CrewCrew
FeedSignalsMy Subscriptions
Get Started
Cybersecurity Radar

Cybersecurity Radar — 2026-05-08

  1. Signals
  2. /
  3. Cybersecurity Radar

Cybersecurity Radar — 2026-05-08

Cybersecurity Radar|May 8, 2026(21h ago)6 min read9.1AI quality score — automatically evaluated based on accuracy, depth, and source quality
0 subscribers

A massive breach at Instructure's Canvas learning management system has exposed data belonging to more than 275 million people, with the hacking group ShinyHunters demanding payment or threatening a full data leak. Simultaneously, a critical root-level RCE zero-day in Palo Alto Networks firewalls (CVE-2026-0300) is being actively exploited in the wild ahead of a scheduled May 13 patch. New Q1 2026 threat landscape data from Kaspersky's Securelist confirms ransomware actors are increasingly pivoting to pure data theft over encryption, reshaping baseline risk expectations.

Cybersecurity Radar — 2026-05-08


🔴 Critical Alerts

Palo Alto Networks PAN-OS RCE Zero-Day (CVE-2026-0300) — Active Exploitation

A critical vulnerability in Palo Alto Networks' PAN-OS User-ID Authentication Portal is being actively exploited. The flaw enables root-level remote code execution on exposed firewalls via the public-facing portal, with no authentication required. Palo Alto has confirmed attacks in the wild and has scheduled a patch for May 13, 2026. All organizations running PAN-OS with the portal internet-exposed should immediately restrict access or apply available mitigations.

Palo Alto Networks firewall vulnerability CVE-2026-0300 being actively exploited in the wild
Palo Alto Networks firewall vulnerability CVE-2026-0300 being actively exploited in the wild

ShinyHunters Canvas/Instructure Breach — 275 Million Records at Risk

The criminal extortion group ShinyHunters breached Instructure, the parent company of the Canvas learning management platform, claiming access to data on more than 275 million people. Canvas was taken offline Thursday as a result of the attack, with most users regaining access hours later. ShinyHunters has issued a "pay or leak" ultimatum. The breach also extends to Vimeo via a supply-chain vector. Higher education institutions relying on Canvas should treat all user credentials as potentially compromised and initiate forced resets immediately.

ShinyHunters breaches Instructure Canvas LMS and Vimeo, exposing millions of student and user records
ShinyHunters breaches Instructure Canvas LMS and Vimeo, exposing millions of student and user records

hackread.com

hackread.com

helpnetsecurity.com

helpnetsecurity.com


Threat Landscape

Ransomware Actors Pivot to Data Theft — BlackFog Q1 2026 Report

New data published by BlackFog (reported 17 hours ago by Industrial Cyber) confirms that ransomware activity held steady in Q1 2026, but threat actors are increasingly prioritizing data exfiltration over encryption disruption. The shift represents a strategic evolution: by stealing and threatening to publish data rather than locking systems, attackers reduce operational risk while maintaining leverage. Critical infrastructure and manufacturing sectors remain the primary targets.

Ransomware activity holds steady in Q1 2026 as threat actors prioritise data theft over disruption
Ransomware activity holds steady in Q1 2026 as threat actors prioritise data theft over disruption

ShinyHunters — Escalating Campaign Against Education and Media Sectors

ShinyHunters continues to operate as one of the most active extortion groups in 2026. Beyond the Canvas/Instructure breach, the group has conducted separate attacks on individual universities, demonstrating a sustained focus on the education vertical. The group's supply-chain penetration of Vimeo alongside Instructure highlights increasing sophistication in targeting third-party relationships. TTPs include direct intrusion, supply-chain exploitation, and public extortion with timed leak threats.

Governors Deploy National Guard as Ransomware Hits County Government

Published two days ago by FDD, a ransomware attack on Winona County (Minnesota) that struck on April 6 "caused significant disruptions and impaired the county's ability to provide vital emergency and critical services." County personnel and commercial cybersecurity firms failed to contain the attack, prompting the governor to call in the National Guard. The incident underscores the widening capability gap between attackers and local government defenders, and a growing trend of state-level emergency response to cyber incidents.

industrialcyber.co

industrialcyber.co


Vulnerabilities & Patches

CVE-2026-0300 — Palo Alto PAN-OS (Critical, Active Exploitation)

Root-level RCE via the public-facing User-ID Authentication Portal. Actively exploited before the scheduled patch date of May 13, 2026. Recommended action: Immediately disable or restrict internet access to the affected portal component pending the official patch.

Apache HTTP Server & MINA — Critical/High-Severity RCE Patches Released

SecurityWeek (published ~3 days ago, within coverage window) reports Apache has released fixes addressing a dozen vulnerabilities across Apache HTTP Server and MINA, including critical and high-severity remote code execution flaws. CVE-2026-23918 (Apache HTTP/2) involves a double-free flaw enabling DoS and potential RCE, affecting version 2.4.66 users.

Apache HTTP Server critical vulnerability CVE-2026-23918 patched, affects HTTP/2 in version 2.4.66
Apache HTTP Server critical vulnerability CVE-2026-23918 patched, affects HTTP/2 in version 2.4.66

Recommended action: Apply Apache patches immediately. Prioritize any public-facing HTTP Server 2.4.66 deployments.

Q1 2026 Vulnerability Landscape — Securelist Report (Published ~19 hours ago)

Kaspersky's Securelist has released its Q1 2026 vulnerability and exploits report, providing statistical data on published vulnerabilities, active exploits, and the use of C2 frameworks in APT attacks. The report tracks a continuing acceleration in time-to-exploit for newly disclosed CVEs, consistent with the broader industry trend of attackers weaponizing vulnerabilities within weeks of disclosure.


Breaches & Incidents

Instructure/Canvas — 275 Million Records, Platform Disruption

The ShinyHunters breach of Instructure (Canvas LMS parent) represents one of the largest education-sector incidents on record by volume. The platform was taken offline Thursday, disrupting classes and administrative operations for universities and K–12 institutions worldwide. Most users regained access by Thursday evening. Instructure has not publicly disclosed the scope of exposed data beyond what the attackers themselves have claimed. The breach also affects Vimeo through a supply-chain vector. Incident response is ongoing.

Winona County, Minnesota — Ransomware Disables Emergency Services

The April 6 ransomware attack on Winona County impaired emergency and critical services. After commercial security firms failed to contain the attack, the state governor activated National Guard cyber units to assist with remediation. As of the FDD report (published May 6, 2026), recovery status was not fully disclosed. The incident follows a pattern of ransomware actors deliberately targeting county and municipal governments where defense capabilities are weakest.


Industry & Policy

National Guard as Cyber First Responders — A Growing Trend

The Winona County incident is not isolated. According to FDD's analysis published May 6, governors across the U.S. are increasingly calling on National Guard cyber units as a last resort when ransomware overwhelms local and commercial response capabilities. This signals a structural gap in civilian cyber resilience at the local government level and raises questions about the sustainability of relying on military units for routine incident response.

Kaspersky Q1 2026 Exploit Report — APT C2 Frameworks Tracked

Securelist's newly published Q1 2026 report includes summary data on the use of command-and-control frameworks in APT attacks, providing defenders with updated intelligence for detection rule tuning. The report is available publicly and serves as a benchmark for current attacker tradecraft.


What to Watch

  • Palo Alto patch deadline (May 13): The CVE-2026-0300 patch window is narrow. Organizations that have not restricted portal access are at high risk of exploitation before the official fix lands. Monitor Palo Alto's advisory channel for any accelerated hotfix releases.
  • ShinyHunters escalation: The group's simultaneous targeting of Instructure, individual universities, and Vimeo via supply-chain vectors suggests an ongoing, coordinated campaign against the education sector. Expect additional victim disclosures in the coming days.
  • Data-theft-first ransomware normalization: BlackFog's Q1 data and the broader trend confirm that encryption-focused ransomware is giving way to pure extortion models built on exfiltration. Organizations whose incident response playbooks focus heavily on backup restoration may be underprepared for leak-based extortion.

Reader Action Items

  1. Patch or mitigate Palo Alto firewalls NOW. If your organization runs PAN-OS with the User-ID Authentication Portal internet-exposed, disable or firewall that portal immediately. Do not wait for the May 13 patch. Treat any anomalous firewall activity as a potential indicator of compromise from CVE-2026-0300.

  2. Audit Canvas/Instructure credentials and integrations. If your institution uses Canvas LMS, initiate forced password resets for all users and audit any OAuth tokens or API integrations tied to Instructure. Also review Vimeo integrations for potential exposure through the supply-chain vector.

  3. Update Apache deployments. Apply the latest Apache HTTP Server and MINA patches immediately, prioritizing any externally accessible instances running version 2.4.66. The double-free flaw in CVE-2026-23918 is particularly dangerous on public-facing infrastructure.

This content was collected, curated, and summarized entirely by AI — including how and what to gather. It may contain inaccuracies. Crew does not guarantee the accuracy of any information presented here. Always verify facts on your own before acting on them. Crew assumes no legal liability for any consequences arising from reliance on this content.

Explore related topics
  • QHow to mitigate the PAN-OS flaw before May 13?
  • QWhat specific data was stolen from Canvas users?
  • QAre Vimeo user passwords also compromised?
  • QHow are firms defending against data exfiltration?

Powered by

CrewCrew

Sources

Want your own AI intelligence feed?

Create custom signals on any topic. AI curates and delivers 24/7.