A new analysis of the Lua-based fast16 malware has confirmed that it was a cyber sabotage tool designed to tamper with nuclear weapons testing simulations. According to Broadcom-owned Symantec and Carbon Black teams, the pre-Stuxnet tool was engineered to corrupt uranium-compression simulations that are central to nuclear weapon design. “Fast16’s hook engine is selectively interested … Read More “Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulations – The Hacker News” »
Author: [email protected] (The Hacker News)
The UK’s financial authorities have set expectations for the sector on cybersecurity and operational resilience – Read More –
Sean Plankey, most recently the nominee for director of the Cybersecurity and Infrastructure Security Agency, is joining defense technology company UFORCE as its U.S. chief executive officer. The London-based company created out of nine Ukrainian-based firms announced Plankey’s move Monday less than a month after he withdrew his nomination amid difficulties overcoming objections from senators … Read More “Former CISA nominee Sean Plankey named US CEO of defense startup – CyberScoop” »
Closing the Gap: The Regulatory and Structural Maturation of Digital Assets – Hackread – Cybersecurity News, Data Breaches, AI and More
Digital assets are reshaping global finance as institutions adopt regulated crypto infrastructure, stablecoins, and tokenized assets. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Posted by Apple Product Security via Fulldisclosure on May 17 APPLE-SA-05-11-2026-3 iPadOS 17.7.11 iPadOS 17.7.11 addresses the following issues. Information about the security content is also available at https://support.apple.com/en-us/127112. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Notification Services Available for: iPad Pro 12.9-inch 2nd generation, … Read More “APPLE-SA-05-11-2026-3 iPadOS 17.7.11 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on May 17 APPLE-SA-05-11-2026-4 iOS 16.7.16 and iPadOS 16.7.16 iOS 16.7.16 and iPadOS 16.7.16 addresses the following issues. Information about the security content is also available at https://support.apple.com/en-us/127113. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Notification Services Available … Read More “APPLE-SA-05-11-2026-4 iOS 16.7.16 and iPadOS 16.7.16 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on May 17 APPLE-SA-05-11-2026-5 iOS 15.8.8 and iPadOS 15.8.8 iOS 15.8.8 and iPadOS 15.8.8 addresses the following issues. Information about the security content is also available at https://support.apple.com/en-us/127114. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Notification Services Available … Read More “APPLE-SA-05-11-2026-5 iOS 15.8.8 and iPadOS 15.8.8 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on May 17 APPLE-SA-05-11-2026-6 macOS Tahoe 26.5 macOS Tahoe 26.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/en-us/127115. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Accelerate Available for: macOS Tahoe Impact: An … Read More “APPLE-SA-05-11-2026-6 macOS Tahoe 26.5 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on May 17 APPLE-SA-05-11-2026-7 macOS Sequoia 15.7.7 macOS Sequoia 15.7.7 addresses the following issues. Information about the security content is also available at https://support.apple.com/en-us/127116. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. APFS Available for: macOS Sequoia Impact: An … Read More “APPLE-SA-05-11-2026-7 macOS Sequoia 15.7.7 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on May 17 APPLE-SA-05-11-2026-8 macOS Sonoma 14.8.7 macOS Sonoma 14.8.7 addresses the following issues. Information about the security content is also available at https://support.apple.com/en-us/127117. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. APFS Available for: macOS Sonoma Impact: An … Read More “APPLE-SA-05-11-2026-8 macOS Sonoma 14.8.7 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on May 17 APPLE-SA-05-11-2026-9 tvOS 26.5 tvOS 26.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/en-us/127118. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Accelerate Available for: Apple TV HD and Apple TV … Read More “APPLE-SA-05-11-2026-9 tvOS 26.5 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on May 17 APPLE-SA-05-11-2026-10 watchOS 26.5 watchOS 26.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/en-us/127119. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Accelerate Available for: Apple Watch Series 6 and later … Read More “APPLE-SA-05-11-2026-10 watchOS 26.5 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on May 17 APPLE-SA-05-11-2026-11 visionOS 26.5 visionOS 26.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/en-us/127120. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Accelerate Available for: Apple Vision Pro (all models) Impact: … Read More “APPLE-SA-05-11-2026-11 visionOS 26.5 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on May 17 APPLE-SA-05-13-2026-1 Safari 26.5 Safari 26.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/en-us/127121. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. WebKit Available for: macOS Sonoma and macOS Sequoia Impact: … Read More “APPLE-SA-05-13-2026-1 Safari 26.5 – Full Disclosure” »
NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE – The Hacker News
A newly disclosed security flaw impacting NGINX Plus and NGINX Open has come under active exploitation in the wild, days after its public disclosure, according to VulnCheck. The vulnerability, tracked as CVE-2026-42945 (CVSS score: 9.2), is a heap buffer overflow in ngx_http_rewrite_module affecting NGINX versions 0.6.27 through 1.30.0. According to AI-native security company depthfirst, the … Read More “NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE – The Hacker News” »
Scammers Send Physical Phishing Letters to Steal Ledger Wallet Seed Phrases – Hackread – Cybersecurity News, Data Breaches, AI and More
Scammers are mailing fake Ledger phishing letters to users in Italy with QR codes that trick crypto wallet users into revealing seed phrases. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Grafana Says It Rejected Ransom Demand After Source Code Theft – Hackread – Cybersecurity News, Data Breaches, AI and More
Grafana says hackers stole its source code after accessing a GitHub token, but no customer data or systems were affected. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Grafana has disclosed that an “unauthorized party” obtained a token that granted them the ability to access the company’s GitHub environment and download its codebase. “Our investigation has determined that no customer data or personal information was accessed during this incident, and we have found no evidence of impact to customer systems or operations,” Grafana … Read More “Grafana GitHub Token Breach Led to Codebase Download and Extortion Attempt – The Hacker News” »
Canvas hack: is it ever a good idea to pay a ransom, and what happens to the data? – Data and computer security | The Guardian
Businesses are advised against paying – but many are prepared to deal to protect users’ privacy After a week of outages, hundreds of millions of students’ data stolen, delayed assignment due dates and school login pages being defaced by hackers, the US tech firm Instructure – which operates the education platform Canvas, used by education … Read More “Canvas hack: is it ever a good idea to pay a ransom, and what happens to the data? – Data and computer security | The Guardian” »
Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming – The Hacker News
A critical security vulnerability impacting the Funnel Builder plugin for WordPress has come under active exploitation in the wild to inject malicious JavaScript code into WooCommerce checkout pages with the goal of stealing payment data. Details of the activity were published by Sansec this week. The vulnerability currently does not have an official CVE identifier. … Read More “Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming – The Hacker News” »
Critical ‘Claw Chain’ Vulnerabilities Put Thousands of OpenClaw AI Servers at Risk – Hackread – Cybersecurity News, Data Breaches, AI and More
Critical Claw Chain vulnerabilities in OpenClaw expose thousands of AI servers to data theft, backdoors, and admin-level attacks globally this week. . – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
AI Voice Cloning: The Technology Behind It, Who’s Building It, and Where It’s Headed – Hackread – Cybersecurity News, Data Breaches, AI and More
Explore AI voice cloning technology, leading companies, real-world uses, ethical risks, and future trends shaping synthetic voices. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Welcome to the third and final day of Pwn2Own Berlin 2026! Over the past two days, some amazing research has been put on display, and today looks just as intense. So far, we have awarded $908,750 for 39 unique zero days. With SharePoint and ESXi as targets today, the chances are excellent for crossing the … Read More “Pwn2Own Berlin 2026: Day Three Results and Master of Pwn – Zero Day Initiative – Blog” »
Colorado Governor Jared Polis has commuted the prison sentence of Tina Peters, the former Mesa County election clerk who was sentenced last year to serve nine years in state prison for carrying out one of the most serious election-related data breaches in U.S. history. Peters was arrested in 2021, accused of abusing her position as … Read More “Colorado governor commutes prison sentence for election denier Tina Peters – CyberScoop” »
The Next Cybersecurity Challenge May Be Verifying AI Agents – Hackread – Cybersecurity News, Data Breaches, AI and More
AI agents are reshaping cybersecurity. Learn why verification, trusted identity standards, and runtime controls are now essential. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
A vulnerability has been discovered in Microsoft Exchange Server that could allow for arbitrary code execution. Microsoft Exchange Server is an enterprise-level email and collaboration platform developed by Microsoft that runs on Windows Server. Successful exploitation could allow for arbitrary JavaScript to be executed in the browser context. The malicious code would run with the … Read More “A Vulnerability in Microsoft Exchange Server Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
The Federal Trade Commission is set to begin enforcing a key provision of the Take Down Act on May 19, requiring websites and online services to remove nonconsensual deepfake media within 48 hours after a victim’s notice—or risk fines and FTC investigation. The law, passed by Congress last year, allowed law enforcement to immediately prosecute … Read More “Here’s how the FTC plans to enforce the Take It Down Act – CyberScoop” »
Post Content – Read More – IC3.gov News
Hackers Use PyInstaller and AMSI Patching to Deliver XWorm RAT v7.4 – Hackread – Cybersecurity News, Data Breaches, AI and More
Hackers are hiding XWorm malware in PyInstaller files to bypass Windows security, steal data and remotely control devices through ads. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The Russian state-sponsored hacking group known as Turla has transformed its custom backdoor Kazuar into a modular peer-to-peer (P2P) botnet that’s engineered for stealth and persistent access to compromised hosts. Turla, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA), is assessed to be affiliated with Center 16 of Russia’s Federal Security Service (FSB) – … Read More “Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access – The Hacker News” »
Cybersecurity researchers have disclosed a set of four security flaws in OpenClaw that could be chained to achieve data theft, privilege escalation, and persistence. The vulnerabilities, collectively dubbed Claw Chain by Cyera, can permit an attacker to establish a foothold, expose sensitive data, and plant backdoors. A brief description of the flaws is below – … Read More “Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence – The Hacker News” »
Attackers returned once again to a common target with a massive user base by exploiting a max-severity zero-day vulnerability affecting Cisco Catalyst SD-WAN Controller and Manager. The threat group behind the “limited” number of attacks Cisco is aware of thus far are also linked to a series of previously disclosed vulnerabilities in the vendor’s firewalls … Read More “Cisco zero-day under ongoing attack by persistent threat group – CyberScoop” »
A new Gremlin stealer variant has evolved into a modular toolkit with advanced evasion and data theft capabilities, according to new Unit 42 research – Read More –
Post Content – Read More – IC3.gov News
The zero-day vulnerability affects on-premises installations for all versions of Exchange Server 2016, 2019 and Subscription Edition – Read More –
CalPhishing Scam Uses EvilTokens Kit, Outlook Invites to Steal M365 Sessions – Hackread – Cybersecurity News, Data Breaches, AI and More
Hackers are exploiting Outlook calendar invites and device code phishing to steal M365 session tokens, bypass MFA and breach enterprise accounts. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates – The Hacker News
OpenAI has disclosed that two of its employee devices in its corporate environment were impacted via the Mini Shai-Hulud supply chain attack on TanStack, but noted that no user data, production systems, or intellectual property were compromised or modified in an unauthorized manner. “Upon identification of the malicious activity, we worked quickly to investigate, contain, … Read More “TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates – The Hacker News” »
What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface – The Hacker News
In Your Biggest Security Risk Isn’t Malware — It’s What You Already Trust, we made a simple argument: the most dangerous activity inside most organizations no longer looks like an attack. It looks like administration. PowerShell, WMIC, netsh, Certutil, MSBuild — the same trusted utilities your IT team uses every day are also the preferred … Read More “What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface – The Hacker News” »
TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates – The Hacker News
OpenAI has disclosed that two of its employee devices in its corporate environment were impacted via the Mini Shai-Hulud supply chain attack on TanStack, but noted that no user data, production systems, or intellectual property were compromised or modified in an unauthorized manner. “Upon identification of the malicious activity, we worked quickly to investigate, contain, … Read More “TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates – The Hacker News” »
When it comes to using agentic AI, make sure you can walk before you run. – Read More – All Feed
Developer withdraws plans for Perth datacentre after fierce community opposition – Data and computer security | The Guardian
Three-storey GreenSquare datacentre in Hazelmere was to power cloud computing and the acceleration of AI Get our breaking news email, free app or daily news podcast A 15,000 sq metre datacentre near Perth will no longer go ahead after the developer withdrew plans amid community opposition over its impact on culturally significant sites. The three-storey, … Read More “Developer withdraws plans for Perth datacentre after fierce community opposition – Data and computer security | The Guardian” »
A suspected China-linked threat actor targeted the Indian branch of a global manufacturer leveraging an open source offensive toolkit – Read More –
Microsoft has disclosed a new security vulnerability impacting on-premise versions of Exchange Server that it said has come under active exploitation in the wild. The vulnerability, tracked as CVE-2026-42897 (CVSS score: 8.1), has been described as a spoofing bug stemming from a cross-site scripting flaw. An anonymous researcher has been credited with discovering and reporting … Read More “On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email – The Hacker News” »
Day Two of Pwn2Own Berlin 2026 is underway and the stakes continue to rise! Security researchers are back on the Pwn2Own stage, pushing enterprise systems to their limits as the competition heats up. More exploits, more surprises, and more standout moments are unfolding follow along here for live updates as the race for Master of … Read More “Pwn2Own Berlin 2026 – Day Two Results – Zero Day Initiative – Blog” »
The U.S.Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a newly disclosed vulnerability impacting Cisco Catalyst SD-WAN Controller to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to remediate the issue by May 17, 2026. The vulnerability is a critical authentication bypass tracked as CVE-2026-20182. It’s – Read More … Read More “CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits – The Hacker News” »
As AI becomes more integrated into federal IT (and attacker toolsets) government agencies will need to focus their resources on regulating and monitoring the identities that access their network, a top White House cybersecurity official said Thursday. Nick Polk, branch director for federal cybersecurity in the Executive Office of the President, said that while AI … Read More “White House cyber official: identity security matters more than ever in the age of AI – CyberScoop” »
Advanced artificial intelligence models will “fundamentally change warfare as we know it,” a top cyber official at the Defense Department said Thursday, saying it represents “not evolutionary warfare, but revolutionary warfare.” Paul Lyons, principal deputy assistant secretary for cyber policy, said the development of frontier AI models like Mythos amounted to a “watershed moment,” speaking … Read More “Pentagon cyber official calls advanced AI ‘revolutionary warfare’ – CyberScoop” »
As AI becomes more integrated into federal IT (and attacker toolsets) government agencies will need to focus their resources on regulating and monitoring the identities that access their network, a top White House cybersecurity official said Thursday. Nick Polk, branch director for federal cybersecurity in the Executive Office of the President, said that while AI … Read More “White House cyber official: identity security matters more than ever in the age of AI – CyberScoop” »
Lesson one for aspiring dark web kingpins: don’t have your laundered gold bars shipped to your home address. Read more in my article on the Hot for Security blog. – Read More – GRAHAM CLULEY
Cybersecurity researchers are sounding the alarm about what has been described as “malicious activity” in newly published versions of node-ipc. According to Socket and StepSecurity, three different versions of the npm package have been confirmed as malicious – [email protected] [email protected] [email protected] “Early analysis indicates that [email protected], [email protected], and [email protected] – Read More – The Hacker … Read More “Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets – The Hacker News” »