5/5/2026 May 5, 2026May 5, 2026 ~ The Cyber Beat ~ Leave a comment China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across RegionsNorth Korean APT ScarCruft Targets Yanbian Gamers via Trojanized PlatformSmall Defense Firms Lack Network Data to Stop Nation-State Hackers, Analyst SaysStates Concerned Over Access to Frontier AI Model PilotsAI Adoption Outpaces Safety Policies, Leaving Organizations Exposed to Cyber RiskResearchers Gaslit Claude Into Giving Instructions to Build ExplosivesStudent Hacked Taiwan High-Speed Rail to Trigger Emergency BrakesKarakurt Extortion Gang ‘Cold Case’ Negotiator Gets 8.5 Years in PrisonRomance Scammers Turn Sweet Talk Into £102M PaydayFTC to Ban Data Broker Kochava From Selling Americans’ Location DataAustralia Launches Cyber Review Board Modeled on Version Disbanded in U.S.Real Estate Giant Cushman & Wakefield Confirms Vishing Incident as ShinyHunters and Qilin Both Come KnockingShinyHunters Claims Dump Puts 119K Vimeo Emails in the WildInstructure Hacker Claims Data Theft From 8,800 Schools, UniversitiesMicrosoft Flags Mass Phishing Campaign Using Fake Compliance EmailsCloudZ Malware Abuses Microsoft Phone Link to Steal SMS and OTPsDAEMON Tools Supply Chain Attack Compromises Official Installers with MalwareMetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution AttacksCritical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCEGoogle Now Offers up to $1.5 Million for Some Android ExploitsGerman Officials Advance Legislation That Would Expand Law Enforcement Use of Surveillance Technology
5/4/2026 May 4, 2026May 4, 2026 ~ The Cyber Beat ~ Leave a comment Itron Hackers Accessed Critical Infrastructure OperatorsSilver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and RussiaIf the Vote You Rocked, Your Personal Info Can Be GrokkedEU Recommends Member States to Not Use Huwaei, ZTE in Connectivity InfrastructureWhite House Considers Vetting AI Models Before They Are ReleasedChatGPT Wrestles With Its Most Chilling Conversation: How Do I Plan an Attack?You Have No Idea How Much You Still Use BlackBerryDHS Demanded Google Surrender Data on Canadian’s Activity, Location Over Anti-ICE PostsForbes Preliminarily Agrees to Pay $10 Million to Settle California Wiretapping LawsuitRansomware Group Claims Breach of Pro-Orbán Hungarian Media FirmInstructure Confirms Data Breach, ShinyHunters Claims AttackHanover County Schools Confirms Data Breach IncidentPhishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM ToolsAmazon SES Increasingly Abused in Phishing to Evade DetectionBackdoored PyTorch Lightning Package Drops Credential StealerWeaver E-Cology Critical Bug Exploited in Attacks Since MarchProgress Patches Critical MOVEit Automation Bug Enabling Authentication BypassCISA Says ‘Copy Fail’ Flaw Now Exploited to Root Linux SystemsKids Say They Can Beat Age Checks by Drawing on a Fake Mustache
5/1-3/2026 May 3, 2026May 3, 2026 ~ The Cyber Beat ~ Leave a comment Ubuntu Infrastructure Has Been Down for More Than a Day…Ubuntu Services Hit by Outages After DDoS Attack…Pro-Iran Crew turns DDoS into Shakedown as Ubuntu.com Stays DownCyber Spies Target Russian Aviation Firms to Steal Satellite and GPS DataU.S. Officials Weigh Cutting Deadlines to Fix Digital Flaws Amid Worries Over AI-Powered Hacking, Sources SayBritish Cyber Agency Warns of Looming ‘Patch Wave’ as AI Speeds Flaw DiscoveryBrace for the Patch Tsunami: AI Is Unearthing Decades of Buried Code DebtGPT-5.5 Matches Heavily Hyped Mythos Preview in New Cybersecurity TestsSenate Judiciary Advances Bill That Would Bar Minors From Interacting With AI CompanionsSecurity Strategies Shift Focus to Cyber InsuranceTwo Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware AttacksDisneyland Now Uses Face Recognition on VisitorsEdu Tech Firm Instructure Discloses Cyber Incident, Probes ImpactTrellix Confirms Source Code Breach With Unauthorized Repository AccessCritrical cPanel Flaw Mass-Exploited in “Sorry” Ransomware AttacksCity of Ardmore (OK) Issues Alert After Ransomware AttackRansomware Attack Cripples Adams County (MS) Systems, Officials Say30,000 Facebook Accounts Hacked via Google AppSheet Phishing CampaignTelegram Mini Apps Abused for Crypto Scams, Android Malware DeliveryConsentFix v3 Attacks Target Azure with Automated OAuth AbuseCybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion AttacksCISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEVMicrosoft Fixes Remote Desktop Warnings Displaying IncorrectlyMicrosoft Defender Wrongly Flags DigiCert Certs as Trojan:Win32/Cerdigent.A!dha