HomeCybersecurity NewsCybersecurity news weekly roundup May 18, 2026
May 18, 2026

Cybersecurity news weekly roundup May 18, 2026

San Mateo, CA, May 18, 2026 — Developments, threats, and responses in the news last week.

STORIES LAST WEEK

Google says criminals used AI to build a working zero-day exploit

GTIG said criminals built a zero-day exploit with AI to bypass 2FA in a web administration tool and planned mass exploitation. The case moves AI from assistance to working exploit generation. Google Cloud Blog, May 11, 2026

Palo Alto firewall zero-day leads to root-level code execution

Attackers exploited CVE-2026-0300 for unauthenticated root-level code execution on PAN-OS firewalls, then used tunneling tools and Active Directory enumeration. Internet-exposed authentication portals need immediate review. SecurityWeek, May 7, 2026

CISA sets rapid deadline for exploited Ivanti EPMM flaw

CISA added Ivanti EPMM CVE-2026-6973 to KEV due to evidence of active exploitation. The flaw lets an authenticated administrator run code on vulnerable mobile-management appliances. CISA, May 7, 2026

Microsoft Patch Tuesday fixes critical identity, domain controller, cloud flaws

Microsoft fixed 118 CVEs, including critical issues in Entra ID, Netlogon, Word, Azure, and the SSO Plugin for Jira and Confluence. Tenable said no zero-days were exploited or publicly disclosed for the first time since 2024. Tenable, May 12, 2026

Mini Shai-Hulud reaches trusted publishing pipelines

Snyk said Mini Shai-Hulud compromised TanStack releases through GitHub Actions cache poisoning and trusted publishing. The campaign spread with valid provenance, raising risk for teams relying on CI/CD attestations. Snyk, May 11, 2026

Checkmarx warns rogue Jenkins AST plugin reached marketplace

Checkmarx warned that threat actors created a modified Jenkins AST plugin that reached the Jenkins Marketplace containing malicious artifacts. Users were told to avoid the May 9 build and verify installed scanner versions. Checkmarx, May 9, 2026

Critical Exim flaw exposes GnuTLS mail servers to remote code execution

CVE-2026-45185, AKA Dead.Letter, is a remotely reachable use-after-free vulnerability in Exim’s GnuTLS-backed TLS path. Affected mail servers need to be updated to version 4.99.3 because no configuration-based workaround exists. CyCognito, May 13, 2026

Dirty Frag raises Linux post-compromise risk across major distributions

Microsoft warned Dirty Frag can turn low-privilege Linux access into root by abusing kernel networking and memory-fragment handling. The technique raises post-compromise risk for SSH, web shell, container, and service-account footholds. Microsoft Security Blog, May 8, 2026

Ollama memory leak threatens prompts, API keys, and AI secrets

Qualys said CVE-2026-7482 lets unauthenticated attackers leak Ollama process memory through the GGUF model loader. Exposed AI servers may reveal prompts, API keys, credentials, and other runtime secrets. Qualys, May 11, 2026

Claude browser flaw shows AI-agent origin controls are still weak

A Claude Chrome extension flaw let another extension inject instructions and hijack agent actions, according to CyberScoop. The case shows browser AI agents need strict origin, permission, and trust boundaries. CyberScoop, May 8, 2026

Lawmakers seek answers from Instructure after Canvas attacks

House Homeland Security asked Instructure to brief lawmakers after Canvas attacks stole student data and disrupted schools during finals. The demand puts incident response and education-platform controls in the private sector under federal scrutiny. House Committee on Homeland Security, May 11, 2026

Foxconn confirms North American factory cyberattack

Foxconn confirmed some North American factories suffered a cyberattack and were resuming normal production. Threat group Nitrogen claimed 8 TB of stolen files, including customer-related designs, instructions, and project documents. BleepingComputer, May 13, 2026

West Pharmaceutical SEC filing says cyberattack disrupted global operations

West Pharmaceutical told regulators that attackers stole data, encrypted systems, and forced global containment procedures. Core enterprise systems were restored, but manufacturing, shipping, and receiving were only restarted at some sites with the timeline for complete restoration not yet given. SEC, May 11, 2026

More cybersecurity news

About NetworkTigers

NetworkTigers is the leader in the secondary market for Grade A, seller-refurbished networking equipment. Founded in January 1996 as Andover Consulting Group, which built and re-architected data centers for Fortune 500 firms, NetworkTigers provides consulting and network equipment to global governmental agencies, Fortune 2000, and healthcare companies. www.networktigers.com.

Ben Walker
Ben Walker
Ben Walker is a freelance research-based technical writer. He has worked as a content QA analyst for AT&T and Pernod Ricard.

Popular Articles