Six more vulnerabilities found in n8n automation platform

Six more vulnerabilities have been discovered in the n8n workflow platform used for building LLM-powered agents to connect business processes....

Microsoft Starts Testing Built-In Sysmon Monitoring in Windows 11

Microsoft is rolling out native Sysmon support in Windows 11 Insider builds, giving security teams built-in system monitoring with optional activation. The post Microsoft Starts...

Chinese-Made Malware Kit Targets Chinese-Based Routers and Edge Devices

DKnife is a Chinese made malware framework that targets Chinese-based users - Read more

Substack Confirms Data Breach, “Limited User Data” Compromised

Substack did not specify the number of users affected by the data breach - Read more

A Victorian schoolteacher was applying for ‘heaps of rentals’ online – then someone accessed...

Michael suspects personal information he submitted to rent application platforms was leaked online. And analysis shows millions of documents may also be at riskGet...

New Cyber Startup Programme to Debut at Infosecurity Europe 2026

Infosecurity Europe 2026 will debut a new Cyber Startup Programme, featuring a dedicated show-floor zone for early-stage cybersecurity companies to showcase innovations, connect with...

Chromium: CVE-2026-1862 Type Confusion in V8

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see (https://chromereleases.googleblog.com/2024 ) for more information. -...

Why Automation Alone Misses AI-Generated Phishing

Phishing has evolved far beyond the crude, mass-produced scams most security teams were trained to recognize. Phishing has evolved far beyond the crude, mass-produced...

Substack data breach leaks users’ email addresses and phone numbers

Substack, a high-profile publishing platform widely used by academics, journalists, subject matter experts, and controversialists, has suffered a data breach...

Chrome Vulnerabilities Allow Code Execution, Browser Crashes

Google released a Chrome security update fixing two high-severity flaws that could enable code execution or crashes via malicious websites. The post Chrome Vulnerabilities Allow...

Latest article

Security posture improvement in the AI era

It’s only been a few weeks since Anthropic announced the Claude Mythos Preview model and launched Project Glasswing with AWS and other...

Metasploit Wrap-Up 05/01/2026

MCP serverThis release our very own cdelafuente-r7 finished implementing the Metasploit MCP Server (msfmcpd), bringing Model Context Protocol support to Metasploit Framework. MCP lets AI applications...

Windows shell spoofing vulnerability puts sensitive data at risk

Microsoft and the US Cybersecurity and Infrastructure Security Agency (CISA) have sounded the alarm about a Windows shell spoofing vulnerability...

Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations

Torrance, United States / California, May 1st, 2026, CyberNewswire Criminal IP partners with Securonix to integrate Criminal IP’s Threat Intelligence into ThreatQ, allowing organizations...