Official intelligence summary

HAIJA INTEL REPORT

Generated 01/05/2026, 09:09. Pipeline: Europe/Belgrade. Regular sources favor exploit, blog, red-team, and attack-path content. CVE items only stay with exploit signal.
Total items15
Regular sources5
Tweets / X10
Threshold0.62
You can save this report in your browser with the favorite button. If you need a shared favorite list, use the CLI helper.

Tweets / X

10 items
AS
assetnote @assetnote
30 Apr, 10:26 · core
0.70
We've released a high fidelity detection technique for CVE-2026-41940 (cPanel/WHM auth bypass). You can find the research post here: https:// slcyber.io/research-cente r/high-fidelity-check-for-the-cpanel-authentication…
@Unit42_Intel avatar
Unit42_Intel @Unit42_Intel
30 Apr, 03:33 · secondary
0.49
Autonomous AI is a force multiplier for cloud misconfiguration exploitation. Our multi-agent pen-testing PoC system, Zealot, empirically tests autonomous AI offensive capabilities and raises more questions about AI-driven attacks. Read the full article: https:// bit.ly/3QyXMe1
tweet media
@_JohnHammond avatar
_JohnHammond @_JohnHammond
30 Apr, 03:53 · secondary
0.46
i should probably add to the noise and earn internet points like everybody else screaming about copy dot fail or mini shai hulud or cpanel hacks or github rce or password manager pwnage or codex goblins or zomg ai or whatever else is BREAKINGtoday but i'm just tired man
@pdiscoveryio avatar
pdiscoveryio @pdiscoveryio
30 Apr, 14:08 · secondary
0.39
Here is the equivalent command for vulnx : vulnx search --kev --poc --remote-exploit --template=false
@h4x0r_dz avatar
h4x0r_dz @h4x0r_dz
30 Apr, 23:37 · core
0.32
rip.v8 Calling all Android and Chrome bug hunters ! We're updating our Android & Chrome VRP programs to ensure we can continue to reward the most challenging and impactful vulnerabilities researchers find in our products. For details, https:// bughunters.google.com/blog/evolving-
tweet media
@SpecterOps avatar
SpecterOps @SpecterOps
30 Apr, 21:39 · core
0.32
AI and non-human identities are changing identity security. Join @jaredcatkinson & @JustinKohler10 for a webinar on our latest research into Identity APM adoption, challenges, and operational maturity. Save your spot: https:// ghst.ly/3QQDhcJ
tweet media
@_JohnHammond avatar
_JohnHammond @_JohnHammond
30 Apr, 15:25 · secondary
0.32
Ok, real question: how many of you have mistyped regsvr32.exe too? New blog is out! Got a chance to take a peek at CastleLoader and a .NET stealer we are calling CastleStealer (duh) Their launch_method 4 calls regsrv32.exe. Yes, regsrv32.exe. The devs typo'd a binary
tweet media
@SentinelOne avatar
SentinelOne @SentinelOne
30 Apr, 19:30 · secondary
0.29
In the era of frontier AI models, the question isn't what vulnerabilities exist. It's what an adversary can actually chain together to exploit today. The answer lives not in the model or the SOC, but in the loop between them. And that loop is what we're unveiling today.
tweet media
@Bugcrowd avatar
Bugcrowd @Bugcrowd
30 Apr, 15:37 · secondary
0.29
Copy Fail puts a few uncomfortable questions on the table How much of your isolation story depends on shared-kernel containers? How quickly can your team validate a credible exploit? Is your disclosure intake ready for more reports that look real, and some that
@hdmoore avatar
hdmoore @hdmoore
30 Apr, 15:32 · secondary
0.28
New runZero 4.9: We got you, defenders! Attack path mapping Multi-homed detection 2D/3D topology maps Deep OT intel + field-level discovery Protocol exposures Risk prioritization UI/UX updates Release info: https:// runzero.com/blog/runzero-4 -9 … #OTsecurity
tweet media

Regular sources

5 items
1.00general · 30 Apr, 17:00microsoft.comAttack pathResearch

Email threat landscape: Q1 2026 trends and insights

In early 2026, email threats increased with a rise in credential phishing, QR code phishing, and CAPTCHA-gated campaigns, highlighted by Microsoft’s disruption of the Ty…

1.00exploit · 30 Apr, 15:502 mentionsseclists.orgResearch

Re: Coordinated Disclosure in the LLM Age

Posted by Brian May on Apr 29 Lucas Holt writes: https://research.swtch.com/openssl | Posted by Greg KH on Apr 30 We (on the kernel) are seeing duplicate reports of the same issue from different groups within the time period it takes to get a fix merged (…

1.00critical · 30 Apr, 14:00cisa.gov

ABB Ability OPTIMAX

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to bypass user authentication on OPTIMAX installations that make use of the Azure…

1.00general · 30 Apr, 13:40bleepingcomputer.comPoCWild exploit

Critical cPanel and WHM bug exploited as a zero-day, PoC now available

The critical CVE-2026-41940 authentication bypass vulnerability in cPanel, WHM, and WP Squared is being actively exploited in the wild and has been leveraged in attempts…

1.00general · 30 Apr, 09:07thehackernews.comRCE

Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution

Google has addressed a maximum severity security flaw in Gemini CLI -- the "@google/gemini-cli" npm package and the "google-github-actions/run-gemini-cli" GitHub Actions…