<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Cyber Kendra</title><description>Tech Hub</description><managingEditor>noreply@blogger.com (Root)</managingEditor><pubDate>Fri, 22 May 2026 23:08:08 +0530</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">3476</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>https://www.cyberkendra.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>All the content is copyright of cyberkendra.com</copyright><itunes:image href="http://2.bp.blogspot.com/-svYWW7Cp8JI/UDUgofD9kUI/AAAAAAAAAEY/ina7VZi4ZRg/s1600/webprotal.png"/><itunes:keywords>Computer,technology,tech,IT,security,Gadgets,Telecom</itunes:keywords><itunes:summary>All about Computer and technology. </itunes:summary><itunes:subtitle>Cyber kendra</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:author>Vivek Gurung</itunes:author><itunes:owner><itunes:email>protalweb@gmail.com</itunes:email><itunes:name>Vivek Gurung</itunes:name></itunes:owner><item><title>How Data Rooms Became Decision-Making Tools</title><link>https://www.cyberkendra.com/2026/05/how-data-rooms-became-decision-making.html</link><category>Tips</category><pubDate>Fri, 22 May 2026 23:08:08 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-4678711839000398852</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Best virtual data rooms" border="0" data-original-height="3062" data-original-width="4899" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWClNq_cR0wgDXeA525Mpr7fNk-RZdbp8XCte7PWL6CozerSNIHslTHQ9Iuzhax7jFsa46jAwUTo0Yoz5Fxmtko76XwKbW6YMLcgZ-TIT8rOoWR4YSRBpIV6HuwjV7XIEX8nVJ85HdcO4GcNqcETOrD1O7aRGpA6PdRNT4FoV-ZnWqrgb5L8bwb3rVvsg/s16000/virtual-data-rooms.webp" title="Best virtual data rooms" /&gt;&lt;/div&gt;&lt;p&gt;Over the years, data rooms were considered simple storage platforms — a secure location where companies posted documents for audit, fundraising, or mergers.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The role of the virtual data room (VDR) has evolved greatly today. It becomes a key node in data room decision-making, assisting the business in interpreting data, monitoring stakeholder activity, and making faster, higher-stakes decisions.&lt;/p&gt;&lt;p&gt;This shift reflects a more radical change in how modern organizations operate: no longer is it a matter of decisions being made purely on documents, but of insights derived from them.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;From Document Storage to Strategic Infrastructure&lt;/h3&gt;&lt;p&gt;Traditional data rooms were designed to resolve a narrow problem: secure document collaboration.&lt;/p&gt;&lt;p&gt;They allowed companies to:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Store confidential files&lt;/li&gt;&lt;li&gt;Restrict access to authorized users&lt;/li&gt;&lt;li&gt;Organize documents for due diligence&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;However, they lacked analytical capabilities.&lt;/p&gt;&lt;p&gt;Modern virtual data room platforms function as strategic infrastructure. They integrate:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Secure storage&lt;/li&gt;&lt;li&gt;Activity tracking&lt;/li&gt;&lt;li&gt;Reporting tools&lt;/li&gt;&lt;li&gt;Workflow automation&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This combination transforms static files into actionable intelligence. Instead of simply hosting documents, today’s platforms actively support data room decision-making by revealing how information is used and by whom.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Virtual Data Room Analytics: Turning Activity into Insight&lt;/h3&gt;&lt;p&gt;The introduction of virtual data room analytics has radically transformed how companies evaluate deals.&lt;/p&gt;&lt;p&gt;These tools monitor user behavior on an ongoing basis, and these include:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Document views&lt;/li&gt;&lt;li&gt;Time spent per file&lt;/li&gt;&lt;li&gt;Download activity&lt;/li&gt;&lt;li&gt;User engagement patterns&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This data generates valuable virtual data room insights.&lt;/p&gt;&lt;p&gt;For example:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;A potential investor who repeatedly reviews financial projections is likely serious&lt;/li&gt;&lt;li&gt;Low engagement with legal documents may signal overlooked risks&lt;/li&gt;&lt;li&gt;High activity from multiple stakeholders may indicate competitive interest&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;These lessons can enable companies to prioritize and allocate resources effectively.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Secure Document Collaboration in Complex Transactions&lt;/h3&gt;&lt;p&gt;Modern deals involve multiple stakeholders working across different locations.&lt;/p&gt;&lt;p&gt;A virtual data room enables secure document collaboration by providing:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Role-based permissions&lt;/li&gt;&lt;li&gt;Encrypted file sharing&lt;/li&gt;&lt;li&gt;Real-time document updates&lt;/li&gt;&lt;li&gt;Detailed audit trails&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This ensures that sensitive information is not lost while remaining available to the appropriate individuals.&lt;/p&gt;&lt;p&gt;Centralization is key. Instead of scattered communication across emails and third-party tools, all collaboration happens within a controlled environment.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Why Data Room Providers Focus on Intelligence&lt;/h3&gt;&lt;p&gt;Leading data room providers have shifted their focus from storage capacity to intelligence.&lt;/p&gt;&lt;p&gt;Today’s platforms compete based on their ability to deliver:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Advanced virtual data room analytics&lt;/li&gt;&lt;li&gt;Clear dashboards and reporting&lt;/li&gt;&lt;li&gt;Customizable workflows&lt;/li&gt;&lt;li&gt;Seamless user experience&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This reflects growing demand for virtual data room insights that directly support business outcomes.&lt;/p&gt;&lt;p&gt;Organizations no longer want tools that simply store files.&lt;/p&gt;&lt;p&gt;They want platforms that:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Highlight risks early&lt;/li&gt;&lt;li&gt;Reveal opportunities&lt;/li&gt;&lt;li&gt;Accelerate decision-making&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;As a result, the virtual data room becomes a decision-support system rather than just a storage solution.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;A Practical Example of Data Room Decision Making&lt;/h3&gt;&lt;p&gt;Consider a startup raising capital.&lt;/p&gt;&lt;p&gt;Using a modern virtual data room, the team can:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Track which investors access the platform&lt;/li&gt;&lt;li&gt;Monitor which documents they review&lt;/li&gt;&lt;li&gt;Measure how long they engage with specific files&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Consistently reviewing financial forecasts and market analysis indicates a strong intent.&lt;/p&gt;&lt;p&gt;The startup can then:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Prioritize communication with that investor&lt;/li&gt;&lt;li&gt;Prepare tailored responses&lt;/li&gt;&lt;li&gt;Anticipate questions&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This is a clear data-driven decision-making case, driven by real-time data. Without analytics, this level of insight would not be possible.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Regional Considerations and Market Practices&lt;/h3&gt;&lt;p&gt;The implementation of data rooms is not consistent across geographies, particularly in regulated markets.&lt;/p&gt;&lt;p&gt;For example, many companies look for certifications such as:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;ISO 27001 for information security management&lt;/li&gt;&lt;li&gt;SOC 2 Type II for operational and security controls&lt;/li&gt;&lt;li&gt;GDPR compliance for handling personal data within the European Union&lt;/li&gt;&lt;li&gt;ISO 27701 for privacy information management&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.cyberkendra.com/2023/05/hipaa-checklist-comprehensive-guide-to.html" target="_blank"&gt;HIPAA compliance&lt;/a&gt; when relating to healthcare data&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;These regional differences are critical for understanding cross-border transactions and international deals, especially when selecting a &lt;a href="https://dataroom.org.uk/" target="_blank"&gt;data room in the UK&lt;/a&gt; or other highly regulated markets.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Automation and Workflow Efficiency&lt;/h3&gt;&lt;p&gt;Another major advantage of modern virtual data room platforms is automation.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Automation features include:&lt;/li&gt;&lt;li&gt;Automatic document indexing&lt;/li&gt;&lt;li&gt;Bulk file uploads&lt;/li&gt;&lt;li&gt;Predefined permission templates&lt;/li&gt;&lt;li&gt;Activity-triggered notifications&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This software reduces manual labor and minimizes errors. It is also because they enhance process uniformity.&lt;/p&gt;&lt;p&gt;Consequently, teams will be able to focus on more valuable activities, including data room decision-making and analysis, rather than on administrative tasks.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Risk Reduction Through Visibility and Control&lt;/h3&gt;&lt;p&gt;Risk management is a core function of any transaction.&lt;/p&gt;&lt;p&gt;A virtual data room enhances risk control by providing:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Detailed audit logs&lt;/li&gt;&lt;li&gt;User activity tracking&lt;/li&gt;&lt;li&gt;Document access history&lt;/li&gt;&lt;li&gt;Security functions as watermarking and two-factor authentication&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;All this is made possible by these capabilities.&lt;/p&gt;&lt;p&gt;In case of a problem, teams can discover:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Who accessed a document&lt;/li&gt;&lt;li&gt;When it was accessed&lt;/li&gt;&lt;li&gt;What actions were taken&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Such visibility minimizes the uncertainty and helps to make better decisions.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Competitive Advantage in High-Stakes Environments&lt;/h3&gt;&lt;p&gt;Data rooms help organizations to gain a competitive advantage.&lt;/p&gt;&lt;p&gt;They can:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Respond to stakeholder requests more quickly&lt;/li&gt;&lt;li&gt;Put information in an organized manner&lt;/li&gt;&lt;li&gt;Identify high-priority opportunities&lt;/li&gt;&lt;li&gt;Accelerate deal timelines&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;These advantages can directly influence results in competitive situations such as M&amp;amp;A or fundraising.&lt;/p&gt;&lt;p&gt;A well-organized virtual data room also signals professionalism. It builds trust with investors, partners, and advisors — often a decisive factor in closing deals.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Future: Intelligent Data Rooms&lt;/h3&gt;&lt;p&gt;The evolution of data rooms is ongoing.&lt;/p&gt;&lt;p&gt;Many platforms are now integrating:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Artificial intelligence&lt;/li&gt;&lt;li&gt;Machine learning&lt;/li&gt;&lt;li&gt;Predictive analytics&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;These technologies enhance virtual data room analytics by:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Identifying missing or incomplete documents&lt;/li&gt;&lt;li&gt;Detecting inconsistencies in data&lt;/li&gt;&lt;li&gt;Recommending relevant files&lt;/li&gt;&lt;li&gt;Predicting user behavior&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This represents the next stage of data room decision-making.&lt;/p&gt;&lt;p&gt;Companies can foresee needs and be proactive rather than respond to user activity. Modern virtual data room providers offer far more than storage.&lt;/p&gt;&lt;p&gt;They deliver:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Actionable virtual data room insights&lt;/li&gt;&lt;li&gt;Advanced virtual data room analytics&lt;/li&gt;&lt;li&gt;Reliable, secure document collaboration&lt;/li&gt;&lt;li&gt;Strong support for data room decision-making&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;These capabilities transform how organizations manage complex transactions.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Conclusion&lt;/h3&gt;&lt;p&gt;The role of data rooms has evolved from passive storage to active decision support.&lt;/p&gt;&lt;p&gt;Today’s virtual data room is a strategic tool that helps businesses:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Understand stakeholder behavior&lt;/li&gt;&lt;li&gt;Reduce risk&lt;/li&gt;&lt;li&gt;Improve efficiency&lt;/li&gt;&lt;li&gt;Make faster, smarter decisions&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This change will only intensify as business environments become more data-driven. Organizations that are effective users of data room providers will handle information efficiently, make better decisions, and achieve better outcomes.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWClNq_cR0wgDXeA525Mpr7fNk-RZdbp8XCte7PWL6CozerSNIHslTHQ9Iuzhax7jFsa46jAwUTo0Yoz5Fxmtko76XwKbW6YMLcgZ-TIT8rOoWR4YSRBpIV6HuwjV7XIEX8nVJ85HdcO4GcNqcETOrD1O7aRGpA6PdRNT4FoV-ZnWqrgb5L8bwb3rVvsg/s72-c/virtual-data-rooms.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Trend Micro's Own Security Tool Turned Against Enterprises — Apex One Zero-Day Actively Exploited</title><link>https://www.cyberkendra.com/2026/05/trend-micros-own-security-tool-turned.html</link><category>Security</category><category>Vulnerability</category><category>ZeroDay Bug</category><pubDate>Fri, 22 May 2026 21:10:40 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-4941070184469962942</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Apex One Zeroday" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2RWKekXHG6dbOJmAofnBDKAwokyPT0w5F4Sz8akE7POSiTcZaHHIwdAY0vesNvUGeUzZFVLYmDHIS8OxJce6JoeGCm917zBx3KsoGrURPKQKa8QSy_Kt-nfEOEcGt8AaMJm0M8AF0ECoGeCjS47FW-akZ84OXLAexyrxJnV3u4uN9D9qvMPqiipXQJMI/s16000/apex-one-flaw.webp" title="Apex One Zeroday" /&gt;&lt;/div&gt;&lt;p&gt;The endpoint security software meant to protect enterprise networks from attackers has itself become a target. Trend Micro has patched a zero-day vulnerability in Apex One — its flagship corporate endpoint protection platform — after its own incident response team caught threat actors actively exploiting the flaw against Windows systems.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Tracked as &lt;b&gt;CVE-2026-34926&lt;/b&gt;, the vulnerability is a directory traversal flaw (a weakness that lets attackers access files and directories outside intended boundaries) in the Apex One on-premises server.&lt;/p&gt;&lt;p&gt;A local attacker who has already obtained admin credentials can exploit it to tamper with a core server table and silently push malicious code out to all endpoint agents deployed across the organization — effectively hijacking the security infrastructure itself to distribute malware.&lt;/p&gt;&lt;p&gt;The attack does carry prerequisites: the target must be running the on-premise version of Apex One, and the attacker must already hold administrative access to the server. That said, those conditions are far from theoretical — TrendAI's incident response team, which discovered the vulnerability, confirmed at least one real-world exploitation attempt before the patch was even released.&lt;/p&gt;&lt;p&gt;CISA has added CVE-2026-34926 to its Known Exploited Vulnerabilities (KEV) catalog and ordered all U.S. federal agencies to apply fixes no later than June 4.&lt;/p&gt;&lt;p&gt;The same &lt;a href="https://success.trendmicro.com/en-US/solution/KA-0023430" rel="nofollow" target="_blank"&gt;update bundle&lt;/a&gt; addresses seven additional high-severity local privilege escalation flaws (CVE-2026-34927 through 34930 and CVE-2026-45206 through 45208), all carrying CVSS scores of 7.8. These were reported by researcher Lays (@_L4ys) of TRAPA Security through Trend Micro's Zero Day Initiative program. Each flaw exploits origin validation errors across different inter-process communication mechanisms in the Apex One agent.&lt;/p&gt;&lt;p&gt;Apex One has been exploited in zero-day attacks repeatedly — in August 2025, September 2023, and September 2022. SecurityWeek notes that some past Apex One attacks have been attributed to Chinese state-sponsored APT groups, and given the level of access required to trigger CVE-2026-34926, a sophisticated threat actor is the most plausible culprit here, too.&lt;/p&gt;&lt;p&gt;&lt;b&gt;What you should do now:&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;On-premises Apex One SP1 users should update to CP Build 18012 (or 17079 for fresh installs)&lt;/li&gt;&lt;li&gt;SaaS and Vision One SEP customers need Security Agent build 14.0.20731 or later&lt;/li&gt;&lt;li&gt;Review who has remote administrative access to your Apex One server and audit perimeter policies immediately&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2RWKekXHG6dbOJmAofnBDKAwokyPT0w5F4Sz8akE7POSiTcZaHHIwdAY0vesNvUGeUzZFVLYmDHIS8OxJce6JoeGCm917zBx3KsoGrURPKQKa8QSy_Kt-nfEOEcGt8AaMJm0M8AF0ECoGeCjS47FW-akZ84OXLAexyrxJnV3u4uN9D9qvMPqiipXQJMI/s72-c/apex-one-flaw.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Why Businesses Should Explore ERP Workflows Risk-Free Before Implementation</title><link>https://www.cyberkendra.com/2025/10/why-businesses-should-explore-erp.html</link><category>Business</category><category>Tips</category><pubDate>Sat, 25 Oct 2025 22:27:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-6079582830337085315</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="ERP Workflows Risk-Free" border="0" data-original-height="2000" data-original-width="3000" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinTzSl2pgnA0m_76iRmWkPpJML1vf6XGaBQB07GUnNGEIcwOWRRoP0TYNGnzWRvJ9IB2VGDUUcyn1DN8IRky0qYj2zHmG0AN1aL8JykeaR96SclA5VtJzrc0g5uGJqyW7XHsJ-T598PnmxFJXvodOYDJS8USHI7SE-_lr3YYkUc3nKHpHx893AgJJztl0/s16000/ERP-Workflows%20.webp" title="ERP Workflows Risk-Free" /&gt;&lt;/div&gt;&lt;p&gt;In today’s rapidly evolving digital economy, efficiency and integration are critical to staying competitive. As organizations grow, managing disparate systems for finance, inventory, sales, and operations becomes increasingly difficult.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;That’s where Enterprise Resource Planning (ERP) systems come in — unifying these processes under a single platform. But investing in a full-scale ERP solution can be daunting. That’s why it’s essential for businesses to &lt;a href="https://centium.net/netsuite-trial" target="_blank"&gt;explore ERP workflows risk-free&lt;/a&gt; before making a long-term commitment.&lt;/p&gt;&lt;p&gt;Today, businesses worldwide are accelerating their digital transformation journeys, seeking systems that can improve collaboration, visibility, and efficiency.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Yet, ERP implementation remains one of the most significant and complex technology decisions an organization can make. The costs, time commitments, and cultural adjustments involved often leave leaders wondering whether the benefits will truly outweigh the challenges.&lt;/p&gt;&lt;p&gt;Fortunately, modern cloud-based ERP providers have recognized this hesitation and introduced free trials and sandbox environments. These allow businesses to test and experience ERP workflows without any upfront investment, mitigating risks while providing valuable hands-on insight into how the system would function in their unique environment.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;Understanding ERP Workflows&lt;/h2&gt;&lt;p&gt;ERP workflows are the backbone of any integrated system. They define how information flows across departments — from procurement and production to finance and customer service.&lt;/p&gt;&lt;p&gt;An efficient workflow ensures that when an event occurs in one area (such as a sale or purchase order), corresponding updates automatically ripple through the entire system. This seamless automation reduces manual errors, speeds up operations, and improves data accuracy.&lt;/p&gt;&lt;p&gt;However, every business has unique needs. A workflow that suits a manufacturing firm may not work for a retail operation or a service-based company. That’s why it’s vital to experiment and customize before deployment — something only possible when businesses explore ERP workflows risk-free through a demo or trial environment.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;The Benefits of Trying ERP Before You Buy&lt;/h2&gt;&lt;h3 style="text-align: left;"&gt;1. Hands-On Learning Without Commitment&lt;/h3&gt;&lt;p&gt;A trial allows business leaders and employees to experience real-world ERP functionalities — from dashboard navigation to data entry and reporting — without financial or contractual obligations. It’s a safe space to understand what works and what doesn’t.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;2. Risk Mitigation&lt;/h3&gt;&lt;p&gt;ERP implementation failures are costly. By testing first, companies can identify integration challenges or gaps early on, ensuring a smoother rollout later. It also helps set realistic expectations for timelines, training requirements, and system adaptability.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;3. Customization and Fit&lt;/h3&gt;&lt;p&gt;Every ERP system is different. Testing multiple platforms enables decision-makers to find the best fit for their business model and industry. Some systems excel in supply chain management, while others specialize in financial automation or project tracking. The right trial helps uncover these strengths and align them with organizational priorities.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;4. Stakeholder Buy-In&lt;/h3&gt;&lt;p&gt;Resistance to change is a common barrier to successful ERP adoption. Allowing teams to test and provide feedback during the trial period helps build internal support. When employees feel included in the decision-making process, they’re more likely to embrace the transition later.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;5. Data-Driven Decision-Making&lt;/h3&gt;&lt;p&gt;Trials often include reporting tools that demonstrate how analytics and dashboards can enhance strategic decision-making. Business leaders can visualize performance metrics and predict outcomes, thereby increasing confidence in their investment decisions.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;Why Centium’s NetSuite Trial Stands Out&lt;/h2&gt;&lt;p&gt;For organizations ready to take that next step, Centium’s NetSuite Trial offers an excellent opportunity to test a leading ERP solution in a secure, cloud-based environment. By signing up for the trial, companies can explore ERP workflows risk-free and experience firsthand how NetSuite simplifies accounting, inventory management, CRM, and more — all from a unified platform.&lt;/p&gt;&lt;p&gt;Unlike traditional on-premises systems, NetSuite’s cloud-based infrastructure ensures real-time access to business data from anywhere. This scalability and flexibility make it ideal for small and medium-sized businesses that plan to grow without constantly upgrading their IT infrastructure.&lt;/p&gt;&lt;p&gt;Centium’s trial environment is designed to mirror a fully functional ERP system, giving businesses a realistic preview of how it can streamline operations, eliminate redundancies, and boost productivity. With expert support available during the trial, users can get tailored insights into how the software can meet their specific operational goals.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Future of ERP Adoption&lt;/h3&gt;&lt;p&gt;As technology advances, ERP systems are becoming more intelligent and accessible. Features like AI-powered forecasting, automated workflows, and integration with emerging tools are transforming how businesses operate. However, even the most advanced ERP solution will only succeed if it aligns with a company’s processes and culture.&lt;/p&gt;&lt;p&gt;That’s why taking the time to explore ERP workflows risk-free is more than a precaution — it’s a strategic advantage. By leveraging trial environments like Centium’s NetSuite offering, organizations can make informed, confident decisions about their ERP investments, ensuring long-term success.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;In Summary:&lt;/h3&gt;&lt;p&gt;ERP systems are powerful tools that can revolutionize business operations — but only if they fit your organization’s needs. By experimenting through a free trial, businesses can evaluate performance, functionality, and usability before committing.&lt;/p&gt;&lt;p&gt;Visit Cyber Kendra to stay informed on the latest in digital transformation, and take the first step toward smarter operations by exploring Centium’s opportunity to explore ERP workflows risk-free today.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinTzSl2pgnA0m_76iRmWkPpJML1vf6XGaBQB07GUnNGEIcwOWRRoP0TYNGnzWRvJ9IB2VGDUUcyn1DN8IRky0qYj2zHmG0AN1aL8JykeaR96SclA5VtJzrc0g5uGJqyW7XHsJ-T598PnmxFJXvodOYDJS8USHI7SE-_lr3YYkUc3nKHpHx893AgJJztl0/s72-c/ERP-Workflows%20.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Windows Kernel Bug Breaks Every Browser Sandbox — And It Almost Stayed Secret Until Pwn2Own</title><link>https://www.cyberkendra.com/2026/05/windows-kernel-bug-breaks-every-browser.html</link><category>Security</category><category>Vulnerability</category><category>Windows 11</category><pubDate>Thu, 21 May 2026 23:28:28 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-243201699795993654</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Windows 11 Kernel Bug" border="0" data-original-height="900" data-original-width="1600" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtPtkrLGsLtZUeQ_Tv2UsH_He3da-5r7yB16YzBy_OJDJsWdJkA-cuzFHnk5aM6fr9xjqUl-Qp2n8MFhOZAFrsWQVi6-4ESSV9UcWgJYUkQH7znuFFlfpABozTREArkec7IWLkSSJh8kRUaa9aJA-RSsfpf5WqZHzbX0CEEd2TL0aflXpYZ_Y7p_AaqcI/w320-h180/windows11-flaw.webp" title="Windows 11 Kernel Bug" width="320" /&gt;&lt;/div&gt;&lt;p&gt;A security researcher prepared a devastating Windows kernel exploit for Pwn2Own Berlin 2026 — then had to watch it go public days before the contest even started.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;CVE-2026-40369&lt;/b&gt; is an unprivileged arbitrary 12-byte kernel write primitive in &lt;code&gt;nt!ExpGetProcessInformation&lt;/code&gt;, reachable from any context that can call &lt;code&gt;NtQuerySystemInformation&lt;/code&gt; — including Chrome, Edge, and Firefox renderer sandboxes. That part that makes this stand out is that browser sandboxes (the isolation layer that's supposed to contain a compromised browser tab) are completely bypassed.&lt;/p&gt;&lt;p&gt;The researcher — Paolo Stagno — had &lt;a href="https://voidsec.com/cve-2026-40369-browser-sandbox-escape/" rel="nofollow" target="_blank"&gt;originally prepared the bug for Pwn2Own Berlin&lt;/a&gt;. A couple of days before the contest, the CVE was assigned, and the bug went public. That timing effectively ended any competition entry, but the disclosure gave the security community something arguably more valuable: a meticulous technical breakdown of how the flaw works and exactly how far an attacker can take it.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What the Bug Actually Does&lt;/h3&gt;&lt;p&gt;The vulnerability resides in &lt;b&gt;ntoskrnl.exe&lt;/b&gt;, in the function &lt;code&gt;ExpGetProcessInformation&lt;/code&gt;, and is triggered by calling &lt;code&gt;NtQuerySystemInformation&lt;/code&gt; with information class 253 (&lt;code&gt;SystemProcessInformationExtension&lt;/code&gt;), passing a kernel address as the output buffer and a length of zero.&lt;/p&gt;&lt;p&gt;The trick here is brutally simple. &lt;b&gt;ProbeForWrite&lt;/b&gt; — the Windows kernel's own mechanism for validating that a buffer pointer is safe to write — is a complete no-op when the supplied length is zero. The entire function body is gated by &lt;code&gt;if (Length)&lt;/code&gt;, so passing &lt;code&gt;Length=0&lt;/code&gt; slides an unvalidated kernel pointer straight through into &lt;code&gt;ExpGetProcessInformation&lt;/code&gt;.&lt;/p&gt;&lt;p&gt;Once inside, the function iterates over all running processes on the system and, for class 253, increments three DWORD values at the attacker's chosen kernel address — providing a reliable 12-byte write primitive. Critically, even though &lt;code&gt;ExpGetProcessInformation&lt;/code&gt; detects the length mismatch and sets &lt;code&gt;STATUS_INFO_LENGTH_MISMATCH&lt;/code&gt;, it does not return early — it stores the error and continues executing the write loop for every process before returning.&lt;/p&gt;&lt;p&gt;The exploit's reliability is described as 100% deterministic. And because &lt;code&gt;NtQuerySystemInformation&lt;/code&gt; is not blocked by Chrome's win32k lockdown, restricted tokens, or untrusted integrity-level checks, the primitive is fully reachable from the renderer sandboxes of Chrome, Edge, and Firefox.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;From Sandbox to SYSTEM&lt;/h3&gt;&lt;p&gt;VoidSec's full write-up chains this primitive into a complete local privilege escalation, lifting a Medium-integrity non-administrator process all the way up to &lt;b&gt;NT AUTHORITY\SYSTEM&lt;/b&gt; via &lt;b&gt;NtCreateToken&lt;/b&gt;. For KASLR (kernel address space layout randomization) bypass, the exploit can be paired with the open-source prefetch-tool, meaning an attacker operating entirely from within a sandboxed browser tab could, in theory, reach full system ownership in two chained steps.&lt;/p&gt;&lt;p&gt;Microsoft assigned it a CVSS score of 7.8 and classified the flaw as an Elevation of Privilege vulnerability affecting Windows 11 versions 24H2 and 25H2.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Patch Is Already Out&lt;/h3&gt;&lt;p&gt;Microsoft's May 2026 Patch Tuesday, released on May 12, includes a fix for CVE-2026-40369. Researcher Ori Nimron (@orinimron123) has since published three tiers of working exploit code on &lt;a href="https://github.com/orinimron123/CVE-2026-40369-EXPLOIT" rel="nofollow" target="_blank"&gt;GitHub&lt;/a&gt; — a basic PoC, a full exploit, and a variant with a Chrome sandbox emulator — making it accessible to both defenders testing their own environments and, inevitably, those with less benign intentions.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What You Should Do&lt;/h3&gt;&lt;p&gt;If you manage Windows 11 24H2 or 25H2 endpoints and haven't applied the May 2026 cumulative update yet, that should move to the top of your patch queue immediately.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The combination of sandbox reachability, deterministic reliability, and publicly available exploit code means this vulnerability has crossed the threshold where "we'll get to it next cycle" is no longer a safe posture. Enterprise teams should also verify that endpoint detection rules are in place for anomalous &lt;code&gt;NtQuerySystemInformation&lt;/code&gt; class 253 calls, which have no legitimate user-space use case.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtPtkrLGsLtZUeQ_Tv2UsH_He3da-5r7yB16YzBy_OJDJsWdJkA-cuzFHnk5aM6fr9xjqUl-Qp2n8MFhOZAFrsWQVi6-4ESSV9UcWgJYUkQH7znuFFlfpABozTREArkec7IWLkSSJh8kRUaa9aJA-RSsfpf5WqZHzbX0CEEd2TL0aflXpYZ_Y7p_AaqcI/s72-w320-h180-c/windows11-flaw.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>PoC Exploit Released for Drupal's Critical SQL Injection CVE-2026-9082</title><link>https://www.cyberkendra.com/2026/05/poc-exploit-released-for-drupals.html</link><category>Drupal</category><category>Security</category><pubDate>Thu, 21 May 2026 22:28:15 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-5989485341691297262</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="SQL Injection in Drupal Core" border="0" data-original-height="1010" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA2t-hzZEsbKHniC93VmzPPwFmk2TN1Ct-SobxZ5Lo1KnVcIB9U_1HxmNx4jQJV-ysIBFEiKAyX6rIDCdW2qxEiFTQQke6rSnr37_3sq83hmslKPHdsDTX3OzQn5etYe5a5QApeShqPyktOACakJ7oG3MvEi_DdLk72Q05X05z2J89ICY03ULM1Gqc3_A/s16000/drupal-sqli.png" title="SQL Injection in Drupal Core" /&gt;&lt;/div&gt;&lt;p&gt;A day after &lt;a href="https://www.cyberkendra.com/2026/05/drupal-patches-highly-critical-sql.html" target="_blank"&gt;Drupal's emergency patches landed&lt;/a&gt;, security researchers at Searchlight Cyber have published a full technical breakdown of CVE-2026-9082 — complete with two working proof-of-concept exploits. If your PostgreSQL-backed Drupal site isn't patched yet, consider this the final warning.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Drupal's database abstraction API exists for one reason: to sanitise queries and prevent SQL injection. The flaw is inside that very layer — specifically in the PostgreSQL-specific override that handles case-insensitive comparisons.&lt;/p&gt;&lt;p&gt;Researcher at &lt;a href="https://slcyber.io/research-center/keys-to-the-kingdom-anonymous-sql-injection-in-drupal-core-cve-2026-9082/" rel="nofollow" target="_blank"&gt;Searchlight Cyber shows&lt;/a&gt; that PostgreSQL is case-sensitive by default, so Drupal wraps query comparisons in a LOWER() function to normalise them. When processing an IN (...) list — say, matching a username against multiple values — it loops through each value and builds SQL placeholder names by combining a field prefix with an array key. The assumption was that those keys would always be sequential integers (0, 1, 2). They aren't.&lt;/p&gt;&lt;p&gt;If an attacker sends a JSON object instead of a plain string for the name field on the login endpoint, PHP decodes it into an associative array with attacker-controlled keys. Those keys land directly inside the SQL text before PDO (PHP's database layer) ever gets to bind and sanitise them. The fix? Three array_values() calls across three files — roughly seven lines of code — that forcibly reset array keys to sequential integers before they reach the vulnerable loop.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Two Entry Points, Both Unauthenticated&lt;/h3&gt;&lt;p&gt;Researchers confirmed two separate paths to trigger the injection:&lt;/p&gt;&lt;p&gt;&lt;b&gt;Variant 1 — &lt;/b&gt;JSON Login endpoint (/user/login?_format=json): An attacker sends the name field as a JSON object with an injected key containing a divide-by-zero subquery. When the boolean predicate is true, the server returns HTTP 500 with a SQLSTATE[22012] division-by-zero error. When false, it returns HTTP 400. That clean status-code split means an attacker can extract arbitrary database content one bit at a time — at scanning speeds. No session, no CSRF token, no credentials required.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Variant 2 — &lt;/b&gt;JSON:API filter parameters (/jsonapi/node/{bundle}): A single GET request with a backtick in a filter key is enough to produce a SQLSTATE[HY093] error on a vulnerable host. This variant doesn't even need a POST body — it's a one-shot fingerprinting probe that works against any publicly accessible node bundle. JSON:API isn't enabled by default, but it's a standard addition on API-driven Drupal deployments.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What's Actually at Risk&lt;/h3&gt;&lt;p&gt;Both exploit variants are fully anonymous — no account needed. On a vulnerable PostgreSQL-backed site, an attacker can quietly extract usernames, password hashes, private content, and any other data the database user can access. From there, privilege escalation and remote code execution are realistic next steps depending on the site configuration.&lt;/p&gt;&lt;p&gt;MySQL and SQLite installations are not reachable via these specific paths, but the same Drupal release bundle includes Symfony and Twig security fixes that apply to every backend — so there's no justification for skipping the update.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What You Should Do Right Now&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Update to the patched releases: Drupal 11.3.10, 11.2.12, 11.1.10 or Drupal 10.6.9, 10.5.10, 10.4.10&lt;/li&gt;&lt;li&gt;If you can't patch immediately, disable the JSON:API module to close Variant 2&lt;/li&gt;&lt;li&gt;Review which user roles can edit Twig templates — a separate exposure path flagged in the same advisory&lt;/li&gt;&lt;li&gt;Check server logs for unexpected HTTP 500 responses on /user/login or /jsonapi/ routes — that's your indicator of active scanning&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;With working exploits now public, automated scanning of Drupal installations has almost certainly already begun. The patch window is effectively closed.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA2t-hzZEsbKHniC93VmzPPwFmk2TN1Ct-SobxZ5Lo1KnVcIB9U_1HxmNx4jQJV-ysIBFEiKAyX6rIDCdW2qxEiFTQQke6rSnr37_3sq83hmslKPHdsDTX3OzQn5etYe5a5QApeShqPyktOACakJ7oG3MvEi_DdLk72Q05X05z2J89ICY03ULM1Gqc3_A/s72-c/drupal-sqli.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Nine-Year-Old Linux Kernel Flaw CVE-2026-46333 Lets Attackers Steal SSH Keys, Shadow Passwords, and Root Access</title><link>https://www.cyberkendra.com/2026/05/nine-year-old-linux-kernel-flaw-cve.html</link><category>Linux</category><category>Security</category><pubDate>Thu, 21 May 2026 09:38:12 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-2567628608663947303</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="CVE-2026-46333 Logic bug in Linux" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXkMjiC3sZ45f1mxAAgz4gGtCkFI7o1fePwL3dkMjUG42vhEUsv3PWmbxI8jN1A-_DyKSyglEIIbx8uAjpzQdRJ7-bmcWOQQrn7Cf7cCvB6Phm2hXKp_W2L5h0GV6cyba98Cj2a-DJgAXJPR6V9LU5X8rICdmN1RwCBd1nWR4bOnxedFcxABOBRKw7UkQ/s16000/linux-local-exploit.webp" title="CVE-2026-46333 Logic bug in Linux" /&gt;&lt;/div&gt;&lt;p&gt;The Qualys Threat Research Unit (TRU) has released the full advisory for CVE-2026-46333, a logic flaw in the Linux kernel's &lt;code&gt;__ptrace_may_access()&lt;/code&gt; function that lets an unprivileged local user disclose sensitive files and execute arbitrary commands as root on default installations of several major Linux distributions. The bug has been sitting quietly in mainline Linux since November 2016 — nearly nine years.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This marks the fourth Linux kernel security issue demanding emergency attention in just three weeks, following &lt;b&gt;&lt;a href="https://www.cyberkendra.com/2026/04/a-732-byte-python-script-can-get-root.html" target="_blank"&gt;Copy Fail&lt;/a&gt;&lt;/b&gt; (April 29), &lt;b&gt;&lt;a href="https://www.cyberkendra.com/2026/05/dirty-frag-no-patch-no-warning-root.html" target="_blank"&gt;Dirty Frag&lt;/a&gt;&lt;/b&gt; (May 7), and &lt;b&gt;&lt;a href="https://www.cyberkendra.com/2026/05/linux-kernel-strikes-again-fragnesia-is.html" target="_blank"&gt;Fragnesia&lt;/a&gt; &lt;/b&gt;(May 13). At this rate, Linux administrators aren't patching vulnerabilities anymore — they're running a triage ward.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What the Bug Actually Does&lt;/h3&gt;&lt;p&gt;&lt;a href="https://cdn2.qualys.com/advisory/2026/05/20/cve-2026-46333-ptrace.txt" rel="nofollow" target="_blank"&gt;TRU identified&lt;/a&gt; a narrow timing window in which a privileged process that is dropping its credentials remains reachable through ptrace-family operations (a set of kernel interfaces used for process inspection and debugging), even though its dumpable flag should have closed that path. By pairing this window with &lt;code&gt;pidfd_getfd()&lt;/code&gt; — a syscall that lets one process grab file descriptors from another — an attacker can essentially pickpocket a dying privileged process before it finishes cleaning up.&lt;/p&gt;&lt;p&gt;The proof-of-concept races against &lt;b&gt;&lt;a href="https://www.cyberkendra.com/2026/05/linux-kernel-had-six-year-bug-that-let.html" target="_blank"&gt;ssh-keysign&lt;/a&gt;&lt;/b&gt;, a setuid binary that ships on every Linux system with OpenSSH installed. During its brief lifetime, ssh-keysign holds the SSH host private key files open as root. The exploit races against its exit, calls &lt;code&gt;pidfd_getfd&lt;/code&gt; on its file descriptor table, and steals the open handles to &lt;code&gt;/etc/ssh/ssh_host_ecdsa_key&lt;/code&gt;, &lt;code&gt;ssh_host_ed25519_key&lt;/code&gt;, and &lt;code&gt;ssh_host_rsa_key&lt;/code&gt;. A second variant targets chage — another setuid binary — and steals the open handle to &lt;code&gt;/etc/shadow&lt;/code&gt;, which contains every user's password hash on the system.&lt;/p&gt;&lt;p&gt;Qualys built four working exploits in total — targeting &lt;code&gt;chage&lt;/code&gt;, &lt;code&gt;ssh-keysign&lt;/code&gt;, &lt;code&gt;pkexec&lt;/code&gt;, and &lt;code&gt;accounts-daemon&lt;/code&gt; — confirming root command execution or credential theft across default installs of Debian 13, Ubuntu 24.04, Ubuntu 26.04, Fedora 43, and Fedora 44.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Why "Local-Only" Doesn't Mean Low Priority&lt;/h3&gt;&lt;p&gt;The bug matters because modern intrusions rarely stop at the first foothold. A web RCE running as www-data, a compromised CI job, a stolen developer shell account, an abused shared-hosting account, or a container workload with access to the host kernel may not start as root. A local kernel bug that reads root-owned secrets can turn that foothold into credential theft, host impersonation, password hash cracking, lateral movement, or a stronger privilege-escalation path.&lt;/p&gt;&lt;p&gt;In a shared-hosting environment, the distinction between credential disclosure and direct root is one without much practical difference — either of those files gets an attacker the rest of the way trivially.&amp;nbsp;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What to Do Right Now&lt;/h3&gt;&lt;p&gt;The fix is Linus Torvald's upstream commit 31e62c2ebbfd — already backported by Debian, Fedora, Red Hat, SUSE, AlmaLinux, CloudLinux, and others. Three concrete steps:&lt;/p&gt;&lt;p&gt;&lt;b&gt;1. Patch and reboot.&lt;/b&gt; Install your distribution's updated kernel and actually reboot — installing the package without rebooting leaves the vulnerable kernel still running.&lt;/p&gt;&lt;p&gt;&lt;b&gt;2. Apply the interim mitigation if patching must wait.&lt;/b&gt; Raise &lt;code&gt;kernel.yama.ptrace_scope&lt;/code&gt; to 2 via &lt;code&gt;sysctl&lt;/code&gt;. This blocks the public exploits since their &lt;code&gt;pidfd_getfd&lt;/code&gt; path is gated by &lt;code&gt;__ptrace_may_access()&lt;/code&gt;. Be aware: this breaks non-root use of &lt;code&gt;gdb -p&lt;/code&gt;, &lt;code&gt;strace -p&lt;/code&gt;, and some container debug tooling, and the setting cannot be lowered without a reboot.&lt;/p&gt;&lt;p&gt;&lt;b&gt;3. Treat SSH host keys as potentially compromised.&lt;/b&gt; If your host allowed untrusted local users during the exposure window, rotate SSH host keys and review any administrative material that lived in the memory of set-uid processes. Silent credential theft is the scariest part of this bug — there's no reliable way to prove after the fact that nothing was exfiltrated.&lt;/p&gt;&lt;p&gt;Working public exploits are already circulating. The window for being ahead of this one is closing fast.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXkMjiC3sZ45f1mxAAgz4gGtCkFI7o1fePwL3dkMjUG42vhEUsv3PWmbxI8jN1A-_DyKSyglEIIbx8uAjpzQdRJ7-bmcWOQQrn7Cf7cCvB6Phm2hXKp_W2L5h0GV6cyba98Cj2a-DJgAXJPR6V9LU5X8rICdmN1RwCBd1nWR4bOnxedFcxABOBRKw7UkQ/s72-c/linux-local-exploit.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Drupal Patches Highly Critical SQL Injection That Lets Anonymous Attackers Hijack PostgreSQL-Backed Sites</title><link>https://www.cyberkendra.com/2026/05/drupal-patches-highly-critical-sql.html</link><category>Drupal</category><category>Security</category><pubDate>Thu, 21 May 2026 00:29:13 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-9074516310879613360</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="CVE-2026-9082 - Drupal SQL Injection" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYmB8vsFk-8-SIe1gbYVNUCjxaUho69AYfhVYBM28rzCaDCHV9kRL9DnLGz5SUFy7HHCbAXAg4bhdTvngwmEKI4KV4mRGSna8qkHnyqQbHo7FCyiXeg1dvfA1bokbsdWZ_aTmYxKJOu5maFtr8RCU4JYwmy8yHAZJiaw4rxJQeLtYCbqqJnBRiejq_CwE/s16000/CVE-2026-9082.webp" title="CVE-2026-9082 - Drupal SQL Injection" /&gt;&lt;/div&gt;&lt;p&gt;Drupal has pushed emergency security updates for a highly critical SQL injection vulnerability in its core database abstraction layer — the kind of flaw that lets an unauthenticated attacker walk straight into your database without needing a username or password.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The vulnerability, tracked as &lt;b&gt;CVE-2026-9082 &lt;/b&gt;and disclosed under advisory &lt;a href="https://www.drupal.org/sa-core-2026-004" rel="nofollow" target="_blank"&gt;SA-CORE-2026-004&lt;/a&gt;, scores 20 out of 25 on Drupal's risk scale. That "Highly Critical" rating isn't an exaggeration: the scoring breakdown shows zero access complexity, no authentication required, and full confidentiality and integrity impact — meaning an attacker can read everything and modify anything.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What's broken and why&lt;/h3&gt;&lt;p&gt;Drupal's database abstraction API is supposed to act as a safety net — a layer between PHP code and the database that automatically sanitizes queries to block injection attacks. But a flaw in this API allows specially crafted HTTP requests to slip past that sanitization entirely, enabling arbitrary SQL to execute directly against the database.&lt;/p&gt;&lt;p&gt;The vulnerability only affects sites running PostgreSQL databases, not MySQL or MariaDB backends. That's a narrowing factor, but PostgreSQL is common among enterprise Drupal deployments — government portals, university sites, and large media organizations frequently run it for performance and compliance reasons.&lt;/p&gt;&lt;p&gt;The consequences of successful exploitation range from &lt;b&gt;data exfiltration&lt;/b&gt; (leaking user records, private content, credentials) to &lt;b&gt;privilege escalation&lt;/b&gt; and, in some configurations, &lt;b&gt;remote code execution&lt;/b&gt; — full server takeover.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Broader blast radius: Symfony and Twig&lt;/h3&gt;&lt;p&gt;The patches do more than fix the SQL injection. The releases for all supported branches also bundle upstream security updates for Symfony and Twig, two PHP libraries that Drupal depends on heavily.&lt;/p&gt;&lt;p&gt;Drupal's advisory explicitly warns that depending on your site's configuration and installed modules, you may be independently vulnerable to those upstream issues — even if PostgreSQL isn't in the picture. All sites should update regardless.&lt;/p&gt;&lt;p&gt;The advisory specifically recommends reviewing which user roles have the ability to update Twig templates, for example through Views or contributed modules — a Twig template injection path could compound the risk significantly.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Who is affected and what to do&lt;/h3&gt;&lt;p&gt;Every supported Drupal branch is in scope: Drupal 10.4 through 11.3. The Drupal Security Team went further and issued best-effort patches for end-of-life Drupal 8 and 9 installations, acknowledging the severity warrants the exception — though those patches come without guarantees and those sites remain exposed to prior unpatched vulnerabilities.&lt;/p&gt;&lt;p&gt;Patched versions are:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;b&gt;Drupal 11: &lt;/b&gt;11.3.10, 11.2.12, 11.1.10&lt;/li&gt;&lt;li&gt;&lt;b&gt;Drupal 10: &lt;/b&gt;10.6.9, 10.5.10, 10.4.10&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Sites using Drupal Steward (Drupal's WAF-based protection service) are already shielded from known attack vectors, but should still upgrade promptly in case additional exploitation paths surface.&lt;/p&gt;&lt;p&gt;Two days before release, the Drupal Security Team issued an advance public notice — rare, and a signal of how seriously they treated this. The team explicitly warned that "exploits might be developed within hours or days" of the advisory going public, urging administrators to reserve time the same day patches dropped.&lt;/p&gt;&lt;p&gt;If your Drupal site runs PostgreSQL and hasn't been updated yet, that window is closing fast. Update now.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYmB8vsFk-8-SIe1gbYVNUCjxaUho69AYfhVYBM28rzCaDCHV9kRL9DnLGz5SUFy7HHCbAXAg4bhdTvngwmEKI4KV4mRGSna8qkHnyqQbHo7FCyiXeg1dvfA1bokbsdWZ_aTmYxKJOu5maFtr8RCU4JYwmy8yHAZJiaw4rxJQeLtYCbqqJnBRiejq_CwE/s72-c/CVE-2026-9082.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>PinTheft: New Linux Exploit Steals Kernel References to Root Shell</title><link>https://www.cyberkendra.com/2026/05/pintheft-new-linux-exploit-steals.html</link><category>Linux</category><category>Security</category><pubDate>Wed, 20 May 2026 23:38:04 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-2826447937744213725</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="PinTheft Linux Flaw" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEu8Iyg8fqy2N8lsmG4ghCtM_-DoX2zQgykFFkA8qHE5u3aS8bywZeZjTSio0x4wbxsi_ZLgz9Omv4qbDWI03FIm11HLneqwIfxLxkTzYJhHiVVRA2PH3_ZY-GVBZ-icho7UPNDD-6IX2VhvYHaGE174QSrHDdy-gGwluS8syl0IRyghf8TSeA6SzwTKs/s16000/PinTheft.webp" title="PinTheft Linux Flaw" /&gt;&lt;/div&gt;&lt;p&gt;A working proof-of-concept exploit for a new Linux kernel privilege escalation bug called &lt;b&gt;PinTheft &lt;/b&gt;went public this week, adding another name to a growing list of kernel-level root escalations that have shaken the Linux security community throughout early 2026.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://github.com/v12-security/pocs/blob/09e835b587bf71249775654061ae4c79e92cf430/pintheft/README.md" rel="nofollow" target="_blank"&gt;Discovered&lt;/a&gt; by Aaron Esau of the V12 security team, PinTheft allows a local attacker to gain root access by exploiting an RDS (Reliable Datagram Sockets) zerocopy double-free bug. A kernel patch is already available — V12 released their PoC only after confirming independent discovery by other teams and verifying the fix landed upstream.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Makes This One Different&lt;/h3&gt;&lt;p&gt;The bug itself lives in a corner of the kernel most people rarely think about: the RDS zerocopy send path, specifically in &lt;code&gt;rds_message_zcopy_from_user()&lt;/code&gt;, which pins user memory pages into kernel space one at a time. If a later page triggers a fault, the error path drops the already-pinned pages — but later RDS message cleanup drops them a second time, because the scatterlist bookkeeping stays live even after the zcopy notifier is cleared. Each failed zerocopy send steals exactly one memory reference from the first page.&lt;/p&gt;&lt;p&gt;On its own, a reference count bug like this is difficult to turn into a useful primitive. PinTheft's real cleverness is what it does next.&lt;/p&gt;&lt;p&gt;To weaponize the reference count bug, the exploit leverages io_uring. The attacker registers an anonymous memory page as an io_uring fixed buffer, assigning it a &lt;code&gt;FOLL_PIN&lt;/code&gt; bias of 1024 references — then systematically drains those references through 1024 deliberately failing RDS sends, until io_uring is left holding a pointer to a page it no longer legitimately owns.&lt;/p&gt;&lt;p&gt;From there, the exploit evicts the target SUID binary's first page from cache, reclaims that same physical page, and uses io_uring's now-dangling buffer pointer to overwrite the page cache of a privileged binary — &lt;code&gt;/usr/bin/su&lt;/code&gt;, &lt;code&gt;passwd&lt;/code&gt;, or &lt;code&gt;pkexec&lt;/code&gt; are preferred targets — with a small custom ELF payload. Run the binary, get a root shell.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Who's Actually at Risk&lt;/h3&gt;&lt;p&gt;Beyond having the RDS module loaded, PinTheft also requires io_uring to be enabled, a readable SUID-root binary to be present, and an x86_64 system. The required RDS module is only default on Arch Linux among common distributions tested — other major distributions do not load it out of the box.&lt;/p&gt;&lt;p&gt;That limits the immediate blast radius. But the conditions aren't exotic on systems where administrators have enabled RDS for workloads that use it, or on containers and CI runners where kernel modules may be more permissive.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;A Pattern That Isn't Slowing Down&lt;/h3&gt;&lt;p&gt;PinTheft follows a wave of other Linux local privilege escalation vulnerabilities disclosed over the past several weeks — DirtyDecrypt, DirtyCBC, &lt;a href="https://www.cyberkendra.com/2026/05/dirty-frag-no-patch-no-warning-root.html" target="_blank"&gt;Dirty Frag&lt;/a&gt;, &lt;a href="https://www.cyberkendra.com/2026/05/linux-kernel-strikes-again-fragnesia-is.html" target="_blank"&gt;Fragnesia&lt;/a&gt;, and &lt;a href="https://www.cyberkendra.com/2026/04/a-732-byte-python-script-can-get-root.html" target="_blank"&gt;CopyFail&lt;/a&gt; — all belonging to the same broad vulnerability class of page-cache overwrite exploits. Threat actors have already begun actively exploiting CopyFail in the wild. Each new PoC in this series raises the question of how many similar bugs remain undiscovered in the kernel's networking and asynchronous I/O subsystems.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What to Do Now&lt;/h3&gt;&lt;p&gt;The straightforward mitigation is to remove RDS entirely if nothing on your system actually needs it:&lt;/p&gt;&lt;pre&gt;rmmod rds_tcp rds
printf 'install rds /bin/false\ninstall rds_tcp /bin/false\n' &amp;gt; /etc/modprobe.d/pintheft.conf&lt;/pre&gt;&lt;p&gt;Apply your distribution's kernel update as soon as it incorporates the upstream patch. If you're running Arch Linux, that should be your first call this week. For everyone else: check whether CONFIG_RDS is enabled in your running kernel before assuming you're clear.&lt;/p&gt;&lt;p&gt;The V12 team also warns that the exploit temporarily corrupts the target SUID binary's page cache in memory. Before running on any test system, the PoC backs up the target binary and prints a restore command — but don't skip the reboot on anything that matters.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEu8Iyg8fqy2N8lsmG4ghCtM_-DoX2zQgykFFkA8qHE5u3aS8bywZeZjTSio0x4wbxsi_ZLgz9Omv4qbDWI03FIm11HLneqwIfxLxkTzYJhHiVVRA2PH3_ZY-GVBZ-icho7UPNDD-6IX2VhvYHaGE174QSrHDdy-gGwluS8syl0IRyghf8TSeA6SzwTKs/s72-c/PinTheft.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>PostgreSQL Patches 11 Security Flaws, Including Code Execution and a Sneaky Password-Stealing Timing Attack</title><link>https://www.cyberkendra.com/2026/05/postgresql-patches-11-security-flaws.html</link><category>Security</category><category>Vulnerability</category><pubDate>Wed, 20 May 2026 23:11:11 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-8201197151934617735</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="PostgreSQL security updates address critical vulnerabilities" border="0" data-original-height="1010" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHlm8PpEmwFLxXSAaDUXC-XBc1zOM5Mgex6MbbXKhpP4FxEsvp1lGCYsapAO1DJxFt1kiPfE8W8YPL-q_lBHDPyvQ_TEBEsUddr3Sm-t3wTnsiTm6JD7oTovAg2aSILC0tSltqd6leTAMeNtlDNGXfn5VW1DXZEGaRez0XzMV1JWbvo2eiI7-jPCsxwZY/s16000/PostgreSQL%20.webp" title="PostgreSQL security updates address critical vulnerabilities" /&gt;&lt;/div&gt;&lt;p&gt;The world's most popular open-source database just dropped its biggest security update of the year — and if you haven't patched yet, attackers may already be eyeing your stack.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The PostgreSQL Global Development Group shipped simultaneous &lt;a href="https://www.postgresql.org/message-id/177876604042.861.12327647497486409223%40wrigleys.postgresql.org" rel="nofollow" target="_blank"&gt;security updates&lt;/a&gt; across every supported major version — 18.4, 17.10, 16.14, 15.18, and 14.23 — fixing 11 CVEs (Common Vulnerabilities and Exposures) and more than 60 additional bugs. Three of those CVEs carry a CVSS score of 8.8 out of 10, meaning they're rated "high severity" and exploitable by a low-privilege remote attacker with minimal friction.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Flaws That Matter Most&lt;/h3&gt;&lt;p&gt;The headline vulnerability is &lt;b&gt;CVE-2026-6637&lt;/b&gt;, a stack buffer overflow buried inside PostgreSQL's &lt;code&gt;refint&lt;/code&gt; contrib module — a built-in tool for enforcing referential integrity between tables. Any unprivileged database user can craft input to trigger the overflow and run arbitrary code as the operating system user running the database. That's a full server compromise from a regular user account.&lt;/p&gt;&lt;p&gt;Equally alarming is &lt;b&gt;CVE-2026-6473&lt;/b&gt;: integer wraparound across multiple PostgreSQL server features lets an attacker force the server to allocate undersized memory blocks, then write beyond their boundaries — leading to segmentation faults and, in the worst case, memory corruption. Ten independent security researchers reported this one, which is a signal that it was being actively probed.&lt;/p&gt;&lt;p&gt;Then there's a subtler threat: &lt;b&gt;CVE-2026-6478&lt;/b&gt;, a covert timing channel in how PostgreSQL compares MD5-hashed passwords during authentication. An attacker can measure the tiny time differences in password comparisons to reconstruct valid credentials — without ever getting a login error. The catch: this only affects databases that still use MD5 passwords, a legacy format inherited from upgrades from PostgreSQL 13 or earlier. The current default, &lt;code&gt;scram-sha-256&lt;/code&gt;, is immune. If you're on an upgraded cluster, check your &lt;code&gt;pg_authid&lt;/code&gt; table.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Logical Replication and Symlink Tricks&lt;/h3&gt;&lt;p&gt;Two more vulnerabilities deserve attention for production deployments. CVE-2026-6638 allows SQL injection via the &lt;code&gt;ALTER SUBSCRIPTION ... REFRESH PUBLICATION&lt;/code&gt; command, giving a subscriber table creator the ability to execute arbitrary SQL using the publication side's credentials — a serious risk for anyone running logical replication (a method of selectively streaming database changes between servers) across trust boundaries.&lt;/p&gt;&lt;p&gt;Meanwhile, CVE-2026-6475 exploits symlink following in &lt;code&gt;pg_basebackup&lt;/code&gt; and &lt;code&gt;pg_rewind&lt;/code&gt;, letting a superuser on the origin server overwrite sensitive OS-level files — such as &lt;code&gt;.bashrc&lt;/code&gt; — on the backup target, potentially hijacking the operating system account during failover operations.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What You Should Do Right Now&lt;/h3&gt;&lt;p&gt;The update process is straightforward: no database dump or schema migration is required. Stop PostgreSQL, replace the binaries, restart. That's it.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;b&gt;Linux (Debian/Ubuntu):&lt;/b&gt; &lt;code&gt;sudo apt update &amp;amp;&amp;amp; sudo apt install postgresql-17&lt;/code&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;RHEL/Fedora:&lt;/b&gt; &lt;code&gt;sudo dnf update postgresql&lt;/code&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;macOS (Homebrew):&lt;/b&gt; &lt;code&gt;brew upgrade postgresql@17&lt;/code&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;For managed cloud databases (AWS RDS, Google Cloud SQL, Azure Database for PostgreSQL), minor version patches roll out during maintenance windows. Log into your console now and verify you're on the patched release — or trigger a manual upgrade if your provider supports it.&lt;/p&gt;&lt;p&gt;This update also serves as a final warning shot for teams running PostgreSQL 14: the version reaches end-of-life on November 12, 2026, after which it will receive no further security fixes. Version 14.23 is the last patch you'll see. If production workloads are still on 14, treat this upgrade cycle as the deadline to migrate to PostgreSQL 16 or 17.&lt;/p&gt;&lt;p&gt;PostgreSQL powers infrastructure at companies ranging from Apple and Instagram to the majority of cloud-native SaaS platforms. A database this deeply embedded in the internet's plumbing is exactly the kind of target that threat actors monitor closely. The 60+ bug fixes bundled alongside these CVEs make patching a double win — security and stability in a single restart.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHlm8PpEmwFLxXSAaDUXC-XBc1zOM5Mgex6MbbXKhpP4FxEsvp1lGCYsapAO1DJxFt1kiPfE8W8YPL-q_lBHDPyvQ_TEBEsUddr3Sm-t3wTnsiTm6JD7oTovAg2aSILC0tSltqd6leTAMeNtlDNGXfn5VW1DXZEGaRez0XzMV1JWbvo2eiI7-jPCsxwZY/s72-c/PostgreSQL%20.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>GitHub's Own Codebase Was Breached — A Poisoned VS Code Extension Was All It Took</title><link>https://www.cyberkendra.com/2026/05/githubs-own-codebase-was-breached.html</link><category>Data Breached</category><category>Security</category><category>Supply Chain</category><pubDate>Wed, 20 May 2026 22:29:15 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-1178144741422026731</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzOZyl0SlPFdXRtvv6zaDFFctJI9H2fpCt4xYoN36vmrUs14cO8OnEIdaXNDVM8mFbXjiR1jwMycPr_-mBwaco55DhzwETlIBhS8jm_BYjP0IAoFBOaWYrhCRrcDmWJM99o-tdnXKkC5VGsxrNJw7Cty18a5ymCa9HvKlxDWZaDh8LbhKmUKKsTqwY4to/s16000/github-hacked.webp" /&gt;&lt;/div&gt;&lt;p&gt;The world's largest code-hosting platform just became the victim of its own ecosystem. On May 20, 2026, &lt;a href="https://x.com/github/status/2056884788179726685" rel="nofollow" target="_blank"&gt;GitHub confirmed&lt;/a&gt; that a threat actor exfiltrated roughly 3,800 of its internal repositories — not through some sophisticated platform zero-day, but by slipping malware into a Visual Studio Code extension and waiting for a GitHub employee to install it.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The attack was claimed by TeamPCP, a cybercrime group that has spent 2026 methodically dismantling developer trust across the open-source &lt;a href="https://www.cyberkendra.com/search/label/Supply%20Chain" target="_blank"&gt;supply chain&lt;/a&gt;. The group posted the stolen data on the Breached cybercrime forum with a $50,000 asking price, threatening to leak everything publicly if no single buyer steps forward.&lt;/p&gt;&lt;p&gt;GitHub's response moved fast. The company said it identified and contained the breach after the poisoned VS Code extension compromised an employee's endpoint. The affected device was isolated, the malicious extension version was pulled, and critical credentials were rotated overnight with the highest-impact secrets prioritized first.&amp;nbsp;&lt;/p&gt;&lt;p&gt;GitHub's current assessment is that only internal repositories were exfiltrated, and the attacker's claims of roughly 3,800 repositories are directionally consistent with what the company's investigation has found so far.&amp;nbsp;&lt;/p&gt;&lt;p&gt;There is, as of now, no evidence that customer repositories, enterprise accounts, or user data were touched — though the investigation remains active.&lt;/p&gt;&lt;p&gt;The mechanics of the attack are deceptively simple. A developer installs what looks like a legitimate VS Code extension — the kind millions of engineers add to their editors without a second thought. The extension is poisoned: it silently compromises the host machine and gives attackers access to whatever that user can reach. For a GitHub employee, that foothold touched thousands of internal repositories.&lt;/p&gt;&lt;p&gt;The TeamPCP group achieved a series of compromises by deploying Mini Shai-Hulud, their adapted version of a self-replicating worm first documented in 2025, which largely automates supply chain attacks by stealing CI/CD credentials and using them to publish infected versions of further packages.&lt;/p&gt;&lt;p&gt;The campaign has affected over 170 packages spanning both npm and PyPI, with more than 518 million cumulative downloads. Earlier in May alone, the group published trojanized versions of Microsoft's official Durable Task Python SDK to PyPI. The malware payload skips systems with a Russian locale — a consistent hallmark of Eastern European cybercrime operations.&lt;/p&gt;&lt;p&gt;Security researchers warn that even limited access to internal repositories could expose operational tooling, internal APIs, authentication workflows, or infrastructure configurations useful for future attacks.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Cybernews researchers noted that exposed source code increases the risk of finding fresh vulnerabilities, particularly in GitHub's integrations with tools like Copilot — even after credentials have been rotated. The breach also arrived shortly after the April 28 disclosure of CVE-2026-3854, a critical GitHub vulnerability that allowed authenticated users to execute arbitrary commands on GitHub servers.&lt;/p&gt;&lt;p&gt;GitHub says a fuller report will be published once the investigation concludes. In the meantime, security teams are urging developers to immediately rotate any API keys or secrets stored in private repositories, audit all IDE extensions and remove anything unverified, and treat their build pipelines as production-grade attack surfaces. When the platform that hosts the world's code gets hit through a developer's own toolchain, the lesson lands for everyone.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzOZyl0SlPFdXRtvv6zaDFFctJI9H2fpCt4xYoN36vmrUs14cO8OnEIdaXNDVM8mFbXjiR1jwMycPr_-mBwaco55DhzwETlIBhS8jm_BYjP0IAoFBOaWYrhCRrcDmWJM99o-tdnXKkC5VGsxrNJw7Cty18a5ymCa9HvKlxDWZaDh8LbhKmUKKsTqwY4to/s72-c/github-hacked.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Google I/O 2026 — Here's Everything Google Announced</title><link>https://www.cyberkendra.com/2026/05/google-io-2026-heres-everything-google.html</link><category>Google</category><category>Technology</category><pubDate>Wed, 20 May 2026 00:28:57 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-2131248114046785409</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Google I/O 2026" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMIJZhBDFtFQf-lI2R0oNFHmvybDHIvEMgioOfrsoa4RIbZwkljtFgwNMt2g4oQ9IyA5VkUjBLCFbBebehOJLQxQxvmBwzKN4DQH3PIciVyaFaM-KrdKFF_76pg7MlA716Ed9xXa9ckCNzXYC8tU4YLZcB8nzInW9XXkjG-YUeSRXtqD3r0vAbLiUfa3E/s16000/Geminiapp_Bento_hero.width-1600.format-webp.webp" title="Google I/O 2026" /&gt;&lt;/div&gt;&lt;p&gt;Google doesn't do small announcements anymore. At I/O 2026 in Mountain View, the company dropped more new products in a single two-hour keynote than most companies release in a year — and a significant chunk of them are already live. The thread running through all of it: Gemini is no longer a chatbot. It's becoming the operating layer of everything Google makes.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Sundar Pichai opened with a scale check that few companies on earth could match. Two years ago, Google was processing 9.7 trillion tokens a month. Last year that climbed to roughly 480 trillion. Today the number is over 3.2 quadrillion per month — a 7x jump in a single year — with over 8.5 million developers now building with Google's models monthly. That trajectory is the context for everything announced on stage.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Gemini Spark: Your First Real AI Agent&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Gemini Spark" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjVjm0SyiTnqZYeia0ev4mSr1ts6sBz832KxStuntnqMHeHbTlBiqcEssiO4XD0DtEyiTxhujyCXugcBFypkLgYo9obxsZkiqfZfu6G8JL3DDSLhB9MocTRGDzoNku_Pe1fiabKgG2HXBxrSLACp3VzI9Zo2tgAr5UxwGYMsLWZD6nGTgwQMWMffdmGD0/s16000/7.png" title="Gemini Spark" /&gt;&lt;/div&gt;&lt;p&gt;Gemini Spark is described as "your personal agent" that takes actions on your behalf to help "navigate your digital life." Google calls it a big shift — transforming Gemini from an assistant that answers questions into an active partner that does real work under your direction. It integrates with Gmail, Docs, and other Google Workspace apps first, before expanding to third-party tools via MCP over the summer.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Spark runs on private Google Cloud servers in the background and keeps working even when you're not actively using your phone. The live demo showed it planning a block party — creating an RSVP tracker in Google Sheets, auto-updating Docs, and sending follow-up email reminders to people who hadn't responded.&amp;nbsp;&lt;/p&gt;&lt;p&gt;You can work with Spark however is most convenient: in the Gemini app, or soon through email and chat. Later this summer, Spark will also operate directly within Chrome, acting as your agentic browser assistant. The beta rolls out to Google AI Ultra subscribers in the US next week.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Android Halo: The Status Bar That Knows What Your Agent Is Doing&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Android Halo" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihkx9sCJhuCGaCevyNywaavwJV_0-mOG0-6o4yZgS2du75IZkZZLDaib-M0YlFp5YhXlTESXqqa59bQkjtpouZLf3G4NEMsYiBW1nPGzMOKnGEhTqdzVa0IJdLwPDrmakX3cKPSIWx0k3CZLBejL11rneY2SJGFpHEgEdjrkSgDuJPtkf3CEQyT1tZKPg/s16000/5.png" title="Android Halo" /&gt;&lt;/div&gt;&lt;p&gt;Android Halo provides at-a-glance visibility into what your agent is working on at any given time, with subtle communication at the top of your phone screen — meaning you can see an agent's progress without having to stop what you're doing or switch apps.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The only visual cue shown so far is a glowing circle morphing into the Gemini sparkle in the upper-left corner of a Pixel phone's status bar. It's coming in Android 17, with more details expected later this year when new Pixel hardware arrives.&amp;nbsp;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Search Gets Its Biggest Upgrade in Nearly 30 Years&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Google AI Search" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKbpszzb7C0Yv3GGWSbmmIpDqTkvvHqyro5TAVMGaDJJ5Bw0BAtaqf_F_Am7RI2Mbuu2kiIs7yPb0WYn7J-gBtLV7AN3hENyZSEYiY5YhwEVjco_xh2X-zNd9MORILo7AbgvFCAl4r8k_WusZDgggmH2V27pi1Q785mhdaoNVZ40Gu-Fui7frs2NcQVuU/s16000/6.png" title="Google AI Search" /&gt;&lt;/div&gt;&lt;p&gt;By combining with Gemini Spark, questions you ask in Search can now be agentic — instead of returning a snapshot of information at that moment, Search can give you ongoing updates in the future. Searching is now an AI function, not just a text input.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Google is also combining AI Overviews and AI Mode into a more unified experience, letting users move seamlessly between traditional results, AI-generated answers, and follow-up conversations without losing context. The deeper you go into a conversation, the more relevant links and sources become. The updated experience is rolling out globally today.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Gemini 3.5 Flash and Omni: The Engine Room&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Gemini Omni" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhneeoOoWlxg6gjhcOppQFzLrtNdnSRx_Ae2f49hTkXaM9OVp0-fT1h8q10UgKqzq6LG1jeeq-ceDF4aWnE-Q5YrD5aUgkXKIz_whqdNYKkIId6TSDWm_hv-E8_1eHu1V-0wl506wl6680PdoxgSv3gCNFe9SXFu7909lIHA5krRSinPl0bkM4f8OxYUFo/s16000/4.png" title="Gemini Omni" /&gt;&lt;/div&gt;Gemini 3.5 Flash is better across all benchmarks than the previous Gemini 3.1 Pro, has made significant progress in coding, and is four times faster than other frontier models in terms of output tokens per second.&amp;nbsp;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Gemini Omni is a new series of models that combines Gemini's reasoning with creation — accepting image, audio, video, and text as input and generating video output grounded in real-world physics and knowledge. Omni Flash is live today for Google AI Plus, Pro, and Ultra subscribers, as well as YouTube Shorts and YouTube Create users at no extra cost.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Antigravity 2.0: Coding by Agent&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Antigravity 2.0" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjs93U-KrPTgOmpSO13m10LJrPoXHhXCsBWV4uVHQP6mh0hgfbMfOfvQOR1udqLShOvaLWEeh_BdqLrAVwhOGkOE-zfncLqr0BNzRHAoah5LjxcwZPpUlPtGMaCTYej-PVUqsFkjrZMFmXcTrUtx9d6HggqbEk2H2IJamLlvBPCF2rjVJIkMgVNowEcLCc/s16000/3.png" title="Antigravity 2.0" /&gt;&lt;/div&gt;&lt;p&gt;Antigravity will now use Gemini 3.5 Flash and allow for faster development cycles. At I/O, Google announced a standalone desktop application dubbed Antigravity 2.0 and a new command-line interface for developers who prefer staying in the terminal, along with new Google Cloud standard privacy protections.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The platform now includes native voice support and integrations with Android, Firebase, and Google AI Studio, and is described as "unabashedly agent-first."&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;CodeMender: The AI That Patches Your Security Holes Automatically&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="CodeMender" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbBYthF9gHWyiVaPvqfVDqFv4_UryPER0nqfXj8ObbbUlwBMP7WVS5Tq9v66Ww89boYJIR4hQeyzVM_ZEmcLF9m-tfmL_y8bV88PcoDdBCCfztaG6F4JC23PgOqFREnMHVDH0qyu1OSZjJa-SdU-JylmcZTFI_GKFF2K7LUPkm_s_3PuUPDZBKROqTEkA/s16000/1.png" title="CodeMender" /&gt;&lt;/div&gt;&lt;p&gt;This is the announcement that didn't get nearly enough attention in the keynote recaps. CodeMender is a new AI-powered agent developed by Google DeepMind that takes a comprehensive approach to code security that's both reactive — instantly patching new vulnerabilities — and proactive, rewriting existing code to eliminate entire classes of flaws. Over the six months Google spent building it, CodeMender already upstreamed 72 security fixes to open-source projects, including codebases as large as 4.5 million lines.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The tool was built using Google's learnings from BigSleep and OSS-Fuzz. It relies on Gemini for root cause analysis, after which it produces security patches that are peer-reviewed by specialized "critique agents" before reaching a human reviewer for final sign-off.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;b&gt;CodeMender &lt;/b&gt;is now available as a powerful AI security agent through Google's Agent Platform, letting any developer — not just Google's own teams — benefit from autonomous vulnerability detection and patching. Alongside CodeMender, Google also announced a dedicated AI Vulnerability Reward Program with bounties up to $30,000, and Secure AI Framework 2.0, an updated set of industry standards for securing autonomous AI agents.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Google Pics, Stitch, and Pomelli: The Creative Triple Threat&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Google Pics &amp;amp; Stitch" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEima9V4H88PTbHGd7uVCfatIkkK12gtCwzytwBWb-hbDoIAi5rdGtwESeaQzKoR13qH0JffT-8NFmgHsPLWkAxVPftWF0DfDN7ry-38vkNuWCoFrszvY_0sqsDjL1NJIUkKOhKsNooMKSfT5Wuc7HC3IP3hL8JSswyZ53N1MS5QGbkJjkJyXSIUlX03rLA/s16000/2.png" title="Google Pics &amp;amp; Stitch" /&gt;&lt;/div&gt;&lt;p&gt;Google Pics is a new image creation tool inside Google Flow that lets you generate images on the fly with AI, all automatically watermarked with SynthID. Stitch lets people create and launch websites using AI, with simple voice inputs to make changes and guide layouts in real time.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Pomelli goes a step further — introducing AI agents that can help you design your brand book and launch a full website, adding new ways to build brand content and entire web presences from scratch. Together, the three tools represent Google's most direct move yet into the territory occupied by Canva, Squarespace, and similar creative platforms.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Universal Cart and the End of Tab-Switching While Shopping&lt;/h3&gt;&lt;p&gt;Google has partnered with Amazon, Shopify, and Walmart on a new open standard called the &lt;b&gt;&lt;a href="https://www.cyberkendra.com/2026/01/google-just-changed-how-youll-shop-with.html" target="_blank"&gt;Universal Commerce Protocol&lt;/a&gt;&lt;/b&gt;, designed to unify digital commerce so AI agents can browse inventories and handle entire purchases without hard-coded integrations for each merchant.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The Universal Cart follows you across Google services, notifying you when items go on sale or come back in stock. In one demo, it flagged that a chosen motherboard and processor were incompatible and recommended a replacement that actually worked — then added everything to the cart automatically. It arrives in the US this summer.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Gemini for Science, Project Genie, and the Long Game&lt;/h3&gt;&lt;p&gt;Gemini for Science will bring together powerful AI tools to assist researchers and help scientists model complex concepts, framed as "a force multiplier for human ingenuity to usher in a new age of progress." Project Genie is being connected with nearly 20 years of Google Street View imagery, letting people create new virtual worlds anchored in real locations. These two announcements sit at the edge of the consumer keynote but point to where Google's deepest research bets are heading.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Daily Brief, Ask YouTube, and Docs Live&lt;/h3&gt;&lt;p&gt;Daily Brief is a personalized digest that sifts through your Gmail, Calendar, and Tasks to prioritize your day and suggest next steps. It's rolling out today to Google AI Plus, Pro, and Ultra subscribers in the US. Ask YouTube expands more widely this summer, letting you use YouTube search as an AI chatbot that points you to exact timestamps in videos that answer your questions. Docs Live, coming this summer to AI Pro and Ultra subscribers, lets you verbally brain-dump whatever's on your mind — complete with "ums" and mid-sentence changes — and Gemini converts it into a finished, structured document.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Bigger Bet&lt;/h3&gt;&lt;p&gt;Google is looking to spend six times more on AI in 2026 than it did in 2022, with an estimated $190 billion in capital expenditures for the year alone.&amp;nbsp;&lt;/p&gt;&lt;p&gt;That's not hedging. Everything shown at I/O 2026 — from Spark running quietly in the cloud, to CodeMender patching your repositories overnight, to Halo glowing in your status bar — is Google betting that the next platform isn't an operating system or a search box. It's an agent that already knows what you need before you type it.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMIJZhBDFtFQf-lI2R0oNFHmvybDHIvEMgioOfrsoa4RIbZwkljtFgwNMt2g4oQ9IyA5VkUjBLCFbBebehOJLQxQxvmBwzKN4DQH3PIciVyaFaM-KrdKFF_76pg7MlA716Ed9xXa9ckCNzXYC8tU4YLZcB8nzInW9XXkjG-YUeSRXtqD3r0vAbLiUfa3E/s72-c/Geminiapp_Bento_hero.width-1600.format-webp.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Microsoft's durabletask Hit by TeamPCP — Your Cloud Keys Were the Target</title><link>https://www.cyberkendra.com/2026/05/microsofts-durabletask-hit-by-teampcp.html</link><category>Microsoft</category><category>Security</category><category>Supply Chain</category><pubDate>Tue, 19 May 2026 23:52:33 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-697797231284041860</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="durabletask python package hacked" border="0" data-original-height="703" data-original-width="1618" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY-oTV5rsT5DbBvRpvNjjmwP17Y6e8FxbVWnRiSWsm1lfB71RwBFM9a9MohZ29IPY80aMftSF3W7YsNq0tz-W6yFK6EBk9JfNSgeGppaBHB6R7MS9N4VtR752bWXczBZ2piP0fc0gsihSTUobz46kUGE_dZ9-3ZeVwndIRxFhos0xMM7JbZ0vxKm_6fKc/s16000/durabletask.webp" title="durabletask python package hacked" /&gt;&lt;/div&gt;&lt;p&gt;TeamPCP has quietly poisoned yet another trusted developer package — and this time the target was sitting inside Microsoft's own toolchain. Three consecutive releases of &lt;b&gt;durabletask &lt;/b&gt;(v1.4.1, v1.4.2, and v1.4.3), the official Python client for Microsoft's Durable Task workflow framework, were compromised and loaded with credential-stealing malware — a direct follow-on to the group's hit on &lt;b&gt;guardrails-ai&lt;/b&gt; just days earlier.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Same Worm, A Sharper Payload&lt;/h3&gt;&lt;p&gt;Security researchers at Wiz disclosed the compromise, noting that the malicious payload — dubbed rope.pyz — is an evolved version of transformers.pyz, the dropper previously deployed in the guardrails-ai attack on May 11.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The core mission hasn't changed: steal everything and move on. But the durabletask variant is notably more aggressive in where it injects, spreading its hooks across &lt;code&gt;task.py&lt;/code&gt;, &lt;code&gt;entities/__init__.py&lt;/code&gt;, &lt;code&gt;extensions/__init__.py&lt;/code&gt;, and &lt;code&gt;payload/__init__.py&lt;/code&gt; — giving it more entry paths than the earlier version. The C2 (command-and-control) server has also shifted from a raw IP address to check.gitservice.com, with a fallback to t.m-kosche.com, and SSL verification is now enabled — a sign the operation is maturing.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Gets Stolen — And How It Spreads&lt;/h3&gt;&lt;p&gt;The worm's credential sweep is comprehensive by design. Once executed on a Linux host, it goes after AWS IAM keys, Azure and GCP service account tokens, Kubernetes service account credentials, HashiCorp Vault tokens, filesystem passwords, and the contents of your shell history files (&lt;code&gt;.bash_history&lt;/code&gt;, &lt;code&gt;.zsh_history&lt;/code&gt;). If you store credentials in Bitwarden, 1Password, or pass/gopass, the payload attempts to brute-force unlock them using passwords it harvests along the way.&lt;/p&gt;&lt;p&gt;What makes this variant especially dangerous is its lateral movement. After infection, the worm actively scans for AWS SSM-reachable instances (Amazon's remote management service) and Kubernetes clusters, then propagates itself to up to five additional targets per compromised host. In a shared CI/CD environment or a cloud cluster, that ceiling can still translate to dozens of machines from a single install event.&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;"These packages are likely to be installed in local developer environments, CI jobs, release workflows, and internal build systems — where git tokens, cloud credentials, Kubernetes service account tokens, and deployment secrets live." — Wiz Threat Intelligence&lt;/p&gt;&lt;/blockquote&gt;&lt;p class="note wr"&gt;&lt;b&gt;⚡ Immediate Action Required&lt;/b&gt;— If your environment installed durabletask v1.4.1, v1.4.2, or v1.4.3, treat the host as fully compromised. Rotate all cloud credentials immediately and check for the infection marker at ~/.cache/.sysupdate-check.&amp;nbsp;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Part of a Relentless 2026 Campaign&lt;/h3&gt;&lt;p&gt;The &lt;b&gt;durabletask &lt;/b&gt;compromise doesn't exist in isolation. TeamPCP — also tracked as PCPcat, ShellForce, and DeadCatx3 — has been running supply chain operations since at least September 2025, gaining notoriety following the React2Shell campaign that exploited cloud environments.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Through early 2026, the group cascaded through Trivy, Checkmarx KICS, LiteLLM, and Telnyx before pivoting to the Mini Shai-Hulud npm and PyPI wave that poisoned over 400 packages in a single night in mid-May. The guardrails-ai infection on May 11 served as the direct precursor to the durabletask attack — the group reusing and refining the same payload architecture each time.&lt;/p&gt;&lt;p&gt;What makes TeamPCP analytically notable is the architectural decision to chain multiple compromises sequentially — where each foothold yields the specific credentials needed to compromise the next target. This isn't spray-and-pray malware. Each package is chosen because it lives in a sensitive part of a development pipeline.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Security Teams Must Do Now&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style="text-align: left;"&gt;&lt;li&gt;Find the exposure: Search lockfiles and CI logs for durabletask versions 1.4.1, 1.4.2, or 1.4.3. Look for &lt;code&gt;/tmp/managed.pyz&lt;/code&gt; or &lt;code&gt;/tmp/rope-*.pyz&lt;/code&gt; on Linux hosts.&lt;/li&gt;&lt;li&gt;Check for execution: The infection marker lives at &lt;code&gt;~/.cache/.sysupdate-check&lt;/code&gt; (general) and &lt;code&gt;~/.cache/.sysupdate-check-k8s&lt;/code&gt; (Kubernetes). Its presence confirms the payload ran.&lt;/li&gt;&lt;li&gt;Rotate everything: AWS IAM credentials, Azure service principals, GCP service accounts, Kubernetes service accounts, Vault tokens, and any passwords that lived in Bitwarden, 1Password, or shell history. Treat all of these as already exfiltrated.&lt;/li&gt;&lt;li&gt;Audit SSM and Kubernetes: Check CloudTrail for &lt;code&gt;SSM:SendCommand&lt;/code&gt; and &lt;code&gt;SSM:DescribeInstanceInformation&lt;/code&gt; calls. Review Kubernetes audit logs for unexpected &lt;code&gt;kubectl exec&lt;/code&gt; activity.&lt;/li&gt;&lt;li&gt;Block C2 infrastructure: At DNS or proxy level, block &lt;code&gt;check.gitservice.com&lt;/code&gt; and &lt;code&gt;t.m-kosche.com&lt;/code&gt;, and outbound connections to the exfil endpoints &lt;code&gt;/v1/models&lt;/code&gt;, &lt;code&gt;/audio.mp3&lt;/code&gt;, and &lt;code&gt;/api/public/version&lt;/code&gt;.&lt;/li&gt;&lt;li&gt;Enforce lockfile hashes: Going forward, validate every PyPI package against known-good hashes. A compromised publishing token — not a vulnerability in your code — is all it takes for the next wave.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The clean versions of durabletask (v1.4.0 and below) are unaffected. Given TeamPCP's cadence in 2026, this will not be the last package to carry rope.pyz — the question is which trusted dependency gets hollowed out next.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY-oTV5rsT5DbBvRpvNjjmwP17Y6e8FxbVWnRiSWsm1lfB71RwBFM9a9MohZ29IPY80aMftSF3W7YsNq0tz-W6yFK6EBk9JfNSgeGppaBHB6R7MS9N4VtR752bWXczBZ2piP0fc0gsihSTUobz46kUGE_dZ9-3ZeVwndIRxFhos0xMM7JbZ0vxKm_6fKc/s72-c/durabletask.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Google's Aluminium OS Spotted on GDG Community Page Hours Before I/O 2026 Keynote</title><link>https://www.cyberkendra.com/2026/05/googles-aluminium-os-spotted-on-gdg.html</link><category>Google</category><category>Googlebook</category><pubDate>Tue, 19 May 2026 22:17:46 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-4559695105247130972</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Google's mysterious Aluminum OS spotted before IO 2026" border="0" data-original-height="1152" data-original-width="2048" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjY88lAMQvbbE4SabCCfRmQpm-kUboyQkBwy_ne4GHK1uBrtkf2BoWIHv6l0tCc9w-yn2JN-snuFaF8ZwRg5aXJn7CftzZzMhMNTpQl7x8da23DechBjSWAr7-GwHEX3UgwyJNxSLpHO5s9d-xWPZrADiGVZ1pyuyzUw54biq5oOc_W8R5sQGf4FJvqIG8/s16000/googleos-aluminioumos.webp" title="Google's mysterious Aluminum OS spotted before IO 2026" /&gt;&lt;/div&gt;&lt;p&gt;A Google Developer Groups event page quietly confirmed what millions of Chromebook users have been waiting to hear — but the story is more complicated than a name leak.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Hours before Google's I/O 2026 keynote kicked off at the Shoreline Amphitheater, Cyber Kendra spotted a GDG Nuremberg recap event page that surfaced, listing "&lt;b&gt;Googlebook &amp;amp; Aluminum OS&lt;/b&gt;" as a confirmed discussion topic — describing it plainly as "Google's new premium laptop category and the merged Android/ChromeOS platform underneath it."&amp;nbsp;&lt;/p&gt;&lt;p&gt;For anyone tracking the slow-burning death of ChromeOS, that single line on a community calendar told the whole story before Sundar Pichai said a word on stage.&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img border="0" data-original-height="1245" data-original-width="1410" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4S05gzfwSRkNly1JfrpxgZB5Dj0f-S0VCG5aX2lYjFo-Ubh6G_za5W87HuUxQTjmeazimLmWw45jjCasozaujyEfp6ICofY3PCSsLjZuqDQAxvK3ukrTynpYCrjn9KSsHbvYkFVlsWQj1b0YQB5ScqO2GGJzi5GR1t-TKLQLlT0KoOQlDHQowGhsAGY0/s16000/aluminiumos-spotted.webp" style="margin-left: auto; margin-right: auto;" /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Image- CyberKendra&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/p&gt;&lt;p&gt;But here's the thing: this wasn't a leak in the traditional sense. Google had already pulled back the curtain on May 12, during a pre-I/O livestream called The Android Show: I/O Edition. The GDG page was simply a community mirror of what Google had already put on the table — and it's precisely that kind of casual community-level confirmation that tends to cut through the PR gloss.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;What Aluminium OS Actually Is&lt;/h2&gt;&lt;p&gt;&lt;a href="https://aluminium-os.com/" target="_blank"&gt;Aluminium OS&lt;/a&gt; is the internal codename for a desktop-optimized Android-based operating system that replaces the Linux-based ChromeOS for consumers. The same Android core runs on both mobile and desktop, adapting to different screen sizes — and it supports both ARM and x86 processors, which would make it the first mainline x86-maintained Android build.&lt;/p&gt;&lt;p&gt;Google has since clarified that "Aluminium" is a development codename, not the final retail brand, and says the actual consumer name will be revealed later in 2026. The hardware carrying this OS has a name, though: Googlebook — Google's deliberate answer to the MacBook branding game.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The announcement was made by Senior Director for Laptops and Tablets Alex Kuscher, and at its center is a feature called Magic Pointer — an AI-powered cursor built with Google DeepMind that brings Gemini's context awareness directly to wherever your mouse is pointing. Shake your cursor over a spreadsheet chart, and Gemini offers analysis. Hover over a paragraph, and it surfaces rewrite or translation options. It is, in effect, Gemini embedded into the lowest level of how you interact with a screen.&lt;/p&gt;&lt;p&gt;Beyond the cursor, Cast My Apps lets users open Android phone apps directly on the laptop display mid-workflow, while Quick Access lets users browse and insert files from a phone via Google Drive — no cable or manual transfer required. Create Your Widget lets users prompt Gemini to build a custom desktop widget pulling from Gmail, Calendar, or the web.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Who Makes the Hardware — and Who Gets Left Behind&lt;/h3&gt;&lt;p&gt;The first Googlebooks are being built by Acer, ASUS, Dell, HP, and Lenovo, with retail availability expected in Q3 2026. Every device will carry a distinctive "Glowbar" light strip as a hardware identifier for the platform. Pricing hasn't been announced, but the range is expected to span from sub-$300 education devices to premium models competing with MacBooks at $1,000+.&lt;/p&gt;&lt;p&gt;For existing Chromebook owners, the news is mixed. Chromebooks with Intel 12th Gen (Alder Lake) or MediaTek Kompanio 520 processors, at least 8GB of RAM, and 128GB of storage are the strongest candidates for future Aluminium OS upgrades. Older, lower-spec devices will likely remain on Chrome OS until their support window expires.&lt;/p&gt;&lt;p&gt;Critically, ChromeOS is not going away entirely — Google intends to keep it alive for enterprise and education users, where the managed, locked-down experience that IT departments depend on remains intact. Schools running Chromebook fleets won't need to panic.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Why This Matters Beyond the Laptop Market&lt;/h3&gt;&lt;p&gt;Microsoft is embedding Copilot into Windows. Apple is integrating Apple Intelligence across its platforms. Google's answer — Gemini baked into the OS at the architecture level rather than retrofitted — gives it a structural advantage neither OpenAI nor Anthropic can replicate: every Googlebook user becomes a Gemini user by default, with no app to download and no subscription to manage.&lt;/p&gt;&lt;p&gt;The GDG Nuremberg event page, scheduled for May 21-22 as a community recap of I/O announcements, plans to dig into exactly this: what Aluminium OS means for Android developers building for large screens, and how the shift to a merged platform affects the existing app testing matrix. Those are developer-facing questions that the polished keynote stage tends to gloss over — and they are often where the real story lives.&lt;/p&gt;&lt;p&gt;Google I/O 2026 is still unfolding today. More details on Aluminium OS, pricing, and the device lineup are expected. But the developer community already knew the headline before the lights came up.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjY88lAMQvbbE4SabCCfRmQpm-kUboyQkBwy_ne4GHK1uBrtkf2BoWIHv6l0tCc9w-yn2JN-snuFaF8ZwRg5aXJn7CftzZzMhMNTpQl7x8da23DechBjSWAr7-GwHEX3UgwyJNxSLpHO5s9d-xWPZrADiGVZ1pyuyzUw54biq5oOc_W8R5sQGf4FJvqIG8/s72-c/googleos-aluminioumos.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Microsoft Busts "Fox Tempest" — A Dark Web Service That Sold Fake Code Signatures to Ransomware Gangs</title><link>https://www.cyberkendra.com/2026/05/microsoft-busts-fox-tempest-dark-web.html</link><category>Microsoft</category><category>Security</category><pubDate>Tue, 19 May 2026 21:57:43 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-4301297788081163485</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Fox Tempest" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-5WmxRa0xiFNcP5CP1ZSze88SfarY4Ik68oNecLFRFgscgpp3bn5WQ-lbm0n5Wgzxo0WutpApdlbDedT0l9ofuNI6LbB9HCSiSwHTV9FvuGOL8-SiOebtyK7VhTP-FYzNdgGaJo5N-d1iwNTH9KqTnsiHeeDsv2hSgO2gFMasfijZgu7mOmjcM2MYcsw/s16000/fox-Tempest.webp" title="Fox Tempest" /&gt;&lt;/div&gt;&lt;p&gt;Microsoft has dismantled a sophisticated criminal operation that essentially ran a paid signing service for malware, allowing ransomware groups to make their malicious software appear completely legitimate to Windows security tools.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The threat actor, tracked as &lt;b&gt;Fox Tempest&lt;/b&gt;, operated a service called signspace[.]cloud that exploited Microsoft's own Artefact Signing infrastructure (formerly Azure Trusted Signing) to generate short-lived, 72-hour code-signing certificates. Those certificates let malware masquerade as trusted software — think AnyDesk, Microsoft Teams, PuTTY, or Webex — bypassing endpoint security controls that would otherwise flag unsigned executables.&lt;/p&gt;&lt;p&gt;In May 2026, Microsoft's Digital Crimes Unit (DCU), working with industry partners, pulled the plug on the operation and revoked over 1,000 fraudulent certificates Fox Tempest had generated across hundreds of Azure tenants.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;How the Service Worked&lt;/h3&gt;&lt;p&gt;Fox Tempest ran this like a proper SaaS business. Customers — other cybercriminals — paid between $5,000 and $9,500 per plan (with higher tiers getting queue priority) via a bilingual English-Russian Google Form. They'd upload malicious payloads to Fox Tempest-controlled environments and receive a properly signed binary back, ready to deploy.&lt;/p&gt;&lt;p&gt;The infrastructure evolved over time. By February 2026, the group had shifted to providing customers with pre-configured virtual machines hosted on Cloudzy, a US-based VPS provider, further streamlining operations and reducing their own exposure.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.microsoft.com/en-us/security/blog/2026/05/19/exposing-fox-tempest-a-malware-signing-service-operation/" rel="nofollow" target="_blank"&gt;Microsoft believes&lt;/a&gt; Fox Tempest likely used stolen US and Canadian identities to pass the identity verification required for Artefact Signing certificates.&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img alt="Fox Tempest attack chain" border="0" data-original-height="2090" data-original-width="2560" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5qsVmw7YIAuJN17XnKytPd3X1JfakAPgjufKHD6pe4nn8kv6aL1mUJA6boKQLuW-WKafgsI8A4BNPWJFJJwoXMJqINNdhhjAHEtBYEuRXw0y1dkicOTwxQgAG8WxcZsHPaWES8_4JaoAHpLGIxvGQbuTOCXdAeFXM6W7F_tTiVhUYlOyq-YenXzCfoR8/s16000/Figure-8.-Vanilla-Tempest-and-Fox-Tempest-attack-chain-scaled.webp" style="margin-left: auto; margin-right: auto;" title="Fox Tempest attack chain" /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Fox Tempest attack chain | Image- Microsoft&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Real-World Damage&lt;/h3&gt;&lt;p&gt;The downstream impact was severe. Ransomware groups, including Vanilla Tempest, Storm-0501, and Storm-2561, all used Fox Tempest-signed malware in active attacks. One documented chain involved Vanilla Tempest distributing a trojanized Microsoft Teams installer through paid Google Ads — victims who downloaded it got the Oyster backdoor and, in several cases, Rhysida ransomware.&lt;/p&gt;&lt;p&gt;Microsoft links Fox Tempest to proceeds in the millions, with victim organisations spanning healthcare, education, government, and financial services across the US, France, India, and China.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What You Should Do&lt;/h3&gt;&lt;p&gt;Microsoft recommends enabling cloud-delivered protection in Microsoft Defender, turning on Safe Links and Safe Attachments in Defender for Office 365, and activating attack surface reduction rules — specifically the advanced ransomware protection rule. Users should also be cautious when downloading software via search ads, even if the binary appears to be signed.&lt;/p&gt;&lt;p&gt;The takedown is significant, but the model Fox Tempest pioneered — malware-signing-as-a-service — is likely to be replicated. Security teams should treat code signatures as a trust signal, not a guarantee.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-5WmxRa0xiFNcP5CP1ZSze88SfarY4Ik68oNecLFRFgscgpp3bn5WQ-lbm0n5Wgzxo0WutpApdlbDedT0l9ofuNI6LbB9HCSiSwHTV9FvuGOL8-SiOebtyK7VhTP-FYzNdgGaJo5N-d1iwNTH9KqTnsiHeeDsv2hSgO2gFMasfijZgu7mOmjcM2MYcsw/s72-c/fox-Tempest.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Discord Calls Are Now End-to-End Encrypted — Even Discord Can't Listen In</title><link>https://www.cyberkendra.com/2026/05/discord-calls-are-now-end-to-end.html</link><category>Discord</category><category>Privacy</category><pubDate>Tue, 19 May 2026 08:34:19 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-8438075982447028630</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Call on Discord Is Now End-to-End Encrypted" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPqJI3ZnS4x5Wb-drXxQxewwDLbrnaqc32dpvHq2s-K6rXW4uOvlsiUPZLTfAMlKyU8aMLtcoKMXX7ITztxfDHreSapd6dMppb9jQg1GHdr3lhtWIt03KlaAzQ4BaQ2_qKXt6GmKm3Jg71t1O6jkUk1sobaE7G1hLvFGMkFvcAlIZdaGKQXifEHNVlJZo/s16000/discord-e2e-call.webp" title="Call on Discord Is Now End-to-End Encrypted" /&gt;&lt;/div&gt;&lt;p&gt;For years, Discord held the same uncomfortable position as every other major communication platform: it could technically access your voice and video calls if asked.&lt;br /&gt;Today, Discord has now completed the full rollout of end-to-end encryption (E2EE — where only the people in a call can decrypt it, not even the platform itself) across every voice and video call on the platform, no settings toggle required.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The change affects DMs, group DMs, server voice channels, and Go Live streams — essentially everything except Stage Channels, which are designed for large broadcast-style audiences where E2EE isn't architecturally suited.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What DAVE actually does under the hood&lt;/h3&gt;&lt;p&gt;The system is built on a custom protocol called DAVE — Discord's Audio and Video End-to-End Encryption — developed with input from cybersecurity firm Trail of Bits, using WebRTC encoded transforms and Message Layer Security (MLS) to protect calls even from Discord's own servers. In plain terms: each audio and video frame gets encrypted using a per-sender symmetric key that only the people on the call can access. External parties, including Discord, are never privy to the media encryption keys.&lt;/p&gt;&lt;p&gt;What makes DAVE technically remarkable isn't just what it does — it's where it has to do it. DAVE has been providing E2EE for tens of millions of calls on Discord every single day, spanning users simultaneously on laptops, phones, PlayStations, Xboxes, and web browsers in the same call. Getting a single encryption protocol to work seamlessly across that device diversity, without audible lag or call quality regressions, is genuinely non-trivial.&lt;/p&gt;&lt;p&gt;At one point, extending DAVE to Firefox exposed a browser-level bug that Discord couldn't simply work around. Rather than ship a patch or quietly drop Firefox support, the team went upstream — collaborated directly with Mozilla, identified the root cause in Firefox's codebase, and helped get a fix merged. That's a level of commitment to "doing it right" that most platform teams don't bother with.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;How to verify your call is actually encrypted&lt;/h3&gt;&lt;p&gt;On the desktop app, a green lock icon labeled "End-to-end encrypted" now appears in the Voice/Video Details panel, along with a new Privacy tab containing a Voice Privacy Code. That code can be compared out-of-band with other participants — on a different platform or in person — to confirm no one is being impersonated on the call. Privacy codes update whenever participants join or leave. It's an optional but meaningful layer for high-stakes conversations.&lt;/p&gt;&lt;p&gt;Each Go Live stream also has its own Stream Privacy Code accessible via the right-click context menu, letting streamers verify the encrypted state of their broadcast independently from the voice channel.&amp;nbsp;&lt;/p&gt;&lt;p&gt;This E2EE rollout landed in the middle of a period of significant trust turbulence for Discord. The platform simultaneously introduced "teen-by-default" settings globally, requiring age verification via face scan or government ID — a move that drew backlash, especially after a 2025 breach at Discord's third-party verification vendor exposed at least 70,000 government ID photos. Completing call encryption — where even Discord cannot listen in — is a direct response to exactly that kind of trust problem.&lt;/p&gt;&lt;p&gt;It's a notable split: Discord is simultaneously expanding what it can't access (your calls) while navigating controversy over what users are being asked to hand over (government IDs). Call encryption doesn't resolve that tension, but it does represent a structural, verifiable privacy guarantee that no policy document can replicate.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What's still not encrypted: text&lt;/h3&gt;&lt;p&gt;&lt;a href="https://discord.com/blog/every-voice-and-video-call-on-discord-is-now-end-to-end-encrypted" rel="nofollow" target="_blank"&gt;Discord has confirmed&lt;/a&gt; it has no current plans to extend E2EE to text messages. The reason is engineering scope, not reluctance: text-based features like message search, moderation, bots, and content filtering are all built on the assumption that messages are readable server-side.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Re-architecting that for E2EE would require rebuilding significant platform infrastructure. For now, if a conversation needs full end-to-end security — text and audio — Signal remains the better choice.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What this means for users&lt;/h3&gt;&lt;p&gt;If you're on a current version of the Discord app, your voice and video calls are now encrypted by default, with no action required on your part. Third-party applications and bots that connect to Discord voice must now implement DAVE support to continue functioning, which means some niche bots may have already broken or require updates from their developers. If a bot in your server abruptly dropped out of voice channels around March 2026, this is likely why.&lt;/p&gt;&lt;p&gt;The DAVE protocol is open-source, and the implementation has been publicly audited — which means the encryption claim isn't one you have to take on faith. That's rarer than it should be.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPqJI3ZnS4x5Wb-drXxQxewwDLbrnaqc32dpvHq2s-K6rXW4uOvlsiUPZLTfAMlKyU8aMLtcoKMXX7ITztxfDHreSapd6dMppb9jQg1GHdr3lhtWIt03KlaAzQ4BaQ2_qKXt6GmKm3Jg71t1O6jkUk1sobaE7G1hLvFGMkFvcAlIZdaGKQXifEHNVlJZo/s72-c/discord-e2e-call.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Storm-2949 Hackers Turned One Stolen Password Reset Into a Full Azure Cloud Takeover</title><link>https://www.cyberkendra.com/2026/05/storm-2949-hackers-turned-one-stolen.html</link><category>Microsoft</category><category>Security</category><pubDate>Tue, 19 May 2026 08:16:51 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-1788216183812945564</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="hackers exfiltrating data" border="0" data-original-height="4168" data-original-width="7295" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2RxByYrZ8-wOwTG6kIHSp0R00EV8WbTbvUM5EebtGB9bMZFL6e3z_mO33DbYu_Sh4eXAY7Zdn6EgnthSlZoBig8gDkAQV5GO7oN_hRLjopJVxsfIT4awyb2-LQhCdDl9iHJqKV1a1Xn-Q2fj0B1SR1Z8QfARaGkzCmpPqs5gKWGq48gqPWkuPGclxtpM/s16000/Storm-2949.webp" title="hackers exfiltrating data" /&gt;&lt;/div&gt;&lt;p&gt;A single helpdesk phone call was all it took.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Microsoft's Threat Intelligence team has &lt;a href="https://www.microsoft.com/en-us/security/blog/2026/05/18/storm-2949-turned-compromised-identity-into-cloud-wide-breach/" rel="nofollow" target="_blank"&gt;published&lt;/a&gt; a detailed breakdown of how a threat actor it tracks as Storm-2949 weaponized Microsoft's own Self-Service Password Reset (SSPR) feature — a routine IT tool — to trigger a sweeping breach across a victim organization's entire cloud environment, spanning Microsoft 365, Azure App Services, Key Vaults, SQL databases, and virtual machines.&lt;/p&gt;&lt;p&gt;The attack never used traditional malware. Instead, Storm-2949 impersonated IT support staff and called targeted employees, convincing them to approve what looked like routine multi-factor authentication (MFA) prompts.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Once victims clicked "Approve," the attacker hijacked the password reset flow, wiped the legitimate user's authentication methods, and enrolled their own device as the new trusted authenticator — effectively locking the real user out permanently.&lt;/p&gt;&lt;p&gt;Using those hijacked accounts — which held privileged Azure role-based access control (RBAC) permissions — the attackers quietly mapped the organization's tenant using automated Microsoft Graph API queries, then began draining OneDrive and SharePoint, targeting VPN configurations and remote access documentation.&lt;/p&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img alt="Storm-2949 attack diagram." border="0" data-original-height="693" data-original-width="836" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkxms8Ell_KUN6k6gZbNREnV-pnS58d9UaqJm1xNzomYgoP5WAcSnM3YA7pN7GxWaZILUJ_jOPOuOYHQcGrqYVYMn93rCgyEE1Jwksa9aQ1-SkEBN0fssE2y-Ct_JGjia3jyfAHhgrYViPA4t7IQxtid1Oi0UtR3euQo5VGoADz12mhvBLoPzF2fN80ng/s16000/image-79.webp" style="margin-left: auto; margin-right: auto;" title="Storm-2949 attack diagram." /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Storm-2949 attack diagram | Microsoft&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;That was just phase one.&lt;/p&gt;&lt;p&gt;According to Microsoft's Threat Intelligence, on the Azure side, Storm-2949 pivoted to App Service publishing profiles to harvest deployment credentials, then raided an Azure Key Vault in under four minutes, pulling database connection strings, identity credentials, and application secrets. Those secrets unlocked the crown jewel: the organization's primary production web application, whose password they changed to maintain control.&lt;/p&gt;&lt;p&gt;From there, they manipulated SQL firewall rules to extract database contents, abused Azure Storage account keys to exfiltrate blob data over multiple days using a custom Python script, and deployed ScreenConnect — a legitimate remote management tool — on virtual machines after disabling Microsoft Defender's real-time protection. Post-compromise activity included harvesting .pfx certificate files and scanning network shares for password strings.&lt;/p&gt;&lt;p&gt;The entire operation exploited legitimate administrative features rather than vulnerabilities, making detection significantly harder.&lt;/p&gt;&lt;p&gt;Microsoft's guidance is direct: enforce phishing-resistant MFA (hardware keys or certificate-based authentication) for all privileged accounts, restrict SSPR to pre-registered methods only, audit Azure RBAC assignments regularly, and deploy Defender for Cloud across Key Vault, Storage, and App Service workloads.&lt;/p&gt;&lt;p&gt;Three attacker-controlled IP addresses have been published as indicators of compromise: 176.123.4[.]44, 91.208.197[.]87, and 185.241.208[.]243 (the ScreenConnect C2 server).&lt;/p&gt;&lt;p&gt;The broader warning is hard to miss — in cloud environments, identity is the perimeter.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2RxByYrZ8-wOwTG6kIHSp0R00EV8WbTbvUM5EebtGB9bMZFL6e3z_mO33DbYu_Sh4eXAY7Zdn6EgnthSlZoBig8gDkAQV5GO7oN_hRLjopJVxsfIT4awyb2-LQhCdDl9iHJqKV1a1Xn-Q2fj0B1SR1Z8QfARaGkzCmpPqs5gKWGq48gqPWkuPGclxtpM/s72-c/Storm-2949.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>How I Deep Clean My Windows Junk Files with Advanced SystemCare 19</title><link>https://www.cyberkendra.com/2026/05/how-i-deep-clean-my-windows-junk-files.html</link><category>Tips</category><category>Windows</category><pubDate>Mon, 18 May 2026 21:45:10 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-7266849813245073962</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Delete Windows Junk Files" border="0" data-original-height="423" data-original-width="1269" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhplHDE_Z5yd-fl-fn7Y6Ae7ZIdLKzn6xHi9f56vA1z8ePSinv_BONXJczR-RNEZix3vW3LUrhbOBoNEM-fZju2WiViqfLEgECWIHO-hrj3dHfAJKZjZ-MEwstvlP27Yq0VEMsKOKQ2nTRTcyDW8qkJILGvxT1SqzHQXd0dUItjgCbN2DaLmEwuHThgN3o/s16000/windows-junk-files.webp" title="Delete Windows Junk Files" /&gt;&lt;/div&gt;&lt;p&gt;Over time, I noticed my Windows PC was becoming slower, especially after installing and testing many Windows apps. Even after uninstalling some apps, my storage space kept shrinking, and performance didn’t fully improve. That’s when I realized that Windows applications leave behind cache files, temporary files, logs, and other data that quietly accumulate over time.&lt;p&gt;&lt;/p&gt;&lt;p&gt;To solve this problem, I started using &lt;a href="https://www.iobit.com/en/advancedsystemcarefree.php?insur=enmd_cyberkendra_asc" target="_blank"&gt;Advanced SystemCare&lt;/a&gt; 19, a PC cleaner and Windows optimization tool that safely and automatically removes hidden junk files. After using it regularly, I found it much easier to clean up stored and hidden junk, free up storage space, and improve overall system responsiveness. In this tutorial, I’ll show you how I use Advanced SystemCare 19 to deep-clean Windows junk in just a few simple steps.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;Why I Started Cleaning My Windows Junk Files&lt;/h2&gt;&lt;p&gt;At first, I underestimated how much clutter Windows apps could create. Even though these apps are convenient, many continue generating unnecessary data in the background.&lt;/p&gt;&lt;p&gt;The most common junk files I found included temporary cache files, update leftovers, log files, outdated installation files, and uninstallation remnants. Over time, these files consumed a surprising amount of disk space and started affecting my PC’s startup speed and responsiveness.&lt;/p&gt;&lt;p&gt;After reading about the Junk File Clean feature in Advanced SystemCare 19, I decided to test it myself. The software claimed it could fully clean outdated data created by Windows programs, automatically improving system speed and freeing up storage space.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;My Step-by-Step Experience Cleaning Windows Programs' Junk Files&lt;/h2&gt;&lt;h3 style="text-align: left;"&gt;Step 1. Installing and Opening Advanced SystemCare 19&lt;/h3&gt;&lt;p&gt;First, I downloaded this &lt;a href="https://www.iobit.com/en/advancedsystemcarefree.php?insur=enmd_cyberkendra_asc" target="_blank"&gt;Windows cleane&lt;/a&gt;r from the official website and installed it on my Windows PC. After launching the software, I immediately noticed the dashboard offered two main cleaning modes: AI Mode and Manual Mode.&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" data-original-height="652" data-original-width="952" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYmK6Kl8z4pDcJaLUtv6uZ_0ap_Kwv7q84RWD1XxpvSZAcslDYzbBvuSDTx4OY2islEaxKLQZ3hMaTci4OkswBh4MrbAYhTQse5QXszy0jTI0wLWOqidrAMKjY7IllpFlwR3Gs3rQrty4wmmvp5x7ABIQSG3uJdTBsRCGVlbIW4nYeZSSp4Cot-YRAAeA/s16000/download%20(6).png" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;For deep cleaning Windows app junk files for the first time, I chose manual mode because it gives me more control over what gets scanned and cleaned. However, for regular maintenance, I usually use AI Mode because it automates everything intelligently. However.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Step 2. Using Junk File Clean in Manual Mode&lt;/h3&gt;&lt;p&gt;Inside Manual Mode, I found several optimization and cleanup modules. To focus on all Windows junk files, I enabled all the checkboxes, including the Privacy Sweep, for additional cleanup.&lt;/p&gt;&lt;p&gt;What impressed me most was that the professional Junk File Clean feature in version 19 could detect junk created by multiple Windows applications much more thoroughly than the default Windows cleanup tools.&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="cleanup tools" border="0" data-original-height="649" data-original-width="952" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2ISnEYq5sAFwyE-JkK7qqSjwH7K_HQU01SHf16jflVQpkA3SgHQRbUBwDwxFYVNnqc1bCD0bTcoMqCqrbEHwvncRiGIuZbZtew-ScOrtPiSmllKsgRKZT8zA5IcoBti5zv8KJ8KZh925WM9QYFN34ZcuxByMCSwd_Lq7NLOWnbrqPQQnhqpUMQooToEM/s16000/download%20(5).png" title="cleanup tools" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Step 3. Running the Scan&lt;/h3&gt;&lt;p&gt;Once the scan started, Advanced SystemCare analyzed my system for multiple types of clutter, including: temporary app cache, installation leftovers, invalid shortcuts, useless registry entries, privacy traces, and old Microsoft Store app data. The scanning process felt surprisingly fast, and I could see the amount of reclaimable disk space updating in real time.&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="disk space updating in real time" border="0" data-original-height="653" data-original-width="952" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNF7tCH1bu-ofCK2SoXz8JRJ-C8vG0VuOLfhqt0cc8-ZEl1ZUrzDSYyESIj8bolqZQATeZyh754rowyqkZLTeH1XUOZANtQnPuo8EFb2-vt9exKwDaGovZ3QXFiyYDHvGgU45RRNr_QC6si1i7R5ztriRydbMlDVIpor08GGqMdJuox_Q2ODrm6Cxw0X4/s16000/download%20(4).png" title="disk space updating in real time" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Step 4. Removing the Detected Junk Files&lt;/h3&gt;&lt;p&gt;After the scan finished, the software displayed a detailed cleanup report showing all detected junk files and leftover data. Before cleaning, I carefully reviewed the results, then clicked the Fix button. Advanced SystemCare safely removed cache files, temporary files, outdated Microsoft Store data, registry clutter, and privacy traces.&lt;/p&gt;&lt;p&gt;I appreciated that the software focused only on unnecessary files rather than deleting important system data. After the cleanup finished, I immediately noticed extra free storage space and smoother system performance.&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="smoother system performance" border="0" data-original-height="653" data-original-width="951" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbFn-MCldrNACnMukJtHqvyxY7AHzskGdnqXmsFuWY5_y6UK0Qlq8lGyYr3bVb5gOY71ACPC1P_KuMX5VsV01Qfto64hg6cK3CEAgRy19NhRVVG0QTMicwV6nFcOFywZZZjKhiYaiHaADmbHRausaFCFPOcdxfNyHB2-Vbw47LLEnLjr62W0p33MAA8UM/s16000/download%20(3).png" title="smoother system performance" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Step 5. The Cleanup Results I Noticed&lt;/h3&gt;&lt;p&gt;Once the process was completed, the confirmation screen summarized everything that had been cleaned. On my older system, the difference was noticeable almost immediately. Startup speed improved, and applications opened more smoothly.&lt;/p&gt;&lt;p&gt;The Summary screen also showed the total number of junk files removed, disk space reclaimed, problems fixed, and privacy and security improvements. For ongoing maintenance, I enabled AutoCare, which now performs cleanup automatically in the background.&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="cleanup automatically in the background" border="0" data-original-height="660" data-original-width="960" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixn95lZxG5nw_9CBwAVWMAGd8_YEnjItIiGw0H2BC3hXos5fn5-4KGwEa_pO_VZIFouYF6X4xSdO3-APUqDO3tMXE4MJ43sMgwZ623Togao8aTXyOPk-B4sxhgCTSwS39lPvN8InX6qAF1GDxldcROd7ySsf397XNhxgdmq-gh_pnk6dYkVr1JxO5GxeA/s16000/download%20(2).png" title="cleanup automatically in the background" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Why Advanced SystemCare 19 Stood Out for Me&lt;/h3&gt;&lt;p&gt;Although I originally turned to Advanced SystemCare 19 mainly to remove persistent Windows apps' junk files, I quickly realized that the software offers far more than a PC cleaner, particularly for performance and speed optimization.&amp;nbsp;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Windows apps' junk files" border="0" data-original-height="651" data-original-width="951" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuDSBTae0SDwpVRJ8EBlHdg7MsVyYrV_AQTAFfL0PXm2rhejlhA0yyxDDr3ctbzugt2oZlVPLdxGRg5AMf83bzKplSWxHH-UYap79KD4GXS7rfWoZSimwZMva2FKuuJaOqkW62Np03kIfmnBG4xqVmUxW-FdetRuVU6RUBHta4_FL5Ld9FDaf7rx4YA00/s16000/download%20(1).png" title="Windows apps' junk files" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The Startup Optimizer became an immediate asset, significantly reducing my boot times by disabling unnecessary startup programs that typically drag down system responsiveness. When I needed to push my hardware further during intensive gaming sessions or heavy multitasking, Turbo Boost proved invaluable by temporarily pausing non-essential background processes to channel raw power where it mattered most.&amp;nbsp;&lt;/p&gt;&lt;p&gt;To cap it off, the Internet Booster delivered a highly noticeable upgrade to my daily workflow, accelerating web browsing and improving download speeds by optimizing my browser settings.&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="accelerating web browsing" border="0" data-original-height="653" data-original-width="952" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvV0n-0VUZeSeNVuEx8wgAEMiQzlXJqD9e8TP4n3hcv3CarDJAmlc3CniwKppr253qkqrs2K8Kvzs2Fc74byMZR-GdfvYwx-n65HMrdts1SpVTayo7GQt_mHfwOgV2p-QvIDs6SoCoPNKbDH948Vh0M2RNieccU5F71z46_r3HoNOR0e4sgwiRa4q8Isc/s16000/download.png" title="accelerating web browsing" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Beyond sheer speed, Advanced SystemCare 19 stood out for its robust, intuitive suite of privacy and security features. The Privacy Shield acted as a secure barrier, safeguarding my sensitive files and personal data from unauthorized third-party access, while the automated Anti-Spyware Protection continuously worked in the background to root out hidden spyware and adware threats.&amp;nbsp;&lt;/p&gt;&lt;p&gt;My everyday online experience felt much cleaner and safer thanks to Browser Protection, which actively blocked intrusive ads, prevented frustrating homepage hijacking, and cleared away tracking traces.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Final Thoughts&lt;/h3&gt;&lt;p&gt;Before using Advanced SystemCare 19, I didn’t realize how much hidden junk Windows programs were leaving behind on my system. Manually searching for cache folders and leftover files felt frustrating and incomplete.&lt;/p&gt;&lt;p&gt;After switching to Advanced SystemCare 19, cleaning junk files became much easier, faster, and safer. The software helped me recover storage space, improve system responsiveness, and reduce unnecessary clutter without requiring advanced technical skills. What I personally liked most was the combination of automatic cleanup, intelligent scanning, privacy protection, and performance optimization all in one place.&lt;/p&gt;&lt;p&gt;If your PC feels slower over time or your storage space keeps disappearing unexpectedly, Windows junk files could be a hidden cause. From my experience, regular deep cleaning with Advanced SystemCare 19 can make a noticeable difference in keeping Windows fast, clean, and responsive.&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhplHDE_Z5yd-fl-fn7Y6Ae7ZIdLKzn6xHi9f56vA1z8ePSinv_BONXJczR-RNEZix3vW3LUrhbOBoNEM-fZju2WiViqfLEgECWIHO-hrj3dHfAJKZjZ-MEwstvlP27Yq0VEMsKOKQ2nTRTcyDW8qkJILGvxT1SqzHQXd0dUItjgCbN2DaLmEwuHThgN3o/s72-c/windows-junk-files.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Grafana Labs Refuses Ransom After GitHub CI Flaw Exposed Its Source Code</title><link>https://www.cyberkendra.com/2026/05/grafana-labs-refuses-ransom-after.html</link><category>Data Breached</category><category>Security</category><pubDate>Sun, 17 May 2026 19:41:35 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-3373609206036922183</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Grafana Hacked" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB-HpWqGFCdtetjp_1FbGBCv6dtRHDi4sgcxDzs1LQZVx-W-MoNgGztEUkI4tZ9vaix_RsQQ2rwd-RpkuAFmqmVgAmM-W5_NQtd4qYNYwZeQuUDLQBuCB-hnf5_Oh5JtQhOwrM2nGGlbhTiFw-36zEy4GnJCpyWP2-lEBNsRp0bXjwAl_T65AKe4Hl7Mw/s16000/Grafana-hacked.webp" title="Grafana Hacked" /&gt;&lt;/div&gt;&lt;p&gt;Grafana Labs publicly confirmed this week that attackers stole a GitHub access token through a misconfigured CI/CD pipeline, downloaded private source code repositories, then attempted to extort the company — and walked away empty-handed.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The breach, announced via a &lt;a href="https://x.com/grafana/status/2055827123236171827" rel="nofollow" target="_blank"&gt;six-tweet thread on X&lt;/a&gt;, traces back to a subtle but well-known class of GitHub Actions vulnerability called a "&lt;b&gt;Pwn Request.&lt;/b&gt;" A recently enabled GitHub Action workflow configured to trigger on pull_request_target events inadvertently granted external contributors — anyone who could open a pull request — access to production secrets during CI runs.&lt;/p&gt;&lt;p&gt;The attacker's method was methodical. By forking a Grafana repository, injecting malicious code via a curl command, and dumping environment variables to a file encrypted with a private key, the threat actor extracted privileged tokens, then deleted their fork to cover their tracks before leveraging the stolen credentials against four additional private repositories.&lt;/p&gt;&lt;p&gt;What stopped the attacker from going completely undetected? Their own curiosity. One of the thousands of canary tokens — invisible tripwires Grafana embeds across its code and infrastructure — was triggered, immediately alerting the global security team. Canary tokens are decoy credentials designed to fire an alert the moment they're used, exposing access that would otherwise go unnoticed.&lt;/p&gt;&lt;p&gt;Grafana's investigation found no evidence of code modifications, unauthorized access to production systems, or exposure of customer data. The company revoked all compromised tokens, disabled the vulnerable workflows, and ran a full credential audit using tools including Trufflehog and Gato-X.&amp;nbsp;&lt;/p&gt;&lt;p&gt;That didn't stop the attacker from trying their luck. After downloading the private codebase, they escalated to extortion — demanding payment in exchange for not releasing the stolen code. Grafana refused. The company cited FBI guidance, noting that paying ransoms offers no data-recovery guarantee and only incentivizes more attacks.&lt;/p&gt;&lt;p&gt;Reports from &lt;a href="https://x.com/H4ckmanac/status/2055380899840078266" rel="nofollow" target="_blank"&gt;Hackmanac&lt;/a&gt; and Ransomware.live attribute the attack to CoinbaseCartel, a data extortion crew that emerged in September 2025 and is assessed to be an offshoot of the ShinyHunters, Scattered Spider, and LAPSUS$ ecosystems. Unlike traditional ransomware groups, CoinbaseCartel focuses exclusively on data theft and extortion, and has already claimed over 170 victims across healthcare, technology, transportation, and manufacturing.&lt;/p&gt;&lt;p&gt;The incident lands as part of a troubling pattern. It follows Instructure's controversial decision to settle with ShinyHunters after the group threatened to leak terabytes of data from thousands of U.S. schools. Grafana's refusal to pay sets a different precedent — one that the FBI has long advocated for.&lt;/p&gt;&lt;p&gt;For developers and security teams, the Grafana incident is a practical reminder: audit any GitHub Actions workflow using pull_request_target triggers in public repositories, restrict CI secrets to least-privilege scopes, and deploy canary tokens across sensitive codebases.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The tripwire is what saved Grafana from a far longer dwell time — threat intelligence from Mandiant suggests the average gap between credential theft and active exploitation is 11 days. Grafana caught it before that clock ran out.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB-HpWqGFCdtetjp_1FbGBCv6dtRHDi4sgcxDzs1LQZVx-W-MoNgGztEUkI4tZ9vaix_RsQQ2rwd-RpkuAFmqmVgAmM-W5_NQtd4qYNYwZeQuUDLQBuCB-hnf5_Oh5JtQhOwrM2nGGlbhTiFw-36zEy4GnJCpyWP2-lEBNsRp0bXjwAl_T65AKe4Hl7Mw/s72-c/Grafana-hacked.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Google's AI Search Guide Is Out — Explained Without the Hype</title><link>https://www.cyberkendra.com/2026/05/googles-ai-search-guide-is-out.html</link><category>Google</category><category>SEO</category><pubDate>Sat, 16 May 2026 09:23:46 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-8965274265211849811</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Guidance on Generative AI Content on Your Website" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLOBY84qOnOvVT93KIB5bopZp0FYtcG0onmIK81xQIxs39VOi5QrbYQXU-isH3t6M3kAiQRh0VWiGxCytMkqaBhNPgKscCaDmMdG407nPHu7BB47CyAT_O7_mupHNLmlBCLyIb7bWfc1UdxyqCKXkJ5oYEbsI-fLfN7Hu75CRxvSpn0DilKp7td2DJkPM/s16000/google-ai-content-guide.webp" title="Guidance on Generative AI Content on Your Website" /&gt;&lt;/div&gt;&lt;p&gt;If you've been following the chatter around "Generative Engine Optimization" or "Answer Engine Optimization," you've probably seen a flood of advice about llms.txt files, content chunking, AI-friendly schema, and prompt-style writing. Most of it is noise. Google's own documentation — updated in 2025 — cuts through cleanly, and the core message is both simpler and more demanding than the SEO industry tends to admit.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This article breaks down what Google actually says, explains what it means in practice, and highlights the parts most publishers miss entirely.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;First, Understand What's Actually Powering AI Overviews&lt;/h2&gt;&lt;p&gt;Before diving into optimization tactics, it helps to understand the engine underneath. Google's AI Overviews and the newer AI Mode aren't magic boxes that independently read the entire web. They work through two primary techniques:&lt;/p&gt;&lt;p&gt;&lt;b&gt;Retrieval-Augmented Generation (RAG): &lt;/b&gt;The AI doesn't generate answers from memory alone. It queries Google's core Search index — the same one used for blue-link results — fetches relevant pages, reads them, and generates a response grounded in that retrieved content. The clickable source links you see in AI Overviews are the pages that were actually retrieved.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Query fan-out:&lt;/b&gt; When someone searches for something complex, the AI doesn't just process the literal query. It generates multiple related sub-queries simultaneously. A search like "how to recover from a Google core update" might fan out into "signs your site was hit by a Google core update," "content quality signals Google uses," and "how long do core update recoveries take." Each fan-out query pulls its own results.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Why this matters:&lt;/b&gt; It means there's no separate "AI index" to get into. If your page ranks well in organic search and is crawlable with a snippet, it's already eligible for AI Overviews. You're not optimizing for a different system — you're optimizing for the same Search infrastructure you already know.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Real Divide: Commodity vs. Non-Commodity Content&lt;/h3&gt;&lt;p&gt;This is the single most important concept in Google's guidance, and it's the one most often glossed over.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Commodity content &lt;/b&gt;is information that could originate from anyone. "10 cybersecurity tips for small businesses." "What is phishing?" "How to create a strong password." These topics have been covered thousands of times, the information is widely known, and a generative AI model could produce them without consulting your site at all. If your content falls into this category, AI systems have no particular reason to cite you — they can simply generate the answer themselves.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Non-commodity content &lt;/b&gt;has something commodity content lacks: a reason to exist that's specific to you. A security researcher's first-hand analysis of a zero-day they discovered. A breakdown of an incident your team responded to. A documented test comparing five password managers using criteria you defined. A breach post-mortem with root cause analysis that only the affected organization could provide.&lt;/p&gt;&lt;p&gt;The difference isn't just about depth. It's about whether your content contains information that exists only because you produced it. First-hand experience, original research, proprietary data, expert analysis of primary sources — these are signals that your content adds something to the web rather than duplicating what's already there.&lt;/p&gt;&lt;p&gt;Consider the example Google itself provides: "7 Tips for First-Time Homebuyers" (commodity) vs. "Why We Waived the Inspection &amp;amp; Saved Money: A Look Inside the Sewer Line" (non-commodity). The second piece has a perspective that can't be replicated — the author was there, made a specific decision, and is reporting the outcome. AI can't fabricate that. It can only cite it.&lt;/p&gt;&lt;p&gt;For cybersecurity publishers specifically, a news article that simply rewrites a vendor advisory is a commodity. A piece that adds timeline analysis, compares the vulnerability to a prior incident, reaches out to affected parties for comment, or provides reproduction steps from independent testing — that's non-commodity.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What AEO and GEO Actually Mean (And Why Google Disagrees With the Industry)&lt;/h3&gt;&lt;p&gt;The SEO industry has spawned two new acronyms to describe optimization for AI systems: &lt;b&gt;AEO &lt;/b&gt;(Answer Engine Optimization) and &lt;b&gt;GEO &lt;/b&gt;(Generative Engine Optimization). Consultants have built entire service lines around these terms.&lt;/p&gt;&lt;p&gt;Google's official position: these are just SEO. The same signals. The same systems.&lt;/p&gt;&lt;p&gt;This is more significant than it sounds. It means Google is explicitly pushing back on the idea that you need a separate strategy for AI search. The implication is that anyone selling you an "AEO audit" distinct from a standard SEO audit is selling you something Google doesn't recognize as real.&lt;/p&gt;&lt;p&gt;That said, there's a practical nuance worth noting: while the underlying signals are the same, the emphasis shifts when AI is synthesizing answers. Traditional SEO rewards pages that match query intent and have authority signals. AI Overviews also reward pages that are &lt;b&gt;citable &lt;/b&gt;— meaning their content is structured clearly enough that the AI can extract a specific claim, quote an explanation, or attribute a data point. A page can rank well in organic search but never appear in an AI Overview if its content isn't written in a way that's easy to reference directly.&lt;/p&gt;&lt;p&gt;The distinction isn't about a different algorithm. It's about readability and extractability — which are good writing practices anyway.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Myth-Busting Section: Things You're Wasting Time On&lt;/h3&gt;&lt;p&gt;Google's documentation explicitly names several practices circulating in the industry as unnecessary or ineffective for Google Search. Here's the list with added context on why each one falls short:&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;llms.txt files&lt;/h4&gt;&lt;p&gt;This format, borrowed from robots.txt conventions, was proposed as a way to give AI systems a structured summary of your site. Google says directly: " You don't need this. Google can crawl and index many file types, but no special file type gets you preferential treatment in AI systems. For non-Google AI crawlers (like those from Anthropic, OpenAI, or Perplexity), llms.txt may eventually matter — but for Google, it's currently irrelevant.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;"Chunking" content&lt;/h4&gt;&lt;p&gt;Some advice tells you to break pages into small, discrete answer blocks so AI can extract them more easily. Google explicitly says this isn't required. Their systems can understand which part of a longer page is relevant to a query. Write for your readers. If shorter pages make sense for your topic and audience, great. If a 3,000-word technical deep-dive serves your readers better, that's fine too.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Rewriting content in "AI-friendly" language&lt;/h4&gt;&lt;p&gt;You don't need to adopt a Q&amp;amp;A format, use specific trigger phrases, or rephrase everything as direct answers. Google's AI understands synonyms and semantic intent. If your content genuinely answers a question, the system can figure that out without you gaming the phrasing.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Chasing inauthentic "mentions"&lt;/h4&gt;&lt;p&gt;Some practitioners advise seeding forums, comment sections, and third-party blogs with brand mentions to influence AI responses. Google's spam systems catch this, and the generative AI features inherit the same quality filters. Unearned mentions don't help; they may hurt.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Overloading structured data&lt;/h4&gt;&lt;p&gt;Structured data (schema.org markup) remains useful for rich results — it helps Google display reviews, FAQs, products, and events properly in traditional search. But there's no special schema that gets you into AI Overviews. Don't add schema, specifically hoping it unlocks AI features; it won't.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Actually Moves the Needle&lt;/h3&gt;&lt;p&gt;Strip away the myths, and you're left with a short, unglamorous list:&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;1. Be crawlable and indexable with a snippet enabled&lt;/h4&gt;&lt;p&gt;Pages blocked by noindex, those behind login walls, or those with no-snippet directives can't appear in AI Overviews regardless of content quality. This is table stakes. Run a Search Console coverage audit first.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;2. Produce genuinely first-hand or expert content&lt;/h4&gt;&lt;p&gt;The AI is looking for pages that contain information it can't synthesize on its own. Reviews written after actual use. Analysis from someone with domain expertise. Data from your own research. If your content could be generated by an AI without consulting your site, it probably won't be cited by one either.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;3. Write clearly, with a navigable structure&lt;/h4&gt;&lt;p&gt;Headings that describe what a section covers. Paragraphs that contain one idea each. Sentences that say what they mean without filler. This isn't about writing "for AI" — it's about writing well. The extractability that makes AI Overviews cite your content is the same thing that makes human readers trust it.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;4. Use high-quality images and video where relevant&lt;/h4&gt;&lt;p&gt;AI Overviews can surface image and video results, not just text. If your topic benefits from visual illustration — a hardware teardown, a vulnerability diagram, a product comparison screenshot — include original visuals with accurate alt text and descriptive filenames.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;5. Ensure good page experience&lt;/h4&gt;&lt;p&gt;Core Web Vitals, mobile rendering, and low latency. These remain ranking signals, and they affect whether retrieved pages get surfaced prominently in AI responses.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;If You Use AI to Help Write Content: What Google Actually Requires&lt;/h3&gt;&lt;p&gt;This is where many publishers are nervous, and the guidance is worth reading carefully.&lt;/p&gt;&lt;p&gt;Google does not ban AI-assisted content. What it penalizes is scaled content abuse — producing large volumes of pages without adding value for users. The test isn't whether AI was involved in writing. The test is whether the output meets the same quality and usefulness standards Google would apply to any content.&lt;/p&gt;&lt;p&gt;In practice, this means:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Using AI to draft a structure, then filling it with first-hand knowledge, original analysis, and expert commentary: acceptable, and likely fine.&lt;/li&gt;&lt;li&gt;Using AI to generate 500 pages of product descriptions with no human review or added value violates the spam policy.&lt;/li&gt;&lt;li&gt;Using AI to speed up research or improve phrasing on content you've substantially developed yourself: acceptable.&lt;/li&gt;&lt;li&gt;Using AI to spin existing articles into slightly different versions at scale: spam policy violation.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The guidance also notes that &lt;b&gt;transparency is a good practice&lt;/b&gt;. If your publication process involves AI tools in meaningful ways, explaining that to readers (in a site-level disclosure or per-article note) builds trust. For e-commerce specifically, AI-generated images must include IPTC DigitalSourceType metadata, marking them as algorithmically produced.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;The Agentic Web Is Coming — Here's What to Watch&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Google Guidance onAI Content" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3sZQazuyj2z1I185u8Bal9qE3HEzXwGIwI8gWxImQ4K2IgTnslPXrMvf1XnQGV0__zmeUj1y8d8ERfWwZtR-ZRQoDNKsaqZQgjvA8RAIByddeUXV9w-lobW_sg3M5gKSVXNsoMd0Jd17QclIDDinPO5fdezUXJad-DgjcjGqttogYmnKXB6IDAbwrfTA/s16000/agentic-web.webp" title="Google Guidance onAI Content" /&gt;&lt;/div&gt;&lt;p&gt;Beyond AI Overviews, Google's documentation introduces something worth tracking: agentic experiences. AI agents — systems that can book reservations, fill out forms, compare products, and complete tasks autonomously — are beginning to access websites the same way browsers do, by rendering pages, reading the DOM, and interpreting accessibility trees.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Google points to the &lt;b&gt;&lt;a href="https://www.cyberkendra.com/2026/01/google-just-changed-how-youll-shop-with.html" target="_blank"&gt;Universal Commerce Protocol (UCP)&lt;/a&gt;&lt;/b&gt; as an emerging standard for how agents will interact with commerce sites. This isn't mainstream yet, but it signals where things are going: a web where the "user" visiting your site may be an AI agent acting on someone's behalf, not a human at all.&lt;/p&gt;&lt;p&gt;For publishers, this is mostly future-watch territory. For e-commerce operators, it's worth considering now: your checkout flows, product data structures, and schema markup will increasingly be navigated by agents rather than read by humans. Semantic HTML, clean DOM structure, and good accessibility practices aren't just for screen readers — they're also how agents parse your pages.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Practical SEO Checklist for AI Search Readiness&lt;/h3&gt;&lt;p&gt;For website owners who want a concrete action list:&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Content audit:&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Identify your top-traffic pages. Ask honestly: does this page contain information that exists because we produced it, or is it a restatement of commonly available facts?&lt;/li&gt;&lt;li&gt;Flag commodity pages for upgrading with first-hand data, original examples, or expert commentary.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Technical audit:&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Check Search Console for indexing issues, noindex tags on content you want crawled, and coverage errors.&lt;/li&gt;&lt;li&gt;Verify snippets aren't blocked via X-Robots-Tag or meta robots directives.&lt;/li&gt;&lt;li&gt;Review Core Web Vitals, particularly LCP and CLS.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Content creation:&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Build a process for producing non-commodity content: primary source analysis, original interviews, first-hand testing, proprietary data.&lt;/li&gt;&lt;li&gt;Stop creating "answer" pages that duplicate what's already on a dozen other sites.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;AI tools policy:&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Decide your publication's approach to AI-assisted writing and document it.&lt;/li&gt;&lt;li&gt;Ensure any AI-assisted content goes through substantive human review that adds real value before publication.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Ignore:&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;llms.txt, content chunking, AI-specific schema, inauthentic mention campaigns.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Final Thought: The Bar Just Got Higher&lt;/h3&gt;&lt;p&gt;The honest takeaway from Google's guidance is that the bar for content that earns visibility in AI-powered search is meaningfully higher than the bar for traditional organic ranking. An article that ranks #3 for a moderately competitive query by satisfying on-page signals might never be cited in an AI Overview if it lacks a distinctive perspective.&lt;/p&gt;&lt;p&gt;That's not necessarily bad news. It's a forcing function. The content that survives this shift is the content that was always worth creating: original, authoritative, specific, and written with a real reader in mind. Publishers who've been producing commodity content at scale are the ones with the most to worry about.&lt;/p&gt;&lt;p&gt;For those doing genuine editorial work — original reporting, expert analysis, first-hand testing — the AI era may actually favor them over the SEO optimization shops that dominated the last decade.&lt;/p&gt;&lt;p class='pRef'&gt;Sources: Google Search Central — &lt;a href="https://developers.google.com/search/docs/fundamentals/ai-optimization-guide" target="_blank" rel="nofollow"&gt;Optimizing your website for generative AI features on Google Search&lt;/a&gt; and &lt;a href="https://developers.google.com/search/docs/fundamentals/using-gen-ai-content" target="_blank" rel="nofollow"&gt;Google Search's guidance on using generative AI content&lt;/a&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLOBY84qOnOvVT93KIB5bopZp0FYtcG0onmIK81xQIxs39VOi5QrbYQXU-isH3t6M3kAiQRh0VWiGxCytMkqaBhNPgKscCaDmMdG407nPHu7BB47CyAT_O7_mupHNLmlBCLyIb7bWfc1UdxyqCKXkJ5oYEbsI-fLfN7Hu75CRxvSpn0DilKp7td2DJkPM/s72-c/google-ai-content-guide.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Microsoft Exchange Zero-Day Exploited in the Wild — and Pwn2Own Researchers Just Made It Worse</title><link>https://www.cyberkendra.com/2026/05/microsoft-exchange-zero-day-exploited.html</link><category>Microsoft</category><category>Security</category><pubDate>Sat, 16 May 2026 08:19:37 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-8663774877664354641</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Exchange Server May 2026 vulnerability CVE-2026-42897" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDT1-Uf3IP5-rxRwHZtSwNFo9RAfWUmr-JMKWnQx5apbd7eqQNFXsiHOR7A7Jn0lZVtOessPtKWuV2wktlSYJLm46BNJb4tkCi-HmbMwhGzpF2_0RxT4KMPUj-QpPy_yN4phiYugFBFPVOVx2Po1KAO4iz_npNxW_qvMu_FvLXNqQDwWXcPBDFtM3xH2o/s16000/CVE-2026-42897.webp" title="Exchange Server May 2026 vulnerability CVE-2026-42897" /&gt;&lt;/div&gt;&lt;p&gt;Microsoft Exchange Server is having a very bad week. While threat actors are already exploiting a critical cross-site scripting vulnerability in the wild, elite researchers at Pwn2Own Berlin 2026 independently demonstrated full SYSTEM-level remote code execution on the same platform — all within 48 hours of each other.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Microsoft confirmed on Thursday that a critical XSS vulnerability, tracked as &lt;b&gt;CVE-2026-42897&lt;/b&gt;, is being actively exploited against on-premises Exchange Server deployments. The flaw affects Exchange Server 2016, 2019, and the Subscription Edition. Exchange Online users are not at risk.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The attack is deceptively simple: an attacker sends a specially crafted email to a target. If the victim opens it in Outlook Web Access (OWA) — the browser-based interface for accessing Exchange mailboxes — arbitrary JavaScript can execute silently in the browser context. No credentials needed, no complex setup. Just a well-timed phishing email.&lt;/p&gt;&lt;p&gt;The vulnerability appeared just two days after Microsoft's May 2026 Patch Tuesday, which addressed 138 separate flaws — a grim reminder that even the most patched environments can be blindsided by zero-days arriving between update cycles.&lt;/p&gt;&lt;p&gt;Microsoft has not identified the threat actor behind the &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42897" rel="nofollow" target="_blank"&gt;active exploitation&lt;/a&gt;, nor shared details about targets, campaign scale, or whether any attacks were successful. CVE-2026-42897 has not yet been added to CISA's Known Exploited Vulnerabilities catalog, though given its "Exploitation Detected" status, that designation could come at any time.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Pwn2Own Adds Fuel to the Fire&lt;/h3&gt;&lt;p&gt;As if the zero-day wasn't enough, on day two of Pwn2Own Berlin 2026, Orange Tsai of DEVCORE Research Team chained three bugs together to achieve remote code execution with SYSTEM privileges on Microsoft Exchange, earning $200,000 — the single largest payout of the competition so far. This is a separate, distinct attack chain from CVE-2026-42897, and per Pwn2Own rules, vendors receive a 90-day window to patch before details are made public.&lt;/p&gt;&lt;p&gt;It follows an equally impressive day-one performance, where Orange Tsai earned $175,000 by chaining four logic bugs to escape the Microsoft Edge sandbox — cementing DEVCORE's position atop the leaderboard.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Should Exchange Admins Do Right Now?&lt;/h3&gt;&lt;p&gt;Microsoft is still working on a permanent fix. In the interim, &lt;a href="https://techcommunity.microsoft.com/blog/exchange/addressing-exchange-server-may-2026-vulnerability-cve-2026-42897/4518498" rel="nofollow" target="_blank"&gt;two mitigations are available&lt;/a&gt;:&lt;/p&gt;&lt;p&gt;The Exchange Emergency Mitigation Service (EEMS) automatically applies protection via a URL rewrite configuration and is enabled by default on supported on-premises Exchange deployments. Admins should verify it's active.&lt;/p&gt;&lt;p&gt;For air-gapped or disconnected environments, Microsoft advises downloading the Exchange On-premises Mitigation Tool (EOMT) and running it via an elevated Exchange Management Shell — either per server or across all servers at once using the CVE-2026-42897 identifier.&lt;/p&gt;&lt;p&gt;Be aware that applying the mitigation introduces some side effects: OWA calendar printing may stop working, and inline images might not render correctly in the reading pane. Microsoft recommends using the Outlook desktop client as a workaround in both cases.&lt;/p&gt;&lt;p&gt;A permanent patch is planned for Exchange SE RTM, Exchange 2016 CU23, and Exchange Server 2019 CU14 and CU15. However, Exchange 2016 and 2019 updates will only be distributed to customers enrolled in the Period 2 Extended Security Update program — Period 1 ESU customers are excluded, as that program ended in April 2026.&lt;/p&gt;&lt;p&gt;With Exchange at the center of corporate email infrastructure — and often internet-exposed — organizations running on-premises deployments cannot afford to wait on this one.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDT1-Uf3IP5-rxRwHZtSwNFo9RAfWUmr-JMKWnQx5apbd7eqQNFXsiHOR7A7Jn0lZVtOessPtKWuV2wktlSYJLm46BNJb4tkCi-HmbMwhGzpF2_0RxT4KMPUj-QpPy_yN4phiYugFBFPVOVx2Po1KAO4iz_npNxW_qvMu_FvLXNqQDwWXcPBDFtM3xH2o/s72-c/CVE-2026-42897.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Linux Kernel Had a Six-Year Bug That Let Anyone Steal SSH Host Keys and Root Passwords</title><link>https://www.cyberkendra.com/2026/05/linux-kernel-had-six-year-bug-that-let.html</link><category>Linux</category><category>Security</category><pubDate>Fri, 15 May 2026 21:08:45 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-6030865485574691225</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="ssh-keysign-pwn" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu2QfnAaNVvQyBR9kE9-zqjo3OV4Ei0q-WavJQnZrBatUwfnWJXocknE_cF2RcW60Whwqy5kOzJmlq4cBX6XnYAjgPAZXSSU8lJ_r-as0L_5TpkYtFJ8mcHT5ElJvbCdU5BKPUeKeM2RjBdgrLWC9J0PqnH5HaGcLw5ZwpTWUCd1Ntwje-JlBl6cu7UK0/s16000/ssh-keysign-pwn.webp" title="ssh-keysign-pwn" /&gt;&lt;/div&gt;&lt;p&gt;A logic flaw sitting quietly in the Linux kernel since at least 2020 — possibly longer — just got a working exploit, a public proof-of-concept, and a same-day patch from Linus Torvalds.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The vulnerability, dubbed &lt;b&gt;ssh-keysign-pwn&lt;/b&gt;, was &lt;a href="https://www.openwall.com/lists/oss-security/2026/05/15/2" rel="nofollow" target="_blank"&gt;disclosed by Qualys &lt;/a&gt;on May 14, 2026, and patched by Linus Torvald the same day. The damage it could have done — and in unpatched environments still can — is significant: any unprivileged local user can silently read a server's SSH host private keys or the entire &lt;code&gt;/etc/shadow&lt;/code&gt; file containing hashed user passwords.&lt;/p&gt;&lt;p&gt;The bug lives in &lt;code&gt;__ptrace_may_access()&lt;/code&gt;, the kernel's gatekeeper for deciding whether one process can inspect another. The function skips its "dumpable" check when &lt;code&gt;task-&amp;gt;mm == NULL&lt;/code&gt; — a state that occurs briefly during process exit, after memory is released (&lt;code&gt;exit_mm()&lt;/code&gt;) but before file descriptors are closed (&lt;code&gt;exit_files()&lt;/code&gt;). That tiny window is everything.&lt;/p&gt;&lt;p&gt;An attacker uses &lt;code&gt;pidfd_getfd(2)&lt;/code&gt; — a legitimate Linux syscall introduced in kernel 5.6 — to steal open file descriptors from a dying privileged process during that gap, when the caller's UID matches the target's. No root required. No special permissions needed.&lt;/p&gt;&lt;p&gt;Two ready-to-run exploits ship with the public PoC: &lt;code&gt;sshkeysign_pwn&lt;/code&gt; targets the &lt;code&gt;ssh-keysign&lt;/code&gt; utility, which opens sensitive host key files before dropping root privileges. By racing the process exit, an unprivileged user can lift those file descriptors. &lt;code&gt;chage_pwn&lt;/code&gt; attacks the &lt;code&gt;chage&lt;/code&gt; utility to pull &lt;code&gt;/etc/shadow&lt;/code&gt;, enabling offline cracking of password hashes. The exploit reliably hits within 100–2,000 process spawns.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Six Years of Missed Warnings&lt;/h3&gt;&lt;p&gt;Google security researcher Jann Horn had already proposed a patch for the underlying FD-theft behavior back in October 2020 — but it never made it through. The &lt;code&gt;ssh-keysign&lt;/code&gt; fd-leaving pattern itself dates to 2002. &lt;code&gt;chage&lt;/code&gt;'s vulnerable &lt;code&gt;spw_open&lt;/code&gt; + &lt;code&gt;setreuid&lt;/code&gt; shape is similarly ancient. The flaw was there. The patch proposal existed. Nobody pushed it across the finish line for five years.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Who Is Affected&lt;/h3&gt;&lt;p&gt;All stable Linux kernels as of May 14, 2026, are affected — everything before commit 31e62c2ebbfd. Confirmed vulnerable distributions include Arch Linux, Debian, Ubuntu, CentOS, and Raspberry Pi OS. If you run any mainstream Linux server or desktop and haven't applied yesterday's kernel update, your SSH host keys and shadow file are readable by any local user on the box.&lt;/p&gt;&lt;p&gt;The fix is in the mainline kernel as of May 14. Until you patch, a temporary workaround is removing execute permissions from &lt;code&gt;ssh-keysign&lt;/code&gt; and &lt;code&gt;chage&lt;/code&gt; — though this doesn't fix the underlying issue and may break legitimate functionality.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Update your kernel immediately and reboot — this is the only real fix&lt;/li&gt;&lt;li&gt;Rotate all SSH host keys on any system that may have been exposed&lt;/li&gt;&lt;li&gt;Force a password reset for privileged accounts if &lt;code&gt;/etc/shadow&lt;/code&gt; was accessible&lt;/li&gt;&lt;li&gt;Run &lt;code&gt;uname -r&lt;/code&gt; to confirm your running kernel includes commit &lt;b&gt;31e62c2ebbfd&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The patch adjusts the kernel's ptrace behavior to properly handle the &lt;code&gt;mm == NULL&lt;/code&gt; case. Linus described the new logic as "slightly saner" — an understated note for a bug that spent six years one race condition away from becoming a full server compromise.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu2QfnAaNVvQyBR9kE9-zqjo3OV4Ei0q-WavJQnZrBatUwfnWJXocknE_cF2RcW60Whwqy5kOzJmlq4cBX6XnYAjgPAZXSSU8lJ_r-as0L_5TpkYtFJ8mcHT5ElJvbCdU5BKPUeKeM2RjBdgrLWC9J0PqnH5HaGcLw5ZwpTWUCd1Ntwje-JlBl6cu7UK0/s72-c/ssh-keysign-pwn.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Google Quietly Cut New Account Storage to 5GB — Your Phone Number Is Now the Price of 15GB</title><link>https://www.cyberkendra.com/2026/05/google-quietly-cut-new-account-storage.html</link><category>Google</category><pubDate>Fri, 15 May 2026 08:59:59 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-3739978039011383665</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicUC2sUmSBNvbE83SYa3xWt1Hq8AyMLzFvRxGr32PlgcGVt_uQhdv2PE5Z_b8GwW58Y94fKjX-zw-5HY7tcv2WJXOXi1bPyVm-dz3zdYUvq-DKQXoyh05CDSJh-9pt_ysDvjjnS1n8_Wedl_I9dmPJa64OiqxjbLYfzP2P4lXfyUwQvuTyX26LudakxtM/s16000/5GB-google-storage.webp" /&gt;&lt;/div&gt;&lt;p&gt;Google has changed the rules on free storage for new accounts — and most users won't notice until it's too late. New Google accounts now default to just 5GB of free storage. To unlock the full 15GB shared across Gmail, Drive, and Google Photos, users must link and verify a phone number during account setup.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The &lt;a href="https://www.reddit.com/r/degoogle/comments/1tc0j0k/gmail_now_gives_5gb_free_if_you_sign_up_without/" rel="nofollow" target="_blank"&gt;prompt users now encounter&lt;/a&gt; makes the trade-off explicit: provide your number and get 15GB, or skip it and stay capped at 5GB. Google's stated rationale, visible within the signup flow itself, is that the phone number ensures the 15GB allocation is granted "only once per person" — effectively an anti-abuse measure to stop bots and throwaway accounts from hoarding free storage indefinitely.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Change Was Already Underway in March&lt;/h3&gt;&lt;p&gt;This didn't happen overnight. Google quietly changed its language around the included storage in mid-March. Where it &lt;a href="https://web.archive.org/web/20260207120224/https://support.google.com/googleone/answer/2375123" rel="nofollow" target="_blank"&gt;previously promised an unconditional 15GB&lt;/a&gt;, it &lt;a href="https://support.google.com/googleone/answer/9312312" rel="nofollow" target="_blank"&gt;now offers "up to" 15GB across&lt;/a&gt; its services. Using the Internet Archive's WayBack Machine, the change can be traced to around March 18, 2026, and remains live today.&amp;nbsp;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Google Calls It a Regional Test&lt;/h3&gt;&lt;p&gt;A Google spokesperson &lt;a href="https://www.howtogeek.com/google-phone-number-link-for-new-accounts/" rel="nofollow" target="_blank"&gt;confirmed to How-To Geek&lt;/a&gt; that the company is "testing" a storage policy for new accounts when they're created in "select regions," although it didn't name those areas. Current reports suggest the 5GB cap is most prevalent in parts of Africa, including Kenya and Nigeria. Existing accounts are not affected — only users creating fresh accounts going forward.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Why Now? AI Costs and Account Abuse&lt;/h3&gt;&lt;p&gt;AI and automation have made multi-account abuse considerably easier — you can theoretically build a seamless storage pool without much manual effort. Malware creators could exploit this to store code and stolen data at scale. Google also isn't immune to the soaring memory prices driven by AI demand it's partly responsible for creating through Gemini.&lt;/p&gt;&lt;p&gt;The concern is that you still have to share your phone number to get 15GB of space that millions take for granted. Google and others already provide two-factor authentication without phone numbers specifically for privacy reasons — a data breach exposing your linked number is a real risk. Small business owners running dedicated work accounts without wanting to tie a personal number will also feel the friction.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What You Should Do&lt;/h3&gt;&lt;p&gt;If you're creating a new Google account, link a phone number during setup to claim the full 15GB. After setup, check your actual storage allocation in Google Account settings — if it reads 5GB rather than 15GB, the account was created without phone verification.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Some users report still receiving 15GB without linking a phone, especially on Android devices set up without a SIM card, so your experience may vary by region and device.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicUC2sUmSBNvbE83SYa3xWt1Hq8AyMLzFvRxGr32PlgcGVt_uQhdv2PE5Z_b8GwW58Y94fKjX-zw-5HY7tcv2WJXOXi1bPyVm-dz3zdYUvq-DKQXoyh05CDSJh-9pt_ysDvjjnS1n8_Wedl_I9dmPJa64OiqxjbLYfzP2P4lXfyUwQvuTyX26LudakxtM/s72-c/5GB-google-storage.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Google's Security Team Built a Zero-Click Root Exploit for the Pixel 10</title><link>https://www.cyberkendra.com/2026/05/googles-security-team-built-zero-click.html</link><category>Google</category><category>Project Zero</category><category>Security</category><pubDate>Fri, 15 May 2026 07:55:23 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-6020965769281107391</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Google Pixel 10 Hacked" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-BpAzVnSsn2XVjGbUrh6IjUm9txlJiiOPFkS_uHUDE0Q01ifH1ThCZN58eFkpjJJWciXqetsFUUD7uZ1_1_nZVoK4pCRjEctdJZ4GjB1DBXOpzTpb-RicbWhO2F3DvT2diEGps_b5VgZBr59fJ1xkRV1C9UIBD2y9p-ZsuSZT34S8-Suaravxxd3FojM/s16000/pixel10-hack.webp" title="Google Pixel 10 Hacked" /&gt;&lt;/div&gt;&lt;p&gt;Google's elite Project Zero security team has done it again — this time turning the Pixel 10 into a case study for how hardware driver vulnerabilities can silently hand an attacker full root control of your phone, no taps required.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;In a &lt;a href="https://projectzero.google/2026/05/pixel-10-exploit.html" rel="nofollow" target="_blank"&gt;research post published May 13&lt;/a&gt;, Project Zero researcher Seth Jenkins detailed a complete zero-click exploit chain for the Pixel 10, building on the team's earlier, &lt;a href="https://projectzero.google/2026/01/pixel-0-click-part-1.html" rel="nofollow" target="_blank"&gt;three-part Pixel 9 research series published&lt;/a&gt; in January 2026. That earlier work had demonstrated it was possible to go from a zero-click context to root on Android in just two exploits — and Jenkins wanted to see if the same was possible on Google's latest flagship.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Entry Point: A Dolby Audio Bug, Repurposed&lt;/h3&gt;&lt;p&gt;The first link in the chain is CVE-2025-54957, a vulnerability in the Dolby Unified Decoder (UDC) — a library for processing Dolby Digital audio formats that is integrated across Android, iOS, Windows, and media streaming devices.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The dangerous part: the Dolby UDC is part of the zero-click attack surface of most Android devices because incoming audio messages in Google Messages are transcribed before a user even opens them. A malicious audio file sent as a message triggers the exploit with no interaction from the target.&lt;/p&gt;&lt;p&gt;Adapting the Dolby exploit for Pixel 10 was straightforward, Jenkins noted, with the main hurdle being that the Pixel 10 uses RET PAC instead of -fstack-protector, a different stack protection mechanism that requires a workaround.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Escalation: A Video Driver With No Boundaries&lt;/h3&gt;&lt;p&gt;On the Pixel 9, the second exploit leveraged the BigWave AV1 decoder driver. That driver doesn't exist on Pixel 10. But Jenkins and collaborator Jann Horn found something worse. Working together, they spent just 2 hours auditing the VPU driver — used for video decoding on the Tensor G5 chip — and discovered an exceptional vulnerability.&lt;/p&gt;&lt;p&gt;The flaw in the driver's &lt;code&gt;mmap&lt;/code&gt; handler is disarmingly simple: the driver makes a call to &lt;code&gt;remap_pfn_range&lt;/code&gt; based purely on the size of the VMA (virtual memory area) and not at all bound to the size of the hardware register region, meaning a caller can map as much physical memory as they want into userland — including the entire kernel image. Making matters worse, the kernel is always at the same physical address on Pixel, so an attacker knows exactly where it is relative to the returned mmap address — no scanning required.&lt;/p&gt;&lt;p&gt;The result: achieving arbitrary read-write access to the kernel required just 5 lines of code, and the full exploit took less than a day to write.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;One Bright Spot: Faster Patching&lt;/h3&gt;&lt;p&gt;Jenkins reported the VPU bug on November 24, 2025, and it was patched 71 days later in the February Pixel security bulletin — notably the first time Android patched a driver bug Jenkins reported within 90 days. Compare that to the Pixel 9 Dolby chain, where the UDC vulnerability remained unpatched on Pixel for 82 days after public disclosure, and the BigWave driver bug took until January 6, 2026, to fix.&lt;/p&gt;&lt;p&gt;Progress — but Project Zero isn't satisfied. Jenkins noted that after flagging the BigWave driver issues, he had hoped the same development team would audit their other drivers. Five months later, a serious, extremely shallow vulnerability was immediately apparent in their VPU driver during a cursory review.&amp;nbsp;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Pixel 10 Users Should Do&lt;/h3&gt;&lt;p&gt;The VPU vulnerability was patched in the &lt;b&gt;February 2026 Pixel security update&lt;/b&gt;. If your device is running the February 2026 Security Patch Level (SPL) or later, you are protected. Check under Settings → About phone → Android security update. The Dolby exploit only affects devices on &lt;b&gt;SPL December 2025 or earlier&lt;/b&gt;.&lt;/p&gt;&lt;p&gt;The deeper lesson here goes beyond any single bug fix: as Android packs in more AI-powered features that silently process incoming media, the zero-click attack surface keeps growing — and hardware driver security hasn't kept pace.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-BpAzVnSsn2XVjGbUrh6IjUm9txlJiiOPFkS_uHUDE0Q01ifH1ThCZN58eFkpjJJWciXqetsFUUD7uZ1_1_nZVoK4pCRjEctdJZ4GjB1DBXOpzTpb-RicbWhO2F3DvT2diEGps_b5VgZBr59fJ1xkRV1C9UIBD2y9p-ZsuSZT34S8-Suaravxxd3FojM/s72-c/pixel10-hack.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>NGINX Rift: An 18-Year-Old Bug Lets Hackers Hijack One-Third of the Internet's Web Servers</title><link>https://www.cyberkendra.com/2026/05/nginx-rift-18-year-old-bug-lets-hackers.html</link><category>Internet</category><category>Security</category><pubDate>Wed, 13 May 2026 23:32:21 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-5493923747151350102</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="NGINX Rift flaw" border="0" data-original-height="1365" data-original-width="2048" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz_JehO8mTlTbFmUrkR05Hw6KRRxpBxwR4GQI4hyphenhyphenTGh2OwZ_2d7-YOMOYwdgKCitMgRjd-KF0gwU9146aHAejsFZC3AEaKZSD-AKYW_7liQ2gMkGyPgKLirIhuIYimzaAPlFCgYF0jFezj_QSCeWbfZzs28k0RuDZCTpA-7SuNPoxi9RyBgqU9zlFSACw/s16000/NGINX-Rift.webp" title="NGINX Rift flaw" /&gt;&lt;/div&gt;&lt;p&gt;A memory corruption flaw in NGINX's source code, hidden since 2008, now has a working exploit. An unauthenticated attacker anywhere on the internet can send a single crafted HTTP request to crash NGINX worker processes — or, under the right conditions, achieve full remote code execution on the server.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Researchers at depthfirst, an autonomous vulnerability analysis platform, &lt;a href="https://depthfirst.com/research/nginx-rift-achieving-nginx-rce-via-an-18-year-old-vulnerability" rel="nofollow" target="_blank"&gt;discovered the flaw&lt;/a&gt; — now tracked as &lt;b&gt;CVE-2026-42945&lt;/b&gt; — while scanning the NGINX codebase in April. Their automated system flagged it within six hours. It was introduced in 2008 and has been quietly sitting in every standard NGINX build for nearly two decades. F5, which maintains NGINX, confirmed the issue on April 24 and published a coordinated advisory today.&lt;/p&gt;&lt;p class="note"&gt;NGINX powers approximately one-third of all websites globally. If your configuration uses &lt;code&gt;rewrite&lt;/code&gt; directives with unnamed regex captures (&lt;code&gt;$1&lt;/code&gt;, &lt;code&gt;$2&lt;/code&gt;) alongside a replacement string containing a question mark, followed by another &lt;code&gt;rewrite&lt;/code&gt;, &lt;code&gt;if&lt;/code&gt;, or &lt;code&gt;set&lt;/code&gt; directive — you are exposed. No authentication is required to trigger it.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;Four CVEs, One Critical Hit&lt;/h2&gt;&lt;p&gt;Depthfirst's scan returned five findings total. Four were confirmed by NGINX. The critical one dominates:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;CVE-2026-42945 - (9.2 Critical)&lt;/li&gt;&lt;li&gt;CVE-2026-42946 - (8.3 High)&lt;/li&gt;&lt;li&gt;CVE-2026-40701 - (6.3 Medium)&lt;/li&gt;&lt;li&gt;CVE-2026-42934 - (6.3 Medium)&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;CVE-2026-42946 is also noteworthy: a state mismatch in the SCGI and uWSGI modules results in a cross-buffer pointer subtraction that yields a ~1 TB key length, causing a crash in the worker. The remaining two are a use-after-free in the SSL module and an out-of-bounds read in the charset module.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Breaks and Why&lt;/h3&gt;&lt;p&gt;The vulnerability lives in &lt;code&gt;src/http/ngx_http_script.c&lt;/code&gt;, inside &lt;code&gt;ngx_http_rewrite_module&lt;/code&gt; — a module present in every standard NGINX build. NGINX's script engine processes &lt;b&gt;rewrite&lt;/b&gt; directives in two passes: first, it calculates how much memory to allocate, then it writes the actual data. The flaw breaks the contract between those two passes.&lt;/p&gt;&lt;p&gt;When a &lt;code&gt;rewrite&lt;/code&gt; replacement string contains a question mark, a function called &lt;code&gt;ngx_http_script_start_args_code&lt;/code&gt; sets an internal flag (&lt;code&gt;e-&amp;gt;is_args = 1&lt;/code&gt;) on the main script engine and &lt;b&gt;never clears it&lt;/b&gt;.&amp;nbsp;&lt;/p&gt;&lt;p&gt;A later &lt;code&gt;set&lt;/code&gt; directive computes the buffer length using a freshly zeroed sub-engine — so it measures the capture as raw bytes, with no escaping. But when the actual write happens, the main engine still has &lt;code&gt;is_args = 1&lt;/code&gt;, so it re-escapes the data through &lt;code&gt;ngx_escape_uri&lt;/code&gt; in &lt;code&gt;NGX_ESCAPE_ARGS&lt;/code&gt; mode. Every &lt;code&gt;+&lt;/code&gt;, &lt;code&gt;%&lt;/code&gt;, or &lt;code&gt;&amp;amp;amp&lt;/code&gt;; character in an attacker's URI expands from one byte to three. The buffer was sized for the smaller value. The write runs past the allocation.&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;"The bytes written past the allocation are derived from the attacker's URI, so the corruption is shaped by the attacker rather than random." — depthfirst advisory&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;The researchers developed a working proof-of-concept demonstrating unauthenticated RCE with ASLR disabled. They also detail a theoretical technique — progressively overwriting pointer bytes across repeated requests — that could be used to defeat ASLR. NGINX's multi-process architecture actually aids exploitation: if a worker crashes, the master spawns a new one with an identical heap layout, giving attackers unlimited retries at no cost.&lt;/p&gt;&lt;p&gt;&lt;!--[ Defer iframe ]--&gt;
&lt;div class='videoYt'&gt;
  &lt;iframe title='Lazy video iframe' class='lazy' data-src='//www.youtube.com/embed/pKAkzLGptfI' allow='accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture' allowfullscreen&gt;&lt;/iframe&gt;
&lt;/div&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Who Is Affected&lt;/h3&gt;&lt;p&gt;The scope is wide. Affected products span most of the NGINX ecosystem:&lt;/p&gt;&lt;div class="table noWrap w100"&gt;&lt;table&gt;

      &lt;thead&gt;

        &lt;tr&gt;&lt;th&gt;&lt;b&gt;Product&lt;/b&gt;&lt;/th&gt;&lt;th&gt;&lt;b&gt;Vulnerable Range&lt;/b&gt;&lt;/th&gt;&lt;th&gt;&lt;b&gt;Fixed In&lt;/b&gt;&lt;/th&gt;&lt;/tr&gt;

      &lt;/thead&gt;

      &lt;tbody&gt;

        &lt;tr&gt;&lt;td&gt;NGINX Open Source&lt;/td&gt;&lt;td&gt;0.6.27 – 1.30.0&lt;/td&gt;&lt;td class="fixed"&gt;1.31.0 / 1.30.1&lt;/td&gt;&lt;/tr&gt;

        &lt;tr&gt;&lt;td&gt;NGINX Plus&lt;/td&gt;&lt;td&gt;R32 – R36&lt;/td&gt;&lt;td class="fixed"&gt;R36 P4 / R32 P6&lt;/td&gt;&lt;/tr&gt;

        &lt;tr&gt;&lt;td&gt;NGINX Instance Manager&lt;/td&gt;&lt;td&gt;2.16.0 – 2.21.1&lt;/td&gt;&lt;td&gt;Move to fixed branch&lt;/td&gt;&lt;/tr&gt;

        &lt;tr&gt;&lt;td&gt;NGINX App Protect WAF&lt;/td&gt;&lt;td&gt;4.9.0–4.16.0, 5.1.0–5.8.0&lt;/td&gt;&lt;td&gt;Move to fixed branch&lt;/td&gt;&lt;/tr&gt;

        &lt;tr&gt;&lt;td&gt;NGINX Gateway Fabric&lt;/td&gt;&lt;td&gt;1.3.0–1.6.2, 2.0.0–2.5.1&lt;/td&gt;&lt;td&gt;Move to fixed branch&lt;/td&gt;&lt;/tr&gt;

        &lt;tr&gt;&lt;td&gt;NGINX Ingress Controller&lt;/td&gt;&lt;td&gt;3.5.0–5.4.1 (multiple)&lt;/td&gt;&lt;td&gt;Move to fixed branch&lt;/td&gt;&lt;/tr&gt;

      &lt;/tbody&gt;

    &lt;/table&gt;&lt;/div&gt;&lt;p&gt;F5 BIG-IP, BIG-IQ, Distributed Cloud, and Silverline are not affected.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What You Should Do Right Now&lt;/h3&gt;&lt;p&gt;&lt;b&gt;Upgrade first.&lt;/b&gt; For NGINX Open Source, upgrade to 1.31.0 or 1.30.1 and restart to reload workers with the patched binary. NGINX Plus users should apply R36 P4 or R32 P6.&lt;/p&gt;&lt;p&gt;&lt;b&gt;If you can't patch immediately,&lt;/b&gt; convert unnamed regex captures to named captures in every affected &lt;code&gt;rewrite&lt;/code&gt; directive:&lt;/p&gt;&lt;p&gt;# Vulnerable — unnamed captures with ? in replacement rewrite ^/users/([0-9]+)/profile/(.*)$ /profile.php?id=$1&amp;amp;tab=$2 last; # Mitigated — named captures bypass the vulnerable code path rewrite ^/users/(?&lt;user_id&gt;[0-9]+)/profile/(?&lt;/user_id&gt;&lt;/p&gt;&lt;section&gt;.*)$ /profile.php?id=$user_id&amp;amp;tab=$section last;&lt;/section&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Named captures (&lt;code&gt;(?&amp;lt;name&amp;gt;...)&lt;/code&gt;) do not pass through the vulnerable escaping logic. This configuration change removes the attack surface without a binary upgrade.&lt;/p&gt;&lt;p&gt;The broader implication here is harder to ignore than the patch itself. A bug this old, in software this widely deployed, was found not by a human auditor poring over diffs, but by an automated system running for six hours. That says something uncomfortable about the gap between how long critical infrastructure has been accumulating risk and how fast the tools to find it are now moving.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz_JehO8mTlTbFmUrkR05Hw6KRRxpBxwR4GQI4hyphenhyphenTGh2OwZ_2d7-YOMOYwdgKCitMgRjd-KF0gwU9146aHAejsFZC3AEaKZSD-AKYW_7liQ2gMkGyPgKLirIhuIYimzaAPlFCgYF0jFezj_QSCeWbfZzs28k0RuDZCTpA-7SuNPoxi9RyBgqU9zlFSACw/s72-c/NGINX-Rift.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Linux Kernel Strikes Again: "Fragnesia" Is the Third Root-Level Flaw in Two Weeks</title><link>https://www.cyberkendra.com/2026/05/linux-kernel-strikes-again-fragnesia-is.html</link><category>Linux</category><category>Security</category><pubDate>Wed, 13 May 2026 22:53:21 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-3856880393494632232</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Fragnesia Linux Flaw" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhODeAKZHXOAeaApwm6ehNJakJ_0Q329Z_cPdQ65ZCrnj9gWzoF2flM_J60lJPh1YAR4Iew1fLc6wJ49TX2i0f66Gv6kK9HNdbCwzz_njqKN3D0fjgciPKOIKQQBvP3igYZp8bMtU2CFd4Bg0K5jQxxyPIH_q3YliBywK4KO8uPR1F1k-NCU2Zr27kHUcs/s16000/Fragnesia.webp" title="Fragnesia Linux Flaw" /&gt;&lt;/div&gt;&lt;p&gt;Linux administrators have barely had time to recover from Copy Fail and Dirty Frag — and now there's a third exploit joining the same dangerous family. Security researchers at V12 Security have disclosed Fragnesia, a new Linux kernel local privilege escalation (LPE) vulnerability that gives any unprivileged local user a reliable, deterministic path to root — without needing a single host-level privilege to pull it off.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The timing couldn't be worse. As we covered here on Cyber Kendra, &lt;a href="https://www.cyberkendra.com/2026/04/a-732-byte-python-script-can-get-root.html" target="_blank"&gt;&lt;b&gt;Copy Fail (CVE-2026-31431)&lt;/b&gt;&lt;/a&gt; — a 732-byte Python script that roots virtually every major Linux distribution since 2017 — dropped on April 29. Just one week later, &lt;b&gt;&lt;a href="https://www.cyberkendra.com/2026/05/dirty-frag-no-patch-no-warning-root.html" target="_blank"&gt;Dirty Frag (CVE-2026-43284 / CVE-2026-43500)&lt;/a&gt;&lt;/b&gt;, discovered by Korean researcher Hyunwoo Kim, chained two separate kernel bugs to deliver the same devastating outcome. Now, Fragnesia arrives as an unintended consequence of one of the very patches meant to fix Dirty Frag — a bitter irony that underscores just how fragile this surface area of the kernel has become.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;What Makes Fragnesia Different&lt;/h2&gt;&lt;p&gt;Fragnesia was &lt;a href="https://github.com/v12-security/pocs/blob/main/fragnesia%2FREADME.md" rel="nofollow" target="_blank"&gt;discovered&lt;/a&gt; by William Bowling and the V12 team using their agentic security tooling, V12. Like its predecessors, it targets the Linux kernel's &lt;b&gt;XFRM ESP-in-TCP subsystem&lt;/b&gt; — the component responsible for handling IPsec (encrypted network traffic) over TCP connections. The core bug is a logic flaw in how the kernel handles shared page fragments during socket buffer (skb) coalescing: the skb "forgets" that a fragment is shared, hence the name.&lt;/p&gt;&lt;p&gt;The attack is methodical and requires no race condition whatsoever. Here's what happens under the hood:&lt;/p&gt;&lt;p&gt;The exploit first calls &lt;code&gt;unshare()&lt;/code&gt; to carve out an isolated user and network namespace — a standard unprivileged operation — which grants it &lt;code&gt;CAP_NET_ADMIN&lt;/code&gt; (network administration capability) within that bubble, without any real privileges on the host. It then installs a crafted ESP security association using a known AES-128-GCM key.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Next, it builds a 256-entry lookup table mapping every possible keystream byte to a specific cryptographic nonce value. With that table in hand, the exploit splices file pages directly from the target binary — &lt;code&gt;/usr/bin/su&lt;/code&gt; — into a TCP socket buffer before enabling ESP-in-TCP mode.&amp;nbsp;&lt;/p&gt;&lt;p&gt;When the socket transitions into espintcp ULP (Upper Layer Protocol) mode, the kernel attempts to decrypt the queued data in-place. The result: the AES-GCM keystream is XORed directly into the kernel's page cache copy of the file, flipping exactly the bytes the attacker wants.&lt;/p&gt;&lt;p&gt;The exploit repeats this for each byte that needs changing, effectively overwriting the first 192 bytes of su with a small ELF stub that calls &lt;code&gt;setresuid(0,0,0)&lt;/code&gt; and executes &lt;code&gt;/bin/sh&lt;/code&gt;. Running su then drops you into a root shell. The on-disk binary is never touched — the corruption lives entirely in memory.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Who Is Affected&lt;/h3&gt;&lt;p&gt;All &lt;b&gt;Linux kernel versions affected by Dirty Frag are also affected by Fragnesia&lt;/b&gt; — specifically, any kernel without the patch published to the netdev mailing list on May 13, 2026. The exploit has been confirmed working on Ubuntu 22.04/24.04-era kernels (tested on 6.8.0-111-generic). Ubuntu's default AppArmor restrictions on unprivileged user namespaces can raise the bar slightly, but the README is explicit: that restriction only requires one additional bypass step and is out of scope for the vulnerability itself.&lt;/p&gt;&lt;p&gt;Microsoft has previously noted active in-the-wild exploitation of related techniques, observing campaigns that gain SSH access and immediately escalate privileges via su — a pattern consistent with both Dirty Frag and now Fragnesia.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What You Should Do Right Now&lt;/h3&gt;&lt;p&gt;The mitigation is the same as for Dirty Frag. If your systems don't depend on IPsec ESP or the RxRPC protocol, disabling the vulnerable modules is the fastest interim fix:&lt;/p&gt;&lt;pre&gt;rmmod esp4 esp6 rxrpc
printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' \
  &amp;gt; /etc/modprobe.d/fragnesia.conf&lt;/pre&gt;&lt;p&gt;If you believe a system has already been exploited, the modified &lt;code&gt;/usr/bin/su&lt;/code&gt; lives only in the page cache. Clear it before anyone else runs &lt;b&gt;su&lt;/b&gt;:&lt;/p&gt;&lt;pre&gt;echo 1 | tee /proc/sys/vm/drop_caches&lt;/pre&gt;&lt;p&gt;Or simply reboot. Apply kernel patches from your distribution vendor as they become available — the upstream patch for this specific bug landed on May 13, 2026.&lt;/p&gt;&lt;p&gt;Three critical Linux LPEs in two weeks is not a coincidence — it's a signal that this region of the kernel has been underexamined for a long time. Keep an eye on your patch feeds.&lt;/p&gt;&lt;p class="note"&gt;Fragnesia was discovered by William Bowling and the V12 team. Technical details and a proof-of-concept are available in the V12 Security GitHub repository.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhODeAKZHXOAeaApwm6ehNJakJ_0Q329Z_cPdQ65ZCrnj9gWzoF2flM_J60lJPh1YAR4Iew1fLc6wJ49TX2i0f66Gv6kK9HNdbCwzz_njqKN3D0fjgciPKOIKQQBvP3igYZp8bMtU2CFd4Bg0K5jQxxyPIH_q3YliBywK4KO8uPR1F1k-NCU2Zr27kHUcs/s72-c/Fragnesia.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item></channel></rss>