Auto-updating • Public sources • Link-out only

Security Intel

Designed for engineers through CISOs: what is being exploited and what deserves attention. Always validate in your environment.

Feed status
CISA KEVOK
Wiz ResearchOK
AquaOK
Palo Alto Unit 42OK
SnykOK
Updated May 05, 2026 (auto-refresh ~15 min)
Showing 30 of 50
Wiz ResearchMay 05, 2026
Open ↗
Introducing Penetration Test Findings: Unified Offensive Security in Wiz
Streamline pen-testing by unifying findings from bug bounties, manual audits, and Wiz Red Agent into a single, context-rich view.
Wiz ResearchMay 04, 2026
Open ↗
Practical Package Security: The Unofficial Guide
Get actionable best practices to shrink your attack surface, protect execution environments, control package ingestion, and catch compromises early.
Wiz ResearchMay 04, 2026
Open ↗
From Foundation to Force: Your Guide to Operationalizing Wiz at Scale
Following your foundation, operationalize Wiz across development, detection and response, and program maturity so your security program never stops getting stronger.
Wiz ResearchMay 04, 2026
Open ↗
Meet Wiz for M365: Bringing SaaS into the Security Graph
Secure Microsoft 365 and the cloud it powers — one platform, one graph, complete context.
Palo Alto Unit 42May 02, 2026
Open ↗
The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1)
Unit 42 analyzes npm supply chain evolution post-Shai Hulud. Discover wormable malware, CI/CD persistence, multi-stage attacks and more. The post The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1) appeared first on Unit 42.
Palo Alto Unit 42May 01, 2026
Open ↗
Essential Data Sources for Detection Beyond the Endpoint
Unit 42 highlights the need for a comprehensive security strategy that spans every IT zone. Explore the full details here. The post Essential Data Sources for Detection Beyond the Endpoint appeared first on Unit 42.
Wiz ResearchMay 01, 2026
Open ↗
Copy Fail: Universal Linux Local Privilege Escalation Vulnerability
Detect and mitigate Copy Fail (CVE-2026-31431), an easily exploitable vulnerability in the Linux kernel that allows escalation from an unprivileged local user account to root access.
CISA KEVMay 01, 2026High
Open ↗
CVE-2026-31431 — Linux Kernel
Linux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation.
Palo Alto Unit 42Apr 30, 2026
Open ↗
That AI Extension Helping You Write Emails? It’s Reading Them First
Unit 42 uncovers high-risk AI browser extensions. Disguised as productivity tools, they steal data, intercept prompts, and exfiltrate passwords. Protect your browser. The post That AI Extension Helping You Write Emails? It’s Reading Them First appeared first on Unit 42.
Wiz ResearchApr 30, 2026
Open ↗
Red Agent and Claude Opus: Securing Production Targets at Scale
Delivering enterprise-grade continuous AI-powered risk assessment to hundreds of customers through the combined power of Wiz and Anthropic
Wiz ResearchApr 30, 2026
Open ↗
The (In)security Landscape of AI-Powered GitHub Actions (Part 2/2)
When AI meets CI/CD: permission bypasses, prompt injection, and what to do about it.
CISA KEVApr 30, 2026High
Open ↗
CVE-2026-41940 — WebPros cPanel & WHM and WP2 (WordPress Squared)
WebPros cPanel & WHM (WebHost Manager) and WP2 (WordPress Squared) contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.
SnykApr 30, 2026
Open ↗
lightning PyPI Compromise: A Bun-Based Credential Stealer in Python
A malicious release of the lightning PyPI package ships a credential-stealing Bun payload that runs on import. Snyk has a live advisory. Here's what's in the package, what to rotate, and how the payload pattern connects to the Mini Shai-Hulud npm campaign one day earlier.
Wiz ResearchApr 29, 2026
Open ↗
Key Takeaways from the 2026 State of AI in the Cloud Report
How AI Adoption, Autonomy, and Attacker Innovation Are Reshaping Cloud Security
Wiz ResearchApr 29, 2026
Open ↗
Supply Chain Campaign Targets SAP npm Packages with Credential-Stealing Malware
Detect and mitigate malicious npm packages linked to the recent Shai-Hulud-style campaign - Mini Shai Hulud.
Wiz ResearchApr 29, 2026
Open ↗
Wiz Code Week Recap: Securing AI Native Development
Providing Application Security teams with visibility and guardrails to secure agentic software development and the modern software supply chain
SnykApr 29, 2026
Open ↗
Don't Panic: The Thymeleaf Template Injection That Only Hurts If You Let It (CVE-2026-40478)
CVE-2026-40478: The Thymeleaf template injection (CVSS 9.1) is conditional. Patch to 3.1.4+ immediately, and audit your code for dynamic view or template expression misuse, which is the key precondition for exploitability.
SnykApr 29, 2026
Open ↗
"A Mini Shai-Hulud Has Appeared": Bun-Based Stealer Hits SAP @cap-js and mbt npm Packages
A new npm supply chain attack self-branded "Mini Shai-Hulud" compromised four SAP-ecosystem packages on April 29, 2026. Snyk has live advisories. Here's the technical breakdown, IOCs, and what to do.
SnykApr 29, 2026
Open ↗
Bridging the Gap to Autonomous Fixes: Snyk and Atlassian Unveil Intelligent Remediation for Jira
Bridge the gap to autonomous fixes. Snyk and Atlassian integrate to transform Jira security tickets into precision fixes using Snyk Studio AI, eliminating context switching and resolving vulnerabilities in minutes.
CISA KEVApr 28, 2026High
Open ↗
CVE-2024-1708 — ConnectWise ScreenConnect
ConnectWise ScreenConnect contains a path traversal vulnerability which could allow an attacker to execute remote code or directly impact confidential data and critical systems.
CISA KEVApr 28, 2026High
Open ↗
CVE-2026-32202 — Microsoft Windows
Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network.
SnykApr 27, 2026
Open ↗
Malicious Release of elementary-data PyPI Package Steals Cloud Credentials from Data Engineers
Attackers exploited a GitHub Actions script injection vulnerability to publish a malicious version of the elementary-data Python CLI (v0.23.3), embedding a credential-stealing backdoor that targeted dbt profiles, cloud provider keys, and SSH secrets from data engineering environments.
Palo Alto Unit 42Apr 24, 2026
Open ↗
TGR-STA-1030: New Activity in Central and South America
Unit 42 research reports that TGR-STA-1030 remains an active threat, particularly in Central and South America. The post TGR-STA-1030: New Activity in Central and South America appeared first on Unit 42.
CISA KEVApr 24, 2026High
Open ↗
CVE-2025-29635 — D-Link DIR-823X
D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.
CISA KEVApr 24, 2026High
Open ↗
CVE-2024-7399 — Samsung MagicINFO 9 Server
Samsung MagicINFO 9 Server contains a path traversal vulnerability that could allow an attacker to write arbitrary files as system authority.
CISA KEVApr 24, 2026High
Open ↗
CVE-2024-57728 — SimpleHelp SimpleHelp
SimpleHelp contains a path traversal vulnerability that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user.
CISA KEVApr 24, 2026High
Open ↗
CVE-2024-57726 — SimpleHelp SimpleHelp
SimpleHelp contains a missing authorization vulnerability that could allow low-privileged technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.
Palo Alto Unit 42Apr 23, 2026
Open ↗
Frontier AI and the Future of Defense: Your Top Questions Answered
What are the next steps for security leaders in this new age of frontier AI? We answer the top 10 questions customers are asking. The post Frontier AI and the Future of Defense: Your Top Questions Answered appeared first on Unit 42.
Palo Alto Unit 42Apr 23, 2026
Open ↗
Can AI Attack the Cloud? Lessons From Building an Autonomous Cloud Offensive Multi-Agent System
Unit 42 reveals how multi-agent AI systems can autonomously attack cloud environments. Learn critical insights and vital lessons for proactive security. The post Can AI Attack the Cloud? Lessons From Building an Autonomous Cloud Offensive Multi-Agent System appeared first on Unit 42.
CISA KEVApr 23, 2026High
Open ↗
CVE-2026-39987 — Marimo Marimo
Marimo contains an pre-authorization remote code execution vulnerability, allowing an unauthenticated attacked to shell access and execute arbitrary system commands.
Notes
  • • This page aggregates public feeds and links out; it does not scan your environment.
  • • Treat items as signals: verify applicability, exposure, and exploitability before action.
  • • For exec-ready prioritization, pair this with the Reality Assessment.