Five new holes, one exploited, found in Ivanti Endpoint Manager Mobile
CSO Online 08.05.2026 21:01
The five new vulnerabilities discovered in Ivanti’s on-premises mobile endpoint management solution are a “classic example of the legacy trap” that CSOs must avoid, says an expert.
“Patch today to survive the weekend,” said Robert Enderle of the Enderle Group, “but start planning your exit from legacy MDM as soon as possible.”
TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms
The Hacker News 08.05.2026 18:12
Threat hunters have flagged a previously undocumented Brazilian banking trojan dubbed TCLBANKER that's capable of targeting 59 banking, fintech, and cryptocurrency platforms.
The activity is being tracked by Elastic Security Labs under the moniker REF3076. The malware family is assessed to be a major update of the Maverick, which is known to leverage a worm called SORVEPOTEL to spread via
DNS-Probleme mit .de-Domains: DENIC liefert erste Erklärung
Heise Security 08.05.2026 17:26
Fehlerhafte Signaturen haben am Mittwoch Ausfälle von .de-Domains verursacht. Die Verantwortlichen bei der DENIC haben jetzt Erklärungen geliefert.
Urteil gegen die Apobank: Finanzinstitut haftet für Phishing-Schaden
Heise Security 08.05.2026 17:19
Das Landgericht Berlin verpflichtet die Apobank zur Erstattung von über 200.000 Euro und fordert eine bessere Auswertung von IP-Adressen zur Betrugsprävention.
Australian Cyber Security Centre Issues Alert Over ClickFix Attacks
Infosecurity Magazine 08.05.2026 11:00
ACSC warns over a campaign targeting organizations which uses ClickFix to deliver Vidar infostealer malware
Your CTEM program is probably ignoring MCP. Here’s how to fix it
CSO Online 08.05.2026 10:00
Model Context Protocol (MCP) is the connective tissue of modern AI tooling and has quietly become one of the most significant blind spots in modern security programs. Like shadow IT before it, shadow AI — especially as it relates to MCP risk — introduces a new class of exposures that security teams lack adequate tooling to see and address. Integrating MCP risks into a Continuous Threat Exposure Management (CTEM) program can help security teams keep up by providing a structured methodology and the operational agility needed to surface MCP exposures before attackers do.
Security has always been a race between how fast the attack surface grows and how fast defenders can see it. Vulnerability Management was the first serious attempt to run that race systematically. It worked until the environment got too complex and security teams found themselves prioritizing what was loudest over what was most dangerous. CTEM is built on the same core instinct to find exposures before attackers do but better reflects the business and technical realities of modern IT environments. Most mature security programs already have the bones of it. The question with MCP isn’t whether CTEM applies. It’s whether the scope has been extended to include it.
Dirty Frag: Weitere Root-Lücke gefährdet unzählige Linux-Systeme
Golem 08.05.2026 09:16
Im Netz kursieren erneut Exploits für eine gefährliche Root-Lücke in Linux. Schützende Updates kommen abermals zu spät – wegen eines Embargo-Verstoßes. (Sicherheitslücke, Ubuntu)
Ivanti EPMM: Update stopft bereits angegriffene Sicherheitslücken
Heise Security 08.05.2026 09:12
Ivanti hat Sicherheitsupdates für den Endpoint Manager Mobile (EPMM) veröffentlicht. Sie schließen auch bereits attackierte Lücken.
Pen tests show AI security flaws far more severe than legacy software bugs
CSO Online 08.05.2026 09:01
Penetration tests of AI-based systems are revealing a greater percentage of high-risk flaws than those discovered in legacy systems.
Security consultancy Cobalt’s annual State of Pentesting Report reveals that 32% of all AI and large language model (LLM) findings are rated as high risk — nearly 2.5 times the rate (13%) of severe flaws found in enterprise security tests more generally.
Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions
The Hacker News 08.05.2026 05:12
Details have emerged about a new, unpatched local privilege escalation (LPE) vulnerability impacting the Linux kernel.
Dubbed Dirty Frag, it has been described as a successor to Copy Fail (CVE-2026-31431, CVSS score: 7.8), a recently disclosed LPE flaw impacting the Linux kernel that has since come under active exploitation in the wild. The vulnerability was reported to Linux kernel maintainers