Introducing IDE-SHEPHERD: Your shield against threat actors lurking in your IDE

IDE-SHEPHERD is an open-source IDE security extension that provides real-time monitoring and protection for VS Code and Cursor. It intercepts malicious process executions, monitors...

CISA Warns of Critical VMware vCenter RCE Vulnerability Now Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting Broadcom’s VMware vCenter Server to its Known Exploited Vulnerabilities (KEV) catalog....

Updated PCI PIN compliance package for AWS Payment Cryptography now available

Amazon Web Services (AWS) is pleased to announce the successful completion of Payment Card Industry Personal Identification Number (PCI PIN) audit for...

Fortinet confirms new zero-day attacks against customer devices

Fortinet has confirmed that a new attack campaign observed recently against customer devices is exploiting an unpatched issue to bypass...

AWS achieves 2025 C5 Type 2 attestation report with 183 services in scope 

Amazon Web Services (AWS) is pleased to announce a successful completion of the 2025 Cloud Computing Compliance Criteria Catalogue (C5) attestation cycle...

Data Leak Exposes 149M Logins, Including Gmail, Facebook

A massive unsecured database exposed 149 million logins, raising concerns over infostealer malware and credential theft. The post Data Leak Exposes 149M Logins, Including Gmail,...

AWS renews the GSMA SAS-SM certification for two AWS Regions and expands to cover...

Amazon Web Services (AWS) is pleased to announce the expansion of GSMA Security Accreditation Scheme for Subscription Management (SAS-SM) certification to four...

Exploring common centralized and decentralized approaches to secrets management

One of the most common questions about secrets management strategies on Amazon Web Services (AWS) is whether an organization should centralize its...

US punts renewal of threat data sharing law to September

US lawmakers have extended the Cybersecurity Information Sharing Act of 2015 for another nine months, buying time to enact a replacement for the legislation....

NHS Issues Open Letter Demanding Improved Cybersecurity Standards from Suppliers

Open letter by NHS technology leaders outlines plans to identify risks to software supply chain security across health and social care system -...

Latest article

Great responsibility, without great power

Welcome to this week’s edition of the Threat Source newsletter. As I’m writing this, today (April 28) is International Superhero Day. If you don’t know the origin story behind...

Imperva Customers Protected Against CVE-2026-41940 in cPanel & WHM

What is CVE-2026-41940? CVE-2026-41940 is a critical authentication bypass vulnerability affecting cPanel & WHM, including DNSOnly, in versions after 11.40. The flaw, discovered by WatchTowr...

Microsoft Windows 11 April 2026 Security Update Breaks Third-Party Backup Applications

Microsoft’s April 2026 cumulative security update for Windows 11 is causing significant disruptions for users relying on third-party backup software, triggering an MS-DEFCON level...

Almost half of UK businesses hit by cyber attacks

The government's annual cyber security report reveals UK businesses are still struggling with the impact of attacks and breaches. - Read more