Visualização normal

Ontem — 8 de Maio de 2026Stream principal
  • ✇cybersecurity
  • New “Dirty Frag” Linux Kernel Vulnerability Could Lead to Root Escalation /u/raptorhunter22
    Researchers disclosed “Dirty Frag,” a Linux kernel vulnerability involving page-cache corruption in the decryption fast path that may allow local privilege escalation to root. The bug is drawing comparisons to past kernel flaws like Dirty Pipe because of its potential impact on multi-user and containerized environments. Technical analysis, affected systems, and mitigation details: https://thecybersecguru.com/news/dirty-frag-linux-kernel-root-vulnerability/ submitted by /u/raptorhunter22
     

New “Dirty Frag” Linux Kernel Vulnerability Could Lead to Root Escalation

8 de Maio de 2026, 01:26

Researchers disclosed “Dirty Frag,” a Linux kernel vulnerability involving page-cache corruption in the decryption fast path that may allow local privilege escalation to root.

The bug is drawing comparisons to past kernel flaws like Dirty Pipe because of its potential impact on multi-user and containerized environments.

Technical analysis, affected systems, and mitigation details: https://thecybersecguru.com/news/dirty-frag-linux-kernel-root-vulnerability/

submitted by /u/raptorhunter22
[link] [comments]
Antes de ontemStream principal

Critical Apache HTTP Server RCE (CVE-2026-23918) - Millions of Servers Potentially Exposed. Patches released

5 de Maio de 2026, 06:06

A critical RCE vulnerability (CVE-2026-23918) has been found in Apache HTTP Server ≤2.4.66, caused by a double-free bug in HTTP/2 handling. It’s rated CVSS 8.8 and could allow remote code execution on vulnerable servers. Apache has fixed it in 2.4.67, but given how widely Apache is deployed, this has a significant impact if left unpatched. If you’re running HTTP/2, update immediately to version 2.4.67.

Read more: https://thecybersecguru.com/news/apache-rce-vulnerability-cve-2026-23918/

submitted by /u/raptorhunter22
[link] [comments]
  • ✇cybersecurity
  • Alleged NVIDIA GeForce NOW Data Breach Claimed by ShinyHunters /u/raptorhunter22
    ShinyHunters is allegedly claiming a breach involving NVIDIA GeForce NOW user data, with exposed records reportedly including verified emails, usernames, DOBs, membership details, and 2FA/TOTP-related metadata on a popular dark-web forum. NVIDIA has not confirmed the breach at the time of writing, so this should be treated as an alleged incident until verified. Still, the reported data types could be useful for phishing, credential stuffing, and targeted account takeover attempts. submi
     

Alleged NVIDIA GeForce NOW Data Breach Claimed by ShinyHunters

2 de Maio de 2026, 10:40
Alleged NVIDIA GeForce NOW Data Breach Claimed by ShinyHunters

ShinyHunters is allegedly claiming a breach involving NVIDIA GeForce NOW user data, with exposed records reportedly including verified emails, usernames, DOBs, membership details, and 2FA/TOTP-related metadata on a popular dark-web forum. NVIDIA has not confirmed the breach at the time of writing, so this should be treated as an alleged incident until verified. Still, the reported data types could be useful for phishing, credential stuffing, and targeted account takeover attempts.

submitted by /u/raptorhunter22
[link] [comments]

CVE-2026-41940 cPanel/WHM Auth Bypass PoC Reportedly Circulating on Dark Web. cPanelSniper Raises Mass-Exploitation Concerns

2 de Maio de 2026, 09:18
CVE-2026-41940 cPanel/WHM Auth Bypass PoC Reportedly Circulating on Dark Web. cPanelSniper Raises Mass-Exploitation Concerns

A critical cPanel/WHM authentication bypass, CVE-2026-41940, is now drawing serious attention after reports that PoC details are circulating in dark-web forums.

The bigger concern is cPanelSniper, a weaponized tool/framework reportedly built around this flaw that could make scanning and exploitation much easier at scale, is available on GitHub.

submitted by /u/raptorhunter22
[link] [comments]

313 Team claims DDoS/extortion attack on Canonical, disrupting Ubuntu services and security update infrastructure

1 de Maio de 2026, 01:47
313 Team claims DDoS/extortion attack on Canonical, disrupting Ubuntu services and security update infrastructure

A report says Canonical/Ubuntu services were disrupted in a massive DDoS attack attributed to Islamic Cyber Resistance in Iraq - 313 Team, with Ubuntu.com reportedly returning 503 errors and possible impact to security/CVE-related services.

submitted by /u/raptorhunter22
[link] [comments]

Polymarket breach claim: xorcat alleges data leak affecting 300,000+ users

28 de Abril de 2026, 14:35
Polymarket breach claim: xorcat alleges data leak affecting 300,000+ users

Threat actor xorcat claims to have breached Polymarket, alleging a data leak impacting 300,000+ users. Details remain limited and unverified as itsa fresh post on a darknweb forum, but if accurate, it underscores ongoing risks around crypto platforms and their integrations being targeted for large-scale data exposure

submitted by /u/raptorhunter22
[link] [comments]
  • ✇cybersecurity
  • RansomHouse claims breach of a popular Cybersecurity Vendor, possibly Barracuda Networks /u/raptorhunter22
    RansomHouse has added an unnamed but hugely popular cybersecurity vendor with over 1 billion dollars in revenue (Possibly, Barracuda Networks) to its leak site, claiming a compromise involving internal data. No independent verification yet, but incidents like this underline how threat actors are increasingly going after high-value infrastructure and security providers rather than individual endpoints. If confirmed, the potential ripple effect across customers could be significant. Comment
     

RansomHouse claims breach of a popular Cybersecurity Vendor, possibly Barracuda Networks

28 de Abril de 2026, 06:36
RansomHouse claims breach of a popular Cybersecurity Vendor, possibly Barracuda Networks

RansomHouse has added an unnamed but hugely popular cybersecurity vendor with over 1 billion dollars in revenue (Possibly, Barracuda Networks) to its leak site, claiming a compromise involving internal data. No independent verification yet, but incidents like this underline how threat actors are increasingly going after high-value infrastructure and security providers rather than individual endpoints. If confirmed, the potential ripple effect across customers could be significant. Comment from them awaited.

submitted by /u/raptorhunter22
[link] [comments]
  • ✇cybersecurity
  • Supply Chain Attack: GitHub Actions compromise led to malicious PyPI release of elementary-data /u/raptorhunter22
    A recent incident shows how CI/CD pipelines are increasingly becoming a target in supply chain attacks. The elementary-data package on PyPI was compromised after an attacker exploited a GitHub Actions vulnerability to push a forged release without modifying the source code. The malicious version embedded a .pth file that executes automatically whenever Python starts, enabling silent code execution in any affected environment. Users who installed the compromised version or relied on unpinne
     

Supply Chain Attack: GitHub Actions compromise led to malicious PyPI release of elementary-data

28 de Abril de 2026, 01:40
Supply Chain Attack: GitHub Actions compromise led to malicious PyPI release of elementary-data

A recent incident shows how CI/CD pipelines are increasingly becoming a target in supply chain attacks. The elementary-data package on PyPI was compromised after an attacker exploited a GitHub Actions vulnerability to push a forged release without modifying the source code. The malicious version embedded a .pth file that executes automatically whenever Python starts, enabling silent code execution in any affected environment. Users who installed the compromised version or relied on unpinned dependencies (including Docker latest tags) were exposed

submitted by /u/raptorhunter22
[link] [comments]

A threat actor who goes by the name "Mr. Raccoon" has claimed to hack Adobe support via 3rd party Indian BPO firm

A massive data breach (allegedly) has occurred at Adobe. Carried out by a threat actor calling themselves "Mr. Raccoon", the claims are that over 13M support ticket details have been leaked along with details of over 15,000 employees. Additionally, they have access to their microsoft SharePoint instance and also to make matters worse, Adobe's HackerOne account. Adobe is yet to comment on this matter.

submitted by /u/raptorhunter22
[link] [comments]

Cisco source code stolen by ShinyHunters via Trivy supply-chain attack. AWS keys breached, 300+ repos cloned and more

Cisco reportedly suffered a breach of its internal development environment after attackers leveraged credentials stolen during the recent Trivy supply-chain compromise. More details linked with sample data

submitted by /u/raptorhunter22
[link] [comments]

Axios npm package compromised in supply chain attack. Downloads malware dropper package

Axios is one of the most used npm packages which just got hit by a supply chain attack. Malicious versions of Axios (1.14.1 and 0.30.4) hit the npm registry yesterday. They carry a malware dropper called plain-crypto-js@4.2.1. If you ran npm install in the last 24 hours, check your lockfile. Roll back to 1.14.0 and rotate every credential that was in your environment. Currently, as of now, npmjs has removed the compromised versions of axios package along with the malicious plain crypto js package. Live updates + info linked.

submitted by /u/raptorhunter22
[link] [comments]

Telnyx package on PyPI compromised by TeamPCP. WAV steganography used for payload delivery

Malicious versions of the telnyx Python SDK (4.87.1, 4.87.2) were uploaded to PyPI. Code executes directly on import. It works cross-platform.

Delivery method is the interesting part. The package fetches a .wav file from C2, reads frame data, base64-decodes it, then XORs using the first few bytes as key to reconstruct the payload. File is valid audio, so it blends in and its pretty hard to detect by traditional methods.

Windows path drops msbuild.exe into Startup for persistence.

Linux/macOS path uses a staged Python loader → fetch WAV → extract second stage → execute via stdin → AES encrypt + exfil.

C2: 83.142.209.203:8080

Endpoints: /hangup.wav, /ringtone.wav

If you pulled those versions: downgrade, rotate secrets, and check for outbound traffic to that IP.

submitted by /u/raptorhunter22
[link] [comments]

China-linked Red Menshen using BPFdoor kernel backdoor in telecom networks

Backdoor operates at the kernel level using BPF to passively inspect traffic and trigger on crafted packets, avoiding exposed ports or typical C2 indicators.

Tradecraft enables long-term persistence and covert access inside core network infrastructure, with very limited visibility from standard monitoring.

Interesting case of network-layer backdoor design rather than traditional userland implants.

submitted by /u/raptorhunter22
[link] [comments]

Navia breach exposed HackerOne employee PII due to a BOLA-style access in third-party system

Breach occurred at Navia Benefit Solutions, a 3rd party, not HackerOne infra.

Around 287 HackerOne employees PII leaked.

Navia delayed breach notifications by weeks. Filed at Maine AG.

Navia was independently breached. Over 10K US employee's PII exposed.

Reports point to an auth flaw (BOLA-type) enabling access to employee PII (SSNs, DoB, addresses, benefits data).

Exposure window: Dec 2025 to Jan 2026.

submitted by /u/raptorhunter22
[link] [comments]

LiteLLM supply chain compromise - a complete analysis

Analysis of the LiteLLM incident: stolen CI tokens → malicious PyPI releases → credential exfiltration from runtime environments.

With focus on trust boundaries in CI/CD and secret exposure.

submitted by /u/raptorhunter22
[link] [comments]

Alleged OVHcloud data of 1.6M customers and 5.9M websites posted on popular forum for sale. CEO Comments

There are reports of OVHcloud-related data being posted on a forum for sale. No official confirmation so far from OVHCloud. Given OVH’s scale, potential impact could be significant depending on scope, especially in Europe

UPDATE: OVHcloud CEO, Octave Klaba has commented that the sample dataset was not found in their system.

submitted by /u/raptorhunter22
[link] [comments]
❌
❌