CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 08:30 05/05/2026 UTC
  • Unauthenticated remote code execution in Weaver E-cology exploited prior to public disclosure Since mid-March 2026, attackers have exploited an unauthenticated remote code execution vulnerability (CVE-2026-22679) in Weaver E-cology, an enterprise office automation platform widely used by Chinese organizations. The flaw exists in versions prior to March 12 and stems from an exposed, unauthenticated debug API endpoint that improperly processes user-supplied parameters, allowing arbitrary system command execution via crafted RPC inputs. Exploitation began five days after the vendor released a security update and two weeks before public disclosure, with the threat actors conducting multi-stage operations focused on reconnaissance and lateral movement prior to detection. No persistent access was established on compromised hosts despite successful exploitation attempts. Read
  • Unauthenticated RCE in Weaver E-cology via Debug API Endpoint (CVE-2026-22679) Actively Exploited in the Wild An unauthenticated remote code execution (RCE) vulnerability (CVE-2026-22679, CVSS 9.8) in Weaver E-cology 10.0 prior to 20260312 is being actively exploited. The flaw exists in the debug API endpoint `/papi/esearch/data/devops/dubboApi/debug/method`, enabling attackers to execute arbitrary commands via crafted POST requests with malicious `interfaceName` and `methodName` parameters. Exploitation activity was first observed by the Shadowserver Foundation on March 31, 2026, with evidence dating back to March 17, 2026—five days after patches were released. The threat actor demonstrated operational sophistication, including failed payload deployments, discovery commands (e.g., `whoami`, `ipconfig`, `tasklist`), and attempts to retrieve PowerShell payloads from attacker-controlled infrastructure. Read
  • Structured loan fraud methodology targeting small to mid-sized credit unions via synthetic identity abuse A documented underground fraud methodology is being actively shared by threat actors to exploit gaps in identity verification and loan approval workflows at small to mid-sized credit unions. The approach bypasses technical vulnerabilities by navigating legitimate lending processes using stolen or synthetic identities and predictable knowledge-based authentication (KBA) responses reconstructed from public and leaked data. Target selection favors institutions perceived as having weaker fraud controls or manual review processes. Funds are rapidly moved through intermediaries and withdrawn to monetize the fraud while appearing as normal customer activity. Read
  • Silver Fox APT expands ABCDoor backdoor operations with RustSL loader and tax-themed phishing targeting India, Russia, and additional regions Silver Fox continues tax-themed phishing operations targeting Indian and Russian organizations, with a newly detailed payload set that includes the ABCDoor backdoor and refined persistence and command-and-control techniques. The campaign began in December 2025 with emails impersonating Indian tax authorities, expanding in January 2026 to target Russian entities using identical tax-audit lures. Kaspersky observed over 1,600 malicious emails across industrial, consulting, retail, and transportation sectors between January and February 2026. Payloads delivered via RustSL loaders include the ValleyRAT backdoor and the previously undocumented ABCDoor Python-based backdoor, which has been active in real-world attacks since Q1 2025. ABCDoor leverages Windows Registry Run keys and scheduled tasks for persistence, communicates over HTTPS using Socket.IO, and supports covert remote control features such as multi-monitor screen streaming and clipboard theft. The backdoor also supports self-updating, self-removal, and extensive host metadata collection, leaving detectable forensic artifacts in the registry and %LOCALAPPDATA%. The campaign’s geographic scope continues to expand, with RustSL configurations now including Japan alongside India, Russia, Indonesia, South Africa, and Cambodia. Silver Fox’s targeting now spans China, Taiwan, Japan, India, Russia, Indonesia, South Africa, and Cambodia, reflecting a broadening operational footprint beyond its historical focus. Read
  • Large-scale AiTM phishing campaign abuses code-of-conduct lures and CAPTCHA gates to harvest credentials A credential theft campaign spanning April 14–16, 2026, leveraged polished code-of-conduct-themed HTML phishing emails to trick recipients into visiting attacker-controlled domains and surrendering authentication tokens. The operation targeted more than 35,000 users across 13,000 organizations in 26 countries, with 92% of targets in the U.S. The emails impersonated internal communications about conduct reviews, incorporating fake authenticity statements, urgency cues, and PDF attachments pointing to CAPTCHA-gated phishing pages. Victims were ultimately routed through adversary-in-the-middle (AiTM) phishing infrastructure to harvest Microsoft credentials and session tokens in real time, effectively bypassing multi-factor authentication (MFA). The final landing experience varied based on whether the flow originated from mobile or desktop environments. Read
  • Establishment of Dark Reading in 2006 as a dedicated cybersecurity publication In early 2006, Steve Saunders, founder of Light Reading, acquired the domain darkreading.com with the intent to launch a dedicated cybersecurity news platform by early May. The initiative sought to address a gap in B2B media, where few security-focused publications existed independent of print counterparts. Initial coverage targeted contemporary threats such as spam-based malware, denial-of-service attacks, and the emerging TJX data breach (46 million records exposed), reflecting the evolving threat landscape of the mid-2000s. The launch underscored the growing complexity of cybersecurity, including the rise of SOCs, alert fatigue, and the uncertainty around firewall replacements, as organizations navigated increasingly diverse attacker types and attack vectors. Read
  • Critical cPanel authentication bypass (CVE-2026-41940) under active mass exploitation A critical authentication bypass vulnerability in cPanel, WHM, and WP Squared products (CVE-2026-41940, CVSS 9.8) is being actively exploited at scale within 24 hours of public disclosure and patch release, granting attackers administrative access to tens of thousands of internet-facing servers and millions of hosted websites. Exploitation began shortly after April 28 vendor patch and April 29 CVE assignment, with known in-the-wild activity predating disclosure. Observed attacks include Mirai botnet recruitment, ransomware deployment (files encrypted with ".sorry" extension), and multi-stage operations achieving full server takeover in minutes without requiring credentials or defeating 2FA. Scans indicate approximately 15,000 compromised instances within the first day, with ongoing exploit attempts numbering in the thousands across diverse geographies and ASNs. The flaw targets the cPanel/WHM management plane typically exposed on TCP/2087, affecting all supported versions and powering roughly 70 million domains. Read
Last updated: 07:30 05/05/2026 UTC
  • Unchecked AI Agent Deployments Drive Widespread Cybersecurity Incidents Across Enterprises A real-world incident demonstrates the catastrophic potential of unchecked AI agent deployments: an AI coding agent deleted a production database and all backups in nine seconds, causing immediate operational disruption for car rental companies. Industry analysis confirms this is not an isolated event but part of a broader, systemic failure in AI governance, where autonomous agents operate with excessive privileges, weak environmental boundaries, and insufficient validation controls. Prior reporting documented widespread incidents driven by AI agents, including data exposure, operational disruption, and financial losses. Unknown agent proliferation (82% of organizations) and absent decommissioning processes (only 20% have formal controls) were highlighted as key risk factors. Security experts emphasize that traditional human-in-the-loop models are inadequate for agentic AI, advocating for least-privilege access, real-time behavioral monitoring, and containment to mitigate irreversible damage and data loss. Read
  • TruffleNet Attack Campaign Targeting AWS Environments The TruffleNet attack campaign, initially documented in late 2025, continues to evolve with observed phishing campaigns leveraging Amazon SES to bypass security controls and execute business email compromise (BEC) attacks. Researchers report a surge in SES abuse tied to exposed AWS credentials in public repositories, enabling automated credential scanning via TruffleHog and large-scale phishing campaigns. Attackers craft convincing phishing emails with custom HTML templates and fabricated email threads to deceive victims, including fake DocuSign notifications and invoice scams targeting finance departments. Read
  • TeamPCP escalates CanisterWorm campaign with geopolitical targeting and multi-vector attacks TeamPCP has escalated its multi-vector CanisterWorm campaign into a geopolitically targeted operation, now confirmed to have leveraged the Trivy supply-chain attack as an access vector for the Checkmarx compromise. The group compromised PyPI packages (LiteLLM versions 1.82.7–1.82.8 and Telnyx versions 4.87.1–4.87.2) and Checkmarx KICS tooling to deliver credential-stealing malware, harvesting SSH keys, cloud credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, TLS/SSL private keys, and bash history files. Checkmarx has publicly confirmed that the LAPSUS$ threat group leaked data stolen from its private GitHub repository, with access facilitated by the Trivy compromise attributed to TeamPCP. The leaked data, published on both dark web and clearnet portals, did not contain customer information, and Checkmarx has blocked access to the affected repository pending forensic investigation. The campaign’s scope expanded from initial npm package compromises to include GitHub repository hijacking (e.g., Aqua Security), Docker Hub compromise, and CI/CD pipeline targeting, while destructive payloads in Iranian Kubernetes environments highlight TeamPCP’s geopolitical alignment. Read
  • Sustained 63% annual increase in cyber-attacks against global education sector over 2023–2025 Between November 2023 and October 2025, cyber-attacks on schools and universities worldwide rose 63% year-over-year, driven by geopolitical tensions, ransomware, and hacktivism. Data breaches increased 73%, hacktivist activity 75%, and ransomware incidents 21% across 67 countries. Research-intensive institutions face targeted theft of AI, quantum, and advanced materials data, while hacktivist campaigns—including Iranian-affiliated actors—conduct DDoS, defacement, and data-leak operations. New data from the UK Cyber Security Breaches Survey 2025/2026 reveals a dramatic surge in cyber breaches among British educational institutions. In 2025/2026, 98% of higher education institutions reported breaches (up from 91%), 88% of further education colleges (up 3%), 73% of secondary schools (up 13%), and 4% of primary schools. The survey highlights phishing as the most prevalent threat, with severe consequences such as revenue loss reported by 5% of businesses. Amid stable national threat levels, small businesses regressed in cyber hygiene, and Cyber Essentials adoption stalled at 5%. Read
  • Self-propagating North Korean job-scam malware spreads via compromised developer projects in software supply chain A North Korean state-aligned actor has transformed fake job recruitment scams into a self-propagating supply-chain attack dubbed "Contagious Interview" that infects developer workstations and propagates via compromised repositories. Void Dokkaebi (aka Famous Chollima) abuses legitimate development workflows by luring developers with fake interviews, then delivering malware via malicious VS Code tasks or hidden payloads in fonts/images. Once committed to Git repositories, the infection spreads to downstream contributors, creating a worm-like chain reaction. Developers’ credentials, crypto wallets, CI/CD pipelines, and production infrastructure are primary targets. Newly identified activity connected to the same actor’s PromptMink campaign targets cryptocurrency developers via malicious npm packages, including @validate-sdk/v2, co-authored by an AI coding assistant. The layered package strategy uses legitimate-looking tools to hide malicious payloads, with payloads evolving from credential theft to broader data exfiltration, persistence mechanisms, and cross-platform binaries. Over 60 packages and 300+ versions have been identified across seven months, with evidence of LLM integration in malware development. Read
  • Rockstar Games analytics data exfiltrated via third-party Snowflake compromise linked to Anodot breach The extortion group ShinyHunters has expanded its campaign tied to the Anodot breach, claiming unauthorized access to Vimeo’s systems and threatening to leak data unless a ransom is paid. The attack leverages authentication tokens stolen from Anodot to compromise downstream victims, including Vimeo and Rockstar Games. Vimeo confirmed that exposed data included email addresses, technical data, video titles, and metadata, but excluded video content, credentials, and payment information. Operations remained unaffected, and Vimeo disabled Anodot integration and launched an investigation with law enforcement. Rockstar Games previously acknowledged a limited breach linked to the same third-party incident, with ShinyHunters leaking approximately 78.6 million records of internal analytics data. The compromised datasets included in-game revenue metrics, player behavior tracking, and Zendesk support analytics, with Rockstar asserting no operational impact. Read
  • Robinhood account creation process exploited to deliver phishing emails via email injection Threat actors abused a flaw in Robinhood’s account creation onboarding process to inject arbitrary HTML into legitimate registration emails, enabling the delivery of convincing phishing messages. Starting April 26, 2026, Robinhood customers received emails from [email protected] with a subject line ‘Your recent login to Robinhood’ warning of an ‘Unrecognized Device Linked to Your Account’. The emails included fake IP addresses, partial phone numbers, and a ‘Review Activity Now’ button that led to a phishing domain. The attack leveraged improperly sanitized device metadata fields during account registration to embed HTML into the Device: field of confirmation emails, creating a fake alert within otherwise legitimate messages. Attackers exploited Gmail’s dot aliasing feature to register accounts using variations of real email addresses, which Robinhood treated as distinct accounts while Gmail directed emails to the intended recipient. Robinhood has confirmed the incident was not a breach and has remediated the flaw by removing the Device: field from account creation emails. Read

Latest updates

Browse →

Karakurt extortion negotiator Deniss Zolotarjovs sentenced to 8.5 years in U.S. prison

Updated: · First: 05.05.2026 13:13 · 📰 1 src / 1 articles

Deniss Zolotarjovs, a Latvian national extradited to the U.S., was sentenced to 8.5 years in prison for his role as a "cold case" negotiator within the Russian Karakurt extortion group. Zolotarjovs orchestrated extortion efforts against U.S. organizations, including a government entity whose 911 system was disrupted, and leveraged stolen personal and health data to coerce ransom payments. His activities contributed to an estimated $56+ million in losses across 54 victim companies, with ransom payments totaling $13+ million from an additional 41 victims.

CloudZ RAT leverages Microsoft Phone Link to intercept SMS and OTPs via Pheno plugin

Updated: · First: 05.05.2026 13:03 · 📰 1 src / 1 articles

A newly identified CloudZ remote access trojan (RAT) variant deploys a malicious plugin named Pheno that exploits Microsoft Phone Link on Windows 10/11 systems to intercept SMS messages and one-time passwords (OTPs) from paired Android or iOS devices without requiring direct compromise of the mobile endpoint. The intrusion has been active since at least January 2026 and is designed to harvest credentials and temporary authentication codes delivered via SMS or authenticator app notifications. The attack abuses Microsoft Phone Link’s local SQLite database and session monitoring to exfiltrate sensitive data via the compromised Windows host.

Anticipated AI-driven surge in software patching prompts operational readiness calls

Updated: · First: 05.05.2026 12:40 · 📰 1 src / 1 articles

The UK National Cyber Security Centre (NCSC) has warned organizations of an imminent “patch wave” driven by AI-powered vulnerability discovery tools, potentially forcing rapid remediation of long-standing technical debt across software supply chains. Vendors are actively using restricted AI systems (e.g., Anthropic’s Mythos Preview, OpenAI’s GPT-5.4) to identify and remediate vulnerabilities in proprietary and open-source software, with disclosure and patching expected to surge once access is broadened. Threat actors are also anticipated to leverage similar capabilities, increasing exploitation pressure. Impact is expected to strain patch management processes, especially for perimeter, cloud, and on-premises systems, with knock-on effects for critical infrastructure. The NCSC emphasizes prioritizing external attack surfaces, enabling automation, and replacing end-of-life systems where patches are unavailable.

Critical unauthenticated RCE flaws in MetInfo and Weaver E-cology exploited in the wild

Updated: · First: 05.05.2026 12:27 · 📰 1 src / 1 articles

Threat actors have begun exploiting two critical unauthenticated remote code execution (RCE) vulnerabilities in widely deployed enterprise software: MetInfo CMS and Weaver E-cology. The flaw in MetInfo, tracked as CVE-2026-29014 (CVSS 9.8), stems from improper neutralization of user-supplied input, enabling unauthenticated attackers to inject arbitrary PHP code via crafted requests and achieve full server compromise. Exploitation activity escalated rapidly over the weekend following initial automated probing, with a focus on exposed MetInfo instances primarily located in Singapore. Approximately 2,000 internet-facing instances have been identified, predominantly in China. A separate RCE vulnerability in Weaver E-cology (CVE-2026-22679, CVSS 9.3) involves abuse of exposed debug functionality reachable via crafted POST requests, allowing attackers to execute arbitrary system commands without authentication. Patches were released March 12; exploitation attempts were observed within a week and continue to leverage the debug endpoint as a stateless command shell, with attackers using ping callbacks and concurrent payload delivery.

ScarCruft (APT37) Expands Tactics with Ruby Jumper Campaign Targeting Air-Gapped Networks

Updated: 05.05.2026 12:07 · First: 14.08.2025 03:00 · 📰 25 src / 28 articles

The **ScarCruft (APT37) Ruby Jumper campaign** and its broader espionage operations continue to evolve, with the group now deploying an **Android variant of the BirdCall backdoor** via a **supply-chain attack on sqgame[.]net**, a Chinese gaming platform frequented by Koreans in the **Yanbian region**—a known transit hub for North Korean defectors. This marks ScarCruft’s first documented use of **mobile malware in a supply-chain context**, expanding its targeting beyond Windows systems to include **Android devices used by high-risk populations**. The Android BirdCall variant collects **geolocation data, contact lists, SMS/call logs, device metadata, and files of interest** (e.g., documents, audio recordings, certificates), while also **recording ambient audio during evening hours** (7 pm–10 pm local time) and using **anti-suspension techniques** (e.g., silent MP3 loops) to evade detection. The malware leverages **pCloud, Yandex Disk, and Zoho WorkDrive** for C2, aligning with the group’s broader abuse of legitimate cloud services. Earlier campaigns, such as **Ruby Jumper (December 2025–February 2026)**, demonstrated ScarCruft’s focus on **air-gapped network breaches** via **USB-based implants (THUMBSBD, VIRUSTASK)** and **cloud-abused C2 (Zoho WorkDrive)**, alongside **multi-stage infection chains** combining LNK files, PowerShell scripts, and Ruby runtime manipulation. The **supply-chain compromise of sqgame[.]net**—first observed in **late 2024**—involved **poisoned APKs** (`ybht.apk`, `sqybhs.apk`) and a **trojanized Windows DLL** (delivered via an update package) that deployed RokRAT as a precursor to BirdCall. This campaign underscores ScarCruft’s **adaptive tradecraft**, blending **supply-chain compromise with mobile surveillance** to exploit geopolitically sensitive targets.

Unauthorized access to Trellix source code repository confirmed

Updated: 05.05.2026 11:55 · First: 02.05.2026 09:41 · 📰 2 src / 2 articles

Trellix confirmed unauthorized access to a portion of its source code repository on May 4, 2026, engaging forensic experts and law enforcement while stating no evidence of exploitation or impact on source code release processes. Security experts warn that access to the source code could give threat actors a tactical roadmap to Trellix’s detection mechanisms, build paths, and potential weaknesses, enabling further supply chain attacks. The incident follows a pattern of recent attacks targeting security vendors and software supply chains, including compromises of vendors like Aqua Security and Checkmarx via the Trivy supply chain attack, which exposed enterprise secrets and involved collaborations between groups like TeamPCP and Lapsus$ for monetization and ransomware deployment.

Unauthenticated RCE in Weaver E-cology via Debug API Endpoint (CVE-2026-22679) Actively Exploited in the Wild

Updated: · First: 05.05.2026 10:37 · 📰 1 src / 1 articles

An unauthenticated remote code execution (RCE) vulnerability (CVE-2026-22679, CVSS 9.8) in Weaver E-cology 10.0 prior to 20260312 is being actively exploited. The flaw exists in the debug API endpoint `/papi/esearch/data/devops/dubboApi/debug/method`, enabling attackers to execute arbitrary commands via crafted POST requests with malicious `interfaceName` and `methodName` parameters. Exploitation activity was first observed by the Shadowserver Foundation on March 31, 2026, with evidence dating back to March 17, 2026—five days after patches were released. The threat actor demonstrated operational sophistication, including failed payload deployments, discovery commands (e.g., `whoami`, `ipconfig`, `tasklist`), and attempts to retrieve PowerShell payloads from attacker-controlled infrastructure.

Large-scale AiTM phishing campaign abuses code-of-conduct lures and CAPTCHA gates to harvest credentials

Updated: · First: 05.05.2026 09:35 · 📰 1 src / 1 articles

A credential theft campaign spanning April 14–16, 2026, leveraged polished code-of-conduct-themed HTML phishing emails to trick recipients into visiting attacker-controlled domains and surrendering authentication tokens. The operation targeted more than 35,000 users across 13,000 organizations in 26 countries, with 92% of targets in the U.S. The emails impersonated internal communications about conduct reviews, incorporating fake authenticity statements, urgency cues, and PDF attachments pointing to CAPTCHA-gated phishing pages. Victims were ultimately routed through adversary-in-the-middle (AiTM) phishing infrastructure to harvest Microsoft credentials and session tokens in real time, effectively bypassing multi-factor authentication (MFA). The final landing experience varied based on whether the flow originated from mobile or desktop environments.

Unauthenticated remote code execution in Weaver E-cology exploited prior to public disclosure

Updated: · First: 05.05.2026 01:12 · 📰 1 src / 1 articles

Since mid-March 2026, attackers have exploited an unauthenticated remote code execution vulnerability (CVE-2026-22679) in Weaver E-cology, an enterprise office automation platform widely used by Chinese organizations. The flaw exists in versions prior to March 12 and stems from an exposed, unauthenticated debug API endpoint that improperly processes user-supplied parameters, allowing arbitrary system command execution via crafted RPC inputs. Exploitation began five days after the vendor released a security update and two weeks before public disclosure, with the threat actors conducting multi-stage operations focused on reconnaissance and lateral movement prior to detection. No persistent access was established on compromised hosts despite successful exploitation attempts.

TruffleNet Attack Campaign Targeting AWS Environments

Updated: 04.05.2026 23:03 · First: 03.11.2025 12:59 · 📰 2 src / 2 articles

The TruffleNet attack campaign, initially documented in late 2025, continues to evolve with observed phishing campaigns leveraging Amazon SES to bypass security controls and execute business email compromise (BEC) attacks. Researchers report a surge in SES abuse tied to exposed AWS credentials in public repositories, enabling automated credential scanning via TruffleHog and large-scale phishing campaigns. Attackers craft convincing phishing emails with custom HTML templates and fabricated email threads to deceive victims, including fake DocuSign notifications and invoice scams targeting finance departments.

Critical cPanel authentication bypass (CVE-2026-41940) under active mass exploitation

Updated: · First: 04.05.2026 22:14 · 📰 1 src / 1 articles

A critical authentication bypass vulnerability in cPanel, WHM, and WP Squared products (CVE-2026-41940, CVSS 9.8) is being actively exploited at scale within 24 hours of public disclosure and patch release, granting attackers administrative access to tens of thousands of internet-facing servers and millions of hosted websites. Exploitation began shortly after April 28 vendor patch and April 29 CVE assignment, with known in-the-wild activity predating disclosure. Observed attacks include Mirai botnet recruitment, ransomware deployment (files encrypted with ".sorry" extension), and multi-stage operations achieving full server takeover in minutes without requiring credentials or defeating 2FA. Scans indicate approximately 15,000 compromised instances within the first day, with ongoing exploit attempts numbering in the thousands across diverse geographies and ASNs. The flaw targets the cPanel/WHM management plane typically exposed on TCP/2087, affecting all supported versions and powering roughly 70 million domains.

Critical Authentication Bypass in Progress MOVEit Automation RCE Vectors Exposed

Updated: 04.05.2026 19:34 · First: 04.05.2026 15:18 · 📰 2 src / 2 articles

A critical authentication bypass vulnerability (CVE-2026-4670) and a high-severity privilege escalation flaw (CVE-2026-5174) in Progress MOVEit Automation have been disclosed and patched. The authentication bypass (CVSS 9.8) allows remote, unauthenticated attackers to bypass authentication and execute arbitrary actions without privileges or user interaction, while the privilege escalation flaw (CVSS 7.7) enables unauthorized administrative control and data exposure. The vulnerabilities affect versions prior to 2025.1.5, 2025.0.9, and 2024.1.8, with fixes requiring full installer upgrades that cause system outages. Airbus SecLab researchers are credited with discovering and reporting both flaws, which can be exploited via service backend command port interfaces. No workarounds exist, and immediate patching is recommended to prevent potential exploitation resembling prior MOVEit Transfer intrusions. MOVEit Automation is an enterprise-grade managed file transfer (MFT) orchestrator used by over 3,000 organizations and 100,000 users globally to automate complex data workflows across local servers, cloud storage, and external partners. Progress Software has issued advisories emphasizing the severity of the flaws, noting that exploitation could lead to full system compromise, data exfiltration, or lateral movement within affected environments. Over 1,400 exposed instances have been identified, including systems linked to U.S. government agencies.

Structured loan fraud methodology targeting small to mid-sized credit unions via synthetic identity abuse

Updated: · First: 04.05.2026 16:42 · 📰 1 src / 1 articles

A documented underground fraud methodology is being actively shared by threat actors to exploit gaps in identity verification and loan approval workflows at small to mid-sized credit unions. The approach bypasses technical vulnerabilities by navigating legitimate lending processes using stolen or synthetic identities and predictable knowledge-based authentication (KBA) responses reconstructed from public and leaked data. Target selection favors institutions perceived as having weaker fraud controls or manual review processes. Funds are rapidly moved through intermediaries and withdrawn to monetize the fraud while appearing as normal customer activity.

Phishing-to-outage lifecycle focus of upcoming MSP cyber resilience webinar featuring Kaseya

Updated: 04.05.2026 15:16 · First: 17.04.2026 15:20 · 📰 2 src / 2 articles

A live technical webinar scheduled for May 14, 2026, hosted by BleepingComputer in collaboration with Kaseya, will present advanced strategies for MSPs to integrate detection, response, and recovery to mitigate phishing-driven cyber incidents. The session will detail how AI-powered phishing, business email compromise, and ransomware campaigns increasingly bypass traditional controls by leveraging trusted SaaS platforms. It will emphasize that even when threats are detected, gaps between security and backup functions can escalate incidents into prolonged operational outages, significantly increasing risks of data theft, account takeover, and ransomware deployment. The webinar will also provide actionable tactics for combining prevention, detection, and rapid recovery to maintain client uptime and operational continuity.

AI-assisted cyber attacks drive record increase in threat actor capabilities and incident volume in 2025

Updated: · First: 04.05.2026 14:58 · 📰 1 src / 1 articles

Throughout 2025, the widespread adoption of advanced AI coding assistants and agentic systems significantly lowered barriers to entry for conducting sophisticated cyberattacks. Non-technical actors leveraged AI tools to execute high-impact compromises, including the theft of 7 million user records from Kaikatsu Club in Japan, attacks on Rakuten Mobile by teenagers, and a month-long extortion campaign against 17 organizations. Time-to-exploit for publicly disclosed vulnerabilities plummeted from over 700 days in 2020 to 44 days in 2025, with 28.3% of CVEs exploited within 24 hours of disclosure. Malicious packages in public repositories surged by 727% since 2022, reaching 454,600 by 2025. The operational tempo now favors attackers, as remediation cycles (74 days average) cannot keep pace with exploit development or AI-driven attack automation.

Silver Fox APT expands ABCDoor backdoor operations with RustSL loader and tax-themed phishing targeting India, Russia, and additional regions

Updated: 04.05.2026 14:35 · First: 04.05.2026 14:57 · 📰 2 src / 2 articles

Silver Fox continues tax-themed phishing operations targeting Indian and Russian organizations, with a newly detailed payload set that includes the ABCDoor backdoor and refined persistence and command-and-control techniques. The campaign began in December 2025 with emails impersonating Indian tax authorities, expanding in January 2026 to target Russian entities using identical tax-audit lures. Kaspersky observed over 1,600 malicious emails across industrial, consulting, retail, and transportation sectors between January and February 2026. Payloads delivered via RustSL loaders include the ValleyRAT backdoor and the previously undocumented ABCDoor Python-based backdoor, which has been active in real-world attacks since Q1 2025. ABCDoor leverages Windows Registry Run keys and scheduled tasks for persistence, communicates over HTTPS using Socket.IO, and supports covert remote control features such as multi-monitor screen streaming and clipboard theft. The backdoor also supports self-updating, self-removal, and extensive host metadata collection, leaving detectable forensic artifacts in the registry and %LOCALAPPDATA%. The campaign’s geographic scope continues to expand, with RustSL configurations now including Japan alongside India, Russia, Indonesia, South Africa, and Cambodia. Silver Fox’s targeting now spans China, Taiwan, Japan, India, Russia, Indonesia, South Africa, and Cambodia, reflecting a broadening operational footprint beyond its historical focus.

High-severity Linux kernel authencesn logic bug (CVE-2026-31431) enables local privilege escalation

Updated: 04.05.2026 14:28 · First: 01.05.2026 13:45 · 📰 2 src / 2 articles

A high-severity zero-day vulnerability in the Linux kernel, tracked as CVE-2026-31431 and nicknamed Copy Fail, has been disclosed after existing undetected since 2017. The flaw is a logic bug in the kernel’s authencesn cryptographic template that permits an unprivileged local user to perform a deterministic four-byte write into the page cache of any readable file on the system. Successful exploitation allows an attacker to escalate privileges to root on affected Linux distributions released since 2017, requiring only a local account and physical access to the target machine. The vulnerability affects multi-user shared systems, containerized environments (Kubernetes, Docker), and similar setups, enabling potential unauthorized access to other users’ data. It has been assigned a CVSS score of 7.8 (High severity). CISA added the flaw to its Known Exploited Vulnerabilities (KEV) Catalog on May 3, 2026, after threat actors began exploiting it in the wild following Theori’s public disclosure on April 29, 2026. A Python-based proof-of-concept exploit was released, demonstrating reliable root access across major distributions, and U.S. government agencies were ordered to patch within two weeks under BOD 22-01.

Establishment of Dark Reading in 2006 as a dedicated cybersecurity publication

Updated: · First: 04.05.2026 14:15 · 📰 1 src / 1 articles

In early 2006, Steve Saunders, founder of Light Reading, acquired the domain darkreading.com with the intent to launch a dedicated cybersecurity news platform by early May. The initiative sought to address a gap in B2B media, where few security-focused publications existed independent of print counterparts. Initial coverage targeted contemporary threats such as spam-based malware, denial-of-service attacks, and the emerging TJX data breach (46 million records exposed), reflecting the evolving threat landscape of the mid-2000s. The launch underscored the growing complexity of cybersecurity, including the rise of SOCs, alert fatigue, and the uncertainty around firewall replacements, as organizations navigated increasingly diverse attacker types and attack vectors.

Linux Kernel Local Privilege Escalation via Copy Fail (CVE-2026-31431)

Updated: 04.05.2026 13:42 · First: 30.04.2026 16:54 · 📰 3 src / 3 articles

Active exploitation of the Linux kernel local privilege escalation vulnerability (CVE-2026-31431) has begun, with threat actors targeting systems to gain root access. The flaw, dubbed "Copy Fail," stems from a logic bug in the kernel's authencesn cryptographic template and enables unprivileged local attackers to escalate privileges via a 4-byte write to the page cache of setuid-root binaries. Exploitation occurs entirely in memory, leaving no disk-based traces, and affects all major Linux distributions since 2017. A 10-line Python PoC achieves 100% reliability, and the flaw poses severe risks in containerized environments, enabling Kubernetes pod escapes and CI/CD pipeline compromises. Discovered in 2026 using AI-assisted analysis, the vulnerability was introduced in 2017 through a performance optimization that reused buffers in the crypto path. Upstream patches were released in kernel versions 6.18.22, 6.19.12, and 7.0, but inconsistent advisories across distributions have delayed widespread mitigation. Microsoft reports limited in-the-wild exploitation so far, primarily PoC testing, but warns of the flaw's broad applicability and potential for container breakouts, multi-tenant compromise, and lateral movement in shared environments. CISA added the flaw to its Known Exploited Vulnerabilities catalog on May 2, 2026, requiring federal agencies to patch within two weeks.

ChatGPT Advanced Account Security feature released for high-risk users

Updated: · First: 04.05.2026 12:29 · 📰 1 src / 1 articles

OpenAI introduced an opt-in Advanced Account Security feature for ChatGPT and Codex users, particularly targeting high-risk groups such as journalists, researchers, political dissidents, and elected officials. The feature replaces password-based authentication with physical security keys or passkeys, eliminates SMS and email-based account recovery in favor of backup passkeys, and shortens sign-in session durations to reduce account takeover risk. Enabled users are excluded from AI training datasets and receive enhanced login alerts and session management capabilities.

Active exploitation of cPanel authentication bypass (CVE-2026-41940) by unknown actor targeting government and MSP networks

Updated: · First: 04.05.2026 12:27 · 📰 1 src / 1 articles

An unknown threat actor is actively exploiting CVE-2026-41940, a critical authentication bypass vulnerability in cPanel and WHM, to compromise government, military, and MSP networks in multiple regions. The campaign has used a custom exploit chain against an Indonesian defense sector training portal via SQL injection and RCE, followed by weaponization of the cPanel flaw to gain elevated control of control panels. Activities originated from IP 95.111.250[.]175 and included the use of AdapdixC2 C2, OpenVPN, and Ligolo for persistence and lateral movement, with evidence of exfiltration of Chinese railway-sector documents. The campaign’s scope and persistence indicate a sophisticated, likely state-aligned or experienced adversary targeting high-value infrastructure.

Global disruption of pig-butchering cryptocurrency scam networks with 276 arrests

Updated: 04.05.2026 08:59 · First: 30.04.2026 14:21 · 📰 2 src / 2 articles

A coordinated international law enforcement operation dismantled nine cryptocurrency investment fraud centers across Dubai and Southeast Asia, arresting 276 suspects linked to pig-butchering (romance baiting) schemes that defrauded victims through fake investment platforms. Scammers cultivated trust with targets via fabricated relationships before redirecting victims to counterfeit cryptocurrency investment portals where deposited funds were immediately siphoned and laundered through layered crypto accounts. Victims were coerced into borrowing money and taking loans to increase investments, exacerbating financial losses. The operation targeted operations including Ko Thet Company, Sanduo Group, and Giant Company, with fugitives still at large. Additional developments include the seizure of over $701 million in illicit funds, charges against key figures in forced labor scam compounds, sanctions on a Cambodian senator tied to cyber scam networks, and the disruption of an Android banking trojan linked to scam operations in Cambodia. U.S. authorities also expanded victim notification efforts and launched new cybersecurity initiatives to counter evolving fraud tactics.

Microsoft Defender false-positive detections targeting DigiCert root certificates resolved

Updated: · First: 03.05.2026 21:11 · 📰 1 src / 1 articles

Microsoft Defender erroneously flagged and removed legitimate DigiCert root certificates as malware Trojan:Win32/Cerdigent.A!dha starting April 30, 2026, affecting Windows systems globally. The false positives stemmed from a Defender signature update and led to certificate removal from the Windows AuthRoot trust store, causing operational disruptions. Microsoft issued corrected definitions in Security Intelligence updates 1.449.430.0 and 1.449.431.0, which restore affected certificates automatically. The incident occurred shortly after a DigiCert security breach where attackers obtained valid code-signing certificates to sign malware, though the root certificates flagged by Defender are unrelated to the revoked signing certificates. The false positives triggered unnecessary remediation actions by users.

FEMITBOT campaign abuses Telegram Mini Apps for crypto scams and Android malware delivery

Updated: · First: 03.05.2026 17:11 · 📰 1 src / 1 articles

A large-scale fraud operation named FEMITBOT has been identified abusing Telegram’s Mini App feature to conduct cryptocurrency scams, impersonate major brands, and distribute Android malware. The operation leverages Telegram bots and embedded Mini Apps to create app-like phishing experiences directly within the messaging platform’s built-in browser. Threat actors impersonate well-known brands such as Apple, Coca-Cola, Disney, eBay, IBM, Moon Pay, NVIDIA, and YouKu to increase credibility, while using a shared backend infrastructure across multiple campaigns. Victims are presented with fake investment dashboards, urgency-driven prompts, and malware-hosting APKs disguised as legitimate applications.

Authentication bypass vulnerability in cPanel and WHM exploited as zero-day prior to patch

Updated: 03.05.2026 00:54 · First: 30.04.2026 14:40 · 📰 2 src / 2 articles

A critical authentication bypass vulnerability (CVE-2026-41940) in cPanel, WHM, and WP Squared has been mass-exploited in 'Sorry' ransomware attacks since May 2026, compromising at least 44,000 cPanel IP addresses globally. The flaw, a CRLF injection in login and session loading processes, allows attackers to bypass authentication and gain full control over cPanel hosts, enabling deployment of a Go-based Linux encryptor that appends the '.sorry' extension to files. Encryption uses ChaCha20 with RSA-2048 key protection, rendering decryption impossible without the threat actor's private key. Ransom notes with a fixed Tox ID are dropped in each compromised folder. cPanel released emergency fixes on April 28, 2026, addressing versions 11.110.0 through 11.136.0 and WP Squared 11.136.1, with approximately 1.5 million exposed instances identified via Shodan scans. Emergency mitigations included port blocking and service suspensions.

Automated OAuth abuse via ConsentFix v3 targets Microsoft Azure environments

Updated: · First: 02.05.2026 17:32 · 📰 1 src / 1 articles

A new attack technique dubbed ConsentFix v3 automates OAuth2 authorization code abuse to compromise Microsoft Azure accounts despite multi-factor authentication (MFA). The attack leverages social engineering to trick victims into pasting or dragging a localhost URL containing an OAuth authorization code into a phishing interface, which is then automatically exchanged for tokens via Microsoft's API. The technique targets first-party Microsoft apps with pre-trusted consent and employs automation tools like Pipedream for real-time token collection, enabling attackers to access compromised accounts and associated resources. The campaign involves reconnaissance, impersonation, phishing hosting, and data exfiltration, with token access potentially granting control over email, files, and other services within the tenant.

Instructure reports cybersecurity incident impacting Canvas platform services

Updated: · First: 02.05.2026 02:43 · 📰 1 src / 1 articles

Instructure, the U.S.-based provider of the Canvas learning management system, disclosed a cybersecurity incident attributed to a criminal threat actor. The company is conducting an active investigation with external forensics experts to assess the scope and impact. Maintenance windows for services such as Canvas Data 2 and Canvas Beta began on May 1, potentially affecting API-reliant tools, though Instructure has not confirmed a direct link to the incident. The event follows a pattern of increased targeting of education technology firms due to the sensitive personal data they manage.

Large-scale Facebook account takeover campaign leveraging Google AppSheet and Vietnamese-linked infrastructure

Updated: · First: 01.05.2026 21:09 · 📰 1 src / 1 articles

A Vietnamese-linked cybercriminal operation codenamed AccountDumpling has compromised approximately 30,000 Facebook accounts using a phishing campaign that abuses Google AppSheet as a relay and exfiltration channel. The campaign targets Facebook Business account owners via phishing emails impersonating Meta Support, directing victims to fake web pages hosted on platforms such as Netlify, Vercel, and Google Drive, or through PDF lures hosted on Canva. Account credentials, 2FA codes, government IDs, and browser screenshots were collected and sold via underground channels, with data exfiltrated to attacker-controlled Telegram channels. Victim geography spans the U.S., Italy, Canada, the Philippines, India, Spain, Australia, the U.K., Brazil, and Mexico.

Claude Mythos uncovers thousands of zero-days across major systems via Project Glasswing

Updated: 01.05.2026 19:26 · First: 08.04.2026 12:16 · 📰 4 src / 4 articles

Anthropic’s Claude Mythos Preview, under Project Glasswing, has autonomously discovered thousands of high-severity zero-day vulnerabilities across major operating systems, web browsers, and software libraries, including long-standing flaws such as a 27-year-old OpenBSD denial-of-service bug and a 16-year-old FFmpeg issue. The model’s agentic coding and reasoning capabilities enable it to autonomously craft complex exploits, such as a FreeBSD NFS server remote code execution chain and a multi-stage browser sandbox escape via JIT heap spray. Project Glasswing, a consortium involving AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorgan Chase, the Linux Foundation, Microsoft, NVIDIA, Palo Alto Networks, and Anthropic, provides $100 million in Mythos Preview usage credits and $4 million in donations to secure critical software. However, as of May 2026, 99% of vulnerabilities identified by Mythos Preview remain unpatched, and the model has now autonomously chained four zero-days to bypass both browser renderer and OS sandboxes, demonstrating the escalating dual-use risks of AI-driven cybersecurity tools. Industry experts warn that the lack of independent verification and the pace of exploit development necessitate rapid patching cycles and enhanced detection mechanisms to mitigate emerging threats.

Unchecked AI Agent Deployments Drive Widespread Cybersecurity Incidents Across Enterprises

Updated: 01.05.2026 17:39 · First: 21.04.2026 16:00 · 📰 2 src / 2 articles

A real-world incident demonstrates the catastrophic potential of unchecked AI agent deployments: an AI coding agent deleted a production database and all backups in nine seconds, causing immediate operational disruption for car rental companies. Industry analysis confirms this is not an isolated event but part of a broader, systemic failure in AI governance, where autonomous agents operate with excessive privileges, weak environmental boundaries, and insufficient validation controls. Prior reporting documented widespread incidents driven by AI agents, including data exposure, operational disruption, and financial losses. Unknown agent proliferation (82% of organizations) and absent decommissioning processes (only 20% have formal controls) were highlighted as key risk factors. Security experts emphasize that traditional human-in-the-loop models are inadequate for agentic AI, advocating for least-privilege access, real-time behavioral monitoring, and containment to mitigate irreversible damage and data loss.