A new wave of fraudulent Android apps quietly racked up millions of downloads on Google Play before being taken down. These apps, now tracked under the name CallPhantom, promised users something irresistible: the ability to look up the call history…
IT Security News Hourly Summary 2026-05-07 15h : 8 posts
8 posts were published in the last hour 13:4 : Palo Alto Networks Firewall Zero-Day RCE Vulnerability Exploited in the Wild Since April 13:4 : Critical Redis Vulnerabilities Enables Remote Code Execution Attacks 13:4 : WatchGuard Agent Vulnerabilities Let Attackers…
Hackers Abuse Google Ads to Steal Users GoDaddy ManageWP login Credentials
Hackers are using fake Google ads to steal login credentials from ManageWP users, GoDaddy’s popular platform for managing WordPress websites from a single dashboard. The campaign, which researchers have dubbed “WrongPress,” plants a fraudulent sponsored search result directly above the…
Palo Alto Networks Firewall Zero-Day RCE Vulnerability Exploited in the Wild Since April
A critical zero-day vulnerability in Palo Alto Networks PAN-OS software has been actively exploited by a likely state-sponsored threat actor since at least April 2026, the company revealed in a security advisory published on May 6, 2026. Tracked as CVE-2026-0300,…
Critical Redis Vulnerabilities Enables Remote Code Execution Attacks
Five dangerous vulnerabilities in Redis expose Redis Cloud, Redis Software, and all open-source community editions to potential remote code execution, giving authenticated attackers a direct path to compromise affected systems. All require authenticated access to exploit, but successful exploitation can…
WatchGuard Agent Vulnerabilities Let Attackers Grant Full SYSTEM Privileges on Windows
WatchGuard has released urgent security updates to address multiple high-severity vulnerabilities affecting the WatchGuard Agent on Windows. The most critical of these flaws allows authenticated local attackers to escalate their privileges to the highest system level, granting them complete control…
Hackers Weaponize Claude AI in Attacks on Water and Drainage Utilities
Hackers have abused commercial Claude AI models to help compromise a Mexican water and drainage utility’s IT network and probe systems connected to critical infrastructure. The attackers used Claude as an operational “copilot” to discover industrial systems, build custom tools,…
Day Zero Readiness: The Operational Gaps That Break Incident Response
Having an incident response retainer, or even a pre-approved external incident response firm, is not the same as being ready for an incident. A retainer means someone will answer the phone. Operational readiness determines whether that team can do meaningful…
ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories
Bad week. Turns out the easiest way to get hacked in 2026 is still the same old garbage: shady packages, fake apps, forgotten DNS junk, scam ads, and stolen logins getting dumped into Discord channels like it’s normal. Some of…
UK Online Safety Act effectiveness questioned
The UK’s Online Safety Act, which became effective in July 2025, has failed to deliver significant improvements in child protection online, according to a new survey by Internet Matters. This article has been indexed from CyberMaterial Read the original article:…
Lloyds, Google Cloud host UK finance cyber hackathon
Lloyds Banking Group partnered with Hack The Box and Google Cloud Security to host a two-day cybersecurity competition for the UK financial services sector, bringing together 33 teams from 16 organizations spanning banking, fintech, technology providers, and regulators. This article…
Google Chrome Accused of Silently Installing 4GB AI Model on User Devices
Cybersecurity researcher Alexander Hanff claims that Google Chrome automatically installs a 4GB Gemini Nano AI model without user notification or consent. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article:…
Webinar Today: Securing Identity Across Humans, Machines and AI
From service accounts to AI-driven processes, identity is evolving faster than most security programs can adapt. Discover strategies for reducing risk and regaining control. The post Webinar Today: Securing Identity Across Humans, Machines and AI appeared first on SecurityWeek. This…
Fake Claude AI Installers Spread Malware
A new malware campaign is exploiting interest in Claude AI by creating fraudulent installer pages that appear in Google Ads search results. This article has been indexed from CyberMaterial Read the original article: Fake Claude AI Installers Spread Malware
Scammers bypass AI email filters with hidden text
Cybercriminals have begun exploiting AI-powered email security systems using a technique called indirect prompt injection, according to new research from Sublime Security. This article has been indexed from CyberMaterial Read the original article: Scammers bypass AI email filters with hidden…
AI-Generated Apps Expose Corporate Data
Thousands of web applications built using AI-powered development platforms have exposed sensitive corporate data to the public internet, according to a new investigation. This article has been indexed from CyberMaterial Read the original article: AI-Generated Apps Expose Corporate Data
Daemon Tools Trojanized in Supply Chain Attack
Disc Soft has confirmed a supply chain attack that compromised its Daemon Tools Lite software, releasing a clean version within 12 hours of notification. This article has been indexed from CyberMaterial Read the original article: Daemon Tools Trojanized in Supply…
NCSC and Five Eyes warn on agentic AI risks
The National Cyber Security Centre (NCSC) and cyber agencies from the Five Eyes intelligence alliance have released guidance warning channel partners about emerging security threats from agentic AI systems. This article has been indexed from CyberMaterial Read the original article:…
Why Outdated Maintenance Software Is a Growing Ransomware Risk
Outdated maintenance software increases ransomware risk by exposing weak access controls, unpatched systems, and critical operational data to attackers. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article: Why Outdated…
Thousands of Vibe-Coded Apps Expose Corporate and Personal Data on the Open Web
Companies like Lovable, Base44, Replit, and Netlify use AI to let anyone build a web app in seconds—and in thousands of cases, spill highly sensitive data onto the public internet. This article has been indexed from Security Latest Read the…
From Android TVs to routers: the xlabs_v1 Mirai-based botnet built for DDoS attacks
A new Mirai‑based botnet, xlabs_v1, hijacks ADB‑exposed IoT devices for powerful DDoS attacks, with 21 flooding methods and DDoS‑for‑hire use. A new Mirai‑derived botnet called xlabs_v1 is hijacking internet‑exposed devices running Android Debug Bridge (ADB) and using them for large‑scale…
Smart Glasses for the Authorities
ICE is developing its own version of smart glasses, with facial recognition tied to various databases. This article has been indexed from Schneier on Security Read the original article: Smart Glasses for the Authorities
Cisco Patches High-Severity Vulnerabilities in Enterprise Products
Successful exploitation of the flaws could lead to code execution, server-side request forgery attacks, and denial-of-service conditions. The post Cisco Patches High-Severity Vulnerabilities in Enterprise Products appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Spring Vulnerabilities Open Door to Arbitrary File Access and GCP Secret Leaks
Security researchers have identified four new vulnerabilities in the Spring Cloud Config Server, ranging from medium to critical severity. These newly disclosed flaws could allow attackers to access arbitrary files, leak Google Cloud Platform (GCP) secrets, and manipulate system directories.…