• Open

    PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers
    Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.
    The Oracle of Delphi Will Steal Your Credentials
    Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The attacks brute forced passwords for RDP credentials to connect to the victim download and execute a previously undetected malware, which we named Trojan.sysscan.
    The Nansh0u Campaign – Hackers Arsenal Grows Stronger
    In the beginning of April, three attacks detected in the Guardicore Global Sensor Network (GGSN) caught our attention. All three had source IP addresses originating in South-Africa and hosted by VolumeDrive ISP (see IoCs).
    Threats Making WAVs - Incident Response to a Cryptomining Attack
    Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident response processes in data centers.
    Keep Your Tech Flame Alive: Trailblazer Rachel Bayley
    In this Akamai FLAME Trailblazer blog post, Rachel Bayley encourages women to step into the unknown and to be their authentic selves.
  • Open

    CTT - 468,124 breached accounts
    In April 2026, data allegedly obtained from CTT, Portugal's national postal service, was posted to a public hacking forum. The data included 468k unique email addresses along with names, phone numbers and parcel tracking numbers which can be used to retrieve the tracking history of the parcel.

  • Open

    How Storm-2949 turned a compromised identity into a cloud-wide breach
    Storm-2949 turned stolen credentials into a cloud-wide breach, moving from identity compromise to large-scale data theft without using malware. This incident shows how threat actors can exploit trusted systems to operate undetected. The post How Storm-2949 turned a compromised identity into a cloud-wide breach appeared first on Microsoft Security Blog.
    How to better protect your growing business in an AI-powered world
    See how built-in security helps keep your growing business running, protect customer trust, and support growth. The post How to better protect your growing business in an AI-powered world appeared first on Microsoft Security Blog.
  • Open

    Addi - 34,532,941 breached accounts
    In March 2026, the Colombian fintech company Addi identified unauthorised activity on its platform and advised customers that "it is possible that your personal information may have been compromised". The "pay or leak" extortion group ShinyHunters subsequently claimed responsibility and published a large trove of personal data allegedly obtained from Addi. The data included 34M unique email addresses from credit scoring requests, credit bureau records, customer identity records and email validation logs. It also contained government issued IDs (Cédula de Ciudadanía), estimated income, socioeconomic levels, purchases and other credit-related data points.
  • Open

    The FBI Wants to Buy Nationwide Access to License Plate Readers
    Only a couple vendors could likely fulfill what the FBI is after, namely Flock and Motorola.
    Podcast: The Physical Politics of the Internet with Britt Paris
    Britt Paris's new book 'Radical Infrastructure: Imagining the Internet from the Ground Up' tells the story of the physical internet, and how it can benefit people, not corporations.
    Researchers Wanted Preschool Teachers to Wear Cameras to Train AI
    “With your permission, your child’s lead teacher may wear a small teacher-worn camera that captures the teacher's approximate first-person perspective, and/or we may place a fixed video camera in the classroom,” a document given to parents and later shared with 404 Media reads.
  • Open

    Microsoft is changing Edge’s plaintext password behavior
    Saved passwords in Microsoft Edge will no longer sit in plaintext memory for the entire browser session after a researcher raised concerns.
    A week in security (May 11 – May 17)
    A list of topics we covered in the week of May 11 to May 17 of 2026
    AI is distorting the Holocaust (Lock and Code S07E10)
    This week on the Lock and Code podcast, we speak with Clara Mansfeld about how AI-generated imagery is warping the history of the Holocaust.
  • Open

    Create a Mass Assignment Lab With Me
    No content preview
    ICMP Walkthrough — OffSec Lab (Privilege Escalation via hping3)
    No content preview
    Broken Authentication: How Attackers Gain Unauthorized Access to Your Application.
    No content preview
    Digging Up the Dead: Disk Forensics & Git Object Archaeology (PicoCTF Walkthrough)
    No content preview
    Docker Compose and Microservices Networks
    No content preview
    Building a powerful SIEM with Clickhouse and Clickdetect
    No content preview
    LLM Security: Understanding AI as an Attack Surface, A TryHackMe Writeup
    No content preview
    The Trojan PR: Achieving Code Execution in GitHub Actions via Pipeline Poisoning
    No content preview
  • Open

    CVE-2026-42945: Mitigating a Critical Heap Buffer Overflow Vulnerability in NGINX
    Discover CVE-2026-42945 (NGINX Rift), a critical heap buffer overflow vulnerability. Learn about the affected versions and critical patch updates.

  • Open

    📖 [The CloudSecList] Issue 338
    📖 [The CloudSecList] Issue 338 was originally published by Marco Lancini at CloudSecList on May 17, 2026.  ( 5 min )
  • Open

    Scientists Discover Strange New Crystal Formed by Nuclear Blast
    A type of crystal lattice called a clathrate structure has been found for the first time in the fallout of a nuclear detonation.
  • Open

    Pwn2Own Berlin 2026: Day Three Results and Master of Pw
    Following two days of intense competition, Day Three of Pwn2Own Berlin 2026 brought the curtain down on an incredible event. Security researchers delivered their final exploits, pushing enterprise systems to the limit one last time as the race for Master of Pwn came to a close. Day Three added to an already historic event, bringing the final totals to $1,298,250 awarded for 47 unique 0-day vulnerabilities across three days of competition. DEVCORE claimed the title of Master of Pwn with a commanding 50.5 points and $505,000 — a dominant performance across all three days. STARLabs SG finished in second with 25 points and $242,500, followed by Out Of Bounds in third with 12.75 points and $95,750. Congratulations to all the researchers who participated, and a special thank you to OffensiveCon …

  • Open

    Tech Companies to Discuss Iran's Future During 'Private Conference' at Uber HQ
    The former Crown Prince of Iran is meeting with Iranian diaspora tech and business leaders on Saturday to discuss the future of the country. Attendees include the CEO of Uber.
    ArXiv to Ban Researchers for a Year if They Submit AI Slop
    The change comes as arXiv and others struggle to manage an influx of AI-generated materials masquerading as rigorous science.
    Behind the Blog: New Music and a Crash Out
    This week, we discuss developers' AI woes, how the magic happens, and the Beach Boys.
    Mayo Clinic is Using AI to Listen to Emergency Room Visits
    Mayo Clinic's "Ambient Listening" has been around for a couple of years, but clearly not all patients know their interactions with nurses are being passively recorded and processed by AI.
  • Open

    The AWS AI Security Framework: Securing AI with the right controls, at the right layers, at the right phases
    TL;DR for busy executives The AWS AI Security Framework helps security leaders move fast and stay secure with AI. Security compounds from day 1 as workloads evolve from prototype to production to scale. Assess first. Request a no-cost SHIP engagement to baseline your posture and build a prioritized roadmap. Phase 1 – Foundational (zero to […]  ( 123 min )
  • Open

    Mini Shai-Hulud: The Worm Returns and Goes Public
    No content preview
  • Open

    Attackers replaced JDownloader installer downloads with malware
    The JDownloader website was compromised and installer download links served malware for several days.
    Meta’s confusing new approach to chat privacy
    WhatsApp now offers disappearing AI chats Meta says it cannot read. While Instagram just removed the feature that stopped Meta reading your messages.
  • Open

    Pwn2Own Berlin 2026 - Day Two Results
    Day Two of Pwn2Own Berlin 2026 and the stakes continue to rise! Security researchers are back on the Pwn2Own stage, pushing enterprise systems to their limits as the competition heats up. More exploits, more surprises, and more standout moments are unfolding, so follow along here for live updates as the race for Master of Pwn intensifies. There were plenty of big targets on the schedule today, including SharePoint, Exchange, and Safari. Following an action-packed Day One where $523,000 was awarded for 24 unique 0-day vulnerabilities, Day Two added another $385,750 and 15 unique 0-days, bringing event totals to $908,750 with 39 unique vulnerabilities overall. DEVCORE holds a commanding lead for Master of Pwn with 40.5 points and $405,000, but with one day still to go, anything can happen. H…
  • Open

    I Got Blocked by Outlier Twice. The Second Time I Had Built My Own Browser.
    No content preview
    POST, PUT, DELETE: Building Custom Requests from Zero
    No content preview

  • Open

    Regional routing for AWS access portals: Implementing custom vanity domains for IAM Identity Center
    AWS IAM Identity Center provides a web-based access portal that gives your workforce a single place to view their AWS accounts and applications. With the recent launch of IAM Identity Center multi-Region replication, customers can replicate their IAM Identity Center instance across multiple AWS Regions to improve resilience and reduce latency for a globally distributed […]  ( 120 min )
    Automating post-quantum cryptography readiness using AWS Config
    Migrating your TLS endpoints to Post-quantum cryptography (PQC) starts with understanding your current TLS endpoint inventory and posture. This post introduces the PQC Readiness Scanner — an automated tool that inventories your Application Load Balancer (ALB), Network Load Balancer (NLB), and Amazon API Gateway endpoints and continuously monitors their TLS configurations for PQC readiness. The […]  ( 114 min )
  • Open

    Signal Warns It Would Pull Out of Canada if Made to Comply with Lawful Access Bill
    Senior research associate Kate Robertson says Bill C-22 could lead to the rollout of forced metadata collection for messaging apps. The post Signal Warns It Would Pull Out of Canada if Made to Comply with Lawful Access Bill appeared first on The Citizen Lab.
  • Open

    DOGE Cuts Unleashed a Deadly Wave of Violence Across Africa, Study Finds
    The dismantling of the United States Agency for International Development (USAID) is associated with measurable increases in Africa, especially in areas most dependent on the agency’s support.
    Internet of Shit: AI Poop Analysis App Offered to Sell Me Database of Its Users' Poops
    "I hoarded a large database of something valuable, just not what you expect… 150k stools images."
  • Open

    Defense in depth for autonomous AI agents
    As AI agents gain autonomy, defense in depth must evolve, with application-layer design, identity, and human oversight at the center. The post Defense in depth for autonomous AI agents appeared first on Microsoft Security Blog.
    Kazuar: Anatomy of a nation-state botnet
    Kazuar, a sophisticated malware family attributed to the Russian state actor Secret Blizzard, has been under constant development for years and continues to evolve in support of espionage-focused operations. Over time, Kazuar has expanded from a relatively traditional backdoor into a highly modular peer-to-peer (P2P) botnet ecosystem designed to enable persistent, covert access to target environments. The post Kazuar: Anatomy of a nation-state botnet appeared first on Microsoft Security Blog.
    When configuration becomes a vulnerability: Exploitable misconfigurations in AI apps
    Exposed UIs, weak authentication, and risky defaults could turn cloud-native AI apps on Kubernetes into potential targets by threat actors. Learn how exploitable misconfigurations lead to RCE and data leaks. The post When configuration becomes a vulnerability: Exploitable misconfigurations in AI apps appeared first on Microsoft Security Blog.
  • Open

    The Internet Has a Front Door — The Edge Is Now Intelligent
    Recent improvements in the capabilities of the edge network have created a smarter, more connected edge. These changes call for a reassessment of edge strategy.
  • Open

    Otto Support - Logging and Visibility in MCP Servers
    If any of the MCP attack classes in this series happened in your environment today, would you detect it? Most MCP servers log only a tool name and a timestamp. This post walks through what that gap looks like in practice, how EchoLeak exploited it, and what proper audit logging actually requires.
  • Open

    Why Malwarebytes blocks some Yahoo Mail redirects
    Some Yahoo Mail users may see repeated Malwarebytes alerts caused by background connections to suspicious third-party domains. Here’s why.
    Deepfake sextortion forces schools to remove student photos from websites
    Experts are urging schools to take down identifiable photos of students, after AI deepfakes have led to sextortion cases at UK schools.
  • Open

    Pwn2Own Berlin 2026 - Day One Results
    Welcome to Day One of Pwn2Own Berlin 2026! Today, 22 entries took the Pwn2Own stage to target AI Databases, Coding Agents, Local Inferences, and a separate category for NVIDIA products, as the world’s top security researchers push technology to its limits. Exploits, surprises, and breakthrough discoveries are unfolding. After Day One, we awarded $523,000 for 24 unique 0-days! DEVCORE is currently in the lead for Master of Pwn, but a pack of teams are right on their heels. Stay tuned tomorrow for more results and surprises. Follow the action live! We’ll be posting real-time updates and results throughout the competition on our blog and across social media. Stay up to date by following us on Twitter, Mastodon, LinkedIn, and Bluesky, and join the conversation using #Pwn2Own Berlin and #P2OBer…
  • Open

    Abrigo - 711,099 breached accounts
    In April 2026, the fintech software company Abrigo was targeted in a "pay or leak" extortion attempt by the ShinyHunters group. Shortly after, data allegedly taken from the company's Salesforce instance was published publicly and contained over 700k unique email addresses belonging to both Abrigo staff and external contacts. Whilst separate from Abrigo's Salesforce compromise via the Drift application connector the previous year, the data fields described in that incident are consistent with the ShinyHunters data, namely that it was "business contact information" including "institution name, employee name, email addresses, and phone numbers".

  • Open

    Detecting and preventing crypto mining in your AWS environment
    This article guides you on how to use Amazon GuardDuty to identify and mitigate cryptocurrency mining threats in your Amazon Web Services (AWS) environment. You’ll learn about the specialized detection capabilities of GuardDuty and best practices to build a multi-layered defense strategy that protects your infrastructure costs and security posture. Understanding the crypto mining challenge […]  ( 111 min )
    Introducing the updated AWS User Guide to Governance, Risk, and Compliance for Responsible AI Adoption
    The financial services industry (FSI) is using AI to transform how financial institutions serve their customers. AI solutions can help proactively manage portfolios, automatically refinance mortgages when rates decrease, and negotiate insurance premiums for customers. However, this adoption brings new governance, risk, and compliance (GRC) considerations that organizations need to address. To help FSI customers […]  ( 108 min )
    PCI PIN and P2PE compliance packages for AWS Payment Cryptography are now available
    Amazon Web Services (AWS) is pleased to announce the successful completion of Payment Card Industry Personal Identification Number (PCI PIN) and PCI Point-to-Point Encryption (PCI P2PE) assessments for the AWS Payment Cryptography service. This assessment expands the AWS Payment Cryptography compliance portfolio, with AWS now validated as a component provider for Key Management (KMCP) and […]  ( 109 min )
  • Open

    Ron Deibert Speaks at the OSCE: Supplementary Human Dimension Meeting II
    Citizen Lab director Ron Deibert recently spoke at the OSCE Supplementary Human Dimension Meeting II on Safeguarding Civil Space in the Digital Age. The post Ron Deibert Speaks at the OSCE: Supplementary Human Dimension Meeting II appeared first on The Citizen Lab.
  • Open

    At Least We Know the Washington Post Isn't Buying Views
    Jeff Bezos learns being good at YouTube is not so easy.
    War and Data Centers Are Driving Up the Cost of Fiber-Optic Cable
    Spools of cable are critical for internet infrastructure and jam-proof drones but skyrocketing costs are making it hard to field them.
    Podcast: The Chinese Deepfake Software Powering Scams
    We got Haotian AI, the Chinese-language deepfake software powering scams. We also talk about a man finding $1 million of Yu-Gi-Oh cards, and how the AI hard drive shortage is impacting internet archiving.
    Software Developers Say AI Is Rotting Their Brains
    “It's making me dumber for sure.”
  • Open

    Pwn2Own Berlin 2026: The Full Schedule
    Willkommen! (Welcome!) Pwn2Own Berlin 2026 has arrived at OffensiveCon, and the world’s top security researchers are ready. This year’s enterprise-focused competition features AI Databases, Coding Agents, Local Inferences, and a separate category for NVIDIA products. Earlier today, we held the random draw to determine attempt order. Below is the official schedule. All times are Berlin local time (CET) and may change as the competition progresses. Check back for live updates. In case you missed it, you can watch the draw here. Jump to: Day One Day Two Day Three DAY ONE Thursday, May 14 - 1030 chompie of IBM X-Force Offensive Research (XOR) targeting NV Container Toolkit in the NVIDIA category for a total of $50…
  • Open

    Weekly Threat Bulletin – May 13th, 2026
    These are the top threats you should know about this week.
  • Open

    Texas sued Netflix over claims it secretly collected and sold users’ data
    The Texas AG sued Netflix, accusing the company of secretly tracking viewers, selling user data, and using addictive features targeted at minors.
    May 2026 Patch Tuesday: no zero-days but plenty to fix
    May’s Patch Tuesday may not be the giant release many expected, but there are still plenty of important fixes that shouldn’t be ignored.
  • Open

    Otto-Support - Supply Chain Risks in MCP Servers
    What if the MCP server itself is the attacker? Supply chain risk in MCP tools is structural, and the postmark-mcp and ClawHub compromises made it concrete. This post pairs those case studies with otto-support's selfpwn module to show exactly what a hostile MCP server can access the moment it runs.
  • Open

    Canada Life - 237,810 breached accounts
    In April 2026, Canada Life was the victim of a "pay or leak" extortion campaign by the ShinyHunters group. The group subsequently published the data which contained over 200k unique email addresses along with names, phone numbers, physical addresses and, in some cases, customer support tickets. In their disclosure notice, Canada Life advised that "it is a small proportion of our customers who may have been impacted". In the wake of the incident, Canada Life also published an alert cautioning customers to be wary of phishing attacks, a pattern often seen after the public release of breached data.

  • Open

    Accelerating detection engineering using AI-assisted synthetic attack logs generation
    What if you could generate realistic attack telemetry on demand? Explore research methods that translate attacker behaviors (TTPs) into synthetic logs that can trigger detections at scale and without sensitive data. The post Accelerating detection engineering using AI-assisted synthetic attack logs generation appeared first on Microsoft Security Blog.
    Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark
    Today Microsoft is announcing a major step forward in AI-powered cyber defense: a new multi-model agentic scanning harness (codenamed MDASH). The post Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark appeared first on Microsoft Security Blog.
    Defending consumer web properties against modern DDoS attacks
    Read how to protect consumer websites and defend against modern DDoS attacks with layered security, resilient architecture, and graceful service degradation. The post Defending consumer web properties against modern DDoS attacks appeared first on Microsoft Security Blog.
    Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise
    Microsoft Incident Response investigated an attack operated through legitimate and trusted administrative mechanisms to blend seamlessly into routine operations and remain undetected demonstrating that intrusions have increasingly avoided using noisy exploits, obvious malware, or custom tooling, instead leveraging systems that organizations already trust within their environments. The post Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise appeared first on Microsoft Security Blog.
  • Open

    AWS Security Agent full repository code scanning feature now available in preview
    Today, we’re excited to announce the preview release of full repository code review, a new capability in AWS Security Agent that performs deep, context-aware security analysis of your entire code base. AI-driven cybersecurity capabilities are advancing rapidly. AWS Security Agent can now find vulnerabilities and build working exploits across your entire code base at a […]  ( 110 min )
    Enabling AI sovereignty on AWS
    Cloud and AI are transforming industries and societies at unprecedented speed, from accelerating research and enhancing customer experiences to optimizing business processes and enriching public services. At Amazon Web Services (AWS), we believe that for the cloud and AI to reach their full potential, customers need control over their data and choices for how and […]  ( 112 min )
  • Open

    The May 2026 Security Update Review
    I’m currently in Berlin helping set up for Pwn2Own Berlin, but that doesn’t stop Patch Tuesday from coming, and it’s another big one. At least nothing is listed as being in the wild – for now. Take a break from your regularly scheduled activities and let’s take a look at the latest security patches from Adobe and Microsoft. Due to technical difficulties, there will not be a video companion for this month. Adobe Patches for May 2026 For May, Adobe released 10 bulletins addressing 52 unique CVEs in Adobe Commerce, After Effects, Adobe Connect, Illustrator, Media Encoder, Premiere Pro, Substance 3D Painter, Substance 3D Sampler, Content Authenticity SDK, and the Adobe Substance 3D Designer. Here’s this month’s overview table: Bulletin ID Product CVE Count Highest Severity High…
    The Apple macOS Security Update Review
    We’ve received some feedback from those who read the Patch Blog that they would like something similar for macOS updates. Unfortunately, Apple doesn’t schedule these for a particular day, but we can provide our thoughts and analysis on the days they do release their latest patches. For May 2026, Apple released 82 unique CVEs across the three macOS versions: 79 for macOS Tahoe 26.5, 45 for macOS Sequoia 15.7.7, and 42 for macOS Sonoma 14.8.7. Since Apple doesn’t provide CVSS scores or other severity information, we’re left to speculate on which of these bugs is the most severe. However, there are a couple that stand out. -              CVE-2026-28819 (Wi-Fi) stands out as the strongest candidate for the most severe as it states, “An app may be able to execute arbitrary code with kernel pri…
  • Open

    Fake Claude search results lure Mac users into ClickFix attack
    Researchers found a ClickFix campaign that uses fake Claude setup guides to trick Mac users into infecting themselves.
    1 in 8 employees have sold company logins or know someone who has
    Cifas just published research that should bother anyone who runs a business, or buys from one.
    Stolen Canvas data was “returned” after hacker agreement, Instructure says
    Instructure says the stolen Canvas data impacting millions of students and staff was “returned.” That’s not how breaches work.
  • Open

    One Is a Fluke, 3 Is a Pattern: MCP Back-End Vulnerabilities
    No content preview
  • Open

    ICE Agents Have List of 20 Million People on Their iPhones Thanks to Palantir
    The comments made by a senior ICE official at a trade show highlight how Palantir is increasing the speed at which ICE operates. Most people detained by ICE have no criminal conviction.
  • Open

    Introducing Joro: Using AI to Build Security Tooling
    Bishop Fox is releasing Joro, a collaborative web exploitation framework built almost entirely with AI. From intercepting proxy to C2 integration, this post covers how it was built, what it does, and what AI-assisted security tool development actually looks like in practice.
  • Open

    Cushman & Wakefield - 310,431 breached accounts
    In May 2026, the real estate services firm Cushman & Wakefield was the target of a "pay or leak" extortion campaign by the ShinyHunters group. Following the threat, the group publicly published data they alleged had been obtained from the firm, consisting mostly of C&W email addresses along with tens of thousands of external email addresses and corporate contact records. The exposed data was primarily business information, including names, job titles, company addresses and phone numbers.

  • Open

    Complimentary virtual training: Get hands-on with AWS Security Services
    If you’re looking to strengthen your organization’s security posture on Amazon Web Services (AWS) but aren’t sure where to start, then we’re here to help. Security Activation Days are complimentary, virtual, hands-on workshops designed to help you get practical experience with AWS security services in a single session. What to expect Each Security Activation Day […]  ( 107 min )
  • Open

    Yarbo responds to robot flaws that could mow down their owners
    A researcher found a host of vulnerabilities in Yarbo garden robots that could expose Wi-Fi passwords, hijack cameras, and run over their owners on command.
    A week in security (May 4 – May 10)
    A list of topics we covered in the week of May 4 to May 10 of 2026
  • Open

    Advancing Collective Defense with Project Glasswing
    No content preview

  • Open

    📖 [The CloudSecList] Issue 337
    📖 [The CloudSecList] Issue 337 was originally published by Marco Lancini at CloudSecList on May 10, 2026.  ( 5 min )

  • Open

    Active attack: Dirty Frag Linux vulnerability expands post-compromise risk
    Dirty Frag is a newly disclosed Linux local privilege escalation vulnerability affecting kernel networking and memory-fragment handling components including esp4, esp6, and rxrpc. The vulnerability enables reliable escalation from an unprivileged user to root and may be leveraged after initial compromise through SSH access, web shells, containers, or low-privileged accounts. Microsoft Defender is actively monitoring limited in-the-wild activity and provides detection coverage for exploitation attempts. The post Active attack: Dirty Frag Linux vulnerability expands post-compromise risk appeared first on Microsoft Security Blog.
  • Open

    Otto Support - The Confused Deputy
    When an agent reads attacker-controlled content and acts on it using its own privileges, the user's name ends up on every audit log entry. From Microsoft Copilot to ConfusedPilot, this post walks through how confused deputy attacks work and the layered controls that help contain them.
  • Open

    Microsoft says Edge’s plaintext password behavior is “by design”
    A researcher found Edge loads saved passwords into computer memory when it starts, making them easier to steal if a device is already compromised.
    ShinyHunters escalates Canvas attacks with school login defacements
    Days after the first attack, ShinyHunters is applying pressure with ransom messages on school login portals.
  • Open

    CVE-2026-34354: Guardicore Local Privilege Escalation Vulnerability
    Read the technical details of a security vulnerability (CVE-2026-34354) in Akamai Guardicore Platform Agent for Windows — and get clear guidance on mitigation.
  • Open

    Zara - 197,376 breached accounts
    In April 2026, the fashion brand Zara was among a number of organisations targeted by the ShinyHunters extortion group as part of their "pay or leak" campaign. The group claimed the breach was related to a compromise of the Anodot analytics platform and subsequently published a terabyte of data allegedly including 95M support ticket records. The data contained 197k unique email addresses alongside product SKUs, order IDs and the market the support ticket originated in. Zara's parent company Inditex advised that the incident didn't affect passwords or payment information.

  • Open

    ICYMI: April 2026 @AWS Security
    Read all about the latest AWS security features, compliance updates, and hands-on resources in our new, monthly digest posts. You’ll find expert blog posts, new service capabilities, code samples, and workshops. AWS Security Blog posts This month’s AWS Security Blog posts covered AI security, identity and access management, threat intelligence, data protection, and multicloud operations. […]  ( 112 min )
    AWS achieves SNI 27017, SNI 27018, and SNI 9001 certifications for the AWS Asia Pacific (Jakarta) Region
    Amazon Web Services (AWS) achieved three Standar Nasional Indonesia (SNI) certifications for the AWS Asia Pacific (Jakarta) Region: SNI ISO/IEC 27017:2015, SNI ISO/IEC 27018:2019, and SNI ISO 9001:2015. SNI represents Indonesia’s national standards framework, comprising standards that are broadly applicable across industries within the country. These certifications further demonstrate that AWS services meet nationally recognized […]  ( 106 min )
  • Open

    Crypto Prediction Markets Explained: How the Blockchain Is Reshaping Forecasting
    Summary Crypto prediction markets use blockchain technology to create liquid platforms for forecasting and hedging real-world events, driving massive growth… The post Crypto Prediction Markets Explained: How the Blockchain Is Reshaping Forecasting appeared first on Chainalysis.  ( 15 min )
  • Open

    Massive AI investment scam network spans 15,500 domains
    AI investment scammers abused the Keitaro ad-tracking platform to cloak their campaign, exposing it only to likely targets.
    If a fake moustache can fool age checks, is the Online Safety Act working?
    A UK report finds some progress since the Act came into force, but widespread workarounds, ongoing harm, and unresolved privacy concerns suggest the impact is still limited.
  • Open

    Otto Support - SSRF and Token Passthrough with MCP
    SSRF and token passthrough are not new, but MCP servers are reintroducing them at scale. From a chained SSRF-to-RCE in mcp-atlassian to Microsoft's MarkItDown and OpenClaw, this post walks through three recent disclosures and the controls that actually prevent them.
  • Open

    Woflow - 447,593 breached accounts
    In March 2026, the AI-driven merchant data platform Woflow was named as a victim by the ShinyHunters data extortion group. The group subsequently published tens of thousands of files allegedly obtained from the company, comprising more than 2TB of data. The trove included hundreds of thousands of email addresses, names, phone numbers and physical addresses, with the data indicating it related to Woflow customers and, in turn, the customers of merchants using their platform.

  • Open

    The IGVM File Format
    This article presents the structure of the Independent Guest Virtual Machine (IGVM) file format, a binary file designed to define and securely launch the initial state of a virtual machine. It bundles all necessary components such as the BIOS/OVMF, kernel, and initial ramdisk, into a single file. We'll focus on a concrete example to understand the main structure of the file format.
  • Open

    New compliance guide available: ISO/IEC 42001:2023 on AWS
    We have released our latest compliance guide, ISO/IEC 42001:2023 on AWS, which provides practical guidance for organizations designing and operating an Artificial Intelligence Management System (AIMS) using AWS services. As organizations deploy AI and generative AI workloads in the cloud, aligning with globally recognized standards such as ISO/IEC 42001:2023 becomes an important step toward strengthening […]  ( 107 min )
  • Open

    Weekly Threat Bulletin – May 6th, 2026
    These are the top threats you should know about this week.
  • Open

    AI Survey: 50% of Organizations Struggle to Maintain Latency at Scale
    The Akamai State of AI Inference report captures real data from the field that describes how AI inference is being built and scaled in production today.
    Akamai Is the 2026 Gartner® Peer Insights™ Customers’ Choice for API Protection
    Read why Akamai was named the only Customers’ Choice in the 2026 Gartner Peer Insights Voice of the Customer for API Protection.
    Akamai Cloud Is Built for What Cloud Has Become (Updated May 2026)
    No content preview
  • Open

    Google Chrome’s silent 4GB AI download problem [updated]
    Google Chrome writes a 4GB AI model to users’ devices without asking, and reinstalls it if you delete it.
    Attackers adopt JavaScript runtime Bun to spread NWHStealer
    A legitimate developer tool is being repurposed by attackers to package and spread this Windows infostealer in harder-to-detect ways.
  • Open

    Otto Support - Excessive Agency and Tool Privileges
    AI agents connected to too many tools don't just create risk, they've already caused real damage. From deleted databases to mass-wiped mailboxes, excessive agency has a track record. This post breaks down what it looks like in practice and how role-aware tool registration can help contain it.
    CVE-2026-42208: Pre-Authentication SQL Injection in LiteLLM Proxy
    Bishop Fox researchers confirmed a critical pre-authentication SQL injection in LiteLLM proxy affecting versions 1.81.16 through 1.83.6. Attackers can exploit it without credentials, and it blends into normal logs. In-the-wild exploitation was observed within 36 hours of the advisory going public.
  • Open

    Where to Build: A Data-Driven Guide to Blockchain Infrastructure for TradFi Tokenization
    This blog is a preview of our forthcoming report, “The New Rails: How Digital Assets Are Reshaping the Foundations of… The post Where to Build: A Data-Driven Guide to Blockchain Infrastructure for TradFi Tokenization appeared first on Chainalysis.  ( 15 min )
  • Open

    LegionProxy - 10,144 breached accounts
    In April 2026, the commercial residential and ISP proxy network LegionProxy suffered a data breach. The incident exposed 10k email addresses, bcrypt password hashes, names and purchases.

  • Open

    Introducing AI traffic analysis dashboards for AWS WAF
    As AI agents, bots, and programmatic access become an increasingly significant portion of web traffic, organizations need better tools to understand, analyze, and manage this activity. Today, we’re excited to announce AI Traffic Analysis dashboards for AWS WAF protection packs—also known as web access control lists (web ACLs)—providing comprehensive visibility into AI bot and agent […]  ( 110 min )
    Five ways to use Kiro and Amazon Q to strengthen your security posture
    A Monday morning security alert flags unauthorized access attempts, security group misconfigurations, and AWS Identity and Access Management (IAM) policy violations. Your team needs answers fast. Security teams are using Kiro and Amazon Q Developer to handle repetitive tasks—scanning resources, drafting policies, and researching Common Vulnerabilities and Exposures (CVEs)—so engineers can focus on risk decisions […]  ( 122 min )
  • Open

    How Akamai's Zero Trust Framework Meets Critical U.S. Government Mandates
    No content preview
    The Other Side of the MCP Threat Conversation
    No content preview
  • Open

    Vimeo - 119,167 breached accounts
    In April 2026, the ShinyHunters extortion group listed Vimeo on their extortion portal as part of their "pay or leak" campaign. They subsequently published hundreds of gigabytes of data, predominantly consisting of video titles, technical data and metadata. The data also included 119k unique email addresses, sometimes accompanied by names. Vimeo attributed the exposure to a breach of Anodot, a third-party analytics vendor, and advised the incident does not include "Vimeo video content, valid user login credentials, or payment card information".

  • Open

    Paramiko Security Audit
    The OSTIF collaborated with Quarkslab to conduct a security audit of Paramiko, a pure-Python implementation of SSHv2 that provides both client- and server-side functionality. Given the sensitivity and importance of the target, the review focused not only on Paramiko itself but also on its dependencies. The assessment covered its interaction with rust-openssl bindings, the use of secure entropy sources, adherence to constant-time requirements, as well as code quality, testing practices, and the CI/CD pipeline, with the goal of identifying opportunities for further hardening.
  • Open

    Securing open proxies in your AWS environment
    This article shows you how to identify and secure open proxies in your AWS environment to prevent abuse, protect your IP address reputation, and control costs. An open proxy is a server that forwards traffic on behalf of internet users without requiring authentication. While proxies can support legitimate use cases such as load balancing or […]  ( 109 min )
  • Open

    The New Ouroboros Technique and How It Fits in dMSA’s Security Model
    No content preview
    How a Streaming Company Scaled Akamai EdgeWorkers to 3 Trillion Requests
    No content preview
  • Open

    Azure Hacking: New Cloudfoxable Challenges
    Cloudfoxable started as a hands-on AWS security training tool. Now it's expanding. Bishop Fox has launched the first set of Azure challenges, giving security professionals a safe, intentionally misconfigured environment to explore identity-driven attack paths and privilege escalation in Azure.
  • Open

    Reborn Gaming - 126 breached accounts
    In April 2026, the gaming community Reborn Gaming suffered a data breach due to a vulnerability in cPanel and WebHost Manager (WHM). The breach exposed 126 unique email addresses along with IP addresses and Steam IDs. Reborn Gaming self-submitted the data to Have I Been Pwned.

  • Open

    Marcus & Millichap - 1,837,078 breached accounts
    In April 2026, the commercial real estate brokerage firm Marcus & Millichap was named as one of multiple alleged victims of the ShinyHunters hacking and extortion group. Data alleged to have been obtained from the company was subsequently released publicly and included 1.8M unique email addresses, along with names, phone numbers and employment-related information including employer, job title and physical company address. In their disclosure notice, Marcus & Millichap advised that data which may have been accessed appeared limited to "company forms, templates, marketing materials, and general contact information".

  • Open

    📖 [The CloudSecList] Issue 336
    📖 [The CloudSecList] Issue 336 was originally published by Marco Lancini at CloudSecList on May 03, 2026.  ( 4 min )
  • Open

    ZenBusiness - 5,118,184 breached accounts
    In March 2026, the hacker and extortion group "ShinyHunters" claimed to have obtained a substantial corpus of data from ZenBusiness, a business formation and compliance platform. The group claimed the data had been exfiltrated from platforms including Snowflake, Mixpanel and Salesforce, and threatened to publish it if a ransom was not paid. The following month, after claiming payment had not been made, ShinyHunters publicly released the data. The collection amounted to many terabytes across thousands of files that appeared to originate from multiple systems and business functions, including leads, support records and other CRM-related data. The data contained approximately 5M unique email addresses, often accompanied by name and phone number depending on the source file.

  • Open

    Security posture improvement in the AI era
    It’s only been a few weeks since Anthropic announced the Claude Mythos Preview model and launched Project Glasswing with AWS and other leading organizations. This has generated a lot of discussion about the future of cybersecurity and what the ever-increasing capabilities of foundation models mean to organizations. As AWS CISO Amy Herzog pointed out in […]  ( 108 min )
    Announcing the ISO 31000:2018 Risk Management on AWS Compliance Guide
    AWS Security Assurance Services is announcing the release of our latest compliance guide, ISO 31000:2018 Risk Management on AWS, which provides practical guidance for organizations establishing and operating a risk management program in AWS environments using ISO 31000:2018 principles. The guide explains how organizations can integrate AWS services into their risk management processes to support […]  ( 107 min )
  • Open

    Aman - 215,563 breached accounts
    In April 2026, the ultra-luxury hotel brand Aman was named by ShinyHunters as the target of a "pay or leak" extortion campaign, with the data allegedly obtained from their Salesforce CRM. The data was subsequently leaked publicly and contained over 200k unique email addresses. Whilst not present on all records, the data also included genders, physical addresses, phone numbers, nationalities, dates of birth, spouse names and VIP status codes.

  • Open

    Chilling Effects in the Digital Age
    Senior research fellow Jon Penney spoke with Michael Geist on the Law Bytes podcast about his new book. The post Chilling Effects in the Digital Age appeared first on The Citizen Lab.
  • Open

    Beyond the Ledger: Why Akamai Is Redefining How We Measure CLIMATE Impact
    No content preview
  • Open

    Introducing AIMap: Security Testing For AI Agent Infrastructure
    Attackers can already find, connect to, and probe your exposed AI agent infrastructure. AIMap gives defenders that same visibility. Built by Bishop Fox, this open-source tool discovers, scores, and tests exposed AI endpoints so you can understand your real attack surface before someone else does.

  • Open

    Auditing Application Permissions in Microsoft Entra ID: Hidden Risks, Pitfalls, and Quarkslab's QAZPT Tool
    This blog post explores Entra ID applications, the complexities of auditing application permissions in Microsoft Entra ID, highlighting hidden risks and pitfalls. It introduces Quarkslab's QAZPT tool, designed to compute and visualize effective permissions in an Entra ID tenant, providing insights into the full picture of permissions and inheritance paths.
  • Open

    Designing trust and safety into Amazon Bedrock powered applications
    Generative AI brings promising innovation, transforming how individuals and organizations approach everything from customer service to content creation and more. As AI continues to expand its capabilities, organizations are increasingly focused on how they can integrate the responsible AI concepts into the development lifecycle of their AI applications. Research from Accenture and Amazon Web Services […]  ( 109 min )
  • Open

    A New Study Shows How Ad-Based Technology is Used for Surveillance
    Citizen Lab director Ron Deibert recently spoke on All Things Considered about the Lab’s new investigation of Webloc, a geolocation surveillance system. The post A New Study Shows How Ad-Based Technology is Used for Surveillance appeared first on The Citizen Lab.
    Kill Bill C-22: Says Civil Society to Parliament
    A group of 25 rights and privacy organizations and experts delivered an open letter to Parliament calling for the full withdrawal of Bill C-22. The post Kill Bill C-22: Says Civil Society to Parliament appeared first on The Citizen Lab.
  • Open

    Weekly Threat Bulletin – April 29th, 2026
    These are the top threats you should know about this week.

  • Open

    Australia’s Crypto Crossroads: Regulation is Here, Now Comes the Hard Part
    Summary Australian exchanges should not treat April 2027 as the first compliance date. AUSTRAC obligations and readiness expectations are already… The post Australia’s Crypto Crossroads: Regulation is Here, Now Comes the Hard Part appeared first on Chainalysis.  ( 10 min )
  • Open

    What the March 2026 Threat Technique Catalog update means for your AWS environment
    The AWS Customer Incident Response Team (AWS CIRT) regularly encounters patterns that repeat across their engagements when helping customers respond to security incidents. We’re passionate about making sure that information is widely accessible so that everyone can improve their security posture and their organization’s resilience to disruption. The primary method we use to share this […]  ( 109 min )
    Access control with IAM Identity Center session tags
    As organizations expand their Amazon Web Services (AWS) footprint, managing secure, scalable, and cost-efficient access across multiple accounts becomes increasingly important. AWS IAM Identity Center offers a centralized, unified solution for managing workforce access to AWS accounts. It simplifies authentication, enhances security, and provides a seamless user sign-in experience to AWS services across diverse environments. […]  ( 110 min )
  • Open

    The API Weak Spot: Study Shows AI Is Compounding Security Pressures
    Nearly 90% of businesses faced API security incidents last year at an average cost of US$700,000. A new study shows how AI is increasing API risks.

  • Open

    Pitney Bowes - 8,243,989 breached accounts
    In April 2026, the hacking collective ShinyHunters claimed to have obtained data from Pitney Bowes as part of a broader extortion campaign that also named several other organisations. After negotiations allegedly failed, the group publicly released the data which included 8.2M unique email addresses, along with names, phone numbers and physical addresses. A subset of the data also included Pitney Bowes employee records with job titles.
    ADT - 5,488,888 breached accounts
    In April 2026, home security firm ADT confirmed a data breach by ShinyHunters, which listed the company on its website as part of a "pay or leak" extortion attempt. The breach impacted 5.5M unique email addresses along with names, phone numbers and physical addresses. ADT also advised that "in a small percentage of cases, dates of birth and the last four digits of Social Security numbers or Tax IDs were included" and that it had contacted all affected people.
  • Open

    OFAC Updates Central Bank of Iran Designation Following Record $344 Million Tether Seizure amid Strait of Hormuz Toll Controversy
    On April 24, 2026, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) updated its designation of… The post OFAC Updates Central Bank of Iran Designation Following Record $344 Million Tether Seizure amid Strait of Hormuz Toll Controversy appeared first on Chainalysis.  ( 8 min )
  • Open

    Winning the Ransomware Race: The New Segmentation Partner Playbook
    No content preview

  • Open

    Udemy - 1,401,259 breached accounts
    In April 2026, online training company Udemy was the victim of a “pay or leak” extortion attempt perpetrated by the ShinyHunters group. The data was subsequently leaked publicly and contained 1.4M unique email addresses belonging to customers and instructors. The data also included names, physical addresses, phone numbers, employer information and instructor payout methods including PayPal, cheque and bank transfer.

  • Open

    📖 [The CloudSecList] Issue 335
    📖 [The CloudSecList] Issue 335 was originally published by Marco Lancini at CloudSecList on April 26, 2026.  ( 5 min )

  • Open

    U.S. Government Unveils Sweeping Enforcement Actions Against Southeast Asian Scam Centers and Crypto Fraud Networks
    Summary In a massive coordinated interagency effort, the Department of Justice (DOJ), the Department of the Treasury’s Office of Foreign… The post U.S. Government Unveils Sweeping Enforcement Actions Against Southeast Asian Scam Centers and Crypto Fraud Networks appeared first on Chainalysis.  ( 10 min )
    EU’s 20th Russia Sanctions Package Signals a New Era of Crypto-Specific Enforcement
    Summary The EU’s 20th Russia sanctions package introduces a total sectoral ban on Russia-based crypto service providers and decentralized platforms,… The post EU’s 20th Russia Sanctions Package Signals a New Era of Crypto-Specific Enforcement appeared first on Chainalysis.  ( 11 min )
  • Open

    The Industrialization of Exploitation: Why Defensive AI Must Outpace Offensive AI
    Today, vulnerabilities can be discovered, connected, and operationalized at a speed that traditional security processes were never designed to match. Learn more.
  • Open

    Carnival - 7,531,359 breached accounts
    In April 2026, the notorious hacking collective ShinyHunters claimed they had obtained a substantial volume of data belonging to the Carnival cruise operator and attempted to extort the organisation to prevent the data from being leaked. The following week, the group published the data publicly, which contained 8.7M records with 7.5M unique email addresses. The data contained fields indicating it related to the Mariner Society loyalty program run by Holland America, a cruise line brand under Carnival, and included names, dates of birth, genders and data relating to status within the loyalty program. Carnival acknowledged a phishing incident involving a single user account and advised they were working to better understand the scope of the unauthorised activity.

  • Open

    AI threats in the wild: The current state of prompt injections on the web
    Posted by Thomas Brunner, Yu-Han Liu, Moni Pande At Google, our Threat Intelligence teams are dedicated to staying ahead of real-world adversarial activity, proactively monitoring emerging threats before they can impact users. Right now, Indirect Prompt Injection (IPI) is a top priority for the security community, anticipating it as a primary attack vector for adversaries to target and compromise AI agents. But while the danger of IPI is widely discussed, are threat actors actually exploiting this vector today – and if so, how? To answer these questions and to uncover real-world abuse, we initiated a broad sweep of the public web to monitor for known indirect prompt injection patterns. This is what we found.  The threat of indirect prompt injection Unlike a direct injection where a user …
  • Open

    Inside the KelpDAO Bridge Exploit: How ~$292 Million in rsETH Was Released Against a Non-Existent Burn
    Summary On April 18, 2026, attackers linked to North Korea’s Lazarus Group stole ~$292 million (116,500 rsETH) from KelpDAO’s LayerZero… The post Inside the KelpDAO Bridge Exploit: How ~$292 Million in rsETH Was Released Against a Non-Existent Burn appeared first on Chainalysis.  ( 11 min )
    $30 Billion and Counting: How Tokenized RWAs Are Becoming a Mainstream Investment for Institutional Capital
    This blog is a preview of our forthcoming report, “The New Rails: How Digital Assets Are Reshaping the Foundations of… The post $30 Billion and Counting: How Tokenized RWAs Are Becoming a Mainstream Investment for Institutional Capital appeared first on Chainalysis.  ( 11 min )
  • Open

    Edmonton Police Trial AI Facial Recognition Bodycams
    The Edmonton Police Service is trialing new bodycam facial recognition technology to identify what they have deemed “high-risk offenders.” Speaking to the CBC, senior research associate Kate Robertson says, “As someone who has been studying algorithmic policing technologies for nearly a decade, and [previously] a lawyer in Canada’s justice system, I have to say that […] The post Edmonton Police Trial AI Facial Recognition Bodycams appeared first on The Citizen Lab.
  • Open

    CVE-2026-33824: Remote Code Execution in Windows IKEv2
    In this excerpt of a TrendAI Research Services vulnerability report, Richard Chen and Lucas Miller of the TrendAI Research team detail a recently patched double free vulnerability in the Windows Internet Key Exchange (IKE) service. This bug was originally discovered by WARP & MORSE team at Microsoft. Successful exploitation could result in a crash of the IKEEXT service, or potentially arbitrary code execution. The following is a portion of their write-up covering CVE-2026-33824, with a few minimal modifications. A double free vulnerability has been reported in the Windows Internet Key Exchange (IKEv2) service. The vulnerability is due to an error when processing fragments. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets to the target server. …
  • Open

    Observability for Akamai Cloud: Get Started with Akamai Cloud Pulse
    No content preview
    A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202
    No content preview
  • Open

    Otto Support – An MCP, Agentic-AI Security Challenge
    Bishop Fox built a vulnerable MCP-based customer support tool and turned it into a security challenge. Explore how AI agents interact with tools, escalate privileges, and expose sensitive data. If you work with AI systems, this CTF shows exactly how these architectures fail in the real world.

  • Open

    The Hack That Exposed Syria’s Sweeping Security Failures
    Senior researcher Noura Aljizawi spoke to WIRED about a hack that revealed Syria’s fragile cybersecurity. The post The Hack That Exposed Syria’s Sweeping Security Failures appeared first on The Citizen Lab.
  • Open

    Weekly Threat Bulletin – April 22nd, 2026
    These are the top threats you should know about this week.
  • Open

    Understanding the CVE Ecosystem and NIST’s Changing Role
    NIST just announced it's prioritizing CVE enrichment for government systems and deprioritizing everything else. For security teams that rely on NVD data, the gap is real. Here's what changed, why it's been coming for years, and what your team should do to stay ahead of the risk.

  • Open

    CVE-2025-29635: Mirai Campaign Targets D-Link Devices
    No content preview
    Scaling Your Media Workloads: Introducing Akamai’s New 8-Card VPU Plan
    No content preview

  • Open

    The AI Threat Multiplier: Why Architectural Flaws Are the New Frontier
    AI has put an end to the era of evaluating CVEs in isolation. The most critical risks now emerge when legacy state machines meet asynchronous execution.
2026-05-19T03:37:00.285Z osmosfeed 1.15.1