A new botnet called Void has emerged on the cybercrime underground, bringing a troubling twist to how attackers manage their operations remotely. Instead of relying on traditional servers that authorities can seize or shut down, Void Botnet routes its commands…
Hackers Use Fake Income Tax Assessment Pages to Infect Windows Systems
A new threat campaign is targeting Windows users in India by disguising malicious files as official income tax documents. Researchers have tracked the operation under the name TAX#TRIDENT, and it has shown the ability to pivot across multiple delivery methods…
How a Webmail Log File Became a Root-Level Backdoor
A forensic breakdown of how an attacker turned CyberPanel’s SnappyMail logging into a persistent webshell that survived every WordPress cleanup attempt. The post How a Webmail Log File Became a Root-Level Backdoor appeared first on Wordfence. This article has been…
A Bipartisan Amendment Would End Police License Plate Tracking Nationwide
One line tucked into a federal highway bill would strip funds from cities and states unless they kill their automated plate tracking programs—effectively banning the tech for all but toll collection. This article has been indexed from Security Latest Read…
IT Security News Hourly Summary 2026-05-21 00h : 4 posts
4 posts were published in the last hour 21:55 : IT Security News Daily Summary 2026-05-20 21:34 : Browser Threats Are Expanding the SMB Attack Surface 21:34 : PinTheft: Another Linux Privilege Escalation, Another Working Exploit, This Time Targeting Arch…
IT Security News Daily Summary 2026-05-20
168 posts were published in the last hour 21:34 : Browser Threats Are Expanding the SMB Attack Surface 21:34 : PinTheft: Another Linux Privilege Escalation, Another Working Exploit, This Time Targeting Arch 21:34 : Trapdoor Android Ad Fraud Operation Uses…
Browser Threats Are Expanding the SMB Attack Surface
Palo Alto Networks warns that browser-based attacks, AI phishing, and malicious extensions are creating growing cybersecurity risks for SMBs. The post Browser Threats Are Expanding the SMB Attack Surface appeared first on eSecurity Planet. This article has been indexed from…
PinTheft: Another Linux Privilege Escalation, Another Working Exploit, This Time Targeting Arch
PinTheft is a Linux LPE flaw in the RDS subsystem with public exploit code. Arch Linux users face the highest risk and should patch immediately. The wave of Linux local privilege escalation vulnerabilities showing up with working exploit code is…
Trapdoor Android Ad Fraud Operation Uses 455 Malicious Apps to Generate Fake Clicks
A large-scale ad fraud operation called Trapdoor has been discovered targeting Android users through 455 malicious apps, quietly generating fake ad clicks and draining real advertising budgets across the digital ecosystem. At its peak, the operation produced 659 million fraudulent…
Even Claude agrees: hole in its sandbox was real and dangerous
Another day, another AI bug silently fixed with no CVE and no public disclosure This article has been indexed from www.theregister.com – Articles Read the original article: Even Claude agrees: hole in its sandbox was real and dangerous
Why Policy in Amazon Bedrock AgentCore chose Cedar for securing agentic workflows
Agents have agency: they adapt and find multiple ways to solve problems. This autonomy creates a fundamental security challenge: the large language model (LLM) at the heart of the agent is non-deterministic, and its decisions can’t be predicted or guaranteed…
The npm Threat Landscape: Attack Surface and Mitigations (Updated May 20)
Unit 42 analyzes npm supply chain evolution post-Shai Hulud. Discover wormable malware, CI/CD persistence, multi-stage attacks and more. The post The npm Threat Landscape: Attack Surface and Mitigations (Updated May 20) appeared first on Unit 42. This article has been…
Microsoft Disrupts Malware-Signing Service Used by Ransomware Gangs
Microsoft disrupted the Fox Tempest operation after attackers abused Azure Artifact Signing to distribute malware disguised as trusted software. The post Microsoft Disrupts Malware-Signing Service Used by Ransomware Gangs appeared first on eSecurity Planet. This article has been indexed from…
IT Security News Hourly Summary 2026-05-20 21h : 7 posts
7 posts were published in the last hour 19:4 : Detecting Bugs and Vulnerabilities in Java With SonarQube 19:4 : Securing the American Experience 18:34 : PinTheft Linux Vulnerability Let Attackers Gain Root Access – PoC Released 18:34 : DevilNFC…
Detecting Bugs and Vulnerabilities in Java With SonarQube
The security audit report landed unexpectedly. It highlighted a critical vulnerability in our payment processing module. We had passed all unit tests. We had passed all integration tests. The code review looked clean. Yet the auditors found a hardcoded API…
Securing the American Experience
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Securing the American Experience
PinTheft Linux Vulnerability Let Attackers Gain Root Access – PoC Released
A proof-of-concept (PoC) exploit was published for a new Linux Local Privilege Escalation (LPE) vulnerability dubbed “PinTheft.” Discovered by Aaron Esau of the V12 security team, the flaw allows local attackers to gain root access by exploiting an RDS zerocopy…
DevilNFC Android Malware Uses Kiosk Mode to Trap Victims During NFC Relay Attacks
A dangerous new Android malware called DevilNFC has emerged, combining NFC relay attacks with a Kiosk Mode trap that locks victims inside a fake banking screen until their card data is stolen. The malware targets customers across Europe and LATAM…
Mini Shai Hulud: Compromised @antv npm packages enable CI/CD credential theft
Compromised @antv npm packages deploy the Mini Shai-Hulud payload to steal CI/CD secrets from Linux-based automation environments. The malware executes during npm install and targets credentials across GitHub, AWS, Kubernetes, Vault, npm, and 1Password platforms. The post Mini Shai Hulud:…
Mac Users Face New Malware Threat Spoofing Apple, Google, and Microsoft
A new SHub Reaper macOS infostealer spoofs prompts from Apple, Google, and Microsoft to steal passwords, crypto data, and business files from Macs. The post Mac Users Face New Malware Threat Spoofing Apple, Google, and Microsoft appeared first on TechRepublic.…
Microsoft Launches New Surface AI PCs for Business Buyers
Microsoft launched new Surface for Business PCs with Intel Core Ultra Series 3 chips, AI features, 5G options, and enterprise security tools. The post Microsoft Launches New Surface AI PCs for Business Buyers appeared first on TechRepublic. This article has…
CISA Contractor Exposed Sensitive Credentials in Public GitHub Repository
CISA is investigating after a contractor’s public GitHub repository exposed AWS GovCloud credentials, internal files, and passwords. The post CISA Contractor Exposed Sensitive Credentials in Public GitHub Repository appeared first on TechRepublic. This article has been indexed from Security Archives…
CISA Adds Seven Known Exploited Vulnerabilities to Catalog
CISA has added seven new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2008-4250 Microsoft Windows Buffer Overflow Vulnerability CVE-2009-1537 Microsoft DirectX NULL Byte Overwrite Vulnerability CVE-2009-3459 Adobe Acrobat and Reader Heap-Based Buffer Overflow…
Securing the gaming culture of cultures
Read about the unique challenges and rewards of securing gaming platforms and how to better protect gaming communities. The post Securing the gaming culture of cultures appeared first on Microsoft Security Blog. This article has been indexed from Microsoft Security…