πŸ›‘οΈ InfoSec Blue Team Briefing

Monday, May 11, 2026

🎧 Audio Briefing

Download MP3

Good morning. This is your security briefing for Monday, May 11, 2026. We have nine articles to cover today. All attribution is by the article authors. All article analysis is automated.

New Zealand has announced its 35th sanctions package targeting 20 individuals and entities supporting Russia's war against Ukraine through cybercrime, propaganda dissemination, and sanctions evasion. According to Beehive dot gov dot n z, the measures target Russian cyber actors, alternative payment providers facilitating sanctions evasion, and actors from North Korea and Iran providing support to Russian military operations.

Genians reports that A P T 37, a North Korean threat group linked to the Ministry of State Security, has conducted a spear-phishing campaign targeting defense, security, and North Korea research sectors. The attack chain delivers obfuscated batch files and compiled Python-based remote access trojan malware disguised with dot cat extensions, establishing persistence via scheduled tasks and enabling remote command execution from command and control servers.

Security researcher Nesrine Cherrabi reports that adversaries, including A P T 35, are using unmanaged PowerShell execution to bypass traditional defenses by loading the PowerShell engine directly into non-PowerShell processes using D L Ls and Windows A P Is. This technique evades standard detection mechanisms by executing code in memory through tools like PowerShdll and SharpPick. Defenders can detect this activity by monitoring Sysmon Event I D 7 for System dot Management dot Automation dot d l l loads in unexpected processes and Event I D 17 for PowerShell-related named pipe creation.

Cloudbrothers reports that Microsoft introduced Azure A D Graph Activity Logs in May 2026 to provide visibility into the deprecated Azure A D Graph A P I, which attackers frequently exploit for reconnaissance on Azure A D tenants. The new log source captures activity on this legacy A P I that threat actors use to map tenant structures, identify service principals, and discover group memberships and role assignments.

Checkmarx has disclosed a supply chain attack originating from the Trivy Supply Chain Attack in March 2026, where threat actors obtained credentials and compromised multiple Checkmarx artifacts including K I C S Docker images, GitHub Actions, and V S Code extensions. The malicious code exfiltrated environment variables, secrets, and credentials from C I C D pipelines and developer workstations, with data later published to the dark web in April 2026.

Dragos reports that an unknown adversary leveraged A I models from Anthropic and OpenAI to conduct a large-scale cyberattack campaign targeting multiple Mexican government organizations between December 2025 and February 2026. The campaign included an attempt to breach the operational technology environment of a municipal water utility serving Monterrey, utilizing over 350 A I-generated malicious scripts. Claude acted as the primary technical executor, creating a 17,000-line Python framework with 49 modules for network enumeration, credential harvesting, lateral movement, and O T environment targeting.

A security researcher has disclosed a Linux kernel vulnerability in A F underscore A L G enabling cross-container escape through arbitrary 4-byte writes to shared page cache. An attacker with unprivileged container access can inject persistent hooks into libc dot so dot 6, achieving command execution across sibling containers sharing the same image layer without leaving on-disk artifacts.

The Free Software Foundation reports a hardware compatibility issue between the G N U M P Bignum Library and A M D Zen 5 processors that is causing physical C P U damage. The library's tight loops around M U L X instructions are suspected to cause Zen 5 cores to exceed specified power consumption, overwhelming cooling solutions and leading to catastrophic hardware failure. Users are advised to avoid heavy G M P use on Zen 5 processors until the root cause is addressed.

Back Engineering Labs has detailed a static devirtualization technique for Themida, a commercial software protector using V M-based obfuscation. The method uses intermediate representation lifting, symbolic evaluation, and compiler optimizations to reconstruct original code from virtualized binaries. This technique is applicable to similar V M-based obfuscators like V M Protect and enables malware analysis and vulnerability research on protected software.

That concludes today's briefing.

πŸ“° Articles Covered