Breaking News – Cyber Threats (last 6h)
Generated: 2026-05-13 03:00 PDT
- GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data
The Hacker News • 2026-05-13 01:08 • thehackernews.com
Cybersecurity researchers are calling attention to a new campaign dubbed GemStuffer that has targeted the RubyGems repository with more than 150 gems that use the registry as a data exfiltration channel rather than for malware distribution.
“The packages do not appear designed for mass developer compromise,” Socket said. “Many have little or no download activity, and the payloads are repetitive,
https://thehackernews.com/2026/05/gemstuffer-abuses-150-rubygems-to.html - Android Adds Intrusion Logging for Sophisticated Spyware Forensics
The Hacker News • 2026-05-12 23:55 • thehackernews.com
Google on Tuesday unveiled a new opt-in Android feature called Intrusion Logging for storing forensic logs to better analyze sophisticated spyware attacks.
Intrusion Logging, available as part of Advanced Protection Mode, enables “persistent and privacy-preserving forensics logging to allow for investigation of devices in the event of a suspected compromise,” the company said.
The feature, it
https://thehackernews.com/2026/05/android-adds-intrusion-logging-for.html - [GUEST DIARY] Tearing apart website fraud to see how it works., (Wed, May 13th)
SANS ISC Diary (full) • 2026-05-12 23:29 • isc.sans.edu
[This is a Guest Diary by Joshua Nikolson, an ISC Intern and part of the SANS.edu Bachelor's degree in Applied Cybersecurity (BACS) program.]
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
