Official intelligence summary

HAIJA INTEL REPORT

Generated 11/05/2026, 09:11. Pipeline: Europe/Belgrade. Regular sources favor exploit, blog, red-team, and attack-path content. CVE items only stay with exploit signal.
Total items15
Regular sources4
Tweets / X11
Threshold0.62
You can save this report in your browser with the favorite button. If you need a shared favorite list, use the CLI helper.

Tweets / X

11 items
@SpecterOps avatar
SpecterOps @SpecterOps
08 May, 16:41 · core
0.76
Security teams need to understand how attackers operate in Azure and Entra ID. Adversary Perspectives: Azure teaches how adversaries exploit weaknesses in Azure & Entra ID, w/ practical tradecraft for red & blue teams. Join us in Amsterdam next month! https:// ghst.ly/4mR0Ga1
tweet media
@_RastaMouse avatar
_RastaMouse @_RastaMouse
09 May, 12:11 · core
0.62
Modern C2 implants use sleep masking & metamorphic code to stay hidden. We’re revealing how to unmask them using low-level runtime telemetry (ETW & CPU profiling) live in production including a POC with a lightweight sensor. My team will be presenting our research at x33fcon:
tweet media
UN
Unit42_Intel @Unit42_Intel
08 May, 01:38 · secondary
0.60
New threat brief: CVE-2026-0300, a buffer overflow vulnerability in the PAN-OS User-ID Authentication Portal. Unit 42 observed limited exploitation for unauthenticated RCE. Read our analysis for mitigation steps and Pal…
@Unit42_Intel avatar
Unit42_Intel @Unit42_Intel
08 May, 21:20 · secondary
0.59
We observed a phishing campaign pivot to evade static analysis, shifting from credential theft to #OAuth device code phishing. Attackers replaced hardcoded URLs with runtime-fetched landing pages and generated images as blob URLs. Details at: https:// bit.ly/4uCtzJQ
tweet mediatweet media
@h4x0r_dz avatar
h4x0r_dz @h4x0r_dz
09 May, 17:23 · core
0.48
Finally, someone exploited the http:// copy.fail I wrote a blog post about the recent copy(dot)fail bug, trying to explain some general concepts that I think were glossed over in the official article by @theori_io. https:// retr0.zip/blog/cve-2026- 31431-copy-fail.html …
tweet media
@SentinelOne avatar
SentinelOne @SentinelOne
08 May, 20:10 · secondary
0.45
Ransomware negotiator tied to $56M in attacks was sentenced, DPRK-linked fraudulent IT worker schemes were disrupted, novel PCPJack attacks cloud infrastructure to steal credentials, and a Palo Alto firewall zero-day is under active exploitation. This is the Good, Bad & Ugly.
tweet media
@SpecterOps avatar
SpecterOps @SpecterOps
09 May, 01:00 · core
0.40
What does it take to build the foundation for a graph that can grow beyond Active Directory? In his latest blog post, Brandon Shearin reflects on a year building OpenGraph for BloodHound, & the work of turning ambiguity into architecture. Check it out
tweet media
@_RastaMouse avatar
_RastaMouse @_RastaMouse
09 May, 16:28 · core
0.36
Finally had time to add EtwInspector to the PSGallery! Check it out. PSGallery: https:// powershellgallery.com/packages/EtwIn spector/1.2.0 … GitHub: https:// github.com/jonny-jhnson/E TWInspector …
tweet media
@_xpn_ avatar
_xpn_ @_xpn_
10 May, 10:57 · core
0.32
The best part of this blog is the duality section. So frigging refreshing to read that. Thanks! If you came to SOCON, you may have seen the fireside chat on Ouroboros (if you weren't too busy counting my "urm"s ). The blog post is now live, detailing how we can use Dev-Tunnels fo
tweet media
@Sysdig avatar
Sysdig @Sysdig
08 May, 20:45 · secondary
0.31
With public exploit code already available, defenders should assume any local foothold on an unpatched Linux system (including from within a container) can rapidly become root access. ↳ Get the full breakdown: https:// okt.to/k93xez
tweet media
@taviso avatar
taviso @taviso
10 May, 04:05 · secondary
0.29
There's a patch available now, that was quick! Here's my demo. I only tested it on Firefox, but any browser that doesn't support PNA is probably affected. https:// lock.cmpxchg8b.com/Ceem9iji/ankim srv.html … https:// github.com/ankitects/anki /releases …

Regular sources

4 items
1.00general · 08 May, 16:13helpnetsecurity.comPoCTradecraft

Dirty Frag: Unpatched Linux vulnerability delivers root access

A week after Copy Fail, another Linux local privilege escalation vulnerability dubbed “Dirty Frag” has been revealed, along with a PoC exploit. What is Dirty Frag In eff…

1.00exploit · 08 May, 01:34seclists.org

Copy Fail 2 / Dirty Frag - n-day from public commit, not embargo break

Posted by SiCk on May 07 Hi, I'm _SiCk (afflicted.sh, 0xdeadbeefnetwork on GitHub). The May 7 LWN piece on "Dirty Frag" raises the question of how the bug surfaced befor…

0.89exploit · 08 May, 06:30seclists.org

Re: XSS in Postorius (Mailman 3) 1.3.13 and earlier

Posted by Demi Marie Obenour on May 07 Yikes! Looks like the PyPI version is also vulnerable. I wonder if Postorius is going to make a release again, or if users should …