Official intelligence summary

HAIJA INTEL REPORT

Generated 29/04/2026, 09:09. Pipeline: Europe/Belgrade. Regular sources favor exploit, blog, red-team, and attack-path content. CVE items only stay with exploit signal.
Total items15
Regular sources3
Tweets / X12
Threshold0.62
You can save this report in your browser with the favorite button. If you need a shared favorite list, use the CLI helper.

Tweets / X

12 items
@SpecterOps avatar
SpecterOps @SpecterOps
28 Apr, 15:15 · core
0.70
Identity risk is accelerating & orgs are adapting. Our Trends in Identity Attack Path Management Report shows: 35% fully implemented APM 75% increasing identity security spend AI is expanding identity risk Check it out: https:// ghst.ly/3Qv0cKJ
tweet media
H4
h4x0r_dz @h4x0r_dz
28 Apr, 02:58 · core
0.70
good research here Ghost Bits is a brilliant research: https:// i.blackhat.com/Asia-26/Presen tations/Asia-26-Bai-Cast-Attack-Ghost-Bits-4.23.pdf … Now you can reproduce CVE-2025-41242 in Vulhub, Spring/Jetty Path trave…
JH
Jhaddix @Jhaddix
28 Apr, 21:48 · core
0.52
Our sponsor this week is @harmonicsec ! Want to see every plugin, skill, MCP server, connector, extension, and scheduled task running in Claude Desktop? Now you can thanks to @harmonicsec ’s free tool: claudit-sec: http…
@Bugcrowd avatar
Bugcrowd @Bugcrowd
28 Apr, 18:25 · secondary
0.39
The latest data on Microsoft vulnerabilities shows a 6% drop in total bugs, but the critical flaws have doubled. Risk is concentrating in the cloud and Office suite, where Azure and Dynamics 365 saw a massive jump in severe findings. With AI speeding up how fast exploits are
tweet media
@mrgretzky avatar
mrgretzky @mrgretzky
28 Apr, 13:41 · core
0.36
Super proud and excited to be joining this year's extraordinary line-up at @x33fcon ! This time, I will be showing a new phishing technique that involves downgrading FIDO MFA to less secure, phishable fallbacks. See you in June!
tweet media
@brutelogic avatar
brutelogic @brutelogic
28 Apr, 16:35 · secondary
0.29
Released unKover, a 403 access bypass tester. Part of our open source recon suite. Built to ace our comprehensive testbed. Definitely worth checking this out. #Bypass #BugBounty #PenTesting
tweet media
@brutelogic avatar
brutelogic @brutelogic
28 Apr, 15:47 · secondary
0.29
Just released reKover, an URL mapper. Part of our open source recon tools suite. Designed to be simple, fast and stealthy. Worth checking it out. #Recon #BugBounty #PenTesting
tweet media
@Mandiant avatar
Mandiant @Mandiant
28 Apr, 19:00 · secondary
0.28
UNC6692 is impersonating IT helpdesk employees on Microsoft Teams to deploy custom malware. The SNOW ecosystem (SNOWBELT, SNOWGLAZE, SNOWBASIN) enables deep network penetration and exfiltration. Read the analysis and get indicators of compromise. https:// goo.gle/3OVpSzs
tweet media
@CrowdStrike avatar
CrowdStrike @CrowdStrike
28 Apr, 16:00 · secondary
0.28
#FalCon2026 is where learning becomes action. From Hands-on Workshops to Adversary Tradecraft to CrowdStrike University, build skills that will make you indispensable. Join us → https:// crwdstr.ke/6012BBzSkQ August 31 - September 3 | Mandalay Bay
tweet media
@Bugcrowd avatar
Bugcrowd @Bugcrowd
28 Apr, 00:01 · secondary
0.28
Attackers are currently exploiting a command injection flaw in DVRs to build out a new Mirai-based botnet. The catch here is that automated scans only tell part of the story. Our Chief Strategy and Trust Officer, @treyford , points out that machine analysis identifies the flaw,
@albinowax avatar
albinowax @albinowax
28 Apr, 16:42 · core
0.26
I just did an interview with @SecWeekly , with teasers for my upcoming #BHUSA presentation "Can AI Do Novel Vulnerability Research: Meet the HTTP Terminator", plus reflections on the Top Ten Web Hacking Techniques of 2025 & 2026. Watch it here:
tweet media
@Unit42_Intel avatar
Unit42_Intel @Unit42_Intel
28 Apr, 21:03 · secondary
0.25
We discovered phishing emails falsely warning recipients their mailbox storage limit was exceeded. Emails include shortened links that redirect to fake cloud storage pages, ultimately redirecting users to pages selling VPNs or antivirus software. Details: https:// bit.ly/4tLKnhy
tweet mediatweet media

Regular sources

3 items
1.00general · 28 Apr, 13:18thehackernews.comRCE

Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE

Cybersecurity researchers have disclosed details of a critical security flaw impacting LeRobot, Hugging Face's open-source robotics platform with nearly 24,000 GitHub st…

1.00general · 28 Apr, 08:37thehackernews.comTradecraftAttack path

Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover

An administrative role meant for artificial intelligence (AI) agents within Microsoft Entra ID could enable privilege escalation and identity takeover attacks, according…

1.00general · 28 Apr, 07:50thehackernews.comWild exploit

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

Microsoft on Monday revised its advisory for a now-patched, high-severity security flaw impacting Windows Shell to acknowledge that it has been actively exploited in the…