Advertisement · 728 × 90

Posts by Sami Laiho

Preview
Windows 11 cumulative updates KB5083769 & KB5082052 released Microsoft has released Windows 11 KB5083769 and KB5082052 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities, bugs, and add new features.

www.bleepingcomputer.com/news/microso...

7 hours ago 0 0 0 0
Preview
Microsoft April 2026 Patch Tuesday fixes 167 flaws, 2 zero-days Today is Microsoft's April 2026 Patch Tuesday with security updates for 167 flaws, including 2 zero-day vulnerabilities.

www.bleepingcomputer.com/news/microso...

7 hours ago 0 0 0 0
The silent “Storm”: New infostealer hijacks sessions, decrypts server-side New "Storm" infostealer skips local decryption, sending browser data to attacker servers. Varonis shows how server-side decryption enables session hijacking, bypassing passwords and MFA.

The silent “Storm”: New infostealer hijacks sessions, decrypts server-side
www.bleepingcomputer.com/news/securit...

14 hours ago 0 0 0 0
JanelaRAT targeting online banking users in Latin America Kaspersky GReAT experts describe the latest JanelaRAT campaign detailing infection chain and malware functionality updates.

JanelaRAT: a financial threat targeting users in Latin America
securelist.com/janelarat-fi...

14 hours ago 0 0 0 0
Preview
APT41 Delivers 'Undetectable' Backdoor to Steal Cloud Credentials The China-backed threat group is targeting AWS, Google, Azure, and Alibaba cloud environments and using typosquatting to obscure C2 communication.

APT41 Delivers 'Zero-Detection' Backdoor to Harvest Cloud Credentials
www.darkreading.com/cloud-securi...

14 hours ago 0 0 0 0
Preview
APT37’s Pretexting-Based Targeted Intrusion: Analysis of Facebook Reconnaissance and Software Tampering Attacks Pretexting by APT37 was identified. After Facebook contact, they sent an encrypted PDF via messenger and lured targets to install a viewer.

APT37’s Pretexting-Based Targeted Intrusion: Analysis of Facebook
Reconnaissance and Software Tampering Attacks
www.genians.co.kr/en/blog/thre...

14 hours ago 0 0 0 0
Preview
OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident OpenAI revoked its macOS signing certificate after a malicious Axios dependency incident on March 31, 2026, preventing potential software misuse.

OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain
Incident
thehackernews.com/2026/04/open...

14 hours ago 1 0 0 0
Preview
FBI, Indonesia take down W3LL phishing tool A widely used phishing tool that allowed hackers to create fake websites that looked like legitimate login portals for just $500 was disrupted by the FBI and law enforcement agencies in Indonesia.

FBI, Indonesia take down W3LL phishing tool
therecord.media/phishing-tak...

14 hours ago 0 0 0 0
Advertisement
Preview
CVE-2026-5194 - GitHub Advisory Database Missing hash/digest size and OID checks allow digests...

wolfSSL - Missing hash/digest size and OID checks
URL: github.com/advisories/G...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.3

19 hours ago 0 0 0 0
Preview
CVE-2026-40175 - GitHub Advisory Database Axios has Unrestricted Cloud Metadata Exfiltration via Header Injection Chain

Axios Vulnerability Disclosure: Unrestricted Cloud Metadata Exfiltration via
Header Injection Chain
URL: github.com/advisories/G...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Proof-of-Concept, CVSSv3.1: 10.0

19 hours ago 1 0 0 0
Preview
Hims Breach Exposes the Most Sensitive Kinds of PHI Threat actors breached the telehealth brand, and now they may know patients' personal health details. What could they do with that information?

Hims Breach Exposes the Most Sensitive Kinds of PHI
www.darkreading.com/cyberattacks...

1 day ago 0 0 0 0
Preview
Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621 Adobe patches CVE-2026-34621 after active exploitation since Dec 2025, preventing remote code execution via malicious PDFs.

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621
thehackernews.com/2026/04/adob...

1 day ago 0 0 0 0
Preview
Unauthenticated remote code execution due to SSH command-line argument injection ### Impact Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network acces...

Cockpit - Unauthenticated remote code execution due to SSH command-line
argument injection
URL: github.com/cockpit-proj...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.8

1 day ago 0 0 0 0
Preview
Unauthenticated remote code execution due to SSH command-line argument injection ### Impact Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network acces...

Cockpit - Unauthenticated remote code execution due to SSH command-line
argument injection
URL: github.com/cockpit-proj...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.8

1 day ago 0 0 0 0
Preview
Pre-Auth Remote Code Execution via Terminal WebSocket Authentication Bypass ## Summary Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal WebSocket endpoint `/terminal/ws` lacks authentication validation, allowing an unauthenticated attacker to obtain a...

Marimo - Pre-Auth Remote Code Execution via Terminal WebSocket Authentication
Bypass
URL: github.com/marimo-team/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Functional, CVSSv3.1: 9.3

1 day ago 0 0 0 0
Advertisement
Adobe Security Bulletin Prenotification Security Advisory for Adobe Acrobat and Reader  | APSB26-43

Security update available for Adobe Acrobat Reader | APSB26-43
URL: helpx.adobe.com/security/pro...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Functional, CVSSv3.1: 8.6

1 day ago 0 0 0 0
Preview
A Single Operator, Two AI Platforms, Nine Government Agencies: The Full Technical Report | Balens Blog In February, we published our initial findings on the AI-assisted breach of Mexico's government infrastructure, warning of the elevated risk that AI-powered threat actors now pose. A single operator u...

gambit.security/blog-post/a-...

2 days ago 0 0 0 0
Preview
March 2026 Cyber Threat Report: Ransomware & GenAI Risk March 2026 cyber threat update: attacks dip to 1,995/week, ransomware rebounds, and GenAI data leakage risk rises—plus key sector and regional trends.

March 2026 Cyber Threat Landscape Shows No Relief as Ransomware Rebounds and
GenAI Risks Intensify
blog.checkpoint.com/research/mar...

2 days ago 0 0 0 0
Preview
Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data Webloc surveils up to 500M devices using ad data; global law enforcement adoption raises warrantless tracking concerns.

Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad
Data
thehackernews.com/2026/04/citi...

2 days ago 0 0 0 0
Preview
Recovery scammers hit you when you’re down: Here’s how to avoid a ‘second strike’ If you’ve been the victim of fraud, you’re likely already a lead on a ‘sucker list’ – and if you’re not careful, your ordeal may be about to get worse.

Recovery scammers hit you when you’re down: Here’s how to avoid a second
strike
www.welivesecurity.com/en/scams/rec...

2 days ago 0 0 0 0
Tearing down a car telematic unit (and finding an accident on Facebook) - Quarkslab's blog From hardware analysis to OSINT: how we retrieved information about a BYD car crash by analyzing the TCU embedded memory.

blog.quarkslab.com/tearing-down...

3 days ago 0 0 0 0
Russian submarines ‘tried to spy on UK while world distracted by Iran’ John Healey, the defence secretary, has revealed a month-long operation to shadow three submarines allegedly spying on pipelines and underwater cables

www.thetimes.com/uk/defence/a...

3 days ago 0 0 0 0
Storm-1175 Deploys Medusa Ransomware Within 24 Hours of Vulnerability Disclosure Storm-1175 launches Medusa ransomware attacks on healthcare and education in the UK, US, and Australia, exploiting flaws within 24 hours fast.

hackread.com/storm-1175-h...

3 days ago 0 0 0 0
Advertisement

New VENOM phishing attacks steal senior executives' Microsoft logins
www.bleepingcomputer.com/news/securit...

3 days ago 0 0 0 0

Marimo OSS Python Notebook RCE: From Disclosure to Exploitation in Under 10
Hours
www.sysdig.com/blog/marimo-...

3 days ago 0 0 0 0
U.S. Public Sector Under Siege: Threat Intelligence for Q1 2026 Discover how TrendAI Vision One™ empowers government agencies and educational institutions with advanced visibility, intelligence, and automation to stay ahead of evolving public sector threats.

U.S. Public Sector Under Siege: Threat Intelligence for Q1 2026
www.trendmicro.com/en_us/resear...

3 days ago 0 0 0 0
Preview
How to protect your organization from AirSnitch Wi-Fi vulnerabilities Practical recommendations for Wi-Fi network isolation and defending against all AirSnitch-style attacks.

AirSnitch: attacking Wi-Fi client isolation and guest networks
www.kaspersky.com/blog/airsnit...

3 days ago 1 0 0 0
Nearly 4,000 US industrial devices exposed to Iranian cyberattacks The attack surface targeted by Iranian-linked hackers in cyberattacks against U.S. critical infrastructure networks includes thousands of Internet-exposed programmable logic controllers (PLCs) manufactured by Rockwell Automation.

Nearly 4,000 US industrial devices exposed to Iranian cyberattacks
www.bleepingcomputer.com/news/securit...

3 days ago 0 0 0 0
Video

My #AI avatar fell off the wagon apparently...

3 days ago 0 0 1 0
Post image

Join me for #techmentor and #cybersecurity Live in #redmond with a BIG discount!

bit.ly/4tw0Ndi

4 days ago 0 0 0 0