Official intelligence summary

HAIJA INTEL REPORT

Generated 28/04/2026, 09:09. Pipeline: Europe/Belgrade. Regular sources favor exploit, blog, red-team, and attack-path content. CVE items only stay with exploit signal.
Total items15
Regular sources4
Tweets / X11
Threshold0.62
You can save this report in your browser with the favorite button. If you need a shared favorite list, use the CLI helper.

Tweets / X

11 items
H4
h4x0r_dz @h4x0r_dz
28 Apr, 02:58 · core
0.70
good research here Ghost Bits is a brilliant research: https:// i.blackhat.com/Asia-26/Presen tations/Asia-26-Bai-Cast-Attack-Ghost-Bits-4.23.pdf … Now you can reproduce CVE-2025-41242 in Vulhub, Spring/Jetty Path trave…
@PortSwiggerRes avatar
PortSwiggerRes @PortSwiggerRes
27 Apr, 17:21 · core
0.70
We've launched a new @WebSecAcademy topic on exploiting AI-powered security scanners! Learn how to use indirect prompt injection to steal data, cause damage & trigger exploit chains!
tweet media
@h4x0r_dz avatar
h4x0r_dz @h4x0r_dz
27 Apr, 16:41 · core
0.46
Who the fuck is still hosting his bug bounty program on HackerOne? i went to http:// clickup.com. opened the page source. found a hardcoded API key in the javascript. copied it. sent one GET request. got back 959 email addresses and 3,165 internal feature flags. employees from Ho
tweet mediatweet media
@brutelogic avatar
brutelogic @brutelogic
27 Apr, 16:24 · secondary
0.39
We're about to release an open source recon tool on GitHub. Try to get the most URLs out of its testbed with your recon methods (in the shortest time possible) and let us know in the comments. https:// recon.brutelogic.net
@SpecterOps avatar
SpecterOps @SpecterOps
27 Apr, 21:05 · core
0.34
ICYMI @_Mayyhem & Javier Azofra Ovejero shipped MSSQLHound in Go. Same lab, 17 min → under 17 sec Cross-platform, SOCKS, Kerberos/NT hash auth, + 37 BloodHound edges with pathfinding. If MSSQL isn't in your attack paths yet, it should be.
tweet media
@Bugcrowd avatar
Bugcrowd @Bugcrowd
27 Apr, 17:47 · secondary
0.34
A red team is only as strong as its ability to think like the threats you’re actually up against. Bugcrowd’s RTaaS brings crowdsourced specialization to your unique attack surface, helping uncover deeper weaknesses and validate defenses beyond static testing. If you’re
tweet media
@SpecterOps avatar
SpecterOps @SpecterOps
27 Apr, 16:34 · core
0.34
The rush to adopt AI is creating more connections, more identities, and more potential attack paths. @ne0nd0g joined Risky Business to talk through what that means for red teaming & why the fundamentals matter more than ever. : https:// risky.biz/SOAPBOX106/
tweet media
@TheDFIRReport avatar
TheDFIRReport @TheDFIRReport
27 Apr, 14:21 · core
0.34
"The Claude project transcripts under the /bissascanner/ project show the operator using Claude Code to read the scanner codebase, understand lease and acknowledgement flow, troubleshoot misses, review benchmark output, and document the project well enough to rebuild parts of the
tweet media
@Bugcrowd avatar
Bugcrowd @Bugcrowd
28 Apr, 00:01 · secondary
0.32
Attackers are currently exploiting a command injection flaw in DVRs to build out a new Mirai-based botnet. The catch here is that automated scans only tell part of the story. Our Chief Strategy and Trust Officer, @treyford , points out that machine analysis identifies the flaw,
@pdiscoveryio avatar
pdiscoveryio @pdiscoveryio
27 Apr, 20:48 · secondary
0.32
ProjectDiscovery @pdiscoveryio · 12h projectdiscovery.io Benchmarking Neo's Black-Box DAST Capabilities - ProjectDiscovery Blog Since the launch of Neo, we've been steadily expanding what it can do. Neo has found 33+ real CVEs across open-source projects, performed well on white-
@Sysdig avatar
Sysdig @Sysdig
27 Apr, 21:28 · secondary
0.29
New from @Sysdig Threat Research: CVE-2026-42208 is a critical pre-auth SQL injection in LiteLLM, an open-source gateway for OpenAI, Anthropic, and more. It was a very targeted AI attack: • Direct access to API keys, provider creds, env configs • Clear schema awareness
tweet media

Regular sources

4 items
1.00general · 28 Apr, 08:37thehackernews.comTradecraftAttack path

Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover

An administrative role meant for artificial intelligence (AI) agents within Microsoft Entra ID could enable privilege escalation and identity takeover attacks, according…

1.00general · 28 Apr, 07:50thehackernews.comWild exploit

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

Microsoft on Monday revised its advisory for a now-patched, high-severity security flaw impacting Windows Shell to acknowledge that it has been actively exploited in the…

1.00general · 27 Apr, 14:08securityweek.com

Malicious AI Prompt Injection Attacks Increasing, but Sophistication Still Low: Google

The tech giant found that many indirect prompt injection attempts are harmless, but some malicious exploits have also been identified. The post Malicious AI Prompt Injec…

1.00general · 27 Apr, 02:00snyk.ioRCEWild exploitResearch

Qinglong task scheduler RCE vulnerabilities exploited in the wild for cryptomining

Two authentication bypass vulnerabilities (CVE-2026-3965, CVE-2026-4047) in the Qinglong task scheduling panel were exploited in the wild to deploy cryptomining malware.…