<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 5/8/2026

SHARE

Breaches

Canvas Breach Disrupts Schools & Colleges Nationwide

An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the service's login page with a ransom demand that threatened to leak data from 275 million students and faculty across nearly 9,000 educational institutions. Canvas parent firm Instructure responded to today's defacement attacks by disabling the platform. READ MORE...


AI Firm Braintrust Prompts API Key Rotation After Data Breach

AI evaluation and observability platform Braintrust urged customers this week to rotate API keys that may have been compromised after hackers accessed an AWS account. The incident, the company says, was discovered on May 4, after receiving a report of suspicious behavior, and was communicated to customers via email on May 5. The message also included indicators of compromise (IOCs) and remediation steps. READ MORE...

Hacking

Trellix source code breach claimed by RansomHouse hackers

The attack on the Trellix source code repository disclosed last week has been claimed by the RansomHouse threat group, which leaked a small set of images as proof of the intrusion. Yesterday, the threat actor published on their data leak site screenshots indicating access to the cybersecurity company's appliance management system. However, BleepingComputer could not confirm the authenticity of the data. READ MORE...

Trends

Businesses hide vast majority of ransomware attacks, report finds

Companies around the world have been keeping the vast majority of ransomware attacks secret, according to a new report from the security firm BlackFog. The number of undisclosed attacks in the first quarter of 2026 was almost 10 times as large as the number of disclosed attacks, according to the report published Wednesday. BlackFog's report, based on information from dark-web leak sites, also includes data on the most targeted sectors and new tools that have emerged in the cybercrime ecosystem. READ MORE...

Malware

After Replacing TeamPCP Malware, 'PCPJack' Steals Cloud Secrets

Researchers have spotted a modular cloud worm that will clear you of any infections by the dangerous supply chain attacker "TeamPCP," free of charge. The catch: It wants your secrets. SentinelLabs named the program "PCPJack" in a new blog post, and described it as "well developed" - effective, with a few inexplicable but superficial oddities. Affected organizations stand to lose secrets associated with their cloud, container, developer, productivity, and financial services. READ MORE...

Information Security

Ivanti customers confront yet another actively exploited zero-day

Attackers are hitting Ivanti customers yet again - circling back to a common target and consistently susceptible vendor in the network edge space - by exploiting a zero-day vulnerability in one of the company's most besieged products. Ivanti warned customers that attackers have successfully exploited CVE-2026-6973, an improper input validation defect in Ivanti Endpoint Manager Mobile (EPMM) that allows authenticated users with administrative privileges to run code remotely. READ MORE...


Microsoft says Edge's plaintext password behavior is "by design"

Some time ago, we discussed whether you should allow your browser to remember your passwords. The typical behavior of browser password managers is to store passwords encrypted on disk, tied to your user account. But recently, a security researcher systematically tested every major Chromium-based browser for how they handle credentials in memory. The researcher found that Edge was the only one loading the entire password vault into plaintext process memory at startup. READ MORE...

Exploits/Vulnerabilities

'Dirty Frag' Linux flaw one-ups CopyFail with no patches and public root exploit

A fresh Linux privilege escalation bug dubbed "Dirty Frag" has dropped into the wild with no patches, no CVE, and a public exploit that hands attackers root access across major distributions. Security researcher Hyunwoo Kim disclosed the local privilege escalation flaw on Friday after what he said was a broken embargo forced the issue into the open. Dirty Frag works by chaining together two separate Linux kernel flaws. READ MORE...


60% of MD5 password hashes are crackable in under an hour

It's World Password Day, and there's really no better way to celebrate than with news that a majority of supposedly secure password hashes can be cracked with a single GPU in less than an hour, some in less than a minute. Using a dataset of more than 231 million unique passwords sourced from dark web leaks researchers at security firm Kaspersky found that, using a single Nvidia RTX 5090 graphics card, 60 percent of passwords could be cracked in less than an hour. READ MORE...


Flaw in Claude's Chrome extension allowed 'any' other plugin to hijack victims' AI

As businesses and governments turn to AI agents to access the internet and perform higher-level tasks, researchers continue to find serious flaws in large language models that can be exploited by bad actors. The latest discovery comes from browser security firm LayerX, involving a bug in the Chrome extension for Anthropic's Claude AI model that allows any other plugin - even ones without special permissions - to embed hidden instructions that can take over the agent. READ MORE...

On This Date

  • ...in 1886, pharmacist John Pemberton first sells his new patent medicine, a drink he calls "Coca-Cola".
  • ...in 1911, legendary blues guitarist Robert Johnson ("Sweet Home Chicago", "Cross Road Blues") is born in Hazlehurst, MS.
  • ...in 1914, Paramount Pictures is founded. The stars in the famous mountain logo represent the first 22 performers signed by the studio.
  • ...in 1945, the Allies celebrate VE day, after the unconditional surrender of the European Axis powers.