{"id":367,"date":"2026-02-13T03:18:36","date_gmt":"2026-02-13T03:18:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mhass016\/?page_id=367"},"modified":"2026-02-13T16:26:09","modified_gmt":"2026-02-13T16:26:09","slug":"news","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mhass016\/news\/","title":{"rendered":"NEWS"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Threat Intelligence<\/h2>\n\n\n<ul class=\"is-grid columns-2 wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/tclbanker-banking-trojan-targets.html'>TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/fake-call-history-apps-stole-payments.html'>Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/one-click-total-shutdown-patient-zero.html'>One Click, Total Shutdown: The &quot;Patient Zero&quot; Webinar on Killing Stealth Breaches<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/quasar-linux-rat-steals-developer.html'>Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/one-missed-threat-per-week-what-25m.html'>One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk<\/a><\/div><\/li><\/ul>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Cyber Attacks<\/h2>\n\n\n<ul class=\"is-grid columns-2 wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/tclbanker-banking-trojan-targets.html'>TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/fake-call-history-apps-stole-payments.html'>Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/one-click-total-shutdown-patient-zero.html'>One Click, Total Shutdown: The &quot;Patient Zero&quot; Webinar on Killing Stealth Breaches<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/quasar-linux-rat-steals-developer.html'>Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/one-missed-threat-per-week-what-25m.html'>One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk<\/a><\/div><\/li><\/ul>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerabilities<\/h2>\n\n\n<ul class=\"is-grid columns-2 wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/tclbanker-banking-trojan-targets.html'>TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/fake-call-history-apps-stole-payments.html'>Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/one-click-total-shutdown-patient-zero.html'>One Click, Total Shutdown: The &quot;Patient Zero&quot; Webinar on Killing Stealth Breaches<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/quasar-linux-rat-steals-developer.html'>Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/one-missed-threat-per-week-what-25m.html'>One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk<\/a><\/div><\/li><\/ul>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Artificial Intelligence<\/h2>\n\n\n<ul class=\"is-grid columns-2 wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/techcrunch.com\/2026\/05\/08\/prime-video-follows-netflix-and-disney-by-adding-a-tiktok-like-clips-feed-in-its-app\/'>Prime Video follows Netflix and Disney by adding a TikTok-like \u2018Clips\u2019 feed in its app<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/techcrunch.com\/2026\/05\/08\/intels-comeback-story-is-even-wilder-than-it-seems\/'>Intel\u2019s comeback story is even wilder than it seems<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/techcrunch.com\/2026\/05\/08\/cloudflare-says-ai-made-1100-jobs-obsolete-even-as-revenue-hit-a-record-high\/'>Cloudflare says AI made 1,100 jobs obsolete, even as revenue hit a record high<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/techcrunch.com\/2026\/05\/08\/porsche-shutters-e-bike-battery-software-subsidiaries-as-part-of-company-overhaul\/'>Porsche shutters e-bike, battery, software subsidiaries as part of company overhaul<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/techcrunch.com\/2026\/05\/08\/mother-ventures-is-looking-at-moms-as-the-economic-engine\/'>Mother Ventures is looking at moms as the \u2018economic engine\u2019<\/a><\/div><\/li><\/ul>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n<ul class=\"is-grid columns-2 wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.theverge.com\/games\/927333\/asus-rog-strix-xg129c-secondary-display'>Asus chases Elgato with its own secondary touchscreen display<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.theverge.com\/streaming\/927327\/amazon-prime-video-vertical-video-feed'>Amazon is adding a vertical video feed to Prime Video<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.theverge.com\/tech\/926989\/yarbo-robot-lawn-mower-hack-company-update-security-promise'>Here is Yarbo\u2019s promise to fix the robot mower that ran me over<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.theverge.com\/ai-artificial-intelligence\/902546\/data-centers-ai-energy-power-grids-controversy'>All the latest updates on AI data centers<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.theverge.com\/policy\/927071\/doge-chatgpt-grants-canceled'>DOGE used ChatGPT in a way that was both dumb and illegal, judge rules<\/a><\/div><\/li><\/ul>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Exploit Database<\/h2>\n\n\n<ul class=\"is-grid columns-2 wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.exploit-db.com\/exploits\/52551'>[webapps] ThingsBoard IoT Platform 4.2.0 &#8211; Server-Side Request Forgery (SSRF)<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.exploit-db.com\/exploits\/52552'>[local] NocoBase  2.0.27 &#8211; VM Sandbox Escape<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.exploit-db.com\/exploits\/52553'>[webapps] Bludit CMS 3.18.4 &#8211;  RCE<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.exploit-db.com\/exploits\/52554'>[webapps] LuaJIT 2.1.1774638290 &#8211; Arbitrary Code Execution<\/a><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.exploit-db.com\/exploits\/52555'>[webapps] Ghost CMS 6.19.0 &#8211; SQLi<\/a><\/div><\/li><\/ul>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat Intelligence Cyber Attacks Vulnerabilities Artificial Intelligence Exploit Database<\/p>\n","protected":false},"author":32138,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mhass016\/wp-json\/wp\/v2\/pages\/367"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mhass016\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mhass016\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mhass016\/wp-json\/wp\/v2\/users\/32138"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mhass016\/wp-json\/wp\/v2\/comments?post=367"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/mhass016\/wp-json\/wp\/v2\/pages\/367\/revisions"}],"predecessor-version":[{"id":380,"href":"https:\/\/sites.wp.odu.edu\/mhass016\/wp-json\/wp\/v2\/pages\/367\/revisions\/380"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mhass016\/wp-json\/wp\/v2\/media?parent=367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}