FSB-linked Turla has retooled its Kazuar backdoor into a peer-to-peer botnet architecture designed for stealth and persistent host access, per CISA. The shift to decentralized C2 significantly raises the cost of defender detection and takedown operations.
The Hacker News
· 15h ago
· Read full article →
🇷🇺 FSB · Russia
The Mini Shai-Hulud supply chain attack on TanStack compromised two OpenAI corporate employee devices; OpenAI says no user data, production systems, or IP were exfiltrated. The incident underscores that even security-conscious AI firms remain exposed to upstream dependency poisoning in developer toolchains.
The Hacker News
· 21h ago
· Read full article →
Malware hidden in poisoned TanStack npm packages compromised two OpenAI employee devices and exfiltrated credential material from internal code repositories. The breach demonstrates that AI-sector firms with high-value IP remain prime supply-chain targets.
SecurityWeek
· 22h ago
· Read full article →
Attackers embedded malware in TanStack npm packages, reaching two OpenAI employee devices and stealing a limited volume of internal credential material. The incident extends a pattern of adversaries using open-source ecosystems to penetrate otherwise hardened enterprise perimeters.
The Register Security
· 22h ago
· Read full article →
A simulated Russian commander defeated NATO by exploiting member-state divisions and decision-cycle lag in a Foreign Policy war game exercise. The scenario exposes structural alliance vulnerabilities that mirror real friction over Article 5 commitments and burden-sharing.
Foreign Policy
· 14h ago
· Read full article →
New polling shows China and Russia now hold higher global favorability ratings than the United States, reversing a gap that existed just three years ago. The shift signals eroding U.S. soft power at a moment when Washington is competing directly with Beijing for influence in the Global South.
The Diplomat
· 19h ago
· Read full article →
Trump and Xi wrapped a two-day Beijing summit on May 15, 2026, emphasizing stability but announcing no concrete agreements. The ambiguity leaves unresolved flashpoints—Taiwan, trade, technology controls—on the table ahead of upcoming legislative deadlines.
Just Security
· 20h ago
· Read full article →
Deepening disagreements over Ukraine policy, Iran, and NATO burden-sharing are pushing transatlantic relations from managed friction toward structural rivalry. European autonomy drives accelerate, but without coordination mechanisms, they risk foreclosing future interoperability with U.S. forces and intelligence.
Just Security
· 20h ago
· Read full article →
CIA Director John Ratcliffe traveled to Havana offering US assistance restoring Cuba's electricity infrastructure in exchange for undisclosed political concessions.
Foreign Policy
· 12h ago
· Read full article →
Trump traveled to China while India and Kenya hosted separate multilateral summits during a week of compressed great-power diplomacy. Simultaneous summit activity across three continents reflects accelerating competition for Global South alignment.
Foreign Policy
· 13h ago
· Read full article →
China treated Trump's summit visit as routine rather than landmark, signaling Beijing's comfort with recalibrated great-power parity. A confident China deprioritizing presidential optics is a direct indicator of how far the bilateral power balance has shifted since 2017.
Foreign Policy
· 16h ago
· Read full article →
Pakistan is positioning to maintain cooperation with both Washington and Beijing in the wake of the Trump-Xi summit, mirroring broader Global South hedging. Islamabad's balancing act tests whether the summit produced durable US-China détente or merely a tactical pause that forces third-party alignment decisions.
The Diplomat
· 18h ago
· Read full article →
Unknown attackers injected credential-stealing malware into newly published versions of node-ipc, a widely used npm inter-process communication library. The compromise threatens any downstream project consuming the package without version pinning or integrity checks.
BleepingComputer
· 15h ago
· Read full article →
Google Threat Intelligence Group exposed UNC6671, operating as 'BlackFile,' running a large-scale extortion campaign using voice phishing and adversary-in-the-middle techniques to defeat MFA and compromise SSO environments.
Google Threat Intelligence
· 18h ago
· Read full article →
A ransomware attack on non-bank lender American Lending Center, discovered nearly a year ago, exposed data on 123,000 individuals. The year-long investigation gap signals systemic breach-notification delays endemic to the financial sector.
SecurityWeek
· 21h ago
· Read full article →
Law enforcement dismantled dark web marketplaces, while ShinyHunters leveraged XSS flaws to extort an edutech firm; separately, threat actors weaponized AI to generate zero-day exploits. AI-assisted vulnerability discovery marks a qualitative escalation in attacker capability available below nation-state level.
SentinelOne
· 19h ago
· Read full article →
CISA added CVE-2026-42897, a cross-site scripting vulnerability in Microsoft Exchange Server, to its Known Exploited Vulnerabilities catalog based on active exploitation evidence. Federal agencies face mandatory remediation under BOD 22-01; Exchange's history as a high-value espionage target raises urgency.
CISA Alerts
· 20h ago
· Read full article →
CISA issued an emergency directive requiring all federal agencies to patch an actively exploited Cisco SD-WAN vulnerability that allows unauthenticated remote attackers to gain administrative privileges.
The Record
· 19h ago
· Read full article →
Microsoft issued mitigations for CVE-2026-42897, an actively exploited Exchange Server zero-day enabling arbitrary code execution via XSS against Outlook on the web users. No permanent patch exists yet, leaving organizations exposed during the remediation gap.
SecurityWeek
· 20h ago
· Read full article →
Microsoft confirmed CVE-2026-42897, a high-severity XSS flaw in Exchange Server, is being actively exploited to execute arbitrary code against Outlook on the web users, with only mitigations available.
BleepingComputer
· 23h ago
· Read full article →
Get this in your inbox
Free daily briefing. No spam. Unsubscribe anytime.
Subscribe Now