Key Developments in Open Source and Security: May 2026

Explore key stories from LWN.net's weekly edition: LLM security risks, restartable sequences in TCMalloc, Fedora/GNOME bugs, Prolly trees, Arm on s390 mainframes, and other open source updates.

Exploring the Latest in Open Source: LWN.net's Weekly Highlights

Q&A covering LLM security, restartable sequences & TCMalloc, Fedora/GNOME bugs, Prolly trees, Arm on s390, Alpine outage, and GCC/Incus/NetHack updates.

10 Critical Things to Know About Firefox's Historic 271 Zero-Day Discovery

Firefox and Anthropic used Claude Mythos AI to find 271 zero-days. This listicle covers the discovery, patching, and defender advantage, offering lessons for cybersecurity teams.

6 Critical Facts About the DarkSword iOS Exploit Chain That Threaten Your Device

DarkSword is a sophisticated government-designed iOS exploit chain using six zero-days, targeting multiple countries and deploying three malware families; leaked after discovery.

Apple May Introduce Fresh MacBook Neo Colors to Offset Rising Costs

Apple may add new MacBook Neo colors to offset potential price hikes due to rising production costs from scaled-up orders, chip shortages, and higher DRAM prices.

New 'ABCDoor' Backdoor Unleashed: Silver Fox Targets Russian and Indian Taxpayers in Coordinated Phishing Blitz

Silver Fox group launches phishing campaigns targeting Indian and Russian taxpayers with new Python backdoor ABCDoor, using Rust-based loader and ValleyRAT. Over 1,600 emails recorded.

Amazon SES Weaponized: How Cybercriminals Exploit Trusted Email Infrastructure

Cybercriminals are exploiting Amazon SES to send phishing emails that pass all security checks. Leaked IAM keys enable mass attacks. Experts urge content-based detection and user vigilance.

OceanLotus APT32 Suspected in Novel PyPI Supply Chain Attack Spreading ZiChatBot Malware

OceanLotus APT32 suspected in PyPI supply chain attack delivering new ZiChatBot malware targeting Windows and Linux via fake libraries.

Exploit Kit Surge in First Quarter 2026 Targets Microsoft Office, Windows, and Linux Systems

Q1 2026 saw a surge in exploit kits targeting Microsoft Office, Windows, and Linux, with a continued rise in registered CVEs and persistent use of legacy vulnerabilities.

Breathing New Life into a 1947 Arvin 664A AM Radio: A Restoration Journey

A 1947 Arvin 664A AM radio found in a homemade cabinet is restored by Ken's Shop. Replacing capacitors and cosmetic work bring it back to life.

Bringing Your Linux Desktop into Virtual Reality with WayVR

WayVR brings the Linux desktop into virtual reality, allowing full control with VR controllers. Learn how it differs from WiVRn, setup steps, and customization options.

Securing vSphere Against BRICKSTORM: Key Questions and Answers for Defenders

This Q&A guide explains BRICKSTORM malware targeting vSphere, why VCSA is vulnerable, persistence techniques, hardening strategies, the role of Mandiant's script, and detection methods for defenders.

Germany's Cyber Extortion Crisis: A Q&A on 2025's Data Leak Surge

Germany saw a 92% surge in data leak victims in 2025, driven by cyber criminals pivoting from English-speaking targets, aided by AI localization, and focusing on vulnerable Mittelstand firms.

Fortifying Your Enterprise in the Age of AI-Driven Vulnerability Discovery

Answering key questions about AI-driven vulnerability exploitation, accelerated attack timelines, and enterprise defense strategies including hardening, AI integration, and playbook updates.

Snow Flurries: Inside UNC6692's Social Engineering and Custom Malware Campaign

UNC6692 campaign used impersonation via Teams, AutoHotKey scripts, and SNOWBELT extension for deep network penetration.

Breaking: Cybersecurity Consultant Demand Hits Record High as Global Cybercrime Damages Exceed $10 Trillion

Cybersecurity consultant demand surges 30% as cybercrime costs exceed $10 trillion globally, prompting IEEE expert advice on essential skills and certifications.

Weekly Cyber Threat Digest: April 20, 2025

Weekly cyber threat digest covering Booking.com, McGraw-Hill, EssentialPlugin, Basic-Fit breaches; AI-driven attacks on Mexican agencies, Claude phishing, GitHub prompt injection; Apache ActiveMQ and Splunk patches.

Weekly Cyber Threat Digest: Breaches, AI Exploits, and Critical Patches (April 27)

Breaches at Vercel, France Titres, UK Biobank, Bitwarden; AI threats like Bissa Scanner; critical Microsoft and Apple patches.

Weekly Cybersecurity Roundup: Major Breaches, AI-Powered Threats, and Critical Patches (May 4th)

Weekly threat roundup: Medtronic data breach, Vimeo vendor compromise, Robinhood phishing, Trellix code leak, plus AI-powered attacks and critical patches for Microsoft Entra ID and cPanel.

How to Nominate a Cybersecurity Star for the 2026 Awards: A Step-by-Step Guide

Step-by-step guide to nominate cybersecurity professionals, teams, or products for the 2026 Cybersecurity Stars Awards. Includes eligibility, narrative tips, and submission process.

Explore

How Massachusetts Locked in $1.4 Billion in Offshore Wind Savings: A Step-by-Step Guide6 Critical Facts About the DarkSword iOS Exploit Chain That Threaten Your DeviceNeoen Activates One of Australia’s Largest Solar Farms; Giant Battery Phase in PipelineXteink Blocks Third-Party Firmware on Its Pocket-Sized E-Readers, Users ReportThe Deadly Landslides Triggered by Cyclone Maila in Papua New Guinea: Key Questions Answered