Breaking News – Cyber Threats (last 6h)
Generated: 2026-05-15 08:00 PDT
- Microsoft Edge to stop loading cleartext passwords in memory on startup
BleepingComputer • 2026-05-15 07:49 • www.bleepingcomputer.com
Microsoft is updating the Edge web browser to ensure it no longer loads saved passwords into process memory in clear text at startup. […]
https://www.bleepingcomputer.com/news/microsoft/microsoft-edge-to-stop-loading-cleartext-passwords-in-memory-on-startup/ - Inside the REMUS Infostealer: Session Theft, MaaS, and Rapid Evolution
BleepingComputer • 2026-05-15 07:02 • www.bleepingcomputer.com
Stolen browser sessions and authentication tokens are becoming more valuable than stolen passwords. Flare explains how the REMUS infostealer evolved around session theft and operational scalability. […]
https://www.bleepingcomputer.com/news/security/inside-the-remus-infostealer-session-theft-maas-and-rapid-evolution/ - Microsoft to automatically roll back faulty Windows drivers
BleepingComputer • 2026-05-15 05:29 • www.bleepingcomputer.com
Microsoft is introducing a new capability that will allow it to remotely roll back problematic Windows drivers delivered through Windows Update. […]
https://www.bleepingcomputer.com/news/microsoft/microsoft-to-automatically-roll-back-faulty-windows-drivers/ - Bypassing On-Camera Age-Verification Checks
Schneier on Security • 2026-05-15 04:06 • www.schneier.comSome AI-based video age-verification checks can be fooled with a fake mustache.
https://www.schneier.com/blog/archives/2026/05/bypassing-on-camera-age-verification-checks.html
- What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface
The Hacker News • 2026-05-15 04:00 • thehackernews.com
In Your Biggest Security Risk Isn’t Malware — It’s What You Already Trust, we made a simple argument: the most dangerous activity inside most organizations no longer looks like an attack. It looks like administration. PowerShell, WMIC, netsh, Certutil, MSBuild — the same trusted utilities your IT team uses every day are also the preferred toolkit of modern threat actors. Bitdefender’s analysis
https://thehackernews.com/2026/05/what-45-days-of-watching-your-own-tools.html - TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates
The Hacker News • 2026-05-15 03:54 • thehackernews.com
OpenAI has disclosed that two of its employee devices in its corporate environment were impacted via the Mini Shai-Hulud supply chain attack on TanStack, but noted that no user data, production systems, or intellectual property were compromised or modified in an unauthorized manner.
“Upon identification of the malicious activity, we worked quickly to investigate, contain, and take steps to
https://thehackernews.com/2026/05/tanstack-supply-chain-attack-hits-two.html - Microsoft warns of Exchange zero-day flaw exploited in attacks
BleepingComputer • 2026-05-15 02:40 • www.bleepingcomputer.com
On Thursday, Microsoft shared mitigations for a high-severity Exchange Server vulnerability exploited in attacks that allow threat actors to execute arbitrary code via cross-site scripting (XSS) while targeting Outlook on the web users. […]
https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-exchange-zero-day-flaw-exploited-in-attacks/
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
