RADAR / 보안/개인정보 레이더

보안/개인정보 레이더

A fast, reusable HTML report for lightweight Radar projects: entity distribution, article velocity, and source mix, alongside a clean reading list.

articles112 entities9 errors24 Generated at2026-05-19 13:56 UTC

Visuals

Chart.js dark editorial responsive

Entity Distribution

Top entities by frequency

Article Timeline

Daily volume inferred from article dates

Source Distribution

Share of articles by source

Data Freshness

Collection lag distribution

Entity Extraction Rate

Percentage with matched entities

Source Health

Article count by source (sorted)

">

엔티티 히트맵 (Top 15 × 14일)

Incident Category Breakdown

Incident Category Breakdown

Keyword-based classifier over title + summary

CategoryArticles
OTHER53
VULNERABILITY29
MALWARE13
RANSOMWARE7
PHISHING6
REGULATORY2
BREACH1
DDOS1

Entity Co-occurrence Network

Entity Co-occurrence Network

Entities that appear together in the same article

Entities

clickable pills top 24 shown
SecurityGeneral 172 Vulnerability 51 Threat 49 DataBreach 23 Malware 16 ConsumerTrust 12 CorporateTrust 11 Privacy 7 Compliance 3

Articles

cards source + date fast scan

Reading List

Click through to the original source

Looking Back, Looking Forward: Digesting a Dynamic Bouillabaisse of Cyber Evolution

Dark Reading editors reflect on two decades of dramatic change — from perimeter defense to assume-breach strategies — and warn that while AI, cloud, and COVID-19 have transformed the threat landscape, organizations are s...

source Dark Reading date 2026-05-19 entities 3

AI Raises the Bar on Vulnerability Awareness and Secure-by-Design Software

AI-powered vulnerability scanning leaves no excuse for unpatched bugs as the EU Cyber Resilience Act pushes firms toward secure-by-design software

source Infosecurity Magazine date 2026-05-19 entities 2

The New Phishing Click: How OAuth Consent Bypasses MFA

In February 2026, a phishing-as-a-service (PhaaS) platform called EvilTokens went live. Within five weeks, it had compromised more than 340 Microsoft 365 organizations across five countries. The targets of the platform...

source The Hacker News date 2026-05-19 entities 4

Microsoft confirms patching issues in restricted Windows networks

Microsoft says customers in restricted network environments may encounter Windows Update failures after installing the January 2026 optional non-security preview updates. [...]

source Bleeping Computer date 2026-05-19 entities 1

Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare

Drupal has issued an alert stating that it intends to release a "core security release" for all supported branches on May 20, 2026, from 5-9 p.m. UTC. "The Drupal Security Team urges you to reserve time for core updates...

source The Hacker News date 2026-05-19 entities 1

SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access

Critical security vulnerabilities have been disclosed in SEPPMail Secure E-Mail Gateway, an enterprise-grade email security solution, that could be exploited to achieve remote code execution and enable an attacker to rea...

source The Hacker News date 2026-05-19 entities 1

Grafana Labs Confirms Hackers Stole Source Code

Open source tool maker Grafana says hackers stole codebase via GitHub breach

source Infosecurity Magazine date 2026-05-19 entities 2

Hackers Bypass Security Tools to Target Users Directly

Bridewell report calls out emergence of “fix-style” attacks

source Infosecurity Magazine date 2026-05-18 entities 1

Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer

Cybersecurity researchers have flagged a compromised version of the Nx Console extension that was published to the Microsoft Visual Studio Code (VS Code) Marketplace. The extension in question is rwl.angular-console (ve...

source The Hacker News date 2026-05-18 entities 3

Popular GitHub Action Tags Redirected to Imposter Commit to Steal CI/CD Credentials

In yet another software supply chain attack, threat actors have compromised the popular GitHub Actions workflow, actions-cool/issues-helper, to run malicious code that harvests sensitive credentials and exfiltrates them ...

source The Hacker News date 2026-05-18 entities 2

Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account

Cybersecurity researchers have discovered a fresh software supply chain attack campaign that has compromised various npm packages associated with the @antv ecosystem as part of the ongoing Mini Shai-Hulud attack wave. "...

source The Hacker News date 2026-05-18 entities 3

INTERPOL ‘Operation Ramz’ seizes 53 malware, phishing servers

More than 200 individuals were arrested for cybercrime activities during INTERPOL's Operation Ramz, which focused on the Middle East and North Africa. [...]

source Bleeping Computer date 2026-05-18 entities 3

OSHA probing worker death at SpaceX’s Starbase site

The death is the latest worker safety issue at the Starbase facility, which has a higher injury rate than all other SpaceX sites.

source TechCrunch date 2026-05-18 entities 1

Microsoft Exchange Zero-Day Under Attack, No Patch Available

CVE-2026-42897 stems from a cross-site scripting (XSS) vulnerability and can allow an attacker to compromise Outlook Web Access (OWA) mailboxes.

source Dark Reading date 2026-05-18 entities 3

SHub macOS infostealer variant spoofs Apple security updates

A new variant of the 'SHub' macOS infostealer uses AppleScript to show a fake security update message and installs a backdoor. [...]

source Bleeping Computer date 2026-05-18 entities 1

CISA Admin Leaked AWS GovCloud Keys on Github

Until this past weekend, a contractor for the Cybersecurity & Infrastructure Security Agency (CISA) maintained a public GitHub repository that exposed credentials to several highly privileged AWS GovCloud accounts and a ...

source Krebs on Security date 2026-05-18 entities 2

Volvo teases a new affordable EV to replace discontinued EX30

Volvo's compact, quirky EX30 had a lot of problems when it was first released. Tariffs essentially erased its affordability, making it more expensive to own, and a battery recall made it dangerous to park indoors. But it...

source The Verge date 2026-05-18 entities 1

TeamPCP Supply Chain Campaign: Activity Through 2026-05-17, (Mon, May 18th)

Since the last update , the TeamPCP supply chain campaign produced its loudest stretch since the March Trivy disclosure: an officially confirmed Checkmarx Jenkins plugin compromise and a new self-spreading Mini Shai-Hulu...

source SANS Internet Storm Center date 2026-05-18 entities 2

Shai-Hulud Worm Clones Spread After Code Release

The release of Shai-Hulud source code spells trouble for software developers as researchers worry the self-replicating worm could scale.

source Dark Reading date 2026-05-18 entities 1

5 Steps to Managing Shadow AI Tools Without Slowing Down Employees

Many employees already use shadow AI tools at work without security review. Adaptive Security breaks down how teams can build practical AI governance without adding friction for employees. [...]

source Bleeping Computer date 2026-05-18 entities 2

Elon Musk has lost his lawsuit against Sam Altman and OpenAI

Elon Musk's claim that he was mistreated by his OpenAI co-founders failed after nine California jurors decided in a unanimous verdict that his lawsuits had been filed too late.

source TechCrunch date 2026-05-18 entities 1

Leaked Shai-Hulud malware fuels new npm infostealer campaign

The Shai-Hulud malware leaked last week is now used in new attacks on the Node Package Manager (npm) index, as infected packages emerged over the weekend. [...]

source Bleeping Computer date 2026-05-18 entities 3

NYC Health + Hospitals says hackers stole medical data and fingerprints during breach affecting at least 1.8 million people

The New York public healthcare system said hackers stole personal and medical data, and scans of biometrics — including fingerprints — in one of the largest recorded breaches of 2026.

source TechCrunch date 2026-05-18 entities 2

Fuel Tank Breaches Expand Scope of Iran's Cyber Offensive

Security experts have long warned that insecure automatic tank gauge (ATG) systems exposed on the Internet can be tampered with by threat actors.

source Dark Reading date 2026-05-18 entities 2

⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More

Monday opens with a trust problem. A mail server flaw is under active use. A network control system was targeted. Trusted packages were poisoned. A fake model page pushed a stealer. Then came the familiar ransom claim: t...

source The Hacker News date 2026-05-18 entities 5

How to Reduce Phishing Exposure Before It Turns into Business Disruption

What happens when a phishing email looks clean enough to pass through security, but dangerous enough to expose the business after one click? That is the gap many SOCs still struggle with: the attacks that leave teams uns...

source The Hacker News date 2026-05-18 entities 2

IT threat evolution in Q1 2026. Mobile statistics

This report contains mobile threat statistics for Q1 2026, along with noteworthy discoveries and quarterly trends: new versions of SparkCat and Triada.

source Securelist - Kaspersky date 2026-05-18 entities 1

IT threat evolution in Q1 2026. Non-mobile statistics

The report presents key trends and statistics on malware that targeted personal computers running Windows and macOS, as well as Internet of Things (IoT) devices, during Q1 2026.

source Securelist - Kaspersky date 2026-05-18 entities 3

Boulevard of Broken Dreams: 2 Decades of Cyber Fails

From the MGM and Caesars fiasco and MOVEit's patch nightmare to epic business blunders and the jaded reality of living in a post-breach world, Dark Reading looks back at the mistakes, miscalculations, systemic failures, ...

source Dark Reading date 2026-05-18 entities 3

Zero-Day Exploit Against Windows BitLocker

It’s nasty , but it requires physical access to the computer: The exploit, named YellowKey, was published earlier this week by a researcher who goes by the alias Nightmare-Eclipse. It reliably bypasses default Windows 11...

source Schneier on Security date 2026-05-18 entities 4

Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flaws

Ivanti, Fortinet, n8n, SAP, and VMware have released security fixes for various vulnerabilities that could be exploited by bad actors to bypass authentication and execute arbitrary code. Topping the list is a critical fl...

source The Hacker News date 2026-05-18 entities 2

NCSC Publishes Guidance on Securing Agentic AI Use

The UK’s National Cyber Security Centre is helping organizations to understand agentic AI security risks

source Infosecurity Magazine date 2026-05-18 entities 1

Security Researchers Find 47 Zero-Days at Pwn2Own Berlin

The research community was awarded $1.3m as it found dozens of novel vulnerabilities at Pwn2Own Berlin

source Infosecurity Magazine date 2026-05-18 entities 1

Bank of England, FCA and Treasury Raise Alarm Over Frontier AI

The UK’s financial authorities have set expectations for the sector on cybersecurity and operational resilience

source Infosecurity Magazine date 2026-05-18 entities 1

MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems

Chaotic Eclipse, the security researcher behind the recently disclosed Windows flaws, YellowKey and GreenPlasma, has released a proof-of-concept (PoC) for a Windows privilege escalation zero-day flaw that grants attacker...

source The Hacker News date 2026-05-17 entities 3

Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware

Cybersecurity researchers have discovered four new npm packages containing information-stealing malware, one of which is a clone of the Shai-Hulud worm open-sourced by TeamPCP. The list of identified packages is below - ...

source The Hacker News date 2026-05-17 entities 2

Microsoft confirms Windows 11 security update install issues

Microsoft has confirmed that the May 2026 Windows 11 security update (KB5089549) fails to install on some systems and triggers 0x800f0922 errors. [...]

source Bleeping Computer date 2026-05-17 entities 1

Exploit available for new DirtyDecrypt Linux root escalation flaw

A recently patched local privilege escalation vulnerability in the Linux kernel's rxgk module now has a proof-of-concept exploit that allows attackers to gain root access on some Linux systems. [...]

source Bleeping Computer date 2026-05-17 entities 2

Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulations

A new analysis of the Lua-based fast16 malware has confirmed that it was a cyber sabotage tool designed to tamper with nuclear weapons testing simulations. According to Broadcom-owned Symantec and Carbon Black teams, the...

source The Hacker News date 2026-05-17 entities 2

Hackers earn $1,298,250 for 47 zero-days at Pwn2Own Berlin 2026

The Pwn2Own Berlin 2026 hacking contest has concluded, with security researchers collecting $1,298,250 in rewards after exploiting 47 zero-day flaws. [...]

source Bleeping Computer date 2026-05-17 entities 3

New Windows 'MiniPlasma' zero-day exploit gives SYSTEM access, PoC released

A cybersecurity researcher has released a proof-of-concept exploit for a Windows privilege escalation zero-day dubbed "MiniPlasma" that lets attackers gain SYSTEM privileges on fully patched Windows systems.  [...]

source Bleeping Computer date 2026-05-17 entities 3

Apple’s Siri revamp could include auto-deleting chats

Privacy will be a major theme when Apple unveils a new version of Siri.

source TechCrunch date 2026-05-17 entities 2

Why trust is a big question at the Elon Musk-OpenAI trial

A big theme in the trial’s final days was whether OpenAI CEO Sam Altman is trustworthy.

source TechCrunch date 2026-05-17 entities 1

Tycoon2FA hijacks Microsoft 365 accounts via device-code phishing

The Tycoon2FA phishing kit now supports device-code phishing attacks and abuses Trustifi click-tracking URLs to hijack Microsoft 365 accounts. [...]

source Bleeping Computer date 2026-05-17 entities 3

NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE

A newly disclosed security flaw impacting NGINX Plus and NGINX Open has come under active exploitation in the wild, days after its public disclosure, according to VulnCheck. The vulnerability, tracked as CVE-2026-42945 (...

source The Hacker News date 2026-05-17 entities 2

Grafana GitHub Token Breach Led to Codebase Download and Extortion Attempt

Grafana has disclosed that an "unauthorized party" obtained a token that granted them the ability to access the company's GitHub environment and download its codebase. "Our investigation has determined that no custom...

source The Hacker News date 2026-05-16 entities 4

Microsoft rejects critical Azure vulnerability report, no CVE issued

A security researcher claims Microsoft quietly fixed an Azure Backup for AKS vulnerability after rejecting his report, and without issuing a CVE. Microsoft disputes the claim, telling BleepingComputer the behavior was ex...

source Bleeping Computer date 2026-05-16 entities 2

Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming

A critical security vulnerability impacting the Funnel Builder plugin for WordPress has come under active exploitation in the wild to inject malicious JavaScript code into WooCommerce checkout pages with the goal...

source The Hacker News date 2026-05-16 entities 2

Russian hackers turn Kazuar backdoor into modular P2P botnet

The Russian hacker group Secret Blizzard has developed its long-running Kazuar backdoor into a modular peer-to-peer (P2P) botnet designed for long-term persistence, stealth, and data collection. [...]

source Bleeping Computer date 2026-05-16 entities 3

Friday Squid Blogging: Bigfin Squid

Article about the bigfin squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.

source Schneier on Security date 2026-05-15 entities 2

Congress Puts Heat on Instructure After Canvas Outage

The House Committee on Homeland Security sent a letter about the Canvas cyberattack, the same day that the edtech company said it reached an "agreement" with the ShinyHunters cybercriminals.

source Dark Reading date 2026-05-15 entities 1

Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access

The Russian state-sponsored hacking group known as Turla has transformed its custom backdoor Kazuar into a modular peer-to-peer (P2P) botnet that's engineered for stealth and persistent access to compromised ...

source The Hacker News date 2026-05-15 entities 4

Gremlin Stealer Evolves into Modular Threat with Advanced Evasion Capabilities

A new Gremlin stealer variant has evolved into a modular toolkit with advanced evasion and data theft capabilities, according to new Unit 42 research

source Infosecurity Magazine date 2026-05-15 entities 1

Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence

Cybersecurity researchers have disclosed a set of four security flaws in OpenClaw that could be chained to achieve data theft, privilege escalation, and persistence. The vulnerabilities, collectively dubbed Cl...

source The Hacker News date 2026-05-15 entities 1

Microsoft Reports Severe Zero-Day Flaw in On-Prem Exchange Servers

The zero-day vulnerability affects on-premises installations for all versions of Exchange Server 2016, 2019 and Subscription Edition

source Infosecurity Magazine date 2026-05-15 entities 3

What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface

In Your Biggest Security Risk Isn't Malware — It's What You Already Trust, we made a simple argument: the most dangerous activity inside most organizations no longer looks like an attack. It looks like administration. Po...

source The Hacker News date 2026-05-15 entities 4

TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates

OpenAI has disclosed that two of its employee devices in its corporate environment were impacted via the Mini Shai-Hulud supply chain attack on TanStack, but noted that no user data, production systems, or intellectual p...

source The Hacker News date 2026-05-15 entities 5

China-Linked Hackers Deploy New TencShell Malware Against Global Manufacturer

A suspected China-linked threat actor targeted the Indian branch of a global manufacturer leveraging an open source offensive toolkit

source Infosecurity Magazine date 2026-05-14 entities 3

[Guest Diary] New Malware Libraries means New Signatures, (Fri, May 15th)

&#;xd; &#;xd; ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;};;

source SANS Internet Storm Center date 2026-05-14 entities 2

On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email

Microsoft has disclosed a new security vulnerability impacting on-premise versions of Exchange Server that it said has come under active exploitation in the wild. The vulnerability, tracked as CVE-2026-42897 (CVSS score:...

source The Hacker News date 2026-05-14 entities 2

CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits

The U.S.Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a newly disclosed vulnerability impacting Cisco Catalyst SD-WAN Controller to its Known Exploited Vulnerabilities (KEV) catalog, requiring...

source The Hacker News date 2026-05-14 entities 2

Taiwan Bullet Train Hack Highlights Cybersecurity Gaps in Rail Systems

A Taiwanese student experimenting with software-defined radio technology shut down three bullet trains for nearly an hour, leading to an anti-terrorism response.

source Dark Reading date 2026-05-14 entities 1

CVE-2026-42897 - Microsoft Exchange Server Cross-Site Scripting Vulnerability

Microsoft Exchange Server contains a cross-site scripting vulnerability during web page generation in Outlook Web Access and when certain interaction conditions are met, arbitrary JavaScript can be executed in the browse...

source CIRCL KEV Feed date 2026-05-14 entities 2

SecurityScorecard Snags Driftnet to Level Up Threat Intelligence

The acquisition looks to boost visibility into third-party ecosystems, which are becoming a bigger concern as vectors for supply chain attacks.

source Dark Reading date 2026-05-14 entities 1

Maximum Severity Cisco SD-WAN Bug Exploited in the Wild

This is the second time this year a threat actor has leveraged a CVSS 10.0 vulnerability in Cisco's network control system.

source Dark Reading date 2026-05-14 entities 3

Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access

Cisco has released updates to address a maximum-severity authentication bypass flaw in Catalyst SD-WAN Controller that it said has been exploited in limited attacks. The vulnerability, tracked as CVE-2026-20182, carries ...

source The Hacker News date 2026-05-14 entities 2

Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets

Cybersecurity researchers are sounding the alarm about what has been described as "malicious activity" in newly published versions of node-ipc. According to Socket and StepSecurity, three different versions of the npm pa...

source The Hacker News date 2026-05-14 entities 1

'FrostyNeighbor' APT Carefully Targets Govt Orgs in Poland, Ukraine

Attackers uniquely fingerprint victims before delivering spear-phishing payloads aimed at espionage, in the latest campaign from the Belarussian nation-state threat group.

source Dark Reading date 2026-05-14 entities 2

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m giving a virtual talk on “The Security of Trust in the Age of AI,” hosted by the Financial Women’s Association of New York , at 6:00 PM ET on May 21, ...

source Schneier on Security date 2026-05-14 entities 2

Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike

The Belarus-aligned threat group known as Ghostwriter has been attributed to a fresh set of attacks targeting governmental organizations in Ukraine. Active since at least 2016, Ghostwriter has been linked to both cyber e...

source The Hacker News date 2026-05-14 entities 2

Google Launches Android Spyware Forensics Tool for High-Risk Users

Google’s Android Advanced Protection Mode is getting a new feature allowing trusted security experts to investigate potential spyware infections

source Infosecurity Magazine date 2026-05-14 entities 1

AI Drives Cybersecurity Investments, Widening 'Valley of Death'

In a role reversal, investment dollars in security startups exceeded the value of mergers and acquisitions in 1Q26 by more than $1 billion, a rare occurrence.

source Dark Reading date 2026-05-14 entities 1

KongTuke hackers now use Microsoft Teams for corporate breaches

Initial access broker KongTuke has moved to Microsoft Teams for social engineering attacks, taking as little as five minutes to gain persistent access to corporate networks. [...]

source Bleeping Computer date 2026-05-14 entities 1

Foxconn Attack Highlights Manufacturing's Cyber Crisis

A Nitrogen ransomware attack on Foxconn's North American facilities is one of 600 hits on manufacturers this year, as gangs increasingly target the sector for its low tolerance for downtime.

source Dark Reading date 2026-05-14 entities 3

PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure

Threat actors have been observed attempting to exploit a recently disclosed security vulnerability in PraisonAI, an open-source multi-agent orchestration framework, within four hours of its public disclosure. The vulnera...

source The Hacker News date 2026-05-14 entities 3

How AI Hallucinations Are Creating Real Security Risks

AI hallucinations are introducing serious security risks into critical infrastructure decision-making by exploiting human trust through highly confident yet incorrect outputs. When an AI model lacks certainty, it doesn’t...

source The Hacker News date 2026-05-14 entities 2

How Dangerous Is Anthropic’s Mythos AI?

Last month, Anthropic made a remarkable announcement about its new model, Claude Mythos Preview: it was so good at finding security vulnerabilities in software that the company would not release it to the general public....

source Schneier on Security date 2026-05-14 entities 1

Kimsuky targets organizations with PebbleDash-based tools

Kaspersky researchers analyze a range of new PebbleDash-based tools used in recent Kimsuky campaigns and reveal their connection to the AppleSeed malware cluster.

source Securelist - Kaspersky date 2026-05-14 entities 2

Dell confirms its SupportAssist software causes Windows BSOD crashes

Dell confirmed that its SupportAssist software is causing blue-screen crashes on some Windows systems following a wave of user reports about random reboots affecting Dell devices since Friday. [...]

source Bleeping Computer date 2026-05-14 entities 1

Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation

An anonymous cybersecurity researcher who disclosed three Microsoft Defender vulnerabilities has returned with two more zero-days involving a BitLocker bypass and a privilege escalation impacting Windows Collaborative Tr...

source The Hacker News date 2026-05-14 entities 1

Most Organizations Now Use AI Agents for Sensitive Security Tasks

Semperis study finds 74% of organizations believe AI will increase attacks on identity infrastructure

source Infosecurity Magazine date 2026-05-14 entities 1

New Fragnesia Linux flaw lets attackers gain root privileges

Linux distros are rolling out patches for a new high-severity kernel privilege escalation vulnerability (known as Fragnasia and tracked as CVE-2026-46300) that allows attackers to run malicious code as root. [...]

source Bleeping Computer date 2026-05-13 entities 2

New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption

Details have emerged about a new variant of the recent Dirty Frag Linux local privilege escalation (LPE) vulnerability that allows local attackers to gain root access, making it the third such bug to be identified in the...

source The Hacker News date 2026-05-13 entities 3

Simple bypass of the link preview function in Outlook Junk folder, (Thu, May 14th)

Besides serving as a place where Microsoft Outlook places suspected spam, the Outlook Junk folder has one additional function that can be quite helpful when it comes to identifying malicious messages. Any e-mail placed i...

source SANS Internet Storm Center date 2026-05-13 entities 1

18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE

Cybersecurity researchers have disclosed multiple security vulnerabilities impacting NGINX Plus and NGINX Open, including a critical flaw that remained undetected for 18 years. The vulnerability, discovered by depthfirst...

source The Hacker News date 2026-05-13 entities 2

Clio’s $500M milestone arrives just as Anthropic ups the ante

Legal tech startups, including Clio, which just hit $500 million in ARR, are seeing massive customer adoption.

source TechCrunch date 2026-05-13 entities 1

CVE-2026-20182 - Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability

Cisco Catalyst SD-WAN Controller & Manager contain an authentication bypass vulnerability that allows an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected syste...

source CIRCL KEV Feed date 2026-05-13 entities 2

West Pharmaceutical says hackers stole data, encrypted systems

West Pharmaceutical Services disclosed that it was the target of a cyberattack that resulted in data exfiltration and system encryption. [...]

source Bleeping Computer date 2026-05-13 entities 2

Iranian hackers targeted major South Korean electronics maker

The Iran-linked hacking group MuddyWater (a.k.a. Seedworm, Static Kitten) launched a broad cyber-espionage campaign targeting at least nine high-profile organizations across multiple sectors and countries. [...]

source Bleeping Computer date 2026-05-13 entities 2

Trump administration defends right to ban content moderation experts from US

The Trump administration is fighting for the right to keep some social media moderation advocates out of the US. On Wednesday, US District Court Judge James Boasberg heard arguments in a lawsuit between the nonprofit Coa...

source The Verge date 2026-05-13 entities 1

Checkbox Assessments Aren't Fit to Measure Risk

Security governance needs to be more than an annual compliance exercise. New companies are emerging to address risk-management gaps in current audit tools.

source Dark Reading date 2026-05-13 entities 2

Attackers Weaponize RubyGems for Data Dead Drops

Threat actors are publishing RubyGems packages that include scrapers targeting public-facing UK government servers, but with no clear objective.

source Dark Reading date 2026-05-13 entities 1

Tables Turn on 'The Gentlemen' RaaS Gang With Data Leak

An OPSEC failure provides a window into what helped the ransomware group rise: a generous affiliate model, opportunistic TTPs, and an effective organizational structure.

source Dark Reading date 2026-05-13 entities 2

AMD’s best CPU tech for gamers is coming to workstations too

For the first time, AMD is including its 3D V-Cache tech in its commercial workstation processors with a refreshed line of Ryzen PRO 9000 series chips. Up until now, AMD's 3D V-Cache chips have mainly been geared toward ...

source The Verge date 2026-05-13 entities 1

New critical Exim mailer flaw allows remote code execution

A critical vulnerability affecting certain configurations of the Exim open-source mail transfer agent could be exploited by an unauthenticated remote attacker to execute arbitrary code. [...]

source Bleeping Computer date 2026-05-13 entities 2

Musk’s xAI is running nearly 50 gas turbines unchecked at its Mississippi data center

Gas turbines at xAI's Colossus 2 data center have drawn a lawsuit over the company's use of "mobile" gas turbines as power plants.

source TechCrunch date 2026-05-13 entities 1

Dark Reading Celebrates 20 Years as a Leading Authority on Cybersecurity, Highlighting the People, Events, Ideas, and Technologies Shaping the Modern Risk Landscape

Informa TechTarget's flagship cybersecurity media brand launches a special content series to mark two decades as a trusted source for cybersecurity professionals.

source Dark Reading date 2026-05-13 entities 1

This is what some of the world’s largest banks of malware look like stacked as hard drives

What would some of the world's largest repositories of malware look like if they were stacked as hard drives, one on top of the other?

source TechCrunch date 2026-05-13 entities 2

Windows BitLocker zero-day gives access to protected drives, PoC released

A cybersecurity researcher has published proof-of-concept (PoC) exploits for two unpatched Microsoft Windows vulnerabilities named YellowKey and GreenPlasma, which are a BitLocker bypass and a privilege-escalation flaw. ...

source Bleeping Computer date 2026-05-13 entities 3

Anthropic courts a new kind of customer: small business owners

For founders and investors, Anthropic's new offering signals that the AI platform wars are expanding downmarket and that the next major battleground for user acquisition isn't the Fortune 500; it's the 36 million small b...

source TechCrunch date 2026-05-13 entities 1

Webinar tomorrow: Why security alone won't stop modern attacks

Tomorrow's webinar examines why prevention alone is no longer enough against modern cyberattacks. The session explores how organizations combine security, backups, and recovery planning to improve cyber resilience after ...

source Bleeping Computer date 2026-05-13 entities 1

Microsoft fixes BitLocker recovery issue only for Windows 11 users

Microsoft has addressed a known issue causing some Windows 11 systems to boot into BitLocker recovery after installing the April 2026 Windows security updates. [...]

source Bleeping Computer date 2026-05-13 entities 1

Ransomware hackers claim breach at Foxconn, a major electronics manufacturer for Apple, Google, and Nvidia

A ransomware group has claimed responsibility for hacking the electronics manufacturing giant Foxconn and is attempting to extort the company.

source TechCrunch date 2026-05-13 entities 3

Canvas Owner Reaches Agreement With Cybercriminals After Ransomware Attack

Instructure says it reached an agreement with ShinyHunters over the Canvas breach data

source Infosecurity Magazine date 2026-05-13 entities 3

Microsoft's MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday

Microsoft has unveiled a new multi-model artificial intelligence (AI)-driven system called MDASH to facilitate vulnerability discovery and remediation at scale, adding that it's being tested by some customers as part of ...

source The Hacker News date 2026-05-13 entities 2

Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation

A threat actor with affiliations to China has been linked to a "multi-wave intrusion" targeting an unnamed Azerbaijani oil and gas company between late December 2025 and late February 2026, marking an expansion of its ta...

source The Hacker News date 2026-05-13 entities 2

LatAm Vibe Hackers Generate Custom Hacking Tools on the Fly

In the latest evolution of automated cyberattacks, threat actors heavily leveraged AI agents to support campaigns against entities in Mexico and Brazil.

source Dark Reading date 2026-05-13 entities 2

China's 'FamousSparrow' APT Nests in South Caucasus Energy Firm

The cyberthreat group targets an Azerbaijani oil and gas firm with repeated attacks, as the China-linked actors extend targeting beyond hospitality, telecom, and government sectors.

source Dark Reading date 2026-05-13 entities 1

Foxconn confirms cyberattack claimed by Nitrogen ransomware gang

Foxconn, the world's largest electronics manufacturer, says some of its North American factories are now working to resume normal operations after a cyberattack. [...]

source Bleeping Computer date 2026-05-13 entities 2

73 Seconds to Breach, 24 Hours to Patch: The Case for Autonomous Validation

Attackers can compromise systems in minutes while patching and response still take hours or days. Picus Security breaks down why autonomous validation is becoming critical for modern defense strategies. [...]

source Bleeping Computer date 2026-05-13 entities 3

Ransomware: Over Half of CISOs Would Consider Paying Ransom to Hackers

Survey of cybersecurity leaders suggests that majority would strongly consider paying cybercriminals, if that’s what it took to help restore encrypted systems

source Infosecurity Magazine date 2026-05-13 entities 2

Adaption aims big with AutoScientist, an AI tool that helps models train themselves

Adaption's new AutoScientist tool is designed to let models adapt to specific capabilities quickly through an automated approach to conventional fine-tuning.

source TechCrunch date 2026-05-13 entities 1