CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 18:15 22/05/2026 UTC
  • Seizure of First VPN service operations amid widespread abuse in cybercrime investigations An international law enforcement operation dismantled the 'First VPN' service, widely abused in ransomware and data theft campaigns, after a multi-year investigation. Operations included the seizure of 33 servers across 27 countries, the arrest of a Ukrainian administrator, and the takeover of associated domains (1vpns.com, 1vpns.net, 1vpns.org, and onion variants). The platform was marketed as no-logging and privacy-focused but allegedly used by threat actors to conceal infrastructure and identities. Investigators infiltrated the service, collected traffic data, and identified thousands of users globally, sharing 506 user identities and 83 intelligence packages with international partners to support ongoing cybercrime investigations. Europol coordinated the operation with support from Bitdefender, advancing 21 investigations through the intelligence gathered. Read
  • PostgreSQL-targeting SQL injection in Drupal Core enables remote code execution On May 22, 2026, Drupal confirmed active exploitation of CVE-2026-9082, a critical SQL injection vulnerability in Drupal Core’s database abstraction API that enables unauthenticated attackers to execute arbitrary SQL commands on PostgreSQL-backed sites. The flaw can lead to remote code execution, privilege escalation, or information disclosure without authentication. Patches have been issued for active Drupal branches (10.4–11.3) and manual fixes provided for end-of-life versions (8.9, 9.5). Drupal rated the risk internally as highly critical (23/25), though NIST assigned a CVSS v3 score of 6.5 (medium severity). Administrators are urged to update immediately, including those using non-PostgreSQL configurations due to upstream dependency fixes. Read
  • Microsoft Defender privilege escalation and denial-of-service vulnerabilities exploited in the wild Microsoft disclosed two actively exploited zero-day vulnerabilities in Microsoft Defender: CVE-2026-41091, a local privilege escalation flaw allowing attackers to gain SYSTEM privileges via improper link resolution, and CVE-2026-45498, a denial-of-service issue impacting Defender functionality. Both flaws were patched in Microsoft Defender Antimalware Platform versions 1.1.26040.8 and 4.18.26040.7, with updates automatically applied through malware definitions and the Microsoft Malware Protection Engine. Microsoft credited five researchers for disclosing the vulnerabilities and confirmed that systems with Defender disabled remain non-exploitable. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added both CVEs to its Known Exploited Vulnerabilities catalog on May 20, 2026, with a federal patch deadline of June 3, 2026. The article also references additional vulnerabilities added to the KEV catalog, including legacy flaws (e.g., CVE-2008-4250, CVE-2009-1537) and a recently weaponized Exchange Server XSS flaw (CVE-2026-42897, CVSS 8.1). Read
  • Medium-severity Apex One zero-day patched after exploitation in on-premises deployments Trend Micro patched CVE-2026-34926, a medium-severity directory traversal flaw in Apex One on-premises installations, after confirming in-the-wild exploitation targeting Windows systems. The vulnerability allowed local attackers with admin credentials to inject malicious code into server key tables and deploy payloads to agents. CISA added the CVE to its Known Exploited Vulnerabilities (KEV) catalog on May 22, 2026, requiring federal agencies to remediate by June 4, 2026. Concurrently, Trend Micro released updates addressing seven local privilege escalation vulnerabilities in the Apex One Standard Endpoint Protection agent. Threat actors have repeatedly exploited Apex One flaws in zero-day attacks, including prior incidents tracked as CVE-2025-54948 (August 2025), CVE-2022-40139 (September 2022), and CVE-2023-41179 (September 2023). Read
  • Infostealer campaign abuses fake Google Gemini and Anthropic Claude Code sites in SEO poisoning attacks A threat actor launched an SEO poisoning campaign in early 2026, creating fake websites impersonating Google’s Gemini CLI and Anthropic’s Claude Code to distribute an in-memory infostealer targeting Windows developers and enterprise users. Victims searching for legitimate AI coding tools were redirected via SEO manipulation to malicious domains that mimic official installation pages. Upon following provided PowerShell commands, users unknowingly executed an infostealer capable of harvesting browser credentials, session cookies, collaboration platform data, cryptocurrency wallet details, cloud storage files, and system metadata. The stolen data was exfiltrated to attacker-controlled command-and-control (C2) servers. The campaign demonstrates a deliberate focus on developer workstations and enterprise environments, using domain naming patterns (.co.uk, .us.com, .us.org) to suggest geographic targeting of the US and UK. Read
  • Former executives convicted for facilitating large-scale tech support fraud operations spanning 2017–2022 Two former executives of a call-tracking and analytics company pleaded guilty to concealing a years-long tech support fraud scheme that targeted individuals globally. Former CEO Adam Young and former CSO Harrison Gevirtz admitted to misprision of a felony and are scheduled for sentencing on June 16. They operated C.A. Cloud Attribution, Ltd. between early 2017 and April 2022, providing services including telephone numbers, call recordings, and call forwarding to known fraudsters. The fraud schemes involved deceptive pop-up ads falsely claiming system infections, directing victims to call centers charging hundreds of dollars for fictitious technical services. Some scammers remotely accessed victims' computers and stole personal and financial information to withdraw funds without authorization. Young and Gevirtz allegedly advised customers to use rotating telephone numbers to reduce complaints and prevent account terminations, and introduced fraudsters to one another. Read
  • Expansion of fraud impact metrics beyond chargeback rates in enterprise risk programs Organizations are broadening fraud measurement beyond traditional chargeback rates to include operational, reputational, and growth-related impacts as fraud techniques evolve. Emerging patterns such as account takeovers and synthetic identity fraud are driving indirect losses, customer churn, and operational overhead that are not captured by chargeback metrics. This shift reflects growing recognition that fraud prevention strategies must balance risk reduction with customer experience and revenue protection. Read
Last updated: 16:15 22/05/2026 UTC
  • OpenAI, TanStack, and Mistral AI Impacted in Escalating Mini Shai-Hulud Supply Chain Campaign The Mini Shai-Hulud supply chain campaign has escalated with a new wave of 639 compromised npm packages tied to the AntV ecosystem, including high-download dependencies such as echarts-for-react and timeago.js. The attack ran for roughly one hour on May 19, 2026, beginning at 01:56 UTC, publishing malicious versions from the compromised “atool” maintainer account that held rights for over 500 packages. Each compromised package added an obfuscated Bun bundle preinstall hook to harvest and exfiltrate credentials (cloud, CI/CD, SSH, Kubernetes, and password manager vaults) via GitHub repositories marked with Dune-themed names and the campaign's reversed signature. Earlier waves targeted TanStack and Mistral AI SDKs, SAP npm packages, and PyPI ecosystems (Lightning, intercom-client), while compromising GitHub Actions workflows ('actions-cool/issues-helper', 'actions-cool/maintain-one-comment') and hundreds of npm packages across multiple ecosystems. Affected organizations include OpenAI (two employee devices breached via TanStack), UiPath, Guardrails AI, OpenSearch, SAP, and hundreds of npm and PyPI packages. The malware harvests over 20 credential types, abuses OIDC tokens to forge Sigstore provenance attestations, implements self-propagation via stolen npm tokens, and includes a destructive sabotage payload targeting systems in Israel or Iran. The campaign is attributed to TeamPCP, which publicly released the Shai-Hulud source code, enabling rapid cloning and weaponization by other actors. Read
  • Widespread OAuth Device Code Phishing Campaign Targets Microsoft 365 via EvilTokens PhaaS Since mid-February 2026, a large-scale device code phishing campaign has targeted Microsoft 365 across at least 340 organizations in over 10 countries, escalating 37.5x in early April. The campaign abuses OAuth device authorization flows via the EvilTokens PhaaS platform and at least 10 additional phishing kits (VENOM, DOCUPOLL, SHAREFILE, etc.), granting persistent access tokens even after password resets. Attacks incorporate anti-bot evasion, multi-hop redirect chains via vendor services, and SaaS-themed lures, while mitigation focuses on disabling device code flows and monitoring anomalous authentications. Credential exposures like the Figure breach (967,200 email records) enable follow-on campaigns—credential stuffing, AI-generated phishing, and help desk social engineering—that bypass legacy MFA through real-time phishing relays and social engineering. Legacy MFA and even FIDO2 passkeys are structurally unable to prevent these attacks, which rely on human judgment at critical control points. Phishing-resistant authentication requires cryptographic origin binding, hardware-bound keys, and live biometric verification to close relay and delegation vectors. New research emphasizes how EvilTokens and similar kits exploit OAuth consent screens to trick users into granting scoped refresh tokens, bypassing MFA entirely and maintaining persistence even after password resets. The attack vector, termed consent phishing or OAuth grant abuse, operates below traditional identity controls, with refresh tokens surviving tenant policy changes unless explicitly revoked. The article also highlights the rise of 'toxic combinations'—unauthorized bridges between SaaS applications via OAuth grants—that create interconnected risk surfaces, exemplified by the 2025 Salesloft-Drift incident. Mitigation strategies now include platforms like Reco that map OAuth grants and AI agents into identity graphs, enabling continuous monitoring and token-level revocation to address these emergent attack pathways. Read
  • Upcoming webinar on automating and coordinating network incident response workflows A live webinar scheduled for June 2, 2026, will address systemic gaps in network incident response workflows that exacerbate incident escalation despite existing monitoring and security tooling. The session, titled "From alert to resolution: Fixing the gaps in network incident response," is hosted by BleepingComputer in partnership with Tines and will be presented by Edgar Ortiz, a Solutions Engineering Leader and Computer Scientist at Tines. It highlights how reliance on manual triage, alert routing, and coordination across disparate systems—rather than visibility limitations—drives incident escalation and service disruption during high-pressure scenarios. Read
  • Unsanctioned AI Tool Usage in Enterprises Over 80% of employees now use unapproved generative AI applications at work, with only 12% of companies maintaining formal AI governance policies. Shadow AI activity primarily occurs through OAuth connections to corporate data, browser extensions, and AI features embedded in pre-approved tools. This unsanctioned usage bypasses traditional security controls, creating significant governance and data exposure risks. Enterprises struggle to balance productivity with security, as employees adopt AI tools 3–5 times daily without IT oversight. The EU AI Act’s mandate for AI system visibility has intensified the need for continuous monitoring and risk assessments. Solutions like Harmonic Security’s platform enable enterprises to enforce smart governance policies based on data sensitivity, employee roles, and tool nature, addressing the operational realities highlighted by recent research. Read
  • Tycoon2FA Phishing-as-a-Service Takedown Tycoon2FA, a subscription-based phishing-as-a-service (PhaaS) platform that bypasses MFA using adversary-in-the-middle techniques, has expanded its capabilities to include device-code phishing attacks targeting Microsoft 365 accounts via OAuth 2.0 device authorization grant flows. The platform, active since August 2023, offers subscription-based access for bypassing multi-factor authentication, targeting major services like Microsoft 365 and Google. It was linked to over 64,000 phishing incidents and facilitated unauthorized access to nearly 100,000 organizations globally by mid-2025. The primary operator, identified as 'SaaadFridi' and 'Mr_Xaad,' remains at large. The platform’s infrastructure relies on adversary-in-the-middle techniques, AI-generated decoy pages, and short-lived domains to evade detection, while customers employ tactics like ATO Jumping to distribute phishing URLs. The platform was disrupted in a March 4, 2026 global takedown led by Europol’s EC3 and law enforcement from six European countries, but rapidly resumed operations within days to pre-disruption levels. Post-disruption, Tycoon2FA operators have continued to develop the kit, adding device-code phishing capabilities that abuse Trustifi click-tracking URLs and OAuth 2.0 flows. The phishing kit now includes a four-layer in-browser delivery chain, fake Microsoft CAPTCHA pages, and extensive anti-analysis protections to evade detection and analysis. Post-compromise activities include business email compromise (BEC), email thread hijacking, cloud account takeovers, and malicious SharePoint links, with old infrastructure remaining active and new domains registered quickly. Read
  • Shamos Infostealer Targeting Mac Devices via ClickFix Attacks Since June 2025, the COOKIE SPIDER group’s Shamos infostealer and Atomic macOS Stealer (AMOS) variants have targeted Mac devices via evolving ClickFix social engineering campaigns, stealing data and credentials from browsers, Keychain, Apple Notes, and cryptocurrency wallets. Early campaigns used malvertising, fake GitHub repositories, and signed Swift applications hosted on legitimate platforms, while also leveraging Terminal-based ClickFix tactics and obfuscated payloads. In March 2026, Apple introduced a Terminal security feature in macOS Tahoe 26.4 to disrupt ClickFix attack chains by blocking pasted command execution and warning users of risks. A major evolution emerged in April 2026 when Jamf researchers observed attackers abusing the built-in Script Editor application to bypass these protections using fake Apple-themed disk cleanup guides and malicious applescript:// URL scheme execution. The Script Editor-based ClickFix variation enabled theft of Keychain data, browser autofill, cryptocurrency wallet extensions, and system details without Terminal interaction, and introduced a backdoor component for persistent access. Most recently, SentinelOne has identified a new SHub macOS infostealer variant, dubbed Reaper, which further refines the Script Editor-based ClickFix attack vector. Reaper uses a fake Apple security update message displayed via the applescript:// URL scheme to launch Script Editor with a malicious AppleScript payload dynamically constructed and hidden under ASCII art. The malware bypasses Apple’s Terminal mitigations, performs device fingerprinting to evade sandboxes, and targets extensive data across browsers, wallets, password managers, iCloud, Telegram, and developer files. It includes a Filegrabber module for collecting sensitive documents and a wallet hijacking mechanism that replaces legitimate application files with malicious payloads. Reaper establishes persistence via a Google software update impersonation script registered as a LaunchAgent, enabling periodic beaconing to the C2 server and remote payload execution. Notably, the malware includes geofencing to avoid infecting Russian systems and represents an escalation in capabilities, incorporating remote access functionality to allow additional malware deployment on compromised macOS devices. Read
  • Microsoft Edge sandbox escape and Windows 11 privilege escalation zero-days demonstrated at Pwn2Own Berlin 2026 Security researchers at Pwn2Own Berlin 2026, held from May 14 to May 16, 2026, demonstrated 47 unique zero-day exploits across enterprise technologies, AI systems, and virtualization platforms, earning $1.3 million in total rewards—up from the initially reported 39 exploits and $908,750 in prizes. Orange Tsai (DEVCORE Research Team) achieved SYSTEM-level remote code execution on Microsoft Exchange and a sandbox escape in Microsoft Edge via chained logic and memory corruption bugs, earning $375,000 in total. The Devcore Research Team became the overall competition winner with $505,000 in earnings after new exploits were reported, including a $100,000 Microsoft SharePoint chain by "splitline" and a $200,000 VMware ESXi cross-tenant code execution by Nguyen Hoang Thach of STARLabs SG. Six independent teams demonstrated Windows 11 privilege escalation zero-days, with awards ranging from $7,500 to $30,000. The event emphasized AI-focused targets for the first time, including coding agents (Cursor, Claude Code, OpenAI Codex), AI databases (Chroma, Postgres pgvector, Oracle Autonomous AI Database), and NVIDIA infrastructure (Megatron Bridge, NV Container Toolkit, Dynamo). All exploited vulnerabilities required arbitrary code execution on fully patched systems under Pwn2Own rules. Vendors were given 90 days to address disclosed zero-days before public disclosure. Read

Latest updates

Browse →

Global law enforcement operation dismantles criminal VPN service used by 25 ransomware groups

Updated: · First: 22.05.2026 20:35 · 📰 1 src / 1 articles

A coordinated international law enforcement operation dismantled First VPN Service, a criminal-focused VPN infrastructure leveraged by at least 25 ransomware groups, threat actors, and cybercriminals for anonymizing malicious activities including ransomware attacks, data theft, network reconnaissance, and denial-of-service operations. The takedown spanned May 19–20, 2026 and involved authorities from 21 countries, including France, the Netherlands, Ukraine, the U.S., and the U.K., under operations led by Europol and Eurojust. The service, active since 2014, provided 32 exit nodes across 27 countries and promoted itself on Russian-speaking cybercrime forums such as Exploit[.]in and XSS[.]is as an anonymity tool resistant to law enforcement cooperation. Impact includes the seizure of 33 servers, interviews with the service administrator, and disruption of infrastructure supporting global cybercrime operations. The FBI confirmed the service’s role in enabling multiple ransomware operations, including Avaddon Ransomware.

AWS GovCloud administrative credentials exposed via contractor-managed public GitHub repository

Updated: 22.05.2026 19:34 · First: 18.05.2026 23:48 · 📰 2 src / 2 articles

A CISA contractor exposed credentials for AWS GovCloud accounts and internal systems via a public GitHub repository named "Private-CISA", enabling potential lateral movement within CISA’s networks. The exposure, first reported by GitGuardian on May 15, 2026, included plaintext passwords, cloud keys, tokens, and software deployment details. The repository was taken offline promptly, but exposed AWS keys remained valid for 48 hours, and CISA has stated there is no indication of sensitive data compromise. Lawmakers have since demanded answers from CISA, citing concerns over internal security culture and contractor oversight, particularly amid significant workforce disruptions at the agency. Reports indicate CISA struggled to fully invalidate exposed credentials for over a week, with evidence suggesting adversaries may have accessed the secrets. An RSA private key in the repository granted full access to CISA’s GitHub enterprise account until its recent revocation.

UAC-0050 Targets European Financial Institution with Spoofed Domain and RMS Malware

Updated: 22.05.2026 19:20 · First: 24.02.2026 16:21 · 📰 2 src / 2 articles

UAC-0050 continues to target European financial institutions with spear-phishing and RMS malware to establish persistent access. Concurrently, Russia-aligned operations such as Ghostwriter (UAC-0057/UNC1151) have intensified phishing campaigns against Ukrainian government entities since spring 2026, using Prometheus-themed lures and sophisticated multi-stage payloads like OYSTERFRESH, OYSTERBLUES, and Cobalt Strike. Ukraine’s National Security and Defense Council also reported increased Russian use of AI tools (e.g., ChatGPT, Google Gemini) for target reconnaissance and malware runtime command generation, alongside broader Kremlin-backed campaigns focused on intelligence gathering, long-term network persistence, and influence operations. These activities align with prior reporting on Russia-nexus adversaries targeting Ukrainian entities and NATO member states, including the deployment of legitimate remote access tools like RMS by UAC-0050.

Zscaler Acquires SquareX to Enhance Browser Security

Updated: 22.05.2026 18:43 · First: 06.02.2026 04:48 · 📰 3 src / 5 articles

In May 2026, Zscaler completed its acquisition of SquareX, formally integrating the Browser Detection and Response (BDR) solution into the Zero Trust Exchange platform to secure unmanaged devices via user-preferred browsers. SquareX’s extension, which converts standard browsers into enterprise-grade secure workspaces with real-time threat detection, remains a standalone offering while being incorporated into Zscaler’s broader strategy. The move, alongside concurrent industry consolidation, reflects growing enterprise adoption of secure browsers amid rising threats to browser-based activities, including malicious extensions, phishing, and AI tool interactions. Gartner projects adoption of secure enterprise browsers to rise from 10% to 25% of organizations by 2028, underscoring the sector’s rapid evolution.

Former executives convicted for facilitating large-scale tech support fraud operations spanning 2017–2022

Updated: · First: 22.05.2026 18:32 · 📰 1 src / 1 articles

Two former executives of a call-tracking and analytics company pleaded guilty to concealing a years-long tech support fraud scheme that targeted individuals globally. Former CEO Adam Young and former CSO Harrison Gevirtz admitted to misprision of a felony and are scheduled for sentencing on June 16. They operated C.A. Cloud Attribution, Ltd. between early 2017 and April 2022, providing services including telephone numbers, call recordings, and call forwarding to known fraudsters. The fraud schemes involved deceptive pop-up ads falsely claiming system infections, directing victims to call centers charging hundreds of dollars for fictitious technical services. Some scammers remotely accessed victims' computers and stole personal and financial information to withdraw funds without authorization. Young and Gevirtz allegedly advised customers to use rotating telephone numbers to reduce complaints and prevent account terminations, and introduced fraudsters to one another.

Medium-severity Apex One zero-day patched after exploitation in on-premises deployments

Updated: 22.05.2026 16:39 · First: 22.05.2026 11:19 · 📰 2 src / 2 articles

Trend Micro patched CVE-2026-34926, a medium-severity directory traversal flaw in Apex One on-premises installations, after confirming in-the-wild exploitation targeting Windows systems. The vulnerability allowed local attackers with admin credentials to inject malicious code into server key tables and deploy payloads to agents. CISA added the CVE to its Known Exploited Vulnerabilities (KEV) catalog on May 22, 2026, requiring federal agencies to remediate by June 4, 2026. Concurrently, Trend Micro released updates addressing seven local privilege escalation vulnerabilities in the Apex One Standard Endpoint Protection agent. Threat actors have repeatedly exploited Apex One flaws in zero-day attacks, including prior incidents tracked as CVE-2025-54948 (August 2025), CVE-2022-40139 (September 2022), and CVE-2023-41179 (September 2023).

Evolving AI-Fueled Social Engineering Surge Targets Healthcare Sector

Updated: · First: 22.05.2026 16:17 · 📰 1 src / 1 articles

Healthcare organizations experienced a notable increase in sophisticated social engineering attacks in 2025, driven by AI-enhanced pretexting and phishing tactics that exploit operational urgency and trust in clinical workflows. Threat actors leveraged generative AI to craft highly targeted, context-aware communications and malicious documents, impersonating executives, vendors, and HR to manipulate healthcare professionals into divulging credentials or enabling session hijacking. The attacks align with long-standing industry vulnerabilities, including legacy systems, high-value data (e.g., patient records), and fragmented supplier ecosystems. The Verizon 2026 Data Breach Investigations Report (DBIR) identifies social engineering as a top three breach pattern in healthcare, alongside system intrusion and miscellaneous errors, collectively accounting for 81% of incidents. Pretexting—previously absent from DBIR healthcare data—now ranks as the second most common social action in healthcare breaches, reflecting a shift toward credibility-driven deception over traditional urgency-based lures.

PostgreSQL-targeting SQL injection in Drupal Core enables remote code execution

Updated: 22.05.2026 16:14 · First: 21.05.2026 06:44 · 📰 2 src / 2 articles

On May 22, 2026, Drupal confirmed active exploitation of CVE-2026-9082, a critical SQL injection vulnerability in Drupal Core’s database abstraction API that enables unauthenticated attackers to execute arbitrary SQL commands on PostgreSQL-backed sites. The flaw can lead to remote code execution, privilege escalation, or information disclosure without authentication. Patches have been issued for active Drupal branches (10.4–11.3) and manual fixes provided for end-of-life versions (8.9, 9.5). Drupal rated the risk internally as highly critical (23/25), though NIST assigned a CVSS v3 score of 6.5 (medium severity). Administrators are urged to update immediately, including those using non-PostgreSQL configurations due to upstream dependency fixes.

Expansion of fraud impact metrics beyond chargeback rates in enterprise risk programs

Updated: · First: 22.05.2026 16:09 · 📰 1 src / 1 articles

Organizations are broadening fraud measurement beyond traditional chargeback rates to include operational, reputational, and growth-related impacts as fraud techniques evolve. Emerging patterns such as account takeovers and synthetic identity fraud are driving indirect losses, customer churn, and operational overhead that are not captured by chargeback metrics. This shift reflects growing recognition that fraud prevention strategies must balance risk reduction with customer experience and revenue protection.

Kimwolf Botmaster 'Dort' Linked to Cybercrime Activities

Updated: 22.05.2026 15:11 · First: 28.02.2026 14:01 · 📰 3 src / 3 articles

Jacob Butler, a 23-year-old Canadian residing in Ottawa, has been arrested for operating the Kimwolf DDoS botnet, a variant of the AisURU botnet. Butler, known online as 'Dort,' faces a charge of aiding and abetting computer intrusion in the US, with potential penalties of up to 10 years in prison if convicted. The botnet enslaved approximately 2 million devices, primarily Android-based and traditionally 'firewalled' consumer hardware like digital photo frames and web cameras, and operated as an Android-focused successor to the Aisuru botnet. Kimwolf propagated via residential proxy networks to expand its reach and was used in cybercrime-as-a-service operations, selling access for DDoS attacks—including against Department of Defense IP addresses—peaking at 31.4 Tbps. The Kimwolf botnet emerged from a vulnerability disclosed in January 2026 and became the world’s largest and most disruptive botnet. Butler has been linked to cybercrime activities dating back to at least 2017, including DDoS attacks, doxing, email flooding, and ties to the LAPSUS$ group. Investigations revealed his involvement in Minecraft cheating software, CAPTCHA bypass tools, and temporary email services. On March 11, 2026, authorities disrupted Kimwolf and Aisuru as part of a coordinated operation in Canada and Germany, though no arrests were disclosed at the time. The US Justice Department later announced Butler’s arrest in Ottawa and unsealed seizure warrants for 45 DDoS-for-hire platforms, including one collaborating with Kimwolf.

Infostealer campaign abuses fake Google Gemini and Anthropic Claude Code sites in SEO poisoning attacks

Updated: · First: 22.05.2026 14:30 · 📰 1 src / 1 articles

A threat actor launched an SEO poisoning campaign in early 2026, creating fake websites impersonating Google’s Gemini CLI and Anthropic’s Claude Code to distribute an in-memory infostealer targeting Windows developers and enterprise users. Victims searching for legitimate AI coding tools were redirected via SEO manipulation to malicious domains that mimic official installation pages. Upon following provided PowerShell commands, users unknowingly executed an infostealer capable of harvesting browser credentials, session cookies, collaboration platform data, cryptocurrency wallet details, cloud storage files, and system metadata. The stolen data was exfiltrated to attacker-controlled command-and-control (C2) servers. The campaign demonstrates a deliberate focus on developer workstations and enterprise environments, using domain naming patterns (.co.uk, .us.com, .us.org) to suggest geographic targeting of the US and UK.

Apple’s App Store fraud prevention efforts block over $11B in six years with $2.2B in 2025 alone

Updated: 22.05.2026 13:30 · First: 21.05.2026 18:11 · 📰 2 src / 2 articles

Apple’s fraud prevention efforts have now cumulatively blocked over $11.2 billion in App Store fraud over six years, including more than $2.2 billion in 2025 alone. The company terminated 193,000 developer accounts, rejected 138,000 enrollments, and deactivated 40.4 million customer accounts due to fraud or abuse in 2025. It also blocked 5.4 million stolen credit cards and banned nearly 2 million user accounts from further transactions. Enforcement expanded through AI-driven detection models, the blocking of 1.1 billion fraudulent account creations, and takedowns of 28,000 illegitimate apps on pirate storefronts.

KEV catalog update includes Langflow RCE and Trend Micro Apex One directory traversal flaws under active exploitation

Updated: · First: 22.05.2026 08:47 · 📰 1 src / 1 articles

CISA added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog: CVE-2025-34291 in Langflow and CVE-2026-34926 in Trend Micro Apex One, citing active exploitation. CVE-2025-34291, with a CVSS score of 9.4, is an origin validation error enabling arbitrary code execution and full system compromise, exposing sensitive tokens and triggering cascading compromises across integrated services. CVE-2026-34926, rated 6.7, is a directory traversal flaw in on-premise Apex One versions allowing pre-authenticated local attackers with administrative server access to inject malicious code deployable to agents. MuddyWater, an Iranian threat actor, has exploited CVE-2025-34291 for initial access, while Trend Micro observed exploitation attempts for CVE-2026-34926 in the wild. FCEB agencies must remediate by June 4, 2026.

Critical REST API Vulnerability in Cisco Secure Workload Allows Unauthenticated Data Access and Privilege Escalation

Updated: · First: 22.05.2026 08:36 · 📰 1 src / 1 articles

A critical, unauthenticated REST API vulnerability (CVE-2026-20223, CVSS 10.0) in Cisco Secure Workload enables remote attackers to read sensitive data and modify configurations across tenant boundaries with Site Admin privileges. The flaw affects both SaaS and on-prem deployments across multiple software releases, with no available workarounds. Exploitation requires crafting a malicious API request to a vulnerable endpoint, posing significant risk to network isolation and data confidentiality.

Agentic AI Supply Chain Risk Management Evolves with Runtime Authority Tracking Requirements

Updated: · First: 22.05.2026 00:11 · 📰 1 src / 1 articles

New guidance emphasizes extending AI Bills of Materials (AI BOMs) to include runtime behavior and delegated authority for autonomous AI agents, addressing critical gaps in traditional artifact-lineage documentation. The shift reflects the rise of agentic AI systems that perform actions beyond static model/data composition, introducing dynamic supply chain risks tied to execution context, tool permissions, and decision propagation. Organizations are urged to adopt agentic-ready AI BOM frameworks to prevent incidents like unchecked AI agents deleting production databases due to authorization failures.

Google Cloud Platform API Key Revocation Delays Beyond UI Confirmation

Updated: · First: 21.05.2026 23:07 · 📰 1 src / 1 articles

Research from Aikido Security reveals that Google Cloud Platform (GCP) API keys remain active for a median of 16 minutes and up to 23 minutes after deletion, creating a critical window for attackers to exploit deleted credentials. The revocation delay varies significantly by region, with authentication success rates ranging from 5% to 79% within the first minute post-deletion. Attackers holding deleted API keys can continue making authenticated requests until Google’s infrastructure propagates the revocation, potentially exfiltrating data via enabled services like Gemini. The GCP console falsely indicates immediate revocation, leaving organizations unaware of ongoing exposure.

Unpatched Chromium Service Worker persistence flaw exposed in tracker

Updated: · First: 21.05.2026 21:13 · 📰 1 src / 1 articles

A persistent Service Worker flaw in Chromium-based browsers allowed JavaScript execution to continue running in the background after browser closure, enabling remote code execution (RCE) on devices. The vulnerability was reported in December 2022 and remained unpatched despite being marked as fixed in February 2026. Google inadvertently exposed technical details in the Chromium Issue Tracker for 14 weeks, increasing the risk of exploitation. Affected browsers include Chrome, Edge, Brave, Opera, Vivaldi, and Arc.

Shifting enterprise budget allocations for identity security in AI agent deployments

Updated: · First: 21.05.2026 18:43 · 📰 1 src / 1 articles

A 2025–2026 Omdia study indicates identity teams are establishing dedicated budgets for securing AI agents, reflecting a significant shift from traditional IAM funding models controlled by CIO or CISO offices. As AI agents proliferate and operate autonomously across hybrid environments, securing their identities—authentication, authorization, governance, and life cycle management—has become a first-class requirement. Enterprises are allocating standalone AI budgets to fund these identity security layers, creating a new funding stream distinct from IT or security budgets.

Seizure of First VPN service operations amid widespread abuse in cybercrime investigations

Updated: 21.05.2026 18:30 · First: 21.05.2026 16:09 · 📰 2 src / 2 articles

An international law enforcement operation dismantled the 'First VPN' service, widely abused in ransomware and data theft campaigns, after a multi-year investigation. Operations included the seizure of 33 servers across 27 countries, the arrest of a Ukrainian administrator, and the takeover of associated domains (1vpns.com, 1vpns.net, 1vpns.org, and onion variants). The platform was marketed as no-logging and privacy-focused but allegedly used by threat actors to conceal infrastructure and identities. Investigators infiltrated the service, collected traffic data, and identified thousands of users globally, sharing 506 user identities and 83 intelligence packages with international partners to support ongoing cybercrime investigations. Europol coordinated the operation with support from Bitdefender, advancing 21 investigations through the intelligence gathered.

Espionage Campaign Targeting Eastern Asia via Sogou Zhuyin Update Server Hijacking

Updated: 21.05.2026 17:17 · First: 29.08.2025 16:12 · 📰 3 src / 3 articles

The TAOTH espionage campaign continues to target Eastern Asia via hijacked Sogou Zhuyin update servers, distributing malware families such as C6DOOR, GTELAM, DESFY, and TOSHIS to dissidents, journalists, and business leaders. The campaign, linked to infrastructure overlap with the ITOCHU threat actor, primarily impacts Taiwan (49% of targets), Cambodia, and the U.S. Additional distribution methods include phishing websites and fake cloud storage pages. Concurrently, Chinese state-aligned hackers have expanded the use of the Linux post-exploitation framework Showboat, now confirmed to operate as a SOCKS5 proxy backdoor with rootkit-like capabilities. Showboat has been deployed against telecommunications providers in the Middle East since at least mid-2022, with victims identified in Afghanistan, Azerbaijan, and possible compromises in the U.S. and Ukraine. Its modular design enables remote shell access, file transfers, and LAN device infection, often leveraging infrastructure geolocated to Chengdu, Sichuan. The malware retrieves obfuscation code from a Pastebin snippet created in January 2022, highlighting long-term development and reuse across Chinese APT groups including Calypso, which also deploys the JFMBackdoor Windows backdoor.

Emergence of structured Drainer-as-a-Service platforms with affiliate-driven wallet theft operations

Updated: · First: 21.05.2026 17:00 · 📰 1 src / 1 articles

Underground cybercriminal ecosystems have matured into structured Drainer-as-a-Service (DaaS) platforms, exemplified by the "Lucifer" operation, which professionalizes wallet theft through SaaS-like models including affiliate commissions, automation, and resilience measures. Victims are lured via phishing to fake crypto, NFT, airdrop, or DeFi sites where wallet connection and transaction approvals enable near-instant asset transfer across blockchains. Affiliates drive traffic while DaaS operators handle infrastructure, transaction logic, and asset draining, splitting proceeds from successful thefts. These platforms lower technical barriers for attackers, increase operational scalability, and resist takedowns through decentralized documentation and rapid reconfiguration, raising the threat level for cryptocurrency users and organizations.

Calypso APT leverages Showboat and JFMBackdoor in ongoing telecom espionage campaign

Updated: · First: 21.05.2026 17:00 · 📰 1 src / 1 articles

A Chinese state-aligned cyber-espionage campaign attributed to the Calypso APT group has been targeting telecommunications providers since at least mid-2022 using newly identified malware families Showboat (Linux) and JFMBackdoor (Windows). The operation spans organizations across the Asia-Pacific and parts of the Middle East, with attackers establishing persistence, conducting espionage, and using compromised infrastructure as pivot points for lateral movement. The campaign employs modular malware frameworks, dead-drop communication techniques, and a partially decentralized operational model to maintain long-term access and operational security.

Industry-wide escalation in deployment of known-vulnerable code amid AI-driven exploitation acceleration

Updated: · First: 21.05.2026 16:00 · 📰 1 src / 1 articles

Three-quarters of organizations admit to frequently shipping code with known vulnerabilities, according to new data from Checkmarx published May 21, 2026. The average time from public disclosure to exploitation has collapsed from 840 days in 2018 to under two days in 2026, with Checkmarx researchers projecting a one-minute exploitation window by 2028. Vulnerability exploitation now accounts for 31% of initial access vectors in breaches, up from 20% in the previous year, per Verizon’s 2026 DBIR. Rising adversary adoption of AI tools is cited as a key driver of the trend, with median threat actors leveraging AI in up to 15 documented techniques and some using AI in 40–50 techniques.

Critical REST API validation flaw in Cisco Secure Workload (CVE-2026-20223) patched

Updated: · First: 21.05.2026 15:04 · 📰 1 src / 1 articles

Cisco patched CVE-2026-20223, a critical vulnerability in Secure Workload with a CVSS score of 10.0, enabling attackers to access site resources with Site Admin privileges by sending crafted API requests to internal REST endpoints. The flaw stems from insufficient input validation and authentication in the REST API. Successful exploitation permits reading sensitive data and modifying configurations across tenant boundaries. The issue affects both SaaS and on-prem deployments of Secure Workload Cluster Software and is limited to internal REST APIs, not the web-based management interface. No exploitation in the wild has been reported.

CISA launches public nomination form for Known Exploited Vulnerabilities catalog

Updated: · First: 21.05.2026 15:00 · 📰 1 src / 1 articles

CISA introduced a public Nomination Form to streamline reporting of actively exploited vulnerabilities (KEVs) to its Known Exploited Vulnerabilities Catalog. The form enables researchers, vendors, and industry partners to submit suspected KEVs directly to CISA for validation and rapid inclusion. CISA emphasizes the role of early detection and coordinated disclosure in reducing systemic cyber risk across critical infrastructure and federal networks.

Linux OrBit Rootkit Evolution and AI-Driven Intrusions Surge in Latin America

Updated: · First: 21.05.2026 14:52 · 📰 1 src / 1 articles

Linux userland rootkit OrBit has been actively maintained and refined by its operators nearly four years after its initial discovery, with evidence of two distinct lineages—Lineage A (full-featured) and Lineage B (lite)—indicating ongoing development and deployment. The malware, attributed to Blockade Spider and linked to the Embargo ransomware campaign, employs advanced evasion techniques, persistence mechanisms, and credential harvesting. Concurrently, two AI-driven intrusion campaigns—SHADOW-AETHER-040 and SHADOW-AETHER-064—have emerged, leveraging agentic AI to conduct intrusions against governments and financial institutions in Latin America, bypassing AI safety controls by framing activities as authorized penetration testing. These developments highlight the convergence of sophisticated rootkit technology and AI-enabled intrusion operations, underscoring the evolving threat landscape for both Linux environments and cloud-based infrastructures.

Flipper One open Linux platform development seeks community collaboration for ARM-based hardware experimentation device

Updated: · First: 21.05.2026 14:00 · 📰 1 src / 1 articles

Flipper Devices initiates an open community-driven project to develop Flipper One, a high-performance ARM-based Linux platform for networking, hardware experimentation, and SDR analysis. The device features a Rockchip RK3576 ARM SoC with 8 GB RAM and an RP2350 microcontroller in a dual-processor design, enabling operation even when the OS is powered off. Flipper One is modular, supporting M.2, GPIO, PCIe, USB 3.1, SATA, and wireless interfaces for SDR, storage, AI accelerators, and satellite connectivity. Targeted use cases include router/VPN gateway, survival desktop, media box, and HDMI-enabled device, though the project remains in active development with unresolved software and hardware challenges.

Microsoft Defender privilege escalation and denial-of-service vulnerabilities exploited in the wild

Updated: 21.05.2026 13:55 · First: 21.05.2026 12:52 · 📰 2 src / 2 articles

Microsoft disclosed two actively exploited zero-day vulnerabilities in Microsoft Defender: CVE-2026-41091, a local privilege escalation flaw allowing attackers to gain SYSTEM privileges via improper link resolution, and CVE-2026-45498, a denial-of-service issue impacting Defender functionality. Both flaws were patched in Microsoft Defender Antimalware Platform versions 1.1.26040.8 and 4.18.26040.7, with updates automatically applied through malware definitions and the Microsoft Malware Protection Engine. Microsoft credited five researchers for disclosing the vulnerabilities and confirmed that systems with Defender disabled remain non-exploitable. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added both CVEs to its Known Exploited Vulnerabilities catalog on May 20, 2026, with a federal patch deadline of June 3, 2026. The article also references additional vulnerabilities added to the KEV catalog, including legacy flaws (e.g., CVE-2008-4250, CVE-2009-1537) and a recently weaponized Exchange Server XSS flaw (CVE-2026-42897, CVSS 8.1).

Mass exploitation of signed vulnerable drivers by 54 EDR killer tools via BYOVD technique

Updated: 22.05.2026 14:38 · First: 19.03.2026 20:52 · 📰 2 src / 1 articles

Security vendors have identified 54 distinct EDR killer tools that abuse Bring Your Own Vulnerable Driver (BYOVD) techniques by exploiting 34 vulnerable, signed drivers to disable endpoint detection and response (EDR) solutions. The tools are deployed primarily by ransomware groups, affiliates, and underground service providers to neutralize security controls before executing file-encrypting malware. Attackers gain kernel-mode privileges (Ring 0) to terminate EDR processes, disable protection mechanisms, and tamper with kernel callbacks, thereby undermining endpoint defenses through abuse of Microsoft’s driver trust model. Recent research demonstrates userland-only techniques that expand the viability of BYOVD attacks. By creating software-emulated device nodes with arbitrary hardware IDs via SetupAPI or Software Device API, attackers can trigger AddDevice callbacks and assemble device stacks without physical hardware. Registry manipulation further enables binding unsigned drivers to arbitrary hardware, bypassing INF/catalog requirements while preserving driver signature validation. Additionally, filter drivers can be made accessible by placing them atop a functional device stack (e.g., Disk Drive class) to satisfy IRP_MJ_CREATE, highlighting new avenues for expanding the attack surface against conditional vulnerabilities in signed drivers. These developments suggest that the pool of exploitable vulnerable drivers may grow as attackers refine userland-only deployment methods, even as Microsoft tightens cross-signing policies.

Critical Path Traversal in Ubiquiti UniFi Network Application Enables Account Takeover

Updated: 22.05.2026 15:00 · First: 19.03.2026 15:00 · 📰 2 src / 1 articles

A critical severity vulnerability, CVE-2026-22557, in Ubiquiti’s UniFi Network Application (versions 10.1.85 and earlier) allows remote attackers on the local network to execute path traversal attacks and gain unauthorized access to system files, enabling account takeover without privileges or user interaction. This vulnerability impacts UniFi Network Application deployments, including those managed via UniFi Cloud Gateway, switches, access points, and gateways. Ubiquiti patched the issue in versions 10.1.89 and later, alongside addressing a second authenticated NoSQL injection flaw enabling privilege escalation. Ubiquiti has since patched three additional maximum-severity vulnerabilities in UniFi OS (CVE-2026-34908, CVE-2026-34909, CVE-2026-34910), enabling unauthorized system changes, file access, and command injection after network access is obtained. Two supplementary flaws (CVE-2026-33000 and CVE-2026-34911) were also addressed. Threat intelligence firm Censys estimates nearly 100,000 Internet-exposed UniFi OS endpoints globally, with approximately 50,000 located in the United States. Ubiquiti has not disclosed evidence of in-the-wild exploitation for any of these vulnerabilities, which were reported via its HackerOne bug bounty program and are exploitable in low-complexity attacks. Historical targeting of Ubiquiti products by state-backed actors and cybercriminals has involved botnet construction and traffic concealment in past campaigns.