CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 16:45 23/05/2026 UTC
  • Underminr CDN Misrouting Vulnerability Exploited to Conceal Malicious Traffic via Shared Edge Infrastructure Threat actors are actively exploiting a vulnerability in shared content delivery network (CDN) infrastructure, dubbed Underminr, to conceal malicious connections behind trusted domains. The technique abuses CDN tenant routing misconfigurations by presenting the Server Name Indication (SNI) and HTTP Host header of a reputable domain while forcing a connection to the IP address of another tenant on the same shared edge infrastructure. This mismatch allows traffic to bypass network policies and appear legitimate, enabling evasion of protective DNS services and egress filtering. Underminr has been observed in attacks targeting large-scale hosting providers, including those that previously mitigated domain fronting, and is being used to hide command-and-control (C2) communications, VPN connections, and proxy traffic. The vulnerability impacts approximately 88 million domains globally, with the highest concentrations in the US, UK, and Canada. Read
  • Privilege escalation in LiteSpeed cPanel plugin via redisAble function exploited in the wild A maximum-severity (CVSS 10.0) privilege escalation vulnerability in the LiteSpeed User-End cPanel Plugin (CVE-2026-48172) is actively exploited to execute arbitrary scripts as the root user. The flaw arises from incorrect privilege assignment in the lsws.redisAble function, enabling any authenticated cPanel user—including attackers or compromised accounts—to gain root-level code execution. The issue affects plugin versions 2.3 through 2.4.4; WHM plugin versions are not impacted. Patches are available in cPanel plugin v2.4.7 (bundled with WHM v5.3.1.0). Read
  • Medium-severity Apex One zero-day patched after exploitation in on-premises deployments Trend Micro patched CVE-2026-34926, a medium-severity directory traversal flaw in Apex One on-premises installations, after confirming in-the-wild exploitation targeting Windows systems. The vulnerability allowed local attackers with admin credentials to inject malicious code into server key tables and deploy payloads to agents. CISA added the CVE to its Known Exploited Vulnerabilities (KEV) catalog on May 22, 2026, requiring federal agencies to remediate by June 4, 2026. Concurrently, Trend Micro released updates addressing seven local privilege escalation vulnerabilities in the Apex One Standard Endpoint Protection agent. Threat actors have repeatedly exploited Apex One flaws in zero-day attacks, including prior incidents tracked as CVE-2025-54948 (August 2025), CVE-2022-40139 (September 2022), and CVE-2023-41179 (September 2023). Read
  • Global law enforcement operation dismantles criminal VPN service used by 25 ransomware groups A coordinated international law enforcement operation dismantled First VPN Service, a criminal-focused VPN infrastructure leveraged by at least 25 ransomware groups, threat actors, and cybercriminals for anonymizing malicious activities including ransomware attacks, data theft, network reconnaissance, and denial-of-service operations. The takedown spanned May 19–20, 2026 and involved authorities from 21 countries, including France, the Netherlands, Ukraine, the U.S., and the U.K., under operations led by Europol and Eurojust. The service, active since 2014, provided 32 exit nodes across 27 countries and promoted itself on Russian-speaking cybercrime forums such as Exploit[.]in and XSS[.]is as an anonymity tool resistant to law enforcement cooperation. Impact includes the seizure of 33 servers, interviews with the service administrator, and disruption of infrastructure supporting global cybercrime operations. The FBI confirmed the service’s role in enabling multiple ransomware operations, including Avaddon Ransomware. Read
  • Former executives convicted for facilitating large-scale tech support fraud operations spanning 2017–2022 Two former executives of a call-tracking and analytics company pleaded guilty to concealing a years-long tech support fraud scheme that targeted individuals globally. Former CEO Adam Young and former CSO Harrison Gevirtz admitted to misprision of a felony and are scheduled for sentencing on June 16. They operated C.A. Cloud Attribution, Ltd. between early 2017 and April 2022, providing services including telephone numbers, call recordings, and call forwarding to known fraudsters. The fraud schemes involved deceptive pop-up ads falsely claiming system infections, directing victims to call centers charging hundreds of dollars for fictitious technical services. Some scammers remotely accessed victims' computers and stole personal and financial information to withdraw funds without authorization. Young and Gevirtz allegedly advised customers to use rotating telephone numbers to reduce complaints and prevent account terminations, and introduced fraudsters to one another. Read
  • Expansion of fraud impact metrics beyond chargeback rates in enterprise risk programs Organizations are broadening fraud measurement beyond traditional chargeback rates to include operational, reputational, and growth-related impacts as fraud techniques evolve. Emerging patterns such as account takeovers and synthetic identity fraud are driving indirect losses, customer churn, and operational overhead that are not captured by chargeback metrics. This shift reflects growing recognition that fraud prevention strategies must balance risk reduction with customer experience and revenue protection. Read
  • Evolving AI-Fueled Social Engineering Surge Targets Healthcare Sector Healthcare organizations experienced a notable increase in sophisticated social engineering attacks in 2025, driven by AI-enhanced pretexting and phishing tactics that exploit operational urgency and trust in clinical workflows. Threat actors leveraged generative AI to craft highly targeted, context-aware communications and malicious documents, impersonating executives, vendors, and HR to manipulate healthcare professionals into divulging credentials or enabling session hijacking. The attacks align with long-standing industry vulnerabilities, including legacy systems, high-value data (e.g., patient records), and fragmented supplier ecosystems. The Verizon 2026 Data Breach Investigations Report (DBIR) identifies social engineering as a top three breach pattern in healthcare, alongside system intrusion and miscellaneous errors, collectively accounting for 81% of incidents. Pretexting—previously absent from DBIR healthcare data—now ranks as the second most common social action in healthcare breaches, reflecting a shift toward credibility-driven deception over traditional urgency-based lures. Read
Last updated: 17:00 23/05/2026 UTC
  • OpenAI, TanStack, and Mistral AI Impacted in Escalating Mini Shai-Hulud Supply Chain Campaign The Mini Shai-Hulud supply chain campaign has escalated with a new wave of 639 compromised npm packages tied to the AntV ecosystem, including high-download dependencies such as echarts-for-react and timeago.js. The attack ran for roughly one hour on May 19, 2026, beginning at 01:56 UTC, publishing malicious versions from the compromised “atool” maintainer account that held rights for over 500 packages. Each compromised package added an obfuscated Bun bundle preinstall hook to harvest and exfiltrate credentials (cloud, CI/CD, SSH, Kubernetes, and password manager vaults) via GitHub repositories marked with Dune-themed names and the campaign's reversed signature. Earlier waves targeted TanStack and Mistral AI SDKs, SAP npm packages, and PyPI ecosystems (Lightning, intercom-client), while compromising GitHub Actions workflows ('actions-cool/issues-helper', 'actions-cool/maintain-one-comment') and hundreds of npm packages across multiple ecosystems. Affected organizations include OpenAI (two employee devices breached via TanStack), UiPath, Guardrails AI, OpenSearch, SAP, and hundreds of npm and PyPI packages. The malware harvests over 20 credential types, abuses OIDC tokens to forge Sigstore provenance attestations, implements self-propagation via stolen npm tokens, and includes a destructive sabotage payload targeting systems in Israel or Iran. The campaign is attributed to TeamPCP, which publicly released the Shai-Hulud source code, enabling rapid cloning and weaponization by other actors. Read
  • Zscaler Acquires SquareX to Enhance Browser Security In May 2026, Zscaler completed its acquisition of SquareX, formally integrating the Browser Detection and Response (BDR) solution into the Zero Trust Exchange platform to secure unmanaged devices via user-preferred browsers. SquareX’s extension, which converts standard browsers into enterprise-grade secure workspaces with real-time threat detection, remains a standalone offering while being incorporated into Zscaler’s broader strategy. The move, alongside concurrent industry consolidation, reflects growing enterprise adoption of secure browsers amid rising threats to browser-based activities, including malicious extensions, phishing, and AI tool interactions. Gartner projects adoption of secure enterprise browsers to rise from 10% to 25% of organizations by 2028, underscoring the sector’s rapid evolution. Read
  • Widespread OAuth Device Code Phishing Campaign Targets Microsoft 365 via EvilTokens PhaaS Since mid-February 2026, a large-scale device code phishing campaign has targeted Microsoft 365 across at least 340 organizations in over 10 countries, escalating 37.5x in early April. The campaign abuses OAuth device authorization flows via the EvilTokens PhaaS platform and at least 10 additional phishing kits (VENOM, DOCUPOLL, SHAREFILE, etc.), granting persistent access tokens even after password resets. Attacks incorporate anti-bot evasion, multi-hop redirect chains via vendor services, and SaaS-themed lures, while mitigation focuses on disabling device code flows and monitoring anomalous authentications. Credential exposures like the Figure breach (967,200 email records) enable follow-on campaigns—credential stuffing, AI-generated phishing, and help desk social engineering—that bypass legacy MFA through real-time phishing relays and social engineering. Legacy MFA and even FIDO2 passkeys are structurally unable to prevent these attacks, which rely on human judgment at critical control points. Phishing-resistant authentication requires cryptographic origin binding, hardware-bound keys, and live biometric verification to close relay and delegation vectors. New research emphasizes how EvilTokens and similar kits exploit OAuth consent screens to trick users into granting scoped refresh tokens, bypassing MFA entirely and maintaining persistence even after password resets. The attack vector, termed consent phishing or OAuth grant abuse, operates below traditional identity controls, with refresh tokens surviving tenant policy changes unless explicitly revoked. The article also highlights the rise of 'toxic combinations'—unauthorized bridges between SaaS applications via OAuth grants—that create interconnected risk surfaces, exemplified by the 2025 Salesloft-Drift incident. Mitigation strategies now include platforms like Reco that map OAuth grants and AI agents into identity graphs, enabling continuous monitoring and token-level revocation to address these emergent attack pathways. Read
  • Upcoming webinar on automating and coordinating network incident response workflows A live webinar scheduled for June 2, 2026, will address systemic gaps in network incident response workflows that exacerbate incident escalation despite existing monitoring and security tooling. The session, titled "From alert to resolution: Fixing the gaps in network incident response," is hosted by BleepingComputer in partnership with Tines and will be presented by Edgar Ortiz, a Solutions Engineering Leader and Computer Scientist at Tines. It highlights how reliance on manual triage, alert routing, and coordination across disparate systems—rather than visibility limitations—drives incident escalation and service disruption during high-pressure scenarios. Read
  • Unsanctioned AI Tool Usage in Enterprises Over 80% of employees now use unapproved generative AI applications at work, with only 12% of companies maintaining formal AI governance policies. Shadow AI activity primarily occurs through OAuth connections to corporate data, browser extensions, and AI features embedded in pre-approved tools. This unsanctioned usage bypasses traditional security controls, creating significant governance and data exposure risks. Enterprises struggle to balance productivity with security, as employees adopt AI tools 3–5 times daily without IT oversight. The EU AI Act’s mandate for AI system visibility has intensified the need for continuous monitoring and risk assessments. Solutions like Harmonic Security’s platform enable enterprises to enforce smart governance policies based on data sensitivity, employee roles, and tool nature, addressing the operational realities highlighted by recent research. Read
  • UAC-0050 Targets European Financial Institution with Spoofed Domain and RMS Malware UAC-0050 continues to target European financial institutions with spear-phishing and RMS malware to establish persistent access. Concurrently, Russia-aligned operations such as Ghostwriter (UAC-0057/UNC1151) have intensified phishing campaigns against Ukrainian government entities since spring 2026, using Prometheus-themed lures and sophisticated multi-stage payloads like OYSTERFRESH, OYSTERBLUES, and Cobalt Strike. Ukraine’s National Security and Defense Council also reported increased Russian use of AI tools (e.g., ChatGPT, Google Gemini) for target reconnaissance and malware runtime command generation, alongside broader Kremlin-backed campaigns focused on intelligence gathering, long-term network persistence, and influence operations. These activities align with prior reporting on Russia-nexus adversaries targeting Ukrainian entities and NATO member states, including the deployment of legitimate remote access tools like RMS by UAC-0050. Read
  • Tycoon2FA Phishing-as-a-Service Takedown Tycoon2FA, a subscription-based phishing-as-a-service (PhaaS) platform that bypasses MFA using adversary-in-the-middle techniques, has expanded its capabilities to include device-code phishing attacks targeting Microsoft 365 accounts via OAuth 2.0 device authorization grant flows. The platform, active since August 2023, offers subscription-based access for bypassing multi-factor authentication, targeting major services like Microsoft 365 and Google. It was linked to over 64,000 phishing incidents and facilitated unauthorized access to nearly 100,000 organizations globally by mid-2025. The primary operator, identified as 'SaaadFridi' and 'Mr_Xaad,' remains at large. The platform’s infrastructure relies on adversary-in-the-middle techniques, AI-generated decoy pages, and short-lived domains to evade detection, while customers employ tactics like ATO Jumping to distribute phishing URLs. The platform was disrupted in a March 4, 2026 global takedown led by Europol’s EC3 and law enforcement from six European countries, but rapidly resumed operations within days to pre-disruption levels. Post-disruption, Tycoon2FA operators have continued to develop the kit, adding device-code phishing capabilities that abuse Trustifi click-tracking URLs and OAuth 2.0 flows. The phishing kit now includes a four-layer in-browser delivery chain, fake Microsoft CAPTCHA pages, and extensive anti-analysis protections to evade detection and analysis. Post-compromise activities include business email compromise (BEC), email thread hijacking, cloud account takeovers, and malicious SharePoint links, with old infrastructure remaining active and new domains registered quickly. Read

Latest updates

Browse →

npm enforces staged package publishing with 2FA approval and install source controls

Updated: · First: 23.05.2026 19:35 · 📰 1 src / 1 articles

npm introduced staged publishing requiring maintainers to approve package releases via two-factor authentication (2FA) before they become publicly available, providing proof of presence for every publish including CI/CD and OIDC workflows. Additionally, npm added three new install source flags (--allow-file, --allow-remote, --allow-directory) to explicitly control non-registry install sources, replacing the single -allow-git flag. These measures target ongoing supply chain attack campaigns, such as those attributed to TeamPCP, which have escalated in open-source ecosystems.

Malicious Laravel Packages Deploy Cross-Platform RAT via Packagist

Updated: 23.05.2026 19:07 · First: 04.03.2026 11:37 · 📰 2 src / 2 articles

Malicious PHP packages on Packagist, disguised as Laravel utilities, deploy a cross-platform remote access trojan (RAT) affecting Windows, macOS, and Linux systems. Eight additional packages were distributed in a coordinated supply chain attack targeting projects with JavaScript build tooling, inserting malicious postinstall scripts in package.json to download and execute a Linux binary from GitHub. The packages 'nhattuanbl/lara-helper', 'nhattuanbl/simple-queue', and 'nhattuanbl/lara-swagger' contain obfuscated PHP code that connects to a C2 server, enabling full remote access to compromised hosts. The RAT supports commands like system reconnaissance, shell execution, and file operations, and runs in the same process as the web application, granting full remote shell access.

CINEMAGOAL piracy operation dismantled after mass account takeovers via stolen streaming auth codes

Updated: · First: 23.05.2026 17:23 · 📰 1 src / 1 articles

Italian authorities have dismantled the CINEMAGOAL piracy operation that used a rogue app to harvest and redistribute authentication codes for major streaming platforms such as Netflix, Disney+, and Spotify. The operation involved over 100 searches, seizures in Italy, France, and Germany, and the identification of 70+ resellers. The system evaded platform blocks by proxying through legitimate services using virtual machines and false identities, causing an estimated €300M in damages. Authorities have begun issuing penalties to identified subscribers and continue analyzing seized data to trace financial flows and additional actors.

Claude Mythos uncovers thousands of zero-days across major systems via Project Glasswing

Updated: 23.05.2026 14:55 · First: 08.04.2026 12:16 · 📰 5 src / 5 articles

Anthropic’s Project Glasswing, powered by the Claude Mythos Preview model, has now identified over 10,000 high- or critical-severity vulnerabilities across widely used software since its launch a month prior, including 6,202 high/critical flaws affecting more than 1,000 open-source projects. Anthropic reports that 1,726 of these candidates have been confirmed as true positives, with 1,094 assessed as high or critical severity. Critical fixes include a WolfSSL certificate forgery flaw (CVE-2026-5194, CVSS 9.1), and 97 vulnerabilities have already been patched upstream with 88 advisories issued. While Mythos Preview demonstrates unprecedented offensive security capabilities—such as autonomously crafting attack chains and detecting real-time fraud like a $1.5 million wire transfer attempt—99% of its discovered vulnerabilities remain unpatched as of May 2026. The model’s rapid vulnerability discovery is reshaping patch cycles, with vendors like Microsoft anticipating sustained increases in monthly patches, and Anthropic urging organizations to accelerate hardening, MFA enforcement, and log retention to mitigate escalating dual-use risks.

Underminr CDN Misrouting Vulnerability Exploited to Conceal Malicious Traffic via Shared Edge Infrastructure

Updated: · First: 23.05.2026 14:00 · 📰 1 src / 1 articles

Threat actors are actively exploiting a vulnerability in shared content delivery network (CDN) infrastructure, dubbed Underminr, to conceal malicious connections behind trusted domains. The technique abuses CDN tenant routing misconfigurations by presenting the Server Name Indication (SNI) and HTTP Host header of a reputable domain while forcing a connection to the IP address of another tenant on the same shared edge infrastructure. This mismatch allows traffic to bypass network policies and appear legitimate, enabling evasion of protective DNS services and egress filtering. Underminr has been observed in attacks targeting large-scale hosting providers, including those that previously mitigated domain fronting, and is being used to hide command-and-control (C2) communications, VPN connections, and proxy traffic. The vulnerability impacts approximately 88 million domains globally, with the highest concentrations in the US, UK, and Canada.

Compromise of Laravel-Lang PHP Packages Results in Cross-Platform Credential Stealer Deployment via Supply Chain Attack

Updated: · First: 23.05.2026 12:51 · 📰 1 src / 1 articles

A coordinated supply chain compromise has affected multiple Laravel-Lang PHP packages—including laravel-lang/lang, laravel-lang/http-statuses, laravel-lang/attributes, and laravel-lang/actions—resulting in the delivery of a multi-platform credential-stealing framework. The attack involved over 700 compromised package versions published within seconds of each other on May 22–23, 2026, suggesting automated mass tagging after likely compromise of organization-level credentials or release infrastructure. A malicious backdoor embedded in src/helpers.php executes automatically via Composer’s autoload.files mechanism on every PHP request in infected applications. The dropper retrieves a PHP-based cross-platform payload from flipboxstudio.info, which deploys platform-specific stealers: a Visual Basic Script on Windows (executed via cscript), and shell execution on Linux/macOS. The malware performs extensive credential harvesting across cloud providers, CI/CD systems, version control, cryptocurrency wallets, browsers, password managers, VPNs, and application tokens (e.g., Discord, Slack, Outlook, FileZilla), before exfiltrating encrypted data to flipboxstudio.info and self-deleting.

Privilege escalation in LiteSpeed cPanel plugin via redisAble function exploited in the wild

Updated: · First: 23.05.2026 10:35 · 📰 1 src / 1 articles

A maximum-severity (CVSS 10.0) privilege escalation vulnerability in the LiteSpeed User-End cPanel Plugin (CVE-2026-48172) is actively exploited to execute arbitrary scripts as the root user. The flaw arises from incorrect privilege assignment in the lsws.redisAble function, enabling any authenticated cPanel user—including attackers or compromised accounts—to gain root-level code execution. The issue affects plugin versions 2.3 through 2.4.4; WHM plugin versions are not impacted. Patches are available in cPanel plugin v2.4.7 (bundled with WHM v5.3.1.0).

Drupal Core SQL Injection Vulnerability (CVE-2026-9082) Actively Exploited in the Wild

Updated: · First: 23.05.2026 10:23 · 📰 1 src / 1 articles

A critical SQL injection vulnerability in Drupal Core (CVE-2026-9082, CVSS 6.5) has been confirmed as actively exploited in the wild, prompting CISA to add it to the Known Exploited Vulnerabilities (KEV) catalog. The flaw affects all supported Drupal Core versions, enabling privilege escalation and potential remote code execution via specially crafted requests leveraging the database abstraction API. Attackers are probing and targeting vulnerable PostgreSQL-backed Drupal sites, with observed activity concentrated in gaming and financial services sectors across 65 countries. Federal agencies have been directed to apply patches by May 27, 2026.

Global law enforcement operation dismantles criminal VPN service used by 25 ransomware groups

Updated: · First: 22.05.2026 20:35 · 📰 1 src / 1 articles

A coordinated international law enforcement operation dismantled First VPN Service, a criminal-focused VPN infrastructure leveraged by at least 25 ransomware groups, threat actors, and cybercriminals for anonymizing malicious activities including ransomware attacks, data theft, network reconnaissance, and denial-of-service operations. The takedown spanned May 19–20, 2026 and involved authorities from 21 countries, including France, the Netherlands, Ukraine, the U.S., and the U.K., under operations led by Europol and Eurojust. The service, active since 2014, provided 32 exit nodes across 27 countries and promoted itself on Russian-speaking cybercrime forums such as Exploit[.]in and XSS[.]is as an anonymity tool resistant to law enforcement cooperation. Impact includes the seizure of 33 servers, interviews with the service administrator, and disruption of infrastructure supporting global cybercrime operations. The FBI confirmed the service’s role in enabling multiple ransomware operations, including Avaddon Ransomware.

AWS GovCloud administrative credentials exposed via contractor-managed public GitHub repository

Updated: 22.05.2026 19:34 · First: 18.05.2026 23:48 · 📰 2 src / 2 articles

A CISA contractor exposed credentials for AWS GovCloud accounts and internal systems via a public GitHub repository named "Private-CISA", enabling potential lateral movement within CISA’s networks. The exposure, first reported by GitGuardian on May 15, 2026, included plaintext passwords, cloud keys, tokens, and software deployment details. The repository was taken offline promptly, but exposed AWS keys remained valid for 48 hours, and CISA has stated there is no indication of sensitive data compromise. Lawmakers have since demanded answers from CISA, citing concerns over internal security culture and contractor oversight, particularly amid significant workforce disruptions at the agency. Reports indicate CISA struggled to fully invalidate exposed credentials for over a week, with evidence suggesting adversaries may have accessed the secrets. An RSA private key in the repository granted full access to CISA’s GitHub enterprise account until its recent revocation.

UAC-0050 Targets European Financial Institution with Spoofed Domain and RMS Malware

Updated: 22.05.2026 19:20 · First: 24.02.2026 16:21 · 📰 2 src / 2 articles

UAC-0050 continues to target European financial institutions with spear-phishing and RMS malware to establish persistent access. Concurrently, Russia-aligned operations such as Ghostwriter (UAC-0057/UNC1151) have intensified phishing campaigns against Ukrainian government entities since spring 2026, using Prometheus-themed lures and sophisticated multi-stage payloads like OYSTERFRESH, OYSTERBLUES, and Cobalt Strike. Ukraine’s National Security and Defense Council also reported increased Russian use of AI tools (e.g., ChatGPT, Google Gemini) for target reconnaissance and malware runtime command generation, alongside broader Kremlin-backed campaigns focused on intelligence gathering, long-term network persistence, and influence operations. These activities align with prior reporting on Russia-nexus adversaries targeting Ukrainian entities and NATO member states, including the deployment of legitimate remote access tools like RMS by UAC-0050.

Zscaler Acquires SquareX to Enhance Browser Security

Updated: 22.05.2026 18:43 · First: 06.02.2026 04:48 · 📰 3 src / 5 articles

In May 2026, Zscaler completed its acquisition of SquareX, formally integrating the Browser Detection and Response (BDR) solution into the Zero Trust Exchange platform to secure unmanaged devices via user-preferred browsers. SquareX’s extension, which converts standard browsers into enterprise-grade secure workspaces with real-time threat detection, remains a standalone offering while being incorporated into Zscaler’s broader strategy. The move, alongside concurrent industry consolidation, reflects growing enterprise adoption of secure browsers amid rising threats to browser-based activities, including malicious extensions, phishing, and AI tool interactions. Gartner projects adoption of secure enterprise browsers to rise from 10% to 25% of organizations by 2028, underscoring the sector’s rapid evolution.

Former executives convicted for facilitating large-scale tech support fraud operations spanning 2017–2022

Updated: · First: 22.05.2026 18:32 · 📰 1 src / 1 articles

Two former executives of a call-tracking and analytics company pleaded guilty to concealing a years-long tech support fraud scheme that targeted individuals globally. Former CEO Adam Young and former CSO Harrison Gevirtz admitted to misprision of a felony and are scheduled for sentencing on June 16. They operated C.A. Cloud Attribution, Ltd. between early 2017 and April 2022, providing services including telephone numbers, call recordings, and call forwarding to known fraudsters. The fraud schemes involved deceptive pop-up ads falsely claiming system infections, directing victims to call centers charging hundreds of dollars for fictitious technical services. Some scammers remotely accessed victims' computers and stole personal and financial information to withdraw funds without authorization. Young and Gevirtz allegedly advised customers to use rotating telephone numbers to reduce complaints and prevent account terminations, and introduced fraudsters to one another.

Medium-severity Apex One zero-day patched after exploitation in on-premises deployments

Updated: 22.05.2026 16:39 · First: 22.05.2026 11:19 · 📰 2 src / 2 articles

Trend Micro patched CVE-2026-34926, a medium-severity directory traversal flaw in Apex One on-premises installations, after confirming in-the-wild exploitation targeting Windows systems. The vulnerability allowed local attackers with admin credentials to inject malicious code into server key tables and deploy payloads to agents. CISA added the CVE to its Known Exploited Vulnerabilities (KEV) catalog on May 22, 2026, requiring federal agencies to remediate by June 4, 2026. Concurrently, Trend Micro released updates addressing seven local privilege escalation vulnerabilities in the Apex One Standard Endpoint Protection agent. Threat actors have repeatedly exploited Apex One flaws in zero-day attacks, including prior incidents tracked as CVE-2025-54948 (August 2025), CVE-2022-40139 (September 2022), and CVE-2023-41179 (September 2023).

Evolving AI-Fueled Social Engineering Surge Targets Healthcare Sector

Updated: · First: 22.05.2026 16:17 · 📰 1 src / 1 articles

Healthcare organizations experienced a notable increase in sophisticated social engineering attacks in 2025, driven by AI-enhanced pretexting and phishing tactics that exploit operational urgency and trust in clinical workflows. Threat actors leveraged generative AI to craft highly targeted, context-aware communications and malicious documents, impersonating executives, vendors, and HR to manipulate healthcare professionals into divulging credentials or enabling session hijacking. The attacks align with long-standing industry vulnerabilities, including legacy systems, high-value data (e.g., patient records), and fragmented supplier ecosystems. The Verizon 2026 Data Breach Investigations Report (DBIR) identifies social engineering as a top three breach pattern in healthcare, alongside system intrusion and miscellaneous errors, collectively accounting for 81% of incidents. Pretexting—previously absent from DBIR healthcare data—now ranks as the second most common social action in healthcare breaches, reflecting a shift toward credibility-driven deception over traditional urgency-based lures.

PostgreSQL-targeting SQL injection in Drupal Core enables remote code execution

Updated: 22.05.2026 16:14 · First: 21.05.2026 06:44 · 📰 2 src / 2 articles

On May 22, 2026, Drupal confirmed active exploitation of CVE-2026-9082, a critical SQL injection vulnerability in Drupal Core’s database abstraction API that enables unauthenticated attackers to execute arbitrary SQL commands on PostgreSQL-backed sites. The flaw can lead to remote code execution, privilege escalation, or information disclosure without authentication. Patches have been issued for active Drupal branches (10.4–11.3) and manual fixes provided for end-of-life versions (8.9, 9.5). Drupal rated the risk internally as highly critical (23/25), though NIST assigned a CVSS v3 score of 6.5 (medium severity). Administrators are urged to update immediately, including those using non-PostgreSQL configurations due to upstream dependency fixes.

Expansion of fraud impact metrics beyond chargeback rates in enterprise risk programs

Updated: · First: 22.05.2026 16:09 · 📰 1 src / 1 articles

Organizations are broadening fraud measurement beyond traditional chargeback rates to include operational, reputational, and growth-related impacts as fraud techniques evolve. Emerging patterns such as account takeovers and synthetic identity fraud are driving indirect losses, customer churn, and operational overhead that are not captured by chargeback metrics. This shift reflects growing recognition that fraud prevention strategies must balance risk reduction with customer experience and revenue protection.

Kimwolf Botmaster 'Dort' Linked to Cybercrime Activities

Updated: 22.05.2026 15:11 · First: 28.02.2026 14:01 · 📰 3 src / 3 articles

Jacob Butler, a 23-year-old Canadian residing in Ottawa, has been arrested for operating the Kimwolf DDoS botnet, a variant of the AisURU botnet. Butler, known online as 'Dort,' faces a charge of aiding and abetting computer intrusion in the US, with potential penalties of up to 10 years in prison if convicted. The botnet enslaved approximately 2 million devices, primarily Android-based and traditionally 'firewalled' consumer hardware like digital photo frames and web cameras, and operated as an Android-focused successor to the Aisuru botnet. Kimwolf propagated via residential proxy networks to expand its reach and was used in cybercrime-as-a-service operations, selling access for DDoS attacks—including against Department of Defense IP addresses—peaking at 31.4 Tbps. The Kimwolf botnet emerged from a vulnerability disclosed in January 2026 and became the world’s largest and most disruptive botnet. Butler has been linked to cybercrime activities dating back to at least 2017, including DDoS attacks, doxing, email flooding, and ties to the LAPSUS$ group. Investigations revealed his involvement in Minecraft cheating software, CAPTCHA bypass tools, and temporary email services. On March 11, 2026, authorities disrupted Kimwolf and Aisuru as part of a coordinated operation in Canada and Germany, though no arrests were disclosed at the time. The US Justice Department later announced Butler’s arrest in Ottawa and unsealed seizure warrants for 45 DDoS-for-hire platforms, including one collaborating with Kimwolf.

Infostealer campaign abuses fake Google Gemini and Anthropic Claude Code sites in SEO poisoning attacks

Updated: · First: 22.05.2026 14:30 · 📰 1 src / 1 articles

A threat actor launched an SEO poisoning campaign in early 2026, creating fake websites impersonating Google’s Gemini CLI and Anthropic’s Claude Code to distribute an in-memory infostealer targeting Windows developers and enterprise users. Victims searching for legitimate AI coding tools were redirected via SEO manipulation to malicious domains that mimic official installation pages. Upon following provided PowerShell commands, users unknowingly executed an infostealer capable of harvesting browser credentials, session cookies, collaboration platform data, cryptocurrency wallet details, cloud storage files, and system metadata. The stolen data was exfiltrated to attacker-controlled command-and-control (C2) servers. The campaign demonstrates a deliberate focus on developer workstations and enterprise environments, using domain naming patterns (.co.uk, .us.com, .us.org) to suggest geographic targeting of the US and UK.

Apple’s App Store fraud prevention efforts block over $11B in six years with $2.2B in 2025 alone

Updated: 22.05.2026 13:30 · First: 21.05.2026 18:11 · 📰 2 src / 2 articles

Apple’s fraud prevention efforts have now cumulatively blocked over $11.2 billion in App Store fraud over six years, including more than $2.2 billion in 2025 alone. The company terminated 193,000 developer accounts, rejected 138,000 enrollments, and deactivated 40.4 million customer accounts due to fraud or abuse in 2025. It also blocked 5.4 million stolen credit cards and banned nearly 2 million user accounts from further transactions. Enforcement expanded through AI-driven detection models, the blocking of 1.1 billion fraudulent account creations, and takedowns of 28,000 illegitimate apps on pirate storefronts.

KEV catalog update includes Langflow RCE and Trend Micro Apex One directory traversal flaws under active exploitation

Updated: · First: 22.05.2026 08:47 · 📰 1 src / 1 articles

CISA added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog: CVE-2025-34291 in Langflow and CVE-2026-34926 in Trend Micro Apex One, citing active exploitation. CVE-2025-34291, with a CVSS score of 9.4, is an origin validation error enabling arbitrary code execution and full system compromise, exposing sensitive tokens and triggering cascading compromises across integrated services. CVE-2026-34926, rated 6.7, is a directory traversal flaw in on-premise Apex One versions allowing pre-authenticated local attackers with administrative server access to inject malicious code deployable to agents. MuddyWater, an Iranian threat actor, has exploited CVE-2025-34291 for initial access, while Trend Micro observed exploitation attempts for CVE-2026-34926 in the wild. FCEB agencies must remediate by June 4, 2026.

Critical REST API Vulnerability in Cisco Secure Workload Allows Unauthenticated Data Access and Privilege Escalation

Updated: · First: 22.05.2026 08:36 · 📰 1 src / 1 articles

A critical, unauthenticated REST API vulnerability (CVE-2026-20223, CVSS 10.0) in Cisco Secure Workload enables remote attackers to read sensitive data and modify configurations across tenant boundaries with Site Admin privileges. The flaw affects both SaaS and on-prem deployments across multiple software releases, with no available workarounds. Exploitation requires crafting a malicious API request to a vulnerable endpoint, posing significant risk to network isolation and data confidentiality.

Agentic AI Supply Chain Risk Management Evolves with Runtime Authority Tracking Requirements

Updated: · First: 22.05.2026 00:11 · 📰 1 src / 1 articles

New guidance emphasizes extending AI Bills of Materials (AI BOMs) to include runtime behavior and delegated authority for autonomous AI agents, addressing critical gaps in traditional artifact-lineage documentation. The shift reflects the rise of agentic AI systems that perform actions beyond static model/data composition, introducing dynamic supply chain risks tied to execution context, tool permissions, and decision propagation. Organizations are urged to adopt agentic-ready AI BOM frameworks to prevent incidents like unchecked AI agents deleting production databases due to authorization failures.

Google Cloud Platform API Key Revocation Delays Beyond UI Confirmation

Updated: · First: 21.05.2026 23:07 · 📰 1 src / 1 articles

Research from Aikido Security reveals that Google Cloud Platform (GCP) API keys remain active for a median of 16 minutes and up to 23 minutes after deletion, creating a critical window for attackers to exploit deleted credentials. The revocation delay varies significantly by region, with authentication success rates ranging from 5% to 79% within the first minute post-deletion. Attackers holding deleted API keys can continue making authenticated requests until Google’s infrastructure propagates the revocation, potentially exfiltrating data via enabled services like Gemini. The GCP console falsely indicates immediate revocation, leaving organizations unaware of ongoing exposure.

Unpatched Chromium Service Worker persistence flaw exposed in tracker

Updated: · First: 21.05.2026 21:13 · 📰 1 src / 1 articles

A persistent Service Worker flaw in Chromium-based browsers allowed JavaScript execution to continue running in the background after browser closure, enabling remote code execution (RCE) on devices. The vulnerability was reported in December 2022 and remained unpatched despite being marked as fixed in February 2026. Google inadvertently exposed technical details in the Chromium Issue Tracker for 14 weeks, increasing the risk of exploitation. Affected browsers include Chrome, Edge, Brave, Opera, Vivaldi, and Arc.

Shifting enterprise budget allocations for identity security in AI agent deployments

Updated: · First: 21.05.2026 18:43 · 📰 1 src / 1 articles

A 2025–2026 Omdia study indicates identity teams are establishing dedicated budgets for securing AI agents, reflecting a significant shift from traditional IAM funding models controlled by CIO or CISO offices. As AI agents proliferate and operate autonomously across hybrid environments, securing their identities—authentication, authorization, governance, and life cycle management—has become a first-class requirement. Enterprises are allocating standalone AI budgets to fund these identity security layers, creating a new funding stream distinct from IT or security budgets.

Seizure of First VPN service operations amid widespread abuse in cybercrime investigations

Updated: 21.05.2026 18:30 · First: 21.05.2026 16:09 · 📰 2 src / 2 articles

An international law enforcement operation dismantled the 'First VPN' service, widely abused in ransomware and data theft campaigns, after a multi-year investigation. Operations included the seizure of 33 servers across 27 countries, the arrest of a Ukrainian administrator, and the takeover of associated domains (1vpns.com, 1vpns.net, 1vpns.org, and onion variants). The platform was marketed as no-logging and privacy-focused but allegedly used by threat actors to conceal infrastructure and identities. Investigators infiltrated the service, collected traffic data, and identified thousands of users globally, sharing 506 user identities and 83 intelligence packages with international partners to support ongoing cybercrime investigations. Europol coordinated the operation with support from Bitdefender, advancing 21 investigations through the intelligence gathered.

Espionage Campaign Targeting Eastern Asia via Sogou Zhuyin Update Server Hijacking

Updated: 21.05.2026 17:17 · First: 29.08.2025 16:12 · 📰 3 src / 3 articles

The TAOTH espionage campaign continues to target Eastern Asia via hijacked Sogou Zhuyin update servers, distributing malware families such as C6DOOR, GTELAM, DESFY, and TOSHIS to dissidents, journalists, and business leaders. The campaign, linked to infrastructure overlap with the ITOCHU threat actor, primarily impacts Taiwan (49% of targets), Cambodia, and the U.S. Additional distribution methods include phishing websites and fake cloud storage pages. Concurrently, Chinese state-aligned hackers have expanded the use of the Linux post-exploitation framework Showboat, now confirmed to operate as a SOCKS5 proxy backdoor with rootkit-like capabilities. Showboat has been deployed against telecommunications providers in the Middle East since at least mid-2022, with victims identified in Afghanistan, Azerbaijan, and possible compromises in the U.S. and Ukraine. Its modular design enables remote shell access, file transfers, and LAN device infection, often leveraging infrastructure geolocated to Chengdu, Sichuan. The malware retrieves obfuscation code from a Pastebin snippet created in January 2022, highlighting long-term development and reuse across Chinese APT groups including Calypso, which also deploys the JFMBackdoor Windows backdoor.

Mass exploitation of signed vulnerable drivers by 54 EDR killer tools via BYOVD technique

Updated: 22.05.2026 14:38 · First: 19.03.2026 20:52 · 📰 2 src / 1 articles

Security vendors have identified 54 distinct EDR killer tools that abuse Bring Your Own Vulnerable Driver (BYOVD) techniques by exploiting 34 vulnerable, signed drivers to disable endpoint detection and response (EDR) solutions. The tools are deployed primarily by ransomware groups, affiliates, and underground service providers to neutralize security controls before executing file-encrypting malware. Attackers gain kernel-mode privileges (Ring 0) to terminate EDR processes, disable protection mechanisms, and tamper with kernel callbacks, thereby undermining endpoint defenses through abuse of Microsoft’s driver trust model. Recent research demonstrates userland-only techniques that expand the viability of BYOVD attacks. By creating software-emulated device nodes with arbitrary hardware IDs via SetupAPI or Software Device API, attackers can trigger AddDevice callbacks and assemble device stacks without physical hardware. Registry manipulation further enables binding unsigned drivers to arbitrary hardware, bypassing INF/catalog requirements while preserving driver signature validation. Additionally, filter drivers can be made accessible by placing them atop a functional device stack (e.g., Disk Drive class) to satisfy IRP_MJ_CREATE, highlighting new avenues for expanding the attack surface against conditional vulnerabilities in signed drivers. These developments suggest that the pool of exploitable vulnerable drivers may grow as attackers refine userland-only deployment methods, even as Microsoft tightens cross-signing policies.

Critical Path Traversal in Ubiquiti UniFi Network Application Enables Account Takeover

Updated: 22.05.2026 15:00 · First: 19.03.2026 15:00 · 📰 2 src / 1 articles

A critical severity vulnerability, CVE-2026-22557, in Ubiquiti’s UniFi Network Application (versions 10.1.85 and earlier) allows remote attackers on the local network to execute path traversal attacks and gain unauthorized access to system files, enabling account takeover without privileges or user interaction. This vulnerability impacts UniFi Network Application deployments, including those managed via UniFi Cloud Gateway, switches, access points, and gateways. Ubiquiti patched the issue in versions 10.1.89 and later, alongside addressing a second authenticated NoSQL injection flaw enabling privilege escalation. Ubiquiti has since patched three additional maximum-severity vulnerabilities in UniFi OS (CVE-2026-34908, CVE-2026-34909, CVE-2026-34910), enabling unauthorized system changes, file access, and command injection after network access is obtained. Two supplementary flaws (CVE-2026-33000 and CVE-2026-34911) were also addressed. Threat intelligence firm Censys estimates nearly 100,000 Internet-exposed UniFi OS endpoints globally, with approximately 50,000 located in the United States. Ubiquiti has not disclosed evidence of in-the-wild exploitation for any of these vulnerabilities, which were reported via its HackerOne bug bounty program and are exploitable in low-complexity attacks. Historical targeting of Ubiquiti products by state-backed actors and cybercriminals has involved botnet construction and traffic concealment in past campaigns.