[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$feYZBlWUq2PXGDAhNt-d4AHEc15o84EXUAzhNFIvLNSA":3},{"items":4,"hasMore":287,"nextOffset":288},[5,14,18,27,35,43,47,55,59,63,66,70,73,81,89,93,97,101,105,113,120,127,135,139,147,151,155,164,171,176,179,183,191,194,198,204,212,216,223,230,238,243,250,253,261,265,269,273,276,279],{"type":6,"value":7,"context":8,"article":9},"cve","CVE-2026-4798","Time-based blind SQL injection via product_order parameter (unauthenticated, requires prior WooCommerce installation)",{"id":10,"title":11,"url":12,"published_at":13},"cb0ee629-2a63-4a38-8c7c-cbe0e550f60a","Avada Builder WordPress plugin flaws allow site credential theft","https:\u002F\u002Fwww.bleepingcomputer.com\u002Fnews\u002Fsecurity\u002Favada-builder-wordpress-plugin-flaws-allow-site-credential-theft\u002F","2026-05-15T15:56:56+00:00",{"type":6,"value":15,"context":16,"article":17},"CVE-2026-4782","Arbitrary file read via custom_svg parameter in Avada Builder shortcode rendering (requires subscriber-level access)",{"id":10,"title":11,"url":12,"published_at":13},{"type":19,"value":20,"context":21,"article":22},"malware","Veeva Vault compromise","Cloud document management system targeted for pharmaceutical data exfiltration",{"id":23,"title":24,"url":25,"published_at":26},"89549a1e-2e91-43d2-b57f-141dda2754dc","‼️🇺🇸 Eli Lilly allegedly breached: 1.2K internal repositories and 40GB of Veeva Vault documents...","https:\u002F\u002Fx.com\u002FDarkWebInformer\u002Fstatus\u002F2055301601019969821","2026-05-15T14:57:41+00:00",{"type":6,"value":28,"context":29,"article":30},"CVE-2026-42897","Microsoft Exchange Server spoofing and XSS vulnerability actively exploited in the wild",{"id":31,"title":32,"url":33,"published_at":34},"c9fc924c-2d60-4142-b750-3b96533b9ea6","Microsoft Warns of Exchange Server Zero-Day Exploited in the Wild","https:\u002F\u002Fwww.securityweek.com\u002Fmicrosoft-warns-of-exchange-server-zero-day-exploited-in-the-wild\u002F","2026-05-15T12:06:53+00:00",{"type":19,"value":36,"context":37,"article":38},"Shai-Hulud","Worm made freely available by TeamPCP for supply chain attack contest",{"id":39,"title":40,"url":41,"published_at":42},"d3fe269f-d683-4dc9-99ce-b0b3a34697a9","TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates","https:\u002F\u002Fthehackernews.com\u002F2026\u002F05\u002Ftanstack-supply-chain-attack-hits-two.html","2026-05-15T10:54:44+00:00",{"type":19,"value":44,"context":45,"article":46},"Mini Shai-Hulud","Supply chain attack worm targeting TanStack and downstream developers",{"id":39,"title":40,"url":41,"published_at":42},{"type":6,"value":48,"context":49,"article":50},"CVE-2026-20127","Earlier SD-WAN vulnerability exploited by UAT-8616 before CVE-2026-20182",{"id":51,"title":52,"url":53,"published_at":54},"dfb85755-1a5d-445b-85b4-c9422c38d564","Cisco Patches Another SD-WAN Zero-Day, the Sixth Exploited in 2026","https:\u002F\u002Fwww.securityweek.com\u002Fcisco-patches-another-sd-wan-zero-day-the-sixth-exploited-in-2026\u002F","2026-05-15T06:28:46+00:00",{"type":6,"value":56,"context":57,"article":58},"CVE-2026-20182","Authentication bypass in Cisco Catalyst SD-WAN Controller\u002FManager, actively exploited by UAT-8616",{"id":51,"title":52,"url":53,"published_at":54},{"type":6,"value":60,"context":61,"article":62},"CVE-2026-20122","Cisco SD-WAN vulnerability in KEV catalog",{"id":51,"title":52,"url":53,"published_at":54},{"type":6,"value":64,"context":61,"article":65},"CVE-2026-20133",{"id":51,"title":52,"url":53,"published_at":54},{"type":6,"value":67,"context":68,"article":69},"CVE-2022-20775","Older Cisco SD-WAN vulnerability exploited in the wild in 2026",{"id":51,"title":52,"url":53,"published_at":54},{"type":6,"value":71,"context":61,"article":72},"CVE-2026-20128",{"id":51,"title":52,"url":53,"published_at":54},{"type":19,"value":74,"context":75,"article":76},"WhatsApp zero-day exploit","Unverified malware delivery mechanism claimed to work via private messages",{"id":77,"title":78,"url":79,"published_at":80},"fc2aa533-2f4a-4943-a4ef-a78265a5f8a9","🚨WhatsApp zero-day exploit allegedly advertised for sale\n\nA threat actor on an underground forum...","https:\u002F\u002Fx.com\u002FDarkWebInformer\u002Fstatus\u002F2058257939362627626","2026-05-23T18:45:07+00:00",{"type":19,"value":82,"context":83,"article":84},"HYFLOCK RaaS","Ransomware-as-a-Service panel active on Russian cybercrime forum",{"id":85,"title":86,"url":87,"published_at":88},"547d19ff-f74f-4405-a919-31f2bf4a86c0","Daily Dose of Dark Web Informer - April 13th, 2026","https:\u002F\u002Fdarkwebinformer.com\u002Fdaily-dose-of-dark-web-informer-april-13th-2026\u002F","2026-04-13T22:42:31+00:00",{"type":19,"value":90,"context":91,"article":92},"EMPIRE GPT","Unreleased AI tool advertised by threat actor JINKUSU as unconstrained exploitation tool",{"id":85,"title":86,"url":87,"published_at":88},{"type":19,"value":94,"context":95,"article":96},"ShadowByt3$ RaaS","Ransomware-as-a-Service with active partnership program",{"id":85,"title":86,"url":87,"published_at":88},{"type":6,"value":98,"context":99,"article":100},"CVE-2026-34621","Adobe Acrobat Reader prototype pollution zero-day enabling code execution via malicious PDFs",{"id":85,"title":86,"url":87,"published_at":88},{"type":19,"value":102,"context":103,"article":104},"LAMASHTU","Newly identified ransomware group",{"id":85,"title":86,"url":87,"published_at":88},{"type":19,"value":106,"context":107,"article":108},"WisERP breach","1.5M customer records allegedly breached and auctioned on dark web",{"id":109,"title":110,"url":111,"published_at":112},"b8cc999d-a068-43c6-8b3c-2691560886cb","🚨🇺🇸 WisERP Allegedly Targeted: 1.5M U.S. ERP Customer Records Advertised in Auction\n\nhttps:\u002F\u002Ft...","https:\u002F\u002Fx.com\u002FDarkWebInformer\u002Fstatus\u002F2058212320468193384","2026-05-23T15:43:51+00:00",{"type":6,"value":28,"context":114,"article":115},"High-severity spoofing vulnerability in Microsoft Exchange Server allowing XSS-based arbitrary code execution",{"id":116,"title":117,"url":118,"published_at":119},"fb0e4e90-3b21-47e6-a6df-92a94bdb6898","Microsoft warns of Exchange zero-day flaw exploited in attacks","https:\u002F\u002Fwww.bleepingcomputer.com\u002Fnews\u002Fmicrosoft\u002Fmicrosoft-warns-of-exchange-zero-day-flaw-exploited-in-attacks\u002F","2026-05-15T09:40:42+00:00",{"type":6,"value":28,"context":121,"article":122},"Cross-site scripting vulnerability in Microsoft Exchange Server allowing spoofing via crafted email, CVSS 8.1, actively exploited",{"id":123,"title":124,"url":125,"published_at":126},"f875f3c5-af20-4d63-a74f-2cb621294b65","On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email","https:\u002F\u002Fthehackernews.com\u002F2026\u002F05\u002Fon-prem-microsoft-exchange-server-cve.html","2026-05-15T06:19:04+00:00",{"type":19,"value":128,"context":129,"article":130},"node-ipc","npm package with stealer\u002Fbackdoor behavior in versions 9.1.6, 9.2.3, 12.0.1",{"id":131,"title":132,"url":133,"published_at":134},"aa9b6454-e13d-4366-9eb6-907d5da71be6","node-ipc npm Package Compromised in Supply Chain Attack","https:\u002F\u002Fsocket.dev\u002Fblog\u002Fnode-ipc-package-compromised?utm_medium=feed","2026-05-14T15:48:51.85+00:00",{"type":19,"value":136,"context":137,"article":138},"peacenotwar","dependency included in node-ipc versions 11.0.0 and 11.1.0 with unauthorized file-writing behavior",{"id":131,"title":132,"url":133,"published_at":134},{"type":6,"value":140,"context":141,"article":142},"CVE-2025-55182","React2Shell Next.js vulnerability exploited by RondoDox in parallel campaign against smart cameras",{"id":143,"title":144,"url":145,"published_at":146},"76343cc5-0302-48ea-8ee1-aec0f1f9a5fc","RondoDox Botnet Exploits Critical 2018 Vulnerability to Hijack ASUS Routers","https:\u002F\u002Fhackread.com\u002Frondodox-botnet-2018-vulnerability-hijack-asus-routers\u002F","2026-05-23T11:16:40+00:00",{"type":6,"value":148,"context":149,"article":150},"CVE-2018-5999","Critical unauthenticated ASUS router configuration update vulnerability exploited by RondoDox botnet",{"id":143,"title":144,"url":145,"published_at":146},{"type":19,"value":152,"context":153,"article":154},"RondoDox","Botnet actively exploiting ASUS router and Next.js vulnerabilities for DDoS attacks since mid-2025",{"id":143,"title":144,"url":145,"published_at":146},{"type":156,"value":157,"context":158,"article":159},"url","https:\u002F\u002Ft.co\u002F8cIHncqWVH","Alleged link to leaked data shared by threat actor (shortened URL)",{"id":160,"title":161,"url":162,"published_at":163},"bc8702b7-4f5c-421a-9fe6-ebf124d4e82d","‼️🇺🇸⚡ Lightning AI allegedly breached: internal codebase and project files exposed from the cre...","https:\u002F\u002Fx.com\u002FDarkWebInformer\u002Fstatus\u002F2055045072610013445","2026-05-14T21:58:20+00:00",{"type":6,"value":48,"context":165,"article":166},"Related SD-WAN Controller vulnerability fixed in February, also exploited by UAT-8616 since 2023",{"id":167,"title":168,"url":169,"published_at":170},"44b2ee87-d276-4d77-b9d7-ec541dcff4f9","Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks","https:\u002F\u002Fwww.bleepingcomputer.com\u002Fnews\u002Fsecurity\u002Fcisco-warns-of-new-critical-sd-wan-flaw-exploited-in-zero-day-attacks\u002F","2026-05-14T20:09:56+00:00",{"type":172,"value":173,"context":174,"article":175},"mitre_attack","T1556 (Modify Authentication Process)","Authentication bypass via peering mechanism manipulation",{"id":167,"title":168,"url":169,"published_at":170},{"type":6,"value":56,"context":177,"article":178},"Critical authentication bypass in Cisco Catalyst SD-WAN Controller, actively exploited in zero-day attacks",{"id":167,"title":168,"url":169,"published_at":170},{"type":172,"value":180,"context":181,"article":182},"T1078 (Valid Accounts)","Attacker logs in as high-privileged vmanage-admin account",{"id":167,"title":168,"url":169,"published_at":170},{"type":172,"value":184,"context":185,"article":186},"T1190","Exploit Public-Facing Application - vdaemon DTLS peering authentication bypass",{"id":187,"title":188,"url":189,"published_at":190},"8d0e4671-1c5a-4ed6-b505-1679ba909603","CVE-2026-20182: Critical Cisco SD-WAN Auth Bypass Under Active Exploitation","https:\u002F\u002Fdarkwebinformer.com\u002Fcve-2026-20182-critical-cisco-sd-wan-auth-bypass-under-active-exploitation\u002F","2026-05-14T20:24:47+00:00",{"type":6,"value":56,"context":192,"article":193},"Critical authentication bypass in Cisco SD-WAN control plane, actively exploited",{"id":187,"title":188,"url":189,"published_at":190},{"type":172,"value":195,"context":196,"article":197},"T1556","Modify Authentication Process - bypass of peering authentication mechanism",{"id":187,"title":188,"url":189,"published_at":190},{"type":6,"value":56,"context":199,"article":200},"Critical authentication bypass in Cisco SD-WAN under active exploitation",{"id":201,"title":202,"url":203,"published_at":190},"cec6ac92-1767-432c-ab18-c4e8b3f27178","‼️CVE-2026-20182: Critical Cisco SD-WAN Auth Bypass Under Active Exploitation\n\nhttps:\u002F\u002Ft.co\u002Fmm9rX...","https:\u002F\u002Fx.com\u002FDarkWebInformer\u002Fstatus\u002F2055021527158919470",{"type":6,"value":205,"context":206,"article":207},"CVE-2020-17103","High-severity elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver",{"id":208,"title":209,"url":210,"published_at":211},"373cfaca-6979-4a09-9120-a5aaa5e97384","🚨 Nightmare Eclipse just released another vulnerability called MiniPlasma\n\nGitHub: https:\u002F\u002Ft.co\u002F...","https:\u002F\u002Fx.com\u002FDarkWebInformer\u002Fstatus\u002F2055024386705358967","2026-05-14T20:36:08+00:00",{"type":156,"value":213,"context":214,"article":215},"https:\u002F\u002Fgithub.com\u002F[nightmareeclipse]\u002FMiniPlasma","GitHub repository containing MiniPlasma vulnerability disclosure and PoC code",{"id":208,"title":209,"url":210,"published_at":211},{"type":19,"value":44,"context":217,"article":218},"Supply chain malware campaign targeting npm and PyPI packages, steals developer credentials and establishes persistence via VS Code hooks",{"id":219,"title":220,"url":221,"published_at":222},"f94e7fe8-0d87-48ba-ab80-37da53d43de5","OpenAI confirms security breach in TanStack supply chain attack","https:\u002F\u002Fwww.bleepingcomputer.com\u002Fnews\u002Fsecurity\u002Fopenai-confirms-security-breach-in-tanstack-supply-chain-attack\u002F","2026-05-14T19:07:24+00:00",{"type":6,"value":56,"context":224,"article":225},"Cisco Catalyst SD-WAN Controller authentication bypass vulnerability actively exploited in the wild",{"id":226,"title":227,"url":228,"published_at":229},"ee5d881f-d39a-48f0-8912-e4b500160d50","CISA Adds One Known Exploited Vulnerability to Catalog","https:\u002F\u002Fwww.cisa.gov\u002Fnews-events\u002Falerts\u002F2026\u002F05\u002F14\u002Fcisa-adds-one-known-exploited-vulnerability-catalog","2026-05-14T12:00:00+00:00",{"type":19,"value":231,"context":232,"article":233},"node-ipc stealer\u002Fbackdoor","Obfuscated stealer and backdoor embedded in compromised npm package versions",{"id":234,"title":235,"url":236,"published_at":237},"9118dacb-dc4e-4d55-8fe1-08774d67f4da","Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets","https:\u002F\u002Fthehackernews.com\u002F2026\u002F05\u002Fstealer-backdoor-found-in-3-node-ipc.html","2026-05-14T17:22:43+00:00",{"type":239,"value":240,"context":241,"article":242},"domain","sh.azurestaticprovider.net","C2 command-and-control domain used for stolen credential exfiltration",{"id":234,"title":235,"url":236,"published_at":237},{"type":6,"value":56,"context":244,"article":245},"Critical authentication bypass in Cisco Catalyst SD-WAN Controller, CVSS 10.0, actively exploited",{"id":246,"title":247,"url":248,"published_at":249},"054756ad-ab67-40ea-b43a-b0e51f79f2c0","Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access","https:\u002F\u002Fthehackernews.com\u002F2026\u002F05\u002Fcisco-catalyst-sd-wan-controller-auth.html","2026-05-14T17:45:20+00:00",{"type":6,"value":48,"context":251,"article":252},"Prior critical auth bypass in same vdaemon service, exploited by UAT-8616 since 2023",{"id":246,"title":247,"url":248,"published_at":249},{"type":19,"value":254,"context":255,"article":256},"Mac.PWS.JobStealer.1","macOS variant of JobStealer malware detected by Dr.Web",{"id":257,"title":258,"url":259,"published_at":260},"3664679b-3384-4934-af30-3cd1d468edc9","Fake Job Interview Apps Drop JobStealer Malware on Windows and macOS","https:\u002F\u002Fhackread.com\u002Ffake-job-interview-jobstealer-malware-windows-macos\u002F","2026-05-14T17:25:10+00:00",{"type":19,"value":262,"context":263,"article":264},"JobStealer","Trojan malware targeting crypto wallets and browser credentials on Windows and macOS",{"id":257,"title":258,"url":259,"published_at":260},{"type":239,"value":266,"context":267,"article":268},"meetlab.io","Fake job interview platform hosting JobStealer malware",{"id":257,"title":258,"url":259,"published_at":260},{"type":239,"value":270,"context":271,"article":272},"cloudproxy.link","Malicious domain associated with JobStealer campaign",{"id":257,"title":258,"url":259,"published_at":260},{"type":239,"value":274,"context":267,"article":275},"carolla.app",{"id":257,"title":258,"url":259,"published_at":260},{"type":239,"value":277,"context":267,"article":278},"meetix.app",{"id":257,"title":258,"url":259,"published_at":260},{"type":19,"value":280,"context":281,"article":282},"PicassoLoader","Downloader malware family used by Ghostwriter as conduit for Cobalt Strike Beacon",{"id":283,"title":284,"url":285,"published_at":286},"3434193e-be2e-4d87-ac38-10ec47e6508d","Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike","https:\u002F\u002Fthehackernews.com\u002F2026\u002F05\u002Fghostwriter-targets-ukrainian.html","2026-05-14T14:00:37+00:00",true,50]