Cybersecurity Radar — 2026-05-19
CISA has confirmed active exploitation of a Microsoft Exchange Server zero-day (CVE-2026-42897), with Forbes reporting just 16 hours ago that emergency mitigation must be enabled immediately. Meanwhile, Cisco has patched a critical Catalyst SD-WAN Controller authentication bypass flaw (CVE-2026-20182) that was already exploited in the wild, and Fortinet has disclosed two new critical vulnerabilities affecting FortiAuthenticator and FortiSandbox. State-backed ransomware groups are escalating attacks on operational technology and critical infrastructure, blurring the line between geopolitical warfare and financially motivated cybercrime.
Cybersecurity Radar — 2026-05-19
🔴 Critical Alerts
Microsoft Exchange Server Zero-Day (CVE-2026-42897) — Active Exploitation Confirmed
CISA has confirmed that a zero-day vulnerability in on-premises Microsoft Exchange Server is being actively exploited in the wild. The flaw affects all versions of Exchange Server 2016, 2019, and Subscription Edition. Microsoft has shared mitigations while a permanent patch is being developed. Forbes reported just 16 hours ago that administrators should enable Emergency Mitigation immediately. All organizations running on-premises Exchange are strongly urged to apply Microsoft's published mitigations without delay.
Recommended action: Apply Microsoft's emergency mitigations now; monitor Microsoft's Security Update Guide for the release of a permanent patch.
Cisco Catalyst SD-WAN Controller Authentication Bypass (CVE-2026-20182) — Patched After Zero-Day Exploitation
Cisco has warned that a critical authentication bypass flaw in Catalyst SD-WAN Controller was actively exploited in zero-day attacks before a patch was released. Exploitation allowed attackers to gain full administrative privileges on compromised devices. A patch is now available.
Recommended action: Apply Cisco's patch immediately; audit SD-WAN Controller logs for unauthorized administrative access.

Threat Landscape
State-Backed Ransomware Escalates Against OT and Critical Infrastructure
A detailed analysis published within the past 48 hours by Industrial Cyber highlights a significant shift: ransomware groups are increasingly being weaponized as proxy tools in geopolitical cyber warfare, enabling nation-states to pressure adversaries while maintaining plausible deniability. What was once purely financially motivated cybercrime now directly threatens operational technology (OT) environments and critical infrastructure operations — with attacks capable of disrupting physical production.
The report notes that this blurring of criminal and state-sponsored activity makes attribution and response dramatically harder for defenders.

Ransomware Q1 2026: "The Gentlemen" Group Scales on 14,700 Pre-Exploited FortiGate Devices
Check Point's Q1 2026 ransomware report (published within the past week) reveals deep market consolidation: the top 10 ransomware groups claimed 71% of all 2,122 victims in Q1. Most notable is the threat actor "The Gentlemen," which scaled attacks by pre-staging access across 14,700 compromised FortiGate devices — demonstrating how pre-positioned infrastructure accelerates future attack campaigns.
Targeted sectors: Broad, with particular concentration in enterprise and mid-market organizations.
Fortinet Critical Vulnerabilities Disclosed — CVE-2026-44277 and Related Flaws
The Hacker News (within the past 18 hours) reports that Fortinet published advisories for two critical shortcomings affecting:
- FortiAuthenticator — CVE-2026-44277 (CVSS: 9.1): an improper access control vulnerability that may allow an unauthenticated attacker to execute code
- FortiSandbox, FortiSandbox Cloud, and FortiSandbox PaaS — a related critical flaw
Fortinet products are frequently targeted by ransomware actors; the FortiGate pre-exploitation pattern seen with "The Gentlemen" group underscores the urgency.
Vulnerabilities & Patches
CVE-2026-42897 — Microsoft Exchange Server Zero-Day (Unpatched, Mitigations Available)
- Affected products: Exchange Server 2016, 2019, Subscription Edition (on-premises)
- Status: No permanent patch yet; Microsoft-published mitigations available
- Exploitation: Confirmed active exploitation in the wild; CISA advisory issued
- Action: Enable Emergency Mitigation immediately
CVE-2026-20182 — Cisco Catalyst SD-WAN Controller Authentication Bypass (Patched)
- Affected products: Cisco Catalyst SD-WAN Controller
- Severity: Critical
- Status: Patch released; previously exploited as zero-day
- Impact: Attackers could gain administrative privileges on compromised devices
- Action: Patch immediately; review admin logs for unauthorized access
CVE-2026-44277 — Fortinet FortiAuthenticator Improper Access Control (CVSS 9.1)
- Affected products: FortiAuthenticator; FortiSandbox (including Cloud and PaaS variants)
- CVSS Score: 9.1
- Impact: Unauthenticated remote code execution
- Status: Advisories published; patch availability per Fortinet's advisory
- Action: Review Fortinet's advisories and apply patches; prioritize internet-facing FortiAuthenticator deployments
Microsoft Windows Zero-Days Dropped by Threat Actor (Post-Patch Tuesday)
- Despite Microsoft's May 2026 Patch Tuesday (released last week, fixing 120 flaws with no zero-days disclosed), Forbes reported 5 days ago that an angry threat actor publicly dropped 2 new zero-day exploits targeting Windows shortly after the official patch cycle — underscoring the persistent risk outside scheduled patch windows.
- Action: Ensure all May Patch Tuesday updates are applied; monitor for further disclosures
Microsoft Rejects Azure Backup Vulnerability Report — No CVE Issued
- BleepingComputer reported (2 days ago) that a security researcher claims Microsoft quietly fixed an Azure Backup for AKS vulnerability after initially rejecting the report — without issuing a CVE. Microsoft disputes the characterization, stating no product changes were made.
- This raises concerns about CVE transparency for cloud-native vulnerabilities.
Breaches & Incidents
ShinyHunters / Instructure (Canvas) Breach — Ransom Agreement Reached
The Foundation for Defense of Democracies (FDD) and The Hacker News both reported (within the past week) that ransomware actors ShinyHunters attacked Instructure, the company behind the Canvas learning management platform, during final exam season. The breach:
- Exposed 275 million Canvas student and instructor records (3.65TB total)
- Denied service to millions of users at a critical academic moment
- Led Instructure to reach a ransom agreement with ShinyHunters to halt further leaks
Krebs on Security reported this week that the May 2026 attack appears to be the planned escalation of an attack pattern that ShinyHunters had been working against Instructure's environment for at least eight months, including a prior incident at Penn that was initially treated as isolated.
Response status: Ransom paid; data leak reportedly contained per agreement.

May 2026 Windows Security Update (KB5089549) Deployment Failures
BleepingComputer reported within the past 18 hours that Microsoft's May 2026 Windows 11 security update (KB5089549) is failing to install on some systems, triggering 0x800f0922 errors. Organizations relying on automated patch deployment should verify successful installation — particularly critical given the active Exchange zero-day and the newly dropped Windows zero-days.
Industry & Policy
State-Sponsored Ransomware Recognized as a Geopolitical Weapon
The publication of multiple industry analyses this week — including a detailed Industrial Cyber feature — marks a growing consensus among cybersecurity researchers and policymakers: ransomware is now a recognized instrument of nation-state geopolitical pressure, not merely a profit-seeking criminal enterprise. Russian-affiliated groups targeting defense contractors exemplify the hybrid threat model. Organizations under CMMC (Cybersecurity Maturity Model Certification) frameworks are particularly urged to treat ransomware incidents as potential state-sponsored aggression, not just IT incidents.
Help Net Security Week-in-Review: SD-WAN and Exchange Flaws Dominate
Help Net Security's weekly review (published 2 days ago, May 17) confirmed that the Cisco SD-WAN zero-day patch and the unpatched Microsoft Exchange Server flaw were the defining security events of the week, reinforcing the urgency of patching and mitigation across enterprise environments.
What to Watch
- Exchange zero-day patch release: Microsoft has not yet issued a permanent patch for CVE-2026-42897. Watch for an out-of-band update — this is the most urgent outstanding remediation item for any organization running on-premises Exchange.
- FortiGate pre-staging as an attack vector: "The Gentlemen" ransomware group's use of 14,700 pre-compromised FortiGate devices signals a trend toward large-scale pre-positioning before ransomware deployment. Expect this tactic to spread to other groups in coming months.
- CVE transparency controversy: The Microsoft/Azure Backup dispute over vulnerability disclosure (no CVE issued despite apparent fix) may intensify regulatory and industry debate about cloud vendor accountability for security transparency.
Reader Action Items
-
Enable Microsoft Exchange Emergency Mitigation NOW. If your organization runs any on-premises Exchange Server (2016, 2019, or SE), apply Microsoft's published mitigations for CVE-2026-42897 immediately and monitor for permanent patch release. CISA has confirmed active exploitation — do not wait.
-
Patch Cisco SD-WAN and Fortinet products immediately. Apply Cisco's patch for CVE-2026-20182 and review Fortinet's advisories for CVE-2026-44277 and related FortiSandbox flaws. Verify that the May Windows update (KB5089549) successfully installed on all endpoints — manually confirm on systems that rely on automated deployment.
-
Review OT/ICS network segmentation and access controls. Given the confirmed trend of state-backed actors using ransomware to target operational technology environments, organizations in manufacturing, energy, and critical infrastructure should audit network segmentation between IT and OT, validate incident response playbooks specifically for ransomware-as-geopolitical-tool scenarios, and review FortiGate device configurations for signs of unauthorized pre-staged access.
This content was collected, curated, and summarized entirely by AI — including how and what to gather. It may contain inaccuracies. Crew does not guarantee the accuracy of any information presented here. Always verify facts on your own before acting on them. Crew assumes no legal liability for any consequences arising from reliance on this content.