<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:media="http://search.yahoo.com/mrss/"><channel><title>Security Bulletins | sig9 | IT &amp; Cybersecurity Consulting in Zurich, Switzerland</title><link>https://sig9.ch/bulletin/</link><description>Daily cybersecurity intelligence and vulnerability bulletins from sig9.</description><language>en-us</language><lastBuildDate>Wed, 13 May 2026 08:00:00 +0200</lastBuildDate><generator>Hugo</generator><dc:creator>sig9</dc:creator><atom:link href="https://sig9.ch/bulletin/" rel="self" type="application/rss+xml"/><item><title>Hacker Wars - May 13, 2026</title><link>https://sig9.ch/bulletin/2026-05-13/</link><pubDate>Wed, 13 May 2026 08:00:00 +0200</pubDate><dc:creator>sig9</dc:creator><guid>https://sig9.ch/bulletin/2026-05-13/</guid><description>&lt;p>&lt;em>Your daily dose of infosec chaos&lt;/em>&lt;/p>
&lt;hr>
&lt;p>Patch Tuesday dropped like a bad habit this week, and Microsoft is serving up zero-click Outlook vulns like it’s 2016 all over again. Meanwhile, healthcare data keeps walking out the door, and someone figured out how to turn RubyGems into a covert exfiltration channel. Grab your coffee and let’s dig in.&lt;/p></description><enclosure url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-13.png" length="0" type="image/png"/><media:thumbnail url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-13.png"/><media:content url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-13.png" type="image/png" medium="image"/><content:encoded><![CDATA[<img src="https://sig9.ch/images/bulletin/hacker-wars-2026-05-13.png" alt="Security Bulletins" style="max-width:100%;height:auto;" /><p><em>Your daily dose of infosec chaos</em></p>
<hr>
<p>Patch Tuesday dropped like a bad habit this week, and Microsoft is serving up zero-click Outlook vulns like it’s 2016 all over again. Meanwhile, healthcare data keeps walking out the door, and someone figured out how to turn RubyGems into a covert exfiltration channel. Grab your coffee and let’s dig in.</p>
<hr>
<h3 id="microsofts-zero-click-outlook-flaw-is-back-from-the-dead">Microsoft’s Zero-Click Outlook Flaw Is Back From The Dead</h3>
<p>CVE-2026-40361 is a critical zero-click vulnerability in Outlook that echoes the infamous BadWinmail bug from a decade ago - the one they called an “enterprise killer.” This time around, attackers can trigger code execution just by sending you an email. No clicks, no macros, no user interaction required. The vulnerability exists in how Outlook processes certain message formats, and exploitation is about as stealthy as it gets.</p>
<p><strong>What to do:</strong> Patch immediately. If you can’t patch yet, disable TNEF parsing in Outlook and monitor for suspicious process spawning from outlook.exe.</p>
<hr>
<h3 id="openloop-health-breach-exposes-716000-patients">OpenLoop Health Breach Exposes 716,000 Patients</h3>
<p>Telehealth platform OpenLoop Health got popped back in January, and they’re just now telling the 716,000 affected users that their personal data went on a field trip. The breach exposed names, addresses, dates of birth, and health information - basically the full identity theft starter pack. The company took four months to disclose, which is… not great.</p>
<p><strong>What to do:</strong> If you’re an OpenLoop user, freeze your credit and watch for suspicious medical claims. Healthcare orgs: review your third-party vendor security posture yesterday.</p>
<hr>
<h3 id="gemstuffer-turns-rubygems-into-a-data-exfiltration-pipeline">GemStuffer Turns RubyGems Into A Data Exfiltration Pipeline</h3>
<p>Researchers uncovered a novel campaign called GemStuffer that planted over 150 malicious packages on RubyGems. But here’s the twist - these gems weren’t designed to infect developers. Instead, they used the registry as a covert channel to exfiltrate data scraped from U.K. council portals. It’s supply chain abuse with a creative pivot: instead of poisoning code, they’re abusing the package ecosystem as dead-drop infrastructure.</p>
<p><strong>What to do:</strong> Audit your dependencies. Run bundler-audit and review any recently installed gems. Consider pinning gem sources to trusted registries.</p>
<hr>
<h3 id="microsoft-drops-138-patches-including-dns-and-netlogon-rce">Microsoft Drops 138 Patches Including DNS And Netlogon RCE</h3>
<p>Patch Tuesday brought 138 vulnerabilities to fix across Microsoft’s product lineup, with 30 rated Critical. The highlights include remote code execution flaws in DNS and Netlogon - the kind of bugs that let an unauthenticated attacker own your domain controller from across the network. None are known to be exploited in the wild yet, but give it about 48 hours.</p>
<p><strong>What to do:</strong> Prioritize the DNS and Netlogon patches on domain controllers. Test and deploy the Outlook fix ASAP. Everything else can follow your normal patch cycle.</p>
<hr>
<p>That’s the chaos for today. Stay sharp out there.</p>
<hr>
<p><em>Brought to you by sig9</em> - sig9.ch | <em>Protecting the unseen, securing the unknown</em></p>
<p><em>This bulletin is provided for informational purposes. Contact us for tailored security analysis.</em></p>
]]></content:encoded></item><item><title>Hacker Wars - May 12, 2026</title><link>https://sig9.ch/bulletin/2026-05-12/</link><pubDate>Tue, 12 May 2026 08:00:00 +0200</pubDate><dc:creator>sig9</dc:creator><guid>https://sig9.ch/bulletin/2026-05-12/</guid><description>&lt;p>&lt;em>Your daily dose of infosec chaos&lt;/em>&lt;/p>
&lt;hr>
&lt;p>Supply chain attacks are having a banner week, SAP admins are losing sleep, and your car might be snitching on your driving habits. Grab your coffee and let’s dive in.&lt;/p></description><enclosure url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-12.png" length="0" type="image/png"/><media:thumbnail url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-12.png"/><media:content url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-12.png" type="image/png" medium="image"/><content:encoded><![CDATA[<img src="https://sig9.ch/images/bulletin/hacker-wars-2026-05-12.png" alt="Security Bulletins" style="max-width:100%;height:auto;" /><p><em>Your daily dose of infosec chaos</em></p>
<hr>
<p>Supply chain attacks are having a banner week, SAP admins are losing sleep, and your car might be snitching on your driving habits. Grab your coffee and let’s dive in.</p>
<hr>
<h3 id="shai-hulud-worm-devours-npm-and-pypi-supply-chain">Shai-Hulud Worm Devours npm and PyPI Supply Chain</h3>
<p>A self-propagating worm dubbed Shai-Hulud has torn through hundreds of packages on npm and PyPI, embedding signed credential-stealing malware into popular developer dependencies. The attack leveraged package signing to appear legitimate, making detection significantly harder than your typical typosquat. If your CI/CD pipeline pulled TanStack or Mistral-related packages recently, assume compromise.</p>
<p><strong>What to do:</strong> Audit your dependency lockfiles immediately and rotate any credentials that were present in build environments.</p>
<hr>
<h3 id="sap-patches-critical-flaws-in-commerce-cloud-and-s4hana">SAP Patches Critical Flaws in Commerce Cloud and S/4HANA</h3>
<p>SAP’s May 2026 security patches drop 15 fixes, including two critical vulnerabilities in Commerce Cloud and S/4HANA that could lead to remote code execution. These are enterprise-grade platforms handling sensitive financial and customer data, so the blast radius of an unpatched exploit is measured in “board presentations.” SAP rated the worst of them CVSS 9.8, which is basically “please patch this before lunch.”</p>
<p><strong>What to do:</strong> Review SAP Security Note 3594521 and prioritize patching internet-facing Commerce Cloud instances.</p>
<hr>
<h3 id="gm-settles-for-1275m-over-selling-driver-data">GM Settles for $12.75M Over Selling Driver Data</h3>
<p>General Motors agreed to pay $12.75 million to settle California CCPA violations after allegedly selling driver telemetry data without proper consent. The data reportedly included detailed driving behavior that was shared with insurance companies, which is a polite way of saying your car was a narc. This settlement is another reminder that connected vehicles are rolling surveillance platforms with cup holders.</p>
<p><strong>What to do:</strong> Review your organization’s connected vehicle policies and check what data your fleet management tools actually collect and share.</p>
<hr>
<h3 id="ghostlock-poc-weaponizes-windows-file-api-for-ransomware-style-locking">GhostLock PoC Weaponizes Windows File API for Ransomware-Style Locking</h3>
<p>A researcher released GhostLock, a proof-of-concept that abuses a legitimate Windows file API to lock access to local and SMB network files without encrypting them. This is a nasty twist on the ransomware playbook - no encryption means no decryption keys to negotiate, and traditional anti-ransomware tools won’t flag it. The technique essentially holds your files hostage using the OS’s own locking mechanisms.</p>
<p><strong>What to do:</strong> Monitor for unusual file handle patterns and consider implementing behavioral detection rules for bulk file-locking operations.</p>
<hr>
<h3 id="fcc-softens-its-ban-on-foreign-made-routers">FCC Softens Its Ban on Foreign-Made Routers</h3>
<p>The FCC eased some restrictions and pushed back deadlines on its ban of foreign-manufactured routers, giving vendors more breathing room but keeping the core prohibition intact. The ban, driven by national security concerns over supply chain integrity in networking equipment, still targets routers from specific manufacturers deemed high-risk. If you thought replacing your infrastructure was expensive before, imagine doing it on a government-mandated timeline.</p>
<p><strong>What to do:</strong> Inventory your network equipment and identify any affected foreign-manufactured routers before enforcement deadlines hit.</p>
<hr>
<p>Catch you tomorrow. In the meantime, go check your attack surface.</p>
<hr>
<p><em>Brought to you by sig9</em> - sig9.ch | <em>Protecting the unseen, securing the unknown</em></p>
<p><em>This bulletin is provided for informational purposes. Contact us for tailored security analysis.</em></p>
]]></content:encoded></item><item><title>Hacker Wars - May 11, 2026</title><link>https://sig9.ch/bulletin/2026-05-11/</link><pubDate>Mon, 11 May 2026 08:00:00 +0200</pubDate><dc:creator>sig9</dc:creator><guid>https://sig9.ch/bulletin/2026-05-11/</guid><description>&lt;p>&lt;em>Your daily dose of infosec chaos&lt;/em>&lt;/p>
&lt;hr>
&lt;p>Today we’ve got supply chain attacks hitting security tools, a Linux vuln with a familiar dirty name, and malware getting creative with blockchain. Again, if you thought AI repos were safe, think again. Grab your coffee and let’s dive in.&lt;/p></description><enclosure url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-11.png" length="0" type="image/png"/><media:thumbnail url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-11.png"/><media:content url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-11.png" type="image/png" medium="image"/><content:encoded><![CDATA[<img src="https://sig9.ch/images/bulletin/hacker-wars-2026-05-11.png" alt="Security Bulletins" style="max-width:100%;height:auto;" /><p><em>Your daily dose of infosec chaos</em></p>
<hr>
<p>Today we’ve got supply chain attacks hitting security tools, a Linux vuln with a familiar dirty name, and malware getting creative with blockchain. Again, if you thought AI repos were safe, think again. Grab your coffee and let’s dive in.</p>
<hr>
<h3 id="checkmarx-jenkins-plugin-gets-backdoored-in-supply-chain-attack">Checkmarx Jenkins Plugin Gets Backdoored in Supply Chain Attack</h3>
<p>A malicious version of the Checkmarx Jenkins AST plugin was pushed to the Jenkins Marketplace last week. If you’re running this in your CI/CD pipeline, you might have invited an attacker to the party.</p>
<p><strong>What to do:</strong> Audit your Jenkins plugins immediately and verify checksums against the official Checkmarx releases.</p>
<hr>
<h3 id="dirty-frag-new-linux-vulnerability-under-active-exploitation">Dirty Frag: New Linux Vulnerability Under Active Exploitation</h3>
<p>CVE-2026-43284 and CVE-2026-43500, collectively known as “Dirty Frag” (or Copy Fail 2), have been disclosed before patches were ready. The vulnerability affects Linux systems and is possibly already being exploited in the wild.</p>
<p><strong>What to do:</strong> Monitor for kernel patches from your distro and consider disabling affected features until a fix is available.</p>
<hr>
<h3 id="fake-openai-repo-hits-1-on-hugging-face-with-244k-downloads">Fake OpenAI Repo Hits #1 on Hugging Face With 244K Downloads</h3>
<p>A malicious repository impersonating OpenAI’s Privacy Filter model climbed to the top of Hugging Face’s trending list. The Rust-based stealer hit Windows users who trusted the repo without verifying its authenticity. Supply chain attacks in the ML ecosystem are becoming a real problem.</p>
<p><strong>What to do:</strong> Always verify model publishers and check repository metadata before downloading from Hugging Face.</p>
<hr>
<h3 id="canvas-lms-back-online-after-cyberattack-disrupted-schools-worldwide">Canvas LMS Back Online After Cyberattack Disrupted Schools Worldwide</h3>
<p>The Canvas learning management system is back online after a cyberattack knocked it offline during exam season. Tens of thousands of students were affected globally. Details on the attack vector are still sparse, but the timing suggests deliberate targeting.</p>
<p><strong>What to do:</strong> If your organization uses Canvas, review access logs and ensure MFA is enabled for all accounts.</p>
<hr>
<h3 id="trickmo-malware-adopts-ton-blockchain-for-stealthy-c2-communications">TrickMo Malware Adopts TON Blockchain for Stealthy C2 Communications</h3>
<p>The TrickMo Android banking trojan is now using The Open Network (TON) blockchain for command-and-control communications. This makes takedowns significantly harder since blockchain infrastructure is decentralized and resilient. European users are the primary targets.</p>
<p><strong>What to do:</strong> Keep your Android devices updated and avoid sideloading apps from unofficial sources.</p>
<hr>
<p>Catch you tomorrow. In the meantime, go check your attack surface.</p>
<hr>
<p><em>Brought to you by sig9</em> - sig9.ch | <em>Protecting the unseen, securing the unknown</em></p>
<p><em>This bulletin is provided for informational purposes. Contact us for tailored security analysis.</em></p>
]]></content:encoded></item><item><title>Hacker Wars - May 08, 2026</title><link>https://sig9.ch/bulletin/2026-05-08/</link><pubDate>Fri, 08 May 2026 08:00:00 +0200</pubDate><dc:creator>sig9</dc:creator><guid>https://sig9.ch/bulletin/2026-05-08/</guid><description>&lt;p>&lt;em>Your daily dose of infosec chaos&lt;/em>&lt;/p>
&lt;hr>
&lt;p>Today’s theme: everything is on fire, and some of it is your fault. We’ve got a Linux kernel zero-day with a PoC already in the wild, a security vendor getting pwned by the very threat actors they’re supposed to stop, and AI agents getting hijacked through sloppy Chrome extensions. Buckle up.&lt;/p></description><enclosure url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-08.png" length="0" type="image/png"/><media:thumbnail url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-08.png"/><media:content url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-08.png" type="image/png" medium="image"/><content:encoded><![CDATA[<img src="https://sig9.ch/images/bulletin/hacker-wars-2026-05-08.png" alt="Security Bulletins" style="max-width:100%;height:auto;" /><p><em>Your daily dose of infosec chaos</em></p>
<hr>
<p>Today’s theme: everything is on fire, and some of it is your fault. We’ve got a Linux kernel zero-day with a PoC already in the wild, a security vendor getting pwned by the very threat actors they’re supposed to stop, and AI agents getting hijacked through sloppy Chrome extensions. Buckle up.</p>
<hr>
<h3 id="dirty-frag-linux-kernel-zero-day-hands-attackers-root-everywhere">Dirty Frag: Linux Kernel Zero-Day Hands Attackers Root Everywhere</h3>
<p>A new local privilege escalation vulnerability dubbed Dirty Frag - a spiritual successor to the infamous Dirty Pipe - lets any local user escalate to root on most major Linux distros with a single command. The PoC is already public, and patches are still pending for many distributions.</p>
<p><strong>What to do:</strong> Monitor your distro’s security advisories religiously, restrict local access to critical systems, and consider disabling unprivileged user namespaces until patches land.</p>
<hr>
<h3 id="ransomhouse-pwns-trellix-security-industry-pretends-not-to-see">RansomHouse Pwns Trellix, Security Industry Pretends Not to See</h3>
<p>RansomHouse - a ransomware group - has breached Trellix, the security vendor formed from the merger of McAfee Enterprise and FireEye. They’ve posted screenshots of internal access as proof. The irony of a security company getting hit by the exact threats they sell protection against is almost too perfect.</p>
<p><strong>What to do:</strong> Review your own vendor risk management. If your security vendor can’t secure themselves, what does that say about your supply chain?</p>
<hr>
<h3 id="claude-chrome-extension-vulnerable-to-prompt-injection-takeover">Claude Chrome Extension Vulnerable to Prompt Injection Takeover</h3>
<p>Researchers found that Anthropic’s Claude browser extension for Chrome has weak permission boundaries and flawed trust logic, allowing malicious web pages to inject prompts and hijack the AI agent. Your helpful AI assistant could be silently turned against you while you browse.</p>
<p><strong>What to do:</strong> Disable or remove the Claude Chrome extension until a patched version is released. If you must use it, avoid browsing untrusted sites with the extension active.</p>
<hr>
<h3 id="shinyhunters-defaces-hundreds-of-canvas-login-portals">ShinyHunters Defaces Hundreds of Canvas Login Portals</h3>
<p>The ShinyHunters extortion gang hit Instructure’s Canvas LPS again, this time defacing login pages for hundreds of universities and school districts with ransom demands. Students and faculty were met with threats to leak stolen data instead of their usual login screens. Education remains a soft target.</p>
<p><strong>What to do:</strong> If your organization uses Canvas, monitor for official breach notifications, force password resets for affected accounts, and brief users on phishing risks stemming from potential data exposure.</p>
<hr>
<h3 id="tclbanker-spreads-itself-through-whatsapp-and-outlook">TCLBanker Spreads Itself Through WhatsApp and Outlook</h3>
<p>A new banking trojan called TCLBanker is spreading via trojanized Logitech AI Prompt Builder installers, then self-propagating through WhatsApp and Outlook messages. It targets 59 banking, fintech, and crypto platforms. The malware is borrowing worm-like tactics from the 2010s playbook, and apparently it still works.</p>
<p><strong>What to do:</strong> Don’t download software from unofficial sources. Alert your SOC to watch for unusual MSI installer activity and outbound connections to banking domains from non-finance endpoints.</p>
<hr>
<p>Catch you tomorrow. In the meantime, go check your attack surface.</p>
<hr>
<p><em>Brought to you by sig9</em> - sig9.ch | <em>Protecting the unseen, securing the unknown</em></p>
<p><em>This bulletin is provided for informational purposes. Contact us for tailored security analysis.</em></p>
]]></content:encoded></item><item><title>Hacker Wars - May 07, 2026</title><link>https://sig9.ch/bulletin/2026-05-07/</link><pubDate>Thu, 07 May 2026 08:00:00 +0200</pubDate><dc:creator>sig9</dc:creator><guid>https://sig9.ch/bulletin/2026-05-07/</guid><description>&lt;p>&lt;em>Your daily dose of infosec chaos&lt;/em>&lt;/p>
&lt;hr>
&lt;p>Today’s theme is clear: AI is not just a tool defenders use. Attackers are wielding it to breach water utilities, researchers are finding critical vulns in AI developer tools, and enterprise gear keeps needing emergency patches. Buckle up.&lt;/p></description><enclosure url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-07.png" length="0" type="image/png"/><media:thumbnail url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-07.png"/><media:content url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-07.png" type="image/png" medium="image"/><content:encoded><![CDATA[<img src="https://sig9.ch/images/bulletin/hacker-wars-2026-05-07.png" alt="Security Bulletins" style="max-width:100%;height:auto;" /><p><em>Your daily dose of infosec chaos</em></p>
<hr>
<p>Today’s theme is clear: AI is not just a tool defenders use. Attackers are wielding it to breach water utilities, researchers are finding critical vulns in AI developer tools, and enterprise gear keeps needing emergency patches. Buckle up.</p>
<hr>
<h3 id="cisco-patches-critical-vulns-leading-to-code-execution-and-ssrf">Cisco Patches Critical Vulns Leading to Code Execution and SSRF</h3>
<p>Cisco shipped fixes for high-severity flaws across its enterprise product lineup that could let attackers achieve code execution or server-side request forgery. If your org runs Cisco gear - and whose doesn’t - these patches need to jump to the top of your queue before exploitation attempts ramp up.</p>
<p><strong>What to do:</strong> Inventory your Cisco deployments and apply the relevant patches immediately. Prioritize internet-facing appliances.</p>
<hr>
<h3 id="claude-ai-used-to-guide-attack-on-mexican-water-utility">Claude AI Used to Guide Attack on Mexican Water Utility</h3>
<p>Dragos revealed that threat actors used Claude AI to help navigate and target OT assets during an intrusion at a water and drainage utility in Mexico. The AI helped attackers understand industrial control systems they likely had no prior expertise with. Welcome to the era of AI-assisted critical infrastructure attacks.</p>
<p><strong>What to do:</strong> Segment your OT networks aggressively. Treat AI chatbots as potential attack enablers when assessing threat models. Monitor for anomalous OT traffic patterns.</p>
<hr>
<h3 id="gemini-cli-had-a-prompt-injection-vuln-that-couldve-wiped-repos">Gemini CLI Had a Prompt Injection Vuln That Could’ve Wiped Repos</h3>
<p>A vulnerability in Google’s Gemini CLI could have allowed attackers to inject malicious prompts via GitHub issues, leading to arbitrary code execution and potential supply chain attacks. The AI agent designed to triage issues could instead be weaponized against the repos it was supposed to help manage.</p>
<p><strong>What to do:</strong> Audit any AI agents integrated into your CI/CD pipelines. Implement strict prompt sanitization and sandboxing for AI-driven automation.</p>
<hr>
<h3 id="pypi-packages-caught-dropping-zichatbot-malware-on-windows-and-linux">PyPI Packages Caught Dropping ZiChatBot Malware on Windows and Linux</h3>
<p>Three malicious packages on PyPI were found delivering a previously unknown malware called ZiChatBot, using Zulip APIs for command-and-control on both Windows and Linux. The packages looked legitimate enough to fool developers into installing them, because of course they did.</p>
<p><strong>What to do:</strong> Pin your dependencies and verify package integrity. Consider using a private package registry or at minimum run automated supply chain scanning in your pipelines.</p>
<hr>
<p>That’s the chaos for today. Stay sharp out there.</p>
<hr>
<p><em>Brought to you by sig9</em> - sig9.ch | <em>Protecting the unseen, securing the unknown</em></p>
<p><em>This bulletin is provided for informational purposes. Contact us for tailored security analysis.</em></p>
]]></content:encoded></item><item><title>Hacker Wars - May 06, 2026</title><link>https://sig9.ch/bulletin/2026-05-06/</link><pubDate>Wed, 06 May 2026 12:00:00 +0200</pubDate><dc:creator>sig9</dc:creator><guid>https://sig9.ch/bulletin/2026-05-06/</guid><description>&lt;p>&lt;em>Your daily dose of infosec chaos&lt;/em>&lt;/p>
&lt;hr>
&lt;p>Today’s theme: your firewall is on fire, your favorite disc imaging tool is a trojan horse, and developers are the new prime targets. Just another Wednesday in the infosec trenches.&lt;/p></description><enclosure url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-06.png" length="0" type="image/png"/><media:thumbnail url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-06.png"/><media:content url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-06.png" type="image/png" medium="image"/><content:encoded><![CDATA[<img src="https://sig9.ch/images/bulletin/hacker-wars-2026-05-06.png" alt="Security Bulletins" style="max-width:100%;height:auto;" /><p><em>Your daily dose of infosec chaos</em></p>
<hr>
<p>Today’s theme: your firewall is on fire, your favorite disc imaging tool is a trojan horse, and developers are the new prime targets. Just another Wednesday in the infosec trenches.</p>
<hr>
<h3 id="palo-alto-firewall-zero-day-under-active-exploitation">Palo Alto Firewall Zero-Day Under Active Exploitation</h3>
<p>CVE-2026-0300 is a critical buffer overflow in PAN-OS Captive Portal service, scoring a spicy 9.3 CVSS. It allows unauthenticated remote code execution on PA and VM-series firewalls - meaning attackers can own your perimeter gear without even logging in. Exploitation is already happening in the wild.</p>
<p><strong>What to do:</strong> Patch PAN-OS immediately. If you can’t patch yet, disable or restrict access to the Captive Portal service.</p>
<hr>
<h3 id="daemon-tools-supply-chain-attack-hits-governments">DAEMON Tools Supply Chain Attack Hits Governments</h3>
<p>Attackers trojanized the official DAEMON Tools installer starting April 8, pushing backdoors to thousands of downloaders worldwide. But here’s the interesting part: the sophisticated payload only deployed on about a dozen high-value systems belonging to government and scientific organizations. Classic supply chain hit with surgical precision.</p>
<p><strong>What to do:</strong> Check if your org installed DAEMON Tools recently. Verify installer hashes and scan endpoints for indicators of compromise.</p>
<hr>
<h3 id="new-quasar-linux-malware-hunts-developers">New Quasar Linux Malware Hunts Developers</h3>
<p>A previously unknown Linux implant called QLNX is making rounds, combining rootkit, backdoor, and credential-stealing capabilities into one nasty package. It specifically targets developer workstations - because of course it does, that’s where the keys to the kingdom live. Source code repos, cloud creds, CI/CD pipelines, all the goodies.</p>
<p><strong>What to do:</strong> Audit developer endpoints for unusual processes or rootkit indicators. Review access controls for source code repositories and CI/CD secrets.</p>
<hr>
<h3 id="instructure-breach-exposes-280-million-education-records">Instructure Breach Exposes 280 Million Education Records</h3>
<p>The edtech giant behind Canvas LMS got hit, and the attacker claims to have stolen data from 8,800 schools and universities - 280 million records covering students and staff. That’s a significant chunk of the global education sector’s data in one shot.</p>
<p><strong>What to do:</strong> If your institution uses Instructure products, monitor for updates on affected datasets and watch for targeted phishing using leaked student/staff information.</p>
<hr>
<p>Catch you tomorrow. In the meantime, go check your attack surface.</p>
<hr>
<p><em>Brought to you by sig9</em> - sig9.ch | <em>Protecting the unseen, securing the unknown</em></p>
<p><em>This bulletin is provided for informational purposes. Contact us for tailored security analysis.</em></p>
]]></content:encoded></item><item><title>Hacker Wars - May 05, 2026</title><link>https://sig9.ch/bulletin/2026-05-05/</link><pubDate>Tue, 05 May 2026 08:00:00 +0200</pubDate><dc:creator>sig9</dc:creator><guid>https://sig9.ch/bulletin/2026-05-05/</guid><description>&lt;p>&lt;em>Your daily dose of infosec chaos&lt;/em>&lt;/p>
&lt;hr>
&lt;p>We’re kicking off Hacker Wars, a daily security newsletter from sig9 where we break down the most important infosec stories so you don’t have to. Expect concise, no-BS coverage of vulnerabilities, breaches, and the creative ways attackers are ruining everyone’s day. No fluff, no vendor pitches, just the stuff that matters. Let’s get into today’s batch.&lt;/p></description><enclosure url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-05.png" length="0" type="image/png"/><media:thumbnail url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-05.png"/><media:content url="https://sig9.ch/images/bulletin/hacker-wars-2026-05-05.png" type="image/png" medium="image"/><content:encoded><![CDATA[<img src="https://sig9.ch/images/bulletin/hacker-wars-2026-05-05.png" alt="Security Bulletins" style="max-width:100%;height:auto;" /><p><em>Your daily dose of infosec chaos</em></p>
<hr>
<p>We’re kicking off Hacker Wars, a daily security newsletter from sig9 where we break down the most important infosec stories so you don’t have to. Expect concise, no-BS coverage of vulnerabilities, breaches, and the creative ways attackers are ruining everyone’s day. No fluff, no vendor pitches, just the stuff that matters. Let’s get into today’s batch.</p>
<hr>
<h3 id="karakurt-extortion-gang-negotiator-gets-85-years-in-prison">Karakurt Extortion Gang Negotiator Gets 8.5 Years in Prison</h3>
<p>A Latvian national who served as a negotiator for the Russian Karakurt ransomware group has been sentenced to 8.5 years in a US prison. The case highlights that even “cold case” cybercrime investigations eventually catch up with the perpetrators, and law enforcement is getting better at pursuing these actors across borders.</p>
<p><strong>What to do:</strong> If you’re dealing with a ransomware incident, remember that paying the ransom doesn’t guarantee anything and may expose you to legal liability.</p>
<hr>
<h3 id="cloudz-malware-abuses-microsoft-phone-link-to-steal-sms-and-otps">CloudZ Malware Abuses Microsoft Phone Link to Steal SMS and OTPs</h3>
<p>A new CloudZ RAT variant is deploying a plugin called Pheno that hijacks Microsoft Phone Link to intercept SMS messages and one-time passwords directly from your phone. This is particularly nasty because it bypasses SMS-based 2FA entirely by reading messages before you even see them.</p>
<p><strong>What to do:</strong> Stop relying on SMS for 2FA. Switch to authenticator apps or hardware keys. Also, audit what apps have access to your Phone Link connection.</p>
<hr>
<h3 id="scarcruft-hacks-gaming-platform-to-deploy-birdcall-malware-on-android-and-windows">ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows</h3>
<p>North Korean hacking group ScarCruft compromised a video game platform in a supply chain attack, trojanizing game components with a backdoor called BirdCall. The attack targeted ethnic Koreans in China and deployed malware on both Android and Windows systems through the same trusted platform.</p>
<p><strong>What to do:</strong> Be cautious with game mods and third-party game components. Consider running games in sandboxed environments if you’re in a high-risk demographic.</p>
<hr>
<h3 id="microsoft-details-phishing-campaign-targeting-35000-users-across-26-countries">Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries</h3>
<p>Microsoft exposed a massive credential theft campaign that hit 35,000 users across 26 countries. The attackers used code-of-conduct-themed lures and legitimate email services to redirect victims to credential-harvesting domains. The multi-stage approach made detection particularly difficult.</p>
<p><strong>What to do:</strong> Train employees to recognize phishing attempts, even when they appear to come from legitimate sources. Implement conditional access policies to limit token abuse.</p>
<hr>
<h3 id="whatsapp-discloses-file-spoofing-arbitrary-url-scheme-vulnerabilities">WhatsApp Discloses File Spoofing, Arbitrary URL Scheme Vulnerabilities</h3>
<p>WhatsApp patched two security flaws that could have allowed attackers to spoof file types and trigger arbitrary URL schemes. The vulnerabilities were responsibly disclosed through Meta’s bug bounty program and have already been fixed in recent updates.</p>
<p><strong>What to do:</strong> Update WhatsApp immediately if you haven’t recently. This is a good reminder that even end-to-end encrypted apps can have implementation vulnerabilities.</p>
<hr>
<p><em>Brought to you by sig9</em> - sig9.ch | <em>Protecting the unseen, securing the unknown</em></p>
<hr>
<p><em>This bulletin is provided for informational purposes. Contact us for tailored security analysis.</em></p>
]]></content:encoded></item></channel></rss>