• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • X
  • Facebook
  • YouTube
  • LinkedIn
Screen Connect
Support
Customer Portal
Pay Online
SWK logo.

SWK Technologies

Software Solutions & Services

  • Accounting & ERP Software
      • Acumatica Cloud ERP
        • Overview
        • Construction
        • Distribution
        • Field Service
        • Financial Management
        • Manufacturing
        • Professional Services
        • Project Accounting
        • Retail-Commerce
      • Sage Intacct
        • Overview
        • Construction and Real Estate (CRE)
        • Distribution Operations for Sage Intacct
        • Financial Services
        • Healthcare
        • Manufacturing Operations for Sage Intacct
        • Nonprofits
        • Professional Services
        • Sage Intacct Payroll powered by ADP
      • Sage 100
        • Overview
        • Business Intelligence
        • Core Accounting & Financials
        • Distribution
        • Manufacturing
        • Payroll
        • Sage 100 Contractor
      • More Accounting Products
        • QuickBooks
        • Sage 50
        • Sage 300
        • Sage 500
        • Sage BusinessWorks
      • ERP Add-ons
        • ADP Workforce Now
        • Avalara
        • AvidXchange
        • BILL
        • BigCommerce
        • CIMCloud
        • Cloud Hosting
        • DataSelf
        • DocLink
        • Fortis
        • FreightPOP
        • Lumber
        • Microsoft 365
        • Netstock
        • Quadient
        • Sage Fixed Assets
        • Sage HCM
        • Sage Intacct Payroll powered by ADP
        • Sage Supply Chain Intelligence
        • Savant WMS
        • Endpoint Automation Solutions
        • ScanForce
        • Solver
        • SPS Commerce
        • Velixo
        • Workforce Go!
      • More ERP Add-ons
        • Bizinsight
        • Concur
        • Crystal Reports
        • Fraxion
        • Fusion RMS
        • FYISoft
        • JobOps
        • KnowledgeSync
        • Lockstep Collect
        • Nuvei
        • Nectari
        • Ottimate
        • Pacejet
        • Planning Maestro
        • Sage CRM
        • Sage HRMS
        • Sage Intelligence
        • Scissortail HCM
        • Service Pro
        • ShipStation
        • Shopify
        • Starship
        • Sugar CRM
        • Time & Billing Pro
        • Timekeeper
        • True Sky
      • Industries
        • Construction
        • Distribution
        • Financial Services
        • Healthcare
        • Manufacturing
        • Nonprofit
        • Professional Services
        • Retail
  • Managed Cloud Services
      • Managed IT Services
        • Managed Cloud Services
        • Network Assurance Core
        • Email Hosting
        • IT Support
        • Microsoft 365 Services
        • Server Monitoring
        • Virtualization
      • Cybersecurity
          • CyberAssurance CORE™
          • Cybersecurity Solutions
          • Backup & Continuity
          • Compliance
          • Dark Web Monitoring
          • EDR
          • Encryption
          • MDR
          • MFA
          • Penetration Testing
          • Security Training
          • SOC
          • Spam & Virus Filtering
          • vCIO
          • Vulnerability Assessment
      • Cloud Services
        • Secure Cloud Hosting
        • Infrastructure-as-a-Service
        • Acumatica IaaS
      • Industries
        • Financial Services
        • Healthcare
        • Construction
      • Locations
          • Nationwide
          • Austin
          • California
          • Chicago
          • Minneapolis
          • New Jersey
          • New York
          • North Carolina
          • Philadelphia
          • Phoenix
          • San Diego
          • Seattle
  • Consulting & Implementation
    • Business Technology Consulting
    • eCommerce
    • Financing
    • Human Capital Management
    • Managed Cloud & IT Services
    • Partner Program
    • Software Development
    • Software Implementation
  • Resources
    • Help Desk
    • Blog Posts
    • Payments Portal
    • Webinars
    • YouTube Channels
    • Acumatica Resources
    • Sage Intacct Resources
    • Sage 100 Resources
    • IT Resource Pages
  • About
    • About SWK
    • Awards & Recognition
    • Life@SWK
    • Careers
    • Success Stories
    • SWK Gives
  • Contact
    • Contact Us
    • Support
    • Our Locations

SWK Technologies May 2026 Cybersecurity News Recap

May 20, 2026 by Hector Bonilla

Home » Cybersecurity » SWK Technologies May 2026 Cybersecurity News Recap

Black smartphone lying at an angle on a white textured surface, displaying the word "May" in bold black text on a white screen.

May 2026 saw an evolution of the cyber incidents highlighted in SWK’s previous Cybersecurity News Recaps, including more suspected hacking by Iran-backed actors and an apparent major resurgence of the notorious ShinyHunters gang over the past few months. This month also saw several other significant cyber incidents within the manufacturing industry, as well as multiple upcoming compliance deadlines, though one of the latter has been disrupted due to federal funding issues and pushback from affected parties.

Continue reading below to learn more about some of the top cybersecurity news stories from May 2026 in this recap by SWK Technologies:

Lawsuit Filed Against OpenAI for Sharing Data

A class action complaint filed in California federal court accuses OpenAI of embedding Meta’s Facebook Pixel and Google Analytics in the ChatGPT web interface, transmitting query topics, user identifiers and email addresses to those platforms without user consent. The suit argues that conversations users assumed were private — including questions about finances, health and legal matters — have been treated as marketing telemetry, in violation of the Electronic Communications Privacy Act, the California Invasion of Privacy Act and the California Constitution. The filing is one of several ongoing legal challenges being levied against AI providers, including a separate verdict dismissing Elon Musk’s claims against OpenAI on statute of limitations grounds and state-level scrutiny of other artificial intelligence vendors.

SEC Regulation S-P June 3 Compliance Deadline Approaching

Smaller financial service entities covered under amendments to the U.S. Securities and Exchange Commission’s (SEC’s) Regulation S-P must reach full compliance by June 3, 2026, the second phase of a rule that took effect for larger institutions in December 2025. The updated rule requires covered firms to adopt written incident response procedures, notify affected individuals within 30 days of a breach involving sensitive personal information and impose contractual breach-reporting obligations on service providers within 72 hours. The deadline applies to registered investment advisers with less than $1.5 billion in assets under management, smaller broker-dealers, smaller investment companies, transfer agents and funding portals, with the SEC signaling examination scrutiny in the months that follow.

ShinyHunters Hit Canvas, 7-Eleven and More Throughout 2026

ShinyHunters claimed responsibility for a breach of Instructure, the parent company of the Canvas learning management system (LMS) used by 41 percent of higher education institutions in North America, with the group asserting it stole data from roughly 275 million users across over 9000 schools. After the incident was disclosed on May 1, 2026, the hacker group hijacked Canvas login pages on May 7 to demand a settlement, disrupting finals week at institutions including Duke, Harvard, the University of Pennsylvania and the University of Wisconsin. Instructure later confirmed it had reached an agreement with the attackers and that the stolen data had been destroyed, though the terms have not been disclosed publicly. A public service announcement issued by the FBI on May 15 warned of follow-on extortion attempts tied to the same group, without referring to Canvas or Instructure directly. The same actors were also tied to a confirmed data breach at 7-Eleven that exposed franchisee documents and a breach at medical device maker Medtronic, with other 2026 victims including educational publisher McGraw Hill, Dutch telecom operator Odido and Carnival Cruises — with the Medtronic listing later removed from the leak site.

CISA Credentials Exposed in Public GitHub Folder

A contractor for the Cybersecurity and Infrastructure Security Agency maintained a public GitHub repository titled Private-CISA that exposed administrative credentials for three AWS GovCloud accounts, plaintext passwords for dozens of internal CISA systems and access tokens for the agency’s internal software artifactory. The exposure was flagged on May 15 by a researcher at GitGuardian after the account owner failed to respond to automated alerts, with the contractor having explicitly disabled the platform’s default secret detection feature and committed to the repo since November 2025. One researcher described the incident to Krebs on Security as the worst leak of his career, citing plaintext credentials in CSV files and concern that an attacker who reached the artifactory could insert malicious code into CISA software builds. A senator on the Homeland Security Committee has requested a classified briefing on the incident, adding to scrutiny that follows earlier reporting about sensitive document uploads to ChatGPT by former acting director Madhu Gottumukkala and his subsequent polygraph dispute.

Pennsylvania Pharmaceutical Manufacturer Recovers after Ransomware

West Pharmaceutical Services, a Pennsylvania-based maker of injectable drug packaging and delivery systems, disclosed in a May 7 filing with the SEC that it had detected a material cyberattack on May 4 in which an unauthorized party exfiltrated data and encrypted certain systems. The company took portions of its network infrastructure offline globally, restricted access to enterprise systems and engaged Palo Alto Networks Unit 42 for incident response while notifying law enforcement, with shipping, receiving and manufacturing temporarily disrupted across multiple sites. By the time the company posted a mid-month update, critical processes had restarted at certain locations and the company said it had taken steps to mitigate the risk of stolen data being released. No ransomware group has publicly claimed responsibility for the intrusion, though the absence of a leak listing has prompted speculation that a ransom may have been paid.

Government Says Iran Hacked Multiple Gas Stations Across U.S.

U.S. officials suspect Iran-linked actors are behind a series of intrusions targeting automatic tank gauge systems that monitor fuel levels at gas stations across multiple states, exploiting devices that were exposed to the Internet without password protection. While there are no reports of physical damage or altered fuel levels, the breaches let intruders tamper with display readings and, in theory, allow a fuel leak to go undetected, according to experts and officials briefed on the investigation. Investigators caution that attribution may remain unresolved because of limited forensic evidence, though Iran’s history of targeting fuel and water systems makes it a leading suspect. The activity follows a six-agency advisory issued in April warning of Iranian-affiliated exploitation of programmable logic controllers (PLC) across U.S. critical infrastructure and earlier disruptions at water utilities and industrial sites.

Foxconn Confirms Ransomware Breach in North America

Taiwan-based electronics manufacturer Foxconn, a major supplier to Apple, Nvidia, Google, Dell and Intel, confirmed a cyberattack affecting several of its North American factories after the Nitrogen ransomware group listed the company on its dark web leak site. The group claimed to have stolen roughly 8 terabytes of data across more than 11 million files, including confidential project documentation, schematics and technical drawings tied to client work, with disruption reported at sites in Mount Pleasant, Wisconsin, and Houston, Texas. Foxconn said its cybersecurity team activated incident response measures, that affected facilities were returning to normal production, and analysts examining sample files said the leaked materials appeared concentrated on Foxconn’s internal engineering rather than unreleased Apple product designs. Security analysts noted that the incident fits a broader pattern of ransomware activity against manufacturers with low tolerance for downtime, with reporting on the breach pointing to long-running interest in the supplier among extortion groups.

CIRCIA May 2026 Finalization Pushed Back

CISA had targeted May 2026 to finalize its rule implementing the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA), though the agency has indicated that a February shutdown at the Department of Homeland Security is likely to push the timetable further. Under the proposal, covered entities would report covered cyber incidents within 72 hours and ransom payments within 24 hours, with scope reaching any business in one of 16 critical infrastructure sectors that exceeds the Small Business Administration size standard. CISA estimates the rule would apply to more than 300,000 entities and has used the additional time to host town hall meetings addressing industry concerns over scope, harmonization with other federal reporting requirements and definitions for substantially similar events.

Are You Protected Against the Latest Cybersecurity Threats?

Between Iran, resurgent ransomware gangs and AI, the cybersecurity landscape is shifting quickly, making it much more difficult for existing policies and tools to keep up with the latest threats. SWK Technologies can help keep your team and defenses up to date with emerging risks that affect your business, providing you with peace of mind in a changing digital world.

Contact SWK here to learn more about our solutions and services for managed security, and let us help you assess your tools, tighten your policies and close the gaps attackers are counting on you to miss.

Reach Out to Us:

Category: Cybersecurity, Blog, IT Services, News and Events

Sidebar

Recent Posts

  • SWK Technologies May 2026 Cybersecurity News Recap
  • Sage Intacct 2026 R2: Update List
  • Sage Intacct vs. Intuit Enterprise Suite
  • Why You Need to Migrate to the Cloud by 2027
  • What CMMC 2.0 Changes for Your Cybersecurity Compliance
  • Sage Intacct vs. Microsoft Dynamics GP
  • Which Microsoft Copilot Plan is Right for You?

Categories

Ready to take the next step?

Contact SWK today to get in touch with one of our experts. We’ll go over your business challenges and unique needs, and see where you can unlock new value from your technology and make your operations run easier.

Get in touch!

Our Latest Posts

Black smartphone lying at an angle on a white textured surface, displaying the word "May" in bold black text on a white screen.

SWK Technologies May 2026 Cybersecurity News Recap

Read moreSWK Technologies May 2026 Cybersecurity News Recap
Finance team reviewing Sage Intacct 2026 R2 updates in a business meeting

Sage Intacct 2026 R2: Update List

Read moreSage Intacct 2026 R2: Update List
Finance team reviewing reporting dashboard for Sage Intacct vs Intuit Enterprise Suite comparison

Sage Intacct vs. Intuit Enterprise Suite

Read moreSage Intacct vs. Intuit Enterprise Suite

Awards and Accreditations

Top work places in NJ 2020.
Acumatica the Cloud ERP gold certified partner.
The Gold Microsoft partner logo on a black background.
Sage business partner diamond logo.
Dell Technologies Gold Partner
Sage tech partner logo.

Stay in the know!

Subscribe for exclusive ERP, process automation, IT and cybersecurity news.

Twitter
  • Facebook
  • YouTube
  • LinkedIn

Home
About
Contact

Support
Screen Connect
Pay Online
Downloads

SWK logo.

Headquarters:
120 Eagle Rock Ave, Suite 330
East Hanover, NJ 07936

Contact:
info@swktech.com
(877) 979-5462

Copyright © 2026 · SWK Technologies, Inc. · All Rights Reserved · Terms of Use · Privacy Policy

This site uses cookies to collect information about your browsing activities in order to provide you with more relevant content and promotional materials, and help us understand your interests and enhance the site. By continuing to browse this site you agree to the use of cookies. Visit our privacy policy to learn more.