What you need to know today.
CISA has added a critical Cisco Catalyst SD-WAN controller authentication bypass to its Known Exploited Vulnerabilities catalog due to active exploitation.
Researchers at the Vector Institute warn that current deepfake detection methods are failing to keep pace with the rapid evolution of generative AI models.
Researchers have identified "zombie linkages" in expired domains, where systems continue to trust original owners long after they have lost control of the domain.
The latest Risky Business podcast episode explores the practical role of AI in cloud security, arguing that AI is augmenting rather than replacing traditional security tools.
A new report indicates that organizations in 2026 are prioritizing proven ROI over rapid AI adoption, leading to increased focus on in-house solutions for security and compliance.
The SANS Internet Storm Center provides its daily security digest for Friday, May 15th, 2026.
This week's infosec product roundup features updates from Alation, Apricorn, Versa Networks, and TrustCloud, with a focus on new AI-driven capabilities.
CISA has added the critical authentication bypass vulnerability CVE-2026-20182 in Cisco Catalyst SD-WAN to its Known Exploited Vulnerabilities (KEV) catalog following confirmed active exploitation.
A Taiwanese student's software-defined radio experiment caused a significant disruption to the local rail system, leading to an anti-terrorism response.
The TeamPCP hacker group is threatening to leak stolen Mistral AI source code unless a buyer is found for the data.
A critical vulnerability in cPanel is currently being leveraged by threat actors in active campaigns to deploy file manager backdoors on compromised servers. This poses a significant risk to web hosting environments, allowing unauthorized access and potential data exfiltration. Organizations using cPanel are urged to apply the latest security patches immediately to mitigate the risk of compromise CVE-2026-41940, CVE-2026-32199, CVE-2026-32200. www.helpnetsecurity.com
Cisco has released patches for a critical SD-WAN vulnerability that has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog due to active exploitation in the wild. This marks the sixth zero-day affecting Cisco's SD-WAN products in 2026, highlighting a persistent threat to network infrastructure. Administrators must prioritize patching to prevent unauthorized administrative access to their systems CVE-2026-20182, CVE-2026-41586. www.helpnetsecurity.com
Researchers have detailed "Fragnesia," a new privilege escalation vulnerability within the Linux kernel's XFRM ESP-in-TCP implementation. This flaw allows local attackers to escalate privileges on affected systems, posing a serious risk to Linux-based environments. Users are advised to update their kernels to the latest patched versions to defend against potential exploitation CVE-2026-46300. www.tenable.com
cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
May 2026: This security advisory provides the details and fix information for a vulnerability that was discovered and fixed after the was disclosed in February 2026. This new advisory is for a new vulnerability in the control connection handshaking. The section of this advisory includes Show Control Connections guidance to help with system checks. A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to the affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.
An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.81.16 to before version 1.83.7, a database query used during proxy API key checks mixed the caller-supplied key value into the query text instead of passing it as a separate parameter. An unauthenticated attacker could send a specially crafted Authorization header to any LLM API route (for example POST /chat/completions) and reach this query through the proxy's error-handling path. An attacker could read data from the proxy's database and may be able to modify it, leading to unauthorised access to the proxy and the credentials it manages. This issue has been patched in version 1.83.7.
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.
A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. The risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal per the best practice guidelines https://knowledgebase.paloaltonetworks.com/KCSArticleDetail by restricting access to only trusted internal IP addresses. Prisma Access, Cloud NGFW and Panorama appliances are not impacted by this vulnerability.