Ethical Hacking Mission Control
This live lab is a safe space for defenders, red teamers, and curious hackers to sharpen their tradecraft using real tooling and real telemetry. Every article, lab module, and intel briefing is curated to help you practice responsible disclosure, grow your skill set, and support the security community.
76% of All Crypto Stolen in 2026 Is Now in North Korea
If AI's So Smart, Why Does It Keep Deleting Production Databases?
Name That Toon: Mark of (Security) Progress
20 Years in Cyber: Dark Reading Marks Milestone With Month of Special Coverage
TeamPCP Hits SAP Packages With 'Mini Shai-Hulud' Attack
Another AI-Assisted Software Scan Yields 9-Year-Old Linux Bug
Anthropic's Mythos Has Landed: Here's What Comes Next for Cyber
Claude Mythos Fears Startle Japan's Financial Services Sector
Reverse Engineering With AI Unearths High-Severity GitHub Bug
Vect 2.0 Ransomware Acts as Wiper, Thanks to Design Error
AI Finds 38 Security Flaws in Electronic Health Record Platform
Oracle Red Bull Racing Team Revs Up Automation to Boost Security
Lotus Wiper Attack Targeted Venezuelan Energy Firms, Utilities
BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later
Fresh Wave of GlassWorm VS Code Extensions Slices Through Supply Chain
Vidar Rises to Top of Chaotic Infostealer Market
Feuding Ransomware Groups Leak Each Other's Data
UNC6692 Combines Social Engineering, Malware, Cloud Abuse
Unpatched 'PhantomRPC' Flaw in Windows Enables Privilege Escalation
Parsing Agentic Offensive Security's Existential Threat
20-Year-Old Malware Rewrites History of Cyber Sabotage
China-Backed Hackers Are Industrializing Botnets
Helping Romance Scam Victims Requires a Proactive, Empathic Approach
Bad Memories Still Haunt AI Agents
'Zealot' Shows What AI's Capable of in Staged Cloud Attack
Electricity Is a Growing Area of Cyber-Risk
US Busts Myanmar Ring Targeting US Citizens in Financial Fraud
Glasswing Secured the Code. The Rest of Your Stack Is Still on You
AI Phishing Is No. 1 With a Bullet for Cyberattackers
North Korea's Lazarus Targets macOS Users via ClickFix
Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets
'The Gentlemen' Rapidly Rises to Ransomware Prominence
DPRK Fake Job Scams Self-Propagate in 'Contagious Interview'
Ransomware Negotiator Pleads Guilty to BlackCat Scheme
Exploits Turn Windows Defender Into Attacker Tool
Chinese APT Targets Indian Banks, Korean Policy Circles
Serial-to-IP Devices Hide Thousands of Old & New Bugs
Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia
Africa Relinquishes Cyberattack Lead to Latin America — For Now
Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk
Google Fixes Critical RCE Flaw in AI-Based 'Antigravity' Tool
Vercel Employee's AI Tool Access Led to Data Breach
WhatsApp Leaks User Metadata to Attackers
How NIST's Cutback of CVE Handling Impacts Cyber Teams
Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing
Every Old Vulnerability Is Now an AI Vulnerability
Coast Guard's New Cybersecurity Rules Offer Lessons for CISOs
NIST Revamps CVE Framework to Focus on High-Impact Vulnerabilities
North Korea Uses ClickFix to Target macOS Users' Data
'Harmless' Global Adware Transforms Into an AV Killer
Two-Factor Authentication Breaks Free From the Desktop
Microsoft's Original Windows Secure Boot Certificate Is Expiring
6-Year Ransomware Campaign Targets Turkish Homes & SMBs
Critical MCP Integration Flaw Puts NGINX at Risk
Navigating the Unique Security Risks of Asia's Digital Supply Chain
Prepping for 'Q-Day': Why Quantum Risk Management Should Start Now
Audit: Big Tech Often Ignores CA Privacy Law Opt-Out Requests
Microsoft, Salesforce Patch AI Agent Data Leak Flaws
Microsoft Bets $10B to Boost Japan's AI, Cybersecurity
Privilege Elevation Dominates Massive Microsoft Patch Update
EDR-Killer Ecosystem Expansion Requires Stronger BYOVD Defenses
War Game Exercise Demonstrates How Social Media Manipulation Works
Why Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loads
CSA: CISOs Should Prepare for Post-Mythos Exploit Storm
Adobe Patches Actively Exploited Zero-Day That Lingered for Months
Bug Bounty Radar
Hand-picked programs with live scope and standout rewards to help you focus your next responsible disclosure run.
FastAPI Cloud
HackerOne • Updated 2024-05-18
Prototype pollution in async workers and GraphQL stitching flaws.
Scope: api.fastapicloud.com, *.fastapicloud.com
Program brief →Supply Chain Monitor
Bugcrowd • Updated 2024-05-22
Dependency confusion, pipeline breakout, and artifact poisoning.
Scope: *.scm.dev, api.scm.dev
Program brief →Secure Notes
Intigriti • Updated 2024-05-17
OAuth misconfigurations, storage isolation, and advanced XSS chains.
Scope: app.securenotes.io, api.securenotes.io
Program brief →OpenTelemetry Hub
YesWeHack • Updated 2024-05-20
Collector escapes, tenant isolation bugs, and SSRF via exporters.
Scope: *.otelhub.dev
Program brief →