Ticker feed
Cybersecurity firm Xint has discovered a critical Linux kernel vulnerability, dubbed "Copy Fail" (CVE-2026-31431), hiding in plain sight since 2017. Using AI-assisted scanning, researcher Tim Becker found a logic flaw in the kernel's cryptography system that lets any unprivileged local user gain full root access — reliably, 100% of the time, with just 10 lines of exploit code.
The bug affects every Linux distribution and leaves zero disk traces, clearing itself on reboot. Real-world risks include Kubernetes container escapes and CI/CD pipeline compromises. A patch is already available. Older, unpatched systems predating 2017 are ironically unaffected.
Source: Dark Reading
Cybersecurity firm Xint has discovered a critical Linux kernel vulnerability, dubbed "Copy Fail" (CVE-2026-31431), hiding in plain sight since 2017. Using AI-assisted scanning, researcher Tim Becker found a logic flaw in the kernel's cryptography system that lets any unprivileged local user gain full root access — reliably, 100% of the time, with just 10 lines of exploit code.
The bug affects every Linux distribution and leaves zero disk traces, clearing itself on reboot. Real-world risks include Kubernetes container escapes and CI/CD pipeline compromises. A patch is already available. Older, unpatched systems predating 2017 are ironically unaffected.
Source: Dark Reading
An AI tool from cybersecurity firm Aisle found 38 previously unknown vulnerabilities in OpenEMR, an open-source electronic health record platform used by over 100,000 healthcare providers globally. Discovered in just three months, the flaws ranged from medium to critical severity and included SQL injection, cross-site scripting, and authorization bypass issues. The worst could have exposed patient health data and handed attackers full server control. All 38 are now patched in versions released in February and March 2025. For comparison, a manual audit in 2018 took far longer and found only 23 flaws. OpenEMR has since built Aisle's tool into its code review process.
Source: Dark Reading
An AI tool from cybersecurity firm Aisle found 38 previously unknown vulnerabilities in OpenEMR, an open-source electronic health record platform used by over 100,000 healthcare providers globally. Discovered in just three months, the flaws ranged from medium to critical severity and included SQL injection, cross-site scripting, and authorization bypass issues. The worst could have exposed patient health data and handed attackers full server control. All 38 are now patched in versions released in February and March 2025. For comparison, a manual audit in 2018 took far longer and found only 23 flaws. OpenEMR has since built Aisle's tool into its code review process.
Source: Dark Reading
What started as a corporate data breach has snowballed into a serious diplomatic rift. South Korean e-commerce giant Coupang disclosed in November that a former employee stole an internal security key, exposing data from 33.7 million users. Seoul launched a sweeping crackdown — police raids, tax audits, parliamentary hearings — but CEO Bom Kim refused to appear. Washington reportedly pushed back, signalling it would pause high-level defence talks unless Kim faced no legal consequences. The fallout has stalled nuclear submarine cooperation talks and drawn 54 Republican lawmakers to accuse Seoul of targeting a US company. Analysts warn the alliance is nearing a "critical threshold of strain."
Source: The Guardian
What started as a corporate data breach has snowballed into a serious diplomatic rift. South Korean e-commerce giant Coupang disclosed in November that a former employee stole an internal security key, exposing data from 33.7 million users. Seoul launched a sweeping crackdown — police raids, tax audits, parliamentary hearings — but CEO Bom Kim refused to appear. Washington reportedly pushed back, signalling it would pause high-level defence talks unless Kim faced no legal consequences. The fallout has stalled nuclear submarine cooperation talks and drawn 54 Republican lawmakers to accuse Seoul of targeting a US company. Analysts warn the alliance is nearing a "critical threshold of strain."
Source: The Guardian
Cybersecurity firm Checkmarx has confirmed that hackers stole data during a supply chain attack that began March 23, 2026. The breach, traced to the Trivy supply chain hack, allowed the TeamPCP group — potentially partnered with the Lapsus$ extortion gang — to hijack GitHub Actions and poison multiple open source packages. A second attack wave on April 22 compromised a DockerHub image and even the Bitwarden CLI NPM package. Lapsus$ later dumped a 96GB archive online, claiming it contained source code, employee data, and credentials. Checkmarx has since hired Mandiant, notified law enforcement, and says the breach is now fully contained.
Source: SecurityWeek
Cybersecurity firm Checkmarx has confirmed that hackers stole data during a supply chain attack that began March 23, 2026. The breach, traced to the Trivy supply chain hack, allowed the TeamPCP group — potentially partnered with the Lapsus$ extortion gang — to hijack GitHub Actions and poison multiple open source packages. A second attack wave on April 22 compromised a DockerHub image and even the Bitwarden CLI NPM package. Lapsus$ later dumped a 96GB archive online, claiming it contained source code, employee data, and credentials. Checkmarx has since hired Mandiant, notified law enforcement, and says the breach is now fully contained.
Source: SecurityWeek
A data breach at Booking.com is powering a surge in scams called "reservation hijacks," where criminals impersonate hotels to trick customers into sending money. Stolen data includes names, emails, phone numbers, and booking details — enough for fraudsters to craft convincing, targeted messages. Financial data wasn't accessed, but experts warn the personal details are highly valuable. Booking.com has reset reservation PINs and is emailing affected customers, but won't say how many people were hit. Norton's Luis Corrons warns the breach gives criminals dangerous precision. Customers should avoid sharing card details via email, phone, WhatsApp, or text.
Source: BBC News
A data breach at Booking.com is powering a surge in scams called "reservation hijacks," where criminals impersonate hotels to trick customers into sending money. Stolen data includes names, emails, phone numbers, and booking details — enough for fraudsters to craft convincing, targeted messages. Financial data wasn't accessed, but experts warn the personal details are highly valuable. Booking.com has reset reservation PINs and is emailing affected customers, but won't say how many people were hit. Norton's Luis Corrons warns the breach gives criminals dangerous precision. Customers should avoid sharing card details via email, phone, WhatsApp, or text.
Source: BBC News
Google's Threat Intelligence Group and Mandiant have exposed a new financially motivated hacker group called UNC6692, which blends social engineering, custom malware, and AWS S3 buckets to steal credentials.
The group starts by flooding a target's inbox with spam, then impersonates IT help desk staff over Microsoft Teams, tricking victims into clicking a phishing link that silently installs malware — including a rogue browser extension, a Python backdoor, and a persistent remote access tool.
From there, attackers scan internal networks, hijack admin accounts, and dump Windows credential stores. Using legitimate cloud infrastructure lets them slip past traditional security filters undetected.
Source: Dark Reading
Google's Threat Intelligence Group and Mandiant have exposed a new financially motivated hacker group called UNC6692, which blends social engineering, custom malware, and AWS S3 buckets to steal credentials.
The group starts by flooding a target's inbox with spam, then impersonates IT help desk staff over Microsoft Teams, tricking victims into clicking a phishing link that silently installs malware — including a rogue browser extension, a Python backdoor, and a persistent remote access tool.
From there, attackers scan internal networks, hijack admin accounts, and dump Windows credential stores. Using legitimate cloud infrastructure lets them slip past traditional security filters undetected.
Source: Dark Reading
Researchers at Nozomi Networks Labs have uncovered three vulnerabilities in CODESYS Control, a widely used industrial PLC platform, that attackers can chain together to replace legitimate control applications with backdoored versions — ultimately gaining full admin access.
The flaws affect water treatment plants, energy grids, and manufacturing lines. An attacker with valid credentials can steal cryptographic keys, tamper with the boot application, and achieve root execution on restart.
CODESYS has patched all three issues in Runtime version 4.21.0.0 and now enforces mandatory code signing by default. Admins should update immediately and tighten network segmentation.
Source: Cybersecurity News
Researchers at Nozomi Networks Labs have uncovered three vulnerabilities in CODESYS Control, a widely used industrial PLC platform, that attackers can chain together to replace legitimate control applications with backdoored versions — ultimately gaining full admin access.
The flaws affect water treatment plants, energy grids, and manufacturing lines. An attacker with valid credentials can steal cryptographic keys, tamper with the boot application, and achieve root execution on restart.
CODESYS has patched all three issues in Runtime version 4.21.0.0 and now enforces mandatory code signing by default. Admins should update immediately and tighten network segmentation.
Source: Cybersecurity News
A critical vulnerability in Microsoft's Entra Agent Identity Platform allowed attackers to hijack powerful service principals across an entire tenant. The Agent ID Administrator role — meant only for managing AI agent identities — had a scoping gap that let users assign themselves ownership of unrelated, high-privileged service principals, generate new credentials, and fully compromise environments. Discovered by Silverfort researchers, the flaw was patched by Microsoft across all cloud environments as of April 2026. Security teams should still audit audit logs for suspicious ownership or credential changes, and treat privileged service principals as critical infrastructure going forward.
Source: Cybersecurity News
A critical vulnerability in Microsoft's Entra Agent Identity Platform allowed attackers to hijack powerful service principals across an entire tenant. The Agent ID Administrator role — meant only for managing AI agent identities — had a scoping gap that let users assign themselves ownership of unrelated, high-privileged service principals, generate new credentials, and fully compromise environments. Discovered by Silverfort researchers, the flaw was patched by Microsoft across all cloud environments as of April 2026. Security teams should still audit audit logs for suspicious ownership or credential changes, and treat privileged service principals as critical infrastructure going forward.
Source: Cybersecurity News
What started as a corporate data breach has escalated into a full-blown diplomatic standoff. South Korean e-commerce giant Coupang disclosed in November that a former employee stole an internal security key, exposing data from 33.7 million users. Seoul responded aggressively — raiding headquarters, launching tax audits, and summoning executives. CEO Bom Kim refused to appear.
Now Washington is reportedly threatening to pause high-level defence talks, including nuclear submarine cooperation, unless South Korea backs off Kim. Fifty-four Republican lawmakers called Seoul's response a "whole-of-government assault." Coupang has spent over $11 million lobbying Washington since 2021. Analysts warn the alliance may be approaching a breaking point.
Source: The Guardian
What started as a corporate data breach has escalated into a full-blown diplomatic standoff. South Korean e-commerce giant Coupang disclosed in November that a former employee stole an internal security key, exposing data from 33.7 million users. Seoul responded aggressively — raiding headquarters, launching tax audits, and summoning executives. CEO Bom Kim refused to appear.
Now Washington is reportedly threatening to pause high-level defence talks, including nuclear submarine cooperation, unless South Korea backs off Kim. Fifty-four Republican lawmakers called Seoul's response a "whole-of-government assault." Coupang has spent over $11 million lobbying Washington since 2021. Analysts warn the alliance may be approaching a breaking point.
Source: The Guardian
Hackers compromised version 2026.4.0 of Bitwarden's CLI NPM package — downloaded over 250,000 times monthly — injecting malware that systematically steals credentials across AWS, Azure, GitHub, GCP, and more. The malicious code also hijacks victims' GitHub accounts to exfiltrate additional secrets, making stolen data potentially visible to anyone searching GitHub — not just the attackers. Bitwarden confirmed the breach but says no user vault data was exposed. The attack mirrors a recent hit on Checkmarx and shares code with the Shai-Hulud worm campaigns from 2024. Hacking group TeamPCP is suspected, though attribution remains complicated.
Source: SecurityWeek
Hackers compromised version 2026.4.0 of Bitwarden's CLI NPM package — downloaded over 250,000 times monthly — injecting malware that systematically steals credentials across AWS, Azure, GitHub, GCP, and more. The malicious code also hijacks victims' GitHub accounts to exfiltrate additional secrets, making stolen data potentially visible to anyone searching GitHub — not just the attackers. Bitwarden confirmed the breach but says no user vault data was exposed. The attack mirrors a recent hit on Checkmarx and shares code with the Shai-Hulud worm campaigns from 2024. Hacking group TeamPCP is suspected, though attribution remains complicated.
Source: SecurityWeek