Aggregator
GitLab security advisory (AV26-406)
ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories
New Linux ‘Copy Fail’ flaw gives hackers root on major distros
Jenkins Patches High-Severity Plugin Flaws Including Path Traversal and Stored XSS
Jenkins project published a security advisory detailing patches for seven plugin vulnerabilities, including high-severity path traversal and Stored Cross-Site Scripting (XSS) flaws. Administrators must urgently update these plugins to secure their Continuous Integration and Continuous Deployment (CI/CD) pipelines against potential remote code execution and session hijacking risks. The most critical issue is a path traversal […]
The post Jenkins Patches High-Severity Plugin Flaws Including Path Traversal and Stored XSS appeared first on Cyber Security News.
Oracle Red Bull Racing Team Revs Up Automation to Boost Security
cPanel zero-day exploited for months before patch release (CVE-2026-41940)
A critical authentication bypass vulnerability (CVE-2026-41940) in cPanel, a popular web-based control panel for managing web hosting accounts, is being exploited by attackers in the wild. What’s more, attackers didn’t have to wait for watchTowr security researchers to release technical details about the vulnerability – they have been spotted exploiting CVE-2026-41940 since February 23, and have likely been abusing it even earlier. About CVE-2026-41940 CPanel, typically provided by shared hosting companies, is one of the … More →
The post cPanel zero-day exploited for months before patch release (CVE-2026-41940) appeared first on Help Net Security.
Угон авто без взлома двери. Как работает хитрая подмена координат и почему обычные глушилки ворам больше не нужны
UK: Education Sector Faces Surge in Cyber Breaches Despite Stable National Threat Levels
最新通杀全线Linux发行版的CVE漏洞解析
Эра дизеля кончается. Водородный двигатель показал КПД 60% — при той же мощности и без выхлопа
Cisco releases open-source toolkit for verifying AI model lineage
Enterprises pulling models from Hugging Face and other open repositories rarely keep records of how those models are altered after download, leaving organizations with little ability to confirm what they are running in production. The State of AI Security 2026 from Cisco places this level of access inside a growing pattern of AI-driven operations that connect directly to core business systems, and identifies AI supply chain exposure as a recurring risk. Cisco has published the … More →
The post Cisco releases open-source toolkit for verifying AI model lineage appeared first on Help Net Security.
Agents can now create Cloudflare accounts, buy domains, and deploy
Securing the AI Ecosystem Begins at the Model Layer
New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials
100000 долларов за кроссовки. Рассказываем, что может пойти не так, если доверить покупки искусственному интеллекту
Met Police face criticism for using AI to spy on their own officers
London police officers have been warned by the Metropolitan Police Federation to watch their backs after the force deployed controversial AI software to investigate misconduct. The staff association, representing more than 30,000 officers in London, reported it had not been informed of plans to use Palantir’s AI to analyze officers’ movements. The Federation notified all colleagues and advised them to exercise “extreme caution when carrying Metropolitan Police-issued devices while off duty”. It believes the use … More →
The post Met Police face criticism for using AI to spy on their own officers appeared first on Help Net Security.
Ваша дача могла быть на дне моря 200 миллионов лет назад. Учёные создали машину времени для любой точки Земли
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2026-41940 WebPros cPanel & WHM and WP2 (WordPress Squared) Missing Authentication for Critical Function Vulnerability
This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.