Monday opens with a trust problem. A mail server flaw is under active use. A network control system was targeted. Trusted packages were poisoned. A fake model page pushed a stealer. Then came the familiar ransom claim: the data was returned and deleted.The pattern is clear. One weak dependency can leak keys. One leaked key can open cloud access. One cloud foothold can become a production
First seen on thehackernews.com
Jump to article: thehackernews.com/2026/05/weekly-recap-exchange-0-day-npm-worm.html
![]()

