In partnership with

⏱️ ≈ 10-minute read

Editor’s Note: This week’s cyber mood is “the perimeter is having a personal crisis.” Palo Alto firewalls were hit through a zero-day with suspected state-linked tradecraft, Ivanti is back in the exploited-enterprise-appliance conversation, cPanel servers are getting compromised at scale, and AI is now helping attackers understand operational technology environments.

One ask before you dive in: if this recap earns a forward or sparks a debate on your team, share it. If there’s something you think we should cover (or skip) next time, hit reply and tell us. Thanks for reading!

📬 This Week’s Clickables

  • 📌 Big News - Palo Alto zero-day exploitation shows hallmarks of Chinese state hacking, Daemon Tools supply-chain attack hits government and scientific entities

  • 🚨 Can’t Miss - Ivanti EPMM zero-day, cPanel exploitation at 40,000-plus servers, Mini Shai-Hulud npm campaign, Iranian APT masquerading as ransomware, Dirty Frag Linux root bug

  • 🤖 AI in Cyber - Claude used in water utility intrusion, Braintrust breach, AI-driven patch deadline pressure, Five Eyes AI-agent guidance, Claude Chrome extension takeover risk

  • 🧪 Strange Cyber Story - France investigates 15-year-old over alleged national ID agency hack

🚨 Big News

🔥 Palo Alto Firewalls Get Hit Through a Zero-Day With State-Hacking Fingerprints

Intro:
Palo Alto Networks’ firewall zero-day story escalated from “patch this soon” to “someone with serious tradecraft has been in the edge device business.” That is not the kind of upgrade anyone wants.

What Happened:
CVE-2026-0300 affects the PAN-OS User-ID Authentication Portal, also known as Captive Portal, on certain PA-Series and VM-Series firewalls. The flaw can allow unauthenticated remote code execution with root privileges when the portal is exposed to public or untrusted networks. Follow-up analysis showed attackers using tunneling tools, probing internal environments, accessing Active Directory, and deleting evidence. SecurityWeek reported that the campaign bears hallmarks of Chinese state hacking, though Palo Alto Networks has not publicly attributed it to a specific group.

Why It’s Important:
Firewalls are supposed to be the guarded door, not the attacker’s private entrance with a welcome mat. Root-level access on an exposed firewall can give intruders visibility, persistence, credentials, and a springboard into internal networks.

The Other Side:
The affected configuration is narrower than “every Palo Alto firewall everywhere,” and exposure depends heavily on whether the portal is reachable from untrusted networks. Palo Alto has advised mitigations including restricting portal access to trusted IPs or disabling the portal where possible.

👉 Takeaway:
Restrict portal exposure, hunt for post-exploitation activity, rotate relevant credentials, and prepare for patch deployment. For edge devices, patching is step one. Proving the attacker is gone is the actual job.

TL;DR:
An exploited PAN-OS zero-day affecting certain Palo Alto firewalls is now tied to activity showing suspected Chinese state-hacking hallmarks.

Further Reading: SecurityWeek

Investors are watching this fast growing tech company.

Meet $MODE, the disruptor turning phones into income generators.

Elon Musk said that “universal income will be necessary if AI takes over most human jobs,” and Mode is pioneering privatized UBI powered by technology. Their 3-year 32,481% revenue growth ranked them the #1 software company on Deloitte’s fastest-growing companies list.

Please read the offering circular and related risks at invest.modemobile.com. This is a paid advertisement for Mode Mobile’s Regulation A+ Offering.

Mode Mobile recently received their ticker reservation with Nasdaq ($MODE), indicating an intent to IPO in the next 24 months. An intent to IPO is no guarantee that an actual IPO will occur.

The Deloitte rankings are based on submitted applications and public company database research, with winners selected based on their fiscal-year revenue growth percentage over a three-year period.

💿 Daemon Tools Supply-Chain Attack Targets Government and Scientific Entities

Intro:
Attackers compromised Daemon Tools software distribution and used the legitimate download channel to reach systems worldwide. Signed software from the official website was apparently feeling too trustworthy.

What Happened:
Kaspersky reported that malicious code was injected into multiple Daemon Tools versions distributed through the legitimate website. SecurityWeek says the trojanized releases affected versions available since April 8, with malicious components signed using valid AVB Disc Soft certificates. The first-stage malware reached thousands of machines across more than 100 countries, then collected system information for attacker review. A more advanced second-stage backdoor was deployed only to select government, scientific, manufacturing, and retail targets.

Why It’s Important:
This is the supply-chain problem in its most annoying form: real site, signed binaries, broad reach, and selective follow-on targeting. That combination makes the attack harder to dismiss as ordinary malware noise.

The Other Side:
The most advanced backdoor reportedly landed on only about a dozen systems, which may limit the deepest compromises. The vendor said the incident was contained and clean builds were released, but that does not automatically clean machines that installed trojanized versions.

👉 Takeaway:
Identify Daemon Tools installs, verify versions, uninstall compromised builds, scan for secondary malware, and review signed software monitoring. Trust the vendor channel, but verify like the vendor channel owes you money.

TL;DR:
A Daemon Tools supply-chain attack used signed trojanized installers to reach users globally, then selectively targeted government, scientific, manufacturing, and retail organizations.

Further Reading: SecurityWeek

The original public CVE List launched in September 1999 with just 321 entries, created to solve a very human security problem: different tools and vendors kept using different names for the same bugs. Source: CVE Program History

🔥 Can’t Miss

  • 📱 Ivanti EPMM Zero-Day Gets Patched After Targeted Exploitation
    Ivanti patched an Endpoint Manager Mobile zero-day exploited in targeted attacks, putting another privileged enterprise management product into the emergency lane. EPMM systems can sit close to mobile device administration, enterprise access, and authentication workflows, so compromise is not exactly a small-room problem. CISA added urgency through the Known Exploited Vulnerabilities process and a short federal patch deadline. Ivanti being a hot target category again is not a plot twist, but it is absolutely a reminder.
    👉 Key takeaway: Prioritize Ivanti EPMM remediation, restrict administrative exposure, and review logs for targeted activity.

  • 🧨 More Than 40,000 Servers Get Pulled Into the cPanel Zero-Day Mess
    Attackers are continuing to exploit CVE-2026-41940, a critical cPanel and WHM vulnerability that can lead to administrative access. SecurityWeek reports that more than 40,000 servers have likely been compromised as exploitation continues. The scale is the story here because cPanel sits behind websites, hosting environments, databases, and server configurations. Shared hosting just found another way to ruin everyone’s week.
    👉 Key takeaway: Patch affected cPanel and WHM systems immediately, audit exposed servers, and assume internet-facing instances have already been scanned.

  • 🧬 Mini Shai-Hulud Keeps Developer Supply Chains on the Menu
    Unit 42 is tracking a Mini Shai-Hulud npm supply-chain wave targeting packages tied to the SAP developer ecosystem. The campaign targets developer workflows and CI/CD environments, where tokens, credentials, and cloud secrets often live within grabbing distance. That makes this more than a malicious package story. It is an enterprise access story wearing a package manager hoodie.
    📱 Ivanti EPMM Zero-Day Gets Patched After Targeted Exploitation
    Ivanti patched an Endpoint Manager Mobile zero-day exploited in targeted attacks, putting another privileged enterprise management product into the emergency lane. CISA added urgency through the Known Exploited Vulnerabilities process and a short federal patch deadline. Ivanti being a hot target category again is not a plot twist, but it is absolutely a reminder.
    👉 Key takeaway: Prioritize Ivanti EPMM remediation, restrict administrative exposure, and review logs for targeted activity.

  • 🧨 More Than 40,000 Servers Get Pulled Into the cPanel Zero-Day Mess
    Attackers are continuing to exploit CVE-2026-41940, a critical cPanel and WHM vulnerability that can lead to administrative access. SecurityWeek reports that more than 40,000 servers have likely been compromised as exploitation continues. Shared hosting just found another way to ruin everyone’s week.
    👉 Key takeaway: Patch affected cPanel and WHM systems immediately, audit exposed servers, and assume internet-facing instances have already been scanned.

  • 🧬 Mini Shai-Hulud Keeps Developer Supply Chains on the Menu
    Unit 42 is tracking a Mini Shai-Hulud npm supply-chain wave targeting packages tied to the SAP developer ecosystem. The campaign targets developer workflows and CI/CD environments, where tokens, credentials, and cloud secrets often live within grabbing distance. It is an enterprise access story wearing a package manager hoodie.
    👉 Key takeaway: Audit npm dependencies, rotate exposed tokens, monitor package updates, and treat developer environments as production-grade security territory.

  • 🎭 Iranian APT Intrusion Wears a Chaos Ransomware Costume
    An Iranian APT intrusion analyzed by Rapid7 appeared to masquerade as a Chaos ransomware incident while showing signs of espionage-focused activity. The attackers reportedly used social engineering, remote access tooling, credential theft, MFA manipulation, lateral movement, and data exfiltration before leaning into the ransomware narrative. Sometimes the mask is the point, not the motive.
    👉 Key takeaway: Investigate identity abuse, remote access tooling, and data theft before assuming an extortion case is financially motivated.

  • 🐧 Dirty Frag Gives Local Attackers Root Across Major Linux Distros
    Dirty Frag is a new Linux zero-day with public exploit details that can give local attackers root privileges across major distributions. Attackers need local access first, but that is exactly what makes it dangerous after phishing, webshells, stolen credentials, or container escapes. A privilege-escalation bug is how “limited access” turns into “the attacker is now the landlord.”
    👉 Key takeaway: Monitor vendor patches and mitigations, reduce unnecessary local access, and treat local privilege escalation as a serious post-compromise accelerator.

200+ Claude Prompts Top Professionals Actually Use at Work

Claude can be your analyst, editor, and strategist.
But most professionals are using it to fix grammar.

These 200+ Claude prompts take it from grammar tool to your most powerful AI work assistant.

Sign up for Superhuman AI and get:

  • 200+ ready-to-use Claude prompts to get real work done in minutes — researched, tested, and used by professionals at Google, Microsoft, and NASA

  • Superhuman AI newsletter (4 min daily) so you keep learning new AI tools and skills to stay ahead in your career — the prompts are just the beginning

🤖 AI in Cyber

  • 🚰 Claude AI Guides Hackers Toward OT Assets During Water Utility Intrusion
    Dragos reported that threat actors used Claude AI during an intrusion involving a Mexican water and drainage utility. The model did not magically hack operational technology, but it helped attackers interpret internal findings and move toward OT, ICS, and SCADA-adjacent assets. AI can compress the boring middle of an intrusion, where attackers figure out what matters and where to go next.
    👉 Key takeaway: Assume attackers will use AI to accelerate internal recon, asset interpretation, and OT targeting.

  • 🔑 Braintrust Breach Forces Customers Into API Key Rotation Mode
    AI evaluation startup Braintrust confirmed unauthorized access to one of its AWS cloud accounts and told customers to rotate sensitive keys. AI evaluation platforms can sit near model providers, application testing, prompts, telemetry, and integration secrets. AI platforms are now part of the secret-management perimeter, whether teams planned for that or not.
    👉 Key takeaway: Treat AI tooling vendors as sensitive infrastructure and limit how long they hold customer secrets.

  • ⏱️ U.S. Officials Consider Three-Day Patch Deadlines as AI Speeds Up Exploitation
    Reuters reports that U.S. officials are weighing whether federal agencies should patch actively exploited vulnerabilities within three days. The concern is that AI tools may help attackers move faster from vulnerability disclosure to exploitation at scale. Patch governance may be headed for a speed limit sign that says “hope your asset inventory works.”
    👉 Key takeaway: Improve asset inventory, emergency patch workflows, exploit-based prioritization, and rollback plans before compressed deadlines become the new normal.

  • 🕵️ Five Eyes Agencies Publish Guidance for Secure AI Agent Deployment
    Cyber agencies from the U.S., U.K., Australia, Canada, and New Zealand published guidance for securing agentic AI systems. The guidance focuses on identity management, least privilege, credential protection, containment, logging, human approval, and prompt-injection risk. AI agents are not magic assistants. They are privileged software identities with initiative.
    👉 Key takeaway: Govern AI agents like high-risk privileged users: limit permissions, isolate execution, log actions, and require approval for sensitive tasks.

  • 🧩 Claude Chrome Extension Bug Shows AI Agents Can Be Hijacked Through Browser Trust Gaps
    A vulnerability dubbed ClaudeBleed in the Claude extension for Chrome could let malicious extensions hijack the AI agent for information theft or unauthorized actions. The issue involved lax permissions and trust assumptions around command origins, creating a path for remote prompt injection. Browser-based AI agents are convenient, which is another way of saying they are now standing very close to everything users do.
    👉 Key takeaway: Review AI browser extension permissions and treat agentic browser tools as new privilege boundaries, not harmless productivity widgets.

🧟‍♂️ Strange Cyber

🪪 France Investigates 15-Year-Old Over Alleged National ID Agency Hack

Intro:
French authorities are investigating a 15-year-old suspected of breaching the country’s national ID agency and trying to sell millions of citizens’ personal records. Most teenagers get in trouble for screen time. This one allegedly brought a national identity platform into the chat.

What Happened:
Paris prosecutors said the teenager is suspected of involvement in a breach affecting France’s National Agency for Secure Documents, known as ANTS. The agency handles applications for passports, national identity cards, residence permits, and driver’s licenses. Authorities said the suspect may have used the alias “breach3d,” which was tied to advertisements for millions of records on cybercrime forums. The exposed data reportedly could include names, email addresses, birth dates, postal addresses, phone numbers, places of birth, unique account identifiers, and login-related information.

Why It’s Important:
National identity systems are a privacy nightmare when breached because the data involved is hard or impossible for individuals to replace. You can reset a password, but you cannot casually rotate your birth date or identity-document history.

The Other Side:
The suspect is a minor, has not been publicly identified, and the investigation is ongoing. Prosecutors still need to establish what happened, what data was actually accessed, and what role the teenager allegedly played.

👉 Takeaway:
Government identity platforms need strict access controls, strong monitoring, fast dark-web detection, and segmentation that assumes attackers may be both skilled and unexpectedly young.

TL;DR:
France is investigating a 15-year-old suspected of breaching ANTS and allegedly trying to sell millions of citizens’ personal data.

Further Reading: The Record

Enjoying Exzec Cyber? Forward this to one person who cares about staying ahead of attacks

Hate everything you see or have other feedback? Reply back to this email!

Keep Reading