Cyber Security News
Start. Stay. Grow.
Curated daily. The latest hacks, breaches, and cyber trends—humanized.
Daily cyber brief
Hacking Brief: May 22, 2026
State-sponsored threat actors dominate today's activity. CISA added two actively exploited vulnerabilities to its KEV catalog: a Langflow flaw and a Trend Micro Apex One vulnerability, the latter confirmed as exploited by an Iranian state-sponsored group. Separately, Chinese espionage operations are targeting telecommunications infrastructure with newly identified malware—"Showboat" delivers SOCKS5 proxy backdoors to Linux and Windows systems in Middle Eastern telcos, while the Webworm APT group is leveraging Discord and Microsoft Graph APIs against European government networks, using SoftEther VPN and tunneling tools for command-and-control.
On the law enforcement front, Canadian and U.S. authorities charged Ottawa resident Jacob Butler, 23, in connection with operating Kimwolf, a botnet that—alongside the Aisuru botnet—infected millions of devices globally. Meanwhile, the FBI is responding to a coordinated GRU campaign targeting home and small office routers across 23 U.S. states with a five-step remediation guidance. In the financial crime sector, Chinese actors continue targeting high-profile individuals with cryptocurrency and stock theft operations, allegedly stealing $734 million in recent campaigns.
Sources: The Hacker News · Bleeping Computer · Dark Reading · CNET · CBC
Around the Web
Last Updated: N/A

Hacks + Heists
Google's AI is being manipulated. The search giant is quietly fighting back - BBC
A BBC investigation revealed a simple way to get AI chatbots to spit out misinformation. Google and other AI companies are now trying to fix the ...
Read more →Russian Hackers Are Inside American Home Routers. The FBI Has a 5-Step Fix - CNET
A coordinated cyberattack by Russia's GRU targeted home and small office routers across 23 states. Here's how to check yours and lock it down.
Read more →Chinese hackers target telcos with new Linux, Windows malware - Bleeping Computer
A Chinese cyber-espionage campaign has been targeting telecommunications providers with newly discovered Linux and Windows malware dubbed Showboat ...
Read more →CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV
The vulnerability has since been exploited by an Iranian state-sponsored hacking ... © 2026 The Hacker News. All Rights Reserved.
Read more →GitHub Breached — Employee Device Hack Led to Exfiltration of 3,800+ Internal Repos
GitHub confirmed that attackers breached its private code repositories after an employee installed a malicious VS Code extension compromised in the Ta...
Read more →
Big Cyber
Trump postpones signing AI and cybersecurity order - Yahoo
US President Donald Trump on Thursday postponed signing an executive order on AI and cybersecurity over concerns it could shrink the country's AI lead...
Read more →State Cyber Leaders Ask Congress to Support SLCGP, CISA - GovTech
Cybersecurity and technology officials from the state governments of Tennessee, New York and Florida travelled to Washington, D.C., to testify before ...
Read more →House Committee Advances Small Business Cybersecurity Bill - VitalLaw.com
Legislation that would direct the Government Accountability Office to examine the cybersecurity needs of small businesses cleared the House Small ...
Read more →Student hackers take on 'ethical battle' beyond cyber attacks and exploits - ABC News
Student hackers compete in the International Cybersecurity Challenge 2026, an ethical hacking contest simulating real cyber attacks and defences ...
Read more →
Hard Tech
React2Shell (CVE-2025-55182)
A 10.0 critical severity vulnerablility affecting server-side use of React.js, tracked as CVE-2025-55182 in React.js and CVE-2025-66478 specifically f...
Read more →Breaking Into a Brother (MFC-J1010DW): Three Security Flaws in a Seemingly Innocent Printer
We discovered three vulnerabilities that when chained together, allow for complete remote compromise:
Read more →Check Point - Wrong Check Point (CVE-2024-24919)
Gather round, gather round - it’s time for another blogpost tearing open an SSLVPN appliance and laying bare a recent in-the-wild exploited bug. This ...
Read more →Backdoor in XZ Utils allows RCE: everything you need to know - CVE-2024-3094
Detect and mitigate CVE-2024-3094, a critical supply chain compromise, affecting XZ Utils Data compression library. Organizations should patch urgentl...
Read more →Loading...
The Cybersecurity Chronicles
‘The Cybersecurity Chronicles: 2024‘ pulls back the curtain on the digital threats that shaped our world last year, revealing the human stories behind the headlines. From art galleries frozen by ransomware to prison tablets hacked with a minus sign, from British Library archivists racing to protect centuries of knowledge to Spotify users meticulously curating their digital identities – these stories illuminate how cybersecurity touches every aspect of modern life.
Author Mark Nole weaves together intimate portraits of the people on all sides of the digital battlefield: the defenders working through sleepless nights to protect critical infrastructure, the victims grappling with stolen identities and lost savings, and even the attackers themselves, operating from nondescript offices with project management software and performance metrics.
Through detailed reporting and narrative storytelling, Nole reveals how 2024 became the year when cybersecurity stopped being just a technical problem and emerged as a fundamentally human challenge. Whether you’re a security professional or simply someone trying to understand our increasingly digital world, these chronicles offer an unprecedented look at how technology shapes – and sometimes betrays – our trust, our privacy, and our lives.

Stay Updated with Cyber Security News
Get the latest cybersecurity headlines, breaking news, and expert insights delivered directly to your inbox. Stay ahead of threats and informed about the digital landscape.
Join thousands of cybersecurity professionals and enthusiasts. No spam, just valuable insights.