Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Windows BitLocker zero-day gives access to protected drives, PoC released

    May 13, 2026

    CVE-2026-44572 | THREATINT

    May 13, 2026

    Exim security advisory (AV26-460) – Canadian Centre for Cyber Security

    May 13, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»InfoSec News Nuggets 05/12/2026
    News

    InfoSec News Nuggets 05/12/2026

    adminBy adminMay 13, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    TanStack, Mistral AI, UiPath Hit in Fresh Supply Chain Attack

    More than 170 NPM and PyPI packages were compromised in a new Mini Shai-Hulud supply chain campaign affecting TanStack, Mistral AI, UiPath, OpenSearch, Guardrails AI, and other projects. The malware targets developer credentials, API keys, cloud secrets, tokens, cryptocurrency wallets, and AI-related secrets, then attempts to spread through compromised NPM and GitHub Actions tokens. This matters because the attackers abused trusted build and release pipelines, which makes provenance and signed packages less useful if the underlying CI/CD workflow is already compromised.

     

    SAP fixes critical vulnerabilities in Commerce Cloud and S/4HANA

    SAP released its May 2026 security updates, fixing 15 vulnerabilities across multiple products, including critical flaws in Commerce Cloud and S/4HANA. One Commerce Cloud issue could allow unauthenticated code execution, while a critical S/4HANA flaw could let low-privileged attackers perform SQL injection and access sensitive database information. SAP says it hasn’t seen exploitation so far, but these systems often sit in business-critical retail, ERP, and financial workflows, so teams should prioritize patching and monitor for suspicious administrative or database activity.

     

    Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak

    Instructure said it reached an agreement with the group behind the Canvas breach to prevent the leak of stolen data affecting thousands of schools and universities. The company said the agreement covers impacted customers, that the data was returned, and that it received digital confirmation of destruction, though there’s never full certainty when dealing with extortion actors. This is a meaningful update because the incident has moved from breach response into downstream risk management, including phishing risk for students, staff, parents, and institutions whose data may have been exposed.

     

    UK water firm fined £1M after running Windows Server 2003

    The UK Information Commissioner’s Office fined South Staffordshire Water and its parent company £963,900 after attackers maintained access for 20 months and later published data belonging to more than 633,000 people. The regulator cited weak monitoring, unpatched systems, administrator-level access gained by attackers, and obsolete software, including Windows Server 2003. This matters for critical infrastructure operators because it shows how basic control failures can create long dwell time, large-scale data exposure, regulatory penalties, and public trust issues even when operational systems remain safe.

     

    Android banking Trojan TrickMo evolves using TON network for C2

    ThreatFabric researchers found a new TrickMo Android banking trojan variant that moved command-and-control traffic to The Open Network, making detection and takedown harder because it doesn’t rely on normal DNS and public internet infrastructure. The malware can steal banking and cryptocurrency credentials, intercept SMS codes, record screens, remotely control infected devices, and now perform network probing and proxy activity through the victim’s device. This matters because compromised phones can become fraud tools, MFA bypass points, and network pivot infrastructure, not just credential theft devices.

    The post InfoSec News Nuggets 05/12/2026 appeared first on AboutDFIR – The Definitive Compendium Project.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleMultiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
    Next Article ZDI-26-309: Microsoft Windows Message Queueing Double Free Local Privilege Escalation Vulnerability
    admin
    • Website

    Related Posts

    News

    Windows BitLocker zero-day gives access to protected drives, PoC released

    May 13, 2026
    News

    War and Data Centers Are Driving Up the Cost of Fiber-Optic Cable

    May 13, 2026
    News

    InfoSec News Nuggets 05/13/2026

    May 13, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202674 Views

    Defending Canada’s Digital Frontier: Combating Phishing, Social Engineering, Ransomware, and Malware

    March 23, 202624 Views

    IP Address Investigations and Local OSINT

    March 20, 202624 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202674 Views

    Defending Canada’s Digital Frontier: Combating Phishing, Social Engineering, Ransomware, and Malware

    March 23, 202624 Views

    IP Address Investigations and Local OSINT

    March 20, 202624 Views
    Our Picks

    Windows BitLocker zero-day gives access to protected drives, PoC released

    May 13, 2026

    CVE-2026-44572 | THREATINT

    May 13, 2026

    Exim security advisory (AV26-460) – Canadian Centre for Cyber Security

    May 13, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.