Cyber Threat Digest · May 20, 2026
Exploit Releases
- 🔥 DirtyDecrypt PoC: Proof-of-concept exploit code has now been released for the recently patched Linux kernel CVE-2026-31635...

Created by Elhanan S. Abrams
Latest vulnerability, exploit, and malware analysis for researchers and SOC professionals
Explore the latest content tracked by Cyber Threat Digest
This video delivers a concise, end-to-end demo of the VulnHub Basic Pentesting 1 lab, ideal for researchers sharpening practical skills.
-...
Joe Slowik shares frontline insights from Navy cyber ops and roles at MITRE, Dragos, and Dataminr.
Traditional speed-focused patching misses the mark on effective vulnerability management. A new white paper delivers practical guidance for SOC teams...
SOAP quietly powers critical billing and document systems, creating blind spots for security teams that assume legacy protocols are no longer...
Infor CISO Mignona Cote's RSAC 2026 interview stresses that AI agents embedded in enterprise apps represent an expanding internal threat vector.
Key...
Grudge-driven actor Nightmare-Eclipse has released six Windows zero-days in six weeks, directly targeting Microsoft Defender and BitLocker with local...
AI-powered vulnerability scanning now removes any excuse for companies to claim ignorance of bugs in their products, according to ENISA's chief...
Dr. Prasad Calyam examines AI's dual-use role in cybersecurity as both defender asset and attacker tool during his 2026 Mizzou Engineering Research...
Critical flaws in the SEPPMail Secure E-Mail Gateway virtual appliance enable remote code execution and arbitrary mail access.
Researchers disclosed 47 unique zero-days across AI databases, coding agents, browsers, and enterprise software at Pwn2Own Berlin, accelerating industry-wide remediation through Trend Micro's Zero Day Initiative.
AI is driving an explosion in vulnerabilities and attacker capabilities, forcing defenders back to fundamentals while adopting smarter automation.
-...
After 16 years without protection, Microsoft's new Entra Backup and Recovery is not full tenant DR or point-in-time recovery but a configuration drift...
A compromised maintainer account enabled attackers to flood AntV and related packages with the Mini-Shai-Hulud worm.
AI governance programs are struggling as decentralized SaaS adoption outpaces visibility and controls.
A public PoC exploit called DirtyDecrypt has been released for the recently patched Linux kernel vulnerability CVE-2026-31635, enabling local...
Automated analysis of the sparc.elf sample confirms Bashlite as a Linux malware family built to launch DDoS attacks. Researchers gain clear confirmation of its infection vector and botnet purpose for detection tuning.
Mythos Preview stunned UK evaluators in early 2026 by completing multi-step network attacks and ICS disruptions, prompting the first national approval...
A fresh Mini Shai-Hulud campaign hit the @antv namespace with 42 malicious npm packages, compromising dormant high-download packages via stolen tokens...
Traditional rule-based defenses fall short against today's automated, intelligent attacks. Organizations are shifting to autonomous AI systems that...