<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: BeyondMachines</title>
    <description>The latest articles on Forem by BeyondMachines (@bsp_beyondmachines).</description>
    <link>https://forem.com/bsp_beyondmachines</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2445503%2F3faf5e64-542b-44d9-9bb9-e5bdaa993b59.png</url>
      <title>Forem: BeyondMachines</title>
      <link>https://forem.com/bsp_beyondmachines</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/bsp_beyondmachines"/>
    <language>en</language>
    <item>
      <title>TanStack npm Packages Compromised in "Mini Shai-Hulud" Supply Chain Attack</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Tue, 12 May 2026 15:01:07 +0000</pubDate>
      <link>https://forem.com/beyondmachines/tanstack-npm-packages-compromised-in-mini-shai-hulud-supply-chain-attack-3pl1</link>
      <guid>https://forem.com/beyondmachines/tanstack-npm-packages-compromised-in-mini-shai-hulud-supply-chain-attack-3pl1</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;The TanStack npm ecosystem was hit by a supply chain attack that hijacked legitimate build pipelines to distribute malware with valid SLSA provenance. The attack harvests cloud credentials and includes a destructive dead-man's switch that deletes home directories if stolen tokens are revoked.&lt;/p&gt;

&lt;h3&gt;
  
  
  Take Action:
&lt;/h3&gt;

&lt;p&gt;If you installed any @tanstack/* packages on May 11, 2026, treat your entire environment as compromised — but before rotating any credentials, first disable the dead-man's switch service (systemctl --user stop gh-token-monitor.service on Linux or launchctl unload ~/Library/LaunchAgents/com.user.gh-token-monitor.plist on macOS) and remove persistence hooks from .claude/ and .vscode/ directories, because revoking tokens before disabling the monitor will trigger destruction of your home directory. After disabling persistence, rotate all secrets (GitHub tokens, AWS keys, npm tokens, SSH keys, Vault tokens — everything), block *.getsession.org at DNS level, and audit your GitHub Actions workflows to pin OIDC trusted publishers to specific branches.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/tanstack-npm-packages-compromised-in-mini-shai-hulud-supply-chain-attack-e-5-d-8-3/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Institute of Public Accountants Reports Data Leak Caused by Database Automation Error</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Tue, 12 May 2026 10:01:08 +0000</pubDate>
      <link>https://forem.com/beyondmachines/institute-of-public-accountants-reports-data-leak-caused-by-database-automation-error-42i2</link>
      <guid>https://forem.com/beyondmachines/institute-of-public-accountants-reports-data-leak-caused-by-database-automation-error-42i2</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;The Institute of Public Accountants (IPA) suffered a data breach due to a human error in an automated database process that leaked member names and ID numbers to other members. The organization disabled the affected process and is working with its technology partner to improve security controls.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/institute-of-public-accountants-reports-data-leak-caused-by-database-automation-error-k-o-y-f-5/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>ShinyHunters Strikes Canvas Again: Second Compromise Defaces 330 School Login Pages</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Tue, 12 May 2026 09:01:08 +0000</pubDate>
      <link>https://forem.com/beyondmachines/shinyhunters-strikes-canvas-again-second-compromise-defaces-330-school-login-pages-1331</link>
      <guid>https://forem.com/beyondmachines/shinyhunters-strikes-canvas-again-second-compromise-defaces-330-school-login-pages-1331</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Instructure's Canvas platform was breached a second time on May 7, 2026, by ShinyHunters, who exploited a vulnerability in the Free-For-Teacher program's support-ticket function to pivot into shared back-end infrastructure, deface ~330 institutional login pages with a ransom note, and pressure payment for data stolen in the prior April 25 breach.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/shinyhunters-strikes-canvas-again-second-compromise-defaces-330-school-login-pages-4-s-x-d-9/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>SailPoint Discloses GitHub Repository Breach Linked to Third-Party Vulnerability</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Tue, 12 May 2026 08:01:08 +0000</pubDate>
      <link>https://forem.com/beyondmachines/sailpoint-discloses-github-repository-breach-linked-to-third-party-vulnerability-3544</link>
      <guid>https://forem.com/beyondmachines/sailpoint-discloses-github-repository-breach-linked-to-third-party-vulnerability-3544</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;SailPoint reports that hackers exploited a third-party application vulnerability to access a subset of its GitHub repositories on April 20, 2026. The company claims that production environments remained secure and has notified affected customers directly.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/sailpoint-discloses-github-repository-breach-linked-to-third-party-vulnerability-4-k-f-o-2/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>State of (in)security - Week 19, 2026</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Mon, 11 May 2026 17:01:07 +0000</pubDate>
      <link>https://forem.com/beyondmachines/state-of-insecurity-week-19-2026-4mon</link>
      <guid>https://forem.com/beyondmachines/state-of-insecurity-week-19-2026-4mon</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Between May 4–11, 2026, the cybersecurity landscape saw 13 advisories and 14 incidents, with active exploits hitting Ivanti EPMM, Palo Alto PAN-OS, and DAEMON Tools (supply chain), along critical flaws in Chrome, MOVEit, PostgreSQL/MariaDB, and Ollama AI servers. Major breaches included ransomware attacks on Fiserv, Liberty Mutual, and Champion Homes, an AWS data center overheating outage disrupting financial platforms, and a $155,000 prompt injection theft from a Grok-linked crypto wallet.&lt;/p&gt;

&lt;h3&gt;
  
  
  Take Action:
&lt;/h3&gt;

&lt;p&gt;Patch your browser (Chrome/Edge/Brave/Opera) and your Android phone today, both have critical flaws. And never run .exe files sent by "recruiters" on social media, no matter who the message appears to come from.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/state-of-in-security-week-19-2026-5-8-v-k-b/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>M3rx Ransomware Group Claims Breach of Australian Toy Distributor KB Toys</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Mon, 11 May 2026 12:01:08 +0000</pubDate>
      <link>https://forem.com/beyondmachines/m3rx-ransomware-group-claims-breach-of-australian-toy-distributor-kb-toys-1gap</link>
      <guid>https://forem.com/beyondmachines/m3rx-ransomware-group-claims-breach-of-australian-toy-distributor-kb-toys-1gap</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;The Australian toy distributor KB Toys was targeted by the M3rx ransomware group, resulting in the alleged theft of 140 GB of sensitive business data and invoices.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/australian-toy-distributor-kb-toys-targeted-by-m3rx-ransomware-group-s-t-o-u-i/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>JDownloader Website Hijacked to Distribute Malware via CMS Exploit</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 10 May 2026 20:01:08 +0000</pubDate>
      <link>https://forem.com/beyondmachines/jdownloader-website-hijacked-to-distribute-malware-via-cms-exploit-3ifp</link>
      <guid>https://forem.com/beyondmachines/jdownloader-website-hijacked-to-distribute-malware-via-cms-exploit-3ifp</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;JDownloader's official website was compromised via a CMS vulnerability, allowing attackers to replace legitimate Windows and Linux installers with malware-laden versions. Existing installations remain safe due to cryptographic signing, users who downloaded and executed the affected files on May 6-7 are advised to change all passwords, and enable multi-factor authentication or reinstall their operating systems.&lt;/p&gt;

&lt;h3&gt;
  
  
  Take Action:
&lt;/h3&gt;

&lt;p&gt;If you downloaded and ran the JDownloader Windows Alternative Installer or Linux shell script between May 6 and May 7, 2026, you should assume your system is compromised. Remove the systems, or ideally reinstall your system. Standard antivirus scans cannot guarantee the removal of this malware. Affected users must change all passwords and enable multi-factor authentication (MFA) on all accounts.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/jdownloader-website-hijacked-to-distribute-malware-via-cms-exploit-n-u-3-j-l/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>MemberSource Credit Union Ransomware Attack Exposes 50 GB of Member Data</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 10 May 2026 16:01:08 +0000</pubDate>
      <link>https://forem.com/beyondmachines/membersource-credit-union-ransomware-attack-exposes-50-gb-of-member-data-3pfc</link>
      <guid>https://forem.com/beyondmachines/membersource-credit-union-ransomware-attack-exposes-50-gb-of-member-data-3pfc</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;MemberSource Credit Union suffered a ransomware attack by the Safepay group that resulted in the theft of 50 GB of sensitive data, including Social Security numbers and financial account details. The breach affected branch networks but did not compromise the institution's core member management system.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/membersource-credit-union-ransomware-attack-exposes-50-gb-of-member-data-6-s-a-6-m/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Critical Rancher Fleet Vulnerability Allows Full Kubernetes Cluster Takeover</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 10 May 2026 15:01:07 +0000</pubDate>
      <link>https://forem.com/beyondmachines/critical-rancher-fleet-vulnerability-allows-full-kubernetes-cluster-takeover-4kf1</link>
      <guid>https://forem.com/beyondmachines/critical-rancher-fleet-vulnerability-allows-full-kubernetes-cluster-takeover-4kf1</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;SUSE Rancher Fleet contains a critical vulnerability (CVE-2026-41050) that allows attackers to bypass multi-tenant isolation and gain cluster-admin privileges by exploiting the Helm deployer's failure to enforce ServiceAccount impersonation.&lt;/p&gt;

&lt;h3&gt;
  
  
  Take Action:
&lt;/h3&gt;

&lt;p&gt;If you're using Rancher Fleet to manage Kubernetes clusters, update ASAP to a patched version (Fleet 0.11.13/0.12.14/0.13.10/0.14.5, or Rancher 2.10.11/2.11.13/2.12.9/2.13.5/2.14.1). If you can't patch right away, disable Fleet-monitored repositories for untrusted tenants, audit your Helm charts for use of the lookup function, and rotate any secrets that may have been exposed.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/critical-rancher-fleet-vulnerability-allows-full-kubernetes-cluster-takeover-v-a-d-8-y/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>AWS Data Center Overheating Disrupts Global Financial Platforms</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 10 May 2026 14:01:08 +0000</pubDate>
      <link>https://forem.com/beyondmachines/aws-data-center-overheating-disrupts-global-financial-platforms-1n4h</link>
      <guid>https://forem.com/beyondmachines/aws-data-center-overheating-disrupts-global-financial-platforms-1n4h</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;AWS experienced a major service disruption in its Northern Virginia region due to data center overheating and power loss, impacting global platforms like Coinbase and CME Group.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/aws-data-center-overheating-disrupts-global-financial-platforms-q-t-m-f-p/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>NVIDIA GeForce NOW Regional Partner Breach Exposes Armenian User Data</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 10 May 2026 13:01:07 +0000</pubDate>
      <link>https://forem.com/beyondmachines/nvidia-geforce-now-regional-partner-breach-exposes-armenian-user-data-g82</link>
      <guid>https://forem.com/beyondmachines/nvidia-geforce-now-regional-partner-breach-exposes-armenian-user-data-g82</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;NVIDIA confirmed a data breach at its Armenian partner, GFN.am, which exposed personal information of GeForce NOW users.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/nvidia-geforce-now-regional-partner-breach-exposes-armenian-user-data-5-t-q-m-q/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Fake Recruiter Campaign on LinkedIn Delivers Info-Stealers via Hijacked Accounts</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 10 May 2026 08:01:08 +0000</pubDate>
      <link>https://forem.com/beyondmachines/fake-recruiter-campaign-on-linkedin-delivers-info-stealers-via-hijacked-accounts-29i9</link>
      <guid>https://forem.com/beyondmachines/fake-recruiter-campaign-on-linkedin-delivers-info-stealers-via-hijacked-accounts-29i9</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;A malware campaign on LinkedIn impersonates known brands to deliver info-stealers through hijacked accounts, Google Forms, and bloated ZIP files. The attack targets session cookies and credentials to bypass MFA and gain persistent access to corporate and personal accounts.&lt;/p&gt;

&lt;h3&gt;
  
  
  Take Action:
&lt;/h3&gt;

&lt;p&gt;Never trust unexpected social media and messenger messages, even from people you know. Hijacked accounts are how this scam spreads. Don't rush, don't fill out forms from strangers, and NEVER download or run executable files (.exe) sent by a "recruiter". Legitimate companies never send EXEs to job candidates.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/fake-recruiter-campaign-on-linkedin-delivers-info-stealers-via-hijacked-accounts-c-l-c-g-3/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
  </channel>
</rss>
