CISA adds second critical flaw in Ivanti EPMM to exploited vulnerabilities catalog Cybersecurity Dive
cyberintel.kalymoon.com · 4643 articles · updated every 4 hours · grows forever
CISA adds second critical flaw in Ivanti EPMM to exploited vulnerabilities catalog Cybersecurity Dive
Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark Microsoft
Israel's Digital Health Stress Test: AI, Cybersecurity, and Wartime Care Redefine the 2026 Healthcare IT Market newswire.com
Also: Indictments in Theft Case, KelpDAO Restarts Operations This week, banking Trojan TCLBanker targeted crypto platforms, three people indicted in a violent digital assets-related robbery, Kelp DAO …
As Regulators Tighten Liability Rules, Banks Face Pressure to Justify Fraud Losses So far, banks have managed to strike a balance between fraud prevention and customer convenience, often accepting a c…
France's Mistral Makes Digital Sovereignty Case for a European Mythos The European Central Bank added to mounting warnings sent to financial institutions that they must urgently act to protect their s…
Lesson one for aspiring dark web kingpins: don't have your laundered gold bars shipped to your home address. Read more in my article on the Hot for Security blog.
Artificial intelligence is now capable of generating attack telemetry that looks and behaves like the real thing, and that is changing how security teams think about testing their defenses. In new wor…
A faulty update to Dell’s SupportAssist Remediation service is sending thousands of Dell and Alienware laptop users into endless Blue Screen of Death (BSOD) loops, with systems crashing every 30 minut…
A critical vulnerability in the widely used Exim mail server allows unauthenticated attackers to execute arbitrary code and fully compromise exposed servers. Federico Kirschbaum, head of the Security …
Imagine locking your organization’s sensitive data behind a heavy vault door, only to realize the locking mechanism is entirely missing. Security researchers at Fog Security recently uncovered a sever…
The cybercrime underworld is turning open-source supply chain attacks into a twisted competition. After months of infiltrating security tools and CI/CD pipelines, the notorious hacking group TeamPCP h…
Enterprise email infrastructure remains one of the most critical and vulnerable targets for cybercriminals. A highly severe security flaw has just been discovered in Canon’s GUARDIANWALL MailSuite, ex…
A sprawling supply chain attack has put software developers worldwide on high alert after hackers compromised more than 170 npm packages and two PyPI packages in a coordinated credential theft campaig…
Security researchers at Calif, a Palo Alto-based cybersecurity firm, have used techniques derived from an early version of Anthropic’s secretive Mythos AI model to uncover two previously undocumented …
A widely used JavaScript inter-process communication library has been weaponized again. Socket and Stepsecurity have confirmed that three newly published versions of node-ipc, a package with over 822,…
A newly uncovered malware framework is raising serious alarms across the cybersecurity community. Researchers have identified a previously unknown implant called TencShell, a sophisticated tool capabl…
New Fragnesia kernel flaw lets unprivileged local users escalate to root on Linux systems
Google’s Android Advanced Protection Mode is getting a new feature allowing trusted security experts to investigate potential spyware infections
Mustang Panda campaign deploys updated FDMTP backdoor against Asia-Pacific and Japan networks
A widely active phishing-as-a-service (PhaaS) operation known as FlowerStorm has begun using a browser-based virtual machine to conceal credential theft code, marking what researchers say is an escala…
Cofense has announced new advancements to its Phishing Defense Platform aimed at improving detection and response to AI-powered phishing attacks. The updates include AI-driven phishing detection, enha…