Cyber Security News
Start. Stay. Grow.
Curated daily. The latest hacks, breaches, and cyber trends—humanized.
Daily cyber brief
Hacking Brief: May 18, 2026
State-Sponsored Threat Actors Weaponize AI for Offensive Operations
Two major developments today highlight the escalating use of AI in cyberattacks. Anthropic disclosed the first reported AI-orchestrated campaign, revealing that a Chinese state-sponsored group leveraged Claude AI's agentic capabilities to autonomously execute 80-90% of attack operations with minimal human supervision. Separately, Google Cloud's Threat Intelligence team documented systematic use of AI models by threat actors from China, North Korea, and Russia for vulnerability discovery, exploit development, and defense evasion techniques. These disclosures mark a significant evolution in threat actor tradecraft, demonstrating operational use of large language models beyond reconnaissance and social engineering.
Active Campaigns Target Critical Infrastructure and High-Value Data
Iranian threat actors are suspected in breaches of automatic tank gauge systems at U.S. gas stations across multiple states, raising concerns about critical infrastructure targeting. The Qilin ransomware-as-a-service operation claimed responsibility for compromising Generation Life, with the affiliate listing the victim on leak sites May 15. In a separate incident, the ShinyHunters group allegedly stole 275 million student records in what researchers describe as a massive breach exposing security failures across universities. Meanwhile, a financially-motivated hacking group reportedly earned over $14 million through X (formerly Twitter) account compromises used to promote cryptocurrency tokens. Historical breach disclosures also surfaced today: documents reveal a 2023 incident where a hacker accessed an FBI server containing files related to Jeffrey Epstein.
Sources: PANews · Cyber Daily · The Australian · 6ABC · Türkiye Today · Google Cloud Blog · Anthropic
Around the Web
Last Updated: N/A

Hacks + Heists
Anthropic Disrupts First Reported AI-Orchestrated Cyberattack Campaign
Anthropic revealed that a Chinese state-sponsored group used Claude AI's agentic capabilities to execute cyberattacks with minimal human supervision, ...
Read more →Hacker accessed FBI server that included Epstein files in 2023, files suggest - 6ABC
A hacker was able to access an FBI server that contained some files related to Jeffrey Epstein, according to documents released by the DOJ.
Read more →Brain implants allow us to move and talk. But they could also be hacked
But they could also be hacked ... The human brain is remarkably complex, with trillions of connections that control how you move, think and feel. Yet ...
Read more →Internet connected Yarbo mowers turned into potential hacking weapon - Yahoo Tech
Hackers could theoretically activate blades remotely, scan nearby networks, or assemble the devices into a botnet for larger attacks. Makris noted ...
Read more →Suspected Iranian hackers breach US gas station fuel monitors - MSN
What happened: Hackers accessed unprotected automatic tank gauge systems at U.S. gas stations, altering display readings but not fuel quantities.
Read more →
Big Cyber
Former CISA nominee Sean Plankey named US CEO of defense startup | CyberScoop
... Cybersecurity and Infrastructure Security Agency, of the Department of Homeland Security, in the Dirksen Senate office building, in Washington, DC...
Read more →Multiple Vulnerabilities in F5 NGINX, BIG-IP and BIG-IQ | Cyber Security Agency of Singapore
F5 has released security updates to address multiple vulnerabilities in NGINX, BIG-IP, and BIG-IQ. Users and administrators of affected products ...
Read more →Instructure Canvas Data Breach Affects 275 Million Users at 8,809 Institutions
Instructure reached a ransom agreement with ShinyHunters after the largest educational security breach on record, affecting nearly 9,000 schools and 2...
Read more →Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulations
Speaking to cybersecurity journalist Kim Zetter, Vikram Thakur, technical director for Symantec, said the level of expertise of understanding ...
Read more →
Hard Tech
React2Shell (CVE-2025-55182)
A 10.0 critical severity vulnerablility affecting server-side use of React.js, tracked as CVE-2025-55182 in React.js and CVE-2025-66478 specifically f...
Read more →Breaking Into a Brother (MFC-J1010DW): Three Security Flaws in a Seemingly Innocent Printer
We discovered three vulnerabilities that when chained together, allow for complete remote compromise:
Read more →Check Point - Wrong Check Point (CVE-2024-24919)
Gather round, gather round - it’s time for another blogpost tearing open an SSLVPN appliance and laying bare a recent in-the-wild exploited bug. This ...
Read more →Backdoor in XZ Utils allows RCE: everything you need to know - CVE-2024-3094
Detect and mitigate CVE-2024-3094, a critical supply chain compromise, affecting XZ Utils Data compression library. Organizations should patch urgentl...
Read more →Loading...
The Cybersecurity Chronicles
‘The Cybersecurity Chronicles: 2024‘ pulls back the curtain on the digital threats that shaped our world last year, revealing the human stories behind the headlines. From art galleries frozen by ransomware to prison tablets hacked with a minus sign, from British Library archivists racing to protect centuries of knowledge to Spotify users meticulously curating their digital identities – these stories illuminate how cybersecurity touches every aspect of modern life.
Author Mark Nole weaves together intimate portraits of the people on all sides of the digital battlefield: the defenders working through sleepless nights to protect critical infrastructure, the victims grappling with stolen identities and lost savings, and even the attackers themselves, operating from nondescript offices with project management software and performance metrics.
Through detailed reporting and narrative storytelling, Nole reveals how 2024 became the year when cybersecurity stopped being just a technical problem and emerged as a fundamentally human challenge. Whether you’re a security professional or simply someone trying to understand our increasingly digital world, these chronicles offer an unprecedented look at how technology shapes – and sometimes betrays – our trust, our privacy, and our lives.

Stay Updated with Cyber Security News
Get the latest cybersecurity headlines, breaking news, and expert insights delivered directly to your inbox. Stay ahead of threats and informed about the digital landscape.
Join thousands of cybersecurity professionals and enthusiasts. No spam, just valuable insights.