Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Dark Web Reaches New Depths: Cybersecurity News Roundup

Recent weeks have witnessed a series of disturbing events in the cybersecurity world, with source code breaches, Windows shell vulnerabilities, and critical authentication flaws all being highlighted by experts.

Published: Sat May 2 03:36:44 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Patch Tsunami: How AI is Unearthing Decades of Buried Code Debt



The National Cyber Security Center (NCSC) is warning of a looming patch tsunami due to years of buried code debt exposed by AI-fueled bug hunting. This means that organizations will need to prepare for an influx of updates to address vulnerabilities across all severities, with critical patches expected in large numbers.



Published: Sat May 2 04:46:38 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Deep#Door RAT Uses Stealthy Persistence to Target Windows Systems

Deep#Door is a newly discovered Python-based backdoor that has been found to use stealthy persistence mechanisms to target Windows systems. The malware campaign uses an unconventional approach to command-and-control communications, using a legitimate public TCP tunneling service called bore.pub. This makes it harder to detect and attribute malicious activity, highlighting the need for security researchers to focus on behavioral signals.

Published: Sat May 2 04:54:53 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Innovation: The Ongoing Battle for Personal Privacy in the Age of Artificial Intelligence


The Dark Side of Innovation: The Ongoing Battle for Personal Privacy in the Age of Artificial Intelligence

In recent years, there has been a growing concern about the impact of artificial intelligence (AI) on personal privacy. As AI technology continues to advance and become more integrated into our daily lives, it is becoming increasingly clear that the benefits of innovation are being outweighed by the risks. From the proliferation of facial recognition systems in public places to the use of AI-powered tools to spy on individuals, the need for greater transparency and accountability has never been more pressing.

A group of companies known as Anthropic has developed a range of AI models that are capable of performing complex tasks such as image recognition and natural language processing. However, these same companies have also come under fire for their role in enabling mass surveillance and espionage by governments and other organizations.

The use of AI technology raises serious questions about the role of government agencies in regulating its development and deployment. As one expert noted, "the fact that the NSA is using this tool to hunt for bugs in Microsoft's software suggests that they are willing to disregard the ban on Anthropic's tools in order to get their hands on it."

Meanwhile, other companies such as Disney have begun to incorporate facial recognition technology into their businesses, with visitors to Disneyland Park and Disney California Adventure Park now having the option to "choose" to enter the park through a lane that is equipped with face recognition systems. The potential for misuse of these technologies is a clear threat to individual rights and freedoms.

In addition to these concerns, there are also growing worries about the potential impact of AI on employment and the economy. As automation and artificial intelligence continue to advance, it is becoming increasingly clear that many jobs will be lost or significantly altered in the coming years.

Despite these challenges, there remains hope for a better future. Many experts believe that with the right regulations and safeguards in place, it is possible to harness the power of AI technology while protecting individual rights and freedoms.

The fight for personal privacy in the age of artificial intelligence is a complex and ongoing battle, one that requires the attention and involvement of individuals, policymakers, and industry leaders alike. As we move forward into an increasingly automated world, it is essential that we prioritize transparency, accountability, and individual rights.



Published: Sat May 2 06:05:37 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Trellix Discloses Breach of Code Repository, Investigating Unauthorized Access to Sensitive Source Code

Trellix has disclosed a security breach affecting part of its source code repository, with unauthorized access gained to sensitive logic, APIs, and credentials. The company is investigating the incident and cooperating with law enforcement, emphasizing that there is no evidence to suggest that its source code release or distribution process was compromised.

Published: Sat May 2 08:14:56 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rogue Cybersecurity Experts: A Cautionary Tale of Ransomware and Deception

Two US cybersecurity experts have been sentenced to prison for their role in supporting ransomware attacks, highlighting the dangers of cybercrime and the importance of upholding ethical standards in the industry. The case serves as a cautionary tale of how easily individuals with specialized knowledge can be tempted by the promise of easy money and succumb to cybercrime.

Published: Sat May 2 11:39:09 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical cPanel Flaw Mass-Exploited in "Sorry" Ransomware Attacks: A Growing Concern for Web Hosts



The Sorry ransomware has been exploiting a critical vulnerability in cPanel, leading to widespread attacks on web servers and data breaches. This article delves into the details of the attack, highlights the challenges faced by those affected, and provides insights into the emerging threat landscape.

Published: Sat May 2 17:55:30 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV: A Growing Concern for Containerized Environments

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a widely disclosed security flaw impacting various Linux distributions to its KEV catalog, citing evidence of active exploitation in the wild. This newly added vulnerability poses significant risks to containerized environments, particularly those utilizing Docker, LXC, and Kubernetes.

Published: Sun May 3 02:10:50 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google's AI-Driven Shift: Bug Bounty Programs Overhauled for Quality over Quantity


Google has announced a major overhaul of its Vulnerability Reward Programs (VRP) for Android and Chrome, shifting its focus towards quality over quantity and harnessing the power of artificial intelligence. The updated programs prioritize high-impact vulnerabilities and incentivize actionable reports with concrete proof and suggested fixes. While this change presents new challenges, it reflects Google's desire to optimize value and efficiency in its vulnerability research efforts.

Published: Sun May 3 04:25:20 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Telegram Mini Apps Abused for Crypto Scams, Android Malware Delivery: A Growing Threat


A growing threat on Telegram: crypto scams and Android malware delivery using Mini Apps. Learn how you can protect yourself from falling victim to these malicious operations.

Published: Sun May 3 09:39:27 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Cybersecurity Alert: Exploits, Breaches, and New Threats Emerge as Weekly Security Affairs Newsletter Arrives

Recent global cyber attacks and breaches have highlighted the ongoing need for improved digital security measures. This article provides an in-depth look at the latest threats and vulnerabilities discussed in the recent Security Affairs newsletter, offering insights into the evolving nature of cybersecurity threats and the importance of prioritizing digital rights and online security.

Published: Sun May 3 09:54:17 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Month of Mayhem: The Crypto Hacking Crisis Exposes the Dark Underbelly of Decentralization

In a month marked by unprecedented levels of cryptocurrency hacking, the very principles of decentralization are being called into question. Can blockchain infrastructure provide the trust and security required by traditional financial institutions? The future of DeFi hangs in the balance.

Published: Sun May 3 11:05:54 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malware Landscape Evolves: New Threats Emerge as Cybersecurity Measures Strengthen


The world of cybercrime is becoming increasingly complex, with new threats emerging every day. As cybersecurity experts and organizations face a rapidly evolving malware landscape, it's essential to stay informed about the latest incidents and take proactive measures to protect against known threats.

Published: Sun May 3 11:12:41 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Flaw in WebPros cPanel Exposes Thousands of Hosting Servers to Exploitation


A recent addition to the U.S. CISA's Known Exploited Vulnerabilities catalog reveals a critical flaw in WebPros cPanel that exposes thousands of hosting servers to potential exploitation. This urgent warning emphasizes the importance of web hosting organizations and individuals taking immediate action to secure their infrastructure against this vulnerability.

Published: Sun May 3 11:20:54 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Instructure Data Breach: The Wider Implications of ShinyHunters' Claimed Attack


Instructure has confirmed that nearly 9,000 schools worldwide, comprising over 275 million individuals, have had their personal information exposed due to a cyberattack attributed to the ShinyHunters extortion gang. The company is working with cybersecurity experts and law enforcement to investigate and address the breach. As a result, it is now important for all parties involved to take proactive measures to protect user data and improve cybersecurity practices in the face of this attack.


Published: Sun May 3 18:43:40 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Agentic AI: A Security Threat That Demands Caution

Five Eyes security agencies issue cautionary warning on agentic AI, advising against rapid rollout due to high risk of misbehavior and amplification of existing frailties. The guidance highlights the need for strong governance, explicit accountability, and rigorous monitoring to ensure safe deployment of agentic AI.

Published: Sun May 3 21:56:53 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Crackdown on Cryptocurrency Scams Leaves $701M Trail in Its Wake

Global authorities have launched a massive crackdown on cryptocurrency scams, resulting in the arrest of at least 276 suspects and the shutdown of nine scam centers targeting Americans. The operation has yielded $701 million in seized assets and is part of a broader effort to combat global cybercrime and financial crime.

Published: Mon May 4 02:11:38 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Phishing Kit Emerges: Bluekit's AI-Powered Threat Landscape

Recently discovered phishing kit Bluekit boasts over 40 website templates and AI-powered features, but its limitations and vulnerabilities raise questions about its effectiveness as a serious threat. Learn more about this emerging phishing kit and its implications for cybersecurity.

Published: Mon May 4 02:20:12 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Five Eyes Warn of Agentic AI Risks: A Call for Caution and Cautious Adoption


The Five Eyes security alliance has issued a warning about the risks associated with agentic AI systems, urging caution and careful planning to mitigate potential security threats.

Published: Mon May 4 03:32:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unveiling the Vulnerabilities: How Public Voter Data Can Be Exploited for Personal Identification

Researcher Noah M. Kenney has discovered that public voter data can be used to identify individuals with a high degree of accuracy, raising concerns about the potential risks associated with sharing sensitive information. His investigation highlights the need for greater vigilance and better data protection measures when it comes to personal information.

Published: Mon May 4 04:40:53 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical cPanel Vulnerability Exploited to Target Government and MSP Networks: A Wake-Up Call for Cybersecurity


Critical cPanel Vulnerability Exploited to Target Government and MSP Networks: A Wake-Up Call for Cybersecurity

A recently disclosed vulnerability in cPanel has been exploited by threat actors to target government networks, managed service providers (MSPs), and hosting providers. This article delves into the details of this vulnerability, its impact on these organizations, and what it means for cybersecurity.

Get the latest news and expert insights from The Hacker News. Follow us on Google News, Twitter, and LinkedIn to stay up-to-date with the latest cybersecurity threats and trends.


Published: Mon May 4 05:53:15 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Avoiding the Next Patch Wave: The Threat of AI-Driven Vulnerability Discovery

Artificial intelligence (AI) is accelerating the discovery of software vulnerabilities, forcing organizations to respond with a wave of urgent security updates. The UK National Cyber Security Centre (NCSC) warns that AI-powered attackers can uncover hidden flaws faster than before, creating pressure on global cybersecurity defenses.

Published: Mon May 4 06:01:03 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Warns of Exploited Linux 'Copy Fail' Flaw, Urges Immediate Patching

CISA Warns of Exploited Linux 'Copy Fail' Flaw, Urges Immediate Patching. A recently discovered Linux vulnerability has been found in the wild just one day after researchers disclosed it, prompting CISA to issue a warning and urge all organizations to patch their systems as soon as possible.

Published: Mon May 4 07:11:54 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of AI-Assisted Attacks: A New Era of Cybersecurity Challenges

As AI technology advances at an unprecedented rate, so too do the sophisticated attacks being conducted by malicious actors. The data from 2025 and 2026 reveals a worrying trend: AI-assisted attacks are becoming increasingly common, with devastating consequences for organizations worldwide.

Published: Mon May 4 07:26:44 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Silver Fox Unleashes ABCDoor Malware via Tax-Themed Phishing Campaign Targeting India and Russia


A new malware campaign by Silver Fox has been detected targeting organizations in India and Russia with a tax-themed phishing email called ABCDoor. The email campaign delivers modified Rust-based loader pulled from a public repository, which ultimately leads to the delivery of a well-known ValleyRAT backdoor codenamed ABCDoor. This article provides a detailed analysis of the threat actor's tactics and techniques used in this campaign and offers insights into how organizations can protect themselves against such threats.

Published: Mon May 4 07:36:41 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Flaw in Linux Kernel Exposed: A Wake-Up Call for System Administrators


The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw in the Linux Kernel to its Known Exploited Vulnerabilities (KEV) catalog, dubbed "Copy Fail". This bug enables an unprivileged local user to write four controlled bytes into the page cache of any readable file, leading to a root escalation attack on major distributions. System administrators must take immediate action to address this vulnerability and apply relevant patches to prevent exploitation.

Published: Mon May 4 07:51:17 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Reevaluating Cybersecurity: Why MSPs Must Adapt to Evolving Threats

Cybersecurity experts warn that managed service providers (MSPs) must adapt to evolving threats by rethinking their security and backup strategies. Join a live webinar on May 14, 2026, at 2:00 PM Eastern Daylight Time, to learn how to strengthen both your security posture and recovery capabilities.

Published: Mon May 4 09:59:39 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Enduring Legacy of Surveillance: How WIRED Exposed the Dark Side of DHS's Customs Summons



A disturbing case involving a customs summons from DHS has exposed the dark side of the government's surveillance efforts. In February 2026, DHS demanded the location information, activity logs, and other identifying details of a Canadian man who had not entered the United States in over a decade, after he posted online condemnations of the killings of two federal immigration agents. The summons raises concerns about the limits of free speech and the role of big tech companies in reporting suspected threats or suspicious activity to authorities. WIRED's investigation reveals a disturbing trend that highlights the need for greater oversight and accountability from government agencies.

Published: Mon May 4 10:21:48 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Trellix Discloses Data Breach After Source Code Repository Hack



Cybersecurity firm Trellix has disclosed a data breach after attackers gained access to "a portion" of its source code repository, highlighting the growing importance of software security in today's digital landscape. The incident serves as a stark reminder of the ever-present threat landscape and underscores the need for vigilance and proactive security measures.

Published: Mon May 4 11:33:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Cybersecurity Landscape: A Shifting Threat Paradigm



The world of cybersecurity is rapidly evolving, with threats becoming increasingly sophisticated and attacks more frequent. This article delves into the latest trends and developments in the industry, including the growing threat of identity security blind spots, patient zero attacks, and AI-powered phishing campaigns. By prioritizing their cybersecurity efforts and taking proactive steps to address emerging threats, organizations can reduce their vulnerability to cyber attacks and protect their sensitive data.

Published: Mon May 4 11:55:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Hidden Backdoor in Deep Learning: The PyTorch Lightning Credential Stealer

PyTorch Lightning, a popular deep learning framework used for pretraining and fine-tuning AI models, has been compromised by a supply-chain attack that allows attackers to steal sensitive credentials. The malicious code was found in version 2.6.3 of the package and is detected as "ShaiWorm," an information-stealing malware that targets .env files, API keys, secrets, GitHub tokens, and data stored in popular browsers.

Published: Mon May 4 13:04:54 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Flaw in Enterprise Software: MOVEit Automation Vulnerability Revealed

Researchers have identified two critical vulnerabilities in Progress Software's MOVEit Automation, which could enable authentication bypasses and privilege escalations. The vulnerabilities were discovered by Airbus SecLab researchers and pose significant risks to organizations that rely on MOVEit Automation for secure file transfer and automation workflows. Find out more about the flaws and how to address them.

Published: Mon May 4 13:13:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Amazon SES Maliciously Exploited by Phishers to Evade Detection


Amazon Web Services' Simple Email Service (SES) has become increasingly vulnerable to abuse by malicious actors exploiting exposed IAM access keys in public assets. This widespread misuse poses significant security risks, highlighting the need for secure storage and management of AWS credentials and regular implementation of security measures such as multi-factor authentication and encryption controls.

Published: Mon May 4 15:47:03 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical cPanel Flaw Exposed: Hackers Target Governments and MSPs Across Southeast Asia and Beyond

Hackers have been exploiting a critical vulnerability in cPanel, allowing them to target governments, military organizations, and managed service providers across Southeast Asia and beyond. Organizations are urged to take immediate action to patch their systems and prevent potential attacks.

Published: Mon May 4 15:57:04 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Aging Online Safely: The Ongoing Challenge of Bypassing Age Checks

Aging Online Safely: The Ongoing Challenge of Bypassing Age Checks

Published: Mon May 4 17:10:45 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exposing the Critical Vulnerabilities: MOVEit Automation Flaws Enable Full System Compromise



A critical vulnerability was discovered in the MOVEit Automation software, which could potentially enable full system compromise. This article will delve into the details of this vulnerability, its impact on various versions of the software, and what organizations can do to protect themselves. Learn more about the critical vulnerabilities and how they can affect your organization.

Published: Mon May 4 17:20:38 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Weaver E-cology Critical Bug Exploited in Attacks Since March


Weaver E-cology, a widely used enterprise office automation and collaboration platform, has been hit by a critical vulnerability that has been exploited in attacks since mid-March. The attack involves an exposed debug API endpoint that allows attackers to execute remote code execution without authentication or input validation. The security update released by the vendor is the recommended fix for users of Weaver E-cology 10.0.

Published: Mon May 4 18:30:32 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Singaporean Cybersecurity Breakthrough: Harnessing Agentic Rule Translation to Simplify SIEM Convergence

Breakthrough in SIEM rule translation enables SOCs to easily detect and respond to security threats across multiple systems, reducing complexity and costs associated with manual rule conversion.

Published: Mon May 4 21:44:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micorosft's Code Conundrum: A Web of Controversy Surrounding GitHub

Microsoft's acquisition of GitHub has been marred by controversy over the platform's reliability, security, and Microsoft's efforts to promote its services without adequately addressing user concerns. The situation highlights the complexities and challenges associated with relying on third-party platforms in the tech industry.

Published: Tue May 5 04:02:16 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Weaver E-cology RCE Flaw: A Critical Vulnerability Exposed

Weaver E-cology has been exposed to a critical remote code execution (RCE) flaw that allows attackers to execute arbitrary commands. Organizations relying on the software are urged to apply patches immediately and remain vigilant for any signs of exploitation by malicious actors.

Published: Tue May 5 04:10:19 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Massive Credential Theft Campaign: How Phishing Emails Utilized Legitimate Email Services to Target 35,000 Users Across 26 Countries


A massive credential theft campaign has targeted 35,000 users across 26 countries in an attempt to harvest their Microsoft credentials and tokens. The attack used legitimate email services, polished HTML templates, and adversary-in-the-middle phishing tactics to trick victims into divulging sensitive information.

Published: Tue May 5 04:21:34 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Instructure Data Breach: A Canvassing Concern for the Global Educational Community



A devastating data breach at Instructure has potentially impacted 9,000 schools worldwide, compromising sensitive user information including names, email addresses, student ID numbers, and private messages. The incident highlights the importance of robust cybersecurity measures in protecting user data and serves as a stark reminder for institutions to prioritize security in their own systems.



Published: Tue May 5 04:35:10 2026 by llama3.2 3B Q4_K_M



SecurityWeek

Cisco Moves to Acquire Astrix Security to Tackle Non-Human Identity Risks

Trellix Source Code Repository Breached

Cybersecurity M&A Roundup: 33 Deals Announced in April 2026

DigiCert Revokes Certificates After Support Portal Hack

Exploitation of ‘Copy Fail’ Linux Vulnerability Begins

OpenAI Rolls Out Advanced Security for ChatGPT Accounts

Over 40,000 Servers Compromised in Ongoing cPanel Exploitation

Edtech Firm Instructure Discloses Data Breach Amid Hacker Leak Threats

US Military Reaches Deals With 7 Tech Companies to Use Their AI on Classified Systems

New Bluekit Phishing Kit Features AI Assistant

CISA News

CISA, US and International Partners Release Guide to Secure Adoption of Agentic AI

CISA and U.S. Government Partners Unveil Guide to Accelerate Zero Trust Adoption in Operational Technology

CISA, National Cyber Security Centre (NCSC) UK, and Global Partners Issue Advisory on Chinese Government-Linked Covert Cyber Networks

CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products

CISA Issues Updated RESURGE Malware Analysis Highlighting a Stealthy but Active Threat

Immediate Action Required: CISA Issues Emergency Directive to Secure Cisco SD-WAN Systems

CISA Announces New Town Halls to Engage with Stakeholders on Cyber Incident Reporting for Critical Infrastructure

CISA’s 2025 Year in Review: Driving Security and Resilience Across Critical Infrastructure

CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication

CISA Orders Federal Agencies to Strengthen Edge Device Security Amid Rising Cyber Threats

CISA Blog

The End is Just the Beginning of Better Security: Enhanced Vulnerability Management with OpenEoX

Super Bowl LX: Strengthening Preparation, Building Resilience, Fostering Partnerships

NCSWIC releases the “‘What is a PACE Plan” video

CISA Urges Critical Infrastructure to Be Air Aware

Helping OT Organizations to Establish Defensible Architecture and More Resilient Operations

The Mandate, Mission, and Momentum to lead the CVE Program into the Future belongs to CISA

The Joint SAFECOM-NCSWIC Project 25 (P25) User Needs Working Group (UNWG) releases the UNWG Video Series

Tackling the National Gap in Software Understanding

Securing Core Cloud Identity Infrastructure: Addressing Advanced Threats through Public-Private Collaboration

SAFECOM Releases the Emergency Communications System Lifecycle Planning Guide Suite Refresh

All CISA Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

Careful Adoption of Agentic AI Services

ABB AWIN Gateways

ABB Ability OPTIMAX

ABB PCM600

ABB Edgenius Management Portal

CISA Adds One Known Exploited Vulnerability to Catalog

ABB Ability Symphony Plus Engineering

ABB System 800xA, Symphony Plus IEC 61850

Adapting Zero Trust Principles to Operational Technology

NSA GRASSMARLIN

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA Adds Four Known Exploited Vulnerabilities to Catalog

SpiceJet Online Booking System

Carlson Software VASCO-B GNSS Receiver

Hangzhou Xiongmai Technology Co., Ltd XM530 IP Camera

Milesight Cameras

Defending Against China-Nexus Covert Networks of Compromised Devices

Yadea T5 Electric Bicycle

Intrado 911 Emergency Gateway (EGW)

FIRESTARTER Backdoor

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Adds One Known Exploited Vulnerability to Catalog

SenseLive X3050

Siemens TPM 2.0

Siemens SCALANCE

Siemens SINEC NMS

Zero Motorcycles Firmware

Siemens RUGGEDCOM CROSSBOW Station Access Controller (SAC)

Hardy Barth Salia EV Charge Controller

Exploit-DB.com RSS Feed

[local] Linux Kernel proc_readdir_de() 6.18-rc5 - Local Privilege Escalation

[local] Linux nf_tables 6.19.3 - Local Privilege Escalation

[hardware] Linksys E1200 2.0.04 - Authenticated Stack Buffer Overflow (RCE)

[webapps] MindsDB 25.9.1.1 - Path Traversal

[local] Windows 11 24H2 - Local Privilege Escalation

[webapps] Traccar GPS Tracking System 6.11.1 - Cross-Site WebSocket Hijacking (CSWSH)

[webapps] FUXA 1.2.8 - Authentication Bypass + RCE Exploit

[webapps] Python-Multipart 0.0.22 - Path Traversal

[local] Google Chrome 145.0.7632.75 - CSSFontFeatureValuesMap

[local] Windows 11 23H2 - Denial of Service (DoS)

[webapps] Repetier-Server 1.4.10 - Path Traversal

[webapps] HUSTOJ Zip-Slip v26.01.24 - RCE

[webapps] BusyBox 1.37.0 - Path Traversal

[local] Windows 11 25H2 - Heap Overflow

[webapps] JUNG Smart Visu Server 1.1.1050 - Dos

[webapps] SumatraPDF 3.5.2 - Remote Code Execution

[webapps] NiceGUI 3.6.1 - Path Traversal

[webapps] Frigate NVR 0.16.3 - Remote Code Execution

[webapps] Js2Py 0.74 - RCE

[webapps] Camaleon CMS v2.9.0 - Path Traversal

[webapps] Cybersecurity AI (CAI) Framework 0.5.10 - Command Injection

[webapps] Erugo 0.2.14 - Remote Code Execution (RCE)

[webapps] deephas 1.0.7 - Prototype Pollution

[webapps] SUSE Manager 4.3.15 - Code Execution

[webapps] HAX CMS 24.x - Stored Cross-Site Scripting (XSS)

[webapps] Craft CMS 5.6.16 - RCE

[local] GNU InetUtils 2.6 - Telnetd Remote Privilege Escalation

[webapps] phpMyFAQ 4.0.16 - Improper Authorization

[webapps] GeographicLib v2.5.1 - stack buffer overflow

[local] OpenWrt 23.05 - Authenticated Remote Code Execution (RCE)

[webapps] OpenKM 6.3.12 - Multiple

[webapps] GUnet OpenEclass E-learning platform < 4.2 - Remote Code Execution (RCE)

[webapps] JuzaWeb CMS 3.4.2 - Authenticated Remote Code Execution

[webapps] FacturaScripts 2025.43 - XSS

[webapps] Xibo CMS 4.3.0 - RCE via SSTI

[local] Fedora - Local Privilege Escalation

[webapps] LangChain Core 1.2.4 - SSTI/RCE

[local] Atlona ATOMERX21 - Authenticated Command Injection

[local] Throttlestop Kernel Driver - Kernel Out-of-Bounds Write Privilege Escalation

[webapps] WordPress Plugin 5.2.0 - Broken Access Control

[local] AVAST Antivirus 25.11 - Unquoted Service Path

[local] NetBT e-Fatura - Privilege Escalation

[webapps] D-Link DIR-650IN - Authenticated Command Injection

[webapps] React Server 19.2.0 - Remote Code Execution

[webapps] RomM 4.4.0 - XSS_CSRF Chain

[webapps] Jumbo Website Manager - Remote Code Execution

[local] ZSH 5.9 - RCE

[webapps] FortiWeb 8.0.2 - Remote Code Execution

[local] 7-Zip 24.00 - Directory Traversal

[webapps] xibocms 3.3.4 - RCE

Full Disclosure

ESP-RFID-Tool v2 PRO Full Public Disclosure

Re: SEC Consult SA-20260427-0 :: Missing TLS Certificate Validation leading to RCE in DeskTime Time Tracking App

SEC Consult SA-20260427-0 :: Missing TLS Certificate Validation leading to RCE in DeskTime Time Tracking App

SEC Consult SA-20260423-0 :: DLL Hijacking in EfficientLab Controlio (cloud-based employee monitoring service)

SEC Consult SA-20260421-0 :: Broken Access Control in Config Endpoint in LiteLLM

SEC Consult SA-20260415-0 :: Exposed Private Key of X.509 Certificate in SAP HANA Cockpit & SAP HANA Database Explorer

APPLE-SA-04-22-2026-2 iOS 18.7.8 and iPadOS 18.7.8

APPLE-SA-04-22-2026-1 iOS 26.4.2 and iPadOS 26.4.2

Research: When Trusted Tools Become Attack Primitives

[KIS-2026-08] SocialEngine <= 7.8.0 (get-memberall) SQL Injection Vulnerability

[KIS-2026-07] SocialEngine <= 7.8.0 Blind Server-Side Request Forgery Vulnerability

Trojan-Spy.Win32.Small / Remote Command Execution

[IWCC 2026] CfP: 15th International Workshop on Cyber Crime - Link ping, Sweden, Aug 24-27, 2026

[SBA-ADV-20251120-01] CVE-2026-0972: GoAnywhere MFT Email HTML Injection

CyberDanube Security Research 20260408-1 | Multiple Vulnerabilities in Siemens SICAM A8000

Open Source Security

Re: [pfx] Postfix stable release 3.11.2 and legacy releases 3.10.9, 3.9.10, 3.8.16

CVE-2026-43870: Apache Thrift: Node.js web_server.js multi-vulnerability

CVE-2026-43869: Apache Thrift: TSSLTransportFactory.java hostname verification

CVE-2026-43868: Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern

Re: systemd-journald in systemd 259 does not escape characters in emerg messages that are wall'd to other user's terminals

Nix/Lix: local privilege escalation in daemon process

Local privilege escalation in Lix and Nix

Re: Precise disclosure contents for copyfail (Re: [oss-security] CVE-2026-31431: CopyFail: linux local privilege scalation)

Re: Fwd: [pfx] Postfix stable release 3.11.2 and legacy releases 3.10.9, 3.9.10, 3.8.16

Re: CVE-2026-31431: CopyFail: linux local privilege scalation

Re: CVE-2026-31431: CopyFail: linux local privilege scalation

Re: Precise disclosure contents for copyfail (Re: [oss-security] CVE-2026-31431: CopyFail: linux local privilege scalation)

Re: [pfx] Postfix stable release 3.11.2 and legacy releases 3.10.9, 3.9.10, 3.8.16

Fwd: [pfx] Postfix stable release 3.11.2 and legacy releases 3.10.9, 3.9.10, 3.8.16

Re: Precise disclosure contents for copyfail (Re: [oss-security] CVE-2026-31431: CopyFail: linux local privilege scalation)








© Ethical Hacking News . All rights reserved.

Privacy | Terms of Use | Contact Us