[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$feYZBlWUq2PXGDAhNt-d4AHEc15o84EXUAzhNFIvLNSA":3},{"items":4,"hasMore":292,"nextOffset":293},[5,14,18,22,26,29,38,42,50,54,62,70,78,82,90,94,98,102,105,113,117,121,129,133,137,145,153,161,165,169,177,185,189,193,197,204,208,213,221,229,237,244,247,250,254,258,262,269,277,284],{"type":6,"value":7,"context":8,"article":9},"cve","CVE-2026-42945","DoS in NGINX ngx_http_rewrite_module, CVSS 9.2, heap buffer overflow",{"id":10,"title":11,"url":12,"published_at":13},"72092131-732c-4da8-bc61-6603e9529ad1","F5 Patches Over 50 Vulnerabilities","https:\u002F\u002Fwww.securityweek.com\u002Ff5-patches-over-50-vulnerabilities\u002F","2026-05-14T10:47:58+00:00",{"type":6,"value":15,"context":16,"article":17},"CVE-2026-34176","BIG-IP remote command injection requiring authentication",{"id":10,"title":11,"url":12,"published_at":13},{"type":6,"value":19,"context":20,"article":21},"CVE-2026-41225","iControl REST privilege escalation, CVSS 8.6, requires Manager permissions",{"id":10,"title":11,"url":12,"published_at":13},{"type":6,"value":23,"context":24,"article":25},"CVE-2026-41957","BIG-IP RCE requiring authentication",{"id":10,"title":11,"url":12,"published_at":13},{"type":6,"value":27,"context":16,"article":28},"CVE-2026-39459",{"id":10,"title":11,"url":12,"published_at":13},{"type":30,"value":31,"context":32,"article":33},"malware","ModeloRAT","Python-based RAT (Pmanager.py) deployed via malicious PowerShell commands; collects system info, screenshots, and exfiltrates files",{"id":34,"title":35,"url":36,"published_at":37},"31f8929b-55a0-40d2-ac68-2f2f8273f283","KongTuke hackers now use Microsoft Teams for corporate breaches","https:\u002F\u002Fwww.bleepingcomputer.com\u002Fnews\u002Fsecurity\u002Fkongtuke-hackers-now-use-microsoft-teams-for-corporate-breaches\u002F","2026-05-14T12:12:40+00:00",{"type":30,"value":39,"context":40,"article":41},"ClickFix","Previous campaign in which ModeloRAT was observed being used",{"id":34,"title":35,"url":36,"published_at":37},{"type":30,"value":43,"context":44,"article":45},"Find My iPhone Off","Phishing kit used to access Apple iCloud accounts and disable Find My on stolen devices",{"id":46,"title":47,"url":48,"published_at":49},"e4ccef1b-9702-4a75-9091-9b670d042d7d","Your iPhone Gets Stolen. Then the Hacking Begins","https:\u002F\u002Fwww.wired.com\u002Fstory\u002Fyour-iphone-gets-stolen-then-the-hacking-begins\u002F","2026-05-14T10:00:00+00:00",{"type":30,"value":51,"context":52,"article":53},"iRealm","Phishing software that generates Apple service lookalike pages and links to bypass Find My iPhone protections",{"id":46,"title":47,"url":48,"published_at":49},{"type":30,"value":55,"context":56,"article":57},"0xEF_DellSupportAss_BUGCHECK_CRITICAL_PROCESS","BSOD error code triggered by Dell SupportAssist Remediation service v5.5.16.0",{"id":58,"title":59,"url":60,"published_at":61},"467cd5e9-95a4-4512-9cfa-0cc1592a25c6","Dell confirms its SupportAssist software causes Windows BSOD crashes","https:\u002F\u002Fwww.bleepingcomputer.com\u002Fnews\u002Fsoftware\u002Fdell-confirms-its-supportassist-software-causes-windows-bsod-crashes\u002F","2026-05-14T10:03:39+00:00",{"type":6,"value":63,"context":64,"article":65},"CVE-2026-41702","High-severity TOCTOU privilege escalation in VMware Fusion SETUID binary",{"id":66,"title":67,"url":68,"published_at":69},"3a025890-2ac1-42e1-8786-7b5553294a44","High-Severity Vulnerability Patched in VMware Fusion","https:\u002F\u002Fwww.securityweek.com\u002Fhigh-severity-vulnerability-patched-in-vmware-fusion\u002F","2026-05-14T08:42:25+00:00",{"type":30,"value":71,"context":72,"article":73},"CVE-Detector\u002F1.0","Scanner conducting reconnaissance of vulnerable PraisonAI endpoints within hours of disclosure",{"id":74,"title":75,"url":76,"published_at":77},"11eba9f7-511b-4c8d-b12d-fb7072a5a474","Hackers Targeted PraisonAI Vulnerability Hours After Disclosure","https:\u002F\u002Fwww.securityweek.com\u002Fhackers-targeted-praisonai-vulnerability-hours-after-disclosure\u002F","2026-05-14T09:45:53+00:00",{"type":6,"value":79,"context":80,"article":81},"CVE-2026-44338","Authentication bypass in PraisonAI versions 2.5.6 to 4.6.33 due to disabled Flask API authentication",{"id":74,"title":75,"url":76,"published_at":77},{"type":30,"value":83,"context":84,"article":85},"PROMPTSPY","Android backdoor using GeminiAutomationAgent for screen monitoring and automation",{"id":86,"title":87,"url":88,"published_at":89},"331342b7-e9ba-4f38-825a-8e308933303b","Google Says Hackers Used AI to Develop a Zero-Day Exploit","https:\u002F\u002Fhackread.com\u002Fgoogle-hackers-used-ai-develop-zero-day-exploit\u002F","2026-05-11T22:00:41+00:00",{"type":30,"value":91,"context":92,"article":93},"SANDCLOCK","Credential stealer used by TeamPCP to steal AWS keys and GitHub tokens",{"id":86,"title":87,"url":88,"published_at":89},{"type":30,"value":95,"context":96,"article":97},"wooyun-legacy","Collection of 85,000 old security cases used to train AI models for vulnerability scanning",{"id":86,"title":87,"url":88,"published_at":89},{"type":30,"value":99,"context":100,"article":101},"Strix","Agentic workflow tool used for multi-stage attacks",{"id":86,"title":87,"url":88,"published_at":89},{"type":30,"value":103,"context":100,"article":104},"Hexstrike",{"id":86,"title":87,"url":88,"published_at":89},{"type":6,"value":106,"context":107,"article":108},"CVE-2026-43284","xfrm-ESP Page-Cache Write vulnerability, part of Dirty Frag chain",{"id":109,"title":110,"url":111,"published_at":112},"296fb746-0313-429b-917b-3918597fbd0e","New Fragnesia Linux flaw lets attackers gain root privileges","https:\u002F\u002Fwww.bleepingcomputer.com\u002Fnews\u002Fsecurity\u002Fnew-fragnesia-linux-flaw-lets-attackers-gain-root-privileges\u002F","2026-05-14T07:34:19+00:00",{"type":6,"value":114,"context":115,"article":116},"CVE-2026-43500","RxRPC Page-Cache Write vulnerability, part of Dirty Frag chain",{"id":109,"title":110,"url":111,"published_at":112},{"type":6,"value":118,"context":119,"article":120},"CVE-2026-46300","Fragnesia Linux kernel privilege escalation vulnerability",{"id":109,"title":110,"url":111,"published_at":112},{"type":30,"value":122,"context":123,"article":124},"BlueHammer","Previous Windows Defender security defect exploited by threat actors before patches",{"id":125,"title":126,"url":127,"published_at":128},"872ede96-6681-4aec-bfe5-dc8a27160356","Researcher Drops YellowKey, GreenPlasma Windows Zero-Days","https:\u002F\u002Fwww.securityweek.com\u002Fresearcher-drops-yellowkey-greenplasma-windows-zero-days\u002F","2026-05-14T07:27:42+00:00",{"type":30,"value":130,"context":131,"article":132},"YellowKey","Windows zero-day BitLocker bypass exploit requiring physical access",{"id":125,"title":126,"url":127,"published_at":128},{"type":30,"value":134,"context":135,"article":136},"GreenPlasma","Windows zero-day privilege escalation to System level",{"id":125,"title":126,"url":127,"published_at":128},{"type":30,"value":138,"context":139,"article":140},"Shai-Hulud","Open source attack tooling released by TeamPCP for supply chain compromise, hosted on Breached CDN",{"id":141,"title":142,"url":143,"published_at":144},"49be262e-42e8-4a01-86c9-b1df7e1fd541","TeamPCP and BreachForums Launch $1,000 Contest for Supply Chain Attacks","https:\u002F\u002Fsocket.dev\u002Fblog\u002Fteampcp-supply-chain-attack-contest?utm_medium=feed","2026-05-14T02:49:33.417+00:00",{"type":30,"value":146,"context":147,"article":148},"PhantomCore","Pro-Ukrainian hacktivist group conducting exploit chain attacks against TrueConf",{"id":149,"title":150,"url":151,"published_at":152},"18dea66d-7d77-4079-b593-29dce63475ad","PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks","https:\u002F\u002Fthehackernews.com\u002F2026\u002F04\u002Fphantomcore-exploits-trueconf.html","2026-04-27T11:54:00+00:00",{"type":30,"value":154,"context":155,"article":156},"Nitrogen","Ransomware operation; first surfaced 2023 as loader deploying BlackCat\u002FALPHV; later developed own strain from leaked Conti 2 builder",{"id":157,"title":158,"url":159,"published_at":160},"a41c1a0a-77ba-4e1c-b36a-abe23a97019f","Foxconn confirms cyberattack claimed by Nitrogen ransomware gang","https:\u002F\u002Fwww.bleepingcomputer.com\u002Fnews\u002Fsecurity\u002Felectronics-giant-foxconn-confirms-cyberattack-on-north-american-factories\u002F","2026-05-13T12:49:54+00:00",{"type":30,"value":162,"context":163,"article":164},"BlackCat\u002FALPHV","Ransomware payload deployed by early Nitrogen operations in 2023",{"id":157,"title":158,"url":159,"published_at":160},{"type":30,"value":166,"context":167,"article":168},"Conti 2","Leaked ransomware builder code used by Nitrogen to develop own strain",{"id":157,"title":158,"url":159,"published_at":160},{"type":30,"value":170,"context":171,"article":172},"Mini Shai-Hulud","Supply chain attack campaign targeting npm and PyPI packages",{"id":173,"title":174,"url":175,"published_at":176},"2b1f8903-1d8f-47b8-9c1f-de08f4c53cdd","TeamPCP Claims Sale of Mistral AI Repositories Amid Mini Shai-Hulud Attack","https:\u002F\u002Fhackread.com\u002Fteampcp-mistral-ai-repositories-mini-shai-hulud-attack\u002F","2026-05-14T00:37:05+00:00",{"type":30,"value":178,"context":179,"article":180},"Shai Hulud worm","Open-sourced worm used in supply chain attack competition with $1,000 USD prize",{"id":181,"title":182,"url":183,"published_at":184},"8ac27af4-850b-4732-82ba-eae17c80509b","Daily Dose of Dark Web Informer - May 13th, 2026","https:\u002F\u002Fdarkwebinformer.com\u002Fdaily-dose-of-dark-web-informer-may-13th-2026\u002F","2026-05-13T22:37:29+00:00",{"type":30,"value":186,"context":187,"article":188},"INC Ransom Ransomware","Claimed attack on Silergy Corp",{"id":181,"title":182,"url":183,"published_at":184},{"type":30,"value":190,"context":191,"article":192},"PayoutsKing Ransomware","Used in attack on NTN Bearing Corporation; exfiltrated 596 GB including US Army JLTV Program documents",{"id":181,"title":182,"url":183,"published_at":184},{"type":30,"value":194,"context":195,"article":196},"Nitrogen Ransomware","Attack on Foxconn",{"id":181,"title":182,"url":183,"published_at":184},{"type":30,"value":170,"context":198,"article":199},"Self-propagating worm used to poison npm and PyPI packages",{"id":200,"title":201,"url":202,"published_at":203},"a62e43bc-e9fa-4817-be52-e94631f4d3be","TeamPCP Used Mini Shai-Hulud Worm to Poison Over 400 npm and PyPI Packages","https:\u002F\u002Fhackread.com\u002Fteampcp-mini-shai-hulud-worm-npm-pypi-packages\u002F","2026-05-13T15:18:47+00:00",{"type":30,"value":205,"context":206,"article":207},"router_init.js","2.2MB obfuscated credential-stealer deployed via Bun runtime in Mistral AI packages",{"id":200,"title":201,"url":202,"published_at":203},{"type":209,"value":210,"context":211,"article":212},"domain","git-tanstack.com","C2 domain hosting malicious transformers.pyz dropper payload",{"id":200,"title":201,"url":202,"published_at":203},{"type":30,"value":214,"context":215,"article":216},"The Gentlemen","RaaS ransomware gang exposed via data leak and OPSEC failure",{"id":217,"title":218,"url":219,"published_at":220},"6365e0df-5485-490b-a20b-af8f098fc664","Tables Turn on 'The Gentlemen' RaaS Gang With Data Leak","https:\u002F\u002Fwww.darkreading.com\u002Fthreat-intelligence\u002Fgentlemen-raas-gang-data-leak","2026-05-13T20:47:46+00:00",{"type":30,"value":222,"context":223,"article":224},"RubyGems malicious packages (unspecified)","Packages published to RubyGems repository containing scraper code targeting UK government servers",{"id":225,"title":226,"url":227,"published_at":228},"296ff0d7-dcaf-4b95-9797-2f1c205e5bdb","Attackers Weaponize RubyGems for Data Dead Drops","https:\u002F\u002Fwww.darkreading.com\u002Fapplication-security\u002Fattackers-weaponize-rubygems-data-dead-drops","2026-05-13T21:09:20+00:00",{"type":6,"value":230,"context":231,"article":232},"CVE-2026-45185","Critical user-after-free vulnerability in Exim mail transfer agent affecting versions 4.97–4.99.2 with GnuTLS, allowing unauthenticated RCE",{"id":233,"title":234,"url":235,"published_at":236},"0cd6dfea-48a1-4923-9d8e-98e8ede4162d","New critical Exim mailer flaw allows remote code execution","https:\u002F\u002Fwww.bleepingcomputer.com\u002Fnews\u002Fsecurity\u002Fnew-critical-exim-mailer-flaw-allows-remote-code-execution\u002F","2026-05-13T20:23:50+00:00",{"type":30,"value":122,"context":238,"article":239},"Local privilege escalation zero-day previously disclosed",{"id":240,"title":241,"url":242,"published_at":243},"3fd3bc5c-2676-4a16-a6bc-b89d2f444d74","Windows BitLocker zero-day gives access to protected drives, PoC released","https:\u002F\u002Fwww.bleepingcomputer.com\u002Fnews\u002Fsecurity\u002Fwindows-bitlocker-zero-day-gives-access-to-protected-drives-poc-released\u002F","2026-05-13T16:37:49+00:00",{"type":30,"value":130,"context":245,"article":246},"BitLocker bypass vulnerability affecting Windows 11 and Server 2022\u002F2025",{"id":240,"title":241,"url":242,"published_at":243},{"type":30,"value":134,"context":248,"article":249},"Windows CTFMON privilege escalation vulnerability",{"id":240,"title":241,"url":242,"published_at":243},{"type":6,"value":251,"context":252,"article":253},"CVE-2026-33825","BlueHammer local privilege escalation zero-day previously disclosed by Chaotic Eclipse",{"id":240,"title":241,"url":242,"published_at":243},{"type":30,"value":255,"context":256,"article":257},"RedSun","Local privilege escalation zero-day silently patched by Microsoft without CVE assignment",{"id":240,"title":241,"url":242,"published_at":243},{"type":30,"value":259,"context":260,"article":261},"Chaotic Eclipse \u002F Nightmare-Eclipse","Threat actor \u002F security researcher releasing Windows zero-day exploits",{"id":240,"title":241,"url":242,"published_at":243},{"type":30,"value":154,"context":263,"article":264},"Ransomware group claiming responsibility for Foxconn attack; active since late 2024",{"id":265,"title":266,"url":267,"published_at":268},"e72e31d9-9a42-4238-a1b4-bb083d8379c1","Foxconn Confirms North American Factories Hit by Cyberattack","https:\u002F\u002Fwww.securityweek.com\u002Ffoxconn-confirms-north-american-factories-hit-by-cyberattack\u002F","2026-05-13T17:13:36+00:00",{"type":30,"value":270,"context":271,"article":272},"PayoutsKing","Ransomware group responsible for NTN Bearing Corporation attack and data exfiltration",{"id":273,"title":274,"url":275,"published_at":276},"5bed6727-5b70-4039-b895-b550a313e2bf","‼️🇺🇸 NTN Bearing Corporation of America Allegedly Hit by PayoutsKing Ransomware: 596 GB Exfiltr...","https:\u002F\u002Fx.com\u002FDarkWebInformer\u002Fstatus\u002F2054617508674421210","2026-05-13T17:39:21+00:00",{"type":30,"value":154,"context":278,"article":279},"Ransomware variant used in attack against Foxconn",{"id":280,"title":281,"url":282,"published_at":283},"2e7925bf-ce09-4d0a-a37c-8fe67ead6036","‼️🇹🇼 FOXCONN has fallen victim to Nitrogen Ransomware\n\nData: 8TB over 11 Million files\n\nStop gu...","https:\u002F\u002Fx.com\u002FDarkWebInformer\u002Fstatus\u002F2054613247941038255","2026-05-13T17:22:25+00:00",{"type":30,"value":285,"context":286,"article":287},"ChimeraZ","Threat actor responsible for Akitatek data breach",{"id":288,"title":289,"url":290,"published_at":291},"1ab45c4a-5862-49e2-ba35-39d644ac20ce","Akitatek Allegedly Breached Exposing 5,400 Customer Records From the French IT Services and Electronics Repair Company","https:\u002F\u002Fdarkwebinformer.com\u002Fakitatek-allegedly-breached-exposing-5-400-customer-records-from-the-french-it-services-and-electronics-repair-company\u002F","2026-05-13T16:14:49+00:00",true,50]