This media is not supported in your browser
VIEW IN TELEGRAM
βοΈ Your AI agents are only as smart as the context they operate onβMost security teams are racing to deploy AI, autonomous workflows, self-healing environments, and agents that triage before a human even sees the alert. But underneath all of it? Context that's fragmented, stale, and contradictor
The technology is ready. The foundation isn't.
The team at Axonius is hosting a live webinar on Tuesday, May 26 at 12 PM ET to dig into exactly this.
π AI is Only as Smart as Its Context: Building a Foundation for Trusted Automation. This webinar will cover:
β’ Why conflicting data causes AI agents to hallucinate, and how to fix it
β’ How to build multi-source consensus with verifiable provenance
β’ What decision-grade asset intelligence actually looks like in practice
If your team is serious about making AI-driven security actually work, this one is for you!
Register here: https://thn.news/trusted-automation
The technology is ready. The foundation isn't.
The team at Axonius is hosting a live webinar on Tuesday, May 26 at 12 PM ET to dig into exactly this.
π AI is Only as Smart as Its Context: Building a Foundation for Trusted Automation. This webinar will cover:
β’ Why conflicting data causes AI agents to hallucinate, and how to fix it
β’ How to build multi-source consensus with verifiable provenance
β’ What decision-grade asset intelligence actually looks like in practice
If your team is serious about making AI-driven security actually work, this one is for you!
Register here: https://thn.news/trusted-automation
π8π€―5π3π±2
π¨ WARNING: Microsoft confirmed active exploitation of a Windows flaw β CVE-2026-32202.
The bug stems from an incomplete fix, allowing attackers to steal credentials via SMB authentication when a malicious file is opened.
π Read details β https://thehackernews.com/2026/04/microsoft-confirms-active-exploitation.html
The bug stems from an incomplete fix, allowing attackers to steal credentials via SMB authentication when a malicious file is opened.
π Read details β https://thehackernews.com/2026/04/microsoft-confirms-active-exploitation.html
π₯8π6π2
π³ Entra ID Agent ID Administrator role flaw enabled service principal takeover.
Users could take over non-agent service principals, add credentials, and escalate privileges before Microsoftβs April 9, 2026 patch.
π See how the attack worked β https://thehackernews.com/2026/04/microsoft-patches-entra-id-role-flaw.html
Users could take over non-agent service principals, add credentials, and escalate privileges before Microsoftβs April 9, 2026 patch.
π See how the attack worked β https://thehackernews.com/2026/04/microsoft-patches-entra-id-role-flaw.html
π12π3
A user ran malware and no alerts fired...
As Ryan Boerner, Founder and CEO at Keep Aware, shows, the browser is now the real OS, but tools below it miss in-session actions where AI and scripts act as the user, breaking identity trust.
π Learn how browser-based attacks bypass modern security stacks β https://thehackernews.com/expert-insights/2026/04/work-moved-into-browser-security-didnt.html
As Ryan Boerner, Founder and CEO at Keep Aware, shows, the browser is now the real OS, but tools below it miss in-session actions where AI and scripts act as the user, breaking identity trust.
π Learn how browser-based attacks bypass modern security stacks β https://thehackernews.com/expert-insights/2026/04/work-moved-into-browser-security-didnt.html
π11π2π2π₯1
A Chinese national linked to Silk Typhoon has been extradited to the U.S. over alleged COVID-19 research cyberattacks.
Prosecutors say Xu Zewei exploited zero-days to breach vaccine research systems under direction of Chinaβs MSS.
π Details β https://thehackernews.com/2026/04/chinese-silk-typhoon-hacker-extradited.html
Prosecutors say Xu Zewei exploited zero-days to breach vaccine research systems under direction of Chinaβs MSS.
π Details β https://thehackernews.com/2026/04/chinese-silk-typhoon-hacker-extradited.html
π€―11π±6π4π3π€2π₯1
AI has erased the patch window.
Exploit discovery now takes minutes, not weeksβleaving organizations exposed before fixes exist. Security shifts from prevention to real-time containment.
π How AI-driven exploits are forcing an assume-breach model β https://thehackernews.com/2026/04/after-mythos-new-playbooks-for-zero.html
Exploit discovery now takes minutes, not weeksβleaving organizations exposed before fixes exist. Security shifts from prevention to real-time containment.
π How AI-driven exploits are forcing an assume-breach model β https://thehackernews.com/2026/04/after-mythos-new-playbooks-for-zero.html
π±9π₯7π6π1
β οΈ An unpatched critical flaw in Hugging Faceβs LeRobot enables remote code execution (CVSS 9.3).
Untrusted pickle over unauthenticated gRPC (no TLS) lets attackers take over servers, steal keys and models, and impact connected robots.
π Details β https://thehackernews.com/2026/04/critical-cve-2026-25874-leaves-hugging.html
Untrusted pickle over unauthenticated gRPC (no TLS) lets attackers take over servers, steal keys and models, and impact connected robots.
π Details β https://thehackernews.com/2026/04/critical-cve-2026-25874-leaves-hugging.html
π3β‘2π₯1π1
Security teams treat data as trusted once it crosses domains. Thatβs the β οΈ flaw.
53% still rely on manual processes, even as attacks hit 137 times a week and π€ AI drives response speeds on both sides. The gap isnβt identity. Itβs how data moves.
π Why data movement is the weakest layer in Zero Trust β https://thehackernews.com/2026/04/why-secure-data-movement-is-zero-trust.html
53% still rely on manual processes, even as attacks hit 137 times a week and π€ AI drives response speeds on both sides. The gap isnβt identity. Itβs how data moves.
π Why data movement is the weakest layer in Zero Trust β https://thehackernews.com/2026/04/why-secure-data-movement-is-zero-trust.html
π3π₯2
π¨ 9 days ago, a compromised OAuth token resulted in a breach at Vercel.
This is the reality facing security teams:
π₯· An infostealer hits a vendor in your SaaS ecosystem, the attacker works backwards from stolen access, and an old consent becomes the front door. πͺ
If you haven't made OAuth grant reviews a regular part of your on-going security program, you should.
Here's a step-by-step guide from Nudge Security to help you β https://thn.news/oauth-checklist
This is the reality facing security teams:
π₯· An infostealer hits a vendor in your SaaS ecosystem, the attacker works backwards from stolen access, and an old consent becomes the front door. πͺ
If you haven't made OAuth grant reviews a regular part of your on-going security program, you should.
Here's a step-by-step guide from Nudge Security to help you β https://thn.news/oauth-checklist
π7π₯1
This media is not supported in your browser
VIEW IN TELEGRAM
π VECT 2.0 ransomware canβt restore what it destroys.
Files over 131 KB are permanently destroyed, not encryptedβbecause required nonces are discarded during execution.
No attacker can recover the data, even after payment.
π Read β https://thehackernews.com/2026/04/vect-20-ransomware-irreversibly.html
Files over 131 KB are permanently destroyed, not encryptedβbecause required nonces are discarded during execution.
No attacker can recover the data, even after payment.
π Read β https://thehackernews.com/2026/04/vect-20-ransomware-irreversibly.html
π₯14π3π1π€1
Google flags indirect prompt injection as a primary attack vector for AI agents.
Attackers embed hidden commands in websites and documentsβseen by AI, not humansβredirecting execution away from user intent. Detections rose 32% in recent scans.
The risk sits in what models consume.
π How web content is being weaponized against AI systems β https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html#:~:text=Turning%20the%20Web%20Into%20a%20Trap%20for%20LLMs
Attackers embed hidden commands in websites and documentsβseen by AI, not humansβredirecting execution away from user intent. Detections rose 32% in recent scans.
The risk sits in what models consume.
π How web content is being weaponized against AI systems β https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html#:~:text=Turning%20the%20Web%20Into%20a%20Trap%20for%20LLMs
π4π€―4π₯2π1
β οΈ A Brazilian cybercrime group is back, targeting Minecraft players with a fake mod.
LofyStealer runs directly in memory, stealing passwords, tokens, and banking data across major browsers after a single install.
π Read more β https://thehackernews.com/2026/04/brazilian-lofygang-resurfaces-after.html
LofyStealer runs directly in memory, stealing passwords, tokens, and banking data across major browsers after a single install.
π Read more β https://thehackernews.com/2026/04/brazilian-lofygang-resurfaces-after.html
π13π₯3π€3
π₯ GitHub RCE via single git push!
CVE-2026-3854: Unsanitized push options let attackers run commands on backend servers, bypassing sandboxing (cross-tenant risk).
π Learn how header injection led to full compromise β https://thehackernews.com/2026/04/researchers-discover-critical-github.html
Patched within hours.
CVE-2026-3854: Unsanitized push options let attackers run commands on backend servers, bypassing sandboxing (cross-tenant risk).
π Learn how header injection led to full compromise β https://thehackernews.com/2026/04/researchers-discover-critical-github.html
Patched within hours.
π₯18π7π2β‘1
π LiteLLM CVE-2026-42208 exploited in ~36 hours.
A pre-auth SQL injection exposed credential tables with LLM and cloud keysβturning a simple flaw into account-level risk.
No PoC needed; advisory and schema were enough.
π Read details β https://thehackernews.com/2026/04/litellm-cve-2026-42208-sql-injection.html
A pre-auth SQL injection exposed credential tables with LLM and cloud keysβturning a simple flaw into account-level risk.
No PoC needed; advisory and schema were enough.
π Read details β https://thehackernews.com/2026/04/litellm-cve-2026-42208-sql-injection.html
π7β‘1
β οΈ CISA added two actively exploited vulnerabilities to KEV, affecting Windows and ScreenConnect.
A Windows flaw links to an incomplete patch tied to APT28 campaigns. ScreenConnect bugs are now used in Medusa ransomware attacks.
π Read β https://thehackernews.com/2026/04/cisa-adds-actively-exploited.html
A Windows flaw links to an incomplete patch tied to APT28 campaigns. ScreenConnect bugs are now used in Medusa ransomware attacks.
π Read β https://thehackernews.com/2026/04/cisa-adds-actively-exploited.html
π3
π¨ WARNING: cPanel patched an auth flaw affecting all supported versionsβforcing providers to restrict access.
Namecheap blocked ports 2083/2087, disabling control panel access until patches deployed.
π Read β https://thehackernews.com/2026/04/critical-cpanel-authentication.html
Namecheap blocked ports 2083/2087, disabling control panel access until patches deployed.
π Read β https://thehackernews.com/2026/04/critical-cpanel-authentication.html
π6π5π€2β‘1
Security teams close hundreds of vulnerabilities and still canβt prove theyβre safer.
Only ~2% of exposures matter when mapped to real attack paths and critical assets. The rest is noise from tools that miss context and exploitability.
π Why most platforms miss real risk β https://thehackernews.com/2026/04/what-to-look-for-in-exposure-management.html
Only ~2% of exposures matter when mapped to real attack paths and critical assets. The rest is noise from tools that miss context and exploitability.
π Why most platforms miss real risk β https://thehackernews.com/2026/04/what-to-look-for-in-exposure-management.html
π2
BeyondTrustβs latest Microsoft Vulnerabilities Report is out, and the numbers should concern every security leader.
Critical vulnerabilities doubled, Azure & Dynamics surged 9x, and 40% of all flaws were tied to Elevation of Privilege.
More insights: https://thn.news/msft-vuln-report
#MVR2026 #LeastPrivilege
Critical vulnerabilities doubled, Azure & Dynamics surged 9x, and 40% of all flaws were tied to Elevation of Privilege.
More insights: https://thn.news/msft-vuln-report
#MVR2026 #LeastPrivilege
π A wave of attacks is using layered npm dependencies to deliver hidden malware.
Fake SDKs, AI-assisted commits, and job scams all route through packages that pull second-stage payloads, stealing crypto wallets, credentials, and source code. Linked to North Korean campaigns targeting developers.
π Learn how these attacks connect across npm, PyPI, and GitHub β https://thehackernews.com/2026/04/new-wave-of-dprk-attacks-uses-ai.html
Fake SDKs, AI-assisted commits, and job scams all route through packages that pull second-stage payloads, stealing crypto wallets, credentials, and source code. Linked to North Korean campaigns targeting developers.
π Learn how these attacks connect across npm, PyPI, and GitHub β https://thehackernews.com/2026/04/new-wave-of-dprk-attacks-uses-ai.html
π±6β‘3π3
β οΈ ALERT β SAP related npm packages were just found shipping credential-stealing malware.
A preinstall script runs on install, steals tokens, and injects GitHub Actions to self-propagate, exfiltrating encrypted secrets via victim-owned repos.
π Read β https://thehackernews.com/2026/04/sap-npm-packages-compromised-by-mini.html
A preinstall script runs on install, steals tokens, and injects GitHub Actions to self-propagate, exfiltrating encrypted secrets via victim-owned repos.
π Read β https://thehackernews.com/2026/04/sap-npm-packages-compromised-by-mini.html
π±3