Weekly Cyber Threat Digest: Major Breaches, AI Vulnerabilities, and Critical Patches (May 11th)
Executive Summary
This week's threat intelligence report covers significant data breaches affecting major organizations, emerging risks from AI-powered tools, and critical vulnerabilities requiring immediate patching. Highlights include a Canvas platform breach impacting millions of students and staff, a Zara customer data leak, and a WebSocket hijacking flaw in a popular AI coding agent.

Top Attacks and Breaches
Canvas Platform Breach: ShinyHunters Targets Instructure
Instructure, the US education technology company behind the widely used Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. The incident exposed sensitive records including student and staff information, private messages, and institutional communications. The threat actor group ShinyHunters escalated the attack by defacing hundreds of school login portals with ransom messages, amplifying the impact on educational institutions worldwide.
Zara Data Breach Tied to Third-Party Provider
Zara, the flagship brand of Spanish fashion group Inditex, experienced a data breach linked to a third-party technology provider. Inditex confirmed unauthorized access, and security experts verified that 197,400 unique email addresses, order IDs, purchase histories, and customer support tickets were exposed. The incident underscores risks in supply chain security for retail giants.
Mediaworks Extortion: 8.5 TB of Data Leaked
Hungarian media company Mediaworks, which operates dozens of newspapers and online outlets, was hit by a data-theft extortion attack. The company confirmed an intrusion after the threat group World Leaks posted 8.5 TB of internal files online. Exposed data reportedly includes payroll records, contracts, financial documents, and internal communications, highlighting the severe consequences of targeted extortion campaigns.
Škoda Online Shop Breach via Software Flaw
Czech automaker Škoda fell victim to a security incident affecting its online shop after attackers exploited a software flaw to gain unauthorized access. Exposed customer data may include names, contact details, order history, and login information. However, the company confirmed that passwords and payment card data were not affected, mitigating financial risk for customers.
AI Threats: Agent Hijacking and Malware Campaigns
Critical WebSocket Hijacking in Cline AI Agent (CVSS 9.7)
Researchers have uncovered a critical WebSocket hijacking vulnerability in Cline's local Kanban server, impacting the widely used open-source AI coding agent. Rated CVSS 9.7 and patched in version 0.1.66, the flaw allowed any website a developer visited to exfiltrate workspace data and inject arbitrary commands into the AI agent. This demonstrates how AI development tools can become a vector for supply chain attacks.

Claude Chrome Extension Flaw Enables Browser Hijacking
Security researchers found a flaw in Anthropic’s Claude in Chrome extension that allowed other browser extensions to hijack the AI agent. The issue enabled malicious prompts to trigger unauthorized actions and access sensitive browser-connected data, showing how AI assistants can extend browser attack surfaces and potentially compromise user privacy.
InstallFix Campaign: Fake Claude AI Installer Delivers Malware
Researchers detailed an InstallFix campaign using fake Claude AI installer pages promoted through Google Ads to infect Windows and macOS users. Victims were tricked into running commands that launched multi-stage malware, stole browser data, disabled protections, and established persistence through scheduled tasks. This campaign highlights the growing use of AI branding in social engineering attacks.
Vulnerabilities and Patches
Critical Authentication Bypass in Progress MOVEit Automation
Progress alerted customers to CVE-2026-4670, a critical authentication bypass in MOVEit Automation managed file transfer software that allows unauthorized access, and CVE-2026-5174, a privilege escalation flaw. Fixes are available in versions 2025.1.5, 2025.0.9, and 2024.1.8. Organizations using MOVEit should apply updates immediately to prevent potential exploitation.
Ivanti EPMM Zero-Day Vulnerability (CVE-2026-6973)
Ivanti has fixed CVE-2026-6973, a high-severity Endpoint Manager Mobile vulnerability that was exploited as a zero-day. The flaw affects EPMM 12.8.0.0 and earlier and allows attackers with administrator permissions to run remote code. While only administrators can exploit it, hundreds of appliances remain vulnerable without patching.
Conclusion
This week's intelligence underscores the importance of patch management, third-party risk assessment, and awareness of AI-related threats. Organizations should prioritize updating affected software, monitoring for anomalous activity related to AI tools, and reinforcing security awareness training against social engineering campaigns.
Related Articles
- Transforming Literacy for English Learners: A District's Step-by-Step Success Plan
- Study Reveals Social Stigma Around GLP-1 Weight Loss Drugs: The Ozempic Paradox
- How to Scrutinize Blue Zone Longevity Claims: A Step-by-Step Guide
- AI Governance Policies Fall Short on Operational Depth, Experts Warn
- Navigating the AI Revolution: A Graduate's Guide to Seizing the Opportunity
- 10 Key Insights on GTA 6's Development and the Future of AAA Gaming Costs
- Panic in Hiring: One Third of Job Seekers Flee AI Interviews
- How One Ohio District Boosted English Learner Literacy: A Step-by-Step Guide for Schools