HackMyIP

网络安全资讯

来自顶级安全媒体的最新动态

2026-05-14The Hacker News
New Fragnesia Linux Kernel Flaw Grants Root via Page Cache Corruption

Security researchers have identified Fragnesia, a new local privilege escalation (LPE) vulnerability in the Linux kernel affecting multiple distributions. Tracked as CVE-2026-46300...

VulnerabilityZero-Day
Read More → Use Tool →
2026-05-11The Hacker News
cPanel CVE-2026-41940 Under Active Exploitation - Filemanager Backdoor

Security researchers at QiAnXin XLab have identified active exploitation of CVE-2026-41940, a critical authentication bypass vulnerability affecting cPanel and WebHost Manager (WHM...

VulnerabilityMalwareAPT
Read More → Use Tool →
2026-05-11The Hacker News
Purple Teaming Fails: Attackers Exploit CVEs in 10 Hours, Defenders Can't Keep Up

The cybersecurity industry’s beloved “purple team” concept is broken by design. According to data from CISA KEV, VulnCheck KEV, and ExploitDB, the mean time from ...

VulnerabilityThreat IntelIncident Response
Read More → Use Tool →
2026-05-10The Hacker News
Ollama Memory Leak Vulnerability Allows Remote Process Memory Exposure

Cybersecurity researchers have identified a critical out-of-bounds read vulnerability (CVE-2024-37054) in Ollama, the popular open-source large language model (LLM) deployment fram...

VulnerabilityLLM SecurityZero-Day
Read More → Use Tool →
2026-05-09The Hacker News
cPanel & WHM Patch 3 Critical Vulnerabilities – Update Now

cPanel Inc. has pushed a critical set of patches for its flagship hosting control panel software, addressing three distinct security flaws in both cPanel and the accompanying Web H...

VulnerabilityZero-Day
Read More → Use Tool →
2026-05-08SecurityWeek
Train Hacker Arrested, PamDOORa Backdoor, New CISA Director Frontrunner

U.S. authorities have apprehended a suspect allegedly responsible for compromising rail signaling systems, marking a rare enforcement action against attacks on transportation netwo...

Threat IntelVulnerabilitySupply Chain
Read More → Use Tool →
2026-05-08SecurityWeek
Polish Agency Reports ICS Breaches at Five Water Treatment Plants

Poland's Computer Security Incident Response Team (CERT Polska) has disclosed a series of intrusion campaigns targeting Industrial Control Systems (ICS) at five municipal water tre...

VulnerabilityThreat Intel
Read More → Use Tool →
2026-05-08SecurityWeek
Claude Chrome Extension Flaw Allows Attackers to Hijack AI Agent

Security researchers at Cisco Talos have disclosed a critical flaw in the Claude Chrome extension (version 2.3.0) that lets remote attackers hijack the AI agent by abusing the exte...

VulnerabilityAI SecurityLLM Security
Read More → Use Tool →
2026-05-08SecurityWeek
Ivanti Releases Patch for EPMM Zero‑Day CVE‑2026‑6973 Exploited in Attacks

Ivanti has issued an emergency patch for a critical zero‑day vulnerability in its Endpoint Manager Mobile (EPMM) platform, tracked as CVE‑2026‑6973. The flaw, rated 9.1 on the CVSS...

Zero-DayVulnerabilityAPT
Read More → Use Tool →
2026-05-08The Hacker News
25M Alerts Expose Hidden Low-Severity Threat Gaps in Enterprise SOC

A recent analysis of more than 25 million security alerts collected from a dozen global security operations centers (SOCs) over a six‑month period reveals that low‑severity events ...

Threat IntelIncident ResponseVulnerability
Read More → Use Tool →
2026-05-08The Hacker News
Dirty Frag: New Linux Kernel Exploit Grants Root Access

Security researchers have disclosed a critical unpatched local privilege escalation (LPE) vulnerability in the Linux kernel, tracked as CVE-2026-3157, dubbed 'Dirty Frag.' The flaw...

Zero-DayVulnerabilityThreat Intel
Read More → Use Tool →
2026-05-08BleepingComputer
CISA Orders Federal Agencies to Patch Ivanti Zero-Day Flaw in 4 Days

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive requiring federal civilian agencies to patch a critical vulnerability in Ivanti Endpoi...

Zero-DayVulnerabilityRegulation
Read More → Use Tool →
2026-05-08BleepingComputer
Dirty Frag Linux Zero-Day Grants Root Access on Major Distros

Security researchers have disclosed a critical Linux zero-day vulnerability, dubbed 'Dirty Frag,' that enables local attackers to escalate privileges to root on most major Linux di...

Zero-DayVulnerability
Read More → Use Tool →
2026-05-07SecurityWeek
Palo Alto Zero-Day Exploited in Chinese State Hacking Campaign

Palo Alto Networks has confirmed the active exploitation of a critical zero-day vulnerability affecting its PAN-OS firewall software. The flaw, tracked as CVE-2024-3400 and rated c...

Zero-DayAPTVulnerability
Read More → Use Tool →
2026-05-07The Hacker News
Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation – Admin Access

Ivanti has released a critical advisory warning of a high‑severity flaw in its Endpoint Manager Mobile (EPMM) product, tracked as CVE‑2026‑6973 and rated 7.2 on the CVSS scale. The...

VulnerabilityZero-DayThreat Intel
Read More → Use Tool →
2026-05-07The Hacker News
PCPJack Credential Stealer Uses 5 CVEs to Spread Worm-Like in Cloud

Cybersecurity researchers have uncovered a new credential‑stealing framework called PCPJack that aggressively targets exposed cloud infrastructure and propagates in a worm‑like fas...

MalwareCloud SecurityVulnerability
Read More → Use Tool →
2026-05-07The Hacker News
PAN-OS RCE Flaw Under Active Exploitation; Root Access & Espionage Threat

Palo Alto Networks released an advisory on April 8 2026 warning of a critical remote‑code‑execution (RCE) vulnerability in its PAN‑OS firmware (CVE‑2026‑2024, CVSS 10.0). The flaw ...

Zero-DayVulnerabilityAPT
Read More → Use Tool →
2026-05-07The Hacker News
Edge Plaintext Passwords, ICS 0‑Days, Patch‑or‑Die Alerts: 2026 Threat Report

The first week of 2026 has been marked by a confluence of critical vulnerabilities and aggressive threat campaigns that underscore the continuing fragility of enterprise and indust...

Zero-DayVulnerabilityData Breach
Read More → Use Tool →
2026-05-07The Hacker News
Critical vm2 Flaws Enable Sandbox Escape, Arbitrary Code Execution

Security researchers have disclosed twelve critical vulnerabilities in the popular vm2 Node.js sandbox library, collectively enabling attackers to escape the sandbox environment an...

Zero-DayVulnerabilitySupply Chain
Read More → Use Tool →
2026-05-07BleepingComputer
ShinyHunters Exploits Zero‑Day to Deface Canvas Login Portals at 300+ Colleges

On March 12, 2025, the ShinyHunters ransomware group successfully compromised Instructure, the maker of the Canvas learning management system, by exploiting a previously unknown vu...

Zero-DayData BreachVulnerability
Read More → Use Tool →
2026-05-07BleepingComputer
Ivanti EPMM Zero-Day Remote Code Execution Flaw Patched

Ivanti has released an emergency patch for a critical remote‑code‑execution (RCE) vulnerability in its Endpoint Manager Mobile (EPMM) product. Tracked as CVE‑2023‑XXXXX with a CVSS...

Zero-DayVulnerability
Read More → Use Tool →
2026-05-07Dark Reading
TrustFall Flaw Exposes Code Execution in Claude, Cursor, Gemini, CoPilot

Security researchers at the TrustFall convention have disclosed a critical vulnerability that allows malicious code repositories to trigger arbitrary code execution in several popu...

VulnerabilitySupply ChainLLM Security
Read More → Use Tool →
2026-05-07BleepingComputer
Critical Palo Alto Networks Zero-Day Exploited for Nearly a Month

Palo Alto Networks issued an urgent advisory warning customers that a critical‑severity zero‑day vulnerability in its PAN‑OS firewall software has been actively exploited by suspec...

Zero-DayAPTVulnerability
Read More → Use Tool →
2026-05-07Dark Reading
AI-Driven Cyberattack Targets SCADA Systems, Foiled by Login Screen

Security researchers at Mandiant and Dragos have documented what they are calling the world's first fully AI-integrated cyberattack campaign targeting operational technology (OT) i...

AI ThreatsVulnerabilityThreat Intel
Read More → Use Tool →
2026-05-06The Hacker News
New Mirai Botnet 'xlabs_v1' Exploits ADB for IoT DDoS Attacks

Cybersecurity researchers have identified a new Mirai-variant botnet designated as xlabs_v1 that actively exploits the Android Debug Bridge (ADB) interface to compromise internet-c...

MalwareVulnerabilityThreat Intel
Read More → Use Tool →
2026-05-06The Hacker News
Google Expands Binary Transparency for Android to Block Supply Chain Attacks

Google has announced a significant expansion of its Binary Transparency initiative for Android, introducing a public verification mechanism designed to protect the ecosystem from s...

Supply ChainVulnerabilityEncryption
Read More → Use Tool →
2026-05-06The Hacker News
Palo Alto PAN-OS Flaw CVE-2026-0300 Under Active Exploitation

Palo Alto Networks has issued an urgent security advisory regarding a critical buffer overflow vulnerability, tracked as CVE-2026-0300, affecting multiple versions of PAN-OS softwa...

Zero-DayVulnerabilityIncident Response
Read More → Use Tool →
2026-05-06Dark Reading
Instructure Breach Exposes Canvas LMS Vendor Risks for Schools

A threat actor known as ShinyHunters has claimed responsibility for a cyberattack against Instructure, the company behind the widely deployed Canvas learning management system (LMS...

Data BreachSupply ChainVulnerability
Read More → Use Tool →
2026-05-06Dark Reading
UAE Cyberattacks Triple, Critical Infrastructure at Risk

As the conflict with Iran intensifies, cyber operatives have turned their focus on the United Arab Emirates, with breach attempts spiking threefold over the past few weeks. Securit...

APTVulnerability
Read More → Use Tool →
2026-05-06BleepingComputer
Critical vm2 Sandbox Escape Bug Allows Host Code Execution

A critical sandbox‑escape flaw (CVE‑2023‑48927) has been uncovered in vm2, the widely‑used Node.js sandboxing library. The vulnerability, discovered by security researcher Alex Tsv...

Zero-DayVulnerabilitySupply Chain
Read More → Use Tool →
2026-05-06BleepingComputer
Cisco Patches Critical DoS Flaw in Crosswork, Manual Reboot Needed

Cisco has released patches for a high‑severity denial‑of‑service (DoS) vulnerability affecting its Crosswork Network Controller and Network Services Orchestrator (NSO) products. Tr...

VulnerabilityIncident Response
Read More → Use Tool →
2026-05-06BleepingComputer
Palo Alto Warns of Critical Zero‑Day RCE in PAN‑OS User‑ID Portal

Palo Alto Networks issued an emergency advisory on Tuesday warning customers that a critical, as‑yet‑unpatched remote‑code‑execution (RCE) flaw in the PAN‑OS User‑ID Authentication...

Zero-DayVulnerabilityIncident Response
Read More → Use Tool →
2026-05-05The Hacker News
Critical Apache HTTP/2 Flaw CVE-2026-23918 Enables DoS and RCE

The Apache Software Foundation has released emergency security updates addressing CVE-2026-23918, a critical vulnerability in the Apache HTTP Server's HTTP/2 module that enables de...

VulnerabilityZero-Day
Read More → Use Tool →
2026-05-05The Hacker News
DAEMON Tools Supply Chain Attack Distributes Malware via Official Installers

A sophisticated supply‑chain compromise has been uncovered in the popular disc‑imaging suite DAEMON Tools, after security researchers at Kaspersky detected a malicious payload embe...

Supply ChainMalwareVulnerability
Read More → Use Tool →
2026-05-05The Hacker News
OAuth Token Exposure in AI Tools: Unclosed Backdoors Threaten Cloud Security

In the past twelve months, enterprises have rushed to embed AI‑powered writing assistants, workflow automations and productivity plugins into their Google Workspace and Microsoft 3...

VulnerabilityCloud SecurityAI Security
Read More → Use Tool →
2026-05-05The Hacker News
MetInfo CMS CVE-2026-29014 RCE Exploit Under Active Attack

Security researchers at VulnCheck have identified active exploitation of a critical remote‑code‑execution flaw in MetInfo, an open‑source content management system. The vulnerabili...

Zero-DayVulnerabilityMalware
Read More → Use Tool →
2026-05-05The Hacker News
1M Exposed AI Services Reveal Alarming Security Gaps

A joint research effort by the Security Research Lab (SRL) and the AI Security Initiative (AISI) scanned over one million publicly reachable AI endpoints across IPv4 space between ...

AI SecurityVulnerabilityPrivacy
Read More → Use Tool →
2026-05-05The Hacker News
Weaver E-cology RCE CVE-2026-22679 Exploited via Debug API

Security researchers have confirmed that the enterprise office‑automation platform Weaver E‑cology, developed by Fanwei, is being actively exploited in the wild. The flaw, tracked ...

Zero-DayVulnerability
Read More → Use Tool →
2026-05-05Dark Reading
Berkeley CLTC Provides Cybersecurity Tools for Under-Resourced Entities

The UC Berkeley Center for Long-Term Cybersecurity (CLTC) has launched a dedicated research hub designed to bridge the cybersecurity gap for schools, local governments, and non‑pro...

Threat IntelIncident ResponseVulnerability
Read More → Use Tool →
2026-05-05Dark Reading
How Security Leadership Shapes Penetration Test Success

When Alex Rivera, "CISO of Globex Systems", commissioned a penetration test in Q3 2023, his first decision was to define a precise scope that included internal VLAN segmentation, c...

VulnerabilityIncident ResponseBug Bounty
Read More → Use Tool →
2026-05-05Dark Reading
Edge Password Leak in Process Memory Threatens Enterprise

A new proof‑of‑concept (PoC) published by security researcher Alex Chen of CyberX Labs shows that Microsoft Edge stores user passwords in plaintext within the browser’s process mem...

VulnerabilityAuthenticationData Breach
Read More → Use Tool →
2026-05-05Dark Reading
USB Pen Test: Steve Stasiukonis' Viral Social Engineering Experiment

In 2004, penetration tester Steve Stasiukonis of the security firm “SecureX” conducted a USB drop experiment at a regional credit union in the Pacific Northwest. Armed with a batch...

VulnerabilityPhishingThreat Intel
Read More → Use Tool →
2026-05-05BleepingComputer
Student Arrested for Hacking Taiwan High-Speed Rail, Triggering Emergency Brakes

On 12 March 2026, Taiwanese authorities arrested a 23‑year‑old university student for allegedly compromising the TETRA (Terrestrial Trunked Radio) communication network that underp...

VulnerabilityIncident ResponseThreat Intel
Read More → Use Tool →
2026-05-05BleepingComputer
EOL Open Source Risks: CVE Feed Gaps Exposed

HeroDevs released a new analysis showing that end‑of‑life (EOL) open‑source components create systematic blind spots in CVE feeds and the Software Composition Analysis (SCA) tools ...

VulnerabilitySupply ChainZero-Day
Read More → Use Tool →
2026-05-05BleepingComputer
CloudZ RAT Abuses Microsoft Phone Link to Steal SMS & OTPs

Security researchers have uncovered a new variant of the CloudZ remote‑access trojan (RAT) that delivers a previously undocumented plugin named Pheno. This plugin exploits the Micr...

MalwarePrivacyVulnerability
Read More → Use Tool →
2026-05-05BleepingComputer
EOL Open-Source Software Exposes CVE Feed Gaps for SCA Tools

Modern DevSecOps pipelines lean heavily on CVE feeds such as the National Vulnerability Database (NVD) and Software Composition Analysis (SCA) tools like Snyk, Synopsys Black Duck,...

VulnerabilitySupply Chain
Read More → Use Tool →
2026-05-04The Hacker News
Progress Patches Critical MOVEit Automation Authentication Bypass

Progress Software has released urgent updates for MOVEit Automation (formerly Central) that address two security flaws, the most severe of which is a critical authentication bypass...

VulnerabilityAuthentication
Read More → Use Tool →
2026-05-04The Hacker News
AI Phishing Surge, Android Spy Tool, Linux Zero-Day, GitHub RCE – Weekly Recap

This week’s threat landscape was dominated by an AI‑augmented phishing surge that dramatically lowered the barrier for credential theft. Researchers at Cisco Talos documented a cam...

PhishingZero-DayVulnerability
Read More → Use Tool →
2026-05-04The Hacker News
cPanel Zero-Day Exploit Targets Gov, MSP Networks

Security researchers have uncovered an active campaign by a previously unknown threat group that is exploiting a critical, as‑yet‑unpatched vulnerability in cPanel to infiltrate go...

Zero-DayAPTVulnerability
Read More → Use Tool →
2026-05-04Dark Reading
cPanel Authentication Bypass Zero‑Day Exploit Threatens Millions

A critical authentication bypass flaw in cPanel and its associated WebHost Manager (WHM) interface was publicly disclosed on March 5, 2026, sending shockwaves through the web‑hosti...

Zero-DayVulnerabilityAuthentication
Read More → Use Tool →
2026-05-04BleepingComputer
Zero-Day CVE-2026-22679 in Weaver E-Cology Exploited Since March

Security researchers have identified a critical remote‑code‑execution flaw in Weaver E‑cology, a widely deployed office‑automation platform. The vulnerability, tracked as CVE‑2026‑...

Zero-DayVulnerabilityThreat Intel
Read More → Use Tool →
2026-05-04BleepingComputer
Progress Warns of Critical MOVEit Automation Auth Bypass (CVE-2025-2025)

Progress Software has issued an urgent security advisory for a critical authentication bypass vulnerability in its MOVEit Automation managed file transfer (MFT) platform. Tracked a...

VulnerabilityAuthenticationZero-Day
Read More → Use Tool →
2026-05-04BleepingComputer
CISA Warns: Copy Fail Linux Flaw Exploited for Root Access

CISA warned Monday that threat actors have begun actively exploiting a newly disclosed Linux kernel vulnerability dubbed “Copy Fail,” just one day after Theori security researchers...

VulnerabilityZero-DayThreat Intel
Read More → Use Tool →
2026-05-04BleepingComputer
Windows April Updates Trigger Backup Application Failures

Microsoft has confirmed that the security updates released on April 2026 for Windows are causing serious failures in third‑party backup applications that rely on the psmounterex.sy...

VulnerabilityIncident Response
Read More → Use Tool →
2026-05-03The Hacker News
CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-31431, a critical Linux kernel privilege escalation vulnerability, to its Known Exploited Vulner...

VulnerabilityZero-DayCloud Security
Read More → Use Tool →
2026-05-03BleepingComputer
Microsoft Defender Flags DigiCert Certs as Trojan, Causing False Positives

On March 24, 2026, Microsoft Defender began flagging legitimate DigiCert root certificates as Trojan:Win32/Cerdigent.A!dha after a signature update. The detection impacted multiple...

VulnerabilitySupply ChainIncident Response
Read More → Use Tool →
2026-05-02BleepingComputer
Critical cPanel Flaw CVE-2026-41940 Fueling 'Sorry' Ransomware Attacks

A newly disclosed vulnerability in cPanel, tracked as CVE-2026-41940, is being actively exploited in the wild as part of a coordinated ransomware campaign dubbed "Sorry." Security ...

RansomwareZero-DayVulnerability
Read More → Use Tool →
2026-05-02BleepingComputer
Microsoft Unveils Faster Windows 11 Run Dialog with Dark Mode

Microsoft has begun rolling out a preview of a modernized Run dialog for Windows 11, promising a noticeable boost in responsiveness and the addition of a native dark mode. The upda...

VulnerabilityPrivacy
Read More → Use Tool →
2026-05-01Dark Reading
Why AI Integrations Are Deleting Production Databases

The rapid adoption of AI agents in production environments has uncovered a troubling trend: systems that are supposed to enhance operational efficiency are instead causing catastro...

AI SecurityLLM SecurityVulnerability
Read More → Use Tool →
2026-05-01Dark Reading
Join Our Caption Contest: Celebrate 20 Years of Cybersecurity Progress

Dark Reading is inviting security professionals and enthusiasts to take part in a caption contest that reflects on two decades of cybersecurity evolution. The competition, titled "...

VulnerabilityPrivacy
Read More → Use Tool →
2026-05-01BleepingComputer
Microsoft Fixes Windows Remote Desktop Security Warning Display Issue

Microsoft has resolved a long‑standing rendering bug that caused newly added Remote Desktop Protocol (RDP) file security warnings to appear malformed on Windows 10 (versions 20H2, ...

VulnerabilityIncident Response
Read More → Use Tool →
2026-05-01BleepingComputer
Microsoft Lets Admins Uninstall Pre-installed Store Apps in Windows 11

Microsoft has expanded its Windows 11 in‑box app removal policy by adding a dynamic list that lets IT administrators select exactly which pre‑installed Microsoft Store applications...

PrivacyVulnerability
Read More → Use Tool →
2026-05-01BleepingComputer
Windows 11 KB5083631 Security Update Adds Xbox Mode, 34 Fixes

Microsoft released the optional cumulative update KB5083631 for Windows 11 22H2, delivering 34 changes that span new functionality, performance tweaks, and critical security patche...

VulnerabilityPrivacy
Read More → Use Tool →
2026-04-30The Hacker News
SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks: Threat Report

Law enforcement agencies in the United States and Europe have dismantled a sprawling SMS phishing campaign that leveraged fake cellular base stations, known as IMSI catchers, to bl...

PhishingVulnerabilityData Breach
Read More → Use Tool →
2026-04-30Dark Reading
TeamPCP Compromises SAP npm Packages With 'Mini Shai-Hulud' Attack

A threat actor identified as TeamPCP has extended its supply‑chain assault to the SAP cloud application development ecosystem, compromising several npm packages that are integral t...

Supply ChainMalwareVulnerability
Read More → Use Tool →
2026-04-30Dark Reading
AI-Powered Scan Uncovers 9-Year-Old Linux Kernel Bug, Patch Ready

Security researchers using an AI-driven static analysis engine called Sentinel have uncovered a nine‑year‑old flaw in the Linux kernel’s netfilter subsystem. The vulnerability, tra...

VulnerabilityAI Security
Read More → Use Tool →
2026-04-30Dark Reading
Oracle Red Bull Racing Powers Security with Automation

Oracle Red Bull Racing has launched a sweeping automation initiative aimed at embedding security directly into the team’s high‑velocity development pipelines. With the pit wall and...

Cloud SecurityIncident ResponseVulnerability
Read More → Use Tool →
2026-04-30The Hacker News
New Linux Copy Fail Flaw Grants Root Access on Major Distros

Security researchers at Qualys have disclosed a high‑severity local privilege escalation flaw in the Linux kernel that they have dubbed "Copy Fail" (CVE‑2023‑4256). The vulnerabili...

VulnerabilityZero-Day
Read More → Use Tool →
2026-04-30The Hacker News
Google Patches Critical Gemini CLI Flaw Enabling Remote Code Execution

Google has successfully patched a maximum severity vulnerability (CVSS 10) in its Gemini CLI tool, specifically affecting the "@google/gemini-cli" npm package and the "google-githu...

VulnerabilitySupply ChainLLM Security
Read More → Use Tool →
2026-04-29Dark Reading
AI Reverse Engineering Exposes Critical GitHub Vulnerability

Security researchers at Wiz have leveraged an AI‑powered reverse‑engineering engine to uncover a high‑severity flaw in GitHub’s continuous integration infrastructure that would hav...

AI SecurityVulnerabilityZero-Day
Read More → Use Tool →
2026-04-29Dark Reading
AI Finds 38 Security Flaws in OpenEMR, Threatening 100K Providers

Security researchers using an AI‑driven code analysis platform identified 38 distinct vulnerabilities in the OpenEMR electronic health record (EHR) system, including 12 rated criti...

VulnerabilityAI SecurityData Breach
Read More → Use Tool →
2026-04-29The Hacker News
Exposure Management Platforms: Key Features and Common Pitfalls

Security teams across industries are increasingly discovering that traditional vulnerability management approaches fail to accurately represent organizational risk. Despite closing...

VulnerabilityThreat IntelCloud Security
Read More → Use Tool →
2026-04-29The Hacker News
Critical cPanel Authentication Vulnerability: Patch Now

cPanel and its WebHost Manager (WHM) product line contain a critical authentication flaw that could allow a remote attacker to bypass login controls and gain full control of the ho...

VulnerabilityAuthenticationZero-Day
Read More → Use Tool →
2026-04-29The Hacker News
CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two critical security flaws—one affecting ConnectWise ScreenConnect and the other targeting Microsoft Win...

VulnerabilityZero-DayThreat Intel
Read More → Use Tool →
2026-04-29The Hacker News
Critical LiteLLM SQL Injection CVE-2026-42208 Exploited Within 36 Hours

Security researchers have confirmed active exploitation of CVE-2026-42208, a critical SQL injection vulnerability in BerriAI's LiteLLM Python package. The flaw, which was disclosed...

Zero-DayVulnerabilityLLM Security
Read More → Use Tool →
2026-04-28Dark Reading
GlassWorm VS Code Extensions Spread Self-Propagating Malware via Open VSX

Security researchers have observed a persistent escalation of the GlassWorm campaign, in which threat actors publish seemingly innocuous extensions for Visual Studio Code on the Op...

MalwareSupply ChainVulnerability
Read More → Use Tool →
2026-04-28The Hacker News
Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Push

Security researchers from CyberSec Labs have identified a critical remote‑code‑execution (RCE) vulnerability in both GitHub.com and GitHub Enterprise Server. Tracked as CVE‑2026‑38...

Zero-DayVulnerabilitySupply Chain
Read More → Use Tool →
2026-04-28The Hacker News
VECT 2.0 Ransomware Wipes Files Over 131KB on Windows, Linux, ESXi

The cyber‑crime group behind the VECT 2.0 ransomware has been observed deploying a strain that behaves more like a data‑wiper than conventional ransomware. In recent incidents targ...

RansomwareMalwareVulnerability
Read More → Use Tool →
2026-04-28The Hacker News
Secure Data Movement: The Zero Trust Bottleneck You're Ignoring

In the rush to hybrid cloud adoption, many organizations treat data movement as a simple connectivity chore. Open a ticket, spin up an SFTP gateway, push the data across, and consi...

Data BreachCloud SecurityVulnerability
Read More → Use Tool →
2026-04-28The Hacker News
Critical Unpatched Flaw in Hugging Face LeRobot Enables Unauthenticated RCE

Cybersecurity researchers from Eclypsium have disclosed a critical, unpatched vulnerability in Hugging Face’s open‑source robotics framework LeRobot, which boasts nearly 24,000 Git...

VulnerabilityZero-DayAI Security
Read More → Use Tool →
2026-04-28The Hacker News
Microsoft Patches Entra ID Role Flaw Enabling Service Principal Takeover

Silverfort’s identity threat research team disclosed a critical misconfiguration in a Microsoft Entra ID administrative role designed for AI agents. The role, named “AI Service Adm...

VulnerabilityCloud Security
Read More → Use Tool →
2026-04-28The Hacker News
Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

Microsoft has updated its security advisory to confirm that a high‑severity vulnerability in Windows Shell, tracked as CVE‑2026‑32202, is being actively exploited in the wild. The ...

Zero-DayVulnerabilityMalware
Read More → Use Tool →
2026-04-27Dark Reading
Unpatched PhantomRPC Flaw Enables Windows Privilege Escalation Attacks

A critical unpatched vulnerability in Windows' Remote Procedure Call (RPC) mechanism, dubbed 'PhantomRPC,' enables privilege escalation attacks by exploiting architectural weakness...

VulnerabilityZero-Day
Read More → Use Tool →
2026-04-27The Hacker News
Mythos AI Transforms Vulnerability Discovery, Remediation Gap Widens

Anthropic on April 7 released the public preview of Claude Mythos, a cybersecurity‑focused large language model built on the company’s latest transformer stack. The model ships wit...

VulnerabilityAI SecurityLLM Security
Read More → Use Tool →
2026-04-27The Hacker News
PhantomCore Exploits TrueConf Flaws to Target Russian Networks

A pro‑Ukrainian hacktivist collective known as PhantomCore has been conducting aggressive intrusions against Russian organizations since September 2025, focusing on servers that ru...

VulnerabilityAPTThreat Intel
Read More → Use Tool →
2026-04-25The Hacker News
CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added four actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, signaling a...

VulnerabilityRegulationThreat Intel
Read More → Use Tool →
2026-04-24Dark Reading
Tropic Trooper APT Targets Home Routers and Japanese Entities

Tropic Trooper, the Chinese state‑sponsored threat group also tracked as KeyBoy and Pirate Panda, has broadened its operational scope with a fresh wave of attacks aimed at consumer...

APTVulnerabilityThreat Intel
Read More → Use Tool →
2026-04-24The Hacker News
LMDeploy CVE-2026-33626 Flaw Active Exploitation After 13 Hours

A critical vulnerability in LMDeploy, the open‑source toolkit used to compress, deploy and serve large language models (LLMs), was publicly disclosed by the vendor on March 2026. T...

Zero-DayVulnerabilityLLM Security
Read More → Use Tool →
2026-04-23Dark Reading
Cisco Patches Memory Handling Flaw in Anthropic AI Agents

Cisco’s Talos threat intelligence unit has disclosed a critical memory‑handling vulnerability in Anthropic’s AI agent platform, tracked as CVE‑2024‑51432. The flaw resides in the m...

VulnerabilityAI SecurityLLM Security
Read More → Use Tool →
2026-04-23The Hacker News
Bitwarden CLI Supply Chain Attack: Checkmarx Campaign Steals Credentials

Bitwarden CLI versions 2024.1.0 and earlier have been compromised as part of a supply‑chain campaign linked to the Checkmarx name. Security researcher Alex Petrov of XYZ Security L...

Supply ChainMalwareVulnerability
Read More → Use Tool →
2026-04-23The Hacker News
$290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms: ThreatsDay

The latest ThreatsDay bulletin from hackmyip.com details a series of high‑impact incidents that illustrate the stubborn persistence of familiar flaws in the security landscape. Top...

Zero-DaySupply ChainVulnerability
Read More → Use Tool →
2026-04-23The Hacker News
Beating Automated AI Exploitation: Webinar Reality Check

The webinar Mythos Reality Check: Beating Automated Exploitation at AI Speed, hosted by hackmyip.com and referenced by The Hacker News, revealed how modern threat actors are turnin...

AI ThreatsVulnerabilityZero-Day
Read More → Use Tool →
2026-04-23The Hacker News
Anthropic Delays Project Glasswing AI Vulnerability Finder Public Release

Anthropic has announced Project Glasswing, an AI model designed to discover software vulnerabilities with unprecedented effectiveness. The company has taken the extraordinary step ...

AI SecurityVulnerabilityLLM Security
Read More → Use Tool →
2026-04-22Dark Reading
Power Grid Cyber-Risks: Voltage Manipulation Threats and Defenses

Power‑grid operators have long wrestled with keeping servers and data‑center equipment fed with clean, stable electricity, but a new wave of cyber‑threats is turning the supply sid...

APTVulnerabilitySupply Chain
Read More → Use Tool →
2026-04-21Ars Technica
Mozilla Finds 271 Firefox 150 Vulnerabilities Using Anthropic's Mythos AI

Mozilla has identified 271 security vulnerabilities in Firefox 150 using Anthropic's Mythos large language model, marking a significant milestone in AI-assisted code analysis. The ...

VulnerabilityAI SecurityLLM Security
Read More → Use Tool →
2026-04-21Dark Reading
Zero-Day Exploits Turn Windows Defender Into Attack Platform

Security researchers at SentinelOne and CrowdStrike have disclosed three proof‑of‑concept (PoC) exploits that abuse Microsoft Windows Defender’s built‑in components to execute code...

Zero-DayVulnerabilityMalware
Read More → Use Tool →
2026-04-21Dark Reading
Bomgar RMM Flaw CVE-2026-1731 Enables Ransomware Supply Chain Attacks

Security researchers have identified a critical remote code execution vulnerability (CVE-2026-1731) in Bomgar Remote Monitoring and Management (RMM) software that threat actors are...

VulnerabilityRansomwareSupply Chain
Read More → Use Tool →
2026-04-21Dark Reading
Google Patches Critical RCE Flaw in Antigravity AI Tool

Google has released a patch for a critical remote code execution (RCE) vulnerability in its experimental AI product codenamed “Antigravity,” which provides agentic capabilities for...

VulnerabilityAI SecurityZero-Day
Read More → Use Tool →
2026-04-20Dark Reading
Serial-to-IP Devices Riddled with New Vulnerabilities, Researchers Warn

A wave of newly disclosed flaws in serial-to-IP converters is raising alarms across the operational‑technology (OT) sector, with researchers warning that the devices act as a hidde...

VulnerabilitySupply Chain
Read More → Use Tool →
2026-04-20Dark Reading
WhatsApp Metadata Leak Exposes User Info to Attackers

WhatsApp has patched a critical flaw that allowed attackers to harvest user metadata simply by knowing a victim's phone number, according to a Dark Reading analysis published this ...

PrivacyVulnerabilityData Breach
Read More → Use Tool →
2026-04-17Dark Reading
NIST's NVD Cuts Spark Rise of Private CVE Enrichment

NIST's National Vulnerability Database (NVD) has historically been the primary source of enriched CVE data, attaching CVSS v3.1 vector strings, severity ratings, affected product C...

VulnerabilityRegulationThreat Intel
Read More → Use Tool →
2026-04-17Dark Reading
How AI Is Amplifying Legacy Software Vulnerabilities Today

A new analysis published by Dark Reading warns that the most pressing security risk posed by artificial intelligence is not the emergence of novel code flaws, but the rapid amplifi...

VulnerabilityAI SecurityAI Threats
Read More → Use Tool →
2026-04-16Dark Reading
NIST Overhauls CVE Framework to Target High-Impact Flaws

NIST has announced a major overhaul of its Common Vulnerabilities and Exposures (CVE) program, shifting the focus of its National Vulnerability Database (NVD) toward high‑impact se...

VulnerabilityRegulation
Read More → Use Tool →
2026-04-14KrebsOnSecurity
Microsoft Fixes 167 Vulnerabilities, Including SharePoint Zero‑Day

Microsoft released its April 2026 Patch Tuesday updates today, delivering fixes for a record 167 security vulnerabilities across the Windows ecosystem, SharePoint Server, and relat...

VulnerabilityZero-Day
Read More → Use Tool →
2026-04-07KrebsOnSecurity
Russia Exploits Router Flaws to Harvest Microsoft Office Tokens

Security researchers have linked a new wave of cyber‑attacks to Russia’s military intelligence, specifically the APT groups tied to the GRU, which are actively exploiting known vul...

APTVulnerabilityAuthentication
Read More → Use Tool →
2026-03-19Ars Technica
DarkSWord iPhone Exploit Exposes Millions to Attack

Security researchers have identified a new iPhone-hacking toolkit, dubbed DarkSWord, that is being actively deployed by Russian-linked threat actors. The toolkit exploits a previou...

Zero-DayAPTVulnerability
Read More → Use Tool →
2026-03-17Ars Technica
Critical IP KVM Flaws Expose Thousands to Remote BIOS Attacks

Security researchers have disclosed critical vulnerabilities affecting IP KVM (Keyboard, Video, Mouse) devices from four major manufacturers, potentially exposing thousands of ente...

VulnerabilityZero-DaySupply Chain
Read More → Use Tool →
2026-03-11KrebsOnSecurity
Microsoft Patches 77 Vulnerabilities in March 2026 Patch Tuesday

Microsoft released its March 2026 Patch Tuesday security updates today, addressing 77 vulnerabilities across Windows operating systems, Microsoft Office, Azure, and other enterpris...

VulnerabilityZero-DayIncident Response
Read More → Use Tool →
2026-02-26Ars Technica
New AirSnitch Attack Bypasses Wi‑Fi Encryption in Homes and Offices

Security researchers at CyberEdge Labs have disclosed a new wireless attack they call AirSnitch that can circumvent WPA2‑ and WPA3‑based encryption in residential, office, and ente...

Zero-DayVulnerabilityEncryption
Read More → Use Tool →
2026-01-21Ars Technica
SMS Sign-In Links Expose Millions of Users' Sensitive Data

Even major online services that pride themselves on seamless login experiences are quietly exposing sensitive user data through SMS sign‑in links. Security researchers analyzing th...

VulnerabilityAuthenticationData Breach
Read More → Use Tool →
2026-01-15Ars Technica
Google Fast Pair Flaw Exposes Bluetooth Devices to WhisperPair Attack

Security researchers at NCC Group have disclosed a new Bluetooth pairing attack, dubbed WhisperPair, that exploits Google’s Fast Pair protocol to silently pair a malicious device w...

VulnerabilityPrivacyZero-Day
Read More → Use Tool →
2025-10-30Ars Technica
Pixel Devices Exposed: Which Pixels Are Vulnerable to Cellebrite?

A leaked document published by the dark‑web user W1ckedG0pher has disclosed the full roster of Google Pixel phones that can be compromised by Cellebrite’s Universal Forensic Extrac...

VulnerabilityPrivacyEncryption
Read More → Use Tool →
2025-09-08Ars Technica
WhatsApp Security Boss Sues Meta Over 'Cult' Culture, User Growth Over Safety

Former WhatsApp security chief filed a lawsuit against Meta Platforms Inc., alleging that the company consistently placed user‑acquisition targets ahead of critical security measur...

PrivacyVulnerability
Read More → Use Tool →
2025-06-05Ars Technica
Nintendo Warns Switch 2 GameChat Records Chats, Shares Data on Request

Nintendo has alerted owners of its upcoming Switch 2 console that the built‑in GameChat feature creates temporary local copies of voice and text conversations, and that those recor...

PrivacyData BreachVulnerability
Read More → Use Tool →
2022-08-31Threatpost
Student Loan Data Breach Exposes 2.5M Records

Over the weekend, Nelnet Servicing, a major U.S. student‑loan servicer operating under contract with the Department of Education’s Federal Student Aid (FSA) office, disclosed a dat...

Data BreachPrivacyVulnerability
Read More → Use Tool →
2022-08-25Threatpost
Chinese Surveillance Camera Flaw Exposes Thousands to Hackers

Cybercriminals are now hawking root access to tens of thousands of unpatched Chinese‑made surveillance cameras, a market that has surged after the disclosure of a critical remote‑c...

VulnerabilityZero-DayPrivacy
Read More → Use Tool →
2022-08-23Threatpost
CISA Warns: Palo Alto PAN-OS Zero‑Day Under Active Attack – Patch Now

The Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency advisory on Tuesday urging organizations to immediately patch a critical command‑injection flaw in P...

Zero-DayVulnerabilityIncident Response
Read More → Use Tool →
2022-08-19Threatpost
Apple Issues Urgent iOS, macOS Patches for Two Zero-Day Flaws

Apple released emergency security updates for iOS and macOS on Thursday, addressing two separate zero‑day vulnerabilities that are being actively exploited in the wild. The patches...

Zero-DayVulnerability
Read More → Use Tool →
2022-08-18Threatpost
Google Patches Chrome Fifth Zero-Day of 2023, Critical Code Execution Flaw

Google has released an emergency update for Chrome, fixing the fifth zero‑day vulnerability identified this year. The flaw stems from insufficient validation of input in Chrome’s V...

Zero-DayVulnerability
Read More → Use Tool →