The Containment Era is here. →Explore

STRUCTURED THREAT INTELLIGENCE FOR THE CLOUD COMMUNITY

Aviatrix Threat Research Center

Cloud breaches are accelerating — across identities, workloads, supply chains, and cloud-native services. In the Containment Era, understanding how a breach unfolds is how you architect to stop it.

The Aviatrix Threat Research Center provides security teams with:

  • A structured understanding of how breaches unfold — kill chain, ATT&CK techniques, CVEs, and IOCs in a consistent format.
  • What attackers exploited, and which enforcement gaps let them move.
  • Where workload-level controls would have broken the attack chain — including paths that posture tools and endpoint detection don't model.
Graphic-for-second-Salt-Typhoon-blog-2

Recent Breaches, Security Incidents & Vulnerabilities

A unified view of real-world cloud threats — combining AI-powered analysis, security research, and expert perspectives through a consistent, cloud-specific framework.

AI-Powered Threat Analysis

Agentic AI that analyzes real-world attacks — across security incidents, breaches, and exploited vulnerabilities — to produce structured, actionable intelligence.

Impact (HIGH)
Mini Shai-Hulud Malware Compromises TanStack npm Packages in 2026
In May 2026, the Mini Shai-Hulud malware campaign, orchestrated by the threat actor group TeamPCP, compromised hundreds of npm packages, notably within the TanStack ecosystem. The malware infiltrated developer environments and CI/CD pipelines, exfiltrating credentials and propagating itself by leveraging stolen access tokens to publish malicious package versions. This self-replicating attack underscores the vulnerabilities inherent in software supply chains and the critical need for robust security measures. The resurgence of Mini Shai-Hulud highlights an escalating trend in sophisticated supply chain attacks targeting open-source ecosystems. Organizations must prioritize securing their development pipelines, implement stringent access controls, and continuously monitor for unauthorized activities to mitigate the risks posed by such evolving threats.

5 hours ago

Kill Chain at a Glance
IC
Initial Compromise (high)
PE
Privilege Escalation (high)
LM
Lateral Movement (high)
C&C
Command & Control (high)
E
Exfiltration (high)
I
Impact (high)
Impact (HIGH)
Hugging Face Tokenizer.json Vulnerability: A New AI Supply Chain Threat
In May 2026, security researchers identified a vulnerability in Hugging Face's AI models, specifically within the 'tokenizer.json' file. Attackers can manipulate this file to intercept and redirect model outputs, potentially exfiltrating sensitive data such as API parameters and credentials. This supply chain attack affects models run locally using formats like SafeTensors, ONNX, and GGUF, but does not impact models executed through Hugging Face's Inference API. The compromised 'tokenizer.json' file allows threat actors to gain visibility into every URL the model accesses, posing significant security risks. This incident underscores the growing threat of supply chain attacks targeting AI infrastructure. As organizations increasingly rely on open-source AI models, ensuring the integrity of all components, including configuration files like 'tokenizer.json', becomes critical. The attack highlights the need for robust validation mechanisms and heightened vigilance when integrating third-party AI models into production environments.

5 hours ago

Kill Chain at a Glance
IC
Initial Compromise (high)
PE
Privilege Escalation (medium)
LM
Lateral Movement (medium)
C&C
Command & Control (medium)
E
Exfiltration (medium)
I
Impact (medium)
Impact (MEDIUM)
ABB Automation Builder Gateway Vulnerability Exposes Industrial Control Systems
In February 2026, ABB disclosed a vulnerability (CVE-2024-41975) in its Automation Builder Gateway for Windows, affecting versions prior to 2.9.0. The gateway, by default, listens on all network adapters on port 1217, allowing unauthenticated remote access. This configuration enables attackers to scan for connected Programmable Logic Controllers (PLCs). While PLC user management typically prevents unauthorized access, if disabled, attackers could potentially interact with the PLCs. ABB addressed this issue in version 2.9.0 by restricting the gateway's default access to local connections. ([cisa.gov](https://www.cisa.gov/news-events/ics-advisories/icsa-25-133-04?utm_source=openai)) This incident underscores the critical importance of secure default configurations in industrial control systems. As cyber threats targeting operational technology environments increase, organizations must ensure that default settings do not expose systems to unnecessary risks. Regularly updating software and reviewing default configurations are essential steps in mitigating such vulnerabilities.

5 hours ago

Kill Chain at a Glance
IC
Initial Compromise (high)
PE
Privilege Escalation (medium)
LM
Lateral Movement (low)
C&C
Command & Control (low)
E
Exfiltration (low)
I
Impact (low)
Impact (NONE)
OpenAI's Daybreak: Revolutionizing Cybersecurity with AI-Powered Vulnerability Detection
In May 2026, OpenAI introduced Daybreak, a cybersecurity initiative leveraging advanced AI models and Codex Security to assist organizations in identifying and patching software vulnerabilities proactively. Daybreak integrates AI capabilities to perform secure code reviews, threat modeling, patch validation, and dependency risk analysis, aiming to enhance software resilience from the development phase. This initiative is part of OpenAI's broader effort to embed robust security measures into software design, enabling defenders to detect and remediate vulnerabilities before they can be exploited by malicious actors. The launch of Daybreak underscores a significant shift in cybersecurity strategies, emphasizing proactive defense mechanisms powered by AI. As cyber threats become more sophisticated, integrating AI-driven tools like Daybreak into the software development lifecycle is crucial for organizations to stay ahead of potential attacks and ensure the security of their digital assets.

5 hours ago

Kill Chain at a Glance
IC
Initial Compromise (high)
PE
Privilege Escalation (medium)
LM
Lateral Movement (medium)
C&C
Command & Control (medium)
E
Exfiltration (medium)
I
Impact (medium)
Impact (CRITICAL)
Mini Shai-Hulud Worm Targets TanStack, Mistral AI, and Others in Major Supply Chain Attack
In May 2026, the threat actor TeamPCP launched a sophisticated supply chain attack known as the Mini Shai-Hulud campaign, compromising over 170 npm and PyPI packages, including those from TanStack, Mistral AI, UiPath, OpenSearch, and Guardrails AI. The attackers injected obfuscated JavaScript files into these packages, which, upon execution, profiled the environment and deployed credential-stealing malware targeting cloud providers, cryptocurrency wallets, AI tools, messaging apps, and CI systems. The stolen data was exfiltrated to attacker-controlled domains, and the malware established persistence in development environments by integrating with IDEs like Visual Studio Code. This incident underscores the escalating threat of supply chain attacks, particularly those targeting widely used open-source packages. The use of self-propagating malware that exploits developer environments highlights the need for enhanced security measures in software development pipelines. Organizations must remain vigilant, regularly audit their dependencies, and implement robust monitoring to detect and mitigate such sophisticated attacks.

5 hours ago

Kill Chain at a Glance
IC
Initial Compromise (high)
PE
Privilege Escalation (high)
LM
Lateral Movement (medium)
C&C
Command & Control (high)
E
Exfiltration (high)
I
Impact (medium)

View All Threats

Browse 3524+ threat reports , deep-dives, and threat intelligence updates.

Browse All

Security Research & Insights

Security Research & Insights with human-led deep dives into campaigns and cloud-native TTPs

Aviatrix
pcpjack
    Someone Evicted TeamPCP from Your Cloud. That Is Not Good News.

    May 07, 2026

    By Matt Snyder

    Aviatrix
    Introducing the Aviatrix Cloud Threat Command Center: Built for the Containment Era

    May 04, 2026

    By John Qian

    Aviatrix
    teampcp_update
      TeamPCP Has a Model. Understanding It Changes What You Defend.

      May 01, 2026

      By Matt Snyder

      Market Perspectives

      Market Perspectives offering expert commentary and select breach analysis from industry leaders

      Aviatrix
      What Could Have Stopped the 2023 MGM Breach? A Study in the Power of Embedded Zero Trust

      Jul 31, 2025

      By John Qian

      Aviatrix
      The Zero Trust Gap: Only 8% of US Enterprises Use Zero Trust Architectures

      Jul 23, 2025

      By Scott Leatherman

      Aviatrix
      HITRUST CSF Compliance in the Cloud—How Aviatrix Secures Healthcare Data

      Jun 25, 2025

      By Tom Davis

      How CNSF Protects Cloud Workloads

      Cloud attackers don’t rely on a single exploit — they rely on paths.

      Once inside, attackers move laterally between workloads, establish command-and-control through egress paths, and exfiltrate data through legitimate cloud services — often before detection tools generate an alert. These paths exist because most security architectures enforce at centralized inspection points, not at every workload. The paths that matter most are the ones that never reach a central firewall.

      Aviatrix Cloud Native Security Fabric (CNSF) contains attacks by enforcing policy at every workload communication path — containing blast radius, blocking lateral movement, and cutting off egress before data leaves the environment.

      Utilize the Network Layer

      With CNSF, enterprises can:

      • Contain attack paths at runtime

        Gain visibility into east-west and egress workload communication and apply controls that limit lateral movement, unauthorized egress, and uncontrolled trust expansion.

      • Eliminate blind spots in workload-to-workload traffic

        Observe traffic across VPCs/VNets, regions, and cloud providers using cloud native telemetry — including paths that posture tools and point controls don’t model.

      • Secure modern and AI-driven workloads

        Understand how agents, services, and workloads communicate at runtime, and enforce policy to reduce the risk of misuse, over-privileged access, or unintended data flows.

      • Apply consistent Zero Trust controls without slowing teams

        Enforce segmentation, egress control, and encryption centrally across clouds — without agents, application changes, or developer friction.

      See Your Attack Paths. Close the Gaps with CNSF.

      Blast radius starts where your enforcement stops.

      Most security architectures enforce at centralized inspection points. Attackers move between workloads on paths that never reach those points — building blast radius invisibly until detection tools fire, often too late.

      The Executive Assistant That Broke the Company Why Shadow AI is the New Cloud Crisis card image

      Your assessment delivers:

      • The Aviatrix Workload Attack Path Assessment (WAPA) analyzes real workload communication using cloud native telemetry to uncover attack paths already present in your environment — and shows how Cloud Native Security Fabric (CNSF) can break those paths with runtime enforcement.

      Containment Era Intelligence

      The threat landscape has changed.
      Has your question changed with it?

      In March 2026, TeamPCP proved that detection-first architectures cannot contain attacks that move through trusted code, not around defenses. Today’s threat actors don’t break in — they log in, blend in, and expand silently. This command center tracks the evolving threat landscape and helps you measure your Blast Radius — the architectural metric that defines resilience in the Containment Era.

      8
      Tracked Campaigns
      82%
      Intrusions are malware-free
      CrowdStrike GTR 2026
      29 min
      Avg. eCrime breakout time
      CrowdStrike GTR 2026
      27 sec
      Fastest observed breakout
      CrowdStrike GTR 2026

      This command center tracks 8 active campaigns and measures your Blast Radius: what an attacker can reach once inside your environment.

      Contain the Blast Radius

      See the attack paths already present in your environment — and where CNSF containment controls would break them.

      Cta pattren Image