GitHub Trending
Enterprise AI bastion host for secure AI API and MCP access, with unified proxying, RBAC, audit logs, rate limiting, and cost tracking across OpenAI, Anthropic, Gemini, and self-hosted LLMs.
GitHub Trending
The world's first autonomous AI agent with built-in cybersecurity. By OTT Cybersecurity LLC.
GitHub Trending
Find zero-days while you sleep. DeepZero is an automated vulnerability research framework that parses, decompiles, and analyzes thousands of Windows kernel drivers for exploitable IOCTLs natively using AI agents.
GitHub Trending
Hardware hacker’s flying probe automation stack for agent-driven target discovery, microscope mapping, safety-monitored CNC motion, probe review, and controlled pin probing.
GitHub Trending
Production-grade MCP server giving Claude 27 security intelligence tools across 21 APIs — CVE lookup, EPSS scoring, CISA KEV, MITRE ATT&CK, Shodan, VirusTotal, and more.
GitHub Trending
The ultimate steganography and digital forensics toolkit. Hide and extract data across images, audio, video, documents, and network packets, or run 11 advanced detection engines to uncover hidden payloads.
GitHub Trending
A minimal LLM-powered zero-day vulnerability scanner by AISLE.
GitHub Trending
High-performance OSINT/CTI framework for automated identity pivoting and risk analysis across 120+ sources.
The Hacker News
18h ago
Every security program is betting on the same assumption: once a system is connected, the problem is solved. Open a ticket, stand up a gateway, push the data through. Done. That assumption is wrong. It is also a major reason Zero Trust programs stall. New research my team just published puts numbers on it. The Cyber360: Defending the Digital Battlespace report, based on a survey of 500 security
Bleeping Computer
14h ago
A 19-year-old dual United States and Estonian citizen arrested in Finland earlier this month faces federal charges in the U.S. alleging he was a prolific member of the notorious Scattered Spider hacking collective. [...]
Bleeping Computer
16h ago
Microsoft says it will start blocking legacy TLS connections for POP and IMAP email clients in Exchange Online starting in July 2026. [...]
Bleeping Computer
20h ago
Microsoft has confirmed a new issue causing newly introduced Windows security warnings to display incorrectly when opening Remote Desktop (.rdp) files. [...]
Bleeping Computer
21h ago
After addressing a widespread outage that affected Outlook.com users worldwide on Monday, Microsoft has asked iPhone users to re-enter their credentials to regain access to their Outlook and Hotmail accounts via the default Mail app. [...]
SecurityWeek
11h ago
Boards may ignore alerts, but they listen to losses: new data from Resilience links security gaps directly to financial impact. The post Cyber Insurance Data Gives CISOs New Ammo for Budget Talks appeared first on SecurityWeek .
SecurityWeek
14h ago
Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. The post The Mythos Moment: Enterprises Must Fight Agents with Agents appeared first on SecurityWeek .
SecurityWeek
14h ago
Join the webinar to explore a practical, multi-layered roadmap to transition from fragmented AI usage to a governed, scalable ecosystem. The post Webinar Today: A Step-by-Step Approach to AI Governance appeared first on SecurityWeek .
SecurityWeek
16h ago
A member of Silk Typhoon, Xu Zewei is accused of launching cyberattacks against universities in the US. The post Alleged Chinese State Hacker Extradited to US appeared first on SecurityWeek .
Security Affairs
20h ago
Osservatorio Nessuno uncovered Morpheus spyware spreading via fake Android apps to steal data, highlighting rising covert surveillance tools. The non-partisan, non-religious, nonprofit organization Osservatorio Nessuno exposed a new spyware called Morpheus, distributed through fake Android apps posing as updates. Once installed, it can steal extensive data from the infected devices. The report shows strong demand [ ]
Wired Security
17h ago
AI agents may soon be buying your stuff for you. The FIDO Alliance has teamed up with Google and Mastercard to try to ensure that shopping in the near future isn't a complete disaster.
Infosecurity Magazine
21h ago
The National Cyber Security Centre has warned against measuring SOCs with ticket-based metrics
Rapid7 Blog
22h ago
Managed Detection and Response (MDR) is a cybersecurity service that combines human expertise and technology to detect, investigate, and respond to threats 24/7. I write this as a Field CISO at Rapid7, but also as someone who has had to live with the operational reality of MDR on the customer side. I have seen what happens when a service is a black box, when technology and service drift apart, and when cost, retention, and accountability are misaligned. That experience shapes the view in this piece: MDR selection is not just about buying monitoring in isolation, but about choosing a partner th
Malwarebytes Labs
20h ago
He created Gmail accounts, impersonated real US researchers, and convinced NASA, the military, and universities to hand over sensitive code.
Exploit-DB
6h ago
Atlona ATOMERX21 - Authenticated Command Injection
Simon Willison (AI sec)
16h ago
Five months in, I think I've decided that I don't want to vibecode — I want professionally managed software companies to use AI coding assistance to make more/better/cheaper software products that they sell to me for money. — Matthew Yglesias Tags: agentic-engineering , vibe-coding , ai-assisted-programming , ai
Help Net Security
BREAKING
1h ago
Academic researchers using commercial AI tools for literature review and idea generation are sending unpublished research questions, draft hypotheses, and proprietary domain knowledge into systems whose data handling they do not understand. A think-aloud study of 15 researchers documents the workarounds these users have built to manage what they see as unresolved confidentiality and output verification problems in tools including Research Rabbit and Elicit AI. The study, conducted by researchers at the University of Texas More The post AI prompt confidentiality and false citations worry resear
Help Net Security
BREAKING
1h ago
If you ask a CISO what keeps them up at night, the answer usually isn’t “lack of tools.” It’s uncertainty. Uncertainty about what they don’t see. Uncertainty about how far an attacker could move once inside. Uncertainty about whether identity programs are actually reducing risk, or just managing symptoms. Identity discovery sits at the center of that uncertainty. It is not glamorous. It does not get the same attention as AI-driven detection or zero trust More The post Identity discovery: The overlooked lever in strategic risk reduction appeared first on Help Net Security .
Help Net Security
7h ago
AI agents are beginning to shop, log in, and complete tasks with little direct input. That shift is pushing the security industry to rethink how trust works when actions are carried out on a user’s behalf. The FIDO Alliance has announced a set of initiatives to build shared standards for these interactions, covering how AI agents authenticate, follow instructions, and carry out transactions. “AI agents are quickly becoming part of how people get things done More The post FIDO Alliance wants to keep AI agents from going rogue on online payments appeared first on Help Net Security .
Help Net Security
12h ago
A coordinated police operation in Switzerland has targeted suspected members of the Black Axe criminal network. On 28 April 2026, authorities carried out house searches across several Swiss cantons, leading to 10 arrests, including the Black Axe ‘Regional Head’ for Southern Europe. Most of those arrested are reported to be of Nigerian origin. The suspects are accused of numerous crimes, including romance scams, other cyber fraud offences causing millions of Swiss francs in damages, and More The post Police arrest 10 suspected members of Black Axe cybercrime gang appeared first on Help Net Secu
Help Net Security
14h ago
The ShinyHunters group claims it has breached the Udemy, one of the world’s largest online learning platforms. According to Have I Been Pwned, the leaked dataset contained 1.4 million unique email addresses of customers and instructors, along with names, physical addresses, phone numbers, employer information, and instructor payout methods, including PayPal, cheque, and bank transfer. “Over 1.4M records containing PII and other internal corporate data have been compromised. Pay or Leak,” ShinyHunters wrote on their More The post ShinyHunters claims it stole 1.4 million records from Udemy appea
TechCrunch Security
12h ago
Despite promising to help determine what happened with the hacks targeting journalists and activists in Italy, Israeli American spyware maker Paragon has reportedly not responded to authorities’ requests for information.
TechCrunch Security
13h ago
The U.S. top court is expected to rule on whether to allow police to identify criminal suspects by dragnet searching the databases of tech giants.
Security Boulevard
5h ago
Learn how to secure Model Context Protocol transport with post-quantum cryptographic agility. Explore hybrid encryption, ML-KEM integration, and AI infrastructure protection. The post Post-Quantum Cryptographic Agility in Model Context Protocol Transport appeared first on Security Boulevard .
Security Boulevard
12h ago
A call saying someone you love has been arrested and needs money ASAP can feel so real that you act before you think. Learn how bail bond scams work and what to watch for to help protect you and your family from falling for the scheme. The post How bail bond scams are using AI to target families appeared first on Security Boulevard .
Security Boulevard
12h ago
For years, the software industry treated public package registries like a law of nature. They were simply there. Immutable, invisible, and somehow outside the normal rules of cost, capacity, and responsibility. The post Open is Not Costless: Reclaiming Sustainable Infrastructure appeared first on Security Boulevard .
Security Boulevard
13h ago
AI tokenomics is reshaping cost, risk, and control. Learn how token-based pricing impacts AI usage and how to prepare. The post AI Tokenomics: Cost, Risk & AI Dependency (2026) appeared first on Security Boulevard .
Security Boulevard
13h ago
Minnesota has produced a quietly strong CISO community, particularly in financial services and insurance. The leaders in this feature are based in the Twin Cities metro or built the core of their careers there, and their work spans credit unions, community banking, wealth management, payment technology, title insurance, and one of the most consequential public […] The post Minnesota’s CISOs: Homegrown Talent Securing Finance, Insurance, and Beyond appeared first on CISO Whisperer . The post Minnesota’s CISOs: Homegrown Talent Securing Finance, Insurance, and Beyond appeared first on Security B
CyberScoop
9h ago
Greg Barbaccia told CyberScoop that Anthropic's Mythos shows real promise for federal cyber defense, but warns that laboratory results and live network conditions are two very different things. The post Federal CIO cautious on Anthropic’s Mythos despite planned rollout appeared first on CyberScoop .
CyberScoop
14h ago
She replaces Rep. Eric Swalwell following his resignation, giving her the position of ranking member of the Subcommittee on Cybersecurity and Infrastructure Protection. The post Rep. Delia Ramirez takes over as top House cybersecurity Dem appeared first on CyberScoop .
Hacker News
15h ago
3 points · 0 comments on Hacker News