Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director Frontrunner
    Cybersecurity

    In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director Frontrunner

    adminBy adminMay 8, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Cybersecurity News tidbits
    Share
    Facebook Twitter LinkedIn Pinterest Email

    SecurityWeek’s weekly cybersecurity news roundup offers a concise overview of important developments that may not receive full standalone coverage but remain relevant to the broader threat landscape.

    This curated summary highlights key stories across vulnerability disclosures, emerging attack methods, policy updates, industry reports, and other noteworthy events to help readers maintain a well-rounded awareness of the evolving cybersecurity environment.

    Here are this week’s highlights:

    US government targets 72-hour patch cycles

    US cybersecurity officials are proposing a significant reduction in federal remediation timelines, moving from a 14-day window to just three days for critical vulnerabilities, Reuters learned. This shift is driven by the rise of sophisticated AI models like Anthropic’s Mythos and OpenAI’s GPT-5.4-Cyber, which allow attackers to weaponize software flaws at unprecedented speeds. It’s worth noting that CISA even now instructs federal agencies to patch some vulnerabilities within three days if the risk of exploitation is significant. 

    Malware leverages Windows Phone Link to steal OTPs

    Advertisement. Scroll to continue reading.

    Cisco Talos has identified a modular malware campaign featuring the CloudZ remote access tool and a new plugin named Pheno. This threat intercepts one-time passwords and SMS messages by targeting the Microsoft Phone Link application to extract data from synchronized SQLite databases on the host PC. The infection chain utilizes a Rust-compiled loader and reflective .NET execution to bypass detection mechanisms.

    Another Venezuelan ATM jackpotter to be deported

    Venezuelan national David Jose Gomez Cegarra was sentenced to time served for his role in an ATM jackpotting operation that stole nearly $300,000 from several banks. The group bypassed security by physically accessing ATM hard drives to install malware, allowing them to trigger cash dispensations. Following his conviction for bank larceny, Cegarra was ordered to pay $294,000 in restitution and was transferred to ICE for deportation.

    Train hacker arrested in Taiwan

    A 23-year-old student has been detained in Taiwan for allegedly infiltrating the high-speed rail network and transmitting fake General Alarm signals to the control center. By cloning Tetra radio signals to trigger manual emergency braking, the suspect forced several trains to stop. Authorities seized multiple radio and electronic devices during the investigation, and the suspect now faces several charges, including interference with public transportation safety.

    IBM security executive positioned as frontrunner for CISA director

    Tom Parker, a security services lead at IBM, has surfaced as a primary candidate to lead the Cybersecurity and Infrastructure Security Agency (CISA) following the withdrawal of Sean Plankey. The Trump administration reportedly favors Parker’s extensive private sector background, which includes founding Hubble. If appointed, he will take over the agency currently overseen by acting director Nick Andersen.

    Drone forum participants targeted in Eurasian spy operation  

    Researchers have identified a targeted spy operation called Operation Silent Rotor aimed at the Eurasian drone industry. Attackers used spear-phishing emails disguised as orders from the Russian Aeronautical Information Center to trick victims into running malware that steals data. The campaign was specifically timed to hit attendees of the Unmanned Aviation 2026 forum in Moscow, allowing the hackers to compromise high-value targets in the sector.

    More US residents imprisoned for operating North Korean laptop farms

    Matthew Isaac Knoot and Erick Ntekereze Prince were each sentenced to 18 months in prison for enabling North Korean IT workers to infiltrate nearly 70 US companies and generate $1.2 million for the sanctioned regime. The defendants hosted corporate laptops at their homes and installed unauthorized remote access software to create the illusion that the overseas workers were operating from within the United States. 

    Gaming platform exploited in North Korean spy campaign

    The North Korea-linked threat actor ScarCruft conducted targeted surveillance against users in the Yanbian region of China by compromising a video game platform used by ethnic Koreans living there. By trojanizing Windows update files and Android game packages, the group deployed the BirdCall backdoor to exfiltrate personal documents and record audio from victim devices. 

    New Linux backdoor PamDOORa 

    A threat actor known as ‘darkworm’ is marketing the source code for PamDOORa, a sophisticated post-exploitation tool designed to compromise the Linux Pluggable Authentication Module (PAM) stack. This backdoor enables persistent SSH access while simultaneously harvesting plaintext credentials from legitimate users, potentially even from incident responders. The malware is currently being offered on a Russian cybercrime forum for $900.

    Hard power cycles required to eradicate Firestarter implant from Cisco firewalls  

    The ArcaneDoor cyber espionage group is using a persistent Linux-based malware called Firestarter to compromise Cisco firewalls. According to Eclypsium, this implant hooks the core LINA process to evade detection and remains active even after firmware patches by re-installing its persistence mechanism during the system’s reboot sequence. Performing a hard power cycle by physically disconnecting the hardware from all power sources for at least one minute is needed to fully purge the infection.

    Related: In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability

    Related: In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

    arrested backdoor CISA director Frontrunner Hacker Linux news PamDOORa train
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleCommunity That Drives AI Visibility
    Next Article What They Are and How to Use Them
    admin
    • Website

    Related Posts

    Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals

    May 20, 2026

    GitHub confirms breach of 3,800 repos via malicious VSCode extension

    May 20, 2026

    Grafana GitHub Breach Exposes Source Code via TanStack npm Attack

    May 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    WordPress 7.0 Launches With Native AI Integration

    May 21, 2026

    Best AI search analytics tools for marketing teams

    May 21, 2026

    Google tests new conversational ad formats in AI Mode and Search

    May 21, 2026

    How to measure AI search visibility: KPIs & reporting

    May 21, 2026
    Categories
    • Blogging (82)
    • Cybersecurity (1,955)
    • Privacy & Online Earning (223)
    • SEO & Digital Marketing (1,218)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (306)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    WordPress 7.0 Launches With Native AI Integration

    May 21, 2026

    Best AI search analytics tools for marketing teams

    May 21, 2026

    Google tests new conversational ad formats in AI Mode and Search

    May 21, 2026
    Most Popular
    • WordPress 7.0 Launches With Native AI Integration
    • Best AI search analytics tools for marketing teams
    • Google tests new conversational ad formats in AI Mode and Search
    • How to measure AI search visibility: KPIs & reporting
    • Mueller Explains Why Google Uses Markdown On Dev Docs
    • Google Marketing Live 2026: Everything you need to know
    • Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’
    • 12 Awesome Custom Google Analytics Reports Created by the Experts
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.