Cyber Security News

Start. Stay. Grow.

Curated daily. The latest hacks, breaches, and cyber trends—humanized.

Daily cyber brief

Hacking Editorial Brief: May 19, 2026

Active Exploitation and Zero-Day Activity

Microsoft disclosed CVE-2026-42897, an Exchange Server zero-day vulnerability affecting Outlook Web Access that has been actively exploited to execute arbitrary JavaScript in targeted attacks. Separately, Google researchers identified a criminal zero-day exploit targeting a popular open-source web administration tool to bypass two-factor authentication—notably, the exploit appears to have been developed using AI techniques. In the industrial sector, CVE-2026-8153 affects Universal Robots PolyScope 5 systems, presenting a critical risk to industrial robot fleets. Microsoft's May 2026 Patch Tuesday addressed 130 vulnerabilities including 30 critical flaws spanning Windows, Office, SharePoint, and DNS components.

Ransomware and Data Breach Campaigns

Foxconn confirmed a suspected ransomware attack impacting North American facilities, with the threat group 'Nitrogen' claiming exfiltration of over 8 terabytes of data. The education technology platform Canvas/Instructure experienced a significant breach attributed to threat actor ShinyHunters, highlighting growing cyber risk in the higher education sector. In cryptocurrency, Ecoprotocol suffered a $76.7 million hack traced to a private key leak according to analysis from Beosin. Meanwhile, the Islamic Cyber Resistance in Iraq-313 Team claimed responsibility for DDoS attacks causing widespread Spotify service disruptions, and CISA updated its DarkSide ransomware advisory with new indicators of compromise to assist network defenders.


Sources: SecurityWeek · SecurityWeek · Help Net Security · Cybersecurity Dive · Binance · SC Media · The Cyber Express · CISA

Around the Web

Last Updated: N/A

Hacker icon

Hacks + Heists

Spotify outage caused by DDoS attack claimed by hacking group | brief | SC Media

The Islamic Cyber Resistance in Iraq-313 Team has claimed responsibility for the widespread disruption, stating they launched a distributed denial ...

Read more →

Grafana Labs Breach Exposes GitHub Codebase

Sophisticated threat actor breached Grafana Labs' GitHub environment after obtaining a stolen token, exfiltrated the company's entire private codebase...

Read more →

Anthropic Disrupts First Reported AI-Orchestrated Cyberattack Campaign

Anthropic revealed that a Chinese state-sponsored group used Claude AI's agentic capabilities to execute cyberattacks with minimal human supervision, ...

Read more →

Hacker accessed FBI server that included Epstein files in 2023, files suggest - 6ABC

A hacker was able to access an FBI server that contained some files related to Jeffrey Epstein, according to documents released by the DOJ.

Read more →

Brain implants allow us to move and talk. But they could also be hacked

But they could also be hacked ... The human brain is remarkably complex, with trillions of connections that control how you move, think and feel. Yet ...

Read more →
Cybersecurity icon

Big Cyber

NGINX CVE-2026-42945 Actively Exploited in the Wild

A heap buffer overflow vulnerability (CVE-2026-42945, CVSS 9.2) in NGINX affecting versions 0.6.27 through 1.30.0 is being actively exploited in the w...

Read more →

CISA Updates DarkSide Ransomware Advisory with IOC Data

CISA added a downloadable STIX file of indicators of compromise (IOCs) to the DarkSide ransomware advisory to help network defenders find and mitigate...

Read more →

Hack The Box Report Reveals AI-Driven Shift Reshaping Cybersecurity Skills and Talent Strategy

NEW YORK, May 19, 2026--Hack The Box, the global leader in AI cybersecurity readiness, today released its Cybersecurity Workforce Intelligence ...

Read more →

Instructure Canvas Learning Platform Suffers Major Ransomware Breach

ShinyHunters ransomware group breached Instructure, affecting nearly 9,000 schools with over 3.65 TB of data compromised belonging to 275 million peop...

Read more →
Technology icon

Hard Tech

React2Shell (CVE-2025-55182)

A 10.0 critical severity vulnerablility affecting server-side use of React.js, tracked as CVE-2025-55182 in React.js and CVE-2025-66478 specifically f...

Read more →

Breaking Into a Brother (MFC-J1010DW): Three Security Flaws in a Seemingly Innocent Printer

We discovered three vulnerabilities that when chained together, allow for complete remote compromise:

Read more →

Check Point - Wrong Check Point (CVE-2024-24919)

Gather round, gather round - it’s time for another blogpost tearing open an SSLVPN appliance and laying bare a recent in-the-wild exploited bug. This ...

Read more →

Backdoor in XZ Utils allows RCE: everything you need to know - CVE-2024-3094

Detect and mitigate CVE-2024-3094, a critical supply chain compromise, affecting XZ Utils Data compression library. Organizations should patch urgentl...

Read more →

Loading...

The Cybersecurity Chronicles

‘The Cybersecurity Chronicles: 2024‘ pulls back the curtain on the digital threats that shaped our world last year, revealing the human stories behind the headlines. From art galleries frozen by ransomware to prison tablets hacked with a minus sign, from British Library archivists racing to protect centuries of knowledge to Spotify users meticulously curating their digital identities – these stories illuminate how cybersecurity touches every aspect of modern life.

Author Mark Nole weaves together intimate portraits of the people on all sides of the digital battlefield: the defenders working through sleepless nights to protect critical infrastructure, the victims grappling with stolen identities and lost savings, and even the attackers themselves, operating from nondescript offices with project management software and performance metrics.

Through detailed reporting and narrative storytelling, Nole reveals how 2024 became the year when cybersecurity stopped being just a technical problem and emerged as a fundamentally human challenge. Whether you’re a security professional or simply someone trying to understand our increasingly digital world, these chronicles offer an unprecedented look at how technology shapes – and sometimes betrays – our trust, our privacy, and our lives.

Mark Nole Book Cover for Cybersecurity book

Stay Updated with Cyber Security News

Get the latest cybersecurity headlines, breaking news, and expert insights delivered directly to your inbox. Stay ahead of threats and informed about the digital landscape.

Join thousands of cybersecurity professionals and enthusiasts. No spam, just valuable insights.