Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks
Ivanti on Thursday published its May 2026 security updates for the Endpoint Manager Mobile (EPMM) product to address five vulnerabilities, including a zero-day exploited in…
Ivanti on Thursday published its May 2026 security updates for the Endpoint Manager Mobile (EPMM) product to address five vulnerabilities, including a zero-day exploited in…
Quasar Linux RAT (QLNX): A Fileless Linux Implant Built for Stealth and Persistence Pierluigi Paganini May 09, 2026 Researchers uncovered QLNX, a Linux RAT targeting…
Thariq Shihipar from Anthropic put out a thought-provoking article recently, where he argues we move from Markdown to HTML for most AI use-cases. I see…
That disconnect matters more now because the cost of failure remains high, while the fight for resources is only getting harder. IBM’s 2025 Cost of…
In 2026, the threat landscape operates as a single, connected system. Identity, malware, and infrastructure are now part of the same attack chain, executed at…
Recently, the Huntress Security Operations Center (SOC) team spent some time talking about what makes our endpoint detection and response (EDR) solution—and the team behind…
A malicious Hugging Face repository that reached the platform’s trending list impersonated OpenAI’s “Privacy Filter” project to deliver information-stealing malware to Windows users. The repository…
Let’s Encrypt temporarily suspended all certificate issuance on May 8, 2026, after engineers identified a critical issue involving a cross-signed certificate linking the organization’s Generation…
Cramming for finals is bad enough without the platform you use to do your schoolwork suddenly shutting down. Unfortunately for countless students across the US,…
A sophisticated Brazilian banking trojan named TCLBANKER, deployed through a trojanized Logitech installer and capable of hijacking victims’ WhatsApp and Outlook accounts to spread itself to…
Ravie LakshmananMay 08, 2026Malware / Threat Intelligence Cybersecurity researchers have disclosed details of a new Linux backdoor named PamDOORa that’s being advertised on the Rehub…
Hyperscaler cloud is incompatible with data sovereignty. That’s because, as US companies, the hyperscalers are potentially subject to US court orders that can compel them…