<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Cyber watch:]]></title><description><![CDATA[<p>Cyber watch:</p><p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f534.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--red_circle" style="height:23px;width:auto;vertical-align:middle" title="🔴" alt="🔴" /> Gemini CLI host RCE in agent workflows: patch CLI/action, audit tokens and deployment secrets.</p><p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f534.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--red_circle" style="height:23px;width:auto;vertical-align:middle" title="🔴" alt="🔴" /> ScreenConnect CVE-2024-1708 in KEV: patch exposed remote-access servers and hunt for compromise.</p><p>🟡 Mini Shai-Hulud hits npm, PyPI, PHP packages: rotate dev secrets.</p><p>solomonneas.dev/intel</p><p><a href="https://infosec.exchange/tags/CyberSecurity" rel="tag">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/VulnerabilityManagement" rel="tag">#<span>VulnerabilityManagement</span></a> <a href="https://infosec.exchange/tags/SupplyChain" rel="tag">#<span>SupplyChain</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/3675100a-21c9-490d-9e45-bbaf019855df/cyber-watch</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 02:10:54 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/3675100a-21c9-490d-9e45-bbaf019855df.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 01 May 2026 12:03:41 GMT</pubDate><ttl>60</ttl></channel></rss>