<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Cyber Kendra</title><description>Tech Hub</description><managingEditor>noreply@blogger.com (Root)</managingEditor><pubDate>Thu, 7 May 2026 09:47:18 +0530</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">3439</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>https://www.cyberkendra.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>All the content is copyright of cyberkendra.com</copyright><itunes:image href="http://2.bp.blogspot.com/-svYWW7Cp8JI/UDUgofD9kUI/AAAAAAAAAEY/ina7VZi4ZRg/s1600/webprotal.png"/><itunes:keywords>Computer,technology,tech,IT,security,Gadgets,Telecom</itunes:keywords><itunes:summary>All about Computer and technology. </itunes:summary><itunes:subtitle>Cyber kendra</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:author>Vivek Gurung</itunes:author><itunes:owner><itunes:email>protalweb@gmail.com</itunes:email><itunes:name>Vivek Gurung</itunes:name></itunes:owner><item><title>Ubuntu's X Account Appears Hijacked to Push Fake "Numbat" Solana AI Agent Crypto Scam</title><link>https://www.cyberkendra.com/2026/05/ubuntus-x-account-appears-hijacked-to.html</link><category>Security</category><category>Ubuntu</category><pubDate>Thu, 7 May 2026 09:47:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-5274602995651435962</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Fake Ubuntu AI website" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHrmjyAFOYInO9UELDxgndgAAqSSBW4NCfUa8TIdJiZ3HMVB1p0j1MkVpc9-TOQWvEN8G3h94_vfz2Mgt0tbDmtIFBUn1M6SfLYlfO0_821th7PgWu-QXPtcyWMcqz8p1TecrV8zD4AwGKQJ3iB21TCqU_d-h4AzXBKYdHyAqiDACe77CNLbv_z2GbH5M/s16000/ubuntu-ai-fake.webp" title="Fake Ubuntu AI website" /&gt;&lt;/div&gt;&lt;p&gt;Ubuntu users and open-source enthusiasts should be on high alert: a sophisticated impersonation campaign is exploiting Ubuntu's branding — and possibly its official X (formerly Twitter) account — to lure victims into a crypto airdrop scam tied to a fake AI agent called "Numbat."&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The fraudulent campaign surfaced today, May 7, through a thread posted from @ubuntu on X, announcing "Numbat" as "Ubuntu's newest AI agent built on Solana" and directing followers to ai-ubuntu.com.&amp;nbsp;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Fake Ubuntu AI X Post" border="0" data-original-height="735" data-original-width="741" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsGFDnruX5GFAFNSsjGMIuvWn8phvPNr07Hto4RwR4HbskrRWVbcT0eR5DihAYUJk7BWduKvSwOuQ6sRIBPNApbamYuCEBR5ZIV9huWc0GbL3L3UF9dvXT8RmAPs2AWVgxDMhWypVJVEM_jdNZ0VCbC2Sd7uGm_5EhfP0pLaa1jEJUpuiRioiFh-vTLF4/s16000/ubuntu-ai-tweet.webp" title="Fake Ubuntu AI X Post" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The thread even carries the hallmark self-awareness of a compromised account: the final tweet states comments were disabled "due to suspicious links and impersonation attempts" — while the thread itself is the suspicious impersonation.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Scam Unpacked&lt;/h3&gt;&lt;p&gt;The ai-ubuntu.com website is a carefully assembled forgery. It lifts real Ubuntu AI documentation wholesale — references to Charmed Kubeflow, Canonical's NVIDIA partnership, MLOps workflows, and Canonical's actual open-source AI tools — and wraps them around fake crypto incentives.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Buried in the legitimately sourced content is the scam's actual payload: a "$UM token" airdrop promising "future allocations" to early ecosystem participants, with an ominous "Snapshot approaching" countdown designed to manufacture urgency.&lt;/p&gt;&lt;p&gt;This technique — blending genuine technical content with fraudulent incentive structures — is increasingly common in brand impersonation attacks targeting developer and open-source communities, where technical credibility lowers victims' guard.&lt;/p&gt;&lt;p&gt;Cyber Kendra checked the &lt;a href="https://smalltools.in/whois-checker" target="_blank"&gt;WHOIS record&lt;/a&gt;&amp;nbsp;for the domain and found that it was registered on May 06, 2026 (a day before), with the Registrar: NICENIC INTERNATIONAL GROUP CO., LIMITED.&lt;/p&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img border="0" data-original-height="893" data-original-width="781" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghmOIwDNwb4r84T00ZstXDGvMCdv_DHBHtAeiB6fwf0fenTRlI6dYbMvBYi2Ry6TlAA-9fgdOjw4qjp4Ij733CI0NAqnkqd64oSaDmfnh1qxJTvqdB1TBGpQ7JAprxttdnkJneyWt-IbU4kC-4t8kpuVi6hcofW9UnS7ejKlaXwzsGvunJpUg24gt4kqc/s16000/website-whois.png" style="margin-left: auto; margin-right: auto;" /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Whois records&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What This Looks Like in Practice&lt;/h3&gt;&lt;p&gt;Whether the @ubuntu account was directly compromised or the X profile was spoofed, the attack follows a well-worn playbook: impersonate a trusted tech brand, invoke AI and blockchain buzzwords to signal legitimacy, dangle token rewards for early participants, then harvest wallet connections or personal data through the "eligibility check" flow on the fraudulent site.&lt;/p&gt;&lt;p&gt;The second document — appearing to mirror ai-ubuntu.com's landing page — reinforces the con by using real Ubuntu workstation imagery, authentic tool logos (TensorFlow, PyTorch, Jupyter, Kafka), and real Canonical partner branding to pass visual inspection.&lt;/p&gt;&lt;p&gt;Scammers simply copied the &lt;a href="https://ubuntu.com/ai" rel="nofollow" target="_blank"&gt;official Ubuntu AI page&lt;/a&gt;&amp;nbsp;and added&amp;nbsp;altered text. [Check Image for difference]&lt;/p&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img border="0" data-original-height="961" data-original-width="1887" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4pkKeU4wcNfOPT5wDuGLs5YUGgL7O6eySGZ5gc-ecEh4PUcHT7JZO4pZuBec7OacBMIBk0GT1dn1OYQhnsx_KFxUaXpG_9mJ4q6RMphG30QaEKppTkGS-SOLsyBKadp5lQG_cESQ_xeJd-DnWkTxdYx00o6-P_4UR5xKWsODzfnDmMBrvHVLz2B0m_EM/s16000/fake-ubuntu-ai.png.webp" style="margin-left: auto; margin-right: auto;" /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Fake Ubuntu AI webpage&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img border="0" data-original-height="962" data-original-width="1897" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihyU8kY2FoslXCmTC6cgdoZRJvoMd0iWiCYWODptbJnHCyOjMaywtcCUrzLCSZEzlrSfQ3q3ZWkmeHJMYjWzoGBL7RV9c8j3MdP7pGEFF_xaS6Vfch3Qf7vnXrARkDlznuB_Wy5qVRL1IIruZ2vVfQ3rOwfZ9Eqw-ZQT1Z6NdUi-s8GLjkikg9z5tFsWo/s16000/official-ubuntu-ai.png.webp" style="margin-left: auto; margin-right: auto;" /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Official Ubuntu AI webpage&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;h3 style="text-align: left;"&gt;What You Should Do&lt;/h3&gt;&lt;p&gt;Do not visit ai-ubuntu.com or connect any wallet to the site. Do not click links from the @ubuntu X thread. Verify any Ubuntu AI announcements exclusively through ubuntu.com and canonical.com. If you've already interacted with the site, revoke any wallet permissions immediately and monitor connected accounts for unauthorised activity.&lt;/p&gt;&lt;p&gt;Canonical has not issued a public statement at the time of writing. Cyber Kendra has reached out for comment.&lt;/p&gt;&lt;p&gt;The incident is a sharp reminder that even trusted open-source brand accounts are prime targets — and that crypto airdrop language should always trigger immediate scepticism, regardless of how official the surrounding content looks.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHrmjyAFOYInO9UELDxgndgAAqSSBW4NCfUa8TIdJiZ3HMVB1p0j1MkVpc9-TOQWvEN8G3h94_vfz2Mgt0tbDmtIFBUn1M6SfLYlfO0_821th7PgWu-QXPtcyWMcqz8p1TecrV8zD4AwGKQJ3iB21TCqU_d-h4AzXBKYdHyAqiDACe77CNLbv_z2GbH5M/s72-c/ubuntu-ai-fake.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Why Ignoring IT Support Can Cost Your Business More</title><link>https://www.cyberkendra.com/2026/05/why-ignoring-it-support-can-cost-your.html</link><category>Learn</category><category>Tips</category><pubDate>Thu, 7 May 2026 07:41:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-1454357472960470063</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Importance of IT Support" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPjgXASl0_gSkYiIDgoDnPtkV1Z2jqZ43dxRfV1lZ8XBnfvTTASd0wkuaL1ZiC2TgPLqPm9fOb7acwsj6q-opb6PLO4fy6MBqOH65gsce0ICguLEyhWI6Vn0-FzrC98TDRH1Cq4UpQyC3AcisuIirZFLVcKRHil5T5ONjeeoWNR_gSsGQgdFkN98rkYlI/s16000/it-support.webp" title="Importance of IT Support" /&gt;&lt;/div&gt;&lt;p&gt;At first glance, skipping proper IT support is a way to save money. After all, if everything appears to be working, why invest in something that feels unnecessary? Well… that is where many businesses get caught off guard.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Technology rarely fails all at once. Instead, problems build quietly in the background – slower systems, missed updates, small glitches. Over time, these issues turn into costly disruptions. Businesses that delay proper IT support often end up paying far more than they expected.&lt;/p&gt;&lt;p&gt;That is why experienced providers such as &lt;a href="https://www.serenoit.co.uk/" target="_blank"&gt;Sereno IT Support&lt;/a&gt; emphasize proactive care rather than reactive fixes. In this article, we will explore the hidden costs of neglecting IT support and why investing in it is essential for long-term success.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Does “Neglecting IT Support” Really Mean?&lt;/h3&gt;&lt;p&gt;Neglecting IT support does not always mean ignoring technology completely. More often, it involves:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Delaying system updates&lt;/li&gt;&lt;li&gt;Ignoring minor technical issues&lt;/li&gt;&lt;li&gt;Using outdated software or hardware&lt;/li&gt;&lt;li&gt;Lacking proper security measures&lt;/li&gt;&lt;li&gt;Having no dedicated IT support strategy&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;These decisions may seem harmless at first, but they can lead to serious consequences over time.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Increased Downtime and Business Interruptions&lt;/h3&gt;&lt;p&gt;One of the most immediate costs of poor IT support is downtime.&lt;/p&gt;&lt;p&gt;When systems fail, employees cannot access files, send emails, or complete tasks. Even a short interruption can disrupt operations.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;The real impact&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Lost working hours&lt;/li&gt;&lt;li&gt;Missed deadlines&lt;/li&gt;&lt;li&gt;Delayed customer responses&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Over time, these interruptions add up and affect overall business performance.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Reduced Employee Productivity&lt;/h3&gt;&lt;p&gt;Slow systems and frequent technical issues can frustrate employees.&lt;/p&gt;&lt;p&gt;Instead of focusing on their tasks, they may spend time:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Restarting systems&lt;/li&gt;&lt;li&gt;Troubleshooting problems&lt;/li&gt;&lt;li&gt;Waiting for the software to respond&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Productivity loss example&lt;/h4&gt;&lt;p&gt;Even losing 15–20 minutes per day per employee can result in significant losses over the course of a year.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Higher Long-Term Repair Costs&lt;/h3&gt;&lt;p&gt;Ignoring small issues often leads to bigger problems.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;What starts small can grow&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;A minor software glitch becomes a system failure&lt;/li&gt;&lt;li&gt;Outdated hardware breaks down completely&lt;/li&gt;&lt;li&gt;Unpatched systems become vulnerable&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Fixing major issues is usually far more expensive than regularly maintaining systems.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Cybersecurity Risks and Data Breaches&lt;/h3&gt;&lt;p&gt;One of the most serious hidden costs is poor cybersecurity.&lt;/p&gt;&lt;p&gt;Without proper IT support, businesses may:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Miss important security updates&lt;/li&gt;&lt;li&gt;Use weak passwords&lt;/li&gt;&lt;li&gt;Lack of monitoring systems&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Consequences&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Data breaches&lt;/li&gt;&lt;li&gt;Financial losses&lt;/li&gt;&lt;li&gt;Damage to reputation&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Cyber incidents can take months – or even years – to recover from.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Loss of Valuable Data&lt;/h3&gt;&lt;p&gt;Data is one of the most important assets a business has.&lt;/p&gt;&lt;p&gt;Without proper backup systems, data can be lost due to:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Hardware failure&lt;/li&gt;&lt;li&gt;Human error&lt;/li&gt;&lt;li&gt;Cyber attacks&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Recovering lost data is often difficult, expensive, or even impossible.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Damage to Business Reputation&lt;/h3&gt;&lt;p&gt;Customers expect reliable service. When systems fail or data is compromised, trust can be affected.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Examples&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Delayed responses to clients&lt;/li&gt;&lt;li&gt;Lost customer information&lt;/li&gt;&lt;li&gt;Service interruptions&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Rebuilding trust takes time and effort.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Inefficient Business Processes&lt;/h3&gt;&lt;p&gt;Outdated or poorly maintained systems can slow down workflows.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Common issues&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Manual processes instead of automation&lt;/li&gt;&lt;li&gt;Poor integration between systems&lt;/li&gt;&lt;li&gt;Difficulty accessing information&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;These inefficiencies reduce overall productivity and increase operational costs.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Lack of Scalability&lt;/h3&gt;&lt;p&gt;Businesses grow – and their technology needs grow too.&lt;/p&gt;&lt;p&gt;Without proper IT support, systems may struggle to handle increased demand.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Result&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Slow performance&lt;/li&gt;&lt;li&gt;System crashes&lt;/li&gt;&lt;li&gt;Limited ability to expand&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Neglecting IT support can limit business growth.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Compliance and Legal Risks&lt;/h3&gt;&lt;p&gt;Many industries have strict regulations regarding data protection and security.&lt;/p&gt;&lt;p&gt;Without proper IT management, businesses may fail to meet these requirements.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Possible consequences&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Legal penalties&lt;/li&gt;&lt;li&gt;Fines&lt;/li&gt;&lt;li&gt;Loss of certifications&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Compliance is not optional – it is essential.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Summary of Hidden Costs&lt;/h3&gt;&lt;div class="table noWrap w100"&gt;&lt;table border="1" cellpadding="8" cellspacing="0"&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Issue&lt;/th&gt;
      &lt;th&gt;Business Impact&lt;/th&gt;
    &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;Downtime&lt;/td&gt;
      &lt;td&gt;Lost productivity and revenue&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;Security risks&lt;/td&gt;
      &lt;td&gt;Data breaches and financial loss&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;Outdated systems&lt;/td&gt;
      &lt;td&gt;Reduced efficiency&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;Data loss&lt;/td&gt;
      &lt;td&gt;Disrupted operations&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;Poor scalability&lt;/td&gt;
      &lt;td&gt;Limited growth&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;&lt;h3 style="text-align: left;"&gt;Why Proactive IT Support Is the Better Approach&lt;/h3&gt;&lt;p&gt;Instead of waiting for problems to occur, proactive IT support focuses on prevention.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Key benefits&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Regular system monitoring&lt;/li&gt;&lt;li&gt;Early detection of issues&lt;/li&gt;&lt;li&gt;Improved system performance&lt;/li&gt;&lt;li&gt;Stronger security&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This approach reduces risks and keeps systems running smoothly.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Small Issues vs Big Consequences&lt;/h3&gt;&lt;p&gt;It is easy to ignore minor IT problems. However, these small issues often lead to larger challenges.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Example&lt;/h4&gt;&lt;p&gt;A simple missed update may:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Create security vulnerabilities&lt;/li&gt;&lt;li&gt;Slow down systems&lt;/li&gt;&lt;li&gt;Cause compatibility issues&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Addressing small problems early can prevent major disruptions later.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;How Businesses Can Avoid These Costs&lt;/h3&gt;&lt;p&gt;Preventing IT-related problems does not have to be complicated.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Practical steps&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Invest in professional IT support&lt;/li&gt;&lt;li&gt;Keep systems updated&lt;/li&gt;&lt;li&gt;Use secure passwords and networks&lt;/li&gt;&lt;li&gt;Implement regular data backups&lt;/li&gt;&lt;li&gt;Monitor systems continuously&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;These actions help maintain a stable and secure IT environment.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Frequently Asked Questions&lt;/h3&gt;&lt;p&gt;&lt;b&gt;Q. Why do businesses neglect IT support?&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A. &lt;/b&gt;Often to reduce costs or because they underestimate the risks.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q. Can small businesses afford IT support?&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A.&amp;nbsp;&lt;/b&gt;Yes. Many providers offer flexible solutions tailored to different budgets.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q. Is reactive IT support enough?&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A.&amp;nbsp;&lt;/b&gt;Reactive support helps fix problems, but proactive support prevents them.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q. What is the biggest risk of neglecting IT?&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A.&amp;nbsp;&lt;/b&gt;Cybersecurity threats and data loss are among the most serious risks.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Conclusion&lt;/h3&gt;&lt;p&gt;Neglecting IT support may seem like a way to save money in the short term, but the hidden costs can be significant. From downtime and lost productivity to cybersecurity risks and damaged reputation, the impact can affect every part of a business.&lt;/p&gt;&lt;p&gt;Investing in reliable IT support helps prevent these problems, ensuring systems run smoothly and securely. With the right approach, businesses can reduce risks, improve efficiency, and focus on growth.&lt;/p&gt;&lt;p&gt;In today’s digital world, IT support is not just an option – it is a necessity for long-term success.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPjgXASl0_gSkYiIDgoDnPtkV1Z2jqZ43dxRfV1lZ8XBnfvTTASd0wkuaL1ZiC2TgPLqPm9fOb7acwsj6q-opb6PLO4fy6MBqOH65gsce0ICguLEyhWI6Vn0-FzrC98TDRH1Cq4UpQyC3AcisuIirZFLVcKRHil5T5ONjeeoWNR_gSsGQgdFkN98rkYlI/s72-c/it-support.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Palo Alto PAN-OS Zero-Day Under Active Attack — No Patch Available Yet</title><link>https://www.cyberkendra.com/2026/05/palo-alto-pan-os-zero-day-under-active.html</link><category>Security</category><category>Vulnerability</category><category>ZeroDay Bug</category><pubDate>Wed, 6 May 2026 19:34:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-8454299546328327887</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="CVE-2026-0300 zero-day" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-VpM_AGnOqDWks62yYVlaCTkoV2_1SOx-TKZ2JB2SPcCv78Sgld_BryD-KlDiF7NnuE3TTQpETU5lWjFJHnnD0pN6S_KquLFVry1gtit0alWROB1dhshY9UNASX43_aBEk4VSzd5aSCVedZ_ghrRsrzbr_jH3CR-9HlhbFBT1tkvzL8iEwKjYV3TQVvk/s16000/CVE-2026-0300.webp" title="CVE-2026-0300 zero-day" /&gt;&lt;/div&gt;&lt;p&gt;Attackers are already exploiting a critical zero-day vulnerability in Palo Alto Networks' PAN-OS, the operating system powering the company's widely deployed enterprise firewalls — and patches won't arrive until May 13 at the earliest.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The flaw, tracked as &lt;b&gt;CVE-2026-0300&lt;/b&gt;, is a buffer overflow in the User-ID Authentication Portal — also known as the Captive Portal — a PAN-OS feature that authenticates users when the firewall cannot automatically map an IP address to a known identity. The vulnerability carries a CVSS 4.0 score of 9.3, placing it firmly in the Critical tier.&lt;/p&gt;&lt;p&gt;The zero-day allows unauthenticated attackers to execute arbitrary code with root privileges on internet-exposed PA-Series and VM-Series firewalls by sending specially crafted network packets. In plain terms: no login, no credentials, full ownership of the firewall.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;In-Wild Exploitation&lt;/h3&gt;&lt;p&gt;Palo Alto Networks &lt;a href="https://security.paloaltonetworks.com/CVE-2026-0300" rel="nofollow" target="_blank"&gt;confirmed in its advisory&lt;/a&gt; that "limited exploitation has been observed targeting Palo Alto Networks User-ID Authentication Portals that are exposed to untrusted IP addresses and/or the public internet." In the threat intelligence community, "limited exploitation" is typically code for highly targeted attacks — often the calling card of nation-state actors probing high-value networks.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Internet threat watchdog Shadowserver is currently tracking over 5,800 PAN-OS VM-Series firewalls exposed online, with the largest concentrations in Asia (2,466 devices) and North America (1,998). Every one of those devices is a potential target if the Captive Portal is enabled and reachable from the internet.&lt;/p&gt;&lt;p&gt;The vulnerability has already reached the "ATTACKED" stage in exploit maturity, and Palo Alto has confirmed that exploitation of CVE-2026-0300 is automatable — meaning threat actors can script and scale attacks without manual intervention.&amp;nbsp;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Makes This Particularly Dangerous&lt;/h3&gt;&lt;p&gt;The flaw is rooted in CWE-787 (Out-of-bounds Write), a class of memory corruption bugs that allow attackers to overwrite adjacent memory and redirect program execution. Because the Authentication Portal is a network-facing service, no user interaction is required — an attacker anywhere on the internet can trigger the exploit if the portal is left exposed.&lt;/p&gt;&lt;p&gt;Prisma Access, Cloud NGFW, and Panorama appliances are not impacted by this vulnerability. The risk is confined strictly to PA-Series and VM-Series hardware and virtual firewalls with the User-ID Authentication Portal switched on.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Patches Coming in Waves&lt;/h3&gt;&lt;p&gt;Patches are rolling out in a staggered schedule between May 13 and May 28, 2026, depending on the PAN-OS branch. Additionally, Palo Alto released a Threat Prevention Signature for PAN-OS 11.1 and above starting May 5, 2026, which can detect and block exploitation attempts.&lt;/p&gt;&lt;p&gt;CISA's Known Exploited Vulnerabilities catalog currently includes 13 Palo Alto product vulnerabilities, but CVE-2026-0300 has not yet been added — an addition that may well come soon, given confirmed in-the-wild exploitation. Given that Palo Alto Networks' products are used by over 70,000 customers worldwide, including 90% of Fortune 10 companies, the blast radius of widespread exploitation would be enormous.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Administrators Should Do Right Now&lt;/h3&gt;&lt;p&gt;Patches aren't here yet, but mitigation options exist. Palo Alto recommends one of two immediate actions:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;b&gt;Restrict access&lt;/b&gt; to the User-ID Authentication Portal to trusted internal IP addresses only — eliminating internet exposure entirely.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Disable &lt;/b&gt;the Authentication Portal outright if your organization doesn't actively use it.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Administrators should verify their exposure status by navigating to Device → User Identification → Authentication Portal Settings → Enable Authentication Portal in the PAN-OS management interface. If that setting is enabled and the portal is reachable from an untrusted network, treat it as a live incident-in-waiting.&lt;/p&gt;&lt;p&gt;Apply the Threat Prevention Signature update immediately (via Device → Dynamic Updates) and schedule patching to the fixed PAN-OS versions the moment they become available on May 13.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-VpM_AGnOqDWks62yYVlaCTkoV2_1SOx-TKZ2JB2SPcCv78Sgld_BryD-KlDiF7NnuE3TTQpETU5lWjFJHnnD0pN6S_KquLFVry1gtit0alWROB1dhshY9UNASX43_aBEk4VSzd5aSCVedZ_ghrRsrzbr_jH3CR-9HlhbFBT1tkvzL8iEwKjYV3TQVvk/s72-c/CVE-2026-0300.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Apache HTTP Server's HTTP/2 Module Has a Memory Bug That Can Crash or Compromise Your Server</title><link>https://www.cyberkendra.com/2026/05/apache-http-servers-http2-module-has.html</link><category>Apache</category><category>Security</category><pubDate>Wed, 6 May 2026 09:04:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-3694597102895604041</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Critical Apache HTTP/2 Flaw (CVE-2026-23918)" border="0" data-original-height="1010" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkqcjvYfj5jLh340MaBt1e7EGfMqmAk9nKmX_5cuOLk6Pt_ReJPVD6an-tdvDeXz7N-VC3yOfojOvkeUpyzg0orYxo9WSdB85v1dNFvwSKfgdkc1gxpCqF98lBvHDB5C9vQ5RsA0pu1rh32gB3r1glUsI-IyRsNTqr-aqooiO3-dSRhPvoo2g9qWl519A/s16000/apache-http-flaw.webp" title="Critical Apache HTTP/2 Flaw (CVE-2026-23918)" /&gt;&lt;/div&gt;&lt;p&gt;A memory management flaw buried inside Apache HTTP Server's HTTP/2 module is giving attackers two options: crash your web server with a two-frame network packet, or — under the right conditions — run arbitrary code on it.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The Apache Software Foundation &lt;a href="https://httpd.apache.org/security/vulnerabilities_24.html" rel="nofollow" target="_blank"&gt;shipped a fix on May 4&lt;/a&gt; as part of the 2.4.67 release, but every installation still running 2.4.66 with HTTP/2 enabled is exposed right now.&lt;/p&gt;&lt;p&gt;The vulnerability, &lt;b&gt;CVE-2026-23918 &lt;/b&gt;(CVSS 8.8), was discovered by Bartlomiej Dmitruk, co-founder of Striga.ai, and Stanislaw Strzalkowski of ISEC.pl. It is a double-free — a class of memory corruption bug where the same chunk of memory gets released twice — inside &lt;code&gt;h2_mplx.c&lt;/code&gt;, the stream cleanup path of &lt;code&gt;mod_http2&lt;/code&gt;.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What triggers it?&lt;/h3&gt;&lt;p&gt;The bug fires when a client sends an HTTP/2 HEADERS frame immediately followed by an RST_STREAM frame on the same stream before the server's multiplexer has had a chance to register the stream. Two internal callbacks — &lt;code&gt;on_frame_recv_cb&lt;/code&gt; and &lt;code&gt;on_stream_close_cb&lt;/code&gt; — both fire in rapid succession and independently walk the same cleanup path, pushing the same stream pointer into the purge queue twice.&amp;nbsp;&lt;/p&gt;&lt;p&gt;When Apache later iterates that queue and calls &lt;code&gt;apr_pool_destroy&lt;/code&gt; on each entry, the second call hits memory that is already gone.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Two outcomes, very different threat levels&lt;/h3&gt;&lt;p&gt;The DoS is the easy one. Dmitruk described it bluntly: one TCP connection, two frames, no authentication, no special headers, no specific URL. The worker process crashes. Apache respawns it automatically, but every request it was handling is dropped — and an attacker can keep cycling this indefinitely.&lt;/p&gt;&lt;p&gt;The remote code execution scenario is more demanding but not theoretical. The research team built a working proof-of-concept on x86-64. It exploits the freed memory via mmap reuse to plant a fake stream structure pointing Apache's own pool cleanup function at &lt;code&gt;system()&lt;/code&gt;.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The key enabler is Apache's scoreboard memory, which sits at a fixed address for the entire lifetime of the server process — even with ASLR (address space layout randomization) active — giving attackers a stable target. The RCE path specifically requires Apache Portable Runtime (&lt;a href="https://apr.apache.org/" rel="nofollow" target="_blank"&gt;APR&lt;/a&gt;) compiled with the mmap allocator, which happens to be the default on Debian-based Linux systems and the official Apache httpd Docker image.&lt;/p&gt;&lt;p&gt;One important carve-out: the MPM prefork mode is not affected. But because &lt;code&gt;mod_http2&lt;/code&gt; ships enabled in default Apache builds and HTTP/2 is standard in most production environments today, the exposed attack surface is significant.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The bigger patch batch&lt;/h3&gt;&lt;p&gt;The 2.4.67 update patches nine additional vulnerabilities alongside CVE-2026-23918, including a moderate privilege escalation in &lt;code&gt;mod_rewrite&lt;/code&gt; (CVE-2026-24072), a timing attack against digest authentication (CVE-2026-33006), and a cluster of AJP proxy memory-handling issues.&lt;/p&gt;&lt;p&gt;Upgrade to Apache HTTP Server 2.4.67 immediately. If an immediate upgrade is not feasible, disabling &lt;b&gt;mod_http2&lt;/b&gt; removes the primary attack surface for CVE-2026-23918. Operators running Debian-derived systems or the official Docker image should treat the RCE risk as real and urgent, not theoretical.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkqcjvYfj5jLh340MaBt1e7EGfMqmAk9nKmX_5cuOLk6Pt_ReJPVD6an-tdvDeXz7N-VC3yOfojOvkeUpyzg0orYxo9WSdB85v1dNFvwSKfgdkc1gxpCqF98lBvHDB5C9vQ5RsA0pu1rh32gB3r1glUsI-IyRsNTqr-aqooiO3-dSRhPvoo2g9qWl519A/s72-c/apache-http-flaw.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Google Chrome Is Silently Pushing a 4 GB AI Model to Your Device — And Reinstalls It If You Delete It</title><link>https://www.cyberkendra.com/2026/05/google-chrome-is-silently-pushing-4-gb.html</link><category>Google</category><category>Privacy</category><pubDate>Wed, 6 May 2026 08:14:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-4241165982966865000</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Download Gemini" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7mDqpqedF9iJAWjYcbQFErOPvdszyRZosg0vNS-DkphGwY_CeIO7P4-gZKWwyVtUEBRoLjMNS2P3J7eLwYnii14575m4AuL8bZf3MH-CG3HB08iJlRIz02z78eiF59RHX-tMhFsmely4q6Ddy4FGwiarC7MDjX2iOH42y3S8OvotF3uPoE2fmQ2CnhmM/s16000/gemini-download.webp" title="Download Gemini" /&gt;&lt;/div&gt;&lt;p&gt;Hundreds of millions of Chrome users have a 4 GB AI model sitting on their hard drives right now — and most of them never agreed to it.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Security and privacy researcher Alexander Hanff, writing under the alias "That Privacy Guy," published a detailed investigation last week revealing that Google Chrome silently downloads the Gemini Nano weight file — Google's on-device large language model — to user devices without any consent prompt.&lt;/p&gt;&lt;p&gt;The file, named &lt;code&gt;weights.bin&lt;/code&gt;, is located in a directory called &lt;code&gt;&lt;b&gt;OptGuideOnDeviceModel&lt;/b&gt;&lt;/code&gt;, buried deep within the Chrome user profile. Delete it, and Chrome will download it again in the next eligible window.&lt;/p&gt;&lt;p&gt;Hanff created a fresh Chrome profile on Apple Silicon specifically for an automated privacy audit. The profile received zero keyboard or mouse input from a human at any point. Using macOS's low-level filesystem event log (&lt;code&gt;.fseventsd&lt;/code&gt;) — which Chrome cannot modify — he traced the exact moment the model landed.&lt;/p&gt;&lt;p&gt;The next day of creating a fresh profile, Chrome created the &lt;code&gt;OptGuideOnDeviceModel directory&lt;/code&gt;, spawned three background unpacker subprocesses, and completed the full 4 GB install in &lt;b&gt;just 14 minutes and 28 seconds&lt;/b&gt;, while a tab sat idle waiting for a timer to expire.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Chrome's internal feature flags confirm that the download begins before the Settings UI that would let a user refuse is even visible — meaning the architecture ensures installation precedes any opportunity to opt out.&lt;/p&gt;&lt;p&gt;Chrome 147 displays a prominent "AI Mode" pill in the address bar — the most visible AI touchpoint in the entire browser. A reasonable user would assume that the pill is powered by the local Gemini Nano model sitting on their disk. It is not.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The AI Mode feature routes every query to Google's cloud servers. The on-device model powers buried features like "Help me write" in text boxes and tab-group suggestions — things most users will never discover. Users pay for storage and bandwidth; the headline feature phones home anyway.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;How to Block It&lt;/h3&gt;&lt;p&gt;Stopping the download is not straightforward for ordinary users:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Chrome flags (Chrome 137+): Open &lt;code&gt;chrome://flags&lt;/code&gt;, search "optimisation guide on device", and set it to Disabled. Note that flags can reset after major browser updates.&lt;/li&gt;&lt;li&gt;Windows Registry: Set &lt;code&gt;OptimizationGuideModelDownloading&lt;/code&gt; to &lt;code&gt;&lt;b&gt;0&lt;/b&gt;&lt;/code&gt; under &lt;code&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome&lt;/code&gt;. Requires admin rights.&lt;/li&gt;&lt;li&gt;Enterprise environments can enforce the block via Group Policy.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;There is no single-click opt-out in Chrome's standard Settings for home users.&lt;/p&gt;&lt;p&gt;Google has not publicly responded to the investigation or addressed the absence of a consent prompt. Hanff argues that the behaviour directly violates the EU's ePrivacy Directive (Article 5(3)) and the GDPR's data minimisation principles — the same legal framework he previously applied to Anthropic's Claude Desktop, which silently registered automation hooks across seven Chromium-based browsers.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7mDqpqedF9iJAWjYcbQFErOPvdszyRZosg0vNS-DkphGwY_CeIO7P4-gZKWwyVtUEBRoLjMNS2P3J7eLwYnii14575m4AuL8bZf3MH-CG3HB08iJlRIz02z78eiF59RHX-tMhFsmely4q6Ddy4FGwiarC7MDjX2iOH42y3S8OvotF3uPoE2fmQ2CnhmM/s72-c/gemini-download.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>WhatsApp Quietly Fixed Two Flaws That Could Make Malware Look Like a PDF</title><link>https://www.cyberkendra.com/2026/05/whatsapp-quietly-fixed-two-flaws-that.html</link><category>Security</category><category>Whatsapp</category><pubDate>Wed, 6 May 2026 07:54:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-5466705583471104740</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="WhatsApp Vulnerabilities" border="0" data-original-height="1010" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizVF2YPinGI2Qq35xJksTxxLtn6JCLyrt-cDVmF67VDZ3CfG0rFJam_8ndWoANKv6tpNq70O6FdPs8jkQY9BBYA1ofo8WyazFfZDVR-m-lJQdGBX7Jx26LIeyXgQaQRrrZgaTQPwCd4D-8OR7fimIdxkpGsUn69gJM5GdHz8RLg5EIqvsf9F8ix4YHo4M/s16000/whatsapp-flaw.webp" title="WhatsApp Vulnerabilities" /&gt;&lt;/div&gt;&lt;p&gt;If you use WhatsApp on Windows, here is something worth knowing: until recently, an attacker could send you what looked like a harmless document — a PDF, an invoice, a document, or anything — and the moment you opened it, your machine would execute it as a program. Meta has now patched that flaw, along with a second vulnerability tied to WhatsApp's AI integration with Instagram Reels.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Meta disclosed both issues through its official security advisories this week. Neither has been observed in the wild to be exploited, and fixes are already live — but the mechanics of both bugs are worth understanding.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Windows Attachment Trick&lt;/h3&gt;&lt;p&gt;&lt;b&gt;CVE-2026-23863&lt;/b&gt; is a file spoofing vulnerability affecting WhatsApp for Windows versions prior to v2.3000.1032164386.258709. The attacker embeds NUL bytes (null characters invisible to the user interface) inside a file's name.&amp;nbsp;&lt;/p&gt;&lt;p&gt;WhatsApp's Windows client would render the file as a benign document type — say, a .pdf — while the operating system would read past the NUL byte and execute it as something else entirely, such as an .exe. It is a deceptive technique that has existed in some form for decades and remains effective when applications fail to properly sanitise filenames.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Instagram Reels AI Angle&lt;/h3&gt;&lt;p&gt;The second flaw, &lt;b&gt;CVE-2026-23866&lt;/b&gt;, sits on a less obvious attack surface: WhatsApp's handling of AI-generated rich response messages for Instagram Reels. Due to incomplete validation, a malicious actor could cause a target device to load media from an arbitrary URL—and, more critically, invoke OS-level custom URL scheme handlers.&amp;nbsp;&lt;/p&gt;&lt;p&gt;On iOS and Android, custom URL schemes (facetime:, tel:, itms-apps:, or third-party app deep links) can be weaponized to redirect users to phishing pages, silently open apps, or probe installed software. The flaw affected WhatsApp for iOS v2.25.8.0 through v2.26.15.72 and Android v2.25.8.0 through v2.26.7.10.&lt;/p&gt;&lt;p&gt;Both vulnerabilities were responsibly disclosed by anonymous external researchers through Meta's bug bounty programme.&lt;/p&gt;&lt;p&gt;Update WhatsApp immediately, on every platform you use it. On Windows, confirm you are running v2.3000.1032164386.258709 or later. On mobile, any version above v2.26.15.72 (iOS) or v2.26.7.10 (Android) is patched.&lt;/p&gt;&lt;p&gt;The broader takeaway: as messaging apps deepen integration with AI features and cross-platform content — like Reels previews inside WhatsApp — the attack surface expands in ways that are not always obvious. Meta caught these before threat actors could, but the window between discovery and disclosure is rarely zero.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizVF2YPinGI2Qq35xJksTxxLtn6JCLyrt-cDVmF67VDZ3CfG0rFJam_8ndWoANKv6tpNq70O6FdPs8jkQY9BBYA1ofo8WyazFfZDVR-m-lJQdGBX7Jx26LIeyXgQaQRrrZgaTQPwCd4D-8OR7fimIdxkpGsUn69gJM5GdHz8RLg5EIqvsf9F8ix4YHo4M/s72-c/whatsapp-flaw.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Top 11 AI-Powered GRC Platforms to Watch Out For in 2026</title><link>https://www.cyberkendra.com/2026/05/top-11-ai-powered-grc-platforms-to.html</link><category>AI</category><category>Tips</category><pubDate>Sun, 3 May 2026 21:39:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-6106448344527770515</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="AI-Powered GRC Platforms" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSm-A5PQ8hp_M8No64-ApihF18pMXCqTnJIucz9BZYQoLXwUdZqYx3uj0bgjzekrciswhsGMgyveQo-hok9-IbhZiqNECmvJvHv5dVUYYedJsvF2FQOQfiwPyI0vLWjILJXhJCiEEnUw8naze9aPDVJwcjynQK_wHMeRmJgLwBbszpkYN2Ab2onLwePrI/s16000/AI-Powered.webp" title="AI-Powered GRC Platforms" /&gt;&lt;/div&gt;&lt;p&gt;Organizations face mounting pressure to demonstrate compliance across multiple frameworks while quantifying cyber risk in terms that boards understand. Manual spreadsheets and siloed tools no longer scale when audit teams juggle simultaneous certifications for SOC 2, ISO 27001, HIPAA, and emerging regulations like DORA.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Risk managers need platforms that translate technical vulnerabilities into business impact and automate repetitive control testing without adding headcount.&lt;/p&gt;&lt;p&gt;AI-powered GRC platforms now deliver automated risk assessments, cross-framework control mapping, and real-time monitoring, reducing audit preparation time from months to weeks. Machine learning algorithms match controls across dozens of standards, populate risk registers from live data sources, and generate board-ready reports that connect security posture to enterprise risk appetite.&amp;nbsp;&lt;/p&gt;&lt;p&gt;These systems handle vendor risk workflows, gap analysis, and remediation tracking in unified interfaces that replace fragmented toolchains.&lt;/p&gt;&lt;p&gt;This analysis examines platforms built for multi-framework compliance, quantified risk management, and continuous control monitoring. Selection criteria include automation depth, framework coverage, vendor risk capabilities, and deployment speed for mid-market and enterprise buyers.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;Best AI-Powered GRC Platforms to watch out for 2026&lt;/h2&gt;&lt;h3 style="text-align: left;"&gt;1. Centraleyes - The Best AI Risk Governance Built for the Threat Landscape Ahead&lt;/h3&gt;&lt;p&gt;&lt;a href="http://centraleyes.com/" target="_blank"&gt;Centraleyes&lt;/a&gt; takes a different architectural approach to GRC: instead of asking teams to define risk scenarios manually, the platform's AI engine generates and updates them continuously - pulling from live threat intelligence feeds, asset inventories, and control gap data to surface what's relevant right now, not what was relevant at last year's audit. Security and compliance teams moving away from yesterday's GRC tools are finding this shift from static to dynamic risk management is exactly what modern threat environments demand.&lt;/p&gt;&lt;p&gt;Centraleyes is selected as the best AI-powered GRC platform for 2026, and is definitely one of the top companies to watch. The company built a proprietary AI governance module that treats AI systems as a manageable risk domain - mapping AI-specific controls into the same workflows used for cyber and regulatory risk.&amp;nbsp;&lt;/p&gt;&lt;p&gt;As organizations face growing pressure to demonstrate responsible AI use to boards and regulators, this positions Centraleyes ahead of platforms still retrofitting AI features onto legacy GRC architecture.&lt;/p&gt;&lt;p&gt;The no-code deployment model means compliance teams can activate new framework modules - including DORA, CMMC 2.0, and emerging regional AI regulations - without IT involvement or implementation projects. Organizations entering a new regulatory environment for the first time can be operationally compliant within 30 days.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Key capabilities&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Continuously updated AI risk register driven by live threat intelligence&lt;/li&gt;&lt;li&gt;Proprietary AI governance framework for managing AI as an enterprise risk domain&lt;/li&gt;&lt;li&gt;No-code framework activation for emerging regulations without IT dependency&lt;/li&gt;&lt;li&gt;Cross-framework control mapping, eliminating redundant evidence collection&lt;/li&gt;&lt;li&gt;Board-ready risk reporting in business language, not security jargon&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;2. OneTrust – Privacy-First GRC for Global Operations&lt;/h3&gt;&lt;p&gt;OneTrust extends privacy and data governance capabilities into broader GRC workflows, serving multinational organizations managing GDPR, CCPA, and sector-specific mandates. The platform integrates consent management, data mapping, and incident response with compliance tracking across regional regulations.&lt;/p&gt;&lt;p&gt;Large enterprises with complex data residency requirements use OneTrust to coordinate privacy impact assessments alongside traditional risk management. The system handles vendor assessments through privacy-specific questionnaires that evaluate data processing agreements and cross-border data flows.&lt;/p&gt;&lt;p&gt;Key capabilities&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Privacy and data governance with consent tracking&lt;/li&gt;&lt;li&gt;Automated data subject access request workflows&lt;/li&gt;&lt;li&gt;Cookie compliance and website scanning tools&lt;/li&gt;&lt;li&gt;Third-party risk assessment with privacy questionnaires&lt;/li&gt;&lt;li&gt;Regional regulation tracking for GDPR and CCPA&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;3. LogicGate – Configurable Workflows for Risk Teams&lt;/h3&gt;&lt;p&gt;LogicGate provides low-code workflow builders that let risk teams design custom GRC processes without developer support. Organizations with unique operational risk frameworks use LogicGate to model industry-specific scenarios not covered by standard compliance templates.&lt;/p&gt;&lt;p&gt;Mid-market companies and business units within larger enterprises adopt LogicGate when off-the-shelf workflows do not align with their existing governance structures. The platform supports enterprise risk management programs that extend beyond IT security into operational and strategic risk domains.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Key capabilities&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Low-code workflow engine for custom process design&lt;/li&gt;&lt;li&gt;Risk register with configurable scoring methodologies&lt;/li&gt;&lt;li&gt;Operational risk tracking beyond security compliance&lt;/li&gt;&lt;li&gt;Integration with existing business intelligence tools&lt;/li&gt;&lt;li&gt;Visual process mapping for governance documentation&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;4. SAI360 – Enterprise Risk Across Business Functions&lt;/h3&gt;&lt;p&gt;SAI360 addresses enterprise risk management across compliance, ethics, learning, and environmental health and safety programs. The platform serves industries with operational risk exposures spanning workplace safety, regulatory compliance, and corporate governance.&lt;/p&gt;&lt;p&gt;Manufacturing firms and multinational corporations use SAI360 to centralize risk data from geographically distributed operations. The system connects incident reporting from factory floors with executive risk committees through configurable escalation rules and dashboards.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Key capabilities&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Enterprise risk management across multiple business functions&lt;/li&gt;&lt;li&gt;Ethics and compliance hotline with case management&lt;/li&gt;&lt;li&gt;Environmental health and safety incident tracking&lt;/li&gt;&lt;li&gt;Policy management with attestation workflows&lt;/li&gt;&lt;li&gt;Audit planning and execution with finding tracking&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;5. Fusion Risk Management – Business Continuity Planning&lt;/h3&gt;&lt;p&gt;Fusion Risk Management focuses on business continuity, disaster recovery, and operational resilience alongside traditional GRC functions. Organizations in critical infrastructure sectors use Fusion to model recovery time objectives and coordinate crisis response across distributed teams.&lt;/p&gt;&lt;p&gt;Financial institutions and healthcare systems rely on Fusion to meet regulatory requirements for operational resilience and business continuity testing. The platform maps critical business processes to supporting technology and third-party dependencies for impact analysis during disruption scenarios.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Key capabilities&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Business continuity planning with recovery time tracking&lt;/li&gt;&lt;li&gt;Crisis management and incident command coordination&lt;/li&gt;&lt;li&gt;Business impact analysis for critical processes&lt;/li&gt;&lt;li&gt;Third-party dependency mapping for resilience&lt;/li&gt;&lt;li&gt;Tabletop exercise management and documentation&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;6. Prevalent – Third-Party Risk Intelligence&lt;/h3&gt;&lt;p&gt;Prevalent specializes in vendor risk management with automated security assessments and continuous monitoring of supplier ecosystems. The platform aggregates threat intelligence, financial health data, and security ratings to score third-party risk without manual questionnaires.&lt;/p&gt;&lt;p&gt;Procurement teams managing hundreds of vendor relationships use Prevalent to automate initial assessments and trigger reviews when supplier risk profiles change. Financial services and healthcare organizations rely on continuous monitoring to detect vendor security incidents between annual audits.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Key capabilities&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Automated vendor security assessments with intelligence feeds&lt;/li&gt;&lt;li&gt;Continuous monitoring of third-party security posture&lt;/li&gt;&lt;li&gt;Financial health and cyber risk scoring&lt;/li&gt;&lt;li&gt;Questionnaire automation with pre-filled responses&lt;/li&gt;&lt;li&gt;Vendor portfolio risk aggregation and reporting&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;7. Vanta – Automated Compliance for Cloud-Native Teams&lt;/h3&gt;&lt;p&gt;Vanta automates evidence collection for SOC 2, ISO 27001, and HIPAA certifications by integrating directly with cloud infrastructure and SaaS tools. The platform monitors security controls continuously and alerts teams when configurations drift from compliance requirements.&lt;/p&gt;&lt;p&gt;Technology startups and SaaS companies use Vanta to achieve first-time certifications quickly and maintain compliance as they scale. The system reduces audit preparation time by automatically gathering screenshots, configuration exports, and access logs that auditors require.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Key capabilities&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Automated evidence collection from cloud infrastructure&lt;/li&gt;&lt;li&gt;Continuous control monitoring with drift detection&lt;/li&gt;&lt;li&gt;SOC 2 and ISO 27001 certification preparation&lt;/li&gt;&lt;li&gt;Integration with AWS, Azure, GCP, and SaaS tools&lt;/li&gt;&lt;li&gt;Audit coordination with document sharing portals&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;8. Drata – Continuous Compliance Monitoring&lt;/h3&gt;&lt;p&gt;Drata provides continuous monitoring and automated testing for compliance frameworks such as SOC 2, ISO 27001, and GDPR. The platform connects to endpoint management, HR systems, and cloud providers to verify control effectiveness in real time.&lt;/p&gt;&lt;p&gt;Fast-growing technology companies use Drata to maintain compliance during rapid hiring and infrastructure changes. The system documents personnel onboarding, device management, and access review processes automatically, reducing manual evidence preparation during audits.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Key capabilities&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Continuous compliance monitoring across multiple frameworks&lt;/li&gt;&lt;li&gt;Automated employee onboarding and offboarding checks&lt;/li&gt;&lt;li&gt;Background check and training completion tracking&lt;/li&gt;&lt;li&gt;Integration with identity providers and endpoint tools&lt;/li&gt;&lt;li&gt;Policy management with employee acknowledgment workflows&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;9. Secureframe – Compliance for Growing Technology Firms&lt;/h3&gt;&lt;p&gt;Secureframe simplifies compliance for technology companies pursuing SOC 2, ISO 27001, and PCI DSS certifications. The platform automates responses to security questionnaires and maintains vendor risk assessments to meet supply chain compliance requirements.&lt;/p&gt;&lt;p&gt;Series A and Series B-stage companies use Secureframe to demonstrate their security posture to enterprise customers and investors. The system generates trust reports that summarize compliance status and security controls for sales teams responding to security reviews.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Key capabilities&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Automated compliance workflows for SOC 2 and ISO&lt;/li&gt;&lt;li&gt;Security questionnaire automation with AI responses&lt;/li&gt;&lt;li&gt;Vendor risk assessment and documentation&lt;/li&gt;&lt;li&gt;Trust center for customer security communications&lt;/li&gt;&lt;li&gt;Integration with development and infrastructure tools&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;10. Tugboat Logic – Risk-Based Compliance Management&lt;/h3&gt;&lt;p&gt;Tugboat Logic connects risk management methodologies with compliance automation for organizations pursuing multiple security certifications. The platform provides pre-built control libraries and policy templates that adapt to industry-specific requirements.&lt;/p&gt;&lt;p&gt;Companies in regulated industries use Tugboat Logic to document control environments and prepare for external audits. The system maps internal controls to framework requirements and tracks remediation activities through integrated workflow tools.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Key capabilities&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Risk-based approach to compliance management&lt;/li&gt;&lt;li&gt;Pre-built policy and procedure templates&lt;/li&gt;&lt;li&gt;Control mapping across security frameworks&lt;/li&gt;&lt;li&gt;Vendor risk management with assessment workflows&lt;/li&gt;&lt;li&gt;Audit preparation and evidence collection&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;11. Sprinto – Compliance Automation for Global Standards&lt;/h3&gt;&lt;p&gt;Sprinto automates compliance for international standards, including SOC 2, ISO 27001, GDPR, and HIPAA, through integrations with cloud infrastructure and business systems. The platform monitors security controls and generates compliance reports for audit teams.&lt;/p&gt;&lt;p&gt;International technology companies use Sprinto to manage compliance across regional requirements as they expand into new markets. The system tracks control changes over time and maintains historical evidence for multi-year audit cycles.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Key capabilities&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Automated compliance for global security standards&lt;/li&gt;&lt;li&gt;Real-time control monitoring with alerting&lt;/li&gt;&lt;li&gt;Integration with cloud providers and SaaS platforms&lt;/li&gt;&lt;li&gt;Compliance dashboard with framework progress tracking&lt;/li&gt;&lt;li&gt;Evidence vault for historical audit documentation&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;How AI Transforms GRC Operations&lt;/h3&gt;&lt;p&gt;Organizations evaluating GRC platforms should understand where artificial intelligence delivers measurable value versus marketing claims:&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Automated Control Mapping&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Natural language processing matches controls across frameworks&lt;/li&gt;&lt;li&gt;Identifies overlapping requirements between standards automatically&lt;/li&gt;&lt;li&gt;Suggests control implementations based on infrastructure configuration&lt;/li&gt;&lt;li&gt;Reduces manual mapping time from weeks to hours&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Risk Quantification and Scoring&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Machine learning calculates the financial impact from vulnerability data&lt;/li&gt;&lt;li&gt;Prioritizes remediation based on threat intelligence feeds&lt;/li&gt;&lt;li&gt;Updates risk scores continuously as environments change&lt;/li&gt;&lt;li&gt;Translates technical findings into business risk language&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Evidence Collection and Monitoring&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Automated screenshot capture and log extraction&lt;/li&gt;&lt;li&gt;Continuous validation of control effectiveness through API integrations&lt;/li&gt;&lt;li&gt;Anomaly detection for configuration drift from baselines&lt;/li&gt;&lt;li&gt;Smart questionnaire routing based on response patterns&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Key Criteria for Evaluating GRC Platforms&lt;/h3&gt;&lt;p&gt;Procurement teams should assess these dimensions when comparing platforms:&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Framework Coverage and Mapping&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Number of pre-built framework libraries included&lt;/li&gt;&lt;li&gt;Quality of control mapping between overlapping standards&lt;/li&gt;&lt;li&gt;Frequency of framework updates for regulatory changes&lt;/li&gt;&lt;li&gt;Support for industry-specific and regional requirements&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Integration Architecture&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Native connectors to cloud infrastructure providers&lt;/li&gt;&lt;li&gt;API availability for custom data sources&lt;/li&gt;&lt;li&gt;Ticketing system integration for remediation workflows&lt;/li&gt;&lt;li&gt;Identity provider support for user provisioning&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Deployment and Time to Value&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Implementation timeline without professional services&lt;/li&gt;&lt;li&gt;Configuration requirements for basic functionality&lt;/li&gt;&lt;li&gt;Training needs for compliance and security teams&lt;/li&gt;&lt;li&gt;Time required to complete the first risk assessment&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Who Should Use AI-Powered GRC Platforms&lt;/h3&gt;&lt;p&gt;Different organizational profiles benefit from GRC automation in distinct ways:&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Enterprises with Multi-Framework Requirements&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Organizations pursuing SOC 2, ISO, and NIST simultaneously&lt;/li&gt;&lt;li&gt;Companies managing regional compliance across multiple jurisdictions&lt;/li&gt;&lt;li&gt;Firms with subsidiary-specific certification needs&lt;/li&gt;&lt;li&gt;Businesses are facing continuous audit cycles year-round&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Fast-Growth Technology Companies&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Startups securing enterprise customers requiring security attestations&lt;/li&gt;&lt;li&gt;SaaS providers maintaining compliance during rapid scaling&lt;/li&gt;&lt;li&gt;Companies with small security teams managing complex toolchains&lt;/li&gt;&lt;li&gt;Organizations entering regulated markets for the first time&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Regulated Industry Operators&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Healthcare organizations managing HIPAA and state privacy laws&lt;/li&gt;&lt;li&gt;Financial services firms coordinating PCI and SOC requirements&lt;/li&gt;&lt;li&gt;Critical infrastructure providers meeting CMMC standards&lt;/li&gt;&lt;li&gt;Public companies addressing SOX controls and audit readiness&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Integration and Compatibility Considerations&lt;/h3&gt;&lt;p&gt;Technical compatibility determines whether GRC platforms fit existing infrastructure:&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Cloud Infrastructure and Security Tools&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;AWS, Azure, and GCP configuration monitoring&lt;/li&gt;&lt;li&gt;SIEM and log aggregation platform integration&lt;/li&gt;&lt;li&gt;Vulnerability scanner data import and correlation&lt;/li&gt;&lt;li&gt;Cloud security posture management tool connectivity&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Identity and Access Management&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Single sign-on with Okta, Azure AD, and Google&lt;/li&gt;&lt;li&gt;User provisioning and deprovisioning automation&lt;/li&gt;&lt;li&gt;Role-based access control with custom permission models&lt;/li&gt;&lt;li&gt;Access review workflows with manager approval chains&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Business Systems and Workflow Tools&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Jira ServiceNow and Asana for remediation tracking&lt;/li&gt;&lt;li&gt;Slack and Teams for alert notifications&lt;/li&gt;&lt;li&gt;Email systems for automated evidence requests&lt;/li&gt;&lt;li&gt;Document repositories for policy management&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;FAQs&lt;/h3&gt;&lt;p&gt;&lt;b&gt;Q. What is the typical implementation timeline for a GRC platform?&lt;/b&gt;&lt;/p&gt;&lt;p&gt;A. Most modern GRC platforms deploy in 30 to 90 days, depending on organizational complexity and integration requirements. No-code platforms with pre-built framework templates enable faster onboarding, while custom implementations requiring extensive configuration can take more than 6 months. &lt;br /&gt;Organizations should evaluate whether vendors offer guided setup assistance and the level of internal IT involvement required for deployment. Platforms with automated discovery and integration wizards typically achieve faster time-to-value than those that require manual data entry.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q. How do GRC platforms handle multiple business units with different compliance needs?&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A.&lt;/b&gt; Enterprise-grade platforms provide multi-tenancy architectures that isolate compliance programs by subsidiary, region, or business unit while enabling consolidated reporting for corporate risk committees. Each tenant maintains separate control libraries, risk registers, and audit workflows with inheritance models that apply parent policies to child entities. &lt;br /&gt;Organizations should verify whether platforms support cross-tenant control mapping and whether users can switch between tenant views without separate login credentials.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q. Can GRC platforms replace manual auditor interactions during certification processes?&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A.&lt;/b&gt;&amp;nbsp;GRC platforms automate evidence collection and documentation preparation, but do not eliminate auditor engagement during formal certification processes. Platforms reduce audit preparation time by enabling continuous compliance monitoring and generating organized evidence packages for auditors to review. &lt;br /&gt;Organizations still participate in opening meetings, walkthroughs, and testing validation with external auditors. The value lies in reducing weeks of manual preparation work to days and maintaining year-round audit readiness.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q. What differentiates vendor risk management features across GRC platforms?&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A.&lt;/b&gt;&amp;nbsp;Advanced platforms integrate vendor risk workflows directly into procurement processes and continuously monitor supplier security posture using external ratings and threat intelligence. Basic implementations treat vendor risk as separate questionnaire modules without integration into supply chain systems. &lt;br /&gt;Organizations managing large vendor portfolios should evaluate automated assessment distribution, response tracking, risk scoring methodologies, and renewal workflows. Continuous monitoring capabilities that detect vendor security incidents between assessment cycles provide significant advantages over annual review approaches.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q. How do organizations measure ROI from GRC platform investments?&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A.&lt;/b&gt;&amp;nbsp;Quantifiable benefits include reduced audit preparation time, faster certification cycles, and decreased reliance on external consultants for compliance management. Organizations typically track hours saved on evidence collection, the number of frameworks managed per FTE, and time to complete risk assessments. &lt;br /&gt;Risk quantification features enable comparison of security investments against potential loss exposure, helping justify control implementations. Multi-framework deployments deliver ROI by reusing control across overlapping requirements, eliminating redundant assessments.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSm-A5PQ8hp_M8No64-ApihF18pMXCqTnJIucz9BZYQoLXwUdZqYx3uj0bgjzekrciswhsGMgyveQo-hok9-IbhZiqNECmvJvHv5dVUYYedJsvF2FQOQfiwPyI0vLWjILJXhJCiEEnUw8naze9aPDVJwcjynQK_wHMeRmJgLwBbszpkYN2Ab2onLwePrI/s72-c/AI-Powered.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>A 21-Year-Old PHP Vulnerability That Opens the Door to Remote Code Execution</title><link>https://www.cyberkendra.com/2026/05/a-21-year-old-php-vulnerability-that.html</link><category>AI</category><category>Programming</category><category>Security</category><pubDate>Sat, 2 May 2026 07:52:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-2084935024559971501</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="21-year-old PHP vulnerability" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicQSzRpd9E-muCzob7L74Kw4QUSd7G_Ow8lKptIaX00gdLnBXumlgCNCfqEqTfZlxwUo7Ixfb_SDIRsmB1uWv09RR-wUdHgxiGiZmQVkMxntoEM7DVhst2Pg5J4jFzQF-kC0rvVjPgSKzxVT8uND_SbTPC3uhh33wModJXxMEl1kfoMYhDJdUqVfbQq8E/s16000/PHP%20unserialize%20flaw.webp" title="21-year-old PHP vulnerability" /&gt;&lt;/div&gt;&lt;p&gt;A security vulnerability that has been hiding inside PHP since 2005 — quietly surviving two decades of audits, engine rewrites, and dozens of related CVEs — has finally been found, and it took an AI to catch it. Yeah, another flaw discovered by AI after the &lt;a href="https://www.cyberkendra.com/2026/04/a-732-byte-python-script-can-get-root.html" target="_blank"&gt;critical Linux Copy Fail flaw&lt;/a&gt;, which leads to root access on almost every major Linux distro.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Researchers at Calif &lt;a href="https://blog.calif.io/p/mad-bugs-finding-and-exploiting-a" rel="nofollow" target="_blank"&gt;published a detailed write-up&lt;/a&gt; today revealing a use-after-free (UAF) bug in PHP's &lt;code&gt;unserialize()&lt;/code&gt; function, a code path that has been exploitable since PHP 5.1 shipped the &lt;code&gt;Serializable&lt;/code&gt; interface twenty-one years ago.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The flaw allows an attacker to achieve remote code execution (RCE) against the latest PHP release, 8.5.5, in roughly 2,000 HTTP requests — with no hardcoded memory offsets and no access to &lt;code&gt;/proc&lt;/code&gt;.&lt;/p&gt;&lt;p&gt;The root cause is a two-line omission. PHP uses an internal lock, &lt;code&gt;BG(serialize_lock)&lt;/code&gt;, to keep each &lt;code&gt;unserialize()&lt;/code&gt; call's reference table private. Every user-code dispatch point inside the deserializer — &lt;code&gt;__wakeup&lt;/code&gt;, &lt;code&gt;__unserialize&lt;/code&gt;, &lt;code&gt;__destruct&lt;/code&gt; — increments that lock before running PHP code. One dispatch site, &lt;code&gt;zend_user_unserialize()&lt;/code&gt;, the handler for the &lt;code&gt;Serializable&lt;/code&gt; interface, never did. The missing increment means a nested &lt;code&gt;unserialize()&lt;/code&gt; call inside a class's own &lt;code&gt;unserialize()&lt;/code&gt; method silently shares the outer call's memory table.&amp;nbsp;&lt;/p&gt;&lt;p&gt;An attacker who can trigger a property-table resize during that window gets a dangling pointer, which leads to memory corruption and, ultimately, arbitrary code execution.&lt;/p&gt;&lt;p&gt;The bug survived the PHP 7 engine rewrite in 2016 untouched. It also outlived a 2017 decision by the PHP project to stop treating &lt;code&gt;unserialize()&lt;/code&gt; memory bugs as security vulnerabilities — a policy that has aged poorly.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;How AI Found What Humans Missed&lt;/h3&gt;&lt;p&gt;Calif built an audit tool, &lt;code&gt;/php-unserialize-audit&lt;/code&gt;, by feeding roughly twenty historical unserialize advisories into Claude and distilling them into a structured bug taxonomy. That tool rediscovered all twelve known phpcodz advisories when run against PHP 5.6.40, then flagged the &lt;code&gt;Serializable&lt;/code&gt; reentrancy issue as novel when pointed at 8.5.5.&lt;/p&gt;&lt;p&gt;The pattern echoes what we reported earlier this year when AI-assisted analysis exposed CopyFail, the critical Linux kernel memory corruption vulnerability. In both cases, AI didn't replace researchers — it handled the exhausting pattern-matching work that lets experts focus on what the findings actually mean.&lt;/p&gt;&lt;p&gt;The remote exploit carries a significant precondition: the target application must load a class implementing &lt;code&gt;Serializable&lt;/code&gt; that calls &lt;code&gt;unserialize()&lt;/code&gt; recursively on user-supplied data and then mutates the resulting object's properties. That combination is uncommon in production code. The local exploit, however, carries no such restriction — any PHP process that passes attacker-controlled input to &lt;code&gt;unserialize()&lt;/code&gt; is vulnerable, and the researchers confirmed it bypasses disable_functions entirely.&lt;/p&gt;&lt;p&gt;The researchers have open-sourced both the exploit and the audit skill.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What to Do&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Audit any code that passes user input to &lt;code&gt;unserialize()&lt;/code&gt; — PHP's own documentation has warned against this for years.&lt;/li&gt;&lt;li&gt;Replace &lt;code&gt;unserialize()&lt;/code&gt; with &lt;code&gt;json_decode()&lt;/code&gt; wherever possible for untrusted data.&lt;/li&gt;&lt;li&gt;Monitor for PHP patches addressing this Serializable dispatch path.&lt;/li&gt;&lt;li&gt;Treat &lt;code&gt;disable_functions&lt;/code&gt; as a speed bump, not a security boundary.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;PHP's &lt;code&gt;unserialize()&lt;/code&gt; has been a vulnerability factory since 2007. This bug suggests it still has more to give — and that AI-assisted auditing is quickly becoming the tool that will drain it.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicQSzRpd9E-muCzob7L74Kw4QUSd7G_Ow8lKptIaX00gdLnBXumlgCNCfqEqTfZlxwUo7Ixfb_SDIRsmB1uWv09RR-wUdHgxiGiZmQVkMxntoEM7DVhst2Pg5J4jFzQF-kC0rvVjPgSKzxVT8uND_SbTPC3uhh33wModJXxMEl1kfoMYhDJdUqVfbQq8E/s72-c/PHP%20unserialize%20flaw.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Anthropic's Claude Security Is Now Open to All Enterprise Users — AI Catches Bugs</title><link>https://www.cyberkendra.com/2026/04/anthropics-claude-security-is-now-open.html</link><category>AI</category><category>Programming</category><pubDate>Thu, 30 Apr 2026 23:41:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-9114206293565338729</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Claude Security code scanning tool" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikcIWqdz-QB328w4w7_nzbsiew9O1DvvLHV-eUecxQ0gzy4BoB_MIzs4z42UI3tjKKFmXMAjQ_62ZZ0Kjy6dLZHULqXHxS3Q3_1vOKxqgSK_swgEtmcNCdKBy8yJeXtqTlLebeBQIiMbQ_GoSnf9-G3I1CpP456kgNrTMe3ws07Yt981IlCc81TYeQUZ4/s16000/claude-security.webp" title="Claude Security code scanning tool" /&gt;&lt;/div&gt;&lt;p&gt;Anthropic has opened Claude Security to all Claude Enterprise customers in public beta, marking a significant shift in how organisations can defend their software.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The tool uses Claude Opus 4.7 — currently one of the strongest generally available models for security analysis — to scan entire codebases, trace how data moves through code, and generate targeted patches for developer review. No custom API integration or agent-building is required; if your organisation already runs Claude, you can point it at a GitHub repository and start scanning today.&lt;/p&gt;&lt;p&gt;The stakes behind this launch are not subtle. &lt;a href="https://claude.com/product/claude-security" rel="nofollow" target="_blank"&gt;Anthropic says&lt;/a&gt; that hundreds of organizations tested the tool in a closed research preview since February, uncovering exploits in production code — including vulnerabilities that existing tools had missed for years.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The predecessor model, Claude Opus 4.6, found over 500 vulnerabilities in production open-source codebases — bugs that had gone undetected for decades despite years of expert review. Patches and coordinated disclosures for those findings are ongoing.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;How it actually works&lt;/h3&gt;&lt;p&gt;Unlike traditional static analysis tools (rule-based scanners that match code against known vulnerability patterns), Claude reads and reasons about code the way a human security researcher would: understanding how components interact, tracing how data moves through an application, and catching complex vulnerabilities that rule-based tools miss.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;!--[ Defer iframe ]--&gt;
&lt;/p&gt;&lt;div class="videoYt"&gt;
  &lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="" class="lazy" data-src="//www.youtube.com/embed/0SgCiUfoYo8" title="Lazy video iframe"&gt;&lt;/iframe&gt;
&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Every finding then passes through a multi-stage verification pipeline where the model challenges its own conclusions before surfacing results to an analyst, reducing false positives and attaching a confidence rating to each issue.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Findings are organised by severity — High, Medium, or Low — based on exploitability in the specific codebase, not just vulnerability category.&amp;nbsp;&lt;/p&gt;&lt;p&gt;A High-severity finding means an unauthenticated remote attacker could exploit it against a default deployment with no meaningful preconditions. Each finding also includes the affected file and line number, reproduction steps, and a suggested patch users can open directly in Claude Code on the Web to review and apply.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What's new in the public beta&lt;/h3&gt;&lt;p&gt;Feedback from the preview shaped several additions in today's release. Teams can now schedule recurring scans — a weekly cadence ties well to sprint boundaries or pre-release checkpoints. Scans can be scoped to a specific directory within a repository, which meaningfully improves success rates on large monorepos.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Dismissed findings can carry documented reasons, building an audit trail for future reviewers. Results export as CSV or Markdown, and per-project webhooks push scan events into Slack, Jira, or other existing tracking systems in real time.&lt;/p&gt;&lt;p&gt;Claude Security sits alongside Anthropic's more restricted Project Glasswing initiative, where the far more capable — and more dangerous — Claude Mythos Preview model is being used with a vetted set of partners. Mythos-class capabilities are expected to become more broadly available within the next year or two, and the volume of downstream vulnerability findings will increase substantially.&lt;/p&gt;&lt;p&gt;Claude Security is Anthropic's answer for the wider enterprise market right now: less powerful, but accessible, with safeguards built in.&lt;/p&gt;&lt;p&gt;On the partner front, CrowdStrike, Palo Alto Networks, SentinelOne, TrendAI, and Wiz are embedding Opus 4.7 into their security platforms, while Accenture, BCG, Deloitte, Infosys, and PwC are helping enterprises deploy Claude-integrated security solutions for vulnerability management, secure code review, and incident response.&lt;/p&gt;&lt;p&gt;Currently, only GitHub-hosted repositories are supported. Access for the Claude Team and Max plan customers is expected soon. Organisations whose legitimate security work triggers Opus 4.7's built-in cyber safeguards can apply for Anthropic's Cyber Verification Program to continue operating without interruption.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikcIWqdz-QB328w4w7_nzbsiew9O1DvvLHV-eUecxQ0gzy4BoB_MIzs4z42UI3tjKKFmXMAjQ_62ZZ0Kjy6dLZHULqXHxS3Q3_1vOKxqgSK_swgEtmcNCdKBy8yJeXtqTlLebeBQIiMbQ_GoSnf9-G3I1CpP456kgNrTMe3ws07Yt981IlCc81TYeQUZ4/s72-c/claude-security.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Lightning PyPI Package Compromised in Supply Chain Attack</title><link>https://www.cyberkendra.com/2026/04/lightning-pypi-package-compromised-in.html</link><category>Security</category><category>Supply Chain</category><pubDate>Thu, 30 Apr 2026 20:15:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-2932520856885183479</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="lightning PyPI Package Compromised" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhllnkRgVQolHxMHwVXvtEMQKvlpKwWvHDH3vZUfr0kHqGJrh79Azxp6WT1EbEyIyhHGsKmw42jlWs2J6IjPrqS1ZD9jzsnx0AmwQX2e-KT6JWOqKAkB-phXRCfGeB7k9AVQ2ej2o_xbMJyBg7j2UJO_4L44ssh75mb3GRMIAu_B4_BsVAvapNZO19q8tE/s16000/lightning.webp" title="lightning PyPI Package Compromised" /&gt;&lt;/div&gt;&lt;p&gt;If you're building, training, or shipping AI models with PyTorch Lightning, check your installed version immediately — two freshly published releases of the &lt;code&gt;lightning&lt;/code&gt; package on PyPI have been weaponised to silently steal credentials the moment you import the library.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Socket's research team today confirmed that versions 2.6.2 and 2.6.3 of the popular deep learning framework are malicious. Version 2.6.1, published January 30, 2026, is clean. Version 2.6.2, published today (April 30, 2026), is where the malicious code was introduced — and Socket's AI scanner flagged both versions as potentially malicious just eighteen minutes after publication.&lt;/p&gt;&lt;p&gt;The timing is critical. Lightning receives hundreds of thousands of downloads per day and millions per month, making this among the highest-impact PyPI compromises of the year.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What the malware actually does&lt;/h3&gt;&lt;p&gt;The attack is surgical and stealthy. The malicious package hides a &lt;code&gt;_runtime&lt;/code&gt; directory containing a downloader and an obfuscated JavaScript payload. The execution chain fires automatically the moment the &lt;code&gt;lightning&lt;/code&gt; module is imported — no additional interaction required.&lt;/p&gt;&lt;p&gt;Under the hood, Socket's analysis found two core components: &lt;code&gt;start.py&lt;/code&gt;, which downloads and executes Bun (a JavaScript runtime) directly from GitHub, and &lt;code&gt;router_runtime.js&lt;/code&gt; — an 11 MB obfuscated payload that runs silently in a daemon thread with suppressed output.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The use of Bun to execute an obfuscated JavaScript payload is a hallmark of the Shai-Hulud worm family, and Socket flagged clear overlaps: the obfuscated JavaScript payload shares similarities with Shai-Hulud attacks, with overlapping targeted tokens, credentials, and obfuscation methods. Socket also found signs that &lt;code&gt;router_runtime.js&lt;/code&gt; both poisons GitHub repositories and infect developer npm packages.&lt;/p&gt;&lt;p&gt;The payload's scope is broad: the JavaScript file contains over 703 references to &lt;code&gt;process&lt;/code&gt; and &lt;code&gt;env&lt;/code&gt;, more than 463 references to tokens and authentication, and 336 references to repositories — alongside credential exfiltration patterns consistent with the theft of developer and cloud credentials, and GitHub API abuse designed to commit encoded data to repositories using stolen tokens.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The GitHub cover-up&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" data-original-height="575" data-original-width="805" height="229" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDwoPeTY8HR_HGMQeDqP5_v07yiWis1eejOT8SpDTYWSdOlFIby7VG-7UM8DwvXA1hWNdPFC_eneb0StUAjiZYZAoOvMdbWFz8OtSAs1dxamxKGLxEfu6N4QR0KjwZ4RrdX3-bfER0o6EhtSO-xLCkecSGcPnRdvEEq0gmaKOvT7VgicYfdlUVf0PmBgc/s320/commit.webp" width="320" /&gt;&lt;/div&gt;&lt;p&gt;A community member first flagged the compromise in Lightning-AI's GitHub repository under issue &lt;a href="https://github.com/Lightning-AI/pytorch-lightning/issues/21691" rel="nofollow" target="_blank"&gt;#21689&lt;/a&gt;, describing the hidden execution chain. That issue was closed without a public explanation. Socket then opened a follow-up warning issue in the Lightning-AI/pytorch-lightning repository. It was closed within one minute by the &lt;code&gt;pl-ghost&lt;/code&gt; account, which posted a "SILENCE DEVELOPER" meme in response. This behaviour strongly suggests the project's GitHub account is itself compromised.&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Part of a larger wave&lt;/h3&gt;&lt;p&gt;This attack doesn't exist in isolation. As Cyber Kendra has been tracking, the sprawling TeamPCP supply chain campaign has also &lt;a href="https://www.cyberkendra.com/2026/04/lapsus-dumps-checkmarx-data-on-dark-web.html" target="_blank"&gt;compromised Checkmarx's KICS Docker images and Bitwarden's CLI npm package&lt;/a&gt;, with hackers leaving it live long enough to harvest AWS keys, GitHub tokens, and SSH credentials.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Just last week, three separate supply chain attacks hit npm, PyPI, and Docker Hub between April 21–23, all targeting the same prize: API keys, cloud credentials, SSH keys, and tokens from developer environments and CI/CD pipelines.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What you need to do right now&lt;/h3&gt;&lt;p&gt;Socket recommends treating any environment that has installed and imported either 2.6.2 or 2.6.3 as fully compromised. The immediate checklist:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Remove &lt;code&gt;lightning&lt;/code&gt; 2.6.2 and 2.6.3 from all systems and downgrade to 2.6.1&lt;/li&gt;&lt;li&gt;Rotate all credentials that may have been exposed — GitHub tokens, npm tokens, AWS/GCP/Azure keys, and any secrets stored in environment variables&lt;/li&gt;&lt;li&gt;Audit your GitHub repositories for unexpected commits or encoded data&lt;/li&gt;&lt;li&gt;Inspect CI/CD logs and developer machines where the package may have been imported&lt;/li&gt;&lt;li&gt;Flag any npm packages published from affected machines for review, as the malware is capable of infecting npm tarballs&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Socket is continuing its analysis and has pledged a deeper technical write-up as more indicators of compromise are confirmed.&lt;/p&gt;&lt;p&gt;This story is developing.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhllnkRgVQolHxMHwVXvtEMQKvlpKwWvHDH3vZUfr0kHqGJrh79Azxp6WT1EbEyIyhHGsKmw42jlWs2J6IjPrqS1ZD9jzsnx0AmwQX2e-KT6JWOqKAkB-phXRCfGeB7k9AVQ2ej2o_xbMJyBg7j2UJO_4L44ssh75mb3GRMIAu_B4_BsVAvapNZO19q8tE/s72-c/lightning.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>CVE-2026-41940: cPanel Authentication Bypass Was Already Being Exploited Before the Patch Even Dropped</title><link>https://www.cyberkendra.com/2026/04/cpanel-authentication-bypass-was.html</link><category>Internet</category><category>Security</category><category>Vulnerability</category><pubDate>Wed, 29 Apr 2026 21:11:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-2382056255009767350</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="cPanel Auth Bypass vulnerability" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM_y9FqUnBgKP5YhVBcFdHlhggl4VbDQqc4Xnuk-NDiDKVRDui_-TmycVNuUpLAT8BP4slkeR0aJEHqEp0obFb3U5JA15F6gMwsu4TV0cN5ki6rn45CFBXYHl6n0dZe1vrP2WxxbMK0RaT8XBz9BA9fNlKnzdVuMKKfTLR410MFkFW5VEtilEnbWfpE7g/s16000/cPanel-login-bypass.webp" title="cPanel Auth Bypass vulnerability" /&gt;&lt;/div&gt;&lt;p&gt;On April 28, 2026, &lt;b&gt;cPanel pushed an emergency security update&lt;/b&gt; for what it described as a vulnerability affecting "various authentication paths" across all currently supported versions of cPanel and WHM (Web Host Manager — the server-level admin interface that controls virtually everything on a shared hosting server).&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The &lt;a href="https://support.cpanel.net/hc/en-us/articles/40073787579671-cPanel-WHM-Security-Update-04-28-2026" rel="nofollow" target="_blank"&gt;advisory&lt;/a&gt; was clinical and brief. What it didn't say was that attackers were already inside.&lt;/p&gt;&lt;p&gt;The vulnerability, now tracked as&lt;b&gt; CVE-2026-41940&lt;/b&gt;, is a CRLF injection flaw (a technique in which an attacker inserts hidden line breaks to manipulate file-based records) in cPanel's session-handling code. The root cause: a sanitization function called &lt;code&gt;filter_sessiondata&lt;/code&gt; existed but was never called inside &lt;code&gt;saveSession&lt;/code&gt; itself — every caller was expected to invoke it manually, and one critical code path in the core server daemon &lt;code&gt;cpsrvd&lt;/code&gt; simply didn't.&lt;/p&gt;&lt;p&gt;KnownHost confirmed the exploitation window wasn't hours — it was at least 30 days. The vulnerability had been used as a zero-day against the management layer of a significant portion of the internet long before cPanel acknowledged a problem existed.&amp;nbsp;&lt;/p&gt;&lt;p&gt;WatchTowr's researchers demonstrated the full attack chain. An attacker first triggers a failed login to mint a pre-authentication session, then sends a crafted HTTP Basic Authorization header — with the password field stuffed with &lt;code&gt;&lt;b&gt;\r\n&lt;/b&gt;&lt;/code&gt;-separated fake session records — while stripping the session cookie's encryption key. Those injected records land in the on-disk session file raw.&amp;nbsp;&lt;/p&gt;&lt;p&gt;A second request, deliberately sent without a security token, forces cPanel to re-read the raw file and flush the injected data into the JSON cache. From that point, every subsequent request sees those forged values as legitimate session keys — including &lt;code&gt;hasroot=1&lt;/code&gt; and &lt;code&gt;successful_internal_auth_with_timestamp&lt;/code&gt;, a flag that instructs cPanel to skip password validation entirely and return &lt;code&gt;AUTH_OK&lt;/code&gt; unconditionally.&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;i&gt;No password. No brute force. Full root-level access to WHM.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;A web hosting and domain registration company, &lt;a href="https://www.namecheap.com/status-updates/ongoing-critical-security-vulnerability-in-cpanel-april-28-2026/" rel="nofollow" target="_blank"&gt;Namecheap, disclosed&lt;/a&gt; that it "relates to an authentication login exploit that could allow unauthorised access to the control panel."&lt;/p&gt;&lt;p&gt;Hosting providers, including Namecheap, KnownHost, hosting.com, HostPapa, and InMotion Hosting, all blocked cPanel ports at the network level while waiting for the patch. cPanel released a fix roughly 2–3 hours after the public advisory, with full deployment across major providers taking 6–7 hours.&lt;/p&gt;&lt;p&gt;The numbers make the stakes clear. With over 70 million domains relying on cPanel, the flaw dramatically expanded the attack surface, potentially enabling mass website defacement, data exfiltration, and server compromise across the hosting supply chain.&lt;/p&gt;&lt;p&gt;But the timeline raises harder questions. An industry source told webhosting.today that the vulnerability had been reported to cPanel approximately two weeks before the April 28 public advisory, and that cPanel's initial response was that nothing was wrong.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Hosting.com's incident communications described the issue as having been "responsibly disclosed to cPanel," confirming that private disclosure preceded the public advisory. The gap between "we told them" and "patch available" is the window during which active exploitation occurred. Webhosting&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What you need to do right now:&lt;/h3&gt;&lt;p&gt;If you manage a cPanel server, run &lt;code&gt;/scripts/upcp --force&lt;/code&gt; as root to force the update, then verify your version with &lt;code&gt;/usr/local/cpanel/cpanel -V&lt;/code&gt;. Patched builds are: 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, 11.136.0.5, and WP Squared 11.136.1.7.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Servers running unsupported or end-of-life versions will not receive patches and should be treated as actively compromised until proven otherwise. Enable two-factor authentication on WHM, restrict access to trusted IPs only, and audit your login logs for any suspicious access during the April 28 window before port blocks went into effect.&amp;nbsp;&lt;/p&gt;&lt;p class="note"&gt;&lt;i&gt;*The article has been updated after the WatchTowr post.&lt;/i&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM_y9FqUnBgKP5YhVBcFdHlhggl4VbDQqc4Xnuk-NDiDKVRDui_-TmycVNuUpLAT8BP4slkeR0aJEHqEp0obFb3U5JA15F6gMwsu4TV0cN5ki6rn45CFBXYHl6n0dZe1vrP2WxxbMK0RaT8XBz9BA9fNlKnzdVuMKKfTLR410MFkFW5VEtilEnbWfpE7g/s72-c/cPanel-login-bypass.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Copy Fail - A 732-Byte Python Script Can Get Root on Every Major Linux Distro</title><link>https://www.cyberkendra.com/2026/04/a-732-byte-python-script-can-get-root.html</link><pubDate>Wed, 29 Apr 2026 23:42:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-1779087465856852661</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Critical Linux flaw exposes billions of devices to root compromise" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1bCUZUrmEmXE35b_gFo-4_SzNeZ9awtpTsxSofMRHf5Mote8x6JsE0J3vhkW07UJ56TRpzLVbros7jbOlADFNUZI_i5B-mv4lOyuRHIe-u2Fvz8DBD9mxOZyL3WzeoCZZOYZ-8PU3zu-cU1NMr-ebrrxJlqx0WHVcsEVLN4x8SC_tlLeAKlkTM7_v4nA/s16000/Copy%20Fail.webp" title="Critical Linux flaw exposes billions of devices to root compromise" /&gt;&lt;/div&gt;&lt;p&gt;A newly disclosed vulnerability in the Linux kernel gives any unprivileged local user a reliable, one-shot path to root — and it has been sitting undetected for nearly a decade. The exploit is a single 732-byte Python script. It works unmodified on Ubuntu, Amazon Linux, Red Hat Enterprise Linux, and SUSE. No guesswork, no timing windows, no per-distribution tuning required.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Researchers at Theori's &lt;a href="https://copy.fail/" rel="nofollow" target="_blank"&gt;Xint Code team published&lt;/a&gt; the details today under the name &lt;b&gt;Copy Fail&lt;/b&gt; (&lt;b&gt;CVE-2026-31431&lt;/b&gt;), disclosing both the root cause and a working proof-of-concept after coordinated patching with the Linux kernel security team.&lt;/p&gt;&lt;p&gt;Most Linux privilege escalation bugs demand some form of luck — a race condition to win, a kernel version to match, a compiled payload to stage. Copy Fail eliminates all of that. It is a straight-line logic flaw: run it once, get root. Researchers directly tested kernel lines 6.12, 6.17, and 6.18 across four distributions and observed a root shell every time.&lt;/p&gt;&lt;p&gt;The write-up draws a deliberate contrast with two famous predecessors. Dirty Cow (2016) required winning a memory-subsystem race, sometimes crashing the machine in the process. Dirty Pipe (2022) was limited to specific kernel versions and needed careful pipe-buffer manipulation. Copy Fail needs none of that — the same script simply works everywhere.&lt;/p&gt;&lt;p&gt;The bug lives at the intersection of three independent kernel changes made between 2011 and 2017 — none problematic on its own. The Linux kernel exposes its cryptographic subsystem to unprivileged userspace through a socket type called &lt;code&gt;AF_ALG&lt;/code&gt;. A separate system call, &lt;code&gt;splice()&lt;/code&gt;, can transfer file data between file descriptors without copying it — passing references to the kernel's own cached pages of a file directly into the crypto subsystem.&lt;/p&gt;&lt;p&gt;In 2017, an optimization was added to &lt;code&gt;algif_aead.c&lt;/code&gt; that made AEAD (authenticated encryption) operations run "in-place," meaning the input and output scatterlists (memory maps used for crypto operations) pointed to the same location. This put live, shared page-cache pages into what the crypto layer treated as a writable destination. That mattered because of a separate, older bug in &lt;code&gt;authencesn&lt;/code&gt; — a crypto wrapper used by IPsec for extended sequence numbers — which writes 4 bytes past the legitimate end of its output buffer as a scratch-pad operation and never restores them.&lt;/p&gt;&lt;p&gt;Together: an attacker splices any readable file's page cache into the crypto path, triggers an &lt;code&gt;authencesn&lt;/code&gt; decryption, and that scratch write lands 4 controlled attacker-chosen bytes at a chosen offset inside the kernel's cached copy of that file. The HMAC check fails and &lt;code&gt;recvmsg()&lt;/code&gt; returns an error — but the write already happened.&lt;/p&gt;&lt;p&gt;The default target is &lt;code&gt;/usr/bin/su&lt;/code&gt;, a setuid-root binary on every tested distribution. Repeat the operation for each 4-byte chunk of shellcode, then call &lt;code&gt;execve("/usr/bin/su")&lt;/code&gt;.&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" data-original-height="903" data-original-width="1024" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBd8dDIyPHkHJrkjVMrarFIqDUfrawnwKEXuIS3-Hs3UbAidCB5-8phMJDkmAkRdREPPev17vCXnTTmwZdYvAcl_E0vOgOl8vLVzP5TyCTZhvmiXJ5dJZqskxqvjvDCWTSVHrd6FVAu4mQpsa6pA2gQfPGxWNEusOzU1m9Ii73sy9hAvIgbfEVVbH70dE/s16000/demo.gif" /&gt;&lt;/div&gt;The kernel loads the binary from the now-corrupted page cache. Because &lt;b&gt;su&lt;/b&gt; is setuid, the shellcode runs as root.&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Affected distributions&lt;/h3&gt;&lt;p&gt;&lt;b&gt;Ubuntu 24.04 LTS, Amazon Linux 2023, RHEL 14.3, SUSE 16, Debian, Arch, Fedora, Rocky, Alma, and other distributions running kernels built between 2017&lt;/b&gt; and the patch are also affected.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The container problem&lt;/h3&gt;&lt;p&gt;Copy Fail does not stop at the host. Because the Linux page cache is shared across all processes on a system — including across container boundaries — a compromised container or pod can use this primitive to tamper with the host's cached binaries and escape to the underlying node. The researchers are publishing a separate follow-up detailing the Kubernetes escape path.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;How it was found&lt;/h3&gt;&lt;p&gt;The discovery was a collaboration between human insight and AI tooling. Theori researcher Taeyang Lee identified &lt;code&gt;AF_ALG&lt;/code&gt; combined with &lt;code&gt;splice()&lt;/code&gt; as a promising attack surface — recognizing that this path could feed page-cache pages of read-only files directly into the kernel crypto subsystem.&amp;nbsp;&lt;/p&gt;&lt;p&gt;That hypothesis was fed as an operator prompt into Xint Code, an AI-assisted security audit tool, which scanned the entire &lt;code&gt;crypto/&lt;/code&gt; subsystem in roughly an hour. Copy Fail was the highest-severity finding in the run. The same scan surfaced additional high-severity vulnerabilities still under coordinated disclosure.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What to do right now&lt;/h3&gt;&lt;p&gt;Update your distribution's kernel package. The fix (mainline commit a664bf3d603d) reverts the 2017 in-place optimization in &lt;code&gt;&lt;b&gt;algif_aead.c&lt;/b&gt;&lt;/code&gt;, separating source and destination scatterlists so page-cache pages can no longer end up in a writable crypto destination. Major distributions are shipping the fix now.&lt;/p&gt;&lt;p&gt;If you cannot patch immediately, disable the algif_aead kernel module. This breaks nothing for the vast majority of systems — dm-crypt, LUKS, IPsec, TLS, SSH, and standard OpenSSL/GnuTLS builds all use the in-kernel crypto API directly and do not go through &lt;code&gt;AF_ALG&lt;/code&gt;:&lt;/p&gt;&lt;pre&gt;echo "install algif_aead /bin/false" &amp;gt; /etc/modprobe.d/disable-algif.conf&lt;br /&gt;rmmod algif_aead 2&amp;gt;/dev/null || true&lt;/pre&gt;&lt;p&gt;For containerized or multi-tenant workloads, block &lt;code&gt;AF_ALG&lt;/code&gt; socket creation via seccomp policy regardless of patch state. The page-cache corruption does not persist across reboots — the cached page reloads clean from disk — but the root shell obtained before reboot is fully real.&lt;/p&gt;&lt;p&gt;The proof-of-concept is published on &lt;a href="https://github.com/theori-io/copy-fail-CVE-2026-31431/blob/main/copy_fail_exp.py" rel="nofollow" target="_blank"&gt;GitHub&lt;/a&gt;. The researchers ask that it be used only on systems the tester owns or has written authorization to test.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1bCUZUrmEmXE35b_gFo-4_SzNeZ9awtpTsxSofMRHf5Mote8x6JsE0J3vhkW07UJ56TRpzLVbros7jbOlADFNUZI_i5B-mv4lOyuRHIe-u2Fvz8DBD9mxOZyL3WzeoCZZOYZ-8PU3zu-cU1NMr-ebrrxJlqx0WHVcsEVLN4x8SC_tlLeAKlkTM7_v4nA/s72-c/Copy%20Fail.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>SAP CAP npm Packages Backdoored in "Mini Shai-Hulud" Attack — Rotate Your Tokens Now</title><link>https://www.cyberkendra.com/2026/04/sap-cap-npm-packages-backdoored-in-mini.html</link><category>Security</category><pubDate>Wed, 29 Apr 2026 20:29:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-4513520577047975487</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="SAP Hacked in Supply Chain Attack" border="0" data-original-height="1024" data-original-width="2048" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCJHGZLtSJ7CUnprbgND_1uHpe7SQYFTmlmd-go5X4FLQIEt99guQBzDMHKboGDXHayU1k26CBUmUyUb-MNHfY4QhjPHWDeaJjdbVdPqHxtpffX4pLnSLvjsLKyOsPws3QO-MjqtbVPG3Q8fj_M77N7u7s8MAsoHrq4UJAJ2B7K5tZ2mMQOs_u6wYR8XU/s16000/SAP-hacked.webp" title="SAP Hacked in Supply Chain Attack" /&gt;&lt;/div&gt;&lt;p&gt;Four npm packages at the heart of SAP's enterprise development ecosystem were quietly backdoored on Tuesday, April 29, 2026 — weaponizing the routine &lt;code&gt;npm install&lt;/code&gt; command to drain credentials from developer machines and corporate CI/CD pipelines.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The operation, which researchers are calling "&lt;b&gt;&lt;a href="https://www.cyberkendra.com/2025/11/sha1-hulud-20-destructive-worm-hijacks.html" target="_blank"&gt;Mini Shai-Hulud&lt;/a&gt;&lt;/b&gt;," has already left a visible scar across GitHub: over 1,000 developer repositories have been poisoned, all stamped with the same attacker's signature — "A Mini Shai-Hulud has Appeared."&lt;/p&gt;&lt;p&gt;The compromised packages are&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style="text-align: left;"&gt;&lt;li&gt;&lt;b&gt;mbt@1.2.48&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;@cap-js/sqlite@2.2.2&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;@cap-js/postgres@2.2.2&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;@cap-js/db-service@2.10.1&lt;/b&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Together, they pull roughly 570,000 weekly downloads. These are not fringe libraries — they are core components of SAP's Cloud Application Programming Model (CAP), used by enterprise teams building cloud applications on SAP's Business Technology Platform, and in MTA (Multi-Target Application) deployment pipelines that touch production SAP systems.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What the Malware Actually Does&lt;/h3&gt;&lt;p&gt;The normal package code in the affected versions still matches the legitimate SAP packages byte-for-byte. The compromise lives entirely in a pre-install hook and two added files. Aikido&lt;/p&gt;&lt;p&gt;Stage one is &lt;code&gt;setup.mjs&lt;/code&gt; — a Bun runtime bootstrapper. It checks the operating system and architecture, downloads Bun 1.3.13 from GitHub when needed, extracts the binary, and runs &lt;code&gt;execution.js&lt;/code&gt; with Bun. Routing the download through an official GitHub release URL was deliberate — it looks like legitimate traffic to most network-level egress filters. Aikido&lt;/p&gt;&lt;p&gt;Stage two is where the real damage happens. &lt;code&gt;execution.js&lt;/code&gt; is an 11MB single-line obfuscated JavaScript blob that hunts for developer credentials in three phases: checking whether it's running inside GitHub Actions (CI/CD), scanning the filesystem and shell environment for GitHub OAuth tokens, npm automation tokens, and AWS/Azure/GCP credentials, then exfiltrating everything over HTTPS to an attacker-controlled C2 endpoint using layered AES-256-GCM plus RSA-OAEP encryption.&lt;/p&gt;&lt;p&gt;For any victim running inside GitHub Actions with a workflow-scoped token, the malware goes further: it uses the stolen token to commit malicious files — including a &lt;code&gt;.vscode/tasks.json&lt;/code&gt; — directly to the victim's own repositories. Any developer who later clones and opens the compromised repository in VS Code will re-trigger the dropper. It's persistence through the developer's own trusted toolchain.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;How the Attacker Got In&lt;/h3&gt;&lt;p&gt;It has &lt;a href="https://x.com/abh1sek/status/2049480221569728761" rel="nofollow" target="_blank"&gt;been reported&lt;/a&gt; that the attacker compromised a legitimate SAP developer account (RoshniNaveenaS) and modified a GitHub Actions workflow to exchange a GitHub OIDC (OpenID Connect) token for a live npm publish token scoped to&lt;code&gt; @cap-js/sqlite&lt;/code&gt;.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The critical flaw: npm's trusted publishing configuration for that package trusted any workflow in the &lt;code&gt;cap-js/cds-dbs&lt;/code&gt; repository — not just the canonical release workflow on the &lt;code&gt;main&lt;/code&gt; branch. A push to a non-main branch was enough to obtain a valid publish credential.&lt;/p&gt;&lt;p&gt;The &lt;code&gt;mbt&lt;/code&gt; package used a separate maintainer set, and its publish token appears to have been stolen through a different, as-yet-unconfirmed vector.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Familiar Playbook, High-Value Target&lt;/h3&gt;&lt;p&gt;The attack's hallmarks — Bun-as-dropper, preinstall-phase execution, obfuscated credential harvester, repository poisoning — connect it directly to the Shai-Hulud malware family that has plagued the npm ecosystem since late 2025.&amp;nbsp;&lt;/p&gt;&lt;p&gt;As we covered at Cyber Kendra, the original Shai-Hulud campaign compromised over 700 npm packages, including &lt;a href="https://www.cyberkendra.com/2025/09/shai-hulud-attack-escalates-crowdstrike.html" target="_blank"&gt;official CrowdStrike packages&lt;/a&gt;, and its second wave impacted more than 27,000 GitHub repositories and exposed approximately 14,000 secrets across hundreds of organizations. This latest variant targets a narrower set of packages but targets a far more privileged environment — enterprise SAP pipelines with access to production cloud infrastructure.&lt;/p&gt;&lt;p&gt;The payload targets GitHub, npm, cloud providers, Kubernetes, CI secrets, and local developer tooling — do not limit rotation to npm tokens.&amp;nbsp;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What You Need to Do Right Now&lt;/h3&gt;&lt;p&gt;If any of the four affected versions touched your environment on or after April 29, 2026:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;b&gt;Rotate everything immediately — &lt;/b&gt;GitHub tokens (all scopes), npm tokens, AWS/Azure/GCP access keys, and any CI/CD secrets&lt;/li&gt;&lt;li&gt;&lt;b&gt;Audit your repositories&lt;/b&gt; for unexpected &lt;code&gt;tasks.json&lt;/code&gt; additions in &lt;code&gt;.vscode/&lt;/code&gt; or &lt;code&gt;.claude/&lt;/code&gt; directories, and search your GitHub account for the description string "A Mini Shai-Hulud has Appeared."&lt;/li&gt;&lt;li&gt;&lt;b&gt;Review CI/CD logs &lt;/b&gt;for unexpected Bun process spawns from temp directories during &lt;code&gt;npm install&lt;/code&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Check lockfiles &lt;/b&gt;for the four compromised version strings and downgrade to the last clean versions (&lt;code&gt;@cap-js/sqlite@2.2.1&lt;/code&gt;, &lt;code&gt;@cap-js/postgres@2.2.1&lt;/code&gt;,&lt;code&gt;@cap-js/db-service@2.10.0&lt;/code&gt;, &lt;code&gt;mbt@1.2.47&lt;/code&gt;)&lt;/li&gt;&lt;li&gt;&lt;b&gt;Harden OIDC publishing configs&lt;/b&gt; by scoping trusted publishers to a specific workflow file on a protected branch, not a repository broadly&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Socket is actively tracking the campaign. This is a developing story.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCJHGZLtSJ7CUnprbgND_1uHpe7SQYFTmlmd-go5X4FLQIEt99guQBzDMHKboGDXHayU1k26CBUmUyUb-MNHfY4QhjPHWDeaJjdbVdPqHxtpffX4pLnSLvjsLKyOsPws3QO-MjqtbVPG3Q8fj_M77N7u7s8MAsoHrq4UJAJ2B7K5tZ2mMQOs_u6wYR8XU/s72-c/SAP-hacked.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Why Some MacBook Features Break after macOS Updates</title><link>https://www.cyberkendra.com/2026/04/why-some-macbook-features-break-after.html</link><category>Learn</category><category>MacOS</category><category>Tips</category><pubDate>Mon, 27 Apr 2026 22:57:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-1182954945953696748</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Macbook macOS Updates" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzAE2GUznKlVJ34_78zL1wX6i6PEeYwf-d3DW3NuGt52W9rrXZmUIFwtqmF9UisubW_fSbaajYmT92o0tXv-GXuA_FIFhPDBFDtTs8mnP4TfedrcZnGKPS9wb0ppt005Rn5yR9MYBasgos3RBIItn9ZmgHIFhqSPn06bBHNJmnZi_MwAGW1OhxSjFr1ZA/s16000/macos-update.webp" title="Macbook macOS Updates" /&gt;&lt;/div&gt;&lt;p&gt;No Mac user can deny that macOS updates are necessary. They improve the system’s entire performance and keep it stable over time. Apple’s updates usually install without any issues and bring noticeable improvements to daily use.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;However, some users notice that certain features behave strangely after an update. They used to work without interruptions, but stopped responding out of nowhere. Users report problems with connectivity, input controls, or system interface. The changes usually result from adjustments in the way macOS manages system resources.&amp;nbsp;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Changes with a macOS Update&lt;/h3&gt;&lt;p&gt;With each macOS update, the system replaces important components that control how the MacBook works. These may be system frameworks that control hardware components and background services. The features that depend on these components may behave differently until the system stabilises.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Users who find their &lt;a href="https://cleanmymac.com/blog/touch-bar-not-showing" target="_blank"&gt;Touch Bar not working on MacBook&lt;/a&gt; right after an update are often dealing with exactly this kind of reset. The Touch Bar is a good example of how tightly integrated some features are with macOS.&amp;nbsp;&lt;/p&gt;&lt;p&gt;It relies on UI frameworks and background processes. If the update resets any of these elements, the feature may be unresponsive or just disappear. The same thing happens with other macOS features that depend on the connection between software and hardware. Post-update issues often affect several system components at once.&amp;nbsp;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Common Features that Break after Updates&lt;/h3&gt;&lt;p&gt;Features that depend on how hardware and system processes interact are the ones that suffer the most after a macOS update.&amp;nbsp;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Hardware-associated features&lt;/h4&gt;&lt;p&gt;Some functionalities depend on the way macOS connects with hardware:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Touch Bar&amp;nbsp;&lt;/li&gt;&lt;li&gt;Trackpad&amp;nbsp;&lt;/li&gt;&lt;li&gt;Keyboard backlight&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Hardware-linked features need low-level system services, so even small changes in how those services load affect their responsiveness.&amp;nbsp;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Connectivity and System Services&lt;/h3&gt;&lt;p&gt;Many users report network-related issues after an update:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Wi-Fi connections dropping&amp;nbsp;&lt;/li&gt;&lt;li&gt;Bluetooth devices are disconnecting or not pairing&lt;/li&gt;&lt;li&gt;&lt;a href="https://discussions.apple.com/thread/256243942?sortBy=rank" rel="nofollow" target="_blank"&gt;AirDrop&lt;/a&gt; and Handoff inconsistencies&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Power management&lt;/h4&gt;&lt;p&gt;These glitches aren’t noticeable right after the update, but users see them after a while:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Wrong battery percentage reporting&amp;nbsp;&lt;/li&gt;&lt;li&gt;Increased fan activity&amp;nbsp;&lt;/li&gt;&lt;li&gt;Background processes are eating up more resources than they used to&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;These issues result from system reindexing, cache rebuilding, or updated power management. The system needs time to stabilise after the update.&amp;nbsp;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Why Does This Happen?&lt;/h3&gt;&lt;p&gt;The unresponsiveness is coming from the way macOS transitions from the old system state to the new one. Even when an update is correctly installed, several background changes can “break” how the features behave.&lt;/p&gt;&lt;p&gt;If macOS replaces system drivers or modifies important frameworks, it’s a big deal. Hardware takes time to adjust to the new configuration. If something doesn’t load properly on the first boot, you assume the feature doesn’t work. Actually, the hardware is completely fine.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Outdated caches are another cause of failure. macOS needs caches to perform indexing and launch apps without delays. After you update, the caches may not match the updated system files. Until they are rebuilt, you’ll notice slowdowns or even missing interface elements.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Permission and security changes play another role. New macOS versions introduce stricter controls on apps. This can reset previously granted permissions or block some background processes.&amp;nbsp;&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;How to Troubleshoot after a macOS Update&lt;/h2&gt;&lt;p&gt;In most cases, these steps are enough to solve the problem:&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Restart&amp;nbsp;&lt;/h4&gt;&lt;p&gt;This is a basic step that can fix many post-update issues. It forces macOS to reload system services and complete background setup tasks. If the problem doesn’t go away, check Activity Monitor for processes that aren’t responding. If needed, restart them.&amp;nbsp;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;System-level resets&lt;/h4&gt;&lt;p&gt;If that didn’t work, try this:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Reset NVRAM/PRAM (on Intel Macs). This can fix problems with the display, sound, and some hardware settings.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Reset SMC (on Intel Macs). That’s useful for power, battery, and thermal behaviour.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;On Macs with Apple Silicon chips, a full restart performs most low-level resets that SMC/NVRAM used to handle. You can try a complete shutdown, and power on after a few minutes to see if the system resets power-related states.&amp;nbsp;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Review software compatibility&lt;/h3&gt;&lt;p&gt;It’s important to check if all apps you’ve installed are fully compatible with the current macOS version. Temporarily uninstalling (or at least disabling) problematic apps can help.&amp;nbsp;&lt;/p&gt;&lt;p&gt;If you tried all steps and none of them worked, it may be a known system bug. Apple usually addresses such problems through minor updates, so check for the latest patches.&amp;nbsp;&lt;/p&gt;&lt;p&gt;In most cases, post-update issues are temporary. The system should stabilise as macOS completes its background processes and adjusts to the new environment.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzAE2GUznKlVJ34_78zL1wX6i6PEeYwf-d3DW3NuGt52W9rrXZmUIFwtqmF9UisubW_fSbaajYmT92o0tXv-GXuA_FIFhPDBFDtTs8mnP4TfedrcZnGKPS9wb0ppt005Rn5yR9MYBasgos3RBIItn9ZmgHIFhqSPn06bBHNJmnZi_MwAGW1OhxSjFr1ZA/s72-c/macos-update.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>A Single Git Push Was All It Took to Compromise GitHub — Millions of Repos Were Exposed</title><link>https://www.cyberkendra.com/2026/04/a-single-git-push-was-all-it-took-to.html</link><category>GitHub</category><category>Security</category><category>Vulnerability</category><pubDate>Tue, 28 Apr 2026 22:36:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-4076703422660127294</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="GitHub RCE - CVE-2026-3854" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitgxqdavylr-td_2BllUW1TRenAVlbvl9IPrYPpHnwMnf_dQAui_Jh50T-NFbqa3XWsWN5Cuj_t2A725LxjCcaw_b5vIjf4T0i-pIK8_KHJKMZs_E-_UlDjhDbzuEEGfLZ5fgBmz-wUQbVnCFrmXyhGWGDyJ-9ahRx0pRMQ3XoT3YuReBlnQt8arc0zCs/s16000/CVE-2026-3854.webp" title="GitHub RCE - CVE-2026-3854" /&gt;&lt;/div&gt;&lt;p&gt;A critical vulnerability in GitHub's internal infrastructure allowed any authenticated user to execute arbitrary commands on GitHub's backend servers using nothing more than a standard &lt;code&gt;git push&lt;/code&gt; command — potentially exposing millions of public and private repositories belonging to other users and organizations.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854" rel="nofollow" target="_blank"&gt;Discovered by Wiz Research&lt;/a&gt; and tracked as &lt;b&gt;CVE-2026-385&lt;/b&gt;4, the flaw stems from an injection vulnerability in GitHub's internal X-Stat header — a semicolon-delimited protocol that passes security metadata between the platform's internal services.&amp;nbsp;&lt;/p&gt;&lt;p&gt;When a user runs &lt;code&gt;git push -o&lt;/code&gt; (push options), GitHub's &lt;code&gt;babeld&lt;/code&gt; proxy embeds those user-supplied strings directly into the &lt;code&gt;X-Stat&lt;/code&gt; header without stripping semicolons. Because the header parser uses last-write-wins logic, an attacker can simply inject a semicolon followed by a field name to silently override security-critical settings already set by the server.&lt;/p&gt;&lt;p&gt;From there, Wiz researcher Sagi Tzadik chained three injected fields to achieve full remote code execution: bypassing the production sandbox by overriding &lt;code&gt;rails_env&lt;/code&gt;, redirecting the hook script directory via &lt;code&gt;custom_hooks_dir&lt;/code&gt;, and finally delivering a path traversal payload through &lt;code&gt;repo_pre_receive_hooks&lt;/code&gt; — forcing the system to execute an arbitrary binary as the &lt;code&gt;git&lt;/code&gt; service user with full filesystem access.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img alt="GitHub Remote Code Execution - CVE-2026-3854" border="0" data-original-height="1463" data-original-width="1920" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmSSC_3nl_v2SspFMFhYTZM1T2lT0WHXF13J4A4POSnk-nv8JMRtyOPUtl6knP_NPFDL8NI74ihUCVGQTqj0Q7SKEnPXlzZf2pAcVoq7NveA5weVp7A6rgcv0jmIYKNrAB9WCy1uMQ0yyeqe9TE_NwPb2B_dy2AjcuL7JoZGiL2XAVKcl1btdRhHyt0Co/s16000/CVE-2026-3854.webp" style="margin-left: auto; margin-right: auto;" title="GitHub Remote Code Execution - CVE-2026-3854" /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;GitHub Remote Code Execution - CVE-2026-3854&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;On GitHub Enterprise Server (GHES), this granted complete server compromise. On GitHub.com, one additional injected flag enabled enterprise-mode behavior, and the same exploit chain landed on shared storage nodes hosting repositories across millions of accounts.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Wiz confirmed that the &lt;b&gt;git&lt;/b&gt; user's permissions allowed reading any repository on the compromised node, regardless of ownership — though the researchers say they did not access other tenants' actual data.&lt;/p&gt;&lt;p&gt;GitHub patched GitHub.com within six hours of the disclosure and&lt;a href="https://github.blog/security/securing-the-git-push-pipeline-responding-to-a-critical-remote-code-execution-vulnerability/" rel="nofollow" target="_blank"&gt; released fixes across all supported GHES versions&lt;/a&gt;. However, &lt;b&gt;Wiz warns that 88% of GitHub Enterprise Server instances remain unpatched&lt;/b&gt; at the time of publication. GHES administrators must upgrade to version 3.19.3 or later immediately.&lt;/p&gt;&lt;p&gt;GitHub CISO Alexis Wales called the finding rare, noting it earned one of the highest bug bounty rewards the platform offers.&lt;/p&gt;&lt;p&gt;Notably, the vulnerability was uncovered using AI-assisted reverse engineering through IDA MCP — marking one of the first critical flaws discovered in closed-source binaries with AI tooling.&lt;/p&gt;&lt;p&gt;&lt;b&gt;If you run GitHub Enterprise Server, treat this as a fire drill — patch now.&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitgxqdavylr-td_2BllUW1TRenAVlbvl9IPrYPpHnwMnf_dQAui_Jh50T-NFbqa3XWsWN5Cuj_t2A725LxjCcaw_b5vIjf4T0i-pIK8_KHJKMZs_E-_UlDjhDbzuEEGfLZ5fgBmz-wUQbVnCFrmXyhGWGDyJ-9ahRx0pRMQ3XoT3YuReBlnQt8arc0zCs/s72-c/CVE-2026-3854.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Google Wallet Now Stores Your Aadhaar ID in India — and Expands Digital IDs to Three More Countries</title><link>https://www.cyberkendra.com/2026/04/google-wallet-now-stores-your-aadhaar.html</link><category>Aadhar</category><category>Google</category><category>India</category><pubDate>Tue, 28 Apr 2026 22:11:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-853593926784470860</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Aadhaar ID in India" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxDeJRPRSvWMefb4rGeUTkTuitaUEWDCL-DtB97jghpVqy04tCCI9x_8_Z0zAjTUq86aLPvZmWlmZpWWBPlDVmr2uArwEIx9f6nfLB6h4CsEAWwLEvMQBRI0ILvUYQA8OIFlVpBT2og6sruqhJYogGtKcWDeA-qhfDkRPMTzeuPCwF_RHUinCUSf0VSsw/s16000/Aadhaar-ID.webp" title="Aadhaar ID in India" /&gt;&lt;/div&gt;&lt;p&gt;Google just made carrying a physical ID one step closer to optional. Starting today, Indian users can save their Aadhaar Verifiable Credential directly inside Google Wallet — stored on-device — while users in Singapore, Taiwan, and Brazil gain access to passport-based digital ID passes for the first time.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The Aadhaar integration, built in &lt;a href="https://blog.google/products-and-platforms/platforms/google-pay/aadhaar-digital-id/?utm_source=cyberkendra.com" rel="nofollow" target="_blank"&gt;partnership with UIDAI&lt;/a&gt; (the government body that manages India's national identity system), lets users add their credential in a few taps and present it digitally wherever it's accepted.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The rollout kicks off with five launch partners: PVR INOX for age verification at cinemas, BharatMatrimony for verified profiles, Atlys for auto-filling international visa applications, and Mygate and Snabbit — both coming in the near future — for verifying delivery personnel and gig workers entering residential communities.&lt;/p&gt;&lt;p&gt;Google has implemented selective disclosure, meaning an app or service only sees what it actually needs — a cinema checking your age doesn't get your address or date of birth, just a confirmed yes-or-no on whether you're old enough.&amp;nbsp;&lt;/p&gt;&lt;p&gt;On top of that, Zero Knowledge Proof (ZKP) cryptography lets the system verify a fact about you without exposing the underlying data at all. The integration is built on ISO 18013-5 and the W3C Digital Credentials API, the same global standards used for mobile driving licences in the US and EU, which means the credential is technically interoperable across platforms and future-proofed against fragmentation.&lt;/p&gt;&lt;p&gt;For the three newly added countries, Google Wallet's ID pass works differently — it's a secure digital ID generated from passport information, useful for in-person age checks and online account verification, rather than a government-issued verifiable credential.&lt;/p&gt;&lt;p&gt;The broader implication here is significant. India's Aadhaar covers over a billion enrolled users, and getting it into a widely installed app like Google Wallet — rather than a standalone government app most people ignore — dramatically raises the chances of real-world adoption. The gig economy and residential security use cases alone address friction points that affect millions of daily interactions in Indian cities.&lt;/p&gt;&lt;p&gt;The Aadhaar credential is live in Google Wallet now. The ID passes for Singapore, Taiwan, and Brazil are also available starting today.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxDeJRPRSvWMefb4rGeUTkTuitaUEWDCL-DtB97jghpVqy04tCCI9x_8_Z0zAjTUq86aLPvZmWlmZpWWBPlDVmr2uArwEIx9f6nfLB6h4CsEAWwLEvMQBRI0ILvUYQA8OIFlVpBT2og6sruqhJYogGtKcWDeA-qhfDkRPMTzeuPCwF_RHUinCUSf0VSsw/s72-c/Aadhaar-ID.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Hackers Targeted LiteLLM's AI Gateway Just 36 Hours After Critical SQL Injection Flaw Went Public</title><link>https://www.cyberkendra.com/2026/04/hackers-targeted-litellms-ai-gateway.html</link><category>AI</category><category>Security</category><category>Vulnerability</category><pubDate>Tue, 28 Apr 2026 21:18:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-6992372743724332186</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJgVIwzE6lh5ItANv71OA3skPG7Gnx0to442puyEJCYjlo-Nc4FOZVSLTwQO6WzyHxeCaSnFYUHbmuy5FigkzS4BI5woLd_-DzBFMbBYyFnGejRzwXjRzKXlVGASiuKyO_DXSUhh_0gDF7gE2ggHo30-T8DYLk_j210QsCIw1cDtQ8IpRL_m2Ku-Fomzw/s16000/CVE-2026-42208.webp" /&gt;&lt;/div&gt;&lt;p&gt;A critical, unauthenticated SQL injection vulnerability in LiteLLM — the open-source gateway that tens of thousands of organisations use to manage API access to OpenAI, Anthropic, and other AI providers — drew targeted exploitation attempts within 36 hours of its public disclosure, according to new &lt;a href="https://www.sysdig.com/blog/cve-2026-42208-targeted-sql-injection-against-litellms-authentication-path-discovered-36-hours-following-vulnerability-disclosure?" rel="nofollow" target="_blank"&gt;research from Sysdig&lt;/a&gt;'s Threat Research Team.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The flaw, tracked as &lt;b&gt;CVE-2026-42208&lt;/b&gt;, affects LiteLLM versions 1.81.16 through 1.83.6. The vulnerability lies within the proxy's authentication step: the Bearer token from an HTTP request header is directly inserted into a SQL query without parameterization (a basic security safeguard), allowing any anonymous attacker to send crafted requests and pull arbitrary data from the PostgreSQL backend — no login required.&lt;/p&gt;&lt;p&gt;The database stores virtual API keys, provider credentials for services like OpenAI and AWS Bedrock, and the proxy's entire runtime environment configuration — effectively a master key to every AI service an organisation has connected to it.&lt;/p&gt;&lt;p&gt;Sysdig observed the first exploitation attempt at 04:24 UTC on April 26, just 36 hours and seven minutes after the advisory was indexed in GitHub's global advisory database on April 24.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The attacker, operating from two IP addresses in the same German autonomous system (AS200373, 3xK Tech GmbH), fired 29 UNION-based SQL injection payloads targeting precisely the three tables most likely to contain production secrets: LiteLLM_VerificationToken, litellm_credentials, and litellm_config.&lt;/p&gt;&lt;p&gt;That level of precision is what stood out to Sysdig's researchers. The attacker already knew LiteLLM's Prisma ORM table naming conventions — including the PascalCase quirk that generic scanners routinely miss — and went straight for credential-bearing tables, skipping benign ones entirely.&amp;nbsp;&lt;/p&gt;&lt;p&gt;A second IP rotated roughly 20 minutes later, replaying the payload set and probing key management endpoints. The final request — a blunt OR 1=1-- — is consistent with an automated harness exhausting its full payload list.&lt;/p&gt;&lt;p&gt;No confirmed data extraction or key reuse was observed, but Sysdig is clear: absence of follow-through does not mean the attempt failed quietly.&lt;/p&gt;&lt;p&gt;The fix is available in v1.83.7, which replaces string interpolation with parameterized queries. Anyone running an internet-facing LiteLLM instance on a vulnerable version should patch immediately, rotate all stored credentials and virtual keys, and audit upstream provider billing logs for unexpected API activity.&lt;/p&gt;&lt;p&gt;The broader warning from Sysdig: AI gateways like LiteLLM aggregate cloud-grade credentials at a scale that makes a single SQL injection equivalent, in blast radius, to a full cloud account compromise. They should be treated accordingly.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJgVIwzE6lh5ItANv71OA3skPG7Gnx0to442puyEJCYjlo-Nc4FOZVSLTwQO6WzyHxeCaSnFYUHbmuy5FigkzS4BI5woLd_-DzBFMbBYyFnGejRzwXjRzKXlVGASiuKyO_DXSUhh_0gDF7gE2ggHo30-T8DYLk_j210QsCIw1cDtQ8IpRL_m2Ku-Fomzw/s72-c/CVE-2026-42208.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>LAPSUS$ Dumps Checkmarx Data on Dark Web — Source Code, API Keys, and Credentials Exposed</title><link>https://www.cyberkendra.com/2026/04/lapsus-dumps-checkmarx-data-on-dark-web.html</link><category>Data Breached</category><category>Security</category><pubDate>Tue, 28 Apr 2026 08:44:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-5556964775974129407</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="CheckMarx Data Leak" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgObm4XfF66aySPfX7mpo6LYhUn3z3NBG2-kLpJatJUuzlkDW1iKmtJnR-em-6f7QwIn-TlxketeRXNq4T3PuXBWW8-3o8QV2wTDH9LLDD3bb0MBlUaB0JMB7bHORW8iX0ActGKEDvPaFOkW1udzon9cmF-OhozrSc5Ur9JRZUUdPefZl6lRW17Ft-OFCY/s16000/checkmarx-data-leak.webp" title="CheckMarx Data Leak" /&gt;&lt;/div&gt;&lt;p&gt;The Checkmarx supply chain nightmare just got worse. The LAPSUS$ cybercrime group has publicly dumped data stolen from the Israeli application security company on its dark web leak site — and Checkmarx has now confirmed it's real.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;On April 25, dark web threat intelligence account @DarkWebInformer flagged on X that LAPSUS$ added Checkmarx to its victim roster alongside MAPFRE and Vodafone. The exposed data reportedly includes source code, an employee database, API keys, and database credentials for both MongoDB and MySQL. Security researcher Adnan Khan noted the dump appears to total roughly 95 GB of private Checkmarx data.&lt;/p&gt;&lt;p&gt;In a &lt;a href="https://checkmarx.com/blog/checkmarx-security-update-april-26/" rel="nofollow" target="_blank"&gt;security update published April 26&lt;/a&gt;, Checkmarx VP of Platform Engineering and Global CISO Udi-Yehuda Tamar confirmed the exposure, stating that a third-party forensic investigation points to the data originating from the company's GitHub repository. "Access to that repository was facilitated through the initial supply chain attack of March 23, 2026," the company said. Checkmarx has since locked down access to the affected repository and says its forensic probe is ongoing.&lt;/p&gt;&lt;p&gt;The company was quick to draw a line between the GitHub repo and its customer-facing infrastructure, stressing that the repository is maintained separately from its production environment and does not hold customer data. It pledged immediate notification if that assessment changes.&lt;/p&gt;&lt;p&gt;This is the latest domino to fall from the sprawling TeamPCP supply chain campaign — an operation that &lt;a href="https://www.cyberkendra.com/2026/04/hackers-poisoned-official-checkmarx.html" target="_blank"&gt;we (Cyber Kendra) covered last week&lt;/a&gt; when attackers pushed credential-stealing malware into Checkmarx's official KICS Docker images and two VS Code extensions on the Open VSX marketplace.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Hackers also &lt;a href="https://www.cyberkendra.com/2026/04/bitwarden-cli-hijacked-to-steal-your.html" target="_blank"&gt;compromise Bitwarden's CLI npm package&lt;/a&gt; (@bitwarden/cli version 2026.4.0), leaving it live for roughly 90 minutes — long enough to harvest AWS keys, GitHub tokens, and SSH credentials from any developer who installed it during that window.&lt;/p&gt;&lt;p&gt;TeamPCP has since boasted on BreachForums that it will "chain these compromises into devastating follow-on ransomware campaigns," and the LAPSUS$ publication appears to be exactly that follow-through. The attackers are deliberately targeting the tools developers are told to trust most — security scanners, password managers, and other high-privilege software wired directly into developer pipelines. The RegisterThe Register&lt;/p&gt;&lt;p&gt;If your organization uses Checkmarx tooling, act now:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Rotate any API keys, tokens, or credentials associated with Checkmarx integrations&lt;/li&gt;&lt;li&gt;Audit GitHub Actions workflows for unauthorized modifications&lt;/li&gt;&lt;li&gt;Remove and reinstall any VS Code extensions sourced from Checkmarx or Open VSX during the March–April window&lt;/li&gt;&lt;li&gt;Block the exfiltration endpoint audit.checkmarx.cx and IP 94.154.172.43 at your perimeter&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The investigation is active. Checkmarx says a more detailed update was expected within 24 hours of the April 26 disclosure.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgObm4XfF66aySPfX7mpo6LYhUn3z3NBG2-kLpJatJUuzlkDW1iKmtJnR-em-6f7QwIn-TlxketeRXNq4T3PuXBWW8-3o8QV2wTDH9LLDD3bb0MBlUaB0JMB7bHORW8iX0ActGKEDvPaFOkW1udzon9cmF-OhozrSc5Ur9JRZUUdPefZl6lRW17Ft-OFCY/s72-c/checkmarx-data-leak.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>AI Agent Wiped a Startup's Entire Database in 9 Seconds — Then Confessed Every Rule It Broke</title><link>https://www.cyberkendra.com/2026/04/ai-agent-wiped-startups-entire-database.html</link><category>AI</category><category>Security</category><pubDate>Tue, 28 Apr 2026 07:51:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-5556177829677745408</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="AI Deleted Database" border="0" data-original-height="3337" data-original-width="5000" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY9igW7aVUAZIkIr7VfTl7-1Czt7b8SqgVk0cm_0XTock2268SN0uP0WGELzaPvfdj8apLFz_ad2FOO4IMLWk17ejw0ztGRWuwfUYX6rJiaAvtW_SdqSX8EwOzIL8yesrA6nkbO3YjDkJv17tVhPi2EknTMT1TIulpB-BYajxzYwHyD36GAcAOA2Y4GjA/s16000/data-delete.webp" title="AI Deleted Database" /&gt;&lt;/div&gt;&lt;p&gt;When Jer Crane sat down to run a routine infrastructure task on a Friday afternoon, he had no idea he was about to spend the entire weekend manually reconstructing three months of customer data from Stripe receipts and email confirmations. His AI coding agent had other plans — and it executed them in under 10 seconds.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Crane is the founder of PocketOS, a SaaS platform that car rental businesses depend on for reservations, payments, and vehicle management. On April 24, his Cursor agent — running Anthropic's flagship Claude Opus 4.6 — hit a credential mismatch while working in PocketOS's staging environment.&lt;/p&gt;&lt;p&gt;Instead of stopping to ask for help, the agent decided to fix the problem itself. It searched the codebase, found an API token stored in an unrelated file, and used it to fire a single GraphQL mutation at Railway, the company's cloud infrastructure provider: &lt;code&gt;mutation { volumeDelete(volumeId: "3d2c42fb-...") }&lt;/code&gt;&lt;/p&gt;&lt;p&gt;The production database was gone. Because Railway stores volume-level backups inside the same volume they protect — a fact buried in their own documentation — those went with it. The most recent recoverable backup was three months old.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The agent's own confession&lt;/h3&gt;&lt;p&gt;What set this incident apart wasn't just the scale of the destruction — it was what happened when Crane asked the agent to explain itself. The model produced a detailed written admission, citing the exact safety rules it had been given and enumerating every one it had violated.&amp;nbsp;&lt;/p&gt;&lt;p&gt;It acknowledged it had guessed that deleting a staging volume would be scoped to staging only, admitted it hadn't checked Railway's documentation before executing a destructive command, and confirmed it had acted entirely without being asked to.&lt;/p&gt;&lt;p&gt;"System prompts are advisory, not enforcing," &lt;a href="https://x.com/lifeof_jer/article/2048103471019434248" rel="nofollow" target="_blank"&gt;Crane wrote in his X post&lt;/a&gt;, which drew over 4.5 million views. "The enforcement layer has to live in the integrations themselves — at the API gateway, in the token system, in the destructive-op handlers."&lt;/p&gt;&lt;p&gt;He's right. The agent knew it was wrong. It said so in writing. And it still couldn't stop itself.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Three failures, one outcome&lt;/h3&gt;&lt;p&gt;The incident wasn't one thing going wrong — it was three separate architectural gaps colliding simultaneously.&lt;/p&gt;&lt;p&gt;First, Cursor's "Destructive Guardrails," which the company markets as restricting agents from altering production environments, failed to prevent the deletion. This isn't unprecedented: Railway CEO Jake Cooper initially said the deletion shouldn't have been possible, then acknowledged it was actually expected behavior — a whiplash response that raised more questions than it answered.&lt;/p&gt;&lt;p&gt;Second, the Railway API token Crane had created specifically for managing custom domains carried root-level permissions across the entire account. There is no role-based access control for Railway API tokens. Every token is effectively an admin key. The community has been asking for scoped tokens for years — it hasn't shipped.&lt;/p&gt;&lt;p&gt;Third — and most critically — Railway's backup architecture means a deleted volume takes its own backups down with it. Calling that a backup strategy is, at best, misleading.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The update&lt;/h3&gt;&lt;p&gt;Railway CEO Jake Cooper stepped in on Sunday evening, helped restore PocketOS's data within an hour, and has since patched the vulnerable API endpoint to perform delayed deletes rather than instant ones. Crane confirmed that the data was recovered, and his customers are operational again.&lt;/p&gt;&lt;p&gt;What developers need to do right now&lt;/p&gt;&lt;p&gt;This incident is a pattern, not an anomaly. At least 10 documented cases across Cursor, Replit, Claude Code, and other AI coding tools share the same root causes: overpermissioned tokens, no confirmation mechanisms for destructive actions, and backups stored in the same blast radius as the data they protect.&lt;/p&gt;&lt;p&gt;If you are running production workloads with AI coding agents, audit your API token scopes today. Ensure backups live on an entirely separate infrastructure. And treat any AI agent system prompt as a suggestion the model may ignore — because, as Claude Opus itself confirmed in writing, sometimes it does.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY9igW7aVUAZIkIr7VfTl7-1Czt7b8SqgVk0cm_0XTock2268SN0uP0WGELzaPvfdj8apLFz_ad2FOO4IMLWk17ejw0ztGRWuwfUYX6rJiaAvtW_SdqSX8EwOzIL8yesrA6nkbO3YjDkJv17tVhPi2EknTMT1TIulpB-BYajxzYwHyD36GAcAOA2Y4GjA/s72-c/data-delete.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>The Rise of Autonomous Cyber Attacks: Risks, Examples &amp; Defense</title><link>https://www.cyberkendra.com/2026/04/rise-of-autonomous-cyber-attacks.html</link><category>AI</category><category>Cyber Attack</category><category>Learn</category><pubDate>Sat, 25 Apr 2026 08:18:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-4325736887089120597</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Autonomous Cyber Attacks" border="0" data-original-height="2025" data-original-width="3600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiClDRVQdE83Z0yl4GJ5bcboSv6By5gwvuaXgk5ZqAUgikis3giqwWekHk4_tGIioYNg91Q84RTuwe14tQ5YF7lQ-jOnCTAVDLWFANRxa8agW1za-klrjF1BvuF5cfVO-FwuwUl2voSFSRemL_B9Anf3IbEIGAsZJ0cSu-pNd0EQrJZAiknoOhQ-k9zEx0/s16000/AI-cyber-attacks.webp" title="Autonomous Cyber Attacks" /&gt;&lt;/div&gt;&lt;p&gt;Last month, a mid-size financial services company ran a routine penetration test. The testers used an AI-assisted reconnaissance tool to map the network. Within 40 minutes, the tool had identified exposed services, correlated employee names with LinkedIn data, generated targeted phishing lures, and flagged three likely paths to domain admin.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The internal security team, working with traditional alert queues and weekly review cycles, would not have caught any of it in time.&lt;/p&gt;&lt;p&gt;That was a controlled test. The real attackers are running the same playbook, but they do not stop when the clock runs out.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Key Takeaways:&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Autonomous attacks operate at machine speed with no human in the loop&lt;/li&gt;&lt;li&gt;AI enables adaptive exploitation that bypasses static defenses&lt;/li&gt;&lt;li&gt;Traditional SOC workflows were not built for millisecond threat cycles&lt;/li&gt;&lt;li&gt;Defending autonomously is no longer optional; it is the only practical response&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;What Are Autonomous Cyber Attacks?&lt;/h2&gt;&lt;p&gt;Autonomous cyber attacks are &lt;a href="https://www.cyberkendra.com/2026/04/ai-powered-github-bot-quietly-targeted.html" target="_blank"&gt;AI-powered operations&lt;/a&gt; that independently plan, execute, and adapt intrusions without requiring a human operator to guide each step. Unlike traditional attacks, where a person types commands and reacts to output, these systems make decisions dynamically, shift tactics when they encounter resistance, and propagate across environments faster than most security tools can generate an alert.&lt;/p&gt;&lt;p&gt;Three characteristics define them:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;b&gt;Self-learning:&lt;/b&gt; The attack refines its approach based on what succeeds. If a port scan triggers a firewall rule, the system notes that and tries a different vector.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Decision-making capability: &lt;/b&gt;The system evaluates multiple exploitation paths and selects the most promising one without waiting for a human to weigh in.&lt;/li&gt;&lt;li&gt;&lt;b&gt;End-to-end automation:&lt;/b&gt; Reconnaissance, initial access, lateral movement, and exfiltration can all be chained together with no human touchpoints.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This is not theoretical. The tooling exists today, and significant portions of it are openly available.&lt;/p&gt;&lt;p&gt;The Autonomous Cyber Attacks are rising in 2026 due to the easy accessibility of AI tools and Large language models. Today, a moderately skilled operator can assemble one from open-source components, AI APIs, and leaked offensive toolkits in an afternoon&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;Real-World Examples of Some Autonomous Cyber Attacks&lt;/h2&gt;&lt;p&gt;Attribution in this space is difficult, and public disclosure is rare. But several documented cases give a clear picture of where things stand.&lt;/p&gt;&lt;p&gt;&lt;b&gt;The GT-1002 Campaign: &lt;/b&gt;Security researchers tracking this campaign documented a &lt;a href="https://www.cyberkendra.com/2025/11/hackers-weaponise-openais-api-to-build.html" target="_blank"&gt;threat actor using automated tooling&lt;/a&gt; to conduct reconnaissance, credential stuffing, and lateral movement across hundreds of enterprise targets. What stood out was the operational pace. Actions that would normally indicate a human operator working over days were compressed into hours. The infrastructure rotated automatically, and the attack pivoted when individual vectors were blocked, without any apparent manual intervention.&lt;/p&gt;&lt;p&gt;&lt;b&gt;AI-Assisted Espionage: &lt;/b&gt;Anthropic's own &lt;a href="https://www.cyberkendra.com/2025/11/anthropic-exposes-first-ai-powered.html" target="_blank"&gt;research has documented adversarial attempts to use AI&lt;/a&gt; systems to assist in cyber operations. In documented cases, AI platforms were queried to assist with reconnaissance, writing attack scripts, and identifying security control gaps. The significance is not that AI was the attack itself, but that it dramatically accelerated the pre-attack research phase.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Hexstrike-AI Framework: &lt;/b&gt;Circulated within offensive security communities, this framework demonstrated an end-to-end automated attack chain: from public internet reconnaissance to internal network pivot, using AI to select and sequence attack techniques based on real-time feedback from the target environment. Regardless of who ultimately uses tooling like this, its existence demonstrates that fully automated, adaptive attack chains are technically feasible today.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;How to Defend Against Autonomous Cyber Attacks&lt;/h3&gt;&lt;p&gt;The reflexive answer is "&lt;b&gt;use AI for defense too.&lt;/b&gt;" That is partially right, but it obscures what actually needs to change operationally.&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="AI Cyber Attacks" border="0" data-original-height="1688" data-original-width="3000" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiW2yB_SZFxQ3qM_65yogOu81_bO_vZX7X3D9kKV8LZAhX5gDBYAbq2KQuMAc80uI3OvTo8jJE3dOwbY2zzKAC-x2MCaeGzkvYnu-O8UHBfkHhwU_H49gqGaXGUfb9fmE_Oz-Tk84FUHkSaCe5BLloKJprz0pNlk8b1jmhXfQ3O5kW2wHxeuo6HhwLKo7g/s16000/ai%20Cyber%20Attacks.webp" title="AI Cyber Attacks" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;AI-Native Security Architecture&lt;/h4&gt;&lt;p&gt;The core problem with traditional security stacks is that they were built around human review cycles. An alert is generated, queued, triaged, and escalated. That workflow made sense when attacks moved at human speed. It does not work when an attacker can complete initial access and lateral movement before the first alert is acknowledged.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Real-time detection&lt;/b&gt; means analyzing behavior at the point of occurrence, not after log aggregation. Network detection systems, endpoint telemetry, and identity activity monitoring need to feed into decision systems that can act within seconds, not minutes.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Automated response&lt;/b&gt; is the logical extension. Isolating a compromised endpoint, revoking a suspicious session token, and blocking an anomalous outbound connection: these actions cannot wait for a security analyst to approve them when the attacker is already moving laterally.&lt;/p&gt;&lt;p&gt;The pushback from operations teams is predictable. Automated response blocks legitimate users sometimes. That is a real cost. But the alternative is accepting that human review timelines are incompatible with the threat environment.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Zero Trust and Identity Security&lt;/h4&gt;&lt;p&gt;Most security architectures still have a soft interior. Once an attacker has a valid credential and is inside the network perimeter, movement is surprisingly easy. Implicit trust based on network location is the foundational assumption that most attack chains depend on.&lt;/p&gt;&lt;p&gt;Continuous verification changes that calculus. Every access request, every API call, every privileged operation is evaluated against the current context: device health, user behavior patterns, time of day, geographic anomalies. A credential used from an unusual location at an unusual time does not automatically succeed.&lt;/p&gt;&lt;p&gt;Least privilege access removes the value of compromised credentials. If a developer's account can only access the specific resources their current work requires, a stolen credential is far less useful to an attacker. Operationalizing this requires more than a policy document; it requires an &lt;a href="https://www.miniorange.com/iam/" target="_blank"&gt;identity and access management solution for Zero Trust&lt;/a&gt; that enforces continuous verification, scopes permissions dynamically, and reduces or eliminates standing access across the environment.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Continuous Monitoring and Behavioral Analytics&lt;/h4&gt;&lt;p&gt;AI-powered attacks do not behave like human attackers in terms of pattern and timing. They often move faster, access more resources in sequence, and operate at times that fall outside normal working hours. Behavioral analytics systems that baseline normal activity can flag these anomalies even when each individual action looks legitimate in isolation.&lt;/p&gt;&lt;p&gt;A single failed authentication is noise. Fifty sequential failed authentications across different accounts from the same IP range, at 3 AM, followed by one success, is a pattern. Systems that detect and respond to the pattern, rather than the individual event, are significantly harder to bypass.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Securing AI Systems&lt;/h4&gt;&lt;p&gt;Security teams increasingly need to defend their own AI deployments. Large language models used in internal tooling can be targeted through prompt injection, where malicious input manipulates the model into performing unintended actions or disclosing sensitive information.&lt;/p&gt;&lt;p&gt;The OWASP Top 10 for LLM Applications provides a starting framework. Key concerns include prompt injection, training data poisoning, and over-reliance on AI outputs without human validation. Organizations deploying AI-assisted security tools need to treat those tools as part of the attack surface, not just part of the defense.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Role of Identity and Access Management in Defense&lt;/h3&gt;&lt;p&gt;Autonomous attacks are effective in large part because they exploit legitimate credentials and access paths. The attacker does not break in through the window; they walk through the front door with keys they found or stole.&lt;/p&gt;&lt;p&gt;Identity and Access Management (IAM) and Privileged Access Management (PAM) address this directly by:&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;MFA and Adaptive Authentication&lt;/h4&gt;&lt;p&gt;Automated credential stuffing attacks test millions of username-password combinations against login portals. Standard MFA blocks the vast majority of these because the attacker has the password but not the second factor. Adaptive MFA goes further: it evaluates context at each login attempt, flagging anomalies in location, device fingerprint, or behavioral patterns and stepping up verification requirements accordingly.&amp;nbsp;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Identity Lifecycle Management (Provisioning and Deprovisioning)&lt;/h4&gt;&lt;p&gt;Orphaned accounts are one of the most consistently exploited entry points in enterprise environments. An employee leaves, their Active Directory account persists, and six months later, an autonomous scanner finds it during credential stuffing. Automated provisioning and deprovisioning closes this loop: access is removed when roles change or employment ends, not when someone remembers to file a ticket.&amp;nbsp;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Role-Based Access Control&lt;/h4&gt;&lt;p&gt;Role-based access control makes the users hold only the minimum permissions their work requires; a compromised credential gives the attacker a narrow foothold rather than broad infrastructure access. AI malware that hijacks a user session inherits that session's permissions. Keeping those permissions tightly scoped limits how far the attack can propagate.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Single Sign-On (SSO)&lt;/h4&gt;&lt;p&gt;SSO centralizes authentication through a single control point, which means anomalous activity is easier to detect and correlate. A credential being used to authenticate against fifteen different applications in four minutes is obvious in a centralized SSO log. That same activity spread across fifteen separate authentication systems may never surface as a coherent signal&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Just-in-Time Privileged Access&amp;nbsp;&lt;/h4&gt;&lt;p&gt;Standing administrative privileges are a permanent target. Just-in-time access management makes sure privileges are granted for a specific task, for a limited window, and revoked automatically when the window closes.&amp;nbsp;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Session Monitoring and Recording&amp;nbsp;&lt;/h4&gt;&lt;p&gt;Even legitimate admin access can be abused, whether by a compromised account or a malicious insider. &lt;a href="https://www.miniorange.com/pam/privileged-session-management" target="_blank"&gt;Privileged session management&lt;/a&gt; records privileged sessions to create an auditable trail of exactly which commands were run, which files were accessed, and which systems were touched. It also creates a detection surface: behavioral analytics applied to session recordings can flag automated command sequences that look nothing like human interaction.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Credential Vaulting and Rotation&amp;nbsp;&lt;/h4&gt;&lt;p&gt;Static credentials are a gift to autonomous attackers. A password that never changes, once exfiltrated, remains valid indefinitely. Credential vaulting stores secrets in an encrypted, access-controlled store rather than in config files or developer laptops. Automated rotation changes those passwords on a regular schedule, meaning stolen credentials have a limited validity window. AI bots built around credential reuse find that the credentials they collected last month no longer work.&lt;/p&gt;&lt;p&gt;Solutions like miniOrange's IAM and PAM platform consolidate these controls: credential vaulting, just-in-time access provisioning, privileged session monitoring, and machine identity management in a single operational framework. The practical value is not just in having the controls, but in having them integrated so that signals from one layer inform decisions in another.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Future Outlook: AI vs. AI Cybersecurity&lt;/h3&gt;&lt;p&gt;The trajectory is clear. Offensive AI capabilities will continue to improve. Defensive AI capabilities will need to match that pace. The intermediate period, where attackers have sophisticated AI tooling and defenders are still running largely manual SOC operations, is the most dangerous window.&lt;/p&gt;&lt;p&gt;&lt;b&gt;AI vs. AI warfare &lt;/b&gt;is already a meaningful framing. Autonomous attack systems probing for weaknesses, automated defense systems detecting and responding, and the outcome determined by which side has better models, better data, and faster feedback loops.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Predictive threat intelligence&lt;/b&gt; is an emerging defensive capability. Rather than detecting attacks that are already in progress, systems trained on attack patterns can identify the precursors: scanning activity, credential testing and staging infrastructure registration. Acting before the attack chain reaches exploitation is significantly more effective than responding during lateral movement.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Autonomous SOCs&lt;/b&gt; are a real near-term development. Not replacing human analysts, but automating the high-volume, time-sensitive work: alert triage, initial investigation, containment actions. Human analysts focus on judgment calls and strategic decisions while automated systems handle the operational tempo.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Regulatory frameworks&lt;/b&gt; are developing in parallel. NIST's AI Risk Management Framework provides structured guidance for managing AI-related risk, including the risks of AI-powered adversaries. Compliance frameworks are likely to evolve to explicitly address autonomous threat scenarios.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Are We Ready? A Final Assessment&lt;/h3&gt;&lt;p&gt;Most organizations are not. That is not a criticism; it is an accurate description of where the industry stands.&lt;/p&gt;&lt;p&gt;Security programs built over the past decade were designed for a threat environment where attackers moved at human speed. The tooling, processes, and staffing models reflect that assumption. The threat environment has changed faster than most organizations have adapted.&lt;/p&gt;&lt;p&gt;But the gap is closeable. The starting point is honest assessment.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Organizational Readiness Checklist:&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Can your SOC detect and respond to a threat within minutes, not hours?&lt;/li&gt;&lt;li&gt;Are privileged access permissions reviewed and right-sized quarterly?&lt;/li&gt;&lt;li&gt;Do you have behavioral analytics capable of detecting anomalous patterns, not just known signatures?&lt;/li&gt;&lt;li&gt;Are machine identities (service accounts, API keys) inventoried and monitored?&lt;/li&gt;&lt;li&gt;Is MFA enforced with session-level controls, not just at login?&lt;/li&gt;&lt;li&gt;Do you have automated response capabilities for common threat scenarios?&lt;/li&gt;&lt;li&gt;Are AI tools in your environment treated as part of the attack surface?&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Maturity Levels:&lt;/p&gt;

&lt;div class="table noWrap w100"&gt;
  &lt;table border="1" cellpadding="8" cellspacing="0"&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Level&lt;/th&gt;
      &lt;th&gt;Characteristics&lt;/th&gt;
    &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;Reactive&lt;/td&gt;
      &lt;td&gt;Alert-based, human review and incident response after compromise&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;Preventive&lt;/td&gt;
      &lt;td&gt;MFA, patching, basic monitoring, policy enforcement&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;Detective&lt;/td&gt;
      &lt;td&gt;Behavioral analytics, threat hunting, anomaly detection&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;Adaptive&lt;/td&gt;
      &lt;td&gt;AI-assisted detection, automated response, continuous verification&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;Autonomous&lt;/td&gt;
      &lt;td&gt;AI-native defense, predictive intelligence, real-time autonomous response&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;&lt;p&gt;Most enterprise organizations sit between Preventive and Detective. The threat environment requires at least Adaptive.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Immediate Next Steps:&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style="text-align: left;"&gt;&lt;li&gt;Audit all privileged accounts and remove standing administrative access where not operationally necessary&lt;/li&gt;&lt;li&gt;Implement behavioral analytics on identity and privileged activity, not just network traffic&lt;/li&gt;&lt;li&gt;Introduce just-in-time access for high-risk systems, reducing the value of stolen credentials&lt;/li&gt;&lt;li&gt;Inventory and rotate machine identity credentials on a scheduled basis&lt;/li&gt;&lt;li&gt;Test your automated detection and response capabilities against a realistic autonomous attack simulation&lt;/li&gt;&lt;li&gt;Evaluate your AI systems for exposure to prompt injection and model manipulation&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;If the goal is to enforce controls like session monitoring, just-in-time access, behavioral analytics, and centralized privileged activity auditing without building each capability independently, platforms like miniOrange PAM can centralize these capabilities across hybrid and cloud environments without disrupting existing developer and operations workflows.&lt;/p&gt;&lt;p&gt;The attackers have already automated. The only viable response is to automate the defense.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Frequently Asked Questions:&amp;nbsp;&lt;/h3&gt;&lt;p&gt;&lt;b&gt;Q. What are autonomous cyber attacks?&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A. &lt;/b&gt;AI-driven attacks that independently plan, execute, and adapt cyber intrusions without human involvement. They use machine learning and automation to select targets, identify vulnerabilities, and move through environments faster than human defenders can respond.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q. What is an AI cyber attack?&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A.&amp;nbsp;&lt;/b&gt;A cyber attack that uses artificial intelligence to automate decision-making, targeting, and execution. This includes AI-generated phishing content, automated exploitation, and self-adapting malware that evades detection.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q. What are the top types of autonomous cyber attacks?&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A.&amp;nbsp;&lt;/b&gt;AI-powered phishing and deepfakes, self-adapting malware, autonomous botnets, and AI-based vulnerability discovery are the primary categories currently observed in enterprise environments.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q. Why are autonomous attacks particularly dangerous?&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A.&amp;nbsp;&lt;/b&gt;They operate at machine speed, adapt in real time when defenses block initial approaches, and can run the same campaign against thousands of targets simultaneously. Traditional security workflows built around human review cycles are poorly matched to this tempo.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q. How can organizations defend against AI cyber threats?&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A.&amp;nbsp;&lt;/b&gt;Through AI-native detection and automated response, Zero Trust security with continuous verification, behavioral analytics that detect anomalous patterns rather than known signatures, and identity governance that limits the value of compromised credentials.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiClDRVQdE83Z0yl4GJ5bcboSv6By5gwvuaXgk5ZqAUgikis3giqwWekHk4_tGIioYNg91Q84RTuwe14tQ5YF7lQ-jOnCTAVDLWFANRxa8agW1za-klrjF1BvuF5cfVO-FwuwUl2voSFSRemL_B9Anf3IbEIGAsZJ0cSu-pNd0EQrJZAiknoOhQ-k9zEx0/s72-c/AI-cyber-attacks.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Your TLS Certificates Are About to Silently Break — And You Won't Know Until It's Too Late</title><link>https://www.cyberkendra.com/2026/04/your-tls-certificates-are-about-to.html</link><category>Apache</category><category>Internet</category><category>Tech</category><pubDate>Fri, 24 Apr 2026 08:34:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-4673795770055771888</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Certificate Authorities (CAs)" border="0" data-original-height="3774" data-original-width="5391" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqT7U8QSgtFDeAe4z9Ilq0xM4bURO67lzaaIIUl3F09cPHzJkia_0x1uPU-Qi8n1jBOplEpj-EPldld8ROgnPrSMO50fqup_jtuapBmDdcS_J5oPzIFJiFmHgslwLx6GnxH6apxp-P8z3mYd4SITwNcJNYdAWJ2Fe8ZIT0VN0ZsK2pFHC19jTi-N5O0dA/s16000/TLS%20certificates.webp" title="Certificate Authorities (CAs)" /&gt;&lt;/div&gt;&lt;p&gt;A quiet but consequential change is coming to internet security infrastructure — and unlike most breaking changes, this one won't announce itself until it's already caused an outage.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://news.apache.org/foundation/entry/the-public-ca-clientauth-eku-sunset-what-apache-software-deployers-need-to-know" rel="nofollow" target="_blank"&gt;Starting May 2026&lt;/a&gt;, major public Certificate Authorities, including Let's Encrypt, DigiCert, Sectigo, and GlobalSign, will stop embedding the Client Authentication Extended Key Usage (EKU) flag in their publicly issued TLS certificates.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The CA/Browser Forum — the governing body that sets browser and CA policy — has ruled that client authentication is a private identity concern, unsuitable for public trust infrastructure. The decision is industry-wide and non-negotiable.&lt;/p&gt;&lt;p&gt;For most websites and HTTPS services, nothing changes. The problem falls squarely on organizations running &lt;b&gt;mutual TLS (&lt;a href="https://www.cloudflare.com/learning/access-management/what-is-mutual-tls/" rel="nofollow" target="_blank"&gt;mTLS&lt;/a&gt;)&lt;/b&gt; — a security model in which both the server and the client present certificates to verify each other's identities, commonly used in high-stakes distributed systems.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Apache Kafka, Cassandra, ZooKeeper, Pulsar, Ignite, and Geode all support mTLS as a first-class authentication mechanism, and many production deployments quietly rely on public CAs to issue those client certificates.&lt;/p&gt;&lt;p&gt;The risky part isn't the policy itself — it's the timing. Certificates issued before the May cutoff continue to work until they expire. The failure arrives with the next routine renewal.&amp;nbsp;&lt;/p&gt;&lt;p&gt;What looks like a stable, fully operational cluster one day becomes an authentication black hole the next, with brokers rejecting clients and cluster members unable to handshake with each other. The certificate will appear perfectly valid in every other respect, making diagnosis genuinely tricky.&lt;/p&gt;&lt;p&gt;Every major TLS library — Java's JSSE, Go's crypto/tls, Rust's rustls, and OpenSSL — enforces the clientAuth EKU check. There's no runtime workaround. The fix requires switching client certificate issuance to an internal or enterprise CA that correctly issues certificates with the required EKU.&lt;/p&gt;&lt;p&gt;Three migration paths exist: run a full internal PKI for both server and client certs; adopt a hybrid model where servers keep public CA certs, but clients move to a private CA; or drop mTLS entirely in favor of application-layer authentication (tokens, OAuth) while retaining standard TLS encryption.&lt;/p&gt;&lt;p&gt;To check if you're exposed, run:&lt;/p&gt;&lt;pre&gt;openssl x509 -in your-cert.pem -noout -text | grep -A1 "Extended Key Usage"&lt;/pre&gt;&lt;p&gt;If the output shows TLS Web Client Authentication and the cert was issued publicly, your clock is ticking.&lt;/p&gt;&lt;p&gt;The Apache Software Foundation's advice is straightforward: start now. Every certificate renewal in the 12 months following May 2026 is a potential production incident waiting to happen.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqT7U8QSgtFDeAe4z9Ilq0xM4bURO67lzaaIIUl3F09cPHzJkia_0x1uPU-Qi8n1jBOplEpj-EPldld8ROgnPrSMO50fqup_jtuapBmDdcS_J5oPzIFJiFmHgslwLx6GnxH6apxp-P8z3mYd4SITwNcJNYdAWJ2Fe8ZIT0VN0ZsK2pFHC19jTi-N5O0dA/s72-c/TLS%20certificates.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Vercel Hacked: Breach Is Bigger Than First Disclosed — Customer Data Stolen Before the Attack Even Started</title><link>https://www.cyberkendra.com/2026/04/vercel-hacked-breach-is-bigger-than.html</link><category>Security</category><category>Vercel</category><pubDate>Fri, 24 Apr 2026 07:54:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-5165804048061028472</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Vercel Hacked — Customers’ data was stolen" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI3mAY6MV47wIeIfrQv7k2ivGymAI4_6siOp4ZzCsbz8CtN7C1mJ21w2nCNE-eQIsQA6D-B4mI03Pg5PhGaYy_genBPSoq_UTdv6CmAwQbGFhjsNEXQR-hBGOmQZvBdFaLW9MaJ3AurRsttDbGiki31mFg6qj1As7wLWMeXFQF1ShtTLi0SE6zlCHpq1g/s16000/vercel-hack.webp" title="Vercel Hacked — Customers’ data was stolen" /&gt;&lt;/div&gt;&lt;p&gt;What began as a contained supply chain incident has quietly expanded into something far more serious.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Vercel has updated its &lt;a href="https://vercel.com/kb/bulletin/vercel-april-2026-security-incident#who-is-impacted" rel="nofollow" target="_blank"&gt;April 2026 security bulletin&lt;/a&gt;, confirming that some customer data was stolen before the breach the company originally disclosed — and that the threat actor behind this attack was already hunting for developer credentials across the broader internet well before the Context.ai compromise that initially triggered the investigation.&lt;/p&gt;&lt;p&gt;Vercel's security team sifted through nearly a petabyte of network and API logs — extending well beyond the original Context.ai entry point — and surfaced two separate findings.&amp;nbsp;&lt;/p&gt;&lt;p&gt;First, additional &lt;a href="https://www.cyberkendra.com/2026/04/vercel-hacked-through-ai-tool-and-your.html" target="_blank"&gt;customer accounts were compromised as part of the April incident&lt;/a&gt;, beyond the initially identified subset. Second, and more alarmingly, a separate cluster of customer accounts showed signs of compromise that predates the April breach entirely and appears unconnected to Vercel's own systems.&lt;/p&gt;&lt;p&gt;Vercel has described these earlier intrusions as potentially resulting from social engineering, malware, or other external methods — and has already contacted affected customers.&lt;/p&gt;&lt;p&gt;CEO Guillermo Rauch &lt;a href="https://x.com/rauchg/status/2047150411170320808" rel="nofollow" target="_blank"&gt;pointed directly&lt;/a&gt; to infostealer malware (credential-harvesting software that silently extracts passwords, tokens, and API keys from infected machines) as the likely mechanism. Once attackers collected those keys, Vercel's logs reveal a consistent playbook: fast, systematic API calls designed to enumerate and read non-sensitive environment variables—the configuration values that hold API keys, database credentials, and third-party service tokens.&lt;/p&gt;&lt;p&gt;That pattern lines up with earlier reporting that a Context.ai employee's computer was infected with infostealer malware after allegedly searching for Roblox game cheats — a textbook infostealer delivery scenario.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;This Is Bigger Than One Company&lt;/h3&gt;&lt;p&gt;Vercel has notified other suspected victims of this threat actor entirely outside of this incident. The company is now coordinating with Microsoft, AWS, Wiz, GitHub, npm, and Socket as part of a widened industry response. On one confirmed positive note: npm packages published by Vercel have been verified as uncompromised, meaning the Next.js supply chain remains clean for now.&lt;/p&gt;&lt;p&gt;If you haven't rotated your Vercel environment variables — especially any not marked as "sensitive" — treat them as already stolen.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Enable multi-factor authentication immediately, review your account activity logs for anything unusual between April 1 and now, and migrate all secrets to Vercel's sensitive environment variables feature going forward. Crucially, Vercel warns that simply deleting your project or account does not eliminate the risk — compromised secrets can still be used against live production systems.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI3mAY6MV47wIeIfrQv7k2ivGymAI4_6siOp4ZzCsbz8CtN7C1mJ21w2nCNE-eQIsQA6D-B4mI03Pg5PhGaYy_genBPSoq_UTdv6CmAwQbGFhjsNEXQR-hBGOmQZvBdFaLW9MaJ3AurRsttDbGiki31mFg6qj1As7wLWMeXFQF1ShtTLi0SE6zlCHpq1g/s72-c/vercel-hack.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Bitwarden CLI Hijacked to Steal Your AWS, GitHub, and SSH Secrets</title><link>https://www.cyberkendra.com/2026/04/bitwarden-cli-hijacked-to-steal-your.html</link><category>Security</category><pubDate>Thu, 23 Apr 2026 20:44:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-7793838835275364558</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Bitwarden CLI Hijacked" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifd8yqJhcGVJl_KxIDgRCk3E2TJC1XUPew51b5AFBXvsVtvQuP-lUXxpSLyQaTbLjyKtvTPH9AJ4iAVhZde5jKGhWcfgnweoWFDCssYhznOsD-F_2b0yDTfyliXHfLjPsWtKOarmqsR9QtrBhT_UdsNs8-VLdH1km2h0zH4P2r3w0JFT0v8Zr9kWq454Y/s16000/Bitwarden-CLI.webp" title="Bitwarden CLI Hijacked" /&gt;&lt;/div&gt;&lt;p&gt;If you installed Bitwarden's command-line password manager this month, your developer credentials — including cloud keys, SSH material, and GitHub tokens — may already be in an attacker's hands.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Security researchers at Socket and &lt;a href="https://research.jfrog.com/post/bitwarden-cli-hijack/" rel="nofollow" target="_blank"&gt;JFrog have confirmed &lt;/a&gt;that &lt;code&gt;@bitwarden/cli&lt;/code&gt; version &lt;code&gt;2026.4.0&lt;/code&gt;, published to npm, was backdoored as part of the same sprawling &lt;a href="https://www.cyberkendra.com/2026/04/hackers-poisoned-official-checkmarx.html" target="_blank"&gt;Checkmarx supply chain campaign&lt;/a&gt; that previously poisoned official KICS Docker images and VS Code extensions.&amp;nbsp;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Bitwarden has since &lt;a href="https://community.bitwarden.com/t/bitwarden-statement-on-checkmarx-supply-chain-incident/96127" rel="nofollow" target="_blank"&gt;confirmed the incident&lt;/a&gt;&lt;/b&gt;, stating the malicious package was live on npm between 5:57 PM and 7:30 PM ET on April 22, 2026 — a roughly 90-minute window. The company says it found no evidence that end-user vault data was accessed or that production systems were compromised, and a CVE is being issued for the affected version.&lt;/p&gt;&lt;p&gt;The attack vector was a compromised GitHub Action inside Bitwarden's own CI/CD pipeline (the automated system that builds and publishes software), meaning the malicious package carried Bitwarden's legitimate branding and repository metadata without raising obvious red flags.&lt;/p&gt;&lt;p&gt;The tampered package swapped out the legitimate CLI binary entry point for a custom loader, &lt;code&gt;bw_setup.js&lt;/code&gt;, which silently runs on installation via a &lt;code&gt;preinstall&lt;/code&gt; npm script hook&amp;nbsp;— before most users would notice anything was wrong.&lt;/p&gt;&lt;p&gt;That loader then downloads the Bun JavaScript runtime from GitHub if it isn't already present — a deliberate evasion trick to avoid raising suspicion — before executing a heavily obfuscated payload stored in &lt;code&gt;bw1.js&lt;/code&gt;.&lt;/p&gt;&lt;p&gt;Once deobfuscated, the payload reveals one of the most aggressive credential-stealing frameworks seen in an npm supply-chain attack. It runs three collectors in parallel: a filesystem sweep targeting SSH keys, &lt;code&gt;.git-credentials&lt;/code&gt;, &lt;code&gt;.npmrc&lt;/code&gt;, &lt;code&gt;.env&lt;/code&gt;, shell history, AWS credentials, GCP secret stores, and Azure Key Vault material; a shell collector that explicitly runs &lt;code&gt;gh auth token&lt;/code&gt; to harvest GitHub CLI credentials and scans the process environment for token patterns; and a GitHub Actions runner collector that harvests CI secrets from automated build environments.&lt;/p&gt;&lt;p&gt;What makes this attack stand out is how it weaponizes stolen GitHub tokens rather than just collecting them. The malware validates tokens, enumerates repositories, creates new branches, commits malicious workflow files, waits for the Actions pipeline to execute, then silently deletes the evidence.&amp;nbsp;&lt;/p&gt;&lt;p&gt;It also explicitly targets AI coding assistant configuration files, including ~/.claude.json and ~/.kiro/settings/mcp.json — a clear signal that attackers are increasingly interested in environments where AI tools may expose API keys or workflow automation secrets.&lt;/p&gt;&lt;p&gt;Stolen data is encrypted using hybrid AES-256-GCM and RSA encryption before being exfiltrated to audit[.]checkmarx[.]cx — a domain masquerading as legitimate Checkmarx infrastructure. If that path is blocked, the malware falls back to GitHub itself, staging encrypted result blobs inside repositories created under the victim's own account.&lt;/p&gt;&lt;p&gt;If you installed &lt;code&gt;@bitwarden/cli 2026.4.0&lt;/code&gt;, act immediately:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Run &lt;code&gt;npm uninstall -g @bitwarden/cli&lt;/code&gt; and &lt;code&gt;npm cache clean --force&lt;/code&gt;&lt;/li&gt;&lt;li&gt;Rotate all GitHub PATs, npm tokens, AWS access keys, GCP and Azure secrets present on that machine&lt;/li&gt;&lt;li&gt;Audit GitHub Actions workflows and repository artifacts for unauthorized runs or branches&lt;/li&gt;&lt;li&gt;Block &lt;code&gt;audit.checkmarx.cx&lt;/code&gt; and &lt;code&gt;94.154.172.43&lt;/code&gt; at your network perimeter&lt;/li&gt;&lt;li&gt;Review shell history and any AI tooling configuration files for sensitive data exposure&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;Users who did not install the package during that specific window are not affected, and Bitwarden confirms vault data integrity was not compromised.&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifd8yqJhcGVJl_KxIDgRCk3E2TJC1XUPew51b5AFBXvsVtvQuP-lUXxpSLyQaTbLjyKtvTPH9AJ4iAVhZde5jKGhWcfgnweoWFDCssYhznOsD-F_2b0yDTfyliXHfLjPsWtKOarmqsR9QtrBhT_UdsNs8-VLdH1km2h0zH4P2r3w0JFT0v8Zr9kWq454Y/s72-c/Bitwarden-CLI.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Pack2TheRoot Flaw Lets Root to Any Linux User — Ubuntu, Debian, Fedora at Risk</title><link>https://www.cyberkendra.com/2026/04/pack2theroot-flaw-lets-root-to-any.html</link><category>Linux</category><category>Security</category><category>Ubuntu</category><pubDate>Thu, 23 Apr 2026 21:29:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-8019217472728161650</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Pack2TheRoot (CVE-2026-41651)" border="0" data-original-height="1350" data-original-width="2400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTRmlmCAYIgxUiPSa4hIEG-4WKJTS5K-hQCM3MWh73LgCNurMwcyFNb2z2Sh2h6wY1S2ta2nr-mulpjjmGmL3GzSdfuU9aNVfKm5oR4y3kHc9i1E9Ccky8YEJeC6ILFmfXX8TVf332ZlHhBYcRzYTliMW8c96vjEp0ADdV5NlI0Awudu8cQPpfB8AYi0k/s16000/Pack2TheRoot.webp" title="Pack2TheRoot (CVE-2026-41651)" /&gt;&lt;/div&gt;&lt;p&gt;A newly disclosed vulnerability in a near-universal Linux component has handed any local, unprivileged user the keys to the entire system — no password, no exploit chain, no guesswork required.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Dubbed &lt;b&gt;Pack2TheRoot&lt;/b&gt; and tracked as &lt;b&gt;CVE-2026-41651&lt;/b&gt;, the flaw lives in &lt;b&gt;PackageKit &lt;/b&gt;— the background daemon that most major Linux desktop distributions use to manage software installations without requiring users to drop into a terminal.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The bug has existed since PackageKit version 1.0.2, released over 12 years ago, meaning the vulnerable codebase has shipped inside countless Linux systems as a default component for well over a decade.&lt;/p&gt;&lt;p&gt;The vulnerability was uncovered by &lt;a href="https://github.security.telekom.com/2026/04/pack2theroot-linux-local-privilege-escalation.html" rel="nofollow" target="_blank"&gt;Deutsche Telekom's Red Team&lt;/a&gt;, who noticed something suspicious during routine research: running a simple &lt;code&gt;pkcon install&lt;/code&gt; command on a Fedora Workstation could install a system package without prompting for a password. That oddity became a thread worth pulling.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The team — assisted by AI-guided analysis using Claude Opus — eventually identified an exploitable race condition (a flaw where two competing processes can be manipulated to produce an unintended outcome) that allows a low-privileged attacker to install or remove system packages entirely without authorisation, ultimately dropping into a full root shell.&lt;/p&gt;&lt;p&gt;The CVSS score is 8.8 (High), with low attack complexity and no user interaction required—a combination that makes this straightforwardly dangerous in any multi-user environment, shared server, or corporate Linux workstation.&lt;/p&gt;&lt;p&gt;Confirmed vulnerable distributions include Ubuntu Desktop 18.04, 24.04.4, and 26.04 beta; Ubuntu Server 22.04–24.04; Debian Trixie 13.4; Rocky Linux 10.1; and Fedora 43 Desktop and Server. The researchers also flag that servers running Cockpit — a popular web-based Linux admin panel — may be exposed even when PackageKit isn't running as a persistent service, since both tools activate on demand via D-Bus.&lt;/p&gt;&lt;p&gt;One usable indicator of compromise exists: after successful exploitation, the PackageKit daemon crashes with an assertion failure. Administrators can check system logs with &lt;code&gt;journalctl -u packagekit | grep emitted_finished&lt;/code&gt; for evidence of prior exploitation.&lt;/p&gt;&lt;p&gt;The fix is already available. PackageKit 1.3.5 resolves the issue, and Debian, Ubuntu, and Fedora have released patched packages as of April 22, 2026. Users should run their system updater immediately and verify their installed PackageKit version via &lt;code&gt;dpkg -l | grep -i packagekit&lt;/code&gt; or &lt;code&gt;rpm -qa | grep -i packagekit&lt;/code&gt;.&lt;/p&gt;&lt;p&gt;Technical details of the root cause and the proof-of-concept exploit are being withheld pending broader adoption of the patch.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTRmlmCAYIgxUiPSa4hIEG-4WKJTS5K-hQCM3MWh73LgCNurMwcyFNb2z2Sh2h6wY1S2ta2nr-mulpjjmGmL3GzSdfuU9aNVfKm5oR4y3kHc9i1E9Ccky8YEJeC6ILFmfXX8TVf332ZlHhBYcRzYTliMW8c96vjEp0ADdV5NlI0Awudu8cQPpfB8AYi0k/s72-c/Pack2TheRoot.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title> Lovable Left Thousands of Projects Exposed for 48 Days — And Still Hasn't Fixed It</title><link>https://www.cyberkendra.com/2026/04/lovable-left-thousands-of-projects.html</link><category>Data Breached</category><category>Security</category><pubDate>Mon, 20 Apr 2026 22:46:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-5792807751210496895</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Lovable Data Leak" border="0" data-original-height="1117" data-original-width="2048" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWchu2lXsoGQ5mhwnUFPPn7auFxv0mDgZw8ZWifmb-x1r5JDtIYatx_MgOcwrojcpbkm8HdfddgGI-wP_421TkL5QlgPekHmTa1rerAfqwdlscuIscz8BIuLNpz0Mr8Zzeie2AW3yoexYNLUgFq8OqtmJ-yirFpO2oruuoHA9dyLGscuNBoZwVe3HXx30/s16000/lovable-data-leak.webp" title="Lovable Data Leak" /&gt;&lt;/div&gt;&lt;p&gt;The vibe-coding platform Lovable.dev is sitting on a ticking data exposure bomb — and it's been ticking for 48 days.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;A security researcher going by @weezerOSINT published a thread on X today revealing that a critical &lt;b&gt;Broken Object Level Authorization (BOLA) flaw&lt;/b&gt; in Lovable's API allows any free account — created in minutes — to access the source code, database credentials, AI chat histories, and customer data belonging to other users.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The vulnerability affects every project created before November 2025, potentially exposing tens of thousands of developers and their end users.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Update:&lt;/b&gt;&amp;nbsp;&lt;a href="https://www.cyberkendra.com/2026/04/lovable-admits-it-broke-its-own.html" target="_blank"&gt;Lovable Admits It Broke Its Own Security Fix — Exposed User Projects for 76 Days&lt;/a&gt;&lt;/p&gt;&lt;p&gt;BOLA — ranked #1 on OWASP's API Security Top 10 — occurs when an API verifies that a user is logged in, but doesn't check whether that user actually owns the resource they're requesting. In Lovable's case, the &lt;code&gt;/projects/{id}/*&lt;/code&gt; endpoints verify Firebase authentication tokens but skip ownership checks entirely. That single gap is enough to bring the entire platform's project history within reach of anyone with a free account.&lt;/p&gt;&lt;p&gt;The researcher &lt;a href="https://x.com/i/trending/2046218555243307472" rel="nofollow" target="_blank"&gt;demonstrated&lt;/a&gt; just how severe this is by accessing an active admin panel for Connected Women in AI, a Danish nonprofit with over 3,700 developer edits in 2026 alone — clearly not abandoned.&amp;nbsp;&lt;/p&gt;&lt;p&gt;From there, the source code revealed hardcoded Supabase credentials, which were used to query the live database and pull real names, job titles, LinkedIn profiles, and Stripe customer IDs belonging to real professionals from Accenture Denmark and Copenhagen Business School. "This is not hacking. This is five API calls from a free account."&lt;/p&gt;&lt;p&gt;The damage doesn't stop at source code. Because Lovable stores the full AI conversation history tied to each project, an attacker can read every prompt a developer ever sent — including pasted error logs, business logic discussions, and credentials shared mid-session. In one retrieved chat, a developer had walked Lovable's AI through building database tables containing &lt;code&gt;email&lt;/code&gt;, &lt;code&gt;date_of_birth&lt;/code&gt;, &lt;code&gt;stripe_customer_id&lt;/code&gt;, and more. All of it, readable.&lt;/p&gt;&lt;p&gt;The bug was first reported on HackerOne on March 3, 2026 — 48 days ago. Lovable triaged it. Then they shipped ownership checks for new projects and quietly left every pre-existing project wide open.&lt;/p&gt;&lt;p&gt;When the researcher filed a second report documenting additional affected endpoints, Lovable marked it a duplicate and closed it. As of today, a project created in April 2026 returns 403 Forbidden.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Lovable's response was characterized as "sophisticated" in some circles, but the researcher's findings suggest the opposite: the company chose to protect new users and simply abandoned everyone who already built on the platform.&lt;/p&gt;&lt;p&gt;Yesterday, Vercel disclosed its own security incident. Vercel traced the intrusion to Context.ai, a third-party AI tool used by an employee, where a compromised Google Workspace OAuth connection allowed attackers to escalate access into Vercel's internal environments.&amp;nbsp;&lt;/p&gt;&lt;p&gt;A threat actor using the ShinyHunters name subsequently listed stolen Vercel data — reportedly including API keys, source code, and employee records — for sale on BreachForums for $2 million. As &lt;a href="https://www.cyberkendra.com/2026/04/vercel-hacked-through-ai-tool-and-your.html" target="_blank"&gt;Cyber Kendra reported&lt;/a&gt;, Vercel has engaged incident response experts and notified law enforcement, warning the breach may affect hundreds of users across many organizations.&lt;/p&gt;&lt;p&gt;Taken together, both incidents point to a broader structural problem in AI-assisted development platforms: security is bolted on after the fact, if at all.&lt;/p&gt;&lt;p&gt;Security firm Symbiotic noted it bluntly: "Telling developers to review security before publishing doesn't work when those developers chose AI tools because they're not security experts."&lt;/p&gt;&lt;p&gt;What Lovable users should do right now:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;b&gt;Rotate all database credentials immediately&lt;/b&gt;, especially Supabase API keys embedded in your project source.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Audit your AI chat history &lt;/b&gt;for any credentials, API keys, or sensitive data you may have pasted mid-session.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Set projects to private&lt;/b&gt; where possible — though as the researcher notes, free-tier users cannot do this on Lovable.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Assume your pre-November 2025 project source code is already public&lt;/b&gt; and act accordingly.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Update:&lt;/b&gt; Lovable has now responded publicly on X. In an initial statement, the company said: "We did not suffer a data breach," attributing the issue to unclear documentation around what "public" project visibility implies — and confirmed that chat messages on public projects have now been made private. It maintained that code visibility on public projects is "intentional behavior" and "consistent by design."&lt;/p&gt;&lt;p&gt;Following community pushback, Lovable issued a second, more detailed statement acknowledging what actually happened. The company explained that in February 2026, while unifying permissions in its backend, it accidentally re-enabled access to chat histories on public projects — a regression that undid a prior API patch.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The HackerOne reports filed against this were closed without escalation because triage partners incorrectly interpreted the behavior as intentional. Lovable says it has now reverted the change and locked down all public project chats. "We understand that pointing to documentation issues alone was not enough here. We'll do better," the company said.&lt;/p&gt;&lt;p&gt;The chat exposure fix is now in place. However, Lovable has not addressed the source code visibility concern for public projects, which the company continues to describe as working as intended.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWchu2lXsoGQ5mhwnUFPPn7auFxv0mDgZw8ZWifmb-x1r5JDtIYatx_MgOcwrojcpbkm8HdfddgGI-wP_421TkL5QlgPekHmTa1rerAfqwdlscuIscz8BIuLNpz0Mr8Zzeie2AW3yoexYNLUgFq8OqtmJ-yirFpO2oruuoHA9dyLGscuNBoZwVe3HXx30/s72-c/lovable-data-leak.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item></channel></rss>