<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Blog</title>
    <link>https://fieldeffect.com/blog</link>
    <description>Looking for the latest info on cyber security? Keep up to date with industry research, news, and thought leadership on the Field Effect blog.</description>
    <language>en</language>
    <pubDate>Fri, 22 May 2026 18:44:58 GMT</pubDate>
    <dc:date>2026-05-22T18:44:58Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Maximum-severity UniFi OS vulnerabilities enable full network takeover</title>
      <link>https://fieldeffect.com/blog/unifi-os-vulnerabilities-patches</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/unifi-os-vulnerabilities-patches" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="Maximum-severity UniFi OS vulnerabilities enable full network takeover" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Ubiquiti has released patches for three maximum-severity UniFi Operating System vulnerabilities that allow unauthenticated remote access to network management infrastructure. The flaws enable unauthorized changes, file access, and command execution, creating a direct path to full system compromise. Organizations running exposed or poorly segmented UniFi environments face elevated risk due to the scale of internet‑accessible deployments and the central role these systems play in network control.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/unifi-os-vulnerabilities-patches" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="Maximum-severity UniFi OS vulnerabilities enable full network takeover" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Ubiquiti has released patches for three maximum-severity UniFi Operating System vulnerabilities that allow unauthenticated remote access to network management infrastructure. The flaws enable unauthorized changes, file access, and command execution, creating a direct path to full system compromise. Organizations running exposed or poorly segmented UniFi environments face elevated risk due to the scale of internet‑accessible deployments and the central role these systems play in network control.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Funifi-os-vulnerabilities-patches&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Fri, 22 May 2026 18:44:58 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/unifi-os-vulnerabilities-patches</guid>
      <dc:date>2026-05-22T18:44:58Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Cisco Secure Workload API flaw creates cross-tenant exposure risk</title>
      <link>https://fieldeffect.com/blog/cisco-secure-workload-api-flaw-creates-cross-tenant-exposure-risk</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/cisco-secure-workload-api-flaw-creates-cross-tenant-exposure-risk" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Cisco Secure Workload API flaw creates cross-tenant exposure risk" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Cisco disclosed a critical vulnerability in Cisco Secure Workload that allows an unauthenticated threat actor to gain &lt;em&gt;Site Admin&lt;/em&gt; privileges through crafted API requests, with a maximum CVSS score. The flaw affects both SaaS and on‑premises deployments and enables access to sensitive data and configuration changes across tenant boundaries, creating exposure in shared environments. Remediation requires upgrading to fixed versions, as no workarounds are available and the vulnerability directly impacts the platform’s security control plane.&amp;nbsp;&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/cisco-secure-workload-api-flaw-creates-cross-tenant-exposure-risk" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Cisco Secure Workload API flaw creates cross-tenant exposure risk" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Cisco disclosed a critical vulnerability in Cisco Secure Workload that allows an unauthenticated threat actor to gain &lt;em&gt;Site Admin&lt;/em&gt; privileges through crafted API requests, with a maximum CVSS score. The flaw affects both SaaS and on‑premises deployments and enables access to sensitive data and configuration changes across tenant boundaries, creating exposure in shared environments. Remediation requires upgrading to fixed versions, as no workarounds are available and the vulnerability directly impacts the platform’s security control plane.&amp;nbsp;&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fcisco-secure-workload-api-flaw-creates-cross-tenant-exposure-risk&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Thu, 21 May 2026 20:53:37 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/cisco-secure-workload-api-flaw-creates-cross-tenant-exposure-risk</guid>
      <dc:date>2026-05-21T20:53:37Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Leaked Shai-Hulud malware fuels wave of npm credential theft campaigns</title>
      <link>https://fieldeffect.com/blog/leaked-shai-hulud-malware</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/leaked-shai-hulud-malware" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Leaked Shai-Hulud malware fuels wave of npm credential theft campaigns" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Threat actors are escalating the Shai‑Hulud campaign by combining leaked malware code with compromised npm packages, enabling rapid, large‑scale credential theft across developer environments. The shift from typosquatted packages to trusted package compromise allows malicious code to propagate through normal dependency updates, increasing exposure across CI/CD pipelines and cloud infrastructure. This activity highlights a growing supply chain risk where trusted software components can become a primary vector for widespread credential compromise and follow‑on attacks.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/leaked-shai-hulud-malware" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Leaked Shai-Hulud malware fuels wave of npm credential theft campaigns" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Threat actors are escalating the Shai‑Hulud campaign by combining leaked malware code with compromised npm packages, enabling rapid, large‑scale credential theft across developer environments. The shift from typosquatted packages to trusted package compromise allows malicious code to propagate through normal dependency updates, increasing exposure across CI/CD pipelines and cloud infrastructure. This activity highlights a growing supply chain risk where trusted software components can become a primary vector for widespread credential compromise and follow‑on attacks.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fleaked-shai-hulud-malware&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Tue, 19 May 2026 20:03:08 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/leaked-shai-hulud-malware</guid>
      <dc:date>2026-05-19T20:03:08Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Microsoft Exchange Server flaw actively exploited, no patch available</title>
      <link>https://fieldeffect.com/blog/microsoft-exchange-server-flaw-actively-exploited-no-patch-available</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/microsoft-exchange-server-flaw-actively-exploited-no-patch-available" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Microsoft Exchange Server flaw actively exploited, no patch available" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Active exploitation of a high-severity vulnerability in on-premises Microsoft Exchange Server exposes organizations using Outlook Web Access to session-level compromise through a crafted email. There is no patch currently available, and organizations rely on Microsoft’s mitigations and validation of coverage across affected systems. Organizations relying on webmail access need to act now to confirm mitigation is in place and reduce exposure while a permanent fix is developed.&amp;nbsp;&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/microsoft-exchange-server-flaw-actively-exploited-no-patch-available" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Microsoft Exchange Server flaw actively exploited, no patch available" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Active exploitation of a high-severity vulnerability in on-premises Microsoft Exchange Server exposes organizations using Outlook Web Access to session-level compromise through a crafted email. There is no patch currently available, and organizations rely on Microsoft’s mitigations and validation of coverage across affected systems. Organizations relying on webmail access need to act now to confirm mitigation is in place and reduce exposure while a permanent fix is developed.&amp;nbsp;&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fmicrosoft-exchange-server-flaw-actively-exploited-no-patch-available&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Fri, 15 May 2026 16:18:35 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/microsoft-exchange-server-flaw-actively-exploited-no-patch-available</guid>
      <dc:date>2026-05-15T16:18:35Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Apache HTTP/2 flaw exposes unpatched servers to possible code execution</title>
      <link>https://fieldeffect.com/blog/apache-http/2-flaw</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/apache-http/2-flaw" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Apache HTTP/2 flaw exposes unpatched servers to possible code execution" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Apache HTTP Server vulnerability CVE-2026-23918 exposes unpatched systems to denial of service and, in some configurations, remote code execution. The issue affects Apache HTTP Server 2.4.66 when HTTP/2 traffic is accepted, a condition common in standard internet-facing deployments. Organizations benefit from confirming HTTP/2 usage and prioritizing an update to version 2.4.67 to remove exposure at the web tier.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/apache-http/2-flaw" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Apache HTTP/2 flaw exposes unpatched servers to possible code execution" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Apache HTTP Server vulnerability CVE-2026-23918 exposes unpatched systems to denial of service and, in some configurations, remote code execution. The issue affects Apache HTTP Server 2.4.66 when HTTP/2 traffic is accepted, a condition common in standard internet-facing deployments. Organizations benefit from confirming HTTP/2 usage and prioritizing an update to version 2.4.67 to remove exposure at the web tier.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fapache-http%2F2-flaw&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Fri, 15 May 2026 12:50:57 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/apache-http/2-flaw</guid>
      <dc:date>2026-05-15T12:50:57Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Microsoft Office update fixes Word RCE triggered via Outlook emails</title>
      <link>https://fieldeffect.com/blog/word-rce-via-outlook-emails</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/word-rce-via-outlook-emails" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="Microsoft Office update fixes Word RCE triggered via Outlook emails" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Microsoft’s May 12, 2026 Patch Tuesday updates address a Microsoft Word remote code execution vulnerability, CVE-2026-40361, that can be triggered through Outlook when rendering a malicious email. The flaw allows code execution on the affected endpoint without user interaction, creating risk of data access, credential theft, and post-compromise activity under the user’s privileges. Microsoft Office updates remediate the vulnerability, and systems without the updated Office components remain exposed even if Windows is fully patched.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/word-rce-via-outlook-emails" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="Microsoft Office update fixes Word RCE triggered via Outlook emails" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Microsoft’s May 12, 2026 Patch Tuesday updates address a Microsoft Word remote code execution vulnerability, CVE-2026-40361, that can be triggered through Outlook when rendering a malicious email. The flaw allows code execution on the affected endpoint without user interaction, creating risk of data access, credential theft, and post-compromise activity under the user’s privileges. Microsoft Office updates remediate the vulnerability, and systems without the updated Office components remain exposed even if Windows is fully patched.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fword-rce-via-outlook-emails&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Thu, 14 May 2026 12:41:56 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/word-rce-via-outlook-emails</guid>
      <dc:date>2026-05-14T12:41:56Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Critical Exim flaw enables remote code execution on GnuTLS builds</title>
      <link>https://fieldeffect.com/blog/critical-exim-flaw-gnutls-builds</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/critical-exim-flaw-gnutls-builds" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Critical Exim flaw enables remote code execution on GnuTLS builds" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; On May 12, 2026, Exim released a security update to fix a critical vulnerability that can allow unauthenticated remote compromise of affected email servers. The issue affects Exim 4.97-4.99.2 on Debian, Ubuntu, and some Debian‑derived distributions where Exim is built with GnuTLS. The only effective resolution is upgrading to Exim 4.99.3 or applying distribution-provided security patches.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/critical-exim-flaw-gnutls-builds" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Critical Exim flaw enables remote code execution on GnuTLS builds" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; On May 12, 2026, Exim released a security update to fix a critical vulnerability that can allow unauthenticated remote compromise of affected email servers. The issue affects Exim 4.97-4.99.2 on Debian, Ubuntu, and some Debian‑derived distributions where Exim is built with GnuTLS. The only effective resolution is upgrading to Exim 4.99.3 or applying distribution-provided security patches.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fcritical-exim-flaw-gnutls-builds&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Tue, 12 May 2026 20:01:49 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/critical-exim-flaw-gnutls-builds</guid>
      <dc:date>2026-05-12T20:01:49Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Session hijacking: What it is and how to prevent it</title>
      <link>https://fieldeffect.com/blog/session-hijacking</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/session-hijacking" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20Generic%203.png" alt="Session hijacking: What it is and how to prevent it" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Most people don't think twice after they log into a website. They enter a password, click "Sign In," and move on with their day. But behind the scenes, something more fragile is happening, and threat actors know it.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/session-hijacking" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20Generic%203.png" alt="Session hijacking: What it is and how to prevent it" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Most people don't think twice after they log into a website. They enter a password, click "Sign In," and move on with their day. But behind the scenes, something more fragile is happening, and threat actors know it.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fsession-hijacking&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity education</category>
      <category>From the experts</category>
      <pubDate>Tue, 12 May 2026 18:15:09 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/session-hijacking</guid>
      <dc:date>2026-05-12T18:15:09Z</dc:date>
      <dc:creator>Sebastien Peterson</dc:creator>
    </item>
    <item>
      <title>Canvas login portal incident led to widespread disruption</title>
      <link>https://fieldeffect.com/blog/canvas-login-portal-incident</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/canvas-login-portal-incident" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Canvas login portal incident led to widespread disruption" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; The Canvas incident escalated into a vendor-side outage during critical academic periods, disrupting exams, coursework access, and institutional operations across thousands of schools globally. While the technical breach and login-portal defacements occurred entirely within Instructure’s environment, the visibility and timing amplified operational disruption and uncertainty for educators and students. Instructure stated that the data was returned and customers would not be separately extorted, however institutions should expect downstream risks such as targeted phishing.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/canvas-login-portal-incident" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Canvas login portal incident led to widespread disruption" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; The Canvas incident escalated into a vendor-side outage during critical academic periods, disrupting exams, coursework access, and institutional operations across thousands of schools globally. While the technical breach and login-portal defacements occurred entirely within Instructure’s environment, the visibility and timing amplified operational disruption and uncertainty for educators and students. Instructure stated that the data was returned and customers would not be separately extorted, however institutions should expect downstream risks such as targeted phishing.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fcanvas-login-portal-incident&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Tue, 12 May 2026 16:54:38 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/canvas-login-portal-incident</guid>
      <dc:date>2026-05-12T16:54:38Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Dirty Frag Linux kernel flaw disclosed, active exploitation observed</title>
      <link>https://fieldeffect.com/blog/dirty-frag-linux-kernel-vulnerability-disclosed-active-exploitation-observed</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/dirty-frag-linux-kernel-vulnerability-disclosed-active-exploitation-observed" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Dirty Frag Linux kernel flaw disclosed, active exploitation observed" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Dirty Frag is a Linux kernel vulnerability that allows a threat actor with limited access to escalate privileges to full root by modifying trusted system files only in memory, bypassing disk‑based security controls. Microsoft observed Dirty Frag being used in post‑compromise activity, increasing the likelihood that an initial foothold on a Linux system can quickly lead to complete system takeover across servers, cloud workloads, and containers.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/dirty-frag-linux-kernel-vulnerability-disclosed-active-exploitation-observed" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Dirty Frag Linux kernel flaw disclosed, active exploitation observed" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Dirty Frag is a Linux kernel vulnerability that allows a threat actor with limited access to escalate privileges to full root by modifying trusted system files only in memory, bypassing disk‑based security controls. Microsoft observed Dirty Frag being used in post‑compromise activity, increasing the likelihood that an initial foothold on a Linux system can quickly lead to complete system takeover across servers, cloud workloads, and containers.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fdirty-frag-linux-kernel-vulnerability-disclosed-active-exploitation-observed&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Fri, 08 May 2026 18:36:14 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/dirty-frag-linux-kernel-vulnerability-disclosed-active-exploitation-observed</guid>
      <dc:date>2026-05-08T18:36:14Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>OPNsense addresses code execution issue with POC available</title>
      <link>https://fieldeffect.com/blog/opnsense-code-execution-issue-poc-available</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/opnsense-code-execution-issue-poc-available" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="OPNsense addresses code execution issue with POC available" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; OPNsense has released fixes for two vulnerabilities that affect firewall management security, both disclosed with publicly available POCs. One flaw allows repeated login attempts without triggering lockouts, increasing exposure to credential‑guessing attacks, while a second, higher‑severity issue can allow full firewall takeover if an account with XMLRPC privileges is compromised. With exploitability demonstrated by the vendor, patching is a priority for organizations relying on OPNsense to protect network boundaries.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/opnsense-code-execution-issue-poc-available" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="OPNsense addresses code execution issue with POC available" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; OPNsense has released fixes for two vulnerabilities that affect firewall management security, both disclosed with publicly available POCs. One flaw allows repeated login attempts without triggering lockouts, increasing exposure to credential‑guessing attacks, while a second, higher‑severity issue can allow full firewall takeover if an account with XMLRPC privileges is compromised. With exploitability demonstrated by the vendor, patching is a priority for organizations relying on OPNsense to protect network boundaries.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fopnsense-code-execution-issue-poc-available&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Thu, 07 May 2026 20:55:21 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/opnsense-code-execution-issue-poc-available</guid>
      <dc:date>2026-05-07T20:55:21Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Palo Alto firewall zero-day allows unauthenticated root access</title>
      <link>https://fieldeffect.com/blog/palo-alto-firewall-zero-day-unauthenticated-root-access</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/palo-alto-firewall-zero-day-unauthenticated-root-access" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Palo Alto firewall zero-day allows unauthenticated root access" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Palo Alto Networks has disclosed an actively exploited unpatched vulnerability (zero-day) that allows an external threat actor to take full control of affected firewalls without authentication. Because the flaw targets a core perimeter security control, successful exploitation can undermine network trust, enable silent monitoring of traffic, and expose internal systems to wider compromise. With active exploitation confirmed, a public exploit available, and vendor patches not yet available, organizations with affected firewalls face immediate risk until fixes and mitigations are applied.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/palo-alto-firewall-zero-day-unauthenticated-root-access" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Palo Alto firewall zero-day allows unauthenticated root access" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Palo Alto Networks has disclosed an actively exploited unpatched vulnerability (zero-day) that allows an external threat actor to take full control of affected firewalls without authentication. Because the flaw targets a core perimeter security control, successful exploitation can undermine network trust, enable silent monitoring of traffic, and expose internal systems to wider compromise. With active exploitation confirmed, a public exploit available, and vendor patches not yet available, organizations with affected firewalls face immediate risk until fixes and mitigations are applied.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fpalo-alto-firewall-zero-day-unauthenticated-root-access&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Wed, 06 May 2026 15:41:07 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/palo-alto-firewall-zero-day-unauthenticated-root-access</guid>
      <dc:date>2026-05-06T15:41:07Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Instructure data breach exposes education sector to extortion</title>
      <link>https://fieldeffect.com/blog/instructure-data-breach-exposes-education-sector-extortion</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/instructure-data-breach-exposes-education-sector-extortion" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Instructure data breach exposes education sector to extortion" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Instructure has disclosed a cybersecurity incident affecting users at selected educational institutions after extortion group ShinyHunters claimed responsibility and published sample data online. Exposed information reportedly includes names, email addresses, student identification numbers, and user messages. While there is no evidence that passwords or financial data were compromised, the exposure of identity and communication data increases the risk of phishing, impersonation, and social engineering attacks targeting schools, staff, students, and third-party partners.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/instructure-data-breach-exposes-education-sector-extortion" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Instructure data breach exposes education sector to extortion" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Instructure has disclosed a cybersecurity incident affecting users at selected educational institutions after extortion group ShinyHunters claimed responsibility and published sample data online. Exposed information reportedly includes names, email addresses, student identification numbers, and user messages. While there is no evidence that passwords or financial data were compromised, the exposure of identity and communication data increases the risk of phishing, impersonation, and social engineering attacks targeting schools, staff, students, and third-party partners.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Finstructure-data-breach-exposes-education-sector-extortion&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Wed, 06 May 2026 13:04:16 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/instructure-data-breach-exposes-education-sector-extortion</guid>
      <dc:date>2026-05-06T13:04:16Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Critical authentication bypass in Progress MOVEit Automation</title>
      <link>https://fieldeffect.com/blog/authentication-bypass-progress-moveit-automation</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/authentication-bypass-progress-moveit-automation" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Critical authentication bypass in Progress MOVEit Automation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Progress Software has disclosed a critical authentication bypass vulnerability in MOVEit Automation that enables unauthenticated, low-complexity remote access. Because the platform is widely used to transfer sensitive business data and is often internet-facing, the flaw creates a direct risk of unauthorized access and downstream compromise. While no active exploitation has been confirmed, similarities to past MOVEit attacks and the presence of legacy and end-of-life deployments increase the potential operational impact.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/authentication-bypass-progress-moveit-automation" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Critical authentication bypass in Progress MOVEit Automation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Progress Software has disclosed a critical authentication bypass vulnerability in MOVEit Automation that enables unauthenticated, low-complexity remote access. Because the platform is widely used to transfer sensitive business data and is often internet-facing, the flaw creates a direct risk of unauthorized access and downstream compromise. While no active exploitation has been confirmed, similarities to past MOVEit attacks and the presence of legacy and end-of-life deployments increase the potential operational impact.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fauthentication-bypass-progress-moveit-automation&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Tue, 05 May 2026 13:06:36 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/authentication-bypass-progress-moveit-automation</guid>
      <dc:date>2026-05-05T13:06:36Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Field Effect announces 2026 participation in MITRE ATT&amp;CK® Evaluations</title>
      <link>https://fieldeffect.com/blog/field-effect-2026-mitre-attck-evaluations</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/field-effect-2026-mitre-attck-evaluations" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Blog-Thumb-MITRE-2026.png" alt="Field Effect announces 2026 participation in MITRE ATT&amp;amp;CK® Evaluations" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h4&gt;&lt;em&gt;Second consecutive participation reinforces commitment to transparency and continuous improvement&lt;/em&gt;&lt;/h4&gt; 
&lt;p&gt;Field Effect, a global cybersecurity company specializing in AI security and managed detection and response (MDR), today announced its participation in the 2026 MITRE ATT&amp;amp;CK® Evaluations.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/field-effect-2026-mitre-attck-evaluations" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Blog-Thumb-MITRE-2026.png" alt="Field Effect announces 2026 participation in MITRE ATT&amp;amp;CK® Evaluations" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h4&gt;&lt;em&gt;Second consecutive participation reinforces commitment to transparency and continuous improvement&lt;/em&gt;&lt;/h4&gt; 
&lt;p&gt;Field Effect, a global cybersecurity company specializing in AI security and managed detection and response (MDR), today announced its participation in the 2026 MITRE ATT&amp;amp;CK® Evaluations.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Ffield-effect-2026-mitre-attck-evaluations&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>News</category>
      <category>Products and services</category>
      <pubDate>Mon, 04 May 2026 14:27:11 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/field-effect-2026-mitre-attck-evaluations</guid>
      <dc:date>2026-05-04T14:27:11Z</dc:date>
      <dc:creator>Field Effect</dc:creator>
    </item>
    <item>
      <title>Copy Fail: Linux kernel privilege escalation flaw publicly disclosed</title>
      <link>https://fieldeffect.com/blog/copy-fail-linux-kernel-poc</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/copy-fail-linux-kernel-poc" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="Copy Fail: Linux kernel privilege escalation flaw publicly disclosed" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Copy Fail (CVE-2026-31431), a Linux kernel logic flaw, allows reliable privilege escalation to root on most systems built since 2017. While not directly exploitable from the internet, the vulnerability turns routine low-privilege access (common in containers, CI/CD pipelines, and shared servers) into full host compromise while bypassing file-integrity monitoring and disk-based detection. In modern Linux environments where untrusted code execution is expected, this significantly increases the risk of lateral movement, container escape, and cross-tenant impact until systems are patched and rebooted.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/copy-fail-linux-kernel-poc" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="Copy Fail: Linux kernel privilege escalation flaw publicly disclosed" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Copy Fail (CVE-2026-31431), a Linux kernel logic flaw, allows reliable privilege escalation to root on most systems built since 2017. While not directly exploitable from the internet, the vulnerability turns routine low-privilege access (common in containers, CI/CD pipelines, and shared servers) into full host compromise while bypassing file-integrity monitoring and disk-based detection. In modern Linux environments where untrusted code execution is expected, this significantly increases the risk of lateral movement, container escape, and cross-tenant impact until systems are patched and rebooted.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fcopy-fail-linux-kernel-poc&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Thu, 30 Apr 2026 20:09:38 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/copy-fail-linux-kernel-poc</guid>
      <dc:date>2026-04-30T20:09:38Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>cPanel and WHM authentication bypass flaw publicly disclosed</title>
      <link>https://fieldeffect.com/blog/cpanel-whm-authentication-bypass-flaw-disclosed</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/cpanel-whm-authentication-bypass-flaw-disclosed" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="cPanel and WHM authentication bypass flaw publicly disclosed" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Researchers disclosed a critical authentication bypass vulnerability in cPanel and WebHost Manager (WHM), widely used web hosting control panels. The flaw allows unauthenticated remote attackers to bypass login and gain access to internet-exposed management interfaces, potentially enabling full control over hosting environments and downstream customer websites. While reports of exploitation have surfaced, they remain unconfirmed by the vendor.&amp;nbsp;&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/cpanel-whm-authentication-bypass-flaw-disclosed" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="cPanel and WHM authentication bypass flaw publicly disclosed" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Researchers disclosed a critical authentication bypass vulnerability in cPanel and WebHost Manager (WHM), widely used web hosting control panels. The flaw allows unauthenticated remote attackers to bypass login and gain access to internet-exposed management interfaces, potentially enabling full control over hosting environments and downstream customer websites. While reports of exploitation have surfaced, they remain unconfirmed by the vendor.&amp;nbsp;&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fcpanel-whm-authentication-bypass-flaw-disclosed&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Wed, 29 Apr 2026 20:36:10 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/cpanel-whm-authentication-bypass-flaw-disclosed</guid>
      <dc:date>2026-04-29T20:36:10Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Vimeo data exposure linked to third‑party analytics platform breach</title>
      <link>https://fieldeffect.com/blog/vimeo-linked-third-party-analytics-platform-breach</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/vimeo-linked-third-party-analytics-platform-breach" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Vimeo data exposure linked to third‑party analytics platform breach" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Vimeo recently disclosed a data exposure linked to a compromised third-party analytics provider, Anodot, which had access to its cloud data environments. The extortion group, ShinyHunters, claimed responsibility, threatening to release stolen data unless a ransom was paid. The incident underscores the risk of attackers exploiting trusted SaaS integrations to access downstream systems and reinforces the need to tightly manage third-party access to sensitive data.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/vimeo-linked-third-party-analytics-platform-breach" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Vimeo data exposure linked to third‑party analytics platform breach" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Vimeo recently disclosed a data exposure linked to a compromised third-party analytics provider, Anodot, which had access to its cloud data environments. The extortion group, ShinyHunters, claimed responsibility, threatening to release stolen data unless a ransom was paid. The incident underscores the risk of attackers exploiting trusted SaaS integrations to access downstream systems and reinforces the need to tightly manage third-party access to sensitive data.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fvimeo-linked-third-party-analytics-platform-breach&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Wed, 29 Apr 2026 12:42:29 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/vimeo-linked-third-party-analytics-platform-breach</guid>
      <dc:date>2026-04-29T12:42:29Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>FIRESTARTER backdoor persists on Cisco firewalls after patching</title>
      <link>https://fieldeffect.com/blog/firestarter-backdoor-cisco-firewalls</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/firestarter-backdoor-cisco-firewalls" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="FIRESTARTER backdoor persists on Cisco firewalls after patching" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; In April 2026, U.S. and UK cyber authorities disclosed a previously unknown persistence mechanism, tracked as FIRESTARTER, discovered on Cisco firewall infrastructure protecting a U.S. federal civilian agency. The mechanism can survive security patches released in September 2025, allowing continued access to affected devices unless remediation extends beyond routine patching. The activity underscores the business risk of perimeter device compromise and reinforces that patching alone does not always equate to full remediation.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/firestarter-backdoor-cisco-firewalls" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="FIRESTARTER backdoor persists on Cisco firewalls after patching" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; In April 2026, U.S. and UK cyber authorities disclosed a previously unknown persistence mechanism, tracked as FIRESTARTER, discovered on Cisco firewall infrastructure protecting a U.S. federal civilian agency. The mechanism can survive security patches released in September 2025, allowing continued access to affected devices unless remediation extends beyond routine patching. The activity underscores the business risk of perimeter device compromise and reinforces that patching alone does not always equate to full remediation.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Ffirestarter-backdoor-cisco-firewalls&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Tue, 28 Apr 2026 12:20:15 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/firestarter-backdoor-cisco-firewalls</guid>
      <dc:date>2026-04-28T12:20:15Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>IT helpdesk impersonation campaign uses Teams to gain initial access</title>
      <link>https://fieldeffect.com/blog/it-helpdesk-impersonation-microsoft-teams</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/it-helpdesk-impersonation-microsoft-teams" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="IT helpdesk impersonation campaign uses Teams to gain initial access" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Threat actors tracked as UNC6692 are impersonating IT helpdesk staff over Microsoft Teams to gain initial access through social engineering rather than technical exploitation. The activity combines targeted email-bombing with external Teams messages that prompt users to install fake fixes, allowing attackers to bypass traditional email and perimeter security controls and establish a foothold inside corporate environments.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/it-helpdesk-impersonation-microsoft-teams" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="IT helpdesk impersonation campaign uses Teams to gain initial access" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Threat actors tracked as UNC6692 are impersonating IT helpdesk staff over Microsoft Teams to gain initial access through social engineering rather than technical exploitation. The activity combines targeted email-bombing with external Teams messages that prompt users to install fake fixes, allowing attackers to bypass traditional email and perimeter security controls and establish a foothold inside corporate environments.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fit-helpdesk-impersonation-microsoft-teams&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Mon, 27 Apr 2026 13:15:36 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/it-helpdesk-impersonation-microsoft-teams</guid>
      <dc:date>2026-04-27T13:15:36Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Field Effect detects AMOS Stealer delivered via Cursor AI agent session</title>
      <link>https://fieldeffect.com/blog/field-effect-detects-amos-stealer-delivered-via-cursor-ai-agent-session</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/field-effect-detects-amos-stealer-delivered-via-cursor-ai-agent-session" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Analyst-Insights_04.jpg" alt="Field Effect detects AMOS Stealer delivered via Cursor AI agent session" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;Key findings&lt;/h2&gt; 
&lt;p&gt;On April 23, 2026, Field Effect MDR detected and responded to an incident involving the execution of malicious and heavily obfuscated AppleScript commands through a Cursor agent session running Claude Code, identified as AMOS Stealer malware.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/field-effect-detects-amos-stealer-delivered-via-cursor-ai-agent-session" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Analyst-Insights_04.jpg" alt="Field Effect detects AMOS Stealer delivered via Cursor AI agent session" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;Key findings&lt;/h2&gt; 
&lt;p&gt;On April 23, 2026, Field Effect MDR detected and responded to an incident involving the execution of malicious and heavily obfuscated AppleScript commands through a Cursor agent session running Claude Code, identified as AMOS Stealer malware.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Ffield-effect-detects-amos-stealer-delivered-via-cursor-ai-agent-session&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <category>From the experts</category>
      <pubDate>Fri, 24 Apr 2026 19:40:36 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/field-effect-detects-amos-stealer-delivered-via-cursor-ai-agent-session</guid>
      <dc:date>2026-04-24T19:40:36Z</dc:date>
      <dc:creator>Daniel Albrecht</dc:creator>
    </item>
    <item>
      <title>Bitwarden CLI compromised as part of supply-chain campaign</title>
      <link>https://fieldeffect.com/blog/bitwarden-cli-compromised-supply-chain-campaign</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/bitwarden-cli-compromised-supply-chain-campaign" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Bitwarden CLI compromised as part of supply-chain campaign" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; A malicious release of the Bitwarden CLI was published to npm in April 2026 as part of an expanding software supply chain campaign linked to earlier Checkmarx developer tooling compromises. The tampered package executed automatically during installation and focused on stealing credentials from developer and CI/CD environments, with potential downstream impact to source repositories, automation pipelines, and cloud infrastructure.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/bitwarden-cli-compromised-supply-chain-campaign" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Bitwarden CLI compromised as part of supply-chain campaign" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; A malicious release of the Bitwarden CLI was published to npm in April 2026 as part of an expanding software supply chain campaign linked to earlier Checkmarx developer tooling compromises. The tampered package executed automatically during installation and focused on stealing credentials from developer and CI/CD environments, with potential downstream impact to source repositories, automation pipelines, and cloud infrastructure.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fbitwarden-cli-compromised-supply-chain-campaign&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Fri, 24 Apr 2026 13:10:49 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/bitwarden-cli-compromised-supply-chain-campaign</guid>
      <dc:date>2026-04-24T13:10:49Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Microsoft issued emergency patch for ASP.NET Core Data Protection flaw</title>
      <link>https://fieldeffect.com/blog/microsoft-emergency-patch-asp.net-core-data-protection-flaw</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/microsoft-emergency-patch-asp.net-core-data-protection-flaw" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Microsoft issued emergency patch for ASP.NET Core Data Protection flaw" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Microsoft issued an out-of-band update to address CVE-2026-40372, a high-severity elevation of privilege vulnerability introduced in the April 14, 2026 .NET 10.0.6 Patch Tuesday release. The flaw affects ASP.NET Core applications that use the Data Protection component to secure authentication state and can allow forged authentication artifacts to persist beyond patching. Organizations running affected configurations benefit from updating, rebuilding impacted applications, and invalidating credentials issued during the vulnerable period to fully restore cryptographic trust.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/microsoft-emergency-patch-asp.net-core-data-protection-flaw" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Microsoft issued emergency patch for ASP.NET Core Data Protection flaw" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Microsoft issued an out-of-band update to address CVE-2026-40372, a high-severity elevation of privilege vulnerability introduced in the April 14, 2026 .NET 10.0.6 Patch Tuesday release. The flaw affects ASP.NET Core applications that use the Data Protection component to secure authentication state and can allow forged authentication artifacts to persist beyond patching. Organizations running affected configurations benefit from updating, rebuilding impacted applications, and invalidating credentials issued during the vulnerable period to fully restore cryptographic trust.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fmicrosoft-emergency-patch-asp.net-core-data-protection-flaw&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Thu, 23 Apr 2026 11:53:20 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/microsoft-emergency-patch-asp.net-core-data-protection-flaw</guid>
      <dc:date>2026-04-23T11:53:20Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Progress patches MOVEit WAF and LoadMaster vulnerabilities</title>
      <link>https://fieldeffect.com/blog/progress-patches-moveit-waf-loadmaster</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/progress-patches-moveit-waf-loadmaster" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Progress patches MOVEit WAF and LoadMaster vulnerabilities" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Progress Software released patches for critical vulnerabilities affecting MOVEit Web Application Firewall and Kemp LoadMaster, widely used at the enterprise and managed service provider perimeter. The issues could allow authenticated threat actors to execute commands or bypass inspection controls under certain conditions, making timely remediation important for reducing risk.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/progress-patches-moveit-waf-loadmaster" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Progress patches MOVEit WAF and LoadMaster vulnerabilities" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;strong&gt;At a glance:&lt;/strong&gt; Progress Software released patches for critical vulnerabilities affecting MOVEit Web Application Firewall and Kemp LoadMaster, widely used at the enterprise and managed service provider perimeter. The issues could allow authenticated threat actors to execute commands or bypass inspection controls under certain conditions, making timely remediation important for reducing risk.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fprogress-patches-moveit-waf-loadmaster&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Wed, 22 Apr 2026 12:14:00 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/progress-patches-moveit-waf-loadmaster</guid>
      <dc:date>2026-04-22T12:14:00Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>18 Seconds: How Field Effect MDR Contains and Reports Threats in Record-Time</title>
      <link>https://fieldeffect.com/blog/18-seconds-field-effect-mdr</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/18-seconds-field-effect-mdr" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Blog-Thumb-18-seconds-1.png" alt="18 Seconds: How Field Effect MDR Contains and Reports Threats in Record-Time" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p class="subtitle"&gt;We’ve entered the era of AI-accelerated attackers and agentic attacks.&lt;br&gt;&lt;span style="font-size: 20px;"&gt;&lt;em&gt;Outpacing AI means detecting and disrupting threats before they can execute and spread.&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/18-seconds-field-effect-mdr" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Blog-Thumb-18-seconds-1.png" alt="18 Seconds: How Field Effect MDR Contains and Reports Threats in Record-Time" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p class="subtitle"&gt;We’ve entered the era of AI-accelerated attackers and agentic attacks.&lt;br&gt;&lt;span style="font-size: 20px;"&gt;&lt;em&gt;Outpacing AI means detecting and disrupting threats before they can execute and spread.&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2F18-seconds-field-effect-mdr&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>News</category>
      <category>Products and services</category>
      <pubDate>Tue, 21 Apr 2026 16:02:00 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/18-seconds-field-effect-mdr</guid>
      <dc:date>2026-04-21T16:02:00Z</dc:date>
      <dc:creator>Mallory Tretter</dc:creator>
    </item>
  </channel>
</rss>
