CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// Cyber
Intel Feed

cyberintel.kalymoon.com  ·  21237 articles  ·  updated every 4 hours · grows forever

21237Total
18378Full Text
May 19, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
⬡ Vulnerabilities & CVEs May 12, 2026
CVE-2026-43888 | Outline up to 1.6.x fs.createWriteStream path traversal (GHSA-hw32-2v7j-mgqc)

A vulnerability described as critical has been identified in Outline up to 1.6.x . Impacted is the function fs.createWriteStream . Such manipulation leads to path traversal. This vulnerability is docu…

VulDB Read →
⬡ Vulnerabilities & CVEs May 12, 2026
CVE-2026-7010 | HAARG HTTP::Tiny up to 0.092 on Perl HTTP Request Host response splitting (EUVD-2026-29344)

A vulnerability classified as critical has been found in HAARG HTTP::Tiny up to 0.092 on Perl. The affected element is an unknown function of the component HTTP Request Handler . Performing a manipula…

VulDB Read →
⬡ Vulnerabilities & CVEs May 12, 2026
CVE-2026-34960 | barebox up to 2026.04.0 DHCP dhcp_message_type out-of-bounds

A vulnerability classified as problematic was found in barebox up to 2026.04.0 . The impacted element is the function dhcp_message_type of the component DHCP Handler . Executing a manipulation can lea…

VulDB Read →
⬡ Vulnerabilities & CVEs May 12, 2026
CVE-2026-42888 | advplyr audiobookshelf up to 2.33.1 Podcast Creation Endpoint PodcastController.js path traversal (GHSA-phch-9734-wrp3)

A vulnerability, which was classified as critical , has been found in advplyr audiobookshelf up to 2.33.1 . This affects an unknown function of the file server/controllers/PodcastController.js of the …

VulDB Read →
⬡ Vulnerabilities & CVEs May 12, 2026
CVE-2026-41489 | Pi-hole up to 6.4.1 pihole-FTL-prestart.sh permission assignment (GHSA-6w8x-p785-6pm4)

A vulnerability, which was classified as problematic , was found in Pi-hole up to 6.4.1 . This impacts an unknown function of the file pihole-FTL-prestart.sh . The manipulation results in incorrect pe…

VulDB Read →
⬡ Vulnerabilities & CVEs May 12, 2026
CVE-2026-37630 | QuickJS-NG 0.12.1 js_mapped_arguments_mark privilege escalation (Issue 1400)

A vulnerability has been found in QuickJS-NG 0.12.1 and classified as critical . Affected is the function js_mapped_arguments_mark . This manipulation causes privilege escalation. This vulnerability i…

VulDB Read →
◉ Threat Intelligence May 12, 2026
Inside AD CS Escalation: Unpacking Advanced Misuse Techniques and Tools

Unit 42 analyzes AD CS exploitation through template misconfigurations and shadow credential misuse while offering behavioral detection for defenders. The post Inside AD CS Escalation: Unpacking Advan…

Palo Alto Unit 42 Read →
◉ Threat Intelligence May 12, 2026
Apple Patches Everything, (Mon, May 11th)

Apple today released its typical feature update across it&#;x26;#;39;s operating systems (iOS, iPadOS, macOS, tvOS, watchOS, vision OS). With this update, Apple patched 84 different vulnerabilities. U…

SANS ISC Read →
◉ Threat Intelligence May 12, 2026
ISC Stormcast For Tuesday, May 12th, 2026 https://isc.sans.edu/podcastdetail/9928, (Tue, May 12th)
SANS ISC Read →
◇ Industry News & Leadership May 12, 2026
Why Hospitals Must Rethink Cyber Resilience

In the face of relentless cyberattacks that threaten patient safety, hospitals must strengthen their resilience, with clinical continuity, secure backups and coordinated recovery emerging as critical …

Data Breach Today Read →
◇ Industry News & Leadership May 12, 2026
What Security Teams are Missing About AI Enabled Threats
Data Breach Today Read →
◇ Industry News & Leadership May 12, 2026
Tables Turned: Gentlemen Ransomware Group Suffers Data Leak

Internal Communications Dumped Online, Revealing Fresh Victims, Repeat Tactics Ransomware group The Gentlemen, a relative newcomer to the cybercrime scene, suffered a leak of its internal communicatio…

Data Breach Today Read →
◇ Industry News & Leadership May 12, 2026
Hackers Hid Inside Major UK Water Utility for Nearly 2 Years

ICO Warns Key Security Gaps Led to Exposed Data of Over 630,000 People A British regulator said a major water sector organization failed to use establish cybersecurity safeguards to secure sensitive d…

Data Breach Today Read →
◇ Industry News & Leadership May 12, 2026
Cloudflare Cuts 1,100, Arctic Wolf Axes 250 Amid AI Surge

Cloud Connectivity, Security Operations Providers Reportedly Chop 20%, 7% of Staff Cloudflare cut more than 1,100 workers from its 5,483-person staff, saying the layoffs will align Cloudflare's operat…

Data Breach Today Read →
◇ Industry News & Leadership May 12, 2026
84 TanStack npm Packages Hacked in Ongoing Supply-Chain Attack Targeting CI Credentials

A significant supply-chain compromise affecting 84 npm package artifacts across the TanStack namespace. The malicious versions, published to the npm registry at approximately 19:20 and 19:26 UTC, cont…

Cybersecurity News Read →
◇ Industry News & Leadership May 12, 2026
Hackers Abuse CVE-2026-41940 to Take Over cPanel and WHM Servers

A fatal authentication bypass vulnerability is actively affecting cPanel and WebHost Manager (WHM) servers worldwide. Tracked as CVE-2026-41940 and bearing an apocalyptic maximum severity score of 9.8…

Cybersecurity News Read →
◇ Industry News & Leadership May 12, 2026
Tech Can't Stop These Threats — Your People Can

Security controls can do only so much. Here are four attacks where your employees are usually your first, and only, line of cyber defense.

Dark Reading Read →
◇ Industry News & Leadership May 12, 2026
FCC Softens Ban on Foreign-Made Routers

The Federal Communications Commission eased some restrictions and pushed back deadlines for foreign router manufacturers, but the ban is still in place.

Dark Reading Read →
◇ Industry News & Leadership May 12, 2026
New GhostLock tool abuses Windows API to block file access

A security researcher has released a proof-of-concept tool named GhostLock that demonstrates how a legitimate Windows file API can be abused in attacks to block access to files stored locally or on SM…

Bleeping Computer Read →
◇ Industry News & Leadership May 12, 2026
Official CheckMarx Jenkins package compromised with infostealer

Checkmarx warned over the weekend that a rogue version of its Jenkins Application Security Testing (AST) plugin had been published on the Jenkins Marketplace. [...]

Bleeping Computer Read →
◇ Industry News & Leadership May 12, 2026
GM agrees to $12.75M California settlement over sale of drivers’ data

California Attorney General Rob Bonta announced a proposed $12.75 million settlement agreement with General Motors (GM) over allegations that the company violated the California Consumer Privacy Act (…

Bleeping Computer Read →
◌ Quantum Computing May 12, 2026
What Happens When Quantum Becomes Practical - The Quantum Insider

What Happens When Quantum Becomes Practical The Quantum Insider

The Quantum Insider Read →
◌ Quantum Computing May 12, 2026
Alice & Bob Secures $3.9M ARPA-E Award to Use Quantum Computing to Design Rare-Earth-Free Magnets - Alice & Bob

Alice & Bob Secures $3.9M ARPA-E Award to Use Quantum Computing to Design Rare-Earth-Free Magnets Alice & Bob

Alice & Bob Read →
◌ Quantum Computing May 12, 2026
2026 Global Quantum and AI Challenge Launches to Accelerate Practical Enterprise Use Cases - The Quantum Insider

2026 Global Quantum and AI Challenge Launches to Accelerate Practical Enterprise Use Cases The Quantum Insider

The Quantum Insider Read →
← Prev 93 / 885 Next →