❌

Normal view

Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE

5 May 2026 at 16:19
The Apache Software Foundation (ASF) has released security updates to address several security vulnerabilities in the HTTP Server, including a severe vulnerability that could potentially lead to remote code execution (RCE). The vulnerability, tracked as CVE-2026-23918 (CVSS score: 8.8), has been described as a case of "double free and possible RCE" in the HTTP/2 protocol handling. This issue

DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware

5 May 2026 at 16:07
A newly identified supply chain attack targeting DAEMON Tools software has compromised its installers to serve a malicious payload, according to findings from Kaspersky. "These installers are distributed from the legitimate website of DAEMON Tools and are signed with digital certificates belonging to DAEMON Tools developers," Kaspersky researchersΒ  Igor Kuznetsov, Georgy Kucherin, Leonid

Major AI Clients Shipping With Broken OAuth Implementations

The majority of widely used AI clients like:

  • Claude Code
  • Claude Desktop
  • Cursor
  • LibreChat
  • Amazon Q CLI

have not implemented the critical refresh-token flow of the OAuth standard.

This is forcing developers to issue long lived tokens creating a serious security regression in an already solved problem.

This write up includes a matrix table of 14 major clients with notes linking to feature requests, pull requests, and multiple forum discussions.

It is not all gloom and doom though!

There is a work-around solution that security conscious users are using as a stop-gap also discussed, along with a best practices guide for developers implementing their own MCP OAuth Solution.

The plan is to update this reference on a monthly basis to track if there is any movement on this open requests.

submitted by /u/mhat
[link] [comments]

China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions

5 May 2026 at 14:19
A sophisticated China-nexus advanced persistent threat (APT) group has been attributed to attacks targeting government entities in South America since at least late 2024 and government agencies in southeastern Europe in 2025. The activity is being tracked by Cisco Talos under the moniker UAT-8302, with post-exploitation involving the deployment of custom-made malware families that have been put

The Back Door Attackers Know About β€” and Most Security Teams Still Haven’t Closed

5 May 2026 at 11:58
Every AI tool, workflow automation, and productivity app your employees connected to Google or Microsoft this year left something behind: a persistent OAuth token with no expiration date, no automatic cleanup, and in most organizations, no one watching it. Your perimeter controls don't see it. Your MFA doesn't stop it. And when an attacker gets hold of one, they don't need a password. OAuth

MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks

5 May 2026 at 11:56
Threat actors are actively exploiting a critical security flaw impacting an open-source content management system (CMS) known as MetInfo, according to new findings from VulnCheck. The vulnerability in question is CVE-2026-29014 (CVSS score: 9.8), a code injection flaw that could result in arbitrary code execution. "MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code

❌