
Eric Foster
2.3K posts

Eric Foster
@performify
CEO @TENEXai - The AI SOC Company. The only AI-native MDR led by operators w/ founding engineers from hyperscalers + AI labs. Named #1 fastest-growing cyber co.


Security things from the last few days: - CopyFail (linux pwn'd) - CopyFail 2/Dirty Frag - 13 advisories in Next.js - Over 70 CVEs addressed in MacOS 26.5 - ~50 CVEs addressed in iOS 26.5 - YellowKey (Windows Bitlocker pwn'd entirely) - GreenPlasma (Windows privilege escalation) - CVE-2026-21510 and CVE-2026-21513 confirmed to be used by Russia for Windows RCE - CVE-2026-32202 separately confirmed to be used by Russia for sensitive document access - Mini-Shai Hulud (over 300 JS and Python packages compromised via GitHub Action cache poisoning) - Google confirms they have identified AI-powered exploitation of zero days in an unidentified "open-source, web-based system administration too" - Canvas (popular LMS used in most schools) pwn'd entirely - PAN-OS (palo alto networks) pwn'd with a 9.3 severity CVE-2026-0300 Are you scared yet?

The Google Threat Intelligence Group has detected the first known instance of a threat actor using an AI-developed zero-day exploit in the wild. While the attackers planned a wide-scale strike, our proactive counter-discovery may have prevented that from happening. This finding is part of our new report on AI-powered threats.


Microsoft is investigating mistralai PyPI package v2.4.6 compromise. Attackers injected code in mistralai/client/__init__.py that executes on import, downloads hxxps://83[.]142[.]209[.]194/transformers.pyz to /tmp/transformers.pyz, and launches a second-stage payload on Linux. The file name transformers.pyz appears deliberately chosen to mimic the widely used Hugging Face Transformers library and blend into ML/dev environments. The main payload is a credential stealer, but it also includes country-aware logic; it avoids Russian-language environments and contains a geo fenced destructive branch that has 1-in-6 chance of executing rm -rf / when the system appears to be in Israel or Iran. To mitigate this threat: isolate affected Linux hosts, block 83[.]142[.]209[.]194, hunt for /tmp/transformers.pyz, pgmonitor[.]py, and pgsql-monitor.service, and rotate exposed credentials.





🚨 Update: Mini Shai-Hulud supply chain attack is back and hit the TanStack npm ecosystem today. At least 84 packages were compromised in two waves starting at 19:20 UTC. @tanstack/react-router, @tanstack/history, @tanstack/router-core, and dozens more across tens of millions of weekly downloads. This is likely from the same TeamPCP campaign behind the SAP npm compromise two weeks ago. If you ran npm install on any @ tanstack package today, treat your environment as compromised. Rotate GitHub tokens, npm tokens, cloud credentials, and CI secrets immediately. Tanner Linsley confirmed affected versions have been unpublished.


🚨 Active supply chain attack hitting SAP’s CAP ecosystem on npm. Four packages tied to SAP’s Cloud Application Programming Model just shipped versions with a new preinstall script that downloads and executes a platform-specific binary. These packages never required this before today. Affected versions: • mbt@1.2.48 • @cap-js/db-service@2.10.1 • @cap-js/postgres@2.2.2 • @cap-js/sqlite@2.2.2 Combined, these packages see 570K+ weekly downloads. @cap-js/db-service and @cap-js/sqlite alone account for ~510K of that. If you’re building on SAP BTP or using MTA deployment pipelines, check your lockfiles now. The compromised versions added a preinstall script that acts as a bootstrapper: it downloads a Bun ZIP from GitHub Releases, extracts it, and immediately executes the binary. It follows HTTP redirects without validating the destination. On Windows, it invokes PowerShell with -ExecutionPolicy Bypass. All four versions were published within a ~2.5 hour window this morning (April 29, UTC). At least one version (@cap-js/sqlite@2.2.2) has already been unpublished. Socket flagged the malicious behavior and is continuing to investigate. If you’re affected: • Do not install the affected versions • Pin to previous known-good versions • Rotate any credentials or tokens exposed in build/dev environments • Review CI/CD logs for unexpected network calls or binary execution Developing story…

















