Posts

The Hacker News - Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor

Cybersecurity researchers have disclosed details of a new Linux malware dubbed Showboat that has been put to use in a campaign targeting a telecommunications provider in the Middle East since at least mid-2022. "Showboat is a modular post-exploitation framework designed for Linux systems, capable of spawning a remote shell, transferring files, and functioning as a SOCKS5 proxy," Lumen from The Hacker News https://thehackernews.com/2026/05/showboat-linux-malware-hits-middle-east.html

The Hacker News - ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories

This week starts small. A token leaks. A bad package slips in. A login trick works. An old tool shows up again. At first, it feels like the usual mess. Then you see the pattern: attackers are not always breaking in. They are using the parts we already trust. That is what makes it worrying. The danger is in normal things now - updates, apps, cloud buttons, support chats, trusted accounts. AI from The Hacker News https://thehackernews.com/2026/05/threatsday-bulletin-linux-rootkits.html

KnowBe4 - Reducing Phish-Prone Rates Without Training Fatigue: A Practical Playbook for Traditional Organizations

Image
Phishing remains the single biggest human-driven threat in most organizations. Yet many security leaders face a familiar problem: the stronger the push to run frequent training and simulations, the louder the employee backlash. Complaints range from “too many tests” to “training interrupts my work,” and that resistance can erode both engagement and security outcomes. The good news: you can lower Phish-prone Percentages without burning out your people by shifting strategy from frequency for frequency’s sake to smarter, less intrusive, and more supportive interventions that change behavior. from KnowBe4 Blog https://blog.knowbe4.com/reducing-phish-prone-rates-without-training-fatigue-a-practical-playbook-for-traditional-organizations

The Hacker News - Microsoft Warns of Two Actively Exploited Defender Vulnerabilities

Microsoft has disclosed that a privilege escalation and a denial-of-service flaw in Defender has come under active exploitation in the wild. The former, tracked as CVE-2026-41091, is rated 7.8 on the CVSS scoring system. Successful exploitation of the flaw could allow an attacker to gain SYSTEM privileges. "Improper link resolution before file access ('link following') in Microsoft Defender from The Hacker News https://thehackernews.com/2026/05/microsoft-warns-of-two-actively.html

The Hacker News - When Identity is the Attack Path

Consider a cached access key on a single Windows machine. It got there the way most cached credentials do - a user logged in, and the key stored itself automatically. Standard AWS behavior. No one misconfigured anything or violated a policy. Yet that single key, which was easily accessible to a minor-league attacker, could have opened a path to some 98% of entities in the company's cloud from The Hacker News https://thehackernews.com/2026/05/when-identity-is-attack-path.html

HACKMAGEDDON - 1-15 May 2026 Cyber Attacks Timeline

The threat landscape during May H1 was dominated by cyber crime and characterized by malware attacks, while the exploitation of public-facing applications led the initial access. from HACKMAGEDDON https://www.hackmageddon.com/2026/05/21/1-15-may-2026-cyber-attacks-timeline/

Schneier - On AI Security

Good report : Executive Summary: Let’s say you wanted to make sure that your AI is secure. Can you just maximize the security and privacy benchmark and call it a day? Nope, because benchmarks don’t actually work for measuring AI capabilities (even when they are NOT emergent systemic properties like security). So let’s take a step back: how do you measure security in the first place? Good question. Over the last 30 years, security engineering for software evolved from black box penetration testing, through whitebox code analysis and architectural risk analysis to de facto process-driven standards like the Building Security In Maturity Model (BSIMM). Software had a very deep impact on business operations, and it appears that AI is going to have an even deeper impact. Will a software security-like measurement move work for AI? Probably. In the meantime we can make real progress in AI security by cleaning up our WHAT piles and managing risk by identifying and applying go...