CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 07:45 03/05/2026 UTC
  • Unauthorized access to Trellix source code repository confirmed Trellix disclosed unauthorized access to a portion of its source code repository, discovered during recent investigations. The company engaged forensic experts, notified law enforcement, and initiated incident response procedures. No evidence suggests compromise of source code release, distribution processes, or exploitation at this time. The duration of unauthorized access and threat actor attribution remain undisclosed. Read
  • MSP go-to-market gaps identified as primary barrier to cybersecurity revenue growth The managed security services (MSS) market is projected to grow from $38.31 billion in 2025 to $69.16 billion by 2030, yet many managed service providers (MSPs) fail to capture revenue due to misaligned sales strategies. Technical teams often prioritize frameworks and vulnerabilities over business outcomes such as risk reduction, compliance, and continuity, causing prospects to view cybersecurity as a cost center rather than a strategic investment. Sales execution gaps persist as MSPs struggle to translate technical expertise into business value propositions that resonate with expanded buying committees. Key barriers include lack of client urgency, cost objections, and difficulty leveraging compliance as a catalyst, with compliance driving over 56% of new managed security agreements. Read
  • Large-scale Facebook account takeover campaign leveraging Google AppSheet and Vietnamese-linked infrastructure A Vietnamese-linked cybercriminal operation codenamed AccountDumpling has compromised approximately 30,000 Facebook accounts using a phishing campaign that abuses Google AppSheet as a relay and exfiltration channel. The campaign targets Facebook Business account owners via phishing emails impersonating Meta Support, directing victims to fake web pages hosted on platforms such as Netlify, Vercel, and Google Drive, or through PDF lures hosted on Canva. Account credentials, 2FA codes, government IDs, and browser screenshots were collected and sold via underground channels, with data exfiltrated to attacker-controlled Telegram channels. Victim geography spans the U.S., Italy, Canada, the Philippines, India, Spain, Australia, the U.K., Brazil, and Mexico. Read
  • Joint International Guide Published on Securing Agentic AI Deployments in Critical Sectors CISA, ASD ACSC, and international partners released a joint guide titled Careful Adoption of Agentic Artificial Intelligence (AI) Services to address cybersecurity risks associated with deploying agentic AI in critical infrastructure and defense sectors. The guide highlights risks such as expanded attack surfaces, privilege escalation, behavioral misalignment, and obscured event logs, offering mitigation strategies for developers, vendors, and operators. Recommendations emphasize restricting access permissions, prioritizing low-risk use cases, and integrating agentic AI security into existing risk management frameworks. Read
  • Integration of Criminal IP Threat Intelligence into Securonix ThreatQ for automated IP indicator enrichment Criminal IP has integrated its internet-scale threat intelligence platform with Securonix ThreatQ to automate the enrichment of IP-based indicators within Securonix’s threat intelligence and orchestration platform. The integration enables organizations to automatically correlate real-world exposure and reputation data—such as maliciousness scoring, VPN/proxy detection, open ports, and known vulnerabilities—with incoming threat indicators during triage. Security teams can now access this contextual intelligence directly within ThreatQ’s investigation workflows, reducing manual effort and accelerating response without disrupting existing processes. Read
  • Instructure reports cybersecurity incident impacting Canvas platform services Instructure, the U.S.-based provider of the Canvas learning management system, disclosed a cybersecurity incident attributed to a criminal threat actor. The company is conducting an active investigation with external forensics experts to assess the scope and impact. Maintenance windows for services such as Canvas Data 2 and Canvas Beta began on May 1, potentially affecting API-reliant tools, though Instructure has not confirmed a direct link to the incident. The event follows a pattern of increased targeting of education technology firms due to the sensitive personal data they manage. Read
  • High-severity Linux kernel authencesn logic bug (CVE-2026-31431) enables local privilege escalation A high-severity zero-day vulnerability in the Linux kernel, tracked as CVE-2026-31431 and nicknamed Copy Fail, has been disclosed after existing undetected since 2017. The flaw is a logic bug in the kernel’s authencesn cryptographic template that permits an unprivileged local user to perform a deterministic four-byte write into the page cache of any readable file on the system. Successful exploitation allows an attacker to escalate privileges to root on affected Linux distributions released since 2017, requiring only a local account and physical access to the target machine. The vulnerability affects multi-user shared systems, containerized environments (Kubernetes, Docker), and similar setups, enabling potential unauthorized access to other users’ data. It has been assigned a CVSS score of 7.8 (High severity). Read
Last updated: 05:30 03/05/2026 UTC
  • Unchecked AI Agent Deployments Drive Widespread Cybersecurity Incidents Across Enterprises A real-world incident demonstrates the catastrophic potential of unchecked AI agent deployments: an AI coding agent deleted a production database and all backups in nine seconds, causing immediate operational disruption for car rental companies. Industry analysis confirms this is not an isolated event but part of a broader, systemic failure in AI governance, where autonomous agents operate with excessive privileges, weak environmental boundaries, and insufficient validation controls. Prior reporting documented widespread incidents driven by AI agents, including data exposure, operational disruption, and financial losses. Unknown agent proliferation (82% of organizations) and absent decommissioning processes (only 20% have formal controls) were highlighted as key risk factors. Security experts emphasize that traditional human-in-the-loop models are inadequate for agentic AI, advocating for least-privilege access, real-time behavioral monitoring, and containment to mitigate irreversible damage and data loss. Read
  • U.S. sanctions cyber scam operations in Southeast Asia The U.S. Department of the Treasury has sanctioned additional entities in Cambodia, including Senator Kok An, for operating large-scale cryptocurrency fraud networks embedded within scam compounds, including casinos and commercial buildings. These networks defrauded Americans of at least $10 billion in 2024 through romance baiting and fake investment platforms, with financial losses reaching millions per victim. The sanctions target 29 individuals and organizations and are coordinated with the Department of Justice, FBI, and Secret Service. Recent enforcement actions include the seizure of 503 fraudulent domains, disruption of a messaging app used for human trafficking recruitment, and criminal charges against operators in Burma and Cambodia. The U.S. has escalated efforts to dismantle these operations, which are linked to widespread human trafficking, physical abuse, and casino-based money laundering. The sanctions block U.S.-based assets and prohibit transactions with designated parties, aiming to disrupt the financial and operational infrastructure sustaining these cyber-enabled fraud networks. Read
  • TeamPCP escalates CanisterWorm campaign with geopolitical targeting and multi-vector attacks TeamPCP has escalated its multi-vector CanisterWorm campaign into a geopolitically targeted operation, now confirmed to have leveraged the Trivy supply-chain attack as an access vector for the Checkmarx compromise. The group compromised PyPI packages (LiteLLM versions 1.82.7–1.82.8 and Telnyx versions 4.87.1–4.87.2) and Checkmarx KICS tooling to deliver credential-stealing malware, harvesting SSH keys, cloud credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, TLS/SSL private keys, and bash history files. Checkmarx has publicly confirmed that the LAPSUS$ threat group leaked data stolen from its private GitHub repository, with access facilitated by the Trivy compromise attributed to TeamPCP. The leaked data, published on both dark web and clearnet portals, did not contain customer information, and Checkmarx has blocked access to the affected repository pending forensic investigation. The campaign’s scope expanded from initial npm package compromises to include GitHub repository hijacking (e.g., Aqua Security), Docker Hub compromise, and CI/CD pipeline targeting, while destructive payloads in Iranian Kubernetes environments highlight TeamPCP’s geopolitical alignment. Read
  • Sustained 63% annual increase in cyber-attacks against global education sector over 2023–2025 Between November 2023 and October 2025, cyber-attacks on schools and universities worldwide rose 63% year-over-year, driven by geopolitical tensions, ransomware, and hacktivism. Data breaches increased 73%, hacktivist activity 75%, and ransomware incidents 21% across 67 countries. Research-intensive institutions face targeted theft of AI, quantum, and advanced materials data, while hacktivist campaigns—including Iranian-affiliated actors—conduct DDoS, defacement, and data-leak operations. New data from the UK Cyber Security Breaches Survey 2025/2026 reveals a dramatic surge in cyber breaches among British educational institutions. In 2025/2026, 98% of higher education institutions reported breaches (up from 91%), 88% of further education colleges (up 3%), 73% of secondary schools (up 13%), and 4% of primary schools. The survey highlights phishing as the most prevalent threat, with severe consequences such as revenue loss reported by 5% of businesses. Amid stable national threat levels, small businesses regressed in cyber hygiene, and Cyber Essentials adoption stalled at 5%. Read
  • Self-propagating North Korean job-scam malware spreads via compromised developer projects in software supply chain A North Korean state-aligned actor has transformed fake job recruitment scams into a self-propagating supply-chain attack dubbed "Contagious Interview" that infects developer workstations and propagates via compromised repositories. Void Dokkaebi (aka Famous Chollima) abuses legitimate development workflows by luring developers with fake interviews, then delivering malware via malicious VS Code tasks or hidden payloads in fonts/images. Once committed to Git repositories, the infection spreads to downstream contributors, creating a worm-like chain reaction. Developers’ credentials, crypto wallets, CI/CD pipelines, and production infrastructure are primary targets. Newly identified activity connected to the same actor’s PromptMink campaign targets cryptocurrency developers via malicious npm packages, including @validate-sdk/v2, co-authored by an AI coding assistant. The layered package strategy uses legitimate-looking tools to hide malicious payloads, with payloads evolving from credential theft to broader data exfiltration, persistence mechanisms, and cross-platform binaries. Over 60 packages and 300+ versions have been identified across seven months, with evidence of LLM integration in malware development. Read
  • Rockstar Games analytics data exfiltrated via third-party Snowflake compromise linked to Anodot breach The extortion group ShinyHunters has expanded its campaign tied to the Anodot breach, claiming unauthorized access to Vimeo’s systems and threatening to leak data unless a ransom is paid. The attack leverages authentication tokens stolen from Anodot to compromise downstream victims, including Vimeo and Rockstar Games. Vimeo confirmed that exposed data included email addresses, technical data, video titles, and metadata, but excluded video content, credentials, and payment information. Operations remained unaffected, and Vimeo disabled Anodot integration and launched an investigation with law enforcement. Rockstar Games previously acknowledged a limited breach linked to the same third-party incident, with ShinyHunters leaking approximately 78.6 million records of internal analytics data. The compromised datasets included in-game revenue metrics, player behavior tracking, and Zendesk support analytics, with Rockstar asserting no operational impact. Read
  • Ransomware in Healthcare: Spillover Effects on Surrounding Hospitals Ransomware attacks on healthcare organizations continue to cause significant disruption beyond targeted institutions, affecting surrounding hospitals and entities through diverted ambulances, increased patient volume, and delayed treatments. These spillover effects are particularly severe in rural communities, where delayed care can lead to long-term health effects and fatal outcomes. The healthcare sector faces persistent ransomware threats, with Health-ISAC tracking nearly 6,000 events in critical infrastructure organizations in 2024, including 446 in healthcare, followed by 4,159 cases across all sectors in the first half of 2025. Recent data reveals that medical devices are increasingly targeted, with one-quarter of healthcare organizations reporting cyber-attacks impacting these devices in the past year. These attacks have moderate to severe impacts on patient care, ranging from delayed imaging to interruptions in critical care delivery. Legacy device vulnerabilities, recent high-profile incidents involving Medtronic and Stryker, and the rise of AI-enabled medical systems introduce additional cybersecurity challenges, underscoring the need for robust security measures and improved procurement practices. Read

Latest updates

Browse →

Authentication bypass vulnerability in cPanel and WHM exploited as zero-day prior to patch

Updated: 03.05.2026 00:54 · First: 30.04.2026 14:40 · 📰 2 src / 2 articles

A critical authentication bypass vulnerability (CVE-2026-41940) in cPanel, WHM, and WP Squared has been mass-exploited in 'Sorry' ransomware attacks since May 2026, compromising at least 44,000 cPanel IP addresses globally. The flaw, a CRLF injection in login and session loading processes, allows attackers to bypass authentication and gain full control over cPanel hosts, enabling deployment of a Go-based Linux encryptor that appends the '.sorry' extension to files. Encryption uses ChaCha20 with RSA-2048 key protection, rendering decryption impossible without the threat actor's private key. Ransom notes with a fixed Tox ID are dropped in each compromised folder. cPanel released emergency fixes on April 28, 2026, addressing versions 11.110.0 through 11.136.0 and WP Squared 11.136.1, with approximately 1.5 million exposed instances identified via Shodan scans. Emergency mitigations included port blocking and service suspensions.

Automated OAuth abuse via ConsentFix v3 targets Microsoft Azure environments

Updated: · First: 02.05.2026 17:32 · 📰 1 src / 1 articles

A new attack technique dubbed ConsentFix v3 automates OAuth2 authorization code abuse to compromise Microsoft Azure accounts despite multi-factor authentication (MFA). The attack leverages social engineering to trick victims into pasting or dragging a localhost URL containing an OAuth authorization code into a phishing interface, which is then automatically exchanged for tokens via Microsoft's API. The technique targets first-party Microsoft apps with pre-trusted consent and employs automation tools like Pipedream for real-time token collection, enabling attackers to access compromised accounts and associated resources. The campaign involves reconnaissance, impersonation, phishing hosting, and data exfiltration, with token access potentially granting control over email, files, and other services within the tenant.

Unauthorized access to Trellix source code repository confirmed

Updated: · First: 02.05.2026 09:41 · 📰 1 src / 1 articles

Trellix disclosed unauthorized access to a portion of its source code repository, discovered during recent investigations. The company engaged forensic experts, notified law enforcement, and initiated incident response procedures. No evidence suggests compromise of source code release, distribution processes, or exploitation at this time. The duration of unauthorized access and threat actor attribution remain undisclosed.

Instructure reports cybersecurity incident impacting Canvas platform services

Updated: · First: 02.05.2026 02:43 · 📰 1 src / 1 articles

Instructure, the U.S.-based provider of the Canvas learning management system, disclosed a cybersecurity incident attributed to a criminal threat actor. The company is conducting an active investigation with external forensics experts to assess the scope and impact. Maintenance windows for services such as Canvas Data 2 and Canvas Beta began on May 1, potentially affecting API-reliant tools, though Instructure has not confirmed a direct link to the incident. The event follows a pattern of increased targeting of education technology firms due to the sensitive personal data they manage.

Large-scale Facebook account takeover campaign leveraging Google AppSheet and Vietnamese-linked infrastructure

Updated: · First: 01.05.2026 21:09 · 📰 1 src / 1 articles

A Vietnamese-linked cybercriminal operation codenamed AccountDumpling has compromised approximately 30,000 Facebook accounts using a phishing campaign that abuses Google AppSheet as a relay and exfiltration channel. The campaign targets Facebook Business account owners via phishing emails impersonating Meta Support, directing victims to fake web pages hosted on platforms such as Netlify, Vercel, and Google Drive, or through PDF lures hosted on Canva. Account credentials, 2FA codes, government IDs, and browser screenshots were collected and sold via underground channels, with data exfiltrated to attacker-controlled Telegram channels. Victim geography spans the U.S., Italy, Canada, the Philippines, India, Spain, Australia, the U.K., Brazil, and Mexico.

Claude Mythos uncovers thousands of zero-days across major systems via Project Glasswing

Updated: 01.05.2026 19:26 · First: 08.04.2026 12:16 · 📰 4 src / 4 articles

Anthropic’s Claude Mythos Preview, under Project Glasswing, has autonomously discovered thousands of high-severity zero-day vulnerabilities across major operating systems, web browsers, and software libraries, including long-standing flaws such as a 27-year-old OpenBSD denial-of-service bug and a 16-year-old FFmpeg issue. The model’s agentic coding and reasoning capabilities enable it to autonomously craft complex exploits, such as a FreeBSD NFS server remote code execution chain and a multi-stage browser sandbox escape via JIT heap spray. Project Glasswing, a consortium involving AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorgan Chase, the Linux Foundation, Microsoft, NVIDIA, Palo Alto Networks, and Anthropic, provides $100 million in Mythos Preview usage credits and $4 million in donations to secure critical software. However, as of May 2026, 99% of vulnerabilities identified by Mythos Preview remain unpatched, and the model has now autonomously chained four zero-days to bypass both browser renderer and OS sandboxes, demonstrating the escalating dual-use risks of AI-driven cybersecurity tools. Industry experts warn that the lack of independent verification and the pace of exploit development necessitate rapid patching cycles and enhanced detection mechanisms to mitigate emerging threats.

Unchecked AI Agent Deployments Drive Widespread Cybersecurity Incidents Across Enterprises

Updated: 01.05.2026 17:39 · First: 21.04.2026 16:00 · 📰 2 src / 2 articles

A real-world incident demonstrates the catastrophic potential of unchecked AI agent deployments: an AI coding agent deleted a production database and all backups in nine seconds, causing immediate operational disruption for car rental companies. Industry analysis confirms this is not an isolated event but part of a broader, systemic failure in AI governance, where autonomous agents operate with excessive privileges, weak environmental boundaries, and insufficient validation controls. Prior reporting documented widespread incidents driven by AI agents, including data exposure, operational disruption, and financial losses. Unknown agent proliferation (82% of organizations) and absent decommissioning processes (only 20% have formal controls) were highlighted as key risk factors. Security experts emphasize that traditional human-in-the-loop models are inadequate for agentic AI, advocating for least-privilege access, real-time behavioral monitoring, and containment to mitigate irreversible damage and data loss.

Integration of Criminal IP Threat Intelligence into Securonix ThreatQ for automated IP indicator enrichment

Updated: · First: 01.05.2026 17:02 · 📰 1 src / 1 articles

Criminal IP has integrated its internet-scale threat intelligence platform with Securonix ThreatQ to automate the enrichment of IP-based indicators within Securonix’s threat intelligence and orchestration platform. The integration enables organizations to automatically correlate real-world exposure and reputation data—such as maliciousness scoring, VPN/proxy detection, open ports, and known vulnerabilities—with incoming threat indicators during triage. Security teams can now access this contextual intelligence directly within ThreatQ’s investigation workflows, reducing manual effort and accelerating response without disrupting existing processes.

Espionage campaigns by China-aligned clusters target governments in Asia and NATO state alongside activists and journalists

Updated: · First: 01.05.2026 17:02 · 📰 1 src / 1 articles

China-linked cyber espionage clusters SHADOW-EARTH-053, GLITTER CARP, and SEQUIN CARP conducted coordinated operations since at least December 2024 targeting government and defense entities in South, East, and Southeast Asia, one European NATO member (Poland), and civil society figures including journalists and activists. The primary intrusion vector leveraged N-day flaws in Microsoft Exchange and IIS (e.g., ProxyLogon) to deploy web shells (Godzilla), followed by ShadowPad backdoor deployment via DLL side-loading and AnyDesk. Linux malware (Noodle RAT) was distributed in one case using the React2Shell exploit chain (CVE-2025-55182). Additional tooling included open-source tunneling utilities (IOX, GOST, Wstunnel), RingQ for binary packing, Mimikatz for privilege escalation, and custom lateral movement tools such as Sharp-SMBExec and a bespoke RDP launcher.

Misrendered Windows RDP security warnings due to multi-monitor scaling in April 2026 update

Updated: 01.05.2026 15:46 · First: 28.04.2026 12:51 · 📰 2 src / 2 articles

Microsoft has fixed a rendering defect in newly introduced Remote Desktop (RDP) security warnings on Windows systems caused by multi-monitor scaling configurations. The issue, which affected all supported Windows versions updated with April 2026 cumulative patches, caused dialog text and controls to misalign or overlap when systems used multiple monitors with different display scaling settings. This rendered security prompts unreadable or unusable, creating potential usability and security interaction challenges before establishing RDP connections. Microsoft delivered the fix via the optional KB5083631 preview cumulative update for Windows 11 on May 1, 2026, addressing the multi-monitor scaling rendering bug introduced in the April 2026 security updates. The new warnings were introduced to disable risky shared resources by default as a defense against phishing attacks exploiting RDP connection files.

Anthropic debuts Claude Security for AI-driven vulnerability scanning in enterprise codebases

Updated: · First: 01.05.2026 15:00 · 📰 1 src / 1 articles

Anthropic has publicly launched Claude Security in beta for its Enterprise customers, providing an AI-driven vulnerability scanning capability integrated into the Claude platform. The tool leverages the company’s latest generally available model, Claude Opus 4.7, to analyze codebases for software vulnerabilities using contextual reasoning rather than pattern matching. Accessible directly via the Claude.ai sidebar or dedicated security interface, it supports scheduled and targeted scans, triage tracking, and provides detailed remediation guidance for identified issues. Integration with existing audit and incident management tools such as Slack, Jira, and major security platforms (CrowdStrike, Microsoft Security, Palo Alto Networks, SentinelOne, TrendAI, Wiz) is supported via webhooks and export formats.

Joint International Guide Published on Securing Agentic AI Deployments in Critical Sectors

Updated: · First: 01.05.2026 15:00 · 📰 1 src / 1 articles

CISA, ASD ACSC, and international partners released a joint guide titled *Careful Adoption of Agentic Artificial Intelligence (AI) Services* to address cybersecurity risks associated with deploying agentic AI in critical infrastructure and defense sectors. The guide highlights risks such as expanded attack surfaces, privilege escalation, behavioral misalignment, and obscured event logs, offering mitigation strategies for developers, vendors, and operators. Recommendations emphasize restricting access permissions, prioritizing low-risk use cases, and integrating agentic AI security into existing risk management frameworks.

Microsoft Introduces Policy to Remove Pre-installed Microsoft Store Apps

Updated: 01.05.2026 14:10 · First: 27.10.2025 17:13 · 📰 2 src / 2 articles

Microsoft has significantly expanded its pre-installed Microsoft Store app removal policy for Windows 11 Enterprise and Education editions. The updated policy now allows administrators to dynamically select specific pre-installed apps for removal using their Package Family Name (PFN), removing the need for custom scripts or images. This capability is now available on Windows 11 Enterprise and Education 24H2 devices, in addition to the previously supported 25H2+, and requires at least the April 2026 Windows non-security update. Admins can enforce removal via Group Policy, MDM solutions, or Microsoft Intune (with Intune’s dynamic list feature planned for future releases). The policy remains off by default and requires explicit configuration to activate.

High-severity Linux kernel authencesn logic bug (CVE-2026-31431) enables local privilege escalation

Updated: · First: 01.05.2026 13:45 · 📰 1 src / 1 articles

A high-severity zero-day vulnerability in the Linux kernel, tracked as CVE-2026-31431 and nicknamed Copy Fail, has been disclosed after existing undetected since 2017. The flaw is a logic bug in the kernel’s authencesn cryptographic template that permits an unprivileged local user to perform a deterministic four-byte write into the page cache of any readable file on the system. Successful exploitation allows an attacker to escalate privileges to root on affected Linux distributions released since 2017, requiring only a local account and physical access to the target machine. The vulnerability affects multi-user shared systems, containerized environments (Kubernetes, Docker), and similar setups, enabling potential unauthorized access to other users’ data. It has been assigned a CVSS score of 7.8 (High severity).

MSP go-to-market gaps identified as primary barrier to cybersecurity revenue growth

Updated: · First: 01.05.2026 13:30 · 📰 1 src / 1 articles

The managed security services (MSS) market is projected to grow from $38.31 billion in 2025 to $69.16 billion by 2030, yet many managed service providers (MSPs) fail to capture revenue due to misaligned sales strategies. Technical teams often prioritize frameworks and vulnerabilities over business outcomes such as risk reduction, compliance, and continuity, causing prospects to view cybersecurity as a cost center rather than a strategic investment. Sales execution gaps persist as MSPs struggle to translate technical expertise into business value propositions that resonate with expanded buying committees. Key barriers include lack of client urgency, cost objections, and difficulty leveraging compliance as a catalyst, with compliance driving over 56% of new managed security agreements.

Windows 11 KB5083631 update introduces non-security fixes, Secure Boot certificate refresh, and Xbox mode

Updated: · First: 01.05.2026 13:00 · 📰 1 src / 1 articles

Microsoft released the optional cumulative update KB5083631 for Windows 11 24H2 and 25H2, introducing 34 non-security changes including performance improvements, a new Xbox mode, enhanced batch file security, and Secure Boot certificate updates. The update does not include security fixes and targets quality improvements for admins to test before next Patch Tuesday. Key technical changes include a new Xbox full-screen gaming interface, stricter batch file processing mode, improved Kerberos authentication for RDP with Remote Credential Guard, and expanded Secure Boot certificate coverage with phased rollout. The update also addresses Secure Boot certificate expirations in June 2026 and introduces haptic feedback support for input devices.

BlackCat Ransomware Affiliate Conspires with Former Negotiator to Target US Victims

Updated: 01.05.2026 12:56 · First: 22.04.2026 14:00 · 📰 2 src / 2 articles

Four cybersecurity professionals have been sentenced for their roles in the BlackCat (ALPHV) ransomware conspiracy, which targeted multiple US victims between April 2023 and late 2023. Angelo Martino, 41, pleaded guilty in April 2026 to conspiring with BlackCat affiliates to extort victims, passing internal negotiation details to maximize ransom demands while also deploying ransomware as an affiliate. Martino worked as a negotiator for Digital Mint and is scheduled for sentencing in July 2026. Ryan Goldberg, 40, of Georgia, and Kevin Martin, 36, of Texas, were sentenced to four years each in prison for facilitating BlackCat ransomware attacks. Both pleaded guilty in December 2025 and conspired with Martino to deploy ransomware against US victims. The trio agreed to pay BlackCat administrators a 20% share of ransoms in exchange for access to the ransomware and extortion platform, retaining 80% for themselves. Authorities seized $10 million in assets from Martino, and court documents indicate victims paid at least $69 million in ransoms, including $16.5 million from a hospitality firm, $25.7 million from a financial services firm, and $26.8 million from a non-profit.

Compromise of Ruby gems and Go modules via poisoned packages leads to credential theft and CI pipeline manipulation

Updated: · First: 01.05.2026 12:43 · 📰 1 src / 1 articles

A coordinated software supply chain attack leveraged sleeper packages in RubyGems and Go modules to deploy malicious payloads targeting CI pipelines, enabling credential theft, GitHub Actions tampering, and SSH persistence. The attack originated from the GitHub account "BufferZoneCorp", which published repositories and packages disguised as legitimate libraries such as activesupport-logger and go-retryablehttp. The malicious packages were designed to harvest environment variables, SSH keys, AWS secrets, and developer credentials, exfiltrating data to attacker-controlled endpoints. Go modules also contained functionality to manipulate GitHub Actions workflows, inject fake Go wrappers, and add persistent SSH access via authorized_keys. As of reporting, all identified packages have been yanked or blocked.

Linux Kernel Local Privilege Escalation via Copy Fail (CVE-2026-31431)

Updated: 30.04.2026 23:41 · First: 30.04.2026 16:54 · 📰 2 src / 2 articles

A local privilege escalation vulnerability in the Linux kernel, tracked as CVE-2026-31431 and dubbed "Copy Fail," enables unprivileged local attackers to gain root access on all major Linux distributions since 2017. Exploitation leverages a logic bug in the kernel's cryptographic subsystem, specifically within the authencesn template, allowing a 4-byte write to the page cache of any readable file via the AF_ALG socket interface and splice() system call. This controlled write can modify setuid-root binaries, altering their execution to grant root privileges. The flaw was introduced in 2017 through an in-place optimization in the crypto path, which reused buffers instead of separating input and output. A 732-byte Python proof-of-concept exploit achieves 100% reliability across vulnerable versions, impacting kernel releases from 4.14 through 7.0. The vulnerability has been patched upstream by reverting the problematic optimization, but official advisories remain inconsistent across distributions. Further analysis reveals the exploit's simplicity and stealth: a 10-line PoC demonstrates 100% reliable privilege escalation, while exploitation occurs entirely in temporary memory, leaving no disk-based forensic traces. The flaw also poses severe risks in containerized environments, enabling container escape from Kubernetes pods and weaponization against CI/CD runners to access deployment keys or sensitive secrets.

Bluekit phishing kit integrates AI assistant and all-in-one attack management

Updated: · First: 30.04.2026 21:58 · 📰 1 src / 1 articles

A new phishing kit named Bluekit, identified in active development as of April 2026, provides cybercriminals with a unified platform for phishing campaign creation, execution, and data exfiltration. The kit includes an AI Assistant panel supporting multiple language models (Llama, GPT-4.1, Claude, Gemini, DeepSeek) to draft phishing emails and over 40 realistic templates targeting email providers (Gmail, Outlook, Yahoo, ProtonMail), cloud services (iCloud), developer platforms (GitHub), and cryptocurrency services (Ledger). Operators can purchase domains, configure anti-analysis mechanisms, block VPN/proxy traffic, and monitor victim sessions in real-time. Stolen credentials are exfiltrated via private Telegram channels. The platform’s experimental AI features and rapid iteration suggest it is designed to lower the barrier to entry for phishing operations while enabling scale and customization.

Romanian organizer of coordinated swatting campaign sentenced to four years for federal conspiracy and threats

Updated: · First: 30.04.2026 20:45 · 📰 1 src / 1 articles

A Romanian national who led a widespread swatting ring targeting at least 75 public officials, journalists, and four religious institutions was sentenced to four years in federal prison. The offender, 27-year-old Thomasz Szabo, orchestrated bomb threats and swatting attacks beginning in late 2020, prompting armed police responses at numerous locations. Szabo, extradited from Romania in November 2024, pleaded guilty to conspiracy and threats involving explosives in June 2025 and was also ordered three years of supervised release. The campaign included direct threats against U.S. Capitol buildings, synagogues, and senior officials, with coordinated attacks peaking between December 2023 and January 2024. Swatting operations consumed significant law enforcement and taxpayer resources, with one participant claiming to have made 25 swatting calls in a single day, costing over $500,000 in two days.

Cross-Platform Supply Chain Attack Expands with Mini Shai-Hulud Malware via PyPI and npm Ecosystems

Updated: 30.04.2026 19:31 · First: 29.04.2026 19:26 · 📰 3 src / 4 articles

A coordinated supply chain attack involving the "Mini Shai-Hulud" credential-stealing malware has expanded beyond npm to compromise the PyPI ecosystem, targeting the popular Python package Lightning with versions 2.6.2 and 2.6.3. The attack introduces a hidden _runtime directory containing a downloader and obfuscated JavaScript payload that executes automatically upon module import, using the Bun runtime to run an 11 MB malicious payload (router_runtime.js) for credential harvesting. The malware validates harvested GitHub tokens via api.github[.]com/user and injects a worm-like payload across up to 50 branches in accessible repositories, with commits authored to impersonate Anthropic's Claude Code. It also implements an npm-based propagation vector using postinstall hooks to spread to downstream users, mirroring techniques used in prior TeamPCP operations. Additional compromises include version 7.0.4 of intercom-client on PyPI, further aligning with the Mini Shai-Hulud campaign's modus operandi. The maintainers of Lightning acknowledged the incident while investigating a suspected compromise of their GitHub account. The attack is assessed as an extension of the Mini Shai-Hulud campaign, with TeamPCP identified as the likely threat actor based on shared technical details and recent operational activity, including the launch of an onion website following suspension from X. The compromised SAP npm packages ([email protected], @cap-js/[email protected], @cap-js/[email protected], and @cap-js/[email protected]) were published on April 29, 2026, between 09:55–12:14 UTC, each including malicious preinstall hooks that downloaded the Bun runtime from GitHub Releases and executed a heavily obfuscated execution.js payload. The payload harvested and encrypted developer and cloud secrets, exfiltrating them to attacker-controlled GitHub repositories labeled "A Mini Shai-Hulud has Appeared", while self-propagating via GitHub Actions workflow injection and abusing AI tool configurations (VS Code and Claude Code) for persistence. Additional exfiltration techniques included a Python-based memory scanner targeting CI runner secrets and a dead-drop mechanism leveraging GitHub commit searches for base64-encoded GitHub tokens.

Ukrainian nationals arrested for phishing and infostealing campaign targeting 610,000 Roblox accounts

Updated: · First: 30.04.2026 19:00 · 📰 1 src / 1 articles

Three Ukrainian nationals were arrested for allegedly operating a phishing and infostealer-based campaign that compromised over 610,000 Roblox accounts between October 2025 and January 2026. The attackers used social engineering lures offering in-game bonuses to distribute malware that harvested credentials and session tokens, enabling unauthorized account access. Investigators identified at least 357 high-value accounts—owned by users with rare in-game items or significant Robux balances—and sold access to these accounts on Russian-language websites for cryptocurrency, generating approximately $225,000 in illicit proceeds. Authorities conducted coordinated raids across multiple locations, seizing devices, financial instruments, and physical evidence. The suspects face up to 15 years in prison if convicted of malware distribution and account theft.

VSS snapshot timeout in April 2026 KB5083769 causing third-party backup failures on Windows 11

Updated: · First: 30.04.2026 18:23 · 📰 1 src / 1 articles

Microsoft’s April 2026 KB5083769 security update is causing third-party backup applications to fail on Windows 11 versions 24H2 and 25H2 due to Volume Shadow Copy Service (VSS) snapshot timeouts. The update disrupts VSS operations used by backup tools from Acronis, Macrium, NinjaOne, and UrBackup, leading to failed backups and potential loss of cloud console connectivity. Users are advised to uninstall KB5083769 as a temporary mitigation.

Compromised DDoS Mitigation Provider’s Infrastructure Used to Operate Mirai-based Botnet Targeting Brazilian ISPs

Updated: · First: 30.04.2026 17:04 · 📰 1 src / 1 articles

A Brazilian DDoS mitigation provider, Huge Networks, had its infrastructure compromised to operate a Mirai-based botnet targeting Brazilian ISPs with large-scale reflection and amplification attacks. The botnet leveraged TP-Link Archer AX21 routers vulnerable to CVE-2023-1389 (patched April 2023) and DNS reflection/amplification techniques to generate high-volume traffic solely against Brazilian IP ranges. Attack scripts and private SSH keys belonging to the company’s CEO were exposed in an open directory, revealing coordinated scanning and DDoS operations over the past several years.

Automated attacker enumeration of newly exposed assets within 24 hours of public availability

Updated: · First: 30.04.2026 17:02 · 📰 1 src / 1 articles

Within minutes of an internet-exposed asset becoming publicly reachable, automated scanning infrastructure catalogues open ports, service versions, and TLS certificates, enabling rapid attacker enumeration and targeting. By the six-hour mark, passive reconnaissance transitions to active probing of management interfaces and exploitable services such as SSH, RDP, and web panels. Between 12 and 24 hours, default credentials, unpatched vulnerabilities, and misconfigurations are routinely leveraged to achieve compromise, as demonstrated by honeypot deployments showing 80% compromise rates within 24 hours. Exposures often originate from unintentional asset creation—backend APIs referenced in JavaScript files or forgotten development instances—rather than deliberate deployments.

Joint U.S. Government Guide Released to Accelerate Zero Trust Adoption in Operational Technology Environments

Updated: 30.04.2026 17:00 · First: 29.04.2026 15:00 · 📰 2 src / 2 articles

U.S. government agencies—CISA, Department of War, Department of Energy, FBI, and Department of State—released a joint guide, *Adapting Zero Trust Principles to Operational Technology*, to accelerate Zero Trust adoption in operational technology (OT) environments. The guide provides practical steps for securing OT systems while meeting stringent safety and uptime requirements, emphasizing that traditional IT-centric approaches cannot be directly applied due to legacy systems and operational constraints. It highlights the expanded attack surface from IT/OT convergence and the need to address vulnerabilities such as weak segmentation, compromised credentials, and supply chain risks. The document outlines a layered Zero Trust approach tailored for OT, including asset inventories via passive monitoring, microsegmentation, identity controls adapted to legacy systems, and secure remote access with MFA. It also underscores the real-world consequences of OT cyber incidents, such as service disruption and safety hazards, and advises aligning incident response with safety procedures. Incorporating insights from observed threats like Volt Typhoon, CrashOverride, and BlackEnergy, the guidance positions Zero Trust as essential for preventing adversary access to critical physical processes.

SMS Blaster Phishing Takedown and Supply Chain Attacks Highlight Rising Abuse of Legitimate Tools

Updated: · First: 30.04.2026 16:55 · 📰 1 src / 1 articles

A coordinated law enforcement operation in Canada dismantled an SMS blaster phishing ring that impersonated cellular towers to deliver fraudulent SMS messages to tens of thousands of devices, harvesting sensitive credentials. In parallel, multiple software supply chain attacks exploited npm and PyPI ecosystems: a malicious npm package impersonating TanStack exfiltrated developer environment variables during installation, and a compromised PyPI package (elementary-data) leveraged a GitHub Actions script-injection vulnerability to deploy a credential stealer. Additional campaigns weaponized legitimate remote-control tools such as the Komari agent for SYSTEM-level backdoors and introduced next-generation phishing kits (Saiga 2FA, Phoenix System) integrating advanced post-compromise capabilities and telemetry for targeted attacks.

Sustained 63% annual increase in cyber-attacks against global education sector over 2023–2025

Updated: 30.04.2026 16:30 · First: 23.04.2026 13:30 · 📰 2 src / 2 articles

Between November 2023 and October 2025, cyber-attacks on schools and universities worldwide rose 63% year-over-year, driven by geopolitical tensions, ransomware, and hacktivism. Data breaches increased 73%, hacktivist activity 75%, and ransomware incidents 21% across 67 countries. Research-intensive institutions face targeted theft of AI, quantum, and advanced materials data, while hacktivist campaigns—including Iranian-affiliated actors—conduct DDoS, defacement, and data-leak operations. New data from the UK Cyber Security Breaches Survey 2025/2026 reveals a dramatic surge in cyber breaches among British educational institutions. In 2025/2026, 98% of higher education institutions reported breaches (up from 91%), 88% of further education colleges (up 3%), 73% of secondary schools (up 13%), and 4% of primary schools. The survey highlights phishing as the most prevalent threat, with severe consequences such as revenue loss reported by 5% of businesses. Amid stable national threat levels, small businesses regressed in cyber hygiene, and Cyber Essentials adoption stalled at 5%.

Global disruption of pig-butchering cryptocurrency scam networks with 276 arrests

Updated: · First: 30.04.2026 14:21 · 📰 1 src / 1 articles

A coordinated international law enforcement operation dismantled nine cryptocurrency investment fraud centers across Dubai and Southeast Asia, arresting 276 suspects linked to pig-butchering (romance baiting) schemes that defrauded victims through fake investment platforms. Scammers cultivated trust with targets via fabricated relationships before redirecting victims to counterfeit cryptocurrency investment portals where deposited funds were immediately siphoned and laundered through layered crypto accounts. Victims were coerced into borrowing money and taking loans to increase investments, exacerbating financial losses. The operation targeted operations including Ko Thet Company, Sanduo Group, and Giant Company, with fugitives still at large.