• Open

    Weekly Threat Bulletin – May 13th, 2026
    These are the top threats you should know about this week.
  • Open

    PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers
    Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.
    The Nansh0u Campaign – Hackers Arsenal Grows Stronger
    In the beginning of April, three attacks detected in the Guardicore Global Sensor Network (GGSN) caught our attention. All three had source IP addresses originating in South-Africa and hosted by VolumeDrive ISP (see IoCs).
    Threats Making WAVs - Incident Response to a Cryptomining Attack
    Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident response processes in data centers.
    The Oracle of Delphi Will Steal Your Credentials
    Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The attacks brute forced passwords for RDP credentials to connect to the victim download and execute a previously undetected malware, which we named Trojan.sysscan.
    Keep Your Tech Flame Alive: Trailblazer Rachel Bayley
    In this Akamai FLAME Trailblazer blog post, Rachel Bayley encourages women to step into the unknown and to be their authentic selves.

  • Open

    Accelerating detection engineering using AI-assisted synthetic attack logs generation
    What if you could generate realistic attack telemetry on demand? Explore research methods that translate attacker behaviors (TTPs) into synthetic logs that can trigger detections at scale and without sensitive data. The post Accelerating detection engineering using AI-assisted synthetic attack logs generation appeared first on Microsoft Security Blog.
    Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark
    Today Microsoft is announcing a major step forward in AI-powered cyber defense: a new multi-model agentic scanning harness (codenamed MDASH). The post Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark appeared first on Microsoft Security Blog.
    Defending consumer web properties against modern DDoS attacks
    Read how to protect consumer websites and defend against modern DDoS attacks with layered security, resilient architecture, and graceful service degradation. The post Defending consumer web properties against modern DDoS attacks appeared first on Microsoft Security Blog.
    Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise
    Microsoft Incident Response investigated an attack operated through legitimate and trusted administrative mechanisms to blend seamlessly into routine operations and remain undetected demonstrating that intrusions have increasingly avoided using noisy exploits, obvious malware, or custom tooling, instead leveraging systems that organizations already trust within their environments. The post Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise appeared first on Microsoft Security Blog.
  • Open

    AWS Security Agent full repository code scanning feature now available in preview
    Today, we’re excited to announce the preview release of full repository code review, a new capability in AWS Security Agent that performs deep, context-aware security analysis of your entire code base. AI-driven cybersecurity capabilities are advancing rapidly. AWS Security Agent can now find vulnerabilities and build working exploits across your entire code base at a […]  ( 110 min )
    Enabling AI sovereignty on AWS
    Cloud and AI are transforming industries and societies at unprecedented speed, from accelerating research and enhancing customer experiences to optimizing business processes and enriching public services. At Amazon Web Services (AWS), we believe that for the cloud and AI to reach their full potential, customers need control over their data and choices for how and […]  ( 112 min )
  • Open

    The May 2026 Security Update Review
    I’m currently in Berlin helping set up for Pwn2Own Berlin, but that doesn’t stop Patch Tuesday from coming, and it’s another big one. At least nothing is listed as being in the wild – for now. Take a break from your regularly scheduled activities and let’s take a look at the latest security patches from Adobe and Microsoft. Due to technical difficulties, there will not be a video companion for this month. Adobe Patches for May 2026 For May, Adobe released 10 bulletins addressing 52 unique CVEs in Adobe Commerce, After Effects, Adobe Connect, Illustrator, Media Encoder, Premiere Pro, Substance 3D Painter, Substance 3D Sampler, Content Authenticity SDK, and the Adobe Substance 3D Designer. Here’s this month’s overview table: Bulletin ID Product CVE Count Highest Severity High…
    The Apple macOS Security Update Review
    We’ve received some feedback from those who read the Patch Blog that they would like something similar for macOS updates. Unfortunately, Apple doesn’t schedule these for a particular day, but we can provide our thoughts and analysis on the days they do release their latest patches. For May 2026, Apple released 82 unique CVEs across the three macOS versions: 79 for macOS Tahoe 26.5, 45 for macOS Sequoia 15.7.7, and 42 for macOS Sonoma 14.8.7. Since Apple doesn’t provide CVSS scores or other severity information, we’re left to speculate on which of these bugs is the most severe. However, there are a couple that stand out. -              CVE-2026-28819 (Wi-Fi) stands out as the strongest candidate for the most severe as it states, “An app may be able to execute arbitrary code with kernel pri…
  • Open

    Fake Claude search results lure Mac users into ClickFix attack
    Researchers found a ClickFix campaign that uses fake Claude setup guides to trick Mac users into infecting themselves.
    1 in 8 employees have sold company logins or know someone who has
    Cifas just published research that should bother anyone who runs a business, or buys from one.
    Stolen Canvas data was “returned” after hacker agreement, Instructure says
    Instructure says the stolen Canvas data impacting millions of students and staff was “returned.” That’s not how breaches work.
  • Open

    One Is a Fluke, 3 Is a Pattern: MCP Back-End Vulnerabilities
    No content preview
  • Open

    ICE Agents Have List of 20 Million People on Their iPhones Thanks to Palantir
    The comments made by a senior ICE official at a trade show highlight how Palantir is increasing the speed at which ICE operates. Most people detained by ICE have no criminal conviction.
  • Open

    Introducing Joro: Using AI to Build Security Tooling
    Bishop Fox is releasing Joro, a collaborative web exploitation framework built almost entirely with AI. From intercepting proxy to C2 integration, this post covers how it was built, what it does, and what AI-assisted security tool development actually looks like in practice.
  • Open

    InfoSec News Nuggets 05/12/2026
    TanStack, Mistral AI, UiPath Hit in Fresh Supply Chain Attack More than 170 NPM and PyPI packages were compromised in a new Mini Shai-Hulud supply chain campaign affecting TanStack, Mistral AI, UiPath, OpenSearch, Guardrails AI, and other projects. The malware targets developer credentials, API keys, cloud secrets, tokens, cryptocurrency wallets, and AI-related secrets, then attempts […] The post InfoSec News Nuggets 05/12/2026 appeared first on AboutDFIR - The Definitive Compendium Project.
  • Open

    Cushman & Wakefield - 310,431 breached accounts
    In May 2026, the real estate services firm Cushman & Wakefield was the target of a "pay or leak" extortion campaign by the ShinyHunters group. Following the threat, the group publicly published data they alleged had been obtained from the firm, consisting mostly of C&W email addresses along with tens of thousands of external email addresses and corporate contact records. The exposed data was primarily business information, including names, job titles, company addresses and phone numbers.
  • Open

    Lab Write-up: Linux CLI — Identifying Incorrect File Extensions
    No content preview
    AI Models & Data | TryHackMe Write-up
    Non-members are welcome to access the full story here Continue reading on InfoSec Write-ups »
    Bad USB: The Invisible Hardware Threat
    No content preview
    Microsoft Edge Password Exposure: How a Memory Dump Reveals Your Credentials
    No content preview
    Your Wallet Is the Inbox: How Web3 Phishing Attacks Are Targeting Users On-Chain
    No content preview
    Attack Playbook — Operation DragonRx
    Phase-by-Phase Attack Guide: Exact Commands Against the Deployed Lab Continue reading on InfoSec Write-ups »
    Information disclosure on debug page APPRENTICE | Lab -02
    No content preview
    Information disclosure in error messages | Lab -01
    No content preview

  • Open

    Complimentary virtual training: Get hands-on with AWS Security Services
    If you’re looking to strengthen your organization’s security posture on Amazon Web Services (AWS) but aren’t sure where to start, then we’re here to help. Security Activation Days are complimentary, virtual, hands-on workshops designed to help you get practical experience with AWS security services in a single session. What to expect Each Security Activation Day […]  ( 107 min )
  • Open

    How the World Became a Casino
    The logic behind Polymarket, Kalshi and sports betting apps can be traced back to the inner workings of the slot machine.
    Your AI Use Is Breaking My Brain
    AI writing is impossible to avoid, is making everything sound the same, and is driving us crazy.
    Students Boo Commencement Speaker After She Calls AI the ‘Next Industrial Revolution’
    A commencement speaker at the University of Central Florida was booed, with graduating humanities students yelling out, "AI SUCKS!"
  • Open

    Yarbo responds to robot flaws that could mow down their owners
    A researcher found a host of vulnerabilities in Yarbo garden robots that could expose Wi-Fi passwords, hijack cameras, and run over their owners on command.
    A week in security (May 4 – May 10)
    A list of topics we covered in the week of May 4 to May 10 of 2026
  • Open

    InfoSec News Nuggets 05/11/2026
    Over 500 Organizations Hit in Years-Long Phishing Campaign SOCRadar reported that Operation HookedWing has stolen more than 2,000 credentials from more than 500 organizations across aviation, critical infrastructure, energy, logistics, government, financial services, and technology. The campaign has used GitHub domains, compromised servers, Microsoft and Outlook-themed lures, and personalized landing pages to make credential theft […] The post InfoSec News Nuggets 05/11/2026 appeared first on AboutDFIR - The Definitive Compendium Project.
  • Open

    Advancing Collective Defense with Project Glasswing
    No content preview

  • Open

    You Don’t Need a 0-Day for RCE: A Real-World Kill Chain
    No content preview
    How I Defeat Passkeys Nearly Every Time
    No content preview

  • Open

    📖 [The CloudSecList] Issue 337
    📖 [The CloudSecList] Issue 337 was originally published by Marco Lancini at CloudSecList on May 10, 2026.
  • Open

    Scientists Studied 906 Mafia Marriages and Found Something Surprising
    Scientists analyzed over 900 marriages within the ’Ndrangheta, one of the most infamous mafia syndicates, to understand how “matrimonial ties relate to power and cohesion within the organization.”

  • Open

    Active attack: Dirty Frag Linux vulnerability expands post-compromise risk
    Dirty Frag is a newly disclosed Linux local privilege escalation vulnerability affecting kernel networking and memory-fragment handling components including esp4, esp6, and rxrpc. The vulnerability enables reliable escalation from an unprivileged user to root and may be leveraged after initial compromise through SSH access, web shells, containers, or low-privileged accounts. Microsoft Defender is actively monitoring limited in-the-wild activity and provides detection coverage for exploitation attempts. The post Active attack: Dirty Frag Linux vulnerability expands post-compromise risk appeared first on Microsoft Security Blog.
  • Open

    University Claims Withholding Water From Nuclear Weapons Data Center Is 'Unlawfully Discriminatory' to Data Centers
    The University promised “to pursue all rights and claims for necessary relief” if a small Michigan community won’t pump water into a data center.
    Behind the Blog: Storage Woes and RSS
    This week, we discuss storage, RSS, and a big reporting project.
    'The Biggest Student Data Privacy Disaster in History': Canvas Hack Shows the Danger of Centralized EdTech
    Messages could include "medical circumstances, accessibility accommodations, disputes, sexual assault allegations," and more.
  • Open

    Otto Support - The Confused Deputy
    When an agent reads attacker-controlled content and acts on it using its own privileges, the user's name ends up on every audit log entry. From Microsoft Copilot to ConfusedPilot, this post walks through how confused deputy attacks work and the layered controls that help contain them.
  • Open

    Microsoft says Edge’s plaintext password behavior is “by design”
    A researcher found Edge loads saved passwords into computer memory when it starts, making them easier to steal if a device is already compromised.
    ShinyHunters escalates Canvas attacks with school login defacements
    Days after the first attack, ShinyHunters is applying pressure with ransom messages on school login portals.
  • Open

    CVE-2026-34354: Guardicore Local Privilege Escalation Vulnerability
    Read the technical details of a security vulnerability (CVE-2026-34354) in Akamai Guardicore Platform Agent for Windows — and get clear guidance on mitigation.
  • Open

    InfoSec News Nuggets 05/08/2026
    Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks Ivanti released May security updates for Endpoint Manager Mobile that fix five vulnerabilities, including CVE-2026-6973, a high-severity flaw exploited in targeted attacks. The bug requires admin privileges, but reporting indicates it may be tied to earlier EPMM flaws that allowed attackers to gain broader control of mobile […] The post InfoSec News Nuggets 05/08/2026 appeared first on AboutDFIR - The Definitive Compendium Project.
  • Open

    Zara - 197,376 breached accounts
    In April 2026, the fashion brand Zara was among a number of organisations targeted by the ShinyHunters extortion group as part of their "pay or leak" campaign. The group claimed the breach was related to a compromise of the Anodot analytics platform and subsequently published a terabyte of data allegedly including 95M support ticket records. The data contained 197k unique email addresses alongside product SKUs, order IDs and the market the support ticket originated in. Zara's parent company Inditex advised that the incident didn't affect passwords or payment information.

  • Open

    ICE Plans to Develop Own Smart Glasses to ‘Supplement’ Its Facial Recognition App
    A DHS official and another person who attended a recent conference described the plans to 404 Media.
    ‘HELLO BOSS’: Inside the Chinese Realtime Deepfake Software Powering Scams Around the World
    404 Media has obtained a copy of ‘Haotian AI’, a popular piece of realtime deepfake software marketed to scammers. It can turn a fraudster's face into anyone else's on WhatsApp, Zoom, and Teams.
    Scientists Gave ‘Aggressive’ Fish Psychedelic Drugs. A Breakthrough Came Next
    “We really had no idea what we were getting ourselves into,” said one researcher involved in the first-of-its-kind study that dosed fish with psilocybin, the component in magic mushrooms.
  • Open

    When prompts become shells: RCE vulnerabilities in AI agent frameworks
    New research exposes how prompt injection in AI agent frameworks can lead to remote code execution. Learn how these vulnerabilities work, what’s impacted, and how to secure your agents. The post When prompts become shells: RCE vulnerabilities in AI agent frameworks appeared first on Microsoft Security Blog.
    World Passkey Day: Advancing passwordless authentication
    This World Passkey Day, read how Microsoft is advancing passkey adoption to replace passwords, cut phishing risk, and deliver simpler, more secure sign-ins. The post World Passkey Day: Advancing passwordless authentication appeared first on Microsoft Security Blog.
  • Open

    ICYMI: April 2026 @AWS Security
    Read all about the latest AWS security features, compliance updates, and hands-on resources in our new, monthly digest posts. You’ll find expert blog posts, new service capabilities, code samples, and workshops. AWS Security Blog posts This month’s AWS Security Blog posts covered AI security, identity and access management, threat intelligence, data protection, and multicloud operations. […]  ( 112 min )
    AWS achieves SNI 27017, SNI 27018, and SNI 9001 certifications for the AWS Asia Pacific (Jakarta) Region
    Amazon Web Services (AWS) achieved three Standar Nasional Indonesia (SNI) certifications for the AWS Asia Pacific (Jakarta) Region: SNI ISO/IEC 27017:2015, SNI ISO/IEC 27018:2019, and SNI ISO 9001:2015. SNI represents Indonesia’s national standards framework, comprising standards that are broadly applicable across industries within the country. These certifications further demonstrate that AWS services meet nationally recognized […]  ( 106 min )
  • Open

    Crypto Prediction Markets Explained: How the Blockchain Is Reshaping Forecasting
    TL;DR Crypto prediction markets use blockchain technology to create liquid platforms for forecasting and hedging real-world events, driving massive growth… The post Crypto Prediction Markets Explained: How the Blockchain Is Reshaping Forecasting appeared first on Chainalysis.  ( 19 min )
  • Open

    Massive AI investment scam network spans 15,500 domains
    AI investment scammers abused the Keitaro ad-tracking platform to cloak their campaign, exposing it only to likely targets.
    If a fake moustache can fool age checks, is the Online Safety Act working?
    A UK report finds some progress since the Act came into force, but widespread workarounds, ongoing harm, and unresolved privacy concerns suggest the impact is still limited.
  • Open

    InfoSec News Nuggets 05/07/2026
    Claude AI Guided Hackers Toward OT Assets During Water Utility Intrusion Dragos reported that attackers used Claude and GPT models during an intrusion into a municipal water and drainage utility in Monterrey, Mexico. The AI tools helped the actor plan activity, build tooling, process victim data, and identify OT assets, including a SCADA and IIoT […] The post InfoSec News Nuggets 05/07/2026 appeared first on AboutDFIR - The Definitive Compendium Project.
  • Open

    Otto Support - SSRF and Token Passthrough with MCP
    SSRF and token passthrough are not new, but MCP servers are reintroducing them at scale. From a chained SSRF-to-RCE in mcp-atlassian to Microsoft's MarkItDown and OpenClaw, this post walks through three recent disclosures and the controls that actually prevent them.
  • Open

    Woflow - 447,593 breached accounts
    In March 2026, the AI-driven merchant data platform Woflow was named as a victim by the ShinyHunters data extortion group. The group subsequently published tens of thousands of files allegedly obtained from the company, comprising more than 2TB of data. The trove included hundreds of thousands of email addresses, names, phone numbers and physical addresses, with the data indicating it related to Woflow customers and, in turn, the customers of merchants using their platform.

  • Open

    The IGVM File Format
    This article presents the structure of the Independent Guest Virtual Machine (IGVM) file format, a binary file designed to define and securely launch the initial state of a virtual machine. It bundles all necessary components such as the BIOS/OVMF, kernel, and initial ramdisk, into a single file. We'll focus on a concrete example to understand the main structure of the file format.
  • Open

    New compliance guide available: ISO/IEC 42001:2023 on AWS
    We have released our latest compliance guide, ISO/IEC 42001:2023 on AWS, which provides practical guidance for organizations designing and operating an Artificial Intelligence Management System (AIMS) using AWS services. As organizations deploy AI and generative AI workloads in the cloud, aligning with globally recognized standards such as ISO/IEC 42001:2023 becomes an important step toward strengthening […]  ( 107 min )
  • Open

    Weekly Threat Bulletin – May 6th, 2026
    These are the top threats you should know about this week.
  • Open

    AI Survey: 50% of Organizations Struggle to Maintain Latency at Scale
    The Akamai State of AI Inference report captures real data from the field that describes how AI inference is being built and scaled in production today.
    Akamai Is the 2026 Gartner® Peer Insights™ Customers’ Choice for API Protection
    Read why Akamai was named the only Customers’ Choice in the 2026 Gartner Peer Insights Voice of the Customer for API Protection.
    Akamai Cloud Is Built for What Cloud Has Become (Updated May 2026)
    No content preview
  • Open

    Google Chrome’s silent 4GB AI download problem [updated]
    Google Chrome writes a 4GB AI model to users’ devices without asking, and reinstalls it if you delete it.
    Attackers adopt JavaScript runtime Bun to spread NWHStealer
    A legitimate developer tool is being repurposed by attackers to package and spread this Windows infostealer in harder-to-detect ways.
    Millions of students’ personal data stolen in major education breach
    ShinyHunters claims it stole personal data from 275 million users on Instructure’s Canvas platform across schools and education providers.
  • Open

    ​​Microsoft named an overall leader in KuppingerCole Analyst’s 2026 Emerging AI Security Operations Center (SOC) report ​​
    Microsoft is excited to be named an Overall Leader, and the Market Leader in the Kuppinger Cole Analyst’s 2026 Emerging AI Security Operations Center (SOC) report, as we see automation and AI as core components of the future of cybersecurity. The post ​​Microsoft named an overall leader in KuppingerCole Analyst’s 2026 Emerging AI Security Operations Center (SOC) report ​​ appeared first on Microsoft Security Blog.
    ClickFix campaign uses fake macOS utilities lures to deliver infostealers
    Threat actors are targeting macOS users with fake utility fixes that trick them into running malicious Terminal commands. This campaign evades traditional defenses by stealing credentials, wallets, and sensitive data. The post ClickFix campaign uses fake macOS utilities lures to deliver infostealers appeared first on Microsoft Security Blog.
  • Open

    Podcast: Flock Used Cameras at a Children’s Gymnastics Center for a Sales Pitch
    A Flock sales pitch; a retracted paper on ChatGPT; and Chinese interference in RightsCon.
    Man Finds $1 Million Worth of Yu-Gi-Oh Cards in a Dumpster
    It was already a sordid tale of online drama, blurry photographs, and erratic TikToks. Then his mom started posting.
  • Open

    Otto Support - Excessive Agency and Tool Privileges
    AI agents connected to too many tools don't just create risk, they've already caused real damage. From deleted databases to mass-wiped mailboxes, excessive agency has a track record. This post breaks down what it looks like in practice and how role-aware tool registration can help contain it.
    CVE-2026-42208: Pre-Authentication SQL Injection in LiteLLM Proxy
    Bishop Fox researchers confirmed a critical pre-authentication SQL injection in LiteLLM proxy affecting versions 1.81.16 through 1.83.6. Attackers can exploit it without credentials, and it blends into normal logs. In-the-wild exploitation was observed within 36 hours of the advisory going public.
  • Open

    Where to Build: A Data-Driven Guide to Blockchain Infrastructure for TradFi Tokenization
    This blog is a preview of our forthcoming report, “The New Rails: How Digital Assets Are Reshaping the Foundations of… The post Where to Build: A Data-Driven Guide to Blockchain Infrastructure for TradFi Tokenization appeared first on Chainalysis.  ( 15 min )
  • Open

    InfoSec News Nuggets 05/06/2026
    Palo Alto Networks warns of firewall RCE zero-day exploited in attacks Palo Alto Networks warned that attackers are exploiting CVE-2026-0300, a critical PAN-OS buffer overflow vulnerability affecting the User-ID Authentication Portal, also known as the Captive Portal. The flaw can allow unauthenticated remote code execution with root privileges on exposed PA-Series and VM-Series firewalls. This […] The post InfoSec News Nuggets 05/06/2026 appeared first on AboutDFIR - The Definitive Compendium Project.
  • Open

    LegionProxy - 10,144 breached accounts
    In April 2026, the commercial residential and ISP proxy network LegionProxy suffered a data breach. The incident exposed 10k email addresses, bcrypt password hashes, names and purchases.

  • Open

    Introducing AI traffic analysis dashboards for AWS WAF
    As AI agents, bots, and programmatic access become an increasingly significant portion of web traffic, organizations need better tools to understand, analyze, and manage this activity. Today, we’re excited to announce AI Traffic Analysis dashboards for AWS WAF protection packs—also known as web access control lists (web ACLs)—providing comprehensive visibility into AI bot and agent […]  ( 110 min )
    Five ways to use Kiro and Amazon Q to strengthen your security posture
    A Monday morning security alert flags unauthorized access attempts, security group misconfigurations, and AWS Identity and Access Management (IAM) policy violations. Your team needs answers fast. Security teams are using Kiro and Amazon Q Developer to handle repetitive tasks—scanning resources, drafting policies, and researching Common Vulnerabilities and Exposures (CVEs)—so engineers can focus on risk decisions […]  ( 122 min )
  • Open

    How Akamai's Zero Trust Framework Meets Critical U.S. Government Mandates
    No content preview
    The Other Side of the MCP Threat Conversation
    No content preview
  • Open

    UK iPhone and iPad Users Can Watch Porn Again
    Following the latest iOS update which requires UK mobile Apple device users to verify their ages, Pornhub’s parent company Aylo is lifting its ban—but only for people using iPads and iPhones.
    The AI Hard Drive Shortage Is Making It More Expensive and Harder to Archive the Internet
    The Internet Archive, Wikimedia, academics, and hobby archivists are having trouble finding hard drives or are having to pay extremely high prices for them.
  • Open

    Update WhatsApp now: Two new flaws could expose you to malicious files
    WhatsApp patches flaws that could expose users to malicious content and disguised malware.
  • Open

    InfoSec News Nuggets 05/05/2026
    Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise Microsoft detailed a large adversary-in-the-middle phishing campaign that targeted more than 35,000 users across more than 13,000 organizations in 26 countries. The campaign used code-of-conduct themed lures, CAPTCHA steps, and realistic enterprise-style messaging to push users through a token theft flow. […] The post InfoSec News Nuggets 05/05/2026 appeared first on AboutDFIR - The Definitive Compendium Project.
  • Open

    Vimeo - 119,167 breached accounts
    In April 2026, the ShinyHunters extortion group listed Vimeo on their extortion portal as part of their "pay or leak" campaign. They subsequently published hundreds of gigabytes of data, predominantly consisting of video titles, technical data and metadata. The data also included 119k unique email addresses, sometimes accompanied by names. Vimeo attributed the exposure to a breach of Anodot, a third-party analytics vendor, and advised the incident does not include "Vimeo video content, valid user login credentials, or payment card information".

  • Open

    Paramiko Security Audit
    The OSTIF collaborated with Quarkslab to conduct a security audit of Paramiko, a pure-Python implementation of SSHv2 that provides both client- and server-side functionality. Given the sensitivity and importance of the target, the review focused not only on Paramiko itself but also on its dependencies. The assessment covered its interaction with rust-openssl bindings, the use of secure entropy sources, adherence to constant-time requirements, as well as code quality, testing practices, and the CI/CD pipeline, with the goal of identifying opportunities for further hardening.
  • Open

    Securing open proxies in your AWS environment
    This article shows you how to identify and secure open proxies in your AWS environment to prevent abuse, protect your IP address reputation, and control costs. An open proxy is a server that forwards traffic on behalf of internet users without requiring authentication. While proxies can support legitimate use cases such as load balancing or […]  ( 109 min )
  • Open

    Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise
    Microsoft Defender Research observed a large-scale credential theft campaign that exemplifies this trend, using code of conduct-themed lures, a multi-step attack chain, and legitimate email services to distribute fully authenticated messages from attacker-controlled domains. The post Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise appeared first on Microsoft Security Blog.
  • Open

    Cyberattacks are raising your prices (Lock and Code S07E09)
    This week on the Lock and Code podcast, we speak with Eva Velasquez about small business cyberattacks and the "cyber tax" coming for us all.
    Thousands of Facebook accounts stolen by phishing emails sent through Google
    In an ongoing operation, hackers are hijacking Facebook accounts using Google AppSheet to send phishing emails that pass security checks.
    The 2026 World Cup scam economy is already running before the first whistle
    A four-part scam economy is already forming around the 2026 World Cup, using the tournament’s brand to sell everything from fake visas to worthless tokens.
    A week in security (April 27 – May 3)
    A list of topics we covered in the week of April 27 to May 3 of 2026
  • Open

    The New Ouroboros Technique and How It Fits in dMSA’s Security Model
    No content preview
    How a Streaming Company Scaled Akamai EdgeWorkers to 3 Trillion Requests
    No content preview
  • Open

    Azure Hacking: New Cloudfoxable Challenges
    Cloudfoxable started as a hands-on AWS security training tool. Now it's expanding. Bishop Fox has launched the first set of Azure challenges, giving security professionals a safe, intentionally misconfigured environment to explore identity-driven attack paths and privilege escalation in Azure.
  • Open

    InfoSec News Nuggets 05/04/2026
    Over 40,000 Servers Compromised in Ongoing cPanel Exploitation Attackers are exploiting CVE-2026-41940, a critical cPanel and WHM authentication bypass flaw that can give unauthenticated attackers administrative access to affected servers. Shadowserver reporting indicates more than 40,000 servers may already be compromised. This matters because cPanel often manages multiple websites, databases, and configurations from one place, […] The post InfoSec News Nuggets 05/04/2026 appeared first on AboutDFIR - The Definitive Compendium Project.
  • Open

    Reborn Gaming - 126 breached accounts
    In April 2026, the gaming community Reborn Gaming suffered a data breach due to a vulnerability in cPanel and WebHost Manager (WHM). The breach exposed 126 unique email addresses along with IP addresses and Steam IDs. Reborn Gaming self-submitted the data to Have I Been Pwned.

  • Open

    Marcus & Millichap - 1,837,078 breached accounts
    In April 2026, the commercial real estate brokerage firm Marcus & Millichap was named as one of multiple alleged victims of the ShinyHunters hacking and extortion group. Data alleged to have been obtained from the company was subsequently released publicly and included 1.8M unique email addresses, along with names, phone numbers and employment-related information including employer, job title and physical company address. In their disclosure notice, Marcus & Millichap advised that data which may have been accessed appeared limited to "company forms, templates, marketing materials, and general contact information".
  • Open

    3 easy-to-miss cybersecurity risks for small businesses
    Small business owners should be sure to fix these three non-technical risks that require little cybersecurity expertise.

  • Open

    📖 [The CloudSecList] Issue 336
    📖 [The CloudSecList] Issue 336 was originally published by Marco Lancini at CloudSecList on May 03, 2026.
  • Open

    ZenBusiness - 5,118,184 breached accounts
    In March 2026, the hacker and extortion group "ShinyHunters" claimed to have obtained a substantial corpus of data from ZenBusiness, a business formation and compliance platform. The group claimed the data had been exfiltrated from platforms including Snowflake, Mixpanel and Salesforce, and threatened to publish it if a ransom was not paid. The following month, after claiming payment had not been made, ShinyHunters publicly released the data. The collection amounted to many terabytes across thousands of files that appeared to originate from multiple systems and business functions, including leads, support records and other CRM-related data. The data contained approximately 5M unique email addresses, often accompanied by name and phone number depending on the source file.

  • Open

    Security posture improvement in the AI era
    It’s only been a few weeks since Anthropic announced the Claude Mythos Preview model and launched Project Glasswing with AWS and other leading organizations. This has generated a lot of discussion about the future of cybersecurity and what the ever-increasing capabilities of foundation models mean to organizations. As AWS CISO Amy Herzog pointed out in […]  ( 108 min )
    Announcing the ISO 31000:2018 Risk Management on AWS Compliance Guide
    AWS Security Assurance Services is announcing the release of our latest compliance guide, ISO 31000:2018 Risk Management on AWS, which provides practical guidance for organizations establishing and operating a risk management program in AWS environments using ISO 31000:2018 principles. The guide explains how organizations can integrate AWS services into their risk management processes to support […]  ( 107 min )
  • Open

    InfoSec News Nuggets 05/01/2026
    US ransomware negotiators get 4 years in prison over BlackCat attacks Two former incident response employees were sentenced to four years in prison each for participating in BlackCat ransomware attacks against five U.S. companies in 2023. The case stands out because it turns the usual insider risk story on its head: people trusted to help […] The post InfoSec News Nuggets 05/01/2026 appeared first on AboutDFIR - The Definitive Compendium Project.
  • Open

    Actively exploited cPanel bug exposes millions of websites to takeover
    A vulnerability in the cPanel/WHM admin interface lets attackers access websites without a username and password.
  • Open

    Aman - 215,563 breached accounts
    In April 2026, the ultra-luxury hotel brand Aman was named by ShinyHunters as the target of a "pay or leak" extortion campaign, with the data allegedly obtained from their Salesforce CRM. The data was subsequently leaked publicly and contained over 200k unique email addresses. Whilst not present on all records, the data also included genders, physical addresses, phone numbers, nationalities, dates of birth, spouse names and VIP status codes.

  • Open

    Chilling Effects in the Digital Age
    Senior research fellow Jon Penney spoke with Michael Geist on the Law Bytes podcast about his new book. The post Chilling Effects in the Digital Age appeared first on The Citizen Lab.
  • Open

    More PayPal emails hijacked to deliver tech support scams
    We investigate how scammers are abusing PayPal’s systems to push victims into calling fake support numbers.
  • Open

    InfoSec News Nuggets 04/30/2026
    Critical cPanel and WHM bug exploited as a zero-day, PoC now available cPanel says CVE-2026-41940 is an authentication bypass flaw affecting cPanel, WHM, and WP Squared, and BleepingComputer reports it has already been exploited in the wild, with one hosting provider seeing attempts as early as February. The issue lets attackers potentially take over the […] The post InfoSec News Nuggets 04/30/2026 appeared first on AboutDFIR - The Definitive Compendium Project.
  • Open

    Beyond the Ledger: Why Akamai Is Redefining How We Measure CLIMATE Impact
    No content preview
  • Open

    Introducing AIMap: Security Testing For AI Agent Infrastructure
    Attackers can already find, connect to, and probe your exposed AI agent infrastructure. AIMap gives defenders that same visibility. Built by Bishop Fox, this open-source tool discovers, scores, and tests exposed AI endpoints so you can understand your real attack surface before someone else does.

  • Open

    Auditing Application Permissions in Microsoft Entra ID: Hidden Risks, Pitfalls, and Quarkslab's QAZPT Tool
    This blog post explores Entra ID applications, the complexities of auditing application permissions in Microsoft Entra ID, highlighting hidden risks and pitfalls. It introduces Quarkslab's QAZPT tool, designed to compute and visualize effective permissions in an Entra ID tenant, providing insights into the full picture of permissions and inheritance paths.
  • Open

    Designing trust and safety into Amazon Bedrock powered applications
    Generative AI brings promising innovation, transforming how individuals and organizations approach everything from customer service to content creation and more. As AI continues to expand its capabilities, organizations are increasingly focused on how they can integrate the responsible AI concepts into the development lifecycle of their AI applications. Research from Accenture and Amazon Web Services […]  ( 109 min )
  • Open

    A New Study Shows How Ad-Based Technology is Used for Surveillance
    Citizen Lab director Ron Deibert recently spoke on All Things Considered about the Lab’s new investigation of Webloc, a geolocation surveillance system. The post A New Study Shows How Ad-Based Technology is Used for Surveillance appeared first on The Citizen Lab.
    Kill Bill C-22: Says Civil Society to Parliament
    A group of 25 rights and privacy organizations and experts delivered an open letter to Parliament calling for the full withdrawal of Bill C-22. The post Kill Bill C-22: Says Civil Society to Parliament appeared first on The Citizen Lab.
  • Open

    Weekly Threat Bulletin – April 29th, 2026
    These are the top threats you should know about this week.
  • Open

    InfoSec News Nuggets 04/29/2026
    Critical GitHub Vulnerability Exposed Millions of Repositories Researchers disclosed CVE-2026-3854, a critical flaw in GitHub’s internal Git infrastructure that could let any authenticated user execute arbitrary commands on backend servers with a single git push. Wiz said the bug affected both GitHub.com and GitHub Enterprise Server, and that on GitHub.com it exposed shared storage nodes […] The post InfoSec News Nuggets 04/29/2026 appeared first on AboutDFIR - The Definitive Compendium Project.

  • Open

    Australia’s Crypto Crossroads: Regulation is Here, Now Comes the Hard Part
    TL;DR Australian exchanges should not treat April 2027 as the first compliance date. AUSTRAC obligations and readiness expectations are already… The post Australia’s Crypto Crossroads: Regulation is Here, Now Comes the Hard Part appeared first on Chainalysis.  ( 13 min )
  • Open

    What the March 2026 Threat Technique Catalog update means for your AWS environment
    The AWS Customer Incident Response Team (AWS CIRT) regularly encounters patterns that repeat across their engagements when helping customers respond to security incidents. We’re passionate about making sure that information is widely accessible so that everyone can improve their security posture and their organization’s resilience to disruption. The primary method we use to share this […]  ( 109 min )
    Access control with IAM Identity Center session tags
    As organizations expand their Amazon Web Services (AWS) footprint, managing secure, scalable, and cost-efficient access across multiple accounts becomes increasingly important. AWS IAM Identity Center offers a centralized, unified solution for managing workforce access to AWS accounts. It simplifies authentication, enhances security, and provides a seamless user sign-in experience to AWS services across diverse environments. […]  ( 110 min )
  • Open

    The API Weak Spot: Study Shows AI Is Compounding Security Pressures
    Nearly 90% of businesses faced API security incidents last year at an average cost of US$700,000. A new study shows how AI is increasing API risks.

  • Open

    Pitney Bowes - 8,243,989 breached accounts
    In April 2026, the hacking collective ShinyHunters claimed to have obtained data from Pitney Bowes as part of a broader extortion campaign that also named several other organisations. After negotiations allegedly failed, the group publicly released the data which included 8.2M unique email addresses, along with names, phone numbers and physical addresses. A subset of the data also included Pitney Bowes employee records with job titles.
    ADT - 5,488,888 breached accounts
    In April 2026, home security firm ADT confirmed a data breach by ShinyHunters, which listed the company on its website as part of a "pay or leak" extortion attempt. The breach impacted 5.5M unique email addresses along with names, phone numbers and physical addresses. ADT also advised that "in a small percentage of cases, dates of birth and the last four digits of Social Security numbers or Tax IDs were included" and that it had contacted all affected people.
  • Open

    Optimize security operations through an AWS Security Hub POC
    April 27, 2026: This post was first published in September 2025 when the enhanced AWS Security Hub was in public preview. It has since been updated to reflect the general availability of Security Hub. This revision also provides a more detailed, step-by-step framework for planning your POC. AWS Security Hub prioritizes your critical security issues […]  ( 113 min )
    Can I do that with policy? Understanding the AWS Service Authorization Reference
    Understanding what AWS Identity and Access Management (IAM) policies can control helps you build better security controls and avoid spending time on approaches that won’t work. You’ve likely encountered questions like: Can I use AWS Organizations service control policies (SCPs) to prevent the creation of security groups that allow traffic from 0.0.0.0/0? Can I block […]  ( 112 min )
  • Open

    OFAC Updates Central Bank of Iran Designation Following Record $344 Million Tether Seizure amid Strait of Hormuz Toll Controversy
    On April 24, 2026, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) updated its designation of… The post OFAC Updates Central Bank of Iran Designation Following Record $344 Million Tether Seizure amid Strait of Hormuz Toll Controversy appeared first on Chainalysis.  ( 12 min )
  • Open

    Winning the Ransomware Race: The New Segmentation Partner Playbook
    No content preview

  • Open

    Udemy - 1,401,259 breached accounts
    In April 2026, online training company Udemy was the victim of a “pay or leak” extortion attempt perpetrated by the ShinyHunters group. The data was subsequently leaked publicly and contained 1.4M unique email addresses belonging to customers and instructors. The data also included names, physical addresses, phone numbers, employer information and instructor payout methods including PayPal, cheque and bank transfer.

  • Open

    📖 [The CloudSecList] Issue 335
    📖 [The CloudSecList] Issue 335 was originally published by Marco Lancini at CloudSecList on April 26, 2026.

  • Open

    U.S. Government Unveils Sweeping Enforcement Actions Against Southeast Asian Scam Centers and Crypto Fraud Networks
    TL;DR In a massive coordinated interagency effort, the Department of Justice (DOJ), the Department of the Treasury’s Office of Foreign… The post U.S. Government Unveils Sweeping Enforcement Actions Against Southeast Asian Scam Centers and Crypto Fraud Networks appeared first on Chainalysis.  ( 14 min )
    EU’s 20th Russia Sanctions Package Signals a New Era of Crypto-Specific Enforcement
    TL;DR The EU’s 20th Russia sanctions package introduces a total sectoral ban on Russia-based crypto service providers and decentralized platforms,… The post EU’s 20th Russia Sanctions Package Signals a New Era of Crypto-Specific Enforcement appeared first on Chainalysis.
  • Open

    Protecting your secrets from tomorrow’s quantum risks
    As outlined in the AWS post-quantum cryptography (PQC) migration plan, addressing the risk of harvest now, decrypt later (HNDL) attack is an important part of your post-quantum plan. Upgrading the client-side of your workloads to support quantum-resistant confidentiality is an important aspect of your side of the PQC shared responsibility model. Timelines to plan and […]  ( 112 min )
  • Open

    The Industrialization of Exploitation: Why Defensive AI Must Outpace Offensive AI
    Today, vulnerabilities can be discovered, connected, and operationalized at a speed that traditional security processes were never designed to match. Learn more.
  • Open

    Carnival - 7,531,359 breached accounts
    In April 2026, the notorious hacking collective ShinyHunters claimed they had obtained a substantial volume of data belonging to the Carnival cruise operator and attempted to extort the organisation to prevent the data from being leaked. The following week, the group published the data publicly, which contained 8.7M records with 7.5M unique email addresses. The data contained fields indicating it related to the Mariner Society loyalty program run by Holland America, a cruise line brand under Carnival, and included names, dates of birth, genders and data relating to status within the loyalty program. Carnival acknowledged a phishing incident involving a single user account and advised they were working to better understand the scope of the unauthorised activity.

  • Open

    AI threats in the wild: The current state of prompt injections on the web
    Posted by Thomas Brunner, Yu-Han Liu, Moni Pande At Google, our Threat Intelligence teams are dedicated to staying ahead of real-world adversarial activity, proactively monitoring emerging threats before they can impact users. Right now, Indirect Prompt Injection (IPI) is a top priority for the security community, anticipating it as a primary attack vector for adversaries to target and compromise AI agents. But while the danger of IPI is widely discussed, are threat actors actually exploiting this vector today – and if so, how? To answer these questions and to uncover real-world abuse, we initiated a broad sweep of the public web to monitor for known indirect prompt injection patterns. This is what we found.  The threat of indirect prompt injection Unlike a direct injection where a user …
  • Open

    Inside the KelpDAO Bridge Exploit: How ~$292 Million in rsETH Was Released Against a Non-Existent Burn
    TL;DR On April 18, 2026, attackers linked to North Korea’s Lazarus Group stole ~$292 million (116,500 rsETH) from KelpDAO’s LayerZero… The post Inside the KelpDAO Bridge Exploit: How ~$292 Million in rsETH Was Released Against a Non-Existent Burn appeared first on Chainalysis.  ( 15 min )
    $30 Billion and Counting: How Tokenized RWAs Are Becoming a Mainstream Investment for Institutional Capital
    This blog is a preview of our forthcoming report, “The New Rails: How Digital Assets Are Reshaping the Foundations of… The post $30 Billion and Counting: How Tokenized RWAs Are Becoming a Mainstream Investment for Institutional Capital appeared first on Chainalysis.  ( 15 min )
  • Open

    Edmonton Police Trial AI Facial Recognition Bodycams
    The Edmonton Police Service is trialing new bodycam facial recognition technology to identify what they have deemed “high-risk offenders.” Speaking to the CBC, senior research associate Kate Robertson says, “As someone who has been studying algorithmic policing technologies for nearly a decade, and [previously] a lawyer in Canada’s justice system, I have to say that […] The post Edmonton Police Trial AI Facial Recognition Bodycams appeared first on The Citizen Lab.
  • Open

    CVE-2026-33824: Remote Code Execution in Windows IKEv2
    In this excerpt of a TrendAI Research Services vulnerability report, Richard Chen and Lucas Miller of the TrendAI Research team detail a recently patched double free vulnerability in the Windows Internet Key Exchange (IKE) service. This bug was originally discovered by WARP & MORSE team at Microsoft. Successful exploitation could result in a crash of the IKEEXT service, or potentially arbitrary code execution. The following is a portion of their write-up covering CVE-2026-33824, with a few minimal modifications. A double free vulnerability has been reported in the Windows Internet Key Exchange (IKEv2) service. The vulnerability is due to an error when processing fragments. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets to the target server. …
  • Open

    Observability for Akamai Cloud: Get Started with Akamai Cloud Pulse
    No content preview
    A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202
    No content preview
  • Open

    Otto Support – An MCP, Agentic-AI Security Challenge
    Bishop Fox built a vulnerable MCP-based customer support tool and turned it into a security challenge. Explore how AI agents interact with tools, escalate privileges, and expose sensitive data. If you work with AI systems, this CTF shows exactly how these architectures fail in the real world.

  • Open

    The Hack That Exposed Syria’s Sweeping Security Failures
    Senior researcher Noura Aljizawi spoke to WIRED about a hack that revealed Syria’s fragile cybersecurity. The post The Hack That Exposed Syria’s Sweeping Security Failures appeared first on The Citizen Lab.
  • Open

    Weekly Threat Bulletin – April 22nd, 2026
    These are the top threats you should know about this week.
  • Open

    A technical walkthrough of multicloud full-stack security using AWS Security Hub Extended
    Building on our recent announcement of AWS Security Hub Extended —our full-stack enterprise security offering — we want to show you how we’re simplifying security procurement and operations for your multicloud environments. Whether you’re a security architect evaluating solutions or a CISO looking to streamline vendor management, this post walks through the streamlined experience that […]  ( 109 min )
    Winter 2025 SOC 1 report is now available with 184 services in scope
    Amazon Web Services (AWS) is pleased to announce that the Winter 2025 System and Organization Controls (SOC) 1 report is now available. The report covers 184 services over the 12-month period from January 1, 2025 – December 31, 2025, giving customers a full year of assurance. This report demonstrates our continuous commitment to adhering to […]  ( 107 min )
  • Open

    Understanding the CVE Ecosystem and NIST’s Changing Role
    NIST just announced it's prioritizing CVE enrichment for government systems and deprioritizing everything else. For security teams that rely on NVD data, the gap is real. Here's what changed, why it's been coming for years, and what your team should do to stay ahead of the risk.

  • Open

    CVE-2025-29635: Mirai Campaign Targets D-Link Devices
    No content preview
    Scaling Your Media Workloads: Introducing Akamai’s New 8-Card VPU Plan
    No content preview

  • Open

    How to clone an AWS CloudHSM cluster across Regions
    Important: As of January 1, 2025, Client SDK 3 tools (CMU and KMU) are no longer supported. This guide has been updated to use Client SDK 5 commands exclusively. Ensure you’re using the latest Client SDK 5 version (5.17 or later) for the most recent features and security improvements. You can use AWS CloudHSM to […]  ( 112 min )
  • Open

    The AI Threat Multiplier: Why Architectural Flaws Are the New Frontier
    AI has put an end to the era of evaluating CVEs in isolation. The most critical risks now emerge when legacy state machines meet asynchronous execution.

  • Open

    📖 [The CloudSecList] Issue 334
    📖 [The CloudSecList] Issue 334 was originally published by Marco Lancini at CloudSecList on April 19, 2026.

  • Open

    Sanctioned Russia-Linked Exchange Grinex Suspends Operations Following Alleged Cyberattack
    TL;DR Grinex, the sanctioned successor to the Russian exchange Garantex, suspended operations yesterday following a claimed 1 billion ruble ($13.7… The post Sanctioned Russia-Linked Exchange Grinex Suspends Operations Following Alleged Cyberattack appeared first on Chainalysis.  ( 12 min )
  • Open

    Amtrak - 2,147,679 breached accounts
    In April 2026, the hacking group ShinyHunters claimed they had breached Amtrak. The group typically compromises organisations' Salesforce instances before demanding a ransom and later, if not paid, dumping the data publicly. They subsequently published the alleged data which contained over 2M unique email addresses along with names, physical addresses and customer support records.

  • Open

    Taking Maestro in Stride: AI Threat Modeling Frameworks
    AI agents don’t fit traditional threat models. They act like users, services, and data pipelines at once. Learn why STRIDE alone falls short, how MAESTRO fills the gaps, and why modern AI systems must be treated as insider threats.
  • Open

    McGraw Hill - 13,500,136 breached accounts
    In April 2026, education company McGraw Hill confirmed a data breach following an extortion attempt. Attributed to a Salesforce misconfiguration, the company stated the incident exposed "a limited set of data from a webpage hosted by Salesforce on its platform". More than 100GB of data was later publicly distributed, containing 13.5M unique email addresses across multiple files, with additional fields such as name, physical address and phone number appearing inconsistently across some records.

  • Open

    Obfuscation vs the Optimizer: An LLVM Middle-End Arms Race
    How one Commit Broke Obfuscation: A blog post exploring the role of compilers and optimizations in the field of obfuscation and de-obfuscation.
  • Open

    Weekly Threat Bulletin – April 15th, 2026
    These are the top threats you should know about this week.
    Azure-Hosted Scanning Cluster Launches WordPress Webshell Discovery Campaign
    Sensor Intel Series: March 2026 CVE Trends
  • Open

    From Stuxnet to Operation Epic Fury: The China-Iran Intelligence Nexus
    Senior research associate Emile Dirks spoke with Domino Theory about Xi Jinping’s view on national security. The post From Stuxnet to Operation Epic Fury: The China-Iran Intelligence Nexus appeared first on The Citizen Lab.

  • Open

    Beijing Codifies Repression of Overseas Activists
    Senior research associate Emile Dirks spoke with Domino Theory about a new law in China that threatens cross-border legal consequences. The post Beijing Codifies Repression of Overseas Activists appeared first on The Citizen Lab.
  • Open

    The April 2026 Security Update Review
    It’s time once again for Patch Tuesday, and this one is huge. We’ve also got multiple exploits in the wild, which adds another layer of urgency to this month’s release. Take a break from your regularly scheduled activities, and let’s take a look at the latest security patches from Adobe and Microsoft. If you’d rather watch the full video recap covering the entire release, you can check it out here: Adobe Patches for April 2026 For April, Adobe released 12 bulletins addressing 61 unique CVEs in Adobe Acrobat Reader, InDesign, InCopy, FrameMaker, Connect, ColdFusion, Bridge, Photoshop, Illustrator, Experience Manager Screens, and the Adobe DNG SDK. Three of the Cold Fusion bugs came through the TrendAI ZDI program. For this month, I’m introducing an Adobe table as well. I’d love to get your …
  • Open

    Anthropic’s Claude Mythos Preview: The AI Cybersecurity Inflection Point
    AI just crossed a threshold. Anthropic’s Claude Mythos can discover and chain vulnerabilities at scale—faster than teams can remediate. What does this mean for your security program, your providers, and your ability to keep up before attackers do?

  • Open

    BSIM explained once and for all!
    Since its initial released in December 2023, many people have used and built tools around the BSIM feature of Ghidra but up to this date its internals were unknown. This post brings some light on how BSIM works, theoretically and in it's C++ implementation.
2026-05-13T03:30:29.524Z osmosfeed 1.15.1