
Loading summary
A
From the CISO series. It's Cybersecurity Headlines
B
these are the cybersecurity headlines for Thursday, May 14, 2026. I'm Sarah Lane Foxconn confirms North American factory attack Foxconn said that several North American factories were hit by a cyber attack claimed by the Nitrogen Ransomware Group, which which says it stole eight terabytes of data, including confidential files tied to customers like Apple, Intel, Google, Dell and Nvidia. Foxconn said it activated incident response measures and is restoring affected operations. The ransomware group continues to pressure some victims through data theft and file encryption. BitLocker zero day accesses protected drives A researcher known as Chaotic Eclipse or Nightmare Eclipse released proof of concept exploits exploits for two unpatched Windows Zero days, dubbed Yellow Key and Green Plasma, including a BitLocker bypass that can expose encrypted drives through the Windows recovery environment. Security researchers confirmed parts of the Yellow Key exploit, which abuses NTFS transaction logs to launch a command shell with access to unlocked BitLocker volumes on TPM only systems. The disclosure follows earlier leaked Windows exploits from the same researcher. M dash patches 16 Windows flaws Microsoft unveiled M Dash, a multimodal AI system that uses more than 100 specialized agents to discover and validate software vulnerabilities in Windows code bases, the company said. M dash identified 16 flaws patched in this month's Patch Tuesday release, including two critical remote code execution bugs affecting Windows networking and authentication components. This follows similar AI driven cybersecurity efforts from Anthropic and OpenAI. Mistral develops new AI model for banks Bloomberg sources say Mistral AI is developing a cybersecurity focused AI model for European banks, looking for alternatives to Anthropic's restricted access Mythos system. The company has reportedly been in talks with financial institutions concerned about AI driven cyber threats and Europe's limited access to advanced US Security models. Mistral CEO Arthur Mensch also argued that Europe needs domestic AI security tools to avoid dependence on foreign systems. Huge thanks to our sponsor Doppel Social engineering attacks look trustworthy A routine request? An internal email? A familiar face on a call. But Doppel sees through that disguise. Its AI native platform detects and disrupts attacks across every channel, while training employees to recognize deepfakes and deception. They fight relentlessly to protect your business, brand and your people. Doppel Outpacing what's next in social engineering? Learn more@doppl.com that's-o ppl.com XM mailer flaw allows remote code execution A critical remote code execution flaw was disclosed in the XM mail Server affecting versions 4.97 through 4.99.2, compiled with GNU TLS and certain SMTP features enabled. The vulnerability stems from a use after freebug during TLS shutdown that could let unauthenticated attackers execute commands as access emails and potentially access compromised environments, researchers at KBAO said. AI Assisted tools helped accelerate exploit development, though a human researcher ultimately produced the successful exploit. Bug Hunter tracks down three massive MCP flaws An Akamai researcher uncovered three major vulnerabilities in Model Context Protocol or MCP servers to tied to Apache Software Foundation, Doris Apache, pinot and Alibaba RDs that could allow SQL injection, sensitive data theft or full database compromise through AI connected systems. Apache patched an SQL injection flaw in Doris Pinot added optional OAUTH protections, but still has some unresolved issues. Alibaba reportedly declined to patch its RDS MCP vulnerability, which researchers say could expose some sensitive metadata through unauthenticated requests. Attackers weaponize Ruby Gems Socket Researchers uncovered a campaign dubbed Gem Stuffer that abuses the Ruby Gems packet registry as a dead drop system for exfiltrated data rather than traditional malware Delivery. More than 100 malicious gems scraped public facing UK government websites and uploaded the collected data back to RubyGems using using embedded API keys, letting attackers retrieve the information without dedicated command and control infrastructure, researchers warn. It highlights how software package registries could increasingly be abused as covert data transport layers in future supply chain attacks. Tables turn on the Gentlemen Check Point analyzed leaked internal data from the ransomware group the gentlemen after unknown hackers breached the gang's back end systems and and began selling 16 gigabytes of stolen data. The leak revealed a structured ransomware as a service operation led by an operator known as Zeta88, with specialized members handling reconnaissance, credential access negotiations and malware development with a 90 to 10 affiliate payout model. The group is said to rely on known vulnerabilities, common ransomware tooling and and some AI assisted development. All security startups will tell you they talk to potential customers. The problem is that you limit your development when you only talk to CISOs who might buy. It's not the same guidance you'll get from a CISO who advises. That's the start of our discussion on this week's episode of Defense In Depth. Look for the episode why Cyber Startups Need CISO Advisors wherever you get your podcasts. And if you have some thoughts on the news from today or about our show in general, be sure to reach out to us feedbackisoseries.com we really want to hear from you. I am Sarah Lane, reporting for the CISO series. You stay classy out there. I mean it.
A
Cybersecurity headlines are available every weekday. Head to cisoseries.com for the full stories. Behind the headlines.
B
It.
Host: Sarah Lane (CISO Series)
Episode Theme:
Today's episode delivers a rapid-fire briefing on major events in cybersecurity, highlighting new ransomware incidents, zero-days, AI-driven security advances, and evolving attack methods. Sarah Lane explores trending threat vectors, vendor updates, and research highlights shaping the info-sec landscape.
[00:10 – 01:00]
[01:00 – 01:45]
[01:46 – 02:10]
[02:11 – 02:41]
[03:08 – 03:35]
[03:36 – 04:06]
[04:07 – 04:37]
[04:38 – 05:08]
On Foxconn breach:
“...including confidential files tied to customers like Apple, Intel, Google, Dell and Nvidia.” [00:17]
On sectoral AI rivalry:
“Europe needs domestic AI security tools to avoid dependence on foreign systems.” – Arthur Mensch, relayed by Sarah Lane [02:37]
On software supply chain evolution:
“It highlights how software package registries could increasingly be abused as covert data transport layers in future supply chain attacks.” [04:34]
| Timestamp | Topic | |-----------|-----------------------------------------------------------| | 00:10 | Foxconn ransomware attack | | 01:00 | BitLocker & Windows zero-days | | 01:46 | Microsoft M Dash AI system | | 02:11 | Mistral AI’s banking model | | 03:08 | XM Mail RCE flaw | | 03:36 | Model Context Protocol (MCP) vulnerabilities | | 04:07 | Ruby Gems registry attack | | 04:38 | “The Gentlemen” ransomware group breached |
Today’s Cybersecurity Headlines episode delivers a sweeping overview of escalating impacts from emerging ransomware, supply chain attacks, and the growing footprint of AI in both offensive and defensive security. From headline-grabbing breaches like Foxconn to backend leaks of ransomware gangs, and from innovative AI tools finding Microsoft bugs to adversaries abusing open-source infrastructure for covert operations, the show concisely delivers what matters most for infosec practitioners.