LiveThreat Advisory
// ADVISORIES & THREAT INTEL

ADVISORIES & THREAT INTEL

APT campaigns, nation-state threats, and security advisories analyzed through a third-party risk management lens.

Breaches Advisories Vulnerabilities 📡 RSS
Time: Severity: 3078 items
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFVerizon DBIR Finds 31% of Breaches Initiated via Exploits, Highlighting Enterprise Vulnerability Glut

Verizon’s 2026 DBIR reports that exploit techniques now drive 31 % of initial‑access breaches, exposing a dangerous vulnerability glut across enterprises. The finding underscores the need for rigorous third‑party patch management in TPRM programs.

High · May 19, 2026 · Dark Reading
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFAI Agent Prompt‑Injection Risks Highlight Need for Secure Automation Workflows

HackRead warns that generative‑AI agents with high privileges are vulnerable to prompt‑injection attacks that can leak data or trigger malicious actions. Organizations must inventory AI agents, enforce prompt validation, and embed security clauses in vendor contracts to mitigate this emerging threat.

Medium · May 19, 2026 · HackRead
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFStealer Spoofs Google, Microsoft & Apple to Backdoor macOS via Fake WeChat and Miro Installers

The SHub Reaper stealer disguises itself as popular apps, leveraging AppleScript to gain persistence on macOS and steal credentials. Its distribution through counterfeit WeChat and Miro installers expands the threat surface for organizations with macOS endpoints, demanding immediate TPRM attention.

High · May 19, 2026 · Dark Reading
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFDell Technologies Announces Edge‑Focused AI Infrastructure Strategy, Claiming 67% of Workloads Run Outside Public Cloud

Dell unveiled a suite of AI‑infrastructure solutions that keep compute and data on‑premise or at the edge, challenging the cloud‑first narrative. The move adds new hardware and software supply‑chain dependencies, raising third‑party risk for enterprises that handle regulated data.

Informational · May 19, 2026 · DataBreachToday
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFNation‑State Cyber Threats Target Emerging Satellite Constellations, Raising TPRM Risks for the Space Sector

As low‑Earth‑orbit mega‑constellations expand, nation‑state actors and criminal groups are developing cyber capabilities to attack on‑orbit assets. Conventional security tools fail in space, prompting a rapid R&D effort to build orbit‑specific defenses. This creates a new, high‑impact risk for any organization that depends on satellite services.

High · May 19, 2026 · DataBreachToday
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFVerizon DBIR 2026 Shows Vulnerability Exploitation Drives One‑Third of Breaches, Patch Lag Worsens

Verizon’s 2026 breach report reveals that a third of all confirmed data breaches began with the exploitation of known vulnerabilities, while organizations patched only a quarter of critical bugs and took 43 days on average to remediate. The trend heightens third‑party risk for any vendor relying on timely patch management.

Medium · May 19, 2026 · DataBreachToday
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🦠
LIVETHREAT BRIEFMicrosoft Dismantles Fox Tempest Malware‑Signing‑as‑a‑Service, Halting Over 1,000 Fraudulent Code‑Signing Certificates

Microsoft’s Digital Crimes Unit disrupted Fox Tempest, a malware‑signing‑as‑a‑service platform that issued trusted certificates to ransomware groups. Over 1,000 fraudulent certificates were revoked, curbing a supply‑chain threat that impacted healthcare, education, government, and financial services worldwide.

High · May 19, 2026 · Security Affairs
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFOpenAI Deploys Embedded Watermarks to Flag AI‑Generated Images, Boosting Content Provenance Across the Enterprise

OpenAI now embeds cryptographic watermarks and C2PA metadata directly into every AI‑generated image, enabling easy verification of provenance. The move strengthens defenses against AI‑driven disinformation and raises the bar for third‑party risk assessments of visual AI services.

Low · May 19, 2026 · ZDNet Security
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFGoogle Cuts Prices and Expands Features for Gemini AI Ultra Plans – New Tiered Subscriptions for Developers and Creatives

Google unveiled a cheaper AI Ultra Lite tier at $100 / month and reduced the full Ultra tier to $200 / month, adding higher usage limits, 20 TB of cloud storage, and new AI agents. The shift reshapes cost structures and expands the functional footprint of Google’s Gemini AI, prompting a review of vendor risk and data‑privacy controls.

Low · May 19, 2026 · ZDNet Security
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFGoogle Launches Gemini Omni AI Video Tool Enabling Realistic Self‑Cloning Avatars – Privacy & Deepfake Risks for Enterprises

Google’s Gemini Omni lets users generate videos from text, images, audio and video, including avatars that clone a person’s voice and likeness. The capability raises brand‑spoofing, fraud, and data‑privacy concerns for enterprises that rely on third‑party video production services.

High · May 19, 2026 · ZDNet Security
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFGoogle Launches AI Search Box with Gemini 3.5 Flash Agents, Expanding Conversational Capabilities

Google rolled out an AI‑driven Search box powered by Gemini 3.5 Flash, adding background information agents, agentic coding, and deeper personalization. Enterprises must reassess data‑privacy, supply‑chain, and endpoint‑security controls around these capabilities.

Informational · May 19, 2026 · ZDNet Security
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFGoogle Announces AI‑Infused Android Updates, Gemini Integration, and XR Roadmap at I/O 2026

At Google I/O 2026 the company rolled out AI‑powered Android updates, embedding Gemini across the OS, unveiling new XR capabilities, and introducing a hardware line called Googlebook. These changes broaden data collection and permission models, creating fresh third‑party risk considerations for enterprises.

Informational · May 19, 2026 · ZDNet Security
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFUK Regulator Mandates Tech Firms to Detect & Remove Deepfakes and Non‑Consensual Intimate Images

Ofcom will require online platforms to adopt hash‑matching detection and enforce a two‑day takedown rule for deepfakes and non‑consensual intimate images, with heavy fines and possible service blocking for non‑compliance. TPRM teams must reassess vendor contracts and verify compliance capabilities.

High · May 19, 2026 · The Record
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFWindows Update Bug Blocks Security Patches on Windows 11 Devices with Low EFI Partition Space

A Microsoft Windows 11 update (KB5089549) fails with error 0x800f0922 on systems with insufficient EFI partition space, preventing critical security fixes from being applied. Organizations must remediate ESP size to restore patch flow and reduce third‑party risk.

High · May 19, 2026 · TechRepublic Security
Read Full Intelligence Brief →
THREAT INTELLT BRIEF💀
LIVETHREAT BRIEFMicrosoft Disrupts Fox Tempest Malware‑Signing‑as‑a‑Service Platform Used by Ransomware Gangs

Microsoft seized the Fox Tempest infrastructure, a malware‑signing‑as‑a‑service operation that issued thousands of fraudulent code‑signing certificates to ransomware affiliates. The disruption removes a critical supply‑chain weapon and forces organizations to reassess reliance on third‑party signing services.

High · May 19, 2026 · The Record
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFZDNet Announces 2026 “Big Guessing Game” Contest – Free Entry for U.S. Residents

ZDNet (CNET Group) released official rules for its 2026 Big Guessing Game, a three‑round, no‑purchase‑necessary contest open to U.S. adults. The event creates marketing‑related third‑party risk that TPRM teams should evaluate.

Low · May 19, 2026 · ZDNet Security
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🦠
LIVETHREAT BRIEFFox Tempest Operates Malware‑Signing‑as‑a‑Service, Fueling Ransomware Campaigns for Multiple Criminal Groups

Fox Tempest provides a malware‑signing‑as‑a‑service that supplies valid code‑signing certificates to threat actors such as Vanilla Tempest and Storm. This service lets ransomware and other malware bypass signature‑based defenses, creating a hidden supply‑chain risk for organizations that trust signed binaries.

High · May 19, 2026 · Microsoft Security Blog
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFNew Android Auto Apps Highlighted to Boost Driver Safety and Efficiency for Consumers and Fleet Operators

ZDNet identified six Android Auto‑compatible apps that improve driver safety, fuel cost management, parking, and media consumption. Organizations should evaluate the data‑privacy and security posture of these third‑party apps before allowing employee use.

Low · May 19, 2026 · ZDNet Security
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFShinyHunters Exfiltrates 600K Records from 7‑Eleven’s Salesforce Environment

7‑Eleven confirmed that attackers accessed its Salesforce tenant in April 2026, stealing over 600,000 records of franchisee and consumer data. The ShinyHunters gang publicly claimed responsibility and leaked a 9.4 GB archive, highlighting third‑party SaaS risk for retailers.

High · May 19, 2026 · BleepingComputer
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFCriminal IP Showcases AI‑Driven Threat Intelligence & Attack Surface Management at Infosecurity Europe 2026

Criminal IP returned to Infosecurity Europe 2026 to unveil AI‑powered threat‑intelligence and attack‑surface‑management solutions. The vendor emphasized automated workflows while addressing prompt‑injection and data‑leak risks, a development that impacts third‑party risk programs.

Informational · May 19, 2026 · HackRead
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFIndustry Leaders Warn of Ongoing Security Hygiene Gaps Amid AI, Cloud, and Pandemic Shifts

Dark Reading reflects on two decades of cyber‑security change, noting that AI, cloud, and COVID‑19 have reshaped threats while many organizations still ignore basic security hygiene, creating heightened risk for third‑party relationships.

Informational · May 19, 2026 · Dark Reading
Read Full Intelligence Brief →
Page 1 of 147