ThreatFeed Logo

ThreatFeed Dashboard

by Jerry Craft, ALM-MIS, CISSP, GSEC, GPEN, GCFE

🌍 Timezone not configured. You're using UTC. Set your timezone to see "today's" articles in your local time.
CVE Search Breaches Trends Industries Vendors MITRE ATT&CK Threat Actors Attack-Tools Alerts Investigations Options Login
🎯 Executive Threat Briefings

Daily Digest

24-hour intelligence digest 50 articles • 13 CVEs • 5 breaches

Weekly Digest

2026-04-27 to 2026-05-03 335 articles • 130 CVEs • 28 breaches

Monthly Digest

April 2026 1734 articles • 861 CVEs • 236 breaches

Quarterly Digest

Q1 2026 3 months analyzed

📊 Breach Metrics

Last 256 days: 1187 breaches (4.6/day), 6.4B records + 1139.7TB data exposed, $18.2B in total loss costs (avg $242.9M across 75 breaches reporting costs)

🔐 CVE Metrics

5611 unique CVEs tracked: 439 critical, 2297 high , 2151 medium , 164 low (559 unclassified)

⚔️ MITRE ATT&CK Metrics

299 unique techniques observed
🔥 = Observed in Nth RRA
🥷 = Observed in Nth Pentesting
Top 10:
T1566 Phishing (491) 🥷
T1190 Exploit Public-Facing Application (365) 🥷
T1068 Exploitation for Privilege Escalation (314) 🥷
T1078 Valid Accounts (267) 🔥 🥷
T1059 Command and Scripting Interpreter (265) 🔥 🥷
T1203 Exploitation for Client Execution (258)
T1204 User Execution (127) 🔥
T1539 Steal Web Session Cookie (92)
T1195 Supply Chain Compromise (84)
T1530 Data from Cloud Storage (73)

🛠️ Attacker Tools

426 unique tools tracked: 408 malware families, 19 attack frameworks

🌍 Top Nation-State Activity (90 Days)

View Actors
Trending Up Cooling Off Stable

🤖 AI Investigation Types

View Investigations

🔍 Recent AI Investigations

CRITICAL CVE-2026-0300 is a critical, actively exploited zero-day buffer overflow vulnerability in the Pal...
2026-05-06
HIGH APT37 (aka ScarCruft), a North Korean state-sponsored APT, is conducting an active, multi-vector ...
2026-05-06
CRITICAL DAEMON Tools' official website was compromised in a sophisticated supply-chain attack active from...
2026-05-05
HIGH CVE-2026-31431, dubbed 'Copy Fail', is a nine-year-old local privilege escalation vulnerability i...
2026-05-05
HIGH UAT-8302 is a newly disclosed, sophisticated China-nexus APT group attributed by Cisco Talos, act...
2026-05-05
View All Investigations
Article filters:
Clear

Showing 27 articles.

Articles Today

BleepingComputer (3)
BleepingComputer
Published: 2026-05-06T13:02:52+00:00 | Fetched: 2026-05-06T13:32:35+00:00
The MuddyWater Iranian hackers disguised their operations as a Chaos ransomware attack, relying on Microsoft Teams social engineering to gain access and establish persistence. [...]
BleepingComputer
Published: 2026-05-06T12:56:32+00:00 | Fetched: 2026-05-06T13:32:35+00:00
Most network incidents don't escalate due to a lack of alerts; they escalate when response breaks down. This webinar explores how to fix gaps in triage, enrichment, and coordination. [...]
BleepingComputer
Published: 2026-05-06T09:18:16+00:00 | Fetched: 2026-05-06T09:44:59+00:00
Palo Alto Networks warned customers today that a critical-severity unpatched vulnerability in the PAN-OS User-ID Authentication Portal is being exploited in attacks. [...]
Cisco Talos Blog (1)
Cisco Talos Blog
Published: 2026-05-06T10:00:12+00:00 | Fetched: 2026-05-06T10:38:30+00:00
Talos has recently started to collect and gather intelligence around phone numbers within emails as an additional indicator of compromise (IOC). In this blog, we discuss new insights into in-the-wild phone number reuse in scam emails.
Dark Reading (2)
Dark Reading
Published: 2026-05-06T12:00:00+00:00 | Fetched: 2026-05-06T12:32:13+00:00
As part of its 20th anniversary celebration, Dark Reading looks back on 20 of the biggest newsmaking events from the past two decades that influenced the risk landscape for today's cybersecurity teams.
Dark Reading
Published: 2026-05-06T05:30:00+00:00 | Fetched: 2026-05-06T09:44:55+00:00
As the war with Iran continues, breach attempts targeting the United Arab Emirates tripled in a few weeks — many targeting critical infrastructure.
Have I Been Pwned latest breaches (1)
Have I Been Pwned latest breaches
Published: 2026-05-06T10:11:25+00:00 | Fetched: 2026-05-06T11:33:09+00:00
In April 2026, the commercial residential and ISP proxy network LegionProxy suffered a data breach. The incident exposed 10k email addresses, bcrypt password hashes, names and purchases.
KnowBe4 Blog (1)
KnowBe4 Blog
Published: 2026-05-06T13:00:03+00:00 | Fetched: 2026-05-06T13:32:34+00:00
Read more ▼
MSRC Security Update Guide (2)
MSRC Security Update Guide
Published: 2026-05-06T08:01:29+00:00 | Fetched: 2026-05-06T09:44:53+00:00
Information published.
MSRC Security Update Guide
Published: 2026-05-06T08:01:23+00:00 | Fetched: 2026-05-06T09:44:53+00:00
Information published.
Malwarebytes (2)
Malwarebytes
Published: 2026-05-06T12:50:55+00:00 | Fetched: 2026-05-06T13:32:34+00:00
A legitimate developer tool is being repurposed by attackers to package and spread this Windows infostealer in harder-to-detect ways.
Malwarebytes
Published: 2026-05-06T12:45:54+00:00 | Fetched: 2026-05-06T13:32:34+00:00
ShinyHunters claims it stole personal data from 275 million users on Instructure’s Canvas platform across schools and education providers.
Proofpoint News Feed (1)
Proofpoint News Feed
Published: 2026-05-06T06:26:29+00:00 | Fetched: 2026-05-06T09:44:57+00:00
SecurityWeek (8)
SecurityWeek
Published: 2026-05-06T13:30:00+00:00 | Fetched: 2026-05-06T13:32:36+00:00
The startup will invest in expanding its training categories, optimizing video generation, and growing its partnership ecosystem. The post Herd Security Raises $3 Million for AI-Powered Training Platform appeared first on SecurityWeek.
SecurityWeek
Published: 2026-05-06T13:00:00+00:00 | Fetched: 2026-05-06T13:32:36+00:00
Likely perpetrated by MuddyWater, the attack combined social engineering, persistence, credential harvesting, and data theft. The post Iranian APT Intrusion Masquerades as Chaos Ransomware Attack appeared first on SecurityWeek.
SecurityWeek
Published: 2026-05-06T11:57:40+00:00 | Fetched: 2026-05-06T12:32:17+00:00
Gavril Sandu, 53, was indicted in 2017, but was arrested and extradited to the United States only in 2026. The post Romanian Extradited to US for Role in Hacking Scheme 17 Years Ago appeared first on SecurityWeek.
SecurityWeek
Published: 2026-05-06T10:15:34+00:00 | Fetched: 2026-05-06T10:38:34+00:00
The agency has issued guidance to help critical infrastructure operators prepare for cyberattacks by foreign threat actors. The post CISA: Critical Infrastructure Must Master Isolation, Recovery appeared first on SecurityWeek.
SecurityWeek
Published: 2026-05-06T09:48:39+00:00 | Fetched: 2026-05-06T10:38:34+00:00
The persistent, evasive implant provides remote access, surveillance, and credential exfiltration capabilities. The post Sophisticated Quasar Linux RAT Targets Software Developers appeared first on SecurityWeek.
SecurityWeek
Published: 2026-05-06T08:33:40+00:00 | Fetched: 2026-05-06T09:45:18+00:00
While trojanized Daemon Tools versions were installed worldwide, a sophisticated backdoor was dropped only on a dozen systems. The post Government, Scientific Entities Hit via Daemon Tools Supply Chain Attack appeared first on SecurityWeek.
SecurityWeek
Published: 2026-05-06T06:32:17+00:00 | Fetched: 2026-05-06T09:45:18+00:00
Containing fixes for critical-severity vulnerabilities, the monthly rollouts will focus on addressing priority issues faster. The post Oracle Debuts Monthly Critical Security Patch Updates appeared first on SecurityWeek.
SecurityWeek
Published: 2026-05-06T04:46:23+00:00 | Fetched: 2026-05-06T09:45:18+00:00
CVE-2026-0300 affects the Captive Portal service of PAN-OS software on PA and VM series firewalls. The post Palo Alto Networks to Patch Zero-Day Exploited to Hack Firewalls appeared first on SecurityWeek.
The Hacker News (5)
The Hacker News
Published: 2026-05-06T12:03:00+00:00 | Fetched: 2026-05-06T13:32:31+00:00
Read more ▼
The Hacker News
Published: 2026-05-06T10:57:00+00:00 | Fetched: 2026-05-06T13:32:31+00:00
Read more ▼
The Hacker News
Published: 2026-05-06T09:13:00+00:00 | Fetched: 2026-05-06T09:44:55+00:00
Read more ▼
The Hacker News
Published: 2026-05-06T08:34:00+00:00 | Fetched: 2026-05-06T09:44:55+00:00
Read more ▼
The Hacker News
Published: 2026-05-06T06:14:00+00:00 | Fetched: 2026-05-06T09:44:55+00:00
Read more ▼
The Record from Recorded Future News (1)
The Record from Recorded Future News
Published: 2026-05-06T12:45:00+00:00 | Fetched: 2026-05-06T13:32:36+00:00
Researchers at Kaspersky said attackers tampered with installers for Daemon Tools — a popular program used to mount disk images as virtual drives — and distributed them through the software’s official website.