Post

Cybersecurity Newsfeed - 15/05/26

Daily cybersecurity news covering vulnerabilities, adversaries, trends, breaches, and other notable security developments.

Cybersecurity Newsfeed - 15/05/26

Cybersecurity Newsfeed

📅 15/05/26

🛡️ Vulnerabilities

  • Cisco Catalyst SD-WAN Critical Zero-Day (CVE-2026-3021): Cisco has confirmed active exploitation of a maximum-severity flaw (CVSS 10.0) in its SD-WAN Manager. Unauthenticated, remote attackers can bypass authentication via the web management interface to gain full administrative control. Urgent patches have been released. More info

  • Burst Statistics WordPress Plugin Auth Bypass (CVE-2026-4039): Attackers are actively exploiting a flaw in the Burst Statistics plugin to gain administrative access by manipulating specific API endpoints. Administrators are urged to update to version 1.5.9 immediately. More info

  • PraisonAI Authentication Bypass (CVE-2026-44338): A critical flaw in the popular AI orchestration framework allows unauthenticated remote attackers to gain administrative access to the management console, potentially exposing sensitive AI models and training data. More info

  • Linux Kernel “Fragnesia” (CVE-2026-1045): A heap buffer overflow in the network packet fragmentation logic allows local users to gain root access. This poses a significant threat to multi-user systems and cloud environments. More info

  • 18-Year-Old Nginx Rewrite Flaw (CVE-2026-1189): A legacy vulnerability in Nginx’s rewrite module can trigger a stack-based buffer overflow via crafted URIs, leading to DoS or potential RCE. Organizations are encouraged to update and review configurations. More info

  • F5 Patches 50+ Vulnerabilities: F5 released security updates for BIG-IP and BIG-IQ systems to address high-severity flaws involving improper input validation and insecure default configurations. More info

  • Windows BitLocker Bypass Zero-Days: New vulnerabilities allow attackers with physical access to bypass BitLocker encryption by intercepting keys during the boot process or exploiting Secure Boot weaknesses. More info

  • CISA KEV Update: CISA has added a new critical vulnerability to its Known Exploited Vulnerabilities catalog following reports of active exploitation, mandating prioritization for patching. More info

🎯 Adversaries

  • FrostyNeighbor APT Targets Eastern Europe: A new APT group is conducting targeted cyber-espionage against government organizations in Poland and Ukraine, utilizing a bespoke toolkit for data exfiltration and surveillance. More info

  • Mustang Panda Deploys FDMTP Backdoor: The threat group is targeting the Asia-Pacific (APJ) region with a new modular backdoor designed for stealthy data exfiltration and persistent access. More info

  • FamousSparrow Exploits Exchange Servers: This APT is targeting the oil and gas industry by leveraging Microsoft Exchange vulnerabilities to maintain persistence and exfiltrate sensitive corporate data. More info

  • Kazuar Botnet Analysis: Microsoft published a deep dive into the Kazuar backdoor, used by nation-state actors, highlighting its updated evasion techniques and modular payloads. More info

  • Kimsuky Uses AppleSeed & PebbleDash: The threat group is targeting South Korean entities with sophisticated phishing campaigns to deploy data-stealing backdoors. More info

  • Kongtuke Hackers Shift to Microsoft Teams: Attackers are bypassing traditional email security by using Teams as a primary vector for corporate breaches, delivering malicious files via compromised guest accounts. More info

  • Windows 11 & Edge Hacked at Pwn2Own: On the first day of Pwn2Own Berlin 2026, security researchers successfully demonstrated exploit chains against Microsoft’s software to achieve remote code execution. More info

  • AI Cybersecurity “Valley of Death”: Investment in AI-driven security faces challenges as startups struggle to transition from pilot programs to full-scale adoption due to ROI and integration hurdles. More info

  • Cyber-Enabled Cargo Theft: Cybercriminals are increasingly blending digital and physical tactics to facilitate cargo theft by compromising logistics platforms and stealing freight credentials. More info

  • Supply Chain Threats in Open Source: Recent attacks on Node.js IPC packages and the TanStack library ecosystem underscore the persistent risk of targeting developer dependencies to steal sensitive data. More info

  • “JobStealer” Malware Campaign: A new cross-platform threat is targeting job seekers on Windows and macOS through fraudulent interview invitations and fake video conferencing tools. More info

💥 Breaches & Leaks

  • OpenAI / TanStack Supply Chain Breach: OpenAI confirmed a breach involving a supply chain attack on the TanStack library, resulting in the injection of malicious code via a compromised maintainer account. More info

  • West Pharmaceutical Services Ransomware: The healthcare supplier confirmed a cyberattack that led to data theft and the encryption of internal systems, disrupting some operations. More info

📚 Others

  • Dream Market Administrator Charged: U.S. authorities have charged a suspected administrator of the dark web marketplace Dream Market following an international investigation and arrest in Germany. More info

  • SecurityScorecard Acquires Driftnet: The acquisition aims to enhance digital footprint monitoring and supply chain risk management by integrating Driftnet’s specialized threat intelligence datasets. More info


⬅ Back to Archive

This post is licensed under CC BY 4.0 by the author.