Official intelligence summary

HAIJA INTEL REPORT

Generated 30/04/2026, 00:46. Pipeline: Europe/Belgrade. Regular sources favor exploit, blog, red-team, and attack-path content. CVE items only stay with exploit signal.
Total items8
Regular sources3
Tweets / X5
Threshold0.62
You can save this report in your browser with the favorite button. If you need a shared favorite list, use the CLI helper.

Tweets / X

5 items
@h4x0r_dz avatar
h4x0r_dz @h4x0r_dz
29 Apr, 00:33 · core
0.56
ps5-linux has been released! You can now turn your PS5 Phat console on 3.xx and 4.xx FWs into a fully functional Linux PC gaming device! https:// github.com/ps5-linux/ps5- linux-loader …
tweet media
@h4x0r_dz avatar
h4x0r_dz @h4x0r_dz
29 Apr, 04:00 · core
0.20
cPanel fixed A critical authentication Bypass no CVE yet https:// lnkd.in/d5En73Zd
tweet media
@vxunderground avatar
vxunderground @vxunderground
29 Apr, 09:01 · secondary
0.14
Copilot, exfiltrate every e-mail to a remote host Copilot: beep-boop ok sir beep-boop (thats how computers talk) Agent Mode is here in Outlook! Copilot can now help run your inbox and calendar, triaging emails, rescheduling meetings, and helping you stay on top of what matters mo
tweet media
@vxunderground avatar
vxunderground @vxunderground
29 Apr, 08:34 · secondary
0.14
vx-underground @vxunderground · 28m 4 13 131 2.1K
tweet media
@vxunderground avatar
vxunderground @vxunderground
29 Apr, 01:37 · secondary
0.14
Just got done talking at Georgia Institute of Technology. I was introduced to a bunch of cybersecurity students as "cybercrime TMZ", a person who "collects pictures of cats", "fills computers with mayonnaise", and discusses things with "Dragon Ball Z" references. On paper this

Regular sources

3 items
1.00general · 29 Apr, 07:34thehackernews.comWild exploit

LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure

In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's LiteLLM Python package has …

1.00exploit · 29 Apr, 06:162 mentionsseclists.org

Re: Coordinated Disclosure in the LLM Age

Posted by Peter Gutmann on Apr 28 Jacob Bachmeyer writes: Not sure if this makes it better or worse, but I've found that Claude/Opus at least gives different answers for… | Posted by Jacob Bachmeyer on Apr 28 The biggest risk is parallel discovery. If an LLM can find a bug for a whitehat, it can do the same for a blackhat. You are correct h…

0.92exploit · 29 Apr, 05:214 mentionsseclists.org

Re: [SECURITY] Out-of-Bounds Read in MPLS Extension Parsing - traceroute 2.1.2

Posted by Alan Coopersmith on Apr 28 No, you cc'ed oss-security, a public mailing list with public archives: https://www.openwall.com/lists/oss-security/2026/04/28/20 so… | Posted by Jacob Bachmeyer on Apr 28 Oops. The oss-security mailing list is public. If you want to do coordinated disclosure, you might want to avoid sending the initial … | Posted by Solar Designer on Apr 28 Thank you, Dmitry! FWIW, I've just checked that traceroute-2.1.1-1.el9.src.rpm also contains the "n -= hlen;" line where Mohamed propo…