# Archive
Browse past daily curated stories
Monday, May 18, 2026
-
1BleepingComputer generalNew Windows 'MiniPlasma' zero-day exploit gives SYSTEM access, PoC released
A researcher released a proof-of-concept exploit for 'MiniPlasma,' an unpatched Windows privilege escalation zero-day that grants SYSTEM-level access on fully patched Windows systems. The public PoC significantly lowers the bar for exploitation, making this an urgent concern for Windows administrators until Microsoft issues a patch.
-
2The Hacker News generalNGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE
CVE-2026-42945 (CVSS 9.2), a heap buffer overflow in NGINX's ngx_http_rewrite_module affecting versions 0.6.27 through 1.30.0, is under active exploitation in the wild within days of public disclosure. The flaw impacts both NGINX Plus and Open Source builds and carries potential for remote code execution, making immediate patching critical for the large population of NGINX deployments.
-
3BleepingComputer generalRussian hackers turn Kazuar backdoor into modular P2P botnet
Russia-linked threat actor Secret Blizzard has evolved its long-standing Kazuar backdoor into a modular peer-to-peer botnet architecture, enhancing its stealth, persistence, and data-collection capabilities. The P2P design complicates traditional C2 takedown efforts and signals a significant operational upgrade for one of Russia's most persistent espionage toolsets.
-
4BleepingComputer generalTycoon2FA hijacks Microsoft 365 accounts via device-code phishing
The Tycoon2FA phishing-as-a-service kit has added device-code phishing support and is abusing Trustifi click-tracking URLs to bypass link-scanning defenses and hijack Microsoft 365 accounts. Device-code phishing is particularly dangerous because it circumvents MFA by tricking users into authorizing attacker-controlled OAuth tokens.
-
5SecurityWeek generalHackers Earn $1.3 Million at Pwn2Own Berlin 2026
Pwn2Own Berlin 2026 awarded $1.3 million in prizes for demonstrated exploits targeting Windows, Linux, VMware, Nvidia, and AI products. The competition results provide a concrete snapshot of current attack surface exposure across critical enterprise and cloud infrastructure components.
-
6The Hacker News generalGrafana GitHub Token Breach Led to Codebase Download and Extortion Attempt
Grafana disclosed that an unauthorized party obtained a GitHub access token, used it to download the company's full codebase, and subsequently attempted extortion. Grafana confirmed no customer data or personal information was accessed, but the incident underscores supply-chain risks from exposed source-code repository credentials.
-
7The Hacker News generalFunnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming
A critical vulnerability in the Funnel Builder plugin for WordPress (no CVE yet assigned) is being actively exploited to inject malicious JavaScript into WooCommerce checkout pages, enabling payment card skimming. Sansec published details of the in-the-wild campaign, and the absence of a CVE may delay patching by site operators relying on vulnerability scanners.
-
8BleepingComputer generalMicrosoft rejects critical Azure vulnerability report, no CVE issued
A security researcher claims Microsoft quietly fixed an Azure Backup for AKS vulnerability after rejecting his report, and without issuing a CVE. Microsoft disputes the claim, telling BleepingComputer the behavior was expected and that "no product changes were made," despite the researcher documenting a silent fix. [...]
-
9Dark Reading generalCan Laws Stop Deepfakes? South Korea Aims to Find Out
South Korea's upcoming local elections next month will serve as a live test of the country's deepfake regulations, which impose criminal penalties for AI-generated electoral disinformation. The outcome will offer policy practitioners early empirical data on whether legislative controls can meaningfully curb deepfake influence operations during active election cycles.
-
10WeLiveSecurity (ESET) threat-intelWhy geopolitical turmoil is a gift for scammers, and how to stay safe
An ESET analysis details how geopolitical instability creates expanded opportunities for fraud campaigns, including charity scams, impersonation of relief organizations, and crisis-themed phishing. The piece is oriented toward practitioner and end-user awareness, with guidance on recognizing opportunistic fraud patterns tied to active conflict narratives.