
- INTERPOL Operation Ramz Disrupts MENA Cybercrime Networks with 201 Arrestsby info@thehackernews.com (The Hacker News) (The Hacker News) on May 18, 2026 at 5:21 pm
INTERPOL has coordinated a first-of-its-kind cybercrime crackdown across the Middle East and North Africa (MENA) that led to 201 arrests and the identification of an additional […]
- β‘ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and Moreby info@thehackernews.com (The Hacker News) (The Hacker News) on May 18, 2026 at 1:50 pm
Monday opens with a trust problem. A mail server flaw is under active use. A network control system was targeted. Trusted packages were poisoned. A fake model page pushed a […]
- How to Reduce Phishing Exposure Before It Turns into Business Disruptionby info@thehackernews.com (The Hacker News) (The Hacker News) on May 18, 2026 at 1:00 pm
What happens when a phishing email looks clean enough to pass through security, but dangerous enough to expose the business after one click? That is the gap many SOCs still […]
- Developer Workstations Are Now Part of the Software Supply Chainby info@thehackernews.com (The Hacker News) (The Hacker News) on May 18, 2026 at 11:23 am
Supply chain attackers are not only trying to slip malicious code into trusted software. They are trying to steal the access that makes trusted software possible. Recently, three […]
- Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flawsby info@thehackernews.com (The Hacker News) (The Hacker News) on May 18, 2026 at 10:54 am
Ivanti, Fortinet, n8n, SAP, and VMware have released security fixes for various vulnerabilities that could be exploited by bad actors to bypass authentication and execute […]
- MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systemsby info@thehackernews.com (The Hacker News) (The Hacker News) on May 18, 2026 at 8:57 am
Chaotic Eclipse, the security researcher behind the recently disclosed Windows flaws, YellowKey and GreenPlasma, has released a proof-of-concept (PoC) for a Windows privilege […]
- Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malwareby info@thehackernews.com (The Hacker News) (The Hacker News) on May 18, 2026 at 8:57 am
Cybersecurity researchers have discovered four new npm packages containing information-stealing malware, one of which is a clone of the Shai-Hulud worm open-sourced by TeamPCP. […]
- Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulationsby info@thehackernews.com (The Hacker News) (The Hacker News) on May 18, 2026 at 6:46 am
A new analysis of the Lua-based fast16 malware has confirmed that it was a cyber sabotage tool designed to tamper with nuclear weapons testing simulations. According to […]
- NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCEby info@thehackernews.com (The Hacker News) (The Hacker News) on May 17, 2026 at 11:57 am
A newly disclosed security flaw impacting NGINX Plus and NGINX Open has come under active exploitation in the wild, days after its public disclosure, according to VulnCheck. The […]
- Grafana GitHub Token Breach Led to Codebase Download and Extortion Attemptby info@thehackernews.com (The Hacker News) (The Hacker News) on May 17, 2026 at 7:13 am
Grafana has disclosed that an “unauthorized party” obtained a token that granted them the ability to access the company’s GitHub environment and download its codebase. “Our […]
- Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimmingby info@thehackernews.com (The Hacker News) (The Hacker News) on May 16, 2026 at 3:20 pm
A critical security vulnerability impacting the Funnel Builder plugin for WordPress has come under active exploitation in the wild to inject malicious JavaScript code into […]
- Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Accessby info@thehackernews.com (The Hacker News) (The Hacker News) on May 15, 2026 at 5:10 pm
The Russian state-sponsored hacking group known as Turla has transformed its custom backdoor Kazuar into a modular peer-to-peer (P2P) botnet that’s engineered for […]
- Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistenceby info@thehackernews.com (The Hacker News) (The Hacker News) on May 15, 2026 at 1:35 pm
Cybersecurity researchers have disclosed a set of four security flaws in OpenClaw that could be chained to achieve data theft, privilege escalation, and persistence. The […]
- What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surfaceby info@thehackernews.com (The Hacker News) (The Hacker News) on May 15, 2026 at 11:00 am
In Your Biggest Security Risk Isn’t Malware β It’s What You Already Trust, we made a simple argument: the most dangerous activity inside most organizations no longer looks like […]
- TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updatesby info@thehackernews.com (The Hacker News) (The Hacker News) on May 15, 2026 at 10:54 am
OpenAI has disclosed that two of its employee devices in its corporate environment were impacted via the Mini Shai-Hulud supply chain attack on TanStack, but noted that no user […]
- On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Emailby info@thehackernews.com (The Hacker News) (The Hacker News) on May 15, 2026 at 6:19 am
Microsoft has disclosed a new security vulnerability impacting on-premise versions of Exchange Server that it said has come under active exploitation in the wild. The […]
- CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploitsby info@thehackernews.com (The Hacker News) (The Hacker News) on May 15, 2026 at 5:28 am
The U.S.Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a newly disclosed vulnerability impacting Cisco Catalyst SD-WAN Controller to its Known Exploited […]
- Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Accessby info@thehackernews.com (The Hacker News) (The Hacker News) on May 14, 2026 at 5:45 pm
Cisco has released updates to address a maximum-severity authentication bypass flaw in Catalyst SD-WAN Controller that it said has been exploited in limited attacks. The […]
- Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secretsby info@thehackernews.com (The Hacker News) (The Hacker News) on May 14, 2026 at 5:22 pm
Cybersecurity researchers are sounding the alarm about what has been described as “malicious activity” in newly published versions of node-ipc. According to Socket and […]
- ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Storiesby info@thehackernews.com (The Hacker News) (The Hacker News) on May 14, 2026 at 4:07 pm
Everything is still on fire. This week feels dumb in the worst way β bad links, weak checks, fake help desks, shady forum posts, and people turning supply chain attacks into […]
- Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strikeby info@thehackernews.com (The Hacker News) (The Hacker News) on May 14, 2026 at 2:00 pm
The Belarus-aligned threat group known as Ghostwriter has been attributed to a fresh set of attacks targeting governmental organizations in Ukraine. Active since at least 2016, […]
- PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosureby info@thehackernews.com (The Hacker News) (The Hacker News) on May 14, 2026 at 11:40 am
Threat actors have been observed attempting to exploit a recently disclosed security vulnerability in PraisonAI, an open-source multi-agent orchestration framework, within four […]
- How AI Hallucinations Are Creating Real Security Risksby info@thehackernews.com (The Hacker News) (The Hacker News) on May 14, 2026 at 11:30 am
AI hallucinations are introducing serious security risks into critical infrastructure decision-making by exploiting human trust through highly confident yet incorrect outputs. […]
- Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalationby info@thehackernews.com (The Hacker News) (The Hacker News) on May 14, 2026 at 9:25 am
An anonymous cybersecurity researcher who disclosed three Microsoft Defender vulnerabilities has returned with two more zero-days involving a BitLocker bypass and a privilege […]
- New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruptionby info@thehackernews.com (The Hacker News) (The Hacker News) on May 14, 2026 at 7:06 am
Details have emerged about a new variant of the recent Dirty Frag Linux local privilege escalation (LPE) vulnerability that allows local attackers to gain root access, making it […]
