CheckMarx Jenkins Hit โš™๏ธ, OpenAI Daybreak ๐Ÿค–, Best Western Breached ๐Ÿจ

TLDRยทยท8 min read
SecurityAI/MLEngineering
Share๐•in

AI Summary

This cybersecurity newsletter covers a supply-chain attack on CheckMarx's Jenkins plugin by TeamPCP, a Shai-Hulud npm worm that compromised 42 @tanstack/* packages via GitHub Actions cache poisoning and OIDC token theft, and a months-long breach of BWH Hotels' reservation system. It also highlights Google's threat intelligence on AI-assisted adversarial operations, OpenAI's new Daybreak cybersecurity program, and new open-source defensive tooling.

Key Facts

โœ“TeamPCP compromised CheckMarx's Jenkins AST plugin by injecting a rogue version (2026.5.09) using credentials stolen in a prior Trivy breach that were never rotated โ€” users should roll back to version 2.0.13-829.
โœ“A Shai-Hulud npm worm hit 42 @tanstack/* packages via GitHub Actions cache poisoning and OIDC token theft, harvesting AWS, GCP, Kubernetes, and SSH credentials and using GitHub's commit search as a P2P C2 channel.
โœ“BWH Hotels (Best Western parent) suffered a 6-month breach of its reservation system exposing guest names, addresses, and stay dates โ€” affected guests should treat all inbound booking-related communications as likely phishing.

Author Takes

SkepticalTLDR InfoSec

AI code scanning tools

Mythos's lighter haul on curl reflects diminishing returns on a heavily fuzzed codebase, and AI tools still only surface known bug classes โ€” not novel ones; practitioners should discount 'dangerously good' vendor framing until independent results land.

NeutralTLDR InfoSec

AI code analyzers as baseline security

AI code analyzers are now table-stakes โ€” any project that hasn't run one likely has a backlog of findings waiting โ€” but must be paired with traditional defenses.

More from TLDR

๐Ÿ“ฐTodayโšกFeed๐Ÿ“กSignals๐Ÿ’ฐCapital