πŸ›‘οΈ InfoSec Blue Team Briefing

Friday, May 08, 2026

🎧 Audio Briefing

Download MP3

Good morning. This is your security briefing for Friday, May 08, 2026, covering 9 articles from yesterday's developments. All attribution is by the article authors. All article analysis is automated.

CISA has added a critical vulnerability to its Known Exploited Vulnerabilities catalog. Palo Alto Networks PAN-OS User-ID Authentication Portal contains an unauthenticated buffer overflow that allows remote attackers to execute arbitrary code with root privileges on PA-Series and VM-Series firewalls. The vulnerability is actively being exploited in the wild against internet-facing firewalls, enabling complete device compromise, espionage, and lateral movement within networks. Organizations must immediately apply security patches, restrict User-ID Authentication Portal access to trusted internal addresses only, and check for indicators of compromise.

CISA has also flagged active exploitation of Ivanti Endpoint Manager Mobile. The vulnerability allows authenticated administrators to execute remote code on typically internet-facing mobile device management servers. Ivanti reports a very limited number of customers have been exploited, with successful attacks requiring administrative authentication. Defenders must immediately apply patches and audit administrative accounts for unauthorized access.

The Guardian has revealed internal documents exposing Russia's secret GRU training program. Department 4 at Bauman Moscow State Technical University serves as a direct pipeline for recruiting and training cyber operatives for offensive operations against Western democracies. The program prepares students for electronic eavesdropping, covert surveillance, and cyber warfare capabilities, with graduates assigned to notorious units like Fancy Bear and Sandworm. Training explicitly includes election interference and hacking targeting critical infrastructure and democratic institutions.

Margin Research has examined cyber connections between Russian and Iranian private cybersecurity sectors. Russian firms like Protey and Positive Technologies are providing surveillance capabilities and threat detection services to Iran. Key findings include Protey's integration into Iran's legal intercept system for mobile communications monitoring, and Ravin Academy, an Iranian company sanctioned by the US for recruiting hackers for Iran's Ministry of Intelligence and Security.

Kaspersky researchers have linked OceanLotus APT group to a supply chain attack distributing ZiChatBot malware through malicious Python packages on PyPI since July 2025. The attackers uploaded trojanized wheel packages disguised as legitimate libraries that deploy droppers to establish persistence and execute arbitrary shellcode commands from command-and-control infrastructure. The campaign targets Python developers on both Windows and Linux platforms.

The United States Department of Justice has sentenced two U.S. nationals to 18 months in prison for facilitating North Korean IT worker schemes. The defendants hosted laptop computers at their residences with remote desktop applications, allowing DPRK IT workers to appear as U.S.-based employees and gain access to nearly 70 U.S. company networks. The schemes generated over one point two million dollars for North Korea and enabled potential data exfiltration and extortion by bypassing security measures through stolen identities and proxy infrastructure.

RTL-SDR reports that a 23-year-old Taiwanese university student was arrested for using a software-defined radio and handheld radios to hack into Taiwan High Speed Rail Corporation's TETRA radio communications system. The student transmitted a spoofed General Alarm signal that triggered emergency braking on four high-speed trains, halting them for 48 minutes. The attack exploited outdated security parameters that had never been rotated in 19 years and potentially unencrypted or weak encryption.

Security researcher Hyunwoo Kim has disclosed Dirty Frag, a universal Linux local privilege escalation vulnerability class that chains two separate vulnerabilities to achieve root access on major Linux distributions. The vulnerabilities have been present since 2017 and 2023 respectively, with no official patches available due to a broken disclosure embargo. Defenders can mitigate by removing the affected kernel modules.

That concludes today's briefing.

πŸ“° Articles Covered