CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 16:30 21/05/2026 UTC
  • Unauthorized access to GitHub internal repositories reported; TeamPCP claims data sale and expands malware campaign GitHub confirmed the unauthorized access to internal repositories stemmed from a trojanized Nx Console VS Code extension installed by an employee, which was live on the Visual Studio Marketplace for only eighteen minutes before removal. The extension, poisoned via a developer’s compromised system linked to the TanStack supply chain attack, executed a stealthy credential stealer targeting data from 1Password, Anthropic Claude Code, npm, GitHub, and AWS. GitHub’s Chief Information Security Officer stated there is no evidence of impact to customer data stored outside internal repositories, and the company has rotated critical secrets as part of containment. TeamPCP claimed responsibility, offering the alleged GitHub data dump for sale with a minimum price of $50,000 and threatening free release if no buyer is found. TeamPCP expanded operations by compromising the durabletask PyPI package with a Linux infostealer targeting credentials across cloud environments and forming partnerships with extortion and ransomware actors including Lapsus$ and Vect ransomware. Grafana Labs confirmed a breach was caused by a missed GitHub workflow token rotation following the TanStack npm supply-chain attack, resulting in the exfiltration of operational information such as business contact names and email addresses without compromising customer production systems. GitHub has now explicitly linked the breach vector to the TanStack npm supply-chain attack, which compromised dozens of TanStack and Mistral AI packages and leaked developer GitHub credentials via the GitHub CLI (gh), enabling the poisoning of the Nx Console extension used in the intrusion. Read
  • Shifting enterprise budget allocations for identity security in AI agent deployments A 2025–2026 Omdia study indicates identity teams are establishing dedicated budgets for securing AI agents, reflecting a significant shift from traditional IAM funding models controlled by CIO or CISO offices. As AI agents proliferate and operate autonomously across hybrid environments, securing their identities—authentication, authorization, governance, and life cycle management—has become a first-class requirement. Enterprises are allocating standalone AI budgets to fund these identity security layers, creating a new funding stream distinct from IT or security budgets. Read
  • Shift in breach vectors: unpatched vulnerabilities surpass credential theft as leading intrusion entry point in 2025 In 2025, unpatched vulnerabilities became the dominant access vector for confirmed data breaches, overtaking credential abuse for the first time in Verizon’s Data Breach Investigations Report (DBIR) series. Analysis of 31,000 security incidents (22,000+ confirmed breaches) revealed 31% of breaches stemmed from exploited unpatched flaws, while credential abuse accounted for 13%. Ransomware involvement rose to 48% of confirmed breaches, with median ransom payments dropping below $140,000. Threat actors increasingly weaponized AI to accelerate vulnerability exploitation, shrinking the defensive window from months to hours. Organizations’ median patching time increased to 43 days, with only 26% of CISA KEV catalog vulnerabilities patched in 2025. Third-party breaches surged 60%, reaching 48% of total incidents, driven by expanded attack surfaces and inadequate MFA enforcement. Gen-AI integration into attack chains and enterprise Shadow AI usage further strained defenses. Mobile-centric phishing attacks achieved a 40% higher success rate than email-based phishing in simulations. Read
  • Seizure of First VPN service operations amid widespread abuse in cybercrime investigations An international law enforcement operation dismantled the 'First VPN' service, widely abused in ransomware and data theft campaigns, after a multi-year investigation. Operations included the seizure of 33 servers across 27 countries, the arrest of a Ukrainian administrator, and the takeover of associated domains (1vpns.com, 1vpns.net, 1vpns.org, and onion variants). The platform was marketed as no-logging and privacy-focused but allegedly used by threat actors to conceal infrastructure and identities. Investigators infiltrated the service, collected traffic data, and identified thousands of users globally, sharing 506 user identities and 83 intelligence packages with international partners to support ongoing cybercrime investigations. Europol coordinated the operation with support from Bitdefender, advancing 21 investigations through the intelligence gathered. Read
  • Microsoft Defender privilege escalation and denial-of-service vulnerabilities exploited in the wild Microsoft disclosed two actively exploited zero-day vulnerabilities in Microsoft Defender: CVE-2026-41091, a local privilege escalation flaw allowing attackers to gain SYSTEM privileges via improper link resolution, and CVE-2026-45498, a denial-of-service issue impacting Defender functionality. Both flaws were patched in Microsoft Defender Antimalware Platform versions 1.1.26040.8 and 4.18.26040.7, with updates automatically applied through malware definitions and the Microsoft Malware Protection Engine. Microsoft credited five researchers for disclosing the vulnerabilities and confirmed that systems with Defender disabled remain non-exploitable. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added both CVEs to its Known Exploited Vulnerabilities catalog on May 20, 2026, with a federal patch deadline of June 3, 2026. The article also references additional vulnerabilities added to the KEV catalog, including legacy flaws (e.g., CVE-2008-4250, CVE-2009-1537) and a recently weaponized Exchange Server XSS flaw (CVE-2026-42897, CVSS 8.1). Read
  • Industry-wide escalation in deployment of known-vulnerable code amid AI-driven exploitation acceleration Three-quarters of organizations admit to frequently shipping code with known vulnerabilities, according to new data from Checkmarx published May 21, 2026. The average time from public disclosure to exploitation has collapsed from 840 days in 2018 to under two days in 2026, with Checkmarx researchers projecting a one-minute exploitation window by 2028. Vulnerability exploitation now accounts for 31% of initial access vectors in breaches, up from 20% in the previous year, per Verizon’s 2026 DBIR. Rising adversary adoption of AI tools is cited as a key driver of the trend, with median threat actors leveraging AI in up to 15 documented techniques and some using AI in 40–50 techniques. Read
  • Espionage Campaign Targeting Eastern Asia via Sogou Zhuyin Update Server Hijacking The TAOTH espionage campaign continues to target Eastern Asia via hijacked Sogou Zhuyin update servers, distributing malware families such as C6DOOR, GTELAM, DESFY, and TOSHIS to dissidents, journalists, and business leaders. The campaign, linked to infrastructure overlap with the ITOCHU threat actor, primarily impacts Taiwan (49% of targets), Cambodia, and the U.S. Additional distribution methods include phishing websites and fake cloud storage pages. Concurrently, Chinese state-aligned hackers have expanded the use of the Linux post-exploitation framework Showboat, now confirmed to operate as a SOCKS5 proxy backdoor with rootkit-like capabilities. Showboat has been deployed against telecommunications providers in the Middle East since at least mid-2022, with victims identified in Afghanistan, Azerbaijan, and possible compromises in the U.S. and Ukraine. Its modular design enables remote shell access, file transfers, and LAN device infection, often leveraging infrastructure geolocated to Chengdu, Sichuan. The malware retrieves obfuscation code from a Pastebin snippet created in January 2022, highlighting long-term development and reuse across Chinese APT groups including Calypso, which also deploys the JFMBackdoor Windows backdoor. Read
Last updated: 15:15 21/05/2026 UTC
  • OpenAI, TanStack, and Mistral AI Impacted in Escalating Mini Shai-Hulud Supply Chain Campaign The Mini Shai-Hulud supply chain campaign has escalated with a new wave of 639 compromised npm packages tied to the AntV ecosystem, including high-download dependencies such as echarts-for-react and timeago.js. The attack ran for roughly one hour on May 19, 2026, beginning at 01:56 UTC, publishing malicious versions from the compromised “atool” maintainer account that held rights for over 500 packages. Each compromised package added an obfuscated Bun bundle preinstall hook to harvest and exfiltrate credentials (cloud, CI/CD, SSH, Kubernetes, and password manager vaults) via GitHub repositories marked with Dune-themed names and the campaign's reversed signature. Earlier waves targeted TanStack and Mistral AI SDKs, SAP npm packages, and PyPI ecosystems (Lightning, intercom-client), while compromising GitHub Actions workflows ('actions-cool/issues-helper', 'actions-cool/maintain-one-comment') and hundreds of npm packages across multiple ecosystems. Affected organizations include OpenAI (two employee devices breached via TanStack), UiPath, Guardrails AI, OpenSearch, SAP, and hundreds of npm and PyPI packages. The malware harvests over 20 credential types, abuses OIDC tokens to forge Sigstore provenance attestations, implements self-propagation via stolen npm tokens, and includes a destructive sabotage payload targeting systems in Israel or Iran. The campaign is attributed to TeamPCP, which publicly released the Shai-Hulud source code, enabling rapid cloning and weaponization by other actors. Read
  • Widespread OAuth Device Code Phishing Campaign Targets Microsoft 365 via EvilTokens PhaaS Since mid-February 2026, a large-scale device code phishing campaign has targeted Microsoft 365 across at least 340 organizations in over 10 countries, escalating 37.5x in early April. The campaign abuses OAuth device authorization flows via the EvilTokens PhaaS platform and at least 10 additional phishing kits (VENOM, DOCUPOLL, SHAREFILE, etc.), granting persistent access tokens even after password resets. Attacks incorporate anti-bot evasion, multi-hop redirect chains via vendor services, and SaaS-themed lures, while mitigation focuses on disabling device code flows and monitoring anomalous authentications. Credential exposures like the Figure breach (967,200 email records) enable follow-on campaigns—credential stuffing, AI-generated phishing, and help desk social engineering—that bypass legacy MFA through real-time phishing relays and social engineering. Legacy MFA and even FIDO2 passkeys are structurally unable to prevent these attacks, which rely on human judgment at critical control points. Phishing-resistant authentication requires cryptographic origin binding, hardware-bound keys, and live biometric verification to close relay and delegation vectors. New research emphasizes how EvilTokens and similar kits exploit OAuth consent screens to trick users into granting scoped refresh tokens, bypassing MFA entirely and maintaining persistence even after password resets. The attack vector, termed consent phishing or OAuth grant abuse, operates below traditional identity controls, with refresh tokens surviving tenant policy changes unless explicitly revoked. The article also highlights the rise of 'toxic combinations'—unauthorized bridges between SaaS applications via OAuth grants—that create interconnected risk surfaces, exemplified by the 2025 Salesloft-Drift incident. Mitigation strategies now include platforms like Reco that map OAuth grants and AI agents into identity graphs, enabling continuous monitoring and token-level revocation to address these emergent attack pathways. Read
  • Upcoming webinar on automating and coordinating network incident response workflows A live webinar scheduled for June 2, 2026, will address systemic gaps in network incident response workflows that exacerbate incident escalation despite existing monitoring and security tooling. The session, titled "From alert to resolution: Fixing the gaps in network incident response," is hosted by BleepingComputer in partnership with Tines and will be presented by Edgar Ortiz, a Solutions Engineering Leader and Computer Scientist at Tines. It highlights how reliance on manual triage, alert routing, and coordination across disparate systems—rather than visibility limitations—drives incident escalation and service disruption during high-pressure scenarios. Read
  • Unsanctioned AI Tool Usage in Enterprises Over 80% of employees now use unapproved generative AI applications at work, with only 12% of companies maintaining formal AI governance policies. Shadow AI activity primarily occurs through OAuth connections to corporate data, browser extensions, and AI features embedded in pre-approved tools. This unsanctioned usage bypasses traditional security controls, creating significant governance and data exposure risks. Enterprises struggle to balance productivity with security, as employees adopt AI tools 3–5 times daily without IT oversight. The EU AI Act’s mandate for AI system visibility has intensified the need for continuous monitoring and risk assessments. Solutions like Harmonic Security’s platform enable enterprises to enforce smart governance policies based on data sensitivity, employee roles, and tool nature, addressing the operational realities highlighted by recent research. Read
  • Unauthenticated SQL Injection and Arbitrary File Read Vulnerabilities in Avada Builder WordPress Plugin Affect One Million Sites Two vulnerabilities in the Avada Builder WordPress plugin—CVE-2026-4782 (arbitrary file read) and CVE-2026-4798 (unauthenticated SQL injection)—have exposed approximately one million WordPress sites to credential theft and full site compromise. The arbitrary file read flaw allows authenticated subscribers to access sensitive server files, including wp-config.php, via the plugin’s shortcode-rendering functionality and custom_svg parameter. Access to wp-config.php can lead to full site takeover by enabling compromise of an administrator account. The unauthenticated SQL injection flaw, rated CVSS 7.5, impacts sites where WooCommerce was enabled and then deactivated, enabling attackers to extract database contents such as password hashes. The vulnerabilities were discovered by security researcher Rafie Muhammad under the Wordfence Bug Bounty Program and reported to the vendor on March 24, 2026, following submission to Wordfence on March 21. The vendor released patches in versions 3.15.2 (April 13) and 3.15.3 (May 12), with site administrators urged to update immediately. Read
  • Tycoon2FA Phishing-as-a-Service Takedown Tycoon2FA, a subscription-based phishing-as-a-service (PhaaS) platform that bypasses MFA using adversary-in-the-middle techniques, has expanded its capabilities to include device-code phishing attacks targeting Microsoft 365 accounts via OAuth 2.0 device authorization grant flows. The platform, active since August 2023, offers subscription-based access for bypassing multi-factor authentication, targeting major services like Microsoft 365 and Google. It was linked to over 64,000 phishing incidents and facilitated unauthorized access to nearly 100,000 organizations globally by mid-2025. The primary operator, identified as 'SaaadFridi' and 'Mr_Xaad,' remains at large. The platform’s infrastructure relies on adversary-in-the-middle techniques, AI-generated decoy pages, and short-lived domains to evade detection, while customers employ tactics like ATO Jumping to distribute phishing URLs. The platform was disrupted in a March 4, 2026 global takedown led by Europol’s EC3 and law enforcement from six European countries, but rapidly resumed operations within days to pre-disruption levels. Post-disruption, Tycoon2FA operators have continued to develop the kit, adding device-code phishing capabilities that abuse Trustifi click-tracking URLs and OAuth 2.0 flows. The phishing kit now includes a four-layer in-browser delivery chain, fake Microsoft CAPTCHA pages, and extensive anti-analysis protections to evade detection and analysis. Post-compromise activities include business email compromise (BEC), email thread hijacking, cloud account takeovers, and malicious SharePoint links, with old infrastructure remaining active and new domains registered quickly. Read
  • Shamos Infostealer Targeting Mac Devices via ClickFix Attacks Since June 2025, the COOKIE SPIDER group’s Shamos infostealer and Atomic macOS Stealer (AMOS) variants have targeted Mac devices via evolving ClickFix social engineering campaigns, stealing data and credentials from browsers, Keychain, Apple Notes, and cryptocurrency wallets. Early campaigns used malvertising, fake GitHub repositories, and signed Swift applications hosted on legitimate platforms, while also leveraging Terminal-based ClickFix tactics and obfuscated payloads. In March 2026, Apple introduced a Terminal security feature in macOS Tahoe 26.4 to disrupt ClickFix attack chains by blocking pasted command execution and warning users of risks. A major evolution emerged in April 2026 when Jamf researchers observed attackers abusing the built-in Script Editor application to bypass these protections using fake Apple-themed disk cleanup guides and malicious applescript:// URL scheme execution. The Script Editor-based ClickFix variation enabled theft of Keychain data, browser autofill, cryptocurrency wallet extensions, and system details without Terminal interaction, and introduced a backdoor component for persistent access. Most recently, SentinelOne has identified a new SHub macOS infostealer variant, dubbed Reaper, which further refines the Script Editor-based ClickFix attack vector. Reaper uses a fake Apple security update message displayed via the applescript:// URL scheme to launch Script Editor with a malicious AppleScript payload dynamically constructed and hidden under ASCII art. The malware bypasses Apple’s Terminal mitigations, performs device fingerprinting to evade sandboxes, and targets extensive data across browsers, wallets, password managers, iCloud, Telegram, and developer files. It includes a Filegrabber module for collecting sensitive documents and a wallet hijacking mechanism that replaces legitimate application files with malicious payloads. Reaper establishes persistence via a Google software update impersonation script registered as a LaunchAgent, enabling periodic beaconing to the C2 server and remote payload execution. Notably, the malware includes geofencing to avoid infecting Russian systems and represents an escalation in capabilities, incorporating remote access functionality to allow additional malware deployment on compromised macOS devices. Read

Latest updates

Browse →

Unpatched Chromium Service Worker persistence flaw exposed in tracker

Updated: · First: 21.05.2026 21:13 · 📰 1 src / 1 articles

A persistent Service Worker flaw in Chromium-based browsers allowed JavaScript execution to continue running in the background after browser closure, enabling remote code execution (RCE) on devices. The vulnerability was reported in December 2022 and remained unpatched despite being marked as fixed in February 2026. Google inadvertently exposed technical details in the Chromium Issue Tracker for 14 weeks, increasing the risk of exploitation. Affected browsers include Chrome, Edge, Brave, Opera, Vivaldi, and Arc.

Shifting enterprise budget allocations for identity security in AI agent deployments

Updated: · First: 21.05.2026 18:43 · 📰 1 src / 1 articles

A 2025–2026 Omdia study indicates identity teams are establishing dedicated budgets for securing AI agents, reflecting a significant shift from traditional IAM funding models controlled by CIO or CISO offices. As AI agents proliferate and operate autonomously across hybrid environments, securing their identities—authentication, authorization, governance, and life cycle management—has become a first-class requirement. Enterprises are allocating standalone AI budgets to fund these identity security layers, creating a new funding stream distinct from IT or security budgets.

Seizure of First VPN service operations amid widespread abuse in cybercrime investigations

Updated: 21.05.2026 18:30 · First: 21.05.2026 16:09 · 📰 2 src / 2 articles

An international law enforcement operation dismantled the 'First VPN' service, widely abused in ransomware and data theft campaigns, after a multi-year investigation. Operations included the seizure of 33 servers across 27 countries, the arrest of a Ukrainian administrator, and the takeover of associated domains (1vpns.com, 1vpns.net, 1vpns.org, and onion variants). The platform was marketed as no-logging and privacy-focused but allegedly used by threat actors to conceal infrastructure and identities. Investigators infiltrated the service, collected traffic data, and identified thousands of users globally, sharing 506 user identities and 83 intelligence packages with international partners to support ongoing cybercrime investigations. Europol coordinated the operation with support from Bitdefender, advancing 21 investigations through the intelligence gathered.

Apple’s App Store fraud prevention efforts block over $11B in six years with $2.2B in 2025 alone

Updated: · First: 21.05.2026 18:11 · 📰 1 src / 1 articles

Apple disclosed cumulative fraud prevention results spanning six years, including $11 billion in blocked App Store fraudulent transactions and over $2.2 billion in 2025 alone. The company reported terminating 193,000 developer accounts, rejecting 138,000 enrollments, and deactivating 40.4 million customer accounts suspected of fraud or abuse. It also blocked 5.4 million stolen credit cards and banned nearly 2 million user accounts from further transactions in 2025.

Espionage Campaign Targeting Eastern Asia via Sogou Zhuyin Update Server Hijacking

Updated: 21.05.2026 17:17 · First: 29.08.2025 16:12 · 📰 3 src / 3 articles

The TAOTH espionage campaign continues to target Eastern Asia via hijacked Sogou Zhuyin update servers, distributing malware families such as C6DOOR, GTELAM, DESFY, and TOSHIS to dissidents, journalists, and business leaders. The campaign, linked to infrastructure overlap with the ITOCHU threat actor, primarily impacts Taiwan (49% of targets), Cambodia, and the U.S. Additional distribution methods include phishing websites and fake cloud storage pages. Concurrently, Chinese state-aligned hackers have expanded the use of the Linux post-exploitation framework Showboat, now confirmed to operate as a SOCKS5 proxy backdoor with rootkit-like capabilities. Showboat has been deployed against telecommunications providers in the Middle East since at least mid-2022, with victims identified in Afghanistan, Azerbaijan, and possible compromises in the U.S. and Ukraine. Its modular design enables remote shell access, file transfers, and LAN device infection, often leveraging infrastructure geolocated to Chengdu, Sichuan. The malware retrieves obfuscation code from a Pastebin snippet created in January 2022, highlighting long-term development and reuse across Chinese APT groups including Calypso, which also deploys the JFMBackdoor Windows backdoor.

Emergence of structured Drainer-as-a-Service platforms with affiliate-driven wallet theft operations

Updated: · First: 21.05.2026 17:00 · 📰 1 src / 1 articles

Underground cybercriminal ecosystems have matured into structured Drainer-as-a-Service (DaaS) platforms, exemplified by the "Lucifer" operation, which professionalizes wallet theft through SaaS-like models including affiliate commissions, automation, and resilience measures. Victims are lured via phishing to fake crypto, NFT, airdrop, or DeFi sites where wallet connection and transaction approvals enable near-instant asset transfer across blockchains. Affiliates drive traffic while DaaS operators handle infrastructure, transaction logic, and asset draining, splitting proceeds from successful thefts. These platforms lower technical barriers for attackers, increase operational scalability, and resist takedowns through decentralized documentation and rapid reconfiguration, raising the threat level for cryptocurrency users and organizations.

Calypso APT leverages Showboat and JFMBackdoor in ongoing telecom espionage campaign

Updated: · First: 21.05.2026 17:00 · 📰 1 src / 1 articles

A Chinese state-aligned cyber-espionage campaign attributed to the Calypso APT group has been targeting telecommunications providers since at least mid-2022 using newly identified malware families Showboat (Linux) and JFMBackdoor (Windows). The operation spans organizations across the Asia-Pacific and parts of the Middle East, with attackers establishing persistence, conducting espionage, and using compromised infrastructure as pivot points for lateral movement. The campaign employs modular malware frameworks, dead-drop communication techniques, and a partially decentralized operational model to maintain long-term access and operational security.

Industry-wide escalation in deployment of known-vulnerable code amid AI-driven exploitation acceleration

Updated: · First: 21.05.2026 16:00 · 📰 1 src / 1 articles

Three-quarters of organizations admit to frequently shipping code with known vulnerabilities, according to new data from Checkmarx published May 21, 2026. The average time from public disclosure to exploitation has collapsed from 840 days in 2018 to under two days in 2026, with Checkmarx researchers projecting a one-minute exploitation window by 2028. Vulnerability exploitation now accounts for 31% of initial access vectors in breaches, up from 20% in the previous year, per Verizon’s 2026 DBIR. Rising adversary adoption of AI tools is cited as a key driver of the trend, with median threat actors leveraging AI in up to 15 documented techniques and some using AI in 40–50 techniques.

Critical REST API validation flaw in Cisco Secure Workload (CVE-2026-20223) patched

Updated: · First: 21.05.2026 15:04 · 📰 1 src / 1 articles

Cisco patched CVE-2026-20223, a critical vulnerability in Secure Workload with a CVSS score of 10.0, enabling attackers to access site resources with Site Admin privileges by sending crafted API requests to internal REST endpoints. The flaw stems from insufficient input validation and authentication in the REST API. Successful exploitation permits reading sensitive data and modifying configurations across tenant boundaries. The issue affects both SaaS and on-prem deployments of Secure Workload Cluster Software and is limited to internal REST APIs, not the web-based management interface. No exploitation in the wild has been reported.

CISA launches public nomination form for Known Exploited Vulnerabilities catalog

Updated: · First: 21.05.2026 15:00 · 📰 1 src / 1 articles

CISA introduced a public Nomination Form to streamline reporting of actively exploited vulnerabilities (KEVs) to its Known Exploited Vulnerabilities Catalog. The form enables researchers, vendors, and industry partners to submit suspected KEVs directly to CISA for validation and rapid inclusion. CISA emphasizes the role of early detection and coordinated disclosure in reducing systemic cyber risk across critical infrastructure and federal networks.

Linux OrBit Rootkit Evolution and AI-Driven Intrusions Surge in Latin America

Updated: · First: 21.05.2026 14:52 · 📰 1 src / 1 articles

Linux userland rootkit OrBit has been actively maintained and refined by its operators nearly four years after its initial discovery, with evidence of two distinct lineages—Lineage A (full-featured) and Lineage B (lite)—indicating ongoing development and deployment. The malware, attributed to Blockade Spider and linked to the Embargo ransomware campaign, employs advanced evasion techniques, persistence mechanisms, and credential harvesting. Concurrently, two AI-driven intrusion campaigns—SHADOW-AETHER-040 and SHADOW-AETHER-064—have emerged, leveraging agentic AI to conduct intrusions against governments and financial institutions in Latin America, bypassing AI safety controls by framing activities as authorized penetration testing. These developments highlight the convergence of sophisticated rootkit technology and AI-enabled intrusion operations, underscoring the evolving threat landscape for both Linux environments and cloud-based infrastructures.

Flipper One open Linux platform development seeks community collaboration for ARM-based hardware experimentation device

Updated: · First: 21.05.2026 14:00 · 📰 1 src / 1 articles

Flipper Devices initiates an open community-driven project to develop Flipper One, a high-performance ARM-based Linux platform for networking, hardware experimentation, and SDR analysis. The device features a Rockchip RK3576 ARM SoC with 8 GB RAM and an RP2350 microcontroller in a dual-processor design, enabling operation even when the OS is powered off. Flipper One is modular, supporting M.2, GPIO, PCIe, USB 3.1, SATA, and wireless interfaces for SDR, storage, AI accelerators, and satellite connectivity. Targeted use cases include router/VPN gateway, survival desktop, media box, and HDMI-enabled device, though the project remains in active development with unresolved software and hardware challenges.

Microsoft Defender privilege escalation and denial-of-service vulnerabilities exploited in the wild

Updated: 21.05.2026 13:55 · First: 21.05.2026 12:52 · 📰 2 src / 2 articles

Microsoft disclosed two actively exploited zero-day vulnerabilities in Microsoft Defender: CVE-2026-41091, a local privilege escalation flaw allowing attackers to gain SYSTEM privileges via improper link resolution, and CVE-2026-45498, a denial-of-service issue impacting Defender functionality. Both flaws were patched in Microsoft Defender Antimalware Platform versions 1.1.26040.8 and 4.18.26040.7, with updates automatically applied through malware definitions and the Microsoft Malware Protection Engine. Microsoft credited five researchers for disclosing the vulnerabilities and confirmed that systems with Defender disabled remain non-exploitable. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added both CVEs to its Known Exploited Vulnerabilities catalog on May 20, 2026, with a federal patch deadline of June 3, 2026. The article also references additional vulnerabilities added to the KEV catalog, including legacy flaws (e.g., CVE-2008-4250, CVE-2009-1537) and a recently weaponized Exchange Server XSS flaw (CVE-2026-42897, CVSS 8.1).

Identity-based attack paths in hybrid environments pose systemic risk due to unchecked permissions and cached credentials

Updated: · First: 21.05.2026 13:30 · 📰 1 src / 1 articles

A single cached AWS access key on a Windows endpoint, obtainable by a low-privilege attacker, could grant access to 98% of an organization’s cloud workloads despite no policy violations or misconfigurations. Identity permissions—spanning Active Directory, cloud IAM, service accounts, machine identities, and AI agents—now function as internal highways for attackers once initial footholds are achieved. Analysis by Palo Alto indicates identity weaknesses were involved in nearly 90% of 2025 incident response engagements, with SpyCloud’s 2026 Identity Exposure Report highlighting a 33% rise in non-human identity theft, including AI tooling-related credentials. Overprivileged roles, unrevoked group memberships, and long-lived developer SSO roles form chained attack paths from low-level access to production admin privileges. Current identity security tools (IGA, PAM) operate in isolation and fail to detect multi-environment identity chains, with IBM X-Force reporting that 32% of 2026 incidents began with stolen or misused credentials. Over 90% of breaches investigated by Palo Alto in 2025 were enabled by preventable identity exposures that existing tools missed.

Microsoft Defender privilege escalation and DoS vulnerabilities exploited in attacks

Updated: · First: 21.05.2026 10:49 · 📰 1 src / 1 articles

Microsoft disclosed and patched two zero-day vulnerabilities in Windows Defender components that are being actively exploited in the wild. CVE-2026-41091 is a privilege escalation flaw in the Microsoft Malware Protection Engine affecting versions 1.1.26030.3008 and earlier, enabling attackers to gain SYSTEM privileges via improper link resolution (link following). CVE-2026-45498 is a denial-of-service (DoS) vulnerability in the Defender Antimalware Platform versions 4.18.26030.3011 and earlier, allowing threat actors to trigger DoS states on unpatched Windows devices. The flaws impact Windows Defender Antimalware Platform, System Center Endpoint Protection, and related security tools. Microsoft released updated engine versions 1.1.26040.8 and 4.18.26040.7 to remediate the issues, with automatic updates enabled by default in most configurations. CISA added both vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog and mandated Federal Civilian Executive Branch (FCEB) agencies to patch within two weeks under BOD 22-01.

Privilege escalation vulnerability in Linux kernel __ptrace_may_access() disclosed after nine years

Updated: · First: 21.05.2026 10:35 · 📰 1 src / 1 articles

A nine-year-old privilege escalation vulnerability in the Linux kernel, tracked as CVE-2026-46333 (CVSS 5.5), has been publicly disclosed. The flaw stems from improper privilege management in the kernel’s __ptrace_may_access() function, enabling unprivileged local users to execute arbitrary commands as root or disclose sensitive files such as /etc/shadow and SSH host keys on default installations of major distributions including Debian, Fedora, and Ubuntu. Exploitation can occur through four distinct attack vectors targeting chage, ssh-keysign, pkexec, and accounts-daemon, providing reliable local root access. A proof-of-concept exploit has been released alongside kernel fixes, and workarounds include raising kernel.yama.ptrace_scope to 2.

Unauthorized access to GitHub internal repositories reported; TeamPCP claims data sale and expands malware campaign

Updated: 21.05.2026 09:54 · First: 20.05.2026 07:01 · 📰 7 src / 7 articles

GitHub confirmed the unauthorized access to internal repositories stemmed from a trojanized Nx Console VS Code extension installed by an employee, which was live on the Visual Studio Marketplace for only eighteen minutes before removal. The extension, poisoned via a developer’s compromised system linked to the TanStack supply chain attack, executed a stealthy credential stealer targeting data from 1Password, Anthropic Claude Code, npm, GitHub, and AWS. GitHub’s Chief Information Security Officer stated there is no evidence of impact to customer data stored outside internal repositories, and the company has rotated critical secrets as part of containment. TeamPCP claimed responsibility, offering the alleged GitHub data dump for sale with a minimum price of $50,000 and threatening free release if no buyer is found. TeamPCP expanded operations by compromising the durabletask PyPI package with a Linux infostealer targeting credentials across cloud environments and forming partnerships with extortion and ransomware actors including Lapsus$ and Vect ransomware. Grafana Labs confirmed a breach was caused by a missed GitHub workflow token rotation following the TanStack npm supply-chain attack, resulting in the exfiltration of operational information such as business contact names and email addresses without compromising customer production systems. GitHub has now explicitly linked the breach vector to the TanStack npm supply-chain attack, which compromised dozens of TanStack and Mistral AI packages and leaked developer GitHub credentials via the GitHub CLI (gh), enabling the poisoning of the Nx Console extension used in the intrusion.

PostgreSQL-targeting SQL injection in Drupal Core enables remote code execution

Updated: · First: 21.05.2026 06:44 · 📰 1 src / 1 articles

A highly critical SQL injection vulnerability in Drupal Core's database abstraction API can grant unauthenticated attackers remote code execution, privilege escalation, or information disclosure on Drupal sites using PostgreSQL. The flaw, tracked as CVE-2026-9082 with a CVSS score of 6.5, allows arbitrary SQL execution via crafted requests sent to PostgreSQL-backed Drupal installations. Exploitation does not require authentication, affecting only PostgreSQL sites. The issue spans multiple supported Drupal versions and has prompted urgent patching for active branches and manual fixes for end-of-life releases.

Infostealer operation attributed to 18-year-old threat actor linked to 28,000 compromised accounts

Updated: · First: 21.05.2026 00:36 · 📰 1 src / 1 articles

An 18-year-old individual from Odesa, Ukraine, has been identified by national cyberpolice and U.S. law enforcement as the operator of an infostealer malware campaign conducted between 2024 and 2025. The threat actor targeted users of a California-based online store, infecting devices to harvest browser sessions, credentials, and payment data. Stolen session tokens allowed bypass of multi-factor authentication in some cases, enabling account takeover. The operation resulted in the compromise of 28,000 customer accounts, with 5,800 exploited for unauthorized purchases totaling approximately $721,000. Direct financial losses, including chargebacks, amounted to $250,000.

In-the-wild exploitation of SonicWall Gen6 SSL-VPN MFA bypass via CVE-2024-12802

Updated: · First: 21.05.2026 00:19 · 📰 1 src / 1 articles

Threat actors exploited CVE-2024-12802 to bypass multi-factor authentication (MFA) on SonicWall Gen6 SSL-VPN appliances, enabling initial access for ransomware operations. Attackers brute-forced VPN credentials and authenticated directly via the UPN login format, bypassing MFA enforcement that appeared active in logs. Intrusions occurred between February and March 2026, with attackers taking 30–60 minutes to gain access, conduct reconnaissance, and test credential reuse. The vulnerability required both firmware updates and manual LDAP server reconfiguration to fully mitigate; incomplete mitigation left devices vulnerable. Gen6 devices are end-of-life as of April 16, 2026, and no longer receive security updates.

Microsoft releases RAMPART and Clarity frameworks to harden AI agent development lifecycle

Updated: · First: 20.05.2026 20:06 · 📰 1 src / 1 articles

Microsoft released two open-source tools, RAMPART and Clarity, to integrate security testing and design validation directly into the AI agent development process. RAMPART is a Pytest-native framework for writing and executing safety and security tests against AI agents, addressing adversarial and benign issues including cross-prompt injections and data exfiltration risks. Clarity serves as an "AI thinking partner" to help developers clarify design intent, explore failure modes, and track decisions before code is written. Together, the tools aim to shift AI safety from post-build review to a continuous, lifecycle-integrated practice by making assumptions testable and incidents reproducible.

Remote code execution flaw in Universal Robots PolyScope 5 Dashboard Server enables unauthenticated takeover of collaborative robots

Updated: · First: 20.05.2026 19:12 · 📰 1 src / 1 articles

A critical command injection vulnerability (CVE-2026-8153) in Universal Robots PolyScope 5 Dashboard Server allows unauthenticated attackers with network access to execute arbitrary commands on the robot’s Linux-based controller, achieving remote code execution (RCE) and full administrative control. The flaw resides in improper input neutralization within the Dashboard Server interface, enabling attackers to manipulate OT environments where collaborative robots (cobots) are deployed across manufacturing, logistics, automotive, healthcare, and other industrial sectors. Exploitation risks sabotage of manufacturing workflows, production shutdowns, ransomware deployment, data destruction, and manipulation of robotic precision and calibration. Safety hazards include disabling safeguards, altering programmed movements, or interrupting safety logic, potentially endangering human operators and causing physical harm or environmental incidents. CVE-2026-8153 carries a CVSS 3.1 base score of 9.8 and requires the Dashboard Server to be enabled and reachable via its network port; direct internet exposure is not typical due to standard OT network segmentation practices.

Quantum Bridge secures $8M Series A for Distributed Symmetric Key Establishment protocol deployment

Updated: · First: 20.05.2026 18:45 · 📰 1 src / 1 articles

Quantum Bridge, a Toronto-based cybersecurity firm specializing in quantum-safe cryptography, announced $8 million in Series A funding, bringing total investment to $16 million. The company’s Distributed Symmetric Key Establishment (DSKE) protocol automates symmetric key creation and distribution using pre-shared random data and secret-sharing across Security Hubs, ensuring no single hub holds the complete key. This architecture mitigates both classical and quantum computing threats. Quantum Bridge’s Symmetric-Key Distribution System (SDS) combines DSKE with post-quantum cryptography (PQC) and quantum key distribution (QKD) into a crypto-agile platform deployable on existing network infrastructure via Ansible-based automation.

Large-scale Android carrier-billing fraud campaign leveraging fake apps and hidden WebView automation

Updated: · First: 20.05.2026 18:30 · 📰 1 src / 1 articles

A 10-month Android malware campaign used nearly 250 counterfeit apps to enroll victims in premium services via carrier billing, targeting users in Malaysia, Thailand, Romania and Croatia. The operation, codenamed Premium Deception by Zimperium zLabs, ran from March 2025 to mid-January 2026 and maintained portions of its infrastructure online at the time of disclosure. Malware variants automated end-to-end subscription enrollment by exploiting legitimate Android APIs, hidden WebViews and operator-specific billing portals to bypass user interaction and detection.

OpenAI, TanStack, and Mistral AI Impacted in Escalating Mini Shai-Hulud Supply Chain Campaign

Updated: 20.05.2026 18:00 · First: 29.04.2026 19:26 · 📰 15 src / 23 articles

The Mini Shai-Hulud supply chain campaign has escalated with a new wave of 639 compromised npm packages tied to the AntV ecosystem, including high-download dependencies such as echarts-for-react and timeago.js. The attack ran for roughly one hour on May 19, 2026, beginning at 01:56 UTC, publishing malicious versions from the compromised “atool” maintainer account that held rights for over 500 packages. Each compromised package added an obfuscated Bun bundle preinstall hook to harvest and exfiltrate credentials (cloud, CI/CD, SSH, Kubernetes, and password manager vaults) via GitHub repositories marked with Dune-themed names and the campaign's reversed signature. Earlier waves targeted TanStack and Mistral AI SDKs, SAP npm packages, and PyPI ecosystems (Lightning, intercom-client), while compromising GitHub Actions workflows ('actions-cool/issues-helper', 'actions-cool/maintain-one-comment') and hundreds of npm packages across multiple ecosystems. Affected organizations include OpenAI (two employee devices breached via TanStack), UiPath, Guardrails AI, OpenSearch, SAP, and hundreds of npm and PyPI packages. The malware harvests over 20 credential types, abuses OIDC tokens to forge Sigstore provenance attestations, implements self-propagation via stolen npm tokens, and includes a destructive sabotage payload targeting systems in Israel or Iran. The campaign is attributed to TeamPCP, which publicly released the Shai-Hulud source code, enabling rapid cloning and weaponization by other actors.

Microsoft-disrupted Fox Tempest’s malware-signing-as-a-service infrastructure

Updated: 20.05.2026 17:36 · First: 19.05.2026 18:00 · 📰 2 src / 2 articles

Microsoft’s Digital Crimes Unit (DCU), in collaboration with the FBI and Europol’s EC3, has disrupted Fox Tempest’s malware-signing-as-a-service (MSaaS) infrastructure that provided fraudulent code-signing certificates for ransomware and malware operations. The takedown involved legal action in the US District Court for the Southern District of New York, sinkholing malicious domains, disabling hundreds of virtual machines on Cloudzy, and suspending roughly 1,000 accounts. Fox Tempest’s MSaaS platform abused Microsoft’s Artifact Signing to issue short-lived certificates valid for 72 hours, sold at tiered pricing from $5,000 to $9,000. The group collaborated with multiple ransomware operations, including Rhysida (Vanilla Tempest), Storm-2501, Storm-0249, INC, Qilin, BlackByte, and Akira, with attacks targeting critical sectors across the U.S., France, India, and China. The service evolved in February 2026 to offer pre-configured Cloudzy VMs, streamlining malicious binary signing and distribution. Microsoft’s operation, codenamed OpFauxSign, includes ongoing efforts to identify and pursue the group’s operators through undercover engagements and legal mechanisms.

Evolving Zero Trust: Continuous Device Verification Required to Combat Credential and Session Token Theft

Updated: · First: 20.05.2026 17:02 · 📰 1 src / 1 articles

A growing body of evidence indicates that identity-centric security architectures are insufficient against increasingly sophisticated cyber threats, particularly when attackers weaponize AI-enhanced phishing kits and session hijacking. Multi-factor authentication (MFA) alone is being bypassed via real-time adversary-in-the-middle (AiTM) phishing, allowing attackers to proxy authentication and steal session tokens post-authentication. As organizations adopt SaaS, BYOD, and hybrid work models, a valid credential no longer guarantees a safe connection without ongoing validation of device security posture. Zero Trust frameworks, especially NIST SP 800-207, emphasize that access decisions must be dynamic and include continuous verification of both user identity and device health throughout the session lifecycle. Historically, identity verification was treated as a one-time event, creating a persistent blind spot where session tokens remain valid even on compromised or unmanaged endpoints. Many Zero Trust deployments have become overly identity-focused, with device posture checks inconsistently applied, limited to modern browser workflows, or absent for legacy protocols, remote access tools, and API integrations. This fragmentation enables attackers to maintain persistence using stolen credentials or intercepted tokens on unmanaged or non-compliant devices.

Drupal core vulnerability disclosure with imminent exploitation risk prompts urgent updates across multiple versions

Updated: · First: 20.05.2026 15:52 · 📰 1 src / 1 articles

Drupal announced an imminent critical security update for core versions 8 and later, with exploitation expected within hours of public disclosure. Administrators are advised to prioritize updates between 17:00–21:00 UTC on May 20, 2026, migrating to supported versions where possible. Non-supported versions (Drupal 8, 9, 11.1x, 10.4x) receive last-minute hotfixes due to severity, while supported versions (10.6.x, 11.3.x) are strongly recommended. No technical details are available yet, and misleading claims online are cautioned against.

China-nexus Webworm expands toolset with EchoCreep and GraphWorm backdoors leveraging Discord and Microsoft Graph API for C2

Updated: · First: 20.05.2026 15:51 · 📰 1 src / 1 articles

A China-aligned threat actor tracked as Webworm has deployed two new custom backdoors, EchoCreep and GraphWorm, using Discord and Microsoft Graph API respectively for command-and-control (C2) communications during 2025 activities. The group, active since at least 2022 and previously associated with RATs such as Trochilus, Gh0st, and 9002, has shifted toward stealthier (semi-)legitimate utilities including SOCKS proxies and custom proxy tools like WormFrp, ChainWorm, SmuxProxy, and WormSocket. Targeting spans government agencies and enterprises in Russia, Georgia, Mongolia, European countries including Belgium, Italy, Serbia, and Poland, and a university in South Africa, often blending operations using SoftEther VPN and GitHub-hosted malware staging. Initial access vectors remain unclear though brute-forcing of web server files and directories using open-source tools like dirsearch and nuclei has been observed.

Surge in unmanaged identity exposures complicates Agent AI adoption across enterprises

Updated: · First: 20.05.2026 14:58 · 📰 1 src / 1 articles

Analysis of the Orchid Security Identity Gap: Snapshot 2026 released on May 19, 2026 reveals a critical imbalance in enterprise identity management landscapes. Visible identity elements constitute only 43% of total identities while 'identity dark matter'—unmanaged or invisible identities—now accounts for 57%, highlighting systemic gaps in IAM practices. This imbalance coincides with widespread enterprise adoption of Agent AI systems, which, by design, seek shortcuts to complete assigned tasks, often exploiting unmanaged credentials, excessive permissions, or orphan accounts to bypass intended access controls. The lack of intrinsic ethical or control mechanisms in AI agents amplifies the risk of unauthorized access or lateral movement, underscoring the need for robust identity governance as a prerequisite for safe Agent AI integration.