Hackers Use AI for Exploit Development, Attack Automation
Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestrate complex attacks.
darkreading – Read More
Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestrate complex attacks.
darkreading – Read More
Using a vulnerability in the portal, hackers accessed names, addresses, email addresses, and phone numbers.
The post Skoda Data Breach Hits Online Shop Customers appeared first on SecurityWeek.
SecurityWeek – Read More
Defending a network at 2 am looks a lot like this: an analyst copy-pasting a hash from a PDF into a SIEM query. A red team script is being rewritten by hand so the blue team can use it. A patch waiting on a change-approval window that’s longer than the exploitation window itself.
Nobody in that chain is incompetent. Every human is doing their job correctly. The problem is the system, its
The Hacker News – Read More
Dubai, UAE, 11th May 2026, CyberNewswire
Hackread – Cybersecurity News, Data Breaches, AI and More – Read More
Tens of thousands of students studying for final exams around the world have regained access to a key online learning system after a cyberattack had earlier knocked it offline.
The post Canvas System Is Online After a Cyberattack Disrupted Thousands of Schools appeared first on SecurityWeek.
SecurityWeek – Read More
Also called Copy Fail 2 and tracked as CVE-2026-43284 and CVE-2026-43500, the exploit was disclosed before a patch was released.
The post New ‘Dirty Frag’ Linux Vulnerability Possibly Exploited in Attacks appeared first on SecurityWeek.
SecurityWeek – Read More
A malicious version of the plugin was published to the Jenkins Marketplace late last week.
The post Checkmarx Jenkins AST Plugin Compromised in Supply Chain Attack appeared first on SecurityWeek.
SecurityWeek – Read More
The second iteration of the German-speaking online crime marketplace had over 22,000 users and more than 100 sellers.
The post Resurrected ‘Crimenetwork’ Marketplace Taken Down, Administrator Arrested appeared first on SecurityWeek.
SecurityWeek – Read More

I’m happy to announce that we are releasing the beta version of RAPTR, a fully open source, API driven collaboration platform built specifically for red and purple team engagements.
Check out the code on GitHub, read the docs, or try out the latest build at our sandbox.
Up until recently, our team relied on PurpleOps for our Purple Team engagements. It’s a solid tool and served as a good starting point for us. Eventually, we needed more out of it, so we maintained our own custom fork to patch in the improvements our workflows required.
However, as our requirements increased, we started to encounter structural limitations. The technical debt began to catch up with us, and the underlying architecture had technical limitations that meant I couldn’t implement the advanced features and integrations we wanted without rebuilding everything from scratch.
So, I decided to build a replacement from scratch.
At its core, RAPTR aims to be an easy-to-use web application where red and blue teams can collaborate. The workflow is designed to help you plan engagements, document attacks and detections, evaluate the results, and generate Jinja-templatable reports.
Here is how the platform breaks down:
The project is currently in beta. It’s stable enough for testing, but we are looking for feedback from the community to iron out the bugs and validate the feature set before a 1.0 release.
Feel free to deploy it, test it out on your next lab engagement, and open an issue on GitHub if you run into bugs or have feature requests. PRs are always welcome.
If you have any questions or would like a tour of the application, or if you would just like to chat about Purple Teaming, please don’t hesitate to get in touch.
Compass Security Blog – Read More
Victims span across the aviation, critical infrastructure, energy, logistics, public administration, and technology sectors.
The post Over 500 Organizations Hit in Years-Long Phishing Campaign appeared first on SecurityWeek.
SecurityWeek – Read More