Cybersecurity Daily: News & Threats · 17 May 2026 · 4 min

Exchange CVE-2026-42897 & TanStack Supply Chain Hit OpenAI

Microsoft Exchange is under active attack via CVE-2026-42897 as CISA mandates a May 29 federal deadline, while a TanStack supply chain attack compromised OpenAI developer devices and forced a mass certificate revocation. Today's briefing breaks down both escalation chains and what security teams need to do now.

Cybersecurity Daily: News & Threats
Now Playing
Exchange CVE-2026-42897 & TanStack Supply Chain Hit OpenAI

Audio is available on Spreaker — see link below.

What's covered

Exchange CVE-2026-42897 Active Exploitation

Microsoft's on-premises Exchange Server is under active attack right now. CVE-2026-42897 is a cross-site scripting flaw in Exchange's web interface, and it's being exploited in the wild via crafted emails.

Listen now →

Exchange Mitigation Service Response

Microsoft deployed the Exchange Emergency Mitigation Service, which enables a URL rewrite rule by default while a permanent patch is still pending. Here's the practical wrinkle: some administrators are seeing a "Mitigation invalid" status message even when the mitigation has applied successfully.

Listen now →

TanStack Supply Chain Attack: OpenAI Impact

The second major story involves a supply chain attack that reached OpenAI. The vehicle was TanStack, a widely used npm package ecosystem.

Listen now →

Certificate Revocation Cascade

What followed at OpenAI was the more structurally interesting consequence. Because employee devices with signing authority were compromised, OpenAI revoked iOS, macOS, and Windows signing certificates.

Listen now →

Broader Threat Signal and What Follows

These two incidents share a structural logic. Exchange is being hit through its web interface.

Listen now →

Chapter summary auto-generated from the verified script. Listen to the full episode for the complete content.

More episodes

From Cybersecurity Daily: News & Threats