Breaking News – Cyber Threats (last 6h)
Generated: 2026-05-06 17:00 PDT
- Smashing Security podcast #466: Meta sees everything, Copy Fail, and a deepfake gets hired
Graham Cluley • 2026-05-06 16:30 • grahamcluley.com
Meta’s smart glasses promise privacy “designed for you” – but everything they record was being beamed off to workers in Nairobi to label by hand. When those workers blew the whistle, Meta sacked all 1,108 of them.Meanwhile, the IT press is in a frenzy over a new Linux bug called “Copy Fail” – complete with logo, dedicated website, and a marketing-friendly name. But is it really the disaster everyone’s making it out to be?
And in our featured interview, Jake Moore of ESET explains how he tricked a company into offering his deepfake clone a job – after a perfectly normal-looking video inte…
https://grahamcluley.com/smashing-security-podcast-466/ - Hackers abuse Google ads for GoDaddy ManageWP login phishing
BleepingComputer • 2026-05-06 14:36 • www.bleepingcomputer.com
A phishing campaign delivered through Google sponsored search results is targeting credentials for ManageWP, GoDaddy’s platform for managing fleets of WordPress websites. […]
https://www.bleepingcomputer.com/news/security/hackers-abuse-google-ads-for-godaddy-managewp-login-phishing/ - Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks
The Hacker News • 2026-05-06 13:21 • thehackernews.com
Cybersecurity researchers have exposed a new Mirai-derived botnet that self-identifies as xlabs_v1 and targets internet-exposed devices running Android Debug Bridge (ADB) to enlist them in a network capable of carrying out distributed denial-of-service (DDoS) attacks.
Hunt.io, which detailed the malware, said it made the discovery after identifying an exposed directory on a Netherlands-hosted
https://thehackernews.com/2026/05/mirai-based-xlabsv1-botnet-exploits-adb.html - Critical vm2 sandbox bug lets attackers execute code on hosts
BleepingComputer • 2026-05-06 11:38 • www.bleepingcomputer.com
A critical vulnerability in the popular Node.js sandboxing library vm2 allows escaping the sandbox and executing arbitrary code on the host system. […]
https://www.bleepingcomputer.com/news/security/critical-vm2-sandbox-bug-lets-attackers-execute-code-on-hosts/ - New Cisco DoS flaw requires manual reboot to revive devices
BleepingComputer • 2026-05-06 11:06 • www.bleepingcomputer.com
Cisco patched a Crosswork Network Controller and Network Services Orchestrator denial-of-service vulnerability that requires manually rebooting targeted systems for recovery. […]
https://www.bleepingcomputer.com/news/security/new-cisco-dos-flaw-requires-manual-reboot-to-revive-devices/
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
