HomeWeekly DigestsThis Week
LiveThreat Threat Intelligence

Weekly Threat Intelligence Digest — May 11 to May 18, 2026

Weekly threat intelligence digest from 481 items (72 critical, 159 high).

May 18, 2026 481 articles analyzed
LIVETHREAT WEEKLY THREAT DIGEST May 11 – May 18, 2026 This week’s data confirms a growing reality: attacks are no longer aimed directly at your own firewalls, they are slipping through the doors of your trusted vendors. Zero‑day exploits built with AI, supply‑chain compromises of npm/PyPI packages, and privileged‑account hijacks in SaaS admin consoles dominate the breach landscape. From the OpenAI TanStack supply‑chain breach to the Cisco SD‑WAN zero‑day and the Funnel Builder WordPress skimmer, the common thread is the abuse of trusted access rather than a flaw in your own code. 👉 The highest‑risk vector this week is privileged third‑party access, not unpatched software inside your perimeter. 🚨 EXECUTIVE RISK SNAPSHOT * Supply‑chain entry points explode → MSPs, CI/CD pipelines, SaaS admin APIs, and open‑source package feeds were the primary compromise routes. * Privilege determines impact → A single hijacked cloud admin account enabled ransomware at Foxconn and data loss of 3.6 TB from Canvas, affecting thousands of downstream customers. * Blind spots remain massive → OT/IoT devices, fourth‑party services, and unmanaged plugins are absent from most TPRM inventories, leaving critical exposure invisible. 🔍 WHAT CHANGED THIS WEEK * AI‑assisted exploits accelerated, with Google confirming the first AI‑crafted zero‑day and a 2FA bypass used in the wild. * Third‑party dependency attacks surged; malicious TanStack npm packages compromised two OpenAI workstations and forced macOS updates. * Critical vulnerabilities in widely‑used infrastructure (Cisco SD‑WAN, NGINX rewrite module, Fortinet Sandbox) were actively exploited within days of disclosure. * Ransomware shifted focus to high‑impact manufacturers (Foxconn) and SaaS platforms (Canvas), leveraging existing privileged access to amplify downstream disruption. 🎯 WHERE YOU ARE MOST LIKELY EXPOSED * SaaS admin consoles – especially API providers like OpenAI, Grafana, and Cloud Hosting platforms. * WordPress ecosystems – any site running Funnel Builder, WooCommerce, or other third‑party plugins. * Network edge devices – Cisco SD‑WAN controllers, NGINX web servers, and Fortinet security appliances. * CI/CD pipelines – Jenkins, Checkmarx, and other build tools that ingest third‑party packages. * Cloud hosting accounts – Azure, AWS, and Google Cloud admin credentials used by Managed Service Providers. ⚡ WHAT TPRM LEADERS SHOULD DO THIS WEEK 1. Verify privileged access inventories  • Request updated admin‑account lists from all SaaS and cloud vendors. 👉 Ask: “Which accounts have full admin rights to your production environment and how are they audited?” 2. Audit third‑party code dependencies  • Demand SBOMs for all software components, focusing on npm, PyPI, and container images. #Cybersecurity #TPRM #VendorRisk #SupplyChainSecurity #ThreatIntel #LiveThreat #VerisqAI

Articles Referenced in This Digest 481 items

Advisory (92)

Critical[local] Remote Sunrise Helper for Windows 2026.14 - Remote Code Execution
HighDebian 13.5 point release lands with security fixes, bug patches
HighMusk v. Altman: A Warning for Enterprise AI
HighAI Doctors? Lawsuits Say No, Some Doctors Say Yes
HighMicrosoft backpedals: Edge to stop loading passwords into memory
HighThe time of much patching is coming
HighWhen configuration becomes a vulnerability: Exploitable misconfigurations in AI apps
HighUnderstanding the Hidden Cost of Faster Payments
HighProxying the Unproxyable? Sending EXE traffic to a Proxy, (Wed, May 13th)
HighThe hidden risk of non-human identities in AI adoption
HighWhy Hospitals Must Rethink Cyber Resilience
HighTexas sues Netflix over alleged data practices that create ‘surveillance machinery’ without user consent
HighInstagram messaging encryption removed, and privacy advocates are pushing back
HighInstagram removed end-to-end encryption for DMs. What should users do?
MediumRocky Linux launches opt-in security repository for urgent fixes
Medium Meta’s confusing new approach to chat privacy
Medium Why Malwarebytes blocks some Yahoo Mail redirects
MediumMicrosoft says some users can't install Office on Windows 365 devices
MediumYour Android phone is getting agentic powers with Gemini Intelligence - here's how and when
MediumFCC Softens Ban on Foreign-Made Routers
MediumCloudflare Cuts 1,100, Arctic Wolf Axes 250 Amid AI Surge
MediumWhy Changing Passwords Doesn’t End an Active Directory Breach
MediumThe patching treadmill: Why traditional application security is no longer enough
InformationalProduct showcase: McAfee + ChatGPT integration turns doubt into a scam check
InformationalClosing the Gap: The Regulatory and Structural Maturation of Digital Assets
InformationalThe best NAS devices of 2026: Expert tested and reviewed
InformationalVibe Coding Cheat Sheet: Tools, Prompts, Security Tips, and More
InformationalSecurityScorecard Buys Driftnet for More Internet Visibility
Informational6 Best VPNs for Canada in 2026 (Free & Paid Options Compared)
LowGoogle’s Default 15GB Free Storage Is Ending for Some New Accounts
InformationalThe Next Cybersecurity Challenge May Be Verifying AI Agents
InformationalMicrosoft to automatically roll back faulty Windows drivers
InformationalAmazon Prime Day 2026 is coming in June: Everything to know about dates, deals, and what to expect
LowThis new Claude skill saves you from bad contracts - and costs less than a lawyer
LowSwitch to plug-in solar? My advice after testing the DIY energy tech at home
InformationalKeycard helps developers secure autonomous AI agents with scoped access
LowAkamai to acquire LayerX for $205 million
LowGoogle lets Workspace admins apply one policy across all SAML apps
InformationalThinking carefully before adopting agentic AI
Informational[Guest Diary] New Malware Libraries means New Signatures, (Fri, May 15th)
InformationalApple’s iPhone Privacy Feature Expands to More Users Worldwide
InformationalInside the SOC: AI-powered DNS defense against ransomware
InformationalAI Drives Cybersecurity Investments, Widening 'Valley of Death'
Low10 Google Maps settings I immediately change on every new phone - and why
InformationalThe best VPN routers of 2026: Expert tested and reviewed
LowThe best secure browsers for privacy in 2026: Expert tested
LowThe best microSD cards of 2026: Expert tested and reviewed
LowI'm no Copilot fan, but these 6 new AI skills turned Edge into my favorite mobile browser
InformationalLABScon25 Replay | Breach Alpha: Trading on Cyber Fallout
InformationalCERN’s open source KiCad library gives the world 17,000 circuit board components
InformationalMicrosoft turns Copilot Studio into an AI agent control center
InformationalMicrosoft’s WinUI agent plugin trims token use by over 70% during development
InformationalCofense adds AI-powered campaign detection to stop phishing attacks
InformationalHYCU aiR detects insider risk and AI activity from backups
InformationalFedRAMP High Authorized: Qualys TotalCloud CNAPP – From Compliance to Defense 
InformationalStop Chasing Threats: Top 3 Insights from the SANS Attack Surface Management Survey
InformationalAchieve Federal-Grade M365 Security: Governing with Qualys SSPM and SCuBA
InformationalDefense in depth for autonomous AI agents
Informational May 2026 Patch Tuesday: no zero-days but plenty to fix
InformationalUS FCC Lets Consumer Routers Receive Updates Through 2028
LowAndroid 17 to expand banking scam call and privacy protections
InformationalWhy business architects are poised to lead the corporate AI revolution
LowFirst look at Googlebook: A premium Chromebook alternative for Android users
InformationalGoogle will let you watch YouTube videos on Android Auto now - is your car supported?
LowGooglebook vs. Chromebook: Why I'm hopeful that both laptop brands can coexist
LowI'm a lawn expert, and here's my favorite trick for finding your perfect robot mower
LowDownload: The IT and security field guide to AI adoption
InformationalVeeam Intelligent ResOps unifies data context and recovery
InformationalOpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation
InformationalDefending consumer web properties against modern DDoS attacks
Low5 Ways To Keep AI In Check
Low1.8 Billion Gmail Users May Want to Check This AI Privacy Setting
InformationalTech Can't Stop These Threats — Your People Can
LowCan hackers break encrypted USB drives? I tried to find out
InformationalWindows 11's new Low Latency Profile may give your PC the speed boost it deserves
InformationaliOS 26.5 is out, bringing encrypted RCS messaging to iPhone and Android users
InformationalCybersecurity jobs available right now: May 12, 2026
InformationalHEIDI: Free IDE security plugin for open-source vulnerability checks
LowWhy we use CAPTCHAs, (Mon, May 11th)
LowWelcoming the Costa Rican Government to Have I Been Pwned
InformationalWelcoming the Bangladesh Government to Have I Been Pwned
InformationalWebinar this week: Prevention alone is not enough against modern attacks
Informational10 questions to ask when using AI models to find vulnerabilities
InformationalStopping bugs before they ship: The shift to preventative security
InformationalBeyond the cleanup job: Redefining application security for the modern enterprise
InformationalThe questionnaire-based TPRM model is broken, and TrustCloud has a fix
InformationalSailPoint Agentic Fabric expands identity governance to autonomous AI agents
InformationalAlation AI Governance creates a system of record for AI oversight
InformationalRed Hat extends open source technology into space
InformationalZimperium Mobile App Response Agent helps security teams counter mobile attacks
LowYour Purple Team Isn't Purple — It's Just Red and Blue in the Same Room
InformationalBringing AI Code Security into Qualys ETM

Breach (20)

CriticalFunnel Builder WordPress plugin bug exploited to steal credit cards
HighSecurity Affairs newsletter Round 577 by Pierluigi Paganini – INTERNATIONAL EDITION
HighGrafana GitHub Token Breach Led to Codebase Download and Extortion Attempt
HighGrafana Says It Rejected Ransom Demand After Source Code Theft
HighOpenAI hit by supply chain attack linked to malicious TanStack packages
HighMore than $10 million stolen from crypto platform THORChain
HighCongress Puts Heat on Instructure After Canvas Outage
HighOpenAI asks macOS users to update after TanStack npm supply chain attack
HighCanada Life - 237,810 breached accounts
HighInstructure settles with hackers following massive student data theft
HighInstructure pays ransom after Canvas incident as Congress announces investigation
HighInstructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak
High Stolen Canvas data was “returned” after hacker agreement, Instructure says
HighCushman & Wakefield - 310,431 breached accounts
HighHackers Hid Inside Major UK Water Utility for Nearly 2 Years
HighInstructure confirms hackers used Canvas flaw to deface portals
HighGM agrees to $12.75M California settlement over sale of drivers’ data
HighPoor security left hackers inside water company network for nearly two years
High A week in security (May 4 – May 10)
MediumIdentity security firm SailPoint discloses GitHub repository breach

Ransomware (2)

CriticalWannaCry, the ransomware attack that changed the history of cybersecurity
HighFoxconn Attack Highlights Manufacturing's Cyber Crisis

ThreatIntel (314)

CriticalResearchers uncover YellowKey and GreenPlasma Windows Zero-Days
CriticalCisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access
CriticalCISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits
CriticalNGINX Rift: an 18-year-old flaw in the world’s most deployed web server just came to light
CriticalWindows 11 and Microsoft Edge hacked at Pwn2Own Berlin 2026
CriticalCisco warns of new critical SD-WAN flaw exploited in zero-day attacks
CriticalHackers exploit auth bypass flaw in Burst Statistics WordPress plugin
CriticalSiemens Ruggedcom Rox
CriticalSiemens Opcenter RDnL
CriticalSiemens SENTRON 7KT PAC1261 Data Manager
CriticalSiemens Solid Edge
CriticalSiemens Teamcenter
CriticalSiemens Ruggedcom Rox
CriticalUniversal Robots Polyscope 5
CriticalSiemens Simcenter Femap
CriticalSiemens Ruggedcom Rox
CriticalSiemens gWAP
CriticalSiemens Siemens ROS#
CriticalRussian Attacks on Polish Water Utilities Use Fear as Weapon
CriticalQuest KACE SMA flaw CVE-2025-32975: when one unpatched tool opens the door to 60 organizations
CriticalMicrosoft Patch Tuesday for May 2026 fix 138 bugs, some of them are alarming
Critical[webapps] Flowise < 3.0.5 - Missing Authentication for Critical Function
Critical73 Seconds to Breach, 24 Hours to Patch: The Case for Autonomous Validation
CriticalWindows BitLocker zero-day gives access to protected drives, PoC released
CriticalNew critical Exim mailer flaw allows remote code execution
CriticalMicrosoft’s Patch Tuesday Update Targets 120 Security Flaws
CriticalMicrosoft’s agentic security system found four critical Windows RCE flaws
CriticalMicrosoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws
CriticalIt's Patch Tuesday for Microsoft and Not a Zero-Day In Sight
CriticalMicrosoft May 2026 Patch Tuesday: Many fixes, but no zero-days
CriticalMicrosoft Patch Tuesday for May 2026 — Snort rules and prominent vulnerabilities
CriticalPwn2Own Berlin 2026 Hits Capacity as Rejected Hackers Release 0-Days
CriticalCritical Patches Issued for Microsoft Products, May 12, 2026
CriticalMultiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution
CriticalMicrosoft May 2026 Patch Tuesday fixes 120 flaws, no zero-days
CriticalFortinet warns of critical RCE flaws in FortiSandbox and FortiAuthenticator
CriticalMicrosoft and Adobe Patch Tuesday, May 2026 Security Update Review
CriticalGoogle Says Hackers Used AI to Build Zero-Day Exploit
CriticalSAP unveils Autonomous Enterprise for AI-driven business operations
CriticalFuji Electric Tellus
CriticalABB Automation Builder Gateway for Windows
CriticalABB AC500 V3 Multiple Vulnerabilities
CriticalABB WebPro SNMP Card PowerValue Multiple Vulnerabilities
CriticalSoftware Bill of Materials for AI - Minimum Elements
CriticalSubnet Solutions PowerSYSTEM Center
CriticalABB AC500 V3 Stack Buffer Overflow in Cryptographic Message Syntax
CriticalAttackers exploit cPanel CVE-2026-41940 to deploy Filemanager Backdoor
CriticalSAP fixes critical vulnerabilities in Commerce Cloud and S/4HANA
CriticalcPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor
HighWhen ransomware hits, confidence doesn’t restore endpoints
HighAI shrinks vulnerability exploitation window to hours
HighThe AI backdoor your security stack is not built to see
HighTycoon2FA hijacks Microsoft 365 accounts via device-code phishing
HighScammers Send Physical Phishing Letters to Steal Ledger Wallet Seed Phrases
HighRussian APT Turla builds long-term access tool with Kazuar Botnet evolution
HighFast16: Pre-Stuxnet Sabotage Tool Was Built to Subvert Nuclear Weapons Simulations
HighRussian hackers turn Kazuar backdoor into modular P2P botnet
HighThe Boring Stuff is Dangerous Now
HighOpenAI Warns Mac Users to Update Apps After Supply-Chain Attack
HighHackers Use PyInstaller and AMSI Patching to Deliver XWorm RAT v7.4
HighGremlin Stealer's Evolved Tactics: Hiding in Plain Sight With Resource Files
HighBypassing On-Camera Age-Verification Checks
HighInside the REMUS Infostealer: Session Theft, MaaS, and Rapid Evolution
HighPopular node-ipc npm package compromised to steal credentials
HighThieves unlock stolen iPhones using cheap tools sold on Telegram
HighTanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates
HighTurla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access
High Attackers replaced JDownloader installer downloads with malware
HighPwn2Own Berlin 2026, Day One: $523,000 paid out, AI products fall
HighGhostwriter group resumes attacks on Ukrainian Government targets
HighCalPhishing Scam Uses EvilTokens Kit, Outlook Invites to Steal M365 Sessions
HighThe AI oversight paradox: Is the investment worth the cost of watching it?
HighBreach Roundup: US Lawmakers Sound Alarm on AI Bug Hunters
HighDevice Code Phishing is an Evolution in Identity Takeover
HighHow Dangerous Is Anthropic’s Mythos AI?
High18-year-old NGINX vulnerability allows DoS, potential RCE
HighTeamPCP hackers advertise Mistral AI code repos for sale
HighODNI taps officials to coordinate response to foreign election threats
HighSiemens SIPROTEC 5
HighSiemens SIMATIC
High'FrostyNeighbor' APT Carefully Targets Govt Orgs in Poland, Ukraine
HighAnthropic's Mythos is evolving faster than expected, reports AI safety agency
HighKimsuky targets organizations with PebbleDash-based tools
HighAI cyber capability is speeding past earlier projections
HighHow AI Hallucinations Are Creating Real Security Risks
HighGhostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike
HighKazuar: Anatomy of a nation-state botnet
HighCryptohack Roundup: Banking Trojan Targets Crypto Firms
High Deepfake sextortion forces schools to remove student photos from websites
HighNitrogen Ransomware claims massive data theft from Foxconn
HighWhen ransomware gets physical: cybercriminals turn to threats of violence
HighDark Reading Celebrates 20 Years as a Leading Authority on Cybersecurity, Highlighting the People, Events, Ideas, and Technologies Shaping the Modern Risk Landscape
HighTables Turn on 'The Gentlemen' RaaS Gang With Data Leak
HighMachine identities outnumber humans 109 to 1
HighOver 70% of organizations hit by identity breaches
HighExaforce Brings in $125M for Real-Time Cyber Reasoning
HighAbrigo - 711,099 breached accounts
HighOpenLoop Health confirms January 2026 Data breach affecting 716,000
HighSmashing Security podcast #467: How ShinyHunters hacked the world’s biggest universities
HighFoxconn confirms cyberattack claimed by Nitrogen ransomware gang
HighWest Pharmaceutical says hackers stole data, encrypted systems
HighKDE gets over €1 million investment to strengthen security and core infrastructure
HighMass Supply-Chain Attack Slams npm and PyPi, Hits Mistral AI
HighWhy Canadian Telecom Providers Are Prime Targets for Cyberattacks
HighResearchers open-source a Wi-Fi cyber range for security training
HighSandyaa: Open-source autonomous security bug hunter
HighNetSPI AI-powered Continuous Pentesting identifies high-impact vulnerabilities
HighHackers accessed BWH Hotels reservation system for months
HighMultiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
HighŠkoda warns of customer data breach after online shop hack
HighWest Pharmaceutical warns of ransomware attack impacting business operations
HighWorm Redux: Fresh Mini Shai-Hulud Infections Bite Supply Chain
HighAmazon Quick authorization bypass let users reach blocked AI chat agents
HighExaforce raises $125 million to respond to AI-powered attacks
HighNew TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots
HighRubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded
HighNew Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution
HighUndermining the trust boundary: Investigating a stealthy intrusion through third-party compromise
HighHow Organizations Are Strengthening Defenses Against Scattered Spider
High 1 in 8 employees have sold company logins or know someone who has
High Fake Claude search results lure Mac users into ClickFix attack
HighState-sponsored actors, better known as the friends you don’t want
HighAndroid banking Trojan TrickMo evolves using TON network for C2
HighOperation HumanitarianBait Uses Fake Aid Documents to Deploy Python Spyware
HighState of ransomware in 2026
HighMac Users Warned Over Fake Claude Install Instructions
HighFCC Robocall Crackdown Raises Privacy Concerns Over Mandatory ID Checks
HighThe hidden smart fridge risks that emerge years after purchase
HighTeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack
HighTables Turned: Gentlemen Ransomware Group Suffers Data Leak
HighGoogle warns artificial intelligence is accelerating cyberattacks and zero-day exploits
HighGoogle Says Hackers Used AI to Develop a Zero-Day Exploit
HighInside AD CS Escalation: Unpacking Advanced Misuse Techniques and Tools
HighOfficial CheckMarx Jenkins package compromised with infostealer
HighUK water company allowed hackers to lurk undetected for nearly two years, regulator finds
HighFCC pushes ban on security updates for foreign-made routers, drones to 2029
HighLinux is getting a security wake-up call - why it was inevitable and I'm not worried
HighPolice take down relaunched criminal marketplace with 22,000 users, €3.6 million in revenue
HighFake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads
High⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More
HighThe Threat Window Is Shrinking. The Response Gap Isn't
HighHackers Exploit Vercel GenAI to Mass-Produce Convincing Phishing Sites
HighTrickMo Android banker adopts TON blockchain for covert comms
MediumAI Voice Cloning: The Technology Behind It, Who’s Building It, and Where It’s Headed
MediumWhat 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface
MediumMaximum Severity Cisco SD-WAN Bug Exploited in the Wild
MediumNIST NVD Enrichment Policy Change: Prioritizing Vulnerabilities with Attacker Behavior Signals
MediumBroadcom releases VMware Fusion security update for root access bug
MediumLinux Kernel bug Fragnesia allows local root access attacks
MediumU.S. CISA adds a flaw in Cisco Catalyst SD-WAN  to its Known Exploited Vulnerabilities catalog
MediumFake Job Interview Apps Drop JobStealer Malware on Windows and macOS
MediumSiemens Industrial Devices
MediumSiemens SIMATIC
MediumCISA Adds One Known Exploited Vulnerability to Catalog
Medium5 Key Takeaways from “Inside the Shape-Shifting Inbox: The New Playbook for SOC Teams”
MediumOngoing exploitation of Cisco Catalyst SD-WAN vulnerabilities
MediumChina-Linked Twill Typhoon Uses Fake Apple and Yahoo Sites for Espionage
MediumFamousSparrow Targeted Oil and Gas Industry via MS Exchange Server Exploit
MediumNew Fragnesia Linux flaw lets attackers gain root privileges
MediumMicrosoft on pace to break annual vulnerability record as AI-driven patch wave takes hold
MediumGemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data
MediumMost Remediation Programs Never Confirm the Fix Actually Worked
MediumAzerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation
MediumMicrosoft's MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday
Medium&#x5b;GUEST DIARY&#x5d; Tearing apart website fraud to see how it works., (Wed, May 13th)
MediumThe world’s most “Dangerous” AI, Anthropic’s Mythos, found only one flaw in curl
MediumFake Claude Code Installer Targets Developers With Browser Credential Stealer
MediumMultiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
MediumZDI-26-308: Ivanti Endpoint Manager RemoteControlAuth Exposed Dangerous Method Information Disclosure Vulnerability
MediumZDI-26-309: Microsoft Windows Message Queueing Double Free Local Privilege Escalation Vulnerability
MediumZDI-26-310: Microsoft Windows splwow64 Race Condition Local Privilege Escalation Vulnerability
MediumZDI-26-311: Apple macOS CoreSymbolication Out-Of-Bounds Read Information Disclosure Vulnerability
MediumZDI-26-312: Apple Safari Web Inspector WebCore Style Resolver Use-After-Free Remote Code Execution Vulnerability
MediumZDI-26-313: Apple Safari Regular Expression Duplicate Named Groups Heap-based Buffer Overflow Remote Code Execution Vulnerability
MediumZDI-26-314: Apple macOS USD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
MediumZDI-26-315: Apple macOS USD Out-Of-Bounds Read Information Disclosure Vulnerability
MediumZDI-26-316: Siemens Simcenter Femap IPT File Parsing Memory Corruption Remote Code Execution Vulnerability
MediumZDI-26-317: Siemens Simcenter Femap IPT File Parsing Memory Corruption Remote Code Execution Vulnerability
MediumCopy.Fail Linux Vulnerability
MediumJetBrains TeamCity vulnerability allows privilege escalation, API exposure (CVE-2026-44413)
MediumThreatDown ITDR prevents credential-based attacks
MediumStealthy hackers exploit cPanel flaw in active backdoor campaign (CVE-2026-41940)
MediumShai Hulud attack ships signed malicious TanStack, Mistral npm packages
MediumLLMs and Text-in-Text Steganography
MediumHackers Use AI for Exploit Development, Attack Automation
MediumDirty Frag is a new Linux bug putting your system at risk - and there's no easy fix yet
MediumCops Shutter Rebooted German Language Cybercrime Market
InformationalISC Stormcast For Friday, May 15th, 2026 https://isc.sans.edu/podcastdetail/9934, (Fri, May 15th)
InformationalSecurityScorecard Snags Driftnet to Level Up Threat Intelligence
InformationalTaiwan Incident Highlights Cybersecurity Gaps in Rail Systems
InformationalHome Depot and Lowe's have power tool deals for up to $400 off ahead of Memorial Day
InformationalCable, cords, and adapters I never throw away - and why these accessories are worth saving
InformationalNew infosec products of the week: May 15, 2026
InformationalZombie linkages are keeping expired domains trusted for years
InformationalDeepfake detection is losing ground to generative models
InformationalStealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets
InformationalAkamai to Buy LayerX for $205M to Expand AI Browser Security
InformationalMustang Panda Linked to New Modular FDMTP Backdoor
InformationalGo-Ahead for AI Chip Sales to 10 Chinese Firms Raise Alarms
InformationalHow Fintech APIs Are Modernizing Business Cash Flow Management
InformationalSuspected Dream Market kingpin arrested after gold bars sent to his home address
Informational[webapps] ePati Antikor NGFW 2.0.1301 - Authentication Bypass
Informational[webapps] Apache HertzBeat 1.8.0 - Remote Code Execution
InformationalWelcoming the Bahamian Government to Have I Been Pwned
InformationalUpcoming Speaking Engagements
InformationalKongTuke hackers now use Microsoft Teams for corporate breaches
InformationalCyber-Enabled Cargo Crime: How Cybercrime Tradecraft is Used to Steal Freight
InformationalOpenAI confirms security breach in TanStack supply chain attack
InformationalSiemens SIMATIC S7 PLC Web Server
InformationalSiemens Ruggedcom Rox
InformationalBeyond Acceleration and Automation: How AI + Intelligence Changes Cyber Defense
InformationalFamousSparrow targets Azerbaijani energy sector in multi-wave espionage campaign
InformationalApril 2026 Cyber Attacks Statistics
InformationalUS charges suspected Dream Market admin arrested in Germany
InformationalDell confirms its SupportAssist software causes Windows BSOD crashes
InformationalISC Stormcast For Thursday, May 14th, 2026 https://isc.sans.edu/podcastdetail/9932, (Thu, May 14th)
InformationalSimple bypass of the link preview function in Outlook Junk folder, (Thu, May 14th)
InformationalAttackers Weaponize RubyGems for Data Dead Drops
InformationalCheckbox Assessments Aren't Fit to Measure to Risk
InformationalBest Buy just slashed the price on this 8TB SanDisk SSD - and I'd recommend it
InformationalGooglebook looks promising, but one big laptop brand is conspicuously absent
InformationalBest Buy is selling last year's LG OLED TV for 50% off - and I can vouch for it
InformationalMy new favorite Android file manager is way better than Google's default - and it's free
InformationalAdobe Express vs Canva: Which design tool is better?
InformationalI'm following the 60-60 rule for headphone listening, and my future self will thank me for it
InformationalClosing the AI governance gap in your enterprise
InformationalVector embedding security gap exposes enterprise AI pipelines
InformationalInstructure Pays ShinyHunters Ransom to Little Likely Return
InformationalIMF Warns AI Has Made Cyber Risk a Financial Stability Threat
InformationalCisco CEO Robbins Ties AI Push to Unpatchable Tech Risk
InformationalTeamPCP Used Mini Shai-Hulud Worm to Poison Over 400 npm and PyPI Packages
InformationalInstructure Reaches Deal with ShinyHunters to Prevent Canvas Data Leak
InformationalTeamPCP Claims Sale of Mistral AI Repositories Amid Mini Shai-Hulud Attack
Informational[webapps] coreruleset 4.21.0 - Firewall Bypass
Informational[webapps] glances 4.5.2 - command injection
Informational[webapps] Ninja Forms Uploads - Unauthenticated PHP File Upload
InformationalOpenAI’s GPT-5.5 is as Good as Mythos at Finding Security Vulnerabilities
InformationalMicrosoft fixes Windows Autopatch bug installing restricted drivers
InformationalMicrosoft fixes BitLocker recovery issue only for Windows 11 users
InformationalWebinar tomorrow: Why security alone won't stop modern attacks
InformationalIranian hackers targeted major South Korean electronics maker
InformationalUK moves to shield security researchers in cybercrime law overhaul
InformationalEuropean Commission head pushes creation of new law delaying teens’ social media access
InformationalAlleged Dream Market admin arrested in Germany after US indictment
InformationalCofense Launches AI-Driven Campaign Detection to Unified Phishing Defense Platform
Informational5 Reasons Vision AI Changes Phishing Remediation
InformationalState-sponsored actors, better known as the friends you don’t want
Informational🎙️SECURITY.COM The Podcast: Iran’s Cyber Warfare Playbook: What Defenders Need to Know Right Now
InformationalCanvas Breach Hackers Reach Deal After Claiming 275M Records Stolen
InformationalHackers Claim 11M Files Stolen From Foxconn, Supplier to Apple and Nvidia
InformationalGoogle Launches New Android Security Features to Fight Scams, Theft
InformationalChina's 'FamousSparrow' APT Nests in South Caucasus Energy Firm
InformationalLatAm Vibe Hackers Generate Custom Hacking Tools on the Fly
InformationalSony just gave me a compelling reason to put my AirPods and Bose headphones away
InformationalHow to learn Claude Code for free with Anthropic's AI courses - one took me just 20 minutes
InformationalRed Hat Desktop vs. Fedora Hummingbird: Which AI development Linux path is right for you?
InformationalWhat is digital transformation? Everything you need to know about how technology is changing business
InformationalYour TV's RS-232 port is a powerful automation tool - how to unlock it (and what it can do)
InformationalGet Audible for 30 days totally free - here's how
InformationalT-Mobile will give you $400 just for switching - here's how to qualify
InformationalVersa CSPM brings continuous visibility to cloud risk and compliance exposure
InformationalApricorn hardens ASK3 encrypted USB drive for extreme conditions
InformationalTuskira’s Kairo exposes hidden AI-driven breach paths
InformationalSignal responds to phishing attacks with new in-app security warnings
InformationalWhatsApp adds Incognito Chat for private Meta AI conversations
InformationalAndroid Adds Intrusion Logging for Sophisticated Spyware Forensics
Informational[Webinar] How Modern Attack Paths Cross Code, Pipelines, and Cloud
LowBreaking things to keep them safe with Philippe Laulheret
InformationalISC Stormcast For Wednesday, May 13th, 2026 https://isc.sans.edu/podcastdetail/9930, (Wed, May 13th)
InformationalOver 1 Million Baby Monitors, Security Cameras Exposed Through Meari Flaws
InformationalHow I made my Windows 11 widgets truly useful: 8 simple tweaks to try before you hide them
InformationalI switched to a Wi-Fi 7 mesh router at home, and the faster download speed is so worth it
InformationalElementary OS vs. Linux Mint: I compared my once favorite distro to the Windows alternative
InformationalChromebook vs. Googlebook: How I'm deciding which laptop to upgrade to next
InformationalFedora Kinoite vs. Silverblue: My verdict after testing both immutable Linux distros
InformationalFedora Hummingbird brings the container security model to a Linux host OS
InformationalAndroid pushes new scam, theft, and AI protections in 2026 update wave
InformationalDefense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark
InformationalAccelerating detection engineering using AI-assisted synthetic attack logs generation
InformationalTop Video Downloaders in 2026: Why Wondershare UniConverter Remains a Strong Choice
InformationalCanvas Hackers ShinyHunters Say Their Official Domain Was Suspended
InformationalMicrosoft May 2026 Patch Tuesday, (Tue, May 12th)
InformationalWindows 11 KB5089549 & KB5087420 cumulative updates released
InformationalMicrosoft releases Windows 10 KB5087544 extended security update
InformationalSignal adds security warnings for social engineering, phishing attacks
LowWebinar: Fixing the gaps in network incident response
InformationalUK fines water supplier $1.3M for exposing data of 664k customers
InformationalUS govt seeks Instructure testimony on massive Canvas cyberattack
InformationalEuropean countries are exporting surveillance tech to countries with poor human rights records, report says
InformationalCongressman launches inquiry into how food retailers use surveillance pricing
InformationalFoxconn confirms cyberattack impacting North American factories
Informational20 Leaders Who Built the CISO Era: 2 Decades of Change
InformationalHugging Face Packages Weaponized With a Single File Tweak
InformationalLinux Mint vs. Elementary OS: I compared both distros, and here's my advice
InformationalYour iPhone RCS chats with Android are encrypted in iOS 26.5: How to verify E2E is enabled
InformationalI overlooked this Sony headphone feature for years - Apple and Bose have nothing like it
InformationalAndroid will hang up on banking scammers for you - how its new anti-spoofing feature works
InformationalI'm a devoted iPhone user but Android 17 is tempting me with its new video and social features
InformationalGeneral Motors to pay $12.75 million over driver data sales
InformationalInstructure took a risky approach to recover stolen Canvas data
InformationaliOS 26.5 Brings Default End-to-End Encrypted RCS Messaging Between iPhone and Android
InformationalWhy Agentic AI Is Security's Next Blind Spot
InformationalMini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages
InformationalWebinar: What the Riskiest SOC Alerts Go Unanswered - and How Radiant Security Can Help
InformationalSeedworm: Iran-Linked Hackers Breached Korean Electronics Maker in Global Spying Campaign
InformationalISC Stormcast For Tuesday, May 12th, 2026 https://isc.sans.edu/podcastdetail/9928, (Tue, May 12th)
InformationalInstructure reaches 'agreement' with ShinyHunters to stop data leak
InformationalOpenSSL, Certpinning and Memory patching. Sounds fun right?
InformationalNew GhostLock tool abuses Windows API to block file access
InformationalWhat It Costs to Hire a Hacker on the Dark Web in 2026
InformationalCyber Espionage Group Targets Aviation Firms to Steal Map Data
InformationalLinux developers weigh emergency “killswitch” for vulnerable kernel functions
InformationalCrimenetwork returns after takedown, dismantled again by German authorities
InformationalISC Stormcast For Monday, May 11th, 2026 https://isc.sans.edu/podcastdetail/9926, (Mon, May 11th)

Vulnerability (53)

CriticalNew Windows 'MiniPlasma' zero-day exploit gives SYSTEM access, PoC released
CriticalAttackers exploit Funnel Builder bug to inject e-skimmers into e-stores
CriticalSECURITY AFFAIRS MALWARE NEWSLETTER ROUND 97
CriticalNGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE
CriticalMicrosoft rejects critical Azure vulnerability report, no CVE issued
CriticalFunnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming
CriticalCritical ‘Claw Chain’ Vulnerabilities Put Thousands of OpenClaw AI Servers at Risk
CriticalNew Cisco SD-WAN Zero-Day Grants Admin Access
CriticalThe First AI-Crafted Zero-Day Was Easy to Spot. The Next One May Not Be
CriticalUnpatched Microsoft Exchange Server vulnerability exploited (CVE-2026-42897)
CriticalCisco patches another actively exploited SD-WAN zero-day (CVE-2026-20182)
CriticalCISA orders all federal agencies to patch exploited bug in Cisco SD-WAN systems by Sunday
CriticalThe third major Linux kernel flaw in two weeks has been found - thanks to AI
Critical18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE
CriticalWindows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation
CriticalThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories
CriticalCritical Fortinet vulnerabilities fixed in FortiSandbox and FortiAuthenticator
CriticalHackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation
CriticalU.S. CISA adds a flaw in BerriAI LiteLLM to its Known Exploited Vulnerabilities catalog
CriticalLyrie.ai Joins First Batch of Anthropic’s Cyber Verification Program
HighHackers earn $1,298,250 for 47 zero-days at Pwn2Own Berlin 2026
HighWeek in review: Cisco patches SD-WAN 0-day, unpatched Microsoft Exchange Server flaw exploited
HighPwn2Own Berlin 2026, Day Three: DEVCORE Crowned Master of Pwn, $1.298 Million Total
HighU.S. CISA adds a flaw in Microsoft Exchange Server to its Known Exploited Vulnerabilities catalog
HighA Vulnerability in Microsoft Exchange Server Could Allow for Arbitrary Code Execution
HighThe 4th Linux kernel flaw this month can lead to stolen SSH host keys
HighTwo Unpatched Windows Exploits Target BitLocker, SYSTEM Access
HighCVE-2026-42897: Microsoft confirms active exploitation of Exchange Server zero-day
HighPwn2Own Berlin 2026, Day Two: $385,750 more, Microsoft Exchange falls, and the running total crosses $900K
High[local] Remote Sunrise Helper for Windows 2026.14 - Unauthenticated File/Directory Listing
High[local] Windows Snipping Tool - NTLMv2 Hash Hijack
HighAvada Builder WordPress plugin flaws allow site credential theft
HighMicrosoft Exchange, Windows 11 hacked on second day of Pwn2Own
HighApril 2026 CVE Landscape
HighOn-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email
HighFour OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence
HighCISA Adds One Known Exploited Vulnerability to Catalog
HighMicrosoft warns of Exchange zero-day flaw exploited in attacks
High[webapps] PJPROJECT 2.16 - Heap Bufferoverflow
High[webapps] WordPress Plugin Supsystic Contact Form 1.7.36 - SSTI
HighFragnesia: New Linux kernel LPE bug was spawned by Dirty Frag patch (CVE-2026-46300)
HighNew Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption
HighPraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure
HighLinux Defenders Face Patch and Exploit Race
HighAI-Built Zero-Day Nearly Powered Mass Attack
HighHow Cloudflare responded to the “Copy Fail” Linux vulnerability
HighApple Patches Everything, (Mon, May 11th)
HighGoogle: Hackers used AI to develop zero-day exploit for web admin tool
HighDirty Frag: Linux kernel hit by second major security flaw in two weeks
High'Dirty Frag' Exploit Poised to Blow Up on Enterprise Linux Distros
HighGoogle researchers uncover criminal zero-day exploit likely built with AI
High Yarbo responds to robot flaws that could mow down their owners
High9-Year-Old Dirty Frag Vulnerability Enables Root Access on Linux Systems

Daily breach, advisory, and vulnerability briefs publish every weekday.

View Live Breach Feed ← All Weekly Digests