AI is your biggest compliance blind spot. And most teams don't know it yet.
New attack surfaces. AI-generated code hitting production. Vendor relationships that didn't exist six months ago. The SOC 2 framework wasn't built for any of this and patching it with manual processes isn't going to cut it.
Rippling just launched Automated Compliance for SOC 2 to help companies get ahead of exactly this problem. Now we're bringing together a panel of CISOs to go deeper: what does a modern compliance program actually look like when AI is embedded in how you build, hire, and operate?
Join Mandy Andress (CISO, Elastic), Yassir Abousselham (CISO, Calendly), and Adrian Ludwig (CISO, Rippling) on May 6 to get ahead of it.
If you own security at a growing company, this is the conversation you need to be in.
πCompliance in the AI Era: Rethinking SOC 2 & Beyond.
Reserve your seat β https://thn.news/compliance-webinar
New attack surfaces. AI-generated code hitting production. Vendor relationships that didn't exist six months ago. The SOC 2 framework wasn't built for any of this and patching it with manual processes isn't going to cut it.
Rippling just launched Automated Compliance for SOC 2 to help companies get ahead of exactly this problem. Now we're bringing together a panel of CISOs to go deeper: what does a modern compliance program actually look like when AI is embedded in how you build, hire, and operate?
Join Mandy Andress (CISO, Elastic), Yassir Abousselham (CISO, Calendly), and Adrian Ludwig (CISO, Rippling) on May 6 to get ahead of it.
If you own security at a growing company, this is the conversation you need to be in.
πCompliance in the AI Era: Rethinking SOC 2 & Beyond.
Reserve your seat β https://thn.news/compliance-webinar
π7π4
π¨ PCPJack malware exploits 5 CVEs to spread across cloud systems.
Steals credentials from Docker, Kubernetes, AWS and more, exfiltrating via Telegram while moving laterally across networks.
Read details: https://thehackernews.com/2026/05/pcpjack-credential-stealer-exploits-5.html
Steals credentials from Docker, Kubernetes, AWS and more, exfiltrating via Telegram while moving laterally across networks.
Read details: https://thehackernews.com/2026/05/pcpjack-credential-stealer-exploits-5.html
π4π€―4π3π1
π¨ Ivanti Endpoint Manager Mobile flaw (CVE-2026-6973) is being exploited in limited attacks, enabling remote code execution with admin access.
CISA has added it to its KEV catalog, with federal agencies ordered to patch by May 10, 2026.
Read: https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html
CISA has added it to its KEV catalog, with federal agencies ordered to patch by May 10, 2026.
Read: https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html
π5π3π₯3
This media is not supported in your browser
VIEW IN TELEGRAM
π¨ A new UNPATCHED Linux kernel βDirty Fragβ LPE flaw enables root access on Ubuntu, RHEL, Fedora and other distributions.
Researchers released a working proof-of-concept exploit capable of gaining root in a single command.
Details here: https://thehackernews.com/2026/05/linux-kernel-dirty-frag-lpe-exploit.html
Researchers released a working proof-of-concept exploit capable of gaining root in a single command.
Details here: https://thehackernews.com/2026/05/linux-kernel-dirty-frag-lpe-exploit.html
π€―24π₯13π5π±5
π¨ A new Linux backdoor βPamDOORaβ is being sold on the cybercrime forum after its price dropped from $1,600 to $900.
The PAM-based malware enables persistent SSH access, steals credentials, and tampers with authentication logs on compromised systems.
Details: https://thehackernews.com/2026/05/new-linux-pamdoora-backdoor-uses-pam.html
The PAM-based malware enables persistent SSH access, steals credentials, and tampers with authentication logs on compromised systems.
Details: https://thehackernews.com/2026/05/new-linux-pamdoora-backdoor-uses-pam.html
π₯16π€―10β‘3π1π1
π¨ QLNX, a previously undocumented #Linux RAT, is targeting developers and DevOps systems to steal npm, PyPI, AWS, Kubernetes, Docker, and CI/CD credentials.
The malware uses fileless execution, PAM backdoors, eBPF rootkits, and 58 remote commands to maintain covert access and hijack software supply chains.
Learn more about QLNX here: https://thehackernews.com/2026/05/quasar-linux-rat-steals-developer.html
The malware uses fileless execution, PAM backdoors, eBPF rootkits, and 58 remote commands to maintain covert access and hijack software supply chains.
Learn more about QLNX here: https://thehackernews.com/2026/05/quasar-linux-rat-steals-developer.html
β‘8π₯5π2
π¨ Nearly 1% of confirmed enterprise incidents came from low-severity or informational alerts.
Analysis of 25M+ alerts reveals ~1 missed breach per week at average scale.
Forensic scans of 82,000 endpoints uncovered 2,600 active infections β 51% already marked "mitigated" by EDR.
Full report and findings: https://thehackernews.com/2026/05/one-missed-threat-per-week-what-25m.html
Analysis of 25M+ alerts reveals ~1 missed breach per week at average scale.
Forensic scans of 82,000 endpoints uncovered 2,600 active infections β 51% already marked "mitigated" by EDR.
Full report and findings: https://thehackernews.com/2026/05/one-missed-threat-per-week-what-25m.html
π₯10π2
π¨ 28 fraudulent apps on the Google Play Store racked up over 7.3 million downloads before removal.
They promised call, SMS, and #WhatsApp histories for any phone number β but delivered only fake data after users paid up to $80.
The CallPhantom scam mainly hit #Android users in India and Asia-Pacific.
Full read β https://thehackernews.com/2026/05/fake-call-history-apps-stole-payments.html
They promised call, SMS, and #WhatsApp histories for any phone number β but delivered only fake data after users paid up to $80.
The CallPhantom scam mainly hit #Android users in India and Asia-Pacific.
Full read β https://thehackernews.com/2026/05/fake-call-history-apps-stole-payments.html
π11π4β‘3
π REMINDER: Today, May 8, 2026 β #Instagram officially disabled end-to-end encryption for Direct Messages.
β’ Meta can now read all your chats.
β’ Download everything NOW or lose it.
β’ Switch to WhatsApp for encryption.
Details: https://thehackernews.com/2026/03/meta-to-shut-down-instagram-end-to-end.html
β’ Meta can now read all your chats.
β’ Download everything NOW or lose it.
β’ Switch to WhatsApp for encryption.
Details: https://thehackernews.com/2026/03/meta-to-shut-down-instagram-end-to-end.html
π33π±18π€―7π₯5π5π4β‘1
π¨ TCLBANKER, a previously undocumented Brazilian banking trojan, is targeting 59 banking, fintech, and #cryptocurrency platforms.
The malware spreads through #WhatsApp Web and Microsoft Outlook, using DLL side-loading, keylogging, and fake credential overlays to evade detection and steal banking credentials.
Read: https://thehackernews.com/2026/05/tclbanker-banking-trojan-targets.html
The malware spreads through #WhatsApp Web and Microsoft Outlook, using DLL side-loading, keylogging, and fake credential overlays to evade detection and steal banking credentials.
Read: https://thehackernews.com/2026/05/tclbanker-banking-trojan-targets.html
π10π8π€―5π±3π₯1
π¨ cPanel and WHM patched three new vulnerabilities enabling file read, Perl code execution, privilege escalation, and DoS attacks.
The fixes follow recent exploitation of another cPanel zero-day to deploy Mirai variants and Sorry ransomware.
Details: https://thehackernews.com/2026/05/cpanel-whm-patch-3-new-vulnerabilities.html
The fixes follow recent exploitation of another cPanel zero-day to deploy Mirai variants and Sorry ransomware.
Details: https://thehackernews.com/2026/05/cpanel-whm-patch-3-new-vulnerabilities.html
π13π6π5π€―4π₯1
π¨ CVE-2026-7482 in Ollama could let remote attackers leak process memory from more than 300,000 exposed servers using crafted GGUF files.
Separate unpatched Windows flaws enable persistent code execution through Ollamaβs update mechanism.
Full details and mitigations: https://thehackernews.com/2026/05/ollama-out-of-bounds-read-vulnerability.html
Separate unpatched Windows flaws enable persistent code execution through Ollamaβs update mechanism.
Full details and mitigations: https://thehackernews.com/2026/05/ollama-out-of-bounds-read-vulnerability.html
π₯22π6β‘3π2
Your biggest security risk in 2026 isnβt malware.
Itβs the tools you already trust.
Attackers are ditching malicious files and βliving off the landβ with PowerShell, WMIC, Certutil and native binaries that your security tools barely blink at.
84% of high-severity incidents now do this.
Read why β https://thehackernews.com/expert-insights/2026/05/your-biggest-security-risk-isnt-malware.html
Itβs the tools you already trust.
Attackers are ditching malicious files and βliving off the landβ with PowerShell, WMIC, Certutil and native binaries that your security tools barely blink at.
84% of high-severity incidents now do this.
Read why β https://thehackernews.com/expert-insights/2026/05/your-biggest-security-risk-isnt-malware.html
π₯12π6π5π1
π¨ WARNING: A malicious Hugging Face repository impersonating #OpenAIβs Privacy Filter model reached #1 trending with about 244,000 downloads in 18 hours while delivering a Rust-based infostealer to Windows users.
Hugging Face disabled the repo; researchers also linked the infrastructure to a ValleyRAT campaign.
Read: https://thehackernews.com/2026/05/fake-openai-privacy-filter-repo-hits-1.html
Hugging Face disabled the repo; researchers also linked the infrastructure to a ValleyRAT campaign.
Read: https://thehackernews.com/2026/05/fake-openai-privacy-filter-repo-hits-1.html
π15π4π€4π₯3
The internet had another normal week...
π Poisoned installers
π₯ Firewall zero-days
π§ Linux rootkits
βοΈ Cloud hijacks
π£ OAuth theft
πͺ€ ClickFix traps
π€ AI bug hunting
β οΈ Fake updates everywhere
β‘ Weekly cyber recap just dropped: https://thehackernews.com/2026/05/weekly-recap-linux-rootkit-macos-crypto.html
π Poisoned installers
π₯ Firewall zero-days
π§ Linux rootkits
βοΈ Cloud hijacks
π£ OAuth theft
πͺ€ ClickFix traps
π€ AI bug hunting
β οΈ Fake updates everywhere
β‘ Weekly cyber recap just dropped: https://thehackernews.com/2026/05/weekly-recap-linux-rootkit-macos-crypto.html
π₯9π€―6π4
Your current open-source governance cannot scale with dependency intake.
According to the latest IDC Analyst Brief, sponsored by ActiveState, 72% of organizations experienced βa direct impact from a community-supported OSS-related vulnerability or compromise in the last year.β
Download the IDC Analyst Brief to see where governance is breaking down at the component level.
Download Here: https://thn.news/open-source-sec-risk
According to the latest IDC Analyst Brief, sponsored by ActiveState, 72% of organizations experienced βa direct impact from a community-supported OSS-related vulnerability or compromise in the last year.β
Download the IDC Analyst Brief to see where governance is breaking down at the component level.
Download Here: https://thn.news/open-source-sec-risk
π10
π¨ The average time from CVE disclosure to working exploit has dropped to roughly 10 hours in 2026, down from 56 days in 2024.
The report says AI-assisted attackers can breach systems in 73 seconds while many defenders still rely on manual workflows.
Read why the gap is widening: https://thehackernews.com/2026/05/your-purple-team-isnt-purple-its-just.html
The report says AI-assisted attackers can breach systems in 73 seconds while many defenders still rely on manual workflows.
Read why the gap is widening: https://thehackernews.com/2026/05/your-purple-team-isnt-purple-its-just.html
π6π€4π2
π¨ Threat actors used AI to create the first known zero-day 2FA bypass on a popular open-source admin tool.
Google spotted it in a planned mass exploitation campaign and helped fix it before widespread use.
Full report: https://thehackernews.com/2026/05/hackers-used-ai-to-develop-first-known.html
Google spotted it in a planned mass exploitation campaign and helped fix it before widespread use.
Full report: https://thehackernews.com/2026/05/hackers-used-ai-to-develop-first-known.html
π€9π₯5
π¨ A malicious Checkmarx Jenkins AST plugin was published to the Jenkins Marketplace after TeamPCP allegedly breached the pluginβs GitHub repository.
The incident comes weeks after earlier TeamPCP-linked compromises involving the KICS Docker image, VS Code extensions, GitHub Actions workflows, and the Bitwarden CLI npm package.
Read: https://thehackernews.com/2026/05/teampcp-compromises-checkmarx-jenkins.html
The incident comes weeks after earlier TeamPCP-linked compromises involving the KICS Docker image, VS Code extensions, GitHub Actions workflows, and the Bitwarden CLI npm package.
Read: https://thehackernews.com/2026/05/teampcp-compromises-checkmarx-jenkins.html
π€―5π₯2
π¨ More than 2,000 attacker IPs worldwide are exploiting cPanel CVE-2026-41940 to deploy the Filemanager backdoor.
The campaign, linked to Mr_Rot13, enables credential theft, ransomware, cryptomining, botnet activity, and persistent SSH access, with infrastructure tied to low-detection activity dating back to 2020.
Read: https://thehackernews.com/2026/05/cpanel-cve-2026-41940-under-active.html
The campaign, linked to Mr_Rot13, enables credential theft, ransomware, cryptomining, botnet activity, and persistent SSH access, with infrastructure tied to low-detection activity dating back to 2020.
Read: https://thehackernews.com/2026/05/cpanel-cve-2026-41940-under-active.html
π₯14π±9π6
π± Apple has released iOS 26.5, bringing default end-to-end encryption to RCS messaging between #iPhone and #Android.
Lock icons will indicate encrypted chats, marking a major expansion of secure cross-platform messaging beyond traditional SMS.
Read β https://thehackernews.com/2026/05/ios-265-brings-default-end-to-end.html
Lock icons will indicate encrypted chats, marking a major expansion of secure cross-platform messaging beyond traditional SMS.
Read β https://thehackernews.com/2026/05/ios-265-brings-default-end-to-end.html
π15π€11π4