Sami Laiho
@samilaiho.com
📤 1636
📥 181
📝 3533
Keynote-speaker, Chief Research Officer, Microsoft MVP since 2011 More info:
https://samilaiho.com/
One in Eight UK Workers Has Sold Their Company Passwords, and Bosses Think it's Fine
www.fortra.com/blog/one-eig...
loading . . .
One in eight UK Workers has Sold Their Company Passwords, and Bosses Think it's Fine
An uncomfortable number of people appear to be quite willing to sell critical credentials and passwords to the highest bidder.
https://www.fortra.com/blog/one-eight-uk-workers-has-sold-their-company-passwords-and-bosses-think-its-fine
about 13 hours ago
0
1
0
Pro-Ukraine BO Team and Head Mare hackers appear to team up in attacks against  Russia
therecord.media/ukraine-bo-t...
loading . . .
Pro-Ukraine BO Team and Head Mare hackers appear to team up in attacks against Russia
Researchers at Moscow-based cybersecurity firm Kaspersky said they identified overlapping infrastructure and tools used by both groups — including command-and-control systems operating on the same com...
https://therecord.media/ukraine-bo-team-head-mare-hacktivists-team-up-kaspersky
about 13 hours ago
0
1
0
Meta U-turns on encryption push for Instagram as DMs go plaintext
www.theregister.com/security/202...
loading . . .
Meta U-turns on encryption push for Instagram as DMs go plaintext
After years of insisting end-to-end encryption was the future of online comms, Zuckcorp has handed itself full visibility into user chats once again
https://www.theregister.com/security/2026/05/08/meta-u-turns-on-encryption-push-for-instagram-as-dms-go-plaintext/5235705
about 13 hours ago
0
0
0
Meta U-turns on encryption push for Instagram as DMs go plaintext
www.theregister.com/security/202...
loading . . .
Meta U-turns on encryption push for Instagram as DMs go plaintext
After years of insisting end-to-end encryption was the future of online comms, Zuckcorp has handed itself full visibility into user chats once again
https://www.theregister.com/security/2026/05/08/meta-u-turns-on-encryption-push-for-instagram-as-dms-go-plaintext/5235705
about 13 hours ago
0
0
0
Trellix source code breach claimed by RansomHouse hackers
www.bleepingcomputer.com/news/securit...
loading . . .
Trellix source code breach claimed by RansomHouse hackers
The attack on the Trellix source code repository disclosed last week has been claimed by the RansomHouse threat group, which leaked a small set of images as proof of the intrusion.
https://www.bleepingcomputer.com/news/security/trellix-source-code-breach-claimed-by-ransomhouse-hackers/
about 13 hours ago
0
0
0
support.cpanel.net/hc/en-us/art...
support.cpanel.net/hc/en-us/art...
support.cpanel.net/hc/en-us/art...
loading . . .
Security: CVE-2026-29203 - cPanel & WHM / WP2 Security Update - May 08, 2026
CauseAn unsafe symlink handling error was found that allows a user to chmod an arbitrary file, allowing for denial of service and possible privilege escalation. ResolutionWe have pushed out a patch...
https://support.cpanel.net/hc/en-us/articles/40311543760407-Security-CVE-2026-29203-cPanel-WHM-WP2-Security-Update-May-08-2026
1 day ago
0
0
0
Exploits and vulnerabilities in Q1 2026
securelist.com/vulnerabilit...
loading . . .
The vulnerability landscape in Q1 2026
This report provides statistical data on published vulnerabilities and exploits we researched during Q1 2026. It also includes summary data on the use of C2 frameworks in APT attacks.
https://securelist.com/vulnerabilities-and-exploits-in-q1-2026/119733/
1 day ago
0
0
0
Real estate giant confirms vishing incident as ShinyHunters and Qilin both come knocking
www.theregister.com/security/202...
loading . . .
Cushman & Wakefield confirms vishing cyberattack
: Cushman & Wakefield activated incident response protocols after serial extortionists issued separate threats
https://www.theregister.com/security/2026/05/05/cushman-wakefield-confirms-vishing-cyberattack/5228718
1 day ago
0
0
0
New PCPJack worm steals credentials, cleans TeamPCP infections
www.bleepingcomputer.com/news/securit...
loading . . .
New PCPJack worm steals credentials, cleans TeamPCP infections
A new malware framework called PCPJack is stealing credentials from exposed cloud infrastructure while actively removing TeamPCP's access to the systems.
https://www.bleepingcomputer.com/news/security/new-pcpjack-worm-steals-credentials-cleans-teampcp-infections/
1 day ago
0
0
0
Hackers steal students’ data during breach at education tech giant Instructure
techcrunch.com/2026/05/05/h...
loading . . .
Hackers steal students' data during breach at education tech giant Instructure | TechCrunch
The data breach at education tech giant Instructure includes students' private data, according to a sample of the allegedly stolen data seen by TechCrunch.
https://techcrunch.com/2026/05/05/hackers-steal-students-data-during-breach-at-education-tech-giant-instructure/
1 day ago
0
0
0
60% of MD5 password hashes are crackable in under an hour
www.theregister.com/security/202...
loading . . .
60% of MD5 password hashes are crackable in under an hour
Happy World Password Day! Maybe it's finally time to kill this holiday in favor of World No-More-Passwords Day?
https://www.theregister.com/security/2026/05/07/60-of-md5-password-hashes-are-crackable-in-under-an-hour/5234954
1 day ago
0
2
0
World Password Day 2026: Why “Strong Passwords” Can’t Save You from AI, Infostealers, and the Telegram Underground
blog.checkpoint.com/security/wor...
loading . . .
World Password Day 2026: Why "Strong Passwords" Can’t Save You from AI, Infostealers, and the Telegram Underground - Check Point Blog
As we recognize World Password Day in 2026, the traditional advice to "use a complex password with numbers and symbols" feels hopelessly outdated. Today,
https://blog.checkpoint.com/security/world-password-day-2026-why-strong-passwords-cant-save-you-from-ai-infostealers-and-the-telegram-underground/
1 day ago
0
0
0
'TrustFall' Convention Exposes Claude Code Execution Risk
www.darkreading.com/application-...
loading . . .
'TrustFall' Exposes Claude Code Execution Risk
Malicious repositories can trigger code execution in Claude Code, Cursor CLI, Gemini CLI, and CoPilot CLI with minimal or no user interaction.
https://www.darkreading.com/application-security/trustfall-exposes-claude-code-execution-risk
1 day ago
0
0
0
Critical vulnerability in Google Chrome prior to 148.0.7778.96 URL:
nvd.nist.gov/vuln/detail/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.6
loading . . .
NVD - CVE-2026-7908
https://nvd.nist.gov/vuln/detail/CVE-2026-7908
1 day ago
0
0
0
ExifTool stdin argument injection via metadata value newlines (bypass of key sanitization fix in v8.30.1) URL:
github.com/gotenberg/go...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Proof-of-Concept, CVSSv3.1: 10.0
loading . . .
ExifTool stdin argument injection via metadata value newlines (bypass of key sanitization fix in v8.30.1)
## Vulnerability Details **CWE**: CWE-20 - Improper Input Validation The metadata value sanitization introduced in v8.30.1 (commit 405f106) only validates metadata KEYS via safeKeyPattern regex. ...
https://github.com/gotenberg/gotenberg/security/advisories/GHSA-q7r4-hc83-hf2q
1 day ago
0
0
0
Apache Wicket: possible session fixation using AuthenticatedWebSession URL:
nvd.nist.gov/vuln/detail/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.1
loading . . .
NVD - CVE-2026-40010
https://nvd.nist.gov/vuln/detail/CVE-2026-40010
1 day ago
0
0
0
Insecure Permissions vulnerability in grokability URL:
nvd.nist.gov/vuln/detail/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.8
loading . . .
NVD - CVE-2026-37709
https://nvd.nist.gov/vuln/detail/CVE-2026-37709
1 day ago
0
0
0
Multiple critical vulnerabilities in OpenClaw URL:
nvd.nist.gov/vuln/detail/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.8
loading . . .
NVD - CVE-2026-43575
https://nvd.nist.gov/vuln/detail/CVE-2026-43575
1 day ago
0
1
0
May 2026 Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (Multiple CVEs) URL:
hub.ivanti.com/s/article/Ma...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Functional, CVSSv3.1: 8.9
loading . . .
Ivanti Innovators Hub
https://hub.ivanti.com/s/article/May-2026-Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-Multiple-CVEs?language=en_US
1 day ago
0
1
0
www.airlockdigital.com/airlock-blog...
loading . . .
When Certificate Trust Fails: The DigiCert Code-Signing Incident and Microsoft Defender False Positive
Why compromised EV code signing certificates pose greater risk than standard code signing, highlighting how CA-managed provisioning can enable attackers to establish trusted signing capability.
https://www.airlockdigital.com/airlock-blog/digicert-incident-and-microsoft-defender-false-positive-what-happened-and-what-it-means
1 day ago
0
0
0
krebsonsecurity.com/2026/05/canv...
loading . . .
Canvas Breach Disrupts Schools & Colleges Nationwide
An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, af...
https://krebsonsecurity.com/2026/05/canvas-breach-disrupts-schools-colleges-nationwide/
1 day ago
0
0
0
Ivanti has released updates for Ivanti Endpoint Manager Mobile (EPMM) which addresses five high severity vulnerabilities.
hub.ivanti.com/s/article/Ma...
loading . . .
Ivanti Innovators Hub
https://hub.ivanti.com/s/article/May-2026-Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-Multiple-CVEs?language=en_US
2 days ago
0
2
0
New CISA initiative aims for critical infrastructure to operate offline during cyberattacks
therecord.media/cisa-initiat...
loading . . .
New CISA initiative aims for critical infrastructure to operate offline during cyberattacks
The initiative, named CI Fortify, focuses on isolation and recovery efforts that would see critical infrastructure organizations proactively disconnect from third-party dependencies and find ways to o...
https://therecord.media/cisa-initiative-aims-for-critical-infrastructure-to-operate-during-cyberattacks
2 days ago
0
1
0
Kochava Will Stop Selling 'Sensitive Location' Info
www.databreachtoday.com/kochava-will...
loading . . .
https://www.databreachtoday.com/kochava-will-stop-selling-sensitive-location-info-a-31601
2 days ago
0
0
0
Google's Android Apps Get Public Verification to Stop Supply Chain Attacks
thehackernews.com/2026/05/andr...
loading . . .
Google's Android Apps Get Public Verification to Stop Supply Chain Attacks
Google expands Android Binary Transparency after May 1, 2026 to verify app authenticity, reducing supply chain attack risks.
https://thehackernews.com/2026/05/android-apps-get-public-verification.html
2 days ago
0
2
1
Websites with an undefined trust level: avoiding the trap
securelist.com/suspicious-w...
loading . . .
How to spot a suspicious website
We explain what suspicious websites are and how to distinguish a safe site from a fraudulent one. A new category in Kaspersky solutions: we're sharing global statistics on untrusted site detection.
https://securelist.com/suspicious-websites-undefined-trust-level/119675/
2 days ago
0
0
0
Critical vm2 sandbox bug lets attackers execute code on hosts
www.bleepingcomputer.com/news/securit...
loading . . .
Critical vm2 sandbox bug lets attackers execute code on hosts
A critical vulnerability in the popular Node.js sandboxing library vm2 allows escaping the sandbox and executing arbitrary code on the host system.
https://www.bleepingcomputer.com/news/security/critical-vm2-sandbox-bug-lets-attackers-execute-code-on-hosts/
2 days ago
0
2
0
MuddyWater hackers use Chaos ransomware as a decoy in attacks
www.bleepingcomputer.com/news/securit...
loading . . .
MuddyWater hackers use Chaos ransomware as a decoy in attacks
The MuddyWater Iranian hackers disguised their operations as a Chaos ransomware attack, relying on  Microsoft Teams social engineering to gain access and establish persistence.
https://www.bleepingcomputer.com/news/security/muddywater-hackers-use-chaos-ransomware-as-a-decoy-in-attacks/
2 days ago
0
0
0
New stealthy Quasar Linux malware targets software developers
www.bleepingcomputer.com/news/securit...
loading . . .
New stealthy Quasar Linux malware targets software developers
A previously undocumented Linux implant named Quasar Linux (QLNX) is targeting developers' systems with a mix of rootkit, backdoor, and credential-stealing capabilities.
https://www.bleepingcomputer.com/news/security/new-stealthy-quasar-linux-malware-targets-software-developers/
2 days ago
0
1
0
Middle East Cyber Battle Field Broadens — Especially in UAE
www.darkreading.com/cyberattacks...
loading . . .
Middle East Cyber Battle Field Broadens — Especially in UAE
As the war with Iran continues, breach attempts targeting the United Arab Emirates tripled in a few weeks — many targeting critical infrastructure.
https://www.darkreading.com/cyberattacks-data-breaches/middle-east-cyber-battle-field-broadens-uae
2 days ago
0
0
0
Multiple vulnerabilities in Apache HTTP Server can lead to Remote Code Execution URL:
nvd.nist.gov/vuln/detail/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.8
loading . . .
NVD - CVE-2026-28780
https://nvd.nist.gov/vuln/detail/CVE-2026-28780
2 days ago
0
1
0
Vulnerability in Sandboxie-Plus privilege escalation via INI CRLF injection bypassing EditAdminOnly URL:
nvd.nist.gov/vuln/detail/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Proof-of-Concept, CVSSv3.1: 9.3
loading . . .
NVD - CVE-2026-34458
https://nvd.nist.gov/vuln/detail/CVE-2026-34458
2 days ago
0
0
0
PhpSpreadsheet SSRF and RCE via PHP stream wrappers in IOFactory::load URL:
nvd.nist.gov/vuln/detail/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Proof-of-Concept, CVSSv3.1: 9.2
loading . . .
NVD - CVE-2026-34084
https://nvd.nist.gov/vuln/detail/CVE-2026-34084
2 days ago
0
1
0
Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID™ Authentication Portal URL:
security.paloaltonetworks.com/CVE-2026-0300
Classification: Critical, Solution: Workaround, Exploit Maturity: Functional, CVSSv3.1: 9.3
loading . . .
CVE-2026-0300 PAN-OS: Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID™ Authentication Portal
A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code wi...
https://security.paloaltonetworks.com/CVE-2026-0300
2 days ago
0
0
0
CloudZ malware abuses Microsoft Phone Link to steal SMS and OTPs
www.bleepingcomputer.com/news/securit...
loading . . .
CloudZ malware abuses Microsoft Phone Link to steal SMS and OTPs
A new version of the CloudZ remote access tool (RAT) is deploying a previously unseen malicious plugin called Pheno that hijacks the Microsoft Phone Link connection to steal sensitive codes from mobil...
https://www.bleepingcomputer.com/news/security/cloudz-malware-abuses-microsoft-phone-link-to-steal-sms-and-otps/
3 days ago
0
1
0
Romance scammers turn sweet talk into ÂŁ102M payday
www.theregister.com/2026/05/05/r...
loading . . .
Romance fraudsters fleeced UK victims of ÂŁ102M in 2025
: Victims losing ÂŁ280K a day to fake profiles and sob stories
https://www.theregister.com/2026/05/05/romance_scam_figures/
3 days ago
0
1
0
Vimeo data breach exposes personal information of 119,000 people
www.bleepingcomputer.com/news/securit...
loading . . .
Vimeo data breach exposes personal information of 119,000 people
The ShinyHunters extortion gang stole personal information belonging to over 119,000 people after hacking the Vimeo online video platform in April, according to data breach notification service Have I...
https://www.bleepingcomputer.com/news/security/vimeo-data-breach-exposes-personal-information-of-119-000-people/
3 days ago
0
2
1
ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows
thehackernews.com/2026/05/scar...
loading . . .
ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows
ScarCruft spreads BirdCall via sqgame.net since late 2024, targeting Android users, enabling surveillance and data theft.
https://thehackernews.com/2026/05/scarcruft-hacks-gaming-platform-to.html
3 days ago
0
1
0
Malicious OpenClaw Skill Distributes Remcos RAT and GhostLoader
www.zscaler.com/blogs/securi...
loading . . .
OpenClaw Skill Distributes Remcos & GhostLoader | ThreatLabz
Technical analysis of a fake OpenClaw “DeepSeek-Claw” skill that tricks AI agents and developers into running hidden payloads that deploy Remcos RAT and GhostLoader.
https://www.zscaler.com/blogs/security-research/malicious-openclaw-skill-distributes-remcos-rat-and-ghostloader
3 days ago
0
1
0
Hacking Embodied AI
www.recordedfuture.com/research/hac...
loading . . .
Hacking Embodied AI
Embodied AI, intelligent systems in physical forms such as humanoid and quadruped robots, is moving from spectacle to staffing plans.
https://www.recordedfuture.com/research/hacking-embodied-ai
3 days ago
0
0
0
UAT-8302 and its box full of malware
blog.talosintelligence.com/uat-8302/
loading . . .
UAT-8302 and its box full of malware
Cisco Talos is disclosing UAT-8302, a sophisticated, China-nexus advanced persistent threat (APT) group targeting government entities in South America since at least late 2024 and government agencies ...
https://blog.talosintelligence.com/uat-8302/
3 days ago
0
0
0
www.bleepingcomputer.com/news/securit...
loading . . .
Student hacked Taiwan high-speed rail to trigger emergency brakes
A 23-year-old university student in Taiwan was arrested for interfering with the TETRA communication system used by the country's high-speed railway network (THSR).
https://www.bleepingcomputer.com/news/security/student-hacked-taiwan-high-speed-rail-to-trigger-emergency-brakes/
3 days ago
0
2
0
OpenCTI privilege escalation and unauthenticated access via default admin account URL:
nvd.nist.gov/vuln/detail/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.8
loading . . .
NVD - CVE-2026-27960
https://nvd.nist.gov/vuln/detail/CVE-2026-27960
3 days ago
0
0
0
Critical vulnerabilities in n8n allow contamination of prototypes and RCE URL:
nvd.nist.gov/vuln/detail/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.4
loading . . .
NVD - CVE-2026-42231
https://nvd.nist.gov/vuln/detail/CVE-2026-42231
3 days ago
0
0
0
OpenClaw 2026.4.7 < 2026.4.14 - Privilege Escalation via Untrusted Webhook Wake Events URL:
nvd.nist.gov/vuln/detail/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.1
loading . . .
NVD - CVE-2026-43566
https://nvd.nist.gov/vuln/detail/CVE-2026-43566
3 days ago
0
1
0
OpenClaw < 2026.4.10 - Unsanitized External Input in Agent Hook Events URL:
nvd.nist.gov/vuln/detail/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.1
loading . . .
NVD - CVE-2026-43534
https://nvd.nist.gov/vuln/detail/CVE-2026-43534
3 days ago
0
1
0
Multiple Critical Vulnerabilities in Eclipse BaSyx V2 URL:
nvd.nist.gov/vuln/detail/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Proof-of-Concept, CVSSv3.1: 10.0
loading . . .
NVD - CVE-2026-7411
https://nvd.nist.gov/vuln/detail/CVE-2026-7411
3 days ago
0
1
0
Critical vulnerabilities in VM2 Sandbox URL:
nvd.nist.gov/vuln/detail/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Proof-of-Concept, CVSSv3.1: 9.8
loading . . .
NVD - CVE-2026-26332
https://nvd.nist.gov/vuln/detail/CVE-2026-26332
3 days ago
0
0
0
security.paloaltonetworks.com/CVE-2026-0300
loading . . .
CVE-2026-0300 PAN-OS: Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID™ Authentication Portal
A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code wi...
https://security.paloaltonetworks.com/CVE-2026-0300
3 days ago
0
0
1
github.com/thtskaran/cl...
loading . . .
GitHub - thtskaran/claude-code-analysis: We read all 512K lines of Claude Code's accidentally exposed source. 82 docs, 15 diagrams, every subsystem mapped — from the hidden YOLO safety classifier to m...
We read all 512K lines of Claude Code's accidentally exposed source. 82 docs, 15 diagrams, every subsystem mapped — from the hidden YOLO safety classifier to multi-agent swarms. - thtskaran/cla...
https://github.com/thtskaran/claude-code-analysis
4 days ago
0
0
0
Load more
feeds!
log in