OpenAI’s GPT-5.5 is as Good as Mythos at Finding Security Vulnerabilities on May 13, 2026 Posted by Bruce Schneier
GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data on May 13, 2026 Posted by The Hacker News
Android Adds Intrusion Logging for Sophisticated Spyware Forensics on May 12, 2026 Posted by The Hacker News
[GUEST DIARY] Tearing apart website fraud to see how it works., (Wed, May 13th) on May 12, 2026 Posted by SANS Internet Storm Center, InfoCON: green
Posted in Hacking news Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows on February 4, 2026 The Hacker News
Posted in Hacking news Hackers Exploit React2Shell to Hijack Web Traffic via Compromised NGINX Servers on February 4, 2026 The Hacker News
ISC Stormcast For Thursday, February 5th, 2026 https://isc.sans.edu/podcastdetail/9796, (Thu, Feb 5th) on February 4, 2026 SANS Internet Storm Center, InfoCON: green
Posted in AI Smashing Security podcast #453: The Epstein Files didn’t hide this hacker very well on February 4, 2026 Graham Cluley
Posted in Hacking news Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models on February 4, 2026 The Hacker News
Posted in Hacking news DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files on February 4, 2026 The Hacker News
Posted in Hacking news China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns on February 4, 2026 The Hacker News