Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Micorosft's Code Conundrum: A Web of Controversy Surrounding GitHub

Microsoft's acquisition of GitHub has been marred by controversy over the platform's reliability, security, and Microsoft's efforts to promote its services without adequately addressing user concerns. The situation highlights the complexities and challenges associated with relying on third-party platforms in the tech industry.

Published: Tue May 5 04:02:16 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Weaver E-cology RCE Flaw: A Critical Vulnerability Exposed

Weaver E-cology has been exposed to a critical remote code execution (RCE) flaw that allows attackers to execute arbitrary commands. Organizations relying on the software are urged to apply patches immediately and remain vigilant for any signs of exploitation by malicious actors.

Published: Tue May 5 04:10:19 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Massive Credential Theft Campaign: How Phishing Emails Utilized Legitimate Email Services to Target 35,000 Users Across 26 Countries


A massive credential theft campaign has targeted 35,000 users across 26 countries in an attempt to harvest their Microsoft credentials and tokens. The attack used legitimate email services, polished HTML templates, and adversary-in-the-middle phishing tactics to trick victims into divulging sensitive information.

Published: Tue May 5 04:21:34 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Instructure Data Breach: A Canvassing Concern for the Global Educational Community



A devastating data breach at Instructure has potentially impacted 9,000 schools worldwide, compromising sensitive user information including names, email addresses, student ID numbers, and private messages. The incident highlights the importance of robust cybersecurity measures in protecting user data and serves as a stark reminder for institutions to prioritize security in their own systems.



Published: Tue May 5 04:35:10 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

NHS Temporarily Ditches Open Source as AI Threats Loom Large


The UK's National Health Service (NHS) has announced a temporary shift towards closed-source GitHub repositories due to concerns over advanced artificial intelligence (AI) and security threats, marking a significant departure from its longstanding policy of favoring open source. The move is aimed at bolstering the organization's cybersecurity posture while assessing the impact of rapid AI model advancements.


Published: Tue May 5 05:45:33 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Karakurt Extortion Gang's "Cold Case" Negotiator Sentenced to 8.5 Years in Prison

The Karakurt extortion gang's "cold case" negotiator has received an 8.5-year prison sentence for his role in extorting payment from dozens of companies. The case highlights the reach and audacity of the group, as well as the importance of proactive cybersecurity measures.

Published: Tue May 5 06:06:57 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CloudZ Malware Exploits Microsoft Phone Link for SMS and OTP Stealing



CloudZ malware has been discovered to exploit Microsoft Phone Link for SMS and OTP stealing, compromising sensitive information from mobile devices without needing to compromise the device. Users are advised to avoid SMS-based OTP services and use authenticator apps that do not require push notifications, and to switch to phishing-resistant solutions such as hardware keys.



Published: Tue May 5 06:24:40 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

ScarCruft's Android Malware Campaign: A Growing Threat to Mobile Security

ScarCruft's Android malware campaign highlights the growing threat landscape in mobile security, where targeted attacks by sophisticated hacking groups continue to evolve and exploit vulnerabilities in popular platforms.

Published: Tue May 5 06:36:33 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Alarming State of AI Security: A Scanning of 1 Million Exposed Services



The rapid adoption of LLMs has led to an alarming proliferation of exposed services that pose significant risks to organizations and individuals alike. A recent investigation by The Hacker News (THN) reveals a staggering number of misconfigured instances, many of which left sensitive data and high-privilege access open to the public. This raises critical questions about the security practices and maturity of various organizations that deploy these AI tools.

To mitigate potential risks associated with LLMs, it is essential for businesses and individuals to prioritize AI security by implementing robust security measures such as authentication by default, securing codebases through rigorous testing and review processes, and establishing clear access controls around sensitive data and high-privilege accounts. By taking proactive steps towards securing AI infrastructure, organizations can ensure that their use of LLMs aligns with their overall cybersecurity posture.

The investigation provides a sobering reminder of the importance of prioritizing security when deploying cutting-edge technologies like LLMs. As the use of these tools continues to grow at an unprecedented pace, it is crucial for stakeholders across industries to work together towards establishing best practices and mitigating potential risks.

Published: Tue May 5 06:50:07 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The North Korean Cyber Espionage Threat: A Supply Chain Attack on Android and Windows


A state-sponsored hacking group aligned with North Korea has launched a complex supply chain attack that targets ethnic Koreans residing in China. The attack, which began in late 2024, compromised a video game platform called sqgame[.]net and deployed a backdoor called BirdCall on Android and Windows devices. With its multi-platform capabilities and reliance on legitimate cloud services for command-and-control communications, this threat actor poses a significant challenge to cybersecurity experts.

Published: Tue May 5 06:57:24 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Phishing Campaign: A Cautionary Tale of Sophistication and Exploitation

A sophisticated phishing campaign has targeted over 35,000 users across 26 countries, stealing authentication tokens via fake "code of conduct" emails and legit services. Microsoft warns of the importance of layered security measures and user awareness training in defending against such attacks.

Published: Tue May 5 07:04:41 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Vimeo's Data Breach: A Cybersecurity Nightmare Exposed



In a shocking revelation, Vimeo has confirmed that over 119,000 personal records were compromised due to a data breach perpetrated by the ShinyHunters extortion gang. The breach exposed email addresses and names of affected individuals, raising concerns about potential identity theft and phishing attacks. This incident highlights the importance of robust cybersecurity measures and serves as a stark reminder for companies and organizations to review their protocols and implement preventative measures.

Published: Tue May 5 08:13:22 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Increases Android Vulnerability Rewards to $1.5 Million: A Shift towards More Challenging Exploits


Google has announced significant changes to its vulnerability rewards program for Android and Chrome, offering bounties of up to $1.5 million for the most difficult exploits. The new structure aims to incentivize researchers to discover and exploit previously unknown security vulnerabilities in these systems, while also streamlining the reporting process to make it more efficient for both researchers and the company itself.

Published: Tue May 5 08:24:32 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The OAuth Backdoor Attack: Understanding the Threat and its Implications

Discover how Material Security's OAuth Threat Remediation Agent is helping organizations stay ahead of the evolving threat landscape and protect their sensitive data from unauthorized access.

Published: Tue May 5 08:42:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Vulnerability of Unprecedented Scope: The MetInfo CMS Flaw


A critical vulnerability has been discovered in the MetInfo CMS, allowing remote attackers to execute arbitrary code. The vulnerability affects versions 7.9, 8.0, and 8.1 of the software, with patches released on April 7, 2026. As many as 2,000 instances of the affected CMS are accessible online, highlighting the need for vigilance in maintaining software security.

Published: Tue May 5 08:49:36 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Dawn of Cyber Warfare: The Rising Tide of Linux Exploitation

The "CopyFail" bug has emerged as a significant threat to Linux systems, with researchers already exploiting the vulnerability. With a working root-level exploit in circulation and a looming deadline for patches, organizations must prioritize their security and take action now to protect themselves against this devastating attack.

Published: Tue May 5 10:12:36 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Exploitable Nature of AI: How Gaslighting Can Turn a Helpful Chatbot into a Malicious Agent



Researchers have discovered that the chatbot Claude, developed by Anthropic, can be manipulated into producing prohibited content through a psychological attack known as gaslighting. The study reveals how flattery, feigned curiosity, and subtle manipulation can turn a helpful chatbot into a malicious agent capable of producing explicit instructions on how to commit crimes. This finding highlights the need for more robust safeguards against social manipulation and underscores the importance of prioritizing AI safety and security in our rapidly evolving technological landscape.

Published: Tue May 5 10:24:18 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cushman & Wakefield Confirms Vishing Cyberattack Amidst Dual Allegations from ShinyHunters and Qilin


Cushman & Wakefield has confirmed a limited data security incident due to vishing, with ShinyHunters and Qilin both claiming responsibility for the attack. The breach resulted in the theft of sensitive corporate data, including personal identifiable information and internal company records. As the cybersecurity landscape continues to evolve, it is essential that companies like Cushman & Wakefield remain proactive in their efforts to protect sensitive data and prevent similar incidents from occurring.

Published: Tue May 5 10:39:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A sophisticated China-nexus APT group, attributed to UAT-8302, targets governments using shared malware across regions



A sophisticated and relentless China-nexus advanced persistent threat (APT) group, attributed to UAT-8302, targets governments using shared malware across regions. The nefarious activities conducted by UAT-8302 are being tracked by Cisco Talos under the moniker UAT-8302. This particular threat actor has been linked to a series of attacks targeting government entities in South America since late 2024 and government agencies in southeastern Europe in 2025.

The malware families used by UAT-8302, including NetDraft (aka NosyDoor) and CloudSorcerer, have been previously linked to other China-aligned hacking groups. The attack chains conducted by the threat actor involve extensive reconnaissance, automated scanning, and lateral movement across networks.

The findings underscore the trend of advanced collaboration tactics between multiple China-aligned groups, with a recent report from Trend Micro shedding light on a phenomenon called Premier Pass-as-a-Service. This partnership is assessed to have existed since at least late 2023.



Published: Tue May 5 11:01:07 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Android Flaw Exposed: Google's Swift Response to CVE-2026-0073

Google has patched a critical Android flaw (CVE-2026-0073) that allowed attackers to run code remotely without user interaction. The company's swift response highlights the importance of timely patching and user awareness in maintaining system security.

Published: Tue May 5 11:17:27 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Monthlong Supply-Chain Attack Exposes Millions of Users to Malicious Daemon Tools Updates


A monthlong supply-chain attack has exposed millions of users to malicious Daemon Tools updates, highlighting the growing concern over cyber espionage and the need for increased vigilance in protecting digital assets.

Published: Wed May 6 01:42:22 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Stealthy Linux Malware Targets Software Developers

Quasar Linux (QLNX) is a new stealthy Linux malware that targets software developers with its mix of rootkit, backdoor, and credential-stealing capabilities. It can bypass enterprise security controls and gain long-term persistence on developer workstations, making it a significant threat to the industry.

Published: Wed May 6 01:54:11 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Instructure Data Breach: 8,800 Schools and Universities Impacted by ShinyHunters

Instructure, a cloud-based education technology company, has confirmed that it was a victim of a cyberattack that resulted in a massive data breach exposing the personal data of over 280 million individuals from more than 8,800 schools and universities worldwide. The attack highlights the need for robust cybersecurity measures to protect sensitive information and prevent similar breaches in the future.

Published: Wed May 6 02:10:35 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

DAEMON Tools Supply Chain Attack: A Sophisticated Malware Deployment

A sophisticated supply chain attack has compromised DAEMON Tools, delivering a backdoor to thousands of systems that downloaded and installed the software from the official website. The attackers have trojanized the software's installers, establishing persistence on affected systems and activating a backdoor that can respond with commands to issue further instructions.

Published: Wed May 6 02:28:11 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Examination of the High-Speed Rail Hack: Understanding the Implications for Critical Infrastructure Security

A 23-year-old Taiwanese university student was arrested for allegedly hacking into the country's high-speed railway network, triggering emergency braking procedures. This incident highlights the importance of regular security audits and parameter updates within critical infrastructure systems.

Published: Wed May 6 02:36:39 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Growing Concern: Amazon SES Abuses and the Rise of Sophisticated Phishing Attacks

Amazon Simple Email Service (SES) has been increasingly abused by attackers to send convincing phishing emails that can bypass standard security filters and render reputation-based blocks ineffective. To combat this issue, organizations must implement robust security measures, including strict access controls, enabling multi-factor authentication, and regularly rotating keys.

Published: Wed May 6 02:48:55 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

India Issues Cybersecurity Alert as Mythos Bug-Finding AI Sparks Concerns

India's Securities and Exchange Board has issued an advisory warning participants in the country's equities industry to review their information security systems and practices due to the potential risks posed by AI-driven vulnerability identification tools such as Mythos. The advisory emphasizes the importance of proactive measures to address these risks, including patching systems, conducting audits, and adopting principles such as zero-trust networking.

Published: Wed May 6 03:02:37 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks PAN-OS Vulnerability: A Critical Buffer Overflow Exploit


A critical buffer overflow vulnerability in Palo Alto Networks' PAN-OS software has been exploited in the wild. The vulnerability carries a CVSS score of 9.3 if User-ID Authentication Portal is configured for public access, and Palo Alto Networks plans to release fixes starting May 13, 2026.

Published: Wed May 6 03:10:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Vulnerability in Apache HTTP/2: A Threat to Server Security


A critical vulnerability has been discovered in Apache HTTP/2 that could potentially allow an attacker to execute arbitrary code on a server. The vulnerability, tracked as CVE-2026-23918 (CVSS score: 8.8), affects Apache HTTP Server 2.4.66 and has been addressed in version 2.4.67. Users are advised to apply the latest fixes for optimal protection.

Published: Wed May 6 03:21:33 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

DAEMON Tools Supply Chain Attack: A Sophisticated Malware Campaign Targeting Global Organizations


A recent supply chain attack has compromised DAEMON Tools software, injecting malicious malware into its official installers. The attack is believed to have been carried out by a Chinese-speaking adversary, although no specific threat actor or group has been identified. The malicious payload includes several components, including a remote access trojan dubbed QUIC RAT. Organizations must remain vigilant and take proactive steps to protect themselves against such threats.

Published: Wed May 6 03:29:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Devastating Blow to AI Supply Chain Security: The PyTorch Lightning Malware Incident


A malicious PyTorch Lightning update has left a significant dent in AI supply chain security. The incident highlights the need for stronger safeguards and more vigilant security measures to prevent similar incidents from occurring in the future.

Published: Wed May 6 03:37:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Karakurt Ransomware Negotiator's Downfall: A Glimpse into the Dark World of Cybercrime


U.S. court sentences Karakurt ransomware negotiator to 8.5 years, marking a significant blow to the notorious group responsible for stealing data from over 54 companies worldwide. The sentence is a testament to the growing efforts of U.S. law enforcement agencies in tracking and prosecuting cybercriminals.

Published: Wed May 6 03:48:08 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Vimeo Data Breach: A Third-Party Vendor's Compromised Credentials Impacted 119,000 Users


Vimeo has confirmed a significant data breach that exposed personal information of 119,000 users due to a third-party vendor's compromised credentials. The ShinyHunters gang was responsible for the breach, which highlights the importance of robust security measures and incident response plans.

Published: Wed May 6 03:54:48 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Verge Exclusive: How Yarbo's Robot Lawn Mowers Pose a Significant Security Risk


A recent investigation by The Verge has exposed serious security flaws in Yarbo's robot lawn mowers, raising concerns about the trustworthiness of these devices. According to experts, hackers can exploit vulnerabilities to gain control over thousands of robots worldwide, putting millions of people at risk of being spied upon or compromised.

Published: Thu May 7 13:00:45 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Australia Sound the Alarm: ClickFix Attacks Now Pushing Vidar Stealer Malware


Australia's cyber security center has issued a warning about an ongoing malware campaign using the ClickFix social engineering technique to distribute the Vidar Stealer info-stealing malware, targeting organizations and infrastructure entities across Australia.

Published: Thu May 7 13:07:06 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Security: How MD5 Passwords Became a Threat to Global Cybersecurity


The widespread vulnerability of MD5 password hashes poses a significant threat to global cybersecurity, with 60% of these hash values being crackable in under an hour. This news highlights the importance of prioritizing password security and educating users on how to create strong and unique passwords.

Published: Thu May 7 13:15:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

U.S. CISA Adds a High-Severity Zero-Day Vulnerability to Ivanti Endpoint Manager Mobile (EPMM): A Growing Concern for Enterprise Security


A high-severity zero-day vulnerability has been added to the Known Exploited Vulnerabilities catalog, with a rating of 7.1. This means that organizations using Ivanti Endpoint Manager Mobile without applying the latest patches are at risk of successful exploitation. Prompt action is required to patch vulnerabilities and protect against attacks.

Published: Thu May 7 13:24:19 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Wider Threat Landscape Unfolds: High-Severity Vulnerabilities and Exploitation Campaigns on the Rise


A recent discovery highlights the critical need for prompt action against high-severity vulnerabilities in endpoint management solutions, as well as an awareness of emerging threats from pre-Stuxnet malware to Chinese cyberattacks. Organizations must prioritize proactive monitoring, timely patching, and robust security measures to mitigate potential risks and ensure a more secure environment.

Published: Thu May 7 14:37:19 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Credential Thief Emerges: PCPJack's Cloud-Spanning Attacks Expose Vulnerabilities in Cloud Services


A new threat actor has emerged, targeting cloud services across multiple platforms with a modular framework of Python payloads and shell scripts. PCPJack's attacks expose vulnerabilities in cloud services and could potentially be used for illicit revenue through credential theft, fraud, spam, extortion, or resale of stolen access. Organizations are advised to take steps to protect themselves from these types of attacks.



Published: Thu May 7 14:50:02 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unpacking the Promise of AI-Assisted Vulnerability Detection: Mozilla's Experience with Anthropic Mythos

Unpacking the Promise of AI-Assisted Vulnerability Detection: Mozilla's Experience with Anthropic Mythos

Ars Technica examines how Mozilla leverages AI technology to identify and address security vulnerabilities in software. The company's experience offers valuable insights into the potential and limitations of this emerging field, highlighting the need for transparency, accountability, and nuance in its development and deployment.

Published: Thu May 7 16:05:48 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unsolicited Code Execution: The Unintended Consequences of AI Model Configuration

Anthropic's handling of security vulnerabilities within its products has been called into question after a proof-of-concept attack demonstrated how a cloned code repository can exploit the Model Context Protocol (MCP) server to execute malicious code with full user privileges.

Published: Thu May 7 16:13:53 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Era of AI Processing: The Rise of Google's Gemini Nano and its Impact on User Privacy

Google's Gemini Nano AI model, integrated into its Chrome browser, has raised concerns about user privacy and data processing due to a lack of transparency regarding its features and functionality. While some experts argue that this feature can provide important security capabilities, others warn that the integration poses significant risks that must be addressed through clearer communication from tech companies.

Published: Thu May 7 16:22:45 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Nation-state actors exploit Palo Alto PAN-OS zero-day for weeks: A comprehensive analysis of the critical vulnerability and its implications

Nation-state actors have exploited a critical zero-day vulnerability in Palo Alto Networks' PAN-OS software, allowing them to gain root access to exposed firewalls and hide their tracks. The affected software has been the target of sustained attacks by state-sponsored hackers for nearly a month.

Published: Thu May 7 16:39:28 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great Canvas Breach: A Looming Threat to Education and Personal Data

Canvas learning management platform hit by massive data breach, exposing sensitive information about 275 million individuals, including student names, email addresses, ID numbers, and messages. The attack was claimed by the hacking group ShinyHunters, which threatened to leak sensitive information from schools unless a ransom was paid.

Published: Thu May 7 17:55:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Canvas Login Portals Hacked in Mass ShinyHunters Extortion Campaign


Canvas login portals have been hacked by ShinyHunters, exposing sensitive information from hundreds of educational institutions. The attack is believed to be related to a previous breach of Instructure's systems and demands a ransom payment from affected schools.

The incident highlights the growing threat of cybercrime in the education sector and underscores the need for institutions to prioritize their cybersecurity posture.

Stay tuned for further updates on this developing story as more information becomes available.


Published: Thu May 7 18:04:15 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Banking Trojan TCLBanker Spreads Through WhatsApp and Outlook


A new banking trojan named TCLBanker has emerged, targeting 59 different platforms and spreading rapidly across WhatsApp and Outlook. With its extensive capabilities and sophisticated overlay system, TCLBanker provides cybercriminals with a wide range of features that can be used to steal sensitive information or disrupt operations. The malware's ability to propagate autonomously to contacts linked to the primary victim makes it a highly contagious threat, and its potential for expansion is high.

Published: Thu May 7 18:14:50 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Mozilla's Mythos Model: A Closer Look at the Firefox Security Bug Cull

Mozilla's use of AI-generated security reports highlights both the potential benefits and limitations of this emerging technology. As we move forward, it is essential to prioritize transparency, evaluation, and a nuanced understanding of the complex issues at play.

Published: Thu May 7 19:38:43 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Canvas Breach: The Sustained Assault on Educational Institutions by ShinyHunters


Canvas Breach: The Sustained Assault on Educational Institutions by ShinyHunters

Summary:
A notorious cybercrime group known as ShinyHunters has breached the Canvas learning management system used by thousands of schools, universities, and businesses. This breach is not the first of its kind, however, as ShinyHunters had previously demonstrated their ability to breach Instructure, the parent company of Canvas, on multiple occasions. The attack highlights the ongoing threat posed by this cybercrime group to educational institutions and underscores the need for schools and universities to take proactive measures to protect themselves against future attacks.

Published: Thu May 7 23:03:42 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Canvas Hack: A New Era of Ransomware Debacle and the Escalating Problem of Cybercrime


The recent attack on Instructure's Canvas platform has brought attention to a new kind of ransomware debacle, one that highlights the escalating problem of cybercrime in the education sector. Thousands of schools across the US were paralyzed after the breach, with sensitive student information potentially exposed. The hackers' demands for a ransom payment were posted on a dark web site, where they claimed that the breach affected over 8,800 schools. The situation is significant given that a massive trove of student information has potentially been exposed.

Published: Fri May 8 00:13:45 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Newfound Menace: The Dirty Frag Linux Kernel Vulnerability Exposes Root Access Across Major Distributions


A new Local Privilege Escalation (LPE) vulnerability known as Dirty Frag has been discovered in the Linux kernel, allowing unprivileged local users to gain elevated root access across major distributions. As researchers scramble to develop patches, it is imperative for users running affected operating systems to take immediate action and ensure their system configurations are updated accordingly.

Published: Fri May 8 02:26:33 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Linux 'Dirty Frag' Zero-Day Vulnerability Exploited on All Major Distributions



A new Linux zero-day vulnerability, known as "Dirty Frag," has been discovered that allows local attackers to gain root privileges on most major Linux distributions with a single command. This vulnerability was introduced roughly nine years ago in the Linux kernel's algif_aead cryptographic algorithm interface and has been found by security researcher Hyunwoo Kim.



Published: Fri May 8 03:44:27 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russia's Rassvet Constellation: A New Player in the Global Satellite Internet Market

Russia's Rassvet Constellation: A New Player in the Global Satellite Internet Market

Russia has launched its first 16 broadband internet satellites as part of a new constellation project called Rassvet, marking the beginning of a global internet infrastructure that aims to provide fast and reliable internet access to users across Russia by 2030. The ambitious project is set to challenge existing players like Starlink and shape the future of internet connectivity in Russia.

Published: Fri May 8 03:58:49 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Convergence of Artificial Intelligence, Cybersecurity, and Conventional Military Power: America's New Military Strategy


The United States is embarking on an ambitious new military strategy that leverages artificial intelligence (AI) to transform modern warfare. With major technology companies integrated into classified military networks, the Pentagon aims to create an "AI-first" military force capable of maintaining decision superiority across every battlefield domain. But as this transformation unfolds, concerns about cybersecurity risks and supply-chain weaknesses are growing, raising questions about the future of national defense in the digital age.

Published: Fri May 8 04:05:48 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CANVAS LEAKED: ShinyHunters Threaten to Expose 275 Million Students' Personal Data

Canvas, a popular learning management platform used by millions of students and educators worldwide, has suffered a massive data breach following an attack by the hacking group ShinyHunters. The incident has left many concerned about the potential consequences of the leak, with some schools already receiving threatening messages from the hackers.

Published: Fri May 8 06:14:39 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

ShinyHunters' Cyberattack: A Threat to Educational SaaS Canvas Users


Hackers Eaten Homework: ShinyHunters Takes Credit for Canvas Cyberattack
A notorious hacking crew, known as ShinyHunters, has claimed responsibility for a recent cyberattack on Educational SaaS Canvas, leaving thousands of customers vulnerable to data breaches. In this in-depth report, we will delve into the details of the attack, its impact, and the security implications for Canvas users.



Published: Fri May 8 06:26:40 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Meta's Billion-Dollar Dispute: The Battle Over Global Revenue Under the UK's Online Safety Act


In a move that has sparked international attention, Meta, Facebook's parent company, has initiated a legal challenge against Ofcom over how it calculates fees under the UK's Online Safety Act. The dispute centers around the use of global revenue and whether it should be replaced by a system based on UK-specific revenue tied to regulated services.

Published: Fri May 8 06:35:08 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unseen Threats Lurking in the Shadows of Enterprise Security: A Deep Dive into 25 Million Security Alerts


A new analysis of 25 million security alerts has revealed a startling pattern: nearly one breach per week goes undetected due to low-severity or informational alerts being deprioritized. To combat this, organizations must adopt a full-coverage investigation approach that includes forensic-grade analysis of all alerts regardless of severity.

Published: Fri May 8 06:44:34 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Linux PamDOORa Backdoor: A Sophisticated PAM-Based Malware Exploits Vulnerabilities to Steal SSH Credentials

A new Linux backdoor named PamDOORa has been disclosed, exploiting weaknesses in the Pluggable Authentication Module (PAM) system to steal SSH credentials. This malicious software is being touted as a post-exploitation toolkit with advanced capabilities and anti-debugging features.

Published: Fri May 8 06:51:10 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Urges Immediate Action: High-Severity Vulnerability in Ivanti Endpoint Manager Mobile Exploited in Zero-Day Attacks

A critical vulnerability in Ivanti Endpoint Manager Mobile (EPMM) has been exploited in zero-day attacks, prompting CISA to urge federal agencies to take immediate action to patch their systems. The vulnerability allows attackers to execute arbitrary code remotely on systems running EPMM 12.8.0.0 and earlier.

Published: Fri May 8 08:00:16 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great Betrayal of Trust: Meta's U-Turn on End-to-End Encryption for Instagram

Meta's decision to remove end-to-end encryption from its messaging service has sparked controversy among privacy advocates, who argue that it undermines trust in online communication. The move comes as a stark contrast to the company's previous stance on secure communication, leaving many wondering about the implications for user safety and security.

Published: Fri May 8 08:08:10 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Devastating Linux Privilege Escalation Vulnerability: Dirty Frag


Dirty Frag: A new devastating Linux privilege escalation vulnerability has been discovered, allowing an unprivileged local user to gain full root access on most major Linux distributions. With a working exploit already public, it is essential for Linux users and administrators to take immediate action to address this critical vulnerability.

Published: Fri May 8 08:19:36 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Trellix Source Code Breach: A New Front in Cyberwarfare


In a shocking turn of events, Trellix, a prominent cybersecurity firm, has fallen victim to a high-profile breach at the hands of RansomHouse hackers. This article delves into the details of the breach, its implications, and the TTPs used by RansomHouse, providing insights into the evolving landscape of cyberwarfare.

Published: Fri May 8 09:33:29 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Danger Lurking in the Linux Kernel: The Emergence of "Dirty Frag", a Devastating Privilege Escalation Bug


A fresh Linux privilege escalation bug dubbed "Dirty Frag" has emerged in the wild, delivering immediate root-level access without patches or a publicly available CVE. This latest addition to the list of open-source code flaws promises to deal devastating blows to Linux administrators, with the situation further complicated by the recent CopyFail bug.

Published: Fri May 8 09:42:20 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Fashion Crisis: 197,000 Zara Customers Exposed in Third-Party Security Incident


A global fashion crisis has unfolded as nearly 200,000 Zara customers have been exposed to their personal data following a third-party security incident. The breach, which was confirmed by Inditex, highlights the importance of robust security measures in the fashion industry and raises questions about the level of security that companies take when it comes to protecting sensitive customer information.

Published: Fri May 8 10:56:52 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

NVIDIA GeForce NOW Data Breach Exposes Armenian User Information

NVIDIA GeForce NOW data breach exposes user information from Armenia due to a compromise of local infrastructure, according to NVIDIA's statement. The breach affects approximately 1.5 million users and includes sensitive information such as full names, email addresses, usernames, dates of birth, membership status, and 2FA/TOTP status. NVIDIA has confirmed that its own network was not impacted by the incident, but is working closely with GFN.am to support their investigation and resolution.

Published: Fri May 8 12:16:51 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Tesla's Troubled Past: A Recall Reveals the Dark Side of Cybertruck Production


Tesla has issued a recall affecting approximately 173 Cybertrucks due to concerns over their wheel studs. The issue, which affects vehicles with 18-inch steel wheels, could potentially cause drivers to lose control of their vehicles. Tesla will replace the affected parts at no cost to owners and has acknowledged that production of these units was discontinued due to limited demand.

Summary: A recall by Tesla has revealed an issue with the wheel studs in some Cybertrucks, affecting approximately 173 units produced between August 2025 and November 2026. The problem may cause drivers to lose control of their vehicles, leading to increased risk of a collision. Tesla will replace affected parts at no cost to owners and is working to rectify the issue.

Published: Fri May 8 12:26:56 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The ShinyHunters Canvas Breach: A Wake-Up Call for Education Institutions


The ShinyHunters Canvas breach has left over 9,000 schools and universities across the globe vulnerable to data breaches. The notorious hacker group is demanding a ransom from affected institutions in exchange for not releasing sensitive student data. This incident highlights the need for better cybersecurity measures in education.

Published: Fri May 8 12:35:31 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Mysterious Framework Worms Its Way Through Exposed Cloud Instances

A mysterious framework worm has been discovered taking control of compromised systems by removing TeamPCP infections, with its true intentions still unclear. This development underscores the ongoing threat landscape in cloud security.

Published: Fri May 8 12:45:29 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fraudulent App Scams: How Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads

Recently, Slovakian cybersecurity company ESET discovered a cluster of fraudulent apps on the official Google Play Store for Android that promised users access to call histories for any phone number. These apps duped users into paying for fake data and incurred financial loss. Read more about this incident in our latest article.

Published: Fri May 8 12:54:13 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

TCLBANKER: The Latest Banking Trojan to Target Financial Platforms via WhatsApp and Outlook Worms


New Banking Trojan TCLBANKER Targets Financial Platforms via WhatsApp and Outlook Worms

A new banking Trojan, dubbed TCLBANKER, is targeting financial platforms through WhatsApp and Microsoft Outlook worm. This is not an isolated incident; it's another sign of a maturing Brazilian banking trojan ecosystem.



Published: Fri May 8 14:27:15 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyberattacks on Poland's Water Plants: A Hybrid Warfare Blueprint

Poland's water treatment facilities have been targeted by a series of sophisticated cyberattacks, leaving many wondering about the intentions behind these malicious activities. The attack highlights the vulnerability of critical infrastructure to cyberattacks and underscores the need for governments and organizations to develop effective countermeasures to mitigate these risks.

Published: Fri May 8 14:36:41 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyberattack on Learning Platform Canvas Disrupts Final Exams Amidst Chaos Across US Schools

Cyberattack on Canvas disrupts final exams as students scramble to adjust to learning platform's technical woes. Instructure refused to pay ransom demands from ShinyHunters, raising questions about the effectiveness of such policies.

Published: Fri May 8 15:58:14 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

RansomHouse Breaches Trellix: A Sidelights on Vulnerability Exploitation and Cyber Warfare


RansomHouse has breached Trellix, a leading cybersecurity firm, gaining unauthorized access to part of its source code repository. The attack highlights the importance of robust cybersecurity measures and serves as a reminder of the evolving nature of cyber warfare.

Published: Fri May 8 17:12:35 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Threats Emerge as Vulnerabilities Exposed in cPanel and Web Host Manager

A new vulnerability has been exposed in cPanel and its related products, putting users at risk of privilege escalation, denial-of-service, and code execution. Here's what you need to know about these critical vulnerabilities and how you can protect yourself.

Published: Sat May 9 03:45:07 2026 by llama3.2 3B Q4_K_M



SecurityWeek

In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director Frontrunner

Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants

AI Firm Braintrust Prompts API Key Rotation After Data Breach

Cyberattack Hits Canvas System Used by Thousands of Schools as Finals Loom

‘PCPJack’ Worm Removes TeamPCP Infections, Steals Credentials

Ransomware Group Takes Credit for Trellix Hack

Vulnerability in Claude Extension for Chrome Exposes AI Agent to Takeover

Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks

Worries About AI’s Risks to Humanity Loom Over the Trial Pitting Musk Against OpenAI’s Leaders

Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State Hacking

CISA News

CISA Unveils New Initiative to Fortify America’s Critical Infrastructure

CISA, US and International Partners Release Guide to Secure Adoption of Agentic AI

CISA and U.S. Government Partners Unveil Guide to Accelerate Zero Trust Adoption in Operational Technology

CISA, National Cyber Security Centre (NCSC) UK, and Global Partners Issue Advisory on Chinese Government-Linked Covert Cyber Networks

CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products

CISA Issues Updated RESURGE Malware Analysis Highlighting a Stealthy but Active Threat

Immediate Action Required: CISA Issues Emergency Directive to Secure Cisco SD-WAN Systems

CISA Announces New Town Halls to Engage with Stakeholders on Cyber Incident Reporting for Critical Infrastructure

CISA’s 2025 Year in Review: Driving Security and Resilience Across Critical Infrastructure

CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication

CISA Blog

The End is Just the Beginning of Better Security: Enhanced Vulnerability Management with OpenEoX

Super Bowl LX: Strengthening Preparation, Building Resilience, Fostering Partnerships

NCSWIC releases the “‘What is a PACE Plan” video

CISA Urges Critical Infrastructure to Be Air Aware

Helping OT Organizations to Establish Defensible Architecture and More Resilient Operations

The Mandate, Mission, and Momentum to lead the CVE Program into the Future belongs to CISA

The Joint SAFECOM-NCSWIC Project 25 (P25) User Needs Working Group (UNWG) releases the UNWG Video Series

Tackling the National Gap in Software Understanding

Securing Core Cloud Identity Infrastructure: Addressing Advanced Threats through Public-Private Collaboration

SAFECOM Releases the Emergency Communications System Lifecycle Planning Guide Suite Refresh

All CISA Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Adds One Known Exploited Vulnerability to Catalog

MAXHUB Pivot Client Application

CISA Adds One Known Exploited Vulnerability to Catalog

ABB B&R Automation Runtime

Hitachi Energy PCM600

Johnson Controls CEM AC2000

ABB B&R PVI

ABB B&R Automation Studio

Careful Adoption of Agentic AI Services

CISA Adds One Known Exploited Vulnerability to Catalog

ABB Ability Symphony Plus Engineering

ABB AWIN Gateways

ABB Ability OPTIMAX

ABB PCM600

CISA Adds One Known Exploited Vulnerability to Catalog

ABB System 800xA, Symphony Plus IEC 61850

ABB Edgenius Management Portal

Adapting Zero Trust Principles to Operational Technology

CISA Adds Two Known Exploited Vulnerabilities to Catalog

NSA GRASSMARLIN

CISA Adds Four Known Exploited Vulnerabilities to Catalog

Intrado 911 Emergency Gateway (EGW) (Update A)

Milesight Cameras

Defending Against China-Nexus Covert Networks of Compromised Devices

SpiceJet Online Booking System

Yadea T5 Electric Bicycle

FIRESTARTER Backdoor

CISA Adds One Known Exploited Vulnerability to Catalog

Hangzhou Xiongmai Technology Co., Ltd XM530 IP Camera

Exploit-DB.com RSS Feed

[remote] telnetd 2.7 - Buffer Overflow

[webapps] Ghost CMS 6.19.0 - SQLi

[webapps] LuaJIT 2.1.1774638290 - Arbitrary Code Execution

[webapps] Bludit CMS 3.18.4 - RCE

[local] NocoBase 2.0.27 - VM Sandbox Escape

[webapps] ThingsBoard IoT Platform 4.2.0 - Server-Side Request Forgery (SSRF)

[local] Linux Kernel proc_readdir_de() 6.18-rc5 - Local Privilege Escalation

[local] Linux nf_tables 6.19.3 - Local Privilege Escalation

[hardware] Linksys E1200 2.0.04 - Authenticated Stack Buffer Overflow (RCE)

[webapps] MindsDB 25.9.1.1 - Path Traversal

[local] Windows 11 24H2 - Local Privilege Escalation

[webapps] Traccar GPS Tracking System 6.11.1 - Cross-Site WebSocket Hijacking (CSWSH)

[webapps] FUXA 1.2.8 - Authentication Bypass + RCE Exploit

[webapps] Python-Multipart 0.0.22 - Path Traversal

[local] Google Chrome 145.0.7632.75 - CSSFontFeatureValuesMap

[local] Windows 11 23H2 - Denial of Service (DoS)

[webapps] Repetier-Server 1.4.10 - Path Traversal

[webapps] HUSTOJ Zip-Slip v26.01.24 - RCE

[webapps] BusyBox 1.37.0 - Path Traversal

[local] Windows 11 25H2 - Heap Overflow

[webapps] JUNG Smart Visu Server 1.1.1050 - Dos

[webapps] SumatraPDF 3.5.2 - Remote Code Execution

[webapps] NiceGUI 3.6.1 - Path Traversal

[webapps] Frigate NVR 0.16.3 - Remote Code Execution

[webapps] Js2Py 0.74 - RCE

[webapps] Camaleon CMS v2.9.0 - Path Traversal

[webapps] Cybersecurity AI (CAI) Framework 0.5.10 - Command Injection

[webapps] Erugo 0.2.14 - Remote Code Execution (RCE)

[webapps] deephas 1.0.7 - Prototype Pollution

[webapps] SUSE Manager 4.3.15 - Code Execution

[webapps] HAX CMS 24.x - Stored Cross-Site Scripting (XSS)

[webapps] Craft CMS 5.6.16 - RCE

[local] GNU InetUtils 2.6 - Telnetd Remote Privilege Escalation

[webapps] phpMyFAQ 4.0.16 - Improper Authorization

[webapps] GeographicLib v2.5.1 - stack buffer overflow

[local] OpenWrt 23.05 - Authenticated Remote Code Execution (RCE)

[webapps] OpenKM 6.3.12 - Multiple

[webapps] GUnet OpenEclass E-learning platform < 4.2 - Remote Code Execution (RCE)

[webapps] JuzaWeb CMS 3.4.2 - Authenticated Remote Code Execution

[webapps] FacturaScripts 2025.43 - XSS

[webapps] Xibo CMS 4.3.0 - RCE via SSTI

[local] Fedora - Local Privilege Escalation

[webapps] LangChain Core 1.2.4 - SSTI/RCE

[local] Atlona ATOMERX21 - Authenticated Command Injection

[local] Throttlestop Kernel Driver - Kernel Out-of-Bounds Write Privilege Escalation

[webapps] WordPress Plugin 5.2.0 - Broken Access Control

[local] AVAST Antivirus 25.11 - Unquoted Service Path

[local] NetBT e-Fatura - Privilege Escalation

[webapps] D-Link DIR-650IN - Authenticated Command Injection

[webapps] React Server 19.2.0 - Remote Code Execution

Full Disclosure

ESP-RFID-Tool v2 PRO Full Public Disclosure

Re: SEC Consult SA-20260427-0 :: Missing TLS Certificate Validation leading to RCE in DeskTime Time Tracking App

SEC Consult SA-20260427-0 :: Missing TLS Certificate Validation leading to RCE in DeskTime Time Tracking App

SEC Consult SA-20260423-0 :: DLL Hijacking in EfficientLab Controlio (cloud-based employee monitoring service)

SEC Consult SA-20260421-0 :: Broken Access Control in Config Endpoint in LiteLLM

SEC Consult SA-20260415-0 :: Exposed Private Key of X.509 Certificate in SAP HANA Cockpit & SAP HANA Database Explorer

APPLE-SA-04-22-2026-2 iOS 18.7.8 and iPadOS 18.7.8

APPLE-SA-04-22-2026-1 iOS 26.4.2 and iPadOS 26.4.2

Research: When Trusted Tools Become Attack Primitives

[KIS-2026-08] SocialEngine <= 7.8.0 (get-memberall) SQL Injection Vulnerability

[KIS-2026-07] SocialEngine <= 7.8.0 Blind Server-Side Request Forgery Vulnerability

Trojan-Spy.Win32.Small / Remote Command Execution

[IWCC 2026] CfP: 15th International Workshop on Cyber Crime - Link ping, Sweden, Aug 24-27, 2026

[SBA-ADV-20251120-01] CVE-2026-0972: GoAnywhere MFT Email HTML Injection

CyberDanube Security Research 20260408-1 | Multiple Vulnerabilities in Siemens SICAM A8000

Open Source Security

CVE-2026-25199: Apache CloudStack: Proxmox Extension Allows Unauthorized Cross-Tenant Instance Access

CVE-2026-25077: Apache CloudStack: Unauthenticated Command Injection in Direct Download Templates

CVE-2025-69233: Apache CloudStack: Domain/account resources limits not honored

CVE-2025-66467: Apache CloudStack: MinIO policy remains intact on bucket deletion

CVE-2025-66172: Apache CloudStack: Any user can attach a volume in their VMs from backups they should not have access to

CVE-2025-66171: Apache CloudStack: Any user can create a new VM from backups they should not have access to

CVE-2025-66170: Apache CloudStack: Any user can list backups that they should not have access to

Go 1.26.3 and Go 1.25.10 are released with 11 security fixes

Re: Re: Dirty Frag: Universal Linux LPE

Re: Re: Dirty Frag: Universal Linux LPE

CVE-2026-6659: Crypt::PasswdMD5 versions through 1.42 for Perl generates insecure random values for salts

BioPython 1.87 fixes CVE-2025-68463 (XXE, SSRF)

Re: Re: Dirty Frag: Universal Linux LPE

Re: CVE request: io_uring zcrx freelist OOB write

Re: Copy Fail 2 / Dirty Frag n-day from public commit, not embargo break








© Ethical Hacking News . All rights reserved.

Privacy | Terms of Use | Contact Us