Cyber Security News

Start. Stay. Grow.

Curated daily. The latest hacks, breaches, and cyber trends—humanized.

Daily cyber brief

Hacking Editorial Brief: May 20, 2026

## GitHub Breach and ShinyHunters Activity

GitHub confirmed a significant security incident affecting approximately 3,800 internal repositories after an employee device was compromised through a malicious Visual Studio Code extension. The threat actor group TeamPCP has claimed possession of source code from roughly 4,000 private repositories and is demanding a minimum of $50,000, with reports indicating the stolen data is being auctioned on dark web forums with bids reaching over $100,000. The breach underscores supply chain risks inherent in developer tooling ecosystems, particularly browser extensions and IDE plugins that have elevated access to sensitive code repositories.

In a separate but notable campaign, the prolific threat actor ShinyHunters has reportedly targeted a cybersecurity firm that advises ransomware victims against paying extortions — a move that appears deliberately ironic. The group, previously linked to breaches of educational platforms including Canvas, continues demonstrating their capability to compromise high-value targets across sectors. Meanwhile, a newly disclosed heap buffer overflow vulnerability in NGINX (CVE-2026-42945) affecting versions 0.6.27 through 1.30.0 is now under active exploitation, posing immediate risk to organizations running vulnerable NGINX Plus and Open Source instances. On the competition front, DEVCORE researchers successfully exploited four Microsoft products at Pwn2Own Berlin 2026, demonstrating advanced zero-day capabilities in a controlled environment.


Sources: SecurityWeek · The Hacker News · PCMag · MyBroadband

Around the Web

Last Updated: N/A

Hacker icon

Hacks + Heists

NGINX Vulnerability CVE-2026-42945 Under Active Exploitation

A newly disclosed security flaw impacting NGINX Plus and NGINX Open is under active exploitation, tracked as CVE-2026-42945, a heap buffer overflow af...

Read more →

Hackers Claim Access to 4,000 GitHub Repositories, Demand $50,000 | Binance News on ...

Hackers from TeamPCP have reportedly accessed source code from approximately 4000 private repositories on GitHub, according to Foresight News.

Read more →

ShinyHunters Goes After Cybersecurity Firm Warning Victims Not to Pay Ransoms | PCMag

... hacking Canvas, an online educational system used by thousands of universities and schools in the US. The hackers posted an extortion note on ...

Read more →

Analysis-Fears of unfettered hacking spurred by Anthropic's Mythos AI model overstated

By AJ Vicens May 20 (Reuters) - Early fears that Anthropic's new AI model, Mythos, could dramatically turbocharge hacking are looking overstated a ...

Read more →

US cyber agency CISA exposed reams of passwords and cloud keys to the open web

The federal cybersecurity agency left plaintext passwords in a spreadsheet uploaded to a public GitHub repository, per a report by independent ...

Read more →
Cybersecurity icon

Big Cyber

Senator Hassan Presses for Answers on Major Reported Data Leak at Leading ...

... Cybersecurity and Infrastructure Security Agency (CISA) maintained lists of agency accounts and passwords on a public database. Senator Hassan ...

Read more →

Sen. Rick Scott Introduces Bill to Strengthen American Cybersecurity Infrastructure

This legislation would create a joint interagency task force led by the Cybersecurity and Infrastructure Security Agency (CISA) with the goal of ...

Read more →

Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps

Cybersecurity researchers have disclosed details of a new ad fraud and malvertising operation dubbed Trapdoor targeting Android device users.

Read more →

Scoop: Trump AI executive order seeks early government access to advanced models

The White House plans to release its much-discussed executive order on cybersecurity and AI safety as soon as this week, sources familiar with the ...

Read more →
Technology icon

Hard Tech

React2Shell (CVE-2025-55182)

A 10.0 critical severity vulnerablility affecting server-side use of React.js, tracked as CVE-2025-55182 in React.js and CVE-2025-66478 specifically f...

Read more →

Breaking Into a Brother (MFC-J1010DW): Three Security Flaws in a Seemingly Innocent Printer

We discovered three vulnerabilities that when chained together, allow for complete remote compromise:

Read more →

Check Point - Wrong Check Point (CVE-2024-24919)

Gather round, gather round - it’s time for another blogpost tearing open an SSLVPN appliance and laying bare a recent in-the-wild exploited bug. This ...

Read more →

Backdoor in XZ Utils allows RCE: everything you need to know - CVE-2024-3094

Detect and mitigate CVE-2024-3094, a critical supply chain compromise, affecting XZ Utils Data compression library. Organizations should patch urgentl...

Read more →

Loading...

The Cybersecurity Chronicles

‘The Cybersecurity Chronicles: 2024‘ pulls back the curtain on the digital threats that shaped our world last year, revealing the human stories behind the headlines. From art galleries frozen by ransomware to prison tablets hacked with a minus sign, from British Library archivists racing to protect centuries of knowledge to Spotify users meticulously curating their digital identities – these stories illuminate how cybersecurity touches every aspect of modern life.

Author Mark Nole weaves together intimate portraits of the people on all sides of the digital battlefield: the defenders working through sleepless nights to protect critical infrastructure, the victims grappling with stolen identities and lost savings, and even the attackers themselves, operating from nondescript offices with project management software and performance metrics.

Through detailed reporting and narrative storytelling, Nole reveals how 2024 became the year when cybersecurity stopped being just a technical problem and emerged as a fundamentally human challenge. Whether you’re a security professional or simply someone trying to understand our increasingly digital world, these chronicles offer an unprecedented look at how technology shapes – and sometimes betrays – our trust, our privacy, and our lives.

Mark Nole Book Cover for Cybersecurity book

Stay Updated with Cyber Security News

Get the latest cybersecurity headlines, breaking news, and expert insights delivered directly to your inbox. Stay ahead of threats and informed about the digital landscape.

Join thousands of cybersecurity professionals and enthusiasts. No spam, just valuable insights.