Drupal is warning that hackers are attempting to exploit a "highly critical" SQL injection vulnerability announced earlier this week. [...]
Search
Fraud losses don't stop at chargebacks. False declines, account takeovers, and abuse also damage revenue and trust. IPQS breaks down why fraud teams need broader visibility into risk and customer impact. [...]
Unit 42 details Screening Serpens' use of AppDomainManager hijacking and new RAT variants to target tech and defense sectors in recent campaigns. The post Tracking Iranian APT Screening Serpens’ 2026 Espionage Campaigns appeared first on Unit 42.
In the course of the Iran war, gasoline prices have risen sharply recently. The interest in electromobilityhas grown as a result. (electromobility, electric car)
Over-earheadphones from Soundcore with adaptive ANC, hi-res audio and up to 65 hours of battery life are available at Amazon at a special price. (Headphones, audio/video)
CEO Lip-Bu Tan wants Intel to switch from a corporateto a start-up mentality. Decisions should be made faster, products should stay on schedule. (Lip-Bu Tan, Intel)
Jacob Butler, 23, has been arrested in Canada and US authorities are seeking his extradition on computer hacking charges. The post Canadian Man Arrested for Operating Kimwolf Botnet appeared first on SecurityWeek.
Ubiquiti has released security updates to patch three maximum severity vulnerabilities in UniFi OS that can be exploited by remote attackers without privileges. [...]
In Italy, investigators have uncovered a large networkfor illegal streaming. In addition to the sellers, customers are also targeted. (Streaming, Disney)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-9082 Drupal Core SQL Injection Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnera
The acquisition of VMware and Bitnami by Broadcom has made standardized container images and helmet charts enormously more expensive. Alternatives provide a remedy. An advisory text by Erik Brwaldt (software development, virtualisation)
The Turtle Beach Vulcan II TKL Pro offers customizable reverb switchesfor competitive gaming. At Amazon, it is now massively reduced. (Technology/hardware, keyboard)
Data centersfor AI canalso be a field for municipal utilities and municipalities. But when it comes to solving the question of energy supply, people think far too briefly. (Netcologne, AI)
Attackers are targeting Github repositories. Within about six hours, over 5,500 repos were equipped with a backdoor. (Backdoor, Virus)
The last update for Destiny 2 comes at the beginning of June. According to insiders, this is followed by layoffs and an uncertain futurefor Bungie. (Destiny 2, Steam)
Xiaomi's CEO does not think the previous price of the YU7ischeap enough - the new standard version is 3,800 euros below the price of the Model Y. (Xiaomi, electric car)
Open-source framework ROADtools is being misused by threat actors for cloud intrusions. Learn how to identify its malicious use. The post Paved With Intent: ROADtools and Nation-State Tactics in the Cloud appeared first on Unit 42.
Vibe coding makes apps available quickly. But without testing, prototypes become security holes. A report by Oliver Jessner (Security, AI)
The new launch date of the Starship V3 has been postponed to the night of 23 May 2026. The reason was technical problems. (Starship)
Amazon offers a battery-powered pool robot from Aiper that keeps the pools clean. (Technology/Hardware)