
HAIJA INTEL REPORT
Tweets / X
6 items





Regular sources
9 itemsRe: Precise disclosure contents for copyfail (Re: [oss-security] CVE-2026-31431: CopyFail: linux local privilege scalation)
Posted by Emily Shepherd on May 04 Was the PoC of the exploit / some description of its severity not made available by the reporter to the security team / maintainer whe…
Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise
Microsoft Defender Research observed a large-scale credential theft campaign that exemplifies this trend, using code of conduct-themed lures, a multi-step attack chain, …
⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & More
This week, the shadows moved faster than the patches. While most teams were still triaging last month’s alerts, attackers had already turned control panels into kill swi…
CISA says ‘Copy Fail’ flaw now exploited to root Linux systems
CISA has warned that threat actors have started exploiting the "Copy Fail" Linux security vulnerability in the wild, one day after Theori researchers disclosed it and sh…
Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia
The China-based cybercrime group known as Silver Fox has been linked to a new campaign targeting organizations in Russia and India with a new malware called ABCDoor. The…
Re: [pfx] Postfix stable release 3.11.2 and legacy releases 3.10.9, 3.9.10, 3.8.16
Posted by Sam James on May 04 Sam James writes: I am interested in feedback on whether using my own judgement is acceptable for bringing these to oss-security, where I b…
Fwd: [pfx] Postfix stable release 3.11.2 and legacy releases 3.10.9, 3.9.10, 3.8.16
Posted by Sam James on May 04 The most significant one here seems to be the first entry under "Fixed in Postfix 3.8, 3.9, 3.10:". -------------------- Start of forwarded…
Fwd: mutt 2.3.2 released
Posted by Sam James on May 03 In the ChangeLog [0], all of these are listed as security fixes. """ 2026-04-26 10:45:26 +0800 Kevin J. McCarthy (4a9c9248) * Update UPDATI…
What researchers learned about building an LLM security workflow
Security operations centers are running into the same wall everywhere. Detection tools generate more alerts than analysts can work through, and the early stages of any i…