Risk and Resilience Podcast: This weeks new episode is out and go and watch and like and subscribe.
AI-Powered Vulnerability Exploitation & Initial Access
Adversaries have moved from experimental AI use to industrial-scale integration of generative models across the cyber attack lifecycle. Google's Threat Intelligence Group confirmed the first AI-generated zero-day exploit—a Python script bypassing two-factor authentication on an open-source admin tool—as well as AI-augmented malware that generates polymorphic code, autonomous agents that execute commands without human input, and supply chain attacks targeting AI dependencies like LiteLLM and OpenClaw skills. Threat actors are also bypassing LLM usage limits via proxy middleware and account-pooling tooling to scale abuse anonymously.
This shift compresses exploit development from weeks to hours, outpacing traditional patch cycles and signature-based detection. AI excels at finding high-level logic flaws that evade scanners, neutralizing MFA without credential theft, while introducing new attack surfaces via AI orchestration layers and third-party skills. Defenders must assume AI-optimized adversaries can iterate faster than manual validation pipelines allow.
Key Takeaways
AI-generated zero-days are operational: First confirmed case shows generative AI can discover, code, and refine exploits for mass deployment—disrupted pre-deployment but code may circulate
Autonomous malware is emerging: Embedded AI agents interpret device state and execute adaptive commands, reducing reliance on human operators
AI supply chains are new attack vectors: Compromised AI dependencies, skills, or API connectors enable credential theft and lateral movement into enterprise environments
Authentication bypass > credential theft: AI finds logic flaws that neutralize MFA at the application layer, demanding server-side validation testing
Defense must accelerate and automate: Patch pipelines, behavioral analytics, and AI-assisted red teaming are essential to close the speed gap
💻 Malware and Vulnerabilities
PraisonAI Authentication Bypass (CVE-2026-44338) Exploited Within Hours of Public Disclosure: Researchers demonstrated end-to-end compromise of AI agent deployments using a trivial header manipulation technique, underscoring the accelerating "disclosure-to-exploitation" timeline for open-source AI tooling and the need for automated patch validation in MLOps pipelines. Link: https://www.sysdig.com/blog/cve-2026-44338-praisonai-authentication-bypass-in-under-4-hours-and-the-growing-trend-of-rapid-exploitation
Critical Cisco Catalyst SD-WAN Controller Flaw (CVE-2026-20182) Allows Unauthenticated Administrative Access: Rapid7 confirmed active exploitation of an authentication bypass vulnerability enabling full controller compromise, urging immediate patching or network isolation for affected deployments managing enterprise branch connectivity and policy enforcement. Link: https://www.rapid7.com/blog/post/ve-cve-2026-20182-critical-authentication-bypass-cisco-catalyst-sd-wan-controller-fixed/
FunnelKit WooCommerce Plugin Vulnerability Actively Exploited for Payment Data Skimming: SanSec researchers identified malicious JavaScript injection via a stored XSS flaw in versions prior to 3.8.2, enabling attackers to harvest checkout form inputs; merchants should update immediately and audit server logs for suspicious script modifications. Link: https://sansec.io/research/funnelkit-woocommerce-vulnerability-exploited
Packagist Urges Immediate Composer Update to Mitigate Dependency Confusion Risks: The PHP package repository warned of a supply chain attack vector allowing malicious package substitution via namespace collision, recommending users upgrade to Composer 2.8.7+ and enable signature verification for all dependency installations. Link: https://socket.dev/blog/packagist-urges-immediate-composer-update
📈 Breaches and Incidents
OpenLoop Health Data Breach Impacts 716,000 Individuals via Third-Party Vendor Compromise: The telehealth provider disclosed unauthorized access to patient names, contact information, and limited clinical notes through a subcontractor's misconfigured database, triggering state breach notifications and offering two years of credit monitoring to affected individuals. Link: https://www.securityweek.com/716000-impacted-by-openloop-health-data-breach/
ICO Fines South Staffs Water £450,000 for Cl0p Ransomware Breach Failures: The UK regulator found the utility failed to implement basic network segmentation and multi-factor authentication prior to the 2023 MOVEit-related intrusion, resulting in prolonged exposure of customer billing and contact data despite known vendor risk indicators. Link: https://www.computerweekly.com/news/366642957/ICO-fines-Cl0p-victim-South-Staffs-Water-over-data-breach
Ransomware Payment Debate Intensifies as New Study Challenges "Never Pay" Doctrine: Analysis of 200+ incident response cases suggests context-dependent decision frameworks—considering data criticality, recovery timelines, and legal constraints—may yield better outcomes than absolute prohibitions, though experts caution against normalizing extortion economics. Link: https://databreaches.net/2026/05/08/one-size-does-not-fit-all-sometimes-victims-probably-should-pay-ransom/
Best Western Booking Portal Breach Exposes Guest Reservation Data: The hotel chain confirmed unauthorized access to its central reservation system affecting booking confirmations, contact details, and partial payment information, with no evidence of full credential or financial data compromise but urging guests to monitor for phishing attempts. Link: https://old.reddit.com/r/bestwestern/comments/1t7dg8d/security_breach_of_bwh_booking_portal/
West Pharmaceutical Services Pennsylvania Facility Disrupted by Cyber Incident: The global healthcare packaging manufacturer experienced operational delays at its Exton campus following detection of suspicious network activity, with production partially restored via manual workflows while forensic investigation continues into scope and attribution. Link: https://dysruptionhub.com/west-pharma-cyberattack-pennsylvania/
🚨 Threat Intel & Info Sharing
K-Pop Fan Communities Targeted by Credential-Stealing Campaigns via Fake Merchandise Sites: South Korean cybersecurity researchers identified phishing operations impersonating popular idol group fan clubs, using counterfeit ticket presale pages and exclusive content portals to harvest login credentials and payment data from thousands of fans across Asia and North America. Link: https://www.chosun.com/english/kpop-culture-en/2026/05/13/RVDMPUVDIFARJJE2W22LUHWTTI/
Cisco Announces 4,000 Job Cuts to Redirect Investment Toward AI-Driven Security and Networking: The networking giant reported record quarterly revenue while outlining a strategic pivot to integrate generative AI across its product portfolio, including autonomous network optimization and AI-assisted threat detection, amid broader industry consolidation around intelligent infrastructure. Link: https://techcrunch.com/2026/05/14/cisco-cuts-nearly-4000-jobs-to-spend-more-on-ai-reports-record-quarterly-revenue/
Foxconn Confirms Cyberattack Disrupted Operations at North American Manufacturing Facilities: The electronics manufacturing giant acknowledged unauthorized access to internal systems affecting production scheduling and logistics coordination at U.S. and Canadian plants, with no evidence of intellectual property exfiltration but ongoing forensic investigation into initial access vectors. Link: https://www.bleepingcomputer.com/news/security/electronics-giant-foxconn-confirms-cyberattack-on-north-american-factories/
Google Expands Android Intrusion Logging to Detect Amnesty International-Identified Spyware Signatures: A new OS-level telemetry feature enables real-time detection of behavioral patterns associated with commercial surveillance tools like Pegasus and Predator, providing users with actionable alerts and forensic export options while balancing privacy-preserving data collection constraints. Link: https://cyberscoop.com/google-android-intrusion-logging-amnesty-spyware-detection/
Foxconn Wisconsin Facility Experiences Extended Cyber-Induced Production Halt: Operational disruptions at the advanced manufacturing campus persisted for 72+ hours following a suspected ransomware-adjacent intrusion, highlighting supply chain fragility and the cascading impact of IT/OT convergence failures in just-in-time production environments. Link: https://dysruptionhub.com/foxconn-wisconsin-cyber-outage/
⚖️ Laws, Policies and Regulations
UK Proposes Safe Harbor Protections for Good-Faith Security Researchers Under Computer Misuse Act Reform: The Home Office unveiled draft legislation to clarify legal boundaries for vulnerability discovery and responsible disclosure, aiming to reduce chilling effects on defensive research while maintaining safeguards against malicious exploitation and unauthorized data access. Link: https://therecord.media/uk-moves-to-shield-security-researchers-cybercrime
German National Charged with Laundering $2.2M in Dream Market Darknet Proceeds via U.S. Financial Institutions: The Department of Justice unsealed an indictment alleging the defendant facilitated cryptocurrency-to-fiat conversions for vendors on the now-defunct Dream Market platform, using layered shell companies and privacy-enhancing technologies to obscure transaction trails across multiple jurisdictions. Link: https://www.justice.gov/usao-ndga/pr/german-citizen-charged-laundering-funds-linked-prominent-darknet-marketplace-dream
European Sovereign Cloud Initiatives Face Processor Dependency Reality Check: Despite policy commitments to reduce extra-European technology reliance, analysis reveals continued dependence on U.S.-designed CPUs and firmware in government cloud deployments, underscoring the gap between strategic autonomy goals and semiconductor supply chain realities. Link: https://www.theregister.com/systems/2026/05/16/europe-built-sovereign-clouds-to-escape-us-control-then-forgot-about-the-processors/5237735
Vietnam Accelerates Domestic Cloud Development to Reduce Government Workload Exposure to Foreign Operators: The Ministry of Information and Communications announced a $500M initiative to build sovereign infrastructure for public sector data, citing national security concerns and data localization mandates while acknowledging technical challenges in achieving parity with hyperscale global providers. Link: https://www.theregister.com/public-sector/2026/05/13/vietnam-to-develop-domestic-cloud-so-it-can-ditch-risky-overseas-operators-for-government-workloads/5239269
💾 The Privacy Posts
by Steven Switz
Maryland Puts Surveillance Pricing in the Privacy Hot Seat
Maryland’s HB 895 makes grocery-based surveillance pricing a privacy and consumer protection issue.
The law restricts covered food retailers and delivery platforms from using personal data to charge higher prices.
Open questions around loyalty programs, baseline prices, and enforcement may shape whether the law has real bite or mainly sends a policy signal.
Maryland’s new Protection From Predatory Pricing Act marks a notable shift in how lawmakers are thinking about algorithmic pricing. Rather than treating personalized pricing as only a competition, inflation, or consumer protection issue, HB 895 frames it as a data-governance problem: when personal data changes the price a shopper sees, privacy risk becomes financial risk. The law applies to covered food retailers and third-party delivery service providers, and it limits the use of personal data or dynamic pricing to set higher prices for certain food purchases. That matters because grocery pricing is not a luxury-market edge case, it affects everyday necessities.
The practical reach of the law may be more modest than the headline suggests. IAPP noted unresolved questions around what counts as a baseline price, how loyalty-program exemptions will work, and whether enforcement will be strong enough to deter creative workarounds. Still, the policy signal is important: personalization is no longer just a marketing feature when it can affect price, offer eligibility, or service terms. Retailers and platforms using loyalty data, behavioral profiles, location signals, app activity, or algorithmic pricing should map where personal data enters pricing decisions and whether the same consumer could receive materially different terms because of it. The broader takeaway is clear: privacy teams, legal teams, and pricing teams need to be in the same room before “personalized value” becomes “personalized disadvantage.”
🤖 AI
Meta Launches Incognito Chat for WhatsApp, Enabling Private Conversations with Meta AI Without Message Retention: The new mode processes prompts ephemeraly without storing inputs or outputs in user history or training datasets, addressing privacy concerns while maintaining access to AI assistance for sensitive queries like health, finance, or legal topics. Link: https://about.fb.com/news/2026/05/incognito-chat-whatsapp-meta-ai/
Pentagon Deploys Anthropic's Mythos to Patch Cyber Gaps While Planning Long-Term Vendor Diversification: U.S. Defense officials confirmed limited operational use of Claude Mythos Preview for vulnerability prioritization and code review in non-classified environments, while accelerating development of sovereign AI alternatives to mitigate supply chain and model dependency risks. Link: https://www.reuters.com/technology/pentagon-deploys-anthropics-mythos-patch-cyber-gaps-while-planning-ditch-firm-2026-05-12/
BiZone Researchers Document "Werewolf" AI Toolkit Enabling Automated Social Engineering at Scale: A newly observed framework combines LLM-driven persona generation, context-aware message crafting, and adaptive response handling to conduct high-volume, low-detection phishing campaigns, with early indicators of integration into Russian-speaking threat actor ecosystems. Link: https://bi-zone.medium.com/tinker-tailor-soldier-paper-werewolfs-latest-toolkit-3a4bb578880e
Microsoft Unveils Multi-Model Agentic Security System Surpassing Industry Benchmark for Autonomous Threat Response: The new architecture orchestrates specialized AI models for detection, investigation, and remediation tasks, achieving 94% accuracy on the MITRE Engenuity ATT&CK Evaluation while reducing mean time to containment by 63% in simulated enterprise environments. Link: https://www.microsoft.com/en-us/security/blog/2026/05/12/defense-at-ai-speed-microsofts-new-multi-model-agentic-security-system-tops-leading-industry-benchmark/
UK AISI Analysis Tracks Accelerating Pace of Autonomous AI Cyber Capability Development: Longitudinal testing shows frontier models now complete complex multi-step attack simulations 4.2x faster than 18 months ago, with diminishing returns from prompt-based guardrails alone and growing emphasis on architectural containment and human-in-the-loop verification. Link: https://www.aisi.gov.uk/blog/how-fast-is-autonomous-ai-cyber-capability-advancing
📊 Trends, Reports, Analysis
ESET Uncovers FrostyNeighbor Campaign Blending Digital Pranks with Espionage-Grade Infrastructure: Analysis of a multi-year operation revealed threat actors using humorous decoy payloads—fake game mods, meme generators—to deliver sophisticated backdoors capable of persistent access, credential harvesting, and lateral movement across Windows and Linux environments.

Link: https://www.welivesecurity.com/en/eset-research/frostyneighbor-fresh-mischief-digital-shenanigans/
📅 Upcoming Events
If you would like to sponsor any of our future in person or virtual events then please email us on [email protected]
We hope you enjoyed our email briefing! ☕🥮If you want to sponsor our next edition or advertise on our site, drop us an email [email protected].
Thank you for being a part of our newsletter community and you can be part of the community by joining our LinkedIn Group.



