<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[CyberMaterial]]></title><description><![CDATA[CyberMaterial turns cybersecurity data into actionable insights and practical advice to keep you safe online. Stay updated with the latest news, alerts, incidents, jobs, events, tools, books, and in-depth analysis.]]></description><link>https://www.cybermaterial.com</link><image><url>https://substackcdn.com/image/fetch/$s_!nNgF!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6c57d21-5644-4f88-bf07-ea44d2603e80_482x482.png</url><title>CyberMaterial</title><link>https://www.cybermaterial.com</link></image><generator>Substack</generator><lastBuildDate>Wed, 06 May 2026 11:12:25 GMT</lastBuildDate><atom:link href="https://www.cybermaterial.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[CyberMaterial]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cybermaterial@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cybermaterial@substack.com]]></itunes:email><itunes:name><![CDATA[CyberMaterial]]></itunes:name></itunes:owner><itunes:author><![CDATA[CyberMaterial]]></itunes:author><googleplay:owner><![CDATA[cybermaterial@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cybermaterial@substack.com]]></googleplay:email><googleplay:author><![CDATA[CyberMaterial]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Cyber Briefing: 2026.05.05]]></title><description><![CDATA[Sophisticated supply chain attacks and critical hardware vulnerabilities are clashing with tougher legal enforcement and new attribution frameworks as the industry balances heightened risk against ...]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260505</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260505</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Tue, 05 May 2026 14:02:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!C7Hy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!C7Hy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!C7Hy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!C7Hy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!C7Hy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!C7Hy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!C7Hy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/abe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:105657,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196535562?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!C7Hy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!C7Hy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!C7Hy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!C7Hy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabe52ad7-8579-4343-bd68-a60be4b107b3_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">The global threat landscape is currently dominated by high-impact supply chain compromises and critical infrastructure vulnerabilities. North Korean state-sponsored group ScarCruft has successfully pivoted to supply chain attacks by trojanizing gaming platforms to deploy the BirdCall backdoor, while Trellix, a major cybersecurity vendor, recently confirmed that threat actors gained unauthorized access to its source code repository. Simultaneously, hardware and software giants like Qualcomm and WhatsApp have rushed to patch critical flaws&#8212;ranging from remote code execution in chipsets to URL execution vulnerabilities in Instagram Reels integration&#8212;highlighting a persistent trend where attackers exploit trusted third-party integrations and ubiquitous hardware to gain foothold in diverse environments.</p><p style="text-align: justify;">On the regulatory and strategic front, the industry is seeing a shift toward more nuanced attribution and a reversal in privacy standards. The introduction of DarkAtlas&#8217;s campaign-based attribution framework represents a move away from rigid group labels toward a multi-layered, confidence-based model for tracking APT evolution. Meanwhile, legal systems are securing wins against cybercrime infrastructure, evidenced by the 8.5-year sentencing of a Latvian negotiator for the Karakurt ransomware group. However, user privacy faces a setback as Meta announces the discontinuation of end-to-end encryption for Instagram DMs, citing low adoption and shifting focus toward moderation and AI training capabilities.</p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;May 05, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/2ZU1HrM1Qr5fVQFl9Ipg1B&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/2ZU1HrM1Qr5fVQFl9Ipg1B" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h2>&#9889;THREAT LANDSCAPE</h2><div><hr></div><p><strong>CISA Adds Major Linux Kernel Vulnerability to Known Exploited Vulnerabilities Catalog</strong></p><p>The United States Cybersecurity and Infrastructure Security Agency has officially added CVE-2026-31431, a critical Linux Kernel flaw known as Copy Fail, to its list of exploited vulnerabilities. This high-severity bug allows unprivileged local users to gain root access across nearly all major Linux distributions by manipulating the system page cache. <strong><a href="https://www.cybermaterial.com/p/cisa-adds-major-linux-kernel-vulnerability">Read More</a></strong></p><p><strong>Cybercrime Syndicates Exploit Vishing and SSO Vulnerabilities for High-Speed Cloud Extortion</strong></p><p>Recent investigations into modern cyber threats reveal that sophisticated hacking groups are increasingly leveraging voice phishing and Single Sign-On weaknesses to execute rapid extortion campaigns against corporate SaaS environments. These attackers bypass traditional perimeter defenses by tricking employees into revealing credentials or approving multi-factor authentication prompts, allowing them to move laterally through cloud applications with unprecedented speed. <strong><a href="https://www.cybermaterial.com/p/cybercrime-syndicates-exploit-vishing">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h2><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h2><div><hr></div><p><strong>Trellix Confirms Unauthorized Source Code Access</strong></p><p>Trellix, a major US cybersecurity vendor formed from the 2021 merger of McAfee Enterprise and FireEye, disclosed on May 4 that threat actors gained unauthorized access to a portion of its source code repository. The company claims no evidence shows its code release or distribution process was compromised or that the stolen code has been exploited, though investigations continue with law enforcement and forensic experts. Security researchers warn that access to a security vendor&#8217;s source code provides attackers with detailed knowledge of detection mechanisms and potential supply chain attack vectors, particularly concerning recent campaigns targeting security tools like Trivy that exposed enterprise credentials.<a href="https://www.cybermaterial.com/p/trellix-confirms-unauthorized-source"> </a><strong><a href="https://www.cybermaterial.com/p/trellix-confirms-unauthorized-source">Read More</a></strong></p><p><strong>ScarCruft Compromises Gaming Platform</strong></p><p>North Korean state-sponsored hacking group ScarCruft compromised a video game platform in a supply chain attack, embedding the BirdCall backdoor into platform components. The attack specifically targets ethnic Koreans living in China, expanding beyond the backdoor&#8217;s previous Windows-only deployment. By trojanizing legitimate gaming software, the attackers can distribute malware to a broader user base through trusted update mechanisms. <strong><a href="https://www.cybermaterial.com/p/scarcruft-compromises-gaming-platform">Read More</a></strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h2><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h2><div><hr></div><p><strong>New Attribution Framework for APT Campaign Tracking</strong></p><p>Security researchers at DarkAtlas have introduced a campaign-based attribution framework that tracks Advanced Persistent Threat (APT) groups by analyzing discrete operational clusters rather than assuming fixed group identities. The framework uses a multi-layered evidence model examining six dimensions (strategic, operational, tactical, technical, infrastructure, and human factors) to establish confidence-based connections between campaigns, addressing the problem that adversaries frequently change tools, infrastructure, and personnel. This approach replaces single-indicator attribution with a Campaign Linkage Graph that maps weighted relationships between operations, allowing analysts to track threat actor evolution without relying on rigid group labels. <strong><a href="https://www.cybermaterial.com/p/new-attribution-framework-for-apt">Read More</a></strong></p><p><strong>Instagram Discontinues End-to-End Encryption</strong></p><p>Meta will discontinue Instagram&#8217;s optional end-to-end encrypted direct messaging feature on May 8, 2026, citing low adoption rates. After this date, all Instagram direct messages will use standard transport encryption, meaning Meta&#8217;s servers can decrypt and access message content for moderation, AI training, and law enforcement requests. Users who previously used encrypted chats have until May 8 to export their encrypted message history before it becomes accessible to Meta&#8217;s systems.<strong> <a href="https://www.cybermaterial.com/p/instagram-discontinues-end-to-end">Read More</a></strong></p><p></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><p><strong>Karakurt negotiator sentenced to 8.5 years</strong></p><p>A Latvian national has been sentenced to 8.5 years in U.S. prison for serving as a negotiator for the Karakurt ransomware group, a Russian cybercrime operation. The defendant was extradited to the United States to face charges related to his role in facilitating ransom negotiations between the criminal group and its victims. Organizations should review their incident response plans and ensure they have protocols for handling ransomware negotiations while cooperating with law enforcement.<a href="https://www.cybermaterial.com/p/karakurt-negotiator-sentenced-to"> </a><strong><a href="https://www.cybermaterial.com/p/karakurt-negotiator-sentenced-to">Read More</a></strong></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>Carleton College launches student cybersecurity teams</strong></p><p>Carleton College has launched student cybersecurity teams with funding support from Shavlik to provide dedicated servers for training and competition. Information Security Officer Kendall George is directing the project across multiple colleges. The initiative aims to develop practical cybersecurity skills among students through hands-on team activities. <strong><a href="https://www.cybermaterial.com/p/carleton-college-launches-student">Read More</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Ask Me Anything Cyber: Bolster AI - Protecting the Internet at Scale]]></title><description><![CDATA[Expert perspectives can make cybersecurity conversations more useful, more practical, and more grounded.]]></description><link>https://www.cybermaterial.com/p/ask-me-anything-cyber-bolster-ai</link><guid isPermaLink="false">https://www.cybermaterial.com/p/ask-me-anything-cyber-bolster-ai</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Tue, 05 May 2026 12:53:50 GMT</pubDate><enclosure url="https://substack-video.s3.amazonaws.com/video_upload/post/192290227/fc30aa0e-cb64-40aa-bf07-db5efe8ba82a/transcoded-69541.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><br>Sofia C. V. and Rod Schultz joined the latest edition of Ask Me Anything Cyber on Thursday, April 30, 2026, at 12:00 PM EDT for a live discussion shaped by audience questions, shared perspectives, an&#8230;</p>
      <p>
          <a href="https://www.cybermaterial.com/p/ask-me-anything-cyber-bolster-ai">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Carleton College launches student cybersecurity teams]]></title><description><![CDATA[Carleton College has established new student cybersecurity teams designed to provide hands-on security training and competitive opportunities.]]></description><link>https://www.cybermaterial.com/p/carleton-college-launches-student</link><guid isPermaLink="false">https://www.cybermaterial.com/p/carleton-college-launches-student</guid><pubDate>Tue, 05 May 2026 12:23:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!E48r!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ee112a2-4cb4-46f5-b8ff-af0252ed3f63_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!E48r!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ee112a2-4cb4-46f5-b8ff-af0252ed3f63_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!E48r!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ee112a2-4cb4-46f5-b8ff-af0252ed3f63_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!E48r!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ee112a2-4cb4-46f5-b8ff-af0252ed3f63_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!E48r!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ee112a2-4cb4-46f5-b8ff-af0252ed3f63_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!E48r!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ee112a2-4cb4-46f5-b8ff-af0252ed3f63_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!E48r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ee112a2-4cb4-46f5-b8ff-af0252ed3f63_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1ee112a2-4cb4-46f5-b8ff-af0252ed3f63_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:748155,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196535450?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ee112a2-4cb4-46f5-b8ff-af0252ed3f63_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!E48r!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ee112a2-4cb4-46f5-b8ff-af0252ed3f63_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!E48r!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ee112a2-4cb4-46f5-b8ff-af0252ed3f63_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!E48r!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ee112a2-4cb4-46f5-b8ff-af0252ed3f63_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!E48r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ee112a2-4cb4-46f5-b8ff-af0252ed3f63_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Carleton College has established new student cybersecurity teams designed to provide hands-on security training and competitive opportunities. The program receives financial backing from Shavlik, which will supply dedicated server infrastructure for participating institutions.<br><br>Kendall George, who serves as Information Security Officer for the colleges involved, is directing the cybersecurity team project. The Shavlik funding will enable each participating school to deploy its own server environment for student training exercises and security competitions.<br><br>The technical infrastructure provided through this support will give students access to realistic environments where they can practice defensive and offensive security techniques. Dedicated servers allow teams to conduct exercises without impacting production systems, providing a safe space for learning through experimentation and simulated attacks.<br><br>This initiative addresses the growing demand for cybersecurity professionals by creating pathways for students to gain practical experience before entering the workforce. Student security teams typically participate in capture-the-flag competitions, vulnerability assessments, and other exercises that mirror real-world security challenges.<br><br>Colleges looking to develop similar programs should consider partnerships with security vendors for infrastructure support and ensure experienced security professionals are available to mentor student participants. Students interested in cybersecurity careers can benefit from joining these teams to build technical skills and professional networks in the security community.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.carleton.edu/news/stories/funds-will-launch-student-cybersecurity-teams/ </p>]]></content:encoded></item><item><title><![CDATA[Karakurt negotiator sentenced to 8.5 years]]></title><description><![CDATA[A Latvian citizen has been sentenced to 8.5 years in federal prison after being convicted for his role as a negotiator for the Karakurt ransomware group, a Russian cybercrime operation.]]></description><link>https://www.cybermaterial.com/p/karakurt-negotiator-sentenced-to</link><guid isPermaLink="false">https://www.cybermaterial.com/p/karakurt-negotiator-sentenced-to</guid><pubDate>Tue, 05 May 2026 12:22:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!jSm5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff02d8124-bc30-4802-8023-2ff5e95ad47c_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jSm5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff02d8124-bc30-4802-8023-2ff5e95ad47c_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jSm5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff02d8124-bc30-4802-8023-2ff5e95ad47c_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!jSm5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff02d8124-bc30-4802-8023-2ff5e95ad47c_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!jSm5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff02d8124-bc30-4802-8023-2ff5e95ad47c_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!jSm5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff02d8124-bc30-4802-8023-2ff5e95ad47c_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jSm5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff02d8124-bc30-4802-8023-2ff5e95ad47c_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f02d8124-bc30-4802-8023-2ff5e95ad47c_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:463000,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196535357?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff02d8124-bc30-4802-8023-2ff5e95ad47c_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jSm5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff02d8124-bc30-4802-8023-2ff5e95ad47c_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!jSm5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff02d8124-bc30-4802-8023-2ff5e95ad47c_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!jSm5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff02d8124-bc30-4802-8023-2ff5e95ad47c_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!jSm5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff02d8124-bc30-4802-8023-2ff5e95ad47c_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A Latvian citizen has been sentenced to 8.5 years in federal prison after being convicted for his role as a negotiator for the Karakurt ransomware group, a Russian cybercrime operation. The defendant was extradited from Latvia to the United States to face charges related to his participation in the criminal enterprise, which targeted organizations through data theft and extortion schemes.<br><br>Karakurt is a financially motivated threat group known for stealing sensitive data from victim organizations and threatening to release it publicly unless a ransom is paid. Unlike traditional ransomware operations that encrypt files, Karakurt primarily focuses on data exfiltration and extortion. The group has targeted victims across multiple sectors, including healthcare, financial services, and critical infrastructure organizations.<br><br>The convicted individual served as a negotiator, acting as an intermediary between the ransomware operators and their victims. This role involved communicating ransom demands, negotiating payment amounts, and providing instructions for cryptocurrency transfers. Negotiators are essential to ransomware operations, as they handle the direct interaction with victims while insulating the core technical operators from law enforcement.<br><br>The case represents a significant law enforcement success in prosecuting ransomware-related crimes, particularly given the challenges of international cooperation and extradition. The 8.5-year sentence reflects the serious nature of ransomware offenses and the U.S. government's commitment to pursuing cybercriminals regardless of their location. This prosecution also demonstrates that individuals in supporting roles, not just the technical operators who deploy malware, face substantial criminal liability.<br><br>Organizations should maintain robust cybersecurity defenses, including regular data backups, network segmentation, and employee security awareness training. When facing a ransomware incident, victims should immediately contact law enforcement and consider engaging experienced incident response professionals. Companies should avoid paying ransoms when possible, as payments fund further criminal activity and provide no guarantee of data recovery or deletion.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.bleepingcomputer.com/news/security/karakurt-extortion-gang-negotiator-sentenced-to-85-years-in-prison/ </p>]]></content:encoded></item><item><title><![CDATA[Instagram Discontinues End-to-End Encryption]]></title><description><![CDATA[Meta has announced it will shut down Instagram's optional end-to-end encrypted direct messaging feature on May 8, 2026.]]></description><link>https://www.cybermaterial.com/p/instagram-discontinues-end-to-end</link><guid isPermaLink="false">https://www.cybermaterial.com/p/instagram-discontinues-end-to-end</guid><pubDate>Tue, 05 May 2026 12:21:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wmGT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b544558-5948-41db-908c-67fe3346acf0_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wmGT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b544558-5948-41db-908c-67fe3346acf0_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wmGT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b544558-5948-41db-908c-67fe3346acf0_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!wmGT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b544558-5948-41db-908c-67fe3346acf0_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!wmGT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b544558-5948-41db-908c-67fe3346acf0_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!wmGT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b544558-5948-41db-908c-67fe3346acf0_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wmGT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b544558-5948-41db-908c-67fe3346acf0_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b544558-5948-41db-908c-67fe3346acf0_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:284439,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196535208?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b544558-5948-41db-908c-67fe3346acf0_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wmGT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b544558-5948-41db-908c-67fe3346acf0_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!wmGT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b544558-5948-41db-908c-67fe3346acf0_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!wmGT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b544558-5948-41db-908c-67fe3346acf0_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!wmGT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b544558-5948-41db-908c-67fe3346acf0_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Meta has announced it will shut down Instagram's optional end-to-end encrypted direct messaging feature on May 8, 2026. The company first introduced the feature in 2021 as a testing initiative to provide users with secure communications accessible only to senders and recipients. Meta attributes the decision to discontinue the feature to extremely low adoption rates among Instagram's user base.<br><br>The removal of end-to-end encryption represents a fundamental change in how Instagram handles user data. Under end-to-end encryption, cryptographic keys remain stored exclusively on user devices, preventing anyone from reading intercepted messages. The platform will now rely solely on Transport Layer Security (TLS), which protects data in transit but allows Meta to decrypt and access message content once it reaches company servers.<br><br>This architectural shift enables Meta to perform several operations on private messages that were previously impossible. The company can now conduct automated scanning for safety violations and malicious links, integrate private chat data into machine learning and AI training models, respond to law enforcement subpoenas with plaintext data, and perform routine moderation using server-side keyword tracking. Cybersecurity experts warn that this change also increases exposure risk during potential server-side data breaches.<br><br>Meta is actively notifying affected users to export their encrypted chat data before the infrastructure changes take effect. After May 8, previously encrypted message threads will become fully accessible to Meta's automated moderation systems. Users can request a secure download of their personal information through account security settings. Failure to export data before the deadline means those private conversations will be added to the platform's scannable database.<br><br>The decision has drawn sharp criticism from cybersecurity professionals and privacy advocates who argue that removing security features contradicts growing demands for digital privacy. Security firms including Malwarebytes have publicly highlighted concerns about corporate data harvesting. While Meta encourages privacy-focused users to migrate to WhatsApp, many security researchers recommend independent platforms like Signal for sensitive communications.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://cybersecuritynews.com/instagram-end-encryption-direct-messages/</p>]]></content:encoded></item><item><title><![CDATA[New Attribution Framework for APT Campaign Tracking]]></title><description><![CDATA[Advanced Persistent Threat (APT) tracking faces a fundamental challenge: adversaries no longer behave as stable, predictable entities.]]></description><link>https://www.cybermaterial.com/p/new-attribution-framework-for-apt</link><guid isPermaLink="false">https://www.cybermaterial.com/p/new-attribution-framework-for-apt</guid><pubDate>Tue, 05 May 2026 12:19:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Yutc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676a20c1-6d07-4448-bf17-c0c7f64e7ceb_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Yutc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676a20c1-6d07-4448-bf17-c0c7f64e7ceb_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Yutc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676a20c1-6d07-4448-bf17-c0c7f64e7ceb_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!Yutc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676a20c1-6d07-4448-bf17-c0c7f64e7ceb_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!Yutc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676a20c1-6d07-4448-bf17-c0c7f64e7ceb_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!Yutc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676a20c1-6d07-4448-bf17-c0c7f64e7ceb_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Yutc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676a20c1-6d07-4448-bf17-c0c7f64e7ceb_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/676a20c1-6d07-4448-bf17-c0c7f64e7ceb_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:439913,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196535082?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676a20c1-6d07-4448-bf17-c0c7f64e7ceb_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Yutc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676a20c1-6d07-4448-bf17-c0c7f64e7ceb_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!Yutc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676a20c1-6d07-4448-bf17-c0c7f64e7ceb_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!Yutc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676a20c1-6d07-4448-bf17-c0c7f64e7ceb_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!Yutc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F676a20c1-6d07-4448-bf17-c0c7f64e7ceb_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Advanced Persistent Threat (APT) tracking faces a fundamental challenge: adversaries no longer behave as stable, predictable entities. Traditional attribution methods that rely on consistent Tactics, Techniques, and Procedures (TTPs) are failing as threat actors routinely change operators, swap tools, rebuild infrastructure, and shift objectives within single campaign cycles. This evolution leaves security analysts with fragmented signals and no reliable method to connect related activities across time.<br><br>DarkAtlas researchers have developed a campaign-based attribution framework that fundamentally rethinks how defenders track APT activity. Instead of treating threat groups as fixed identities, the framework focuses on discrete, time-bound clusters of activity called campaigns. Each campaign is defined by its objectives, infrastructure patterns, and operational behavior, with continuity between campaigns inferred through partial overlaps across multiple independent evidence layers rather than identical TTPs.<br><br>The framework employs an Overlap Model that examines six analytical dimensions before establishing attribution confidence. The strategic layer analyzes geopolitical alignment and targeting intent. The operational layer tracks targeting patterns, campaign timing, and victim sequencing. The tactical layer maps procedural execution against frameworks like MITRE ATT&amp;CK. The technical layer examines custom malware characteristics, encryption routines, and build artifacts. The infrastructure layer studies domain naming conventions, TLS certificate reuse, and DNS behavior. The human layer captures operator-specific traits including coding style, language artifacts, and operational security habits. Attribution confidence is rated as high, medium, or low depending on how many independent evidence layers converge, with high-confidence assessments requiring strong, multi-layered overlap.<br><br>This approach produces a Campaign Linkage Graph where each node represents a distinct campaign and edges represent weighted relationships between operations. Strong links indicate substantial overlap across multiple layers, medium links reflect partial alignment, and weak links flag tentative connections requiring further validation. The graph-based structure naturally accommodates adversary evolution by absorbing tooling changes as new nodes, treating infrastructure rotation as weaker but traceable connections, and capturing group fragmentation as branching paths within the network.<br><br>Security teams should move away from single-indicator attribution and require multi-layer evidence before drawing conclusions about campaign origin. Organizations should treat TTPs as behavioral signals rather than definitive fingerprints, since adversaries routinely modify or share techniques to create false attribution trails. Teams should adopt campaign-centric tracking models where each operation is logged as a discrete unit, assign confidence tiers to all attribution assessments, and focus monitoring resources on stable indicators such as victimology and geopolitical timing that persist longer than tools or infrastructure.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://cybersecuritynews.com/new-attribution-framework-connects-apt-campaigns/ </p>]]></content:encoded></item><item><title><![CDATA[ScarCruft Compromises Gaming Platform ]]></title><description><![CDATA[A North Korean state-sponsored hacking group known as ScarCruft has successfully compromised a video game platform in a supply chain espionage operation, according to recent threat intelligence findings.]]></description><link>https://www.cybermaterial.com/p/scarcruft-compromises-gaming-platform</link><guid isPermaLink="false">https://www.cybermaterial.com/p/scarcruft-compromises-gaming-platform</guid><pubDate>Tue, 05 May 2026 12:17:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9YQ-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2155230-6b14-4b22-b121-4ca0ca23a104_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9YQ-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2155230-6b14-4b22-b121-4ca0ca23a104_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9YQ-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2155230-6b14-4b22-b121-4ca0ca23a104_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!9YQ-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2155230-6b14-4b22-b121-4ca0ca23a104_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!9YQ-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2155230-6b14-4b22-b121-4ca0ca23a104_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!9YQ-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2155230-6b14-4b22-b121-4ca0ca23a104_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9YQ-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2155230-6b14-4b22-b121-4ca0ca23a104_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2155230-6b14-4b22-b121-4ca0ca23a104_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:739008,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196534833?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2155230-6b14-4b22-b121-4ca0ca23a104_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9YQ-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2155230-6b14-4b22-b121-4ca0ca23a104_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!9YQ-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2155230-6b14-4b22-b121-4ca0ca23a104_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!9YQ-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2155230-6b14-4b22-b121-4ca0ca23a104_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!9YQ-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2155230-6b14-4b22-b121-4ca0ca23a104_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>A North Korean state-sponsored hacking group known as ScarCruft has successfully compromised a video game platform in a supply chain espionage operation, according to recent threat intelligence findings. The attackers embedded their BirdCall backdoor into legitimate platform components, transforming trusted gaming software into a malware distribution vehicle. The campaign appears specifically designed to target ethnic Koreans residing in China.<br><br>ScarCruft, also tracked by various security vendors under different names, has maintained a consistent focus on espionage operations aligned with North Korean state interests. The group has historically concentrated on intelligence gathering from targets in South Korea, China, and other regions with significant Korean diaspora populations. This latest campaign represents a tactical evolution in their approach to victim compromise.<br><br>The BirdCall backdoor, previously documented in attacks targeting Windows systems, has been modified for this supply chain operation. By compromising the gaming platform itself rather than individual users, the attackers gain access to automatic distribution through legitimate software update channels. This method allows malware to bypass many traditional security controls that would flag suspicious downloads from unknown sources. Users receive the trojanized components through normal platform operations, making detection significantly more difficult.<br><br>The targeting of ethnic Koreans in China suggests intelligence collection objectives related to diaspora communities. Gaming platforms provide an attractive vector for such operations because they maintain persistent connections, require regular updates, and often request elevated system permissions. The compromise of platform infrastructure enables attackers to reach numerous users simultaneously while maintaining operational security through the use of legitimate distribution channels.<br><br>Organizations using the affected gaming platform should immediately verify the integrity of installed components and monitor for suspicious network activity. Security teams should review logs for unusual outbound connections and consider implementing additional network segmentation for gaming and entertainment software. Users in potentially targeted demographics should exercise heightened caution with gaming platform updates and consider using dedicated systems for such applications separate from devices containing sensitive information.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://thehackernews.com/2026/05/scarcruft-hacks-gaming-platform-to.html</p>]]></content:encoded></item><item><title><![CDATA[Trellix Confirms Unauthorized Source Code Access]]></title><description><![CDATA[Trellix, a prominent cybersecurity vendor, has confirmed that threat actors successfully accessed portions of its source code repository in an incident disclosed May 4.]]></description><link>https://www.cybermaterial.com/p/trellix-confirms-unauthorized-source</link><guid isPermaLink="false">https://www.cybermaterial.com/p/trellix-confirms-unauthorized-source</guid><pubDate>Tue, 05 May 2026 12:13:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!p95j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F038aff60-28b4-4f51-9286-4b82327e4c0e_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!p95j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F038aff60-28b4-4f51-9286-4b82327e4c0e_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!p95j!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F038aff60-28b4-4f51-9286-4b82327e4c0e_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!p95j!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F038aff60-28b4-4f51-9286-4b82327e4c0e_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!p95j!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F038aff60-28b4-4f51-9286-4b82327e4c0e_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!p95j!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F038aff60-28b4-4f51-9286-4b82327e4c0e_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!p95j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F038aff60-28b4-4f51-9286-4b82327e4c0e_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/038aff60-28b4-4f51-9286-4b82327e4c0e_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:85599,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196534531?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F038aff60-28b4-4f51-9286-4b82327e4c0e_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!p95j!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F038aff60-28b4-4f51-9286-4b82327e4c0e_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!p95j!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F038aff60-28b4-4f51-9286-4b82327e4c0e_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!p95j!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F038aff60-28b4-4f51-9286-4b82327e4c0e_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!p95j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F038aff60-28b4-4f51-9286-4b82327e4c0e_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Trellix, a prominent cybersecurity vendor, has confirmed that threat actors successfully accessed portions of its source code repository in an incident disclosed May 4. The company, which was formed in 2021 through the merger of McAfee Enterprise and FireEye under private equity firm Symphony Technology Group, has notified law enforcement and engaged forensic experts to investigate the breach. Trellix provides threat intelligence, AI-powered detection and response services including network and endpoint detection, along with data and email security solutions.<br><br>According to the company's statement, investigators have found no evidence that the source code release or distribution process was affected, nor have they identified any exploitation of the stolen code. However, the investigation remains ongoing, and Trellix has declined to share additional details about the incident or the threat actors responsible until the investigation concludes.<br><br>Security experts warn that source code access to a cybersecurity vendor presents significant risks. Isaac Evans, founder of software security firm Semgrep, explained that such access provides attackers with detailed information about where security controls exist, how detection systems are written, and where trusted update or build paths might be vulnerable. This intelligence allows threat actors to understand defensive tools from the inside and potentially weaponize the software ecosystem itself as a delivery mechanism for attacks.<br><br>The incident follows a pattern of recent supply chain attacks targeting security vendors. Multiple companies, including Aqua Security and Checkmarx, were recently compromised through an attack on the security scanner Trivy, which resulted in the exposure of numerous enterprise secrets. Google Cloud's Wiz Security reported in late March that the TeamPCP group behind the Trivy campaign may be collaborating with the extortion group Lapsus$ to monetize stolen credentials, with additional signs pointing to cooperation with the Vect ransomware group.<br><br>Security professionals emphasize that organizations must treat code repositories as critical assets requiring robust protection, not merely storage locations. Stolen tokens, gaps in continuous integration and deployment pipelines, and overtrusted build workflows enable attackers to move laterally between projects, harvesting secrets and establishing persistence. The targeting of security vendors represents a strategic shift where attackers seek not just customer data but leverage over the entire security ecosystem.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.infosecurity-magazine.com/news/trellix-reveals-unauthorized/ </p>]]></content:encoded></item><item><title><![CDATA[Qualcomm May 2026 Security Vulnerabilities ]]></title><description><![CDATA[Qualcomm Technologies has issued its May 2026 security bulletin, disclosing a significant number of vulnerabilities affecting both proprietary and open-source software components across its product portfolio.]]></description><link>https://www.cybermaterial.com/p/qualcomm-may-2026-security-vulnerabilities</link><guid isPermaLink="false">https://www.cybermaterial.com/p/qualcomm-may-2026-security-vulnerabilities</guid><pubDate>Tue, 05 May 2026 12:08:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!KRug!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f39303f-7380-4453-ad85-61491f8f1d8a_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KRug!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f39303f-7380-4453-ad85-61491f8f1d8a_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KRug!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f39303f-7380-4453-ad85-61491f8f1d8a_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!KRug!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f39303f-7380-4453-ad85-61491f8f1d8a_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!KRug!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f39303f-7380-4453-ad85-61491f8f1d8a_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!KRug!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f39303f-7380-4453-ad85-61491f8f1d8a_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KRug!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f39303f-7380-4453-ad85-61491f8f1d8a_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5f39303f-7380-4453-ad85-61491f8f1d8a_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:144818,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196534039?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f39303f-7380-4453-ad85-61491f8f1d8a_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KRug!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f39303f-7380-4453-ad85-61491f8f1d8a_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!KRug!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f39303f-7380-4453-ad85-61491f8f1d8a_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!KRug!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f39303f-7380-4453-ad85-61491f8f1d8a_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!KRug!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f39303f-7380-4453-ad85-61491f8f1d8a_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Qualcomm Technologies has issued its May 2026 security bulletin, disclosing a significant number of vulnerabilities affecting both proprietary and open-source software components across its product portfolio. The security flaws pose serious risks to devices powered by Qualcomm chipsets, including smartphones, automotive systems, and industrial Internet of Things equipment.<br><br>The vulnerabilities represent a broad attack surface that threat actors could potentially exploit to gain unauthorized access to affected systems. According to the bulletin, these security gaps could enable attackers to compromise devices without requiring any user interaction, significantly lowering the barrier for successful exploitation. This no-click attack vector makes the vulnerabilities particularly dangerous for enterprise and consumer environments alike.<br><br>While specific technical details about individual vulnerabilities were not provided in the available information, the scope of affected systems suggests the flaws exist across multiple software layers in Qualcomm's technology stack. The inclusion of both proprietary Qualcomm code and open-source components indicates that the security issues may stem from various sources within the complex chipset ecosystem. Remote code execution capabilities would allow attackers to run arbitrary code on vulnerable devices, potentially leading to data theft, device control, or use of compromised systems as entry points for broader network attacks.<br><br>The impact spans multiple critical sectors given Qualcomm's dominant position in mobile and embedded systems. Smartphones represent the most widespread consumer risk, while automotive vulnerabilities could affect vehicle safety and security systems. Industrial IoT deployments face operational technology risks that could disrupt manufacturing, logistics, and infrastructure operations. The cross-sector nature of these vulnerabilities amplifies the urgency for coordinated patching efforts.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>Qualcomm is strongly recommending that original equipment manufacturers immediately deploy the available security patches to their device fleets. Organizations using Qualcomm-powered devices should contact their hardware vendors to determine patch availability and deployment timelines. Security teams should prioritize updating internet-facing and mission-critical systems first, while monitoring for any signs of exploitation attempts. Given the remote code execution potential, network segmentation and enhanced monitoring should be implemented for devices that cannot be immediately patched.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>: https://gbhackers.com/qualcomm-chipset-vulnerabilities/ </p>]]></content:encoded></item><item><title><![CDATA[WhatsApp Patches URL Execution Flaw]]></title><description><![CDATA[Meta has released security patches for WhatsApp addressing two vulnerabilities that could enable attackers to execute malicious URLs and mask harmful files on user devices.]]></description><link>https://www.cybermaterial.com/p/whatsapp-patches-url-execution-flaw</link><guid isPermaLink="false">https://www.cybermaterial.com/p/whatsapp-patches-url-execution-flaw</guid><pubDate>Tue, 05 May 2026 12:06:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!1adG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d016870-bf2e-4e86-946d-e4f7c12e29b2_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1adG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d016870-bf2e-4e86-946d-e4f7c12e29b2_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1adG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d016870-bf2e-4e86-946d-e4f7c12e29b2_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!1adG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d016870-bf2e-4e86-946d-e4f7c12e29b2_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!1adG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d016870-bf2e-4e86-946d-e4f7c12e29b2_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!1adG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d016870-bf2e-4e86-946d-e4f7c12e29b2_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1adG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d016870-bf2e-4e86-946d-e4f7c12e29b2_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5d016870-bf2e-4e86-946d-e4f7c12e29b2_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:550156,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196533854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d016870-bf2e-4e86-946d-e4f7c12e29b2_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1adG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d016870-bf2e-4e86-946d-e4f7c12e29b2_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!1adG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d016870-bf2e-4e86-946d-e4f7c12e29b2_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!1adG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d016870-bf2e-4e86-946d-e4f7c12e29b2_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!1adG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d016870-bf2e-4e86-946d-e4f7c12e29b2_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p> Meta has released security patches for WhatsApp addressing two vulnerabilities that could enable attackers to execute malicious URLs and mask harmful files on user devices. The flaws were discovered in the messaging platform's handling of Instagram Reels and file processing mechanisms.<br><br>The more critical vulnerability centers on WhatsApp's processing of Instagram Reels content. The flaw allows remote threat actors to exploit unvalidated message elements within Reels shared through the platform. By manipulating these elements, attackers could force arbitrary URLs to execute on a victim's device without proper validation or user consent.<br><br>The technical issue stems from insufficient input validation when WhatsApp processes Instagram Reels metadata and embedded links. When a malicious Reel is shared through WhatsApp, the application fails to properly sanitize certain message components, allowing attackers to inject and trigger unauthorized URLs. The second vulnerability involves file disguising capabilities, though specific technical details about this flaw remain limited in available reporting.<br><br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>The vulnerabilities pose significant risks to WhatsApp&#8217;s user base, which numbers in the billions globally. Successful exploitation could lead to phishing attacks, malware distribution, or redirection to malicious websites. The remote nature of the Instagram Reels vulnerability is particularly concerning, as it requires no physical access to target devices and could potentially be deployed at scale through social engineering tactics.<br><br>Meta has deployed patches through standard WhatsApp updates to address both vulnerabilities. Users should immediately update their WhatsApp applications to the latest version available through their device&#8217;s app store. Organizations using WhatsApp for business communications should prioritize these updates and remind employees to exercise caution when interacting with Instagram Reels shared through the platform, even from known contacts, until updates are confirmed installed.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>: https://gbhackers.com/whatsapp-security-flaw-enables-malicious-url-execution/</p>]]></content:encoded></item><item><title><![CDATA[Cyber Briefing: 2026.05.04]]></title><description><![CDATA[From 'Copy Fail' kernels to cloud-speed extortion, the gap between discovery and disaster is disappearing.]]></description><link>https://www.cybermaterial.com/p/cyber-briefing-20260504</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cyber-briefing-20260504</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Mon, 04 May 2026 14:03:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zkb8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkb8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkb8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!zkb8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!zkb8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!zkb8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkb8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png" width="700" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:223075,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196415461?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkb8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png 424w, https://substackcdn.com/image/fetch/$s_!zkb8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png 848w, https://substackcdn.com/image/fetch/$s_!zkb8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png 1272w, https://substackcdn.com/image/fetch/$s_!zkb8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8014e85b-bdf5-48c6-af7f-1d33bfc401ed_700x394.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Welcome to Cyber Briefing, your daily source for all things cybersecurity. We bring you the latest advisories, alerts, incidents, and news every weekday.</p><p style="text-align: justify;">The current threat landscape is defined by a volatile mix of high-speed cloud extortion and critical infrastructure vulnerabilities. From the widespread &#8220;Copy Fail&#8221; Linux kernel flaw to the &#8220;Salt Typhoon&#8221; infiltration of IBM subsidiaries, attackers are exploiting both deep-system bugs and human-centric weaknesses like vishing and SSO gaps. These incidents, coupled with a massive data breach at Instructure affecting millions, highlight a shift toward rapid, high-impact campaigns that bypass traditional defenses to compromise national digital sovereignty and global supply chains.</p><p style="text-align: justify;">Simultaneously, the integration of AI is fundamentally altering the pace of cybersecurity, with the UK NCSC warning that automated vulnerability discovery is forcing an era of &#8220;hyper-patching.&#8221; In response, the industry is pivoting toward quality over quantity; Google&#8217;s strategic shift in its bug bounty programs prioritizes human-driven, high-impact research to filter out AI-generated noise. As state-sponsored operatives face legal accountability in international courts, the focus for organizations has moved beyond simple perimeter defense toward systemic resilience and the mitigation of third-party risks.</p><p>Listen to our podcast here &#9196;</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a426b057dd2e0c473f0f32288&quot;,&quot;title&quot;:&quot;May 04, 2026 - Cyber Briefing&quot;,&quot;subtitle&quot;:&quot;CyberMaterial&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/4LYsJoByH8EuNCgDam6lIH&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/4LYsJoByH8EuNCgDam6lIH" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zkJR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png" width="1456" height="223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:223,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zkJR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 424w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 848w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1272w, https://substackcdn.com/image/fetch/$s_!zkJR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2364acf-ce92-4ae8-bf8c-7bcc3554fee7_1552x238.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/3Kw14fw&quot;,&quot;text&quot;:&quot;Get BlueSleuth-Lite&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/3Kw14fw"><span>Get BlueSleuth-Lite</span></a></p><div><hr></div><h2>&#9889;THREAT LANDSCAPE</h2><div><hr></div><p><strong>CISA Adds Major Linux Kernel Vulnerability to Known Exploited Vulnerabilities Catalog</strong></p><p>The United States Cybersecurity and Infrastructure Security Agency has officially added CVE-2026-31431, a critical Linux Kernel flaw known as Copy Fail, to its list of exploited vulnerabilities. This high-severity bug allows unprivileged local users to gain root access across nearly all major Linux distributions by manipulating the system page cache. <a href="https://www.cybermaterial.com/p/cisa-adds-major-linux-kernel-vulnerability">Read More</a></p><p><strong>Cybercrime Syndicates Exploit Vishing and SSO Vulnerabilities for High-Speed Cloud Extortion</strong></p><p>Recent investigations into modern cyber threats reveal that sophisticated hacking groups are increasingly leveraging voice phishing and Single Sign-On weaknesses to execute rapid extortion campaigns against corporate SaaS environments. These attackers bypass traditional perimeter defenses by tricking employees into revealing credentials or approving multi-factor authentication prompts, allowing them to move laterally through cloud applications with unprecedented speed. <a href="https://www.cybermaterial.com/p/cybercrime-syndicates-exploit-vishing">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llmP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!llmP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 424w, https://substackcdn.com/image/fetch/$s_!llmP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 848w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1272w, https://substackcdn.com/image/fetch/$s_!llmP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b11ab90-9f41-4bc9-821d-72a1c23c0da2_1198x191.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.youtube.com/@cybermaterial&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.youtube.com/@cybermaterial"><span>Subscribe Now</span></a></p><div><hr></div><h2><strong>&#128680;INCIDENTS &amp; REAL-WORLD IMPACT</strong></h2><div><hr></div><p><strong>Ubuntu Infrastructure Disruptions Linked to Coordinated DDoS Campaign</strong></p><p>Canonical and Ubuntu face widespread service interruptions following a targeted cyberattack claimed by a hacktivist collective. The ongoing incident has disabled essential web systems and repository access, leaving millions of users temporarily unable to perform routine system updates or software installations.<a href="https://www.cybermaterial.com/p/ubuntu-infrastructure-disruptions"> Read More</a></p><p><strong>ShinyHunters Targets Instructure in Massive Data Breach Affecting Millions</strong></p><p>Educational technology giant Instructure has confirmed a security breach involving its Canvas platform, with the ShinyHunters hacking group claiming to have stolen personal data from 275 million users. While the company acknowledges the exposure of names and messages, the attackers allege a much larger scale of theft involving thousands of schools and a compromise of the company&#8217;s Salesforce environment. <a href="https://www.cybermaterial.com/p/shinyhunters-targets-instructure">Read More</a></p><p><strong>Salt Typhoon Linked to IBM Subsidiary Breach</strong></p><p>&#8220;The April 2026 infiltration of IBM Italy subsidiary Sistemi Informativi has ignited urgent discussions regarding European digital sovereignty and the persistent threat of state-sponsored espionage. Attributed by intelligence sources to the China-linked group Salt Typhoon, the incident underscores the vulnerability of national infrastructure when managed by third-party IT providers. <a href="https://www.cybermaterial.com/p/salt-typhoon-linked-to-ibm-subsidiary">Read More</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MGQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MGQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MGQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff45785ab-3ec5-4945-8e6d-9545448fa306_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><h2><strong>&#128275; EXECUTIVE RISK &amp; CYBERNOMICS</strong></h2><div><hr></div><p><strong>AI accelerates vulnerability discovery and forces rapid updates according to UK NCSC</strong></p><p>The National Cyber Security Centre warns that artificial intelligence is significantly shortening the time it takes for attackers to find and exploit software vulnerabilities. This trend is expected to trigger a massive wave of urgent security patches as hidden flaws across the global technology ecosystem are exposed at an unprecedented pace.<a href="https://www.cybermaterial.com/p/ai-accelerates-vulnerability-discovery"> Read More</a></p><p></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f7lS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg" width="1456" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69329,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026538?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f7lS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!f7lS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf2ab8bc-91cf-4eef-bf0b-ade19d3d2934_1503x360.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/services/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/services/"><span>Get Help</span></a></p><div><hr></div><h2><strong>&#128737;&#65039; POLICY, REGULATION &amp; LEGAL SIGNALS</strong></h2><div><hr></div><p><strong>Russian cyber operative admits to sabotaging international energy infrastructure</strong></p><p>A Russian hacker linked to state-sponsored attacks on global oil and gas systems has pleaded guilty in a U.S. federal court. Artem Vladimirovich Revenskii faces a potential 27-year prison sentence for his role in damaging critical infrastructure across multiple nations, including the United States and Ukraine. <a href="https://www.cybermaterial.com/p/russian-cyber-operative-admits-to">Read More</a></p><div><hr></div><h2><strong>&#128187; CAREER ENABLEMENT</strong></h2><div><hr></div><p><strong>Google Shifts Bug Bounty Focus Toward High Impact Exploits and Android Security</strong></p><p>Google has overhauled its vulnerability reward programs for Android and Chrome to prioritize high-quality research over the high volume of reports generated by artificial intelligence. The update reflects a strategic pivot toward incentivizing human-driven insights and actionable fixes as automated tools continue to flood the system with low-value submissions.<a href="https://www.cybermaterial.com/p/google-shifts-bug-bounty-focus-toward">Read More</a></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HL0l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg" width="1198" height="191" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:191,&quot;width&quot;:1198,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HL0l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HL0l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F642acc3e-c303-44ff-ac3f-640c8c52d02c_1198x191.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><a href="https://www.cybermaterial.com/s/documents">Click Here To Read</a></p><div><hr></div><p>Copyright &#169; 2026 <a href="http://cybermaterial.com/">CyberMaterial</a>. All Rights Reserved.</p><p style="text-align: justify;">Follow CyberMaterial on:</p><p style="text-align: justify;"><a href="https://www.cybermaterial.com/">Substack</a>,<a href="https://www.linkedin.com/company/cybermaterial/"> LinkedIn</a>,<a href="https://twitter.com/cybermaterial_"> Twitter</a>,<a href="https://www.reddit.com/r/cybermaterial/"> Reddit</a>,<a href="https://instagram.com/Cybermat3rial"> Instagram</a>,<a href="https://www.facebook.com/cybermaterial"> Facebook</a>,<a href="https://www.youtube.com/@cybermaterial"> YouTube</a>, and<a href="https://cybermaterial.medium.com/"> Medium</a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Google Shifts Bug Bounty Focus Toward High Impact Exploits and Android Security]]></title><description><![CDATA[Google is significantly restructuring its security rewards to keep pace with the rapid evolution of generative artificial intelligence in the cybersecurity sector.]]></description><link>https://www.cybermaterial.com/p/google-shifts-bug-bounty-focus-toward</link><guid isPermaLink="false">https://www.cybermaterial.com/p/google-shifts-bug-bounty-focus-toward</guid><pubDate>Mon, 04 May 2026 12:35:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ORUX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c65ea8-382d-46f9-a0d1-6f7284cfc0ed_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ORUX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c65ea8-382d-46f9-a0d1-6f7284cfc0ed_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ORUX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c65ea8-382d-46f9-a0d1-6f7284cfc0ed_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!ORUX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c65ea8-382d-46f9-a0d1-6f7284cfc0ed_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!ORUX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c65ea8-382d-46f9-a0d1-6f7284cfc0ed_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!ORUX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c65ea8-382d-46f9-a0d1-6f7284cfc0ed_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ORUX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c65ea8-382d-46f9-a0d1-6f7284cfc0ed_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/83c65ea8-382d-46f9-a0d1-6f7284cfc0ed_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:540265,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196415294?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c65ea8-382d-46f9-a0d1-6f7284cfc0ed_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ORUX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c65ea8-382d-46f9-a0d1-6f7284cfc0ed_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!ORUX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c65ea8-382d-46f9-a0d1-6f7284cfc0ed_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!ORUX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c65ea8-382d-46f9-a0d1-6f7284cfc0ed_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!ORUX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c65ea8-382d-46f9-a0d1-6f7284cfc0ed_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Google is significantly restructuring its security rewards to keep pace with the rapid evolution of generative artificial intelligence in the cybersecurity sector. As advanced AI models make it easier for researchers to automate code analysis and generate voluminous reports, the company is shifting its focus away from raw quantity. The new framework prioritizes vulnerability submissions that provide concrete proof of concept and demonstrable user impact, moving toward a model that values quality and depth over the sheer number of bugs discovered.<br><br>The most substantial increases in rewards are targeted at the Android ecosystem, specifically for exploits that remain difficult for automated tools to detect. Top payouts for zero-click exploits targeting the Pixel Titan M security chip have been raised to 1.5 million dollars, emphasizing the protection of critical hardware components. Conversely, Chrome payouts have seen a decrease in base rewards for common issues like memory safety, as Google aims to discourage lengthy, AI-assisted write-ups in favor of concise, reproducible evidence of a flaw.<br><br>This recalibration is a direct response to the surge of AI-generated reports that have overwhelmed security teams across the industry. While automation helps identify variants of known problems and suggests potential fixes, it has also led to an influx of noise that can obscure significant threats. By reducing bonuses for certain standard vulnerabilities and focusing on full-chain exploits, Google intends to reward researchers who can bypass advanced structural protections that AI still struggles to navigate effectively.<br><br>Despite the reduction in some individual payout categories, Google expects its total expenditure on bug bounties to increase throughout 2026. The company paid out a record 17.1 million dollars in 2025 and maintains that these structural changes are intended to optimize efficiency rather than cut costs. The program now places a higher premium on submissions that include suggested patches and those that focus on components maintained directly by Google, ensuring that resources are directed toward the most relevant security risks.<br><br>The broader cybersecurity landscape is facing similar challenges, with other major organizations pausing submissions due to the volume of AI-facilitated data. Google's strategy represents an attempt to harness the benefits of automation while safeguarding the human ingenuity required for complex security research. By adapting its reward structures to favor high-impact and AI-resistant vulnerabilities, the company aims to set a new standard for how tech giants manage security research in an increasingly automated environment.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://bughunters.google.com/blog/evolving-the-android-chrome-vrps-for-the-ai-era</p>]]></content:encoded></item><item><title><![CDATA[Russian cyber operative admits to sabotaging international energy infrastructure]]></title><description><![CDATA[A Russian hacker linked to state-sponsored attacks on global oil and gas systems has pleaded guilty in a U.S.]]></description><link>https://www.cybermaterial.com/p/russian-cyber-operative-admits-to</link><guid isPermaLink="false">https://www.cybermaterial.com/p/russian-cyber-operative-admits-to</guid><pubDate>Mon, 04 May 2026 12:34:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_Abq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9aafd2d-dc86-4a87-b2ab-70304fbcc39d_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_Abq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9aafd2d-dc86-4a87-b2ab-70304fbcc39d_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_Abq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9aafd2d-dc86-4a87-b2ab-70304fbcc39d_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!_Abq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9aafd2d-dc86-4a87-b2ab-70304fbcc39d_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!_Abq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9aafd2d-dc86-4a87-b2ab-70304fbcc39d_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!_Abq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9aafd2d-dc86-4a87-b2ab-70304fbcc39d_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_Abq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9aafd2d-dc86-4a87-b2ab-70304fbcc39d_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9aafd2d-dc86-4a87-b2ab-70304fbcc39d_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:546818,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196415223?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9aafd2d-dc86-4a87-b2ab-70304fbcc39d_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_Abq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9aafd2d-dc86-4a87-b2ab-70304fbcc39d_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!_Abq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9aafd2d-dc86-4a87-b2ab-70304fbcc39d_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!_Abq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9aafd2d-dc86-4a87-b2ab-70304fbcc39d_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!_Abq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9aafd2d-dc86-4a87-b2ab-70304fbcc39d_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>A Russian hacker linked to state-sponsored attacks on global oil and gas systems has pleaded guilty in a U.S. federal court. Artem Vladimirovich Revenskii faces a potential 27-year prison sentence for his role in damaging critical infrastructure across multiple nations, including the United States and Ukraine.<br><br>A Russian national known by the alias Digit has formally entered a plea agreement following charges of wire fraud, identity theft, and conspiracy to damage protected computers. Federal prosecutors in California reached the deal with Artem Vladimirovich Revenskii after he was extradited from the Dominican Republic late last year. The defendant was allegedly a key member of Sector 16, a hacking collective working on behalf of the Russian government to strike at perceived geopolitical enemies.<br><br>The group specifically focused its efforts on industrial control systems that manage energy operations in Western nations and Eastern Europe. Court documents reveal that the hackers infiltrated facilities in the United States, Germany, France, and Latvia, causing direct damage to the systems that keep these utilities running. Revenskii and his associates targeted infrastructure that would maximize disruption for the civilian population and the regional economy.<br><br>Much of the group's most aggressive activity was directed toward Ukraine, where they attempted to disable the national electric grid and sabotage gas stations in the capital. Investigators uncovered communications where Revenskii detailed plans to plunge the entire country into a total blackout for several days. In 2025, the group successfully breached a natural gas plant in Poltava, where they discussed methods to physically destroy hardware and deform pipelines by manipulating pressure and ventilation controls.<br><br>Sector 16 first surfaced in early 2025 when they collaborated with other pro-Russia hacktivist groups to claim credit for a cyberattack on oil storage tanks in Texas. While many Russian cybercriminals traditionally focused on financial gain through ransomware, this specific cell demonstrated a clear shift toward state-aligned destruction. Their public displays on the dark web were designed to showcase their ability to reach critical Western assets.<br><br>The prosecution of Revenskii represents a significant move by the Department of Justice to hold state-backed actors accountable for attacks on civil infrastructure. As Russian cyber operations continue to evolve from simple data theft to physical sabotage, international law enforcement has increased efforts to intercept operatives traveling outside of Russia. Revenskii now awaits sentencing as the court considers the recommendation for a reduced term in exchange for his plea.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://kyivindependent.com/russian-hacker-targeted-global-oil-gas-facilities-pleads-guilty/</p>]]></content:encoded></item><item><title><![CDATA[AI accelerates vulnerability discovery and forces rapid updates according to UK NCSC]]></title><description><![CDATA[The National Cyber Security Centre warns that artificial intelligence is significantly shortening the time it takes for attackers to find and exploit software vulnerabilities.]]></description><link>https://www.cybermaterial.com/p/ai-accelerates-vulnerability-discovery</link><guid isPermaLink="false">https://www.cybermaterial.com/p/ai-accelerates-vulnerability-discovery</guid><pubDate>Mon, 04 May 2026 12:33:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ceCJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcde04369-2f86-4ae1-98e4-45ecfb668523_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ceCJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcde04369-2f86-4ae1-98e4-45ecfb668523_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ceCJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcde04369-2f86-4ae1-98e4-45ecfb668523_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!ceCJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcde04369-2f86-4ae1-98e4-45ecfb668523_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!ceCJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcde04369-2f86-4ae1-98e4-45ecfb668523_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!ceCJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcde04369-2f86-4ae1-98e4-45ecfb668523_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ceCJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcde04369-2f86-4ae1-98e4-45ecfb668523_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cde04369-2f86-4ae1-98e4-45ecfb668523_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:623496,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196415073?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcde04369-2f86-4ae1-98e4-45ecfb668523_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ceCJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcde04369-2f86-4ae1-98e4-45ecfb668523_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!ceCJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcde04369-2f86-4ae1-98e4-45ecfb668523_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!ceCJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcde04369-2f86-4ae1-98e4-45ecfb668523_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!ceCJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcde04369-2f86-4ae1-98e4-45ecfb668523_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>The National Cyber Security Centre warns that artificial intelligence is significantly shortening the time it takes for attackers to find and exploit software vulnerabilities. This trend is expected to trigger a massive wave of urgent security patches as hidden flaws across the global technology ecosystem are exposed at an unprecedented pace.<br><br>The emergence of AI-driven exploitation is forcing a necessary correction for the technical debt currently embedded in modern software. According to NCSC officials, skilled actors are now able to identify and leverage vulnerabilities across proprietary, commercial, and open-source platforms with greater efficiency than ever before. This shift means that organizations can no longer afford to delay updates, as the window between the discovery of a flaw and its active exploitation is rapidly closing.<br><br>To manage this incoming surge of security requirements, the NCSC recommends that organizations prioritize their internet-facing systems and external perimeters. By reducing the visible attack surface, companies can mitigate the immediate risk posed by automated discovery tools. Once external defenses are secured, the focus should shift inward to cloud environments and on-premise infrastructure to ensure comprehensive protection against deep-seated flaws.<br><br>Security professionals are also being urged to address legacy systems that have reached their end-of-life status. Because these systems no longer receive official updates, they represent a permanent risk that cannot be solved through traditional patching. In these scenarios, the only viable solution is to replace the outdated technology or negotiate for extended vendor support to ensure the systems remain resilient against modern, AI-enhanced threats.<br><br>The guidance advocates for an update-by-default strategy, utilizing automatic hot-patching whenever possible to reduce the manual burden on IT teams. For systems where automation is not feasible, organizations should employ risk-based frameworks to prioritize the most critical fixes. By streamlining the update process now, businesses can prepare for a future where high-frequency patching becomes the standard requirement for maintaining digital safety.<br><br>Long-term security will ultimately depend on more than just reactive patching; it requires a fundamental shift toward secure-by-design principles. The NCSC suggests that software vendors adopt memory-safe languages and containment technologies to eliminate entire classes of vulnerabilities at the source. Until these architectural changes become widespread, organizations must rely on robust cyber hygiene, enhanced threat detection, and rigorous observability to stay ahead of evolving digital risks.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.ncsc.gov.uk/blogs/prepare-for-vulnerability-patch-wave</p>]]></content:encoded></item><item><title><![CDATA[Salt Typhoon Linked to IBM Subsidiary Breach]]></title><description><![CDATA[The breach targeted a central pillar of Italy's digital framework, as Sistemi Informativi manages critical IT infrastructure for a wide range of public agencies and private sector giants.]]></description><link>https://www.cybermaterial.com/p/salt-typhoon-linked-to-ibm-subsidiary</link><guid isPermaLink="false">https://www.cybermaterial.com/p/salt-typhoon-linked-to-ibm-subsidiary</guid><pubDate>Mon, 04 May 2026 12:32:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!NyTe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5596bc65-09c4-448e-9fc1-878bf7550a71_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NyTe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5596bc65-09c4-448e-9fc1-878bf7550a71_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NyTe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5596bc65-09c4-448e-9fc1-878bf7550a71_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!NyTe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5596bc65-09c4-448e-9fc1-878bf7550a71_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!NyTe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5596bc65-09c4-448e-9fc1-878bf7550a71_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!NyTe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5596bc65-09c4-448e-9fc1-878bf7550a71_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NyTe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5596bc65-09c4-448e-9fc1-878bf7550a71_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5596bc65-09c4-448e-9fc1-878bf7550a71_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:532594,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196414973?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5596bc65-09c4-448e-9fc1-878bf7550a71_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NyTe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5596bc65-09c4-448e-9fc1-878bf7550a71_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!NyTe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5596bc65-09c4-448e-9fc1-878bf7550a71_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!NyTe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5596bc65-09c4-448e-9fc1-878bf7550a71_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!NyTe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5596bc65-09c4-448e-9fc1-878bf7550a71_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The breach targeted a central pillar of Italy's digital framework, as Sistemi Informativi manages critical IT infrastructure for a wide range of public agencies and private sector giants. When the company&#8217;s systems were taken offline in late April, the ripple effect was immediate, prompting IBM to deploy both internal and external specialists to contain the intrusion and restore stability. While the tech giant has officially confirmed the containment of the incident, the specific volume of data compromised and the depth of the network penetration remain subjects of intense forensic scrutiny.<br><br>Security analysts are particularly concerned due to the involvement of Salt Typhoon, an advanced persistent threat group known for its technical sophistication and strategic patience. Unlike many cybercriminal groups that seek immediate financial gain, this actor focuses on long-term data exfiltration and the mapping of backbone networks. Their presence within a primary IT integrator suggests a motive beyond simple disruption, likely aimed at establishing a silent, long-term foothold within the communication relays and databases that power the Italian state.<br><br>This operation reflects a broader trend of escalating Chinese-linked cyber activities across the West, following recent high-profile compromises of telecommunications and defense logistics in North America and Northern Europe. Salt Typhoon typically bypasses traditional defenses by exploiting zero-day vulnerabilities in enterprise hardware and infiltrating supply chains rather than relying on common phishing tactics. By targeting the service providers that manage government data, the group effectively turns a single point of failure into a master key for an entire nation&#8217;s digital assets.<br><br>The aftermath of the attack serves as a stark warning for the European Union as it navigates an increasingly hostile digital landscape. It demonstrates that the distinction between private corporate security and national security has effectively vanished, as the compromise of a private subsidiary can have immediate consequences for public safety and governance. To counter such disciplined adversaries, experts argue that European nations must move beyond reactive measures, instead prioritizing unified intelligence sharing and the rigorous hardening of the third-party providers that form the invisible spine of modern society.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.repubblica.it/tecnologia/2026/05/03/news/esclusivo_pa_italiana_e_non_solo_attaccata_da_un_gruppo_di_hacker_cinesi-425320702/</p>]]></content:encoded></item><item><title><![CDATA[ShinyHunters Targets Instructure in Massive Data Breach Affecting Millions]]></title><description><![CDATA[Instructure officially disclosed the security incident after the ShinyHunters extortion group listed the company on their data leak site.]]></description><link>https://www.cybermaterial.com/p/shinyhunters-targets-instructure</link><guid isPermaLink="false">https://www.cybermaterial.com/p/shinyhunters-targets-instructure</guid><pubDate>Mon, 04 May 2026 12:30:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!CJCx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc89d0160-02fc-4cba-afdc-fe62d03a4b29_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CJCx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc89d0160-02fc-4cba-afdc-fe62d03a4b29_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CJCx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc89d0160-02fc-4cba-afdc-fe62d03a4b29_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!CJCx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc89d0160-02fc-4cba-afdc-fe62d03a4b29_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!CJCx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc89d0160-02fc-4cba-afdc-fe62d03a4b29_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!CJCx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc89d0160-02fc-4cba-afdc-fe62d03a4b29_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CJCx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc89d0160-02fc-4cba-afdc-fe62d03a4b29_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c89d0160-02fc-4cba-afdc-fe62d03a4b29_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:695380,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196414821?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc89d0160-02fc-4cba-afdc-fe62d03a4b29_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CJCx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc89d0160-02fc-4cba-afdc-fe62d03a4b29_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!CJCx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc89d0160-02fc-4cba-afdc-fe62d03a4b29_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!CJCx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc89d0160-02fc-4cba-afdc-fe62d03a4b29_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!CJCx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc89d0160-02fc-4cba-afdc-fe62d03a4b29_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Instructure officially disclosed the security incident after the ShinyHunters extortion group listed the company on their data leak site. The company confirmed that unauthorized access led to the exposure of personal details, including names, email addresses, student identification numbers, and private communications between users. Although the investigation is still in its early stages, the company maintains that highly sensitive information such as financial records, government IDs, and passwords remained secure during the intrusion.<br><br>In response to the discovery, the technology provider implemented immediate security measures to contain the threat and prevent further unauthorized access. These actions included deploying software patches, increasing system monitoring, and rotating application keys to secure their infrastructure. Consequently, institutional customers using the platform have been required to re-authorize their API access so that new, secure keys can be issued for their specific environments.<br><br>The ShinyHunters group, which operates on an extortion-as-a-service model, has made bold claims regarding the scope of the data theft that far exceed the company's initial reports. The hackers assert they have obtained over 240 million records from approximately 15,000 educational institutions spanning North America, Europe, and Asia. This group has a history of targeting major corporate entities through Salesforce vulnerabilities, having previously claimed responsibility for significant breaches at other global organizations.<br><br>This latest incident follows a pattern of high-profile attacks by ShinyHunters, who recently targeted other major firms and claimed to have accessed over a billion records in previous campaigns. Their strategy typically involves listing victims on a public leak site to pressure them into paying a ransom. The group&#8217;s focus on educational technology highlights a growing trend of cybercriminals targeting platforms that host massive amounts of personal data belonging to students and faculty.<br><br>The full extent of the breach remains unverified by independent security researchers, as Instructure has not yet provided specific details regarding the timeline of the attack or the veracity of the ransom demands. Currently, the company is working alongside third-party cybersecurity firms and law enforcement agencies to conduct a forensic analysis of the event. As the investigation continues, schools and universities using Canvas are being urged to remain vigilant and follow the updated security protocols issued by the provider.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://www.techzine.eu/news/security/140994/shinyhunters-claims-instructure-breach-data-from-275m-users-stolen/</p>]]></content:encoded></item><item><title><![CDATA[Ubuntu Infrastructure Disruptions Linked to Coordinated DDoS Campaign]]></title><description><![CDATA[Canonical recently confirmed that its web infrastructure is currently enduring a sustained cross-border attack.]]></description><link>https://www.cybermaterial.com/p/ubuntu-infrastructure-disruptions</link><guid isPermaLink="false">https://www.cybermaterial.com/p/ubuntu-infrastructure-disruptions</guid><pubDate>Mon, 04 May 2026 12:29:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dIUQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad4a15a1-670a-45f3-ace1-b21d9da31ec2_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dIUQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad4a15a1-670a-45f3-ace1-b21d9da31ec2_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dIUQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad4a15a1-670a-45f3-ace1-b21d9da31ec2_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!dIUQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad4a15a1-670a-45f3-ace1-b21d9da31ec2_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!dIUQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad4a15a1-670a-45f3-ace1-b21d9da31ec2_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!dIUQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad4a15a1-670a-45f3-ace1-b21d9da31ec2_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dIUQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad4a15a1-670a-45f3-ace1-b21d9da31ec2_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ad4a15a1-670a-45f3-ace1-b21d9da31ec2_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:547962,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196414732?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad4a15a1-670a-45f3-ace1-b21d9da31ec2_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dIUQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad4a15a1-670a-45f3-ace1-b21d9da31ec2_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!dIUQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad4a15a1-670a-45f3-ace1-b21d9da31ec2_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!dIUQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad4a15a1-670a-45f3-ace1-b21d9da31ec2_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!dIUQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad4a15a1-670a-45f3-ace1-b21d9da31ec2_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p> Canonical recently confirmed that its web infrastructure is currently enduring a sustained cross-border attack. The company stated that teams are actively working to mitigate the disruption and promised to release more detailed information through official channels as soon as the situation is stabilized. This confirmation follows a series of reports from users who found themselves unable to access public-facing resources starting late Thursday.<br><br>The primary method of the disruption has been identified as a distributed denial-of-service attack. This technique involves overwhelming target servers with a massive influx of junk traffic, effectively drowning out legitimate requests and forcing the infrastructure to crash. While technically less sophisticated than a data breach, the scale of this particular flood has proven sufficient to knock critical services offline for an extended period.<br><br>Internal discussions among developers on community forums suggest the impact is broader than a simple website outage. The attack has reportedly compromised the security API used by the operating system, which explains why users have encountered errors when attempting to download security patches or new packages. Independent testing has verified that update protocols remain non-functional across multiple devices, confirming that the core utility of the distribution is currently hampered.<br><br>As the outage enters its second day, the impact remains significant with no immediate timeline for a full recovery. A spokesperson for Canonical has largely pointed back to the company's initial public statement, emphasizing that the focus remains on defensive mitigation. The disruption marks one of the most visible service failures for the Linux distribution in recent years, highlighting the vulnerability of centralized update repositories.<br><br>Responsibility for the incident has been claimed by a group identified as The Islamic Cyber Resistance in Iraq 313 Team. The group utilized their Telegram channel to announce that they were behind the flooding of Canonical&#8217;s servers. While the motive remains tied to hacktivism, the practical result is a continued bottleneck for the global Ubuntu user base as they wait for the infrastructure to be restored.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p>Source: https://discourse.ifin.network/t/ubuntu-services-under-attack/356 </p>]]></content:encoded></item><item><title><![CDATA[Cybercrime Syndicates Exploit Vishing and SSO Vulnerabilities for High-Speed Cloud Extortion ]]></title><description><![CDATA[The evolution of these tactics marks a significant shift in the cybercrime landscape, as threat actors move away from slow, malware-heavy infections toward agile, identity-based intrusions.]]></description><link>https://www.cybermaterial.com/p/cybercrime-syndicates-exploit-vishing</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cybercrime-syndicates-exploit-vishing</guid><pubDate>Mon, 04 May 2026 12:27:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!R-G_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!R-G_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!R-G_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!R-G_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!R-G_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!R-G_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!R-G_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f638de62-e912-4520-996a-e05869af4cb7_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:446144,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196414582?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!R-G_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!R-G_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!R-G_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!R-G_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The evolution of these tactics marks a significant shift in the cybercrime landscape, as threat actors move away from slow, malware-heavy infections toward agile, identity-based intrusions. By targeting administrative accounts within Single Sign-On platforms, attackers can gain broad access to sensitive data stored across various cloud services, often completing their data theft and extortion demands within hours of the initial breach.<br><br>The initial phase of these attacks typically begins with a high-pressure voice phishing call, often referred to as vishing. In these scenarios, a threat actor poses as a member of the corporate IT help desk or security team, contacting a specific employee to report a fabricated technical issue. The goal is to convince the target to share their login credentials or to accept a push notification on their authentication app. Because these calls rely on social engineering and psychological manipulation rather than malicious software, they frequently bypass automated security filters that look for suspicious code or links.<br><br>Once the attackers gain entry into the corporate environment, they immediately target the Single Sign-On or SSO provider. SSO is designed to streamline user access by allowing one set of credentials to unlock multiple applications, but in the hands of a criminal, it becomes a master key. By abusing SSO configurations, the intruders can grant themselves persistent access to a wide array of Software-as-a-Service platforms, such as document storage, customer databases, and communication tools like Slack or Microsoft Teams. This centralized control allows them to navigate the network with the same privileges as a legitimate administrator.<br><br>After securing access to the various SaaS platforms, the group focuses on rapid data exfiltration rather than deploying ransomware to encrypt files. They identify the most sensitive corporate data&#8212;financial records, legal documents, or customer personal information&#8212;and transfer it to their own servers. The speed of this process is a defining characteristic of modern extortion groups; they aim to steal as much information as possible before the internal security team can detect the anomaly. By the time an alert is triggered, the data has often already left the company's control.<br><br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>The extortion phase begins shortly after the data has been stolen. Instead of leaving a digital ransom note on a server, the attackers often contact company executives directly via email or even phone calls to demand payment. They threaten to leak the stolen data on public forums or sell it to competitors if their demands are not met. Because the attackers have already demonstrated their ability to move through the cloud environment at will, the pressure on the victim organization to pay is immense, as the threat of a massive data breach becomes an immediate reality.<br><br>Defending against these rapid-fire attacks requires a move beyond traditional antivirus software toward robust identity security and employee awareness. Organizations are being urged to implement more secure forms of multi-factor authentication, such as hardware keys, which are much harder to compromise through vishing. Additionally, monitoring for unusual behavior within SSO logs, such as logins from unexpected locations or at odd hours, is essential for catching these intruders before they can complete their mission. As cybercrime groups continue to refine their social engineering and cloud exploitation techniques, the speed of response has become the most critical factor in modern digital defense.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>: https://www.crowdstrike.com/en-us/blog/defending-against-cordial-spider-and-snarky-spider-with-falcon-shield/ </p>]]></content:encoded></item><item><title><![CDATA[CISA Adds Major Linux Kernel Vulnerability to Known Exploited Vulnerabilities Catalog]]></title><description><![CDATA[The Cybersecurity and Infrastructure Security Agency recently expanded its Known Exploited Vulnerabilities catalog to include CVE-2026-31431, a logic flaw in the Linux kernel&#8217;s cryptographic template.]]></description><link>https://www.cybermaterial.com/p/cisa-adds-major-linux-kernel-vulnerability</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cisa-adds-major-linux-kernel-vulnerability</guid><pubDate>Mon, 04 May 2026 12:25:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!v2kH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!v2kH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!v2kH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!v2kH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!v2kH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!v2kH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!v2kH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:530219,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196414267?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!v2kH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!v2kH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!v2kH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!v2kH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>The Cybersecurity and Infrastructure Security Agency recently expanded its Known Exploited Vulnerabilities catalog to include CVE-2026-31431, a logic flaw in the Linux kernel&#8217;s cryptographic template. This vulnerability, discovered by researchers at Xint Code, affects a wide range of popular distributions including Ubuntu, Red Hat Enterprise Linux, SUSE, and Amazon Linux. The flaw is particularly dangerous because it allows a local user to execute a deterministic 4-byte write into the page cache of any readable file, which can lead to a full system takeover. Because the exploit targets memory rather than the physical disk, the changes are silent and difficult for traditional security tools to detect.<br><br>The technical root of the issue lies in the interaction between the kernel's crypto subsystem and the splice system call. By using an unprivileged AF_ALG socket, an attacker can map sensitive file pages into a cryptographic operation. A specific error in the authencesn algorithm causes the kernel to use the output buffer as a scratch space, inadvertently writing controlled data past the intended boundary. This extra write lands directly in the page cache of a chosen file, such as a setuid-root binary. Because the kernel does not mark these corrupted pages as dirty, the file on the disk remains original while the version running in memory is compromised.<br><br>To carry out the attack, an operator uses a small script to target a common binary like the su utility. After binding to the vulnerable cryptographic mode and setting the parameters, the attacker uses the recv system call to trigger the decryption process. This process repeats until enough shellcode has been injected into the cached version of the binary. When the attacker subsequently executes the utility, the kernel loads the corrupted code from the cache. Since the utility naturally runs with root privileges, the injected code provides the attacker with total control over the operating system.<br><br><br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>Research shows that this vulnerability has been present in the Linux kernel since an optimization made in 2017. It is highly portable and effective across different architectures, making it a more reliable threat than previous kernel exploits like Dirty Cow. The simplicity of the exploit is a major concern, as a script under one kilobyte in size can consistently achieve root access on modern systems such as Ubuntu 24.04 or RHEL 10.1. Furthermore, because it exploits the shared page cache, the vulnerability can be used to escape Kubernetes containers and move laterally within cloud environments.<br><br>In response to the active exploitation of this flaw, CISA has issued a directive requiring federal agencies to remediate the vulnerability by May 15, 2026. While the mandate specifically applies to Federal Civilian Executive Branch agencies, cybersecurity experts strongly advise private organizations to prioritize patching their Linux infrastructure. Most major distributions have released updates to address the logic bug in the cryptographic subsystem, and administrators are encouraged to apply these kernel patches immediately to prevent unauthorized privilege escalation.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>: https://www.cisa.gov/news-events/alerts/2026/05/01/cisa-adds-one-known-exploited-vulnerability-catalog </p>]]></content:encoded></item><item><title><![CDATA[GoldPickaxe]]></title><description><![CDATA[The Mobile Malware That Doesn&#8217;t Just Steal Passwords, It Steals You]]></description><link>https://www.cybermaterial.com/p/goldpickaxe</link><guid isPermaLink="false">https://www.cybermaterial.com/p/goldpickaxe</guid><dc:creator><![CDATA[CyberMaterial]]></dc:creator><pubDate>Sat, 02 May 2026 14:01:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!k_aH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dd8e56-dc33-4d01-8055-511ede01b99b_948x630.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!k_aH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dd8e56-dc33-4d01-8055-511ede01b99b_948x630.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!k_aH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dd8e56-dc33-4d01-8055-511ede01b99b_948x630.jpeg 424w, https://substackcdn.com/image/fetch/$s_!k_aH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dd8e56-dc33-4d01-8055-511ede01b99b_948x630.jpeg 848w, https://substackcdn.com/image/fetch/$s_!k_aH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dd8e56-dc33-4d01-8055-511ede01b99b_948x630.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!k_aH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dd8e56-dc33-4d01-8055-511ede01b99b_948x630.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!k_aH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dd8e56-dc33-4d01-8055-511ede01b99b_948x630.jpeg" width="948" height="630" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87dd8e56-dc33-4d01-8055-511ede01b99b_948x630.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:630,&quot;width&quot;:948,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:117664,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195866647?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dd8e56-dc33-4d01-8055-511ede01b99b_948x630.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!k_aH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dd8e56-dc33-4d01-8055-511ede01b99b_948x630.jpeg 424w, https://substackcdn.com/image/fetch/$s_!k_aH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dd8e56-dc33-4d01-8055-511ede01b99b_948x630.jpeg 848w, https://substackcdn.com/image/fetch/$s_!k_aH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dd8e56-dc33-4d01-8055-511ede01b99b_948x630.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!k_aH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87dd8e56-dc33-4d01-8055-511ede01b99b_948x630.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Most people think mobile malware is about stolen passwords, banking logins, or credit card details.</p><p>But GoldPickaxe changed that.</p><p>This is one of the more dangerous mobile malware campaigns to emerge in recent years because it doesn&#8217;t stop at account access, it targets identity itself.</p><p>And that changes everything.</p><div><hr></div><h3><strong>Watch Summary Video Below: &#11015;&#65039;</strong></h3><h3></h3>
      <p>
          <a href="https://www.cybermaterial.com/p/goldpickaxe">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>