Cybersecurity News
Stay informed about the latest cybersecurity incidents, vulnerabilities, and threat landscape changes. We cover data breaches, ransomware campaigns, critical CVEs, and regulatory updates – with context on what it means for you and how to protect yourself.
Security updates for cPanel, WHM and WP Squared: three CVEs
cPanel has released security updates for cPanel and Web Host Manager (WHM), addressing three vulnerabilities: arbitrary file read, arbitrary Perl ...
How CallPhantom and GoldFactory Exploit Trust in Mobile Apps
28 fraudulent applications under the collective codename CallPhantom managed to gain more than 7.3 million installs in Google Play, promising ...
How Bleeding Llama and Ollama Windows Auto-Update Lead to Critical RCE
Ollama, one of the most popular platforms for running LLM models locally, has faced two classes of critical issues at ...
Exploited PAN-OS User-ID Portal RCE (CVE-2026-0300) Guidance
Palo Alto Networks PAN-OS contains a critical vulnerability CVE-2026-0300 in the User-ID Authentication Portal service that is already being exploited ...
MetInfo CMS 7.9–8.1 under active attack via CVE-2026-29014 RCE
The critical remote code execution vulnerability CVE-2026-29014 (CVSS 9.8) in MetInfo CMS versions 7.9, 8.0, and 8.1 is already being ...
Inside PCPJack: Cloud Credential Theft Targeting Open Services
PCPJack is a new credential theft framework targeting exposed cloud services (Docker, Kubernetes, Redis, MongoDB, RayML, vulnerable web applications). It ...
How Dirty Frag Breaks Linux Kernel Security for Local Attackers
Dirty Frag is a new, currently unpatched local privilege escalation vulnerability in the Linux kernel that allows any local user ...
How Google’s Binary Transparency Changes Android Trust
Google has announced the extension of its Binary Transparency mechanism to the Android ecosystem, introducing a public cryptographic log of ...
ZiChatBot malware hides in PyPI packages, abusing Zulip C2
Three packages have been discovered on Python Package Index (PyPI) that, in addition to their advertised functionality, silently deliver the ...