Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access

15/05/2026 0 Comments 0 tags

The Russian state-sponsored hacking group known as Turla has transformed its custom backdoor Kazuar into a modular peer-to-peer (P2P) botnet that’s engineered for stealth and persistent access to compromised hosts.

Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence

15/05/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed a set of four security flaws in OpenClaw that could be chained to achieve data theft, privilege escalation, and persistence. The vulnerabilities, collectively dubbed Claw Chain

TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates

15/05/2026 0 Comments 0 tags

OpenAI has disclosed that two of its employee devices in its corporate environment were impacted via the Mini Shai-Hulud supply chain attack on TanStack, but noted that no user data,

What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface

15/05/2026 0 Comments 0 tags

In Your Biggest Security Risk Isn’t Malware — It’s What You Already Trust, we made a simple argument: the most dangerous activity inside most organizations no longer looks like an

On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email

15/05/2026 0 Comments 0 tags

Microsoft has disclosed a new security vulnerability impacting on-premise versions of Exchange Server that it said has come under active exploitation in the wild. The vulnerability, tracked as CVE-2026-42897 (CVSS

CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits

15/05/2026 0 Comments 0 tags

The U.S.Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a newly disclosed vulnerability impacting Cisco Catalyst SD-WAN Controller to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive

Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets

14/05/2026 0 Comments 0 tags

Cybersecurity researchers are sounding the alarm about what has been described as “malicious activity” in newly published versions of node-ipc. According to Socket and StepSecurity, three different versions of the

Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access

14/05/2026 0 Comments 0 tags

Cisco has released updates to address a maximum-severity authentication bypass flaw in Catalyst SD-WAN Controller that it said has been exploited in limited attacks. The vulnerability, tracked as CVE-2026-20182, carries

ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories

14/05/2026 0 Comments 0 tags

Everything is still on fire. This week feels dumb in the worst way — bad links, weak checks, fake help desks, shady forum posts, and people turning supply chain attacks

Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike

14/05/2026 0 Comments 0 tags

The Belarus-aligned threat group known as Ghostwriter has been attributed to a fresh set of attacks targeting governmental organizations in Ukraine. Active since at least 2016, Ghostwriter has been linked