Infosecurity Europe 2026 will debut a new Cyber Startup Programme, featuring a dedicated show-floor zone for early-stage cybersecurity companies to showcase innovations, connect with investors and highlight emerging technologies
Flux RSS
— Sources secondairesFlaws in GitHub Codespaces allow RCE via crafted repositories or pull requests
Cellebrite data confirms digital evidence is now central to almost all cases
Researchers at Check Point link ‘Amarath-Dragon’ attacks to prolific Chinese cyber-espionage operation
Pindrop warns of 1210% increase in AI-powered fraud last year
SystemBC malware linked to 10,000 infected IPs, posing risks to sensitive government infrastructure
ShadowSyndicate cluster expands with new SSH fingerprints connecting servers to other ransomware ops
Cofense claims AI is making phishing emails more personalized and sophisticated
Pillar Security discovered two new critical vulnerabilities in n8n that could lead to supply chain compromise, credential harvesting and complete takeover attacks
CISA has added a critical CVE in SolarWinds Web Help Desk to its KEV Catalog
A security researcher found 386 malicious ‘skills’ published on ClawHub, a skill repository for the popular OpenClaw AI assistant project
40,000 WordPress sites are vulnerable to SQL injection in Quiz and Survey Master plugin
DockerDash vulnerability allows RCE and data exfiltration via unverified metadata in Ask Gordon
UK Data Protection Watchdog has “serious concerns” over data privacy on Elon Musk’s social platform
A new ransomware-as-a-service operation dubbed “Vect” features custom malware
Elon Musk and X’s former CEO were summoned for voluntary interviews in Paris on April 20, 2026
Multi-stage attack begins with fake message relating to business requests and evades detection with link hidden in a PDF
Wiz Security claims Moltbook misconfiguration allowed full read and write access
NSA released new guidelines to help organizations achieve target-level Zero Trust maturity
A supply chain attack on Notepad++ update process was linked to compromised hosting infrastructure