Cybersecurity 101
Incident Response: The Complete Guide
A complete guide to incident response — the six-phase lifecycle, the response team, plans and playbooks, frameworks, and the practices that limit breach damage.
Policy & Government
Between May 19 and 22, Europol hosted the third and most successful operational week of Project A.S.S.E.T., bringing 31 countries and more than 40 agencies into one room to trace criminal money. The result: hundreds of bank accounts and crypto wallets identified.
phishing
The FBI's IC3 has warned organizations about Kali365, a Telegram-sold phishing-as-a-service kit that runs device-code phishing against Microsoft 365 — stealing the OAuth tokens issued after the victim genuinely passes MFA on Microsoft's real sign-in page.
Supply Chain Attack
The 2026 supply-chain wave has reached PHP. Researchers found 700+ malicious version tags on the Laravel-Lang project — yet the official repositories were never touched. The attacker pointed Git tags at a fork they controlled, defeating the most intuitive defender check.
Vulnerabilities
Researchers at ADAMnetworks disclosed Underminr, a domain-fronting-style flaw they say affects roughly 88 million domains. Its defining property is invisibility: because the TLS SNI and HTTP Host header match, the CDN-side checks built to kill domain fronting never trigger.
Vulnerabilities
CVE-2026-48172, a CVSS 10.0 flaw in the LiteSpeed User-End cPanel plugin, lets anyone with a valid cPanel account run code as root. LiteSpeed confirms it is being actively exploited. On shared hosting, one cheap account is now a path to every account on the server.
Cybersecurity 101
A complete guide to vulnerability management: what vulnerabilities are, how they are scored and disclosed, the management lifecycle, and how to build a program.
Policy & Government
Dutch financial-crime investigators seized 800 servers and arrested two men tied to Stark Industries, a hosting firm researchers have long described as a bulletproof hoster. The action targets the shared infrastructure layer beneath Russian state-aligned cyber and influence operations.
Vulnerabilities
Ubiquiti has patched three maximum-severity flaws in UniFi OS — the operating system behind its gateways, Dream Machines, and network video recorders. All three are rated CVSS 10.0, and all three are remotely exploitable by an attacker with no privileges.
Vulnerabilities
Trend Micro patched CVE-2026-34926, a directory-traversal zero-day in Apex One that is already exploited in the wild and now on CISA's KEV list with a June 4 deadline. Its modest 6.7 CVSS score hides the real risk: a path to push malicious code to every managed endpoint.
An automated campaign called Megalodon pushed 5,718 malicious commits to 5,561 GitHub repositories in six hours, hiding secret-stealing payloads inside CI/CD workflow files. It weaponizes the merge — the most routine action in software development.
Trump Mobile confirmed customer names, email and mailing addresses, phone numbers, and order identifiers were exposed to the open internet, and attributed the incident to a third-party platform provider. The company said it is still evaluating whether it must notify affected customers.
Unit 42 is tracking Screening Serpens, an Iran-nexus APT that fuses DLL sideloading with AppDomainManager hijacking — manipulating .NET applications into switching off their own security mechanisms before deploying six new RATs across the U.S., Israel, and the UAE.
The Based Apparel merchandise site was pulled offline on May 22 after reports it served a ClickFix attack: a fake Cloudflare check whose 'copy' button placed a hidden shell command on the clipboard, then asked visitors to paste it into their own terminal.
Canadian authorities arrested Jacob Butler, 23, of Ottawa — known online as 'Dort' — the alleged operator of the KimWolf DDoS-for-hire botnet. The US has charged him and is seeking extradition. KimWolf allegedly grew to nearly two million infected devices.
A complete guide to the major types of cyberattacks — from malware and phishing to injection, credential, and AI-enabled attacks — and how to defend against each.
Cisco patched CVE-2026-20223, a CVSS 10.0 flaw in Cisco Secure Workload: insufficient authentication on internal REST API endpoints lets an unauthenticated attacker seize Site Admin — full control of the microsegmentation platform built to contain attackers.
A Europol- and Eurojust-coordinated operation dismantled First VPN — a service Europol calls the most widely used in the cybercrime underground — arresting an admin, seizing 33 servers, and identifying thousands of cybercrime-linked users. The intelligence yield is the story.
Lumen's Black Lotus Labs disclosed Showboat, a modular Linux backdoor a China-affiliated espionage operation has used to sit inside Middle East and Central Asia telecom networks for roughly four years. A SOCKS5-proxy foothold inside a carrier is a persistent window into a region's traffic.
Drupal shipped an out-of-band 'Highly Critical' fix for CVE-2026-9082, an unauthenticated SQL injection in Drupal core affecting every PostgreSQL-backed site. Maintainers warned exploits could land within hours — for a core flaw pre-announced on schedule, the patch window is effectively closed.
Qualys disclosed CVE-2026-46333 — 'ssh-keysign-pwn' — a nine-year-old Linux kernel ptrace flaw that gives an unprivileged user root. Its defining feature is credential theft: the exploit captures SSH keys and shadow-file password hashes, so a patched kernel does not end the exposure.
Microsoft patched UnDefend (CVE-2026-41091) and RedSun (CVE-2026-45498), two Defender zero-days exploited in the wild since April. Their purpose is the security tool itself — one escalates through Defender, the other disables it. Barracuda ties the wave to the researcher behind MiniPlasma.