Google Drive Expands AI Ransomware Detection, File Recovery to More Users

Google expands Drive ransomware detection and file recovery with its latest AI model, which detects 14 times more infections as the features move beyond...

AWS Security Agent on-demand penetration testing now generally available

AWS Security Agent on-demand penetration testing is now generally available, enabling you to run comprehensive security tests across all your applications, not...

Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets

Key Points Check Point Research identified a zero-day vulnerability in the TrueConf client application, tracked as CVE-2026-3502, with a CVSS score of 7.8. The flaw stems...

Hackers Weaponize Legitimate Windows Tools to Disable Antivirus Before Ransomware Attacks

Ransomware attacks have gone far beyond simple malicious code. Today, attackers operate with the precision of a well-planned business, using trusted Windows tools to...

ChatGPT Security Issue Enabled Data Theft via Single Prompt

OpenAI has patched vulnerability, which Check Point said was because of a DNS loophole - Read more

PX4 Autopilot

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker with access to the MAVLink interface to execute arbitrary shell commands without cryptographic authentication. The...

Anritsu Remote Spectrum Monitor

View CSAF Summary Successful exploitation of this vulnerability could allow attackers with network access to alter operational settings, obtain sensitive signal data, or disrupt device availability. The...

Ransomware in 2025: Blending in is the strategy

Ransomware attacks aren’t smash-and-grab anymore. They’re built on access that already looks legitimate — closer to positioning chess pieces than breaking the door down.That’s...

Banning routers won’t fix what’s already broken

America's foreign-made router ban sparked valid debate about supply chains, geopolitics and trust, but the truth is that the ban addresses tomorrow’s procurement decisions...

Latest article

Great responsibility, without great power

Welcome to this week’s edition of the Threat Source newsletter. As I’m writing this, today (April 28) is International Superhero Day. If you don’t know the origin story behind...

Imperva Customers Protected Against CVE-2026-41940 in cPanel & WHM

What is CVE-2026-41940? CVE-2026-41940 is a critical authentication bypass vulnerability affecting cPanel & WHM, including DNSOnly, in versions after 11.40. The flaw, discovered by WatchTowr...

Microsoft Windows 11 April 2026 Security Update Breaks Third-Party Backup Applications

Microsoft’s April 2026 cumulative security update for Windows 11 is causing significant disruptions for users relying on third-party backup software, triggering an MS-DEFCON level...

Almost half of UK businesses hit by cyber attacks

The government's annual cyber security report reveals UK businesses are still struggling with the impact of attacks and breaches. - Read more