Weekly Cyber Threat Roundup: May 4 – Medical Device Breach, AI Tool Abuse, and Critical Patches
This week's threat report covers a Medtronic breach, Vimeo data leak, Robinhood phishing, Trellix source code theft, AI-powered attacks like Bluekit and Cursor flaw, plus critical patches for Microsoft Entra ID and cPanel.
Overview
The cybersecurity landscape this week is marked by a major breach at a global medical device manufacturer, a phishing campaign exploiting a trading platform's official email system, and new research exposing AI-powered threats. Additionally, critical patches have been released for Microsoft Entra ID and cPanel. Below is a detailed breakdown of the top incidents, AI-related dangers, and vulnerabilities.

Top Attacks and Breaches
Medtronic Discloses Cyberattack on Corporate IT Systems
Medtronic, a leading global medical device maker, has revealed that an unauthorized party gained access to its corporate IT systems. The company stated that the incident did not affect its products, operations, or financial systems. However, the threat actor group ShinyHunters has claimed responsibility, alleging the theft of 9 million records. Medtronic is currently assessing the scope and nature of the exposed data.
Vimeo Breach Linked to Analytics Vendor Anodot
Video hosting platform Vimeo confirmed a data breach originating from a compromise at its analytics vendor Anodot. Exposed information includes internal operational details, video titles and metadata, and some customer email addresses. Crucially, passwords, payment data, and actual video content were not accessed. The incident underscores the risks of third-party integrations.
Robinhood Account Creation Abused in Phishing Campaign
Threat actors exploited the account creation process of the online trading platform Robinhood to launch a sophisticated phishing campaign. Emails were sent from Robinhood’s official mailing account, containing links to phishing sites that bypassed security checks. Robinhood confirmed that no accounts or funds were compromised and has removed the vulnerable “Device” field used in the attack.
Trellix Source Code Repository Breach
Trellix, a major endpoint security and XDR vendor, experienced a source code repository breach after attackers accessed a portion of its internal code. The company has engaged forensic experts and law enforcement. To date, no evidence of product tampering, pipeline compromise, or active exploitation has been found.
AI Threats
Critical Flaw in Cursor's AI Coding Environment: CVE-2026-26268
Researchers have identified a vulnerability in Cursor’s coding environment that allows remote code execution when its AI agent interacts with a cloned malicious repository. The attack leverages Git hooks and bare repositories to execute attacker scripts, risking exposure of source code, tokens, and internal tools.

Bluekit: AI-Powered Phishing-as-a-Service Platform
Security researchers have exposed Bluekit, a phishing-as-a-service platform that bundles over 40 templates and an AI Assistant powered by multiple large language models including GPT-4.1, Claude, Gemini, Llama, and DeepSeek. This AI-assisted toolkit centralizes domain setup, creates realistic login clones, incorporates anti-analysis filters, and enables real-time session monitoring and Telegram-based exfiltration.
AI-Enabled Supply Chain Attack on Open-Source Crypto Trading Project
Researchers demonstrated a novel supply chain attack where Anthropic’s Claude Opus co-authored a code commit that introduced PromptMink malware into an open-source autonomous crypto trading project. The hidden dependency siphoned credentials, planted persistent SSH access, and stole source code, potentially enabling wallet takeover.
Vulnerabilities and Patches
Microsoft Fixes Privilege Escalation in Entra ID
Microsoft has patched a privilege escalation flaw in Microsoft Entra ID that allowed the Agent ID Administrator role for AI agents to take over any service account. A published proof-of-concept demonstrated how attackers could add credentials and impersonate privileged identities. Organizations using Entra ID should apply the update immediately.
cPanel Addresses Critical Authentication Bypass (CVE-2026-41940)
cPanel has released a fix for CVE-2026-41940, a critical authentication bypass in cPanel and WHM that is being actively exploited in the wild as a zero-day. The vulnerability allows full administrative control without credentials. Administrators are urged to patch promptly.
For the latest discoveries in cyber research, download our Threat Intelligence Bulletin.