<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Archives - MASSIVE News</title>
	<atom:link href="https://massive.news/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://massive.news/tag/security/</link>
	<description>Progressive Mix of World News and Propaganda</description>
	<lastBuildDate>Sat, 02 May 2026 09:30:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://massive.news/wp-content/uploads/2024/08/m-150x150.jpg</url>
	<title>Security Archives - MASSIVE News</title>
	<link>https://massive.news/tag/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Teen arrested on suspicion of bomb hoax after Peter Kay show evacuated over ‘suspicious bag’</title>
		<link>https://massive.news/teen-arrested-on-suspicion-of-bomb-hoax-after-peter-kay-show-evacuated-over-suspicious-bag/</link>
		
		<dc:creator><![CDATA[wiredgorilla]]></dc:creator>
		<pubDate>Sat, 02 May 2026 09:30:10 +0000</pubDate>
				<category><![CDATA[World News]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Donald Trump]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[uk]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[us]]></category>
		<category><![CDATA[vladimir putin]]></category>
		<category><![CDATA[war]]></category>
		<category><![CDATA[YouTube]]></category>
		<guid isPermaLink="false">https://massive.news/teen-arrested-on-suspicion-of-bomb-hoax-after-peter-kay-show-evacuated-over-suspicious-bag/</guid>

					<description><![CDATA[<p>PETER Kay’s gig was evacuated mid-performance after the comedian was bundled off stage by security. The...</p>
<p>The post <a href="https://massive.news/teen-arrested-on-suspicion-of-bomb-hoax-after-peter-kay-show-evacuated-over-suspicious-bag/">Teen arrested on suspicion of bomb hoax after Peter Kay show evacuated over ‘suspicious bag’</a> appeared first on <a href="https://massive.news">MASSIVE News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="video-container"><iframe width="560" height="315" src="https://www.youtube.com/embed/OQGtfBn-W3o" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p>PETER Kay’s gig was evacuated mid-performance after the comedian was bundled off stage by security.</p>
<p>The show at the Utilita Arena Birmingham was abruptly cancelled after just 45 minutes on Friday night.</p>
<p>A 19-year-old man was arrested on suspicion of a bomb hoax and remains in custody.</p>
<p>Read more: https://www.thesun.co.uk/news/38993259/peter-kay-gig-evacuated-comedian-bundled-off-stage/</p>
<p>The Sun brings you breaking news and in-depth analysis on the stories that matter most. From the ongoing war in Ukraine to conflicts in the Middle East and US and UK politics, we post updates as they happen. Expect the latest on major global events, pressing political debates, celebrity updates and exclusive royal family content, along with in-depth investigations and expert commentary. Get comprehensive coverage of Donald Trump&#8217;s Presidency, Vladimir Putin&#8217;s actions, and the unfolding drama of the British Royal Family.</p>
<p>Subscribe now for daily updates and exclusive content from The Sun.<br />https://www.youtube.com/c/thesun?sub_confirmation=1</p>
<p>👑 For the latest Royal news, subscribe to The Sun&#8217;s Royal Exclusive YouTube Channel: https://www.youtube.com/@RoyalExclusiveTheSun</p>
<p>Read The Sun: https://bit.ly/3Tay1OY<br />Like The Sun on Facebook: https://www.facebook.com/thesun/<br />Follow The Sun on TikTok: https://www.tiktok.com/@thesun<br />Subscribe to The Sun on Snapchat: https://www.snapchat.com/discover/The_Sun/1633225139<br />#uk #bomb #peterkay</p>
<p>The post <a href="https://massive.news/teen-arrested-on-suspicion-of-bomb-hoax-after-peter-kay-show-evacuated-over-suspicious-bag/">Teen arrested on suspicion of bomb hoax after Peter Kay show evacuated over ‘suspicious bag’</a> appeared first on <a href="https://massive.news">MASSIVE News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Defending Against CORDIAL SPIDER and SNARKY SPIDER with Falcon Shield</title>
		<link>https://massive.news/defending-against-cordial-spider-and-snarky-spider-with-falcon-shield/</link>
		
		<dc:creator><![CDATA[wiredgorilla]]></dc:creator>
		<pubDate>Sat, 02 May 2026 09:18:47 +0000</pubDate>
				<category><![CDATA[Technology and Science]]></category>
		<category><![CDATA[access]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[cases]]></category>
		<category><![CDATA[Counter Adversary Operations]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[evolution]]></category>
		<category><![CDATA[grant]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Surface]]></category>
		<category><![CDATA[Threat Hunting & Intel]]></category>
		<guid isPermaLink="false">https://massive.news/defending-against-cordial-spider-and-snarky-spider-with-falcon-shield/</guid>

					<description><![CDATA[<p>Since October 2025, CrowdStrike Counter Adversary Operations has observed a shift in intrusion tradecraft: Threat actors...</p>
<p>The post <a href="https://massive.news/defending-against-cordial-spider-and-snarky-spider-with-falcon-shield/">Defending Against CORDIAL SPIDER and SNARKY SPIDER with Falcon Shield</a> appeared first on <a href="https://massive.news">MASSIVE News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span readability="52"></p>
<p>Since October 2025, CrowdStrike Counter Adversary Operations has observed a shift in intrusion tradecraft: Threat actors are executing high-speed, SaaS-centric attacks that bypass traditional endpoint visibility. CORDIAL SPIDER and SNARKY SPIDER exemplify this evolution as distinct adversaries conducting rapid data theft and extortion campaigns with striking operational similarities.&nbsp;</p>
<p>In most cases, these adversaries use voice phishing (vishing) to direct targeted users to malicious, SSO-themed adversary-in-the-middle (AiTM) pages, where they capture authentication data and pivot directly into SSO-integrated SaaS applications. By operating almost exclusively within trusted SaaS environments, they minimize their footprint while accelerating time to impact. The combination of speed, precision, and SaaS-only activity creates significant detection and visibility challenges for defenders.&nbsp;</p>
<p>This blog details how these adversaries operate and how CrowdStrike Falcon® Shield identifies and disrupts their attacks.</p>
<h2>How AiTM Pages Enable Initial Access</h2>
<p>During vishing calls, CORDIAL SPIDER and SNARKY SPIDER impersonate IT support and create urgency around account issues or security updates to direct employees to fraudulent AiTM pages. These domains closely mimic legitimate corporate login portals (e.g., &lt;companyname&gt;sso[.]com, my&lt;companyname&gt;[.]com, &lt;companyname&gt;id[.]com, &lt;companyname&gt;internal[.]com). When users enter their credentials, the adversaries capture authentication data and active session tokens in real time. Because the AiTM proxy relays authentication to the legitimate service, users often see a normal login experience and remain unaware of the compromise.</p>
<p>In most observed cases, these credentials grant access to the organization’s identity provider (IdP), providing a single point of entry into multiple SaaS applications. By abusing the trust relationship between the IdP and connected services, the adversaries bypass the need to compromise individual SaaS apps and instead move laterally across the victim&#8217;s entire SaaS ecosystem with a single authenticated session.</p>
<p>Falcon Shield is built to detect these anomalous sign-in attempts. While adversaries attempt to blend in with legitimate activity by aligning source location, device fingerprint, and working hours, Falcon Shield applies advanced anomaly detection to surface subtle deviations. By combining a deep understanding of authentication flows with visibility into network characteristics, anonymization services, and session-clustering methods, Falcon Shield reliably identifies malicious access attempts.&nbsp;</p>
<p></span></p>
<p>The post <a href="https://massive.news/defending-against-cordial-spider-and-snarky-spider-with-falcon-shield/">Defending Against CORDIAL SPIDER and SNARKY SPIDER with Falcon Shield</a> appeared first on <a href="https://massive.news">MASSIVE News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Future of AI-Powered Vulnerability Discovery</title>
		<link>https://massive.news/the-future-of-ai-powered-vulnerability-discovery/</link>
		
		<dc:creator><![CDATA[wiredgorilla]]></dc:creator>
		<pubDate>Sat, 02 May 2026 09:00:16 +0000</pubDate>
				<category><![CDATA[Technology and Science]]></category>
		<category><![CDATA[access]]></category>
		<category><![CDATA[agentic AI]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[cases]]></category>
		<category><![CDATA[Counter Adversary Operations]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Environment]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[full]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Open]]></category>
		<category><![CDATA[openai]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[research]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Space]]></category>
		<category><![CDATA[Surface]]></category>
		<category><![CDATA[Threat Hunting & Intel]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://massive.news/the-future-of-ai-powered-vulnerability-discovery/</guid>

					<description><![CDATA[<p>AI is reshaping the future of vulnerability research. Advanced AI models are capable of discovering vulnerabilities...</p>
<p>The post <a href="https://massive.news/the-future-of-ai-powered-vulnerability-discovery/">The Future of AI-Powered Vulnerability Discovery</a> appeared first on <a href="https://massive.news">MASSIVE News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="video-container"><iframe width="560" height="315" src="https://www.youtube.com/embed/hvtzS6iJCNo" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></div>
<p>AI is reshaping the future of vulnerability research. Advanced AI models are capable of discovering vulnerabilities at machine speed, far faster than organizations can patch them. The consequences for defenders are enormous — and the opportunities for adversaries are vast.</p>
<p>In the latest episode of the Adversary Universe podcast, CrowdStrike’s Adam Meyers, SVP of Counter Adversary Operations, and Cristian Rodriguez, Field CTO of the Americas, unpack some of the most pressing questions facing security teams today: What does AI-powered vulnerability research mean for the future of security operations? How will adversaries use it to their advantage?</p>
<p>Threat actors are already using AI in their operations: The CrowdStrike 2026 Global Threat Report revealed an 89% year-over-year increase in attacks by adversaries using AI. FANCY BEAR, FAMOUS CHOLLIMA, and PUNK SPIDER are among the prolific threat actors weaponizing AI in their operations, using it to craft more convincing phishing lures, automate social engineering, and improve the speed of malicious content. While core tradecraft remains human-driven, AI acts as a force multiplier, helping adversaries increase efficiency. A tool in the eCrime space uses AI to conduct voice phishing attacks, which can now be executed agentically.&nbsp;</p>
<p>As AI continues to rapidly mature and adversaries explore its use, the hosts explain, the pressure is on organizations to defend against their evolving tradecraft. Vulnerability discovery, exploitation, and patching are at the front and center of their concerns. And CrowdStrike is at the forefront of defense, as a founding member of Project Glasswing and participant in OpenAI’s Trusted Access for Cyber program.</p>
<h2>The Looming Vuln-pocalypse</h2>
<p>The most urgent topic discussed is the “vuln-pocalypse,” a term used to describe the projected massive influx of newly discovered vulnerabilities driven by AI-accelerated research.&nbsp;</p>
<p>“I’ve been saying since November, we’re looking at three to nine months until a massive influx of zero-day vulnerabilities,” Adam says in this episode.</p>
<p>To explain why, he describes how vulnerabilities are traditionally found. One uses deep reverse engineering of the target to create an exploit. The other, more frequently used method of fuzzing involves putting random data into a program’s inputs until it crashes, then analyzing the results to see what is broken and potentially exploitable. AI can dramatically accelerate fuzzing by quickly triaging those results in far less time than a human could to find something useful.</p>
<p>More than 48,000 new CVEs were published in 2025.<sup>1</sup> If AI accelerates discovery by even 10x, Adam points out, defenders could be looking at nearly half a million vulnerabilities requiring attention in the coming years. “That’s going to mean significant trouble,” he notes.</p>
<p>Why? Adversaries are eyeing zero-days and weaponizing vulnerabilities at greater speed. In 2025, CrowdStrike Counter Adversary Operations observed a 42% year-over-year increase in the number of zero-days exploited prior to public disclosure, the 2026 Global Threat Report found. Chinese adversaries demonstrated they can consistently operationalize publicly disclosed exploits within days of the vulnerability’s release — in some cases, within two days.&nbsp;</p>
<h2>Not an “End of the World” Situation</h2>
<p>While organizations are rightfully concerned about the rise in vulnerabilities, Adam and Cristian shared some key defensive takeaways to help them approach it.&nbsp;</p>
<h3>Patching Prioritization</h3>
<p>There are two ways organizations typically prioritize patching. The first is prevalence, or how much of that vulnerability is in their environment. The second is severity, typically determined by CVSS score. This system breaks down when adversaries chain multiple vulnerabilities together. While they may appear low-priority in isolation, together they can open a door.&nbsp;</p>
<p>Organizations must be more thoughtful in what they’re patching, how they’re patching, and when. Adam’s guidance is to patch based on what is actively being exploited in the wild; he references CISA’s Known Exploited Vulnerabilities catalog, which shares the vulnerabilities CISA is aware of being exploited on a weekly basis. Security teams don’t have to patch every vulnerability — they have to patch the vulnerabilities that present the greatest threat.&nbsp;</p>
<h3>Zero Days Are Just the Beginning</h3>
<p>Zero-days are alarming, but they’re not the catastrophe many assume they are. Even if an adversary uses a zero-day to gain access, Adam explains, they still need to do something with their access — move laterally, escalate privileges, identify targets, exfiltrate data. All of this post-exploitation activity is observable. If the adversary can be caught, they can be stopped.</p>
<p>These observations contribute to CrowdStrike’s “community immunity,” Cristian says. “Every time an adversary burns through some new type of tradecraft, we’re crowdsourcing that telemetry.” All of this high-fidelity telemetry can then be used to identify that behavior in the future.</p>
<h3>AI in the Defender’s Toolbox</h3>
<p>Below are some of the ways defenders can incorporate AI into their security posture:</p>
<ul>
<li><b>Agentic red teaming:</b> Continuous red-team exercises can surface vulnerabilities in the environment before adversaries find them.</li>
<li><b>AI vulnerability scanning:</b> Use AI to proactively identify vulnerabilities in the development pipeline.</li>
</ul>
<p>Organizations are also advised to stay current on agentic AI news to understand this constantly evolving space and prepare their environments.</p>
<p>Check out the full Adversary Universe podcast episode below or tune in on Spotify and Apple Podcasts.</p>
<p><iframe width="560" height="315" src="https://www.youtube.com/embed/uT4gsfraDYs?si=b-BGIIqwHIdBRH87" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin">[embedded content]</iframe></p>
<h4>Additional Resources</h4>
<p><sup>1</sup>&nbsp;2026 VulnCheck Exploit Intelligence Report</p>
<p>The post <a href="https://massive.news/the-future-of-ai-powered-vulnerability-discovery/">The Future of AI-Powered Vulnerability Discovery</a> appeared first on <a href="https://massive.news">MASSIVE News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
