Official intelligence summary

HAIJA INTEL REPORT

Generated 23/04/2026, 09:09. Pipeline: Europe/Belgrade. Regular sources favor exploit, blog, red-team, and attack-path content. CVE items only stay with exploit signal.
Total items15
Regular sources2
Tweets / X13
Threshold0.62
You can save this report in your browser with the favorite button. If you need a shared favorite list, use the CLI helper.

Tweets / X

13 items
@TalosSecurity avatar
TalosSecurity @TalosSecurity
22 Apr, 16:59 · secondary
0.56
Attackers continued to rely heavily on phishing - an easy and low-cost social engineering operation - for initial access in 2025. For phishing lure trends and more, read the full 2025 Year in Review: https:// cs.co/6018BBBeDQ
tweet media
@TalosSecurity avatar
TalosSecurity @TalosSecurity
22 Apr, 15:03 · secondary
0.49
Phishing is making a comeback with an AI-powered twist. Read Talos' Q1 2026 Incident Response Trends report to see how threat actors are targeting public administration and how you can lock down your defenses against these evolving tactics: https:// cs.co/6011B6hCjZ
tweet media
@TheDFIRReport avatar
TheDFIRReport @TheDFIRReport
22 Apr, 16:57 · core
0.48
We identified an exposed server that provided unusual visibility into a large-scale, multi-victim exploitation and collection operation. Artifacts on the host showed that Claude Code and OpenClaw were embedded in the operator's day-to-day workflow, supporting troubleshooting,
tweet media
@BishopFox avatar
BishopFox @BishopFox
22 Apr, 22:54 · secondary
0.34
Tool Spotlight: CloudFox Cloud pentesting is hard, but it's not because the attacks are so clever. It’s hard because the environment is such a mess. CloudFox helps find the exploitable paths in AWS and GCP.
tweet mediatweet media
@TalosSecurity avatar
TalosSecurity @TalosSecurity
22 Apr, 20:32 · secondary
0.34
The number of device registration events reported by users as fraud increased 178% from 2024 to 2025. Dive deeper into these trends in our Year in Review: https:// cs.co/6014BBBjiA
tweet media
@TalosSecurity avatar
TalosSecurity @TalosSecurity
22 Apr, 18:31 · secondary
0.34
Attacks are becoming faster to build, easier to scale, and increasingly designed to blend into normal activity. Watch the latest TTP for more incident response trends from Q1 2026: https:// cs.co/6010BBDTna
tweet media
@harmj0y avatar
harmj0y @harmj0y
22 Apr, 08:17 · core
0.34
Gone are the days of risking a Rubeus monitor run (even via the amazing BOF[.]NET by @_EthicalChaos_ ) in your conquest beacon. @virtualloc is crushing it!
tweet media
@vxunderground avatar
vxunderground @vxunderground
23 Apr, 06:21 · secondary
0.32
Meanwhile in Bug Bounty: AI slop bug reports overflowing vendors. Vendors can't handle the slop. Slop code, slop exploits, and slop write-ups result in vendor exiting program. AI slop is choking Bug Bounty
tweet media
@SentinelOne avatar
SentinelOne @SentinelOne
22 Apr, 19:31 · secondary
0.29
Three weeks. Three tier-1 supply chain attacks. SentinelOne stopped all three from the moment they were observed in the wild - with no prior knowledge of any payload. LiteLLM. Axios. CPU-Z. Different vectors. Different threat actors. Different techniques. One thing in common:
tweet media
@s0md3v avatar
s0md3v @s0md3v
22 Apr, 03:12 · secondary
0.29
Just released v6.0.0 It supports ECMA 2025 so you can parse js files with cutting-edge syntax. 4x speedup too ^_^ Parse javascript in python Introducing esprima2: https:// github.com/s0md3v/esprima2
tweet mediatweet media
@SentinelOne avatar
SentinelOne @SentinelOne
23 Apr, 00:57 · secondary
0.24
The High Stakes: These devices are capable of mesh networking and software-defined control. Centralized cloud control over thousands of these devices means a single configuration change could repurpose them at scale - a risk compounded by the lack of transparency over who
@Rapid7 avatar
Rapid7 @Rapid7
22 Apr, 21:45 · secondary
0.24
Exploited high and critical vulnerabilities are up 105% YoY. The 2026 Global Threat Landscape Report breaks down how shrinking disclosure-to-exploitation timelines are reshaping how teams assess and respond. Download it here: https:// r-7.co/3PicnK6
tweet media
@vxunderground avatar
vxunderground @vxunderground
22 Apr, 07:31 · secondary
0.24
Normal programs are like straight-A students who go to church on Sunday and respect their parents and elders. Malware is like the kid who skips school, smokes marijuana, and has pre-marital sex. Malware is BAD. Malware, not even once

Regular sources

2 items
1.00exploit · 22 Apr, 03:13seclists.org

Re: UAF in rsync 3.4.1 and below

Posted by Sam James on Apr 21 Salvatore Bonaccorso writes: https://github.com/RsyncProject/rsync/issues/871 Over there, tridge says: sam

0.89exploit · 22 Apr, 03:34seclists.org

Re: Go 1.26.2 and Go 1.25.9 are released with 10 security fixes

Posted by Demi Marie Obenour on Apr 21 I believe Fedora manages to package multiple versions of Rust libraries without any problems. They don't ship them to users, thoug…