Official intelligence summary

HAIJA INTEL REPORT

Generated 23/04/2026, 09:09. Pipeline: Europe/Belgrade. Regular sources favor exploit, blog, red-team, and attack-path content. CVE items only stay with exploit signal.
Total items15
Regular sources2
Tweets / X13
Threshold0.62
You can save this report in your browser with the favorite button. If you need a shared favorite list, use the CLI helper.

Tweets / X

13 items
TA
TalosSecurity @TalosSecurity
22 Apr, 16:59 · secondary
0.53
Attackers continued to rely heavily on phishing - an easy and low-cost social engineering operation - for initial access in 2025. For phishing lure trends and more, read the full 2025 Year in Review: https:// cs.co/6018…
RE
RedCanary @RedCanary
22 Apr, 22:18 · secondary
0.46
Zscaler ThreatLabz has published a technical analysis on activity we believe to be orchestrated by Tropic Trooper, using military-themed lures and a trojanized SumatraPDF to deploy AdaptixC2 with a custom GitHub-based C…
TA
TalosSecurity @TalosSecurity
22 Apr, 15:03 · secondary
0.46
Phishing is making a comeback with an AI-powered twist. Read Talos' Q1 2026 Incident Response Trends report to see how threat actors are targeting public administration and how you can lock down your defenses against th…
@TheDFIRReport avatar
TheDFIRReport @TheDFIRReport
22 Apr, 16:57 · core
0.34
We identified an exposed server that provided unusual visibility into a large-scale, multi-victim exploitation and collection operation. Artifacts on the host showed that Claude Code and OpenClaw were embedded in the operator's day-to-day workflow, supporting troubleshooting,
tweet media
@BishopFox avatar
BishopFox @BishopFox
22 Apr, 22:54 · secondary
0.24
Tool Spotlight: CloudFox Cloud pentesting is hard, but it's not because the attacks are so clever. It’s hard because the environment is such a mess. CloudFox helps find the exploitable paths in AWS and GCP.
tweet mediatweet media
@TalosSecurity avatar
TalosSecurity @TalosSecurity
22 Apr, 20:32 · secondary
0.24
The number of device registration events reported by users as fraud increased 178% from 2024 to 2025. Dive deeper into these trends in our Year in Review: https:// cs.co/6014BBBjiA
tweet media
@TalosSecurity avatar
TalosSecurity @TalosSecurity
22 Apr, 18:31 · secondary
0.24
Attacks are becoming faster to build, easier to scale, and increasingly designed to blend into normal activity. Watch the latest TTP for more incident response trends from Q1 2026: https:// cs.co/6010BBDTna
tweet media
@harmj0y avatar
harmj0y @harmj0y
22 Apr, 21:37 · core
0.20
In less than 20 minutes and under $2, we used our .NET reversing capability to run a SAST scan of Azure Cosmos DB in the Microsoft Container Registry (MCR), surfacing a high severity vulnerability in the now-deprecated database. Model: Moonshot AI - Kimi K2.6 Task/agent
tweet media
@SentinelOne avatar
SentinelOne @SentinelOne
22 Apr, 19:31 · secondary
0.20
Three weeks. Three tier-1 supply chain attacks. SentinelOne stopped all three from the moment they were observed in the wild - with no prior knowledge of any payload. LiteLLM. Axios. CPU-Z. Different vectors. Different threat actors. Different techniques. One thing in common:
tweet media
@harmj0y avatar
harmj0y @harmj0y
22 Apr, 08:17 · core
0.20
Gone are the days of risking a Rubeus monitor run (even via the amazing BOF[.]NET by @_EthicalChaos_ ) in your conquest beacon. @virtualloc is crushing it!
tweet mediatweet media
@_RastaMouse avatar
_RastaMouse @_RastaMouse
22 Apr, 06:49 · core
0.20
This is what's happening to YouTube. This is one of my most popular videos. It's how to fix a UEFI bootloader. As you can see the traffic has been cut in half over the last 6 months. But if you Google how to fix a UEFI bootloader, Gemini will give you my exact step by step
tweet mediatweet media
@s0md3v avatar
s0md3v @s0md3v
22 Apr, 03:12 · secondary
0.20
Just released v6.0.0 It supports ECMA 2025 so you can parse js files with cutting-edge syntax. 4x speedup too ^_^ Parse javascript in python Introducing esprima2: https:// github.com/s0md3v/esprima2
tweet mediatweet media
@Rapid7 avatar
Rapid7 @Rapid7
22 Apr, 21:45 · secondary
0.14
Exploited high and critical vulnerabilities are up 105% YoY. The 2026 Global Threat Landscape Report breaks down how shrinking disclosure-to-exploitation timelines are reshaping how teams assess and respond. Download it here: https:// r-7.co/3PicnK6
tweet media

Regular sources

2 items
1.00exploit · 22 Apr, 03:13seclists.org

Re: UAF in rsync 3.4.1 and below

Posted by Sam James on Apr 21 Salvatore Bonaccorso writes: https://github.com/RsyncProject/rsync/issues/871 Over there, tridge says: sam

0.89exploit · 22 Apr, 03:34seclists.org

Re: Go 1.26.2 and Go 1.25.9 are released with 10 security fixes

Posted by Demi Marie Obenour on Apr 21 I believe Fedora manages to package multiple versions of Rust libraries without any problems. They don't ship them to users, thoug…