CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// Cyber
Intel Feed

cyberintel.kalymoon.com  ·  21548 articles  ·  updated every 4 hours · grows forever

21548Total
18590Full Text
May 20, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
⬡ Vulnerabilities & CVEs May 11, 2026
CVE-2026-41951 | GROWI up to 7.5.0 path traversal (EUVD-2026-29047)

A vulnerability has been found in GROWI up to 7.5.0 and classified as critical . Affected is an unknown function. The manipulation leads to path traversal. This vulnerability is listed as CVE-2026-419…

VulDB Read →
⬡ Vulnerabilities & CVEs May 11, 2026
CVE-2026-8318 | VectifyAI PageIndex up to f50e52975313c6716c02b20a119577a1929decba PDF Table of Contents pageindex/page_index.py toc_transformer infinite loop (Issue 174)

A vulnerability was found in VectifyAI PageIndex up to f50e52975313c6716c02b20a119577a1929decba and classified as problematic . Affected by this vulnerability is the function toc_transformer of the fi…

VulDB Read →
⬡ Vulnerabilities & CVEs May 11, 2026
CVE-2026-8319 | aiwaves-cn agents up to e8c4e3c2d19739d3dff59e577d1c97090cc15f59 cheshire_cat_core stray_cat.py recall_relevant_memories_to_working_memory resource consumption (Issue 219)

A vulnerability was found in aiwaves-cn agents up to e8c4e3c2d19739d3dff59e577d1c97090cc15f59 . It has been classified as problematic . Affected by this issue is the function recall_relevant_memories_…

VulDB Read →
⬡ Vulnerabilities & CVEs May 11, 2026
CVE-2026-8320 | jishenghua jshERP up to 3.6 updatePlatformConfigByKey Endpoint UserService.java getUserByWeixinCode weixinUrl server-side request forgery (Issue 152)

A vulnerability was found in jishenghua jshERP up to 3.6 . It has been declared as critical . This affects the function getUserByWeixinCode of the file jshERP-boot/src/main/java/com/jsh/erp/service/Us…

VulDB Read →
⬡ Vulnerabilities & CVEs May 11, 2026
CVE-2026-8321 | inkeep agents 0.58.14 runAuth Middleware runAuth.ts createDevContext authentication bypass (Issue 3024)

A vulnerability was found in inkeep agents 0.58.14 . It has been rated as critical . This vulnerability affects the function createDevContext of the file agents-api/src/middleware/runAuth.ts of the co…

VulDB Read →
⬡ Vulnerabilities & CVEs May 11, 2026
CVE-2026-4802 | Cockpit-HQ Cockpit System Logs User Interface os command injection

A vulnerability categorized as critical has been discovered in Cockpit-HQ Cockpit . This issue affects some unknown processing of the component System Logs User Interface . Executing a manipulation ca…

VulDB Read →
⬡ Vulnerabilities & CVEs May 11, 2026
CVE-2026-7818 | pgAdmin 4 up to 9.14 FileBackedSessionManager path traversal

A vulnerability identified as critical has been detected in pgAdmin 4 up to 9.14 . Impacted is an unknown function of the component FileBackedSessionManager . The manipulation leads to path traversal.…

VulDB Read →
◉ Threat Intelligence May 11, 2026
The State of Ransomware – Q1 2026

Key Findings Ransomware in Q1 2026: Consolidation at Scale During the first quarter of 2026, we monitored more than 70 active data leak sites (DLS) that collectively listed 2,122 new victims. This fig…

Check Point Research Read →
◉ Threat Intelligence May 11, 2026
11th May – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 11th May, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Instructure, the US education technology company behin…

Check Point Research Read →
◉ Threat Intelligence May 11, 2026
GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access

Executive Summary Since our February 2026 report on AI-related threat activity, Google Threat Intelligence Group (GTIG) has continued to track a maturing transition from nascent AI-enabled operations …

Mandiant Read →
◉ Threat Intelligence May 11, 2026
Why we use CAPTCHAs, (Mon, May 11th)

A few months ago, I implemented Cloudflare&#;x26;#;39;s Turnstile CAPTCHA on some pages. The reason for implementing these CAPTCHAs is obvious: Bots make up a large percentage of traffic and affect si…

SANS ISC Read →
◇ Industry News & Leadership May 11, 2026
The Threat Window Is Shrinking. The Response Gap Isn't

Patching Workflows Built for Weekly Cycles Can't Survive an Era of Hourly Exploits AI is shrinking the window between vulnerability disclosure and active exploitation from weeks to hours. But remediat…

Data Breach Today Read →
◇ Industry News & Leadership May 11, 2026
Vidar Malware Targets Browser Credentials, Cookies, Crypto Wallets, and System Data

A long-active information stealer is making headlines again, and this time it is targeting more than just passwords. Vidar malware, a credential-harvesting tool in circulation since late 2018, has bee…

Cybersecurity News Read →
◇ Industry News & Leadership May 11, 2026
macOS Malware Leverages Google Ads and Legitimate Claude.ai Shared Chats to Deliver Malware

Threat actors are executing a sophisticated malvertising campaign targeting macOS users via poisoned Google Ads and deceptive artificial intelligence applications. Researchers recently uncovered an op…

Cybersecurity News Read →
◇ Industry News & Leadership May 11, 2026
Hackers Use Weaponized JPEG File to Deploy Trojanized ScreenConnect Malware

A sophisticated new cyberattack campaign is targeting Windows systems using a fake image file to sneak dangerous malware past security defenses. The operation, named Operation SilentCanvas, tricks vic…

Cybersecurity News Read →
◇ Industry News & Leadership May 11, 2026
GhostLock Attack Leverages Windows file-sharing to Lock Files Access Like Ransomware

Traditional ransomware disrupts organizations by encrypting data and demanding payment for decryption keys. However, a newly disclosed technique called GhostLock demonstrates a fundamentally different…

Cybersecurity News Read →
◇ Industry News & Leadership May 11, 2026
Lyrie.ai Joins First Batch of Anthropic’s Cyber Verification Program

Dubai, UAE, May 11th, 2026, CyberNewswire Dubai-founded OTT Cybersecurity LLC also unveils the Agent Trust Protocol (ATP), the first open cryptographic standard for AI agent identity, scope, and actio…

Cybersecurity News Read →
◇ Industry News & Leadership May 11, 2026
Trending Hugging Face Repo With 200k Downloads Executes Malware on Windows Machines

A popular artificial intelligence repository on Hugging Face was recently found hiding dangerous malware that targeted Windows users. The repository, named “Open-OSS/privacy-filter,” had racked up ove…

Cybersecurity News Read →
◇ Industry News & Leadership May 11, 2026
Crimenetwork Takedown Exposes 22,000 Users and Over 100 Illegal Sellers

In a massive, internationally coordinated operation, the Frankfurt am Main Public Prosecutor’s Office – Central Office for Combating Internet Crime (ZIT) and the Federal Criminal Police Office (BKA) h…

Cybersecurity News Read →
◇ Industry News & Leadership May 11, 2026
ShinyHunters Breaches Instructure Canvas LMS Through Free-For-Teacher Account Program

The infamous hacking group ShinyHunters has struck again, this time targeting Instructure, the company behind Canvas Learning Management System (LMS). In early May 2026, Instructure confirmed unauthor…

Cybersecurity News Read →
◇ Industry News & Leadership May 11, 2026
Hackers Use Fake DeepSeek TUI GitHub Repositories to Deliver Malware

Hackers are once again targeting developers and AI enthusiasts by impersonating popular open-source tools on GitHub. This time, the target is DeepSeek TUI, a legitimate terminal-based intelligent agen…

Cybersecurity News Read →
◇ Industry News & Leadership May 11, 2026
Hackers Use PlugX-Like DLL Sideloading Chain in Fake Claude Malware Campaign

Cybercriminals are getting creative with how they lure victims into downloading malware, and a new campaign involving a fake version of Anthropic’s Claude AI assistant is raising serious concerns. Att…

Cybersecurity News Read →
◇ Industry News & Leadership May 11, 2026
Police Shut Relaunched Crimenetwork Dark Web Marketplace

Spanish police have arrested the suspected administrator of German dark web marketplace Crimenetwork

Infosecurity Magazine Read →
◇ Industry News & Leadership May 11, 2026
Zara Data Breach Impacts Nearly 200,000 Customers

ShinyHunters gets away with emails and other data on 200,000 Zara customers

Infosecurity Magazine Read →
← Prev 113 / 898 Next →