{"id":784,"date":"2022-01-18T11:14:49","date_gmt":"2022-01-18T17:14:49","guid":{"rendered":"https:\/\/www.echorequest.com\/?page_id=784"},"modified":"2025-05-12T13:01:06","modified_gmt":"2025-05-12T18:01:06","slug":"online-security-news","status":"publish","type":"page","link":"https:\/\/www.echorequest.com\/?page_id=784","title":{"rendered":"ONLINE Security News"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">THE HACKER NEWS (THN) FEED:<\/h2>\n\n\n<ul class=\"is-grid columns-4 has-dates wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/what-45-days-of-watching-your-own-tools.html'>What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface<\/a><\/div><time datetime=\"2026-05-15T06:00:00-05:00\" class=\"wp-block-rss__item-publish-date\">May 15, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/tanstack-supply-chain-attack-hits-two.html'>TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates<\/a><\/div><time datetime=\"2026-05-15T05:54:44-05:00\" class=\"wp-block-rss__item-publish-date\">May 15, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/on-prem-microsoft-exchange-server-cve.html'>On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email<\/a><\/div><time datetime=\"2026-05-15T01:19:04-05:00\" class=\"wp-block-rss__item-publish-date\">May 15, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/cisa-adds-cisco-sd-wan-cve-2026-20182.html'>CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits<\/a><\/div><time datetime=\"2026-05-15T00:28:03-05:00\" class=\"wp-block-rss__item-publish-date\">May 15, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/cisco-catalyst-sd-wan-controller-auth.html'>Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access<\/a><\/div><time datetime=\"2026-05-14T12:45:20-05:00\" class=\"wp-block-rss__item-publish-date\">May 14, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/stealer-backdoor-found-in-3-node-ipc.html'>Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets<\/a><\/div><time datetime=\"2026-05-14T12:22:43-05:00\" class=\"wp-block-rss__item-publish-date\">May 14, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/threatsday-bulletin-pan-os-rce-mythos.html'>ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories<\/a><\/div><time datetime=\"2026-05-14T11:07:46-05:00\" class=\"wp-block-rss__item-publish-date\">May 14, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/thehackernews.com\/2026\/05\/ghostwriter-targets-ukrainian.html'>Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike<\/a><\/div><time datetime=\"2026-05-14T09:00:37-05:00\" class=\"wp-block-rss__item-publish-date\">May 14, 2026<\/time> <\/li><\/ul>\n\n\n<p>DARK READING FEED:<\/p>\n\n\n<ul class=\"is-grid columns-4 has-dates wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/ics-ot-security\/taiwan-incident-highlights-cybersecurity-gaps'>Taiwan Incident Highlights Cybersecurity Gaps in Rail Systems<\/a><\/div><time datetime=\"2026-05-14T20:00:00-05:00\" class=\"wp-block-rss__item-publish-date\">May 14, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/cyber-risk\/securityscorecard-snags-driftnet-to-level-up-threat-intelligence'>SecurityScorecard Snags Driftnet to Level Up Threat Intelligence<\/a><\/div><time datetime=\"2026-05-14T15:57:27-05:00\" class=\"wp-block-rss__item-publish-date\">May 14, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/vulnerabilities-threats\/maximum-severity-cisco-sd-wan-bug-exploited'>Maximum Severity Cisco SD-WAN Bug Exploited in the Wild<\/a><\/div><time datetime=\"2026-05-14T15:25:31-05:00\" class=\"wp-block-rss__item-publish-date\">May 14, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/frostyneighbor-apt-govt-orgs-poland-ukraine'>&#039;FrostyNeighbor&#039; APT Carefully Targets Govt Orgs in Poland, Ukraine<\/a><\/div><time datetime=\"2026-05-14T11:59:25-05:00\" class=\"wp-block-rss__item-publish-date\">May 14, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/cybersecurity-operations\/ai-cybersecurity-investments-valley-death'>AI Drives Cybersecurity Investments, Widening &#039;Valley of Death&#039;<\/a><\/div><time datetime=\"2026-05-14T08:00:00-05:00\" class=\"wp-block-rss__item-publish-date\">May 14, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/foxconn-attack-manufacturing-cyber-crisis'>Foxconn Attack Highlights Manufacturing&#039;s Cyber Crisis<\/a><\/div><time datetime=\"2026-05-14T07:00:00-05:00\" class=\"wp-block-rss__item-publish-date\">May 14, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/cyber-risk\/checkbox-assessments-aren-t-fit-to-measure-to-risk'>Checkbox Assessments Aren&#039;t Fit to Measure Risk<\/a><\/div><time datetime=\"2026-05-13T16:17:07-05:00\" class=\"wp-block-rss__item-publish-date\">May 13, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/application-security\/attackers-weaponize-rubygems-data-dead-drops'>Attackers Weaponize RubyGems for Data Dead Drops<\/a><\/div><time datetime=\"2026-05-13T16:09:20-05:00\" class=\"wp-block-rss__item-publish-date\">May 13, 2026<\/time> <\/li><\/ul>\n\n\n<p>INFO-SECURITY Magazine FEED:<\/p>\n\n\n<ul class=\"has-dates wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.infosecurity-magazine.com\/news\/mustang-panda-fdmtp-backdoor-apj\/'>Mustang Panda Linked to Updated FDMTP Backdoor in Asia-Pacific Espionage Campaign<\/a><\/div><time datetime=\"2026-05-14T10:00:00-05:00\" class=\"wp-block-rss__item-publish-date\">May 14, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.infosecurity-magazine.com\/news\/google-launches-android-spyware\/'>Google Launches Android Spyware Forensics Tool for High-Risk Users<\/a><\/div><time datetime=\"2026-05-14T08:30:00-05:00\" class=\"wp-block-rss__item-publish-date\">May 14, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.infosecurity-magazine.com\/news\/fragnesia-linux-kernel-lpe-root\/'>New Fragnesia Flaw Hands Linux Local Users Root Access<\/a><\/div><time datetime=\"2026-05-14T08:00:00-05:00\" class=\"wp-block-rss__item-publish-date\">May 14, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.infosecurity-magazine.com\/news\/most-organizations-ai-agents\/'>Most Organizations Now Use AI Agents for Sensitive Security Tasks<\/a><\/div><time datetime=\"2026-05-14T04:20:00-05:00\" class=\"wp-block-rss__item-publish-date\">May 14, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.infosecurity-magazine.com\/news\/ico-steps-in-advice-handling-ai\/'>ICO Publishes Five-Step Plan to Counter Emerging AI-Powered Attacks<\/a><\/div><time datetime=\"2026-05-14T04:00:00-05:00\" class=\"wp-block-rss__item-publish-date\">May 14, 2026<\/time> <\/li><\/ul>\n\n\n<p>Krebs On Security:<\/p>\n\n\n<ul class=\"has-dates wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/krebsonsecurity.com\/2026\/05\/patch-tuesday-may-2026-edition\/'>Patch Tuesday, May 2026 Edition<\/a><\/div><time datetime=\"2026-05-12T16:46:45-05:00\" class=\"wp-block-rss__item-publish-date\">May 12, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/krebsonsecurity.com\/2026\/05\/canvas-breach-disrupts-schools-colleges-nationwide\/'>Canvas Breach Disrupts Schools &amp; Colleges Nationwide<\/a><\/div><time datetime=\"2026-05-07T21:58:46-05:00\" class=\"wp-block-rss__item-publish-date\">May 7, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/krebsonsecurity.com\/2026\/04\/anti-ddos-firm-heaped-attacks-on-brazilian-isps\/'>Anti-DDoS Firm Heaped Attacks on Brazilian ISPs<\/a><\/div><time datetime=\"2026-04-30T09:04:26-05:00\" class=\"wp-block-rss__item-publish-date\">April 30, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/krebsonsecurity.com\/2026\/04\/scattered-spider-member-tylerb-pleads-guilty\/'>\u2018Scattered Spider\u2019 Member \u2018Tylerb\u2019 Pleads Guilty<\/a><\/div><time datetime=\"2026-04-21T09:53:59-05:00\" class=\"wp-block-rss__item-publish-date\">April 21, 2026<\/time> <\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/krebsonsecurity.com\/2026\/04\/patch-tuesday-april-2026-edition\/'>Patch Tuesday, April 2026 Edition<\/a><\/div><time datetime=\"2026-04-14T16:47:59-05:00\" class=\"wp-block-rss__item-publish-date\">April 14, 2026<\/time> <\/li><\/ul>\n\n\n<p class=\"has-large-font-size\"><strong>CISA &#8211; Cybersecurity and Infrastructure Security Agency<\/strong><\/p>\n\n\n\n<p>ALERTS AND ADVISORIES:<\/p>\n\n\n<div class=\"components-placeholder\"><div class=\"notice notice-error\"><strong>RSS Error:<\/strong> Retrieved unsupported status code &quot;403&quot;<\/div><\/div>\n\n\n<p>CISA NEWS: <\/p>\n\n\n<div class=\"components-placeholder\"><div class=\"notice notice-error\"><strong>RSS Error:<\/strong> Retrieved unsupported status code &quot;403&quot;<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>THE HACKER NEWS (THN) FEED: DARK READING FEED: INFO-SECURITY Magazine FEED: Krebs On Security: CISA &#8211; Cybersecurity and Infrastructure Security Agency ALERTS AND ADVISORIES: CISA NEWS:<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-784","page","type-page","status-publish","hentry","post-preview"],"_links":{"self":[{"href":"https:\/\/www.echorequest.com\/index.php?rest_route=\/wp\/v2\/pages\/784","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.echorequest.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.echorequest.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.echorequest.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.echorequest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=784"}],"version-history":[{"count":21,"href":"https:\/\/www.echorequest.com\/index.php?rest_route=\/wp\/v2\/pages\/784\/revisions"}],"predecessor-version":[{"id":949,"href":"https:\/\/www.echorequest.com\/index.php?rest_route=\/wp\/v2\/pages\/784\/revisions\/949"}],"wp:attachment":[{"href":"https:\/\/www.echorequest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}