Security Brief Daily

Security Brief Daily

A daily AI-generated cybersecurity briefing. Fresh threat intelligence, vulnerability roundups, and infosec news — concise, clear, and delivered every day.

  1. 1D AGO

    May 15, 2026 · #57

    Episode 57 — 15 May 2026 1. Hackers exploit auth bypass flaw in Burst Statistics WordPress plugin Source: Bleeping Computer Hackers are leveraging a critical authentication bypass vulnerability in the WordPress plugin Burst Statistics to obtain admin-level access to websites. Burst Statistics is a privacy-focused analytics plugin active on 200,000 WordPress sites and marketed as a lightweight... 2. Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks Source: Bleeping Computer Cisco is warning that a critical Catalyst SD-WAN Controller authentication bypass flaw, tracked as CVE-2026-20182, was actively exploited in zero-day attacks that allowed attackers to gain administrative privileges on compromised devices. CVE-2026-20182 has a maximum severity... 3. 18-year-old NGINX vulnerability allows DoS, potential RCE Source: Bleeping Computer An 18-year-old flaw in the NGINX open-source web server, discovered using an autonomous scanning system, can be exploited for denial of service and, under certain conditions, remote code execution. The vulnerability is tracked as CVE-2026-42945 and received a critical... 4. TeamPCP hackers advertise Mistral AI code repos for sale Source: Bleeping Computer The TeamPCP hacker group is threatening to leak source code from the Mistral AI project unless a buyer is found for the data. In a post on a hacker forum, the threat actor is asking $25,000 for a set of nearly 450 repositories. Mistral AI is a French artificial intelligence... 5. On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email Source: The Hacker News Microsoft has disclosed a new security vulnerability impacting on-premise versions of Exchange Server that it said has come under active exploitation in the wild. The vulnerability, tracked as CVE-2026-42897 (CVSS score: 8.1), has been described as a spoofing bug stemming... 6. Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation Source: The Hacker News An anonymous cybersecurity researcher who disclosed three Microsoft Defender vulnerabilities has returned with two more zero-days involving a BitLocker bypass and a privilege escalation impacting Windows Collaborative Translation Framework (CTFMON). The security defects have... 7. PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure Source: The Hacker News Threat actors have been observed attempting to exploit a recently disclosed security vulnerability in PraisonAI, an open-source multi-agent orchestration framework, within four hours of public disclosure. The vulnerability in question is CVE-2026-44338 (CVSS score: 7.3), a... 8. 18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE Source: The Hacker News Cybersecurity researchers have disclosed multiple security vulnerabilities impacting NGINX Plus and NGINX Open, including a critical flaw that remained undetected for 18 years. The vulnerability, discovered by depthfirst, is a heap buffer overflow issue impacting...

    4 min
  2. 2D AGO

    May 14, 2026 · #56

    Episode 56 — 14 May 2026 1. Windows BitLocker zero-day gives access to protected drives, PoC released Source: Bleeping Computer A cybersecurity researcher has published proof-of-concept (PoC) exploits for two unpatched Microsoft Windows vulnerabilities named YellowKey and GreenPlasma, which are a BitLocker bypass and a privilege-escalation flaw. Known as Chaotic Eclipse or Nightmare Eclipse, the... 2. New Fragnesia Linux flaw lets attackers gain root privileges Source: Bleeping Computer Linux distros are rolling out patches for a new high-severity kernel privilege escalation vulnerability that allows attackers to run malicious code as root. Known as Fragnasia and tracked as CVE-2026-46300 , this security flaw stems from a logic bug in the Linux XFRM... 3. New critical Exim mailer flaw allows remote code execution Source: Bleeping Computer A critical vulnerability affecting certain configurations of the Exim open-source mail transfer agent could be exploited by an unauthenticated remote attacker to execute arbitrary code. Identified as CVE-2026-45185 , the security issue impacts some Exim versions before 4.99.3... 4. West Pharmaceutical says hackers stole data, encrypted systems Source: Bleeping Computer West Pharmaceutical Services disclosed that it was the target of a cyberattack that resulted in data exfiltration and system encryption. The company said that it detected a compromise on May 4th. An investigation into the incident determined that the attacker stole data from... 5. 18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE Source: The Hacker News 6. New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption Source: The Hacker News Details have emerged about a new variant of the recent Dirty Frag Linux local privilege escalation (LPE) vulnerability that allows local attackers to gain root access, making it the third such bug to be identified in the kernel within a span of two weeks. Codenamed Fragnesia,... 7. Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation Source: The Hacker News A threat actor with affiliations to China has been linked to a "multi-wave intrusion" targeting an unnamed Azerbaijani oil and gas company between late December 2025 and late February 2026, marking an expansion of its targeting. The activity has been attributed by Bitdefender... 8. New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution Source: The Hacker News Exim has released security updates to address a severe security issue affecting certain configurations that could enable memory corruption and potential code execution. Exim is an open-source Mail Transfer Agent (MTA) designed for Unix-like systems to receive, route, and...

    4 min
  3. 3D AGO

    May 13, 2026 · #55

    Episode 55 — 13 May 2026 1. Fortinet warns of critical RCE flaws in FortiSandbox and FortiAuthenticator Source: Bleeping Computer Fortinet has released security updates to address two critical vulnerabilities in FortiSandbox and FortiAuthenticator that could enable attackers to run commands or arbitrary code on unpatched systems. The first one, tracked as CVE-2026-44277, impacts the company's... 2. SAP fixes critical vulnerabilities in Commerce Cloud and S/4HANA Source: Bleeping Computer SAP has released the May 2026 security updates addressing 15 vulnerabilities across multiple products, including two critical flaws in Commerce Cloud and S/4HANA. Commerce Cloud is an enterprise-grade e-commerce platform used by online stores owned by large retailers and... 3. New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution Source: The Hacker News Exim has released security updates to address a severe security issue affecting certain configurations that could enable memory corruption and potential code execution. Exim is an open-source Mail Transfer Agent (MTA) designed for Unix-like systems to receive, route, and... 4. Signal adds security warnings for social engineering, phishing attacks Source: Bleeping Computer Signal has introduced new in-app confirmations and warning messages as additional safeguards against phishing and social engineering attempts that could lead to various forms of fraud. The purpose is to introduce enough friction that users get the time to evaluate the safety... 5. UK fines water supplier $1.3M for exposing data of 664k customers Source: Bleeping Computer The Information Commissioner's Office has fined South Staffordshire Water Plc and parent company South Staffordshire Plc £963,900 ($1.3 million) over a cyberattack that exposed the personal data of 663,887 customers and employees. The company supplies 330 million liters of... 6. Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation Source: The Hacker News Google on Monday disclosed that it identified an unknown threat actor using a zero-day exploit that it said was likely developed with an artificial intelligence (AI) system, marking the first time the technology has been put to use in the wild in a malicious context for... 7. RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded Source: The Hacker News RubyGems, the standard package manager for the Ruby programming language, has temporarily paused account sign ups following what has been described as a "major malicious attack." "We're dealing with a major malicious attack on RubyGems right now," Maciej Mensfeld, senior... 8. New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots Source: The Hacker News Cybersecurity researchers have flagged a new version of the TrickMo Android banking trojan that uses The Open Network (TON) for command-and-control (C2). The new variant, observed by ThreatFabric between January and February 2026, has been observed actively targeting banking...

    4 min
  4. 4D AGO

    May 12, 2026 · #54

    Episode 54 — 12 May 2026 1. Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation Source: The Hacker News Google on Monday disclosed that it identified an unknown threat actor using a zero-day exploit that it said was likely developed with an artificial intelligence (AI) system, marking the first time the technology has been put to use in the wild in a malicious context for... 2. Official CheckMarx Jenkins package compromised with infostealer Source: Bleeping Computer Checkmarx warned over the weekend that a rogue version of its Jenkins Application Security Testing (AST) plugin had been published on the Jenkins Marketplace. The compromise was claimed by the TeamPCP hacker group, which initiated a spree of supply-chain attacks that included... 3. Instructure confirms hackers used Canvas flaw to deface portals Source: Bleeping Computer Education technology giant Instructure has confirmed that a security vulnerability allowed hackers to modify Canvas login portals and leave an extortion message. BleepingComputer has learned that both the breach and defacements involved multiple cross-site scripting (XSS)... 4. cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor Source: The Hacker News A threat actor named Mr_Rot13 has been attributed to the exploitation of a recently disclosed critical cPanel flaw to deploy a backdoor codenamed Filemanager on compromised environments. The attack exploits CVE-2026-41940, a vulnerability impacting cPanel and WebHost Manager... 5. Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages Source: The Hacker News TeamPCP, the threat actor behind the recent supply chain attack spree, has been linked to the compromise of the npm and PyPI packages from TanStack, UiPath, Mistral AI, OpenSearch, and Guardrails AI as part of a fresh Mini Shai-Hulud campaign. The affected npm packages have... 6. TrickMo Android banker adopts TON blockchain for covert comms Source: Bleeping Computer A new variant of the TrickMo Android banking malware, delivered in campaigns targeting users across Europe, introduces new commands and uses The Open Network (TON) for stealthy command-and-control communications. The TrickMo banker was first spotted in September 2019 and has... 7. Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak Source: The Hacker News Cybersecurity researchers have disclosed a critical security vulnerability in Ollama that, if successfully exploited, could allow a remote, unauthenticated attacker to leak its entire process memory. The out-of-bounds read flaw, which likely impacts over 300,000 servers... 8. Hackers abuse Google ads, Claude.ai chats to push Mac malware Source: Bleeping Computer Attackers are abusing Google Ads and legitimate Claude.ai shared chats in an active malvertising campaign. Users searching for "Claude mac download" may come across sponsored search results that list claude.ai as the target website, but lead to instructions that install...

    4 min
  5. 5D AGO

    May 11, 2026 · #53

    Episode 53 — 11 May 2026 1. Google: Hackers used AI to develop zero-day exploit for web admin tool Source: Bleeping Computer Researchers at Google Threat Intelligence Group (GTIG) say that a zero-day exploit targeting a popular open-source web administration tool was likely generated using AI. The exploit could be leveraged to bypass the two-factor authentication (2FA) protection in a popular... 2. Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak Source: The Hacker News Cybersecurity researchers have disclosed a critical security vulnerability in Ollama that, if successfully exploited, could allow a remote, unauthenticated attacker to leak its entire process memory. The out-of-bounds read flaw, which likely impacts over 300,000 servers... 3. TrickMo Android banker adopts TON blockchain for covert comms Source: Bleeping Computer A new variant of the TrickMo Android banking malware, delivered in campaigns targeting users across Europe, introduces new commands and uses The Open Network (TON) for stealthy command-and-control communications. The TrickMo banker was first spotted in September 2019 and has... 4. Hackers abuse Google ads, Claude.ai chats to push Mac malware Source: Bleeping Computer Attackers are abusing Google Ads and legitimate Claude.ai shared chats in an active malvertising campaign. Users searching for "Claude mac download" may come across sponsored search results that list claude.ai as the target website, but lead to instructions that install... 5. Police shut down reboot of Crimenetwork marketplace, arrest admin Source: Bleeping Computer German authorities have shut down a relaunch version of the criminal marketplace 'Crimenetwork' that generated more than 3.6 million euros, and arrested its operator. Crimenetwork was the largest online cybercrime marketplace in Germany, operating since 2012 and with 100,000... 6. JDownloader site hacked to replace installers with Python RAT malware Source: Bleeping Computer The website for the popular JDownloader download manager was compromised earlier this week to distribute malicious Windows and Linux installers, with the Windows payload found deploying a Python-based remote access trojan. The supply chain attack affects those who downloaded... 7. Fake OpenAI repository on Hugging Face pushes infostealer malware Source: Bleeping Computer A malicious Hugging Face repository that reached the platform’s trending list impersonated OpenAI’s “Privacy Filter” project to deliver information-stealing malware to Windows users. The repository briefly reached #1 on Hugging Face and accumulated 244,000 downloads before...

    4 min
  6. MAY 9

    May 09, 2026 · #51

    Episode 51 — 09 May 2026 1. NVIDIA confirms GeForce NOW data breach affecting Armenian users Source: Bleeping Computer NVIDIA has confirmed in a statement for BleepingComputer that GeForce NOW user information has been exposed in a data breach. The gaming and hardware giant has clarified that the impact is limited to Armenia, and was caused by a compromise of the infrastructure operated by a... 2. Trellix source code breach claimed by RansomHouse hackers Source: Bleeping Computer The attack on the Trellix source code repository disclosed last week has been claimed by the RansomHouse threat group, which leaked a small set of images as proof of the intrusion. Yesterday, the threat actor published on their data leak site screenshots indicating access to... 3. Former govt contractor convicted for wiping dozens of federal databases Source: Bleeping Computer A 34-year-old Virginia man was found guilty of conspiring to destroy dozens of government databases after getting fired from his job as a federal contractor. In 2016, Sohaib Akhter and his twin brother and co-defendant Muneeb Akhter were also sentenced to several years in... 4. New Linux 'Dirty Frag' zero-day gives root on all major distros Source: Bleeping Computer A new Linux zero-day exploit, named Dirty Frag, allows local attackers to gain root privileges on most major Linux distributions with a single command. Security researcher Hyunwoo Kim, who disclosed it earlier today and published a proof-of-concept (PoC) exploit, says this... 5. Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access Source: The Hacker News Ivanti is warning that a new security flaw impacting Endpoint Manager Mobile (EPMM) has been explored in limited attacks in the wild. The high-severity vulnerability, CVE-2026-6973 (CVSS score: 7.2), is a case of improper input validation affecting EPMM before versions... 6. PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems Source: The Hacker News Cybersecurity researchers have disclosed details of a new credential theft framework dubbed PCPJack that targets exposed cloud infrastructure and ousts any artifacts linked to TeamPCP from the environments. "The toolset harvests credentials from cloud, container, developer,... 7. Canvas Breach Disrupts Schools & Colleges Nationwide Source: Krebs on Security An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the service’s login page with a ransom demand... 8. PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux Source: The Hacker News Cybersecurity researchers have discovered three packages on the Python Package Index (PyPI) repository that are designed to stealthily deliver a previously unknown malware family called ZiChatBot on Windows and Linux systems. "While these wheel packages do implement the...

    5 min
  7. MAY 8

    May 08, 2026 · #50

    Episode 50 — 08 May 2026 1. New Linux 'Dirty Frag' zero-day gives root on all major distros Source: Bleeping Computer A new Linux zero-day vulnerability, named Dirty Frag, allows local attackers to gain root privileges on most major Linux distributions with a single command. Security researcher Hyunwoo Kim, who disclosed the flaw earlier today and published a proof-of-concept (PoC) exploit,... 2. Ivanti warns of new EPMM flaw exploited in zero-day attacks Source: Bleeping Computer Ivanti warned customers today to patch a high-severity remote code execution vulnerability in Endpoint Manager Mobile (EPMM) exploited in zero-day attacks. The security flaw (tracked as CVE-2026-6973) stems from an Improper Input Validation weakness that allows remote... 3. Palo Alto Networks firewall zero-day exploited for nearly a month Source: Bleeping Computer Palo Alto Networks warned customers that suspected state-sponsored hackers have been exploiting a critical-severity PAN-OS firewall zero-day vulnerability for nearly a month. Tracked as CVE-2026-0300 , this remote code execution security flaw was found in the PAN-OS User-ID... 4. Former govt contractor convicted for wiping dozens of federal databases Source: Bleeping Computer A 34-year-old Virginia man was found guilty of conspiring to destroy dozens of government databases after getting fired from his job as a federal contractor. In 2016, Sohaib Akhter and his twin brother and co-defendant Muneeb Akhter were also sentenced to several years in... 5. PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage Source: The Hacker News Palo Alto Networks has disclosed that threat actors may have attempted to unsuccessfully exploit a recently disclosed critical security flaw as early as April 9, 2026. The vulnerability in question is CVE-2026-0300 (CVSS score: 9.3/8.7), a buffer overflow vulnerability in the... 6. Canvas Breach Disrupts Schools & Colleges Nationwide Source: Krebs on Security An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the service’s login page with a ransom demand... 7. vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution Source: The Hacker News A dozen critical security vulnerabilities have been disclosed in the vm2 Node.js library that could be exploited by bad actors to break out of the sandbox and execute arbitrary code on susceptible systems. vm2 is an open-source library used to run untrusted JavaScript code... 8. MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack Source: The Hacker News The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and Static Kitten) has been attributed to a ransomware attack in what has been described as a "false flag" operation. The attack, observed by Rapid7 in early 2026, has been found to...

    5 min
  8. MAY 7

    May 07, 2026 · #49

    Episode 49 — 07 May 2026 1. New Cisco DoS flaw requires manual reboot to revive devices Source: Bleeping Computer Cisco released security updates to fix a Crosswork Network Controller (CNC) and Network Services Orchestrator (NSO) denial-of-service (DoS) vulnerability that requires manually rebooting targeted systems for recovery. Large enterprises and service providers leverage the CNC... 2. Critical vm2 sandbox bug lets attackers execute code on hosts Source: Bleeping Computer A critical vulnerability in the popular Node.js sandboxing library vm2 allows escaping the sandbox and executing arbitrary code on the host system. The security issue is tracked as CVE-2026-26956 and has been confirmed to impact vm2 version 3.10.4, although earlier releases... 3. Hackers abuse Google ads for GoDaddy ManageWP login phishing Source: Bleeping Computer A phishing campaign delivered through Google sponsored search results is targeting credentials for ManageWP, GoDaddy’s platform for managing fleets of WordPress websites. The threat actor is using an adversary-in-the-middle (AitM) approach where the fake login page acts as a... 4. MuddyWater hackers use Chaos ransomware as a decoy in attacks Source: Bleeping Computer The MuddyWater Iranian hackers disguised their operations as a Chaos ransomware attack, relying on Microsoft Teams social engineering to gain access and establish persistence. Although the attack involved credential theft, persistence, remote access, data exfiltration,... 5. MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack Source: The Hacker News The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and Static Kitten) has been attributed to a ransomware attack in what has been described as a "false flag" operation. The attack, observed by Rapid7 in early 2026, has been found to... 6. Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks Source: The Hacker News Cybersecurity researchers have exposed a new Mirai-derived botnet that self-identifies as xlabs_v1 and targets internet-exposed devices running Android Debug Bridge (ADB) to enlist them in a network capable of carrying out distributed denial-of-service (DDoS) attacks.... 7. ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows Source: The Hacker News The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage attack, trojanizing its components with a backdoor called BirdCallto likely target ethnic Koreans residing in China. While prior versions... 8. China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions Source: The Hacker News A sophisticated China-nexus advanced persistent threat (APT) group has been attributed to attacks targeting government entities in South America since at least late 2024 and government agencies in southeastern Europe in 2025. The activity is being tracked by Cisco Talos under...

    4 min

About

A daily AI-generated cybersecurity briefing. Fresh threat intelligence, vulnerability roundups, and infosec news — concise, clear, and delivered every day.