NCSA Webboard
    • ล่าสุด
    • แท็ก
    • ฮิต
      • ติดต่อสำนักงาน
    • ลงทะเบียน
    • เข้าสู่ระบบ
    1. หน้าแรก
    2. NCSA_THAICERT
    • รายละเอียด
    • ติดตาม 0
    • คนติดตาม 2
    • กระทู้ 2,179
    • กระทู้ 2,180
    • ดีที่สุด 0
    • Controversial 0
    • กลุ่ม 2

    NCSA_THAICERT

    @NCSA_THAICERT

    1
    ชื่อเสียง
    55
    ดูข้อมูลส่วนตัว
    2.2k
    กระทู้
    2
    คนติดตาม
    0
    ติดตาม
    เข้าร่วม ออนไลน์ล่าสุด
    เว็บไซต์ www.ncsa.or.th/?fbclid=IwAR0BqJEC-CJzBs98rlBxUbZkNBgp1g814xdDNNaKnHTrxfqZhPD--ksY68I

    NCSA_THAICERT เลิกติดตาม ติดตาม
    Global Moderator administrators

    Latest posts made by NCSA_THAICERT

    • Cyber Threat Intelligence 19 May 2026

      Industrial Sector

      • Fuel Tank Breaches Expand Scope Of Iran's Cyber Offensive
        "Iranian hackers reportedly breached systems that monitor fuel levels in storage tanks serving gas stations around the US, demonstrating yet again the changing nature of modern warfare and Iran's cyber reach beyond its active military engagement with the US and Israel. Threat actors from Iran allegedly exploited automatic tank gauge (ATG) systems that were exposed online and lacked password protections, according to a report published by CNN Friday that cited sources familiar with the incident. Attackers managed to change display readings on the tanks but not the actual levels of fuel in them, according to the report."
        https://www.darkreading.com/cyberattacks-data-breaches/fuel-tank-breaches-expand-scope-irans-cyber-offensive

      New Tooling

      • Lyrie: Open-Source Autonomous Pentesting Agent
        "Penetration testing has usually required weeks of manual work, specialized tooling, and teams with narrow skill sets. Lyrie, an open-source autonomous security agent built by OTT Cybersecurity, compresses that process into a command line tool and publishes the entire codebase. The project reached version 3.1.0 this month. The release adds XChaCha20-Poly1305 memory encryption for sensitive threat data, seven new proof-of-concept generators covering prompt injection, auth bypass, CSRF, open redirect, race conditions, secret exposure, and cross-site execution, and three new deep scanners for Rust analysis, taint engine processing, and AI-driven code review. The repository now ships 25 tested commands spanning core security operations, binary analysis, governance, and self-improvement workflows."
        https://www.helpnetsecurity.com/2026/05/18/lyrie-ai-autonomous-pentesting-agent/
        https://github.com/OTT-Cybersecurity-LLC/lyrie-ai

      Vulnerabilities

      • Exploit Available For New DirtyDecrypt Linux Root Escalation Flaw
        "A recently patched local privilege escalation vulnerability in the Linux kernel's rxgk module now has a proof-of-concept exploit that allows attackers to gain root access on some Linux systems. Named DirtyDecrypt and also known as DirtyCBC, this security flaw was also autonomously found and reported by the V12 security team earlier this month, when the maintainers informed them that it was a duplicate that had already been patched in the mainline. "We found and reported this on May 9, 2026, but was informed it was a duplicate by the maintainers," V12 said. "It's a rxgk pagecache write due to missing COW guard in rxgk_decrypt_skb. See poc.c for more details.""
        https://www.bleepingcomputer.com/news/security/exploit-available-for-new-dirtydecrypt-linux-root-escalation-flaw/
      • Linux Kernel Flaw Opens Root-Only Files To Unprivileged Users
        "Another Linux kernel flaw has handed local unprivileged users a way to peek at files they should never be able to read, including root-only secrets such as SSH keys. The bug affects multiple LTS kernel lines from 5.10 upward, although a fix has already landed – and there is now a proposal for reducing the odds of similar surprises in future. What FOSS analytics vendor Metabase memorably dubbed the strip-mining era of open source security continues. This time, the culprit is CVE-2026-46333, a local kernel vulnerability that lets an unprivileged user read files they should not be able to access, including those normally available only to root. An attacker who already has login access to an affected machine could therefore potentially grab SSH keys, password files, or other confidential credentials, as the KnightLi blog explains."
        https://www.theregister.com/security/2026/05/18/linux-kernel-flaw-opens-root-only-files-to-unprivileged-users/5241950
        https://www.knightli.com/en/2026/05/17/ssh-keysign-pwn-cve-2026-46333/

      Malware

      • SHub Reaper | MacOS Stealer Spoofs Apple, Google, And Microsoft In a Single Attack Chain
        "Infostealers targeting macOS have continued to proliferate over the last two years, with threat actors iterating on successful techniques across related malware families. Researchers at Moonlock, Jamf, and Malwarebytes have previously documented the rise of SHub Stealer, including its use of fake application installers and “ClickFix” social engineering. This week, SentinelOne observed a new SHub variant using the build tag “Reaper”. Reaper uses fake WeChat and Miro installers as lures, but what stands out is the way the infection chain shifts its disguise at each stage. The payload may be hosted on a typo-squatted Microsoft domain, executed under the guise of an Apple security update, and persist from a fake Google Software Update directory. Alongside the previously documented SHub feature set, the build also adds an AMOS-style document theft module with chunked uploads."
        https://www.sentinelone.com/blog/shub-reaper-macos-stealer-spoofs-apple-google-and-microsoft-in-a-single-attack-chain/
        https://www.bleepingcomputer.com/news/security/shub-macos-infostealer-variant-spoofs-apple-security-updates/
        https://hackread.com/reaper-malware-fake-microsoft-domain-macos-passwords/
        https://www.theregister.com/security/2026/05/19/do-fear-the-reaper-stealer-swipes-macos-users-passwords-wallets-then-backdoors-them/5242258
      • New Actors Deploy Shai-Hulud Clones: TeamPCP Copycats Are Here
        "Four new malicious npm packages were detected and reported by OX Security in the last 24h, containing infostealer code. One of the packages (chalk-tempalte) contains a direct clone of the Shai-Hulud source code that TeamPCP leaked last week, probably inspired as part of the supply chain attack competition that was published in BreachForums not long after. One incriminating evidence that this is a different actor from TeamPCP, is that the Shai-Hulud malware code is an almost exact copy of the leaked source code, with no obfuscation techniques, which make the final version visually different from the original. In our breakdown we show the side by side comparison of the chalk-template Shai-Hulud version with the original source code leak, showing that they are the same."
        https://www.ox.security/blog/new-actors-deploy-shai-hulud-clones-teampcp-copycats-are-here/
        https://www.bleepingcomputer.com/news/security/leaked-shai-hulud-malware-fuels-new-npm-infostealer-campaign/
        https://www.securityweek.com/first-shai-hulud-worm-clones-emerge/
        https://www.theregister.com/cyber-crime/2026/05/18/shai-hulud-copycat-hits-another-npm-package/5242180
      • Click, Install, Compromised: The New Wave Of Zoom-Themed Attacks
        "As with most things, change is inevitable - especially for threat actors operating in a rapidly evolving threat landscape. What starts as a familiar Zoom invite can quickly escalate into a full-blown compromise. Recently, the Cofense Phishing Defense Center (PDC) has observed a shift in which traditional credential-harvesting phishing campaigns and familiar social engineering tactics are increasingly being repurposed to deliver more significant threats, including malware and unauthorized remote access."
        https://cofense.com/blog/click-install-compromised-the-new-wave-of-zoom-themed-attacks
      • When Worm Source Code Goes Open Source: The Shai-Hulud Clones Arrive
        "Last week the TeamPCP group did something the open source security community has been quietly dreading: they published the source code for the Shai-Hulud worm on GitHub and ran what amounted to a public attack challenge on BreachForums, inviting other actors to take the code and run with it. Days later, the first clones appeared on npm. A single threat actor uploaded four malicious packages from one account: a near-verbatim copy of Shai-Hulud with its own command-and-control infrastructure, three Axios typosquats, and a DDoS botnet payload that conscripts infected machines into a flooding network. All of them are aimed at developers who happen to fat-finger a dependency name."
        https://mondoo.com/blog/shai-hulud-clones-arrive-when-worm-source-code-goes-open-source
        https://www.darkreading.com/application-security/shai-hulud-worm-clones-spread-code-release
      • Custom Attack Tooling Including Undisclosed C2 Infrastructure Targeting Malaysian Organizations
        "Oasis Security identified attacker-controlled infrastructure hosted on Microsoft Azure infrastructure in the Malaysia West region, used to conduct a targeted intrusion campaign against multiple Malaysian organizations. The operation demonstrates a high degree of operational planning, with the attacker developing purpose-built Python tooling for each target — covering internal network enumeration, database access, and external data exfiltration."
        https://oasis-security.io/blog/malaysian-government-with-undisclosed-c2-infrastructure
        https://hackread.com/government-backed-hackers-cloudflare-malaysia-espionage/
      • Fast16: Pre-Stuxnet Sabotage Tool Was Built To Subvert Nuclear Weapons Simulations
        "In April 2026, our peers in SentinelOne published the first public analysis of fast16, a previously undiscovered sabotage framework whose oldest components appear to date from around 2005, approximately two years before Stuxnet first became active. The framework consists of a service binary that embeds an early Lua 5.0 virtual machine, a boot-start filesystem driver that intercepts and patches executable code as it is read from disk, and a rule-driven hook engine that rewrites very specific instruction sequences inside a single, narrowly defined target application."
        https://www.security.com/threat-intelligence/fast16-nuclear-sabotage
        https://thehackernews.com/2026/05/pre-stuxnet-fast16-malware-tampered.html
      • NATS-As-C2: Inside a New Technique Attackers Are Using To Harvest Cloud Credentials And AI API Keys
        "On May 5, 2026, the Sysdig Threat Research Team (TRT) identified a novel command-and-control (C2) technique in which a threat actor used a NATS server as C2 infrastructure. The Sysdig TRT has dubbed this technique “NATS-as-C2.” Rather than relying on traditional HTTP-based panels or chat platforms, the attacker leveraged infrastructure more commonly associated with modern distributed systems. The Sysdig TRT traced the activity to an extended exploitation attempt involving CVE-2026-33017, an unauthenticated remote code execution (RCE) vulnerability in Langflow that was added to the CISA KEV catalog on March 25, 2026. Over roughly 30 minutes of hands-on activity, the operator at 159.89.205.184 (DigitalOcean) downloaded a Python worker and a Go binary. During this time, the Sysdig TRT captured the threat actor’s payload, exposing their coordination plane: a NATS server at 45.192.109.25:14222 running an authenticated, ACL-enforced instance. The attacker subsequently attempted to escape the container using DirtyPipe and DirtyCreds exploits."
        https://webflow.sysdig.com/blog/nats-as-c2-inside-a-new-technique-attackers-are-using-to-harvest-cloud-credentials-and-ai-api-keys
      • Gamaredon’s Infection Chain: Spoofed Emails, GammaDrop And GammaLoad
        "Investigating Gamaredon’s abuse of CVE-2025-8088, we identified a dozen waves of spearphishing emails against Ukrainian state institutions in a campaign that is still active, dating back to September 2025. These emails – spoofed or sent from compromised government accounts – deliver persistent, multi-stage VBScript downloaders that profile the infected system. In the absence of public analysis of these malware, this report documents Gamaredon’s GammaDrop and GammaLoad downloader variants, the infrastructure behind them, and the methods used to deliver the spearphishing emails."
        https://harfanglab.io/insidethelab/gamaredon-gammadrop-gammaload/

      Breaches/Hacks/Leaks

      • 7-Eleven Data Breach Confirmed After ShinyHunters Ransom Demand
        "7-Eleven, the world’s largest convenience store chain, has confirmed suffering a data breach after the notorious ShinyHunters hacker group claimed to have stolen information from its systems. The company has started sending out security incident notices revealing that an intrusion into 7-Eleven systems used to store franchisee documents was detected on April 8. According to a notification submitted to the Maine Attorney General’s Office, unspecified personal information has been compromised. The exposed information was provided to the company during franchise applications."
        https://www.securityweek.com/7-eleven-data-breach-confirmed-after-shinyhunters-ransom-demand/
        https://securityaffairs.com/192336/data-breach/shinyhunters-hack-7-eleven-franchisee-data-and-salesforce-records-exposed.html
      • A Hotel Check-In System Left a Million Passports And Driver’s Licenses Open For Anyone To See
        "A hotel check-in system left more than 1 million customer passports, driver’s licenses, and selfie verification photos to the open web after a security lapse. The data is now offline after TechCrunch alerted the company responsible. The hotel check-in system, called Tabiq, is maintained by the Japan-based tech startup Reqrea. According to its website, Tabiq is used in several hotels across Japan and relies on facial recognition and document scanning to check guests in."
        https://techcrunch.com/2026/05/15/a-hotel-check-in-system-left-a-million-passports-and-drivers-licenses-open-for-anyone-to-see/
        https://securityaffairs.com/192302/data-breach/public-amazon-bucket-leaks-sensitive-guest-data-from-japanese-hotel-platform-tabiq.html
      • Millions Impacted Across Several US Healthcare Data Breaches
        "Several major data breaches were added to the healthcare data breach tracker maintained by the US Department of Health and Human Services (HHS) in recent days. All of the breaches were disclosed in recent months, but the number of affected individuals has only been made public now on the HHS breach tracker. The largest incident affects the New York City Health and Hospitals Corporation, which in March disclosed a data breach detected on February 2, 2026. An investigation found that threat actors had access to its systems between November 2025 and February 2026 via a third-party vendor. Exposed information includes personal, health insurance, medical, biometric, and financial information."
        https://www.securityweek.com/millions-impacted-across-several-us-healthcare-data-breaches/

      General News

      • April 2026 Threat Trend Report On APT Groups
        "this report covers cyber espionage and covert sabotage activities by Region-led threat groups believed to be supported by the Region. it excludes cybercrime groups that operate for financial gain. based on publicly available analysis over the past month, we categorized threat actors according to the names of their representatives in the ATIP."
        https://asec.ahnlab.com/en/93744/
      • 201 Arrests In First-Of-Its-Kind Cybercrime Operation In MENA Region
        "A first-of-its-kind cybercrime operation in the MENA region has led to the arrest of 201 individuals, with a further 382 suspects identified. Thirteen countries from the Middle East and North Africa took part in Operation Ramz (October 2025 – 28 February 2026) which aimed to investigate and disrupt malicious infrastructure, identify and arrest suspects, and prevent future losses. The operation focused on neutralizing phishing and malware threats, as well as tackling cyber scams that inflict severe cost to the region. In addition to the arrests made, 3,867 victims were identified, and 53 servers were seized."
        https://www.interpol.int/en/News-and-Events/News/2026/201-arrests-in-first-of-its-kind-cybercrime-operation-in-MENA-region
        https://www.bleepingcomputer.com/news/security/interpol-operation-ramz-seizes-53-malware-phishing-servers/
        https://thehackernews.com/2026/05/interpol-operation-ramz-disrupts-mena.html
        https://therecord.media/more-than-200-arrested-interpol-middle-east-scams
        https://cyberscoop.com/interpol-operation-ramz-middle-east-north-africa/
        https://www.infosecurity-magazine.com/news/interpol-cybercrime-crackdown-mena/
        https://www.helpnetsecurity.com/2026/05/18/interpol-mena-cybercrime-operation-ramz-201-arrests/
      • Hacktivists, Ransomware, And a 124% Surge Across DACH
        "Hacktivism and ransomware targeting organizations across Germany, Austria, and Switzerland increased 124% in 2025, according to Check Point Exposure Management (based on published attacks on the web and dark web). Three distinct dynamics drove the surge, each with its own logic and its own implications for security teams in 2026."
        https://blog.checkpoint.com/exposure-management/hacktivists-ransomware-and-a-124-surge-the-dach-threat-picture/
      • The Canvas Breach Proved That Prevention Is No Longer Enough
        "Earlier this month, ShinyHunters breached Instructure’s Canvas platform twice within a single week — stealing 3.65 terabytes of data from approximately 275 million users across more than 8,000 institutions. The group defaced login pages at hundreds of schools during final exam periods, forced Canvas offline, and extracted a ransom payment before Congress opened a formal investigation. The attack did not require exotic malware or zero-day exploits. Attackers entered through compromised “Free-For-Teacher” accounts, escalated rapidly, and exfiltrated sensitive data at scale before Instructure could contain them."
        https://cyberscoop.com/canvas-breach-saas-security-identity-governance-op-ed/
      • AI Is Drowning Software Maintainers In Junk Security Reports
        "AI-assisted vulnerability research has exploded, unleashing a firehose of low-quality reports on overworked software maintainers who are wasting hours sifting through noise instead of fixing real problems. Linus Torvalds, the Linux kernel’s creator, says the flood has made the project’s security mailing list “almost entirely unmanageable, with enormous duplication due to different people finding the same things with the same tools.”"
        https://www.helpnetsecurity.com/2026/05/18/problems-with-ai-assisted-vulnerability-research/
        https://www.theregister.com/security/2026/05/18/linus-torvalds-says-ai-powered-bug-hunters-have-made-linux-security-mailing-list-almost-entirely-unmanageable/5241633
      • The AI Backdoor Your Security Stack Is Not Built To See
        "Enterprises deploying LLMs have spent the past two years building defenses around a reasonable assumption: malicious behavior leaves a trace in the input. Scan for suspicious tokens, filter unusual characters, watch for prompt injection patterns. New research from Microsoft and the Institute of Science Tokyo demonstrates that this defensive posture has a blind spot, and the cost of that blind spot could be measured in leaked proprietary data and regulatory exposure."
        https://www.helpnetsecurity.com/2026/05/18/metabackdoor-llm-backdoor-attack/
        https://arxiv.org/pdf/2605.15172
      • AI Shrinks Vulnerability Exploitation Window To Hours
        "Time has become organizations’ biggest vulnerability because the gap between vulnerability discovery and exploitation has narrowed to hours, according to Synack’s 2026 State of Vulnerabilities Report. Agentic AI systems that act autonomously across systems introduce new risks that require human expertise to identify and understand. Automated scanning detects known signatures but can miss logic flaws, misconfigurations, and unexpected behavior."
        https://www.helpnetsecurity.com/2026/05/18/synack-2025-ai-driven-vulnerability-trends-report/
      • When Ransomware Hits, Confidence Doesn’t Restore Endpoints
        "Ransomware, supply chain vulnerabilities, insider threats, compliance failures, and software disruptions remain major concerns for security leaders, according to The Ransomware Reality: Zero Days to Recover report by Absolute Security. A survey of 750 CISOs from enterprise organizations with more than 5,000 employees in the United States and the United Kingdom revealed gaps between ransomware frequency, confidence in recovery capabilities, and remediation timelines."
        https://www.helpnetsecurity.com/2026/05/18/absolute-security-cisos-ransomware-pressure-report/
      • IT Threat Evolution In Q1 2026. Mobile Statistics
        "In the third quarter of 2025, we updated the methodology for calculating statistical indicators based on the Kaspersky Security Network. These changes affected all sections of the report except for the statistics on installation packages, which remained unchanged. To illustrate the differences between the reporting periods, we have also recalculated data for the previous quarters. Consequently, these figures may significantly differ from the previously published ones. However, subsequent reports will employ this new methodology, enabling precise comparisons with the data presented in this post."
        https://securelist.com/malware-report-q1-2026-mobile-statistics/119819/
        https://securelist.com/malware-report-q1-2026-pc-iot-statistics/119828/
      • Developer Workstations Are Now Part Of The Software Supply Chain
        "Supply chain attackers are not only trying to slip malicious code into trusted software. They are trying to steal the access that makes trusted software possible. Recently, three separate campaigns hit npm, PyPI, and Docker Hub in a 48-hour window, and all three targeted secrets from developer environments and CI/CD pipelines, including API keys, cloud credentials, SSH keys, and tokens. This is an ongoing concern and is self-propagating, as seen in attacks like the "mini Shai Hulud" campaigns. That pattern should change how security teams think about the software supply chain."
        https://thehackernews.com/2026/05/developer-workstations-are-now-part-of.html

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) e4f5cd06-c56f-4daf-9059-fb8db5755b2d-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • พบอัปเดตความปลอดภัยเดือนพฤษภาคมติดตั้งล้มเหลวใน Windows 11 บางเครื่อง ผู้ดูแลระบบเร่งตรวจสอบ

      พบอัปเดตความปลอดภัยเดือนพฤษภาคมติดตั้งล.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand f0cc0885-ce8c-470c-be8f-a6fe786f3081-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Grafana เผยเหตุข้อมูลรั่วไหล หลังผู้โจมตีใช้ GitHub Token เข้าถึง Source Code และพยายามเรียกค่าไถ่

      Grafana เผยเหตุข้อมูลรั่วไหล หลังผู้โจมตีใช้ GitH.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand bf64b0bb-1e53-4313-8af6-72befce8f7ec-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • พบช่องโหว่ Zero-Day "MiniPlasma" บน Windows เสี่ยงถูกยกระดับสิทธิ์เป็น SYSTEM แม้ติดตั้งอัปเดตล่าสุดแล้ว

      พบช่องโหว่ Zero-Day MiniPlasma บน Windows เสี่ยงถูกยกระดับส.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand a452b36f-383b-49aa-b9d3-abfec04d7f05-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • 🛑 ด่วน! แจ้งเตือนช่องโหว่ใน Microsoft Exchange Server On-Premises 🛑

      ศูนย์ประสานการรักษาความมั่นคงปลอดภัยระบบคอมพิวเตอร์แห่งชาติ (ThaiCERT) ได้ติดตามสถานการณ์ภัยคุกคามทางไซเบอร์ และพบประกาศด้านความปลอดภัยเกี่ยวกับช่องโหว่ CVE-2026-42897 ซึ่งกระทบต่อ Microsoft Exchange Server แบบ On-Premises โดย Microsoft ระบุว่าช่องโหว่นี้ถูกนำไปใช้โจมตีจริงแล้ว และสามารถถูกโจมตีผ่านอีเมลที่ถูกสร้างขึ้นเป็นพิเศษ หากผู้ใช้งานเปิดอีเมลดังกล่าวผ่าน Outlook Web Access / Outlook on the web (OWA) และเข้าเงื่อนไขการโต้ตอบบางประการ ผู้โจมตีอาจทำให้มีการรัน JavaScript ที่ไม่พึงประสงค์ในบริบทของเว็บเบราว์เซอร์ได้[1]

      1. รายละเอียดช่องโหว่
        CVE-2026-42897 - Microsoft Exchange Server Spoofing / Cross-Site Scripting (XSS) Vulnerability (CVSS v3.1: 8.1) ช่องโหว่นี้เกิดจากการจัดการข้อมูลนำเข้าไม่เหมาะสมระหว่างการสร้างหน้าเว็บ ทำให้เกิดปัญหา Cross-Site Scripting (XSS) และสามารถนำไปสู่การ spoofing ผ่านเครือข่ายได้ โดยผู้โจมตีที่ไม่ได้รับอนุญาตสามารถส่งอีเมลที่สร้างขึ้นเป็นพิเศษไปยังผู้ใช้งาน เมื่อผู้ใช้งานเปิดอีเมลดังกล่าวผ่าน OWA (Outlook Web Access) ภายใต้เงื่อนไขบางประการ อาจทำให้โค้ด JavaScript ถูกรันในบริบทของเบราว์เซอร์ของผู้ใช้งาน[2]

      2. ผลิตภัณฑ์ที่ได้รับผลกระทบ
        ช่องโหว่นี้กระทบ Microsoft Exchange Server แบบ On-Premises ดังต่อไปนี้
        2.1 Microsoft Exchange Server 2016 ทุกอัปเดต
        2.2 Microsoft Exchange Server 2019 ทุกอัปเดต
        2.3 Microsoft Exchange Server Subscription Edition (SE) ทุกอัปเดต

      3. แนวทางการแก้ไข[3]
        3.1 ขณะนี้ยังไม่มีแพตช์ถาวรสำหรับช่องโหว่นี้ โดย Microsoft ระบุว่า Exchange Emergency Mitigation Service (EEMS) จะช่วยปรับใช้มาตรการบรรเทาผลกระทบอัตโนมัติให้กับ Exchange Server 2016, 2019 และ SE แบบ On-Premises
        3.2 Microsoft อยู่ระหว่างเตรียมออกแพตช์สำหรับ Exchange SE RTM, Exchange 2016 CU23 และ Exchange Server 2019 CU14/CU15 โดยสำหรับ Exchange 2016 และ 2019 จะมีให้เฉพาะลูกค้าที่อยู่ในโปรแกรม Extended Security Update (ESU) Period 2
        3.3 ผู้ดูแลระบบควรติดตามประกาศและอัปเดตจาก Microsoft อย่างใกล้ชิด และติดตั้งแพตช์ทันทีเมื่อพร้อมใช้งาน

      4. แนวทางลดความเสี่ยง
        4.1 ตรวจสอบทันทีว่า Exchange Emergency Mitigation Service (EEMS) เปิดใช้งานอยู่หรือไม่
        4.2 หาก EEMS ถูกปิดใช้งาน ให้เปิดใช้งานโดยเร็ว เนื่องจากเป็นแนวทางที่ Microsoft แนะนำสำหรับการลดความเสี่ยงในทันที
        4.3 ตรวจสอบว่าเซิร์ฟเวอร์ Exchange ไม่ได้ใช้เวอร์ชันที่เก่ากว่า March 2023 เนื่องจาก EM Service อาจไม่สามารถตรวจสอบ mitigation ใหม่ได้
        4.4 สำหรับสภาพแวดล้อมแบบ air-gapped หรือไม่สามารถใช้ EEMS ได้ ให้ดาวน์โหลด Exchange On-premises Mitigation Tool (EOMT) เวอร์ชันล่าสุด และรันคำสั่งผ่าน Exchange Management Shell แบบสิทธิ์ผู้ดูแลระบบ
        4.5 จำกัดการเข้าถึง Exchange Server จากอินเทอร์เน็ตเท่าที่จำเป็น และพิจารณาเพิ่มการตรวจจับ/กรองอีเมลที่มีเนื้อหาน่าสงสัย
        4.6 แจ้งเตือนผู้ใช้งานให้ระมัดระวังการเปิดอีเมลที่ผิดปกติ โดยเฉพาะเมื่อใช้งานผ่าน Outlook Web Access / Outlook on the web

      Microsoft Exchange Server On-Premises.png

      แหล่งอ้างอิง
      [1] https://dg.th/pmdqus9801
      [2] https://dg.th/lpestq91o6
      [3] https://dg.th/7ojxn95rga

      🛑 หมายเหตุ - อ้างอิง CVSS จาก https://www.cve.org/ 🛑

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • 🛑 ด่วน!Google Chrome ออกอัปเดตแก้ไขช่องโหว่หลายรายการ 🛑

      ศูนย์ประสานการรักษาความมั่นคงปลอดภัยระบบคอมพิวเตอร์แห่งชาติ (ThaiCERT) ได้ติดตามสถานการณ์ภัยคุกคามทางไซเบอร์ และพบประกาศด้านความปลอดภัยเกี่ยวกับการอัปเดต Google Chrome 148 ซึ่งแก้ไขช่องโหว่ด้านความปลอดภัยรวม 79 รายการ โดยมีช่องโหว่ระดับ Critical จำนวน 14 รายการ และระดับ High จำนวน 37 รายการ กระทบต่อหลายส่วนประกอบของเบราว์เซอร์ เช่น WebML, Skia, UI, FileSystem, Input, Aura, HID, Blink, Tab Groups, Downloads, ANGLE และ Payments [1]

      1. รายละเอียดช่องโหว่
        ช่องโหว่ระดับ Critical ที่ได้รับการแก้ไขในรอบนี้ประกอบด้วยหลายประเภท เช่น Heap Buffer Overflow, Integer Overflow, Use-After-Free, Insufficient Validation of Untrusted Input, Object Lifecycle Issue และ Race Condition ซึ่งเป็นกลุ่มช่องโหว่ที่อาจนำไปสู่การทำงานผิดพลาดของเบราว์เซอร์ การรันโค้ดจากระยะไกล หรือการหลีกเลี่ยงกลไกความปลอดภัยได้ในบางเงื่อนไข

      ช่องโหว่ Critical ที่สำคัญ ได้แก่ [2]

      • CVE-2026-8509 - Heap buffer overflow ใน WebML
      • CVE-2026-8510 - Integer overflow ใน Skia
      • CVE-2026-8511 - Use after free ใน UI
      • CVE-2026-8512 - Use after free ใน FileSystem
      • CVE-2026-8513 - Use after free ใน Input
      • CVE-2026-8514 - Use after free ใน Aura
      • CVE-2026-8515 - Use after free ใน HID
      • CVE-2026-8516 - Insufficient validation of untrusted input ใน DataTransfer
      • CVE-2026-8517 - Object lifecycle issue ใน WebShare
      • CVE-2026-8518 - Use after free ใน Blink
      • CVE-2026-8519 - Integer overflow ใน ANGLE
      • CVE-2026-8520 - Race condition ใน Payments
      • CVE-2026-8521 - Use after free ใน Tab Groups
      • CVE-2026-8522 - Use after free ใน Downloads
      1. ผลิตภัณฑ์ที่ได้รับผลกระทบ
      • Google Chrome for Windows
      • Google Chrome for macOS
      • Google Chrome for Linux
      1. แนวทางการแก้ไข
        อัปเดต Google Chrome เป็นเวอร์ชันล่าสุดทันที ได้แก่
      • Windows / macOS: 148.0.7778.167/168
      • Linux: 148.0.7778.167
      1. แนวทางลดความเสี่ยง
      • หลีกเลี่ยงการเข้าเว็บไซต์ที่ไม่น่าเชื่อถือ หรือเปิดลิงก์จากอีเมล/ข้อความที่ไม่ทราบแหล่งที่มา
      • จำกัดการติดตั้ง extension เฉพาะรายการที่จำเป็นและเชื่อถือได้
      • เปิดใช้งาน automatic update ของ Chrome

      Google Chrome.png

      แหล่งอ้างอิง
      [1] https://dg.th/l9grebqvsf
      [2] https://dg.th/f0vyaghbdl

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 18 May 2026

      Financial Sector

      • GCC Cyber 2026: How Digital Banking Expansion Is Creating a New Attack Surface Attackers Are Already Exploiting
        "The Gulf Cooperation Council (GCC) region has spent the last several years building one of the world’s most ambitious digital economies. Across Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the UAE, governments and enterprises have accelerated investments in cloud infrastructure, AI-driven services, smart cities, and digital banking technology at a pace rarely seen elsewhere. Banks are rolling out instant payments, embedded finance services, mobile-first platforms, and API-driven ecosystems designed to support a rapidly expanding fintech economy."
        https://cyble.com/blog/gcc-digital-banking-attack-surface-risks-2026/

      Vulnerabilities

      • Claw Chain: Cyera Research Unveil Four Chainable Vulnerabilities In OpenClaw
        "Cyera's research team identified four previously undisclosed vulnerabilities in OpenClaw, one of the most rapidly adopted open-source platforms for autonomous AI agents. Originally launched as “Clawdbot” in late 2025, OpenClaw connects LLMs directly to filesystems, SaaS applications, credentials, and execution environments - and is increasingly deployed across enterprise workflows for IT automation, customer service, and operational integrations with platforms like Telegram, Discord, and Microsoft Agent 365. The four findings - spanning sandbox isolation, identity, and execution validation - were disclosed to the OpenClaw maintainers in April 2026 and have all been patched."
        https://www.cyera.com/blog/claw-chain-cyera-research-unveil-four-chainable-vulnerabilities-in-openclaw
        https://thehackernews.com/2026/05/four-openclaw-flaws-enable-data-theft.html
        https://hackread.com/claw-chain-vulnerabilities-openclaw-ai-servers-risk/
      • Microsoft Silently Patched a CVSS 9.9 Privilege Escalation In Azure Backup For AKS
        "In March 2026, I discovered a privilege escalation vulnerability in Azure Backup for AKS that allowed a user with only the “Backup Contributor” Azure role (zero Kubernetes permissions) to gain cluster-admin on any AKS cluster. CERT/CC validated this finding as VU#284781 on April 16, 2026. Microsoft rejected it, claiming the “attacker already held administrator access.” This was factually incorrect — the vulnerability grants cluster-admin, it does not require it. On May 12, 2026, I confirmed Microsoft has silently patched the behavior without:"
        https://olearysec.com/research/azure-backup-aks-silent-patch/
        https://www.bleepingcomputer.com/news/security/microsoft-rejects-critical-azure-vulnerability-report-no-cve-issued/
      • Microsoft Warns Of Exchange Zero-Day Flaw Exploited In Attack
        "On Thursday, Microsoft shared mitigations for a high-severity Exchange Server vulnerability exploited in attacks that allow threat actors to execute arbitrary code via cross-site scripting (XSS) while targeting Outlook on the web users. Microsoft describes this security flaw (CVE-2026-42897) as a spoofing vulnerability affecting up-to-date Exchange Server 2016, Exchange Server 2019, and Exchange Server Subscription Edition (SE) software. While patches aren't yet available to permanently fix the vulnerability, the company added that the Exchange Emergency Mitigation Service (EEMS) will provide automatic mitigation for Exchange Server 2016, 2019, and SE on-premises servers."
        https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-exchange-zero-day-flaw-exploited-in-attacks/
        https://techcommunity.microsoft.com/blog/exchange/addressing-exchange-server-may-2026-vulnerability-cve-2026-42897/4518498
        https://www.cisa.gov/news-events/alerts/2026/05/15/cisa-adds-one-known-exploited-vulnerability-catalog
        https://thehackernews.com/2026/05/on-prem-microsoft-exchange-server-cve.html
        https://www.infosecurity-magazine.com/news/microsoft-zeroday-exchange-servers/
        https://www.securityweek.com/microsoft-warns-of-exchange-server-zero-day-exploited-in-the-wild/
        https://securityaffairs.com/192204/security/cve-2026-42897-microsoft-confirms-active-exploitation-of-exchange-server-zero-day.html
        https://securityaffairs.com/192240/hacking/u-s-cisa-adds-a-flaw-in-microsoft-exchange-server-to-its-known-exploited-vulnerabilities-catalog.html
      • Critical FunnelKit Vulnerability Threatens 40,000+ WooCommerce Checkouts
        "Sansec is tracking active attacks against Funnel Builder by FunnelKit, a checkout and upsell plugin used on 40,000+ WooCommerce stores. All versions before 3.15.0.3 let unauthenticated attackers inject arbitrary JavaScript into every checkout page on the store. Attackers are planting fake Google Tag Manager scripts into the plugin's "External Scripts" setting. The injected code looks like ordinary analytics next to the store's real tags, but loads a payment skimmer that steals credit card numbers, CVVs and billing addresses from checkout. FunnelKit has shipped a patched version and is asking all customers to update."
        https://sansec.io/research/funnelkit-woocommerce-vulnerability-exploited
        https://www.bleepingcomputer.com/news/security/funnel-builder-wordpress-plugin-bug-exploited-to-steal-credit-cards/
        https://thehackernews.com/2026/05/funnel-builder-flaw-under-active.html
        https://securityaffairs.com/192260/cyber-crime/attackers-exploit-funnel-builder-bug-to-inject-e-skimmers-into-e-stores.html
      • Chrome 148 Update Patches Critical Vulnerabilities
        "Google this week released a Chrome 148 update that resolves 79 vulnerabilities, including 14 critical-severity bugs across multiple components. The first critical issue is a heap buffer overflow in WebML tracked as CVE-2026-8509, for which the internet giant paid a $43,000 bug bounty. Google has not shared details on the flaw, but its severity rating and the paid amount suggest that it could be exploited for remote code execution. The second critical issue is CVE-2026-8510, an integer overflow weakness in Skia that earned the reporting researcher a $25,000 reward."
        https://www.securityweek.com/chrome-148-update-patches-critical-vulnerabilities/
      • New Windows 'MiniPlasma' Zero-Day Exploit Gives SYSTEM Access, PoC Released
        "A cybersecurity researcher has released a proof-of-concept exploit for a Windows privilege escalation zero-day dubbed "MiniPlasma" that lets attackers gain SYSTEM privileges on fully patched Windows systems. The exploit was published by a researcher known as Chaotic Eclipse, or Nightmare Eclipse, who released both the source code and a compiled executable on GitHub after claiming that Microsoft failed to properly patch a previously reported 2020 vulnerability. According to the researcher, the flaw impacts the 'cldflt.sys' Cloud Filter driver and its 'HsmOsBlockPlaceholderAccess' routine, which was originally reported to Microsoft by Google Project Zero researcher James Forshaw in September 2020."
        https://www.bleepingcomputer.com/news/microsoft/new-windows-miniplasma-zero-day-exploit-gives-system-access-poc-released/

      Malware

      • Inside The REMUS Infostealer: Session Theft, MaaS, And Rapid Evolution
        "In recent months, a new infostealer malware known as REMUS has emerged across the cybercrime landscape, drawing attention from security researchers and malware analysts. Several technical analyses published in recent months focused on the malware’s capabilities, infrastructure, and similarities to Lumma Stealer, including browser targeting mechanisms, and credential theft functionality and more. However, far less attention has been given to the underground operation behind the malware itself."
        https://www.bleepingcomputer.com/news/security/inside-the-remus-infostealer-session-theft-maas-and-rapid-evolution/
      • PureLogs: Delivery Via PawsRunner Steganography
        "The use of steganography in the threat landscape continues to accelerate. Threat actors are increasingly shifting from direct encrypted transfers to a 'legitimate-file-plus-hidden-data' model, effectively masking their next-stage payloads within everyday media. FortiGuard Labs recently uncovered a phishing campaign that abuses environment variables to hide malicious commands and uses PawsRunner as a Steganography Loader to deploy the .NET infostealer PureLogs."
        https://www.fortinet.com/blog/threat-research/purelogs-delivery-via-pawsrunner-steganography
      • From PyInstaller To XWorm V7.4: Infection Chain Analysis
        "Point Wild conducted an in-depth analysis of a suspicious PyInstaller-packed Python sample and identified it as a multi-stage malware loader designed to deploy the XWorm Remote Access Trojan (RAT), specifically associated with the XWorm V7.4 campaign. The sample leveraged multiple layers of obfuscation, staged execution and anti-analysis techniques to conceal its true functionality and evade detection by traditional security controls."
        https://www.pointwild.com/threat-intelligence/from-pyinstaller-to-xworm-v7-4-infection-chain-analysis/
        https://hackread.com/hackers-pyinstaller-amsi-patching-xworm-rat-v7-4/
      • New Calendar Invite Phishing Campaign: ICS Abuse And Post-Delivery Persistence
        "Fortra Intelligence and Research Experts (FIRE) have identified an ongoing campaign combining ConsentFix (also known as device code phishing) to harvest Microsoft account credentials and calendar phishing (or CalPhishing) to bypass security controls and push users closer to the 'trusted' workflow. This activity is likely linked to the EvilTokens AI-enabled phishing kit, which has been known to include calendar phishing as an option. However, CalPhishing appears to be the increasingly preferable method of delivery thanks to its ability to bypass defences."
        https://www.fortra.com/blog/new-calendar-invite-phishing-campaign-ics-abuse-and-post-delivery-persistence
        https://hackread.com/calphishing-eviltokens-kit-outlook-invites-m365/
      • Gremlin Stealer's Evolved Tactics: Hiding In Plain Sight With Resource Files
        "This article examines new obfuscation techniques the Gremlin stealer malware uses to conceal malicious payloads within embedded resources. We analyze a variant protected by a sophisticated commercial packing utility that employs instruction virtualization, transforming the original code into a custom, non-standard bytecode executed by a private virtual machine. Gremlin stealer siphons sensitive information from compromised systems and exfiltrates it to attacker‑controlled servers for potential publication or sale. It targets web browsers, system clipboard and local storage to exfiltrate sensitive information like:"
        https://unit42.paloaltonetworks.com/gremlin-stealer-evolution/
        https://www.infosecurity-magazine.com/news/gremlin-stealer-evolves-into/
      • Cato CTRL Threat Research: Suspected China-Linked Threat Actor Targets Global Manufacturer With Undocumented TencShell Malware
        "In April 2026, Cato CTRL identified and blocked an attempted intrusion against a global manufacturing customer involving TencShell, a previously undocumented, Go-based implant derived from the open-source Rshell C2 framework. The activity appeared in traffic associated with a third-party user connected to the customer environment. The attack chain used a first-stage dropper, Donut shellcode, a masqueraded .woff web-font resource, memory injection, and web-like C2 communication. We assess the activity as suspected China-linked based on the apparent Rshell lineage, Tencent-themed API impersonation, and infrastructure patterns, While this pattern is relevant to our suspected China-linked assessment, it is not sufficient on its own for attribution."
        https://www.catonetworks.com/blog/cato-ctrl-suspected-china-linked-threat-actor-targets-global-manufacturer/
        https://www.infosecurity-magazine.com/news/china-hackers-tencshell-malware/
      • Kazuar: Anatomy Of a Nation-State Botnet
        "Kazuar, a sophisticated malware family attributed to the Russian state actor Secret Blizzard, has been under constant development for years and continues to evolve in support of espionage-focused operations. Over time, Kazuar has expanded from a relatively traditional backdoor into a highly modular peer-to-peer (P2P) botnet ecosystem designed to enable persistent, covert access to target environments. This upgrade aligns with Secret Blizzard’s broader objective of gaining long-term access to systems for intelligence collection. The threat actor has historically targeted organizations in the government and diplomatic sector in Europe and Central Asia, as well as systems in Ukraine previously compromised by Aqua Blizzard, very likely for the purpose of obtaining information supporting Russia’s foreign policy and military objectives."
        https://www.microsoft.com/en-us/security/blog/2026/05/14/kazuar-anatomy-of-a-nation-state-botnet/
        https://thehackernews.com/2026/05/turla-turns-kazuar-backdoor-into.html
        https://www.bleepingcomputer.com/news/security/russian-hackers-turn-kazuar-backdoor-into-modular-p2p-botnet/
        https://securityaffairs.com/192231/apt/russian-apt-turla-builds-long-term-access-tool-with-kazuar-botnet-evolution.html
      • Tinker Tailor Soldier: Paper Werewolf’s Latest Toolkit
        "In March—April 2026, we uncovered a new campaign by Paper Werewolf targeting Russian industrial, financial, and transport organizations. The analysis revealed several previously undescribed malware instances, including a custom‑built stealer we dubbed PaperGrabber, loaders and downloaders written in C++, C#, Python, and JavaScript, and a novel shellcode‑based implant for the Mythic post‑exploitation framework."
        https://bi.zone/eng/expertise/blog/kamen-nozhnitsy-bumaga-novyy-instrumentariy-v-atakakh-klastera-paper-werewolf/
      • Tycoon 2FA Operators Adopt OAuth Device Code Phishing
        "In late April 2026, the eSentire Threat Response Unit (TRU) analyzed a phishing campaign that combines two trends TRU has tracked over the past year. The first is the continued operation of the Tycoon 2FA Phishing-as-a-Service (PhaaS) kit despite the March 2026 coalition takedown led by Microsoft and Europol in collaboration with eSentire and other industry partners; the second is the broader shift toward abusing OAuth Device Authorization Grant flows to compromise Microsoft 365 accounts."
        https://www.esentire.com/blog/tycoon-2fa-operators-adopt-oauth-device-code-phishing
        https://www.bleepingcomputer.com/news/security/tycoon2fa-hijacks-microsoft-365-accounts-via-device-code-phishing/
      • Scammers Send Physical Phishing Letters To Steal Ledger Wallet Seed Phrases
        "Crypto wallet owners using Ledger hardware wallets are being targeted through physical mail, with scammers impersonating the company in a campaign designed to steal recovery seed phrases. The operation uses printed letters that look official, complete with Ledger branding, a reference number, and a fake security notice warning recipients about an urgent “Quantum Resistance” update. One example of the scam circulating online shows an Italian language version addressed to a customer in Italy, suggesting the attackers are tailoring the campaign based on regional customer data. The letter claims users must complete a mandatory security upgrade for their Ledger device before a deadline or risk losing wallet functionality."
        https://hackread.com/scammers-physical-phishing-letters-ledger-wallet-seed/

      Breaches/Hacks/Leaks

      • American Lending Center Data Breach Affects 123,000 Individuals
        "American Lending Center this week revealed that a data breach discovered last year has impacted more than 123,000 individuals. American Lending Center (ALC) is a California-based non-bank lender that manages a $3 billion portfolio specializing in government-guaranteed small business loans. The organization is notifying individuals affected by the data breach that information such as names, dates of birth, and SSNs may have been stolen in a ransomware attack detected in July 2025."
        https://www.securityweek.com/american-lending-center-data-breach-affects-123000-individuals/
      • More Than $10 Million Stolen From Crypto Platform THORChain
        "Cryptocurrency platform THORChain said more than $10 million was stolen during a security incident on Friday morning. The cyberattack was first identified by blockchain security firm Peckshield and cryptocurrency investigator Zachary Wolk, who goes by the online alias ZachXBT. Around 6 am EST, both reported that more than 36 Bitcoin, worth about $3 million, and another $7 million in other coins was siphoned from THORChain. THORChain published its own statement shortly after confirming the incident."
        https://therecord.media/more-than-10-million-stolen-crypto-platform-thorchain
      • Grafana GitHub Token Breach Led To Codebase Download And Extortion Attempt
        "Grafana has disclosed that an "unauthorized party" obtained a token that granted them the ability to access the company's GitHub environment and download its codebase. "Our investigation has determined that no customer data or personal information was accessed during this incident, and we have found no evidence of impact to customer systems or operations," Grafana said in a series of posts on X. The company also said it immediately launched a forensic analysis upon discovering the activity and that it identified the source of the leak, adding the compromised credentials have since been invalidated, and extra security measures have been implemented to secure against unauthorized access."
        https://thehackernews.com/2026/05/grafana-github-token-breach-led-to.html
        https://hackread.com/grafana-source-code-theft-rejected-ransom-demand/

      General News

      • Pwn2Own Berlin 2026, Day One: $523,000 Paid Out, AI Products Fall
        "Day one of Pwn2Own Berlin 2026 featured 22 entries targeting widely used technologies, including browsers, operating systems, AI platforms, and NVIDIA infrastructure. By the end of the day, researchers demonstrated 24 unique zero-day vulnerabilities and earned a total of $523,000 in rewards, highlighting ongoing security risks across major enterprise and consumer software ecosystems. Orange Tsai of the DEVCORE Research Team made the headlines; he chained four separate logic bugs to escape the Microsoft Edge sandbox, a technically demanding achievement that earned him $175,000 and 17.5 Master of Pwn points in a single attempt. It was the kind of result that reminds you why this competition exists: not to embarrass vendors, but to surface flaws in controlled conditions before someone with worse intentions finds them first."
        https://securityaffairs.com/192183/hacking/pwn2own-berlin-2026-day-one-523000-paid-out-ai-products-fall.html
      • Microsoft Exchange, Windows 11 Hacked On Second Day Of Pwn2Own
        "During the second day of Pwn2Own Berlin 2026, competitors collected $385,750 in cash awards after exploiting 15 unique zero-day vulnerabilities in multiple products, including Windows 11, Microsoft Exchange, and Red Hat Enterprise Linux for Workstations. The Pwn2Own Berlin 2026 hacking competition takes place at the OffensiveCon conference from May 14 to May 16 and focuses on enterprise technologies and artificial intelligence. Security researchers can earn over $1,000,000 in cash and prizes by hacking fully patched products in the web browser, enterprise applications, cloud-native/container environments, virtualization, local privilege escalation, servers, local inference, and LLM categories."
        https://www.bleepingcomputer.com/news/security/pwn2own-day-two-hackers-demo-microsoft-exchange-windows-11-red-had-enterprise-linux-zero-days/
        https://securityaffairs.com/192209/security/pwn2own-berlin-2026-day-two-385750-more-microsoft-exchange-falls-and-the-running-total-crosses-900k.html
      • Pwn2Own Berlin 2026, Day Three: DEVCORE Crowned Master Of Pwn, $1.298 Million Total
        "Pwn2Own Berlin 2026 ended after three intense days, with participants discovering 47 unique zero-days, and earning $1,298,250 in total payouts. Pwn2Own Berlin 2026 wrapped up at OffensiveCon on Saturday with a final day that sealed DEVCORE’s dominance across every metric that matters. That's a wrap on Pwn2Own Berlin 2026! 🏆 $1,298,250 awarded. 47 unique 0-days. 3 days of absolute chaos. And talk about main character energy – congrats to DEVCORE for claiming Master of Pwn with 50.5 points and $505,000 – they never slowed down. See you next year! #Pwn2Own… pic.twitter.com/ZcWN8VPLDS — TrendAI Zero Day Initiative (@thezdi) May 16, 2026"
        https://securityaffairs.com/192250/hacking/pwn2own-berlin-2026-day-three-devcore-crowned-master-of-pwn-1-298-million-total.html
      • Microsoft Backpedals: Edge To Stop Loading Passwords Into Memory
        "Microsoft is updating the Edge web browser to ensure it no longer loads saved passwords into process memory in clear text at startup after previously stating it was "by design." This behavior was disclosed on May 4 by security researcher Tom Jøran Sønstebyseter Rønning, who demonstrated that all credentials stored in the Edge built-in password manager were decrypted on launch and kept in memory even when not in use. Rønning also released a proof-of-concept (PoC) tool that would allow attackers with Administrator privileges to dump passwords from other users' Edge processes (without admin privileges, the PoC only allows accessing Edge processes launched by the same user)."
        https://www.bleepingcomputer.com/news/microsoft/microsoft-edge-to-stop-loading-cleartext-passwords-in-memory-on-startup/
      • The Boring Stuff Is Dangerous Now
        "Are you freaking out? It feels like the entire industry is losing its head over the collision of two huge security pressures. First, every development team has suddenly been mandated to use AI coding tools, resulting in thousands of new bugs and misconfigurations. This has coincided with the announcement that, if Claude Mythos was unleashed, it would exploit every unknown vulnerability out there. It’s enough to make everyone from triagers and CISOs want to give up. Let’s consider how both scenarios play out, and what it means for vulnerability discovery, vulnerability management, and actual risk reduction."
        https://www.darkreading.com/cyber-risk/ai-code-and-agents-forces-defenders-adapt
      • The Next Cybersecurity Challenge May Be Verifying AI Agents
        "For the past two decades, cybersecurity has largely been a story about protecting humans from machines blocking malware, filtering phishing emails, companies mitigating DDoS attacks, and patching software vulnerabilities before attackers exploit them. The adversary was clear. The surface was known. The playbook, while imperfect, was at least legible, but that story is now changing. The next major frontier in cybersecurity is not defending against AI. It is figuring out how to trust it."
        https://hackread.com/next-cybersecurity-challenge-verifying-ai-agents/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) 068ff30d-5170-4a28-a399-89f3aa493977-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • พบช่องโหว่ Claw Chain ใน OpenClaw เสี่ยงขโมยข้อมูลและยกระดับสิทธิ์

      พบช่องโหว่ Claw Chain ใน OpenClaw เสี่ยงขโมยข้อมูลและย.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand e15d17e4-474f-4087-a2a8-1ac55beedd45-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • OpenAI ได้รับผลกระทบจาก Supply Chain Attack ผ่านแพ็กเกจ TanStack อันตราย

      OpenAI ได้รับผลกระทบจาก Supply Chain Attack ผ่านแพ็กเกจ TanStack .png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand d472e47f-dea7-44d3-afaf-c6a80a7286b5-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • พบช่องโหว่ร้ายแรงในปลั๊กอิน Funnel Builder บน WordPress ถูกใช้ฝังโค้ดขโมยข้อมูลบัตรเครดิตร้านค้าออนไลน์

      พบช่องโหว่ร้ายแรงในปลั๊กอิน Funnel Builder บน WordPress ถ.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 6d1c1bcc-5c48-4c13-a77a-78ce9c42a9e6-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT