πŸ›‘οΈ InfoSec Blue Team Briefing

Tuesday, May 12, 2026

🎧 Audio Briefing

Download MP3

Good morning. This is your security briefing for Tuesday, May 12, 2026, covering 5 articles. All attribution is by the article authors. All article analysis is automated.

Jonathan Johnson has released EtwWatcher, a static website tool that enables security researchers to analyze changes in Event Tracing for Windows providers across different Windows builds. The tool accepts provider snapshots in JSON format, compares them, and highlights modifications in event descriptions and template data, helping sensor companies and researchers track telemetry evolution and develop better detection strategies.

SΓ©bastien Dudek has highlighted LUKSbox, a Rust-based encrypted container tool that allows users to store sensitive files on untrusted cloud storage by encrypting them with user-controlled keys before upload. The tool supports hardware security keys including FIDO2 and Trusted Platform Module, post-quantum cryptography, and provides tamper-evidence, creating opaque containers that prevent storage providers from accessing encrypted contents even under legal compulsion.

Microsoft has open-sourced CHERIoT-Ibex, a hardware-enforced memory safety solution designed to address memory vulnerabilities that account for approximately 70% of Microsoft's annual security flaws. The platform provides a 32-bit RISC-V core with hardware-enforced memory safety and fine-grained compartmentalization for embedded devices, Internet of Things, and cloud infrastructure, offering both spatial and temporal memory protection with efficiency comparable to low-cost microcontrollers.

The Information Commissioner's Office has fined South Staffordshire Plc Β£963,900 following a cyber attack that began with a phishing email, allowing an attacker to remain undetected for 20 months before escalating to domain administrator privileges in May 2022. The breach resulted in personal data of over 633,000 individuals being published on the dark web, exposing customer and employee information including bank details and National Insurance numbers.

Sophos X-Ops reports that threat actors are using malicious advertising and search engine poisoning to direct users to a fake Claude AI website that distributes the Beagle backdoor. The attack chain uses dynamic link library sideloading with a legitimate G DATA updater to execute DonutLoader shellcode, which then deploys the Beagle backdoor capable of command execution, file operations, and directory management on compromised systems.

That concludes today's briefing.

πŸ“° Articles Covered