⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & More

This week, the shadows moved faster than the patches. While most teams were still triaging last month’s alerts, attackers had already turned control panels into kill switches, kernels into open doors, and open-source pipelines into silent delivery systems. The game has shifted from breach to occupat
ORIGINAL SOURCE →via The Hacker News
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] 60–80% of your CVEs are unreachable. Here's how to prove it.
- [CYBER] Rajasthan Man Posing As "Love Guru" Arrested For Extortion, Blackmailing
- [CYBER] Trellix discloses data breach after source code repository hack
- [CYBER] CVE-2026-42809 - Apache Polaris: An authenticated low-privileged user can abuse Polaris staged table creation to mint broad temporary storage credentials for an attacker-chosen location before Polaris validates that location
- [CYBER] CVE-2026-42812 - Apache Polaris: No protection on `write.metadata.path`
- [CYBER] CVE-2026-37458 - FRRouting FRR Denial of Service