appeared first on SecurityWeek .</description>
      <source url="https://www.securityweek.com/ai-firm-braintrust-prompts-api-key-rotation-after-data-breach/">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/ai-firm-braintrust-prompts-api-key-rotation-after-data-breach/</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>AWS</category>
      <category>Breach</category>
      <category>AI</category>
    </item>
    <item>
      <title>Cyberattack Hits Canvas System Used by Thousands of Schools as Finals Loom</title>
      <link>https://www.securityweek.com/cyberattack-hits-canvas-system-used-by-thousands-of-schools-as-finals-loom/</link>
      <description>A system that thousands of schools and universities use went offline due to a cyberattack, creating chaos as students tried to study for finals. The post Cyberattack Hits Canvas System Used by Thousands of Schools as...</description>
      <source url="https://www.securityweek.com/cyberattack-hits-canvas-system-used-by-thousands-of-schools-as-finals-loom/">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/cyberattack-hits-canvas-system-used-by-thousands-of-schools-as-finals-loom/</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk</title>
      <link>https://thehackernews.com/2026/05/one-missed-threat-per-week-what-25m.html</link>
      <description>The dark secret of enterprise security operations is that defenders have quietly institutionalized the practice of not looking. This is not just anecdotal, but rather backed by a recent report investigating more than...</description>
      <source url="https://thehackernews.com/2026/05/one-missed-threat-per-week-what-25m.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/05/one-missed-threat-per-week-what-25m.html</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Google is turning Android Studio into a policy watchdog</title>
      <link>https://www.helpnetsecurity.com/2026/05/08/google-android-studio-app-security-updates/</link>
      <description>Google has expanded Play Policy Insights in Android Studio to help developers catch policy issues while coding, including warnings for common problems such as missing login credentials. Later this year, developers who...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/08/google-android-studio-app-security-updates/">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/08/google-android-studio-app-security-updates/</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Scam</category>
    </item>
    <item>
      <title>Helping North Korean IT remote workers is becoming a fast track to prison</title>
      <link>https://www.helpnetsecurity.com/2026/05/08/north-korean-it-workers-us-laptop-farm-operation-sentencing</link>
      <description>Two U.S. nationals were sentenced to 18 months in prison for operating “laptop farms” that helped North Korean IT workers gain employment at nearly 70 American companies, generating more than $1.2 million for Pyongyan...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/08/north-korean-it-workers-us-laptop-farm-operation-sentencing">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/08/north-korean-it-workers-us-laptop-farm-operation-sentencing</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Former govt contractor convicted for wiping dozens of federal databases</title>
      <link>https://www.bleepingcomputer.com/news/security/former-govt-contractor-convicted-for-wiping-dozens-of-federal-databases</link>
      <description>A 34-year-old Virginia man was found guilty of conspiring to destroy dozens of government databases after getting fired from his job as a federal contractor. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/former-govt-contractor-convicted-for-wiping-dozens-of-federal-databases">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/former-govt-contractor-convicted-for-wiping-dozens-of-federal-databases</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Jobs</category>
    </item>
    <item>
      <title>‘PCPJack’ Worm Removes TeamPCP Infections, Steals Credentials</title>
      <link>https://www.securityweek.com/pcpjack-worm-removes-teampcp-infections-steals-credentials/</link>
      <description>The malware framework targets web applications and cloud environments, including AWS, Docker, Kubernetes, and more. The post ‘PCPJack’ Worm Removes TeamPCP Infections, Steals Credentials appeared first on SecurityWeek .</description>
      <source url="https://www.securityweek.com/pcpjack-worm-removes-teampcp-infections-steals-credentials/">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/pcpjack-worm-removes-teampcp-infections-steals-credentials/</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>AWS</category>
      <category>Kubernetes</category>
      <category>Scam</category>
    </item>
    <item>
      <title>Snyk integrates Claude to advance AI-native application security</title>
      <link>https://www.helpnetsecurity.com/2026/05/08/snyk-ai-security-platform</link>
      <description>Snyk has announced it is leveraging Anthropic’s Claude models to advance software security. Snyk has integrated Claude into the Snyk AI Security Platform, enabling automated vulnerability discovery, prioritization, an...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/08/snyk-ai-security-platform">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/08/snyk-ai-security-platform</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Vulnerability</category>
      <category>AI</category>
    </item>
    <item>
      <title>Avantra’s new AI can diagnose SAP failures in seconds</title>
      <link>https://www.helpnetsecurity.com/2026/05/08/avantra-26-released</link>
      <description>Avantra launched Avantra 26, an advancement in AI-driven operations, strengthening native integration with SAP Cloud ALM, and delivering automated visibility across SAP Business Technology Platform (BTP). Avantra also...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/08/avantra-26-released">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/08/avantra-26-released</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Securonix launches AI threat research agent and ThreatWatch validation tool</title>
      <link>https://www.helpnetsecurity.com/2026/05/08/securonix-threat-research-agent-threatwatch-threatq/</link>
      <description>Securonix announced the Securonix Threat Research Agent and ThreatWatch for ThreatQ, expanding how security teams research threats, validate exposure, and turn intelligence into documented action. Built on the ThreatQ...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/08/securonix-threat-research-agent-threatwatch-threatq/">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/08/securonix-threat-research-agent-threatwatch-threatq/</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>OpenAI tunes GPT-5.5-Cyber for more permissive security workflows</title>
      <link>https://www.helpnetsecurity.com/2026/05/08/openai-gpt-5-5-cyber-model</link>
      <description>OpenAI is rolling out GPT-5.5-Cyber, a variant of its latest AI model, in limited preview for verified cybersecurity professionals and organizations through its Trusted Access for Cyber program. Trusted Access for Cyb...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/08/openai-gpt-5-5-cyber-model">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/08/openai-gpt-5-5-cyber-model</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>AI, Cyberwarfare, and Autonomous Weapons: Inside America’s New Military Strategy</title>
      <link>https://securityaffairs.com/191842/cyber-warfare-2/ai-cyberwarfare-and-autonomous-weapons-inside-americas-new-military-strategy.html</link>
      <description>The Pentagon is integrating AI into military operations, transforming cybersecurity, targeting, and command systems into a unified warfare architecture. May 2026 marks a turning point in the evolution of modern warfar...</description>
      <source url="https://securityaffairs.com/191842/cyber-warfare-2/ai-cyberwarfare-and-autonomous-weapons-inside-americas-new-military-strategy.html">Security Affairs</source>
      <guid isPermaLink="true">https://securityaffairs.com/191842/cyber-warfare-2/ai-cyberwarfare-and-autonomous-weapons-inside-americas-new-military-strategy.html</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Transilience AI unveils Security Operating System for cloud remediation</title>
      <link>https://www.helpnetsecurity.com/2026/05/08/transilience-ai-full-stack-os/</link>
      <description>Transilience AI has announced the general availability of its Full Stack Security Operating System for the cloud, platform designed to solve one of enterprise security’s most persistent challenges: bridging the gap be...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/08/transilience-ai-full-stack-os/">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/08/transilience-ai-full-stack-os/</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Object First Fleet Manager simplifies distributed backup storage</title>
      <link>https://www.helpnetsecurity.com/2026/05/08/object-first-fleet-manager-backup-storage/</link>
      <description>Object First released Object First Fleet Manager, a cloud-based service that simplifies the management of distributed Ootbi backup storage deployments for Veeam Software environments. Built for enterprises and service...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/08/object-first-fleet-manager-backup-storage/">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/08/object-first-fleet-manager-backup-storage/</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Vulnerability in Claude Extension for Chrome Exposes AI Agent to Takeover</title>
      <link>https://www.securityweek.com/vulnerability-in-claude-extension-for-chrome-exposes-ai-agent-to-takeover/</link>
      <description>Lax extension permissions and improper trust implementation allow attackers to inject prompts in the Claude Chrome extension. The post Vulnerability in Claude Extension for Chrome Exposes AI Agent to Takeover appeared...</description>
      <source url="https://www.securityweek.com/vulnerability-in-claude-extension-for-chrome-exposes-ai-agent-to-takeover/">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/vulnerability-in-claude-extension-for-chrome-exposes-ai-agent-to-takeover/</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Vulnerability</category>
      <category>AI</category>
    </item>
    <item>
      <title>New infosec products of the week: May 8, 2026</title>
      <link>https://www.helpnetsecurity.com/2026/05/08/new-infosec-products-of-the-week-may-8-2026/</link>
      <description>Here’s a look at the most interesting products from the past week LastPass, Operant AI, Sysdig, and VIAVI. Operant AI Endpoint Protector secures AI agents and MCP tools Operant AI has launched Operant Endpoint Protect...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/08/new-infosec-products-of-the-week-may-8-2026/">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/08/new-infosec-products-of-the-week-may-8-2026/</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Canvas Breach Disrupts Schools &amp; Colleges Nationwide</title>
      <link>https://krebsonsecurity.com/2026/05/canvas-breach-disrupts-schools-colleges-nationwide/</link>
      <description>An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime...</description>
      <source url="https://krebsonsecurity.com/2026/05/canvas-breach-disrupts-schools-colleges-nationwide/">KrebsOnSecurity</source>
      <guid isPermaLink="true">https://krebsonsecurity.com/2026/05/canvas-breach-disrupts-schools-colleges-nationwide/</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Breach</category>
    </item>
    <item>
      <title>ISC Stormcast For Friday, May 8th, 2026 https://isc.sans.edu/podcastdetail/9924, (Fri, May 8th)</title>
      <link>https://isc.sans.edu/diary/rss/32966</link>
      <description />
      <source url="https://isc.sans.edu/diary/rss/32966">SANS ISC</source>
      <guid isPermaLink="true">https://isc.sans.edu/diary/rss/32966</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Detecting Web Server Probing &amp; Fuzzing in Traefik with Automated Cloudflare Response</title>
      <link>https://www.elastic.co/security-labs/detecting-web-server-probing-and-fuzzing</link>
      <description>This article shows how a customized Elastic Security ES|QL detection rule can identify web server probing and fuzzing activity in Traefik logs and automatically block the attacking IP via Cloudflare.</description>
      <source url="https://www.elastic.co/security-labs/detecting-web-server-probing-and-fuzzing">Elastic Security Labs</source>
      <guid isPermaLink="true">https://www.elastic.co/security-labs/detecting-web-server-probing-and-fuzzing</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Kubernetes security fundamentals: Secrets</title>
      <link>https://securitylabs.datadoghq.com/articles/kubernetes-security-fundamentals-part-8/</link>
      <description>A look at how to secure Kubernetes secrets</description>
      <source url="https://securitylabs.datadoghq.com/articles/kubernetes-security-fundamentals-part-8/">Datadog Security Labs</source>
      <guid isPermaLink="true">https://securitylabs.datadoghq.com/articles/kubernetes-security-fundamentals-part-8/</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Kubernetes</category>
    </item>
    <item>
      <title>Cyber resiliency in practice: Lessons from recent supply chain attacks</title>
      <link>https://www.chainguard.dev/unchained/cyber-resiliency-in-practice-lessons-from-recent-supply-chain-attacks</link>
      <description>Learn how modern cyber resiliency helps organizations prevent, detect, and recover from supply chain attacks like Trivy, Axios, and LiteLLM.</description>
      <source url="https://www.chainguard.dev/unchained/cyber-resiliency-in-practice-lessons-from-recent-supply-chain-attacks">Chainguard Unchained</source>
      <guid isPermaLink="true">https://www.chainguard.dev/unchained/cyber-resiliency-in-practice-lessons-from-recent-supply-chain-attacks</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      <category>Supply Chain</category>
    </item>
    <item>
      <title>New TCLBanker malware self-spreads over WhatsApp and Outlook</title>
      <link>https://www.bleepingcomputer.com/news/security/new-tclbanker-malware-self-spreads-over-whatsapp-and-outlook</link>
      <description>A new trojan named TCLBanker, which targets 59 banking, fintech, and cryptocurrency platforms, uses a trojanized MSI installer for Logitech AI Prompt Builder to infect systems. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/new-tclbanker-malware-self-spreads-over-whatsapp-and-outlook">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/new-tclbanker-malware-self-spreads-over-whatsapp-and-outlook</guid>
      <pubDate>Thu, 07 May 2026 18:06:52 -0400</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access</title>
      <link>https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html</link>
      <description>Ivanti is warning that a new security flaw impacting Endpoint Manager Mobile (EPMM) has been explored in limited attacks in the wild. The high-severity vulnerability, CVE-2026-6973 (CVSS score: 7.2), is a case of impr...</description>
      <source url="https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html</guid>
      <pubDate>Thu, 07 May 2026 23:25:00 +0530</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State Hacking</title>
      <link>https://www.securityweek.com/palo-alto-zero-day-exploited-in-campaign-bearing-hallmarks-of-chinese-state-hacking</link>
      <description>The cybersecurity firm has not explicitly accused China of being behind the attack, but the evidence suggests it was. The post Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State Hacking appear...</description>
      <source url="https://www.securityweek.com/palo-alto-zero-day-exploited-in-campaign-bearing-hallmarks-of-chinese-state-hacking">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/palo-alto-zero-day-exploited-in-campaign-bearing-hallmarks-of-chinese-state-hacking</guid>
      <pubDate>Thu, 07 May 2026 15:31:12 +0000</pubDate>
      <category>Vulnerability</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Fake Claude AI Site Drops Beagle Backdoor on Windows Users</title>
      <link>https://www.infosecurity-magazine.com/news/fake-claude-site-beagle-backdoor/</link>
      <description>Sophos finds fake Claude site spreading DonutLoader and a new Beagle backdoor via DLL sideloading</description>
      <source url="https://www.infosecurity-magazine.com/news/fake-claude-site-beagle-backdoor/">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/fake-claude-site-beagle-backdoor/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Cisco patches high-severity flaws enabling SSRF, code execution attacks</title>
      <link>https://securityaffairs.com/191808/breaking-news/cisco-patches-high-severity-flaws-enabling-ssrf-code-execution-attacks.html</link>
      <description>Cisco fixed several high‑severity flaws in its enterprise products, including SSRF bugs in Unity Connection that could enable code execution or service disruption. Cisco released patches for multiple high‑severity vul...</description>
      <source url="https://securityaffairs.com/191808/breaking-news/cisco-patches-high-severity-flaws-enabling-ssrf-code-execution-attacks.html">Security Affairs</source>
      <guid isPermaLink="true">https://securityaffairs.com/191808/breaking-news/cisco-patches-high-severity-flaws-enabling-ssrf-code-execution-attacks.html</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Rapid7 and OpenAI: Helping Defenders Move at Machine Speed</title>
      <link>https://www.rapid7.com/blog/post/ai-rapid7-openai-helping-defenders-move-at-machine-speed/</link>
      <description>Wade Woolwine is Senior Director, Product Security at Rapid7. Announcing OpenAI's Trusted Access for Cyber program CIOs and CISOs are telling us the same thing in different ways: Advances in frontier AI are accelerati...</description>
      <source url="https://www.rapid7.com/blog/post/ai-rapid7-openai-helping-defenders-move-at-machine-speed/">Rapid7 Blog</source>
      <guid isPermaLink="true">https://www.rapid7.com/blog/post/ai-rapid7-openai-helping-defenders-move-at-machine-speed/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Building for the future</title>
      <link>https://blog.cloudflare.com/building-for-the-future/</link>
      <description>This afternoon, we sent the following email to our global team. One of our core values at Cloudflare is transparency, and we believe it's important that you hear this directly from us because it’s a major moment at Cl...</description>
      <source url="https://blog.cloudflare.com/building-for-the-future/">Cloudflare Blog</source>
      <guid isPermaLink="true">https://blog.cloudflare.com/building-for-the-future/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Anthropic response to 1-click pwn: Shouldn't have clicked 'ok'</title>
      <link>https://www.theregister.com/security/2026/05/07/claude-code-trust-prompt-can-trigger-one-click-rce/5235319</link>
      <description>Security biz Adversa AI argues users of AI tools need clearer warnings</description>
      <source url="https://www.theregister.com/security/2026/05/07/claude-code-trust-prompt-can-trigger-one-click-rce/5235319">The Register - Security</source>
      <guid isPermaLink="true">https://www.theregister.com/security/2026/05/07/claude-code-trust-prompt-can-trigger-one-click-rce/5235319</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Worries About AI’s Risks to Humanity Loom Over the Trial Pitting Musk Against OpenAI’s Leaders</title>
      <link>https://www.securityweek.com/worries-about-ais-risks-to-humanity-loom-over-the-trial-pitting-musk-against-openais-leaders/</link>
      <description>Musk said that he could have founded OpenAI as a for-profit company, just like the other companies he started or took over. “I deliberately chose this,” he said, “for the public good.” The post Worries About AI’s Risk...</description>
      <source url="https://www.securityweek.com/worries-about-ais-risks-to-humanity-loom-over-the-trial-pitting-musk-against-openais-leaders/">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/worries-about-ais-risks-to-humanity-loom-over-the-trial-pitting-musk-against-openais-leaders/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>ICYMI: April 2026 @AWS Security</title>
      <link>https://aws.amazon.com/blogs/security/icymi-april-2026-aws-security/</link>
      <description>Read all about the latest AWS security features, compliance updates, and hands-on resources in our new, monthly digest posts. You’ll find expert blog posts, new service capabilities, code samples, and workshops. AWS S...</description>
      <source url="https://aws.amazon.com/blogs/security/icymi-april-2026-aws-security/">AWS Security Blog</source>
      <guid isPermaLink="true">https://aws.amazon.com/blogs/security/icymi-april-2026-aws-security/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>AWS</category>
    </item>
    <item>
      <title>Unplug your way to better code</title>
      <link>https://blog.talosintelligence.com/unplug-your-way-to-better-code/</link>
      <description>Cybersecurity concepts — logs, packets, DNS exfiltration, and more — are usually intangible, and its practitioners are prone to mental fatigue, Amy takes a second to yell at you to go touch grass.</description>
      <source url="https://blog.talosintelligence.com/unplug-your-way-to-better-code/">Cisco Talos</source>
      <guid isPermaLink="true">https://blog.talosintelligence.com/unplug-your-way-to-better-code/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>What Mozilla learned running an AI security bug hunting pipeline on Firefox</title>
      <link>https://www.helpnetsecurity.com/2026/05/07/mozilla-firefox-claude-ai-security-bug-hunting/</link>
      <description>Over the past several months, Mozilla ran an agentic harness powered by Claude Mythos Preview across Firefox’s source code, identifying 271 security bugs that were fixed in Firefox 150, with additional fixes shipped i...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/07/mozilla-firefox-claude-ai-security-bug-hunting/">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/07/mozilla-firefox-claude-ai-security-bug-hunting/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>$250 million cryptocurrency heist funded luxury fashion, nightclub parties, and private jets</title>
      <link>https://www.helpnetsecurity.com/2026/05/07/crypto-theft-home-burglary-scheme/</link>
      <description>20-year-old California resident Marlon Ferro, known online as “GothFerrari,” was sentenced to 78 months in prison for his role in a cryptocurrency theft operation tied to more than $250 million in stolen digital asset...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/07/crypto-theft-home-burglary-scheme/">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/07/crypto-theft-home-burglary-scheme/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Vendor Says Daemon Tools Supply Chain Attack Contained</title>
      <link>https://www.securityweek.com/vendor-says-daemon-tools-supply-chain-attack-contained/</link>
      <description>The software developer has identified the impacted systems, removed potentially compromised files, and validated installation packages. The post Vendor Says Daemon Tools Supply Chain Attack Contained appeared first on...</description>
      <source url="https://www.securityweek.com/vendor-says-daemon-tools-supply-chain-attack-contained/">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/vendor-says-daemon-tools-supply-chain-attack-contained/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Supply Chain</category>
    </item>
    <item>
      <title>One keypress is all it takes to compromise four AI coding tools</title>
      <link>https://www.helpnetsecurity.com/2026/05/07/trustfall-ai-coding-cli-vulnerability-research/</link>
      <description>Developers clone unfamiliar repositories all the time. Open-source projects, work from teammates, sample code from a tutorial, a library someone recommended on a forum. The convention is old and reasonable: you look a...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/07/trustfall-ai-coding-cli-vulnerability-research/">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/07/trustfall-ai-coding-cli-vulnerability-research/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Node.js 26 ships with Temporal API enabled by default</title>
      <link>https://www.helpnetsecurity.com/2026/05/07/node-js-26-released/</link>
      <description>Developers managing JavaScript runtimes have a new major version to evaluate. Node.js 26.0.0 brings the long-awaited Temporal API to the platform alongside an updated V8 engine, a refreshed HTTP client, and several lo...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/07/node-js-26-released/">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/07/node-js-26-released/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Facial recognition arrives at the gates of Disney’s magic kingdom</title>
      <link>https://www.helpnetsecurity.com/2026/05/07/disney-facial-recognition-entrance-lanes/</link>
      <description>Disney has equipped select entrance lanes at Disneyland Park and Disney California Adventure Park with facial recognition technology, saying the system is intended to streamline re-entry procedures and help prevent fr...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/07/disney-facial-recognition-entrance-lanes/">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/07/disney-facial-recognition-entrance-lanes/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Kloudfuse 4.0 delivers AI-governed observability and scalable workload isolation</title>
      <link>https://www.helpnetsecurity.com/2026/05/07/kloudfuse-4-0-observability-platform/</link>
      <description>Kloudfuse has announced the general availability of Kloudfuse 4.0. The release helps enterprises meet rising compliance requirements, adopt AI-driven observability with production-grade governance, and scale their obs...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/07/kloudfuse-4-0-observability-platform/">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/07/kloudfuse-4-0-observability-platform/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Red Hat Enterprise Linux adds post-quantum security and AI-driven automation in latest releases</title>
      <link>https://www.helpnetsecurity.com/2026/05/07/red-hat-enterprise-linux-10-2-and-9-8/</link>
      <description>Red Hat has announced the upcoming general availability of Red Hat Enterprise Linux 10.2 and 9.8. Building on the innovation of Red Hat Enterprise Linux 10, the latest versions help address security threats, speed AI...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/07/red-hat-enterprise-linux-10-2-and-9-8/">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/07/red-hat-enterprise-linux-10-2-and-9-8/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>AWS achieves SNI 27017, SNI 27018, and SNI 9001 certifications for the AWS Asia Pacific (Jakarta) Region</title>
      <link>https://aws.amazon.com/blogs/security/aws-achieves-sni-27017-sni-27018-and-sni-9001-certifications-for-the-aws-asia-pacific-jakarta-region/</link>
      <description>Amazon Web Services (AWS) achieved three Standar Nasional Indonesia (SNI) certifications for the AWS Asia Pacific (Jakarta) Region: SNI ISO/IEC 27017:2015, SNI ISO/IEC 27018:2019, and SNI ISO 9001:2015. SNI represents...</description>
      <source url="https://aws.amazon.com/blogs/security/aws-achieves-sni-27017-sni-27018-and-sni-9001-certifications-for-the-aws-asia-pacific-jakarta-region/">AWS Security Blog</source>
      <guid isPermaLink="true">https://aws.amazon.com/blogs/security/aws-achieves-sni-27017-sni-27018-and-sni-9001-certifications-for-the-aws-asia-pacific-jakarta-region/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>AWS</category>
    </item>
    <item>
      <title>Boost Security Raises $4 Million for SDLC Defense Platform</title>
      <link>https://www.securityweek.com/boost-security-raises-4-million-for-sdlc-defense-platform/</link>
      <description>The company is expanding its platform’s capabilities with the acquisition of SecureIQx and Korbit.ai. The post Boost Security Raises $4 Million for SDLC Defense Platform appeared first on SecurityWeek .</description>
      <source url="https://www.securityweek.com/boost-security-raises-4-million-for-sdlc-defense-platform/">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/boost-security-raises-4-million-for-sdlc-defense-platform/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Legacy Security Tools Are Failing Data Protection, Capital One Software Report Finds</title>
      <link>https://www.infosecurity-magazine.com/news/legacy-security-tools-are-failing/</link>
      <description>Traditional network security tools are undermining data protection, with Forrester and Capital One Software research warning AI adoption is impossible without rethinking data security</description>
      <source url="https://www.infosecurity-magazine.com/news/legacy-security-tools-are-failing/">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/legacy-security-tools-are-failing/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Claude Code OAuth Tokens Can Be Stolen Through Stealthy MCP Hijacking</title>
      <link>https://www.securityweek.com/claude-code-oauth-tokens-can-be-stolen-through-stealthy-mcp-hijacking/</link>
      <description>Mitiga researchers say attackers can silently redirect Claude Code MCP traffic, intercept OAuth tokens, and maintain persistent access to connected SaaS platforms. The post Claude Code OAuth Tokens Can Be Stolen Throu...</description>
      <source url="https://www.securityweek.com/claude-code-oauth-tokens-can-be-stolen-through-stealthy-mcp-hijacking/">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/claude-code-oauth-tokens-can-be-stolen-through-stealthy-mcp-hijacking/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Cline Kanban Flaw Lets Websites Hijack AI Coding Agents</title>
      <link>https://www.infosecurity-magazine.com/news/cline-kanban-websocket-hijack-ai/</link>
      <description>Oasis Security finds critical Cline kanban WebSocket flaw exposing AI coding agents to hijack</description>
      <source url="https://www.infosecurity-magazine.com/news/cline-kanban-websocket-hijack-ai/">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/cline-kanban-websocket-hijack-ai/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Chrome 148 Rolls Out With 127 Security Fixes</title>
      <link>https://www.securityweek.com/chrome-148-rolls-out-with-127-security-fixes/</link>
      <description>The fresh browser update resolves critical-severity integer overflow and use-after-free vulnerabilities. The post Chrome 148 Rolls Out With 127 Security Fixes appeared first on SecurityWeek .</description>
      <source url="https://www.securityweek.com/chrome-148-rolls-out-with-127-security-fixes/">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/chrome-148-rolls-out-with-127-security-fixes/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>The Browser Is Breaking Your DLP: How Data Slips Past Modern Controls</title>
      <link>https://www.bleepingcomputer.com/news/security/the-browser-is-breaking-your-dlp-how-data-slips-past-modern-controls</link>
      <description>Your security controls aren't failing, they're missing where most of today's work actually happens. Keep Aware shows how browser activity like copy/paste and AI prompts bypass traditional protections. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/the-browser-is-breaking-your-dlp-how-data-slips-past-modern-controls">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/the-browser-is-breaking-your-dlp-how-data-slips-past-modern-controls</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>One Click, Total Shutdown: The "Patient Zero" Webinar on Killing Stealth Breaches</title>
      <link>https://thehackernews.com/2026/05/one-click-total-shutdown-patient-zero.html</link>
      <description>The hardest part of cybersecurity isn't the technology, it’s the people. Every major breach you’ve read about lately usually starts the same way: one employee, one clever email, and one "Patient Zero" infection. In 20...</description>
      <source url="https://thehackernews.com/2026/05/one-click-total-shutdown-patient-zero.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/05/one-click-total-shutdown-patient-zero.html</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Breach</category>
    </item>
    <item>
      <title>OpenAI and Anthropic LLMs Used in Critical Infrastructure Cyber-Attack, Warns Dragos</title>
      <link>https://www.infosecurity-magazine.com/news/llm-critical-infrastructure/</link>
      <description>Commercial AI models were used to help plan and conduct cyber-attack against operational technology of a water and drainage facility, say researchers</description>
      <source url="https://www.infosecurity-magazine.com/news/llm-critical-infrastructure/">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/llm-critical-infrastructure/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Attackers Could Exploit AI Vision Models Using Imperceptible Image Changes</title>
      <link>https://www.securityweek.com/attackers-could-exploit-ai-vision-models-using-imperceptible-image-changes/</link>
      <description>Cisco’s AI security researchers have analyzed ways to target vision-language models (VLMs) using pixel-level perturbation. The post Attackers Could Exploit AI Vision Models Using Imperceptible Image Changes appeared f...</description>
      <source url="https://www.securityweek.com/attackers-could-exploit-ai-vision-models-using-imperceptible-image-changes/">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/attackers-could-exploit-ai-vision-models-using-imperceptible-image-changes/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Vulnerability</category>
      <category>AI</category>
    </item>
    <item>
      <title>Why Security in 2026 Requires Continuous Threat and Exposure Management (CTEM) at Scale</title>
      <link>https://www.rapid7.com/blog/post/em-2026-cybersecurity-requires-ctem-at-scale/</link>
      <description>Let's be honest, the patching window just shrank to something no practitioner or organization can keep up with. Organizations now need to operate in an environment that must assume breach, which means fundamentals lik...</description>
      <source url="https://www.rapid7.com/blog/post/em-2026-cybersecurity-requires-ctem-at-scale/">Rapid7 Blog</source>
      <guid isPermaLink="true">https://www.rapid7.com/blog/post/em-2026-cybersecurity-requires-ctem-at-scale/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Breach</category>
    </item>
    <item>
      <title>How Cloudflare responded to the “Copy Fail” Linux vulnerability</title>
      <link>https://blog.cloudflare.com/copy-fail-linux-vulnerability-mitigation/</link>
      <description>When a critical Linux kernel privilege escalation was publicly disclosed, Cloudflare's security and engineering teams detected, investigated, and mitigated the threat across our global fleet, confirming zero customer...</description>
      <source url="https://blog.cloudflare.com/copy-fail-linux-vulnerability-mitigation/">Cloudflare Blog</source>
      <guid isPermaLink="true">https://blog.cloudflare.com/copy-fail-linux-vulnerability-mitigation/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>AI Coding Agents Could Fuel Next Supply Chain Crisis</title>
      <link>https://www.securityweek.com/ai-coding-agents-could-fuel-next-supply-chain-crisis/</link>
      <description>“TrustFall” attack shows how AI coding agents can be manipulated into launching stealthy supply chain compromises. The post AI Coding Agents Could Fuel Next Supply Chain Crisis appeared first on SecurityWeek .</description>
      <source url="https://www.securityweek.com/ai-coding-agents-could-fuel-next-supply-chain-crisis/">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/ai-coding-agents-could-fuel-next-supply-chain-crisis/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Supply Chain</category>
      <category>AI</category>
    </item>
    <item>
      <title>World's First AI-Driven Cyberattack Couldn't Breach OT Systems</title>
      <link>https://www.darkreading.com/ics-ot-security/worlds-first-ai-driven-cyberattack-couldnt-breach-ot-systems</link>
      <description>The most sophisticated AI-integrated campaign to date hit a brick wall in the form of a SCADA login screen.</description>
      <source url="https://www.darkreading.com/ics-ot-security/worlds-first-ai-driven-cyberattack-couldnt-breach-ot-systems">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/ics-ot-security/worlds-first-ai-driven-cyberattack-couldnt-breach-ot-systems</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Breach</category>
      <category>AI</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Webinar: Why modern attacks require both security and recovery</title>
      <link>https://www.bleepingcomputer.com/news/security/webinar-why-modern-attacks-require-both-security-and-recovery</link>
      <description>Modern attacks don't stop at initial compromise. This webinar explores why security and recovery must work together to reduce downtime and improve resilience. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/webinar-why-modern-attacks-require-both-security-and-recovery">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/webinar-why-modern-attacks-require-both-security-and-recovery</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Webinar Today: Securing Identity Across Humans, Machines and AI</title>
      <link>https://www.securityweek.com/webinar-today-securing-identity-across-humans-machines-and-ai/</link>
      <description>From service accounts to AI-driven processes, identity is evolving faster than most security programs can adapt. Discover strategies for reducing risk and regaining control. The post Webinar Today: Securing Identity A...</description>
      <source url="https://www.securityweek.com/webinar-today-securing-identity-across-humans-machines-and-ai/">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/webinar-today-securing-identity-across-humans-machines-and-ai/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Identity</category>
      <category>AI</category>
    </item>
    <item>
      <title>ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories</title>
      <link>https://thehackernews.com/2026/05/threatsday-bulletin-edge-plaintext.html</link>
      <description>Bad week. Turns out the easiest way to get hacked in 2026 is still the same old garbage: shady packages, fake apps, forgotten DNS junk, scam ads, and stolen logins getting dumped into Discord channels like it’s normal...</description>
      <source url="https://thehackernews.com/2026/05/threatsday-bulletin-edge-plaintext.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/05/threatsday-bulletin-edge-plaintext.html</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Scam</category>
    </item>
    <item>
      <title>Day Zero Readiness: The Operational Gaps That Break Incident Response</title>
      <link>https://thehackernews.com/2026/05/day-zero-readiness-operational-gaps.html</link>
      <description>Having an incident response retainer, or even a pre-approved external incident response firm, is not the same as being ready for an incident. A retainer means someone will answer the phone. Operational readiness deter...</description>
      <source url="https://thehackernews.com/2026/05/day-zero-readiness-operational-gaps.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/05/day-zero-readiness-operational-gaps.html</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>From Android TVs to routers: the xlabs_v1 Mirai-based botnet built for DDoS attacks</title>
      <link>https://securityaffairs.com/191796/malware/from-android-tvs-to-routers-the-xlabs_v1-mirai-based-botnet-built-for-ddos-attacks.html</link>
      <description>A new Mirai‑based botnet, xlabs_v1, hijacks ADB‑exposed IoT devices for powerful DDoS attacks, with 21 flooding methods and DDoS‑for‑hire use. A new Mirai‑derived botnet called xlabs_v1 is hijacking internet‑exposed d...</description>
      <source url="https://securityaffairs.com/191796/malware/from-android-tvs-to-routers-the-xlabs_v1-mirai-based-botnet-built-for-ddos-attacks.html">Security Affairs</source>
      <guid isPermaLink="true">https://securityaffairs.com/191796/malware/from-android-tvs-to-routers-the-xlabs_v1-mirai-based-botnet-built-for-ddos-attacks.html</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Breach</category>
    </item>
    <item>
      <title>Daemon Tools Developer Confirms Software Was Trojanized</title>
      <link>https://www.infosecurity-magazine.com/news/daemon-tools-confirms-software/</link>
      <description>A China-linked threat actor backdoored a version of Daemon Tools to infect thousands</description>
      <source url="https://www.infosecurity-magazine.com/news/daemon-tools-confirms-software/">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/daemon-tools-confirms-software/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Threat Research</category>
    </item>
    <item>
      <title>PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux</title>
      <link>https://thehackernews.com/2026/05/pypi-packages-deliver-zichatbot-malware.html</link>
      <description>Cybersecurity researchers have discovered three packages on the Python Package Index (PyPI) repository that are designed to stealthily deliver a previously unknown malware family called ZiChatBot on Windows and Linux...</description>
      <source url="https://thehackernews.com/2026/05/pypi-packages-deliver-zichatbot-malware.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/05/pypi-packages-deliver-zichatbot-malware.html</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Researchers Spot Uptick in Use of Vercel for Phishing Campaigns</title>
      <link>https://www.infosecurity-magazine.com/news/researchers-spot-uptick-vercel/</link>
      <description>Cofense has warned of a “significant” increase in phishing campaigns abusing Vercel platform</description>
      <source url="https://www.infosecurity-magazine.com/news/researchers-spot-uptick-vercel/">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/researchers-spot-uptick-vercel/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Phishing</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Claude AI Guided Hackers Toward OT Assets During Water Utility Intrusion</title>
      <link>https://www.securityweek.com/claude-ai-guided-hackers-toward-ot-assets-during-water-utility-intrusion/</link>
      <description>Dragos has published a report describing how threat actors used Claude AI in an attack on a water and drainage utility in Mexico. The post Claude AI Guided Hackers Toward OT Assets During Water Utility Intrusion appea...</description>
      <source url="https://www.securityweek.com/claude-ai-guided-hackers-toward-ot-assets-during-water-utility-intrusion/">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/claude-ai-guided-hackers-toward-ot-assets-during-water-utility-intrusion/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Open-source MCP server monitoring for Python apps</title>
      <link>https://www.helpnetsecurity.com/2026/05/07/bluerock-mcp-python-hooks-mcp-server-monitoring/</link>
      <description>Pythonic Model Context Protocol servers handle tool calls, session events, module imports, and subprocess activity. BlueRock has released MCP Python Hooks, an open source runtime sensor that gives developers a way to...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/07/bluerock-mcp-python-hooks-mcp-server-monitoring/">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/07/bluerock-mcp-python-hooks-mcp-server-monitoring/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Multi-model AI is creating a routing headache for enterprises</title>
      <link>https://www.helpnetsecurity.com/2026/05/07/f5-ai-inference-operations-report/</link>
      <description>Application teams are moving AI inference into production systems that support business operations. Enterprises are expanding traffic management, identity controls, observability, and routing systems for multiple AI m...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/07/f5-ai-inference-operations-report/">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/07/f5-ai-inference-operations-report/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Identity</category>
      <category>AI</category>
    </item>
    <item>
      <title>An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary], (Wed, May 6th)</title>
      <link>https://isc.sans.edu/diary/rss/32962</link>
      <description>[This is a Guest Diary by Eric Roldan, an ISC intern as part of the SANS.edu BACS program]</description>
      <source url="https://isc.sans.edu/diary/rss/32962">SANS ISC</source>
      <guid isPermaLink="true">https://isc.sans.edu/diary/rss/32962</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Critical Buffer Overflow in Palo Alto Networks PAN-OS User-ID Authentication Portal (CVE-2026-0300)</title>
      <link>https://www.rapid7.com/blog/post/etr-critical-buffer-overflow-in-palo-alto-networks-pan-os-user-id-authentication-portal-cve-2026-0300</link>
      <description>Overview On May 6, 2026, Palo Alto Networks published a security advisory for CVE-2026-0300 , a critical unauthenticated buffer overflow vulnerability affecting PAN-OS PA-Series and VM-Series firewall appliances. Pris...</description>
      <source url="https://www.rapid7.com/blog/post/etr-critical-buffer-overflow-in-palo-alto-networks-pan-os-user-id-authentication-portal-cve-2026-0300">Rapid7 Blog</source>
      <guid isPermaLink="true">https://www.rapid7.com/blog/post/etr-critical-buffer-overflow-in-palo-alto-networks-pan-os-user-id-authentication-portal-cve-2026-0300</guid>
      <pubDate>Wed, 06 May 2026 13:27:31 +0000</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack</title>
      <link>https://thehackernews.com/2026/05/muddywater-uses-microsoft-teams-to.html</link>
      <description>The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and Static Kitten) has been attributed to a ransomware attack in what has been described as a "false flag" operation. The a...</description>
      <source url="https://thehackernews.com/2026/05/muddywater-uses-microsoft-teams-to.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/05/muddywater-uses-microsoft-teams-to.html</guid>
      <pubDate>Wed, 06 May 2026 18:30:00 +0530</pubDate>
      <category>Azure</category>
      <category>Ransomware</category>
      <category>Scam</category>
    </item>
    <item>
      <title>Iran-Linked APT Posed as Chaos Ransomware Member in Espionage Campaign</title>
      <link>https://www.infosecurity-magazine.com/news/iran-linked-apt-chaos-ransomware</link>
      <description>Rapid7 reveals an Iranian false flag operation masquerading as a Chaos ransomware attack</description>
      <source url="https://www.infosecurity-magazine.com/news/iran-linked-apt-chaos-ransomware">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/iran-linked-apt-chaos-ransomware</guid>
      <pubDate>Wed, 06 May 2026 13:00:00 +0000</pubDate>
      <category>Ransomware</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Attacks Abuse Windows Phone Link to Steal Texts &amp;amp; Bypass 2FA</title>
      <link>https://www.darkreading.com/cyberattacks-data-breaches/attacks-abuse-windows-phone-link-texts-bypass-2fa</link>
      <description>In hard-to-detect attacks, hackers are dropping the CloudZ RAT and a fresh plug-in, Pheno, to hijack the Windows-based bridge between PCs and smartphones.</description>
      <source url="https://www.darkreading.com/cyberattacks-data-breaches/attacks-abuse-windows-phone-link-texts-bypass-2fa">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/cyberattacks-data-breaches/attacks-abuse-windows-phone-link-texts-bypass-2fa</guid>
      <pubDate>Wed, 06 May 2026 10:30:27 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Insights into the clustering and reuse of phone numbers in scam emails</title>
      <link>https://blog.talosintelligence.com/insights-into-the-clustering-and-reuse-of-phone-numbers-in-scam-emails/</link>
      <description>Talos has recently started to collect and gather intelligence around phone numbers within emails as an additional indicator of compromise (IOC). In this blog, we discuss new insights into in-the-wild phone number reus...</description>
      <source url="https://blog.talosintelligence.com/insights-into-the-clustering-and-reuse-of-phone-numbers-in-scam-emails/">Cisco Talos</source>
      <guid isPermaLink="true">https://blog.talosintelligence.com/insights-into-the-clustering-and-reuse-of-phone-numbers-in-scam-emails/</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Scam</category>
    </item>
    <item>
      <title>One in Eight Workers Has Sold Their Corporate Logins</title>
      <link>https://www.infosecurity-magazine.com/news/one-eight-workers-sold-corporate/</link>
      <description>Cifas says that 13% of employees admit selling company credentials to a former colleague</description>
      <source url="https://www.infosecurity-magazine.com/news/one-eight-workers-sold-corporate/">Infosecurity Magazine</source>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/one-eight-workers-sold-corporate/</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Scam</category>
    </item>
    <item>
      <title>Middle East Cyber Battle Field Broadens — Especially in UAE</title>
      <link>https://www.darkreading.com/cyberattacks-data-breaches/middle-east-cyber-battle-field-broadens-uae</link>
      <description>As the war with Iran continues, breach attempts targeting the United Arab Emirates tripled in a few weeks — many targeting critical infrastructure.</description>
      <source url="https://www.darkreading.com/cyberattacks-data-breaches/middle-east-cyber-battle-field-broadens-uae">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/cyberattacks-data-breaches/middle-east-cyber-battle-field-broadens-uae</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Breach</category>
    </item>
    <item>
      <title>India orders infosec red alert in case Mythos sparks crime spree</title>
      <link>https://www.theregister.com/security/2026/05/06/india-orders-infosec-red-alert-in-case-mythos-sparks-crime/5224961</link>
      <description>Securities regulator urges market players to develop new strategies and nail cyber-basics before AI models fuel mass attacks</description>
      <source url="https://www.theregister.com/security/2026/05/06/india-orders-infosec-red-alert-in-case-mythos-sparks-crime/5224961">The Register - Security</source>
      <guid isPermaLink="true">https://www.theregister.com/security/2026/05/06/india-orders-infosec-red-alert-in-case-mythos-sparks-crime/5224961</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Muddying the Tracks: The State-Sponsored Shadow Behind Chaos Ransomware</title>
      <link>https://www.rapid7.com/blog/post/tr-muddying-tracks-state-sponsored-shadow-behind-chaos-ransomware/</link>
      <description>Executive summary In early 2026, a sophisticated intrusion initially appearing to be a standard Chaos ransomware attack was assessed to be consistent with a targeted state-sponsored operation. While the threat actor o...</description>
      <source url="https://www.rapid7.com/blog/post/tr-muddying-tracks-state-sponsored-shadow-behind-chaos-ransomware/">Rapid7 Blog</source>
      <guid isPermaLink="true">https://www.rapid7.com/blog/post/tr-muddying-tracks-state-sponsored-shadow-behind-chaos-ransomware/</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Ransomware</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>CrowdStrike Named a Leader in the First-Ever Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies</title>
      <link>https://www.crowdstrike.com/en-us/blog/crowdstrike-named-leader-gartner-magic-quadrant-cyberthreat-intelligence/</link>
      <description />
      <source url="https://www.crowdstrike.com/en-us/blog/crowdstrike-named-leader-gartner-magic-quadrant-cyberthreat-intelligence/">CrowdStrike Blog</source>
      <guid isPermaLink="true">https://www.crowdstrike.com/en-us/blog/crowdstrike-named-leader-gartner-magic-quadrant-cyberthreat-intelligence/</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Teams calls are about to get a lot harder to fake</title>
      <link>https://www.helpnetsecurity.com/2026/05/07/microsoft-teams-calling-brand-impersonation-protection/</link>
      <description>Microsoft Teams Calling is getting a new feature that will warn users about suspicious inbound VoIP calls from first-time external callers who might be impersonating trusted brands. The post Teams calls are about to g...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/07/microsoft-teams-calling-brand-impersonation-protection/">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/07/microsoft-teams-calling-brand-impersonation-protection/</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Azure</category>
    </item>
    <item>
      <title>Sysdig delivers cloud security that runs inside AI coding agents</title>
      <link>https://www.helpnetsecurity.com/2026/05/06/sysdig-headless-cloud-security-platform/</link>
      <description>Sysdig announced headless cloud security, a cyberdefense platform designed for the agentic AI era. Sysdig Headless Cloud Security enables customers to drop the traditional, one-size-fits-all UI approach and equip thei...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/06/sysdig-headless-cloud-security-platform/">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/06/sysdig-headless-cloud-security-platform/</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>Taiwan High-Speed Rail Emergency Braking Hack: How a Student Stopped the Trains and Exposed a Major Security Gap</title>
      <link>https://securityaffairs.com/191785/hacking/taiwan-high-speed-rail-emergency-braking-hack-how-a-student-stopped-the-trains-and-exposed-a-major-security-gap.html</link>
      <description>Taiwan high‑speed rail was disrupted after a 23‑year‑old student spoofed signals and triggered an emergency alarm, stopping four trains for nearly an hour. Taiwan high‑speed rail system, one of the most important piec...</description>
      <source url="https://securityaffairs.com/191785/hacking/taiwan-high-speed-rail-emergency-braking-hack-how-a-student-stopped-the-trains-and-exposed-a-major-security-gap.html">Security Affairs</source>
      <guid isPermaLink="true">https://securityaffairs.com/191785/hacking/taiwan-high-speed-rail-emergency-braking-hack-how-a-student-stopped-the-trains-and-exposed-a-major-security-gap.html</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Breach</category>
    </item>
    <item>
      <title>Hackers abuse Google ads for GoDaddy ManageWP login phishing</title>
      <link>https://www.bleepingcomputer.com/news/security/hackers-abuse-google-ads-for-godaddy-managewp-login-phishing</link>
      <description>A phishing campaign delivered through Google sponsored search results is targeting credentials for ManageWP, GoDaddy's platform for managing fleets of WordPress websites. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/hackers-abuse-google-ads-for-godaddy-managewp-login-phishing">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/hackers-abuse-google-ads-for-godaddy-managewp-login-phishing</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Phishing</category>
      <category>Scam</category>
      <category>Threat Research</category>
    </item>
    <item>
      <title>Yet Another Way to Bypass Google Chrome's Encryption Protection</title>
      <link>https://www.darkreading.com/endpoint-security/yet-another-way-bypass-google-chromes-encryption-protection</link>
      <description>Authors of the VoidStealer Trojan uncovered a way to get around Google's App-Bound Encryption (ABE), opening the door to infostealers.</description>
      <source url="https://www.darkreading.com/endpoint-security/yet-another-way-bypass-google-chromes-encryption-protection">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/endpoint-security/yet-another-way-bypass-google-chromes-encryption-protection</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Instructure Breach Exposes Schools' Vendor Dependence</title>
      <link>https://www.darkreading.com/cyberattacks-data-breaches/instructure-breach-exposes-schools-vendor-dependence</link>
      <description>ShinyHunters' attack on Instructure, which owns the widely used Canvas learning management system (LMS), carries big questions about the trust educational institutions put into their vendors.</description>
      <source url="https://www.darkreading.com/cyberattacks-data-breaches/instructure-breach-exposes-schools-vendor-dependence">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/cyberattacks-data-breaches/instructure-breach-exposes-schools-vendor-dependence</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Breach</category>
    </item>
    <item>
      <title>New compliance guide available: ISO/IEC 42001:2023 on AWS</title>
      <link>https://aws.amazon.com/blogs/security/new-compliance-guide-available-iso-iec-420012023-on-aws/</link>
      <description>We have released our latest compliance guide, ISO/IEC 42001:2023 on AWS, which provides practical guidance for organizations designing and operating an Artificial Intelligence Management System (AIMS) using AWS servic...</description>
      <source url="https://aws.amazon.com/blogs/security/new-compliance-guide-available-iso-iec-420012023-on-aws/">AWS Security Blog</source>
      <guid isPermaLink="true">https://aws.amazon.com/blogs/security/new-compliance-guide-available-iso-iec-420012023-on-aws/</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>AWS</category>
    </item>
    <item>
      <title>Critical vm2 sandbox bug lets attackers execute code on hosts</title>
      <link>https://www.bleepingcomputer.com/news/security/critical-vm2-sandbox-bug-lets-attackers-execute-code-on-hosts</link>
      <description>A critical vulnerability in the popular Node.js sandboxing library vm2 allows escaping the sandbox and executing arbitrary code on the host system. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/critical-vm2-sandbox-bug-lets-attackers-execute-code-on-hosts">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/critical-vm2-sandbox-bug-lets-attackers-execute-code-on-hosts</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>Arctic Wolf kicks 250 employees out of the pack to save money for AI</title>
      <link>https://www.theregister.com/ai-and-ml/2026/05/06/arctic-wolf-cuts-250-jobs-in-ai-push/5231213</link>
      <description>Cuts appear to hit sales, product, and marketing, accounting for under 10% of staff</description>
      <source url="https://www.theregister.com/ai-and-ml/2026/05/06/arctic-wolf-cuts-250-jobs-in-ai-push/5231213">The Register - Security</source>
      <guid isPermaLink="true">https://www.theregister.com/ai-and-ml/2026/05/06/arctic-wolf-cuts-250-jobs-in-ai-push/5231213</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>AI</category>
    </item>
    <item>
      <title>New Cisco DoS flaw requires manual reboot to revive devices</title>
      <link>https://www.bleepingcomputer.com/news/security/new-cisco-dos-flaw-requires-manual-reboot-to-revive-devices</link>
      <description>Cisco patched a Crosswork Network Controller and Network Services Orchestrator denial-of-service vulnerability that requires manually rebooting targeted systems for recovery. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/new-cisco-dos-flaw-requires-manual-reboot-to-revive-devices">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/new-cisco-dos-flaw-requires-manual-reboot-to-revive-devices</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title>1 in 8 employees totally cool with selling work credentials</title>
      <link>https://www.theregister.com/security/2026/05/06/1-in-8-workers-say-selling-company-logins-is-justifiable/5231104</link>
      <description>13% say they’ve sold logins or know someone who has, survey suggests</description>
      <source url="https://www.theregister.com/security/2026/05/06/1-in-8-workers-say-selling-company-logins-is-justifiable/5231104">The Register - Security</source>
      <guid isPermaLink="true">https://www.theregister.com/security/2026/05/06/1-in-8-workers-say-selling-company-logins-is-justifiable/5231104</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Scam</category>
    </item>
    <item>
      <title>DAEMON Tools devs confirm breach, release malware-free version</title>
      <link>https://www.bleepingcomputer.com/news/security/daemon-tools-devs-confirm-breach-release-malware-free-version</link>
      <description>Disc Soft Limited, the maker of DAEMON Tools Lite, confirmed that the software had been trojanized in a supply chain attack and released a new, malware-free version. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/daemon-tools-devs-confirm-breach-release-malware-free-version">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/daemon-tools-devs-confirm-breach-release-malware-free-version</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Breach</category>
      <category>Supply Chain</category>
    </item>
    <item>
      <title>The Jenkins Threat Landscape</title>
      <link>https://www.wiz.io/blog/jenkins-threat-risk-insights</link>
      <description>What usage patterns, plugin adoption, and configuration choices reveal about the Jenkins attack surface.</description>
      <source url="https://www.wiz.io/blog/jenkins-threat-risk-insights">Wiz Blog</source>
      <guid isPermaLink="true">https://www.wiz.io/blog/jenkins-threat-risk-insights</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Why ransomware attacks succeed even when backups exist</title>
      <link>https://www.bleepingcomputer.com/news/security/why-ransomware-attacks-succeed-even-when-backups-exist</link>
      <description>Backups don't fail because they're missing, they fail because attackers destroy them first. Acronis explains how ransomware targets backup systems before encryption, leaving no path to recovery. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/why-ransomware-attacks-succeed-even-when-backups-exist">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/why-ransomware-attacks-succeed-even-when-backups-exist</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Ransomware</category>
    </item>
    <item>
      <title>LABScon25 Replay | Please Connect to the Foreign Entity to Enhance Your User Experience</title>
      <link>https://www.sentinelone.com/labs/labscon25-replay-please-connect-to-the-foreign-entity-to-enhance-your-user-experience/</link>
      <description>Joe FitzPatrick reveals how consumer imports of networked devices pose a real security risk to small businesses and critical infrastructure alike.</description>
      <source url="https://www.sentinelone.com/labs/labscon25-replay-please-connect-to-the-foreign-entity-to-enhance-your-user-experience/">SentinelLabs</source>
      <guid isPermaLink="true">https://www.sentinelone.com/labs/labscon25-replay-please-connect-to-the-foreign-entity-to-enhance-your-user-experience/</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Webinar: Why network incidents escalate and how to fix response gaps</title>
      <link>https://www.bleepingcomputer.com/news/security/webinar-why-network-incidents-escalate-and-how-to-fix-response-gaps</link>
      <description>Most network incidents don't escalate due to a lack of alerts; they escalate when response breaks down. This webinar explores how to fix gaps in triage, enrichment, and coordination. [...]</description>
      <source url="https://www.bleepingcomputer.com/news/security/webinar-why-network-incidents-escalate-and-how-to-fix-response-gaps">BleepingComputer</source>
      <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/webinar-why-network-incidents-escalate-and-how-to-fix-response-gaps</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>The Hacker News Launches 'Cybersecurity Stars Awards 2026' — Submissions Now Open</title>
      <link>https://thehackernews.com/2026/05/the-hacker-news-launches-cybersecurity.html</link>
      <description>For nearly 20 years, we at The Hacker News have mostly told scary stories about cyberspace — big hacks, broken systems, and new threats. But behind every headline, there’s a quieter, better story. It’s the story of le...</description>
      <source url="https://thehackernews.com/2026/05/the-hacker-news-launches-cybersecurity.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/05/the-hacker-news-launches-cybersecurity.html</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>From Stuxnet to ChatGPT: 20 News Events That Shaped Cyber</title>
      <link>https://www.darkreading.com/threat-intelligence/stuxnet-chatgpt-20-news-events-cyber</link>
      <description>As part of its 20th anniversary celebration, Dark Reading looks back on 20 of the biggest newsmaking events from the past two decades that influenced the risk landscape for today's cybersecurity teams.</description>
      <source url="https://www.darkreading.com/threat-intelligence/stuxnet-chatgpt-20-news-events-cyber">Dark Reading</source>
      <guid isPermaLink="true">https://www.darkreading.com/threat-intelligence/stuxnet-chatgpt-20-news-events-cyber</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Romanian Man Extradited to US for Role in Hacking Scheme 17 Years Ago</title>
      <link>https://www.securityweek.com/romanian-extradited-to-us-for-role-in-hacking-scheme-17-years-ago/</link>
      <description>Gavril Sandu, 53, was indicted in 2017, but was arrested and extradited to the United States only in 2026. The post Romanian Man Extradited to US for Role in Hacking Scheme 17 Years Ago appeared first on SecurityWeek .</description>
      <source url="https://www.securityweek.com/romanian-extradited-to-us-for-role-in-hacking-scheme-17-years-ago/">SecurityWeek</source>
      <guid isPermaLink="true">https://www.securityweek.com/romanian-extradited-to-us-for-role-in-hacking-scheme-17-years-ago/</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Your AI Agents Are Already Inside the Perimeter. Do You Know What They're Doing?</title>
      <link>https://thehackernews.com/2026/05/your-ai-agents-are-already-inside.html</link>
      <description>Analysts recently confirmed what identity security teams have quietly feared: AI agents are being deployed faster than enterprises can govern them. In their inaugural Market Guide for Guardian Agents, Gartner states t...</description>
      <source url="https://thehackernews.com/2026/05/your-ai-agents-are-already-inside.html">The Hacker News</source>
      <guid isPermaLink="true">https://thehackernews.com/2026/05/your-ai-agents-are-already-inside.html</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Identity</category>
      <category>AI</category>
    </item>
    <item>
      <title>Intel 471 speeds threat hunting and remediation with Retroactive Threat Detections</title>
      <link>https://www.helpnetsecurity.com/2026/05/06/intel-471-retroactive-threat-detection/</link>
      <description>Intel 471 has announced Retroactive Threat Detections (RTD), a new capability within its Verity471 platform. RTD helps security teams quickly understand the impact of new threats on their environments. This transforms...</description>
      <source url="https://www.helpnetsecurity.com/2026/05/06/intel-471-retroactive-threat-detection/">Help Net Security</source>
      <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/06/intel-471-retroactive-threat-detection/</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
    <item>
      <title>Rowhammer Attack Against NVIDIA Chips</title>
      <link>https://www.schneier.com/blog/archives/2026/05/rowhammer-attack-against-nvidia-chips.html</link>
      <description>A new rowhammer attack gives complete control of NVIDIA CPUs. On Thursday, two research teams, working independently of each other, demonstrated attacks against two cards from Nvidia’s Ampere generation that take GPU...</description>
      <source url="https://www.schneier.com/blog/archives/2026/05/rowhammer-attack-against-nvidia-chips.html">Schneier on Security</source>
      <guid isPermaLink="true">https://www.schneier.com/blog/archives/2026/05/rowhammer-attack-against-nvidia-chips.html</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      <category>Cloud Security</category>
    </item>
  </channel>
</rss>