CVE-2023-33538 allows for command injection in TP-Link routers. We discuss exploitation attempts with payloads characteristic of Mirai botnet malware. The
CVE-2023-33538 allows for command injection in TP-Link routers. We discuss exploitation attempts with payloads characteristic of Mirai botnet malware. The
As OpenAI and Anthropic advance frontier AI, SentinelOne delivers AI-native, machine-speed cyber defense at global scale.SentinelOneRead More
Learn how to build a comprehensive cryptographic inventory and strengthen quantum‑safe readiness using Microsoft Security tools, best‑practice lifecycle models, and
On April 6th, 2026, we publicly disclosed a critical Arbitrary File Upload vulnerability in Ninja Forms – File Upload, a
Last week, there were disclosed in and that have been added to the Wordfence Intelligence Vulnerability Database, and there were
The Microsoft Defender Security Research Team uncovered a sophisticated macOS intrusion campaign attributed to the North Korean threat actor Sapphire
Give your agents, developers, and automations a home for code and data. We’ve just launched Artifacts: Git-compatible versioned storage built
AI Search is the search primitive for your agents. Create instances dynamically, upload files, and search across instances with hybrid
Learn how to deploy PlanetScale Postgres and MySQL databases via Cloudflare and connect Cloudflare Workers.The Cloudflare BlogRead More
Agents are becoming multi-channel. That means making them available wherever your users already are — including the inbox. Today, Cloudflare
We built a custom technology stack to run fast large language models on Cloudflare’s infrastructure. This post explores the engineering
We’re building AI Gateway into a unified inference layer for AI, letting developers call models from 14+ providers. New features
ANY.RUN has observed a sustained surge in a credential-phishing campaign active since 2024. This campaign, dubbed BlobPhish, introduces a sneaky twist: instead of delivering phishing
Key findings Proofpoint monitored a cargo theft actor’s post‑compromise activity for more than a month in a decoy environment operated by Deception.pro. The attacker abused multiple
Palo Alto Networks reaffirms its deep commitment to UK digital security, ensuring data autonomy, resilience and control for British organizations.
Enterprises aiming to predict and mitigate human, machine, and AI‑agent risks at scale demand AI‑powered identity‑first security without compromise.Trend Micro
Frameworks 6.25.0 + KDE Plasma 6.6.4LinuxSecurity – Security AdvisoriesRead More
Frameworks 6.25.0 + KDE Plasma 6.6.4LinuxSecurity – Security AdvisoriesRead More
Frameworks 6.25.0 + KDE Plasma 6.6.4LinuxSecurity – Security AdvisoriesRead More
Frameworks 6.25.0 + KDE Plasma 6.6.4LinuxSecurity – Security AdvisoriesRead More
Frameworks 6.25.0 + KDE Plasma 6.6.4LinuxSecurity – Security AdvisoriesRead More
Frameworks 6.25.0 + KDE Plasma 6.6.4LinuxSecurity – Security AdvisoriesRead More
AI changes how incidents unfold and how we respond. Learn which IR practices still apply and where new telemetry, tools,
Learn how Be My Eyes assists visually impaired users, whether it can truly stop phishing, and the key security measures
An experimental voice pipeline for the Agents SDK enables real-time voice interactions over WebSockets. Developers can now build agents with
The report contains industrial threat statistics for Q4 2025. It covers various infection vectors and malware types, as well as
Announcing a preview of the next edition of the Agents SDK — from lightweight primitives to a batteries-included platform for
Cloudflare Workflows, a durable execution engine for multi-step applications, now supports higher concurrency and creation rate limits through a rearchitectured
Agent Lee is an in-dashboard agent that shifts Cloudflare’s interface from manual tab-switching to a single prompt. Using sandboxed TypeScript,
Browser Rendering is now Browser Run, with Live View, Human in the Loop, CDP access, session recordings, and 4x higher
The Cloudflare Registrar API is now in beta. Developers and AI agents can search, check availability, and register domains at
Get cliff notes from our three-part deep dive into the 2026 Threat Detection Report and watch every episode, on demand
Region Meshes is a new RIPE Atlas tool that visualises intra-region routing paths, showing where traffic stays local, where it
In Chile, cybersecurity compliance is becoming an operational issue, not just a legal one. Under the new Cybersecurity Framework Law,
Analysis of 80B+ BGP updates shows repeated “noise” is highly concentrated in a small set of peers, sessions, and prefixes,
On April 9, 2026, cpuid.com was actively serving malware through its own official download button. Threat actors had compromised the
GDDRHammer, GeForge, and GPUBreach: three new research papers on Rowhammer attacks with major security implications.Kaspersky official blogRead More
Finding the best threat intelligence feeds is about finding the right mix of coverage, context, and operational value. In this
Cloudflare is introducing scannable API tokens, enhanced OAuth visibility, and GA for resource-scoped permissions. These tools help developers implement a
Cloudflare Mesh provides secure, private network access for users, nodes, and autonomous AI agents. By integrating with Workers VPC, developers
A new integration gives teams an easy way to update Zscaler Internet Access (ZIA) network policies using Red Canary response
Managed OAuth for Cloudflare Access helps AI agents securely navigate internal applications. By adopting RFC 9728, agents can authenticate on
We share Cloudflare’s internal strategy for governing MCP using Access, AI Gateway, and MCP server portals. We also launch Code
Modern phishing campaigns increasingly abuse legitimate services. Cloud platforms, file-sharing tools, trusted domains, and widely used SaaS applications are now
On March 2nd, 2026, we received a submission through our Bug Bounty Program for a Remote Code Execution vulnerability in
If you run a SOC, you already know the feeling: alerts stack up fast, priorities collide, and leadership wants answers
Keyloggers: A Persistent Threat Nowadays, virtually all digital services rely on logins and authentication, from email inboxes to help desks.
SOC case management turns a flood of disconnected alerts into a structured investigation process. Done right, it helps a security
Recent advances in quantum hardware and software have accelerated the timeline on which quantum attack might happen. Cloudflare is responding
Unit 42 uncovers critical vulnerabilities in Amazon Bedrock AgentCore’s sandbox, demonstrating DNS tunneling and credential exposure. The post Cracks in
A complete checklist for strengthening security in the Kaspersky Security Center console.Kaspersky official blogRead More
Managing ~600 infrastructure devices with a three-person team demands careful design choices. Based on experience in Central Asia, this article
In this report, Kaspersky experts share their insights into the 2025 financial threat landscape, including regional statistics and trends in
90% of attacks start with phishing. For CISOs, the real pain begins when the SOC cannot quickly tell whether a suspicious alert is just noise
By applying symbolic execution and the Z3 theorem prover to BPF bytecode, we’ve automated the generation of malware trigger packets,
The 2026 Threat Detection Report surveys the AI landscape for both defenders and adversaries. Here’s how you can stay ahead.Red
The ADEM Universal Agent for Prisma Access unifies network data across branch sites to fuel agentic autonomous operations. Get full-stack
Phishing remains one of the most persistent cyber threats facing enterprise organizations. Despite investment in perimeter defenses, identity protection, and
Unit 42 reveals “Agent God Mode” in Amazon Bedrock AgentCore. Broad IAM permissions lead to privilege escalation and data exfiltration
The first quarter of 2026 has reinforced a hard truth: U.S. government agencies and educational institutions are operating in the
Threat actors are distributing a Trojan disguised as Proxifier software; through a multi-stage infection chain, it delivers ClipBanker – malware
A BTS comeback and world-tour announcement has resulted in a new wave of scam campaigns. Kaspersky experts have discovered fraudulent
Germany’s economy is a precision machine: finance fuels it, manufacturing builds it, telecom connects it, IT optimizes it, and healthcare sustains it. The
A severe Android intent‑redirection vulnerability in a widely deployed SDK exposed sensitive user data across millions of apps. Microsoft researchers
Edge devices are prime targets — learn how attackers exploit the perimeter to gain access, persist, and pivot to identity.SentinelOneRead
Introduction April is a season of fresh starts, and at VMRay, that means another powerful Platform release. Whether it’s the
Microsoft Incident Response – Detection and Response Team (DART) researchers observed an emerging, financially motivated threat actor, tracked as Storm-2755,
Last week, there were disclosed in that have been added to the Wordfence Intelligence Vulnerability Database, and there were that
Posted by Ben Ackerman, Chrome team, Daniel Rubery, Chrome team and Guillaume Ehinger, Google Account Security team Following our April
Cisco announces the intent to acquire Galileo, a dynamic player in the observability for AI space that is helping make
In the SOC of the future, autonomous defense moves at machine speed, agents add context and coordination, and humans focus
FBI disrupts GRU router hijacking operation, ClickFix sidesteps Apple’s Terminal mitigation, and Iranian actors exploit PLCs across U.S. infrastructure.SentinelOneRead More
False positives drain time, blur priorities, and make it harder for security teams to spot what actually matters. A noisy
Posted by Jiacheng Lu, Software Engineer, Google Pixel Team Google is continuously advancing the security of Pixel devices. We have
At Wordfence, we run a bug bounty program that pays out mid-six figures per year to researchers in bug bounties
Cloudflare’s global network has officially crossed 500 Tbps of external capacity, enough to route more than 20% of the web
Cloudflare’s mission has always been to help build a better Internet. Sometimes that means building for the Internet as it
We explore the risks of smart sex toys — from data breaches and tracking to vulnerabilities — and offer practical
Kaspersky GReAT experts describe the latest JanelaRAT campaign detailing infection chain and malware functionality updates.SecurelistRead More
Cisco’s Vikas Butaney on the 2026 State of Industrial AI Report — and what it takes to be an AI
Outbound Workers for Sandboxes provide a programmable, zero-trust egress proxy for AI agents. This allows developers to inject credentials and
The Internet’s core, rooted in open standards and unique identifiers, has always depended on trust. That trust is part of
Cloudflare Sandboxes give AI agents a persistent, isolated environment: a real computer with a shell, a filesystem, and background processes
For the latest discoveries in cyber research for the week of 13th April, please download our Threat Intelligence Bulletin. TOP
We’re introducing Durable Object Facets, allowing Dynamic Workers to instantiate Durable Objects with their own isolated SQLite databases. This enables
Key Takeaways Mailbox rules are a high-risk post-exploitation tactic. Attackers abuse native mailbox rules for exfiltration, persistence, and communication manipulation. Combined with third-party services
We’re introducing cf, a new unified CLI designed for consistency across the Cloudflare platform, alongside Local Explorer for debugging local
In the beginning of April, three attacks detected in the Guardicore Global Sensor Network (GGSN) caught our attention. All three
Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.BlogRead
Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The
In this Akamai FLAME Trailblazer blog post, Rachel Bayley encourages women to step into the unknown and to be their
Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files.
A laborban jól működő OT-biztonsági POC-k gyakran elvéreznek éles, vállalati szintű kiterjesztéskor. A hagyományos, SPAN-alapú láthatósági megoldások skálázáskor elszálló CAPEX/OPEX-et
Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files.
Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.BlogRead
Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The
Organizations must deploy a remote working strategy that suits the office anywhere model CIOs need to demonstrate leadership as we
Organizations must deploy a remote working strategy that suits the office anywhere model CIOs need to demonstrate leadership as we
In the beginning of April, three attacks detected in the Guardicore Global Sensor Network (GGSN) caught our attention. All three
In this Akamai FLAME Trailblazer blog post, Rachel Bayley encourages women to step into the unknown and to be their
A CheckPoint kutatóinak jelentése egy kifinomult kártevő terjesztési rendszert ír le, amelyet a “Stargazer Goblin” nevű fenyegető csoport követett el.
A Proton elindította a Proton Docs-t, a magánélet-központú munkaeszköz-csomagjának legújabb alkalmazását, amely a Google Docs-hoz hasonló, a Google-hoz nem kötődő
A NIS 2 irányelv az Európai Unió (EU) szabályrendszere, amelynek célja a kulcsfontosságú iparágak kiberbiztonságának fokozása. Az Irányelv 2023. január
A dokumentum szerint azonban míg az Anonymous kollektíva egy sokszínű és kiterjedt csoport, amely sok különböző eszméket karolnak fel, a megfigyelések arra utalnak, hogy a magát “Anonymous Sudan”-nak nevező csoportnak semmi köze nincs a nagyobb Anonymous kollektívához, vagy az eredeti Anonymous Sudan mögött álló felhasználókhoz, illetve a #OpSudan Anonymous akciókhoz.
A Cloudflare blogbejegyzése egy rekordot döntő DDoS-támadás sikeres elhárításáról számol be, és számos fontos tanulsággal szolgál. A támadás rávilágított a DDoS-támadások növekvő méretére és gyakoriságára, valamint arra, hogy többrétegű védelmi stratégiákra van szükség a hatékony elhárításukhoz. A támadásra adott sikeres válaszlépés a biztonsági szolgáltatók és szervezetek közötti együttműködés fontosságát is demonstrálta, valamint a mesterséges intelligencia és a gépi tanulás használatát a támadások valós idejű azonosítása és enyhítése érdekében. A jelentés hangsúlyozza a DDoS-támadások folyamatos és változó fenyegetését, valamint azt, hogy a szervezeteknek ébernek és felkészültnek kell maradniuk az ilyen támadásokra.
A Mandiant Security Perspectives Report kiemeli a kibertámadások egyre növekvő fenyegetettségét, különös tekintettel a zsarolóvírus-támadások egyre kifinomultabb és pusztítóbb jellegére. A jelentés azt is megjegyzi, hogy a távmunka új sebezhetőségeket és kihívásokat teremtett a szervezetek számára a távoli hozzáférés biztosítása terén, és hogy az ellátási láncot érő támadások egyre nagyobb aggodalomra adnak okot. E kihívások kezelése érdekében a szervezeteknek a proaktív fenyegetésvadászatra és -felderítésre kell összpontosítaniuk, hogy gyorsabban azonosíthassák a támadásokat és reagálhassanak rájuk. A jelentés végső soron arra emlékeztet, hogy a kibertámadások fenyegetése valós és folyamatos, és hogy a szervezeteknek továbbra is ébernek és proaktívnak kell maradniuk az ellenük való védekezésben.
Az elmúl hetekben több kutató is felhívta a figyelemet kiterjedt adathalász támadásokra, melyek a MFA (Multifactor Authentication) többényezős hitelesítéssel védett
Bumblebee kód emlemzését nemrég publikálta a Paloaltonetwork. Projector Libra az egyik bűnöző csoport amely Bumblebee-t terjeszti. Ezt teszi oly módon,
Az elemzőket és a szakértőket is meglepte, milyen mértékű lehet a március elején bejelentett Microsoft Exchange szervereket érintő sérülékenység kihasználása.
A Ubiquiti Networks termékei közt főként vezeték nélküli eszközök találhatóak kifejezetten kis-és közepes méretű vállalkozások számára kifejlesztve. A cég most
A DJI – az egyik legnépszerűbb drónokat gyártó kínai cég – felkerült az USA Kereskedelmi Minisztériumának üzleti titok lopása alanyainak listájára, ahol a Huawei és a ZTE is szerepel, sok más kínai gyártóval együtt. A minisztérium az utolsó frissítés során 77 új “entitást” vett fel a listára.
A SolarWinds elleni támadás nagyságrendileg 18 000 vállalatot érint. Márciusban a frissítésekbe rejtett backdoorral sikerült elérnie a támadóknak, hogy olyan szervezeteket is célpontként tudjon kezelni, mint a FireEye, vagy az USA Kereskedelmi és Pénzügyminisztériuma, vagy a Belbiztonsági Minisztérium egyes rendszerei és az érintett szervezetek száma egyre nő és nem mindegyik publikus.
Igaz a hír, és lassan fél napja a világ IT szakértői elemzik, hogy az amerikai székhelyű FireEye kiberbiztonsági céget kibertámadás érte. A támadás tényét maga a cég jelentette be blogján, és a sok érdekes tény mellett kiemelték, hogy következtetéseik és az elemzések jelenlegi eredményei szerint államilag szponzorált hackerek hatoltak be az informatikai rendszerükbe. Az első sokkon túl azonban álljunk meg egy percre: