[
News
|
Newsletters
|
Blogs
|
Lists
|
Media
|
Jobs
]
HoneyDB
DarkReading
China's 'FamousSparrow' APT Nests in South Caucasus Energy Firm
LatAm Vibe Hackers Generate Custom Hacking Tools on the Fly
It's Patch Tuesday for Microsoft & Not a Zero-Day In Sight
Hugging Face Packages Weaponized With a Single File Tweak
20 Leaders Who Built the CISO Era: 2 Decades of Change
Worm Redux: Fresh Mini Shai-Hulud Infections Bite Supply Chain
FCC Softens Ban on Foreign-Made Routers
Tech Can't Stop These Threats — Your People Can
'Dirty Frag' Exploit Poised to Blow Up on Enterprise Linux Distros
Hackers Use AI for Exploit Development, Attack Automation
Ars Technica
Linux bitten by second severe vulnerability in as many weeks
Chaos erupts as cyberattack disrupts learning platform Canvas amid finals
Mozilla says 271 vulnerabilities found by Mythos have "almost no false positives"
Ars Asks: Share your shell and show us your tricked-out terminals!
Widely used Daemon Tools disk app backdoored in monthlong supply-chain attack
Why Reddit blocked my daily visit to its mobile website
GameStop offers $56 billion for eBay, struggles to explain how it'll pay for it
Ubuntu infrastructure has been down for more than a day
The most severe Linux threat to surface in years catches the world flat-footed
Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden
CyberScoop
‘Mini Shai-Hulud’ malware compromises hundreds of open-source packages in sprawling supply-chain attack
Major world economies spell out key elements of AI ‘ingredients list’
Microsoft addresses 137 vulnerabilities in May’s Patch Tuesday, including 13 rated critical
Google and Amnesty International teamed up to make it harder for spyware vendors to hide
AI is separating the companies built to scale from the ones built to sell
Instructure claims hackers returned stolen Canvas data after an extortion standoff
Google spotted an AI-developed zero-day before attackers could use it
The missing cybersecurity leader in small business
Sen. Schumer seeks DHS plan on AI cyber coordination with state, local governments
ShinyHunters claims nearly 9,000 schools affected by Canvas data breach
InfoSecurity Magazine
Canvas Owner Reaches Agreement With Cybercriminals After Ransomware Attack
Avada Builder Flaws Expose One Million WordPress Sites
Ransomware: Over Half of CISOs Would Consider Paying Ransom to Hackers
Global Cyber Agencies Issue New SBOMs for AI Guidance to Tackle AI Supply Chain Risks
UK Cybersecurity Market Expands to £14.7bn with Strong Growth in AI Security Firms
Microsoft Fixes 17 Critical Flaws in May Patch Tuesday
OpenAI Launches 'Daybreak' to Help Build Secure By Design Software
Mini Shai-Hulud Hits TanStack npm Packages
End‑to‑End Encrypted RCS Messaging Arrives Across iPhone and Android
Attackers Combine ClickFix With PySoxy Proxying to Maintain Persistence
SecurityWeek
Sweet Security Launches Agentic AI Red Teaming to Counter ‘Mythos Moment’
Webinar Today: ROI for Cyber-Physical Security Programs
Government to Scrutinize Instructure Over Canvas Disruption, Data Breach
716,000 Impacted by OpenLoop Health Data Breach
Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening Enterprises
Fortinet, Ivanti Patch Critical Vulnerabilities
Chipmaker Patch Tuesday: Intel and AMD Patch 70 Vulnerabilities
Hundreds of Malicious Packages Force RubyGems to Suspend Registrations
ICS Patch Tuesday: New Security Advisories From Siemens, Schneider, CISA
Microsoft Patches 137 Vulnerabilities
ZDNet
Your TV's RS-232 port is a powerful automation tool - how to unlock it (and what it can do)
CachyOS vs. MX Linux: Are you seeking speed or stability in your distro?
What is digital transformation? Everything you need to know about how technology is changing business
Red Hat Desktop vs. Fedora Hummingbird: Which AI development Linux path is right for you?
How to learn Claude Code for free with Anthropic's AI courses - one took me just 20 minutes
Sony just gave me a compelling reason to put my AirPods and Bose headphones away
Fedora Kinoite vs. Silverblue: My verdict after testing both immutable Linux distros
Buying a robot mower? You can safely ignore these specs (and which ones actually matter)
Chromebook vs. Googlebook: How I'm deciding which laptop to upgrade to next
Elementary OS vs. Linux Mint: I compared my once favorite distro to the Windows alternative
The Hacker News
Microsoft's MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday
Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation
[Webinar] How Modern Attack Paths Cross Code, Pipelines, and Cloud
Most Remediation Programs Never Confirm the Fix Actually Worked
Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws
GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data
Android Adds Intrusion Logging for Sophisticated Spyware Forensics
New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution
RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded
New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots
BleepingComputer
Microsoft fixes Windows Autopatch bug installing restricted drivers
Foxconn confirms cyberattack claimed by Nitrogen ransomware gang
73 Seconds to Breach, 24 Hours to Patch: The Case for Autonomous Validation
Microsoft says some users can't install Office on Windows 365 devices
US govt seeks Instructure testimony on massive Canvas cyberattack
UK fines water supplier $1.3M for exposing data of 664k customers
Webinar: Fixing the gaps in network incident response
Signal adds security warnings for social engineering, phishing attacks
Microsoft releases Windows 10 KB5087544 extended security update
Fortinet warns of critical RCE flaws in FortiSandbox and FortiAuthenticator
gbhackers
ClickFix Evolves Using Decade-Old Open-Source Python SOCKS5 Proxy
Ransomware Gangs Use BYOVD and EDR Killers to Disable Security Tools
Infostealer Malware Fuels Corporate Breaches From Personal Devices
Q1 2026 Ransomware Attacks Hits 2,122 Orgs Amid Fewer, More Impactful Groups
Fake FinalShell and Xshell Sites Push Kong RAT Malware
Zoom Rooms and Workplace Flaws Expose Users to Elevated Access Attacks
Threat Actors Abuse Vercel AI Tools to Mass-Produce Realistic Phishing Sites
SAP Releases Patch for Critical SQL Injection Flaw in S/4HANA
Cushman and Wakefield Confirms Data Breach Impacting Over 310,000 Accounts
Vidar Stealer Campaign Evades EDR to Steal Credentials
Cybersecurity Dive
Canvas owner reaches ‘agreement’ with threat actors after data breach
Guardrail Technologies launches Traffic Light for Code & AI™; first security technology to verify & secure AI code and the people creating it
Identity takes center stage as a leading factor in enterprise cyberattacks
AI and an absent government: Takeaways from RSAC 2026
Second Canvas data breach causes major disruptions for schools, colleges
AI used to develop working zero-day exploit, researchers warn
New cybersecurity industry coalition aims to lead US critical infrastructure protection
Identity is the new perimeter as rapid NHI proliferation threatens visibility and control
Instructure confirms cybersecurity incident
Anthropic’s Claude used in attempted compromise of Mexican water utility
Threatpost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
The Register
Malware crew TeamPCP open-sources its Shai-Hulud worm on GitHub
Vietnam to develop domestic cloud so it can ditch risky overseas operators for government workloads
Doozy of a Patch Tuesday includes 30 critical Microsoft CVEs
Foxconn confirms cyberattack after ransomware crew claims it stole confidential Apple, Nvidia files
US bank reports itself after slinging customer data at 'unauthorized AI app'
Cache-poisoning caper turns TanStack npm packages toxic
Apple, Google drag cross-platform texting into the encrypted age
Japan’s PM orders cybersecurity review to stop Mythos going full CyberZilla
Double Canvas breach acknowledged as ShinyHunters sets new pay-or-leak deadline
Cookie thieves caught stealing dev secrets via fake Claude Code installers
VentureBeat
Protect your enterprise now from the Shai-Hulud worm and npm vulnerability in 6 actionable steps
Running Claude Code or Claude in Chrome? Here's the audit matrix for every blind spot your security stack misses
AI agents are running hospital records and factory inspections. Enterprise IAM was never built for them.
AI tool poisoning exposes a major flaw in enterprise agent security
5,000 vibe-coded apps just proved shadow AI is the new S3 bucket crisis
An AI agent rewrote a Fortune 50 security policy. Here's how to govern AI agents before one does the same.
Anthropic Skill scanners passed every check. The malicious code rode in on a test file.
TechCrunch
US lawmakers demand answers from Instructure after Canvas data breaches
Google launches new Android security feature to help uncover spyware attacks
US bank discloses security lapse after sharing customer data with AI app
Exaforce raises $125M Series B to build AI for catching and stopping cyberattacks as they happen
Instructure strikes deal with hackers who breached it twice
Poland says hackers breached water treatment plants, and the US is facing the same threat
US defense contractor who sold hacking tools to Russian broker ordered to pay $10M to former employers
Hackers deface school login pages after claiming another Instructure hack
Hackers hack victims hacked by other hackers
How Anthropic’s Mythos has rewritten Firefox’s approach to cybersecurity
Network World Security
Cisco open-sources agentic AI security spec
HPE revamps private cloud stack for enterprises rethinking VMware
Versa takes aim at fragmented enterprise security with CSPM, orchestration update, and AI agent controls
Red Hat opens Ansible to AI agents, within limits
2026 network outage report and internet health check
Network jobs watch: Hiring, skills and certification trends
Red Hat offers endless Linux support — for a fee
Red Hat: Sovereignty is more than just compliance
Linux kernel maintainers suggest a ‘kill switch’ to protect systems until a zero-day vulnerability is patched
Tech job postings hit three-year high as AI demand fuels hiring rebound
Help Net Security
Signal responds to phishing attacks with new in-app security warnings
Tuskira’s Kairo exposes hidden AI-driven breach paths
Apricorn hardens ASK3 encrypted USB drive for extreme conditions
KDE gets over €1 million investment to strengthen security and core infrastructure
Microsoft’s agentic security system found four critical Windows RCE flaws
Versa CSPM brings continuous visibility to cloud risk and compliance exposure
NetSPI AI-powered Continuous Pentesting identifies high-impact vulnerabilities
Sandyaa: Open-source autonomous security bug hunter
The hidden risk of non-human identities in AI adoption
Researchers open-source a Wi-Fi cyber range for security training
SC Magazine
Optimize Legal Operations as the CISO Role Changes to Address Skills Gaps and AI - Walter Scott Wilkens - BSW #447
Patch Tuesday: No zero days among 137 Microsoft CVEs, 4 Word RCEs
Fighting fire with fire: Defending against Mythos-powered cyberattacks
Tomato, JDownloader, TempPCP, Bad Vibes, Dirty Frag, Giedi Prime, Aaran Leyland... - SWN #580
‘Mini’ Shai-Hulud attack compromises hundreds of npm, PyPI packages
Incident Response Tabletop Exercises: How CISOs Build Cyber Resilience Before Breach - WC #1
5 ways to defend against vibe hacking
Apple and Google roll out end-to-end encrypted RCS messaging
New GhostLock tool abuses Windows API to block file access
Frame Security launches with $50 million to combat AI-driven social engineering
© 2026 RiskDiscovery | Sponsored by:
Deception Logic