π Gemini and Cursor vulnerabilities exposed direct code execution in dev workflows.
#Gemini CLI (CVSS 10.0) auto-trusted folders in CI, letting malicious .gemini/ configs from PRs run on hosts. #Cursor bugs triggered hidden Git hooks and exposed local API keys via extensions.
π Details β https://thehackernews.com/2026/04/google-fixes-cvss-10-gemini-cli-ci-rce.html
#Gemini CLI (CVSS 10.0) auto-trusted folders in CI, letting malicious .gemini/ configs from PRs run on hosts. #Cursor bugs triggered hidden Git hooks and exposed local API keys via extensions.
π Details β https://thehackernews.com/2026/04/google-fixes-cvss-10-gemini-cli-ci-rce.html
π13π4π₯1
β οΈ UPDATE: #cPanel flaw now tracked as CVE-2026-41940 (CVSS 9.8)βan auth bypass granting unauthenticated admin access.
Actively exploited as a 0-day for weeks. Root cause: CRLF injection lets attackers forge sessions and escalate to root.
π Exploit mechanics and real-world impact β https://thehackernews.com/2026/04/critical-cpanel-authentication.html
Actively exploited as a 0-day for weeks. Root cause: CRLF injection lets attackers forge sessions and escalate to root.
π Exploit mechanics and real-world impact β https://thehackernews.com/2026/04/critical-cpanel-authentication.html
π9π1π1
β οΈ A new #Linux flaw mirrors Dirty Pipeβbut adds cross-container impact.
βCopy Failβ (CVE-2026-31431) lets any local user overwrite cached system files and run them as root. No race condition.
Works across major Linux distros since 2017.
π Read β https://thehackernews.com/2026/04/new-linux-copy-fail-vulnerability.html
βCopy Failβ (CVE-2026-31431) lets any local user overwrite cached system files and run them as root. No race condition.
Works across major Linux distros since 2017.
π Read β https://thehackernews.com/2026/04/new-linux-copy-fail-vulnerability.html
π±12π6π4β‘1π€―1
π¨ Attackers are targeting enterprise admins with fake tools and running control through #Ethereum smart contracts.
Malware spreads via SEO-poisoned #GitHub repos, then pulls live C2 from blockchain. No domains to block. Access lands on high-privilege systems.
π Learn how this campaign turns search results into enterprise breaches β https://thehackernews.com/2026/04/etherrat-distribution-spoofing.html
Malware spreads via SEO-poisoned #GitHub repos, then pulls live C2 from blockchain. No domains to block. Access lands on high-privilege systems.
π Learn how this campaign turns search results into enterprise breaches β https://thehackernews.com/2026/04/etherrat-distribution-spoofing.html
π5π4π₯1
β οΈ Malware now ships its payload inside the installer.
DEEP#DOOR embeds a Python backdoor in a script, extracts it at runtime, and avoids external downloads.
Using tunneling, it keeps access and steals credentials with minimal trace.
π Read β https://thehackernews.com/2026/04/new-python-backdoor-uses-tunneling.html
DEEP#DOOR embeds a Python backdoor in a script, extracts it at runtime, and avoids external downloads.
Using tunneling, it keeps access and steals credentials with minimal trace.
π Read β https://thehackernews.com/2026/04/new-python-backdoor-uses-tunneling.html
π±6π3π€3
AI-enabled cyber attacks are on the rise. Are you prepared? Most orgs arenβt as prepared as they think for AI-enabled attacks, but itβs never too late to start.
The cyber risk playbook for the AI threat era draws on research from over 200 GRC, IT, and cybersecurity professionals to gain new insights into AI-enabled attacks and the need for proactive cyber resilience.
Get the playbook today β https://thn.news/nyc-cyber-training
The cyber risk playbook for the AI threat era draws on research from over 200 GRC, IT, and cybersecurity professionals to gain new insights into AI-enabled attacks and the need for proactive cyber resilience.
Get the playbook today β https://thn.news/nyc-cyber-training
π3π€3π1
π₯ Cyber chaos exploding this week...
β’ Fake cell towers
β’ npm .env theft
β’ Extensions sell data
β’ 3.4M servers exposed
β’ Vidar tops stealers
β’ 38 OpenEMR flaws
β’ Komari backdoor used
β’ Saiga 2FA kits
β’ Black Axe arrests
β’ PhantomRPC unpatched
β’ Robinhood phishing trick
β’ arXiv leaks keys
β’ Qinglong crypto mining
β’ PyPI supply attack
π‘οΈ Full list here β https://thehackernews.com/2026/04/threatsday-bulletin-sms-blaster-busts.html
β’ Fake cell towers
β’ npm .env theft
β’ Extensions sell data
β’ 3.4M servers exposed
β’ Vidar tops stealers
β’ 38 OpenEMR flaws
β’ Komari backdoor used
β’ Saiga 2FA kits
β’ Black Axe arrests
β’ PhantomRPC unpatched
β’ Robinhood phishing trick
β’ arXiv leaks keys
β’ Qinglong crypto mining
β’ PyPI supply attack
π‘οΈ Full list here β https://thehackernews.com/2026/04/threatsday-bulletin-sms-blaster-busts.html
π7π₯5π4π€4β‘1π1
π¨ Supply chain attacks are escalating...
A widely used AI dev tool, PyTorch Lightning, was compromised on PyPI and turned into a credential stealer.
β Malicious code runs on import
β No user action needed
β Credentials silently stolen
Read: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html
A widely used AI dev tool, PyTorch Lightning, was compromised on PyPI and turned into a credential stealer.
β Malicious code runs on import
β No user action needed
β Credentials silently stolen
Read: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html
π±7π5π₯4π2π€―1
π€¦ββοΈ Another supply chain hit.
intercom-client npm package compromised
β Malicious preinstall hook executes on install
β Credentials targeted across dev & CI/CD
Linked to ongoing Mini Shai-Hulud campaign.
Read this update here: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html#intercom-npm-package-compromised-as-part-of-mini-shai-hulud
intercom-client npm package compromised
β Malicious preinstall hook executes on install
β Credentials targeted across dev & CI/CD
Linked to ongoing Mini Shai-Hulud campaign.
Read this update here: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html#intercom-npm-package-compromised-as-part-of-mini-shai-hulud
π9π6π₯5
β οΈ Update: Mini Shai-Hulud is spreading across ecosystems.
β intercom-client (npm) and intercom-php (Packagist) compromised
β Install-time hooks deploy credential stealer
Attack targets GitHub tokens, cloud creds, SSH keys, Kubernetes, Vault, Docker, and .env files.
Read: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html#intercom-npm-and-packagist-package-compromised-as-part-of-mini-shai-hulud
Campaign linked to TeamPCP and earlier Lightning compromise.
β intercom-client (npm) and intercom-php (Packagist) compromised
β Install-time hooks deploy credential stealer
Attack targets GitHub tokens, cloud creds, SSH keys, Kubernetes, Vault, Docker, and .env files.
Read: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html#intercom-npm-and-packagist-package-compromised-as-part-of-mini-shai-hulud
Campaign linked to TeamPCP and earlier Lightning compromise.
π€―8π4π3π2β‘1
π¬ Poisoned Ruby gems + Go modules used in a supply chain attack.
β’ Steal AWS creds, SSH keys, configs
β’ Tamper GitHub Actions via fake binaries
β’ Add SSH access for persistence
Read β https://thehackernews.com/2026/05/poisoned-ruby-gems-and-go-modules.html
β’ Steal AWS creds, SSH keys, configs
β’ Tamper GitHub Actions via fake binaries
β’ Add SSH access for persistence
Read β https://thehackernews.com/2026/05/poisoned-ruby-gems-and-go-modules.html
π6π3π€2
π Two cybersecurity professionals were sentenced to four years each for helping deploy BlackCat ransomware across the U.S. in 2023.
They took a share of ransom payments, including about $1.2 million in Bitcoin from one victim.
Read β https://thehackernews.com/2026/05/two-cybersecurity-professionals-get-4.html
They took a share of ransom payments, including about $1.2 million in Bitcoin from one victim.
Read β https://thehackernews.com/2026/05/two-cybersecurity-professionals-get-4.html
π€13π11β‘4π1π±1
Cybersecurity market: $38 B β $69 B by 2030
Yet MSPs still lose deals:
β’ 77% canβt create urgency
β’ 66% face cost pushback
β’ 8+ decision-makers per deal
Fix: sell outcomes, not tech
Read more β https://thehackernews.com/2026/05/top-five-sales-challenges-costing-msps.html
Yet MSPs still lose deals:
β’ 77% canβt create urgency
β’ 66% face cost pushback
β’ 8+ decision-makers per deal
Fix: sell outcomes, not tech
Read more β https://thehackernews.com/2026/05/top-five-sales-challenges-costing-msps.html
π5π₯1π1π1
β οΈ China-linked hackers targeted governments across Asia + a NATO state (Poland), exploiting Exchange/IIS flaws to deploy ShadowPad.
At the same time: journalists & activists hit with phishing campaigns.
Two ops. Same priorities.
Details here β https://thehackernews.com/2026/05/china-linked-hackers-target-asian.html
At the same time: journalists & activists hit with phishing campaigns.
Two ops. Same priorities.
Details here β https://thehackernews.com/2026/05/china-linked-hackers-target-asian.html
π₯13π7π3π2
β οΈ Two cybercrime groups are executing rapid SaaS attacks with minimal trace.
Cordial Spider and Snarky Spider use vishing and AiTM phishing to steal credentials, bypass MFA, and access multiple platforms through SSO.
Read: https://thehackernews.com/2026/05/cybercrime-groups-using-vishing-and-sso.html
Cordial Spider and Snarky Spider use vishing and AiTM phishing to steal credentials, bypass MFA, and access multiple platforms through SSO.
Read: https://thehackernews.com/2026/05/cybercrime-groups-using-vishing-and-sso.html
π₯12π2π1
π 30,000 Facebook accounts compromised in a phishing campaign using Google AppSheet emails.
A Vietnamese-linked operation called AccountDumpling targeted Facebook Business users, stole credentials, sent data to Telegram, and resold accounts.
Read: https://thehackernews.com/2026/05/30000-facebook-accounts-hacked-via.html
A Vietnamese-linked operation called AccountDumpling targeted Facebook Business users, stole credentials, sent data to Telegram, and resold accounts.
Read: https://thehackernews.com/2026/05/30000-facebook-accounts-hacked-via.html
π21π€―10π₯5π€4π2π1
π¨ Cybersecurity firm Trellix confirms a breach.
Attackers accessed part of its source code repository; no exploitation or release impact found. Investigation ongoing with forensic experts and law enforcement.
Details β https://thehackernews.com/2026/05/trellix-confirms-source-code-breach.html
Attackers accessed part of its source code repository; no exploitation or release impact found. Investigation ongoing with forensic experts and law enforcement.
Details β https://thehackernews.com/2026/05/trellix-confirms-source-code-breach.html
π15π±6π3π₯2
π¨ New analysis reveals browser extensions legally selling user data.
80 extensions affect 6.5M+ usersβad blockers and streaming tools includedβcollecting and reselling browsing, viewing, and demographic data.
All disclosed in privacy policies.
Read: https://thehackernews.com/2026/04/threatsday-bulletin-sms-blaster-busts.html#extensions-legally-sell-user-data
80 extensions affect 6.5M+ usersβad blockers and streaming tools includedβcollecting and reselling browsing, viewing, and demographic data.
All disclosed in privacy policies.
Read: https://thehackernews.com/2026/04/threatsday-bulletin-sms-blaster-busts.html#extensions-legally-sell-user-data
π12π₯9π9π€4
β οΈ A new #Linux flaw is now under active exploitation.
CISA added CVE-2026-31431 to its KEV list. The bug lets low-privilege users gain full root access. Patches released.
Fix deadline: May 15, 2026.
Read: https://thehackernews.com/2026/05/cisa-adds-actively-exploited-linux-root.html
CISA added CVE-2026-31431 to its KEV list. The bug lets low-privilege users gain full root access. Patches released.
Fix deadline: May 15, 2026.
Read: https://thehackernews.com/2026/05/cisa-adds-actively-exploited-linux-root.html
π±30π€8π₯7β‘6π2π1
276 suspects arrested in a global crackdown on crypto investment scams.
Dubai Police, FBI, and Chinese authorities shut down 9 scam centers targeting Americans. $701 M in crypto seized. FBI alerts helped save $562 M for nearly 9,000 victims.
Read: https://thehackernews.com/2026/05/global-crackdown-arrests-276-shuts-9.html
Dubai Police, FBI, and Chinese authorities shut down 9 scam centers targeting Americans. $701 M in crypto seized. FBI alerts helped save $562 M for nearly 9,000 victims.
Read: https://thehackernews.com/2026/05/global-crackdown-arrests-276-shuts-9.html
π19π₯13π3π€1π€―1
CVE-2026-41940 (cPanel) exploited within 24h
β’ 44,000 IPs linked to scanning/brute-force activity
β’ Targets: Southeast Asia gov/military + MSPs
β’ Enables auth bypass β full system control
β’ Mirai variants and Sorry ransomware observed
Read: https://thehackernews.com/2026/05/critical-cpanel-vulnerability.html
β’ 44,000 IPs linked to scanning/brute-force activity
β’ Targets: Southeast Asia gov/military + MSPs
β’ Enables auth bypass β full system control
β’ Mirai variants and Sorry ransomware observed
Read: https://thehackernews.com/2026/05/critical-cpanel-vulnerability.html
π21π€―11π₯6β‘2π2