- World's First AI-Driven Cyberattack Couldn't Breach OT Systemsby Nate Nelson (darkreading) on May 7, 2026 at 1:00 pm
The most sophisticated AI-integrated campaign to date hit a brick wall in the form of a SCADA login screen.
- 'TrustFall' Exposes Claude Code Execution Riskby Jai Vijayan (darkreading) on May 7, 2026 at 1:00 pm
Researchers find malicious repositories can trigger code execution in Claude Code with minimal or no user interaction.
- ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Storiesby info@thehackernews.com (The Hacker News) (The Hacker News) on May 7, 2026 at 11:33 am
Bad week. Turns out the easiest way to get hacked in 2026 is still the same old garbage: shady packages, fake apps, forgotten DNS junk, scam ads, and stolen logins getting dumped into Discord channels like it’s normal. Some of these attack chains don’t even feel sophisticated anymore. More like some tired guy with a Telegram account and too much free time. The worst part is how often this stuff
- Day Zero Readiness: The Operational Gaps That Break Incident Responseby info@thehackernews.com (The Hacker News) (The Hacker News) on May 7, 2026 at 10:54 am
Having an incident response retainer, or even a pre-approved external incident response firm, is not the same as being ready for an incident. A retainer means someone will answer the phone. Operational readiness determines whether that team can do meaningful work the moment they do. That distinction matters far more than many organizations realize. In the first hours of a security incident
- PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linuxby info@thehackernews.com (The Hacker News) (The Hacker News) on May 7, 2026 at 9:20 am
Cybersecurity researchers have discovered three packages on the Python Package Index (PyPI) repository that are designed to stealthily deliver a previously unknown malware family called ZiChatBot on Windows and Linux systems. "While these wheel packages do implement the features described on their PyPI web pages, their true purpose is to covertly deliver malicious files," Kaspersky
- vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Executionby info@thehackernews.com (The Hacker News) (The Hacker News) on May 7, 2026 at 4:15 am
A dozen critical security vulnerabilities have been disclosed in the vm2 Node.js library that could be exploited by bad actors to break out of the sandbox and execute arbitrary code on susceptible systems. vm2 is an open-source library used to run untrusted JavaScript code inside a secure sandbox by intercepting and proxying JavaScript objects to prevent sandboxed code from accessing the host
- Yet Another Way to Bypass Google Chrome's Encryption Protectionby Jai Vijayan (darkreading) on May 6, 2026 at 9:19 pm
Authors of the VoidStealer Trojan uncovered a way to get around Google's App-Bound Encryption (ABE), opening the door to infostealers.
- Instructure Breach Exposes Schools' Vendor Dependenceby Alexander Culafi (darkreading) on May 6, 2026 at 9:02 pm
ShinyHunters' attack on Instructure, which owns the widely used Canvas learning management system (LMS), carries big questions about the trust educational institutions put into their vendors.
- Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacksby info@thehackernews.com (The Hacker News) (The Hacker News) on May 6, 2026 at 8:21 pm
Cybersecurity researchers have exposed a new Mirai-derived botnet that self-identifies as xlabs_v1 and targets internet-exposed devices running Android Debug Bridge (ADB) to enlist them in a network capable of carrying out distributed denial-of-service (DDoS) attacks. Hunt.io, which detailed the malware, said it made the discovery after identifying an exposed directory on a Netherlands-hosted
- Security Experts Discuss Proposed Government Patching Deadlinesby algerj@bnpmedia.com (Jordyn Alger) (Cybersecurity News) on May 6, 2026 at 4:09 pm
U.S. cyber officials are considering shortening the deadline for fixing critical vulnerabilities in government IT, and security experts are sharing their thoughts.
- MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attackby info@thehackernews.com (The Hacker News) (The Hacker News) on May 6, 2026 at 1:00 pm
The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and Static Kitten) has been attributed to a ransomware attack in what has been described as a "false flag" operation. The attack, observed by Rapid7 in early 2026, has been found to leverage social engineering techniques via Microsoft Teams to initiate the infection sequence. Although the incident
- The Hacker News Launches 'Cybersecurity Stars Awards 2026' — Submissions Now Openby info@thehackernews.com (The Hacker News) (The Hacker News) on May 6, 2026 at 12:03 pm
For nearly 20 years, we at The Hacker News have mostly told scary stories about cyberspace — big hacks, broken systems, and new threats. But behind every headline, there’s a quieter, better story. It’s the story of leaders making tough calls under pressure, teams building smarter defenses, and security products that keep hunting threats 24/7 — even when it’s hard. Most of the time, this work is
- From Stuxnet to ChatGPT: 20 News Events That Shaped Cyberby Dark Reading Editorial Team (darkreading) on May 6, 2026 at 12:00 pm
As part of its 20th anniversary celebration, Dark Reading looks back on 20 of the biggest newsmaking events from the past two decades that influenced the risk landscape for today's cybersecurity teams.
- Your AI Agents Are Already Inside the Perimeter. Do You Know What They're Doing?by info@thehackernews.com (The Hacker News) (The Hacker News) on May 6, 2026 at 10:57 am
Analysts recently confirmed what identity security teams have quietly feared: AI agents are being deployed faster than enterprises can govern them. In their inaugural Market Guide for Guardian Agents, Gartner states that “enterprise adoption of AI agents is accelerating, outpacing maturity of governance policy controls.” Enterprise leaders can request access to the Gartner Market Guide for
- Attacks Abuse Windows Phone Link to Steal Texts & Bypass 2FAby Elizabeth Montalbano (darkreading) on May 6, 2026 at 10:30 am
In hard-to-detect attacks, hackers are dropping the CloudZ RAT and a fresh plug-in, Pheno, to hijack the Windows-based bridge between PCs and smartphones.















