CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◍ Incident Response & DFIR May 15, 2026

InfoSec News Nuggets 05/15/2026

AboutDFIR Archived May 15, 2026 ✓ Full text saved

Microsoft Warns of Exchange Server Zero-Day Exploited in the Wild Microsoft warned that attackers are exploiting CVE-2026-42897, an on-prem Exchange Server flaw affecting Exchange Subscription Edition, 2016, and 2019. The issue is a spoofing and cross-site scripting vulnerability that can be triggered through a specially crafted email viewed in Outlook Web Access under certain conditions. […] The post InfoSec News Nuggets 05/15/2026 appeared first on AboutDFIR - The Definitive Compendium Project

Full text archived locally
✦ AI Summary · Claude Sonnet


    By MaryOn May 15, 2026 Microsoft Warns of Exchange Server Zero-Day Exploited in the Wild Microsoft warned that attackers are exploiting CVE-2026-42897, an on-prem Exchange Server flaw affecting Exchange Subscription Edition, 2016, and 2019. The issue is a spoofing and cross-site scripting vulnerability that can be triggered through a specially crafted email viewed in Outlook Web Access under certain conditions. Exchange Online isn’t affected, but organizations running on-prem Exchange should apply Microsoft’s temporary mitigations, confirm Exchange Emergency Mitigation Service coverage, and watch for follow-on guidance until a permanent patch is available.   Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilities Cisco Talos is tracking active exploitation of CVE-2026-20182, an authentication bypass flaw in Cisco Catalyst SD-WAN Controller and Manager that can let a remote unauthenticated attacker gain administrative privileges. Talos ties the activity to UAT-8616 and says the same actor has attempted to add SSH keys, modify NETCONF configurations, and escalate privileges. This matters because SD-WAN control infrastructure sits close to routing, segmentation, and branch connectivity, so compromise can create broad operational and lateral movement risk.   Popular node-ipc npm Package Infected with Credential Stealer Socket found malicious versions of the widely used node-ipc npm package that contain obfuscated stealer and backdoor behavior. The affected versions are node-ipc 9.1.6, 9.2.3, and 12.0.1, and the malware attempts to fingerprint systems, read local files, package collected data, and exfiltrate it through attacker-controlled infrastructure. Development teams should block the affected versions, audit recent installs, and rotate exposed developer, cloud, CI/CD, and source control credentials if the package was used.   Help-Desk Lures Drop KongTuke’s Evolved ModeloRAT ReliaQuest reported that the KongTuke initial access broker has moved into external Microsoft Teams chats to impersonate help desk staff and push users into running malicious PowerShell commands. The campaign delivers an evolved ModeloRAT payload with stronger persistence, multiple access paths, and a more resilient command-and-control setup. This is practical for defenders because Teams federation and external chat permissions are now part of the initial access surface, not just collaboration settings.   Hackers exploit auth bypass flaw in Burst Statistics WordPress plugin Attackers are exploiting CVE-2026-8181, a critical authentication bypass flaw in the Burst Statistics WordPress plugin that can allow admin impersonation through REST API requests. The plugin is active on roughly 200,000 WordPress sites, and Wordfence reported thousands of blocked attacks shortly after disclosure. Site owners should update to version 3.4.2 or disable the plugin, then review admin accounts, new user creation, redirects, and unexpected plugin or theme changes. CATEGORIESInfoSec News Nuggets TAGSAboutDFIRBurst Statisticsnews nuggetsSocket SHARE FACEBOOK TWITTER LINKEDIN PINTEREST STUMBLEUPON EMAIL
    💬 Team Notes
    Article Info
    Source
    AboutDFIR
    Category
    ◍ Incident Response & DFIR
    Published
    May 15, 2026
    Archived
    May 15, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗