CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 07:15 08/05/2026 UTC
  • MuddyWater Expands Global Campaigns with New Backdoors Targeting US and Israeli Entities The MuddyWater threat actor, linked to Iran’s Ministry of Intelligence and Security (MOIS) and also known as Static Kitten, Mango Sandstorm, and Seedworm, has continued to refine its global espionage campaigns by masquerading as ransomware operations to obscure state-sponsored activity. In early 2026, the group conducted an intrusion disguised as a Chaos ransomware attack, leveraging Microsoft Teams for social engineering to establish screen-sharing sessions, steal credentials, and deploy remote management tools like AnyDesk and DWAgent. The operation included extortion emails directing victims to a ransomware leak site, but no file-encrypting malware was deployed, confirming the use of ransomware-as-a-decoy tactics. The attackers deployed a custom RAT named Darkcomp (Game.exe), signed with a previously linked certificate, and dropped via a loader named ms_upd.exe. The backdoor features anti-analysis checks and supports 12 commands, including PowerShell execution and persistent shell access. Rapid7 researchers attribute the campaign to MuddyWater with moderate confidence, citing infrastructure overlap, code-signing certificates, and operational tradecraft. This follows a late 2025 incident where MuddyWater used Qilin ransomware for similar deception, suggesting an evolving pattern of false-flag operations to evade detection. Additionally, MuddyWater has been linked to a campaign targeting Omani government institutions, exfiltrating over 26,000 Ministry of Justice records, and pro-Iran-aligned hacktivist groups like Handala Hack have escalated activities, including leaking sensitive documents from the Port of Fujairah in the UAE. Earlier campaigns targeted over 100 organizations globally, including government entities, diplomatic missions, and telecommunications firms in the MENA region, using phishing emails with malicious Word documents to drop backdoors like Phoenix v4, MuddyViper, UDPGangster, and RustyWater. The group has also targeted Israeli sectors across academia, engineering, and local government, as well as US companies with backdoors such as Dindoor and Fakeset. The shift from PowerShell-based tools to Rust-based implants and now ransomware decoys underscores MuddyWater’s adaptability and focus on evading attribution while pursuing espionage objectives. Read
  • Windows Beagle backdoor deployed via trojanized Claude AI relay installer A multi-stage malware campaign delivers the Windows Beagle backdoor through a trojanized installer for a fake "Claude-Pro Relay" tool hosted on the lookalike domain claude-pro[.]com. The installer, distributed as a 505 MB ZIP archive, abuses a signed G Data antivirus updater (NOVupdate.exe) to sideload a malicious DLL (avk.dll) and an encrypted payload via DLL sideloading. The malware chain leverages DonutLoader for in-memory deployment of the Beagle backdoor, which provides attackers with remote control capabilities including file operations, command execution, and persistence via the Windows Startup folder. The campaign infrastructure, set up in March 2026, uses Cloudflare for distribution and Alibaba Cloud for C2 hosting on ports 443 (TCP) and 8080 (UDP) with AES encryption. Beagle has evolved since initial observations in February 2026, with variants incorporating AdaptixC2 shellcode and masquerading as updates for multiple security vendors. Technical analysis links the sideloading technique and artifacts to PlugX-associated activity, suggesting possible involvement or imitation by established threat actors. Read
  • WebSocket origin validation bypass in Cline Kanban enables AI agent hijacking and data exfiltration A critical security flaw in Cline Kanban's WebSocket endpoints allows any website a user visits to hijack AI coding agents, exfiltrate workspace data, inject terminal commands, or terminate active sessions. The vulnerability (CVSS 9.7) affects Cline version 0.1.59 and earlier, leveraging missing origin validation and authentication on three unauthenticated WebSocket endpoints exposed on localhost port 3484. Exploitation requires no phishing, malware, or social engineering, as browsers permit cross-origin WebSocket connections to localhost, bypassing intended access controls. Impact includes full AI agent compromise, sensitive data theft, and arbitrary code execution with default "bypass permissions" enabled. Read
  • Nexcorium Mirai variant leverages CVE-2024-3721 to compromise TBK DVRs and expand DDoS botnet operations A Mirai variant named Nexcorium is being actively deployed via CVE-2024-3721, a command injection vulnerability affecting TBK DVR-4104 and DVR-4216 devices, to establish a DDoS botnet. The malware exploits the flaw to drop a downloader that executes architecture-specific payloads, displays a message indicating takeover by "nexuscorp," and leverages hard-coded credentials for lateral movement via Telnet. Persistence is achieved through crontab and systemd services, with command-and-control (C2) communication awaiting DDoS attack instructions. The malware also includes an exploit for CVE-2017-17215 to target Huawei HG532 devices and deletes original binaries to hinder forensic analysis. Analysis by FortiGuard Labs confirms the multi-architecture infection process and identifies evidence in attack traffic pointing to a previously untracked threat actor group referred to as "Nexus Team," indicating potential attribution beyond earlier assumptions. Additionally, a separate Mirai-derived botnet, xlabs_v1, has been observed exploiting exposed Android Debug Bridge (ADB) services on TCP port 5555 to compromise Android TV boxes, set-top boxes, smart TVs, and other IoT devices for DDoS-for-hire operations. The botnet implements a bandwidth-tiered pricing model and includes a "killer" subsystem to terminate competing malware, targeting consumer IoT and game servers. Read
  • Linux Kernel Dirty Frag LPE Vulnerability Chain Enables Root Access A new local privilege escalation (LPE) vulnerability chain dubbed Dirty Frag has been disclosed for the Linux kernel, enabling unprivileged local users to gain root access across major distributions. The flaw combines two page-cache write primitives—xfrm-ESP Page-Cache Write and RxRPC Page-Cache Write—to bypass existing mitigations and achieve deterministic exploitation with high success rates. Affected distributions include Ubuntu 24.04.4, RHEL 10.1, openSUSE Tumbleweed, CentOS Stream 10, AlmaLinux 10, and Fedora 44. A working proof-of-concept (PoC) allows root access in a single command, though exploitation paths vary by distribution due to module availability and AppArmor restrictions. Read
  • Credential theft campaign PCPJack leverages five CVEs for cloud propagation and eviction of TeamPCP artifacts PCPJack, a credential theft framework targeting cloud infrastructure, has been further analyzed by SentinelLabs, confirming its worm-like propagation via five CVEs and deliberate eviction of TeamPCP artifacts. The framework now appears to be an offshoot of TeamPCP operations, potentially created by a former member or affiliate leveraging intimate knowledge of the group’s earlier tactics. PCPJack’s expanded capabilities include encrypted Telegram exfiltration of stolen credentials using X25519 ECDH and ChaCha20-Poly1305, Sliver-based backdoor deployment across multiple CPU architectures, and enhanced persistence mechanisms via systemd, cron, or container-based methods. Primary monetization focuses on financial fraud, spam, credential resale, or extortion, with lateral movement achieved through SSH keys, Kubernetes, and Docker environments. Read
  • CloudZ RAT abuses Microsoft Phone Link via Pheno plugin for credential and OTP theft Since at least January 2026, threat actors have abused the CloudZ RAT and custom Pheno plugin to hijack Microsoft Phone Link on Windows hosts, enabling credential and OTP theft by intercepting synchronized mobile data without mobile device compromise. The attack chain begins with a fake ScreenConnect executable delivering a Rust-compiled loader that deploys CloudZ via regasm.exe, establishing persistence via a scheduled task under the SYSTEM account. CloudZ includes 20+ commands for data theft and system control, while the Pheno plugin scans for active Phone Link sessions to harvest synchronized content from SQLite databases like PhoneExperiences-*.db. Cisco Talos has published IOCs and ClamAV signatures to aid detection. The intrusion leverages Phone Link’s desktop synchronization of SMS, call logs, and notifications over Wi-Fi/Bluetooth, exposing a critical gap in MFA defenses that focus solely on mobile endpoints. The malware employs anti-analysis techniques and retrieves secondary configuration from staging servers and Pastebin, rotating user-agent strings to blend with legitimate traffic. No attribution to a known threat actor has been made. Read
Last updated: 04:00 08/05/2026 UTC
  • Unchecked AI Agent Deployments Drive Widespread Cybersecurity Incidents Across Enterprises A real-world incident demonstrates the catastrophic potential of unchecked AI agent deployments: an AI coding agent deleted a production database and all backups in nine seconds, causing immediate operational disruption for car rental companies. Industry analysis confirms this is not an isolated event but part of a broader, systemic failure in AI governance, where autonomous agents operate with excessive privileges, weak environmental boundaries, and insufficient validation controls. Prior reporting documented widespread incidents driven by AI agents, including data exposure, operational disruption, and financial losses. Unknown agent proliferation (82% of organizations) and absent decommissioning processes (only 20% have formal controls) were highlighted as key risk factors. Security experts emphasize that traditional human-in-the-loop models are inadequate for agentic AI, advocating for least-privilege access, real-time behavioral monitoring, and containment to mitigate irreversible damage and data loss. Read
  • TruffleNet Attack Campaign Targeting AWS Environments The TruffleNet attack campaign, initially documented in late 2025, continues to evolve with observed phishing campaigns leveraging Amazon SES to bypass security controls and execute business email compromise (BEC) attacks. Researchers report a surge in SES abuse tied to exposed AWS credentials in public repositories, enabling automated credential scanning via TruffleHog and large-scale phishing campaigns. Attackers craft convincing phishing emails with custom HTML templates and fabricated email threads to deceive victims, including fake DocuSign notifications and invoice scams targeting finance departments. Read
  • TCLBanker Evolution: Water Saci Expands WhatsApp/Outlook Campaign Targeting 59 Brazilian Banks and Fintech Platforms A new trojan named TCLBanker, which targets 59 banking, fintech, and cryptocurrency platforms, has emerged as a major evolution of the older Maverick/SORVEPOTEL malware family. The malware spreads via WhatsApp and Outlook using self-spreading worm modules that automatically infect new victims, primarily in Brazil, but with potential for regional expansion. TCLBanker is loaded via DLL side-loading within a legitimate Logitech application, avoiding detection by security products. The banking module monitors browser activity in real-time, enabling remote control operations including live screen streaming, keylogging, and clipboard hijacking, while using sophisticated overlay systems to harvest credentials and financial data. The malware's WhatsApp worm module hijacks authenticated sessions to harvest contacts and send spam messages, while the Outlook worm module abuses COM automation to distribute phishing emails. The threat actor behind TCLBanker, identified as Water Saci, has incorporated advanced evasion techniques and may have used AI tools during development, further refining its capabilities beyond earlier iterations like SORVEPOTEL and Maverick. Read
  • Supply Chain Attack on Drift via OAuth Token Theft A supply chain attack targeted the Drift chatbot, a marketing software-as-a-service product owned by Salesloft, resulting in the mass theft of OAuth tokens from multiple companies. Salesloft took Drift offline on September 5, 2025, to review and enhance security. Affected companies include Cloudflare, Google Workspace, PagerDuty, Palo Alto Networks, Proofpoint, SpyCloud, Tanium, Tenable, and Zscaler. The threat actor, tracked as UNC6395 and GRUB1, exploited OAuth tokens to access Salesforce data, with evidence now confirming over 700 organizations were impacted. The attack demonstrated that OAuth grants can be weaponized even when the app and token were initially legitimate, underscoring the risks of third-party integrations and the need for robust, continuous monitoring of OAuth behavior. The incident revealed that the attacker bypassed MFA entirely by presenting a legitimate OAuth token already granted to Drift, accessing Salesforce data without logging in. This approach allowed UNC6395 to systematically export data and search for credentials such as AWS access keys, Snowflake tokens, and passwords across affected organizations. The full scope of the breach is still being assessed, but the attack structure serves as a warning: trusting an app at installation does not guarantee its ongoing trustworthiness, and OAuth grants require active, continuous monitoring rather than passive acceptance. Security teams are now urged to adopt tools that provide visibility into OAuth-connected applications, monitor their behavior over time, and enable rapid response to mitigate risks. Read
  • ScarCruft (APT37) Expands Tactics with Ruby Jumper Campaign Targeting Air-Gapped Networks The ScarCruft (APT37) Ruby Jumper campaign and its broader espionage operations continue to evolve, with the group now deploying an Android variant of the BirdCall backdoor via a supply-chain attack on sqgame[.]net, a Chinese gaming platform targeting Koreans in the Yanbian region—a transit hub for North Korean defectors. This marks ScarCruft’s first documented use of mobile malware in a supply-chain context, expanding its targeting beyond Windows systems to include Android devices used by high-risk populations. The Android BirdCall variant (internally named 'zhuagou') collects geolocation data, contact lists, SMS/call logs, device metadata, and files of interest (e.g., documents, audio recordings, certificates), while also recording ambient audio during evening hours (7 pm–10 pm local time) and using anti-suspension techniques (e.g., silent MP3 loops) to evade detection. The malware leverages Zoho WorkDrive for C2, with 12 separate accounts identified in this campaign, aligning with the group’s broader abuse of legitimate cloud services. Earlier campaigns, such as Ruby Jumper (December 2025–February 2026), demonstrated ScarCruft’s focus on air-gapped network breaches via USB-based implants (THUMBSBD, VIRUSTASK) and cloud-abused C2 (Zoho WorkDrive), alongside multi-stage infection chains combining LNK files, PowerShell scripts, and Ruby runtime manipulation. The supply-chain compromise of sqgame[.]net—first observed in late 2024—involved poisoned APKs (`ybht.apk`, `sqybhs.apk`) and a trojanized Windows DLL (delivered via an update package) that deployed RokRAT as a precursor to BirdCall. This campaign underscores ScarCruft’s adaptive tradecraft, blending supply-chain compromise with mobile surveillance to exploit geopolitically sensitive targets. The iOS game on the platform remained uncompromised, likely due to Apple’s stringent review process. Read
  • Phishing-to-outage lifecycle focus of upcoming MSP cyber resilience webinar featuring Kaseya A live technical webinar scheduled for May 14, 2026, hosted by BleepingComputer in collaboration with Kaseya, will present advanced strategies for MSPs to integrate detection, response, and recovery to mitigate phishing-driven cyber incidents. The session will detail how AI-powered phishing, business email compromise, and ransomware campaigns increasingly bypass traditional controls by leveraging trusted SaaS platforms. It will emphasize that even when threats are detected, gaps between security and backup functions can escalate incidents into prolonged operational outages, significantly increasing risks of data theft, account takeover, and ransomware deployment. The webinar will also provide actionable tactics for combining prevention, detection, and rapid recovery to maintain client uptime and operational continuity. Kaseya experts Austin O'Saben and Adam Marget will lead the session, providing MSPs with specific guidance on integrating backup and disaster recovery into security strategies to reduce downtime and limit incident impact. Separately, a May 7, 2026 article by The Hacker News promotes a related but distinct webinar, "One Click, Total Shutdown: The 'Patient Zero' Webinar on Killing Stealth Breaches," emphasizing the first moments of a breach and rapid containment strategies for AI-driven phishing attacks. It highlights the "Patient Zero" concept, the critical 5-minute window to contain an infection, and tactics such as zero-trust isolation and a "Recovery Blueprint" to prevent escalation to data theft or ransomware. Read
  • North Korean State Actors Exploit Fake Employee Schemes to Infiltrate Companies North Korean state actors continue to exploit fake employee schemes to infiltrate companies, particularly in blockchain and technology sectors, funneling stolen virtual currency and funds to North Korea's weapons program. The practice has escalated with remote work and AI, enabling fraudsters to impersonate employees and gain privileged access to company networks. Labyrinth Chollima, a prolific North Korean-linked cyber threat group, has evolved into three distinct hacking groups: Labyrinth Chollima (cyber espionage targeting industrial, logistics, and defense), Golden Chollima (smaller-scale cryptocurrency theft), and Pressure Chollima (high-value heists). Each group uses distinct toolsets derived from the same malware framework used by Labyrinth Chollima in the 2000s and 2010s. A joint investigation uncovered a network of remote IT workers tied to Lazarus Group's Famous Chollima division, with researchers capturing live activity of Lazarus operators on sandboxed laptops. The scheme, tracked as Jasper Sleet, PurpleDelta, and Wagemole, involves stealing or borrowing identities, using AI tools for interviews, and funneling salaries to the DPRK. Thousands of North Korean IT workers have infiltrated companies over the past two years, exploiting hiring processes and remote work environments. The U.S. Treasury has sanctioned individuals and entities involved, while Japan, South Korea, and the U.S. collaborate to combat the threat. Five U.S. citizens pleaded guilty to assisting North Korea's illicit revenue generation schemes, and two additional U.S. nationals, Kejia Wang and Zhenxing Wang, were sentenced to prison for operating a 'laptop farm' that facilitated the infiltration of over 100 companies, generating $5 million in illicit revenue and causing $3 million in damages to victim companies. Two more U.S. nationals, Matthew Isaac Knoot and Erick Ntekereze Prince, have now been sentenced to 18 months in prison each for operating laptop farms that enabled North Korean IT workers to fraudulently secure remote employment at nearly 70 American companies between 2020 and 2024. The operations resulted in over $1.2 million in illicit payments to North Korean operatives and caused significant remediation costs for victim companies. Read

Latest updates

Browse →

Credential theft campaign PCPJack leverages five CVEs for cloud propagation and eviction of TeamPCP artifacts

Updated: 08.05.2026 12:00 · First: 07.05.2026 20:45 · 📰 3 src / 3 articles

PCPJack continues to propagate as a worm-like credential theft framework across Docker, Kubernetes, Redis, MongoDB, RayML, and vulnerable web applications, now confirmed to deliberately evict TeamPCP artifacts before executing its payload. The framework remains attributed to a former TeamPCP operator leveraging intimate knowledge of the group’s tooling, with targeting patterns mirroring TeamPCP’s early campaigns from December 2025. Unlike TeamPCP’s earlier operations, PCPJack avoids cryptocurrency mining despite targeting crypto credentials, focusing instead on monetization via credential theft, fraud, spam, extortion, or resale. SentinelLabs analysis indicates PCPJack’s orchestrator script (worm.py) uses Telegram for C2 and propagates via Common Crawl parquet files, while a secondary shell script (check.sh) deploys Sliver-based backdoors across x86_64, x86, and ARM architectures and scans cloud environments for credentials tied to multiple service providers.

Former Contractors Accused of Wiping 96 U.S. Government Databases

Updated: 08.05.2026 11:45 · First: 04.12.2025 18:30 · 📰 2 src / 2 articles

Two former federal contractors, Muneeb and Sohaib Akhter, have been convicted for conspiring to steal sensitive information and wipe 96 U.S. government databases in February 2025 after being fired. The brothers, who had prior convictions for hacking U.S. State Department systems in 2016, were rehired by a contractor servicing over 45 federal agencies. They allegedly used commands to prevent database modifications, deleted critical records including Freedom of Information Act files and investigative documents, and attempted to conceal their actions by wiping logs, company laptops, and seeking guidance from an AI assistant on erasing evidence. The brothers were terminated during a remote meeting on February 18, 2025, immediately after the company discovered Sohaib Akhter’s felony conviction. They face severe penalties, with Sohaib scheduled for sentencing on September 9, 2026, potentially receiving up to 21 years in prison, while Muneeb faces a maximum of 45 years for multiple felony charges including computer fraud, aggravated identity theft, and destruction of government records.

Linux Kernel Dirty Frag LPE Vulnerability Chain Enables Root Access

Updated: · First: 08.05.2026 08:12 · 📰 1 src / 1 articles

A new local privilege escalation (LPE) vulnerability chain dubbed Dirty Frag has been disclosed for the Linux kernel, enabling unprivileged local users to gain root access across major distributions. The flaw combines two page-cache write primitives—xfrm-ESP Page-Cache Write and RxRPC Page-Cache Write—to bypass existing mitigations and achieve deterministic exploitation with high success rates. Affected distributions include Ubuntu 24.04.4, RHEL 10.1, openSUSE Tumbleweed, CentOS Stream 10, AlmaLinux 10, and Fedora 44. A working proof-of-concept (PoC) allows root access in a single command, though exploitation paths vary by distribution due to module availability and AppArmor restrictions.

European Commission Investigates Breach in Mobile Device Management Platform

Updated: 08.05.2026 01:36 · First: 09.02.2026 11:49 · 📰 4 src / 4 articles

The European Commission is investigating a second breach affecting its Amazon cloud infrastructure hosting the Europa.eu platform, which occurred on March 24, 2026. A threat actor, identified as ShinyHunters, claims to have stolen over 350GB of data, including databases, confidential documents, employee PII, DKIM keys, internal admin URLs, NextCloud data, and military financing data. The attacker stated no intention to extort the Commission but warned of potential secondary impacts such as identity risk and spear-phishing attacks. The breach was contained within hours, and the Commission is notifying affected entities while investigating the full impact. This follows the January 30, 2026 breach of the Commission’s mobile device management platform, linked to Ivanti EPMM vulnerabilities, which exposed staff names, phone numbers, and business email addresses and was contained within 9 hours. Separately, ShinyHunters has recently targeted Instructure’s Canvas platform, breaching it a second time to deface login portals for approximately 330 educational institutions, replacing standard pages with an extortion message and threatening to leak data if a ransom is not paid by May 12, 2026. Instructure confirmed data theft during the attack but continues investigating the incident.

TCLBanker Evolution: Water Saci Expands WhatsApp/Outlook Campaign Targeting 59 Brazilian Banks and Fintech Platforms

Updated: 08.05.2026 01:06 · First: 03.10.2025 15:02 · 📰 6 src / 17 articles

A new trojan named TCLBanker, which targets 59 banking, fintech, and cryptocurrency platforms, has emerged as a major evolution of the older Maverick/SORVEPOTEL malware family. The malware spreads via WhatsApp and Outlook using self-spreading worm modules that automatically infect new victims, primarily in Brazil, but with potential for regional expansion. TCLBanker is loaded via DLL side-loading within a legitimate Logitech application, avoiding detection by security products. The banking module monitors browser activity in real-time, enabling remote control operations including live screen streaming, keylogging, and clipboard hijacking, while using sophisticated overlay systems to harvest credentials and financial data. The malware's WhatsApp worm module hijacks authenticated sessions to harvest contacts and send spam messages, while the Outlook worm module abuses COM automation to distribute phishing emails. The threat actor behind TCLBanker, identified as Water Saci, has incorporated advanced evasion techniques and may have used AI tools during development, further refining its capabilities beyond earlier iterations like SORVEPOTEL and Maverick.

ClickFix social engineering campaigns distributing Vidar Stealer malware via compromised WordPress sites

Updated: · First: 07.05.2026 21:00 · 📰 1 src / 1 articles

An active malware campaign leveraging the ClickFix social engineering technique is targeting Australian organizations and infrastructure entities through compromised WordPress websites. The attack redirects users to malicious payloads via WordPress-hosted infrastructure and displays fake Cloudflare verification or CAPTCHA prompts instructing victims to manually execute malicious PowerShell commands. This results in the delivery and execution of Vidar Stealer, an information-stealing malware family operating as malware-as-a-service (MaaS). The campaign abuses legitimate-looking prompts to bypass security controls, with Vidar Stealer designed to operate from system memory for evasion and persistence, targeting sensitive data including browser credentials, cryptocurrency wallets, and system metadata.

Exploitation of Ivanti EPMM Vulnerabilities (CVE-2025-4427, CVE-2025-4428) Leads to Malware Deployment

Updated: 07.05.2026 20:55 · First: 19.09.2025 07:10 · 📰 11 src / 15 articles

Ivanti has disclosed CVE-2026-6973, a high-severity improper input validation vulnerability in Endpoint Manager Mobile (EPMM) with a CVSS score of 7.2. The flaw allows remotely authenticated users with administrative access to achieve remote code execution on EPMM appliances running versions prior to 12.6.1.1, 12.7.0.1, and 12.8.0.1. Ivanti reports very limited exploitation in the wild and notes that customers who rotated credentials following prior attacks (e.g., CVE-2026-1281 and CVE-2026-1340) may reduce risk exposure. CISA added CVE-2026-6973 to its Known Exploited Vulnerabilities (KEV) catalog on May 7, 2026, requiring Federal Civilian Executive Branch agencies to apply patches by May 10, 2026. Alongside this, Ivanti also patched four additional high-severity EPMM vulnerabilities (CVE-2026-5786, CVE-2026-5787, CVE-2026-5788, CVE-2026-7821), though the company has no evidence these have been exploited in the wild. Earlier phases of this campaign documented exploitation of CVE-2025-4427 and CVE-2025-4428, leading to malware deployment and follow-on attacks against government agencies worldwide. Subsequent disclosures revealed additional zero-day vulnerabilities (CVE-2026-1281, CVE-2026-1340) exploited in attacks, with over 850 exposed EPMM instances tracked online. A single threat actor using bulletproof hosting infrastructure (PROSPERO) was responsible for 83% of exploitation attempts, often employing DNS callbacks for verification. Affected organizations included the Dutch Data Protection Authority (AP), the Council for the Judiciary, the European Commission, and Finland's Valtori, with breaches exposing sensitive employee data.

Cybersecurity and data protection budget allocation challenges

Updated: 07.05.2026 17:50 · First: 14.08.2025 17:00 · 📰 2 src / 2 articles

Organizations continue to face internal budget conflicts between cybersecurity, data protection, and cyber-resilience initiatives, with 72% of security professionals reporting that data security has never been more critical. However, legacy network and perimeter security tools are actively impeding adequate data protection, as evidenced by over half of organizations lacking full vulnerability visibility and nearly half admitting their data security processes hinder competitiveness. Budget challenges are exacerbated by the need for modern data protection strategies that support AI adoption, as autonomous AI agents heighten risks of unintended data exposure. Traditional siloed solutions fail to provide the speed, flexibility, scalability, and AI readiness required today, with only 33% of organizations using tokenization—a critical capability for reducing risk while enabling data-driven innovation. The shift toward integrated strategies that protect data across cloud and AI environments is now a strategic imperative, with top priorities including protecting enterprise data at scale, improving security posture, and adopting proactive security measures. Prior context includes fragmented responsibilities across departments leading to silos, competition between prevention-focused cybersecurity and recovery-focused data protection teams, and leadership viewing security spending as an intangible cost. Regulatory pressures often drive compliance-focused strategies over resilience-focused ones, while modern threats like sophisticated ransomware and polymorphic malware demand unified approaches that align prevention and recovery.

WebSocket origin validation bypass in Cline Kanban enables AI agent hijacking and data exfiltration

Updated: · First: 07.05.2026 17:30 · 📰 1 src / 1 articles

A critical security flaw in Cline Kanban's WebSocket endpoints allows any website a user visits to hijack AI coding agents, exfiltrate workspace data, inject terminal commands, or terminate active sessions. The vulnerability (CVSS 9.7) affects Cline version 0.1.59 and earlier, leveraging missing origin validation and authentication on three unauthenticated WebSocket endpoints exposed on localhost port 3484. Exploitation requires no phishing, malware, or social engineering, as browsers permit cross-origin WebSocket connections to localhost, bypassing intended access controls. Impact includes full AI agent compromise, sensitive data theft, and arbitrary code execution with default "bypass permissions" enabled.

Browser-native data loss prevention visibility gap revealed in modern enterprise workflows

Updated: · First: 07.05.2026 17:01 · 📰 1 src / 1 articles

Modern enterprise data leakage risks are exacerbated by browser-based workflows where sensitive data moves via copy/paste, form inputs, file uploads, and AI tool interactions without detection by traditional DLP controls. Analysis indicates 46% of sensitive file uploads to web applications are directed to unsanctioned or personal accounts, exposing a critical blind spot in existing data loss prevention (DLP) strategies. Traditional endpoint, network, and cloud DLP tools lack visibility into in-browser activities such as clipboard usage, real-time form inputs, and AI prompt data entry, enabling data exfiltration under the guise of normal user behavior. This operational shift to SaaS, web apps, and AI-driven tools has rendered legacy DLP ineffective at monitoring the primary interface through which sensitive data now flows.

AI-assisted cyber intrusion targeting Mexican water utility infrastructure

Updated: · First: 07.05.2026 17:00 · 📰 1 src / 1 articles

Between December 2025 and February 2026, a cyber-attack leveraging commercial large language models (LLMs) targeted a municipal water and drainage utility provider in the Monterrey metropolitan area of Mexico, compromising IT systems and attempting to breach operational technology (OT) environments. Attackers used Anthropic’s Claude AI as the primary technical executor for intrusion planning, tool development, and deployment, while OpenAI’s GPT models were used for analytical tasks, data processing, and Spanish-language output generation. The campaign generated 350 AI-produced malicious scripts, demonstrating an advanced, automated approach to cyber operations. The intrusion highlighted the accessibility of AI tools for threat actors with limited operational technology (OT) expertise, enabling rapid refinement of attack techniques and credential-based brute force attempts using default login lists. Despite the compromise, the OT breach was ultimately unsuccessful.

Phishing-to-outage lifecycle focus of upcoming MSP cyber resilience webinar featuring Kaseya

Updated: 07.05.2026 16:50 · First: 17.04.2026 15:20 · 📰 4 src / 4 articles

A live technical webinar scheduled for May 14, 2026, hosted by BleepingComputer in collaboration with Kaseya, will present advanced strategies for MSPs to integrate detection, response, and recovery to mitigate phishing-driven cyber incidents. The session will detail how AI-powered phishing, business email compromise, and ransomware campaigns increasingly bypass traditional controls by leveraging trusted SaaS platforms. It will emphasize that even when threats are detected, gaps between security and backup functions can escalate incidents into prolonged operational outages, significantly increasing risks of data theft, account takeover, and ransomware deployment. The webinar will also provide actionable tactics for combining prevention, detection, and rapid recovery to maintain client uptime and operational continuity. Kaseya experts Austin O'Saben and Adam Marget will lead the session, providing MSPs with specific guidance on integrating backup and disaster recovery into security strategies to reduce downtime and limit incident impact. Separately, a May 7, 2026 article by The Hacker News promotes a related but distinct webinar, "One Click, Total Shutdown: The 'Patient Zero' Webinar on Killing Stealth Breaches," emphasizing the first moments of a breach and rapid containment strategies for AI-driven phishing attacks. It highlights the "Patient Zero" concept, the critical 5-minute window to contain an infection, and tactics such as zero-trust isolation and a "Recovery Blueprint" to prevent escalation to data theft or ransomware.

North Korean State Actors Exploit Fake Employee Schemes to Infiltrate Companies

Updated: 07.05.2026 16:45 · First: 21.08.2025 00:39 · 📰 15 src / 23 articles

North Korean state actors continue to exploit fake employee schemes to infiltrate companies, particularly in blockchain and technology sectors, funneling stolen virtual currency and funds to North Korea's weapons program. The practice has escalated with remote work and AI, enabling fraudsters to impersonate employees and gain privileged access to company networks. Labyrinth Chollima, a prolific North Korean-linked cyber threat group, has evolved into three distinct hacking groups: Labyrinth Chollima (cyber espionage targeting industrial, logistics, and defense), Golden Chollima (smaller-scale cryptocurrency theft), and Pressure Chollima (high-value heists). Each group uses distinct toolsets derived from the same malware framework used by Labyrinth Chollima in the 2000s and 2010s. A joint investigation uncovered a network of remote IT workers tied to Lazarus Group's Famous Chollima division, with researchers capturing live activity of Lazarus operators on sandboxed laptops. The scheme, tracked as Jasper Sleet, PurpleDelta, and Wagemole, involves stealing or borrowing identities, using AI tools for interviews, and funneling salaries to the DPRK. Thousands of North Korean IT workers have infiltrated companies over the past two years, exploiting hiring processes and remote work environments. The U.S. Treasury has sanctioned individuals and entities involved, while Japan, South Korea, and the U.S. collaborate to combat the threat. Five U.S. citizens pleaded guilty to assisting North Korea's illicit revenue generation schemes, and two additional U.S. nationals, Kejia Wang and Zhenxing Wang, were sentenced to prison for operating a 'laptop farm' that facilitated the infiltration of over 100 companies, generating $5 million in illicit revenue and causing $3 million in damages to victim companies. Two more U.S. nationals, Matthew Isaac Knoot and Erick Ntekereze Prince, have now been sentenced to 18 months in prison each for operating laptop farms that enabled North Korean IT workers to fraudulently secure remote employment at nearly 70 American companies between 2020 and 2024. The operations resulted in over $1.2 million in illicit payments to North Korean operatives and caused significant remediation costs for victim companies.

Active exploitation of PAN-OS RCE zero-day CVE-2026-0300 via User-ID Authentication Portal

Updated: 07.05.2026 16:34 · First: 07.05.2026 13:57 · 📰 2 src / 2 articles

State-sponsored threat actors tracked as CL-STA-1132 have exploited the critical PAN-OS firewall zero-day CVE-2026-0300 since at least April 9, 2026, achieving initial unauthenticated remote code execution by April 16–17, 2026. The vulnerability, a buffer overflow in the User-ID Authentication Portal service, enables root-level arbitrary code execution on exposed PA-Series and VM-Series firewalls. Attackers injected shellcode into nginx worker processes and immediately began erasing forensic artifacts, including crash kernel messages and nginx records, to evade detection. Post-compromise activity included Active Directory enumeration and deployment of EarthWorm and ReverseSocks5 tunneling tools on April 29, 2026, targeting additional network devices. The adversary’s use of open-source tools and disciplined, intermittent operational sessions over weeks minimized signature-based detection while maintaining stealth. Over 5,400 PAN-OS VM-Series firewalls remain exposed on the internet, predominantly in Asia and North America. CISA added CVE-2026-0300 to its Known Exploited Vulnerabilities Catalog on May 7, 2026, mandating federal remediation by May 9, 2026. Palo Alto Networks plans to release patches starting May 13, 2026.

Windows Beagle backdoor deployed via trojanized Claude AI relay installer

Updated: 07.05.2026 16:15 · First: 07.05.2026 13:02 · 📰 2 src / 2 articles

A multi-stage malware campaign delivers the Windows Beagle backdoor through a trojanized installer for a fake "Claude-Pro Relay" tool hosted on the lookalike domain claude-pro[.]com. The installer, distributed as a 505 MB ZIP archive, abuses a signed G Data antivirus updater (NOVupdate.exe) to sideload a malicious DLL (avk.dll) and an encrypted payload via DLL sideloading. The malware chain leverages DonutLoader for in-memory deployment of the Beagle backdoor, which provides attackers with remote control capabilities including file operations, command execution, and persistence via the Windows Startup folder. The campaign infrastructure, set up in March 2026, uses Cloudflare for distribution and Alibaba Cloud for C2 hosting on ports 443 (TCP) and 8080 (UDP) with AES encryption. Beagle has evolved since initial observations in February 2026, with variants incorporating AdaptixC2 shellcode and masquerading as updates for multiple security vendors. Technical analysis links the sideloading technique and artifacts to PlugX-associated activity, suggesting possible involvement or imitation by established threat actors.

Marlon Ferro sentenced for role in $250M cryptocurrency heist involving social engineering and residential burglaries

Updated: · First: 07.05.2026 15:11 · 📰 1 src / 1 articles

A 20-year-old California man, Marlon Ferro, was sentenced to 6.5 years in prison for acting as a home invader and money launderer in a criminal conspiracy that stole over $250 million in cryptocurrency between late 2023 and early 2025. Ferro targeted individuals suspected of holding significant cryptocurrency assets, using social engineering to gain wallet access and resorting to residential burglaries when victims stored funds in hardware wallets. The scheme combined advanced online fraud with traditional burglary, resulting in the theft of hardware wallets containing approximately 100 Bitcoins (valued at over $5 million at the time) and the laundering of stolen funds through cryptocurrency exchanges and mixing services. The operation funded lavish lifestyles, including private security, nightclub outings, international travel, and high-end purchases.

Microsoft Edge plaintext credential exposure via process memory vulnerability

Updated: · First: 07.05.2026 14:33 · 📰 1 src / 1 articles

A vulnerability in Microsoft Edge allows local administrators to extract plaintext user passwords from the browser’s process memory, even when credentials are not actively in use. The flaw stems from Edge storing all saved passwords in cleartext in memory upon startup, a behavior unique among Chromium-based browsers. Exploitation requires prior compromise of the target device and enables memory dumping via the Windows Task Manager to retrieve credentials. Microsoft has defended the design choice as intentional to speed up sign-in processes.

Incident response operational gaps expose critical visibility and access delays in Day Zero breach scenarios

Updated: · First: 07.05.2026 13:54 · 📰 1 src / 1 articles

Organizations with incident response retainers or pre-approved external teams frequently lack operational readiness to act effectively during the first hours of a breach. Delays in provisioning access to identity systems, cloud environments, endpoint detection and response (EDR) tools, and logging infrastructure hinder responders’ ability to gain visibility, contain threats, and reconstruct attack timelines. Every administrative or approval delay benefits attackers, increasing the risk of deeper compromise, broader lateral movement, and costlier recovery. Operational readiness requires pre-configured accounts, tested workflows, and clear authority structures to enable immediate investigative access without live negotiations or manual setup during an active incident.

ZiChatBot malware delivered via compromised PyPI packages leveraging Zulip APIs as C2

Updated: · First: 07.05.2026 12:20 · 📰 1 src / 1 articles

Three malicious Python packages uploaded to PyPI between July 16–22, 2025 delivered a previously undocumented malware family, ZiChatBot, on Windows and Linux systems using Zulip REST APIs as a covert command-and-control channel. The attack bypassed traditional C2 infrastructure by abusing public chat platform APIs and exhibited code similarities to a dropper previously attributed to the OceanLotus (APT32) group, suggesting expansion of the actor’s supply chain tactics.

Increase in Vercel-based phishing campaigns leveraging generative AI tools

Updated: · First: 07.05.2026 11:30 · 📰 1 src / 1 articles

Low-skilled threat actors are increasingly abusing Vercel’s v0.dev generative AI platform to create sophisticated, brand-impersonating phishing pages, enabling high-fidelity social engineering attacks with minimal technical effort. Attackers exploit Vercel’s free-tier testing, low-cost pro tiers, integrated hosting, and cloud-based infrastructure to rapidly deploy and redeploy malicious sites that closely mimic legitimate brand landing pages, including Microsoft, Spotify, Adidas, Ferrari, Louis Vuitton, and Nike. The platform’s integration with third-party services such as Telegram, AWS, Stripe, and xAI further enhances operational flexibility and credential harvesting capabilities.

Critical sandbox escape flaw in vm2 NodeJS library

Updated: 07.05.2026 07:15 · First: 27.01.2026 18:35 · 📰 4 src / 4 articles

A critical-severity vulnerability (CVE-2026-22709) in the vm2 Node.js sandbox library allows escaping the sandbox and executing arbitrary code on the host system. The flaw arises from improper sanitization of Promises and has affected multiple versions, including the recently disclosed CVE-2026-26956, which exploits WebAssembly exception handling in Node.js 25 environments to bypass vm2's security defenses. The discovery of a dozen additional critical vulnerabilities in vm2—including CVE-2026-24118, CVE-2026-24120, CVE-2026-24781, CVE-2026-26332, CVE-2026-43997, CVE-2026-43999, CVE-2026-44005, CVE-2026-44006, CVE-2026-44007, CVE-2026-44008, and CVE-2026-44009—further demonstrates the persistent difficulty in securely isolating untrusted JavaScript code. All vulnerabilities enable sandbox escape with arbitrary code execution and carry CVSS scores between 9.1 and 10.0. Users are advised to upgrade to vm2 version 3.11.2 (or later) to mitigate risks, as the maintainer acknowledges future bypasses are likely and recommends considering alternatives like isolated-vm for stronger isolation.

Adversary-in-the-Middle phishing campaign leveraging Google Ads targets ManageWP credentials

Updated: · First: 07.05.2026 00:36 · 📰 1 src / 1 articles

A phishing campaign is abusing Google sponsored search results to deliver adversary-in-the-middle (AiTM) phishing pages targeting credentials for ManageWP, GoDaddy’s remote WordPress administration platform. Threat actors proxy victim interactions in real time between the fake login page and the legitimate ManageWP service, capturing credentials and 2FA codes via a Telegram-controlled channel. The campaign is designed as an interactive, operator-driven framework rather than a commoditized phishing kit. Targeted users include developers and agencies managing WordPress fleets, with compromised accounts potentially granting access to hundreds of sites per victim. The campaign has impacted at least 200 unique victims to date, according to Guardio Labs.

Nexcorium Mirai variant leverages CVE-2024-3721 to compromise TBK DVRs and expand DDoS botnet operations

Updated: 06.05.2026 23:21 · First: 18.04.2026 09:01 · 📰 3 src / 3 articles

A Mirai variant named Nexcorium is being actively deployed via CVE-2024-3721, a command injection vulnerability affecting TBK DVR-4104 and DVR-4216 devices, to establish a DDoS botnet. The malware exploits the flaw to drop a downloader that executes architecture-specific payloads, displays a message indicating takeover by "nexuscorp," and leverages hard-coded credentials for lateral movement via Telnet. Persistence is achieved through crontab and systemd services, with command-and-control (C2) communication awaiting DDoS attack instructions. The malware also includes an exploit for CVE-2017-17215 to target Huawei HG532 devices and deletes original binaries to hinder forensic analysis. Analysis by FortiGuard Labs confirms the multi-architecture infection process and identifies evidence in attack traffic pointing to a previously untracked threat actor group referred to as "Nexus Team," indicating potential attribution beyond earlier assumptions. Additionally, a separate Mirai-derived botnet, xlabs_v1, has been observed exploiting exposed Android Debug Bridge (ADB) services on TCP port 5555 to compromise Android TV boxes, set-top boxes, smart TVs, and other IoT devices for DDoS-for-hire operations. The botnet implements a bandwidth-tiered pricing model and includes a "killer" subsystem to terminate competing malware, targeting consumer IoT and game servers.

Cisco CNC and NSO DoS flaw CVE-2026-20188 triggers manual reboot requirement

Updated: · First: 06.05.2026 21:06 · 📰 1 src / 1 articles

Cisco disclosed and patched a high-severity denial-of-service (DoS) vulnerability, CVE-2026-20188, in Crosswork Network Controller (CNC) and Network Services Orchestrator (NSO) that can only be recovered from via manual system reboot. Unauthenticated remote attackers can exploit the flaw due to insufficient rate limiting on incoming connections, causing resource exhaustion and unresponsiveness in unpatched CNC/NSO deployments. Impact includes disruption of network management and orchestration services for large enterprises and service providers relying on these platforms. No active exploitation has been observed at the time of disclosure, but manual intervention remains necessary to restore functionality.

Trojanized DAEMON Tools installers deliver multi-stage backdoor via signed software supply chain compromise

Updated: 06.05.2026 19:43 · First: 05.05.2026 19:07 · 📰 3 src / 3 articles

DAEMON Tools installers distributed from the official website and digitally signed with legitimate developer certificates were trojanized to deliver a multi-stage malware payload since April 8, 2026, compromising three binaries—DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe—to activate an implant on launch. The attack was officially confirmed by Disc Soft Limited on May 6, 2026, which acknowledged unauthorized interference within its infrastructure and released a malware-free version (DAEMON Tools Lite 12.6) on May 5, 2026. The compromised versions (12.5.0.2421 to 12.5.0.2434) contacted the C2 domain env-check.daemontools[.]cc to receive commands executed via cmd.exe, leading to the deployment of payloads including envchk.exe, cdg.exe, and a minimal backdoor capable of file exfiltration, command execution, and in-memory shellcode execution. The campaign, attributed to a Chinese-speaking adversary, showed targeted delivery with only a small subset of infected hosts receiving follow-on malware. The implant executed shell commands via cmd.exe to download and run further payloads, including a .NET reconnaissance tool (envchk.exe), a shellcode loader (cdg.exe), and a minimal backdoor with capabilities such as file exfiltration, command execution, and in-memory shellcode execution. Kaspersky telemetry observed several thousand infection attempts across over 100 countries, but second-stage backdoor delivery was highly targeted, with only a dozen hosts receiving follow-on malware. Infected systems receiving the backdoor belonged to organizations in retail, scientific, government, and manufacturing sectors in Russia, Belarus, and Thailand, with one educational institution in Russia receiving the QUIC RAT payload. The backdoor supports multiple C2 protocols and process injection techniques, and evidence suggests the activity is attributed to a Chinese-speaking adversary.

CloudZ RAT abuses Microsoft Phone Link via Pheno plugin for credential and OTP theft

Updated: 06.05.2026 18:00 · First: 06.05.2026 11:34 · 📰 2 src / 2 articles

Since at least January 2026, threat actors have abused the CloudZ RAT and custom Pheno plugin to hijack Microsoft Phone Link on Windows hosts, enabling credential and OTP theft by intercepting synchronized mobile data without mobile device compromise. The attack chain begins with a fake ScreenConnect executable delivering a Rust-compiled loader that deploys CloudZ via regasm.exe, establishing persistence via a scheduled task under the SYSTEM account. CloudZ includes 20+ commands for data theft and system control, while the Pheno plugin scans for active Phone Link sessions to harvest synchronized content from SQLite databases like PhoneExperiences-*.db. Cisco Talos has published IOCs and ClamAV signatures to aid detection. The intrusion leverages Phone Link’s desktop synchronization of SMS, call logs, and notifications over Wi-Fi/Bluetooth, exposing a critical gap in MFA defenses that focus solely on mobile endpoints. The malware employs anti-analysis techniques and retrieves secondary configuration from staging servers and Pastebin, rotating user-agent strings to blend with legitimate traffic. No attribution to a known threat actor has been made.

Modern ransomware campaigns systematically undermine backup infrastructure as part of attack lifecycle

Updated: · First: 06.05.2026 17:04 · 📰 1 src / 1 articles

Modern ransomware threat actors integrate backup system targeting into their attack chains, compromising recovery infrastructure before payload deployment. Attackers follow a deliberate sequence—initial access, credential theft, lateral movement, backup discovery, backup destruction—then deploy ransomware when recovery options are eliminated. This operational shift makes traditional backup-focused defenses insufficient, as backup systems often operate without isolation, immutability, or access controls, becoming single points of failure during incidents. Ransomware attacks increased 50% year-over-year according to Acronis Cyberthreats Report H2 2025, highlighting the urgency for organizations to redesign backup and recovery architectures with resilience against active compromise.

CISA launches CI Fortify initiative to enhance critical infrastructure resilience against cyber threats

Updated: 06.05.2026 16:15 · First: 05.05.2026 15:00 · 📰 2 src / 2 articles

CISA’s CI Fortify initiative has expanded with detailed guidance for critical infrastructure (CI) operators to prepare for worst-case scenarios where third-party networks and upstream providers cannot be trusted and threat actors already have access to operational technology (OT) environments. The initiative now includes specific recommendations to identify critical customers, set service delivery targets, update business continuity plans for prolonged isolation, and collaborate with vendors to map dependencies. While welcomed by industry, experts caution that isolation alone is insufficient without layered control measures, and CISA emphasizes that adopting these capabilities enhances resilience against all disruptions, from cyber-attacks to physical events. The CI Fortify initiative was launched to bolster operational resilience across U.S. CI sectors, including water, energy, transportation, and communications. The framework prioritizes actionable steps such as developing isolation and recovery capabilities, testing manual and localized operations, and fostering collaboration with CISA to mitigate cyber threats. Acting Director Nick Andersen reinforced the urgency of implementation, framing CI Fortify as timely guidance to protect networks and critical services from threat actors aiming to degrade or disrupt infrastructure.

MuddyWater Expands Global Campaigns with New Backdoors Targeting US and Israeli Entities

Updated: 06.05.2026 16:02 · First: 22.10.2025 18:00 · 📰 11 src / 20 articles

The MuddyWater threat actor, linked to Iran’s Ministry of Intelligence and Security (MOIS) and also known as Static Kitten, Mango Sandstorm, and Seedworm, has continued to refine its global espionage campaigns by masquerading as ransomware operations to obscure state-sponsored activity. In early 2026, the group conducted an intrusion disguised as a Chaos ransomware attack, leveraging Microsoft Teams for social engineering to establish screen-sharing sessions, steal credentials, and deploy remote management tools like AnyDesk and DWAgent. The operation included extortion emails directing victims to a ransomware leak site, but no file-encrypting malware was deployed, confirming the use of ransomware-as-a-decoy tactics. The attackers deployed a custom RAT named Darkcomp (Game.exe), signed with a previously linked certificate, and dropped via a loader named *ms_upd.exe*. The backdoor features anti-analysis checks and supports 12 commands, including PowerShell execution and persistent shell access. Rapid7 researchers attribute the campaign to MuddyWater with moderate confidence, citing infrastructure overlap, code-signing certificates, and operational tradecraft. This follows a late 2025 incident where MuddyWater used Qilin ransomware for similar deception, suggesting an evolving pattern of false-flag operations to evade detection. Additionally, MuddyWater has been linked to a campaign targeting Omani government institutions, exfiltrating over 26,000 Ministry of Justice records, and pro-Iran-aligned hacktivist groups like Handala Hack have escalated activities, including leaking sensitive documents from the Port of Fujairah in the UAE. Earlier campaigns targeted over 100 organizations globally, including government entities, diplomatic missions, and telecommunications firms in the MENA region, using phishing emails with malicious Word documents to drop backdoors like Phoenix v4, MuddyViper, UDPGangster, and RustyWater. The group has also targeted Israeli sectors across academia, engineering, and local government, as well as US companies with backdoors such as Dindoor and Fakeset. The shift from PowerShell-based tools to Rust-based implants and now ransomware decoys underscores MuddyWater’s adaptability and focus on evading attribution while pursuing espionage objectives.

Webinar announcement: Improving incident response workflows to prevent network incident escalation

Updated: · First: 06.05.2026 15:56 · 📰 1 src / 1 articles

BleepingComputer will host a live webinar on June 2, 2026, at 12:00 PM ET titled \"From alert to containment: Fixing the gaps in network incident response\" featuring Edgar Ortiz from Tines. The session addresses why many network incidents escalate not due to missing alerts but because of breakdowns in incident response workflows, particularly during triage, alert enrichment, prioritization, and cross-system coordination. Organizations often rely on manual processes that delay containment and increase the risk of service disruptions when time-sensitive decisions are required.