A newly identified botnet called xlabs_v1 has been found targeting Minecraft game servers by exploiting Android devices with the Android Debug Bridge (ADB) port left open and exposed to the internet. The botnet is a modified version of the well-known…
Malicious Tanstack Package Uses Postinstall Script to Steal Developer Environment Files
A malicious npm package impersonating the widely trusted TanStack project was discovered on April 29, 2026, silently stealing developer environment files the moment it was installed. The attacker registered the unscoped “tanstack” package name on npm, dressed it up as…
[un]prompted 2026 – Why Most ML Vulnerability Detection Fails
Author, Creator & Presenter: Jenny Guanni Qu, AI Researcher At Pebblebed Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’ YouTube Channel. Permalink The post [un]prompted 2026 –…
⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & More
This week, the shadows moved faster than the patches. While most teams were still triaging last month’s alerts, attackers had already turned control panels into kill switches, kernels into open doors, and open-source pipelines into silent delivery systems. The game…
New MOVEit vulnerabilities prompt urgent patch warning
Progress Software warned customers to immediately upgrade to versions of the file-transfer tool that fix the serious flaws. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: New MOVEit vulnerabilities prompt urgent patch warning
IT Security News Hourly Summary 2026-05-04 18h : 16 posts
16 posts were published in the last hour 15:32 : Wiz ZeroDay.Cloud Event Reveals 20-Year-Old PostgreSQL Vulnerabilities 15:32 : DHS Demanded Google Surrender Data on Canadian’s Activity, Location Over Anti-ICE Posts 15:32 : Cyberattacks are raising your prices (Lock and…
Critical vulnerability in cPanel leads to widespread exploitation
Researchers warn that threat activity continues to surge, including brute force attacks and ransomware. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Critical vulnerability in cPanel leads to widespread exploitation
Wiz ZeroDay.Cloud Event Reveals 20-Year-Old PostgreSQL Vulnerabilities
Researchers revealed 20-year-old PostgreSQL flaws at Wiz ZeroDay.Cloud event, exposing critical bugs in pgcrypto and prompting urgent patches for database security. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article:…
DHS Demanded Google Surrender Data on Canadian’s Activity, Location Over Anti-ICE Posts
Using a 1930s trade law, Homeland Security targeted the man—who hasn’t entered the US in more than a decade—following posts on X condemning the killings of Renee Good and Alex Pretti. This article has been indexed from Security Latest Read…
Cyberattacks are raising your prices (Lock and Code S07E09)
This week on the Lock and Code podcast, we speak with Eva Velasquez about small business cyberattacks and the “cyber tax” coming for us all. This article has been indexed from Malwarebytes Read the original article: Cyberattacks are raising your…
Shadow IT has given way to shadow AI. Enter AI-BOMs
‘If you don’t have visibility, you can’t understand what to protect’ When it comes to securing enterprise supply chains, now heavily infused with AI applications and agents, a software bill of materials (SBOM) no longer provides a complete inventory of…
FlowCarp Identifies Protocols
I am thrilled to announce the release of a brand new tool called FlowCarp! FlowCarp is a simple command line tool that performs a very complicated task. It identifies the application layer protocol in network traffic without relying on port…
How cyber insurance helped with breach recovery — or not
<p>Since its emergence in the 1990s, cyber insurance has become a critical part of enterprise risk management. Initially an offshoot of errors and omissions insurance, cyber insurance coverage, which was limited in scope, swiftly matured as companies became more reliant…
DHS Demanded Google Surrender Data on Canadian’s Activity, Location Over Anti-ICE Posts
Using a 1930s trade law, Homeland Security targeted the man—who hasn’t entered the US in more than a decade—following posts on X condemning the killings of Renee Good and Alex Pretti. This article has been indexed from Security Latest Read…
Ten Great Cybersecurity Job Opportunities
Security Boulevard is now providing a weekly cybersecurity jobs report through which opportunities for cybersecurity professionals will be highlighted as part of an effort to better serve our audience. Our goal in these challenging economic times is to make it…
npm Supply Chain Attack Spreads Worm Malware Stealing Developer Secrets Across Compromised Packages
Worry grows within the cybersecurity community following discovery of a fresh supply chain threat aimed at the npm platform, where self-replicating malicious code infiltrates public software libraries to harvest confidential information from coders. Though broad consumer impact seems minimal,…
Owl IRD enables one-way forensic data transfer for incident response teams
Owl Cyber Defense has announced the launch of its Incident Response Diode (IRD), a pocket-sized protocol filtering diode (PFD) designed for incident response and forensics teams. The Owl IRD was developed to help users securely move evidence from compromised endpoints…
Operant AI Endpoint Protector secures AI agents and MCP tools
Operant AI has launched Operant Endpoint Protector, a new addition to its AI Defense Platform that enables enterprise IT and security teams to discover, detect, and defend against threats across every AI tool, coding agent, and Model Context Protocol (MCP)-connected…
DigiCert breached via malicious screensaver file
A targeted social engineering attack against DigiCert’s support channel led to the compromise of internal systems and the unauthorized issuance of EV Code Signing certificates. DigiCert is a global Certificate Authority (CA) providing digital trust services, specializing in TLS/SSL certificates,…
Penske Logistics launches platform for real-time supply chain visibility
Penske Logistics has announced the launch of Supply Chain Insight, a secure technology platform and mobile application that provides customers with a real-time view of their supply chain operations across transportation and warehousing. Supply chain leaders are under increased pressure…
Critical MOVEit Automation auth bypass vulnerability fixed (CVE-2026-4670)
Progress Software has fixed a critical authentication bypass (CVE-2026-4670) and a privilege escalation (CVE-2026-5174) vulnerability in MOVEit Automation, exploitation of which “may lead to unauthorized access, administrative control, and data exposure.” The vulnerabilities were reported privately by Airbus researchers and…
New MOVEit vulnerabilities prompt urgent vendor warning
Progress Software warned customers to immediately upgrade to versions of the file-transfer tool that fix the serious flaws. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: New MOVEit vulnerabilities prompt urgent vendor warning
DShield Honeypot Update, (Mon, May 4th)
This week, I will release a few updates to our DShield honeypot. The update should happen automatically if you have “automatic updates” enabled on your system. There will be two major changes: This article has been indexed from SANS Internet…
US healthcare marketplaces shared citizenship and race data with ad tech giants
Virginia and Washington D.C. paused the data collection and sharing, after Bloomberg’s investigation found their health insurance marketplaces were sharing users’ information with advertisers. This article has been indexed from Security News | TechCrunch Read the original article: US healthcare…