β‘ WEBINAR β Your AppSec tools are flooded with βtoastβ alerts. But attackers are quietly building a Lethal Chain to your most important data.
Small low-risk flaws in code, pipeline, and cloud create one deadly path your tools miss.
Learn:
β’ How to spot real dangerous risks
β’ How to map actual attack paths
β’ A simple way to cut noise and focus on what matters
Join Wiz experts Mike McGuire & Salman Ladha live next week.
π Watch here β https://thehackernews.com/2026/05/webinar-why-your-appsec-tools-miss.html
Small low-risk flaws in code, pipeline, and cloud create one deadly path your tools miss.
Learn:
β’ How to spot real dangerous risks
β’ How to map actual attack paths
β’ A simple way to cut noise and focus on what matters
Join Wiz experts Mike McGuire & Salman Ladha live next week.
π Watch here β https://thehackernews.com/2026/05/webinar-why-your-appsec-tools-miss.html
π₯3π2
This media is not supported in your browser
VIEW IN TELEGRAM
π¨ ConsentFix v3 just dropped on the XSS criminal forum.
New toolkit fully automates Microsoft account hijacks:
σ ―β’σ ClickFix social engineering + OAuth consent phishing
σ ―β’σ Fake personas & email campaigns
σ ―β’σ Cloudflare phishing pages
σ ―β’σ Auto token swap β persistent session + refresh tokens
Easily bypasses MFA/passkeys.
Read: https://thehackernews.com/2026/05/weekly-recap-linux-rootkit-macos-crypto.html#:~:text=New%20ConsentFix%20V3%20Attack%20Automates%20Microsoft%20Account%20Hijacking
New toolkit fully automates Microsoft account hijacks:
σ ―β’σ ClickFix social engineering + OAuth consent phishing
σ ―β’σ Fake personas & email campaigns
σ ―β’σ Cloudflare phishing pages
σ ―β’σ Auto token swap β persistent session + refresh tokens
Easily bypasses MFA/passkeys.
Read: https://thehackernews.com/2026/05/weekly-recap-linux-rootkit-macos-crypto.html#:~:text=New%20ConsentFix%20V3%20Attack%20Automates%20Microsoft%20Account%20Hijacking
π₯5π2
This media is not supported in your browser
VIEW IN TELEGRAM
π³ One sneaky plaintext byte is all it takes.
Eximβs new βDead.Letterβ (CVE-2026-45185) triggers when a client sends a TLS close_notify mid-BDAT, then slips in a final \n.
That single write hits a freed TLS buffer β corrupts heap allocator metadata on GnuTLS builds (4.97β4.99.2).
XBOW calls it one of the highest-caliber bugs theyβve seen in Exim.
Patch to 4.99.3 right now π https://thehackernews.com/2026/05/new-exim-bdat-vulnerability-exposes.html
Eximβs new βDead.Letterβ (CVE-2026-45185) triggers when a client sends a TLS close_notify mid-BDAT, then slips in a final \n.
That single write hits a freed TLS buffer β corrupts heap allocator metadata on GnuTLS builds (4.97β4.99.2).
XBOW calls it one of the highest-caliber bugs theyβve seen in Exim.
Patch to 4.99.3 right now π https://thehackernews.com/2026/05/new-exim-bdat-vulnerability-exposes.html
π₯5β‘1π1
What if your Android phone secretly kept a tamper-proof forensic log that even advanced spyware canβt delete?
Google just made it real with "Intrusion Logging"
πΈ Opt-in, 12-month encrypted records designed for journalists & activists.
πΈ Enable: Settings β Security & privacy β Advanced Protection β Intrusion Logging
πΈ Rolling out with Android 16 (December update)
Full story: https://thehackernews.com/2026/05/android-adds-intrusion-logging-for.html
Google just made it real with "Intrusion Logging"
πΈ Opt-in, 12-month encrypted records designed for journalists & activists.
πΈ Enable: Settings β Security & privacy β Advanced Protection β Intrusion Logging
πΈ Rolling out with Android 16 (December update)
Full story: https://thehackernews.com/2026/05/android-adds-intrusion-logging-for.html
π₯15π€8π6π±5π1
This media is not supported in your browser
VIEW IN TELEGRAM
β‘ An 18-year-old flaw in NGINX can let unauthenticated attackers run code or crash servers using crafted HTTP requests.
Tracked as CVE-2026-42945 and named NGINX Rift, the bug affects NGINX Plus and Open Source.
Patch details and mitigation steps: https://thehackernews.com/2026/05/18-year-old-nginx-rewrite-module-flaw.html
Tracked as CVE-2026-42945 and named NGINX Rift, the bug affects NGINX Plus and Open Source.
Patch details and mitigation steps: https://thehackernews.com/2026/05/18-year-old-nginx-rewrite-module-flaw.html
π€―14π₯7π±5β‘1π1
π 3rd Linux kernel LPE in just ~2 weeks: Fragnesia (CVE-2026-46300) just dropped.
Attackers can now gain root by corrupting the kernel page cache through a flaw in XFRM ESP-in-TCP.
PoC is public. Major distros have already issued advisories.
Details: https://thehackernews.com/2026/05/new-fragnesia-linux-kernel-lpe-grants.html
Attackers can now gain root by corrupting the kernel page cache through a flaw in XFRM ESP-in-TCP.
PoC is public. Major distros have already issued advisories.
Details: https://thehackernews.com/2026/05/new-fragnesia-linux-kernel-lpe-grants.html
π€―21π±5β‘4π₯3π2
π₯ Two new Windows zero-days expose a BitLocker bypass in WinRE and a CTFMON privilege escalation issue.
YellowKey affects Windows 11 and Server 2022/2025; GreenPlasma could enable abuse of SYSTEM-writable paths.
Full story: https://thehackernews.com/2026/05/windows-zero-days-expose-bitlocker.html
YellowKey affects Windows 11 and Server 2022/2025; GreenPlasma could enable abuse of SYSTEM-writable paths.
Full story: https://thehackernews.com/2026/05/windows-zero-days-expose-bitlocker.html
π6π₯3
π₯ Two new Windows zero-days expose a BitLocker bypass in WinRE and a CTFMON privilege escalation issue.
YellowKey affects Windows 11 and Server 2022/2025; GreenPlasma could enable abuse of SYSTEM-writable paths.
Full story: https://thehackernews.com/2026/05/windows-zero-days-expose-bitlocker.html
YellowKey affects Windows 11 and Server 2022/2025; GreenPlasma could enable abuse of SYSTEM-writable paths.
Full story: https://thehackernews.com/2026/05/windows-zero-days-expose-bitlocker.html
π₯4π2π€―2
β οΈ AI hallucinations just became a real cyber weapon.
2025 benchmark of 40 AI models: 36/40 were more likely to give confident wrong answers than correct ones on hard questions.
Thatβs not a glitch. Thatβs your new attack surface.
Read β https://thehackernews.com/2026/05/how-ai-hallucinations-are-creating-real.html
2025 benchmark of 40 AI models: 36/40 were more likely to give confident wrong answers than correct ones on hard questions.
Thatβs not a glitch. Thatβs your new attack surface.
Read β https://thehackernews.com/2026/05/how-ai-hallucinations-are-creating-real.html
π9π₯4
π¨ Threat actors targeted PraisonAI CVE-2026-44338, an authentication bypass vulnerability, within hours of disclosure.
The flaw affects versions 2.5.6β4.6.33 and can expose the /agents endpoint without authorization.
Read the full report: https://thehackernews.com/2026/05/praisonai-cve-2026-44338-auth-bypass.html
The flaw affects versions 2.5.6β4.6.33 and can expose the /agents endpoint without authorization.
Read the full report: https://thehackernews.com/2026/05/praisonai-cve-2026-44338-auth-bypass.html
π4
You've heard us say compliance should be part of how you operate, not a project.
On May 20, we're showing you exactly what that means.
Watch Rippling Automated Compliance for SOC 2 collect evidence continuously, catch issues the moment they happen, and resolve them, all without leaving the platform. No bouncing between tools. No quarterly scramble. No mystery about what your auditors will find.
This is the live demo. Come with questions.
π₯Automated Compliance: From Manual Chaos to Continuous Control
π May 20 | Live Product Demo | Free
Save your spot β https://thn.news/compliance-automation-webinar
On May 20, we're showing you exactly what that means.
Watch Rippling Automated Compliance for SOC 2 collect evidence continuously, catch issues the moment they happen, and resolve them, all without leaving the platform. No bouncing between tools. No quarterly scramble. No mystery about what your auditors will find.
This is the live demo. Come with questions.
π₯Automated Compliance: From Manual Chaos to Continuous Control
π May 20 | Live Product Demo | Free
Save your spot β https://thn.news/compliance-automation-webinar
π1
π¨ Belarus-aligned Ghostwriter has targeted Ukrainian government organizations since March 2026 with spear-phishing PDFs impersonating Ukrtelecom.
The campaign uses Ukraine IP geofencing, JavaScript PicassoLoader, 10-minute host fingerprinting, and Cobalt Strike after victim validation.
Full infection chain: https://thehackernews.com/2026/05/ghostwriter-targets-ukrainian.html
The campaign uses Ukraine IP geofencing, JavaScript PicassoLoader, 10-minute host fingerprinting, and Cobalt Strike after victim validation.
Full infection chain: https://thehackernews.com/2026/05/ghostwriter-targets-ukrainian.html
π3β‘2π₯2
π₯ ThreatsDay Bulletin is out!
β’ PAN-OS root RCE actively exploited
β’ AI model hijacks
β’ GhostLock file lock trick
β’ Zero-auth defense leak
β’ OnlyFans ransomware
β’ ClickFix upgrade
+ 9 more stories.
Full read π https://thehackernews.com/2026/05/threatsday-bulletin-pan-os-rce-mythos.html
β’ PAN-OS root RCE actively exploited
β’ AI model hijacks
β’ GhostLock file lock trick
β’ Zero-auth defense leak
β’ OnlyFans ransomware
β’ ClickFix upgrade
+ 9 more stories.
Full read π https://thehackernews.com/2026/05/threatsday-bulletin-pan-os-rce-mythos.html
π2
π¨ ALERT - Three newly published node-ipc npm versions have been confirmed as malicious, with obfuscated stealer/backdoor behavior targeting developer and cloud secrets.
Full details on affected versions and how the payload triggers at runtime: https://thehackernews.com/2026/05/stealer-backdoor-found-in-3-node-ipc.html
Full details on affected versions and how the payload triggers at runtime: https://thehackernews.com/2026/05/stealer-backdoor-found-in-3-node-ipc.html
π7π₯4
π¨ Limited attacks are exploiting CVE-2026-20182, a CVSS 10.0 auth bypass in Cisco Catalyst SD-WAN Controller.
Unauthenticated remote attackers can gain admin privileges and manipulate SD-WAN configurations.
Affected: on-prem, cloud, government deployments.
Full details and mitigation steps: https://thehackernews.com/2026/05/cisco-catalyst-sd-wan-controller-auth.html
Unauthenticated remote attackers can gain admin privileges and manipulate SD-WAN configurations.
Affected: on-prem, cloud, government deployments.
Full details and mitigation steps: https://thehackernews.com/2026/05/cisco-catalyst-sd-wan-controller-auth.html
π9π₯4π3π±1
π¨ CISA added CVE-2026-20182, a CVSS 10.0 authentication bypass in Cisco Catalyst SD-WAN Controller, to its KEV catalog amid active exploitation.
Remote attackers can gain admin privileges. FCEB agencies must remediate by May 17, 2026.
Full details: https://thehackernews.com/2026/05/cisa-adds-cisco-sd-wan-cve-2026-20182.html
Remote attackers can gain admin privileges. FCEB agencies must remediate by May 17, 2026.
Full details: https://thehackernews.com/2026/05/cisa-adds-cisco-sd-wan-cve-2026-20182.html
π₯9π4π±4
π¨ On-prem Microsoft Exchange Server CVE-2026-42897 is under active exploitation.
The CVSS 8.1 spoofing flaw stems from XSS and can allow arbitrary JavaScript execution when crafted emails are opened in Outlook Web Access under certain conditions.
Read: https://thehackernews.com/2026/05/on-prem-microsoft-exchange-server-cve.html
The CVSS 8.1 spoofing flaw stems from XSS and can allow arbitrary JavaScript execution when crafted emails are opened in Outlook Web Access under certain conditions.
Read: https://thehackernews.com/2026/05/on-prem-microsoft-exchange-server-cve.html
π8π±5
π¨ Two OpenAI employee devices were impacted in the Mini Shai-Hulud supply chain attack via TanStack.
Limited credentials were exfiltrated from internal code repos, prompting macOS certificate revocation and required app updates before June 12, 2026.
Read: https://thehackernews.com/2026/05/tanstack-supply-chain-attack-hits-two.html
Limited credentials were exfiltrated from internal code repos, prompting macOS certificate revocation and required app updates before June 12, 2026.
Read: https://thehackernews.com/2026/05/tanstack-supply-chain-attack-hits-two.html
π₯6π3
Your biggest blind spot isn't malware. It's the trusted tools your team already uses every day.
PowerShell. Certutil. netsh.
Attackers love them too β and Bitdefender just proved it in 700,000+ incidents.
What happens when you watch your own tools for 45 days? Learn here β https://thehackernews.com/2026/05/what-45-days-of-watching-your-own-tools.html
PowerShell. Certutil. netsh.
Attackers love them too β and Bitdefender just proved it in 700,000+ incidents.
What happens when you watch your own tools for 45 days? Learn here β https://thehackernews.com/2026/05/what-45-days-of-watching-your-own-tools.html
π€6π3
π¨ Four OpenClaw vulnerabilities dubbed Claw Chain can be chained to steal sensitive data, escalate privileges, and establish persistence.
All four flaws are fixed in OpenClaw 2026.4.22.
Full technical breakdown of the attack chain and CVEs: https://thehackernews.com/2026/05/four-openclaw-flaws-enable-data-theft.html
All four flaws are fixed in OpenClaw 2026.4.22.
Full technical breakdown of the attack chain and CVEs: https://thehackernews.com/2026/05/four-openclaw-flaws-enable-data-theft.html
π9π₯5π€―3π2
β οΈ Turla has rebuilt Kazuar into a modular P2P botnet designed for stealth and persistent access.
The upgraded .NET backdoor uses Kernel, Bridge, and Worker modules to handle C2, tasking, collection, and exfiltration.
Learn more: https://thehackernews.com/2026/05/turla-turns-kazuar-backdoor-into.html
The upgraded .NET backdoor uses Kernel, Bridge, and Worker modules to handle C2, tasking, collection, and exfiltration.
Learn more: https://thehackernews.com/2026/05/turla-turns-kazuar-backdoor-into.html
π€―7π±2