<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>IT security news</title>
    <link>https://infosecnews.hofud.com/</link>
    <description>Recent content on IT security news</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 14 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://infosecnews.hofud.com/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Top impactful security developments (2026-05-14 01:02) - $DDTEXT summary</title>
      <link>https://infosecnews.hofud.com/posts/infosec-20260514_0102/</link>
      <pubDate>Thu, 14 May 2026 00:00:00 +0000</pubDate>
      
      <guid>https://infosecnews.hofud.com/posts/infosec-20260514_0102/</guid>
      
      <description>&lt;p&gt;&lt;strong&gt;Executive‑level threat‑intel briefing – 2024‑04‑22 → 2024‑05‑13&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Prepared for the IoT subsidiary of an electric‑equipment group (Linux/Ubuntu 24.04, macOS, Windows 11 workstations; Azure Container Apps, Kubernetes; Wolfi/Alpine/Debian/Ubuntu container images; heavy use of npm, pip, GitHub Actions, Azure DevOps, and Microsoft‑centric tooling).&lt;/em&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h3 id=&#34;1critical-kernellevel-exploits-that-can-hit-linuxbased-iot-devices&#34;&gt;1. Critical kernel‑level exploits that can hit Linux‑based IoT devices&lt;/h3&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;What happened&lt;/th&gt;
          &lt;th&gt;Why it matters for you&lt;/th&gt;
          &lt;th&gt;References&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;CopyFail &amp;amp; DirtyFrag kernel bugs were publicly disclosed together with full exploit code&lt;/strong&gt; – the author released a working exploit the day before a weekend, giving attackers “zero‑day” leverage on any Linux system that has not been patched. The bugs allow local privilege escalation to &lt;strong&gt;root&lt;/strong&gt; and can be chained to remote code execution on devices that expose a privileged service (e.g., web‑UI, SSH, or container runtimes).&lt;/td&gt;
          &lt;td&gt;Many of our edge gateways and Azure‑hosted containers run recent Linux kernels that are still vulnerable to these bugs. An unpatched kernel on a device could be compromised, giving the attacker full control of the host and the ability to pivot into the corporate network.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://infosec.exchange/@rene_mobile/116552428921991986&#34;&gt;https://infosec.exchange/@rene_mobile/116552428921991986&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;CopyFail is being used as a “sudo‑bypass”&lt;/strong&gt; – a Mastodon post shows a user exploiting the bug to avoid typing a password, confirming that the exploit works in the wild.&lt;/td&gt;
          &lt;td&gt;Demonstrates that the exploit is already being abused in the field; any device that allows local users (e.g., maintenance engineers) to run code could be compromised without needing a remote vector.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://mastodon.de/@the_moep/116496490115111513&#34;&gt;https://mastodon.de/@the_moep/116496490115111513&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;Action:&lt;/strong&gt; Verify kernel version on all deployed IoT gateways, edge servers, and container hosts. Apply the latest distro patches (Ubuntu 24.04 kernel 6.5+; Alpine 3.19; Wolfi 0.8) immediately. Consider kernel‑hardening (grsecurity/SELinux/AppArmor) and restrict local console access.&lt;/p&gt;</description>
      
    </item>
    
    <item>
      <title>Top impactful security developments (2026-05-14 02:27) - 21 days summary</title>
      <link>https://infosecnews.hofud.com/posts/infosec-20260514_0227/</link>
      <pubDate>Thu, 14 May 2026 00:00:00 +0000</pubDate>
      
      <guid>https://infosecnews.hofud.com/posts/infosec-20260514_0227/</guid>
      
      <description>&lt;p&gt;&lt;strong&gt;Executive‑level take‑aways (2024‑05‑23 → 2024‑05‑14)&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Area&lt;/th&gt;
          &lt;th&gt;Why it matters to an IoT/embedded organisation&lt;/th&gt;
          &lt;th&gt;Key actions&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;Linux kernel &amp;amp; RTOS base layers&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;New kernel‑level bugs (CopyFail / DirtyFrag) affect any device that runs a recent Linux kernel – including the Wolfi, Alpine and Ubuntu images you use for Azure Container Apps and on‑device Linux.&lt;/td&gt;
          &lt;td&gt; ‑ Accelerate patching of all Linux hosts (kernel ≥ 6.6) and rebuild container images with the latest distro security updates. &lt;br&gt;‑ Enable kernel‑hardening (CONFIG_STRICT_KERNEL_RW, SELinux/AppArmor) on edge devices.&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;Web‑browser UI stacks&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Chrome 148 (127 fixes, 3 critical) and Chrome 147 (30 fixes, 4 critical use‑after‑free) – plus Firefox 150 (423 AI‑found bugs, multiple sandbox‑escapes) – are the primary front‑ends for many IoT management consoles and mobile/web apps.&lt;/td&gt;
          &lt;td&gt; ‑ Force automatic updates on all workstations (Ubuntu 24.04, macOS, Windows 11) and on any embedded Chromium‑based UI (e.g., Electron dashboards). &lt;br&gt;‑ Validate that container‑based browsers are rebuilt from the latest upstream images.&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;Supply‑chain attacks on development toolchains&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;A wave of wormable supply‑chain compromises (Bitwarden‑CLI, SAP‑CAP npm packages, Intercom client, PyPI Lightning, Mini Shai‑Hulud) inject malicious pre‑install scripts that steal cloud/CI credentials and then republish infected packages. This directly threatens the CI/CD pipelines that build your Azure Container Apps and the firmware images you sign for micro‑controllers.&lt;/td&gt;
          &lt;td&gt; ‑ Adopt “install‑scripts‑disabled” (&lt;code&gt;npm install --ignore‑scripts&lt;/code&gt;, &lt;code&gt;pip install --no‑binary&lt;/code&gt;) for un‑trusted packages. &lt;br&gt;‑ Enforce signed package verification (SLSA, provenance) in your CI pipelines. &lt;br&gt;‑ Rotate all npm/GitHub tokens after each release and enforce MFA.&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;AI‑generated zero‑day&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Google’s GTIG disclosed the first confirmed AI‑crafted zero‑day used in the wild (targeting a web‑based admin tool). AI‑assisted exploit creation shortens the window between discovery and weaponisation – a risk for any custom web UI you expose.&lt;/td&gt;
          &lt;td&gt; ‑ Add behavioural anomaly detection on your web‑app servers (process‑memory, syscalls). &lt;br&gt;‑ Keep all third‑party libraries up‑to‑date; AI‑generated exploits often target unpatched memory‑safety bugs.&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;Mobile‑app &amp;amp; extension abuse&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;The “ClaudeBleed” Chrome‑extension bug demonstrates how a seemingly harmless extension can become a “confused deputy”, stealing files and sending emails without user consent. Many IoT operators ship companion mobile apps that load third‑party extensions.&lt;/td&gt;
          &lt;td&gt; ‑ Whitelist only vetted extensions in corporate Chrome/Edge policies. &lt;br&gt;‑ Audit any internal extensions for the &lt;code&gt;externally_connectable&lt;/code&gt; flag.&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;Ransomware &amp;amp; data‑extortion surge&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Q1 2026 ransomware activity rose 22 % (ReliaQuest). New groups (The Gentlemen) focus on credential theft and data‑only extortion rather than encryption – a direct threat to the secrets you store in Azure Key Vault or on‑device TPMs.&lt;/td&gt;
          &lt;td&gt; ‑ Implement continuous credential‑monitoring (Azure AD Identity Protection, secret‑scan in repos). &lt;br&gt;‑ Back‑up critical configuration data off‑site and test restore procedures.&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;Overall recommendation&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;The convergence of kernel‑level bugs, massive browser patches, and wormable supply‑chain attacks means the “trust‑but‑verify” model for open‑source tooling is no longer sufficient for IoT product lines.&lt;/td&gt;
          &lt;td&gt; ‑ Create a “Supply‑Chain Hardening Playbook” that (i) pins dependencies with hash verification, (ii) runs a SBOM generator on every container image, (iii) enforces least‑privilege CI service accounts, and (iv) integrates Microsoft Defender for Cloud (ASC) alerts with your Azure Sentinel SIEM.&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;1-critical-os--kernel-issues&#34;&gt;1. Critical OS &amp;amp; Kernel Issues&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Incident&lt;/th&gt;
          &lt;th&gt;Impact on IoT / Embedded&lt;/th&gt;
          &lt;th&gt;Source&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;CopyFail &amp;amp; DirtyFrag kernel bugs&lt;/strong&gt; – two long‑standing Linux kernel vulnerabilities were publicly disclosed without coordinated vendor notification, leaving a “week‑before‑weekend” window for exploitation on production systems. The bugs are memory‑corruption primitives that can lead to remote code execution on any Linux device that has not been patched.&lt;/td&gt;
          &lt;td&gt;Embedded gateways, edge‑Linux containers, and any device using a recent kernel (e.g., Wolfi, Alpine, Ubuntu) are exposed.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://infosec.exchange/@rene_mobile/116552428921991986&#34;&gt;https://infosec.exchange/@rene_mobile/116552428921991986&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;No new kernel CVE numbers were published yet&lt;/strong&gt;, but the advisory stresses the need for immediate patch distribution (90‑day default) before public exploit release.&lt;/td&gt;
          &lt;td&gt;Same as above.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://infosec.exchange/@rene_mobile/116552428921991986&#34;&gt;https://infosec.exchange/@rene_mobile/116552428921991986&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;em&gt;Take‑away&lt;/em&gt;: Push kernel updates to all edge devices within the next maintenance window; consider enabling live‑patching (e.g., kpatch) for critical deployments.&lt;/p&gt;</description>
      
    </item>
    
    <item>
      <title>Top impactful security developments (2026-05-14 05:41) - 1 day summary</title>
      <link>https://infosecnews.hofud.com/posts/infosec-20260514_0541/</link>
      <pubDate>Thu, 14 May 2026 00:00:00 +0000</pubDate>
      
      <guid>https://infosecnews.hofud.com/posts/infosec-20260514_0541/</guid>
      
      <description>&lt;p&gt;&lt;strong&gt;Executive Summary – Key Threat‑Intelligence Highlights (13 May – 14 May 2026)&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Below is a concise, prioritized briefing of the most impactful security events that are directly relevant to our IoT‑focused subsidiary (Linux/Ubuntu workstations, Azure Container Apps, Kubernetes, and the typical development toolchain).  Each bullet includes a full‑length source link as required.&lt;/p&gt;
&lt;hr&gt;
&lt;h3 id=&#34;1-critical-vulnerabilities-that-touch-our-stack&#34;&gt;1. Critical Vulnerabilities that Touch Our Stack&lt;/h3&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Threat&lt;/th&gt;
          &lt;th&gt;Why It Matters for Us&lt;/th&gt;
          &lt;th&gt;Source&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;VM2 sandbox‑escape (CVE‑2026‑44005)&lt;/strong&gt; – Remote code execution in the popular Node.js sandbox library used by many npm packages.&lt;/td&gt;
          &lt;td&gt;Our container images (Wolfi, Alpine, Debian, Ubuntu) often run Node‑based build tools and CI/CD scripts; a compromised VM2 could break isolation and lead to host compromise.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://cveawg.mitre.org/api/cve/CVE-2026-44005&#34;&gt;https://cveawg.mitre.org/api/cve/CVE-2026-44005&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;WebdriverIO CI/CD command‑injection (CVE‑2026‑25244)&lt;/strong&gt; – Malicious Git branch names can trigger code execution on CI runners.&lt;/td&gt;
          &lt;td&gt;Directly affects our Azure Pipelines / GitHub Actions workflows that use WebdriverIO for UI testing.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://mastodon.social/@netsecio/116567593278695651&#34;&gt;https://mastodon.social/@netsecio/116567593278695651&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;Firefox high‑severity bugs discovered by Anthropic’s Mythos AI (CVE‑2026‑33824, CVE‑2026‑33827)&lt;/strong&gt; – Remote‑code‑execution paths in the browser.&lt;/td&gt;
          &lt;td&gt;Developers and QA staff use Firefox on Ubuntu workstations; a compromised browser can be a foothold for credential theft.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.cyberhub.blog/article/25855-anthropics-mythos-ai-discovers-multiple-high-severity-vulnerabilities-in-firefox&#34;&gt;https://www.cyberhub.blog/article/25855-anthropics-mythos-ai-discovers-multiple-high-severity-vulnerabilities-in-firefox&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;Windows BitLocker zero‑day (public PoC)&lt;/strong&gt; – Bypass of drive encryption on Windows 11.&lt;/td&gt;
          &lt;td&gt;Some engineering laptops still run Windows 11 with BitLocker; the flaw could expose source code or design data.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/windows-bitlocker-zero-day-gives-access-to-protected-drives-poc-released/&#34;&gt;https://www.bleepingcomputer.com/news/security/windows-bitlocker-zero-day-gives-access-to-protected-drives-poc-released/&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;Microsoft Patch Tuesday (May 2026)&lt;/strong&gt; – 120 CVEs fixed, 29 are critical RCE bugs affecting Windows, Azure services, and core libraries.&lt;/td&gt;
          &lt;td&gt;Our Azure Container Apps and any Windows‑based build agents must be patched immediately to stay protected.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://securebulletin.com/microsoft-patch-tuesday-may-2026-120-vulnerabilities-fixed-including-29-critical-rce-flaws/&#34;&gt;https://securebulletin.com/microsoft-patch-tuesday-may-2026-120-vulnerabilities-fixed-including-29-critical-rce-flaws/&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;Action:&lt;/strong&gt; Verify that all CI runners, container base images, and developer workstations have applied the above patches; add VM2 and WebdriverIO to the vulnerability‑management watchlist.&lt;/p&gt;</description>
      
    </item>
    
    <item>
      <title>Top impactful security developments (2026-05-13 16:37)</title>
      <link>https://infosecnews.hofud.com/posts/infosec-20260513_1637/</link>
      <pubDate>Wed, 13 May 2026 00:00:00 +0000</pubDate>
      
      <guid>https://infosecnews.hofud.com/posts/infosec-20260513_1637/</guid>
      
      <description>&lt;p&gt;&lt;strong&gt;Key security developments (2026‑05‑11 → 2026‑05‑13) that matter most to an IoT‑focused, Azure‑centric organisation&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Date&lt;/th&gt;
          &lt;th&gt;What happened&lt;/th&gt;
          &lt;th&gt;Why it matters to you&lt;/th&gt;
          &lt;th&gt;Source&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑05‑11 – 2026‑05‑12&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;“Mini Shai‑Hulud” supply‑chain worm&lt;/strong&gt; – a coordinated attack that compromised &amp;gt; 170 npm and PyPI packages (including the widely‑used &lt;strong&gt;@tanstack&lt;/strong&gt; routing libraries, &lt;strong&gt;Mistral AI&lt;/strong&gt; SDKs, &lt;strong&gt;UiPath&lt;/strong&gt;, &lt;strong&gt;OpenSearch&lt;/strong&gt;, and many others). The malware steals CI/CD tokens (GitHub OIDC, npm, AWS/GCP/Azure, Kubernetes, HashiCorp Vault) and uses them to publish further malicious versions, creating a self‑propagating worm. It also drops a “gh‑token‑monitor” daemon that wipes the user’s home directory if the stolen token is revoked. &lt;br&gt; • &lt;strong&gt;Impact on CI/CD&lt;/strong&gt; – the attack chain exploits a mis‑configured &lt;code&gt;pull_request_target&lt;/code&gt; workflow, GitHub‑Actions cache poisoning, and runtime extraction of OIDC tokens, meaning that even a &lt;em&gt;trusted&lt;/em&gt; publishing pipeline can become the delivery vector. &lt;br&gt; • &lt;strong&gt;IoT relevance&lt;/strong&gt; – any internal build pipelines that produce firmware images, container images, or SDKs for micro‑controllers (e.g., ESP‑32, Nordic) that pull npm/PyPI dependencies are now exposed to credential theft and malicious code injection. &lt;br&gt; • &lt;strong&gt;Mitigation&lt;/strong&gt; – rotate all CI/CD secrets immediately, audit GitHub Actions for &lt;code&gt;pull_request_target&lt;/code&gt; usage, enforce strict provenance checks, and block the attacker‑controlled domains &lt;code&gt;git‑tanstack.com&lt;/code&gt;, &lt;code&gt;*.getsession.org&lt;/code&gt;, and &lt;code&gt;api.masscan.cloud&lt;/code&gt;.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://undercodenews.com/worm-redux-mini-shai-hulud-expands-its-attack-on-the-open-source-supply-chain/&#34;&gt;https://undercodenews.com/worm-redux-mini-shai-hulud-expands-its-attack-on-the-open-source-supply-chain/&lt;/a&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.securityweek.com/tanstack-mistral-ai-uipath-hit-in-fresh-supply-chain-attack/&#34;&gt;https://www.securityweek.com/tanstack-mistral-ai-uipath-hit-in-fresh-supply-chain-attack/&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://bsky.app/profile/socket.dev/post/3mlm4sndzyc2e&#34;&gt;https://bsky.app/profile/socket.dev/post/3mlm4sndzyc2e&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.orca.security/resources/blog/tanstack-npm-supply-chain-worm/&#34;&gt;https://www.orca.security/resources/blog/tanstack-npm-supply-chain-worm/&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑05‑12&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Chrome zero‑day exploits actively exploited in the wild&lt;/strong&gt; – two new CVE‑linked vulnerabilities (CVE‑2022‑26923 and another undisclosed) are being used by threat actors. The advisory urges an immediate browser update. &lt;br&gt; • &lt;strong&gt;Impact on IoT devices&lt;/strong&gt; – many embedded web‑UIs (e.g., router admin panels, device management portals) rely on Chrome‑based WebViews; an unpatched browser can lead to remote code execution on the host system that runs the UI. &lt;br&gt; • &lt;strong&gt;Action&lt;/strong&gt; – push Chrome updates to all developer workstations (Ubuntu 24.04, macOS, Windows 11) and to any embedded Linux devices that ship a Chromium engine.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://bsky.app/profile/idez-inc.bsky.social/post/3mlons4drni2a&#34;&gt;https://bsky.app/profile/idez-inc.bsky.social/post/3mlons4drni2a&lt;/a&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑05‑12&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Microsoft‑research‑led AI‑generated zero‑day&lt;/strong&gt; – a proof‑of‑concept exploit that bypasses two‑factor authentication was discovered to be AI‑crafted. The exploit chain targets a Windows authentication component and was flagged as a zero‑day. &lt;br&gt; • &lt;strong&gt;Impact on Azure &amp;amp; Office 365&lt;/strong&gt; – the same authentication flow is used by Azure AD and many SaaS services; an unpatched Windows host (including Azure VM agents) could be compromised. &lt;br&gt; • &lt;strong&gt;Action&lt;/strong&gt; – ensure all Windows 11 endpoints have the latest security patches and enable Microsoft Defender for Identity to monitor abnormal authentication attempts.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.computing.co.uk/news/2026/security/criminals-used-ai-to-create-zero-day-exploit?utm_source=mastodon_org&amp;amp;utm_medium=post&amp;amp;utm_campaign=May_AIZeroDay&#34;&gt;https://www.computing.co.uk/news/2026/security/criminals-used-ai-to-create-zero-day-exploit?utm_source=mastodon_org&amp;amp;utm_medium=post&amp;amp;utm_campaign=May_AIZeroDay&lt;/a&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑05‑12&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Mozilla AI‑assisted vulnerability hunt – 423 Firefox bugs fixed&lt;/strong&gt; – Mozilla used large‑language‑model assistants (Claude Mythos Preview &amp;amp; Claude Opus) to drive fuzzing and generate proof‑of‑concepts, resulting in 423 security fixes (including 15‑year‑old HTML and XSLT bugs, WebAssembly, IndexedDB, HTTPS, and sandbox bypasses). &lt;br&gt; • &lt;strong&gt;Relevance&lt;/strong&gt; – demonstrates that AI can accelerate discovery of deep, long‑standing bugs in complex code bases. The same approach could be applied to IoT firmware, RTOS kernels, or cryptographic libraries (e.g., OpenSSL, mbedTLS). &lt;br&gt; • &lt;strong&gt;Action&lt;/strong&gt; – consider piloting AI‑assisted static analysis for your own embedded codebases and integrate the findings into your CI pipeline.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.datasecuritybreach.fr/firefox-lia-debusque-423-failles-cachees/&#34;&gt;https://www.datasecuritybreach.fr/firefox-lia-debusque-423-failles-cachees/&lt;/a&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑05‑12&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Microsoft Patch Tuesday (May 2026)&lt;/strong&gt; – 137 Windows patches (including 30 critical CVEs) and 127 Chromium‑related fixes for Edge. Notably, a remote‑code‑execution flaw in Outlook preview and a high‑severity issue in the Microsoft SSO plugin for Jira/Confluence were addressed. &lt;br&gt; • &lt;strong&gt;Impact&lt;/strong&gt; – the Outlook preview RCE can be triggered by a malicious email preview, a realistic attack vector for phishing‑driven compromises of developer workstations. &lt;br&gt; • &lt;strong&gt;Action&lt;/strong&gt; – apply the May 2026 patches across all Windows 11 and Azure VM workloads; verify that Outlook preview is disabled if not needed.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://hackerworkspace.com/article/sans-stormcast-wednesday-may-13th-2026-microsoft-patch-tuesday-large-npm-pypi-compromise-rubygems-attack&#34;&gt;https://hackerworkspace.com/article/sans-stormcast-wednesday-may-13th-2026-microsoft-patch-tuesday-large-npm-pypi-compromise-rubygems-attack&lt;/a&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑05‑12 – 13&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Ransomware landscape shift – data‑theft over encryption&lt;/strong&gt; – Kaspersky’s International Anti‑Ransomware Day report (12 May 2026) and Securelist’s “State of Ransomware 2026” highlight that ransomware groups are increasingly focusing on double‑extortion, data‑theft, and “encryption‑less” extortion. High‑value sectors (manufacturing, healthcare, finance) remain prime targets. &lt;br&gt; • &lt;strong&gt;Impact on IoT&lt;/strong&gt; – many IoT deployments store telemetry in cloud databases (Azure SQL, PostgreSQL, MongoDB). A breach that exfiltrates data can expose device configurations, firmware versions, and even cryptographic keys. &lt;br&gt; • &lt;strong&gt;Action&lt;/strong&gt; – enforce regular backups, segment IoT data stores, and monitor for abnormal data‑exfiltration patterns (e.g., large uploads to unknown endpoints).&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://securelist.com/state-of-ransomware-in-2026/119761/&#34;&gt;https://securelist.com/state-of-ransomware-in-2026/119761/&lt;/a&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑05‑12&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Supply‑chain attack on OpenVSX (IDE extensions)&lt;/strong&gt; – the “GlassWorm” campaign (attributed to a separate actor) compromised a VS Code extension on OpenVSX, delivering a Zig‑compiled native binary that installs a persistent backdoor on developer machines. &lt;br&gt; • &lt;strong&gt;Relevance&lt;/strong&gt; – developers building firmware for micro‑controllers often install VS Code extensions for language support; a compromised extension can steal signing keys or firmware‑signing certificates. &lt;br&gt; • &lt;strong&gt;Action&lt;/strong&gt; – restrict VS Code extension sources to the official Microsoft Marketplace, audit installed extensions, and monitor for unknown binaries in &lt;code&gt;~/.vscode/extensions&lt;/code&gt;.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://infosec.exchange/@cidu/116563888871363394&#34;&gt;https://infosec.exchange/@cidu/116563888871363394&lt;/a&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑05‑13&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Azure‑specific threat intel – “TeamPCP” leveraging trusted publishing&lt;/strong&gt; – a follow‑up analysis (Wiz, StepSecurity) confirms that the Mini Shai‑Hulud worm used Azure‑linked OIDC tokens to mint short‑lived npm publish tokens, bypassing the need for long‑lived credentials. &lt;br&gt; • &lt;strong&gt;Impact&lt;/strong&gt; – any Azure Container Apps (ACA) or Azure Kubernetes Service (AKS) build pipelines that pull npm packages are at risk of pulling malicious code that could run inside your containers. &lt;br&gt; • &lt;strong&gt;Action&lt;/strong&gt; – enable Azure Policy to block package publishing from un‑approved service principals, enforce signed‑package verification, and add runtime monitoring for unexpected network calls from containers to &lt;code&gt;git‑tanstack.com&lt;/code&gt; or &lt;code&gt;*.getsession.org&lt;/code&gt;.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.wiz.io/blog/mini-shai-hulud-st-rikes-again-tanstack-more-npm-packages-compromised&#34;&gt;https://www.wiz.io/blog/mini-shai-hulud-st-rikes-again-tanstack-more-npm-packages-compromised&lt;/a&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑05‑13&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Linux kernel hardening – no new zero‑day disclosed&lt;/strong&gt; – the week’s major kernel‑related advisories (CVE‑2026‑8388 – CVE‑2026‑8401) were patched in Firefox 150.0.3, not the kernel itself. No large‑scale kernel exploits were reported, so no immediate action required beyond routine patching.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.mozilla.org/en-US/security/advisories/&#34;&gt;https://www.mozilla.org/en-US/security/advisories/&lt;/a&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 id=&#34;consolidated-recommendations-for-the-iot-subsidiary&#34;&gt;Consolidated Recommendations for the IoT Subsidiary&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Secure CI/CD pipelines&lt;/strong&gt;&lt;/p&gt;</description>
      
    </item>
    
    <item>
      <title>Top impactful security developments (2026-05-12)</title>
      <link>https://infosecnews.hofud.com/posts/infosec-20260513/</link>
      <pubDate>Tue, 12 May 2026 00:00:00 +0000</pubDate>
      
      <guid>https://infosecnews.hofud.com/posts/infosec-20260513/</guid>
      
      <description>&lt;p&gt;&lt;strong&gt;Executive‑level threat briefing – 5 May – 12 May 2026&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Prepared for the IoT subsidiary (Linux/Ubuntu, macOS, Windows workstations; Azure Container Apps, Kubernetes; heavy use of npm / pip / Maven / GitHub CI‑CD).&lt;/em&gt;&lt;/p&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;#&lt;/th&gt;
          &lt;th&gt;Threat / Vulnerability&lt;/th&gt;
          &lt;th&gt;Why it matters to the group&lt;/th&gt;
          &lt;th&gt;Key details &amp;amp; recommended actions&lt;/th&gt;
          &lt;th&gt;Sources&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;1&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Linux kernel privilege‑escalation bugs – “CopyFail” &amp;amp; “DirtyFrag”&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Many IoT gateways, edge devices and container hosts run recent Linux kernels (Ubuntu 24.04, Debian, Alpine). These bugs allow an unprivileged attacker to gain root without a patch being available for weeks.&lt;/td&gt;
          &lt;td&gt;• CopyFail (CVE‑2026‑6746, CVE‑2026‑6757, CVE‑2026‑6758) and DirtyFrag (CVE‑2026‑6784‑6786) are &lt;strong&gt;unpatched&lt;/strong&gt; and have been publicly disclosed with exploit code circulating. &lt;br&gt;• Mitigation: disable the &lt;code&gt;esp4&lt;/code&gt;, &lt;code&gt;esp6&lt;/code&gt; and &lt;code&gt;rxrpc&lt;/code&gt; kernel modules and apply the “module‑disable” work‑around from the Openwall mailing list. &lt;br&gt;• Long‑term: track kernel updates and consider using a hardened RTOS (e.g., Zephyr with SELinux) for new IoT firmware.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://infosec.exchange/@rene_mobile/116552428921991986&#34;&gt;https://infosec.exchange/@rene_mobile/116552428921991986&lt;/a&gt;  &lt;a href=&#34;https://www.openwall.com/lists/oss-security/2026/05/07/8&#34;&gt;https://www.openwall.com/lists/oss-security/2026/05/07/8&lt;/a&gt;  &lt;a href=&#34;https://infosec.exchange/@harrysintonen/116535053646996124&#34;&gt;https://infosec.exchange/@harrysintonen/116535053646996124&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Chrome 148 – 127 security fixes (3 critical, 31 high)&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Chrome/Chromium is embedded in many IoT web‑UIs, admin consoles and internal tools. A critical integer‑overflow in Blink (CVE‑2026‑7896) and two use‑after‑free bugs (CVE‑2026‑7897, CVE‑2026‑7898) can lead to remote code execution from a malicious web page.&lt;/td&gt;
          &lt;td&gt;• All Windows, macOS and Linux workstations must &lt;strong&gt;update to Chrome 148.0.7778.96&lt;/strong&gt; immediately. &lt;br&gt;• If you host internal web‑apps, enforce CSP and enable Chrome’s “sandbox” flags. &lt;br&gt;• Consider moving admin consoles to Chromium‑based Edge (see note 5).&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://cybersecuritynews.com/chrome148-vulnerabilities-patched/&#34;&gt;https://cybersecuritynews.com/chrome148-vulnerabilities-patched/&lt;/a&gt;  &lt;a href=&#34;https://mastodon.social/@sethmlarson/116534405807214892&#34;&gt;https://mastodon.social/@sethmlarson/116534405807214892&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;3&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Active exploitation of Chrome zero‑days (public “update‑or‑die” campaign)&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;A coordinated “update‑or‑die” message on BlueSky is urging immediate Chrome upgrades, indicating &lt;strong&gt;active exploitation in the wild&lt;/strong&gt;.&lt;/td&gt;
          &lt;td&gt;• Treat as &lt;strong&gt;high‑severity&lt;/strong&gt; – force auto‑updates via GPO or MDM. &lt;br&gt;• Audit any internal devices that still run older Chrome/Chromium builds (e.g., IoT kiosks).&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://bsky.app/profile/idez-inc.bsky.social/post/3mlons4drni2a&#34;&gt;https://bsky.app/profile/idez-inc.bsky.social/post/3mlons4drni2a&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;4&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Microsoft Edge stores passwords in plaintext in RAM&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Edge is the default browser on many Windows 11 workstations used by developers and ops staff. Plaintext passwords in memory can be harvested by malware with local admin rights – a realistic post‑exploitation step.&lt;/td&gt;
          &lt;td&gt;• If Edge is required, enforce &lt;strong&gt;full‑disk encryption&lt;/strong&gt; and &lt;strong&gt;process‑level hardening&lt;/strong&gt; (e.g., Credential Guard). &lt;br&gt;• Prefer Chrome or Firefox for privileged accounts; consider disabling Edge’s password manager.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.ubergizmo.com/2026/05/microsoft-edge-security-passwords/&#34;&gt;https://www.ubergizmo.com/2026/05/microsoft-edge-security-passwords/&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;5&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;vm2 Node.js sandbox‑escape chain (12 critical CVEs)&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;vm2 is a popular library for executing untrusted JavaScript in many IoT cloud‑services, CI pipelines and serverless functions. A sandbox escape gives an attacker &lt;strong&gt;full host compromise&lt;/strong&gt;.&lt;/td&gt;
          &lt;td&gt;• Upgrade vm2 to &lt;strong&gt;3.11.2&lt;/strong&gt; (or later) across all Node.js services. &lt;br&gt;• Run untrusted code in &lt;strong&gt;container‑isolated&lt;/strong&gt; environments instead of vm2 where possible.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://cyber.netsecops.io/articles/dozen-critical-sandbox-escape-vulnerabilities-disclosed-in-vm2-node-js-library/&#34;&gt;https://cyber.netsecops.io/articles/dozen-critical-sandbox-escape-vulnerabilities-disclosed-in-vm2-node-js-library/&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;6&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Mini Shai‑Hulud supply‑chain worm (npm + PyPI)&lt;/strong&gt; – massive credential‑stealer that hijacks CI/CD pipelines, GitHub OIDC tokens and publishes malicious package versions with &lt;strong&gt;valid SLSA provenance&lt;/strong&gt;. Affects 84 versions of 42 TanStack packages, Mistral AI, UiPath, OpenSearch, Guardrails AI and &amp;gt; 170 other npm/PyPI artifacts.&lt;/td&gt;
          &lt;td&gt;• Our CI/CD runners (GitHub Actions, Azure Pipelines) and developer workstations install npm packages daily. &lt;br&gt;• The worm &lt;strong&gt;exfiltrates GitHub tokens, npm publish tokens, AWS/Azure/GCP credentials, HashiCorp Vault tokens, Kubernetes service‑account tokens&lt;/strong&gt; and can self‑propagate. &lt;br&gt;• It also drops a “gh‑token‑monitor” daemon that wipes the user’s home directory if the malicious token is revoked.&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Immediate mitigation&lt;/strong&gt;: &lt;br&gt;1. &lt;strong&gt;Audit lockfiles&lt;/strong&gt; for any of the listed package names/versions (e.g., &lt;code&gt;@tanstack/router&lt;/code&gt;, &lt;code&gt;@tanstack/react-router&lt;/code&gt;, &lt;code&gt;mistralai&lt;/code&gt;, &lt;code&gt;guardrails-ai&lt;/code&gt;). &lt;br&gt;2. &lt;strong&gt;Remove&lt;/strong&gt; any compromised packages and reinstall clean versions from maintainers’ post‑mortem releases. &lt;br&gt;3. &lt;strong&gt;Rotate&lt;/strong&gt; all cloud and GitHub credentials (PATs, OIDC tokens, npm tokens). &lt;br&gt;4. &lt;strong&gt;Block&lt;/strong&gt; C2 domains: &lt;code&gt;git‑tanstack.com&lt;/code&gt;, &lt;code&gt;*.getsession.org&lt;/code&gt;, &lt;code&gt;api.masscan.cloud&lt;/code&gt;. &lt;br&gt;5. Harden GitHub Actions: pin OIDC permissions, disable &lt;code&gt;pull_request_target&lt;/code&gt; workflows, clear caches, pin actions to commit SHAs. &lt;br&gt;6. Enable &lt;strong&gt;behavioral analysis&lt;/strong&gt; on package installs (e.g., Snyk, Orca, or custom canary scripts).&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://safedep.io/mass-npm-supply-chain-attack-tanstack-mistral/&#34;&gt;https://safedep.io/mass-npm-supply-chain-attack-tanstack-mistral/&lt;/a&gt;  &lt;a href=&#34;https://orca.security/resources/blog/tanstack-npm-supply-chain-worm/&#34;&gt;https://orca.security/resources/blog/tanstack-npm-supply-chain-worm/&lt;/a&gt;  &lt;a href=&#34;https://thehackernews.com/2026/05/minishai-hulud-worm-compromises.html&#34;&gt;https://thehackernews.com/2026/05/minishai-hulud-worm-compromises.html&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;7&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;ZiChatBot supply‑chain attack on PyPI (Zulip‑based C2)&lt;/strong&gt; – three malicious packages (&lt;code&gt;uuid32-utils&lt;/code&gt;, &lt;code&gt;colorinal&lt;/code&gt;, &lt;code&gt;termncolor&lt;/code&gt;) drop a Windows‑Linux malware that uses Zulip’s public REST API for command‑and‑control, stealing developer credentials and persisting via registry/launch‑agents.&lt;/td&gt;
          &lt;td&gt;• Our Python‑based tooling (e.g., firmware build scripts, CI helpers) may pull from PyPI. &lt;br&gt;• The C2 traffic blends with legitimate Zulip traffic, making detection hard.&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Action&lt;/strong&gt;: &lt;br&gt;1. Scan internal PyPI mirrors for the three package names and purge them. &lt;br&gt;2. Add &lt;strong&gt;Zulip API&lt;/strong&gt; outbound‑traffic monitoring to network IDS/EDR. &lt;br&gt;3. Rotate any credentials found on affected hosts.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://cyber.netsecops.io/articles/dozen-critical-sandbox-escape-vulnerabilities-disclosed-in-vm2-node-js-library/&#34;&gt;https://cyber.netsecops.io/articles/dozen-critical-sandbox-escape-vulnerabilities-disclosed-in-vm2-node-js-library/&lt;/a&gt; (the article also references the ZiChatBot case)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;8&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Daemon Tools supply‑chain compromise (OpenVSX / VS Code extensions)&lt;/strong&gt; – malicious VS Code extension uploaded to OpenVSX steals credentials and spreads via the IDE.&lt;/td&gt;
          &lt;td&gt;• Developers use VS Code on Windows/macOS workstations; compromised extensions can harvest Azure AD tokens, GitHub PATs, and cloud keys.&lt;/td&gt;
          &lt;td&gt;• Restrict VS Code marketplace to the official Microsoft store. &lt;br&gt;• Audit installed extensions for any from &lt;code&gt;openvsx.org&lt;/code&gt; and remove unknown ones.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.kaspersky.com/blog/daemon-tools-supply-chain-attack/55691/&#34;&gt;https://www.kaspersky.com/blog/daemon-tools-supply-chain-attack/55691/&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;9&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Firefox AI‑driven hardening (423 bugs fixed via Claude Mythos)&lt;/strong&gt; – Mozilla disclosed a historic AI‑assisted bug‑hunting campaign that patched 423 hidden vulnerabilities, many of them sandbox‑escapes and memory‑corruption bugs.&lt;/td&gt;
          &lt;td&gt;• Our internal web‑apps and embedded browsers (e.g., WebView) may use Firefox‑based engines. The &lt;strong&gt;AI‑driven pipeline&lt;/strong&gt; signals that future zero‑days could be discovered and weaponised faster.&lt;/td&gt;
          &lt;td&gt;• Stay on the latest Firefox ESR releases. &lt;br&gt;• Consider adopting similar AI‑assisted static analysis for our own firmware codebases.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://undercodenews.com/worm-redux-mini-shai-hulud-expands-its-attack-on-the-open-source-supply-chain/&#34;&gt;https://undercodenews.com/worm-redux-mini-shai-hulud-expands-its-attack-on-the-open-source-supply-chain/&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;10&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Azure Container Apps &amp;amp; Kubernetes – increased focus on supply‑chain hygiene&lt;/strong&gt; (implicit in multiple reports)&lt;/td&gt;
          &lt;td&gt;The supply‑chain attacks above exploit the same CI/CD pipelines that feed Azure Container Apps. Azure’s native Defender for Containers is enabled but &lt;strong&gt;does not block malicious npm/pip packages&lt;/strong&gt;.&lt;/td&gt;
          &lt;td&gt;• Enable &lt;strong&gt;Microsoft Defender for Cloud&lt;/strong&gt; → Container security → “Supply‑chain protection” (preview). &lt;br&gt;• Integrate SCA tools (Snyk, Orca, Dependency‑Track) into Azure DevOps pipelines.&lt;/td&gt;
          &lt;td&gt;(derived from the overall context; no single URL)&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 id=&#34;key-takeaways-for-the-iot-subsidiary&#34;&gt;Key Take‑aways for the IoT subsidiary&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Patch aggressively&lt;/strong&gt; – Linux kernel, Chrome, Edge, vm2, and any vulnerable libraries must be updated within 48 h.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Treat supply‑chain incidents as active threats&lt;/strong&gt; – the Mini Shai‑Hulud worm and ZiChatBot demonstrate that a single compromised npm/PyPI package can compromise &lt;strong&gt;all developer workstations, CI runners and cloud credentials&lt;/strong&gt;. Immediate credential rotation and network‑level blocking are mandatory.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hardening CI/CD&lt;/strong&gt; – lock down GitHub Actions (disable &lt;code&gt;pull_request_target&lt;/code&gt;, pin actions, clear caches) and enforce short‑lived OIDC tokens with &lt;strong&gt;least‑privilege scopes&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Container isolation&lt;/strong&gt; – avoid relying on vm2 or other in‑process sandboxes; run untrusted code in separate containers with &lt;strong&gt;no host‑mounts&lt;/strong&gt; and enforce &lt;strong&gt;seccomp/AppArmor&lt;/strong&gt; profiles.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Credential protection on workstations&lt;/strong&gt; – Edge’s plaintext password issue and the vm2 escape both highlight the need for &lt;strong&gt;full‑disk encryption&lt;/strong&gt;, &lt;strong&gt;Credential Guard&lt;/strong&gt;, and &lt;strong&gt;process‑level monitoring&lt;/strong&gt; on Windows, plus &lt;strong&gt;EDR&lt;/strong&gt; on Linux/macOS.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Monitoring &amp;amp; detection&lt;/strong&gt; – add alerts for outbound traffic to the identified C2 domains (&lt;code&gt;git‑tanstack.com&lt;/code&gt;, &lt;code&gt;*.getsession.org&lt;/code&gt;, &lt;code&gt;api.masscan.cloud&lt;/code&gt;, &lt;code&gt;api.zulip.com&lt;/code&gt;) and for unusual npm/pip install activity (e.g., packages not in the allow‑list).&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;By addressing the items above, the organization can significantly reduce the attack surface of its IoT firmware development pipeline, its Azure‑hosted container workloads, and the endpoint workstations that developers and ops staff use daily.&lt;/p&gt;</description>
      
    </item>
    
    <item>
      <title>Top impactful security developments (2026-05-09)</title>
      <link>https://infosecnews.hofud.com/posts/infosec-20260509/</link>
      <pubDate>Sat, 09 May 2026 00:00:00 +0000</pubDate>
      
      <guid>https://infosecnews.hofud.com/posts/infosec-20260509/</guid>
      
      <description>&lt;p&gt;&lt;strong&gt;Executive summary – most impactful security news (02 May 2026 – 09 May 2026) for an IoT‑focused subsidiary&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Category&lt;/th&gt;
          &lt;th&gt;Why it matters to the group (IoT devices, cloud‑native CI/CD, Azure, Linux/Windows workstations)&lt;/th&gt;
          &lt;th&gt;Key take‑aways&lt;/th&gt;
          &lt;th&gt;Sources&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;Critical browser &amp;amp; OS flaws&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;All corporate workstations (Ubuntu 24.04, macOS, Windows 11) and any embedded web UI (e.g., device management portals) use Chromium‑based browsers. A sandbox‑escape or memory‑corruption bug can lead to full system compromise and lateral movement into Azure‑hosted containers.&lt;/td&gt;
          &lt;td&gt;• &lt;strong&gt;Google Chrome 148&lt;/strong&gt; – 127 security fixes, 3 critical (integer overflow in Blink CVE‑2026‑7896, use‑after‑free in Mobile CVE‑2026‑7897, use‑after‑free in Chromoting CVE‑2026‑7898) and 31 high‑severity issues (V8, ANGLE, WebRTC, etc.). &lt;br&gt;• &lt;strong&gt;CVE‑2026‑7908&lt;/strong&gt; – critical use‑after‑free in the Fullscreen component that enables a sandbox escape (CVSS 9.6). &lt;br&gt;• &lt;strong&gt;Microsoft Edge&lt;/strong&gt; – loads &lt;em&gt;all&lt;/em&gt; saved passwords in clear‑text in process memory, exposing credentials to any local attacker or malicious script.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://beyondmachines.net/event_details/google-chrome-148-released-with-127-security-fixes-9-r-e-9-6/gD2P6Ple2L&#34;&gt;https://beyondmachines.net/event_details/google-chrome-148-released-with-127-security-fixes-9-r-e-9-6/gD2P6Ple2L&lt;/a&gt; &lt;br&gt; &lt;a href=&#34;https://www.yazoul.net/advisory/cve/cve-2026-7908-google-chrome-sandbox-escape&#34;&gt;https://www.yazoul.net/advisory/cve/cve-2026-7908-google-chrome-sandbox-escape&lt;/a&gt; &lt;br&gt; &lt;a href=&#34;https://www.thurrott.com/cloud/335739/microsoft-edge-loads-all-saved-passwords-in-plain-text-upon-launch&#34;&gt;https://www.thurrott.com/cloud/335739/microsoft-edge-loads-all-saved-passwords-in-plain-text-upon-launch&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;Firefox hardening (AI‑driven bug hunting)&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Firefox is used in many internal tools and as a rendering engine for embedded web UIs. The release shows how AI can uncover deep‑seated memory‑corruption bugs that could be weaponised against IoT gateways or container‑hosted services.&lt;/td&gt;
          &lt;td&gt;• 423 vulnerabilities fixed in Firefox 150 (including multiple sandbox‑escape primitives, race‑conditions, and IPC bugs). &lt;br&gt;• Demonstrates the value of AI‑assisted code review for large C++ codebases – a model that could be applied to your own firmware or RTOS code.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://hacks.mozilla.org/2026/05/behind-the-scenes-hardening-firefox/&#34;&gt;https://hacks.mozilla.org/2026/05/behind-the-scenes-hardening-firefox/&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;Node.js vm2 library – massive sandbox‑escape chain&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Many IoT back‑ends, CI/CD pipelines, and serverless functions run untrusted JavaScript in vm2. The disclosed 12 critical CVEs (CVSS 9.8) allow arbitrary host‑code execution, breaking the isolation that vm2 is supposed to provide.&lt;/td&gt;
          &lt;td&gt;• All versions ≤ 3.10.4 are vulnerable; patch is vm2 3.11.2. &lt;br&gt;• Exploits can be delivered via compromised npm packages or malicious CI jobs, directly affecting Azure Container Apps or Kubernetes pods that depend on vm2.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://cyber.netsecops.io/articles/dozen-critical-sandbox-escape-vulnerabilities-disclosed-in-vm2-nodejs-library/?utm_source=bluesky&amp;amp;utm_medium=social&amp;amp;utm_campaign=daily&#34;&gt;https://cyber.netsecops.io/articles/dozen-critical-sandbox-escape-vulnerabilities-disclosed-in-vm2-nodejs-library/?utm_source=bluesky&amp;amp;utm_medium=social&amp;amp;utm_campaign=daily&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;Supply‑chain attacks on development tools &amp;amp; package ecosystems&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Your CI/CD pipelines (Azure DevOps, GitHub Actions) pull dependencies from npm, PyPI, Maven, etc. Compromise of these ecosystems can inject back‑doors into firmware builds, OTA update servers, or container images.&lt;/td&gt;
          &lt;td&gt;• &lt;strong&gt;Daemon Tools&lt;/strong&gt; – official Windows installers (v12.5.0.2421‑2434) were trojanised, signed with the vendor’s certificate. The back‑door (QUIC RAT) collects system info and can download further payloads. &lt;br&gt;• &lt;strong&gt;PyPI “lightning” package&lt;/strong&gt; – malicious wheel (versions 2.6.2‑2.6.3) drops a downloader that steals GitHub, npm, AWS/Azure/GCP tokens and installs a RAT. &lt;br&gt;• &lt;strong&gt;ZiChatBot campaign&lt;/strong&gt; – three fake PyPI wheels (uuid32‑utils, colorinal, termncolor) load a malicious DLL/so that installs a RAT using Zulip REST APIs. &lt;br&gt;• &lt;strong&gt;Axios npm compromise&lt;/strong&gt; – malicious releases (1.14.1, 0.30.4) pull a malicious dependency that installs a back‑door on any system that installs the package. &lt;br&gt;• &lt;strong&gt;TeamPCP / ShinyHunters&lt;/strong&gt; – targeted PyTorch‑Lightning, other popular Python packages; malware harvests developer credentials and propagates via GitHub Actions, affecting downstream builds.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.kaspersky.com/blog/daemon-tools-supply-chain-attack/55691/&#34;&gt;https://www.kaspersky.com/blog/daemon-tools-supply-chain-attack/55691/&lt;/a&gt; &lt;br&gt; &lt;a href=&#34;https://social.raytec.co/@techbot/116516673690579154&#34;&gt;https://social.raytec.co/@techbot/116516673690579154&lt;/a&gt; &lt;br&gt; &lt;a href=&#34;https://securelist.com/oceanlotus-suspected-pypi-zichatbot-campaign/119603/&#34;&gt;https://securelist.com/oceanlotus-suspected-pypi-zichatbot-campaign/119603/&lt;/a&gt; &lt;br&gt; &lt;a href=&#34;https://darktrace.com/blog/when-trust-becomes-the-attack-surface-supply-chain-attacks-in-an-era-of-automation-and-implicit-trust&#34;&gt;https://darktrace.com/blog/when-trust-becomes-the-attack-surface-supply-chain-attacks-in-an-era-of-automation-and-implicit-trust&lt;/a&gt; &lt;br&gt; &lt;a href=&#34;https://spycloud.com/blog/cybercrime-update-15-shinyhunters-supplychains-and-sketchy-new-criminal-forums/&#34;&gt;https://spycloud.com/blog/cybercrime-update-15-shinyhunters-supplychains-and-sketchy-new-criminal-forums/&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;Linux kernel &amp;amp; low‑level library privilege‑escalation&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Your container images run on Alpine, Debian, Wolfi and Ubuntu; a kernel LPE can compromise the host node and all co‑located IoT workloads.&lt;/td&gt;
          &lt;td&gt;• &lt;strong&gt;DirtyFrag&lt;/strong&gt; – a newly disclosed local privilege‑escalation bug (mitigation disables esp4, esp6, rxrpc modules). &lt;br&gt;• &lt;strong&gt;Multiple CVEs in libc / binutils / zlib&lt;/strong&gt; (CVE‑2026‑6746, ‑6757, ‑6758, ‑6784‑6786) fixed in recent Firefox releases but also affect any Linux distribution.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.openwall.com/lists/oss-security/2026/05/07/8&#34;&gt;https://www.openwall.com/lists/oss-security/2026/05/07/8&lt;/a&gt; &lt;br&gt; &lt;a href=&#34;https://www.yazoul.net/advisory/cve/cve-2026-6746-google-chrome-sandbox-escape&#34;&gt;https://www.yazoul.net/advisory/cve/cve-2026-6746-google-chrome-sandbox-escape&lt;/a&gt; (lists related CVEs)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;Ransomware &amp;amp; data‑theft trends&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Even if not directly targeting IoT devices, ransomware that exfiltrates credentials or cloud‑service tokens can be used to hijack Azure subscriptions, CI/CD secrets, and OTA update pipelines.&lt;/td&gt;
          &lt;td&gt;• &lt;strong&gt;ShinyHunters&lt;/strong&gt; – shift from encryption to pure data‑theft/extortion, targeting SaaS, cloud accounts, and credential stores. &lt;br&gt;• &lt;strong&gt;Akira, Qilin, The Gentlemen&lt;/strong&gt; – continued high‑volume ransomware activity (2 638 victim posts in Q1 2026). &lt;br&gt;• &lt;strong&gt;State‑sponsored MuddyWater&lt;/strong&gt; – masquerades ransomware attacks to hide espionage; uses remote‑desktop tools and steals VPN configs, potentially giving adversaries footholds in corporate networks.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://it.slashdot.org/story/26/05/02/234244/ransomware-is-getting-uglier-as-cybercriminals-fake-leaks-and-skip-encryption-entirely&#34;&gt;https://it.slashdot.org/story/26/05/02/234244/ransomware-is-getting-uglier-as-cybercriminals-fake-leaks-and-skip-encryption-entirely&lt;/a&gt; &lt;br&gt; &lt;a href=&#34;https://securityaffairs.com/191765/breaking-news/iranian-cyber-espionage-disguised-as-a-chaos-ransomware-attack.html&#34;&gt;https://securityaffairs.com/191765/breaking-news/iranian-cyber-espionage-disguised-as-a-chaos-ransomware-attack.html&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;AI‑driven tooling &amp;amp; threat‑intel&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Your organization relies heavily on Microsoft Copilot / GitHub Copilot. Recent reports show AI is already being used by attackers to automate exploit generation (e.g., AI‑chained zero‑days).&lt;/td&gt;
          &lt;td&gt;• &lt;strong&gt;AI‑generated exploit chains&lt;/strong&gt; – autonomous validation pipelines can combine multiple zero‑days into a single exploit that bypasses both renderer and OS sandboxes. &lt;br&gt;• &lt;strong&gt;Mozilla’s AI‑assisted bug‑hunting pipeline&lt;/strong&gt; demonstrates both the power and the risk of AI‑generated code that may unintentionally create new attack surfaces.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.hacks.mozilla.org/2026/05/behind-the-scenes-hardening-firefox/&#34;&gt;https://www.hacks.mozilla.org/2026/05/behind-the-scenes-hardening-firefox/&lt;/a&gt; (mentions AI pipeline) &lt;br&gt; &lt;a href=&#34;https://www.bleepingcomputer.com/news/google/go&#34;&gt;https://www.bleepingcomputer.com/news/google/go&lt;/a&gt; (bluesky posts about active zero‑day exploitation)&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h3 id=&#34;recommendations-for-the-iot-subsidiary&#34;&gt;Recommendations for the IoT subsidiary&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Patch browsers immediately&lt;/strong&gt; – Deploy Chrome 148 (or the latest stable) on all workstations and any embedded web UI devices that use Chromium. Verify that Edge is either upgraded to a version that mitigates the password‑in‑memory issue or replace Edge with Chrome/Firefox for credential‑sensitive tasks.&lt;/p&gt;</description>
      
    </item>
    
    <item>
      <title>Top impactful security developments (2026-05-08)</title>
      <link>https://infosecnews.hofud.com/posts/report-20260508/</link>
      <pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate>
      
      <guid>https://infosecnews.hofud.com/posts/report-20260508/</guid>
      
      <description>&lt;p&gt;&lt;strong&gt;Executive‑level Threat‑Intelligence Summary – 1 May 2026 → 8 May 2026&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Prepared for the IoT subsidiary of an electric‑equipment group (Ubuntu 24.04, macOS, Windows 11 workstations; Azure ACA/Kubernetes containers based on Wolfi, Alpine, Debian, Ubuntu). The focus is on high‑impact vulnerabilities, supply‑chain compromises, ransomware‑scale breaches and IoT‑specific threats that could affect our development stack, CI/CD pipelines, container images or field devices.&lt;/em&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h3 id=&#34;1-critical-os--kernel-vulnerabilities-linux-windows-chrome&#34;&gt;1. Critical OS &amp;amp; Kernel Vulnerabilities (Linux, Windows, Chrome)&lt;/h3&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Date&lt;/th&gt;
          &lt;th&gt;Vulnerability&lt;/th&gt;
          &lt;th&gt;Impact &amp;amp; Relevance&lt;/th&gt;
          &lt;th&gt;Source&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;02 May 2026&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Google Chrome navigation‑component bug (EUVD‑2026‑28021)&lt;/strong&gt; – pre‑v148.0.7778.96 allowed a compromised renderer to bypass site‑isolation via a crafted HTML page (medium‑severity, “Chromium security severity: Medium”).&lt;/td&gt;
          &lt;td&gt;Affects any Chrome‑based browsers used by developers or internal tools (Chrome, Edge, Chromium). Bypass of site‑isolation can lead to cross‑origin data leakage.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2026-28021&#34;&gt;https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2026-28021&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;06 May 2026&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Palo Alto Networks PAN‑OS User‑ID Authentication Portal buffer overflow (CVE‑2026‑0300)&lt;/strong&gt; – remote unauthenticated RCE with full root privileges on PA‑Series &amp;amp; VM‑Series firewalls.&lt;/td&gt;
          &lt;td&gt;Our Azure‑based perimeter firewalls (if Palo Alto) could be fully compromised, allowing lateral movement into on‑prem or cloud workloads.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://gbhackers.com/critical-palo-alto-firewall-vulnerability/&#34;&gt;https://gbhackers.com/critical-palo-alto-firewall-vulnerability/&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;06 May 2026&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Linux kernel “perf/x86” privilege‑escalation (CVE‑2026‑31782, CVSS 7.8)&lt;/strong&gt; – local exploit in the perf subsystem.&lt;/td&gt;
          &lt;td&gt;Affects all Linux hosts (including our container base images) that ship the vulnerable kernel; could be leveraged after initial foothold to gain root.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.thehackerwire.com/vulnerability/CVE-2026-31782/&#34;&gt;https://www.thehackerwire.com/vulnerability/CVE-2026-31782/&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;02 May 2026&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Linux kernel “Copy Fail” privilege‑escalation (CVE‑2026‑31431, CVSS 7.8)&lt;/strong&gt; – logic flaw in the crypto subsystem (AF_ALG socket abuse) that enables local users to obtain root. Public exploits are already available and affect Ubuntu, RHEL, SUSE and container images.&lt;/td&gt;
          &lt;td&gt;Direct relevance to our Ubuntu 24.04, Debian and Alpine containers; attackers who gain any low‑privilege shell can instantly become root.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.picussecurity.com/resource/blog/copy-fail-critical-linux-kernel-privilege-escalation-vulnerability-cve-2026-31431&#34;&gt;https://www.picussecurity.com/resource/blog/copy-fail-critical-linux-kernel-privilege-escalation-vulnerability-cve-2026-31431&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;02 May 2026&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Linux kernel local privilege escalation (CVE‑2026‑31706, CVSS 9.8)&lt;/strong&gt; – high‑severity local root exploit (Nessus plugin 311699).&lt;/td&gt;
          &lt;td&gt;Same impact as above; any compromised container or host can be fully taken over.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.tenable.com/plugins/nessus/311699&#34;&gt;https://www.tenable.com/plugins/nessus/311699&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;06 May 2026&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Debian 11/12/13 “unpatched” kernel vulnerability (CVE‑2026‑43104, CVSS 9.8)&lt;/strong&gt; – remote code execution via kernel flaw.&lt;/td&gt;
          &lt;td&gt;Affects Debian‑based images (including many of our CI runners).&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.tenable.com/plugins/nessus/312640&#34;&gt;https://www.tenable.com/plugins/nessus/312640&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;06 May 2026&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Debian “unpatched” kernel vulnerability (CVE‑2026‑43118, CVSS 9.8)&lt;/strong&gt; – another remote code execution path in the Linux kernel.&lt;/td&gt;
          &lt;td&gt;Same relevance to Debian‑based CI/CD workers and container builds.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.tenable.com/plugins/nessus/312641&#34;&gt;https://www.tenable.com/plugins/nessus/312641&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;Take‑away:&lt;/strong&gt; Patch all Linux hosts and container base images immediately (Ubuntu 24.04, Debian, Alpine, Wolfi). Verify that Chrome/Edge browsers are updated past v148.0.7778.96. Review firewall firmware versions if Palo Alto devices are in use.&lt;/p&gt;</description>
      
    </item>
    
    <item>
      <title>Top impactful security developments (2026-05-06)</title>
      <link>https://infosecnews.hofud.com/posts/report-20260506/</link>
      <pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate>
      
      <guid>https://infosecnews.hofud.com/posts/report-20260506/</guid>
      
      <description>&lt;p&gt;&lt;strong&gt;Executive‑level Threat‑Intelligence Summary (2026‑04‑28 → 2026‑05‑06)&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Below are the most impactful security events that intersect with the technologies and attack surfaces used by our IoT subsidiary (Linux/Ubuntu workstations, containerised workloads on Azure/Kubernetes, CI/CD pipelines, embedded‑device firmware, and the Microsoft stack).  Each bullet includes a short impact statement and a direct, non‑shortened source link as required.&lt;/p&gt;
&lt;hr&gt;
&lt;h3 id=&#34;1-critical-oslevel-and-kernel-vulnerabilities&#34;&gt;1. Critical OS‑level and Kernel Vulnerabilities&lt;/h3&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Date&lt;/th&gt;
          &lt;th&gt;Vulnerability&lt;/th&gt;
          &lt;th&gt;Impact &amp;amp; Relevance&lt;/th&gt;
          &lt;th&gt;Source&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑04‑30&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Linux kernel “Copy Fail” – CVE‑2026‑31431&lt;/strong&gt; (local privilege escalation, CVSS 7.8) – affects every Linux kernel ≥ 4.14 (including Ubuntu 24.04 LTS, Debian, Alpine, Wolfi). Public exploit available; comparable to Dirty Cow/Dirty Pipe.&lt;/td&gt;
          &lt;td&gt;Any workstation, CI runner or container host running an unpatched kernel can be fully compromised by a local attacker – critical for our Ubuntu workstations and container base images.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.tenable.com/blog/copy-fail-cve-2026-31431-frequently-asked-questions-about-linux-kernel-privilege-escalation&#34;&gt;https://www.tenable.com/blog/copy-fail-cve-2026-31431-frequently-asked-questions-about-linux-kernel-privilege-escalation&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑04‑30&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;cPanel/WHM authentication bypass – CVE‑2026‑41940&lt;/strong&gt; (critical, CVSS 9.8) – unauthenticated remote attackers can gain admin access to the control panel.&lt;/td&gt;
          &lt;td&gt;Many web‑hosting services (including any internal or partner portals) use cPanel; a breach could expose source code repositories, CI credentials, or IoT firmware binaries.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://securityboulevard.com/2026/04/imperva-customers-protected-against-cve-2026-41940-in-cpanel-whm/&#34;&gt;https://securityboulevard.com/2026/04/imperva-customers-protected-against-cve-2026-41940-in-cpanel-whm/&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑05‑02&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Traefik cross‑namespace SSRF – EUVD‑2026‑26432&lt;/strong&gt; (medium‑high, CVSS 8.7) – improper isolation in the Kubernetes CRD provider allows a pod to reach resources in other namespaces.&lt;/td&gt;
          &lt;td&gt;Directly affects our Azure Container Apps / AKS deployments that use Traefik as ingress; could be leveraged to pivot from a compromised container to the host network or secret stores.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-26432&#34;&gt;https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-26432&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑05‑06&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Palo Alto Networks PAN‑OS buffer‑overflow – CVE‑2026‑0300&lt;/strong&gt; (high, CVSS 9.3) – remote unauthenticated code execution on PA‑Series/VM‑Series firewalls.&lt;/td&gt;
          &lt;td&gt;Our perimeter security may include Palo Alto firewalls; exploitation could give attackers full control of the network edge, bypassing Azure security controls.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://gbhackers.com/critical-palo-alto-firewall-vulnerability/&#34;&gt;https://gbhackers.com/critical-palo-alto-firewall-vulnerability/&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h3 id=&#34;2-browser--webplatform-flaws-impact-on-webbased-iot-management-uis&#34;&gt;2. Browser &amp;amp; Web‑Platform Flaws (Impact on Web‑Based IoT Management UIs)&lt;/h3&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Date&lt;/th&gt;
          &lt;th&gt;Vulnerability&lt;/th&gt;
          &lt;th&gt;Impact &amp;amp; Relevance&lt;/th&gt;
          &lt;th&gt;Source&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑04‑30&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Chrome navigation‑bypass (site‑isolation) – CVE‑2026‑7959&lt;/strong&gt; (Medium, “Inappropriate implementation in Navigation”)&lt;/td&gt;
          &lt;td&gt;Allows a compromised renderer to escape Chrome’s site‑isolation sandbox, potentially stealing data from web‑based IoT dashboards or CI/CD web consoles.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-28021&#34;&gt;https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-28021&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑04‑30&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Chrome permissions validation – CVE‑2026‑7959 (second entry, EUVD‑2026‑28025)&lt;/strong&gt; – crafted network traffic can leak cross‑origin data.&lt;/td&gt;
          &lt;td&gt;Could be abused to exfiltrate credentials from Chrome‑based developer tools or internal web portals.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-28025&#34;&gt;https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-28025&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑05‑02&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Jenkins GitHub plugin stored XSS – CVE‑2026‑42523&lt;/strong&gt; – attacker‑controlled payload executed in Jenkins UI.&lt;/td&gt;
          &lt;td&gt;Jenkins is a common CI/CD orchestrator for firmware builds; XSS can lead to credential theft or pipeline compromise.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.yazoul.net/advisory/cve/cve-2026-42523-jenkins-github-plugin-stored-xss&#34;&gt;https://www.yazoul.net/advisory/cve/cve-2026-42523-jenkins-github-plugin-stored-xss&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h3 id=&#34;3-iotdevice-and-embeddedfirmware-vulnerabilities&#34;&gt;3. IoT‑Device and Embedded‑Firmware Vulnerabilities&lt;/h3&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Date&lt;/th&gt;
          &lt;th&gt;Vulnerability&lt;/th&gt;
          &lt;th&gt;Impact &amp;amp; Relevance&lt;/th&gt;
          &lt;th&gt;Source&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑05‑01&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Totolink NR1800X router command injection – CVE‑2026‑7548&lt;/strong&gt; (High, CVSS 8.7) – remote unauthenticated command execution via &lt;code&gt;/cgi-bin/cstecgi.cgi&lt;/code&gt;.&lt;/td&gt;
          &lt;td&gt;Many consumer‑grade routers (including those used in test labs for IoT gateways) are vulnerable; could be a foothold for lateral movement into internal IoT networks.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://cveawg.mitre.org/api/cve/CVE-2026-7548&#34;&gt;https://cveawg.mitre.org/api/cve/CVE-2026-7548&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑05‑03&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Edimax BR‑6208AC vulnerability – CVE‑2026‑7685&lt;/strong&gt; (critical) – remote code execution on the Wi‑Fi access point.&lt;/td&gt;
          &lt;td&gt;Edimax devices are often used as test APs for embedded development; compromise could affect OTA update pipelines.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.redpacketsecurity.com/cve-alert-cve-2026-7685-edimax-br-6208ac/&#34;&gt;https://www.redpacketsecurity.com/cve-alert-cve-2026-7685-edimax-br-6208ac/&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑04‑30 – 05‑06&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Multiple GoPhish phishing‑kit detections&lt;/strong&gt; (e.g., 159.65.114.244:3333, 129.213.166.220:3333, 122.170.96.200:3333).&lt;/td&gt;
          &lt;td&gt;GoPhish is a popular phishing‑simulation tool; compromised instances can be abused to harvest credentials from developers and engineers.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.redpacketsecurity.com/gophish-login-detected-159-65-114-244-port-3333/&#34;&gt;https://www.redpacketsecurity.com/gophish-login-detected-159-65-114-244-port-3333/&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h3 id=&#34;4-ransomware-extortion--statesponsored-threat-activity&#34;&gt;4. Ransomware, Extortion &amp;amp; State‑Sponsored Threat Activity&lt;/h3&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Date&lt;/th&gt;
          &lt;th&gt;Event&lt;/th&gt;
          &lt;th&gt;Impact &amp;amp; Relevance&lt;/th&gt;
          &lt;th&gt;Source&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑04‑30&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;ALPHV/BlackCat ransomware sentencing&lt;/strong&gt; – two U.S. operators sentenced to 4 years each; highlighted the ransomware‑as‑a‑service model and the use of compromised credentials to infiltrate victim networks.&lt;/td&gt;
          &lt;td&gt;Demonstrates the continued profitability of ransomware gangs that target enterprise infrastructure, including cloud‑hosted CI/CD pipelines.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.justice.gov/opa/pr/two-americans-who-attacked-multiple-us-victims-using-alphv-blackcat-ransomware-sentenced&#34;&gt;https://www.justice.gov/opa/pr/two-americans-who-attacked-multiple-us-victims-using-alphv-blackcat-ransomware-sentenced&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑05‑05&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Karakurt extortion‑gang negotiator sentenced to 85 years&lt;/strong&gt; – illustrates the scale of organized ransomware extortion operations (Karakurt is a spin‑off of Conti).&lt;/td&gt;
          &lt;td&gt;Highlights the risk of extortion attacks on supply‑chain partners and the importance of robust incident‑response and backup strategies.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/karakurt-extortion-gang-negotiator-sentenced-to-85-years-in-prison/&#34;&gt;https://www.bleepingcomputer.com/news/security/karakurt-extortion-gang-negotiator-sentenced-to-85-years-in-prison/&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h3 id=&#34;5-supplychain--developmenttool-risks&#34;&gt;5. Supply‑Chain &amp;amp; Development‑Tool Risks&lt;/h3&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Date&lt;/th&gt;
          &lt;th&gt;Issue&lt;/th&gt;
          &lt;th&gt;Impact &amp;amp; Relevance&lt;/th&gt;
          &lt;th&gt;Source&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑04‑30&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Chrome “permissions” leak&lt;/strong&gt; (EUVD‑2026‑28025) – allows cross‑origin data leakage over the local network.&lt;/td&gt;
          &lt;td&gt;Affects developers using Chrome for local testing of IoT web interfaces; may expose API keys or firmware binaries.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-28025&#34;&gt;https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-28025&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑05‑02&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Jenkins XSS (CVE‑2026‑42523)&lt;/strong&gt; – as above, directly targets CI/CD tooling.&lt;/td&gt;
          &lt;td&gt;Critical for any automated build or firmware signing pipeline.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://www.yazoul.net/advisory/cve/cve-2026-42523-jenkins-github-plugin-stored-xss&#34;&gt;https://www.yazoul.net/advisory/cve/cve-2026-42523-jenkins-github-plugin-stored-xss&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;strong&gt;2026‑05‑06&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;OpenClaw SSRF (EUVD‑2026‑28021 &amp;amp; EUVD‑2026‑28022)&lt;/strong&gt; – remote site‑isolation bypass in Chrome may be leveraged to attack OpenClaw‑based monitoring tools.&lt;/td&gt;
          &lt;td&gt;Low priority for us but worth noting if OpenClaw is used for internal telemetry.&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-28021&#34;&gt;https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-28021&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h3 id=&#34;6-recommendations-prioritized&#34;&gt;6. Recommendations (Prioritized)&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Patch Linux kernels immediately&lt;/strong&gt; on all Ubuntu, Debian, Alpine, Wolfi hosts. Verify that kernel versions ≥ 5.19.254 (or the vendor‑provided patch) are deployed.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Update Traefik to the latest patched release&lt;/strong&gt; (≥ 2.11.43 / 3.6.14) and audit CRD provider RBAC rules.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Upgrade Chrome to ≥ 148.0.7778.96&lt;/strong&gt; across all developer workstations and CI browsers.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Apply the cPanel/WHM security update&lt;/strong&gt; (or block external access to the admin interface).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Review Jenkins plugins&lt;/strong&gt;; remove or upgrade the vulnerable GitHub plugin.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Scan internal network for exposed IoT gateways&lt;/strong&gt; (Totolink, Edimax) and replace or patch firmware.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enforce MFA and credential‑rotation&lt;/strong&gt; for all Azure AD, Office 365, and GitHub accounts to mitigate ransomware credential‑theft vectors.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Monitor for GoPhish phishing‑kit activity&lt;/strong&gt; using Microsoft Defender ATP and EDR alerts; block known malicious IPs at the perimeter.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;These actions address the highest‑impact findings that intersect with our OS stack, container platform, CI/CD pipeline, and IoT device ecosystem.&lt;/p&gt;</description>
      
    </item>
    
  </channel>
</rss>
