Cybersecurity News
Stay informed about the latest cybersecurity incidents, vulnerabilities, and threat landscape changes. We cover data breaches, ransomware campaigns, critical CVEs, and regulatory updates – with context on what it means for you and how to protect yourself.
How alleged cPanel CVE-2026-41940 is exploited for backdoors
A critical vulnerability in cPanel and WebHost Manager (WHM), tracked as CVE-2026-41940, is, according to researchers from QiAnXin XLab, being ...
Typosquatted Hugging Face Repository Used in AI Supply Chain Attack
The malicious Open-OSS/privacy-filter repository on the Hugging Face platform, masquerading as the legitimate OpenAI Privacy Filter model, was used to ...
How the Mini Shai-Hulud Worm Compromised npm and PyPI Supply Chains
Mini Shai-Hulud, linked to the TeamPCP group, has become one of the most dangerous worms in the npm and PyPI ...
TrickMo C turns infected Androids into TON-based proxy nodes
Researchers at ThreatFabric have identified a new variant of the Android trojan TrickMo, which uses the decentralized network The Open ...
RubyGems blocks new registrations after suspected malware campaign
RubyGems — the standard package manager for the Ruby programming language — has temporarily blocked new account registration after an ...
Critical GnuTLS Use-After-Free Vulnerability in Exim (CVE-2026-45185)
The Exim project has released an emergency security update that fixes the CVE-2026-45185 use-after-free vulnerability, which leads to heap corruption ...
GemStuffer campaign turns RubyGems into free data infrastructure
Researchers at Socket discovered a campaign called GemStuffer, in which more than 150 packages were uploaded to the RubyGems repository ...
How Microsoft’s May 2026 Patch Tuesday Impacts Windows, Azure and AD
Microsoft in the May Patch Tuesday 2026 closed 138 vulnerabilities in Windows and cloud services, including critical flaws in Windows ...
Inside QLNX: a stealthy Linux implant stealing developer secrets
Trend Micro researchers have described a previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX), which, according to their findings, ...
How Low-Priority Alerts and EDR ‘Mitigations’ Hide Real Threats
A study covering more than 25 million security alerts in real corporate environments revealed a structural issue: almost 1% of ...