top of page
Untitled design.png

Weekly INK

Each week we compile an advisory on the latest threats, trends and newsworthy topics from the cyber security industry affecting small and medium enterprises. Join our subscribers below and help us prevent cybersecurity breaches.

watermark4.png

Issue #197 - May 4, 2026

  • 4 days ago
  • 2 min read

Attacks Abuse Windows Phone Link to Steal Texts & Bypass 2FA

Source: Dark Reading

Researchers say attackers are abusing Microsoft Phone Link on compromised Windows systems to intercept SMS messages and one-time passcodes from paired phones without infecting the mobile device itself. The campaign shows how trusted cross-device features can quietly become a path to credential theft and two-factor bypass.




MetInfo, Weaver E-cology Vulnerabilities in Attackers’ Crosshairs

Source: SecurityWeek

Attackers are actively exploiting critical flaws in MetInfo and Weaver E-cology, two enterprise platforms widely used in China. The bugs allow unauthenticated remote code execution, and observed activity included probing, payload delivery, and discovery commands. The story is a reminder that internet-facing business apps can become immediate entry points.




PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage

Source: The Hacker News

Palo Alto Networks says attackers have actively exploited a critical PAN-OS User-ID Authentication Portal flaw to gain unauthenticated remote code execution with root privileges. The observed follow-on activity included shellcode injection, log cleanup, Active Directory reconnaissance, and tunneling tools, pointing to disciplined intrusion activity consistent with espionage-focused tradecraft.




Critrical cPanel flaw mass-exploited in "Sorry" ransomware attacks

Source: BleepingComputer

A critical cPanel authentication bypass flaw is being mass-exploited to compromise servers and deploy the Linux-based “Sorry” ransomware. Reports indicate attackers moved quickly from public disclosure to real-world attacks, with thousands of internet-facing systems at risk. Organizations running cPanel should treat emergency patching and containment as immediate priorities.




Trellix Source Code Breach Highlights Growing Supply Chain Threats

Source: Dark Reading

Trellix disclosed unauthorized access to part of its source code repository, with no evidence so far that release or distribution processes were affected. Even so, breaches like this matter because source code can reveal product logic, detection methods, and build assumptions, giving attackers useful insight for future supply chain attacks.




 
 

Help us Prevent Breaches.

We will never share or sell your information. Unsubscribe at any time.

Email: *

Received.

bottom of page