<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0"><id>tag:blogger.com,1999:blog-4802841478634147276</id><updated>2026-05-22T14:20:18.392+05:30</updated><title type="text">The Hacker News</title><subtitle type="html">The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and hackers</subtitle><link href="https://thehackernews.com/feeds/posts/default" rel="http://schemas.google.com/g/2005#feed" type="application/atom+xml"/><link href="https://thehackernews.com/feeds/posts/default?redirect=false" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/" rel="alternate" type="text/html"/><link href="http://pubsubhubbub.appspot.com/" rel="hub"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default?start-index=26&amp;max-results=25&amp;redirect=false" rel="next" type="application/atom+xml"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><generator uri="http://www.blogger.com" version="7.00">Blogger</generator><openSearch:totalResults>16418</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-5123861868689911749</id><published>2026-05-22T14:20:18.391+05:30</published><updated>2026-05-22T14:20:18.392+05:30</updated><title type="text">Kimwolf DDoS Botnet Operator Arrested in Canada Over DDoS-for-Hire Attacks</title><summary type="html">
The U.S. Department of Justice (DoJ) on Thursday announced the arrest of a Canadian man in connection with allegedly operating a distributed denial-of-service (DDoS) botnet known as Kimwolf.

In tandem, Jacob Butler (aka Dort), 23, Ottawa, Canada, has been charged with offenses related to the development and operation of the botnet. Kimwolf is assessed to be a variant of AISURU.

"Kimwolf </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/5123861868689911749" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/5123861868689911749" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/kimwolf-ddos-botnet-operator-arrested.html" rel="alternate" title="Kimwolf DDoS Botnet Operator Arrested in Canada Over DDoS-for-Hire Attacks" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5VYMnsK-UMv3L8TZp1KhZ4PQti0VtUXkbDREtK-R9Hbtj6bdYrPRwwn8VItL49asZcHEMSOFJyfV25Da96CerBXrPRnHZHncrTuo7Mj7dxEkNGNR4jZZs19Y2pep2dl7KZ0IK1CkexVOQhr14e5MIP5oe5vglQ2StuxG6xv2ataqy8jvD9T1fXLToZHc5/s260-e100/ddos-canada.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-7639085923648119461</id><published>2026-05-22T11:17:33.647+05:30</published><updated>2026-05-22T14:00:13.546+05:30</updated><title type="text">CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV</title><summary type="html">
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Langflow and Trend Micro Apex One to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

The vulnerabilities in question are listed below -


  CVE-2025-34291 (CVSS score: 9.4) - An origin validation error vulnerability in Langflow that could </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/7639085923648119461" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/7639085923648119461" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/cisa-adds-exploited-langflow-and-trend.html" rel="alternate" title="CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi04a_rowIzNPvHHvDTUE34d3bZlOhBeQXtC0UdXyjlf988G4zVE89QKWqSWASKd2LD0T8O2XhkDVgG7UGFIxlpvQWHPx-o_X7vfMK5fH4uSDg3eSUDAaWKtgresEyD9JpINkxtdELWn-qiv6usoLgwSlYNi89xJeVBwYYsCF2y-KKNz0x04KS0PeDPL57J/s260-e100/cisa-kev-flaws.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-741094857437214958</id><published>2026-05-22T11:06:18.309+05:30</published><updated>2026-05-22T11:08:34.019+05:30</updated><title type="text">Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access</title><summary type="html">

Cisco has rolled out updates for a maximum-severity security flaw impacting Secure Workload that could allow an unauthenticated, remote attacker to access sensitive data.

Tracked as CVE-2026-20223 (CVSS score: 10.0), the vulnerability arises from insufficient validation and authentication when accessing REST API endpoints.

"An attacker could exploit this vulnerability if they are able to send</summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/741094857437214958" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/741094857437214958" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/cisco-patches-cvss-100-secure-workload.html" rel="alternate" title="Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLweJvl8B70zomibdr4U6WvYgbmZn4gKKOG9F7xDPXzgeENKK0kg2kgK1yvZDS7AJFkY9De2rG2EQzCLvN1FmjrXXDIm-CkmU88QcexbMkr60gKVKexF-d1qtGHusrr6_j5yrtMv31PSUEygioHJikBsifQ0VHW18IU7lu_oItTzQXugwHPLoO_DYNdnYx/s260-e100/cisco-workload.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-4018152168578087720</id><published>2026-05-21T19:47:09.492+05:30</published><updated>2026-05-21T22:05:26.767+05:30</updated><title type="text">Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor</title><summary type="html">
Cybersecurity researchers have disclosed details of a new Linux malware dubbed Showboat that has been put to use in a campaign targeting a telecommunications provider in the Middle East since at least mid-2022.

"Showboat is a modular post-exploitation framework designed for Linux systems, capable of spawning a remote shell, transferring files, and functioning as a SOCKS5 proxy," Lumen </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4018152168578087720" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4018152168578087720" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/showboat-linux-malware-hits-middle-east.html" rel="alternate" title="Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYTZEcd3s0q7NssZnOYvAFrMtE1fTJQtdNoUDwBZKG1DkQWYL4uY6gExiUwuNcMnZG-J8dM8iTJIm6nD2Bv80qI2xMubYmnGScqUNQfeI6kF49vFkU0wKpi7iaVvbl1MX1zPleKP2iOShCd9u4S-EpLA-cBKf5lNlW7OXLu0NmiUlw35Qr0GzXmpylPcXz/s260-e100/telecom-linux.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-4487468289300411007</id><published>2026-05-21T17:22:14.520+05:30</published><updated>2026-05-22T10:59:52.155+05:30</updated><title type="text">ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories</title><summary type="html">

This week starts small.

A token leaks. A bad package slips in. A login trick works. An old tool shows up again. At first, it feels like the usual mess. Then you see the pattern: attackers are not always breaking in. They are using the parts we already trust.

That is what makes it worrying. The danger is in normal things now - updates, apps, cloud buttons, support chats, trusted accounts. AI </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4487468289300411007" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4487468289300411007" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/threatsday-bulletin-linux-rootkits.html" rel="alternate" title="ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifIiAs3r9mSWAyNYngQby6QllKy0gx1dGJB4MNtgMjRQLUIkp7-fr851xuTEe6-izLAtNHux1PgdVBiWmEQctN2QM1bzV_CP0bcR7_ReqHg-lXrDa-EqUsZAUgC8da72h6tdbZU6H8nWMzAfZEItMY49Big4dpxtSHr5r7sgm7W01mhA31E274dUfWBHMi/s260-e100/tday.png" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-6805036243609108000</id><published>2026-05-21T16:25:57.091+05:30</published><updated>2026-05-22T13:59:49.049+05:30</updated><title type="text">Microsoft Warns of Two Actively Exploited Defender Vulnerabilities</title><summary type="html">
Microsoft has disclosed that a privilege escalation and a denial-of-service flaw in Defender has come under active exploitation in the wild.

The former, tracked as CVE-2026-41091, is rated 7.8 on the CVSS scoring system. Successful exploitation of the flaw could allow an attacker to gain SYSTEM privileges.

"Improper link resolution before file access ('link following') in Microsoft Defender </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6805036243609108000" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6805036243609108000" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/microsoft-warns-of-two-actively.html" rel="alternate" title="Microsoft Warns of Two Actively Exploited Defender Vulnerabilities" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNxp-fCwFOYcXoyRTmhjpwfvFCjfE36YoU8z-7es2XrOajnfSfpttiB9KMfwqCNbwzHQ85kILhlUwo4DeQFWXFq29J8p_oVAIe-gKCCegmTid4YW_22sK6CQO_TwELXa7Z-RZmvDvHx7N3Vg7y-xm78iSGjzCg2AU3FnHo1Hp7v80JJkBruCc05JVvVwnx/s260-e100/windows-defender.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-1323807892386575097</id><published>2026-05-21T16:00:00.000+05:30</published><updated>2026-05-21T16:00:00.114+05:30</updated><title type="text">When Identity is the Attack Path</title><summary type="html">
Consider a cached access key on a single Windows machine. It got there the way most cached credentials do - a user logged in, and the key stored itself automatically. Standard AWS behavior. No one misconfigured anything or violated a policy. Yet that single key, which was easily accessible to a minor-league attacker, could have opened a path to some 98% of entities in the company's cloud </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/1323807892386575097" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/1323807892386575097" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/when-identity-is-attack-path.html" rel="alternate" title="When Identity is the Attack Path" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv9W2lSuCdHjvqeLUN5WtqUOgCwe2FAyP1Y_z4oUr1LgM1MdOE5A83gkzSOfGjIosfdlfB4SuLbeVbydeuParENW4MH2aWYuWqnB-DeOd7gC3RJnp7wFucmuinh9kiMBI99337kQYcBrlIX-WH3u204eu7FTy5b_gpkXC6ZHupWD3P60yFk4-2DUrTuuc/s260-e100/xmxm.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-6015047848817303747</id><published>2026-05-21T13:05:53.804+05:30</published><updated>2026-05-21T13:21:09.476+05:30</updated><title type="text">9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros</title><summary type="html">
Cybersecurity researchers have disclosed details of a vulnerability in the Linux kernel that remained undetected for nine years.

The vulnerability, tracked as CVE-2026-46333 (CVSS score: 5.5), is a case of improper privilege management that could permit an unprivileged local user to disclose sensitive files and execute arbitrary commands as root on default installations of several major </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6015047848817303747" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6015047848817303747" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/9-year-old-linux-kernel-flaw-enables.html" rel="alternate" title="9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCjgJwva2lZrAwxHWPZFiphHAhxBdWRyU4gUiAZIStkUP4JU6yej3Z1xVhUtrhaIYVu4IL5KpvOomBDHU_aLtvgHV-R9_41nUSrngG0BGBlCv2pByfkVZNKxmwA3Nf6NR7pi6XgwdUjkwFw27lm_vNR_w2Cr1An46yOM8kfIEphrSCq2aRcaKNNj9D-PiN/s260-e100/linux-exploit.gif" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-5826543343082842994</id><published>2026-05-21T09:57:01.180+05:30</published><updated>2026-05-21T11:26:01.698+05:30</updated><title type="text">GitHub Internal Repositories Breached via Malicious Nx Console VS Code Extension</title><summary type="html">
GitHub on Wednesday officially confirmed that the breach of its internal repositories was the result of a compromise of an employee device involving a poisoned version of the Nx Console Microsoft Visual Studio Code (VS Code) extension.&amp;nbsp;

The development comes as the Nx team revealed that the extension, nrwl.angular-console, was breached after one of its developers' systems was hacked in the</summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/5826543343082842994" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/5826543343082842994" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/github-internal-repositories-breached.html" rel="alternate" title="GitHub Internal Repositories Breached via Malicious Nx Console VS Code Extension" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ64wgVqZTQx208NgY0sBvUUQcR5mb-G4ENkfw4PEX9KlJJxEI_uUKQvPG0rReXB4chZ3wXrvNSR1QsrK525DDHkzY9X3nQYduh36qKTyC-k4EfixFeOU7YR1mRIw8ZJL-oYN8k_wwBid2GU8NYJtCqEFLOSzomuu-Xx7yA3Djim0nq79RyoZJs6HGga_H/s260-e100/github-hacked.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-3499693813752194586</id><published>2026-05-21T09:14:11.287+05:30</published><updated>2026-05-22T11:00:46.584+05:30</updated><title type="text">Highly Critical Drupal Core Flaw Exposes PostgreSQL Sites to RCE Attacks</title><summary type="html">
Drupal has released security updates for a "highly critical" security vulnerability in Drupal Core that could be exploited by attackers to achieve remote code execution, privilege escalation, or information disclosure.
The vulnerability, now tracked as CVE-2026-9082, carries a CVSS score of 6.5 out of 10.0, per CVE.org. Drupal said the vulnerability resides in a database abstraction API that is </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/3499693813752194586" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/3499693813752194586" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/highly-critical-drupal-core-flaw.html" rel="alternate" title="Highly Critical Drupal Core Flaw Exposes PostgreSQL Sites to RCE Attacks" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyhKX1WKEWbBPd4sElCP9BB26eorxZX1Lo25Mcu-A5bfBUuWT63SQ-Hyycv1YPSlvVeZPfLSEbb8mQnuPvf0KEDm8mYTtCLoYZuMG6A8maidLefE12_3Plum0keZ-mbAS4dGN-x7Oj0NWOmoeqp6_PEK0fqpnZwz8ZFV-NhyFl78WS4Nck76yAbfgWRpK7/s260-e100/drupal-flaw.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-8814639759795125120</id><published>2026-05-20T22:36:54.856+05:30</published><updated>2026-05-21T10:09:18.930+05:30</updated><title type="text">Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development</title><summary type="html">
Microsoft has unveiled two new open-source tools called RAMPART and Clarity to assist developers in better testing the security of artificial intelligence (AI) agents.

RAMPART, short for Risk Assessment and Measurement Platform for Agentic Red Teaming, functions as a Pytest-native safety and security testing framework for writing and running safety and security tests for AI agents, covering </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/8814639759795125120" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/8814639759795125120" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/microsoft-open-sources-rampart-and.html" rel="alternate" title="Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheh8SBZDUM83ug6w9EopUahk6CPc27TOD5qpmZWVC8hDMYM-8wdgTLXt1KHv_66Q061_5gm3crZszZf-UvSWWZKb6Aax7BxJ5gzPEyfQTp9JPEcNUmLZnEBD3YuFHoqCU4stvSdSVON7hFJq4ZYb4Rdq1vyOK0VUURDjUpCcEP9_SN5xkQckqwaFS_-dQz/s260-e100/mss.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-4384456451548190916</id><published>2026-05-20T20:06:44.537+05:30</published><updated>2026-05-20T20:06:44.538+05:30</updated><title type="text">Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks</title><summary type="html">


Microsoft on Tuesday said it disrupted a malware-signing-as-a-service (MSaaS) operation that weaponized the company's Artifact Signing system to deliver malicious code and conduct ransomware and other attacks, compromising thousands of machines and networks across the world.

The tech giant attributed the activity to a threat actor it calls Fox Tempest, which it said offered the MSaaS scheme </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4384456451548190916" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4384456451548190916" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/microsoft-takes-down-malware-signing.html" rel="alternate" title="Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiypJnCUStqk0SRgnT6bFPLXM9F10uUBgEZgGScKH8lNthkNnD4zP2-CBNIvo2eukKJzGKOs7RFjIq1KmR-pIGFT3pFS1wgz8ySDW7O9OaMkAHXSaZvHSP_Y2JxqGgkdbCLXcn-VZOYwirKa9gU7FqEZXDafHhgxupVx6cuJam1wsnjq3qjz7q36GlvirT/s260-e100/windows-ransomware.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-5129427820924447015</id><published>2026-05-20T18:21:43.904+05:30</published><updated>2026-05-21T16:11:39.188+05:30</updated><title type="text">Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API</title><summary type="html">
Cybersecurity researchers have flagged fresh activity from a China-aligned threat actor known as Webworm in 2025, deploying custom backdoors that employ Discord and Microsoft Graph API for command-and-control (C2 or C&amp;amp;C) communications.

Webworm, first publicly documented by Broadcom-owned Symantec in September 2022, is assessed to be active since at least 2022, targeting government agencies</summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/5129427820924447015" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/5129427820924447015" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/webworm-deploys-echocreep-and-graphworm.html" rel="alternate" title="Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt4cD52DtnzH5FM8ZMrW9KyPrD1ysrJURSmqalrw9f6siP8XxYqClsqV6ofHpM8ir7gBnmmvehj5HB1k0aSHdPmLtKKwtLLvjSi4ELa9eMq12maW7p56a2yBdl7xzdfv6893fvQxLIH0kKGYKnzYM_7-3XysWIGsSNiEYXBjmiWFqe0Pe8uq-TkWlQjjv4/s260-e100/cyberattack-paki.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-7044036917603631904</id><published>2026-05-20T17:28:00.000+05:30</published><updated>2026-05-20T17:32:45.429+05:30</updated><title type="text">Agent AI is Coming. Are You Ready?</title><summary type="html">

New Industry Data Just Released Suggests Not.

On May 19th, 2026, Orchid Security released the results of our Identity Gap: Snapshot 2026. Among the findings, "identity dark matter" (the unseen, unmanaged elements of identity) now overshadows the visible elements 57% vs. 43%. And it couldn't have occurred at a worse time, with enterprises embracing Agent AI with both arms (and unfortunately, as</summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/7044036917603631904" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/7044036917603631904" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/agent-ai-is-coming-are-you-ready.html" rel="alternate" title="Agent AI is Coming. Are You Ready?" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjYQaF0euKIc86WLed9RLojSVHUNrnpx7_OeZHvmaPtnFPmL3WrhC-DU-7asOtrYx8fBGP-UCdxI1QljVgaT_wYA6uIye4yHpzpk-uSQb934K7NDSPn-jFJR63cEeUZ8SsDevlcvX-O62_-C8HZeVreeg2aB5stt6z9kluLUvIUgXAGVpAMccDc19lrsmK/s260-e100/agentai.gif" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-1654279987672404683</id><published>2026-05-20T17:08:43.932+05:30</published><updated>2026-05-20T21:40:25.704+05:30</updated><title type="text">GitHub Breached — Employee Device Hack Led to Exfiltration of 3,800+ Internal Repos</title><summary type="html">
GitHub on Tuesday said it's investigating unauthorized access to its internal repositories after the notorious threat actor known as TeamPCP listed the platform's source code and internal organizations for sale on a cybercrime forum.

"While we currently have no evidence of impact to customer information stored outside of GitHub's internal repositories (such as our customers' enterprises, </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/1654279987672404683" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/1654279987672404683" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/github-investigating-teampcp-claimed.html" rel="alternate" title="GitHub Breached — Employee Device Hack Led to Exfiltration of 3,800+ Internal Repos" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoDiyeJZY33dxAsa8qElLYXNILLDT4NhloINZiuzcx3La2JvDK_d54kM8qsx_obt8vQ3FpTJr2ZVoMYiEcqHN0sbt-1A_MHlS7mSavlbDiEDg42HN1d4wCffs7ytuZhDvmMjuej5oljVIqIuRezyZCLmafRclN3wNBKcboV-19F0VMMBkVsQZckV5UaiiH/s260-e100/github.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-1891892962577771224</id><published>2026-05-20T16:00:00.000+05:30</published><updated>2026-05-20T16:00:00.107+05:30</updated><title type="text">Typosquatting Is No Longer a User Problem. It's a Supply Chain Problem</title><summary type="html">

AI-generated lookalike domains are now embedded inside the third-party scripts running on your web properties. Here's why your current stack can't see them, and what detection actually requires.
Download the CISO Expert Guide to Typosquatting in the AI Era →


TL;DR&amp;nbsp;


  Typosquatting is no longer a user problem. Attackers now embed lookalike domains inside legitimate third-party scripts. </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/1891892962577771224" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/1891892962577771224" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/typosquatting-is-no-longer-user-problem.html" rel="alternate" title="Typosquatting Is No Longer a User Problem. It's a Supply Chain Problem" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLWPxY_gRwc5keQNREyoTXSadlwpCLyUdAq4v1fQA5_lA2tJ0Ia6xOk-FaLuNHwJjV_xaF7M0xzPvqHk4e7aym6R7J2aaGCGm7Bnv8OXh7GScZ-G7ic5pdEgK-0E0_y_yLz16V2A2GL5uTmU7tRPUyoDl5LfzTzQnuMlI1QV7SEhRC9Cli7zci_no9pyk/s260-e100/ref.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-2475570232070529325</id><published>2026-05-20T13:58:26.969+05:30</published><updated>2026-05-20T18:07:34.567+05:30</updated><title type="text">Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit</title><summary type="html">
Microsoft on Tuesday released a mitigation for a BitLocker bypass vulnerability named YellowKey following its public disclosure last week.

The zero-day flaw, now tracked as CVE-2026-45585, carries a CVSS score of 6.8. It has been described as a BitLocker security feature bypass.

"Microsoft is aware of a security feature bypass vulnerability in Windows publicly referred to as 'YellowKey,'" the </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/2475570232070529325" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/2475570232070529325" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/microsoft-releases-mitigation-for.html" rel="alternate" title="Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8DmW5nAG63-9iR2RmnP7i3GVJ9EBtLznscnnjROZ-DWRALYo0zsPNjUm2J6khkqSDJiX5Gmwb8sxPh4jHRcsJWFhKSdxZzz4D2f5bOahbfcnmQrUdvhyphenhyphenNVrE-LFMUhhf6rvSyxG2CoVhEFxbZSpEc0y52PM-qxwn02cDP3K3hEzf1nqcRNZEG1wOTjAiQ/s260-e100/bitlocker-exploit.png" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-6267203836821006714</id><published>2026-05-20T10:42:06.035+05:30</published><updated>2026-05-20T10:43:01.113+05:30</updated><title type="text">Grafana GitHub Breach Exposes Source Code via TanStack npm Attack</title><summary type="html">
Grafana Labs, on May 19, 2026, said an investigation into its recent breach found no evidence of customer production systems or operations being compromised.

It said the scope of the incident is limited to the Grafana Labs GitHub environment, which includes public and private source code along with internal GitHub repositories.

"After the initial assessment, we found that in addition to source</summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6267203836821006714" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6267203836821006714" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/grafana-github-breach-exposes-source.html" rel="alternate" title="Grafana GitHub Breach Exposes Source Code via TanStack npm Attack" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1N3gjAFZQ-1hptUuKwQmHMjlZwIMDn6H6mKc9UuDELAKWl_3Kow6EcD72IkWpBf8ZB2Db8wrZW86zVxKaEgQZ7_sVrWoDokD1LoLPUqhhCw2lLDl9ODqq2ZkfBrK6SUTrbROBuFNXN16HPtMWtS9EMIFsO3yQsISWCK0JrlwiUWineb9sxIq-un41smHG/s260-e100/grafana-breach.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-2839794315829641803</id><published>2026-05-19T22:08:12.340+05:30</published><updated>2026-05-19T22:08:12.341+05:30</updated><title type="text">Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps</title><summary type="html">
Cybersecurity researchers have disclosed details of a new ad fraud and malvertising operation dubbed Trapdoor targeting Android device users.

The activity, per HUMAN's Satori Threat Intelligence and Research Team, encompassed 455 malicious Android apps and 183 threat actor-owned command-and-control (C2) domains, turning the infrastructure into a pipeline for multi-stage fraud.

"Users </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/2839794315829641803" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/2839794315829641803" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/trapdoor-android-ad-fraud-scheme-hit.html" rel="alternate" title="Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4-ldAXS8Yw3BhdSS9xeJFNzwDm-mrNDxHr28zcknAKH8knTU_WleHEhmJ-vgNokgVbm9y8vRH18v9Oxz6F7twmnBoJfIQ2fVeuhEErRAF31F9MES02sZMhYG-i7F9Ty-C-yD64U4cmgq3CD7nuEnD9OZpxWCTKAPCXfIDKycUeZEfJIBBagPPW72JgWZO/s260-e100/android-ad-fraud.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-4494841495613125218</id><published>2026-05-19T20:26:26.492+05:30</published><updated>2026-05-20T09:40:17.300+05:30</updated><title type="text">DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability</title><summary type="html">
Proof-of-concept (PoC) exploit code has now been released for a recently patched security flaw in the Linux kernel that could allow for local privilege escalation (LPE).
Dubbed DirtyDecrypt (aka DirtyCBC), the vulnerability was discovered and reported by the Zellic and V12 security team on May 9, 2026, only to be informed by the maintainers that it was a duplicate of a vulnerability that had </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4494841495613125218" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4494841495613125218" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/dirtydecrypt-poc-released-for-linux.html" rel="alternate" title="DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgecVdZ_vIxfMWdiQkn7dC_SCueSRLBHaU01aHrtW1lUsx3_5gwbM6fG5NyV-VUhnDxvolk_tzMNWgINg06cwjKL1xIeDIFMiFH56IUO_zwZwJqiLnMp-VJcIWFjhulk1AHnlZ_ETgH3vg6Q6SHS4Ae-teRmaLDY4XZhONjoz4MeKvQLyzJ_YdckL8lk3fe/s260-e100/linux-poc.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-3715825082895875652</id><published>2026-05-19T17:00:00.000+05:30</published><updated>2026-05-19T17:00:00.130+05:30</updated><title type="text">The New Phishing Click: How OAuth Consent Bypasses MFA</title><summary type="html">
In February 2026, a phishing-as-a-service (PhaaS) platform called EvilTokens went live. Within five weeks, it had compromised more than 340 Microsoft 365 organizations across five countries.&amp;nbsp;

The targets of the platform received a message asking them to enter a short code at microsoft.com/devicelogin and complete their normal MFA challenge, then walked away believing they had verified a </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/3715825082895875652" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/3715825082895875652" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/the-new-phishing-click-how-oauth.html" rel="alternate" title="The New Phishing Click: How OAuth Consent Bypasses MFA" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLnnvBvl0Gs5pfpUcrlJ_Ni62CyGs5UpoGCmpUAjReyBpExj5FzhuxSwuUcfQiyxDqeeoy6jSAHq4tA2KUnO5CRfbpfd_jN1ndeXgC0MiG0TrAfAyW67eybZeHMY-t6_kICQdPPKqK-1n9Ngkrj7UJrZZa1KQWqN9WjaTaDuHA_t6RW9Stul6tb82OS_4/s260-e100/reco1.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-9067296067929898194</id><published>2026-05-19T16:14:45.020+05:30</published><updated>2026-05-20T20:10:58.531+05:30</updated><title type="text">Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare</title><summary type="html">
Drupal has issued an alert stating that it intends to release a "core security release" for all supported branches on May 20, 2026, from 5-9 p.m. UTC.

"The Drupal Security Team urges you to reserve time for core updates at that time because exploits might be developed within hours or days," the maintainers of the PHP-based content management system (CMS) said.

"Not all configurations are </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/9067296067929898194" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/9067296067929898194" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/drupal-to-release-urgent-core-security.html" rel="alternate" title="Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdm6ntsTvJJXoF1Bvx2Qm11faosxt-w7g0VzPCnsORnDN-q79t1wnbzqTFxbkRw5DF1DjhdDUgZ1H_0O4h35tZcEvlsM7dEUkbPyvaQdkEhhyGhpF90Bug4O1aai-0dXi1DdnnOpH2SmC8GoQD0TAd742-StQ4Pva_IVXNUcRpy9V96B7dwBnOc41xScyj/s260-e100/drupal-update.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-6227042359223251877</id><published>2026-05-19T14:53:15.145+05:30</published><updated>2026-05-19T14:53:15.145+05:30</updated><title type="text">SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access</title><summary type="html">
Critical security vulnerabilities have been disclosed in SEPPMail Secure E-Mail Gateway, an enterprise-grade email security solution, that could be exploited to achieve remote code execution and enable an attacker to read arbitrary mails from the virtual appliance.
"These vulnerabilities could have been exploited to read all mail traffic or as an entry vector into the internal network," </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6227042359223251877" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6227042359223251877" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/seppmail-secure-e-mail-gateway.html" rel="alternate" title="SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiortK4EUp9FwJsfVYW-j20LfpbM5qMNelk5-T8BbZ7dEcmBLXnqhWW9loE8GD6aexZv3h-xHEgn_N7ECjV8KXdcGwNxsbhCPP07COzt9c8BhMaVTF4OaSnKD2b98mJjsU1d57OXj2FQtOhKyeo6oPcT0-rrOi-_dKf1iielQQnhsprZ43tHyYFbiYhgFK8/s260-e100/email-hacking.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-6762225883947791762</id><published>2026-05-19T13:19:23.209+05:30</published><updated>2026-05-21T11:25:11.181+05:30</updated><title type="text">Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer</title><summary type="html">
Cybersecurity researchers have flagged a compromised version of the Nx Console extension that was published to the Microsoft Visual Studio Code (VS Code) Marketplace.

The extension in question is rwl.angular-console (version 18.95.0), a popular user interface and plugin for code editors like VS Code, Cursor, and JetBrains. The VS Code extension has more than 2.2 million installations. The Open </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6762225883947791762" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6762225883947791762" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/compromised-nx-console-18950-targeted.html" rel="alternate" title="Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi61imbY3-QbM_mT_6WAxBXaFeZ3eXwprN147ox_bMvVqh9NrS69IwqwwL4qu2z1eRA8NfrWwyJi9bIDuREGEVZ-LdBMCGTSxdul92ZApPGrzwqOcr3b6YBKC19N97sk75izvamQxOqBzokKhF-__uaEuw74ZbKQLxKxMQWgRXSCR3FE6ULeHGxbiIhuEso/s260-e100/nconsole.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-5832698164227831590</id><published>2026-05-19T10:58:06.853+05:30</published><updated>2026-05-19T14:42:32.580+05:30</updated><title type="text">Popular GitHub Action Tags Redirected to Imposter Commit to Steal CI/CD Credentials</title><summary type="html">
In yet another software supply chain attack, threat actors have compromised the popular GitHub Actions workflow, actions-cool/issues-helper, to run malicious code that harvests sensitive credentials and exfiltrates them to an attacker-controlled server.

"Every existing tag in the repository has been moved to point to an imposter commit that does not appear in the action's normal commit history,</summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/5832698164227831590" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/5832698164227831590" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/05/github-actions-supply-chain-attack.html" rel="alternate" title="Popular GitHub Action Tags Redirected to Imposter Commit to Steal CI/CD Credentials" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc7jpVO6HhBuEBTjkwmNjYhKlFmhhmytOqNZHYuGP-dNWrf3AoyE68yoKj77elddOX4Ps2x9jSuwhi5sE-QjK_oEjLXgQW9e6EHx6W0G7qTqYTM3fZh1AQTyrgm2o-PFBeD9ryHnC6fDmK5MYKUzBjU_pJibTilnm1d99WSQkJux6PXXRydkYW5d15Ada-/s260-e100/step.jpg" width="72"/></entry></feed>