Official intelligence summary

HAIJA INTEL REPORT

Generated 28/04/2026, 09:09. Pipeline: Europe/Belgrade. Regular sources favor exploit, blog, red-team, and attack-path content. CVE items only stay with exploit signal.
Total items15
Regular sources2
Tweets / X13
Threshold0.62
You can save this report in your browser with the favorite button. If you need a shared favorite list, use the CLI helper.

Tweets / X

13 items
PO
PortSwiggerRes @PortSwiggerRes
27 Apr, 17:21 · core
0.66
We've launched a new @WebSecAcademy topic on exploiting AI-powered security scanners! Learn how to use indirect prompt injection to steal data, cause damage & trigger exploit chains!
@h4x0r_dz avatar
h4x0r_dz @h4x0r_dz
27 Apr, 16:41 · core
0.40
Who the fuck is still hosting his bug bounty program on HackerOne? i went to http:// clickup.com. opened the page source. found a hardcoded API key in the javascript. copied it. sent one GET request. got back 959 email addresses and 3,165 internal feature flags. employees from Ho
tweet mediatweet media
@brutelogic avatar
brutelogic @brutelogic
27 Apr, 16:24 · secondary
0.35
We're about to release an open source recon tool on GitHub. Try to get the most URLs out of its testbed with your recon methods (in the shortest time possible) and let us know in the comments. https:// recon.brutelogic.net
@Bugcrowd avatar
Bugcrowd @Bugcrowd
27 Apr, 17:47 · secondary
0.29
A red team is only as strong as its ability to think like the threats you’re actually up against. Bugcrowd’s RTaaS brings crowdsourced specialization to your unique attack surface, helping uncover deeper weaknesses and validate defenses beyond static testing. If you’re
tweet media
@SpecterOps avatar
SpecterOps @SpecterOps
27 Apr, 21:05 · core
0.28
ICYMI @_Mayyhem & Javier Azofra Ovejero shipped MSSQLHound in Go. Same lab, 17 min → under 17 sec Cross-platform, SOCKS, Kerberos/NT hash auth, + 37 BloodHound edges with pathfinding. If MSSQL isn't in your attack paths yet, it should be.
tweet media
@pdiscoveryio avatar
pdiscoveryio @pdiscoveryio
27 Apr, 20:48 · secondary
0.28
ProjectDiscovery @pdiscoveryio · Apr 27 projectdiscovery.io Benchmarking Neo's Black-Box DAST Capabilities - ProjectDiscovery Blog Since the launch of Neo, we've been steadily expanding what it can do. Neo has found 33+ real CVEs across open-source projects, performed well on whi
@SpecterOps avatar
SpecterOps @SpecterOps
27 Apr, 16:34 · core
0.28
The rush to adopt AI is creating more connections, more identities, and more potential attack paths. @ne0nd0g joined Risky Business to talk through what that means for red teaming & why the fundamentals matter more than ever. : https:// risky.biz/SOAPBOX106/
tweet media
@TheDFIRReport avatar
TheDFIRReport @TheDFIRReport
27 Apr, 14:21 · core
0.28
"The Claude project transcripts under the /bissascanner/ project show the operator using Claude Code to read the scanner codebase, understand lease and acknowledgement flow, troubleshoot misses, review benchmark output, and document the project well enough to rebuild parts of the
tweet media
@Sysdig avatar
Sysdig @Sysdig
27 Apr, 21:28 · secondary
0.25
New from @Sysdig Threat Research: CVE-2026-42208 is a critical pre-auth SQL injection in LiteLLM, an open-source gateway for OpenAI, Anthropic, and more. It was a very targeted AI attack: • Direct access to API keys, provider creds, env configs • Clear schema awareness
tweet media
@Mandiant avatar
Mandiant @Mandiant
27 Apr, 18:00 · secondary
0.25
72 hours remain before the session. Join GTIG Chief Analyst John Hultquist and Mandiant Principal Consultant Omar ElAhdan to explore how security teams are adapting to faster exploitation timelines and AI-enabled threats. Register now → https:// bit.ly/4u76P4g
tweet media
@_JohnHammond avatar
_JohnHammond @_JohnHammond
27 Apr, 15:12 · secondary
0.25
During tax season I got a notification that my tax documents are ready, from... uh... Zoom Phishing email leveraging their legitimate document sharing functionality, pointing to a link and a domain that _looks like_ an IRS website, but, infects your computer. Video link below:
tweet media
@SentinelOne avatar
SentinelOne @SentinelOne
27 Apr, 01:59 · secondary
0.24
We often chase what’s new(or can hype): triaging the latest threats, pushing quick analysis, applying mitigations, and moving on. In that cycle, it’s easy to overlook the value of continuity and historical context in ongoing campaigns. This research from @vkamluk is a good
tweet media
@_xpn_ avatar
_xpn_ @_xpn_
27 Apr, 12:36 · core
0.22
God now I REALLY want a Framework laptop :/ Those Pro's look awesome!

Regular sources

2 items
1.00general · 27 Apr, 14:08securityweek.com

Malicious AI Prompt Injection Attacks Increasing, but Sophistication Still Low: Google

The tech giant found that many indirect prompt injection attempts are harmless, but some malicious exploits have also been identified. The post Malicious AI Prompt Injec…

1.00general · 27 Apr, 02:00snyk.ioRCEWild exploitResearch

Qinglong task scheduler RCE vulnerabilities exploited in the wild for cryptomining

Two authentication bypass vulnerabilities (CVE-2026-3965, CVE-2026-4047) in the Qinglong task scheduling panel were exploited in the wild to deploy cryptomining malware.…