Cybersecurity News

Stay informed about the latest cybersecurity incidents, vulnerabilities, and threat landscape changes. We cover data breaches, ransomware campaigns, critical CVEs, and regulatory updates – with context on what it means for you and how to protect yourself.

Exploited PAN-OS User-ID Portal RCE (CVE-2026-0300) Guidance

CyberSecureFox Editorial Team

Palo Alto Networks PAN-OS contains a critical vulnerability CVE-2026-0300 in the User-ID Authentication Portal service that is already being exploited ...

Hooded figure controlling a digital dark web from behind computer screens.

MetInfo CMS 7.9–8.1 under active attack via CVE-2026-29014 RCE

CyberSecureFox Editorial Team

The critical remote code execution vulnerability CVE-2026-29014 (CVSS 9.8) in MetInfo CMS versions 7.9, 8.0, and 8.1 is already being ...

Dark, surreal chess scene with puppet master controlling pieces and eerie figures.

How MuddyWater Uses Chaos Ransomware Branding for Espionage

CyberSecureFox Editorial Team

MuddyWater, an Iran-linked state-sponsored group, has begun conducting targeted espionage and sabotage operations under the banner of the Chaos ransomware ...

** Dual-themed illustration contrasting cyber threats and secure coding practices.

Inside PCPJack: Cloud Credential Theft Targeting Open Services

CyberSecureFox Editorial Team

PCPJack is a new credential theft framework targeting exposed cloud services (Docker, Kubernetes, Redis, MongoDB, RayML, vulnerable web applications). It ...

A hooded figure holds a key toward a giant cracked penguin symbol amidst dark shadows.

How Dirty Frag Breaks Linux Kernel Security for Local Attackers

CyberSecureFox Editorial Team

Dirty Frag is a new, currently unpatched local privilege escalation vulnerability in the Linux kernel that allows any local user ...

Android figure surrounded by digital security elements, with people holding phones.

How Google’s Binary Transparency Changes Android Trust

CyberSecureFox Editorial Team

Google has announced the extension of its Binary Transparency mechanism to the Android ecosystem, introducing a public cryptographic log of ...

ZiChatBot malware hides in PyPI packages, abusing Zulip C2

CyberSecureFox Editorial Team

Three packages have been discovered on Python Package Index (PyPI) that, in addition to their advertised functionality, silently deliver the ...

Futuristic cyber security command center with detailed threat analysis displayed.

Targeted and Mass Attacks Using cPanel CVE-2026-41940

CyberSecureFox Editorial Team

The critical CVE-2026-41940 vulnerability in cPanel/WHM is already being used not only by mass botnets and ransomware operators, but also ...

Aerial view of a river separating North Korea and Russia, with urban landscapes.

ScarCruft targets sqgame[.]net users with BirdCall spyware

CyberSecureFox Editorial Team

The North Korea–linked group ScarCruft carried out a targeted supply-chain attack against the gaming platform sqgame[.]net, popular among ethnic Koreans ...

Hacker at a desk with screens showing cybersecurity threats and San Francisco skyline.

How a Multi‑Stage AiTM Phishing Campaign Bypasses MFA and Targets 35,000 Users

CyberSecureFox Editorial Team

In mid‑April 2026, a multi‑stage phishing campaign was identified that targeted more than 35,000 users across 13,000 organizations. It used ...

123192 Next