Post

Cybersecurity Newsfeed - 21/05/26

Daily cybersecurity news covering vulnerabilities, adversaries, trends, breaches, and other notable security developments.

Cybersecurity Newsfeed - 21/05/26

Cybersecurity Newsfeed

📅 21/05/26

🛡️ Vulnerabilities

  • SonicWall MFA Bypass via Incomplete Patching: SonicWall has cautioned customers that threat actors are bypassing multi-factor authentication (MFA) on its SSL VPN appliances. The issue stems from incomplete patching of a previously disclosed vulnerability, allowing attackers to exploit lingering weaknesses in the authentication logic to gain persistent corporate network access. More info

  • PinTheft Local Privilege Escalation in Arch Linux: A newly discovered local privilege escalation vulnerability, dubbed PinTheft, has been identified in Arch Linux. This flaw allows a standard user to gain root privileges by exploiting a race condition within specific system utilities. A functional exploit has been released. More info

  • CISA Adds Seven Flaws to KEV Catalog: CISA has added seven vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation in the wild. These flaws span various software and hardware products, and the agency mandates that organizations prioritize patching them immediately. More info

  • Critical Drupal Update Fixes High-Exploitation Risk Bug: Drupal has released a critical security update to address a high-risk vulnerability that could lead to full site compromise. The flaw involves an exploitation risk where attackers could execute arbitrary code under certain configurations. More info

  • DirtyDecrypt PoC Released for Linux Kernel Flaw: A proof-of-concept (PoC) exploit, named DirtyDecrypt, has been released for a significant Linux kernel vulnerability. This flaw allows local users to bypass memory protections and achieve unauthorized data decryption or privilege escalation. More info

  • Microsoft Shares Mitigations for YellowKey Zero-Day: Microsoft has issued mitigation guidance for “YellowKey,” a critical Windows zero-day vulnerability currently being exploited in the wild. The flaw resides in the Windows kernel and can be leveraged by attackers to bypass security features and gain elevated system privileges. More info

  • Huawei Zero-Day Linked to 2025 Luxembourg Telecom Crash: An alleged Huawei zero-day vulnerability has been linked to a major telecommunications crash in Luxembourg in 2025. Investigations suggest that threat actors exploited an unpatched flaw in Huawei networking gear to disrupt core services. More info

  • Windows Zero-Day Barrage Escalates After Patch Tuesday: Following Patch Tuesday, a barrage of new Windows zero-day vulnerabilities has been reported, keeping security teams on high alert. These flaws include remote code execution and privilege escalation bugs across multiple components and are being targeted by APT groups. More info

🎯 Adversaries

  • Webworm APT Launches New European Campaign: The Webworm APT group has launched a new campaign targeting European government and industrial sectors. Using updated malware variants, the group employs sophisticated obfuscation techniques to evade traditional detection mechanisms and conduct cyber espionage. More infoMore info
  • Banana RAT Targets 16 Brazilian Banks via Fake Invoices: The Banana RAT malware is currently targeting sixteen major Brazilian banks through a campaign involving fraudulent invoices. Distributed via email, this Remote Access Trojan allows hackers to monitor user activity, capture keystrokes, and intercept credentials. More info

  • Unit 42 Tracks Maliciously Tampered Chef Clusters: Unit 42 researchers are tracking a campaign involving tampered Chef clusters where attackers gain access to management consoles to inject malicious recipes and cookbooks into the infrastructure-as-code pipeline, deploying backdoors and cryptominers. More info

  • Fake Word Documents Deploy RATs in Enterprise Phishing: A sophisticated phishing campaign is utilizing fake Microsoft Word documents containing malicious macros or exploits to deploy remote access tools (RATs). By leveraging trusted tools, the campaign often bypasses traditional antivirus signatures. More info

🤖 AI Security

  • Claude AI Sandbox Escape Defeated: Security researchers have identified a dangerous sandbox escape vulnerability in Anthropic’s Claude AI model. The flaw allowed the AI to execute unauthorized code outside its restricted environment. Anthropic acknowledged the risk and deployed a fix to reinforce the boundary. More info

  • Microsoft Releases Open-Source AI Safety Tools (Rampart & Clarity): Microsoft has introduced two new open-source tools designed to enhance AI agent security. Rampart focuses on providing a secure execution boundary for agents, while Clarity offers observability into agent decision-making processes. More info

  • Max-Severity Flaw in ChromaDB Vector Database: A maximum-severity vulnerability has been discovered in ChromaDB, a popular vector database used in AI applications. The flaw enables remote code execution (RCE) by exploiting improper input validation during data ingestion, allowing for complete server hijacking. More info

  • Mini-Shai-Hulud Campaign Targets CI/CD Pipelines via npm: Microsoft researchers have uncovered a malicious campaign involving compromised npm packages designed to facilitate CI/CD credential theft. The attack targets developers by injecting malicious scripts into legitimate package dependencies to exfiltrate API keys and cloud tokens. More info

  • Token Pilfering Surges to Bypass Multi-Factor Authentication: A recent report highlights the surging threat of token theft as a primary method for bypassing MFA. Attackers are increasingly using adversary-in-the-middle (AiTM) techniques to steal session tokens directly from browsers and hijack active cloud sessions. More info

  • PCPJack Worm Steals Cloud Service Provider Credentials: A new wormable malware named PCPJack has been identified targeting cloud environments. The worm spreads by exploiting misconfigured Port Control Protocol (PCP) services, moving laterally across networks to exfiltrate cloud infrastructure management secrets. More info

💥 Breaches & Leaks

  • GitHub Confirms Breach as 4,000 Internal Repos Stolen: GitHub has confirmed a security breach resulting in the theft of approximately 4,000 internal repositories. The incident occurred after an attacker gained unauthorized access via a compromised employee credential. Customer data and core services were not impacted. More info

🏛️ Takedowns & Disruptions

  • Microsoft Dismantles ‘Fox Tempest’ Malware-Signing Operation: Microsoft has successfully dismantled “Fox Tempest,” a cybercrime operation that provided fake malware-signing services to threat actors by abusing Microsoft’s platform to obtain legitimate digital certificates and evade security filters. More infoMore info

⬅ Back to Archive

This post is licensed under CC BY 4.0 by the author.