12 News Items
THN · BleepingComputer · Krebs · Dark Reading · SANS
THN · BleepingComputer · Krebs · Dark Reading · SANS
📰 Cybersecurity News Headlines
Top stories from leading cybersecurity publications as of May 12, 2026.
-
GM agrees to $12.75M California settlement over sale of drivers’ data
— Bleeping Computer
California Attorney General Rob Bonta announced a proposed $12.75 million settlement agreement with General Motors (GM) over allegations tha… -
Apple Patches Everything, (Mon, May 11th)
— SANS ISC
Apple today released its typical feature update across it's operating systems (iOS, iPadOS, macOS, tvOS, watchOS, vision … -
Official CheckMarx Jenkins package compromised with infostealer
— Bleeping Computer
Checkmarx warned over the weekend that a rogue version of its Jenkins Application Security Testing (AST) plugin had been published on the Je… -
New GhostLock tool abuses Windows API to block file access
— Bleeping Computer
A security researcher has released a proof-of-concept tool named GhostLock that demonstrates how a legitimate Windows file API can be abus… -
FCC Softens Ban on Foreign-Made Routers
— Dark Reading
The Federal Communications Commission eased some restrictions and pushed back deadlines for foreign router manufacturers, but the ban is sti… -
Tech Can't Stop These Threats — Your People Can
— Dark Reading
Security controls can do only so much. Here are four attacks where your employees are usually your first, and only, line of cyber defense. -
TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack
— The Hacker News
Checkmarx has confirmed that a modified version of the Jenkins AST plugin was published to the Jenkins Marketplace. "If you are using Checkm… -
cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor
— The Hacker News
A threat actor named Mr_Rot13 has been attributed to the exploitation of a recently disclosed critical cPanel flaw to deploy a backdoor code… -
Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation
— The Hacker News
Google on Monday disclosed that it identified an unknown threat actor using a zero-day exploit that it said was likely developed with an art… -
Instructure confirms hackers used Canvas flaw to deface portals
— Bleeping Computer
Education technology giant Instructure has confirmed that a security vulnerability allowed hackers to modify Canvas login portals and leave … -
'Dirty Frag' Exploit Poised to Blow Up on Enterprise Linux Distros
— Dark Reading
The privilege escalation vulnerability, which is similar to other Linux flaws like Copy Fail and Dirty Pipe, may already be under limited ex… -
Why we use CAPTCHAs, (Mon, May 11th)
— SANS ISC
A few months ago, I implemented Cloudflare's Turnstile CAPTCHA on some pages. The reason for implementing these CAPTCHAs …
Generated by HiveNet.ai Threat Intelligence Platform · May 12, 2026 · Sources: The Hacker News, Bleeping Computer, Krebs on Security, Dark Reading, SANS ISC