Hermes
Thursday 14 May 2026  ·  76 articles scored  ·  4 top scorers  ·  last 24h
1
🔐 security Microsoft Security Blog
73%

Accelerating detection engineering using AI-assisted synthetic attack logs generation

What if you could generate realistic attack telemetry on demand? Explore research methods that translate attacker behaviors (TTPs) into synthetic logs that can trigger detections at scale and without…

Novelty
75%
Depth
70%
Practical
75%
Surprise
60%
Relevance
85%
https://www.microsoft.com/en-us/security/blog/2026/05/12/accelerating-detection-engineering-using-ai-assisted-synthetic-attack-logs-generation/
2
🔐 security Schneier on Security
72%

Copy.Fail Linux Vulnerability

This is the worst Linux vulnerability in years. TL;DR copy.fail is a Linux kernel local privilege escalation, not a browser or clipboard attack. Disclosed by Theori on 29 April 2026 with a working Po…

Novelty
80%
Depth
70%
Practical
65%
Surprise
75%
Relevance
75%
https://www.schneier.com/blog/archives/2026/05/copy-fail-linux-vulnerability.html
3
🔐 security SecurityWeek
72%

Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening Enterprises

CVE-2026-40361 is similar to a vulnerability found a decade ago, BadWinmail, which at the time was dubbed an “enterprise killer”. The post Microsoft Patches Critical Zero-Click Outlook Vulnerability …

Novelty
70%
Depth
55%
Practical
85%
Surprise
60%
Relevance
90%
https://www.securityweek.com/microsoft-patches-critical-zero-click-outlook-vulnerability-threatening-enterprises/
4
🤖 ai The Decoder
71%

Google says it stopped a mass cyberattack after AI was used to discover a zero-day exploit

Google's Threat Intelligence Group has identified the first known case of an attacker using AI to discover and weaponize a zero-day vulnerability. Google says it stopped the planned mass attack. Stat…

Novelty
85%
Depth
55%
Practical
55%
Surprise
85%
Relevance
90%
https://the-decoder.com/google-says-it-stopped-a-mass-cyberattack-after-ai-was-used-to-discover-a-zero-day-exploit/
5
🔐 security Microsoft Security Blog
69%

Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark

Today Microsoft is announcing a major step forward in AI-powered cyber defense: a new multi-model agentic scanning harness (codenamed MDASH). The post Defense at AI speed: Microsoft’s new multi-model…

https://www.microsoft.com/en-us/security/blog/2026/05/12/defense-at-ai-speed-microsofts-new-multi-model-agentic-security-system-tops-leading-industry-benchmark/
6
🔐 security Microsoft Security Blog
68%

Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise

Microsoft Incident Response investigated an attack operated through legitimate and trusted administrative mechanisms to blend seamlessly into routine operations and remain undetected demonstrating th…

https://www.microsoft.com/en-us/security/blog/2026/05/12/undermining-the-trust-boundary-investigating-a-stealthy-intrusion-through-third-party-compromise/
7
🔐 security Krebs on Security
66%

Patch Tuesday, May 2026 Edition

Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer cod…

https://krebsonsecurity.com/2026/05/patch-tuesday-may-2026-edition/
8
🔐 security SecurityWeek
66%

Microsoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own Code

Microsoft’s MDASH discovered 16 of the Patch Tuesday vulnerabilities, and Palo Alto used Mythos to find dozens of flaws. The post Microsoft, Palo Alto Networks Find Many Vulnerabilities by Using AI o…

https://www.securityweek.com/microsoft-palo-alto-networks-find-many-vulnerabilities-by-using-ai-on-their-own-code/
9
🔐 security Schneier on Security
63%

OpenAI’s GPT-5.5 is as Good as Mythos at Finding Security Vulnerabilities

The UK’s AI Security Institute evaluated GPT-5.5’s ability to find security vulnerabilities, and found that it is comparable to Claude Mythos. Note that the OpenAI model is generally available. Here …

https://www.schneier.com/blog/archives/2026/05/openais-gpt-5-5-is-as-good-as-mythos-at-finding-security-vulnerabilities.html
10
⚡ tech Stratechery
62%

The Deployment Company, Back to the 70s, Apple and Intel

OpenAI is forming a new company to deploy AI, and the other labs aren't far behind, reinforcing the thesis that AI's impact will require top-down implementation. Then, Apple has economic reasons to w…

https://stratechery.com/2026/the-deployment-company-back-to-the-70s-apple-and-intel/
11
📦 m365 Petri IT Knowledgebase
61%

Microsoft to Retire Exchange ActiveSync Certificate-Based Authentication

Microsoft is phasing out an old authentication method for mobile email, which signals another major step toward stricter, modern security in Exchange Online. Organizations relying on certificate-base…

https://petri.com/microsoft-retire-exchange-activesync-certificate-authentication/
12
🤖 ai The Decoder
61%

Anthropic overtakes OpenAI in B2B adoption for the first time according to Ramp spending data

Anthropic now leads OpenAI in B2B adoption for the first time, with 34.4 percent of US companies on the Ramp AI Index compared to OpenAI's 32.3 percent. Anthropic quadrupled its reach in just one yea…

https://the-decoder.com/anthropic-overtakes-openai-in-b2b-adoption-for-the-first-time-according-to-ramp-spending-data/
13
📦 m365 Petri IT Knowledgebase
60%

Microsoft’s May 2026 Patch Tuesday Updates Fix 30 Critical Flaws

Microsoft has released the May 2026 Patch Tuesday updates for Windows 11. This month, Microsoft has fixed a total of 138 security flaws in Windows, Office, Microsoft Edge, Azure, .NET and Visual Stud…

https://petri.com/microsoft-may-2026-patch-tuesday-updates/
14
📦 m365 Petri IT Knowledgebase
59%

Windows Update Gets Cloud‑Based Driver Recovery to Fix Faulty Updates

Microsoft is tackling one of Windows’ most frustrating issues, broken driver updates, with a new cloud‑powered solution that fixes problems before users even notice. This new Cloud‑Initiated Driver R…

https://petri.com/windows-update-cloud-driver-recovery-faulty-updates/
15
📦 m365 Petri IT Knowledgebase
59%

Dirty Frag Linux Flaw Allows Local Privilege Escalation to Root Access

A newly discovered Linux flaw dubbed “Dirty Frag” is raising alarms among security experts as it enables attackers to escalate minor breaches into full system takeovers quickly. This vulnerability hi…

https://petri.com/dirty-frag-linux-root-access-vulnerability/