cPanel and WHM have released emergency patches for three vulnerabilities that could allow attackers to compromise web hosting environments through authentication bypass and privilege escalation.
A wave of critical vulnerabilities, new malware families, and AI-driven attacks target Apache, Chrome, Firefox, Linux, Azure AD, Microsoft Teams,…
A wave of critical vulnerabilities and active attack campaigns demands immediate patching across Android, Apache, Chrome, Linux, and enterprise platforms.
Attackers are exploiting PAN-OS and Ivanti EPMM zero-days while a new Mirai botnet variant and PyPI malware campaigns escalate threats…
A roundup of the week's top cybersecurity news includes supply chain attacks on Google Android and DAEMON Tools, active exploitation…
North Korea's ScarCruft group uses a gaming platform to deploy BirdCall malware, while critical RCE flaws in Apache HTTP/2, MetInfo…
Apache HTTP Server, Microsoft Edge, and a new MicroStealer malware each pose distinct threats, from remote code execution to credential…
More than 1,600 phishing emails were flagged between early January and early February 2026 across industrial, consulting, retail, and transportation…
Researchers from Airbus SecLab discovered the authentication bypass and privilege escalation flaws in Progress MOVEit Automation, prompting urgent patches across…
The VENOMOUS#HELPER campaign uses phishing emails disguised as Social Security Administration statements to trick victims into installing legitimate remote access…
The threat actor also used a prior custom exploit chain involving SQL injection and CAPTCHA bypass against an Indonesian defense training portal before pivoting to cPanel attacks.
AI tools like ChatGPT and Claude Code enabled individuals with no coding background to conduct attacks previously requiring skilled engineers,…
Security researchers uncovered a supply chain attack where a fake TanStack npm package used automated postinstall scripts to harvest environment…
The flaw was introduced through three separate kernel changes made in 2011, 2015, and 2017, none of which appeared malicious…
The attacker exploited a malfunctioning endpoint sensor to maintain undetected access for ten days, stealing certificates used to sign Zhong Stealer malware.
Varonis researchers found that Bluekit's centralized dashboard captures session tokens and cookies after victims complete 2FA, rendering that security measure ineffective.
The Mini Shai-Hulud worm uses a Bun runtime bootstrap to silently harvest credentials from developer machines, cloud platforms, and AI coding tools before npm install completes.
A botched merge left critical Apache MINA deserialization fixes unpublished until project maintainers caught the error and reissued versions 2.2.7 and 2.1.12.
The international operation involved 276 arrests and the shutdown of nine scam centers, with human trafficking victims forced to run…
Attackers now use AI models to discover and exploit zero day vulnerabilities in minutes, with documented campaigns like GAMECHANGE showing…
Two critical MOVEit Automation vulnerabilities discovered by Airbus SecLab researchers allow unauthenticated attackers to bypass authentication and escalate privileges to…
The flaw allows attackers on the same local network to inject commands into the dhclient configuration file through unescaped double…
Security researchers warn that email bombing, which triggers panic, is the entry point for fake IT support calls that achieve…
CISA warns that CVE-2026-41940, an authentication bypass in cPanel and WHM, is being actively exploited, giving attackers full administrative control…

Sign in to your account