🛡️ AI News Hunt

Home News About

Live · Last updated: May 16, 2026, 6:28 AM UTC

AI News

MIT Tech Review

The World Health Organization has published its 2026 global health statistics report, which assesses progress towards health targets set in 2015. The report indicates that the world is on track to miss its health targets.

AI Security

The Hacker News

Cybersecurity researchers have disclosed four security flaws in OpenClaw, collectively known as "Claw Chain," which can enable data theft, privilege escalation, and persistence. The flaws can be chained to allow an attacker to establish a foothold, expose sensitive data, and plant backdoors.

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-20182, a critical authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller, to its Known Exploited Vulnerabilities (KEV) catalog. FCEB agencies are required to remediate the issue by May 17, 2026.

The Hacker News

Ghostwriter, a Belarus-aligned threat group, has been linked to a series of attacks targeting Ukrainian government organizations using geofenced PDF phishing and Cobalt Strike. Ghostwriter has been active since at least 2016 and has been tracked under various monikers, including FrostyNeighbor, PUSHCHA, Storm-0257, TA445, and UAC-0057.

Cyber Attacks

BleepingComputer

A critical vulnerability in the Funnel Builder WordPress plugin is being actively exploited to inject malicious JavaScript snippets into WooCommerce checkout pages. This vulnerability allows attackers to potentially steal credit card information.

BleepingComputer

Competitors at Pwn2Own Berlin 2026 exploited zero-day vulnerabilities in Windows 11 and Microsoft Exchange, collecting a total of $385,750 in cash awards. The vulnerabilities were among 15 unique zero-day vulnerabilities found in multiple products.

BleepingComputer

The REMUS infostealer has evolved to prioritize the theft of browser sessions and authentication tokens, which are becoming increasingly valuable. This infostealer is designed for operational scalability, suggesting it is intended for large-scale malicious activities.

BleepingComputer

Microsoft has identified a high-severity Exchange Server vulnerability that allows threat actors to execute arbitrary code via cross-site scripting (XSS). The vulnerability has been exploited in attacks targeting Outlook on the web users.

BleepingComputer

The TeamPCP hacker group is advertising Mistral AI code repositories for sale, threatening to leak the source code if a buyer is not found. The sale involves the Mistral AI project's source code repositories.

Latest Breaches

Krebs on Security

This month's Patch Tuesday saw widely-used software makers, including Apple, Google, Microsoft, Mozilla, and Oracle, fix near-record volumes of security bugs. Artificial intelligence platforms have been effective in identifying vulnerabilities in human-made computer code.

Krebs on Security

A data extortion attack on the Canvas education technology platform has disrupted classes and coursework at US schools and universities. The attack, which defaced the login page with a ransom demand, claims to involve data from 275 million students and faculty across nearly 9,000 institutions.

Krebs on Security

A Brazilian DDoS protection firm enabled a botnet that launched massive DDoS attacks against other network operators in Brazil. The firm's CEO attributes the malicious activity to a security breach, possibly orchestrated by a competitor.

Krebs on Security

Tyler Robert Buchanan, a 24-year-old British national, has pleaded guilty to wire fraud conspiracy and aggravated identity theft. He admitted involvement in text-message phishing attacks in 2022 that targeted major technology companies and resulted in the theft of tens of millions of dollars worth of cryptocurrency.

Krebs on Security

Microsoft released 167 security updates to address vulnerabilities in Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender. Additionally, Google Chrome fixed its fourth zero-day of 2026 and Adobe Reader received an emergency update to address an actively exploited flaw.

Krebs on Security

Russian hackers linked to military intelligence units are exploiting known flaws in older internet routers to steal Microsoft Office authentication tokens. The campaign has affected over 18,000 networks, allowing hackers to quietly harvest authentication tokens without deploying malicious software or code.

Krebs on Security

Daniil Maksimovich Shchukin, a 31-year-old Russian, has been identified as the head of the Russian ransomware groups GandCrab and REvil, operating under the handle "UNKN". He is accused of carrying out at least 130 acts of computer sabotage and extortion against victims in Germany between 2019 and 2021.

Krebs on Security

A financially motivated group has launched a "CanisterWorm" wiper attack targeting Iran, spreading through poorly secured cloud services. The attack affects systems using Iran's time zone or with Farsi set as the default language.

Krebs on Security

The U.S. Justice Department, along with authorities in Canada and Germany, has disrupted the online infrastructure behind four IoT botnets: Aisuru, Kimwolf, JackSkid, and Mossad. These botnets, comprised of over three million hacked IoT devices, are responsible for recent record-breaking DDoS attacks.

Ransomware & Malware

BleepingComputer

An 18-year-old vulnerability in the NGINX open-source web server has been discovered, allowing for denial of service and potential remote code execution. The flaw was found using an autonomous scanning system.

Security Affairs

ESET researchers have uncovered new activity from the APT group FrostyNeighbor, also known as Ghostwriter, targeting Ukrainian government organizations since at least March 2026. The campaign is similar to previous FrostyNeighbor campaigns.

Security Affairs

Researchers Chaotic Eclipse, also known as Nightmare-Eclipse, have disclosed two Windows zero-day vulnerabilities, YellowKey and GreenPlasma, affecting BitLocker and the CTFMON framework. The flaws allow attackers to bypass BitLocker protections and exploit the CTFMON framework.

Vulnerabilities & CVEs

The Hacker News

Threat actors have been observed attempting to exploit CVE-2026-44338, a missing authentication vulnerability in PraisonAI with a CVSS score of 7.3, within four hours of its public disclosure. CVE-2026-44338 exposes sensitive endpoints to anyone, potentially allowing an attacker to invoke unauthorized actions.

The Hacker News

AI hallucinations are introducing serious security risks into critical infrastructure decision-making by generating highly confident yet incorrect outputs. These outputs occur when an AI model lacks certainty and generates the most probable response based on patterns in its training data.

The Hacker News

An anonymous researcher, known by the alias Chaotic Eclipse, has disclosed two zero-day vulnerabilities affecting Windows: a BitLocker bypass and a privilege escalation in the Windows Collaborative Translation Framework (CTFMON). The vulnerabilities have been codenamed YellowKey and GreenPlasma.

The Hacker News

Cybersecurity researchers have disclosed a critical 18-year-old flaw in the ngx_http_rewrite_module of NGINX Plus and NGINX Open, which could enable unauthenticated remote code execution (CVE-2026-42945). The vulnerability has a CVSS v4 score of 9.2.

The Hacker News

Azerbaijani oil and gas company was targeted by a threat actor with affiliations to China in a "multi-wave intrusion" between late December 2025 and late February 2026. The activity was attributed to a hacking group known as FamousSparrow (aka UAT-9244) with moderate-to-high confidence.

The Hacker News

Security teams have improved visibility into their environments, but struggle to confirm the effectiveness of remediation efforts, with median time to remediate edge device vulnerabilities at 32 days. The mean time to exploit vulnerabilities is estimated to be negative seven days, according to the Mandiant's M-Trends 2026 report and Verizon's 2025 DBIR.

Cybersecurity Trends

Cloud & DevSecOps

AWS Security Blog

AWS has introduced the PQC Readiness Scanner, an automated tool that inventories and continuously monitors TLS configurations for Post-quantum cryptography (PQC) readiness across Application Load Balancer (ALB), Network Load Balancer (NLB), and Amazon API Gateway endpoints. The tool helps users understand their current TLS endpoint inventory and posture.

AWS Security Blog

Amazon Web Services (AWS) is enabling AI sovereignty for customers, allowing them control over their data and choices for how and where it is used. This move aims to unlock the full potential of cloud and AI technologies.

AWS Security Blog

AWS has released a monthly digest post featuring the latest security features, compliance updates, and hands-on resources. The April 2026 AWS Security Blog posts covered topics such as AI security, identity and access management, threat intelligence, data protection, and multicloud operations.

Privacy & Surveillance

EFF

There is no explicit information in the provided snippet about the topic of a "Hackers Guide to Circumventing Internet Shutdowns". However, based on the title, a possible factual summary for a tech audience could be: A "Hackers Guide to Circumventing Internet Shutdowns" is a topic that may be discussed, but no specific information is provided in the snippet.

EFF

The Electronic Frontier Foundation (EFF) filed an amicus brief in the U.S. Court of Appeals for the Fourth Circuit arguing that electronic device searches at the border require a warrant. The brief was filed alongside other organizations including the national ACLU and the National Association of Criminal Defense Lawyers (NACDL).

IT Industry

The Register

Anthropic, the maker of the Claude AI model, is urging the US government to implement stricter controls on chip and model exports to prevent China from advancing its AI capabilities. This warning is based on concerns that authoritarian regimes could set the rules for AI development unless the US takes action.

The Register

A vulnerability in Exchange Server has been exploited, allowing attackers to use Outlook Web Access (OWA) inboxes as script launchpads. Microsoft has released a mitigation to address the issue, but it may cause problems with inline images and calendar printing until a proper patch is available.

Open Source & Dev Tools

GitHub Blog

In April 2026, GitHub experienced 10 incidents that resulted in degraded performance across its services. These incidents affected GitHub's overall availability.

GitHub Blog

GitHub has published a post titled "GitHub for Beginners: Getting started with OSS contributions" on their blog, which aims to help users find opportunities to contribute to the open source community. The post is available on GitHub's developer skills section.

Threat Intelligence

Unit 42

Security leaders are seeking answers on the next steps in the new age of frontier AI, with questions being addressed in a recent post. A post titled "Frontier AI and the Future of Defense: Your Top Questions Answered" aims to answer the top 10 questions customers are asking.

NIST & Frameworks

Cybersecurity Insights

Verifiable digital credential issuance involves structuring and sharing credentials, such as mobile driver's licenses (mDLs), using formats like ISO/IEC 18013-5 and -7 mobile documents (mdocs) or W3C Verifiable Credentials (VCs). The issuance process is a crucial step in creating functional digital credentials.

Cybersecurity Insights

The NIST Cyber AI Profile Workshop received input on the Preliminary Draft in January, which is informing the development of the next draft. A full workshop summary capturing themes and highlights is being prepared for publication.

Cybersecurity Insights

The Cybersecurity Framework (CSF) 2.0 was published in 2024, marking two years since its release. The CSF 2.0 included the addition of a Govern Function and other updates.

Cybersecurity Insights

Data Privacy Week is a global initiative led by the National Cybersecurity Alliance to spread awareness about online privacy and empower individuals and businesses to respect privacy, safeguard data, and enable trust. The NIST Privacy Engineering Program is reflecting on its recent work and looking ahead to future collaborations with its privacy stakeholder community in 2026.

Cybersecurity Insights

Rodney Petersen has served as the Director of NICE at NIST for the past eleven years, focusing on advancing cybersecurity education and workforce development. He will be retiring from federal government service at the end of the 2025 calendar year.

Cybersecurity Insights

NIST has released Revision 4 of Special Publication 800-63, Digital Identity Guidelines, which is the culmination of a nearly four-year collaborative process involving foundational research, public drafts, and over 6,000 comments. This revision aims to address changes in the digital landscape since the last update.

Regulatory Compliance

Infosecurity Magazine

Microsoft has reported a severe zero-day flaw in on-premises installations of Exchange Server, specifically affecting versions 2016, 2019, and Subscription Edition. The vulnerability is present in all versions of these Exchange Server iterations.

Government & Policy

All CISA Advisories

CISA has added CVE-2026-42897, a Microsoft Exchange Server Cross-Site Scripting Vulnerability, to its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation. This vulnerability is a frequent attack vector.

All CISA Advisories

Siemens ROS# contains a path traversal vulnerability in its file_server service prior to version 2.2.2, allowing an attacker to access arbitrary files with the user's rights. A new version, 2.2.2, has been released to address this issue.

All CISA Advisories

Siemens gPROMS Web Applications Publisher (gWAP) is affected by a remote code execution vulnerability due to a third-party component, specifically the Axios HTTP client library. The vulnerability allows a "Gadget" attack chain that enables prototype pollution in other third-party libraries.

All CISA Advisories

Siemens SIMATIC CN 4100 contains multiple vulnerabilities that could potentially lead to a compromise in availability, integrity, and confidentiality. Siemens recommends updating to the latest version of SIMATIC CN 4100 to address these vulnerabilities.

All CISA Advisories

Siemens Ruggedcom Rox contains an input validation vulnerability in its Scheduler functionality that could allow an authenticated remote attacker to execute arbitrary commands. Siemens has released new versions to address this vulnerability and recommends updating to the latest versions.

All CISA Advisories

Siemens Ruggedcom Rox versions prior to v2.17.1 contain multiple third-party vulnerabilities. Affected versions include RUGGEDCOM ROX MX5000 with vers:intdot/<2.17.1.

All CISA Advisories

Simcenter Femap is affected by a heap-based buffer overflow vulnerability in the Datakit library, which can be triggered when the application reads files in IPT format. This vulnerability could allow an attacker to perform remote code execution.

All CISA Advisories

Universal Robots Polyscope 5 versions prior to 5.25.1 are affected by vulnerabilities that could allow an attacker to bypass authentication and execute code. Successful exploitation of these vulnerabilities could have security implications.

All CISA Advisories

Siemens Ruggedcom Rox contains an input validation vulnerability that could allow an authenticated remote attacker to execute arbitrary commands with root privileges. Siemens has released new versions for the affected products and recommends updating to the latest version.

All CISA Advisories

Siemens Teamcenter is affected by multiple vulnerabilities that could compromise availability, integrity, and confidentiality. Siemens has released new versions for the affected products and recommends updating to the latest versions.

Zero-Day Exploits

The Hacker News

A new variant of the TrickMo Android banking trojan has been observed using The Open Network (TON) for command-and-control (C2) and SOCKS5 to create Android network pivots. This variant was actively targeting banking and cryptocurrency wallet users in France, Italy, and Austria between January and February 2026.

The Hacker News

Agentic AI is currently running in production environments across many organizations, executing tasks and consuming data without significant security involvement. The industry conversation around agentic AI has focused on policy decisions such as allowing or restricting its use.

The Hacker News

Instructure, the parent company of Canvas, has reached an agreement with the decentralized cybercrime group ShinyHunters to stop the leak of 3.65TB of stolen information. The agreement was made after ShinyHunters breached Instructure's network and threatened to release the stolen data from thousands of schools and universities.

Nation-State Attacks

Mandiant

Google Threat Intelligence Group has tracked an expansive extortion campaign by UNC6671, a threat actor operating under the "BlackFile" brand. The campaign involves vishing, a type of phishing attack that uses phone calls.

Mandiant

There is not enough information provided to create a factual summary for a tech audience. The content appears to be an introduction to a guide about vSphere and BRICKSTORM malware, but it does not contain any technical information.

Dark Web & Underground

Security Affairs

Broadcom released a security update for VMware Fusion to address a high-severity vulnerability, CVE-2026-41702, which could allow local attackers to escalate privileges to root on affected systems. The flaw is a time-of-check time-of-use (TOCTOU) vulnerability.

AI/ML Security Research

The Hacker News

A purple team, intended to simulate real-world attacks, often consists of a blue team and a red team working together in the same room, rather than being a distinct entity. This setup can hinder the effectiveness of the purple team due to the limitations and inefficiencies of the system it operates within.

The Hacker News

A critical security vulnerability, tracked as CVE-2026-7482, has been discovered in Ollama, allowing a remote, unauthenticated attacker to leak its entire process memory. The flaw, codenamed Bleeding Llama, has a CVSS score of 9.1 and is estimated to impact over 300,000 servers globally.

The Hacker News

cPanel has released updates to address three vulnerabilities in cPanel and Web Host Manager (WHM), including CVE-2026-29201, CVE-2026-29202, and CVE-2026-29203. The vulnerabilities could be exploited to achieve privilege escalation, code execution, and denial-of-service.

IoT & OT Security

The Hacker News

Palo Alto Networks has disclosed a critical security flaw, CVE-2026-0300, in its PAN-OS software, which is a buffer overflow vulnerability in the User-ID Authentication Portal service. This vulnerability has a CVSS score of 9.3/8.7 and could allow an unauthenticated attacker to gain root access.

Quantum & Cryptography

Schneier on Security

There is no specific tech-related information provided in the given text. However, it mentions a blog moderation policy update at Schneier's blog, stating that a new policy has been implemented.

Schneier on Security

Some AI-based video age-verification checks can be bypassed using a fake mustache. This method has been reported to successfully fool certain age-verification systems.

Schneier on Security

A speaker is scheduled to give a virtual talk on "The Security of Trust in the Age of AI" hosted by the Financial Women's Association of New York on May 21, 2026, at 6:00 PM ET. They will also speak at the Potsdam Conference on National Cybersecurity at the Hasso Plattner Institut in Potsdam, Germany, from June 24- (exact date not specified).

Schneier on Security

Anthropic's Claude Mythos Preview AI model is capable of finding security vulnerabilities in software. The company has chosen not to release it to the general public, instead making it available to a select group of companies to scan and fix their own software.

Schneier on Security

A Linux kernel vulnerability known as "copy.fail" (CVE-2026-31431) has been disclosed, allowing for local privilege escalation. The vulnerability exploits the kernel crypto API and splice() function to write data into the page cache of a file.

Schneier on Security

Researchers have found that Large Language Models (LLMs) are effective at hiding text messages within other text messages using a technique called text-in-text steganography. This is based on a study published at arxiv.org with the reference 2510.20075.

Schneier on Security

Analysis by the Anti-Corruption Data Collective found that long-shot bets on Polymarket had an average win rate of around 52 percent in markets on military and defense actions. Long-shot bets on Polymarket are defined as wagers of $2,500 or more at odds of 35 percent or less.

Schneier on Security

ICE is developing its own version of smart glasses that incorporates facial recognition technology. The smart glasses will be linked to various databases.

Healthcare Security

Infosecurity Magazine

ReliaQuest researchers have identified a combination of open-source tools, specifically ClickFix and PySoxy proxying, being used by attackers to maintain persistent access. This exploitation of open-source tools allows attackers to maintain access after an initial social engineering attack.

Financial Security

SecurityWeek

OpenAI was hit by a TanStack supply chain attack, resulting in two employee devices being compromised and credential material being stolen from their code repositories. The attack targeted OpenAI's code repositories.

Critical Infrastructure

All CISA Advisories

Siemens Solid Edge SE2026 before Update 5 is vulnerable to two file parsing vulnerabilities that can be triggered when reading specially crafted PAR files. A new version has been released to address these vulnerabilities.

All CISA Advisories

A vulnerability was discovered in the web server of the Siemens SENTRON 7KT PAC1261 Data Manager, specifically in versions before V2.1.0, which could allow an attacker to retrieve authorization tokens. Siemens has released a new version to address this issue.

All CISA Advisories

Siemens Opcenter RDnL is affected by a missing authentication vulnerability in the 'ActiveMQ Artemis' critical function. An unauthenticated attacker within the adjacent network can use the Core protocol to force a target broker to establish an outbound connection to a rogue broker.

All CISA Advisories

Siemens' Ruggedcom Rox product contains an improper access control vulnerability that allows an authenticated remote attacker to read arbitrary files with root privileges. Siemens has released new versions to address this issue and recommends updating to the latest versions.

All CISA Advisories

Siemens SIMATIC S7 PLCs contain multiple vulnerabilities in their web server that could allow cross-site scripting attacks. Siemens has released new versions for affected products and recommends updating to the latest versions.

All CISA Advisories

CISA has added CVE-2026-20182, a Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability, to its Known Exploited Vulnerabilities (KEV) Catalog due to evidence of active exploitation.

All CISA Advisories

Siemens SIMATIC HMI Unified Comfort Panels before V21.0 have a vulnerability that allows an unauthenticated attacker to access the web browser via the help link. This vulnerability can be exploited if the web browser is not protected by security mechanisms.

All CISA Advisories

Siemens Industrial Devices have released new versions to address a vulnerability that could allow an attacker to cause a denial of service condition. The affected products require updating to the latest versions to mitigate the issue.

All CISA Advisories

Siemens SIPROTEC 5 devices have a vulnerability where they do not use sufficiently random numbers to generate session identifiers, potentially allowing a brute-force attack. This could enable an unauthenticated remote attacker to hijack a valid user session.

All CISA Advisories

A vulnerability in Fuji Electric Tellus version 5.0.2 allows an attacker to elevate privileges from user to system, potentially enabling temporary denial of service, file opening, or file deletion. The affected version is Tellus 5.0.2.

Security Tools & Research

Unit 42

Unit 42 research indicates that frontier AI models can enhance vulnerability discovery, acting as full-spectrum security researchers. These models enable autonomous zero-day discovery and faster N-day patching.

Unit 42

Unit 42 has discovered "Agent God Mode" in Amazon Bedrock AgentCore, which grants broad IAM permissions. This vulnerability poses risks of privilege escalation and data exfiltration.

Check Point Research

The Gentlemen is a relatively new ransomware-as-a-service (RaaS) operation that emerged around mid-2025, advertising its service across multiple underground forums. Its operators invite penetration testers and other technically skilled actors to join as affiliates.

Check Point Research

Instructure, a US education technology company behind the Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. Exposed data reportedly includes student and staff records and private messages.

Check Point Research

In Q1 2026, over 70 active data leak sites listed 2,122 new ransomware victims, representing a 12.2% decline from the previous quarter's record. This figure is the second-highest Q1 on record, with a 117% increase compared to the same period in previous years.

Check Point Research

Medtronic, a global medical device maker, has disclosed a cyberattack on its corporate IT systems, with an unauthorized party accessing data. The company reported no impact on its products, operations, or financial systems.

Check Point Research

VECT Ransomware is a Ransomware-as-a-Service (RaaS) program that first appeared in December 2025 on a Russian-language cybercrime forum. It claimed its first two victims in January 2026.

Bug Bounty & Disclosure