[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"brief-today":3,"brief-red-blue":29,"brief-weekly-card":50,"brief-priorities":56},{"morning":4,"evening":17,"lastUpdatedTime":28},{"edition":5,"date":6,"time":7,"title":8,"bullets":9,"severity":10,"readMinutes":11,"iocCount":12,"podcastDuration":13,"updatedAt":14,"updatedAgo":15,"reviewUrl":16,"podcastUrl":16},"Morning Brief","May 14, 2026","07:30","ThreatNoir Morning Brief — May 14",[],"HIGH",1,11,"2:44","2026-05-14T03:11:56.144636+00:00","17h ago","\u002Freview\u002F2026-05-14\u002Fmorning",{"edition":18,"date":6,"time":19,"title":20,"bullets":21,"severity":22,"readMinutes":11,"iocCount":23,"podcastDuration":24,"updatedAt":25,"updatedAgo":26,"reviewUrl":27,"podcastUrl":27},"Evening Brief","18:00","ThreatNoir Afternoon Brief — May 14",[],"MEDIUM",10,"2:01","2026-05-14T13:16:34.306499+00:00","7h ago","\u002Freview\u002F2026-05-14\u002Fafternoon","15:16",{"items":30},[31,38,44],{"title":32,"slug":33,"description":34,"durationLabel":35,"tone":36,"thumbnailUrl":37},"Critical Exim Flaw Hands Attackers Remote Code Execution","critical-exim-flaw-hands-attackers-remote-code-execution","A use-after-free vulnerability in Exim's TLS buffer handling allows unauthenticated remote code execution on versions 4.97-4.99.2 compiled with GnuTLS, affecting default packages on Debian and Ubuntu.","1:40","people","https:\u002F\u002Fcdn.threatnoir.com\u002Fshow\u002F2026-05-14\u002Fthumbnail.jpg",{"title":39,"slug":40,"description":41,"durationLabel":35,"tone":42,"thumbnailUrl":43},"Nitrogen Ransomware Hits Foxconn, Claims 8TB Stolen","nitrogen-ransomware-hits-foxconn-claims-8tb-stolen","Nitrogen ransomware operators breached Foxconn's North American facilities and exfiltrated 8TB of schematics from Apple, Google, Dell, and Nvidia before encrypting systems.","lock","https:\u002F\u002Fcdn.threatnoir.com\u002Fshow\u002F2026-05-13\u002Fthumbnail.jpg",{"title":45,"slug":46,"description":47,"durationLabel":35,"tone":48,"thumbnailUrl":49},"Checkmarx Jenkins Plugin Backdoored With Infostealer","checkmarx-jenkins-plugin-backdoored-with-infostealer","Attackers used stolen Trivy credentials to compromise the official Checkmarx Jenkins AST plugin on the marketplace, injecting an infostealer that harvested build pipeline credentials for at least a month.","skull","https:\u002F\u002Fcdn.threatnoir.com\u002Fshow\u002F2026-05-12\u002Fthumbnail.jpg",{"slug":51,"weekLabel":52,"tagline":53,"dateFrom":54,"dateTo":55},"2026-w19","2026-W19","Education burns while AI attacks accelerate","2026-05-04","2026-05-10",{"items":57,"totalCount":58},[],0]