#Canvas login portals for 15,000 institutions, including top universities like Harvard and Oxford, has exfiltrated 3.65 terabytes of student and faculty data in their boldest attempt at monetizing stolen data since announcing itself as #ShinyHunters in 2020.

This massive black hat #BigEdu data security attack runs alongside concurrent supply chain grift attacks on corporate players like #Vimeo #WynnResorts #Snowflake and #Zara, exposing critical flaws in #EdTech & #Corporate #InfoSec partcularly protocol for third-party vendor trust.

The nefarious #ShinyHunters cabal has infiltrated over 400+ organizations in #SAAS & #DRM data breaches including #Google #Salesforce #Workday, #Crunchbase, #Gucci, #Coinbase, and #Qantas airlines not to mention so called "Security" professionals such as #CrowdStrike and #ADT

https://www.pcmag.com/news/video-platform-vimeo-hacked-by-shinyhunters-gang

https://www.docontrol.io/blog/shinyhunters

https://www.securityweek.com/wynn-resorts-says-21000-employees-affected-by-shinyhunters-hack/

https://www.reco.ai/blog/shinyhunters-data-breach-vs-saas-why-dynamic-security-matters

Donuts and Beagles: Fake Claude site spreads backdoor

A fraudulent website impersonating Anthropic's Claude AI platform has been distributing a previously undocumented backdoor called Beagle through malvertising campaigns. The attack begins when victims download a fictitious tool named Claude-Pro Relay from claude-pro[.]com, delivered as a 505 MB ZIP archive. The infection chain utilizes DLL sideloading, exploiting a signed G DATA antivirus updater to load malicious code. The technique mirrors PlugX delivery methods but deploys different payloads. Beagle supports eight commands including shell execution, file transfer, and directory listing, communicating with C2 servers using AES encryption. Related samples dating to February 2026 have been identified, with some variants delivering AdaptixC2 framework. Additional domains impersonated security vendors like Trellix, CrowdStrike, and SentinelOne. The infrastructure spans Cloudflare for distribution and Alibaba Cloud for command and control.

Pulse ID: 69fcc63f1dce161fc2f8380c
Pulse Link: https://otx.alienvault.com/pulse/69fcc63f1dce161fc2f8380c
Pulse Author: AlienVault
Created: 2026-05-07 17:05:03

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #Cloud #CrowdStrike #CyberSecurity #Encryption #InfoSec #Malvertising #OTX #OpenThreatExchange #PlugX #SentinelOne #SideLoading #Trellix #ZIP #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

A CrowdStrike fortalece sua aliança global para mitigar riscos na IA generativa:

• Foco em detecção de vulnerabilidades
• Proteção de infraestruturas críticas
• Padronização de protocolos de segurança tecnológica

Inovação colaborativa para um futuro digital seguro. 🛡️💻

#CyberSecurity #GenerativeAI #CrowdStrike

⚠️ CrowdStrike says Cordial Spider and Snarky Spider are speeding through Scattered Spider’s playbook #CrowdStrike says the two Com-linked crews have targeted US organizations across academia, aviation and tech since at least Oct 2025, using vishing, fake SSO pages, MFA takeover and SaaS data theft.

Cybercrime Groups Exploit Vishing, SSO Abuse in SaaS Extortion Spree

Cybercrime groups are launching lightning-fast extortion attacks within trusted SaaS environments, exploiting vishing and SSO abuse to evade detection and strike with precision. By hiding in plain sight, they're creating significant challenges for defenders trying to keep up.

https://osintsights.com/cybercrime-groups-exploit-vishing-sso-abuse-in-saas-extortion-spree?utm_source=mastodon&utm_medium=social

#SaasExtortion #Vishing #SsoAbuse #CloudEconomy #Crowdstrike

Cybercrime Groups Exploit Vishing, SSO Abuse in SaaS Extortion Spree

Learn how cybercrime groups exploit vishing and SSO abuse in SaaS extortion attacks and protect your business from these threats today with expert insights.

OSINTSights

CrowdStrike makes a mistake, Windows Servers BSOD and fail to boot, Linux users observe...

https://watch.linuxrenaissance.com/w/xA4U2CE28qcQPYA4KFjRyM

CrowdStrike makes a mistake, Windows Servers BSOD and fail to boot, Linux users observe...

PeerTube
Critical bug in CrowdStrike LogScale let attackers access files

CrowdStrike fixed CVE-2026-40050 in LogScale self-hosted, a critical flaw allowing unauthenticated file access via path traversal.

Security Affairs
I'm so tired of endpoint agents that are supposed to provide visibility on what's happening, but that cannot monitor their own dumb behaviour.
Does #crowdstrike Falcon need to read /bin/sleep 100 times a second? No... It does not.
🛡️ CrowdStrike LogScale CRITICAL vuln (CVE-2026-40050): unauth path traversal — remote file read risk for self-hosted users. Tenable Nessus for Windows: HIGH vuln (CVE-2026-33694), file deletion & privilege escalation. Patch ASAP! https://radar.offseq.com/threat/vulnerabilities-patched-in-crowdstrike-tenable-pro-da7dee84 #OffSeq #Vuln #CrowdStrike #Tenable
Mythos, a powerful new AI model, signals a turning point in cybersecurity, where advanced AI tools may democratize powerful hacking capabilities faster than governments and companies can respond. https://www.japantimes.co.jp/commentary/2026/04/23/japan/ai-disruption-destroys-deterrence/?utm_medium=Social&utm_source=mastodon #commentary #japan #anthropic #ai #artificialintelligence #anthropic #claude #mythos #terminator #firefox #crowdstrike #openai #gpt53codex #cybersecurity
New AI tool reshapes the cybersecurity landscape

There appears to be consensus that Mythos represents a 'step change' in capability and is a taste of the new digital world that we now inhabit.

The Japan Times