Official intelligence summary

HAIJA INTEL REPORT

Generated 07/05/2026, 09:11. Pipeline: Europe/Belgrade. Regular sources favor exploit, blog, red-team, and attack-path content. CVE items only stay with exploit signal.
Total items15
Regular sources3
Tweets / X12
Threshold0.62
You can save this report in your browser with the favorite button. If you need a shared favorite list, use the CLI helper.

Tweets / X

12 items
@SpecterOps avatar
SpecterOps @SpecterOps
06 May, 01:24 · core
0.68
Got identity security on your mind? This #KnowYourAdversary episode with Javier Azofra Ovejero of @SiemensHealth breaks down how attackers exploit gaps between AD, Entra ID, and CyberArk. Listen: https:// ghst.ly/4vsSRvg
tweet media
H4
h4x0r_dz @h4x0r_dz
06 May, 01:26 · core
0.60
Reproducing a Double Free RCE in Apache CVE-2026-23918 on the most used software on the internet with one prompt that costs like $0.001 via DeepSeek is scary as hell. Now, anyone with zero knowledge can hack the interne…
@_xpn_ avatar
_xpn_ @_xpn_
06 May, 21:19 · core
0.56
What GPT 5.4-Cyber can do while you’re 40,000ft in the air If you came to SOCON, you may have seen the fireside chat on Ouroboros (if you weren't too busy counting my "urm"s ). The blog post is now live, detailing how we can use Dev-Tunnels for lateral movement, and allow pivotin
tweet media
RA
Rapid7 @Rapid7
06 May, 15:56 · secondary
0.50
On 5/6/26, #PaloAltoNetworks published a security advisory for a critical vuln. affecting PAN-OS PA-Series & VM-Series firewall appliances. CVE-2026-0300 carries a CVSSv4 score of 9.3 and has been confirmed as exploited…
@SpecterOps avatar
SpecterOps @SpecterOps
06 May, 19:37 · core
0.48
"Red team" has become a catchall term. Some vendors mean pentesting. Others mean compliance theater. None of that tells you what actually matters: Would you detect an attacker once they're already in? @Ne0nd0g breaks it down
tweet media
@_xpn_ avatar
_xpn_ @_xpn_
06 May, 23:18 · core
0.46
In his latest research, @_xpn_ tears apart VS Code Dev Tunnels and finds a C2 framework underneath - REST → WebSocket → SSH → MsgPack RPC, remote exec, file ops. Find the Ouroboros tool and protocol breakdown at the link!
tweet media
@_dirkjan avatar
_dirkjan @_dirkjan
06 May, 14:55 · core
0.46
One month to go until the next public edition of my Entra ID course in The Hague. Working on some roadrecon and roadtx updates from my backlog, and new content on agent identities! Tickets are still available via
tweet media
@h4x0r_dz avatar
h4x0r_dz @h4x0r_dz
06 May, 09:51 · core
0.44
For a Fistful of Dollars: Less than $100 of Compute Surfaces Pre-auth RCE in Apache httpd Write-up:
tweet media
@dunderhay avatar
dunderhay @dunderhay
06 May, 18:02 · curator
0.41
If you came to SOCON, you may have seen the fireside chat on Ouroboros (if you weren't too busy counting my "urm"s ). The blog post is now live, detailing how we can use Dev-Tunnels for lateral movement, and allow pivoting from GitHub/Entra ID access.
tweet media
@BishopFox avatar
BishopFox @BishopFox
06 May, 20:05 · secondary
0.35
A failed login should not take 6 seconds. Bishop Fox researchers reproduced CVE-2026-42208 in LiteLLM’s proxy. The attack requires no authentication, still returns HTTP 401 responses, and uses timing delays to extract sensitive data. Observed in the wild roughly 36 hours after
tweet mediatweet media
@nahamsec avatar
nahamsec @nahamsec
06 May, 23:04 · core
0.34
After not receiving a raise in the four years I’ve worked at BHIS they’ve now decided to reduce my pay by $40k after coming back from maternity leave and moving my role to solely pentesting. So I am looking for a new position effective immediately if anyone has any leads
@h4x0r_dz avatar
h4x0r_dz @h4x0r_dz
06 May, 18:29 · core
0.32
What a surprise A cybersecurity firm, “Red Access,” contacted us less than 24 hours before going to the media with vague claims about Replit. This is not how responsible security research works. The standard practice in terms of disclosure policies, as followed by CISA, CERT/CC,
tweet media

Regular sources

3 items
1.00general · 06 May, 18:00microsoft.comResearch

​​Microsoft named an overall leader in KuppingerCole Analyst’s 2026 Emerging AI Security Operations Center (SOC) report ​​

Microsoft is excited to be named an Overall Leader, and the Market Leader in the Kuppinger Cole Analyst’s 2026 Emerging AI Security Operations Center (SOC) report, as we…

1.00general · 06 May, 11:18bleepingcomputer.comRCE

Palo Alto Networks warns of firewall RCE zero-day exploited in attacks

Palo Alto Networks warned customers today that a critical-severity unpatched vulnerability in the PAN-OS User-ID Authentication Portal is being exploited in attacks. [..…

1.00general · 06 May, 08:14thehackernews.comRCEWild exploit

Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution

Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in the wild. The vulnerabilit…