Transcript
A (0:00)
From the CISO series. It's Cybersecurity Headlines
B (0:07)
these are the cybersecurity headlines for Tuesday, May 5, 2026. I'm Sarah Lane. Instructure discloses breach amid leak threats Education software provider Instructure disclosed a cyber attack that disrupted services tied to API keys and led to a data breach affecting its Canvas platform. Attackers accessed names, email addresses, student IDs and user messages, though the company says passwords and financial data weren't involved. Instructure says its rotated keys, revoked credentials and contained the situation with outside forensic support. The Shiny Hunters group claims responsibility, alleging it stole 3.65 terabytes of data tied to as many as 275 million users across nearly 9,000 institutions. DigiCert revokes Certificates Digicert disclosed a malware attack delivered via a customer support chat, infecting internal systems and pivoting into its support portal to obtain EV code signing certificates. The attackers exploited access to initialization codes and approved orders to generate certificates. Some were used to sign malware, prompting the company to revoke about 60 certificates and cancel affected orders. Digicert says it contained the incident, found no broader system compromise and has since tightened controls like MFA and restricting support portal access and file uploads. Silver Fox Targets Indian and Russian orgs China Linked Advanced Persistent Threat, or APT Group Silver Fox launched a phishing campaign targeting organizations in India and Russia using tax themes emails to deliver malware, including the newly identified ABC Door Backdoor and the already known Valley Rat. Researchers at Kaspersky observed more than 1600 malicious messages with attacks using spoofed government notices and malicious archives to gain access and establish persistence with stealthy remote controls. New wave of Cargo Theft the FBI is warning cyber enabled cargo theft is increasing with phishing fake websites and compromised accounts impersonating logistics firms to hijack shipments. Criminals infiltrate broker and carrier systems, post fraudulent load listings, reroute deliveries and then resell stolen goods. Losses in the US and Canada reached around $725 million in 2025, alongside rising incident severity. Researchers at Proofpoint link the activity to organized crime. Huge thanks to our sponsor, Vanta, risk and regulation are ramp up and customers expect proof of security just to do business. Vanta's automation brings compliance, risk and customer trust together on one AI powered platform. So whether you're prepping for a SoC2 or running an enterprise GRC program, Vanta keeps you secure and keeps your deals moving. Learn more@vanta.com CISO World Leaks claims breach of Hungarian firm Ransomware Group World Leaks says it breached Hungary's media works leaking about 8.5 terabytes of allegedly sensitive data, including payroll records, contracts and internal communications. Media Works confirmed the incident and launched an investigation with warning that using the stolen data could be illegal. While independent outlets reported the leak may include politically sensitive editorial discussions tied to Russia. The group is known as a rebrand of Hunters International and focuses on data theft and extortion. Simple Help and Screen Connect Go Fish. A phishing campaign dubbed Venomous Helper has has targeted more than 80 organizations, mostly in the US using spoofed Social Security Administration emails to trick victims into installing legitimate RMM tools like Simple Help and Screen Connect. Researchers at Securinex say attackers use these tools to establish persistent, stealthy remote access with redundant control channels allowing file transfers, command execution and undetected lateral movement. Pytorch Lightning drops Credential Stealer A malicious version of Pytorch Lightning on Pypi executed a hidden supply chain attack that ran an obfuscated JavaScript payload after import. The payload was identified by Microsoft as Shy worm and steals credentials from browsers, files, files, tokens and cloud services, along with arbitrary command execution. The impact seems limited, but the package has been rolled Back to version 2.6.1. Affected users are urged to rotate all secrets Shocking News Kids can circumvent age checks Research from Internet Matters finds the UK's new online safety act age checks are largely ineffective, with 46% of children polled saying they're easy to bypass, using tactics like fake birthdays, a borrowed ID, or even disguises like a mustache. The survey of more than 1,000 families also shows 32% of kids have bypassed controls 17% of parents admit helping do so. Despite the new rules, 49% of children still report encountering harmful content. Early research is showing that AI provides clear productivity gains, but the ROI is harder to pinpoint. Almost all LLMs will confidently produce seemingly high quality output. But are we setting ourselves up for failure when we mistake confidence for accuracy? That is what we're digging into on the latest episode of the CISO series podcast. Look for the episode AI Confidence. It's a trap wherever you get your podcasts. And if you have thoughts on the news from today or about our show in general, be sure to reach out to us feedbackisoseries.com we'd love to hear from you. I'm Sarah Lane reporting for the CISO series. Stay safe out there and we'll talk to you tomorrow.
