CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◍ Incident Response & DFIR May 14, 2026

InfoSec News Nuggets 05/14/2026

AboutDFIR Archived May 14, 2026 ✓ Full text saved

Hackers Targeted PraisonAI Vulnerability Hours After Disclosure Attackers began probing for CVE-2026-44338, a PraisonAI authentication bypass flaw, less than four hours after public disclosure. The issue affects PraisonAI versions 2.5.6 through 4.6.33 when the legacy Flask API server is exposed with authentication disabled by default. This matters because exposed AI agent frameworks can trigger configured […] The post InfoSec News Nuggets 05/14/2026 appeared first on AboutDFIR - The Definitive C

Full text archived locally
✦ AI Summary · Claude Sonnet


    By MaryOn May 14, 2026 Hackers Targeted PraisonAI Vulnerability Hours After Disclosure Attackers began probing for CVE-2026-44338, a PraisonAI authentication bypass flaw, less than four hours after public disclosure. The issue affects PraisonAI versions 2.5.6 through 4.6.33 when the legacy Flask API server is exposed with authentication disabled by default. This matters because exposed AI agent frameworks can trigger configured workflows, and the impact depends on what those agents are allowed to access or do. Organizations using PraisonAI should update to version 4.6.34 and confirm agent APIs aren’t reachable without authentication.   18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE Researchers disclosed CVE-2026-42945, a critical heap buffer overflow in the NGINX rewrite module that has existed for 18 years. The flaw can be triggered through crafted HTTP requests and may allow unauthenticated remote code execution or denial of service under certain conditions. This is worth prioritizing because NGINX is widely used in internet-facing web infrastructure, reverse proxies, ingress controllers, and application delivery stacks. Teams should update affected NGINX and F5 components and review rewrite rules that use unnamed captures.   Windows BitLocker zero-day gives access to protected drives, PoC released A researcher released proof-of-concept exploits for two unpatched Windows issues named YellowKey and GreenPlasma. YellowKey can bypass BitLocker protection in certain TPM-only configurations by abusing Windows Recovery Environment behavior, while GreenPlasma is a privilege escalation issue tied to Windows CTFMON. The practical concern is that public exploit code can move quickly from research into attacker testing, especially since prior leaks from the same researcher were later exploited in the wild. Security teams should track Microsoft guidance, review BitLocker configurations, and avoid relying on TPM-only protection for high-risk systems.   Sandworm Activity in Industrial Environments: What the Data Reveals Nozomi Networks analyzed more than 5.5 million alerts from 10 industrial organizations and identified 29 confirmed Sandworm-related events. The research found that affected systems often produced weeks or months of warning signs before Sandworm activity, including EternalBlue, Cobalt Strike, RAT activity, and Log4Shell indicators. The key takeaway for OT and critical infrastructure teams is that Sandworm doesn’t need zero-days when environments already have unresolved compromise paths, and detection alone isn’t enough if containment is slow.   FamousSparrow APT Targets Azerbaijani Oil and Gas Industry Bitdefender reported a multi-wave espionage campaign against an Azerbaijani oil and gas company, attributed with moderate-to-high confidence to the China-linked FamousSparrow threat group. The attackers repeatedly returned through the same vulnerable Microsoft Exchange entry point and deployed Deed RAT and Terndoor across multiple waves. This matters for energy sector defenders because the incident shows how incomplete remediation can leave the original access path open, allowing a capable actor to return with new tooling after defenders remove the visible malware. CATEGORIESInfoSec News Nuggets TAGSAboutDFIRnews nuggetsNGINXPraisonAI SHARE FACEBOOK TWITTER LINKEDIN PINTEREST STUMBLEUPON EMAIL
    💬 Team Notes
    Article Info
    Source
    AboutDFIR
    Category
    ◍ Incident Response & DFIR
    Published
    May 14, 2026
    Archived
    May 14, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗