4 people. No compliance team. No GRC consultant. No second job.
Full SOC 2 compliance.
Before Rippling Automated Compliance for SOC 2 officially launched, one startup put it to the test during beta. On May 13, Nikolas Huebecker, founder of a YC-backed stealth startup, shares exactly how easy it was to get enterprise-grade compliance without adding headcount, slowing down the team, or losing their minds in spreadsheets.
If your company needs SOC 2 and you're not sure how to get there without it consuming everything, this is the session to attend.
πHow a 4-Person Startup Got Enterprise-Grade Compliance Without Adding Headcount
π May 13 | Virtual | Free
Register now β https://thn.news/compliance-launch-webinar
Full SOC 2 compliance.
Before Rippling Automated Compliance for SOC 2 officially launched, one startup put it to the test during beta. On May 13, Nikolas Huebecker, founder of a YC-backed stealth startup, shares exactly how easy it was to get enterprise-grade compliance without adding headcount, slowing down the team, or losing their minds in spreadsheets.
If your company needs SOC 2 and you're not sure how to get there without it consuming everything, this is the session to attend.
πHow a 4-Person Startup Got Enterprise-Grade Compliance Without Adding Headcount
π May 13 | Virtual | Free
Register now β https://thn.news/compliance-launch-webinar
π7π€7
β οΈ RubyGems has suspended new signups after a major malicious attack involving hundreds of packages, some reportedly carrying exploits.
The incident raises fresh concerns over open-source supply chain security.
Details here: https://thehackernews.com/2026/05/rubygems-suspends-new-signups-after.html
The incident raises fresh concerns over open-source supply chain security.
Details here: https://thehackernews.com/2026/05/rubygems-suspends-new-signups-after.html
π9π±3π2π€―2
β‘ Google is rolling out #Android Intrusion Logging, an opt-in feature that stores encrypted forensic logs for 12 months to help investigate suspected spyware attacks.
Available on Android 16 December update and newer.
Full story: https://thehackernews.com/2026/05/android-adds-intrusion-logging-for.html
Available on Android 16 December update and newer.
Full story: https://thehackernews.com/2026/05/android-adds-intrusion-logging-for.html
π±7π€5π4β‘2π2π€―2
β οΈ GemStuffer used more than 150 RubyGems packages to exfiltrate scraped U.K. council portal data, not distribute malware.
The gems collected ModernGov pages, built .gem archives, and published them to RubyGems with hardcoded credentials.
Read: https://thehackernews.com/2026/05/gemstuffer-abuses-150-rubygems-to.html
The gems collected ModernGov pages, built .gem archives, and published them to RubyGems with hardcoded credentials.
Read: https://thehackernews.com/2026/05/gemstuffer-abuses-150-rubygems-to.html
π₯5π4
π Microsoft patched 138 security flaws across its products, including 30 Critical bugs and Windows DNS, Netlogon, Azure, Dynamics 365, and Hyper-V issues.
None are listed as publicly known or under active attack.
Full details here: https://thehackernews.com/2026/05/microsoft-patches-138-vulnerabilities.html
None are listed as publicly known or under active attack.
Full details here: https://thehackernews.com/2026/05/microsoft-patches-138-vulnerabilities.html
π6π₯4π€3β‘1
Exploit timelines are outpacing remediation: Mandiant estimates mean time to exploit at -7 days, while Verizon puts median edge-device remediation at 32 days.
The issue: closed tickets donβt always mean risk is gone.
Full analysis: https://thehackernews.com/2026/05/most-remediation-programs-never-confirm.html
The issue: closed tickets donβt always mean risk is gone.
Full analysis: https://thehackernews.com/2026/05/most-remediation-programs-never-confirm.html
π5π₯2
β οΈ China-linked FamousSparrow targeted an Azerbaijani oil and gas firm in a multi-wave intrusion from Dec 2025 to Feb 2026.
Attackers reused a vulnerable Microsoft Exchange Server entry point to deploy Deed RAT and attempt TernDoor.
Read: https://thehackernews.com/2026/05/azerbaijani-energy-firm-hit-by-repeated.html
Attackers reused a vulnerable Microsoft Exchange Server entry point to deploy Deed RAT and attempt TernDoor.
Read: https://thehackernews.com/2026/05/azerbaijani-energy-firm-hit-by-repeated.html
π7π4π€4π₯1π1
UMAI surfaces the public AI ecosystem, including the exposed parts π, through raw technical evidence.
We collect the underlying technical details that help organizations understand, navigate, and investigate an environment expanding faster than most teams can even map.
Turns out some AI agents are better at discovering AI systems than security teams π€·πΎββοΈ
Start exploring for free: https://thn.news/ai-ecosystem-search
We collect the underlying technical details that help organizations understand, navigate, and investigate an environment expanding faster than most teams can even map.
Turns out some AI agents are better at discovering AI systems than security teams π€·πΎββοΈ
Start exploring for free: https://thn.news/ai-ecosystem-search
π7π₯3π3
π₯ Microsoftβs new MDASH AI just uncovered 16 Windows vulnerabilities, patched today in Patch Tuesday β including 4 critical RCEs in the TCP/IP kernel and IKEv2 VPN.
An army of 100+ AI agents debated, validated, and proved them exploitable.
Read more: https://thehackernews.com/2026/05/microsofts-mdash-ai-system-finds-16.html
An army of 100+ AI agents debated, validated, and proved them exploitable.
Read more: https://thehackernews.com/2026/05/microsofts-mdash-ai-system-finds-16.html
π₯4β‘1π1π€1
β‘ WEBINAR β Your AppSec tools are flooded with βtoastβ alerts. But attackers are quietly building a Lethal Chain to your most important data.
Small low-risk flaws in code, pipeline, and cloud create one deadly path your tools miss.
Learn:
β’ How to spot real dangerous risks
β’ How to map actual attack paths
β’ A simple way to cut noise and focus on what matters
Join Wiz experts Mike McGuire & Salman Ladha live next week.
π Watch here β https://thehackernews.com/2026/05/webinar-why-your-appsec-tools-miss.html
Small low-risk flaws in code, pipeline, and cloud create one deadly path your tools miss.
Learn:
β’ How to spot real dangerous risks
β’ How to map actual attack paths
β’ A simple way to cut noise and focus on what matters
Join Wiz experts Mike McGuire & Salman Ladha live next week.
π Watch here β https://thehackernews.com/2026/05/webinar-why-your-appsec-tools-miss.html
π₯3π2
This media is not supported in your browser
VIEW IN TELEGRAM
π¨ ConsentFix v3 just dropped on the XSS criminal forum.
New toolkit fully automates Microsoft account hijacks:
σ ―β’σ ClickFix social engineering + OAuth consent phishing
σ ―β’σ Fake personas & email campaigns
σ ―β’σ Cloudflare phishing pages
σ ―β’σ Auto token swap β persistent session + refresh tokens
Easily bypasses MFA/passkeys.
Read: https://thehackernews.com/2026/05/weekly-recap-linux-rootkit-macos-crypto.html#:~:text=New%20ConsentFix%20V3%20Attack%20Automates%20Microsoft%20Account%20Hijacking
New toolkit fully automates Microsoft account hijacks:
σ ―β’σ ClickFix social engineering + OAuth consent phishing
σ ―β’σ Fake personas & email campaigns
σ ―β’σ Cloudflare phishing pages
σ ―β’σ Auto token swap β persistent session + refresh tokens
Easily bypasses MFA/passkeys.
Read: https://thehackernews.com/2026/05/weekly-recap-linux-rootkit-macos-crypto.html#:~:text=New%20ConsentFix%20V3%20Attack%20Automates%20Microsoft%20Account%20Hijacking
π₯5π2
This media is not supported in your browser
VIEW IN TELEGRAM
π³ One sneaky plaintext byte is all it takes.
Eximβs new βDead.Letterβ (CVE-2026-45185) triggers when a client sends a TLS close_notify mid-BDAT, then slips in a final \n.
That single write hits a freed TLS buffer β corrupts heap allocator metadata on GnuTLS builds (4.97β4.99.2).
XBOW calls it one of the highest-caliber bugs theyβve seen in Exim.
Patch to 4.99.3 right now π https://thehackernews.com/2026/05/new-exim-bdat-vulnerability-exposes.html
Eximβs new βDead.Letterβ (CVE-2026-45185) triggers when a client sends a TLS close_notify mid-BDAT, then slips in a final \n.
That single write hits a freed TLS buffer β corrupts heap allocator metadata on GnuTLS builds (4.97β4.99.2).
XBOW calls it one of the highest-caliber bugs theyβve seen in Exim.
Patch to 4.99.3 right now π https://thehackernews.com/2026/05/new-exim-bdat-vulnerability-exposes.html
π₯5β‘1π1
What if your Android phone secretly kept a tamper-proof forensic log that even advanced spyware canβt delete?
Google just made it real with "Intrusion Logging"
πΈ Opt-in, 12-month encrypted records designed for journalists & activists.
πΈ Enable: Settings β Security & privacy β Advanced Protection β Intrusion Logging
πΈ Rolling out with Android 16 (December update)
Full story: https://thehackernews.com/2026/05/android-adds-intrusion-logging-for.html
Google just made it real with "Intrusion Logging"
πΈ Opt-in, 12-month encrypted records designed for journalists & activists.
πΈ Enable: Settings β Security & privacy β Advanced Protection β Intrusion Logging
πΈ Rolling out with Android 16 (December update)
Full story: https://thehackernews.com/2026/05/android-adds-intrusion-logging-for.html
π₯15π€8π6π±5π1
This media is not supported in your browser
VIEW IN TELEGRAM
β‘ An 18-year-old flaw in NGINX can let unauthenticated attackers run code or crash servers using crafted HTTP requests.
Tracked as CVE-2026-42945 and named NGINX Rift, the bug affects NGINX Plus and Open Source.
Patch details and mitigation steps: https://thehackernews.com/2026/05/18-year-old-nginx-rewrite-module-flaw.html
Tracked as CVE-2026-42945 and named NGINX Rift, the bug affects NGINX Plus and Open Source.
Patch details and mitigation steps: https://thehackernews.com/2026/05/18-year-old-nginx-rewrite-module-flaw.html
π€―14π₯7π±5β‘1π1
π 3rd Linux kernel LPE in just ~2 weeks: Fragnesia (CVE-2026-46300) just dropped.
Attackers can now gain root by corrupting the kernel page cache through a flaw in XFRM ESP-in-TCP.
PoC is public. Major distros have already issued advisories.
Details: https://thehackernews.com/2026/05/new-fragnesia-linux-kernel-lpe-grants.html
Attackers can now gain root by corrupting the kernel page cache through a flaw in XFRM ESP-in-TCP.
PoC is public. Major distros have already issued advisories.
Details: https://thehackernews.com/2026/05/new-fragnesia-linux-kernel-lpe-grants.html
π€―21π±5β‘4π₯3π2
π₯ Two new Windows zero-days expose a BitLocker bypass in WinRE and a CTFMON privilege escalation issue.
YellowKey affects Windows 11 and Server 2022/2025; GreenPlasma could enable abuse of SYSTEM-writable paths.
Full story: https://thehackernews.com/2026/05/windows-zero-days-expose-bitlocker.html
YellowKey affects Windows 11 and Server 2022/2025; GreenPlasma could enable abuse of SYSTEM-writable paths.
Full story: https://thehackernews.com/2026/05/windows-zero-days-expose-bitlocker.html
π6π₯3
π₯ Two new Windows zero-days expose a BitLocker bypass in WinRE and a CTFMON privilege escalation issue.
YellowKey affects Windows 11 and Server 2022/2025; GreenPlasma could enable abuse of SYSTEM-writable paths.
Full story: https://thehackernews.com/2026/05/windows-zero-days-expose-bitlocker.html
YellowKey affects Windows 11 and Server 2022/2025; GreenPlasma could enable abuse of SYSTEM-writable paths.
Full story: https://thehackernews.com/2026/05/windows-zero-days-expose-bitlocker.html
π₯4π2π€―2
β οΈ AI hallucinations just became a real cyber weapon.
2025 benchmark of 40 AI models: 36/40 were more likely to give confident wrong answers than correct ones on hard questions.
Thatβs not a glitch. Thatβs your new attack surface.
Read β https://thehackernews.com/2026/05/how-ai-hallucinations-are-creating-real.html
2025 benchmark of 40 AI models: 36/40 were more likely to give confident wrong answers than correct ones on hard questions.
Thatβs not a glitch. Thatβs your new attack surface.
Read β https://thehackernews.com/2026/05/how-ai-hallucinations-are-creating-real.html
π9π₯4
π¨ Threat actors targeted PraisonAI CVE-2026-44338, an authentication bypass vulnerability, within hours of disclosure.
The flaw affects versions 2.5.6β4.6.33 and can expose the /agents endpoint without authorization.
Read the full report: https://thehackernews.com/2026/05/praisonai-cve-2026-44338-auth-bypass.html
The flaw affects versions 2.5.6β4.6.33 and can expose the /agents endpoint without authorization.
Read the full report: https://thehackernews.com/2026/05/praisonai-cve-2026-44338-auth-bypass.html
π4
You've heard us say compliance should be part of how you operate, not a project.
On May 20, we're showing you exactly what that means.
Watch Rippling Automated Compliance for SOC 2 collect evidence continuously, catch issues the moment they happen, and resolve them, all without leaving the platform. No bouncing between tools. No quarterly scramble. No mystery about what your auditors will find.
This is the live demo. Come with questions.
π₯Automated Compliance: From Manual Chaos to Continuous Control
π May 20 | Live Product Demo | Free
Save your spot β https://thn.news/compliance-automation-webinar
On May 20, we're showing you exactly what that means.
Watch Rippling Automated Compliance for SOC 2 collect evidence continuously, catch issues the moment they happen, and resolve them, all without leaving the platform. No bouncing between tools. No quarterly scramble. No mystery about what your auditors will find.
This is the live demo. Come with questions.
π₯Automated Compliance: From Manual Chaos to Continuous Control
π May 20 | Live Product Demo | Free
Save your spot β https://thn.news/compliance-automation-webinar
π1
π¨ Belarus-aligned Ghostwriter has targeted Ukrainian government organizations since March 2026 with spear-phishing PDFs impersonating Ukrtelecom.
The campaign uses Ukraine IP geofencing, JavaScript PicassoLoader, 10-minute host fingerprinting, and Cobalt Strike after victim validation.
Full infection chain: https://thehackernews.com/2026/05/ghostwriter-targets-ukrainian.html
The campaign uses Ukraine IP geofencing, JavaScript PicassoLoader, 10-minute host fingerprinting, and Cobalt Strike after victim validation.
Full infection chain: https://thehackernews.com/2026/05/ghostwriter-targets-ukrainian.html
π3β‘2π₯2