Today’s Brief
A short daily summary of emerging and accelerating Signals.
No investment advice. Research signals and sources only. EarlyNarratives provides informational signals derived from public sources. It does not provide financial, legal, or tax advice.
Read today's brief below. Want the next edition in your inbox? Subscribe free just below.
- The Hacker News - cPanel CVE-2026-41940 under active exploitationthehackernews.com
- CSO Online - cPanel flaw exposes enterprises to hosting supply-chain riskscsoonline.com
- Multiple vulnerabilities in cPanel and WHMCERT.BE - Warning
Critical security patches released for Linux kernel and Apple operating systems
Between May 11 and 12, 2026, coordinated security updates were issued addressing multiple critical vulnerabilities in the Linux kernel across SUSE, Ubuntu, and Apple operating systems.
Details
- Patches released May 11-12, 2026, responding to known exploited vulnerabilities.
- Coordinated updates across major OS vendors highlight urgency in addressing security risks.
- Timely patching essential to protect systems from exploitation of disclosed vulnerabilities.
Microsoft patches 137 vulnerabilities in May 2026 Patch Tuesday with no zero-days
Microsoft released its May 2026 Patch Tuesday updates addressing 137 security vulnerabilities across a wide range of products, including Windows, Azure, Dynamics 365, and Microsoft 365. Among these, 13 to 31 were rated critical, with several allowing remote code execution.
Details
- Microsoft's new AI system MDASH is entering private preview, signaling a shift in vulnerability research.
- The volume of patched vulnerabilities reflects increased AI-assisted detection efforts in 2026.
- Organizations must act promptly to mitigate risks from critical flaws in widely used Microsoft products.
Fortinet patches multiple critical vulnerabilities including remote code execution flaws
Fortinet has released security advisories addressing several vulnerabilities across its product portfolio, including critical remote code execution (RCE) flaws in FortiSandbox and FortiAuthenticator.
Details
- Fortinet published multiple security advisories on May 12-13, 2026, with patches now available.
- Several vulnerabilities have high CVSS scores indicating severe risk if exploited.
- Security centers and advisories are actively urging users to update affected products immediately.
New 'Dirty Frag' Linux kernel vulnerabilities spur urgent patches across distributions
Two critical Linux kernel vulnerabilities collectively known as 'Dirty Frag' have been disclosed, affecting multiple Linux distributions including Ubuntu, RHEL, and Fedora.
Details
- Vulnerabilities were disclosed before patches were available, leading to active exploitation.
- Multiple Linux distributions have released urgent security updates to mitigate risks.
- The flaws affect critical kernel components, requiring immediate attention from system administrators.
Google detects first AI-developed zero-day exploit targeting 2FA bypass
Google's Threat Intelligence Group (GTIG) identified a zero-day exploit created with AI by a cybercrime group, targeting a popular open-source web administration tool to bypass two-factor authentication.
Details
- This is the first confirmed case of AI-developed zero-day exploits in the wild, signaling a shift in attacker capabilities.
- Advances in AI are accelerating vulnerability discovery and exploit generation by threat actors.
- Organizations face increasing urgency to adopt proactive detection and response tools amid evolving AI-driven threats.
Checkmarx Jenkins AST plugin compromised in supply chain attack by TeamPCP
Coverage discusses speculative scenarios for 2025; treat as market chatter and see linked sources.
Details
- The compromised plugin was published recently and remains available, increasing exposure risk.
- Checkmarx is actively working to remove the malicious version and release a clean update.
- This incident follows a recent supply chain attack on another Checkmarx product, indicating persistent targeting.
Mini Shai-Hulud malware campaign compromises hundreds of npm and PyPI packages
A widespread supply chain attack known as 'Mini Shai-Hulud' has infected over 400 malicious versions across approximately 170 npm and PyPI packages, including major libraries from TanStack, Mistral AI, and UiPath.
Details
- The attack was discovered recently in May 2026, affecting hundreds of packages across major registries.
- Malicious packages were signed with valid credentials, indicating sophisticated bypass of security controls.
- Immediate credential changes are urged to prevent further compromise following the attack.
Multiple critical security updates issued for Red Hat, Adobe, and Google Chrome products
On May 12-13, 2026, Red Hat, Adobe, and Google released important security advisories addressing multiple critical vulnerabilities across their products.
Details
- Security advisories were published within the last 24 hours, indicating newly disclosed vulnerabilities.
- Some vulnerabilities have high CVSS scores up to 9.6, demanding immediate attention.
- Coordinated updates from multiple vendors highlight a surge in critical security fixes requiring prompt action.
Attackers exploit microsoft teams and appsec tool gaps to build lethal intrusion chains
Recent investigations reveal attackers leveraging trusted collaboration platforms like Microsoft Teams to initiate complex intrusions involving malware, credential theft, and lateral movement.
Details
- Recent Rapid7 analysis exposes a fast-moving intrusion leveraging Teams and identity abuse in April 2026.
- A current webinar highlights the urgent need to improve AppSec detection strategies to prevent lethal attack chains.
- The convergence of collaboration platform risks and AppSec tool challenges demands immediate attention from security teams.
Microsoft issues security updates for multiple critical vulnerabilities in Office and Windows
Microsoft has released security patches addressing numerous critical vulnerabilities across Microsoft Office, Windows kernel-mode drivers, and related components.
Details
- Microsoft has just released security updates addressing these critical flaws.
- Attackers often exploit such vulnerabilities soon after disclosure.
- Organizations need to act quickly to mitigate potential attacks exploiting these issues.
More chatter
Lower-signal community items and early chatter, separated from the main brief.
Multiple critical vulnerabilities found in Dalfox server mode
Dalfox server mode is affected by several high-severity vulnerabilities including unauthenticated remote code execution, arbitrary file read, file creation/append, and remote denial of service.
Details
- The vulnerabilities were disclosed recently with assigned CVEs and GitHub advisories.
- Dalfox is a widely used security tool, increasing the risk of exploitation.
- Prompt awareness and mitigation reduce potential damage from active exploits.
Multiple medium-severity vulnerabilities disclosed in Mermaid diagramming tool
Four medium-severity security advisories have been published for the Mermaid diagramming tool, detailing improper sanitization issues leading to CSS and HTML injection, as well as an infinite loop denial-of-service vulnerability affecting Gantt charts.
Details
- The advisories were published recently, indicating fresh risks to Mermaid users.
- Mermaid is widely used in documentation and development workflows, increasing potential impact.
- Early awareness helps organizations prioritize updates and mitigate threats promptly.
Critical vulnerabilities and malware found in GuardDog and @tanstack/* packages
Recent GitHub advisories reveal multiple security issues affecting GuardDog and @tanstack/* packages.
Details
- The advisories were published recently in May 2026, indicating active threats.
- Developers and organizations relying on these tools must urgently assess and remediate.
- The critical severity of some issues demands immediate attention to prevent exploitation.
IOCX v0.7.3 introduces deterministic PE structural validation to improve malware analysis and blue team automation
IOCX version 0.7.3 delivers a fully deterministic structural validation framework for Portable Executable (PE) files, addressing persistent issues of non-determinism in PE parsing caused by malformed headers, inconsistent RVA resolutions, and ambiguous directory boundaries....
Details
- IOCX v0.7.3 release addresses persistent non-determinism issues in PE parsing.
- Automation and enrichment tooling increasingly demand stable and reproducible PE analysis.
- Malware researchers and blue teams benefit immediately from hardened validation rules in this update.
You've seen today's brief and the current signals. Get the next edition in your inbox with one field and a quick consent check. No card needed.
Free gives current signals and storylines with source links. Upgrade for archive, alerts, watchlists, exports, API, and workflow tools.