• Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

    Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

    Cybersecurity researchers have warned of an active malicious campaign that’s targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025. “PowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections,” Cisco Talos

    Read More

  • ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories

    ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories

    You know that feeling when you open your feed on a Thursday morning and it’s just… a lot? Yeah. This week delivered. We’ve got hackers getting creative in ways that are almost impressive if you ignore the whole “crime” part, ancient vulnerabilities somehow still ruining people’s days, and enough supply chain drama to fill a season of television…

    Read More

  • [Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment

    [Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment

    In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials: service accounts, API tokens, AI agent connections, andOAuth grants. When projects end or employees leave, most

    Read More

  • Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

    Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

    Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the service. The details of the vulnerabilities are below – CVE-2026-20184 (CVSS score: 9.8) – An improper certificate validation in the integration of single sign-on…

    Read More

  • UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a new campaign that has targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive data from Chromium-based web browsers and WhatsApp. The activity, which was observed between March and April

    Read More

  • n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

    n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

    Threat actors have been observed weaponizing n8n, a popular artificial intelligence (AI) workflow automation platform, to facilitate sophisticated phishing campaigns and deliver malicious payloads or fingerprint devices by sending automated emails. “By leveraging trusted infrastructure, these attackers bypass traditional security filters, turning productivity tools into delivery

    Read More

  • Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

    Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

    A recently disclosed critical security flaw impacting nginx-ui, an open-source, web-based Nginx management tool, has come under active exploitation in the wild. The vulnerability in question is CVE-2026-33032 (CVSS score: 9.8), an authentication bypass vulnerability that enables threat actors to seize control of the Nginx service. It has been codenamed MCPwn by Pluto Security. “

    Read More

  • Deterministic + Agentic AI: The Architecture Exposure Validation Requires

    Deterministic + Agentic AI: The Architecture Exposure Validation Requires

    Few technologies have moved from experimentation to boardroom mandate as quickly as AI. Across industries, leadership teams have embraced its broader potential, and boards, investors, and executives are already pushing organizations to adopt it across operational and security functions. Pentera’s AI Security and Exposure Report 2026 reflects that momentum: every CISO surveyed

    Read More

  • Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities

    Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities

    Microsoft on Tuesday released updates to address a record 169 security flaws across its product portfolio, including one vulnerability that has been actively exploited in the wild. Of these 169 vulnerabilities, 157 are rated Important, eight are rated Critical, three are rated Moderate, and one is rated Low in severity. Ninety-three of the flaws are

    Read More

  • OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams

    OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams

    OpenAI on Tuesday unveiled GPT-5.4-Cyber, a variant of its latest flagship model, GPT‑5.4, that’s specifically optimized for defensive cybersecurity use cases, days after rival Anthropic unveiled its own frontier model, Mythos. “The progressive use of AI accelerates defenders – those responsible for keeping systems, data, and users safe – enabling them to find and fix problems

    Read More