114Articles
8Categories
2026-05-08Date
🚨
Your refresh plan has a CVE blind spotThe conversation is straightforward, but the problem behind it is not. The customer bought servers in 2017 and typically refresh every five to six years. Generally, around the 2022 to 2023 timeframe, they would have looked to buy new. Historically, that is what would have happene…
KEV
🚨
CVE-2026-6973: Authenticated Admin RCE In Ivanti EPMM Added to CISA KEVCVE-2026-6973: Authenticated Admin RCE In Ivanti EPMM Added to CISA KEV Ivanti has patched CVE-2026-6973, a high-severity remote code execution (RCE) vulnerability affecting Ivanti Endpoint Manager Mobile (EPMM) on-prem deployments. The vulnerability has been exploited in the wil…
KEV
🚨
Why the approaching flood of vulnerabilities changes everything — and what to do about itAI-driven discovery, NIST’s retreat from universal enrichment, and the end of “good enough” vulnerability management Key takeaways AI-driven discovery tools are accelerating CVE volume, resulting in an expected deluge of 59,000 disclosed vulnerabilities this year.   NIST has…
KEV
🚨
Dirty Frag (CVE-2026-43284, CVE-2026-43500): Frequently asked questions about this Linux kernel privilege escalation vulnerability chainWeeks after the Copy Fail vulnerability was revealed, a new Linux kernel escalation vulnerability has been uncovered. Dubbed “Dirty Frag,” this flaw could allow a local user to gain root access on affected Linux distributions. Public exploit code has been released prior to patche…
KEV
🚨
Five new holes, one exploited, found in Ivanti Endpoint Manager MobileThe five new vulnerabilities discovered in Ivanti’s on-premises mobile endpoint management solution are a “classic example of the legacy trap” that CSOs must avoid, says an expert. “Patch today to survive the weekend,” said Robert Enderle of the Enderle Group, “but start planning…
KEV
🐛
13 new critical holes in JavaScript sandbox allow execution of arbitrary code
🐛
Palo Alto Networks firewall flaw has been exploited for several weeks
🐛
PoC Exploit Released for Dirty Frag Linux Kernel Vulnerability
🐛
Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions
🐛
Another Universal Linux Local Privilege Escalation (LPE) Vulnerability: Dirty Frag, (Fri, May 8th)
🐛
CVE-2026-41673 xmldom: Denial of service via uncontrolled recursion in XML serialization
🐛
CVE-2026-43869 Apache Thrift: TSSLTransportFactory.java hostname verification
🐛
CVE-2026-41672 xmldom: XML node injection through unvalidated comment serialization
🐛
CVE-2026-41674 xmldom: XML injection through unvalidated DocumentType serialization
🐛
CVE-2026-41675 xmldom: XML node injection through unvalidated processing instruction serialization
🐛
CVE-2026-25243 redis-server RESTORE invalid memory access may allow remote code execution
🐛
CVE-2026-31717 ksmbd: validate owner of durable handle on reconnect
🐛
CVE-2026-23631 redis-server Lua use-after-free may allow remote code execution
🐛
CVE-2026-31718 ksmbd: fix use-after-free in __ksmbd_close_fd() via durable scavenger
🐛
CVE-2026-23479 redis-server use-after-free in unblock client flow may allow remote code execution
🐛
CVE-2026-25588 RedisTimeSeries RESTORE invalid memory access may allow remote code execution
🐛
CVE-2026-25589 RedisBloom RESTORE invalid memory access may allow remote code execution
🐛
Critical Vulnerability in Rancher Fleet Enables Full Cluster-Admin Privileges
🐛
CVE-2025-68670: discovering an RCE vulnerability in xrdp
🐛
Your CTEM program is probably ignoring MCP. Here’s how to fix it
🐛
Ivanti EPMM vulnerability exploited in zero-day attacks (CVE-2026-6973)
🐛
Dirty Frag: Unpatched Linux vulnerability delivers root access
🐛
Metasploit Wrap-Up 05/08/2026
🐛
VU#260001: Linux kernel contains local privilege escalation vulnerability (Copy Fail)
⚠️
Become a millionaire by bug hunting on Android
⚠️
Meta allegedly made billions from scam advertising while online fraud explodes worldwide.
⚠️
NWHStealer Campaign Deploys Bun Loader, Anti-VM Evasion, and Encrypted C2
⚠️
Multiple Critical Flaws Fixed in Next.js and React Server Components
⚠️
423 Firefox Flaws Fixed as Browser Gains Support for Claude, Mythos, and More
⚠️
May 2026 Patch Tuesday forecast: AI starts driving security industry changes
⚠️
Mental health apps are collecting more than emotional conversations
⚠️
Product showcase: NetGuard open-source firewall for Android
⚠️
Snyk integrates Claude to advance AI-native application security
⚠️
Fake Moustache Fools Age Checks, Sparks Online Safety Act Fears
⚠️
Trellix Investigates RansomHouse Breach Claims Involving Source Code Repository
⚠️
Pen tests show AI security flaws far more severe than legacy software bugs
⚠️
Helping North Korean IT remote workers is becoming a fast track to prison
⚠️
New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials
⚠️
Cline Kanban WebSocket Vulnerability Enables Malicious Sites to Take Over AI Coding Agents
⚠️
Claude in Chrome is taking orders from the wrong extensions
⚠️
Dirty Frag: A new Linux privilege escalation vulnerability is already in the wild
⚠️
From Cyberwar to Cognitive Warfare: The Geopolitical Impact on Cybersecurity in Africa
⚠️
Pam Backdoor Targets Linux Systems to Steal SSH Credentials
⚠️
Zero Chaos: Scaling Detection Engineering at the Speed of Software, with Detection As Code
⚠️
MFA Alone Won’t Save You
⚠️
ShinyHunters defaces Canvas portals during finals week.
⚠️
Multiple universities forced to reschedule final exams after Canvas cyber incident
⚠️
Apple and Meta warn Canada’s Bill C-22 forces encryption backdoors
⚠️
Insider Betting on Polymarket
⚠️
The four-day race you don’t want to be in.
KEV
⚠️
Canvas, Shai-Hulud, QuasarRat, 0Days, Anthropic, Aaran Leyland, and EU Compliance! - SWN #579
📢
EU calls VPNs “a loophole that needs closing” in age verification push
📢
Kingdom Market administrator given 16-year sentence
🔥
Canvas Breach Disrupts Schools & Colleges Nationwide
🔥
The Canvas Hack Is a New Kind of Ransomware Debacle
🔥
Hackers Use Morse Code to Trick Grok and Bankrbot, Steal $200K in Crypto Tokens
🔥
Zara - 197,376 breached accounts
🔥
PCPJack Campaign Boots TeamPCP Off Compromised Machines
🔥
Canvas outage hits thousands of universities as ShinyHunters threatens leak
🔥
Avantra’s new AI can diagnose SAP failures in seconds
🔥
Former IT contractor convicted for wiping 96 US government databases
🔥
Microsoft says Edge’s plaintext password behavior is “by design”
🔥
You Have 60 Seconds to Stop the Breach. Are You Ready?
🔥
Pro-Ukraine BO Team and Head Mare hackers appear to team up in attacks against Russia
🔥
ShinyHunters claims nearly 9,000 schools affected by Canvas data breach
🔥
Instructure confirms cybersecurity incident
🔥
Anthropic’s Claude used in attempted compromise of Mexican water utility
🔥
Zara Data Breach: 197,000 Customers Exposed in Third-Party Security Incident
🔥
Poland says hackers breached water treatment plants, and the U.S. is facing the same threat
🔥
Cyberattacks on Poland’s Water Plants: A Blueprint for Hybrid Warfare
🔥
RansomHouse says it breached Trellix and exposes internal systems
🔥
Developers Are the New Target
🕵️
ISC Stormcast For Friday, May 8th, 2026 https://isc.sans.edu/podcastdetail/9924, (Fri, May 8th)
🕵️
New infosec products of the week: May 8, 2026
🕵️
Your coworker might be selling company logins, and thinks it’s fine
🕵️
New Infostealer Campaign Abuses GitHub Releases to Hide Malware Payloads
🕵️
PCPJack Worm Targets Docker, Kubernetes, Redis, and MongoDB Credentials
🕵️
Transilience AI unveils Security Operating System for cloud remediation
🕵️
Object First Fleet Manager simplifies distributed backup storage
🕵️
Roblox chat moderation gets bypassed by leet speak and code words
🕵️
Signed Logitech Installer Abused to Drop TCLBANKER Banking Trojan
🕵️
Securonix launches AI threat research agent and ThreatWatch validation tool
🕵️
OpenAI tunes GPT-5.5-Cyber for more permissive security workflows
🕵️
ZiChatBot Malware Abuses Zulip APIs for Stealthy C2 Operations
🕵️
Google is turning Android Studio into a policy watchdog
🕵️
Modular RAT Campaign Steals Credentials and Captures Screenshots
🕵️
Fake OpenClaw Installer Targets Crypto Wallets and Password Managers
🕵️
Flaw in Claude’s Chrome extension allowed ‘any’ other plugin to hijack victims’ AI
🕵️
SOCRadar Recognized in the 2026 Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies
🕵️
Sen. Schumer seeks DHS plan on AI cyber coordination with state, local governments
🕵️
Friday Squid Blogging: Giant Squid Live in the Waters of Western Australia
🌐
Australian Cyber Security Centre Issues Alert Over ClickFix Attacks
🌐
Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise
🌐
TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms
🌐
Space, the internet's next frontier.
📡
Detecting Web Server Probing & Fuzzing in Traefik with Automated Cloudflare Response
📡
Meet Rassvet, Russia’s Answer to Starlink
📡
AI, Cyberwarfare, and Autonomous Weapons: Inside America’s New Military Strategy
📡
Sri Lanka makes 37 arrests as it raids another scam centre
📡
One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk
📡
ShinyHunters escalates Canvas attacks with school login defacements
📡
Inside Department 4: Russia’s secret school for hackers
📡
One in eight UK workers has sold their company passwords, and bosses think it’s fine
📡
The Evolution of Kaspersky SIEM | Kaspersky official blog
📡
Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads
📡
US defense contractor who sold hacking tools to Russian broker ordered to pay $10M to former employers
📡
Virginia man found guilty of deleting 96 government databases
📡
GM to pay over $12 million in California privacy settlement involving driver data
📡
ShinyHunters Claims Second Attack Against Instructure