<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>THREAT INTELLIGENCE</title>
    <link>https://matlock.ca/cybersecnews/</link>
    <description>Cybersecurity news aggregated from 94 sources</description>
    <language>en-us</language>
    <lastBuildDate>Thu, 21 May 2026 13:01:08 -0300</lastBuildDate>
    <atom:link href="https://matlock.ca/cybersecnews/feed.xml" rel="self" type="application/rss+xml"/>
  <item>
    <title>Microsoft Defender vulnerabilities exploited in the wild (CVE-2026-41091, CVE-2026-45498)</title>
    <link>https://www.helpnetsecurity.com/2026/05/21/microsoft-defender-vulnerabilities-cve-2026-41091-cve-2026-45498/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/21/microsoft-defender-vulnerabilities-cve-2026-41091-cve-2026-45498/</guid>
    <pubDate>Thu, 21 May 2026 10:57:13 +0000</pubDate>
    <category>CISA KEV</category>
    <description>Attackers are exploiting two Microsoft Defender vulnerabilities (CVE-2026-41091 and CVE-2026-45498), Microsoft acknowledged and CISA confirmed by adding them to its Known Exploited Vulnerabilities catalog. The vulnerabilities CVE-2026-41091 allows for local privilege elevation (L…</description>
  </item>
  <item>
    <title>Mini Shai-Hulud: Frequently asked questions about the TeamPCP npm and PyPI supply chain campaign</title>
    <link>https://www.tenable.com/blog/mini-shai-hulud-frequently-asked-questions</link>
    <guid isPermaLink="true">https://www.tenable.com/blog/mini-shai-hulud-frequently-asked-questions</guid>
    <pubDate>Thu, 21 May 2026 11:28:22 -0400</pubDate>
    <category>CISA KEV</category>
    <description>A self-propagating worm has compromised more than 170 npm and PyPI packages, defeating provenance attestation and breaching OpenAI and Mistral AI. Here is what you need to know. Key takeaways Mini Shai-Hulud is a self-propagating worm by TeamPCP that steals developer and cloud cr…</description>
  </item>
  <item>
    <title>Microsoft is working on a patch for ‘YellowKey’ attack on Bitlocker, offers temporary fix</title>
    <link>https://www.csoonline.com/article/4175411/microsoft-is-working-on-a-patch-for-yellowkey-attack-on-bitlocker-offers-temporary-fix-2.html</link>
    <guid isPermaLink="true">https://www.csoonline.com/article/4175411/microsoft-is-working-on-a-patch-for-yellowkey-attack-on-bitlocker-offers-temporary-fix-2.html</guid>
    <pubDate>Thu, 21 May 2026 01:08:41 +0000</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Microsoft says it is considering a patch for a zero-day vulnerability, dubbed YellowKey, that allows attackers with access to a Windows device to bypass Bitlocker encryption protection and read and write files. The flaw was disclosed last week, and there is already a public proof…</description>
  </item>
  <item>
    <title>Highly Critical Drupal Core Flaw Exposes PostgreSQL Sites to RCE Attacks</title>
    <link>https://thehackernews.com/2026/05/highly-critical-drupal-core-flaw.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/05/highly-critical-drupal-core-flaw.html</guid>
    <pubDate>Thu, 21 May 2026 09:14:11 +0530</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Drupal has released security updates for a &quot;highly critical&quot; security vulnerability in Drupal Core that could be exploited by attackers to achieve remote code execution, privilege escalation, or information disclosure. The vulnerability, now tracked as CVE-2026-9082, carries a CV…</description>
  </item>
  <item>
    <title>CVE-2026-45585 Windows BitLocker Security Feature Bypass Vulnerability</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45585</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45585</guid>
    <pubDate>Thu, 21 May 2026 07:00:00 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Added a script to implement a mitigation and removed the manual mitigations. Please read the information to decide if you need to run the provided script.</description>
  </item>
  <item>
    <title>CVE-2026-43619 Rsync &lt; 3.4.3 Symlink Race Condition via Path-Based Syscalls</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43619</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43619</guid>
    <pubDate>Thu, 21 May 2026 01:01:17 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-43618 Rsync &lt; 3.4.3 Integer Overflow Information Disclosure</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43618</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43618</guid>
    <pubDate>Thu, 21 May 2026 01:01:23 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-43620 Rsync &lt; 3.4.3 Out-of-Bounds Array Read via recv_files()</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43620</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43620</guid>
    <pubDate>Thu, 21 May 2026 01:01:28 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-47784 In memcached before 1.6.42, password data for SASL password database authentication has a timing side channel because memcmp is used by sasl_server_userdb_checkpass.</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-47784</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-47784</guid>
    <pubDate>Thu, 21 May 2026 01:01:53 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-47783 In memcached before 1.6.42, username data for SASL password database authentication has a timing side channel because a loop exits as soon as a valid username is found by sasl_server_userdb_checkpass.</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-47783</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-47783</guid>
    <pubDate>Thu, 21 May 2026 01:01:59 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-32792 Packet of death with DNSCrypt</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32792</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32792</guid>
    <pubDate>Thu, 21 May 2026 01:02:10 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-42960 Possible cache poisoning via promiscuous records for the authority section</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42960</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42960</guid>
    <pubDate>Thu, 21 May 2026 01:02:16 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-42959 Crash during DNSSEC validation of malicious content</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42959</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42959</guid>
    <pubDate>Thu, 21 May 2026 01:02:21 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-44608 Use after free and crash under special conditions in RPZ code</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-44608</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-44608</guid>
    <pubDate>Thu, 21 May 2026 01:02:27 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-33278 Possible arbitrary code execution during DNSSEC validation</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33278</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33278</guid>
    <pubDate>Thu, 21 May 2026 01:02:32 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-42923 Degradation of service with unbounded NSEC3 hash calculations</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42923</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42923</guid>
    <pubDate>Thu, 21 May 2026 01:02:54 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-45803 gh: GitHub Actions log output in `gh run view` allows terminal escape sequence injection</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45803</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45803</guid>
    <pubDate>Thu, 21 May 2026 01:03:11 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-43970 Decompression Bomb in cow_spdy:inflate/2 Allows Memory Exhaustion via Crafted SPDY Frame</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43970</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43970</guid>
    <pubDate>Thu, 21 May 2026 01:03:23 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-43617 Rsync &lt; 3.4.3 Authorization Bypass via Hostname Resolution</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43617</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43617</guid>
    <pubDate>Thu, 21 May 2026 01:01:34 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-45232 Rsync &lt; 3.4.3 Off-by-One Stack Write via HTTP Proxy</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45232</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45232</guid>
    <pubDate>Thu, 21 May 2026 01:01:40 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-29518 Rsync &lt; 3.4.3 TOCTOU Race Condition Allows Symlink-Based Arbitrary File Write</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-29518</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-29518</guid>
    <pubDate>Thu, 21 May 2026 01:02:04 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-41292 Long list of incoming EDNS options degrades performance</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41292</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41292</guid>
    <pubDate>Thu, 21 May 2026 01:02:38 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-42534 Jostle logic bypass degrades resolution performance</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42534</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42534</guid>
    <pubDate>Thu, 21 May 2026 01:02:43 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-40622 Another &#x27;ghost domain names&#x27; attack variant</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40622</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40622</guid>
    <pubDate>Thu, 21 May 2026 01:02:49 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-42944 Heap overflow with multiple NSID, COOKIE, PADDING EDNS options</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42944</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42944</guid>
    <pubDate>Thu, 21 May 2026 01:03:00 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-44390 Unbounded name compression in certain cases causes degradation of service</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-44390</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-44390</guid>
    <pubDate>Thu, 21 May 2026 01:03:06 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-45736 ws: Uninitialized memory disclosure</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45736</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45736</guid>
    <pubDate>Thu, 21 May 2026 01:03:17 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>Nine-Year-Old Kernel Flaw Puts Linux SSH Private Keys at Risk</title>
    <link>https://gbhackers.com/nine-year-old-kernel-flaw/</link>
    <guid isPermaLink="true">https://gbhackers.com/nine-year-old-kernel-flaw/</guid>
    <pubDate>Thu, 21 May 2026 07:10:25 +0000</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>A newly disclosed Linux kernel vulnerability, tracked as CVE-2026-46333, poses a serious risk to SSH private keys and other sensitive credentials. The flaw, present in the kernel since 2016, allows a local attacker to escalate from a basic shell account to full root access on man…</description>
  </item>
  <item>
    <title>9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros</title>
    <link>https://thehackernews.com/2026/05/9-year-old-linux-kernel-flaw-enables.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/05/9-year-old-linux-kernel-flaw-enables.html</guid>
    <pubDate>Thu, 21 May 2026 13:05:53 +0530</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Cybersecurity researchers have disclosed details of a vulnerability in the Linux kernel that remained undetected for nine years. The vulnerability, tracked as CVE-2026-46333 (CVSS score: 5.5), is a case of improper privilege management that could permit an unprivileged local user…</description>
  </item>
  <item>
    <title>Critical Vulnerability in Cisco Secure Workload Threatens Enterprise API Security</title>
    <link>https://gbhackers.com/critical-vulnerability-in-cisco-secure-workload/</link>
    <guid isPermaLink="true">https://gbhackers.com/critical-vulnerability-in-cisco-secure-workload/</guid>
    <pubDate>Thu, 21 May 2026 09:13:21 +0000</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Cisco has disclosed a critical security vulnerability in its Secure Workload platform that could allow unauthenticated attackers to gain high-level administrative access to sensitive enterprise environments. The flaw, tracked as CVE-2026-20223, carries a maximum CVSS score of 10.…</description>
  </item>
  <item>
    <title>Microsoft Warns of Two Actively Exploited Defender Vulnerabilities</title>
    <link>https://thehackernews.com/2026/05/microsoft-warns-of-two-actively.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/05/microsoft-warns-of-two-actively.html</guid>
    <pubDate>Thu, 21 May 2026 16:25:57 +0530</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Microsoft has disclosed that a privilege escalation and a denial-of-service flaw in Defender has come under active exploitation in the wild. The former, tracked as CVE-2026-41091, is rated 7.8 on the CVSS scoring system. Successful exploitation of the flaw could allow an attacker…</description>
  </item>
  <item>
    <title>Microsoft Defender Zero-Day Vulnerabilities Actively Exploited in the Wild</title>
    <link>https://gbhackers.com/microsoft-defender-zero-day-vulnerabilities/</link>
    <guid isPermaLink="true">https://gbhackers.com/microsoft-defender-zero-day-vulnerabilities/</guid>
    <pubDate>Thu, 21 May 2026 11:32:23 +0000</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Microsoft has disclosed two new zero-day vulnerabilities in Microsoft Defender that are actively being exploited in the wild, raising concerns among security professionals and enterprise users. The vulnerabilities, tracked as CVE-2026-41091 and CVE-2026-45498, were officially rel…</description>
  </item>
  <item>
    <title>CVE-2026-9082: Highly Critical SQL Injection Vulnerability in Drupal Core (SA-CORE-2026-004)</title>
    <link>https://www.tenable.com/blog/cve-2026-9082-highly-critical-sql-injection-vulnerability-in-drupal-core-sa-core-2026-004</link>
    <guid isPermaLink="true">https://www.tenable.com/blog/cve-2026-9082-highly-critical-sql-injection-vulnerability-in-drupal-core-sa-core-2026-004</guid>
    <pubDate>Thu, 21 May 2026 09:25:37 -0400</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>A highly critical SQL injection vulnerability in Drupal core&#x27;s database abstraction layer affects sites running PostgreSQL. Key Takeaways CVE-2026-9082 is a highly critical SQL injection vulnerability in Drupal core&#x27;s database abstraction API that can be exploited by unauthentica…</description>
  </item>
  <item>
    <title>Cisco fixed maximum severity flaw CVE-2026-20223 in Secure Workload</title>
    <link>https://securityaffairs.com/192473/security/cisco-fixed-maximum-severity-flaw-cve-2026-20223-in-secure-workload.html</link>
    <guid isPermaLink="true">https://securityaffairs.com/192473/security/cisco-fixed-maximum-severity-flaw-cve-2026-20223-in-secure-workload.html</guid>
    <pubDate>Thu, 21 May 2026 13:22:17 +0000</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Cisco fixed a critical Secure Workload flaw (CVE-2026-20223) that could let attackers gain Site Admin privileges through crafted API requests. Cisco released patches for a critical vulnerability, tracked as CVE-2026-20223 (CVSS score of 10.0), in Secure Workload. The flaw stems f…</description>
  </item>
  <item>
    <title>New GhostTree Attack Causes EDR Tools to Hang, Leaving Files Unscanned</title>
    <link>https://gbhackers.com/new-ghosttree-attack-causes-edr-tools/</link>
    <guid isPermaLink="true">https://gbhackers.com/new-ghosttree-attack-causes-edr-tools/</guid>
    <pubDate>Thu, 21 May 2026 04:54:28 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>A newly disclosed attack technique dubbed “GhostTree” is raising concerns among defenders after researchers demonstrated how it can disrupt endpoint detection and response (EDR) tools and bypass file scanning mechanisms on Windows systems. The technique, discovered by Varonis Thr…</description>
  </item>
  <item>
    <title>Claude Code Sandbox Flaw May Compromise User Secrets</title>
    <link>https://gbhackers.com/claude-code-sandbox-flaw/</link>
    <guid isPermaLink="true">https://gbhackers.com/claude-code-sandbox-flaw/</guid>
    <pubDate>Thu, 21 May 2026 04:35:22 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>A newly disclosed security flaw in Anthropic’s Claude Code platform has exposed a critical weakness in its network sandbox, potentially allowing attackers to bypass restrictions and exfiltrate sensitive data. The issue, identified by security researcher Aonan Guan, marks the seco…</description>
  </item>
  <item>
    <title>Cyber threats push SMBs to spend more on security</title>
    <link>https://www.helpnetsecurity.com/2026/05/21/idc-smbs-cybersecurity-spending-report/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/21/idc-smbs-cybersecurity-spending-report/</guid>
    <pubDate>Thu, 21 May 2026 04:00:35 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Cybersecurity has become a key priority for small and medium-sized businesses due to growing threats and wider AI adoption. An IDC survey of 2,200 SMBs in eight markets examined how organizations manage cyber risks, prepare for AI-related threats, and handle third-party vendor se…</description>
  </item>
  <item>
    <title>PoC Released for PinTheft Linux Flaw Enabling Root Privilege Escalation</title>
    <link>https://gbhackers.com/poc-released-for-pintheft-linux-flaw/</link>
    <guid isPermaLink="true">https://gbhackers.com/poc-released-for-pintheft-linux-flaw/</guid>
    <pubDate>Thu, 21 May 2026 05:32:58 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>A public proof-of-concept (PoC) exploit called “PinTheft” has been released for a newly disclosed Linux kernel flaw that allows local attackers to escalate privileges to root on certain systems. PinTheft is a Linux local privilege escalation (LPE) exploit that targets a reference…</description>
  </item>
  <item>
    <title>WantToCry Ransomware Exploits SMB to Encrypt Remote Files</title>
    <link>https://gbhackers.com/wanttocry-ransomware-exploits-smb/</link>
    <guid isPermaLink="true">https://gbhackers.com/wanttocry-ransomware-exploits-smb/</guid>
    <pubDate>Thu, 21 May 2026 05:02:13 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>A new ransomware campaign named “WantToCry” that leverages exposed Server Message Block (SMB) services to gain access and encrypt victim data without deploying traditional malware on compromised systems. This approach significantly reduces the detection surface, making it harder …</description>
  </item>
  <item>
    <title>Windows93 / Myspace93 - 46,105 breached accounts</title>
    <link>https://haveibeenpwned.com/Breach/Windows93</link>
    <guid isPermaLink="true">https://haveibeenpwned.com/Breach/Windows93</guid>
    <pubDate>Thu, 21 May 2026 03:45:15 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>In January 2021, the parody site Windows93 suffered a data breach of the Myspace93 sub-site after a beta application was exploited to download server files. The compromised data was later leaked in June and included 46k Myspace93 accounts containing email and IP addresses, userna…</description>
  </item>
  <item>
    <title>The friendly skies aren’t friendly.</title>
    <link>https://thecyberwire.com/podcasts/hacking-humans/387/notes</link>
    <guid isPermaLink="true">https://thecyberwire.com/podcasts/hacking-humans/387/notes</guid>
    <pubDate>Thu, 21 May 2026 05:00:00 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>This week, hosts of N2K CyberWire ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ alongside ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠…</description>
  </item>
  <item>
    <title>Why AI changed the threat model for travel technology</title>
    <link>https://www.helpnetsecurity.com/2026/05/21/devon-bryan-booking-holdings-cso-leadership-travel/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/21/devon-bryan-booking-holdings-cso-leadership-travel/</guid>
    <pubDate>Thu, 21 May 2026 06:00:03 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>In this Help Net Security interview, Devon Bryan, SVP, Global CSO at Booking Holdings, reflects on his path from Air Force network security engineer to global CSO across financial services, hospitality, and travel technology. He discusses why the travel industry&amp;#8217;s interconn…</description>
  </item>
  <item>
    <title>AI red teaming agents change how LLMs get tested</title>
    <link>https://www.helpnetsecurity.com/2026/05/21/ai-red-teaming-agents-research/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/21/ai-red-teaming-agents-research/</guid>
    <pubDate>Thu, 21 May 2026 05:00:28 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Adversarial probing of LLMs has piled up a sprawling toolkit over the past three years. Attack techniques with names like Tree of Attacks with Pruning, Crescendo, and Skeleton Key sit alongside hundreds of prompt transforms and scoring methods across open-source frameworks includ…</description>
  </item>
  <item>
    <title>Follow the Crypto</title>
    <link>https://thecyberwire.com/podcasts/threat-vector/118/notes</link>
    <guid isPermaLink="true">https://thecyberwire.com/podcasts/threat-vector/118/notes</guid>
    <pubDate>Thu, 21 May 2026 06:00:00 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Every threat actor leaves a financial signature. Ransomware operators, state-sponsored hackers, fraud networks — they all need to move money, and when they do, the blockchain records it permanently. ⁠Jackie Burns Koven⁠ leads cyber threat intelligence at Chainalysis, where she tr…</description>
  </item>
  <item>
    <title>Critical Drupal Vulnerability Could Leave Sites Open to Cyberattack</title>
    <link>https://gbhackers.com/critical-drupal-vulnerability-could-leave-sites-open-to-cyberattack/</link>
    <guid isPermaLink="true">https://gbhackers.com/critical-drupal-vulnerability-could-leave-sites-open-to-cyberattack/</guid>
    <pubDate>Thu, 21 May 2026 07:38:31 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>The Drupal Security Team has issued a warning about a highly critical vulnerability affecting Drupal core, with a security release scheduled for May 20, 2026 (PSA-2026-05-18). The flaw carries a severity rating of 20/25, indicating a significant risk that attackers could compromi…</description>
  </item>
  <item>
    <title>Mini Shai-Hulud Hits @antv npm Packages, Targets CI/CD Secrets</title>
    <link>https://gbhackers.com/antv-npm-packages/</link>
    <guid isPermaLink="true">https://gbhackers.com/antv-npm-packages/</guid>
    <pubDate>Thu, 21 May 2026 07:14:12 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>An Active and sophisticated supply chain attack targeting the widely used @antv npm ecosystem, where a threat actor compromised a maintainer account and pushed malicious package updates designed to steal sensitive CI/CD credentials. The campaign, dubbed “Mini Shai-Hulud,” demonst…</description>
  </item>
  <item>
    <title>AI becoming an SOC imperative for curtailing emerging cyber threats</title>
    <link>https://www.csoonline.com/article/4175349/ai-becoming-an-soc-imperative-for-curtailing-emerging-cyber-threats.html</link>
    <guid isPermaLink="true">https://www.csoonline.com/article/4175349/ai-becoming-an-soc-imperative-for-curtailing-emerging-cyber-threats.html</guid>
    <pubDate>Thu, 21 May 2026 07:00:00 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>The cybersecurity profession is on the verge of a sea change, and security pros must begin to master AI tools to combat emerging threats by building more autonomous, real-time protections. Expert panelists at a recent DTX conference session in Manchester, titled “ Bot vs Bot: Sur…</description>
  </item>
  <item>
    <title>Terra adds continuous network exploitation validation to its platform</title>
    <link>https://www.helpnetsecurity.com/2026/05/21/terra-security-network-exploitation-validation/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/21/terra-security-network-exploitation-validation/</guid>
    <pubDate>Thu, 21 May 2026 07:13:32 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Terra Security has announced the public preview of continuous exploitation validation for network infrastructure, now available to all customers through the Terra Platform. The launch expands Terra’s offensive security capabilities from web applications to network infrastructure …</description>
  </item>
  <item>
    <title>Indian Student Data Weaponized in Phishing and Financial Fraud Campaigns</title>
    <link>https://gbhackers.com/phishing-and-financial-fraud-campaigns/</link>
    <guid isPermaLink="true">https://gbhackers.com/phishing-and-financial-fraud-campaigns/</guid>
    <pubDate>Thu, 21 May 2026 08:07:48 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>A growing trend in India where student data is increasingly being exploited for cybercrime activities, including phishing, impersonation, social engineering, and financial fraud. As educational institutions rapidly adopt digital platforms for admissions, fee payments, examination…</description>
  </item>
  <item>
    <title>ASAPP expands adversarial testing for enterprise AI systems</title>
    <link>https://www.helpnetsecurity.com/2026/05/21/asapp-expands-adversarial-testing-for-enterprise-ai-systems/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/21/asapp-expands-adversarial-testing-for-enterprise-ai-systems/</guid>
    <pubDate>Thu, 21 May 2026 08:11:13 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>ASAPP has launched Continuous Red Teaming, a new capability that integrates adversarial AI testing directly into ASAPP&amp;#8217;s model evaluation framework. The new capability is built on Promptfoo, an AI security platform that helps enterprises detect and address vulnerabilities i…</description>
  </item>
  <item>
    <title>New NGINX 0-Day RCE “nginx-poolslip” Threatens Millions of Servers</title>
    <link>https://gbhackers.com/new-nginx-0-day-rce-nginx-poolslip/</link>
    <guid isPermaLink="true">https://gbhackers.com/new-nginx-0-day-rce-nginx-poolslip/</guid>
    <pubDate>Thu, 21 May 2026 09:24:57 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>A newly discovered zero-day vulnerability in NGINX, dubbed “nginx-poolslip,” is raising serious concerns across the global cybersecurity community, as it exposes millions of servers to potential remote code execution (RCE) attacks. The vulnerability affects NGINX version 1.31.0, …</description>
  </item>
  <item>
    <title>Fake Invitation Phishing Campaign Steals Credentials From U.S. Organizations</title>
    <link>https://gbhackers.com/fake-invitation-phishing-campaign/</link>
    <guid isPermaLink="true">https://gbhackers.com/fake-invitation-phishing-campaign/</guid>
    <pubDate>Thu, 21 May 2026 09:02:20 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>A large-scale phishing campaign leveraging fake event invitations is actively targeting U.S. organizations, combining credential theft, OTP interception, and remote access tool abuse into a single attack chain. The campaign stands out due to its repeatable phishing framework, whi…</description>
  </item>
  <item>
    <title>A Hacker Group Is Poisoning Open Source Code at an Unprecedented Scale</title>
    <link>https://www.wired.com/story/teampcp-software-supply-chain-attack-spree-github/</link>
    <guid isPermaLink="true">https://www.wired.com/story/teampcp-software-supply-chain-attack-spree-github/</guid>
    <pubDate>Thu, 21 May 2026 09:00:00 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>GitHub is just the latest victim of TeamPCP, a gang that has carried out a spree of software supply chain attacks that has impacted hundreds of organizations.</description>
  </item>
  <item>
    <title>Microsoft releases open-source tools to operationalize AI agent safety</title>
    <link>https://www.csoonline.com/article/4175592/microsoft-releases-open-source-tools-to-operationalize-ai-agent-safety-2.html</link>
    <guid isPermaLink="true">https://www.csoonline.com/article/4175592/microsoft-releases-open-source-tools-to-operationalize-ai-agent-safety-2.html</guid>
    <pubDate>Thu, 21 May 2026 10:28:06 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Microsoft has open-sourced two new tools aimed at bringing AI safety checks much earlier into the agent development lifecycle. The tools, called Rampart and Clarity, were announced this week as part of Microsoft’s broader push to operationalize safety engineering for agentic AI. …</description>
  </item>
  <item>
    <title>Apache OFBiz RCE Flaw Abuses Password-Change Restrictions for Authentication Bypass</title>
    <link>https://gbhackers.com/apache-ofbiz-rce-flaw-abuses-password-change-restrictions/</link>
    <guid isPermaLink="true">https://gbhackers.com/apache-ofbiz-rce-flaw-abuses-password-change-restrictions/</guid>
    <pubDate>Thu, 21 May 2026 12:02:37 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>A critical authentication bypass vulnerability in Apache OFBiz allows attackers to hijack forced password-change flows and achieve remote code execution (RCE) via a single HTTP request, affecting all versions before 24.09.06. Apache OFBiz RCE Flaw Apache OFBiz is an open-source E…</description>
  </item>
  <item>
    <title>Tenable One deepens third-party integrations with new Open Connector for unified risk visibility</title>
    <link>https://www.tenable.com/blog/new-tenable-one-open-connector-extends-third-party-integrations-unified-risk-visibility</link>
    <guid isPermaLink="true">https://www.tenable.com/blog/new-tenable-one-open-connector-extends-third-party-integrations-unified-risk-visibility</guid>
    <pubDate>Thu, 21 May 2026 08:30:00 -0400</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>The days of rigid, vendor-locked security stacks are over. The Tenable One Open Connector amplifies Tenable One’s extensive capacity to ingest and consolidate third-party security data, giving you more complete visibility across your attack surface, so you can keep using your pre…</description>
  </item>
  <item>
    <title>Europol dismantles ‘First VPN’ service used by ransomware gangs</title>
    <link>https://cyberinsider.com/europol-dismantles-first-vpn-service-used-by-ransomware-gangs/</link>
    <guid isPermaLink="true">https://cyberinsider.com/europol-dismantles-first-vpn-service-used-by-ransomware-gangs/</guid>
    <pubDate>Thu, 21 May 2026 12:00:12 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>European law enforcement agencies have dismantled a long-running VPN service allegedly used by ransomware gangs and cybercriminals to conceal attacks, steal data, and evade investigators. The operation, coordinated by France and the Netherlands with support from Europol and Euroj…</description>
  </item>
  <item>
    <title>ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories</title>
    <link>https://thehackernews.com/2026/05/threatsday-bulletin-linux-rootkits.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/05/threatsday-bulletin-linux-rootkits.html</guid>
    <pubDate>Thu, 21 May 2026 17:22:14 +0530</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>This week starts small. A token leaks. A bad package slips in. A login trick works. An old tool shows up again. At first, it feels like the usual mess. Then you see the pattern: attackers are not always breaking in. They are using the parts we already trust. That is what makes it…</description>
  </item>
  <item>
    <title>Selective HTTP Proxying in Linux, (Thu, May 21st)</title>
    <link>https://isc.sans.edu/diary/rss/33002</link>
    <guid isPermaLink="true">https://isc.sans.edu/diary/rss/33002</guid>
    <pubDate>Thu, 21 May 2026 13:34:09 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Recently, Rob wrote about a tool, Proxifier , that can intercept requests from specific processes. Proxifier is available for Windows, macOS, and Android. But I have not seen a generic Linux option yet. The advantage of a tool like Proxifier is the ability to target specific soft…</description>
  </item>
  <item>
    <title>Reducing Phish-Prone Rates Without Training Fatigue: A Practical Playbook for Traditional Organizations</title>
    <link>https://blog.knowbe4.com/reducing-phish-prone-rates-without-training-fatigue-a-practical-playbook-for-traditional-organizations</link>
    <guid isPermaLink="true">https://blog.knowbe4.com/reducing-phish-prone-rates-without-training-fatigue-a-practical-playbook-for-traditional-organizations</guid>
    <pubDate>Thu, 21 May 2026 13:00:04 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Phishing remains the single biggest human-driven threat in most organizations. Yet many security leaders face a familiar problem: the stronger the push to run frequent training and simulations, the louder the employee backlash. Complaints range from “too many tests” to “training …</description>
  </item>
  <item>
    <title>Chinese APTs Share Linux Backdoor in Central Asia Telco Attacks</title>
    <link>https://www.darkreading.com/threat-intelligence/chinese-apts-linux-backdoor-telco-attacks</link>
    <guid isPermaLink="true">https://www.darkreading.com/threat-intelligence/chinese-apts-linux-backdoor-telco-attacks</guid>
    <pubDate>Thu, 21 May 2026 14:00:00 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>&amp;quot;Showboat&amp;quot; doesn&#x27;t show off, but clearly it doesn&#x27;t need to, as it&#x27;s long helped China spy on small market communications providers.</description>
  </item>
  <item>
    <title>Content Delivery Exploit Opens Websites to Brand Hijacking</title>
    <link>https://www.darkreading.com/cyber-risk/content-delivery-exploit-websites-brand-hijacking</link>
    <guid isPermaLink="true">https://www.darkreading.com/cyber-risk/content-delivery-exploit-websites-brand-hijacking</guid>
    <pubDate>Thu, 21 May 2026 13:05:00 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>The Underminr domain-fronting attack allows threat actors to modify Web requests and leverage trusted websites to cloak malicious activity.</description>
  </item>
  <item>
    <title>Q1 2026 Threat Landscape Report: Zero-clicks, geopolitical tensions, and some wins for law enforcement</title>
    <link>https://www.rapid7.com/blog/post/tr-q1-2026-threat-landscape-report-geopolitics-ransomware</link>
    <guid isPermaLink="true">https://www.rapid7.com/blog/post/tr-q1-2026-threat-landscape-report-geopolitics-ransomware</guid>
    <pubDate>Thu, 21 May 2026 13:00:00 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>The first quarter of 2026 reinforced that attackers are moving faster, operating with greater coordination, and exploiting weaknesses before most organizations can respond effectively. From escalating geopolitical tensions to increasingly aggressive ransomware operations, the lat…</description>
  </item>
  <item>
    <title>Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor</title>
    <link>https://thehackernews.com/2026/05/showboat-linux-malware-hits-middle-east.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/05/showboat-linux-malware-hits-middle-east.html</guid>
    <pubDate>Thu, 21 May 2026 19:47:09 +0530</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Cybersecurity researchers have disclosed details of a new Linux malware dubbed Showboat that has been put to use in a campaign targeting a telecommunications provider in the Middle East since at least mid-2022. &quot;Showboat is a modular post-exploitation framework designed for Linux…</description>
  </item>
  <item>
    <title>Cybersecurity’s Hidden Communication Risk</title>
    <link>https://www.youtube.com/shorts/uFmYgvJr21Y</link>
    <guid isPermaLink="true">https://www.youtube.com/shorts/uFmYgvJr21Y</guid>
    <pubDate>Thu, 21 May 2026 14:01:22 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Cybersecurity professionals often rely on acronyms and technical shorthand without realizing most people don’t understand them. The speaker connects this to a behavioral science concept called the “curse of experience” — experts naturally assume others share their knowledge. That…</description>
  </item>
  <item>
    <title>UK plans for cybercrime law reform would protect almost no one, experts warn</title>
    <link>https://therecord.media/uk-plans-for-cybercrime-law-reform-limited-protections</link>
    <guid isPermaLink="true">https://therecord.media/uk-plans-for-cybercrime-law-reform-limited-protections</guid>
    <pubDate>Thu, 21 May 2026 14:47:00 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>The proposals would require researchers to cease activity the moment a vulnerability is identified, meaning they could not confirm it was real, assess its severity or determine its exploitability.</description>
  </item>
  <item>
    <title>Authorities dismantle First VPN, used by ransomware actors</title>
    <link>https://www.helpnetsecurity.com/2026/05/21/operation-saffron-first-vpn-takedown/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/21/operation-saffron-first-vpn-takedown/</guid>
    <pubDate>Thu, 21 May 2026 14:03:44 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>First VPN, a virtual private network service marketed to cybercriminals, promising anonymity for its users, was taken offline on May 19 and 20 as part of Operation Saffron. During the operation, French and Dutch authorities, with support from Europol and Eurojust, dismantled 33 s…</description>
  </item>
  <item>
    <title>CISA asks cybersecurity community to alert it to vulnerability exploitation</title>
    <link>https://www.cybersecuritydive.com/news/cisa-cve-vulnerability-exploitation-nominations/820870/</link>
    <guid isPermaLink="true">https://www.cybersecuritydive.com/news/cisa-cve-vulnerability-exploitation-nominations/820870/</guid>
    <pubDate>Thu, 21 May 2026 11:00:25 -0400</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>The agency wants to ensure that its public catalog of actively exploited flaws is as comprehensive as possible.</description>
  </item>
  <item>
    <title>Attackers are bypassing MFA on SonicWall VPNs because something was wrong with previous fix</title>
    <link>https://securityaffairs.com/192477/hacking/attackers-are-bypassing-mfa-on-sonicwall-vpns-because-something-was-wrong-with-previous-fix.html</link>
    <guid isPermaLink="true">https://securityaffairs.com/192477/hacking/attackers-are-bypassing-mfa-on-sonicwall-vpns-because-something-was-wrong-with-previous-fix.html</guid>
    <pubDate>Thu, 21 May 2026 14:29:21 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Attackers bypassed MFA on patched SonicWall Gen6 VPNs because admins missed extra manual steps required to fully fix the flaw. There is a particular kind of security failure that is harder to catch than an unpatched system: a patched system where the patch did not actually work b…</description>
  </item>
  <item>
    <title>Google Chrome Security Flaws Could Let Attackers Execute Code Remotely</title>
    <link>https://gbhackers.com/google-chrome-security-flaws/</link>
    <guid isPermaLink="true">https://gbhackers.com/google-chrome-security-flaws/</guid>
    <pubDate>Thu, 21 May 2026 10:41:39 +0000</pubDate>
    <category>Security Bulletins</category>
    <description>Google has released a critical security update for its Chrome browser, addressing multiple vulnerabilities that could allow attackers to execute arbitrary code on affected systems. The update, now rolling out to users globally, upgrades Chrome to version 148.0.7778.178/179 for Wi…</description>
  </item>
  <item>
    <title>Mullvad confirms VPN fingerprinting flaw, says fix is on the way</title>
    <link>https://cyberinsider.com/mullvad-confirms-vpn-fingerprinting-flaw-says-fix-is-on-the-way/</link>
    <guid isPermaLink="true">https://cyberinsider.com/mullvad-confirms-vpn-fingerprinting-flaw-says-fix-is-on-the-way/</guid>
    <pubDate>Thu, 21 May 2026 12:48:15 +0000</pubDate>
    <category>Security Advisories</category>
    <description>Mullvad has published an official advisory confirming a fingerprinting issue in its VPN infrastructure that could allow online services to probabilistically correlate users as they switch between VPN servers. The company says the flaw does not expose a user’s identity, but it can…</description>
  </item>
  <item>
    <title>GitHub Internal Repositories Breached via Malicious Nx Console VS Code Extension</title>
    <link>https://thehackernews.com/2026/05/github-internal-repositories-breached.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/05/github-internal-repositories-breached.html</guid>
    <pubDate>Thu, 21 May 2026 09:57:01 +0530</pubDate>
    <category>Incident Reporting</category>
    <description>GitHub on Wednesday officially confirmed that the breach of its internal repositories was the result of a compromise of an employee device involving a poisoned version of the Nx Console Microsoft Visual Studio Code (VS Code) extension.&amp;nbsp; The development comes as the Nx team r…</description>
  </item>
  <item>
    <title>Dragonica Lunaris - 126,293 breached accounts</title>
    <link>https://haveibeenpwned.com/Breach/Dragonica</link>
    <guid isPermaLink="true">https://haveibeenpwned.com/Breach/Dragonica</guid>
    <pubDate>Thu, 21 May 2026 04:41:32 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>In December 2025, the European Dragonica private server Dragonica Lunaris suffered a data breach. The incident exposed 126k email addresses, usernames, dates of birth and bcrypt password hashes. The service operator confirmed the breach and advised it has since been fixed.</description>
  </item>
  <item>
    <title>Grafana Labs Says Code Breach Stemmed from TanStack Attack</title>
    <link>https://www.infosecurity-magazine.com/news/grafana-labs-code-breach-tanstack/</link>
    <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/grafana-labs-code-breach-tanstack/</guid>
    <pubDate>Thu, 21 May 2026 08:00:00 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>Grafana Labs has confirmed a recent data breach was caused by the TanStack supply chain attack</description>
  </item>
  <item>
    <title>GitHub, Grafana Labs breaches traced back to TanStack supply chain compromise</title>
    <link>https://www.helpnetsecurity.com/2026/05/21/github-grafana-breach-root-cause-nx-console/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/21/github-grafana-breach-root-cause-nx-console/</guid>
    <pubDate>Thu, 21 May 2026 13:42:10 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>GitHub CISO Alexis Wales has named the malicious VS Code extension behind the breach they suffered at the hands of the threat group TeamPCP: Nx Console, a popular developer tool with 2.2 million installs. A malicious version of the otherwise benign extension was used to steal sec…</description>
  </item>
  <item>
    <title>GitHub Breach Traced to Malicious &#x27;Nx Console&#x27; VS Code Extension</title>
    <link>https://www.infosecurity-magazine.com/news/github-breach-nx-console-vs-code/</link>
    <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/github-breach-nx-console-vs-code/</guid>
    <pubDate>Thu, 21 May 2026 14:45:00 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>A threat actor compromised an Nx developer and posed as a legitimate maintainer to publish a malicious extension on Visual Studio Marketplace</description>
  </item>
  <item>
    <title>Grafana Labs links GitHub environment breach to TanStack npm supply chain attack</title>
    <link>https://www.cybersecuritydive.com/news/grafana-labs-github-environment-breach-tanstack-npm-supply-chain/820866/</link>
    <guid isPermaLink="true">https://www.cybersecuritydive.com/news/grafana-labs-github-environment-breach-tanstack-npm-supply-chain/820866/</guid>
    <pubDate>Thu, 21 May 2026 10:49:54 -0400</pubDate>
    <category>Incident Reporting</category>
    <description>The company behind the widely used observability platform refused an extortion demand and has since taken steps to harden its security.</description>
  </item>
  <item>
    <title>Cybercriminal VPN Dismantled in Europol Crackdown</title>
    <link>https://www.infosecurity-magazine.com/news/first-vpn-takedown-europol/</link>
    <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/first-vpn-takedown-europol/</guid>
    <pubDate>Thu, 21 May 2026 15:30:00 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>First VPN, a service used by ransomware actors and fraudsters, was dismantled by Europol</description>
  </item>
  <item>
    <title>ISC Stormcast For Thursday, May 21st, 2026 https://isc.sans.edu/podcastdetail/9940, (Thu, May 21st)</title>
    <link>https://isc.sans.edu/diary/rss/33000</link>
    <guid isPermaLink="true">https://isc.sans.edu/diary/rss/33000</guid>
    <pubDate>Thu, 21 May 2026 02:00:03 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.</description>
  </item>
  <item>
    <title>Product showcase: Bitdefender Mobile Security for iOS protects privacy where scams begin</title>
    <link>https://www.helpnetsecurity.com/2026/05/21/product-showcase-bitdefender-mobile-security-for-ios/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/21/product-showcase-bitdefender-mobile-security-for-ios/</guid>
    <pubDate>Thu, 21 May 2026 04:30:40 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Bitdefender Mobile Security for iOS is a security and privacy application for iPhone and iPad that helps protect against phishing attempts, online scams, unsafe websites, and account exposure. I have used Bitdefender Mobile Security for iOS for the last two years. It was easy to …</description>
  </item>
  <item>
    <title>Two U.S. Executives Plead Guilty in India-Based Tech Support Fraud Schemes</title>
    <link>https://gbhackers.com/two-u-s-executives-plead-guilty/</link>
    <guid isPermaLink="true">https://gbhackers.com/two-u-s-executives-plead-guilty/</guid>
    <pubDate>Thu, 21 May 2026 05:43:31 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Two U.S.-based business executives have pleaded guilty to their roles in enabling large-scale tech-support fraud operations linked to call centers in India, according to the U.S. Department of Justice. Adam Young, 42, former CEO of a telecommunications services company based in M…</description>
  </item>
  <item>
    <title>BadIIS Malware Hijacks IIS Servers to Redirect Users to Illicit Sites</title>
    <link>https://gbhackers.com/badiis-malware-hijacks-iis/</link>
    <guid isPermaLink="true">https://gbhackers.com/badiis-malware-hijacks-iis/</guid>
    <pubDate>Thu, 21 May 2026 05:34:21 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>A new variant of the BadIIS malware that hijacks Microsoft IIS web servers to redirect users to illicit websites, highlighting an evolving malware-as-a-service (MaaS) ecosystem operated by Chinese-speaking cybercrime groups. The newly analyzed variant is marked by embedded “demo.…</description>
  </item>
  <item>
    <title>Most dark web activity revolves around a handful of topics</title>
    <link>https://www.helpnetsecurity.com/2026/05/21/dark-web-activity-research/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/21/dark-web-activity-research/</guid>
    <pubDate>Thu, 21 May 2026 05:30:02 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Dark web activity often becomes visible during marketplace seizures, major data leaks, or sudden spikes in criminal activity. Those events can create an impression of an ecosystem where attention shifts quickly and new trends regularly replace old ones. A six-year dataset coverin…</description>
  </item>
  <item>
    <title>P2PInfect Botnet Targets Kubernetes via Exposed Redis</title>
    <link>https://gbhackers.com/p2pinfect-botnet-targets-kubernetes/</link>
    <guid isPermaLink="true">https://gbhackers.com/p2pinfect-botnet-targets-kubernetes/</guid>
    <pubDate>Thu, 21 May 2026 06:41:45 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>A persistent P2Pinfect botnet campaign targeting Google Kubernetes Engine (GKE) clusters through exposed Redis instances, highlighting how a single cloud misconfiguration can enable long-term compromise. In several investigated environments, attackers maintained access for up to …</description>
  </item>
  <item>
    <title>Riverbed introduces new Aternity tools for autonomous IT operations</title>
    <link>https://www.helpnetsecurity.com/2026/05/21/riverbed-aternity-innovations/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/21/riverbed-aternity-innovations/</guid>
    <pubDate>Thu, 21 May 2026 07:49:40 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Riverbed has announced new capabilities for Aternity designed to support autonomous IT operations for digital experience management. The updates help digital workplace teams move toward prevention-focused operations through broader visibility, context-aware intelligence, and gove…</description>
  </item>
  <item>
    <title>Forward launches Predict to test network changes before deployment</title>
    <link>https://www.helpnetsecurity.com/2026/05/21/forward-launches-predict-to-test-network-changes-before-deployment/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/21/forward-launches-predict-to-test-network-changes-before-deployment/</guid>
    <pubDate>Thu, 21 May 2026 07:36:17 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Forward has unveiled Forward Predict, a new capability that allows organizations to evaluate the impact of network changes before deployment. By testing proposed changes against a digital twin of the production network, Forward Predict helps identify potential issues before they …</description>
  </item>
  <item>
    <title>CTERA brings AI insights and automation for unstructured data</title>
    <link>https://www.helpnetsecurity.com/2026/05/21/ctera-insightai/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/21/ctera-insightai/</guid>
    <pubDate>Thu, 21 May 2026 07:25:50 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>CTERA has announced the launch of CTERA InsightAI, an agentic AI intelligence layer for the CTERA Intelligent Data Platform. The new capability is designed to help enterprises understand, manage, secure, and optimize unstructured data environments. CTERA InsightAI adds AI-driven …</description>
  </item>
  <item>
    <title>Virtru centers file collaboration around data-level protection</title>
    <link>https://www.helpnetsecurity.com/2026/05/21/virtru-centers-file-collaboration-around-data-level-protection/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/21/virtru-centers-file-collaboration-around-data-level-protection/</guid>
    <pubDate>Thu, 21 May 2026 08:20:14 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Virtru unveiled Virtru Collaborate, a new offering that eliminates that tradeoff, a FedRAMP authorized space where sensitive files are encrypted and protected by the Trusted Data Format (TDF), and where that protection travels seamlessly with the data as teams work together acros…</description>
  </item>
  <item>
    <title>Tenable Hexa AI automates remediation across attack surfaces</title>
    <link>https://www.helpnetsecurity.com/2026/05/21/tenable-hexa-ai-automates-remediation-across-attack-surfaces/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/21/tenable-hexa-ai-automates-remediation-across-attack-surfaces/</guid>
    <pubDate>Thu, 21 May 2026 08:02:56 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Tenable has announced the general availability of Tenable Hexa AI, the agentic AI engine of the Tenable One Exposure Management Platform. Tenable Hexa AI is an advanced agentic AI for cybersecurity solution, equipped with advanced multi-step reasoning and Model Context Protocol (…</description>
  </item>
  <item>
    <title>TamperedChef Malware Hides in Signed Apps to Drop Stealers and RATs</title>
    <link>https://gbhackers.com/tamperedchef-malware-hides-in-signed-apps/</link>
    <guid isPermaLink="true">https://gbhackers.com/tamperedchef-malware-hides-in-signed-apps/</guid>
    <pubDate>Thu, 21 May 2026 09:42:32 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>A large-scale malware campaign dubbed “TamperedChef” is leveraging trojanized productivity applications such as PDF editors, calendar tools, and file converters to silently deploy information stealers and remote access trojans (RATs), according to recent threat intelligence findi…</description>
  </item>
  <item>
    <title>Fake Microsoft Teams Downloads Spread ValleyRAT Malware</title>
    <link>https://gbhackers.com/fake-microsoft-teams-downloads/</link>
    <guid isPermaLink="true">https://gbhackers.com/fake-microsoft-teams-downloads/</guid>
    <pubDate>Thu, 21 May 2026 10:25:57 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Hackers are actively distributing a sophisticated ValleyRAT malware variant through fake Microsoft Teams download pages, leveraging social engineering and multi-stage execution techniques to evade detection. The campaign, first observed in mid-April on the X platform, uses fraudu…</description>
  </item>
  <item>
    <title>The readiness paradox: Why a false sense of cyber confidence is becoming a liability</title>
    <link>https://cyberscoop.com/cybersecurity-readiness-paradox-resilience-op-ed/</link>
    <guid isPermaLink="true">https://cyberscoop.com/cybersecurity-readiness-paradox-resilience-op-ed/</guid>
    <pubDate>Thu, 21 May 2026 10:00:00 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>As AI expands the attack surface and alert fatigue grows, cyber exposure management offers a clearer path to understanding where risk truly concentrates and how to reduce it before a crisis hits. The post The readiness paradox: Why a false sense of cyber confidence is becoming a …</description>
  </item>
  <item>
    <title>Discord Enables End-to-End Encryption by Default Across Voice and Video Features</title>
    <link>https://gbhackers.com/discord-enables-end-to-end-encryption/</link>
    <guid isPermaLink="true">https://gbhackers.com/discord-enables-end-to-end-encryption/</guid>
    <pubDate>Thu, 21 May 2026 11:18:12 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Discord has officially enabled end-to-end encryption (E2EE) by default for all voice and video communications across its platform, marking a significant shift in user privacy and secure communications. The announcement, made on May 18, 2026, confirms that every voice and video ca…</description>
  </item>
  <item>
    <title>Fitbit Air vs Pixel Watch 4: Which Should You Wear at Night?</title>
    <link>https://www.techrepublic.com/article/news-fitbit-air-pixel-watch-4-gh/</link>
    <guid isPermaLink="true">https://www.techrepublic.com/article/news-fitbit-air-pixel-watch-4-gh/</guid>
    <pubDate>Thu, 21 May 2026 14:24:17 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Fitbit Air offers $99 sleep-first tracking, Pixel Watch 4 pairing, and a cheaper Whoop alternative, but Google’s AI coaching remains unproven. The post Fitbit Air vs Pixel Watch 4: Which Should You Wear at Night? appeared first on TechRepublic .</description>
  </item>
  <item>
    <title>Google Health 5.0 Brings New Fitbit App Design, AI Coach, and Android Widget</title>
    <link>https://www.techrepublic.com/article/news-google-health-fitbit-app-ai-coach-widget/</link>
    <guid isPermaLink="true">https://www.techrepublic.com/article/news-google-health-fitbit-app-ai-coach-widget/</guid>
    <pubDate>Thu, 21 May 2026 12:46:38 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Google Health 5.0 replaces the Fitbit app with a redesigned layout, Gemini-powered coaching, a new Android widget, and retired Fitbit features. The post Google Health 5.0 Brings New Fitbit App Design, AI Coach, and Android Widget appeared first on TechRepublic .</description>
  </item>
  <item>
    <title>Google Brings a Long-Missing Apple Feature to Android</title>
    <link>https://www.techrepublic.com/article/news-google-continue-on-android-17-handoff/</link>
    <guid isPermaLink="true">https://www.techrepublic.com/article/news-google-continue-on-android-17-handoff/</guid>
    <pubDate>Thu, 21 May 2026 12:38:18 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Google’s Continue On in Android 17 lets users move supported tasks from phone to tablet, bringing Apple-like Handoff to Android devices soon. The post Google Brings a Long-Missing Apple Feature to Android appeared first on TechRepublic .</description>
  </item>
  <item>
    <title>Permanent Jobs Fall in UK as Temporary Placements Rise: Report</title>
    <link>https://www.techrepublic.com/article/uk-permanent-jobs-fall-temporary-placements-rise/</link>
    <guid isPermaLink="true">https://www.techrepublic.com/article/uk-permanent-jobs-fall-temporary-placements-rise/</guid>
    <pubDate>Thu, 21 May 2026 12:26:56 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>UK permanent job placements fell in April while temporary hires rose due to economic uncertainty and global conflict, according to a new KPMG/REC report The post Permanent Jobs Fall in UK as Temporary Placements Rise: Report appeared first on TechRepublic .</description>
  </item>
  <item>
    <title>Historic SpaceX IPO Filing Reveals Starlink, AI, and Mars Ambitions</title>
    <link>https://www.techrepublic.com/article/news-spacex-ipo-filing-starlink-ai-starship-musk/</link>
    <guid isPermaLink="true">https://www.techrepublic.com/article/news-spacex-ipo-filing-starlink-ai-starship-musk/</guid>
    <pubDate>Thu, 21 May 2026 15:29:38 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>SpaceX’s IPO filing reveals Starlink’s revenue role, major AI spending, Starship costs, Musk’s control, and legal risks facing investors. The post Historic SpaceX IPO Filing Reveals Starlink, AI, and Mars Ambitions appeared first on TechRepublic .</description>
  </item>
  <item>
    <title>Glucose Tracking Is Turning Into the Next Big Health Data Platform</title>
    <link>https://www.techrepublic.com/article/news-ai-glucose-monitors-wellness-wearables/</link>
    <guid isPermaLink="true">https://www.techrepublic.com/article/news-ai-glucose-monitors-wellness-wearables/</guid>
    <pubDate>Thu, 21 May 2026 15:07:39 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Glucose tracking is moving beyond diabetes care as CGMs, AI platforms, and wearable sensors reshape personalized health data and wellness tools. The post Glucose Tracking Is Turning Into the Next Big Health Data Platform appeared first on TechRepublic .</description>
  </item>
  <item>
    <title>Shifting Budget Dynamics for Identity Security and AI Agents</title>
    <link>https://www.darkreading.com/identity-access-management-security/shifting-budget-dynamics-for-identity-security-and-ai-agents</link>
    <guid isPermaLink="true">https://www.darkreading.com/identity-access-management-security/shifting-budget-dynamics-for-identity-security-and-ai-agents</guid>
    <pubDate>Thu, 21 May 2026 08:00:00 +0000</pubDate>
    <category>Cyber Threat Landscape</category>
    <description>AI agent projects are proliferating throughout the enterprise, and those AI agent identities require management, security, and governance. New Omdia research shows the AI agent identity budget dynamics are very different than traditional IAM projects.</description>
  </item>
  <item>
    <title>ASCII art in phishing emails | Kaspersky official blog</title>
    <link>https://www.kaspersky.com/blog/ascii-qr-phishing/55789/</link>
    <guid isPermaLink="true">https://www.kaspersky.com/blog/ascii-qr-phishing/55789/</guid>
    <pubDate>Thu, 21 May 2026 05:00:04 +0000</pubDate>
    <category>Cyber Threat Landscape</category>
    <description>Cybercriminals using ASCII art to create pseudographics QR codes with embedded phishing links.</description>
  </item>
  <item>
    <title>Catch spyware in the act with Windows Webcam Monitoring</title>
    <link>https://www.malwarebytes.com/blog/product/2026/05/catch-spyware-in-the-act-with-windows-webcam-monitoring</link>
    <guid isPermaLink="true">https://www.malwarebytes.com/blog/product/2026/05/catch-spyware-in-the-act-with-windows-webcam-monitoring</guid>
    <pubDate>Thu, 21 May 2026 10:19:18 +0000</pubDate>
    <category>Cyber Threat Landscape</category>
    <description>Know when a program tries to access your webcam so you can allow or block, in real time.</description>
  </item>
  <item>
    <title>Three-Quarters of Firms Knowingly Ship Vulnerable Code</title>
    <link>https://www.infosecurity-magazine.com/news/threequarters-knowingly-ship/</link>
    <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/threequarters-knowingly-ship/</guid>
    <pubDate>Thu, 21 May 2026 13:00:00 +0000</pubDate>
    <category>Cyber Threat Landscape</category>
    <description>AI risks threaten to permeate supply chains through unvetted code and unaudited suppliers</description>
  </item>
  <item>
    <title>AI Agents Are Shifting Identity Security Budget Dynamics</title>
    <link>https://www.darkreading.com/identity-access-management-security/shifting-budget-dynamics-identity-security-ai-agents</link>
    <guid isPermaLink="true">https://www.darkreading.com/identity-access-management-security/shifting-budget-dynamics-identity-security-ai-agents</guid>
    <pubDate>Thu, 21 May 2026 15:43:37 +0000</pubDate>
    <category>Cyber Threat Landscape</category>
    <description>AI agent projects are proliferating throughout the enterprise, and those AI agent identities require management, security, and governance. New Omdia research shows the AI agent identity budget dynamics are very different than traditional IAM projects.</description>
  </item>
  <item>
    <title>Who’s responsible when AI starts making mistakes?</title>
    <link>https://thecyberwire.com/podcasts/ai-security-brief/3/notes</link>
    <guid isPermaLink="true">https://thecyberwire.com/podcasts/ai-security-brief/3/notes</guid>
    <pubDate>Thu, 21 May 2026 05:00:00 +0000</pubDate>
    <category>Podcasts</category>
    <description>With over two decades of experience spanning global CIO and CISO roles Sachin Jain has a perspective on accountability that goes well beyond the CISO&#x27;s desk. In this episode, Sachin shares why AI governance is a shared responsibility across the organization, and offers practical …</description>
  </item>
  <item>
    <title>Scam ads, AI hallucinations, and legal implications.</title>
    <link>https://thecyberwire.com/podcasts/caveat/309/notes</link>
    <guid isPermaLink="true">https://thecyberwire.com/podcasts/caveat/309/notes</guid>
    <pubDate>Thu, 21 May 2026 05:00:00 +0000</pubDate>
    <category>Infosec News</category>
    <description>This week, Dave and Ben sit down to discuss two legal cases. The first case involves Santa Clara suing Meta over alleged scam ads. The second story looks at a now dismissed case where the lawyers could potentially face consequences for allegedly using fake AI citations in their f…</description>
  </item>
  <item>
    <title>The EU Is Going Through a Trump-Fueled Breakup With Big Tech</title>
    <link>https://www.wired.com/story/the-eu-is-going-through-a-trump-fueled-breakup-with-big-tech/</link>
    <guid isPermaLink="true">https://www.wired.com/story/the-eu-is-going-through-a-trump-fueled-breakup-with-big-tech/</guid>
    <pubDate>Thu, 21 May 2026 06:00:00 +0000</pubDate>
    <category>Infosec News</category>
    <description>France is already moving on from Zoom and Microsoft Teams in favor of homegrown alternatives. Other countries are quickly following suit.</description>
  </item>
  <item>
    <title>Discord adds end-to-end encryption to voice and video calls by default</title>
    <link>https://securityaffairs.com/192463/security/discord-adds-end-to-end-encryption-to-voice-and-video-calls-by-default.html</link>
    <guid isPermaLink="true">https://securityaffairs.com/192463/security/discord-adds-end-to-end-encryption-to-voice-and-video-calls-by-default.html</guid>
    <pubDate>Thu, 21 May 2026 06:40:53 +0000</pubDate>
    <category>Infosec News</category>
    <description>Discord now enables end-to-end encryption by default for all voice and video calls, making conversations inaccessible even to the platform itself. No announcement fanfare, no opt-in required, no settings to dig through. Discord flipped a switch on Monday and end-to-end encryption…</description>
  </item>
  <item>
    <title>When Identity is the Attack Path</title>
    <link>https://thehackernews.com/2026/05/when-identity-is-attack-path.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/05/when-identity-is-attack-path.html</guid>
    <pubDate>Thu, 21 May 2026 16:00:00 +0530</pubDate>
    <category>Infosec News</category>
    <description>Consider a cached access key on a single Windows machine. It got there the way most cached credentials do - a user logged in, and the key stored itself automatically. Standard AWS behavior. No one misconfigured anything or violated a policy. Yet that single key, which was easily …</description>
  </item>
  <item>
    <title>Researchers left AI agents alone in a virtual town and watched it all unravel</title>
    <link>https://www.malwarebytes.com/blog/ai/2026/05/researchers-left-ai-agents-alone-in-a-virtual-town-and-watched-it-all-unravel</link>
    <guid isPermaLink="true">https://www.malwarebytes.com/blog/ai/2026/05/researchers-left-ai-agents-alone-in-a-virtual-town-and-watched-it-all-unravel</guid>
    <pubDate>Thu, 21 May 2026 10:01:54 +0000</pubDate>
    <category>Infosec News</category>
    <description>Told not to commit crimes, the AI agents mostly did anyway. Arson, violence, romance, self-deletion, and general chaos quickly ensued.</description>
  </item>
  <item>
    <title>Scammers are abusing an internal Microsoft account to send spam links</title>
    <link>https://techcrunch.com/2026/05/21/scammers-are-abusing-an-internal-microsoft-account-to-send-spam/</link>
    <guid isPermaLink="true">https://techcrunch.com/2026/05/21/scammers-are-abusing-an-internal-microsoft-account-to-send-spam/</guid>
    <pubDate>Thu, 21 May 2026 11:42:57 +0000</pubDate>
    <category>Infosec News</category>
    <description>The loophole allows spammers and scammers to send emails from a legitimate Microsoft email address typically used for sending genuine account alerts.</description>
  </item>
  <item>
    <title>TikTok, YouTube, and Roblox face scrutiny, but age gates won’t fix child safety</title>
    <link>https://www.malwarebytes.com/blog/family-and-parenting/2026/05/tiktok-youtube-and-roblox-face-scrutiny-but-age-gates-wont-fix-child-safety</link>
    <guid isPermaLink="true">https://www.malwarebytes.com/blog/family-and-parenting/2026/05/tiktok-youtube-and-roblox-face-scrutiny-but-age-gates-wont-fix-child-safety</guid>
    <pubDate>Thu, 21 May 2026 11:08:37 +0000</pubDate>
    <category>Infosec News</category>
    <description>Ofcom says TikTok and YouTube are &quot;not safe enough&quot; for children, but simply adding stricter age checks is not the answer.</description>
  </item>
  <item>
    <title>Nine-Year-Old Linux Kernel Flaw Leaks SSH Keys and Password Hashes</title>
    <link>https://www.infosecurity-magazine.com/news/linux-kernel-ptrace-flaw-ssh-keys/</link>
    <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/linux-kernel-ptrace-flaw-ssh-keys/</guid>
    <pubDate>Thu, 21 May 2026 12:00:00 +0000</pubDate>
    <category>Infosec News</category>
    <description>Qualys finds nine-year-old Linux ptrace flaw exposing SSH keys and password hashes locally</description>
  </item>
  <item>
    <title>FreePBX Security Flaw Lets Attackers Access User Portals</title>
    <link>https://gbhackers.com/freepbx-security-flaw/</link>
    <guid isPermaLink="true">https://gbhackers.com/freepbx-security-flaw/</guid>
    <pubDate>Wed, 20 May 2026 06:30:14 +0000</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>A critical security vulnerability has been discovered in FreePBX, a widely used open-source PBX platform, allowing unauthenticated attackers to access user portals under certain conditions. The flaw, tracked as CVE-2026-46376, carries a CVSS v4 base score of 9.1 and affects the U…</description>
  </item>
  <item>
    <title>CVE Lite CLI: Open-source dependency vulnerability scanner</title>
    <link>https://www.helpnetsecurity.com/2026/05/20/cve-lite-cli-open-source-dependency-vulnerability-scanner/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/20/cve-lite-cli-open-source-dependency-vulnerability-scanner/</guid>
    <pubDate>Wed, 20 May 2026 06:00:59 +0000</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Dependency vulnerability scanning in JavaScript and TypeScript projects has long sat at the end of the development pipeline. Pull requests get opened, continuous integration runs, and a security scanner returns a list of CVE identifiers that developers then have to triage hours o…</description>
  </item>
  <item>
    <title>CVE-2026-43493 crypto: pcrypt - Fix handling of MAY_BACKLOG requests</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43493</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43493</guid>
    <pubDate>Wed, 20 May 2026 01:01:28 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-43491 net: qrtr: ns: Limit the maximum server registration per node</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43491</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43491</guid>
    <pubDate>Wed, 20 May 2026 01:01:33 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>CVE-2026-43492 lib/crypto: mpi: Fix integer underflow in mpi_read_raw_from_sgl()</title>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43492</link>
    <guid isPermaLink="true">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43492</guid>
    <pubDate>Wed, 20 May 2026 01:01:22 -0700</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Information published.</description>
  </item>
  <item>
    <title>Pardus Linux Vulnerability Lets Local Attackers Gain Silent Root Access</title>
    <link>https://gbhackers.com/pardus-linux-vulnerability/</link>
    <guid isPermaLink="true">https://gbhackers.com/pardus-linux-vulnerability/</guid>
    <pubDate>Wed, 20 May 2026 08:39:56 +0000</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>A critical privilege escalation vulnerability chain, tracked as CVE-2026-5140, has been discovered in the Pardus Linux update mechanism, allowing local users to gain full root access without authentication. The issue, rated CVSS 9.3 (Critical), affects the pardus-update package a…</description>
  </item>
  <item>
    <title>DirtyDecrypt: PoC Released for yet another Linux flaw</title>
    <link>https://securityaffairs.com/192436/uncategorized/dirtydecrypt-poc-released-for-yet-another-linux-flaw.html</link>
    <guid isPermaLink="true">https://securityaffairs.com/192436/uncategorized/dirtydecrypt-poc-released-for-yet-another-linux-flaw.html</guid>
    <pubDate>Wed, 20 May 2026 07:36:57 +0000</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>DirtyDecrypt (CVE-2026-31635): working PoC out for a Linux kernel LPE flaw. Missing COW guard in rxgk_decrypt_skb lets local attackers reach root. After Copy Fail, Dirty Frag, and Fragnesia, here comes DirtyDecrypt, another local privilege escalation vulnerability in the kernel, …</description>
  </item>
  <item>
    <title>Microsoft provides mitigation for “YellowKey” BitLocker bypass flaw (CVE-2026-45585)</title>
    <link>https://www.helpnetsecurity.com/2026/05/20/yellowkey-bitlocker-mitigation-cve-2026-45585/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/20/yellowkey-bitlocker-mitigation-cve-2026-45585/</guid>
    <pubDate>Wed, 20 May 2026 08:33:52 +0000</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Microsoft is working on a fix for CVE-2026-45585 (aka &amp;#8220;Yellowkey&amp;#8221;), a vulnerability that can be used by attackers to bypass protections offered by BitLocker, the full-disk encryption feature built into Windows, and access users&amp;#8217; data. In the meantime, the compan…</description>
  </item>
  <item>
    <title>Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit</title>
    <link>https://thehackernews.com/2026/05/microsoft-releases-mitigation-for.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/05/microsoft-releases-mitigation-for.html</guid>
    <pubDate>Wed, 20 May 2026 13:58:26 +0530</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Microsoft on Tuesday released a mitigation for a BitLocker bypass vulnerability named YellowKey following its public disclosure last week. The zero-day flaw, now tracked as CVE-2026-45585, carries a CVSS score of 6.8. It has been described as a BitLocker security feature bypass. …</description>
  </item>
  <item>
    <title>Why some security fixes never reach your vulnerability dashboard</title>
    <link>https://www.csoonline.com/article/4173425/why-some-security-fixes-never-reach-your-vulnerability-dashboard.html</link>
    <guid isPermaLink="true">https://www.csoonline.com/article/4173425/why-some-security-fixes-never-reach-your-vulnerability-dashboard.html</guid>
    <pubDate>Wed, 20 May 2026 09:00:00 +0000</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>On April 22, for roughly 90 minutes, a malicious version of Bitwarden CLI appeared on npm. Version 2026.4.0 contained a credential-stealing payload that executed an obfuscated loader and harvested AWS, Azure, GCP, GitHub, and npm tokens from any developer machine that ran npm ins…</description>
  </item>
  <item>
    <title>How an image could compromise your Mac: understanding an ExifTool vulnerability (CVE-2026-3102)</title>
    <link>https://securelist.com/exiftool-compromise-mac/119866/</link>
    <guid isPermaLink="true">https://securelist.com/exiftool-compromise-mac/119866/</guid>
    <pubDate>Wed, 20 May 2026 09:02:31 +0000</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>We explain how a flaw in ExifTool allows attackers to compromise macOS systems via a malicious image (CVE-2026-3102).</description>
  </item>
  <item>
    <title>Critical ExifTool Vulnerability Lets Hackers Compromise Macs via Malicious Images</title>
    <link>https://gbhackers.com/exiftool-vulnerability-2/</link>
    <guid isPermaLink="true">https://gbhackers.com/exiftool-vulnerability-2/</guid>
    <pubDate>Wed, 20 May 2026 13:26:42 +0000</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>A newly disclosed vulnerability in ExifTool, tracked as CVE-2026-3102, exposes macOS systems to command execution attacks through malicious image metadata, highlighting ongoing risks in widely used file processing tools. ExifTool is a popular utility used across media workflows t…</description>
  </item>
  <item>
    <title>NVIDIA Triton Inference Server Flaw Raises Risk of Unauthorized Access</title>
    <link>https://gbhackers.com/nvidia-triton-inference-server-flaw-raises-risk-of-unauthorized-access/</link>
    <guid isPermaLink="true">https://gbhackers.com/nvidia-triton-inference-server-flaw-raises-risk-of-unauthorized-access/</guid>
    <pubDate>Wed, 20 May 2026 12:13:19 +0000</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>NVIDIA has disclosed a critical security vulnerability in its Triton Inference Server that could allow attackers to bypass authentication and gain unauthorized access to affected systems. The flaw, tracked as CVE-2026-24207, has been assigned a CVSS v3.1 score of 9.8, indicating …</description>
  </item>
  <item>
    <title>Microsoft issues YellowKey mitigation, no patch yet</title>
    <link>https://securityaffairs.com/192449/hacking/microsoft-issues-yellowkey-mitigation-no-patch-yet.html</link>
    <guid isPermaLink="true">https://securityaffairs.com/192449/hacking/microsoft-issues-yellowkey-mitigation-no-patch-yet.html</guid>
    <pubDate>Wed, 20 May 2026 15:07:51 +0000</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Microsoft acknowledged the YellowKey BitLocker bypass flaw and released mitigations, urging admins to disable autofstx.exe and enable TPM+PIN. A week after Chaotic Eclipse publicly dropped the YellowKey vulnerability, Microsoft acknowledged it and published a mitigation. Not a pa…</description>
  </item>
  <item>
    <title>VU#980487: Local privilege escalation in Linux Kernel (Dirty Frag)</title>
    <link>https://kb.cert.org/vuls/id/980487</link>
    <guid isPermaLink="true">https://kb.cert.org/vuls/id/980487</guid>
    <pubDate>Wed, 20 May 2026 21:23:46 +0000</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Overview A privilege escalation vulnerability, nicknamed &quot;Dirty Frag,&quot; has been discovered in the Linux kernel versions 4.10 and later. This vulnerability is a result of chaining together two previously discovered vulnerabilities, xfrm-ESP Page-Cache Write CVE-2026-43284 and the …</description>
  </item>
  <item>
    <title>Drupal admins rushing to patch maximum severity SQL injection vulnerability</title>
    <link>https://www.csoonline.com/article/4175329/drupal-admins-rushing-to-patch-maximum-severity-sql-injection-vulnerability.html</link>
    <guid isPermaLink="true">https://www.csoonline.com/article/4175329/drupal-admins-rushing-to-patch-maximum-severity-sql-injection-vulnerability.html</guid>
    <pubDate>Wed, 20 May 2026 23:58:57 +0000</pubDate>
    <category>Common Vulnerabilities and Exposures</category>
    <description>Administrators of the Drupal open source content management platform are rushing to install an emergency patch issued today to fix a “highly critical” SQL injection vulnerability in the application’s core. While the vulnerability only affects websites that use the PostgreSQL data…</description>
  </item>
  <item>
    <title>Windows 11 BitLocker Zero-Day, TeamPCP Malware Leak, Iran Gas Station Hacks | Cybersecurity Today</title>
    <link>https://cybersecuritytoday.libsyn.com/windows-11-bitlocker-zero-day-teampcp-malware-leak-iran-gas-station-hacks-cybersecurity-today</link>
    <guid isPermaLink="true">https://cybersecuritytoday.libsyn.com/windows-11-bitlocker-zero-day-teampcp-malware-leak-iran-gas-station-hacks-cybersecurity-today</guid>
    <pubDate>Wed, 20 May 2026 03:07:00 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>A serious new Windows 11 BitLocker vulnerability, open-sourced offensive malware tools, a suspected Iranian cyber campaign targeting U.S. fuel infrastructure, and malware that appears designed to interfere with nuclear weapons simulation systems. Cybersecurity Today would like to…</description>
  </item>
  <item>
    <title>GitHub Investigating TeamPCP Claimed Breach of ~4,000 Internal Repositories</title>
    <link>https://thehackernews.com/2026/05/github-investigating-teampcp-claimed.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/05/github-investigating-teampcp-claimed.html</guid>
    <pubDate>Wed, 20 May 2026 09:31:15 +0530</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>GitHub on Tuesday said it&#x27;s investigating unauthorized access to its internal repositories after the notorious threat actor known as TeamPCP listed the platform&#x27;s source code and internal organizations for sale on a cybercrime forum. &quot;While we currently have no evidence of impact…</description>
  </item>
  <item>
    <title>Grafana GitHub Breach Exposes Source Code via TanStack npm Attack</title>
    <link>https://thehackernews.com/2026/05/grafana-github-breach-exposes-source.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/05/grafana-github-breach-exposes-source.html</guid>
    <pubDate>Wed, 20 May 2026 10:42:06 +0530</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Grafana Labs, on May 19, 2026, said an investigation into its recent breach found no evidence of customer production systems or operations being compromised. It said the scope of the incident is limited to the Grafana Labs GitHub environment, which includes public and private sou…</description>
  </item>
  <item>
    <title>PoC Exploit Released for DirtyDecrypt Linux Kernel Vulnerability</title>
    <link>https://gbhackers.com/poc-exploit-dirtydecrypt-linux-kernel-vulnerability/</link>
    <guid isPermaLink="true">https://gbhackers.com/poc-exploit-dirtydecrypt-linux-kernel-vulnerability/</guid>
    <pubDate>Wed, 20 May 2026 05:44:20 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>PoC exploit code for the DirtyDecrypt (DirtyCBC) Linux kernel vulnerability has been released publicly, turning a previously theoretical local privilege escalation into a practical, copy‑paste exploit path to root on specific Linux distributions. DirtyDecrypt (also called DirtyCB…</description>
  </item>
  <item>
    <title>Hackers Exploit MSHTA to Deploy LummaStealer and Amatera Malware</title>
    <link>https://gbhackers.com/lummastealer-and-amatera-malware/</link>
    <guid isPermaLink="true">https://gbhackers.com/lummastealer-and-amatera-malware/</guid>
    <pubDate>Wed, 20 May 2026 05:38:46 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Hackers are increasingly abusing the legacy Microsoft HTML Application Host (MSHTA) utility to deliver commodity malware such as LummaStealer and Amatera. Despite being tied to Internet Explorer, which was retired in 2022, MSHTA remains default in Windows, making it an attractive…</description>
  </item>
  <item>
    <title>GitHub Source Code Reportedly Compromised, TeamPCP Claims Breach</title>
    <link>https://gbhackers.com/github-source-code-reportedly-compromised/</link>
    <guid isPermaLink="true">https://gbhackers.com/github-source-code-reportedly-compromised/</guid>
    <pubDate>Wed, 20 May 2026 05:14:49 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>A threat actor group known as TeamPCP has claimed responsibility for a significant breach involving GitHub’s internal systems, alleging the theft of sensitive source code and proprietary organizational data. The group is currently offering the allegedly stolen dataset for sale on…</description>
  </item>
  <item>
    <title>Risky Business #838 -- GitHub investigates possible breach</title>
    <link>https://risky.biz/RB838/</link>
    <guid isPermaLink="true">https://risky.biz/RB838/</guid>
    <pubDate>Wed, 20 May 2026 15:22:48 +1000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>On this week’s show Patrick Gray, Adam Boileau and James Wilson discuss the week’s cybersecurity news. They cover: GitHub announced a possible breach CISA leaks important creds, keys in public repo Awful vulnerability in Bitlocker renders it useless without a PIN So. Many. Patche…</description>
  </item>
  <item>
    <title>New NGINX Vulnerability Exposes Servers to Malicious Code Execution</title>
    <link>https://gbhackers.com/new-nginx-vulnerability-exposes-servers/</link>
    <guid isPermaLink="true">https://gbhackers.com/new-nginx-vulnerability-exposes-servers/</guid>
    <pubDate>Wed, 20 May 2026 06:52:54 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>NGINX has disclosed a new high‑severity vulnerability in its JavaScript module that can allow remote attackers to crash servers and, in specific conditions, execute arbitrary code on vulnerable systems. F5 has published a security advisory (K000161307) describing a flaw in the NG…</description>
  </item>
  <item>
    <title>Alleged Huawei zero-day blamed for the 2025 Luxembourg telecom crash</title>
    <link>https://securityaffairs.com/192431/hacking/alleged-huawei-zero-day-blamed-for-the-2025-luxembourg-telecom-crash.html</link>
    <guid isPermaLink="true">https://securityaffairs.com/192431/hacking/alleged-huawei-zero-day-blamed-for-the-2025-luxembourg-telecom-crash.html</guid>
    <pubDate>Wed, 20 May 2026 05:30:04 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>A Huawei zero-day flaw reportedly caused Luxembourg’s 2025 nationwide outage, disrupting landline, 4G/5G, and emergency services On July 23, 2025, a nationwide telecom outage in Luxembourg was reportedly triggered by a previously undisclosed flaw in Huawei enterprise routers. The…</description>
  </item>
  <item>
    <title>Interpol&#x27;s &#x27;Operation Ramz&#x27; Pioneers Cross-Region Collabs in Middle East</title>
    <link>https://www.darkreading.com/cybersecurity-operations/interpol-operation-ramz-cross-region-middle-east</link>
    <guid isPermaLink="true">https://www.darkreading.com/cybersecurity-operations/interpol-operation-ramz-cross-region-middle-east</guid>
    <pubDate>Wed, 20 May 2026 07:00:00 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>While the numbers are modest, the crackdown on cybercrime involved 13 countries in the MENA region, the largest law enforcement collaboration to date.</description>
  </item>
  <item>
    <title>Verizon DBIR: Vulnerability Exploits Overtake Credentials as Top Access Vector</title>
    <link>https://www.infosecurity-magazine.com/news/verizon-dbir-exploits-top-access/</link>
    <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/verizon-dbir-exploits-top-access/</guid>
    <pubDate>Wed, 20 May 2026 08:40:00 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Verizon DBIR finds 31% of data breaches began with software flaws last year</description>
  </item>
  <item>
    <title>TeamPCP GitHub Breach: Internal GitHub Repositories Allegedly Accessed</title>
    <link>https://socradar.io/blog/teampcp-github-breach-internal-github-repository/</link>
    <guid isPermaLink="true">https://socradar.io/blog/teampcp-github-breach-internal-github-repository/</guid>
    <pubDate>Wed, 20 May 2026 07:18:04 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>TeamPCP GitHub Breach: Internal GitHub Repositories Allegedly Accessed TeamPCP is back in the headlines, and this time the target is not a plugin, a CI/CD pipeline, or an open-source package. The group is claiming access to GitHub itself, one of the most critical pieces of infras…</description>
  </item>
  <item>
    <title>Shift to Prevention and Enforcement as We Repeat Security Mistakes With AI - Rob Allen - BSW #448</title>
    <link>https://www.youtube.com/watch?v=lwoe4JEyNGE</link>
    <guid isPermaLink="true">https://www.youtube.com/watch?v=lwoe4JEyNGE</guid>
    <pubDate>Wed, 20 May 2026 09:00:57 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Over the last decade, cybersecurity heavily invested in EDR, XDR, SIEM, telemetry, and SOC-driven operations. We stopped asking how to stop attacks and started asking how fast we could detect them. However, Mythos and frontier models have changed that paradigm. How do you detect …</description>
  </item>
  <item>
    <title>GitHub confirms internal repository theft as TeamPCP claims attack</title>
    <link>https://cyberinsider.com/github-confirms-internal-repository-theft-as-teampcp-claims-attack/</link>
    <guid isPermaLink="true">https://cyberinsider.com/github-confirms-internal-repository-theft-as-teampcp-claims-attack/</guid>
    <pubDate>Wed, 20 May 2026 10:28:46 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>GitHub disclosed that it is investigating unauthorized access to its internal repositories after attackers compromised an employee&#x27;s device through a malicious Visual Studio Code extension. The company says there is currently no evidence that customer repositories or enterprise d…</description>
  </item>
  <item>
    <title>TeamPCP breached GitHub’s internal codebase via poisoned VS Code extension</title>
    <link>https://www.helpnetsecurity.com/2026/05/20/github-breached-teampcp/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/20/github-breached-teampcp/</guid>
    <pubDate>Wed, 20 May 2026 10:41:12 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Following TeamPCP&amp;#8217;s claim that they&amp;#8217;ve breached GitHub&amp;#8217;s own private code repositories, the Microsoft-owned company launched an investigation and confirmed the compromise. &amp;#8220;Our current assessment is that the activity involved exfiltration of GitHub-interna…</description>
  </item>
  <item>
    <title>SHub Reaper impersonates Apple, Google, and Microsoft in one MacOS attack chain</title>
    <link>https://www.csoonline.com/article/4174147/shub-reaper-impersonates-apple-google-and-microsoft-in-one-macos-attack-chain.html</link>
    <guid isPermaLink="true">https://www.csoonline.com/article/4174147/shub-reaper-impersonates-apple-google-and-microsoft-in-one-macos-attack-chain.html</guid>
    <pubDate>Wed, 20 May 2026 11:49:23 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>A newly disclosed macOS infostealer campaign is exploiting user trust in some of the biggest names in tech to slip past defenses. Researchers at SentinelOne have detailed a new variant of the SHub malware family, dubbed “Reaper,” that impersonates Apple, Google, and Microsoft at …</description>
  </item>
  <item>
    <title>ArmorCode gives security teams AI workers for exposure and remediation</title>
    <link>https://www.helpnetsecurity.com/2026/05/20/armorcode-anya-agents/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/20/armorcode-anya-agents/</guid>
    <pubDate>Wed, 20 May 2026 11:22:49 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>ArmorCode has announced Anya Agents, a new agentic AI framework delivered on the patented ArmorCode Agentic AI Platform that enables organizations to operationalize AI-driven security workflows at enterprise scale. Built on ArmorCode’s Context Risk Graph, Anya Agents help securit…</description>
  </item>
  <item>
    <title>Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development</title>
    <link>https://thehackernews.com/2026/05/microsoft-open-sources-rampart-and.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/05/microsoft-open-sources-rampart-and.html</guid>
    <pubDate>Wed, 20 May 2026 22:36:54 +0530</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Microsoft has unveiled two new open-source tools called RAMPART and Clarity to assist developers in better testing the security of artificial intelligence (AI) agents. RAMPART, short for Risk Assessment and Measurement Platform for Agentic Red Teaming, functions as a Pytest-nativ…</description>
  </item>
  <item>
    <title>Grafana GitHub Security Incident Reportedly Connected to TanStack npm Ransomware</title>
    <link>https://gbhackers.com/grafana-github-security-incident/</link>
    <guid isPermaLink="true">https://gbhackers.com/grafana-github-security-incident/</guid>
    <pubDate>Wed, 20 May 2026 13:42:43 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Grafana Labs has disclosed a targeted GitHub security incident linked to the ongoing TanStack npm supply chain ransomware campaign, raising concerns about software development pipeline security and token management practices. The company confirmed that attackers gained unauthoriz…</description>
  </item>
  <item>
    <title>Gremlin Stealer Hides C2 and Exfiltration Paths in Encrypted Resources</title>
    <link>https://gbhackers.com/gremlin-stealer-hides-c2/</link>
    <guid isPermaLink="true">https://gbhackers.com/gremlin-stealer-hides-c2/</guid>
    <pubDate>Wed, 20 May 2026 12:44:48 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>A newly identified variant of the Gremlin stealer malware is leveraging advanced obfuscation techniques to conceal its command-and-control (C2) infrastructure and data exfiltration logic within encrypted .NET resource sections. This evolution highlights a significant shift toward…</description>
  </item>
  <item>
    <title>Old Breaches Resold as New Corporate Data Leaks</title>
    <link>https://gbhackers.com/new-corporate-data-leaks/</link>
    <guid isPermaLink="true">https://gbhackers.com/new-corporate-data-leaks/</guid>
    <pubDate>Wed, 20 May 2026 12:17:19 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Dark web data brokers are increasingly recycling old breach data and marketing it as fresh corporate leaks. The activity, largely observed in Chinese-language cybercrime forums and Telegram channels, is creating confusion among organizations and diverting security resources towar…</description>
  </item>
  <item>
    <title>GitHub admits major source code leak after 3,800 internal repositories breached</title>
    <link>https://www.csoonline.com/article/4174747/github-admits-major-source-code-leak-after-3800-internal-repositories-breached-2.html</link>
    <guid isPermaLink="true">https://www.csoonline.com/article/4174747/github-admits-major-source-code-leak-after-3800-internal-repositories-breached-2.html</guid>
    <pubDate>Wed, 20 May 2026 15:47:03 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Microsoft’s GitHub has suffered what appears to be its biggest ever security breach after confirming that attackers exfiltrated code from around 3,800 of the company’s internal repositories. News of the incident first emerged on May 19, when GitHub said it was investigating “unau…</description>
  </item>
  <item>
    <title>Implement agentic AI in cybersecurity with Tenable Hexa AI: Reduce cyber risk at machine speed</title>
    <link>https://www.tenable.com/blog/implement-agentic-ai-in-cybersecurity-to-reduce-risk-tenable-hexa-ai</link>
    <guid isPermaLink="true">https://www.tenable.com/blog/implement-agentic-ai-in-cybersecurity-to-reduce-risk-tenable-hexa-ai</guid>
    <pubDate>Wed, 20 May 2026 09:00:00 -0400</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>As frontier AI models collapse the traditional exploit window, Tenable Hexa AI transforms the security operating model from manual triage to agentic orchestration. See how you can automate vulnerability remediation and super-charge exposure management with Tenable Hexa AI. Key ta…</description>
  </item>
  <item>
    <title>Ukraine probes teen suspect in cyber theft scheme targeting California online shoppers</title>
    <link>https://therecord.media/ukraine-probes-teen-suspect-cyber-theft-scheme</link>
    <guid isPermaLink="true">https://therecord.media/ukraine-probes-teen-suspect-cyber-theft-scheme</guid>
    <pubDate>Wed, 20 May 2026 16:33:00 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>The investigation began after U.S. authorities informed their Ukrainian counterparts that hackers operating from Ukraine could be involved in attacks targeting users of American e-commerce platforms, Ukraine&#x27;s Prosecutor General said.</description>
  </item>
  <item>
    <title>Compromised coding tool helped hackers breach thousands of GitHub repositories</title>
    <link>https://www.cybersecuritydive.com/news/github-hacked-repository-data/820722/</link>
    <guid isPermaLink="true">https://www.cybersecuritydive.com/news/github-hacked-repository-data/820722/</guid>
    <pubDate>Wed, 20 May 2026 10:43:31 -0400</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>The attack is the latest example of hackers&amp;rsquo; intense focus on open-source packages.</description>
  </item>
  <item>
    <title>Carding site B1ack’s Stash dumps 4.6 Million stolen cards for free</title>
    <link>https://securityaffairs.com/192415/cyber-crime/carding-site-b1acks-stash-dumps-4-6-million-stolen-cards-for-free.html</link>
    <guid isPermaLink="true">https://securityaffairs.com/192415/cyber-crime/carding-site-b1acks-stash-dumps-4-6-million-stolen-cards-for-free.html</guid>
    <pubDate>Wed, 20 May 2026 12:14:10 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Carding forum B1ack&amp;#8217;s Stash claims to have released millions of stolen CVV2 payment card records for free after suspending sellers. B1ack&amp;#8217;s Stash, one of the most active stolen card marketplaces on the dark web, has released 4.6 million credit card records for free, n…</description>
  </item>
  <item>
    <title>Patch Now: Critical Flaw in OT Robot OS Gives Attackers Control</title>
    <link>https://www.darkreading.com/ics-ot-security/patch-now-critical-flaw-ot-robot-os</link>
    <guid isPermaLink="true">https://www.darkreading.com/ics-ot-security/patch-now-critical-flaw-ot-robot-os</guid>
    <pubDate>Wed, 20 May 2026 16:12:08 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>An unauthenticated attacker can exploit the command injection vulnerability to gain remote access to robotic systems, causing significant disruption to the environment.</description>
  </item>
  <item>
    <title>Verizon DBIR: Vulnerability exploitation is the dominant initial access vector</title>
    <link>https://www.helpnetsecurity.com/2026/05/20/verizon-2026-dbir-findings/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/20/verizon-2026-dbir-findings/</guid>
    <pubDate>Wed, 20 May 2026 14:10:13 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Vulnerability exploitation has overtaken stolen credentials as the most common way attackers gain initial access to target networks, according to the 2026 Verizon Data Breach Investigations Report. This is the first time credential theft has been knocked off the top spot in the r…</description>
  </item>
  <item>
    <title>NanoCo lands $12 million seed funding, launches enterprise assistant built on NanoClaw</title>
    <link>https://www.helpnetsecurity.com/2026/05/20/nanoco-seed-funding-12-million/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/20/nanoco-seed-funding-12-million/</guid>
    <pubDate>Wed, 20 May 2026 14:00:58 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>NanoCo announced a $12 million seed round, alongside the commercial launch of a professional assistant built on its open-source agent framework NanoClaw. Valley Capital Partners led the round. Docker, Vercel, monday.com, Slow Ventures, Clutch Capital, Factorial Capital, and Huggi…</description>
  </item>
  <item>
    <title>Operationalizing CTEM Faster: Build Surface Command Dashboards in Minutes</title>
    <link>https://www.rapid7.com/blog/post/em-operationalizing-ctem-building-surface-command-dashboards</link>
    <guid isPermaLink="true">https://www.rapid7.com/blog/post/em-operationalizing-ctem-building-surface-command-dashboards</guid>
    <pubDate>Wed, 20 May 2026 12:15:54 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Modern attack surfaces don’t sit still. Cloud expansion, SaaS sprawl, identity complexity, and shadow IT are continuously reshaping organizational risk. For security leaders, visibility isn’t the challenge anymore, but actually operationalizing that visibility is. Surface Command…</description>
  </item>
  <item>
    <title>The cost of trusting the extension ecosystem.</title>
    <link>https://thecyberwire.com/podcasts/daily-podcast/2556/notes</link>
    <guid isPermaLink="true">https://thecyberwire.com/podcasts/daily-podcast/2556/notes</guid>
    <pubDate>Wed, 20 May 2026 20:30:00 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>GitHub confirms a breach tied to a malicious VS Code extension. Anthropic fights a Pentagon blacklist as the White House weighs new AI security rules. Drupal scrambles to patch a critical flaw. Cisco Talos tracks the evolution of BadIIS malware-for-hire. Signal adds anti-phishing…</description>
  </item>
  <item>
    <title>GitHub Confirms Breach, 4K Internal Repos Stolen</title>
    <link>https://www.darkreading.com/application-security/github-confirms-breach-4k-internal-repos-stolen</link>
    <guid isPermaLink="true">https://www.darkreading.com/application-security/github-confirms-breach-4k-internal-repos-stolen</guid>
    <pubDate>Wed, 20 May 2026 20:51:32 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>Open source software giant GitHub confirmed a data breach this week involving the theft of thousands of repos. One threat actor — TeamPCP — took credit.</description>
  </item>
  <item>
    <title>The AI Kill Switch Problem</title>
    <link>https://www.youtube.com/shorts/6qZlS6yr52c</link>
    <guid isPermaLink="true">https://www.youtube.com/shorts/6qZlS6yr52c</guid>
    <pubDate>Wed, 20 May 2026 21:00:07 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>The UK is discussing cybersecurity legislation that could include emergency shutdown mechanisms — “kill switches” — for advanced AI systems that threaten national security or human life. The speaker argues that emergency stop capabilities are reasonable at the system level. AI sy…</description>
  </item>
  <item>
    <title>PinTheft: Another Linux Privilege Escalation, Another Working Exploit, This Time Targeting Arch</title>
    <link>https://securityaffairs.com/192456/security/pintheft-another-linux-privilege-escalation-another-working-exploit-this-time-targeting-arch.html</link>
    <guid isPermaLink="true">https://securityaffairs.com/192456/security/pintheft-another-linux-privilege-escalation-another-working-exploit-this-time-targeting-arch.html</guid>
    <pubDate>Wed, 20 May 2026 20:32:53 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>PinTheft is a Linux LPE flaw in the RDS subsystem with public exploit code. Arch Linux users face the highest risk and should patch immediately. The wave of Linux local privilege escalation vulnerabilities showing up with working exploit code is not slowing down. The latest is Pi…</description>
  </item>
  <item>
    <title>Fake Android Apps Commit Carrier Billing Fraud for Premium Svcs.</title>
    <link>https://www.darkreading.com/mobile-security/fake-android-apps-carrier-billing-fraud</link>
    <guid isPermaLink="true">https://www.darkreading.com/mobile-security/fake-android-apps-carrier-billing-fraud</guid>
    <pubDate>Wed, 20 May 2026 20:35:35 +0000</pubDate>
    <category>Vulnerability Disclosure</category>
    <description>The disguised apps use WebView automation, JavaScript injection, and OTP interception to avoid detection and complete fraudulent subscriptions.</description>
  </item>
  <item>
    <title>Smashing Security podcast #468: High-speed train hacks and homicidal lawnmowers</title>
    <link>https://grahamcluley.com/smashing-security-podcast-468/</link>
    <guid isPermaLink="true">https://grahamcluley.com/smashing-security-podcast-468/</guid>
    <pubDate>Wed, 20 May 2026 23:04:42 +0000</pubDate>
    <category>Security Bulletins</category>
    <description>A 23-year-old radio enthusiast spent £300 on a piece of kit from the internet, and used it to bring four packed high-speed trains to a screeching halt. His defence in court? Possibly the most creative excuse we&#x27;ve heard all year. Meanwhile, owners of $4,000 robot lawnmowers are d…</description>
  </item>
  <item>
    <title>Why Policy in Amazon Bedrock AgentCore chose Cedar for securing agentic workflows</title>
    <link>https://aws.amazon.com/blogs/security/why-policy-in-amazon-bedrock-agentcore-chose-cedar-for-securing-agentic-workflows/</link>
    <guid isPermaLink="true">https://aws.amazon.com/blogs/security/why-policy-in-amazon-bedrock-agentcore-chose-cedar-for-securing-agentic-workflows/</guid>
    <pubDate>Wed, 20 May 2026 20:56:03 +0000</pubDate>
    <category>Security Advisories</category>
    <description>Agents have agency: they adapt and find multiple ways to solve problems. This autonomy creates a fundamental security challenge: the large language model (LLM) at the heart of the agent is non-deterministic, and its decisions can’t be predicted or guaranteed in advance. It can ha…</description>
  </item>
  <item>
    <title>Microsoft disrupts malware code-signing service used by ransomware gangs</title>
    <link>https://www.csoonline.com/article/4173417/microsoft-disrupts-malware-code-signing-service-used-by-ransomware-gangs.html</link>
    <guid isPermaLink="true">https://www.csoonline.com/article/4173417/microsoft-disrupts-malware-code-signing-service-used-by-ransomware-gangs.html</guid>
    <pubDate>Wed, 20 May 2026 00:45:54 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>Microsoft has disrupted the infrastructure powering the largest malware code-signing service used to help ransomware groups and other cybercriminals make malicious programs harder to detect on Windows. The threat actors behind the service used stolen identities and impersonated l…</description>
  </item>
  <item>
    <title>What happens when your identity provider becomes the kill chain</title>
    <link>https://www.helpnetsecurity.com/2026/05/20/idp-kill-chain-video/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/20/idp-kill-chain-video/</guid>
    <pubDate>Wed, 20 May 2026 04:30:14 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>In this Help Net Security video, Colin Constable, CTO at Atsign, explains why your identity provider (IdP) has become the kill chain in cyberattacks. Attackers steal session cookies, tokens, or consent grants you&amp;#8217;ve already issued and walk in behind you. Constable breaks do…</description>
  </item>
  <item>
    <title>FBI warns students and staff that ShinyHunters may come knocking after Canvas breach</title>
    <link>https://www.bitdefender.com/en-us/blog/hotforsecurity/fbi-shinyhunters-canvas-breach</link>
    <guid isPermaLink="true">https://www.bitdefender.com/en-us/blog/hotforsecurity/fbi-shinyhunters-canvas-breach</guid>
    <pubDate>Wed, 20 May 2026 08:28:36 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>Having receive a ransom payment for its attack on Canvas, ShinyHunters and other extortion gangs are only likely to be further incentivised to launch similar attacks in future. Read more in my article on the Hot for Security blog.</description>
  </item>
  <item>
    <title>A malicious VS code extension just breached GitHub ‘s internal repositories</title>
    <link>https://securityaffairs.com/192440/cyber-crime/a-malicious-vs-code-extension-just-breached-github-s-internal-repositories.html</link>
    <guid isPermaLink="true">https://securityaffairs.com/192440/cyber-crime/a-malicious-vs-code-extension-just-breached-github-s-internal-repositories.html</guid>
    <pubDate>Wed, 20 May 2026 08:50:50 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>One employee installed a trojanized VS Code extension. Result: ~3,800 GitHub internal repositories exfiltrated. TeamPCP claims credit, wants $50K. There is something almost ironic about GitHub, the platform that hosts the code for most of the world&amp;#8217;s software, getting breac…</description>
  </item>
  <item>
    <title>Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals</title>
    <link>https://www.helpnetsecurity.com/2026/05/20/encryption-consulting-certsecure-manager-v3-3/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/20/encryption-consulting-certsecure-manager-v3-3/</guid>
    <pubDate>Wed, 20 May 2026 09:16:55 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>Encryption Consulting has released CertSecure Manager v3.3, which automates zero-touch certificate renewal across all major enterprise server platforms and extends CA support to 11 providers, including Google Public CA and AWS. Certificate-related outages can cost enterprises mil…</description>
  </item>
  <item>
    <title>GitHub Confirms Breach of Internal Repositories Via Malicious VS Code Extension</title>
    <link>https://www.infosecurity-magazine.com/news/github-confirms-breach-vs-code/</link>
    <guid isPermaLink="true">https://www.infosecurity-magazine.com/news/github-confirms-breach-vs-code/</guid>
    <pubDate>Wed, 20 May 2026 10:45:00 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>The prolific threat group TeamPCP has claimed a hack into GitHub’s internal repositories</description>
  </item>
  <item>
    <title>Fox Tempest Linked to Malware-Signing Service Abusing Microsoft Artifact Signing</title>
    <link>https://gbhackers.com/fox-tempest-abusing-microsoft-artifact-signing/</link>
    <guid isPermaLink="true">https://gbhackers.com/fox-tempest-abusing-microsoft-artifact-signing/</guid>
    <pubDate>Wed, 20 May 2026 11:04:51 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>Fox Tempest, a financially motivated threat actor, has been linked to a large-scale malware-signing-as-a-service (MSaaS) operation that abused Microsoft’s Artefact Signing platform to enable cybercriminals to distribute malicious software that appeared to be trusted. According to…</description>
  </item>
  <item>
    <title>Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks</title>
    <link>https://thehackernews.com/2026/05/microsoft-takes-down-malware-signing.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/05/microsoft-takes-down-malware-signing.html</guid>
    <pubDate>Wed, 20 May 2026 20:06:44 +0530</pubDate>
    <category>Incident Reporting</category>
    <description>Microsoft on Tuesday said it disrupted a malware-signing-as-a-service (MSaaS) operation that weaponized the company&#x27;s Artifact Signing system to deliver malicious code and conduct ransomware and other attacks, compromising thousands of machines and networks across the world. The …</description>
  </item>
  <item>
    <title>Microsoft DurableTask Python Client Targeted in TeamPCP Cyberattack</title>
    <link>https://gbhackers.com/microsoft-durabletask-python-client-targeted-teampcp/</link>
    <guid isPermaLink="true">https://gbhackers.com/microsoft-durabletask-python-client-targeted-teampcp/</guid>
    <pubDate>Wed, 20 May 2026 12:25:40 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>The ongoing TeamPCP software supply chain campaign has compromised the official Microsoft DurableTask Python client, a widely used package for orchestrating workflows in Python applications. Three versions of the durabletask package on PyPI, 1.4.1, 1.4.2, and 1.4.3, were identifi…</description>
  </item>
  <item>
    <title>Customers say Trump Mobile is leaking their personal information</title>
    <link>https://techcrunch.com/2026/05/20/customers-say-trump-mobile-is-leaking-their-personal-information/</link>
    <guid isPermaLink="true">https://techcrunch.com/2026/05/20/customers-say-trump-mobile-is-leaking-their-personal-information/</guid>
    <pubDate>Wed, 20 May 2026 15:28:55 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>Trump Mobile is leaking customers’ email and home addresses but has not responded to people alerting the company of the data exposure, according to two YouTubers who said they verified that their leaked data is authentic.</description>
  </item>
  <item>
    <title>GitHub says hackers stole data from thousands of internal repositories</title>
    <link>https://techcrunch.com/2026/05/20/github-says-hackers-stole-data-from-thousands-of-internal-repositories/</link>
    <guid isPermaLink="true">https://techcrunch.com/2026/05/20/github-says-hackers-stole-data-from-thousands-of-internal-repositories/</guid>
    <pubDate>Wed, 20 May 2026 13:25:58 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>The code hosting giant GitHub said it was investigating a breach, but said there was no evidence of customer data theft.</description>
  </item>
  <item>
    <title>GitHub discloses breach of 3,800 internal code repositories.</title>
    <link>https://thecyberwire.com/newsletters/daily-briefing/15/96</link>
    <guid isPermaLink="true">https://thecyberwire.com/newsletters/daily-briefing/15/96</guid>
    <pubDate>Wed, 20 May 2026 16:00:00 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>Microsoft disrupts malware signing service. Business news: Akamai to acquire LayerX for $205 million.</description>
  </item>
  <item>
    <title>7-Eleven confirms breach after ShinyHunters claims</title>
    <link>https://therecord.media/7-eleven-reports-data-breach-shinyhunters</link>
    <guid isPermaLink="true">https://therecord.media/7-eleven-reports-data-breach-shinyhunters</guid>
    <pubDate>Wed, 20 May 2026 16:05:00 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>The breach notification letters say 7-Eleven discovered the breach on April 8 and, after an investigation, determined that the cybercriminals gained access to “certain 7-Eleven systems used to store franchisee documents.”</description>
  </item>
  <item>
    <title>GitHub says internal repositories were impacted in poisoned VS Code extension attack</title>
    <link>https://cyberscoop.com/github-internal-repositories-vs-code-extension-attack/</link>
    <guid isPermaLink="true">https://cyberscoop.com/github-internal-repositories-vs-code-extension-attack/</guid>
    <pubDate>Wed, 20 May 2026 14:48:38 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>GitHub said late Tuesday that internal repositories were exfiltrated after an employee device was compromised through a poisoned Visual Studio Code extension, an incident that underscores the growing risks facing software development platforms and the ecosystems built around thir…</description>
  </item>
  <item>
    <title>7-Eleven hit by data breach</title>
    <link>https://www.cybersecuritydive.com/news/7-eleven-cyberattack-franchisee-data/820698/</link>
    <guid isPermaLink="true">https://www.cybersecuritydive.com/news/7-eleven-cyberattack-franchisee-data/820698/</guid>
    <pubDate>Wed, 20 May 2026 10:57:00 -0400</pubDate>
    <category>Incident Reporting</category>
    <description>The retailer confirmed that an unauthorized third party gained access to certain systems used to store franchisee documents earlier this spring.</description>
  </item>
  <item>
    <title>Microsoft disrupts cybercrime operation that hid behind legitimate software</title>
    <link>https://www.cybersecuritydive.com/news/microsoft-disrupts-cybercrime-hid-legitimate-software/820724/</link>
    <guid isPermaLink="true">https://www.cybersecuritydive.com/news/microsoft-disrupts-cybercrime-hid-legitimate-software/820724/</guid>
    <pubDate>Wed, 20 May 2026 10:48:29 -0400</pubDate>
    <category>Incident Reporting</category>
    <description>The Fox Tempest malware-signing-as-a-service operation was linked to numerous ransomware attacks.</description>
  </item>
  <item>
    <title>Meet Rampart and Clarity, Microsoft’s new red team combo AI agents</title>
    <link>https://cyberscoop.com/microsoft-rampart-clarity-agentic-ai-security-red-teaming-tools/</link>
    <guid isPermaLink="true">https://cyberscoop.com/microsoft-rampart-clarity-agentic-ai-security-red-teaming-tools/</guid>
    <pubDate>Wed, 20 May 2026 20:25:51 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>Microsoft’s AI red team lead talked to CyberScoop about the goals behind open sourcing a pair of security tools meant for developers and incident responders. The post Meet Rampart and Clarity, Microsoft’s new red team combo AI agents appeared first on CyberScoop .</description>
  </item>
  <item>
    <title>Processes and Culture Top Reasons Behind Data Breaches</title>
    <link>https://www.darkreading.com/cyberattacks-data-breaches/processes-and-culture-top-reasons-behind-data-breaches</link>
    <guid isPermaLink="true">https://www.darkreading.com/cyberattacks-data-breaches/processes-and-culture-top-reasons-behind-data-breaches</guid>
    <pubDate>Wed, 20 May 2026 17:42:30 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>Government leaders revealed that, in spite of state laws meant to improve cyber hygiene, an analysis of incidents showed issues persist and visibility falls short.</description>
  </item>
  <item>
    <title>Investigating unauthorized access to GitHub’s internal repositories</title>
    <link>https://github.blog/security/investigating-unauthorized-access-to-githubs-internal-repositories/</link>
    <guid isPermaLink="true">https://github.blog/security/investigating-unauthorized-access-to-githubs-internal-repositories/</guid>
    <pubDate>Wed, 20 May 2026 21:07:38 +0000</pubDate>
    <category>Incident Reporting</category>
    <description>If any impact is discovered, customers will be notified via established incident response and notification channels. The post Investigating unauthorized access to GitHub&amp;#8217;s internal repositories appeared first on The GitHub Blog .</description>
  </item>
  <item>
    <title>ISC Stormcast For Wednesday, May 20th, 2026 https://isc.sans.edu/podcastdetail/9938, (Wed, May 20th)</title>
    <link>https://isc.sans.edu/diary/rss/32998</link>
    <guid isPermaLink="true">https://isc.sans.edu/diary/rss/32998</guid>
    <pubDate>Wed, 20 May 2026 02:00:02 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.</description>
  </item>
  <item>
    <title>7 hard truths security pros should know: 2026 DevOps Threats Report</title>
    <link>https://www.helpnetsecurity.com/2026/05/20/hard-truths-from-2026-devops-threats-report/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/20/hard-truths-from-2026-devops-threats-report/</guid>
    <pubDate>Wed, 20 May 2026 05:00:15 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>In 2025, trusted Git hosting platforms became a playground for cyber criminals. This is the main conclusion from the latest “DevOps Threat Unwrapped Report 2026” by GitProtect. If you want to effectively counter attacks targeted at your code (and business), you need security meas…</description>
  </item>
  <item>
    <title>When your AI assistant has the keys to production</title>
    <link>https://www.helpnetsecurity.com/2026/05/20/agentic-ai-security-llm-research/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/20/agentic-ai-security-llm-research/</guid>
    <pubDate>Wed, 20 May 2026 05:30:28 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Large language models in operational roles query telemetry, propose configuration changes, and in some deployments execute those changes against live infrastructure. Ticket drafting and alert summarization were the starting point. Vendors describe this work as autonomous remediat…</description>
  </item>
  <item>
    <title>Trapdoor Android Ad Fraud Ring Abuses 455 Apps for Fake Clicks</title>
    <link>https://gbhackers.com/trapdoor-android-ad-fraud-ring/</link>
    <guid isPermaLink="true">https://gbhackers.com/trapdoor-android-ad-fraud-ring/</guid>
    <pubDate>Wed, 20 May 2026 06:50:17 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>A large-scale Android ad fraud campaign named “Trapdoor,” exposing a sophisticated ecosystem built on 455 malicious apps and 183 command-and-control (C2) domains. The operation combines malvertising, automated click fraud, and advanced evasion techniques to create a self-sustaini…</description>
  </item>
  <item>
    <title>DevilNFC Malware Traps Android Users in NFC Relay Attacks</title>
    <link>https://gbhackers.com/devilnfc-malware-traps-android-users/</link>
    <guid isPermaLink="true">https://gbhackers.com/devilnfc-malware-traps-android-users/</guid>
    <pubDate>Wed, 20 May 2026 06:12:52 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>A newly identified Android malware family named DevilNFC is raising concern among cybersecurity researchers for its advanced use of kiosk mode to trap victims during NFC relay attacks. These malware families mark a significant evolution in NFC relay threats. Unlike earlier campai…</description>
  </item>
  <item>
    <title>Mini Shai-Hulud Attack Hits npm Ecosystem, Compromising Over 600 Packages</title>
    <link>https://gbhackers.com/mini-shai-hulud-attack-hits-npm-compromising-600-packages/</link>
    <guid isPermaLink="true">https://gbhackers.com/mini-shai-hulud-attack-hits-npm-compromising-600-packages/</guid>
    <pubDate>Wed, 20 May 2026 06:11:59 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>A large-scale supply chain attack targeting the npm ecosystem has resurfaced with a new variant of the Mini Shai-Hulud malware, compromising more than 600 packages and introducing advanced evasion techniques, including forged Sigstore provenance. The attack primarily targeted the…</description>
  </item>
  <item>
    <title>Single-Letter Go Module Typosquat Drops DNS-Based Backdoor</title>
    <link>https://gbhackers.com/single-letter-go-module-typosquat/</link>
    <guid isPermaLink="true">https://gbhackers.com/single-letter-go-module-typosquat/</guid>
    <pubDate>Wed, 20 May 2026 06:06:43 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>A newly uncovered software supply chain attack targeting Go developers demonstrates how a single-character typo can silently introduce a persistent backdoor. A malicious Go module, github.com/shopsprint/decimal, designed to impersonate the widely trusted github.com/shopspring/dec…</description>
  </item>
  <item>
    <title>Communicating cyber risk in dollars boards understand</title>
    <link>https://www.helpnetsecurity.com/2026/05/20/nick-nieuwenhuis-nedscaper-cyber-resilience-strategy/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/20/nick-nieuwenhuis-nedscaper-cyber-resilience-strategy/</guid>
    <pubDate>Wed, 20 May 2026 06:30:37 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>In this Help Net Security interview, Nick Nieuwenhuis, Cybersecurity Architect at Nedscaper, explains why cybersecurity has not delivered the resilience that decades of investment have promised. He argues that spending has leaned too heavily on technical controls while neglecting…</description>
  </item>
  <item>
    <title>Void Botnet Leverages Ethereum for Resilient C2</title>
    <link>https://gbhackers.com/void-botnet-leverages-ethereum/</link>
    <guid isPermaLink="true">https://gbhackers.com/void-botnet-leverages-ethereum/</guid>
    <pubDate>Wed, 20 May 2026 07:42:31 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>A newly identified botnet, named Void, is leveraging Ethereum smart contracts to build a resilient, hard-to-disrupt command-and-control (C2) infrastructure, marking a continued evolution in blockchain-enabled cybercrime. Discovered in March 2026 and advertised on a Russian-langua…</description>
  </item>
  <item>
    <title>Eviltokens: A Conversation with Huntress on an AI‑Enabled Device Code Phishing Campaign</title>
    <link>https://thecyberwire.com/podcasts/microsoft-threat-intelligence/69/notes</link>
    <guid isPermaLink="true">https://thecyberwire.com/podcasts/microsoft-threat-intelligence/69/notes</guid>
    <pubDate>Wed, 20 May 2026 07:05:00 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠⁠Sherrod DeGrippo⁠ joins researchers from Huntress to break down the rise of ⁠EvilTokens⁠, an AI-powered phishing-as-a-service platform designed to bypass MFA and automate credential theft at scale. Together, t…</description>
  </item>
  <item>
    <title>GUEST ESSAY: AI can speed up communication, but it can also weaken human connection</title>
    <link>https://www.lastwatchdog.com/guest-essay-ai-can-speed-up-communication-but-it-can-also-weaken-human-connection/</link>
    <guid isPermaLink="true">https://www.lastwatchdog.com/guest-essay-ai-can-speed-up-communication-but-it-can-also-weaken-human-connection/</guid>
    <pubDate>Wed, 20 May 2026 09:35:09 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>The first warning sign came on stage. Related: Carol Sturka declares her agency I had turned to ChatGPT to help organize research notes for an upcoming keynote. I was pressed for time and wanted help spotting patterns I might have &amp;#8230; (more…) The post GUEST ESSAY: AI can spee…</description>
  </item>
  <item>
    <title>Darwinium updates mobile SDKs to detect remote access scam activity</title>
    <link>https://www.helpnetsecurity.com/2026/05/20/darwinium-sdk-updates/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/20/darwinium-sdk-updates/</guid>
    <pubDate>Wed, 20 May 2026 09:02:54 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Darwinium has announced updates to its Android and iOS mobile SDKs. It enables banks, payment providers, and digital businesses to tackle the proliferation of remote access scams, including those that manipulate live sessions and account farming operations that run mule networks.…</description>
  </item>
  <item>
    <title>Fake Tax Assessment Pages Spread Windows Malware</title>
    <link>https://gbhackers.com/fake-tax-assessment-pages/</link>
    <guid isPermaLink="true">https://gbhackers.com/fake-tax-assessment-pages/</guid>
    <pubDate>Wed, 20 May 2026 10:56:11 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Hackers are actively targeting Windows users with fake Indian Income Tax assessment pages in a campaign tracked as TAX#TRIDENT. The campaign begins with fraudulent tax assessment or penalty pages designed to create urgency. Victims are prompted to download what appears to be an o…</description>
  </item>
  <item>
    <title>Tracking TamperedChef Clusters via Certificate and Code Reuse</title>
    <link>https://unit42.paloaltonetworks.com/tracking-tampered-chef-clusters/</link>
    <guid isPermaLink="true">https://unit42.paloaltonetworks.com/tracking-tampered-chef-clusters/</guid>
    <pubDate>Wed, 20 May 2026 10:00:46 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Unit 42 analyzes TamperedChef malware clusters that use trojanized productivity apps and malvertising to deliver stealthy payloads to targets. The post Tracking TamperedChef Clusters via Certificate and Code Reuse appeared first on Unit 42 .</description>
  </item>
  <item>
    <title>Trust3 AI focuses on AI agent risks with MCP Security layer</title>
    <link>https://www.helpnetsecurity.com/2026/05/20/trust3-mcp-security/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/05/20/trust3-mcp-security/</guid>
    <pubDate>Wed, 20 May 2026 10:41:04 +0000</pubDate>
    <category>Threat Intelligence</category>
    <description>Trust3 AI has announced the launch of Model Context Protocol (MCP) Security, establishing a new standard for safeguarding enterprise agentic AI workloads. This solution forms a key capability within Trust3 AI&amp;#8217;s enterprise agent control plane, empowering security and governa…</description>
  </item>
  </channel>
</rss>