Latest Articles

RansomHouse says it breached Trellix and exposes internal systems
May 08, 2026
RansomHouse claimed responsibility for the Trellix breach, adding the security firm to its Tor data leak site and sharing screenshots of internal systems. The RansomHouse ransom... (Security Affairs)

Another Universal Linux Local Privilege Escalation (LPE) Vulnerability: Dirty Frag, (Fri, May 8th)
May 08, 2026
Less than two weeks after the public disclosure of the Copy Fail vulnerability (CVE-2026-31431), another local privilege escalation (LPE) vulnerability in the Linux kernel has b... (SANS ISC)

In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director Frontrunner
May 08, 2026
Other noteworthy stories that might have slipped under the radar: US gov targets 72-hour patch cycles, malware uses Windows Phone Link to steal OTPs, spy operation targets Euras... (SecurityWeek)

Zara Data Breach: 197,000 Customers Exposed in Third-Party Security Incident
May 08, 2026
Nearly 200,000 Zara customers were exposed in a third-party breach linked to ShinyHunters, revealing emails, purchase history, and support data. Personal data belonging to nearl... (Security Affairs)

CISA gives feds four days to patch Ivanti flaw exploited as zero-day
May 08, 2026
CISA has given U.S. federal agencies four days to secure their networks against a high-severity vulnerability in Ivanti Endpoint Manager Mobile (EPMM) exploited in zero-day atta... (BleepingComputer)

Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise
May 08, 2026
A previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) is targeting developers' systems to establish a silent foothold as well as facilitate a broad range of... (The Hacker News)

Australian Cyber Security Centre Issues Alert Over ClickFix Attacks
May 08, 2026
ACSC warns over a campaign targeting organizations which uses ClickFix to deliver Vidar infostealer malware (Infosecurity Magazine)

Friday Squid Blogging: Giant Squid Live in the Waters of Western Australia
May 08, 2026
Evidence of them has been found by analyzing DNA in the seawater. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covere... (Schneier on Security)

A Framework for AI Threat Readiness
May 08, 2026
AI models now find and exploit zero-days autonomously. This 4-pillar framework accelerates patching, analysis, and threat response. (Wiz Blog)

Metasploit Wrap-Up 05/08/2026
May 08, 2026
Spring cleanup This week’s Metasploit updates focused on foundational improvements and expanded target reach. Key enhancements were made to the recently released Copy Fail explo... (Rapid7 Blog)

Insider Betting on Polymarket
May 08, 2026
Insider trading is rife on Polymarket: Analysis by the Anti-Corruption Data Collective, a non-profit research and advocacy group, found that long-shot bets—defined as wagers of... (Schneier on Security)

Worm rubs out competitor's malware, then takes control
May 08, 2026
All your compromised credentials are belong to us now instead of the other gang (The Register - Security)

CISA Adds One Known Exploited Vulnerability to Catalog
May 08, 2026
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-42208 BerriAI LiteLLM SQL Injectio... (CISA Current Activity)

NVIDIA confirms GeForce NOW data breach affecting Armenian users
May 08, 2026
NVIDIA has confirmed in a statement for BleepingComputer that GeForce NOW user information has been exposed in a data breach. [...] (BleepingComputer)

Critical Apache HTTP Server HTTP/2 Vulnerability Could Enable Remote Code Execution
May 08, 2026
A high-severity vulnerability (CVE-2026-23918, CVSS 8.8) was disclosed affecting Apache HTTP Server, allowing attackers to potentially achieve remote code execution via speciall... (Orca Security Blog)

Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads
May 08, 2026
Cybersecurity researchers have discovered fraudulent apps on the official Google Play Store for Android that falsely claimed to offer access to call histories for any phone numb... (The Hacker News)

Why More Analysts Won’t Solve Your SOC’s Alert Problem
May 08, 2026
Attackers move faster than overwhelmed SOC teams can realistically investigate alerts. Prophet Security breaks down how AI can help analysts investigate alerts faster and focus... (BleepingComputer)

GCSI 2026: AI Readiness in a City Built in Layers
May 08, 2026
GCSI 2026 showed why cyber readiness depends on visibility into vendors, AI tools, identities, workflows, and hidden business dependencies. (GitGuardian Blog)

Trellix source code breach claimed by RansomHouse hackers
May 08, 2026
The attack on the Trellix source code repository disclosed last week has been claimed by the RansomHouse threat group, which leaked a small set of images as proof of the intrusi... (BleepingComputer)

Zero Chaos: Scaling Detection Engineering at the Speed of Software, with Detection As Code
May 08, 2026
Every engineering team in your organization ships code through a pipeline. They branch, test, review, and deploy. If something breaks, they roll back. If someone asks "what chan... (Rapid7 Blog)

See and Secure Everything at the Edge with Wiz and Akamai
May 08, 2026
Akamai edge configurations are now visible on the Wiz Security Graph, giving teams a single understanding of risk from edge to runtime (Wiz Blog)

Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants
May 08, 2026
The hackers gained the ability to modify equipment operational parameters, creating a direct risk to the public water supply. The post Polish Security Agency Reports ICS Breache... (SecurityWeek)

AI Firm Braintrust Prompts API Key Rotation After Data Breach
May 08, 2026
Hackers accessed one of the company’s AWS accounts and compromised AI provider secrets stored in Braintrust. The post AI Firm Braintrust Prompts API Key Rotation After Data Brea... (SecurityWeek)

Cyberattack Hits Canvas System Used by Thousands of Schools as Finals Loom
May 08, 2026
A system that thousands of schools and universities use went offline due to a cyberattack, creating chaos as students tried to study for finals. The post Cyberattack Hits Canvas... (SecurityWeek)

One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk
May 08, 2026
The dark secret of enterprise security operations is that defenders have quietly institutionalized the practice of not looking. This is not just anecdotal, but rather backed by... (The Hacker News)

Google is turning Android Studio into a policy watchdog
May 08, 2026
Google has expanded Play Policy Insights in Android Studio to help developers catch policy issues while coding, including warnings for common problems such as missing login cred... (Help Net Security)

Helping North Korean IT remote workers is becoming a fast track to prison
May 08, 2026
Two U.S. nationals were sentenced to 18 months in prison for operating “laptop farms” that helped North Korean IT workers gain employment at nearly 70 American companies, genera... (Help Net Security)

Former govt contractor convicted for wiping dozens of federal databases
May 08, 2026
A 34-year-old Virginia man was found guilty of conspiring to destroy dozens of government databases after getting fired from his job as a federal contractor. [...] (BleepingComputer)

‘PCPJack’ Worm Removes TeamPCP Infections, Steals Credentials
May 08, 2026
The malware framework targets web applications and cloud environments, including AWS, Docker, Kubernetes, and more. The post ‘PCPJack’ Worm Removes TeamPCP Infections, Steals Cr... (SecurityWeek)

Snyk integrates Claude to advance AI-native application security
May 08, 2026
Snyk has announced it is leveraging Anthropic’s Claude models to advance software security. Snyk has integrated Claude into the Snyk AI Security Platform, enabling automated vul... (Help Net Security)

Avantra’s new AI can diagnose SAP failures in seconds
May 08, 2026
Avantra launched Avantra 26, an advancement in AI-driven operations, strengthening native integration with SAP Cloud ALM, and delivering automated visibility across SAP Business... (Help Net Security)

Securonix launches AI threat research agent and ThreatWatch validation tool
May 08, 2026
Securonix announced the Securonix Threat Research Agent and ThreatWatch for ThreatQ, expanding how security teams research threats, validate exposure, and turn intelligence into... (Help Net Security)

OpenAI tunes GPT-5.5-Cyber for more permissive security workflows
May 08, 2026
OpenAI is rolling out GPT-5.5-Cyber, a variant of its latest AI model, in limited preview for verified cybersecurity professionals and organizations through its Trusted Access f... (Help Net Security)

AI, Cyberwarfare, and Autonomous Weapons: Inside America’s New Military Strategy
May 08, 2026
The Pentagon is integrating AI into military operations, transforming cybersecurity, targeting, and command systems into a unified warfare architecture. May 2026 marks a turning... (Security Affairs)

Transilience AI unveils Security Operating System for cloud remediation
May 08, 2026
Transilience AI has announced the general availability of its Full Stack Security Operating System for the cloud, platform designed to solve one of enterprise security’s most pe... (Help Net Security)

Object First Fleet Manager simplifies distributed backup storage
May 08, 2026
Object First released Object First Fleet Manager, a cloud-based service that simplifies the management of distributed Ootbi backup storage deployments for Veeam Software environ... (Help Net Security)

Vulnerability in Claude Extension for Chrome Exposes AI Agent to Takeover
May 08, 2026
Lax extension permissions and improper trust implementation allow attackers to inject prompts in the Claude Chrome extension. The post Vulnerability in Claude Extension for Chro... (SecurityWeek)

New infosec products of the week: May 8, 2026
May 08, 2026
Here’s a look at the most interesting products from the past week LastPass, Operant AI, Sysdig, and VIAVI. Operant AI Endpoint Protector secures AI agents and MCP tools Operant... (Help Net Security)

Canvas Breach Disrupts Schools & Colleges Nationwide
May 08, 2026
An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the... (KrebsOnSecurity)

ISC Stormcast For Friday, May 8th, 2026 https://isc.sans.edu/podcastdetail/9924, (Fri, May 8th)
May 08, 2026
(SANS ISC)

Detecting Web Server Probing & Fuzzing in Traefik with Automated Cloudflare Response
May 08, 2026
This article shows how a customized Elastic Security ES|QL detection rule can identify web server probing and fuzzing activity in Traefik logs and automatically block the attack... (Elastic Security Labs)

Kubernetes security fundamentals: Secrets
May 08, 2026
A look at how to secure Kubernetes secrets (Datadog Security Labs)

Cyber resiliency in practice: Lessons from recent supply chain attacks
May 08, 2026
Learn how modern cyber resiliency helps organizations prevent, detect, and recover from supply chain attacks like Trivy, Axios, and LiteLLM. (Chainguard Unchained)

New TCLBanker malware self-spreads over WhatsApp and Outlook
May 07, 2026
A new trojan named TCLBanker, which targets 59 banking, fintech, and cryptocurrency platforms, uses a trojanized MSI installer for Logitech AI Prompt Builder to infect systems.... (BleepingComputer)

Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access
May 07, 2026
Ivanti is warning that a new security flaw impacting Endpoint Manager Mobile (EPMM) has been explored in limited attacks in the wild. The high-severity vulnerability, CVE-2026-6... (The Hacker News)

Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State Hacking
May 07, 2026
The cybersecurity firm has not explicitly accused China of being behind the attack, but the evidence suggests it was. The post Palo Alto Zero-Day Exploited in Campaign Bearing H... (SecurityWeek)

Fake Claude AI Site Drops Beagle Backdoor on Windows Users
May 07, 2026
Sophos finds fake Claude site spreading DonutLoader and a new Beagle backdoor via DLL sideloading (Infosecurity Magazine)

Cisco patches high-severity flaws enabling SSRF, code execution attacks
May 07, 2026
Cisco fixed several high‑severity flaws in its enterprise products, including SSRF bugs in Unity Connection that could enable code execution or service disruption. Cisco release... (Security Affairs)

Rapid7 and OpenAI: Helping Defenders Move at Machine Speed
May 07, 2026
Wade Woolwine is Senior Director, Product Security at Rapid7. Announcing OpenAI's Trusted Access for Cyber program CIOs and CISOs are telling us the same thing in different ways... (Rapid7 Blog)

Building for the future
May 07, 2026
This afternoon, we sent the following email to our global team. One of our core values at Cloudflare is transparency, and we believe it's important that you hear this directly f... (Cloudflare Blog)

Anthropic response to 1-click pwn: Shouldn't have clicked 'ok'
May 07, 2026
Security biz Adversa AI argues users of AI tools need clearer warnings (The Register - Security)

Worries About AI’s Risks to Humanity Loom Over the Trial Pitting Musk Against OpenAI’s Leaders
May 07, 2026
Musk said that he could have founded OpenAI as a for-profit company, just like the other companies he started or took over. “I deliberately chose this,” he said, “for the public... (SecurityWeek)

ICYMI: April 2026 @AWS Security
May 07, 2026
Read all about the latest AWS security features, compliance updates, and hands-on resources in our new, monthly digest posts. You’ll find expert blog posts, new service capabili... (AWS Security Blog)

Unplug your way to better code
May 07, 2026
Cybersecurity concepts — logs, packets, DNS exfiltration, and more — are usually intangible, and its practitioners are prone to mental fatigue, Amy takes a second to yell at you... (Cisco Talos)

What Mozilla learned running an AI security bug hunting pipeline on Firefox
May 07, 2026
Over the past several months, Mozilla ran an agentic harness powered by Claude Mythos Preview across Firefox’s source code, identifying 271 security bugs that were fixed in Fire... (Help Net Security)

$250 million cryptocurrency heist funded luxury fashion, nightclub parties, and private jets
May 07, 2026
20-year-old California resident Marlon Ferro, known online as “GothFerrari,” was sentenced to 78 months in prison for his role in a cryptocurrency theft operation tied to more t... (Help Net Security)

Vendor Says Daemon Tools Supply Chain Attack Contained
May 07, 2026
The software developer has identified the impacted systems, removed potentially compromised files, and validated installation packages. The post Vendor Says Daemon Tools Supply... (SecurityWeek)

One keypress is all it takes to compromise four AI coding tools
May 07, 2026
Developers clone unfamiliar repositories all the time. Open-source projects, work from teammates, sample code from a tutorial, a library someone recommended on a forum. The conv... (Help Net Security)

Node.js 26 ships with Temporal API enabled by default
May 07, 2026
Developers managing JavaScript runtimes have a new major version to evaluate. Node.js 26.0.0 brings the long-awaited Temporal API to the platform alongside an updated V8 engine,... (Help Net Security)

Facial recognition arrives at the gates of Disney’s magic kingdom
May 07, 2026
Disney has equipped select entrance lanes at Disneyland Park and Disney California Adventure Park with facial recognition technology, saying the system is intended to streamline... (Help Net Security)

Kloudfuse 4.0 delivers AI-governed observability and scalable workload isolation
May 07, 2026
Kloudfuse has announced the general availability of Kloudfuse 4.0. The release helps enterprises meet rising compliance requirements, adopt AI-driven observability with producti... (Help Net Security)

Red Hat Enterprise Linux adds post-quantum security and AI-driven automation in latest releases
May 07, 2026
Red Hat has announced the upcoming general availability of Red Hat Enterprise Linux 10.2 and 9.8. Building on the innovation of Red Hat Enterprise Linux 10, the latest versions... (Help Net Security)

AWS achieves SNI 27017, SNI 27018, and SNI 9001 certifications for the AWS Asia Pacific (Jakarta) Region
May 07, 2026
Amazon Web Services (AWS) achieved three Standar Nasional Indonesia (SNI) certifications for the AWS Asia Pacific (Jakarta) Region: SNI ISO/IEC 27017:2015, SNI ISO/IEC 27018:201... (AWS Security Blog)

Boost Security Raises $4 Million for SDLC Defense Platform
May 07, 2026
The company is expanding its platform’s capabilities with the acquisition of SecureIQx and Korbit.ai. The post Boost Security Raises $4 Million for SDLC Defense Platform appeare... (SecurityWeek)

Legacy Security Tools Are Failing Data Protection, Capital One Software Report Finds
May 07, 2026
Traditional network security tools are undermining data protection, with Forrester and Capital One Software research warning AI adoption is impossible without rethinking data se... (Infosecurity Magazine)

Claude Code OAuth Tokens Can Be Stolen Through Stealthy MCP Hijacking
May 07, 2026
Mitiga researchers say attackers can silently redirect Claude Code MCP traffic, intercept OAuth tokens, and maintain persistent access to connected SaaS platforms. The post Clau... (SecurityWeek)

Cline Kanban Flaw Lets Websites Hijack AI Coding Agents
May 07, 2026
Oasis Security finds critical Cline kanban WebSocket flaw exposing AI coding agents to hijack (Infosecurity Magazine)

Chrome 148 Rolls Out With 127 Security Fixes
May 07, 2026
The fresh browser update resolves critical-severity integer overflow and use-after-free vulnerabilities. The post Chrome 148 Rolls Out With 127 Security Fixes appeared first on... (SecurityWeek)

The Browser Is Breaking Your DLP: How Data Slips Past Modern Controls
May 07, 2026
Your security controls aren't failing, they're missing where most of today's work actually happens. Keep Aware shows how browser activity like copy/paste and AI prompts bypass t... (BleepingComputer)

One Click, Total Shutdown: The "Patient Zero" Webinar on Killing Stealth Breaches
May 07, 2026
The hardest part of cybersecurity isn't the technology, it’s the people. Every major breach you’ve read about lately usually starts the same way: one employee, one clever email,... (The Hacker News)

OpenAI and Anthropic LLMs Used in Critical Infrastructure Cyber-Attack, Warns Dragos
May 07, 2026
Commercial AI models were used to help plan and conduct cyber-attack against operational technology of a water and drainage facility, say researchers (Infosecurity Magazine)

Attackers Could Exploit AI Vision Models Using Imperceptible Image Changes
May 07, 2026
Cisco’s AI security researchers have analyzed ways to target vision-language models (VLMs) using pixel-level perturbation. The post Attackers Could Exploit AI Vision Models Usin... (SecurityWeek)

Why Security in 2026 Requires Continuous Threat and Exposure Management (CTEM) at Scale
May 07, 2026
Let's be honest, the patching window just shrank to something no practitioner or organization can keep up with. Organizations now need to operate in an environment that must ass... (Rapid7 Blog)

How Cloudflare responded to the “Copy Fail” Linux vulnerability
May 07, 2026
When a critical Linux kernel privilege escalation was publicly disclosed, Cloudflare's security and engineering teams detected, investigated, and mitigated the threat across our... (Cloudflare Blog)

AI Coding Agents Could Fuel Next Supply Chain Crisis
May 07, 2026
“TrustFall” attack shows how AI coding agents can be manipulated into launching stealthy supply chain compromises. The post AI Coding Agents Could Fuel Next Supply Chain Crisis... (SecurityWeek)

World's First AI-Driven Cyberattack Couldn't Breach OT Systems
May 07, 2026
The most sophisticated AI-integrated campaign to date hit a brick wall in the form of a SCADA login screen. (Dark Reading)

Webinar: Why modern attacks require both security and recovery
May 07, 2026
Modern attacks don't stop at initial compromise. This webinar explores why security and recovery must work together to reduce downtime and improve resilience. [...] (BleepingComputer)

Webinar Today: Securing Identity Across Humans, Machines and AI
May 07, 2026
From service accounts to AI-driven processes, identity is evolving faster than most security programs can adapt. Discover strategies for reducing risk and regaining control. The... (SecurityWeek)

ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories
May 07, 2026
Bad week. Turns out the easiest way to get hacked in 2026 is still the same old garbage: shady packages, fake apps, forgotten DNS junk, scam ads, and stolen logins getting dumpe... (The Hacker News)

Day Zero Readiness: The Operational Gaps That Break Incident Response
May 07, 2026
Having an incident response retainer, or even a pre-approved external incident response firm, is not the same as being ready for an incident. A retainer means someone will answe... (The Hacker News)

From Android TVs to routers: the xlabs_v1 Mirai-based botnet built for DDoS attacks
May 07, 2026
A new Mirai‑based botnet, xlabs_v1, hijacks ADB‑exposed IoT devices for powerful DDoS attacks, with 21 flooding methods and DDoS‑for‑hire use. A new Mirai‑derived botnet called... (Security Affairs)

Daemon Tools Developer Confirms Software Was Trojanized
May 07, 2026
A China-linked threat actor backdoored a version of Daemon Tools to infect thousands (Infosecurity Magazine)

PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux
May 07, 2026
Cybersecurity researchers have discovered three packages on the Python Package Index (PyPI) repository that are designed to stealthily deliver a previously unknown malware famil... (The Hacker News)

Researchers Spot Uptick in Use of Vercel for Phishing Campaigns
May 07, 2026
Cofense has warned of a “significant” increase in phishing campaigns abusing Vercel platform (Infosecurity Magazine)

Claude AI Guided Hackers Toward OT Assets During Water Utility Intrusion
May 07, 2026
Dragos has published a report describing how threat actors used Claude AI in an attack on a water and drainage utility in Mexico. The post Claude AI Guided Hackers Toward OT Ass... (SecurityWeek)

Open-source MCP server monitoring for Python apps
May 07, 2026
Pythonic Model Context Protocol servers handle tool calls, session events, module imports, and subprocess activity. BlueRock has released MCP Python Hooks, an open source runtim... (Help Net Security)

Multi-model AI is creating a routing headache for enterprises
May 07, 2026
Application teams are moving AI inference into production systems that support business operations. Enterprises are expanding traffic management, identity controls, observabilit... (Help Net Security)

An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary], (Wed, May 6th)
May 07, 2026
[This is a Guest Diary by Eric Roldan, an ISC intern as part of the SANS.edu BACS program] (SANS ISC)

Critical Buffer Overflow in Palo Alto Networks PAN-OS User-ID Authentication Portal (CVE-2026-0300)
May 06, 2026
Overview On May 6, 2026, Palo Alto Networks published a security advisory for CVE-2026-0300 , a critical unauthenticated buffer overflow vulnerability affecting PAN-OS PA-Series... (Rapid7 Blog)

MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack
May 06, 2026
The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and Static Kitten) has been attributed to a ransomware attack in what has been desc... (The Hacker News)

Iran-Linked APT Posed as Chaos Ransomware Member in Espionage Campaign
May 06, 2026
Rapid7 reveals an Iranian false flag operation masquerading as a Chaos ransomware attack (Infosecurity Magazine)

Attacks Abuse Windows Phone Link to Steal Texts & Bypass 2FA
May 06, 2026
In hard-to-detect attacks, hackers are dropping the CloudZ RAT and a fresh plug-in, Pheno, to hijack the Windows-based bridge between PCs and smartphones. (Dark Reading)

Insights into the clustering and reuse of phone numbers in scam emails
May 06, 2026
Talos has recently started to collect and gather intelligence around phone numbers within emails as an additional indicator of compromise (IOC). In this blog, we discuss new ins... (Cisco Talos)

One in Eight Workers Has Sold Their Corporate Logins
May 06, 2026
Cifas says that 13% of employees admit selling company credentials to a former colleague (Infosecurity Magazine)

Middle East Cyber Battle Field Broadens — Especially in UAE
May 06, 2026
As the war with Iran continues, breach attempts targeting the United Arab Emirates tripled in a few weeks — many targeting critical infrastructure. (Dark Reading)

India orders infosec red alert in case Mythos sparks crime spree
May 06, 2026
Securities regulator urges market players to develop new strategies and nail cyber-basics before AI models fuel mass attacks (The Register - Security)

Muddying the Tracks: The State-Sponsored Shadow Behind Chaos Ransomware
May 06, 2026
Executive summary In early 2026, a sophisticated intrusion initially appearing to be a standard Chaos ransomware attack was assessed to be consistent with a targeted state-spons... (Rapid7 Blog)

CrowdStrike Named a Leader in the First-Ever Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies
May 06, 2026
(CrowdStrike Blog)

Teams calls are about to get a lot harder to fake
May 06, 2026
Microsoft Teams Calling is getting a new feature that will warn users about suspicious inbound VoIP calls from first-time external callers who might be impersonating trusted bra... (Help Net Security)

Sysdig delivers cloud security that runs inside AI coding agents
May 06, 2026
Sysdig announced headless cloud security, a cyberdefense platform designed for the agentic AI era. Sysdig Headless Cloud Security enables customers to drop the traditional, one-... (Help Net Security)

Taiwan High-Speed Rail Emergency Braking Hack: How a Student Stopped the Trains and Exposed a Major Security Gap
May 06, 2026
Taiwan high‑speed rail was disrupted after a 23‑year‑old student spoofed signals and triggered an emergency alarm, stopping four trains for nearly an hour. Taiwan high‑speed rai... (Security Affairs)

Hackers abuse Google ads for GoDaddy ManageWP login phishing
May 06, 2026
A phishing campaign delivered through Google sponsored search results is targeting credentials for ManageWP, GoDaddy's platform for managing fleets of WordPress websites. [...] (BleepingComputer)

Yet Another Way to Bypass Google Chrome's Encryption Protection
May 06, 2026
Authors of the VoidStealer Trojan uncovered a way to get around Google's App-Bound Encryption (ABE), opening the door to infostealers. (Dark Reading)

Instructure Breach Exposes Schools' Vendor Dependence
May 06, 2026
ShinyHunters' attack on Instructure, which owns the widely used Canvas learning management system (LMS), carries big questions about the trust educational institutions put into... (Dark Reading)

New compliance guide available: ISO/IEC 42001:2023 on AWS
May 06, 2026
We have released our latest compliance guide, ISO/IEC 42001:2023 on AWS, which provides practical guidance for organizations designing and operating an Artificial Intelligence M... (AWS Security Blog)

Critical vm2 sandbox bug lets attackers execute code on hosts
May 06, 2026
A critical vulnerability in the popular Node.js sandboxing library vm2 allows escaping the sandbox and executing arbitrary code on the host system. [...] (BleepingComputer)

Arctic Wolf kicks 250 employees out of the pack to save money for AI
May 06, 2026
Cuts appear to hit sales, product, and marketing, accounting for under 10% of staff (The Register - Security)

New Cisco DoS flaw requires manual reboot to revive devices
May 06, 2026
Cisco patched a Crosswork Network Controller and Network Services Orchestrator denial-of-service vulnerability that requires manually rebooting targeted systems for recovery. [...] (BleepingComputer)

1 in 8 employees totally cool with selling work credentials
May 06, 2026
13% say they’ve sold logins or know someone who has, survey suggests (The Register - Security)

DAEMON Tools devs confirm breach, release malware-free version
May 06, 2026
Disc Soft Limited, the maker of DAEMON Tools Lite, confirmed that the software had been trojanized in a supply chain attack and released a new, malware-free version. [...] (BleepingComputer)

The Jenkins Threat Landscape
May 06, 2026
What usage patterns, plugin adoption, and configuration choices reveal about the Jenkins attack surface. (Wiz Blog)

Why ransomware attacks succeed even when backups exist
May 06, 2026
Backups don't fail because they're missing, they fail because attackers destroy them first. Acronis explains how ransomware targets backup systems before encryption, leaving no... (BleepingComputer)

LABScon25 Replay | Please Connect to the Foreign Entity to Enhance Your User Experience
May 06, 2026
Joe FitzPatrick reveals how consumer imports of networked devices pose a real security risk to small businesses and critical infrastructure alike. (SentinelLabs)

Webinar: Why network incidents escalate and how to fix response gaps
May 06, 2026
Most network incidents don't escalate due to a lack of alerts; they escalate when response breaks down. This webinar explores how to fix gaps in triage, enrichment, and coordina... (BleepingComputer)

The Hacker News Launches 'Cybersecurity Stars Awards 2026' — Submissions Now Open
May 06, 2026
For nearly 20 years, we at The Hacker News have mostly told scary stories about cyberspace — big hacks, broken systems, and new threats. But behind every headline, there’s a qui... (The Hacker News)

From Stuxnet to ChatGPT: 20 News Events That Shaped Cyber
May 06, 2026
As part of its 20th anniversary celebration, Dark Reading looks back on 20 of the biggest newsmaking events from the past two decades that influenced the risk landscape for toda... (Dark Reading)

Romanian Man Extradited to US for Role in Hacking Scheme 17 Years Ago
May 06, 2026
Gavril Sandu, 53, was indicted in 2017, but was arrested and extradited to the United States only in 2026. The post Romanian Man Extradited to US for Role in Hacking Scheme 17 Y... (SecurityWeek)

Your AI Agents Are Already Inside the Perimeter. Do You Know What They're Doing?
May 06, 2026
Analysts recently confirmed what identity security teams have quietly feared: AI agents are being deployed faster than enterprises can govern them. In their inaugural Market Gui... (The Hacker News)

Intel 471 speeds threat hunting and remediation with Retroactive Threat Detections
May 06, 2026
Intel 471 has announced Retroactive Threat Detections (RTD), a new capability within its Verity471 platform. RTD helps security teams quickly understand the impact of new threat... (Help Net Security)

Rowhammer Attack Against NVIDIA Chips
May 06, 2026
A new rowhammer attack gives complete control of NVIDIA CPUs. On Thursday, two research teams, working independently of each other, demonstrated attacks against two cards from N... (Schneier on Security)
