Ethical Hacking Mission Control
This live lab is a safe space for defenders, red teamers, and curious hackers to sharpen their tradecraft using real tooling and real telemetry. Every article, lab module, and intel briefing is curated to help you practice responsible disclosure, grow your skill set, and support the security community.
CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV
Critrical cPanel flaw mass-exploited in "Sorry" ransomware attacks
ConsentFix v3 attacks target Azure with automated OAuth abuse
Trellix Confirms Source Code Breach With Unauthorized Repository Access
15-year-old detained over French govt agency data breach
Microsoft tests modern Windows Run, says it's faster than legacy dialog
30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign
China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists
76% of All Crypto Stolen in 2026 Is Now in North Korea
If AI's So Smart, Why Does It Keep Deleting Production Databases?
Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks
Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations
Edu tech firm Instructure discloses cyber incident, probes impact
Edtech firm Instructure confirms data breach after Salesforce instance hack
Story retracted
Microsoft now lets admins choose pre-installed Store apps to uninstall
Name That Toon: Mark of (Security) Progress
20 Years in Cyber: Dark Reading Marks Milestone With Month of Special Coverage
Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft
US ransomware negotiators get 4 years in prison over BlackCat attacks
Top Five Sales Challenges Costing MSPs Cybersecurity Revenue
Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks
Microsoft fixes Remote Desktop warnings displaying incorrectly
Windows 11 KB5083631 update released with 34 changes and fixes
TeamPCP Hits SAP Packages With 'Mini Shai-Hulud' Attack
Another AI-Assisted Software Scan Yields 9-Year-Old Linux Bug
April KB5083769 Windows 11 update causes backup software failures
New Bluekit phishing service includes an AI assistant, 40 templates
Romanian leader of online swatting ring gets 4 years in prison
FBI links cybercriminals to sharp surge in cargo theft attacks
PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials
Anthropic's Mythos Has Landed: Here's What Comes Next for Cyber
Anti-DDoS Firm Heaped Attacks on Brazilian ISPs
What Happens in the First 24 Hours After a New Asset Goes Live
New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials
EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades
Police dismantles 9 crypto scam centers, arrests 276 suspects
New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions
Critical cPanel and WHM bug exploited as a zero-day, PoC now available
Claude Mythos Fears Startle Japan's Financial Services Sector
ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories
New Linux ‘Copy Fail’ flaw gives hackers root on major distros
Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution
Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining
Reverse Engineering With AI Unearths High-Severity GitHub Bug
Official SAP npm packages compromised to steal credentials
Vect 2.0 Ransomware Acts as Wiper, Thanks to Design Error
New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs
AI Finds 38 Security Flaws in Electronic Health Record Platform
CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV
Oracle Red Bull Racing Team Revs Up Automation to Boost Security
GitHub fixes RCE flaw that gave access to millions of private repos
Popular WordPress redirect plugin hid dormant backdoor for years
Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks
cPanel, WHM emergency update fixes critical auth bypass bug
CISA orders feds to patch Windows flaw exploited as zero-day
Hackers arrested for hijacking and selling 610,000 Roblox accounts
Learning from the Vercel breach: Shadow AI & OAuth sprawl
Lotus Wiper Attack Targeted Venezuelan Energy Firms, Utilities
Broken VECT 2.0 ransomware acts as a data wiper for large files
What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)
SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware
LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure
Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately
European police dismantles €50 million crypto investment fraud ring
Microsoft says backend change broke Teams Free chat and calls
BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
Video service Vimeo confirms Anodot breach exposed user data
Microsoft to deprecate legacy TLS in Exchange Online starting July
Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover
Hackers are exploiting a critical LiteLLM pre-auth SQLi flaw
US reportedly charges Scattered Spider hacker arrested in Finland
NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later
Fresh Wave of GlassWorm VS Code Extensions Slices Through Supply Chain
Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data
Vidar Rises to Top of Chaotic Infostealer Market
Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push
Inside an OPSEC Playbook: How Threat Actors Evade Detection
Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign
Feuding Ransomware Groups Leak Each Other's Data
Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About
After Mythos: New Playbooks For a Zero-Window Era
VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi
Microsoft asks iPhone users to reauthenticate after Outlook outage
Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks
Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE
Microsoft: New Remote Desktop warnings may display incorrectly
UNC6692 Combines Social Engineering, Malware, Cloud Abuse
Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202
FTC: Americans lost over $2.1 billion to social media scams in 2025
Unpatched 'PhantomRPC' Flaw in Windows Enables Privilege Escalation
Canada arrests three for operating “SMS blaster” device in Toronto
Alleged Silk Typhoon hacker extradited to US for cyberespionage
Robinhood account creation flaw abused to send phishing emails
Parsing Agentic Offensive Security's Existential Threat
GlassWorm malware attacks return via 73 OpenVSX "sleeper" extensions
Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware
PyPI package with 1.1M monthly downloads hacked to push infostealer
Webinar: Spotting cyberattacks before they begin
Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack
20-Year-Old Malware Rewrites History of Cyber Sabotage
PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks
Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud
Home security giant ADT data breach affects 5.5 million people
Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side
⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More
Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
China-Backed Hackers Are Industrializing Botnets
CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline
Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software
FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches
Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2
Apple Fixes iOS Flaw That Let FBI Recover Deleted Signal Messages
Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain
Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens
Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API
Toxic Combinations: When Cross-App Permissions Stack into Risk
Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles
Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023
Helping Romance Scam Victims Requires a Proactive, Empathic Approach
Bad Memories Still Haunt AI Agents
'Zealot' Shows What AI's Capable of in Staged Cloud Attack
Electricity Is a Growing Area of Cyber-Risk
Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine
26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases
LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure
UNC6692 Impersonates IT Help Desk via Microsoft Teams to Deploy SNOW Malware
Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign
ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories
[Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed
Project Glasswing Proved AI Can Find the Bugs. Who's Going to Fix Them?
Vercel Finds More Compromised Accounts in Context.ai-Linked Breach
Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug
5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time
Why Most AI Deployments Stall After the Demo
‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty
Patch Tuesday, April 2026 Edition
Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
How AI Assistants are Moving the Security Goalposts
Who is the Kimwolf Botmaster “Dort”?
US Busts Myanmar Ring Targeting US Citizens in Financial Fraud
Glasswing Secured the Code. The Rest of Your Stack Is Still on You
AI Phishing Is No. 1 With a Bullet for Cyberattackers
North Korea's Lazarus Targets macOS Users via ClickFix
Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets
'The Gentlemen' Rapidly Rises to Ransomware Prominence
DPRK Fake Job Scams Self-Propagate in 'Contagious Interview'
Ransomware Negotiator Pleads Guilty to BlackCat Scheme
Exploits Turn Windows Defender Into Attacker Tool
Chinese APT Targets Indian Banks, Korean Policy Circles
Serial-to-IP Devices Hide Thousands of Old & New Bugs
NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software
China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors
Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack
Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape
SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation
22 BRIDGE:BREAK Flaws Expose Thousands of Lantronix and Silex Serial-to-IP Converters
NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs
No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks
Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution
CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines
SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files
⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More
Russia Hacked Routers to Steal Microsoft Office Tokens
‘CanisterWorm’ Springs Wiper Attack Targeting Iran
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
Microsoft Patch Tuesday, March 2026 Edition
Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia
Africa Relinquishes Cyberattack Lead to Latin America — For Now
Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk
Google Fixes Critical RCE Flaw in AI-Based 'Antigravity' Tool
Vercel Employee's AI Tool Access Led to Data Breach
WhatsApp Leaks User Metadata to Attackers
How NIST's Cutback of CVE Handling Impacts Cyber Teams
Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing
Every Old Vulnerability Is Now an AI Vulnerability
Coast Guard's New Cybersecurity Rules Offer Lessons for CISOs
NIST Revamps CVE Framework to Focus on High-Impact Vulnerabilities
North Korea Uses ClickFix to Target macOS Users' Data
'Harmless' Global Adware Transforms Into an AV Killer
Two-Factor Authentication Breaks Free From the Desktop
Microsoft's Original Windows Secure Boot Certificate Is Expiring
6-Year Ransomware Campaign Targets Turkish Homes & SMBs
Critical MCP Integration Flaw Puts NGINX at Risk
Navigating the Unique Security Risks of Asia's Digital Supply Chain
Prepping for 'Q-Day': Why Quantum Risk Management Should Start Now
Audit: Big Tech Often Ignores CA Privacy Law Opt-Out Requests
Microsoft, Salesforce Patch AI Agent Data Leak Flaws
Microsoft Bets $10B to Boost Japan's AI, Cybersecurity
Privilege Elevation Dominates Massive Microsoft Patch Update
EDR-Killer Ecosystem Expansion Requires Stronger BYOVD Defenses
War Game Exercise Demonstrates How Social Media Manipulation Works
Why Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loads
CSA: CISOs Should Prepare for Post-Mythos Exploit Storm
Adobe Patches Actively Exploited Zero-Day That Lingered for Months
Bug Bounty Radar
Hand-picked programs with live scope and standout rewards to help you focus your next responsible disclosure run.
FastAPI Cloud
HackerOne • Updated 2024-05-18
Prototype pollution in async workers and GraphQL stitching flaws.
Scope: api.fastapicloud.com, *.fastapicloud.com
Program brief →Supply Chain Monitor
Bugcrowd • Updated 2024-05-22
Dependency confusion, pipeline breakout, and artifact poisoning.
Scope: *.scm.dev, api.scm.dev
Program brief →Secure Notes
Intigriti • Updated 2024-05-17
OAuth misconfigurations, storage isolation, and advanced XSS chains.
Scope: app.securenotes.io, api.securenotes.io
Program brief →OpenTelemetry Hub
YesWeHack • Updated 2024-05-20
Collector escapes, tenant isolation bugs, and SSRF via exporters.
Scope: *.otelhub.dev
Program brief →