CISO Talk by James Azar
CyberHub Podcast
May Patch Tuesday: Microsoft Patches 137 Flaws With No Active Zero-Days, Nitrogen Ransomware Hits Foxconn, Mini Shai-Hulud Compromises 170+ TanStack Mistral UiPath Packages
0:00
-19:19

May Patch Tuesday: Microsoft Patches 137 Flaws With No Active Zero-Days, Nitrogen Ransomware Hits Foxconn, Mini Shai-Hulud Compromises 170+ TanStack Mistral UiPath Packages

Patch Tuesday: 137 Microsoft Fixes | Foxconn Hit by Nitrogen Ransomware | Shai-Hulud Worm Hits 170+ Packages | Instructor Pays Ransom, Congress Investigates | AI Layoffs Hit Cloudflare

Good Morning Security Gang,

Today’s episode felt like the cybersecurity equivalent of getting hit by a freight train moving at AI speed.

Patch Tuesday dropped like a bomb across the industry. At the same time, ShinyHunters forced Instructor into paying ransom during finals week chaos, Foxconn got hit by the Nitrogen ransomware gang, the Shai-Hulud supply chain worm bypassed modern provenance protections, and multiple major companies openly admitted AI is replacing jobs in cybersecurity and engineering.

👉 The theme today is uncomfortable but unavoidable:
Every layer of modern enterprise operations is under simultaneous pressure, technical, operational, workforce, and strategic.

Double espresso in hand, let’s dive in.

🧭 Executive Summary

Today’s threat landscape highlights the convergence of accelerated exploitation, supply chain compromise, operational disruption, and workforce transformation driven by AI. Organizations are no longer facing isolated cyber incidents, they are confronting simultaneous attacks across infrastructure, software supply chains, identity systems, manufacturing operations, and governance frameworks.

At the same time, the industry itself is being reshaped by AI adoption, with companies reducing workforce headcount while relying more heavily on automation and AI-driven tooling. The result is a cybersecurity environment where the pace of threats is increasing while the operational models defending against them are fundamentally changing in real time.

📰 Top Stories & Deep Dive Analysis

🎓 Instructor Pays ShinyHunters – Congress Launches Investigation

Instructor, the company behind Canvas LMS, reportedly paid an undisclosed ransom to ShinyHunters after the group breached the platform twice within a two-week span.

The first breach involved the theft of data tied to approximately 9,000 institutions. The second attack escalated into mass portal defacements during finals week, disrupting access for millions of students and placing enormous operational pressure on universities already struggling to recover.

The situation has now moved beyond cybersecurity and into regulatory territory. House Homeland Security Committee Chairman Andrew Garbarino formally demanded a briefing from Instructor, citing serious concerns over the company’s remediation efforts and overall incident response posture.

The broader issue here is that paying ransom does not restore trust. Instructor claims the stolen data was returned and deleted, but neither Congress nor the cybersecurity community views attacker promises as a valid control mechanism. The fallout here will likely shape future regulatory expectations around SaaS breach handling and higher education cyber resilience.

🏭 Foxconn Hit by Nitrogen Ransomware – OT and Supply Chain Collide

Foxconn confirmed a ransomware attack impacting portions of its North American factory network, with the Nitrogen ransomware group claiming responsibility and alleging theft of eight terabytes of sensitive data.

According to reports, systems inside Foxconn facilities failed, Wi-Fi services collapsed, and employees were forced to continue operations manually using pen and paper while production disruptions unfolded.

The potential implications here are enormous. Foxconn is not just another manufacturer, it is one of the world’s most critical electronics supply chain hubs, supporting companies like Apple, Microsoft, Google, and Cisco.

This is a textbook example of OT and IT convergence risk. Modern manufacturing environments depend heavily on interconnected systems, meaning ransomware no longer just impacts data, it impacts production continuity, operational safety, intellectual property, and downstream customer ecosystems simultaneously.

🧬 Shai-Hulud Supply Chain Worm Evolves – Provenance Protections Bypassed

The Shai-Hulud supply chain campaign escalated dramatically this week, spreading malicious packages across npm and PyPI ecosystems through over 170 compromised packages and more than 400 malicious versions.

What makes this attack particularly significant is that the malicious packages shipped with valid provenance attestations and legitimate Sigstore signatures, bypassing modern supply chain integrity protections many organizations have spent years implementing.

"The Shai-Hulud supply chain worm shipped with valid SLSA Build Level 3 attestations and legitimate Sigstore signatures—defeating the supply chain integrity controls the community has been investing in for over two years. If any developer ran npm install against @tanstack or Mistral AI packages on May 11, treat that CI/CD environment as fully compromised. Rotate every secret immediately." James Azar

Attackers exploited weaknesses in GitHub Actions workflows, cache poisoning vulnerabilities, and OIDC token extraction from runner memory to distribute the malware rapidly across ecosystems connected to TanStack, Mistral AI, UiPath, and others.

This marks a major turning point in supply chain security. The industry’s trust assumptions around signed packages and provenance validation have now been challenged directly. Organizations can no longer assume that cryptographic trust alone guarantees software integrity.

🩹 Patch Tuesday – The Industry’s Monthly Stress Test

This month’s Patch Tuesday was enormous, spanning Microsoft, Apple, Adobe, SAP, Fortinet, and Ivanti. And while Microsoft finally broke its 22-month streak of actively exploited zero-days, the operational burden remains staggering.

🪟 Microsoft – 137 CVEs Patched

Microsoft released fixes for 137 vulnerabilities, including 17 critical flaws. The highest-priority issues involve:

  • Windows DNS Client Remote Code Execution

  • Netlogon RCE impacting authentication infrastructure

  • Explorer Preview Pane RCE requiring no double-click interaction

CVE-2026-41096 - Windows DNS Client RCE

CVE-2026-41089 - NetLogon RCE (unauthenticated/low-priv → auth stack)

The risk here centers around authentication infrastructure and name resolution services, core systems attackers routinely target for rapid lateral movement. Domain controllers and DNS services should remain top patching priorities across enterprise environments.

🍎 Apple – Over 60 iOS & 80 macOS Vulnerabilities

Apple patched more than 60 vulnerabilities in iOS and over 80 in macOS Tahoe, including:

  • WebKit flaws

  • Sandbox escapes

  • Privilege escalation vulnerabilities

  • Gatekeeper bypasses

WebKit continues to represent a major attack surface because nearly every application leveraging embedded browser functionality inherits the risk. This reinforces how browsers and mobile ecosystems remain foundational exposure points in modern enterprise environments.

iOS/iPadOS 26.5 | 60+ CVEs including 20 WebKit flaws macOS Tahoe 26.5 | ~80 vulnerabilities including root privilege escalation, sandbox escape, Gatekeeper bypass Legacy: Sequoia 15.7.7 and Sonoma 14.8.7 also updated

🎨 Adobe – 52 Vulnerabilities Across Critical Products

Adobe addressed 52 vulnerabilities across ten products, including highly severe flaws in Adobe Connect and Adobe Commerce.

  • CVE-2026-34659: Adobe Connect RCE (CVSS 9.6)

  • CVE-2026-34660: Adobe Connect privilege escalation (CVSS 9.3)

The concern here is speed. Adobe vulnerabilities tend to be weaponized quickly once public disclosures occur, particularly within collaboration and commerce platforms that frequently sit internet-facing inside enterprise environments.

🏢 SAP – Authentication Bypass and ERP Exposure

SAP patched two critical vulnerabilities affecting SAP Commerce Cloud and S/4HANA environments, including an authentication bypass capable of leading directly to server-side code execution.

  • CVE-2026-34260: SQL injection in S/4HANA (missing input validation, exfiltrate financial/procurement data)

  • CVE-2026-34263: Authentication bypass in SAP Commerce Cloud (improper Spring security config, no credentials required, arbitrary server-side code execution)

ERP environments continue to attract ransomware groups because they provide direct access to financial systems, procurement workflows, and sensitive operational data. Organizations with internet-exposed SAP infrastructure should already be treating these patches as emergency-level priorities.

🛡️ Fortinet – Public PoC Already Circulating

Fortinet disclosed critical unauthenticated RCE vulnerabilities affecting FortiSandbox and FortiAuthenticator, with proof-of-concept exploit code already publicly circulating.

  • CVE-2026-39808, CVE-2026-39813: Unauthenticated RCE in FortiSandbox

  • CVE-2026-44277: FortiAuthenticator vulnerability

URGENCY ESCALATOR: Public PoC for CVE-2026-39808 is already circulating.

This matters because compromising a malware analysis platform or MFA infrastructure directly undermines trust in downstream defensive operations. Once again, attackers are targeting the systems defenders rely on most.

🔥 Ivanti – Still the Gift That Keeps Giving

Ivanti released seven new CVEs affecting Endpoint Manager and other products, including SQL injection vulnerabilities capable of enabling remote code execution.

Flag immediately: CVE-2026-42212 — SQL injection to RCE in EPM

At this point, Ivanti vulnerabilities have become almost synonymous with persistent exploitation campaigns. What stood out, however, was Ivanti acknowledging that AI-assisted red team tooling identified vulnerabilities traditional security scanning methods missed entirely.

That’s a signal the rest of the industry should pay attention to carefully.

🏨 BWH Hotels Breach – Six Months of Guest Reservation Access

BWH Hotels, parent company of Best Western, disclosed that attackers maintained persistent access to a reservation application for approximately six months.

The exposed information included:

  • Names

  • Email addresses

  • Home addresses

  • Reservation details

  • Travel dates

  • Special accommodation requests

While payment data was reportedly unaffected, this type of information creates extremely rich social engineering datasets. Attackers can now craft phishing and fraud campaigns referencing real travel patterns and personal requests, dramatically increasing credibility and targeting effectiveness.

🏦 Community Bank Self-Reports AI Data Exposure to the SEC

Community Bank disclosed to the SEC that an employee used an unauthorized AI chatbot tool that exposed customer data including names, dates of birth, and Social Security numbers.

This may become one of the first major examples of “shadow AI” evolving into a formal regulatory disclosure event.

The key issue here is governance. Employees are already integrating AI tools into workflows faster than organizations can create policies or controls to manage them. Without strong DLP enforcement and AI governance frameworks, this type of incident will become increasingly common.

🤖 Cloudflare and Arctic Wolf Layoffs – AI Reshapes Cybersecurity Jobs

Cloudflare cut approximately 1,100 employees while Arctic Wolf reduced staffing by 250 positions, both explicitly citing increased AI adoption and operational automation.

This represents a major strategic shift inside the cybersecurity industry itself. AI is no longer just augmenting operations, it’s actively reshaping workforce models.

However, there’s still an important caveat. AI systems today still struggle with drift, hallucinations, context accuracy, and nuanced operational decision-making. Human expertise remains essential, especially in incident response, architecture, governance, and strategic security leadership.

The organizations that succeed in this transition will likely be the ones combining AI acceleration with skilled human oversight, not replacing one with the other entirely.

🎯 Key Takeaway

👉 Cybersecurity is no longer facing isolated incidents, it’s facing simultaneous pressure across infrastructure, software, workforce, and operational trust models.

🛠️ Action Items for Security Leaders

  • 🔐 Audit all Canvas-linked identity providers and enforce credential resets

  • 🏭 Review OT segmentation and production continuity plans in manufacturing environments

  • 🧬 Pin package versions and audit GitHub Actions workflows for supply chain exposure

  • 🩹 Prioritize DNS, Netlogon, SAP Commerce, and Fortinet patches immediately

  • 🍎 Push Apple MDM updates across all managed endpoints

  • 🛡️ Isolate Fortinet and Ivanti management interfaces from internet exposure

  • 🏨 Increase monitoring for social engineering tied to hospitality reservation data

  • 🏦 Deploy DLP controls specifically targeting AI chatbot interactions

  • 🤖 Begin workforce planning around AI orchestration and security oversight skills

  • 🔍 Reevaluate assumptions around signed packages and software provenance validation

Leave a comment

🧠 James Azar’s CISOs Take

What stood out to me today is that every layer of the stack got hit simultaneously. Manufacturing operations, education systems, developer ecosystems, identity infrastructure, and even workforce models are all under pressure at the same time. The Foxconn attack shows how ransomware now impacts global production continuity, while the Shai-Hulud campaign demonstrates that even modern supply chain integrity controls are no longer enough on their own.

The second takeaway is that AI is rapidly changing both sides of cybersecurity. Attackers are leveraging automation and AI-assisted tooling to accelerate operations, while defenders and vendors are restructuring teams around AI adoption. But we’re still early in this transition. AI today is powerful, but it still requires strong human oversight to avoid hallucinations, operational drift, and strategic mistakes. The organizations that balance automation with experienced human judgment are going to be the ones best positioned moving forward.

🔥 Stay Cyber Safe.

Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.

Share

Discussion about this episode

User's avatar

Ready for more?