New Exim Exploit, Android Intrusion Logging Feature, Microsoft Issues 138 Security Patches

THN Daily Updates
Newsletter
cover

Fundamentals of Software Testing, 2nd Edition, Revised and Updated ($170.00 Value) FREE for a Limited Time

Software testing has greatly evolved since the first edition of this book in 2011. Testers are now required to work in "agile" teams and focus on automating test cases. It has thus been necessary to update this work, in order to provide fundamental knowledge that testers should have to be effective and efficient in today's world.

Download Now Sponsored
LATEST NEWS May 13, 2026

[Webinar] Why Your AppSec Tools Miss the "Lethal Path" (and How to Fix It)

TL;DR: Stop chasing thousands of "toast" alerts. Join experts from Wiz and Okta/GitLab to learn how hackers connect tiny flaws to build a "Lethal Chain" to your data—and how to break it. Register for the Strategic Brief...

Read More
Twitter Facebook LinkedIn

Most Remediation Programs Never Confirm the Fix Actually Worked

Security teams have never had better visibility into their environments and never been worse at confirming what they fix stays fixed. Mandiant's M-Trends 2026 report puts the mean time to exploit at an estimated negativ...

Read More
Twitter Facebook LinkedIn

Stop Using Spreadsheets and PDFs for Pentest Reporting

Move from static files to live findings, automate remediation, and prove risk reduction. See it in action!

Read More
Twitter Facebook LinkedIn

Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws

Microsoft on Tuesday released patches for 138 security vulnerabilities spanning its product portfolio, although none of them have been listed as publicly known or under active attack. Of the 138 flaws, 30 are rated Cri...

Read More
Twitter Facebook LinkedIn

GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data

Cybersecurity researchers are calling attention to a new campaign dubbed GemStuffer that has targeted the RubyGems repository with more than 150 gems that use the registry as a data exfiltration channel rather than for ...

Read More
Twitter Facebook LinkedIn

Android Adds Intrusion Logging for Sophisticated Spyware Forensics

Google on Tuesday unveiled a new opt-in Android feature called Intrusion Logging for storing forensic logs to better analyze sophisticated spyware attacks. Intrusion Logging, available as part of Advanced Protection Mod...

Read More
Twitter Facebook LinkedIn

New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution

Exim has released security updates to address a severe security issue affecting certain configurations that could enable memory corruption and potential code execution. Exim is an open-source Mail Transfer Agent (MTA) d...

Read More
Twitter Facebook LinkedIn

RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded

RubyGems, the standard package manager for the Ruby programming language, has temporarily paused account sign ups following what has been described as a "major malicious attack." "We're dealing with a major malicious at...

Read More
Twitter Facebook LinkedIn
cover

Fundamentals of Software Testing, 2nd Edition, Revised and Updated ($170.00 Value) FREE for a Limited Time

Software testing has greatly evolved since the first edition of this book in 2011. Testers are now required to work in "agile" teams and focus on automating test cases. It has thus been necessary to update this work, in order to provide fundamental knowledge that testers should have to be effective and efficient in today's world.

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi