Official intelligence summary

HAIJA INTEL REPORT

Generated 24/04/2026, 09:09. Pipeline: Europe/Belgrade. Regular sources favor exploit, blog, red-team, and attack-path content. CVE items only stay with exploit signal.
Total items15
Regular sources5
Tweets / X10
Threshold0.62
You can save this report in your browser with the favorite button. If you need a shared favorite list, use the CLI helper.

Tweets / X

10 items
@_RastaMouse avatar
_RastaMouse @_RastaMouse
23 Apr, 17:50 · core
0.74
London red teamers, join us on April 30 at 6:00 PM for an evening of knowledge sharing with fellow offensive experts! There will be drinks, presentations, and tradecraft discussions with both internal and consulting red teams. Register now: https:// info.fortra.com/c2lug-april-20
tweet media
SY
Sysdig @Sysdig
23 Apr, 15:00 · secondary
0.69
From disclosure to exploitation in just 12 hours. A newly disclosed SSRF vulnerability in LMDeploy (CVE-2026-33626) was exploited shortly after the GitHub advisory was published, with no public PoC available. ↳ Read the…
@SpecterOps avatar
SpecterOps @SpecterOps
23 Apr, 21:58 · core
0.54
If MSSQL isn't in your attack path visibility yet, this is your sign. @Mayyhem just shipped a major MSSQLHound upgrade with Javier Azofra Ovejero ( https:// github.com/jazofra): faster, cross-platform, and pathfinding-ready in BloodHound. Check it out!
tweet media
@TheDFIRReport avatar
TheDFIRReport @TheDFIRReport
23 Apr, 14:18 · core
0.42
"Beyond the AI-control surface, the host also preserved the operator’s alerting and command channel on Telegram. Runner scripts across the Bissa scanner harness hardcoded a Telegram bot token tied to the bot bissapwned_bot (display name “BissaPwned”, bot user ID 8798206332)
tweet media
@h4x0r_dz avatar
h4x0r_dz @h4x0r_dz
23 Apr, 07:18 · core
0.42
Chinese LLMs can hack better than state-sponsored hackers with properly evolved harness - Kimi K2.5 managed to find and exploit 6 vulnerabilities in browsers: a single page view or an extension install by victims equal full system hijack. Check https:// arxiv.org/abs/2604.20801
tweet media
@CrowdStrike avatar
CrowdStrike @CrowdStrike
23 Apr, 19:00 · secondary
0.36
27 seconds. That’s the record for how quickly an adversary moved laterally after initial access last year. Is your SOC built for that kind of speed? See the science behind our human-backed AI agents at the Agentic SOC Summit: The New Standard for Autonomous Defense.
tweet media
@RedCanary avatar
RedCanary @RedCanary
23 Apr, 22:35 · secondary
0.35
Your inbox is exploding. Then, “IT” calls to help. Think it’s a coincidence? Think again. Our researchers are seeing an uptick in campaigns that leverage email bombing and Teams phishing to cause trouble. See how it works and unpack all of our April findings here:
tweet media
@Mandiant avatar
Mandiant @Mandiant
23 Apr, 20:00 · secondary
0.34
In this episode of The Defender’s Advantage Podcast, host Luke McNamara is joined by Chris Linklater, Practice Leader at Mandiant, to discuss key insights from the M-Trends 2026 report. Take a listen: https:// bit.ly/3QXGEyw
tweet media
@_xpn_ avatar
_xpn_ @_xpn_
23 Apr, 12:18 · core
0.34
Think about the red teams you respect most. Now think about how they actually breach mature environments with strong stacks and strong defenders. It's almost never a memory corruption 0day. It's abuse of functionality.
@_JohnHammond avatar
_JohnHammond @_JohnHammond
23 Apr, 15:01 · secondary
0.32
More ConsentFix -- a "V3" some might say, shared amongst a dark web/cybercrime forum, and a treasure trove of tradecraft to see how bad actors leverage third-party sites and services to do their dirty work. Video link below B E C A U S E A L G O R I T H M
tweet media

Regular sources

5 items
1.00general · 23 Apr, 16:56helpnetsecurity.comAttack path

With AI’s help, North Korean hackers stumbled into a near-undetectable attack

For many years, state-sponsored hacking was defined by human expertise in finding security holes, writing malware and exploits, pulling off social engineering and phishi…

1.00general · 23 Apr, 15:00bishopfox.comResearch

Otto Support - An MCP, Agentic-AI Security Challenge

Bishop Fox built a vulnerable MCP-based customer support tool and turned it into a security challenge. Explore how AI agents interact with tools, escalate privileges, an…

1.00critical · 23 Apr, 14:00cisa.govRCEWild exploit

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-39987 Marimo Remote Code Ex…

1.00general · 23 Apr, 13:05bleepingcomputer.comTradecraft

CISA orders feds to patch BlueHammer flaw exploited as zero-day

CISA has ordered U.S. federal agencies to patch a Microsoft Defender privilege escalation flaw (dubbed BlueHammer) that has been exploited in zero-day attacks. [...]

1.00general · 23 Apr, 02:00intigriti.comResearch

Vulnpocalypse Now? How AI is changing vulnerability discovery

What you will learn How vulnerability research and security testing may evolve in the future, based on expert insights and reflections from Intigriti COO Ed Parsons. How…