On May 19, 2026, the clearest event-driven development was the release of DirtyDecrypt proof-of-concept code for Linux kernel CVE-2026-31635, alongside a CISA advisory focused on Kieback & Peter DDC building controllers. The same coverage window also highlighted a scheduled Drupal core security release, a compromised Nx Console extension, malicious AntV npm packages, and an OAuth consent phishing campaign that bypasses MFA.
| Fact | Publisher | Source |
|---|---|---|
| PoC exploit code was released for Linux kernel CVE-2026-31635 LPE. | feeds.feedburner.com | https://thehackernews.com/2026/05/dirtydecrypt-poc-released-for-linux.html |
| CISA emphasized OT zoning and firewalls for Kieback & Peter DDC controllers. | cisa.gov | https://www.cisa.gov/news-events/ics-advisories/icsa-26-139-05 |
| Drupal planned a core security release for May 20, 2026, from 5-9 p.m. UTC. | feeds.feedburner.com | https://thehackernews.com/2026/05/drupal-to-release-urgent-core-security.html |
| A compromised Nx Console 18.95.0 targeted VS Code users with credential theft. | feeds.feedburner.com | https://thehackernews.com/2026/05/compromised-nx-console-18950-targeted.html |
| Malicious AntV-related npm packages were tied to a compromised maintainer account. | feeds.feedburner.com | https://thehackernews.com/2026/05/mini-shai-hulud-pushes-malicious-antv.html |
| EvilTokens was linked to OAuth consent phishing that bypasses MFA protections. | feeds.feedburner.com | https://thehackernews.com/2026/05/the-new-phishing-click-how-oauth.html |
DirtyDecrypt moved this coverage window from patch status to exploitation relevance after proof-of-concept code was reported as public. At the same time, CISA's Kieback & Peter advisory kept operational technology exposure in focus, while the rest of the day clustered around supply-chain compromise, identity abuse, and pending CMS patching.
The May 19 set is notable because it spans both enterprise infrastructure and developer ecosystems. One side is operational resilience in building automation; the other is the rapid weaponization or distribution risk seen in Linux privilege escalation research, compromised extensions, malicious npm packages, and OAuth consent phishing.
| Type | Items |
|---|---|
| Dates | 2026-05-19, 2026-05-20, 2026-05-09 |
| Publishers | cisa.gov, feeds.feedburner.com, NIST, Microsoft, Google |
| Main topics | DirtyDecrypt, Kieback & Peter DDC, Drupal, Nx Console, AntV, EvilTokens |
This is the strongest event-based headline because the change is explicit: feeds.feedburner.com: PoC exploit code was released for a recently patched Linux kernel flaw that could allow local privilege escalation. feeds.feedburner.com also adds timing context by saying the issue was reported on May 9, 2026, which sharpens the story from vulnerability awareness to exploitability pressure. NIST: vulnerability database for CVE records and severity metadata; Microsoft and Google appear in the draft as reference anchors rather than substantive reporting, so the cross-source picture shows breadth of mention but uneven depth rather than a direct contradiction.
cisa.gov frames this cluster around defensive architecture rather than a single dramatic exploit claim: cisa.gov: the system is protected by dividing operational technology zones with firewalls, and building automation systems should not be directly accessible from untrusted networks. cisa.gov also ties that design to organizational safety-management measures, which makes the advisory more about exposure reduction and operational discipline than a one-line patch announcement. One remediation line in the provided fact set refers to Siemens preparing fixes, and in this draft it reads as adjacent security guidance rather than a clearly matched Kieback & Peter product detail.
feeds.feedburner.com reports a defined timing window: Drupal intended to release a core security update on May 20, 2026, from 5-9 p.m. UTC. That makes this cluster less about a disclosed technical root cause and more about response readiness, especially because the source says exploits might be developed within hours or days. The significance is scheduling certainty paired with vulnerability ambiguity.
feeds.feedburner.com describes this as a compromised developer tool distribution issue, naming rwl.angular-console version 18.95.0 and noting more than 2.2 million installations. That combination matters because it joins a specific bad version to a large potential blast radius. The practical signal is not just compromise, but trust erosion in a widely used editor extension path.
feeds.feedburner.com places this inside an ongoing software supply-chain wave and ties it to packages associated with the @antv ecosystem. The strongest concrete detail is the compromised maintainer account and the mention of echarts-for-react with roughly 1.1 million weekly usage, which suggests scale even though the draft does not enumerate every affected package. This cluster reinforces that maintainer-account compromise remains a high-leverage attack path.
feeds.feedburner.com says EvilTokens went live in February 2026 and links it to OAuth consent abuse rather than classic password theft. That matters because the user action being abused is approval, not credential entry alone, which changes how defenders think about MFA coverage. In this briefing set, it functions as the identity-layer counterpart to the day's code and package trust issues.
Only one cluster, DirtyDecrypt, appears across multiple publishers in the draft, but the support is asymmetrical. feeds.feedburner.com carries the substantive narrative, while NIST, Microsoft, and Google mainly serve as institutional reference points, so the signal is better read as topic gravity than full independent confirmation.
The most immediate operational watchpoint is whether the Drupal release window on May 20 changes downstream risk or update urgency. The clearest strategic pattern across the rest of the set is acceleration from disclosure to exploitability or from trusted distribution to malicious delivery.
Watch for follow-on reporting that turns advisory language into confirmed exploitation details, especially around DirtyDecrypt and building automation exposure. Also watch whether extension, npm, or OAuth-themed attacks expand from isolated cases into repeated campaign patterns.
The May 19 coverage is anchored by one exploitability milestone and several trust-boundary failures. DirtyDecrypt is the sharpest headline, while Kieback & Peter, Drupal, Nx Console, AntV, and EvilTokens show how infrastructure, software supply chains, and identity workflows were all under pressure in the same cycle.
This briefing on Security News 2026-05-19 is based on evidence collected from 5 sources (feeds.feedburner.com, cisa.gov, NIST, Microsoft, Google).
Each section is organized so you can compare topic, context, key points, verification points, and action angle at a glance.
DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability
Summary: feeds.feedburner.com uses "DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability" to frame one evidence-backed angle on Security News 2026-05-19. For the 2026-05-19 window, the main takeaway is Proof-of-concept (PoC)…
Source: https://thehackernews.com/2026/05/dirtydecrypt-poc-released-for-linux.html
Kieback & Peter DDC Building Controllers
Summary: cisa.gov uses "Kieback & Peter DDC Building Controllers" to frame one evidence-backed angle on Security News 2026-05-19. For the 2026-05-19 window, the main takeaway is <p><a href="https://github.com/cisagov/CSAF/blob/dev…
Source: https://www.cisa.gov/news-events/ics-advisories/icsa-26-139-05
Siemens RUGGEDCOM APE1808 Devices
Summary: cisa.gov uses "Siemens RUGGEDCOM APE1808 Devices" to frame one evidence-backed angle on Security News 2026-05-19. For the 2026-05-19 window, the main takeaway is <p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_f…
Source: https://www.cisa.gov/news-events/ics-advisories/icsa-26-139-02
ABB CoreSense HM and CoreSense M10
Summary: cisa.gov uses "ABB CoreSense HM and CoreSense M10" to frame one evidence-backed angle on Security News 2026-05-19. For the 2026-05-19 window, the main takeaway is <p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_…
Source: https://www.cisa.gov/news-events/ics-advisories/icsa-26-139-01
ScadaBR
Summary: cisa.gov uses "ScadaBR" to frame one evidence-backed angle on Security News 2026-05-19. For the 2026-05-19 window, the main takeaway is <p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26…
Source: https://www.cisa.gov/news-events/ics-advisories/icsa-26-139-03
ZKTeco CCTV Cameras
Summary: cisa.gov uses "ZKTeco CCTV Cameras" to frame one evidence-backed angle on Security News 2026-05-19. For the 2026-05-19 window, the main takeaway is <p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/…
Source: https://www.cisa.gov/news-events/ics-advisories/icsa-26-139-04
The New Phishing Click: How OAuth Consent Bypasses MFA
Summary: feeds.feedburner.com uses "The New Phishing Click: How OAuth Consent Bypasses MFA" to frame one evidence-backed angle on Security News 2026-05-19. For the 2026-05-19 window, the main takeaway is In February 2026, a phishing-as-a-service (P…
Source: https://thehackernews.com/2026/05/the-new-phishing-click-how-oauth.html
Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare
Summary: feeds.feedburner.com uses "Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare" to frame one evidence-backed angle on Security News 2026-05-19. For the 2026-05-19 window, the main takeaway is Drupal has issued a…
Source: https://thehackernews.com/2026/05/drupal-to-release-urgent-core-security.html
SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access
Summary: feeds.feedburner.com uses "SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access" to frame one evidence-backed angle on Security News 2026-05-19. For the 2026-05-19 window, the main takeaway is Critical security…
Source: https://thehackernews.com/2026/05/seppmail-secure-e-mail-gateway.html
Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer
Summary: feeds.feedburner.com uses "Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer" to frame one evidence-backed angle on Security News 2026-05-19. For the 2026-05-19 window, the main takeaway is Cybersecurity re…
Source: https://thehackernews.com/2026/05/compromised-nx-console-18950-targeted.html
Popular GitHub Action Tags Redirected to Imposter Commit to Steal CI/CD Credentials
Summary: feeds.feedburner.com uses "Popular GitHub Action Tags Redirected to Imposter Commit to Steal CI/CD Credentials" to frame one evidence-backed angle on Security News 2026-05-19. For the 2026-05-19 window, the main takeaway is In yet another…
Source: https://thehackernews.com/2026/05/github-actions-supply-chain-attack.html
Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account
Summary: feeds.feedburner.com uses "Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account" to frame one evidence-backed angle on Security News 2026-05-19. For the 2026-05-19 window, the main takeaway is Cybersecurity…
Source: https://thehackernews.com/2026/05/mini-shai-hulud-pushes-malicious-antv.html
National Vulnerability Database
Summary: NIST uses "National Vulnerability Database" to frame one evidence-backed angle on Security News 2026-05-19. For the 2026-05-19 window, the main takeaway is Official U.S. vulnerability database for CVE records and severity metadata. Fallbac…
Source: https://nvd.nist.gov/
Microsoft Security Response Center
Summary: Microsoft uses "Microsoft Security Response Center" to frame one evidence-backed angle on Security News 2026-05-19. For the 2026-05-19 window, the main takeaway is Official Microsoft security update guide and vulnerability response informa…
Google Online Security Blog
Summary: Google uses "Google Online Security Blog" to frame one evidence-backed angle on Security News 2026-05-19. For the 2026-05-19 window, the main takeaway is Official Google security research, product security, and vulnerability disclosure pos…
Source: https://security.googleblog.com/
Check publication timing, scope limits, and later updates before turning the draft into a stronger conclusion.
A. feeds.feedburner.com provided the clearest event update: DirtyDecrypt PoC code for CVE-2026-31635 was reported as released, while cisa.gov anchored the OT side with Kieback & Peter guidance.
A. cisa.gov highlighted Kieback & Peter DDC building controllers and emphasized OT zoning, firewalls, and keeping BA systems off untrusted networks.
A. feeds.feedburner.com reported two major ones: Nx Console 18.95.0 in the VS Code Marketplace and malicious AntV-related npm packages tied to a compromised maintainer account.
A. feeds.feedburner.com said Drupal planned a core security release for May 20, 2026, from 5-9 p.m. UTC, with a warning that exploits could follow quickly.
A. DirtyDecrypt had the broadest footprint across 4 publishers in the draft set: feeds.feedburner.com, NIST, Microsoft, and Google, although the narrative detail mainly came from feeds.feedburner.com.
Last updated: 2026-05-20T11:00:19.169Z