<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Cyber Kendra</title><description>Tech Hub</description><managingEditor>noreply@blogger.com (Root)</managingEditor><pubDate>Thu, 21 May 2026 00:29:13 +0530</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">3471</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>https://www.cyberkendra.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>All the content is copyright of cyberkendra.com</copyright><itunes:image href="http://2.bp.blogspot.com/-svYWW7Cp8JI/UDUgofD9kUI/AAAAAAAAAEY/ina7VZi4ZRg/s1600/webprotal.png"/><itunes:keywords>Computer,technology,tech,IT,security,Gadgets,Telecom</itunes:keywords><itunes:summary>All about Computer and technology. </itunes:summary><itunes:subtitle>Cyber kendra</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:author>Vivek Gurung</itunes:author><itunes:owner><itunes:email>protalweb@gmail.com</itunes:email><itunes:name>Vivek Gurung</itunes:name></itunes:owner><item><title>Drupal Patches Highly Critical SQL Injection That Lets Anonymous Attackers Hijack PostgreSQL-Backed Sites</title><link>https://www.cyberkendra.com/2026/05/drupal-patches-highly-critical-sql.html</link><category>Drupal</category><category>Security</category><pubDate>Thu, 21 May 2026 00:29:13 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-9074516310879613360</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="CVE-2026-9082 - Drupal SQL Injection" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYmB8vsFk-8-SIe1gbYVNUCjxaUho69AYfhVYBM28rzCaDCHV9kRL9DnLGz5SUFy7HHCbAXAg4bhdTvngwmEKI4KV4mRGSna8qkHnyqQbHo7FCyiXeg1dvfA1bokbsdWZ_aTmYxKJOu5maFtr8RCU4JYwmy8yHAZJiaw4rxJQeLtYCbqqJnBRiejq_CwE/s16000/CVE-2026-9082.webp" title="CVE-2026-9082 - Drupal SQL Injection" /&gt;&lt;/div&gt;&lt;p&gt;Drupal has pushed emergency security updates for a highly critical SQL injection vulnerability in its core database abstraction layer — the kind of flaw that lets an unauthenticated attacker walk straight into your database without needing a username or password.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The vulnerability, tracked as &lt;b&gt;CVE-2026-9082 &lt;/b&gt;and disclosed under advisory &lt;a href="https://www.drupal.org/sa-core-2026-004" rel="nofollow" target="_blank"&gt;SA-CORE-2026-004&lt;/a&gt;, scores 20 out of 25 on Drupal's risk scale. That "Highly Critical" rating isn't an exaggeration: the scoring breakdown shows zero access complexity, no authentication required, and full confidentiality and integrity impact — meaning an attacker can read everything and modify anything.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What's broken and why&lt;/h3&gt;&lt;p&gt;Drupal's database abstraction API is supposed to act as a safety net — a layer between PHP code and the database that automatically sanitizes queries to block injection attacks. But a flaw in this API allows specially crafted HTTP requests to slip past that sanitization entirely, enabling arbitrary SQL to execute directly against the database.&lt;/p&gt;&lt;p&gt;The vulnerability only affects sites running PostgreSQL databases, not MySQL or MariaDB backends. That's a narrowing factor, but PostgreSQL is common among enterprise Drupal deployments — government portals, university sites, and large media organizations frequently run it for performance and compliance reasons.&lt;/p&gt;&lt;p&gt;The consequences of successful exploitation range from &lt;b&gt;data exfiltration&lt;/b&gt; (leaking user records, private content, credentials) to &lt;b&gt;privilege escalation&lt;/b&gt; and, in some configurations, &lt;b&gt;remote code execution&lt;/b&gt; — full server takeover.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Broader blast radius: Symfony and Twig&lt;/h3&gt;&lt;p&gt;The patches do more than fix the SQL injection. The releases for all supported branches also bundle upstream security updates for Symfony and Twig, two PHP libraries that Drupal depends on heavily.&lt;/p&gt;&lt;p&gt;Drupal's advisory explicitly warns that depending on your site's configuration and installed modules, you may be independently vulnerable to those upstream issues — even if PostgreSQL isn't in the picture. All sites should update regardless.&lt;/p&gt;&lt;p&gt;The advisory specifically recommends reviewing which user roles have the ability to update Twig templates, for example through Views or contributed modules — a Twig template injection path could compound the risk significantly.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Who is affected and what to do&lt;/h3&gt;&lt;p&gt;Every supported Drupal branch is in scope: Drupal 10.4 through 11.3. The Drupal Security Team went further and issued best-effort patches for end-of-life Drupal 8 and 9 installations, acknowledging the severity warrants the exception — though those patches come without guarantees and those sites remain exposed to prior unpatched vulnerabilities.&lt;/p&gt;&lt;p&gt;Patched versions are:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;b&gt;Drupal 11: &lt;/b&gt;11.3.10, 11.2.12, 11.1.10&lt;/li&gt;&lt;li&gt;&lt;b&gt;Drupal 10: &lt;/b&gt;10.6.9, 10.5.10, 10.4.10&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Sites using Drupal Steward (Drupal's WAF-based protection service) are already shielded from known attack vectors, but should still upgrade promptly in case additional exploitation paths surface.&lt;/p&gt;&lt;p&gt;Two days before release, the Drupal Security Team issued an advance public notice — rare, and a signal of how seriously they treated this. The team explicitly warned that "exploits might be developed within hours or days" of the advisory going public, urging administrators to reserve time the same day patches dropped.&lt;/p&gt;&lt;p&gt;If your Drupal site runs PostgreSQL and hasn't been updated yet, that window is closing fast. Update now.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYmB8vsFk-8-SIe1gbYVNUCjxaUho69AYfhVYBM28rzCaDCHV9kRL9DnLGz5SUFy7HHCbAXAg4bhdTvngwmEKI4KV4mRGSna8qkHnyqQbHo7FCyiXeg1dvfA1bokbsdWZ_aTmYxKJOu5maFtr8RCU4JYwmy8yHAZJiaw4rxJQeLtYCbqqJnBRiejq_CwE/s72-c/CVE-2026-9082.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>PinTheft: New Linux Exploit Steals Kernel References to Root Shell</title><link>https://www.cyberkendra.com/2026/05/pintheft-new-linux-exploit-steals.html</link><category>Linux</category><category>Security</category><pubDate>Wed, 20 May 2026 23:38:04 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-2826447937744213725</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="PinTheft Linux Flaw" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEu8Iyg8fqy2N8lsmG4ghCtM_-DoX2zQgykFFkA8qHE5u3aS8bywZeZjTSio0x4wbxsi_ZLgz9Omv4qbDWI03FIm11HLneqwIfxLxkTzYJhHiVVRA2PH3_ZY-GVBZ-icho7UPNDD-6IX2VhvYHaGE174QSrHDdy-gGwluS8syl0IRyghf8TSeA6SzwTKs/s16000/PinTheft.webp" title="PinTheft Linux Flaw" /&gt;&lt;/div&gt;&lt;p&gt;A working proof-of-concept exploit for a new Linux kernel privilege escalation bug called &lt;b&gt;PinTheft &lt;/b&gt;went public this week, adding another name to a growing list of kernel-level root escalations that have shaken the Linux security community throughout early 2026.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://github.com/v12-security/pocs/blob/09e835b587bf71249775654061ae4c79e92cf430/pintheft/README.md" rel="nofollow" target="_blank"&gt;Discovered&lt;/a&gt; by Aaron Esau of the V12 security team, PinTheft allows a local attacker to gain root access by exploiting an RDS (Reliable Datagram Sockets) zerocopy double-free bug. A kernel patch is already available — V12 released their PoC only after confirming independent discovery by other teams and verifying the fix landed upstream.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Makes This One Different&lt;/h3&gt;&lt;p&gt;The bug itself lives in a corner of the kernel most people rarely think about: the RDS zerocopy send path, specifically in &lt;code&gt;rds_message_zcopy_from_user()&lt;/code&gt;, which pins user memory pages into kernel space one at a time. If a later page triggers a fault, the error path drops the already-pinned pages — but later RDS message cleanup drops them a second time, because the scatterlist bookkeeping stays live even after the zcopy notifier is cleared. Each failed zerocopy send steals exactly one memory reference from the first page.&lt;/p&gt;&lt;p&gt;On its own, a reference count bug like this is difficult to turn into a useful primitive. PinTheft's real cleverness is what it does next.&lt;/p&gt;&lt;p&gt;To weaponize the reference count bug, the exploit leverages io_uring. The attacker registers an anonymous memory page as an io_uring fixed buffer, assigning it a &lt;code&gt;FOLL_PIN&lt;/code&gt; bias of 1024 references — then systematically drains those references through 1024 deliberately failing RDS sends, until io_uring is left holding a pointer to a page it no longer legitimately owns.&lt;/p&gt;&lt;p&gt;From there, the exploit evicts the target SUID binary's first page from cache, reclaims that same physical page, and uses io_uring's now-dangling buffer pointer to overwrite the page cache of a privileged binary — &lt;code&gt;/usr/bin/su&lt;/code&gt;, &lt;code&gt;passwd&lt;/code&gt;, or &lt;code&gt;pkexec&lt;/code&gt; are preferred targets — with a small custom ELF payload. Run the binary, get a root shell.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Who's Actually at Risk&lt;/h3&gt;&lt;p&gt;Beyond having the RDS module loaded, PinTheft also requires io_uring to be enabled, a readable SUID-root binary to be present, and an x86_64 system. The required RDS module is only default on Arch Linux among common distributions tested — other major distributions do not load it out of the box.&lt;/p&gt;&lt;p&gt;That limits the immediate blast radius. But the conditions aren't exotic on systems where administrators have enabled RDS for workloads that use it, or on containers and CI runners where kernel modules may be more permissive.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;A Pattern That Isn't Slowing Down&lt;/h3&gt;&lt;p&gt;PinTheft follows a wave of other Linux local privilege escalation vulnerabilities disclosed over the past several weeks — DirtyDecrypt, DirtyCBC, &lt;a href="https://www.cyberkendra.com/2026/05/dirty-frag-no-patch-no-warning-root.html" target="_blank"&gt;Dirty Frag&lt;/a&gt;, &lt;a href="https://www.cyberkendra.com/2026/05/linux-kernel-strikes-again-fragnesia-is.html" target="_blank"&gt;Fragnesia&lt;/a&gt;, and &lt;a href="https://www.cyberkendra.com/2026/04/a-732-byte-python-script-can-get-root.html" target="_blank"&gt;CopyFail&lt;/a&gt; — all belonging to the same broad vulnerability class of page-cache overwrite exploits. Threat actors have already begun actively exploiting CopyFail in the wild. Each new PoC in this series raises the question of how many similar bugs remain undiscovered in the kernel's networking and asynchronous I/O subsystems.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What to Do Now&lt;/h3&gt;&lt;p&gt;The straightforward mitigation is to remove RDS entirely if nothing on your system actually needs it:&lt;/p&gt;&lt;pre&gt;rmmod rds_tcp rds
printf 'install rds /bin/false\ninstall rds_tcp /bin/false\n' &amp;gt; /etc/modprobe.d/pintheft.conf&lt;/pre&gt;&lt;p&gt;Apply your distribution's kernel update as soon as it incorporates the upstream patch. If you're running Arch Linux, that should be your first call this week. For everyone else: check whether CONFIG_RDS is enabled in your running kernel before assuming you're clear.&lt;/p&gt;&lt;p&gt;The V12 team also warns that the exploit temporarily corrupts the target SUID binary's page cache in memory. Before running on any test system, the PoC backs up the target binary and prints a restore command — but don't skip the reboot on anything that matters.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEu8Iyg8fqy2N8lsmG4ghCtM_-DoX2zQgykFFkA8qHE5u3aS8bywZeZjTSio0x4wbxsi_ZLgz9Omv4qbDWI03FIm11HLneqwIfxLxkTzYJhHiVVRA2PH3_ZY-GVBZ-icho7UPNDD-6IX2VhvYHaGE174QSrHDdy-gGwluS8syl0IRyghf8TSeA6SzwTKs/s72-c/PinTheft.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>PostgreSQL Patches 11 Security Flaws, Including Code Execution and a Sneaky Password-Stealing Timing Attack</title><link>https://www.cyberkendra.com/2026/05/postgresql-patches-11-security-flaws.html</link><category>Security</category><category>Vulnerability</category><pubDate>Wed, 20 May 2026 23:11:11 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-8201197151934617735</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="PostgreSQL security updates address critical vulnerabilities" border="0" data-original-height="1010" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHlm8PpEmwFLxXSAaDUXC-XBc1zOM5Mgex6MbbXKhpP4FxEsvp1lGCYsapAO1DJxFt1kiPfE8W8YPL-q_lBHDPyvQ_TEBEsUddr3Sm-t3wTnsiTm6JD7oTovAg2aSILC0tSltqd6leTAMeNtlDNGXfn5VW1DXZEGaRez0XzMV1JWbvo2eiI7-jPCsxwZY/s16000/PostgreSQL%20.webp" title="PostgreSQL security updates address critical vulnerabilities" /&gt;&lt;/div&gt;&lt;p&gt;The world's most popular open-source database just dropped its biggest security update of the year — and if you haven't patched yet, attackers may already be eyeing your stack.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The PostgreSQL Global Development Group shipped simultaneous &lt;a href="https://www.postgresql.org/message-id/177876604042.861.12327647497486409223%40wrigleys.postgresql.org" rel="nofollow" target="_blank"&gt;security updates&lt;/a&gt; across every supported major version — 18.4, 17.10, 16.14, 15.18, and 14.23 — fixing 11 CVEs (Common Vulnerabilities and Exposures) and more than 60 additional bugs. Three of those CVEs carry a CVSS score of 8.8 out of 10, meaning they're rated "high severity" and exploitable by a low-privilege remote attacker with minimal friction.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Flaws That Matter Most&lt;/h3&gt;&lt;p&gt;The headline vulnerability is &lt;b&gt;CVE-2026-6637&lt;/b&gt;, a stack buffer overflow buried inside PostgreSQL's &lt;code&gt;refint&lt;/code&gt; contrib module — a built-in tool for enforcing referential integrity between tables. Any unprivileged database user can craft input to trigger the overflow and run arbitrary code as the operating system user running the database. That's a full server compromise from a regular user account.&lt;/p&gt;&lt;p&gt;Equally alarming is &lt;b&gt;CVE-2026-6473&lt;/b&gt;: integer wraparound across multiple PostgreSQL server features lets an attacker force the server to allocate undersized memory blocks, then write beyond their boundaries — leading to segmentation faults and, in the worst case, memory corruption. Ten independent security researchers reported this one, which is a signal that it was being actively probed.&lt;/p&gt;&lt;p&gt;Then there's a subtler threat: &lt;b&gt;CVE-2026-6478&lt;/b&gt;, a covert timing channel in how PostgreSQL compares MD5-hashed passwords during authentication. An attacker can measure the tiny time differences in password comparisons to reconstruct valid credentials — without ever getting a login error. The catch: this only affects databases that still use MD5 passwords, a legacy format inherited from upgrades from PostgreSQL 13 or earlier. The current default, &lt;code&gt;scram-sha-256&lt;/code&gt;, is immune. If you're on an upgraded cluster, check your &lt;code&gt;pg_authid&lt;/code&gt; table.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Logical Replication and Symlink Tricks&lt;/h3&gt;&lt;p&gt;Two more vulnerabilities deserve attention for production deployments. CVE-2026-6638 allows SQL injection via the &lt;code&gt;ALTER SUBSCRIPTION ... REFRESH PUBLICATION&lt;/code&gt; command, giving a subscriber table creator the ability to execute arbitrary SQL using the publication side's credentials — a serious risk for anyone running logical replication (a method of selectively streaming database changes between servers) across trust boundaries.&lt;/p&gt;&lt;p&gt;Meanwhile, CVE-2026-6475 exploits symlink following in &lt;code&gt;pg_basebackup&lt;/code&gt; and &lt;code&gt;pg_rewind&lt;/code&gt;, letting a superuser on the origin server overwrite sensitive OS-level files — such as &lt;code&gt;.bashrc&lt;/code&gt; — on the backup target, potentially hijacking the operating system account during failover operations.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What You Should Do Right Now&lt;/h3&gt;&lt;p&gt;The update process is straightforward: no database dump or schema migration is required. Stop PostgreSQL, replace the binaries, restart. That's it.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;b&gt;Linux (Debian/Ubuntu):&lt;/b&gt; &lt;code&gt;sudo apt update &amp;amp;&amp;amp; sudo apt install postgresql-17&lt;/code&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;RHEL/Fedora:&lt;/b&gt; &lt;code&gt;sudo dnf update postgresql&lt;/code&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;macOS (Homebrew):&lt;/b&gt; &lt;code&gt;brew upgrade postgresql@17&lt;/code&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;For managed cloud databases (AWS RDS, Google Cloud SQL, Azure Database for PostgreSQL), minor version patches roll out during maintenance windows. Log into your console now and verify you're on the patched release — or trigger a manual upgrade if your provider supports it.&lt;/p&gt;&lt;p&gt;This update also serves as a final warning shot for teams running PostgreSQL 14: the version reaches end-of-life on November 12, 2026, after which it will receive no further security fixes. Version 14.23 is the last patch you'll see. If production workloads are still on 14, treat this upgrade cycle as the deadline to migrate to PostgreSQL 16 or 17.&lt;/p&gt;&lt;p&gt;PostgreSQL powers infrastructure at companies ranging from Apple and Instagram to the majority of cloud-native SaaS platforms. A database this deeply embedded in the internet's plumbing is exactly the kind of target that threat actors monitor closely. The 60+ bug fixes bundled alongside these CVEs make patching a double win — security and stability in a single restart.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHlm8PpEmwFLxXSAaDUXC-XBc1zOM5Mgex6MbbXKhpP4FxEsvp1lGCYsapAO1DJxFt1kiPfE8W8YPL-q_lBHDPyvQ_TEBEsUddr3Sm-t3wTnsiTm6JD7oTovAg2aSILC0tSltqd6leTAMeNtlDNGXfn5VW1DXZEGaRez0XzMV1JWbvo2eiI7-jPCsxwZY/s72-c/PostgreSQL%20.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>GitHub's Own Codebase Was Breached — A Poisoned VS Code Extension Was All It Took</title><link>https://www.cyberkendra.com/2026/05/githubs-own-codebase-was-breached.html</link><category>Data Breached</category><category>Security</category><category>Supply Chain</category><pubDate>Wed, 20 May 2026 22:29:15 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-1178144741422026731</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzOZyl0SlPFdXRtvv6zaDFFctJI9H2fpCt4xYoN36vmrUs14cO8OnEIdaXNDVM8mFbXjiR1jwMycPr_-mBwaco55DhzwETlIBhS8jm_BYjP0IAoFBOaWYrhCRrcDmWJM99o-tdnXKkC5VGsxrNJw7Cty18a5ymCa9HvKlxDWZaDh8LbhKmUKKsTqwY4to/s16000/github-hacked.webp" /&gt;&lt;/div&gt;&lt;p&gt;The world's largest code-hosting platform just became the victim of its own ecosystem. On May 20, 2026, &lt;a href="https://x.com/github/status/2056884788179726685" rel="nofollow" target="_blank"&gt;GitHub confirmed&lt;/a&gt; that a threat actor exfiltrated roughly 3,800 of its internal repositories — not through some sophisticated platform zero-day, but by slipping malware into a Visual Studio Code extension and waiting for a GitHub employee to install it.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The attack was claimed by TeamPCP, a cybercrime group that has spent 2026 methodically dismantling developer trust across the open-source &lt;a href="https://www.cyberkendra.com/search/label/Supply%20Chain" target="_blank"&gt;supply chain&lt;/a&gt;. The group posted the stolen data on the Breached cybercrime forum with a $50,000 asking price, threatening to leak everything publicly if no single buyer steps forward.&lt;/p&gt;&lt;p&gt;GitHub's response moved fast. The company said it identified and contained the breach after the poisoned VS Code extension compromised an employee's endpoint. The affected device was isolated, the malicious extension version was pulled, and critical credentials were rotated overnight with the highest-impact secrets prioritized first.&amp;nbsp;&lt;/p&gt;&lt;p&gt;GitHub's current assessment is that only internal repositories were exfiltrated, and the attacker's claims of roughly 3,800 repositories are directionally consistent with what the company's investigation has found so far.&amp;nbsp;&lt;/p&gt;&lt;p&gt;There is, as of now, no evidence that customer repositories, enterprise accounts, or user data were touched — though the investigation remains active.&lt;/p&gt;&lt;p&gt;The mechanics of the attack are deceptively simple. A developer installs what looks like a legitimate VS Code extension — the kind millions of engineers add to their editors without a second thought. The extension is poisoned: it silently compromises the host machine and gives attackers access to whatever that user can reach. For a GitHub employee, that foothold touched thousands of internal repositories.&lt;/p&gt;&lt;p&gt;The TeamPCP group achieved a series of compromises by deploying Mini Shai-Hulud, their adapted version of a self-replicating worm first documented in 2025, which largely automates supply chain attacks by stealing CI/CD credentials and using them to publish infected versions of further packages.&lt;/p&gt;&lt;p&gt;The campaign has affected over 170 packages spanning both npm and PyPI, with more than 518 million cumulative downloads. Earlier in May alone, the group published trojanized versions of Microsoft's official Durable Task Python SDK to PyPI. The malware payload skips systems with a Russian locale — a consistent hallmark of Eastern European cybercrime operations.&lt;/p&gt;&lt;p&gt;Security researchers warn that even limited access to internal repositories could expose operational tooling, internal APIs, authentication workflows, or infrastructure configurations useful for future attacks.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Cybernews researchers noted that exposed source code increases the risk of finding fresh vulnerabilities, particularly in GitHub's integrations with tools like Copilot — even after credentials have been rotated. The breach also arrived shortly after the April 28 disclosure of CVE-2026-3854, a critical GitHub vulnerability that allowed authenticated users to execute arbitrary commands on GitHub servers.&lt;/p&gt;&lt;p&gt;GitHub says a fuller report will be published once the investigation concludes. In the meantime, security teams are urging developers to immediately rotate any API keys or secrets stored in private repositories, audit all IDE extensions and remove anything unverified, and treat their build pipelines as production-grade attack surfaces. When the platform that hosts the world's code gets hit through a developer's own toolchain, the lesson lands for everyone.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzOZyl0SlPFdXRtvv6zaDFFctJI9H2fpCt4xYoN36vmrUs14cO8OnEIdaXNDVM8mFbXjiR1jwMycPr_-mBwaco55DhzwETlIBhS8jm_BYjP0IAoFBOaWYrhCRrcDmWJM99o-tdnXKkC5VGsxrNJw7Cty18a5ymCa9HvKlxDWZaDh8LbhKmUKKsTqwY4to/s72-c/github-hacked.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Google I/O 2026 — Here's Everything Google Announced</title><link>https://www.cyberkendra.com/2026/05/google-io-2026-heres-everything-google.html</link><category>Google</category><category>Technology</category><pubDate>Wed, 20 May 2026 00:28:57 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-2131248114046785409</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Google I/O 2026" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMIJZhBDFtFQf-lI2R0oNFHmvybDHIvEMgioOfrsoa4RIbZwkljtFgwNMt2g4oQ9IyA5VkUjBLCFbBebehOJLQxQxvmBwzKN4DQH3PIciVyaFaM-KrdKFF_76pg7MlA716Ed9xXa9ckCNzXYC8tU4YLZcB8nzInW9XXkjG-YUeSRXtqD3r0vAbLiUfa3E/s16000/Geminiapp_Bento_hero.width-1600.format-webp.webp" title="Google I/O 2026" /&gt;&lt;/div&gt;&lt;p&gt;Google doesn't do small announcements anymore. At I/O 2026 in Mountain View, the company dropped more new products in a single two-hour keynote than most companies release in a year — and a significant chunk of them are already live. The thread running through all of it: Gemini is no longer a chatbot. It's becoming the operating layer of everything Google makes.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Sundar Pichai opened with a scale check that few companies on earth could match. Two years ago, Google was processing 9.7 trillion tokens a month. Last year that climbed to roughly 480 trillion. Today the number is over 3.2 quadrillion per month — a 7x jump in a single year — with over 8.5 million developers now building with Google's models monthly. That trajectory is the context for everything announced on stage.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Gemini Spark: Your First Real AI Agent&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Gemini Spark" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjVjm0SyiTnqZYeia0ev4mSr1ts6sBz832KxStuntnqMHeHbTlBiqcEssiO4XD0DtEyiTxhujyCXugcBFypkLgYo9obxsZkiqfZfu6G8JL3DDSLhB9MocTRGDzoNku_Pe1fiabKgG2HXBxrSLACp3VzI9Zo2tgAr5UxwGYMsLWZD6nGTgwQMWMffdmGD0/s16000/7.png" title="Gemini Spark" /&gt;&lt;/div&gt;&lt;p&gt;Gemini Spark is described as "your personal agent" that takes actions on your behalf to help "navigate your digital life." Google calls it a big shift — transforming Gemini from an assistant that answers questions into an active partner that does real work under your direction. It integrates with Gmail, Docs, and other Google Workspace apps first, before expanding to third-party tools via MCP over the summer.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Spark runs on private Google Cloud servers in the background and keeps working even when you're not actively using your phone. The live demo showed it planning a block party — creating an RSVP tracker in Google Sheets, auto-updating Docs, and sending follow-up email reminders to people who hadn't responded.&amp;nbsp;&lt;/p&gt;&lt;p&gt;You can work with Spark however is most convenient: in the Gemini app, or soon through email and chat. Later this summer, Spark will also operate directly within Chrome, acting as your agentic browser assistant. The beta rolls out to Google AI Ultra subscribers in the US next week.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Android Halo: The Status Bar That Knows What Your Agent Is Doing&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Android Halo" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihkx9sCJhuCGaCevyNywaavwJV_0-mOG0-6o4yZgS2du75IZkZZLDaib-M0YlFp5YhXlTESXqqa59bQkjtpouZLf3G4NEMsYiBW1nPGzMOKnGEhTqdzVa0IJdLwPDrmakX3cKPSIWx0k3CZLBejL11rneY2SJGFpHEgEdjrkSgDuJPtkf3CEQyT1tZKPg/s16000/5.png" title="Android Halo" /&gt;&lt;/div&gt;&lt;p&gt;Android Halo provides at-a-glance visibility into what your agent is working on at any given time, with subtle communication at the top of your phone screen — meaning you can see an agent's progress without having to stop what you're doing or switch apps.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The only visual cue shown so far is a glowing circle morphing into the Gemini sparkle in the upper-left corner of a Pixel phone's status bar. It's coming in Android 17, with more details expected later this year when new Pixel hardware arrives.&amp;nbsp;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Search Gets Its Biggest Upgrade in Nearly 30 Years&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Google AI Search" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKbpszzb7C0Yv3GGWSbmmIpDqTkvvHqyro5TAVMGaDJJ5Bw0BAtaqf_F_Am7RI2Mbuu2kiIs7yPb0WYn7J-gBtLV7AN3hENyZSEYiY5YhwEVjco_xh2X-zNd9MORILo7AbgvFCAl4r8k_WusZDgggmH2V27pi1Q785mhdaoNVZ40Gu-Fui7frs2NcQVuU/s16000/6.png" title="Google AI Search" /&gt;&lt;/div&gt;&lt;p&gt;By combining with Gemini Spark, questions you ask in Search can now be agentic — instead of returning a snapshot of information at that moment, Search can give you ongoing updates in the future. Searching is now an AI function, not just a text input.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Google is also combining AI Overviews and AI Mode into a more unified experience, letting users move seamlessly between traditional results, AI-generated answers, and follow-up conversations without losing context. The deeper you go into a conversation, the more relevant links and sources become. The updated experience is rolling out globally today.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Gemini 3.5 Flash and Omni: The Engine Room&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Gemini Omni" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhneeoOoWlxg6gjhcOppQFzLrtNdnSRx_Ae2f49hTkXaM9OVp0-fT1h8q10UgKqzq6LG1jeeq-ceDF4aWnE-Q5YrD5aUgkXKIz_whqdNYKkIId6TSDWm_hv-E8_1eHu1V-0wl506wl6680PdoxgSv3gCNFe9SXFu7909lIHA5krRSinPl0bkM4f8OxYUFo/s16000/4.png" title="Gemini Omni" /&gt;&lt;/div&gt;Gemini 3.5 Flash is better across all benchmarks than the previous Gemini 3.1 Pro, has made significant progress in coding, and is four times faster than other frontier models in terms of output tokens per second.&amp;nbsp;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Gemini Omni is a new series of models that combines Gemini's reasoning with creation — accepting image, audio, video, and text as input and generating video output grounded in real-world physics and knowledge. Omni Flash is live today for Google AI Plus, Pro, and Ultra subscribers, as well as YouTube Shorts and YouTube Create users at no extra cost.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Antigravity 2.0: Coding by Agent&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Antigravity 2.0" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjs93U-KrPTgOmpSO13m10LJrPoXHhXCsBWV4uVHQP6mh0hgfbMfOfvQOR1udqLShOvaLWEeh_BdqLrAVwhOGkOE-zfncLqr0BNzRHAoah5LjxcwZPpUlPtGMaCTYej-PVUqsFkjrZMFmXcTrUtx9d6HggqbEk2H2IJamLlvBPCF2rjVJIkMgVNowEcLCc/s16000/3.png" title="Antigravity 2.0" /&gt;&lt;/div&gt;&lt;p&gt;Antigravity will now use Gemini 3.5 Flash and allow for faster development cycles. At I/O, Google announced a standalone desktop application dubbed Antigravity 2.0 and a new command-line interface for developers who prefer staying in the terminal, along with new Google Cloud standard privacy protections.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The platform now includes native voice support and integrations with Android, Firebase, and Google AI Studio, and is described as "unabashedly agent-first."&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;CodeMender: The AI That Patches Your Security Holes Automatically&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="CodeMender" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbBYthF9gHWyiVaPvqfVDqFv4_UryPER0nqfXj8ObbbUlwBMP7WVS5Tq9v66Ww89boYJIR4hQeyzVM_ZEmcLF9m-tfmL_y8bV88PcoDdBCCfztaG6F4JC23PgOqFREnMHVDH0qyu1OSZjJa-SdU-JylmcZTFI_GKFF2K7LUPkm_s_3PuUPDZBKROqTEkA/s16000/1.png" title="CodeMender" /&gt;&lt;/div&gt;&lt;p&gt;This is the announcement that didn't get nearly enough attention in the keynote recaps. CodeMender is a new AI-powered agent developed by Google DeepMind that takes a comprehensive approach to code security that's both reactive — instantly patching new vulnerabilities — and proactive, rewriting existing code to eliminate entire classes of flaws. Over the six months Google spent building it, CodeMender already upstreamed 72 security fixes to open-source projects, including codebases as large as 4.5 million lines.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The tool was built using Google's learnings from BigSleep and OSS-Fuzz. It relies on Gemini for root cause analysis, after which it produces security patches that are peer-reviewed by specialized "critique agents" before reaching a human reviewer for final sign-off.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;b&gt;CodeMender &lt;/b&gt;is now available as a powerful AI security agent through Google's Agent Platform, letting any developer — not just Google's own teams — benefit from autonomous vulnerability detection and patching. Alongside CodeMender, Google also announced a dedicated AI Vulnerability Reward Program with bounties up to $30,000, and Secure AI Framework 2.0, an updated set of industry standards for securing autonomous AI agents.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Google Pics, Stitch, and Pomelli: The Creative Triple Threat&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Google Pics &amp;amp; Stitch" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEima9V4H88PTbHGd7uVCfatIkkK12gtCwzytwBWb-hbDoIAi5rdGtwESeaQzKoR13qH0JffT-8NFmgHsPLWkAxVPftWF0DfDN7ry-38vkNuWCoFrszvY_0sqsDjL1NJIUkKOhKsNooMKSfT5Wuc7HC3IP3hL8JSswyZ53N1MS5QGbkJjkJyXSIUlX03rLA/s16000/2.png" title="Google Pics &amp;amp; Stitch" /&gt;&lt;/div&gt;&lt;p&gt;Google Pics is a new image creation tool inside Google Flow that lets you generate images on the fly with AI, all automatically watermarked with SynthID. Stitch lets people create and launch websites using AI, with simple voice inputs to make changes and guide layouts in real time.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Pomelli goes a step further — introducing AI agents that can help you design your brand book and launch a full website, adding new ways to build brand content and entire web presences from scratch. Together, the three tools represent Google's most direct move yet into the territory occupied by Canva, Squarespace, and similar creative platforms.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Universal Cart and the End of Tab-Switching While Shopping&lt;/h3&gt;&lt;p&gt;Google has partnered with Amazon, Shopify, and Walmart on a new open standard called the &lt;b&gt;&lt;a href="https://www.cyberkendra.com/2026/01/google-just-changed-how-youll-shop-with.html" target="_blank"&gt;Universal Commerce Protocol&lt;/a&gt;&lt;/b&gt;, designed to unify digital commerce so AI agents can browse inventories and handle entire purchases without hard-coded integrations for each merchant.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The Universal Cart follows you across Google services, notifying you when items go on sale or come back in stock. In one demo, it flagged that a chosen motherboard and processor were incompatible and recommended a replacement that actually worked — then added everything to the cart automatically. It arrives in the US this summer.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Gemini for Science, Project Genie, and the Long Game&lt;/h3&gt;&lt;p&gt;Gemini for Science will bring together powerful AI tools to assist researchers and help scientists model complex concepts, framed as "a force multiplier for human ingenuity to usher in a new age of progress." Project Genie is being connected with nearly 20 years of Google Street View imagery, letting people create new virtual worlds anchored in real locations. These two announcements sit at the edge of the consumer keynote but point to where Google's deepest research bets are heading.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Daily Brief, Ask YouTube, and Docs Live&lt;/h3&gt;&lt;p&gt;Daily Brief is a personalized digest that sifts through your Gmail, Calendar, and Tasks to prioritize your day and suggest next steps. It's rolling out today to Google AI Plus, Pro, and Ultra subscribers in the US. Ask YouTube expands more widely this summer, letting you use YouTube search as an AI chatbot that points you to exact timestamps in videos that answer your questions. Docs Live, coming this summer to AI Pro and Ultra subscribers, lets you verbally brain-dump whatever's on your mind — complete with "ums" and mid-sentence changes — and Gemini converts it into a finished, structured document.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Bigger Bet&lt;/h3&gt;&lt;p&gt;Google is looking to spend six times more on AI in 2026 than it did in 2022, with an estimated $190 billion in capital expenditures for the year alone.&amp;nbsp;&lt;/p&gt;&lt;p&gt;That's not hedging. Everything shown at I/O 2026 — from Spark running quietly in the cloud, to CodeMender patching your repositories overnight, to Halo glowing in your status bar — is Google betting that the next platform isn't an operating system or a search box. It's an agent that already knows what you need before you type it.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMIJZhBDFtFQf-lI2R0oNFHmvybDHIvEMgioOfrsoa4RIbZwkljtFgwNMt2g4oQ9IyA5VkUjBLCFbBebehOJLQxQxvmBwzKN4DQH3PIciVyaFaM-KrdKFF_76pg7MlA716Ed9xXa9ckCNzXYC8tU4YLZcB8nzInW9XXkjG-YUeSRXtqD3r0vAbLiUfa3E/s72-c/Geminiapp_Bento_hero.width-1600.format-webp.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Microsoft's durabletask Hit by TeamPCP — Your Cloud Keys Were the Target</title><link>https://www.cyberkendra.com/2026/05/microsofts-durabletask-hit-by-teampcp.html</link><category>Microsoft</category><category>Security</category><category>Supply Chain</category><pubDate>Tue, 19 May 2026 23:52:33 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-697797231284041860</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="durabletask python package hacked" border="0" data-original-height="703" data-original-width="1618" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY-oTV5rsT5DbBvRpvNjjmwP17Y6e8FxbVWnRiSWsm1lfB71RwBFM9a9MohZ29IPY80aMftSF3W7YsNq0tz-W6yFK6EBk9JfNSgeGppaBHB6R7MS9N4VtR752bWXczBZ2piP0fc0gsihSTUobz46kUGE_dZ9-3ZeVwndIRxFhos0xMM7JbZ0vxKm_6fKc/s16000/durabletask.webp" title="durabletask python package hacked" /&gt;&lt;/div&gt;&lt;p&gt;TeamPCP has quietly poisoned yet another trusted developer package — and this time the target was sitting inside Microsoft's own toolchain. Three consecutive releases of &lt;b&gt;durabletask &lt;/b&gt;(v1.4.1, v1.4.2, and v1.4.3), the official Python client for Microsoft's Durable Task workflow framework, were compromised and loaded with credential-stealing malware — a direct follow-on to the group's hit on &lt;b&gt;guardrails-ai&lt;/b&gt; just days earlier.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Same Worm, A Sharper Payload&lt;/h3&gt;&lt;p&gt;Security researchers at Wiz disclosed the compromise, noting that the malicious payload — dubbed rope.pyz — is an evolved version of transformers.pyz, the dropper previously deployed in the guardrails-ai attack on May 11.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The core mission hasn't changed: steal everything and move on. But the durabletask variant is notably more aggressive in where it injects, spreading its hooks across &lt;code&gt;task.py&lt;/code&gt;, &lt;code&gt;entities/__init__.py&lt;/code&gt;, &lt;code&gt;extensions/__init__.py&lt;/code&gt;, and &lt;code&gt;payload/__init__.py&lt;/code&gt; — giving it more entry paths than the earlier version. The C2 (command-and-control) server has also shifted from a raw IP address to check.gitservice.com, with a fallback to t.m-kosche.com, and SSL verification is now enabled — a sign the operation is maturing.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Gets Stolen — And How It Spreads&lt;/h3&gt;&lt;p&gt;The worm's credential sweep is comprehensive by design. Once executed on a Linux host, it goes after AWS IAM keys, Azure and GCP service account tokens, Kubernetes service account credentials, HashiCorp Vault tokens, filesystem passwords, and the contents of your shell history files (&lt;code&gt;.bash_history&lt;/code&gt;, &lt;code&gt;.zsh_history&lt;/code&gt;). If you store credentials in Bitwarden, 1Password, or pass/gopass, the payload attempts to brute-force unlock them using passwords it harvests along the way.&lt;/p&gt;&lt;p&gt;What makes this variant especially dangerous is its lateral movement. After infection, the worm actively scans for AWS SSM-reachable instances (Amazon's remote management service) and Kubernetes clusters, then propagates itself to up to five additional targets per compromised host. In a shared CI/CD environment or a cloud cluster, that ceiling can still translate to dozens of machines from a single install event.&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;"These packages are likely to be installed in local developer environments, CI jobs, release workflows, and internal build systems — where git tokens, cloud credentials, Kubernetes service account tokens, and deployment secrets live." — Wiz Threat Intelligence&lt;/p&gt;&lt;/blockquote&gt;&lt;p class="note wr"&gt;&lt;b&gt;⚡ Immediate Action Required&lt;/b&gt;— If your environment installed durabletask v1.4.1, v1.4.2, or v1.4.3, treat the host as fully compromised. Rotate all cloud credentials immediately and check for the infection marker at ~/.cache/.sysupdate-check.&amp;nbsp;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Part of a Relentless 2026 Campaign&lt;/h3&gt;&lt;p&gt;The &lt;b&gt;durabletask &lt;/b&gt;compromise doesn't exist in isolation. TeamPCP — also tracked as PCPcat, ShellForce, and DeadCatx3 — has been running supply chain operations since at least September 2025, gaining notoriety following the React2Shell campaign that exploited cloud environments.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Through early 2026, the group cascaded through Trivy, Checkmarx KICS, LiteLLM, and Telnyx before pivoting to the Mini Shai-Hulud npm and PyPI wave that poisoned over 400 packages in a single night in mid-May. The guardrails-ai infection on May 11 served as the direct precursor to the durabletask attack — the group reusing and refining the same payload architecture each time.&lt;/p&gt;&lt;p&gt;What makes TeamPCP analytically notable is the architectural decision to chain multiple compromises sequentially — where each foothold yields the specific credentials needed to compromise the next target. This isn't spray-and-pray malware. Each package is chosen because it lives in a sensitive part of a development pipeline.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Security Teams Must Do Now&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style="text-align: left;"&gt;&lt;li&gt;Find the exposure: Search lockfiles and CI logs for durabletask versions 1.4.1, 1.4.2, or 1.4.3. Look for &lt;code&gt;/tmp/managed.pyz&lt;/code&gt; or &lt;code&gt;/tmp/rope-*.pyz&lt;/code&gt; on Linux hosts.&lt;/li&gt;&lt;li&gt;Check for execution: The infection marker lives at &lt;code&gt;~/.cache/.sysupdate-check&lt;/code&gt; (general) and &lt;code&gt;~/.cache/.sysupdate-check-k8s&lt;/code&gt; (Kubernetes). Its presence confirms the payload ran.&lt;/li&gt;&lt;li&gt;Rotate everything: AWS IAM credentials, Azure service principals, GCP service accounts, Kubernetes service accounts, Vault tokens, and any passwords that lived in Bitwarden, 1Password, or shell history. Treat all of these as already exfiltrated.&lt;/li&gt;&lt;li&gt;Audit SSM and Kubernetes: Check CloudTrail for &lt;code&gt;SSM:SendCommand&lt;/code&gt; and &lt;code&gt;SSM:DescribeInstanceInformation&lt;/code&gt; calls. Review Kubernetes audit logs for unexpected &lt;code&gt;kubectl exec&lt;/code&gt; activity.&lt;/li&gt;&lt;li&gt;Block C2 infrastructure: At DNS or proxy level, block &lt;code&gt;check.gitservice.com&lt;/code&gt; and &lt;code&gt;t.m-kosche.com&lt;/code&gt;, and outbound connections to the exfil endpoints &lt;code&gt;/v1/models&lt;/code&gt;, &lt;code&gt;/audio.mp3&lt;/code&gt;, and &lt;code&gt;/api/public/version&lt;/code&gt;.&lt;/li&gt;&lt;li&gt;Enforce lockfile hashes: Going forward, validate every PyPI package against known-good hashes. A compromised publishing token — not a vulnerability in your code — is all it takes for the next wave.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The clean versions of durabletask (v1.4.0 and below) are unaffected. Given TeamPCP's cadence in 2026, this will not be the last package to carry rope.pyz — the question is which trusted dependency gets hollowed out next.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY-oTV5rsT5DbBvRpvNjjmwP17Y6e8FxbVWnRiSWsm1lfB71RwBFM9a9MohZ29IPY80aMftSF3W7YsNq0tz-W6yFK6EBk9JfNSgeGppaBHB6R7MS9N4VtR752bWXczBZ2piP0fc0gsihSTUobz46kUGE_dZ9-3ZeVwndIRxFhos0xMM7JbZ0vxKm_6fKc/s72-c/durabletask.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Google's Aluminium OS Spotted on GDG Community Page Hours Before I/O 2026 Keynote</title><link>https://www.cyberkendra.com/2026/05/googles-aluminium-os-spotted-on-gdg.html</link><category>Google</category><category>Googlebook</category><pubDate>Tue, 19 May 2026 22:17:46 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-4559695105247130972</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Google's mysterious Aluminum OS spotted before IO 2026" border="0" data-original-height="1152" data-original-width="2048" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjY88lAMQvbbE4SabCCfRmQpm-kUboyQkBwy_ne4GHK1uBrtkf2BoWIHv6l0tCc9w-yn2JN-snuFaF8ZwRg5aXJn7CftzZzMhMNTpQl7x8da23DechBjSWAr7-GwHEX3UgwyJNxSLpHO5s9d-xWPZrADiGVZ1pyuyzUw54biq5oOc_W8R5sQGf4FJvqIG8/s16000/googleos-aluminioumos.webp" title="Google's mysterious Aluminum OS spotted before IO 2026" /&gt;&lt;/div&gt;&lt;p&gt;A Google Developer Groups event page quietly confirmed what millions of Chromebook users have been waiting to hear — but the story is more complicated than a name leak.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Hours before Google's I/O 2026 keynote kicked off at the Shoreline Amphitheater, Cyber Kendra spotted a GDG Nuremberg recap event page that surfaced, listing "&lt;b&gt;Googlebook &amp;amp; Aluminum OS&lt;/b&gt;" as a confirmed discussion topic — describing it plainly as "Google's new premium laptop category and the merged Android/ChromeOS platform underneath it."&amp;nbsp;&lt;/p&gt;&lt;p&gt;For anyone tracking the slow-burning death of ChromeOS, that single line on a community calendar told the whole story before Sundar Pichai said a word on stage.&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img border="0" data-original-height="1245" data-original-width="1410" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4S05gzfwSRkNly1JfrpxgZB5Dj0f-S0VCG5aX2lYjFo-Ubh6G_za5W87HuUxQTjmeazimLmWw45jjCasozaujyEfp6ICofY3PCSsLjZuqDQAxvK3ukrTynpYCrjn9KSsHbvYkFVlsWQj1b0YQB5ScqO2GGJzi5GR1t-TKLQLlT0KoOQlDHQowGhsAGY0/s16000/aluminiumos-spotted.webp" style="margin-left: auto; margin-right: auto;" /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Image- CyberKendra&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/p&gt;&lt;p&gt;But here's the thing: this wasn't a leak in the traditional sense. Google had already pulled back the curtain on May 12, during a pre-I/O livestream called The Android Show: I/O Edition. The GDG page was simply a community mirror of what Google had already put on the table — and it's precisely that kind of casual community-level confirmation that tends to cut through the PR gloss.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;What Aluminium OS Actually Is&lt;/h2&gt;&lt;p&gt;&lt;a href="https://aluminium-os.com/" target="_blank"&gt;Aluminium OS&lt;/a&gt; is the internal codename for a desktop-optimized Android-based operating system that replaces the Linux-based ChromeOS for consumers. The same Android core runs on both mobile and desktop, adapting to different screen sizes — and it supports both ARM and x86 processors, which would make it the first mainline x86-maintained Android build.&lt;/p&gt;&lt;p&gt;Google has since clarified that "Aluminium" is a development codename, not the final retail brand, and says the actual consumer name will be revealed later in 2026. The hardware carrying this OS has a name, though: Googlebook — Google's deliberate answer to the MacBook branding game.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The announcement was made by Senior Director for Laptops and Tablets Alex Kuscher, and at its center is a feature called Magic Pointer — an AI-powered cursor built with Google DeepMind that brings Gemini's context awareness directly to wherever your mouse is pointing. Shake your cursor over a spreadsheet chart, and Gemini offers analysis. Hover over a paragraph, and it surfaces rewrite or translation options. It is, in effect, Gemini embedded into the lowest level of how you interact with a screen.&lt;/p&gt;&lt;p&gt;Beyond the cursor, Cast My Apps lets users open Android phone apps directly on the laptop display mid-workflow, while Quick Access lets users browse and insert files from a phone via Google Drive — no cable or manual transfer required. Create Your Widget lets users prompt Gemini to build a custom desktop widget pulling from Gmail, Calendar, or the web.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Who Makes the Hardware — and Who Gets Left Behind&lt;/h3&gt;&lt;p&gt;The first Googlebooks are being built by Acer, ASUS, Dell, HP, and Lenovo, with retail availability expected in Q3 2026. Every device will carry a distinctive "Glowbar" light strip as a hardware identifier for the platform. Pricing hasn't been announced, but the range is expected to span from sub-$300 education devices to premium models competing with MacBooks at $1,000+.&lt;/p&gt;&lt;p&gt;For existing Chromebook owners, the news is mixed. Chromebooks with Intel 12th Gen (Alder Lake) or MediaTek Kompanio 520 processors, at least 8GB of RAM, and 128GB of storage are the strongest candidates for future Aluminium OS upgrades. Older, lower-spec devices will likely remain on Chrome OS until their support window expires.&lt;/p&gt;&lt;p&gt;Critically, ChromeOS is not going away entirely — Google intends to keep it alive for enterprise and education users, where the managed, locked-down experience that IT departments depend on remains intact. Schools running Chromebook fleets won't need to panic.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Why This Matters Beyond the Laptop Market&lt;/h3&gt;&lt;p&gt;Microsoft is embedding Copilot into Windows. Apple is integrating Apple Intelligence across its platforms. Google's answer — Gemini baked into the OS at the architecture level rather than retrofitted — gives it a structural advantage neither OpenAI nor Anthropic can replicate: every Googlebook user becomes a Gemini user by default, with no app to download and no subscription to manage.&lt;/p&gt;&lt;p&gt;The GDG Nuremberg event page, scheduled for May 21-22 as a community recap of I/O announcements, plans to dig into exactly this: what Aluminium OS means for Android developers building for large screens, and how the shift to a merged platform affects the existing app testing matrix. Those are developer-facing questions that the polished keynote stage tends to gloss over — and they are often where the real story lives.&lt;/p&gt;&lt;p&gt;Google I/O 2026 is still unfolding today. More details on Aluminium OS, pricing, and the device lineup are expected. But the developer community already knew the headline before the lights came up.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjY88lAMQvbbE4SabCCfRmQpm-kUboyQkBwy_ne4GHK1uBrtkf2BoWIHv6l0tCc9w-yn2JN-snuFaF8ZwRg5aXJn7CftzZzMhMNTpQl7x8da23DechBjSWAr7-GwHEX3UgwyJNxSLpHO5s9d-xWPZrADiGVZ1pyuyzUw54biq5oOc_W8R5sQGf4FJvqIG8/s72-c/googleos-aluminioumos.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Microsoft Busts "Fox Tempest" — A Dark Web Service That Sold Fake Code Signatures to Ransomware Gangs</title><link>https://www.cyberkendra.com/2026/05/microsoft-busts-fox-tempest-dark-web.html</link><category>Microsoft</category><category>Security</category><pubDate>Tue, 19 May 2026 21:57:43 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-4301297788081163485</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Fox Tempest" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-5WmxRa0xiFNcP5CP1ZSze88SfarY4Ik68oNecLFRFgscgpp3bn5WQ-lbm0n5Wgzxo0WutpApdlbDedT0l9ofuNI6LbB9HCSiSwHTV9FvuGOL8-SiOebtyK7VhTP-FYzNdgGaJo5N-d1iwNTH9KqTnsiHeeDsv2hSgO2gFMasfijZgu7mOmjcM2MYcsw/s16000/fox-Tempest.webp" title="Fox Tempest" /&gt;&lt;/div&gt;&lt;p&gt;Microsoft has dismantled a sophisticated criminal operation that essentially ran a paid signing service for malware, allowing ransomware groups to make their malicious software appear completely legitimate to Windows security tools.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The threat actor, tracked as &lt;b&gt;Fox Tempest&lt;/b&gt;, operated a service called signspace[.]cloud that exploited Microsoft's own Artefact Signing infrastructure (formerly Azure Trusted Signing) to generate short-lived, 72-hour code-signing certificates. Those certificates let malware masquerade as trusted software — think AnyDesk, Microsoft Teams, PuTTY, or Webex — bypassing endpoint security controls that would otherwise flag unsigned executables.&lt;/p&gt;&lt;p&gt;In May 2026, Microsoft's Digital Crimes Unit (DCU), working with industry partners, pulled the plug on the operation and revoked over 1,000 fraudulent certificates Fox Tempest had generated across hundreds of Azure tenants.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;How the Service Worked&lt;/h3&gt;&lt;p&gt;Fox Tempest ran this like a proper SaaS business. Customers — other cybercriminals — paid between $5,000 and $9,500 per plan (with higher tiers getting queue priority) via a bilingual English-Russian Google Form. They'd upload malicious payloads to Fox Tempest-controlled environments and receive a properly signed binary back, ready to deploy.&lt;/p&gt;&lt;p&gt;The infrastructure evolved over time. By February 2026, the group had shifted to providing customers with pre-configured virtual machines hosted on Cloudzy, a US-based VPS provider, further streamlining operations and reducing their own exposure.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.microsoft.com/en-us/security/blog/2026/05/19/exposing-fox-tempest-a-malware-signing-service-operation/" rel="nofollow" target="_blank"&gt;Microsoft believes&lt;/a&gt; Fox Tempest likely used stolen US and Canadian identities to pass the identity verification required for Artefact Signing certificates.&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img alt="Fox Tempest attack chain" border="0" data-original-height="2090" data-original-width="2560" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5qsVmw7YIAuJN17XnKytPd3X1JfakAPgjufKHD6pe4nn8kv6aL1mUJA6boKQLuW-WKafgsI8A4BNPWJFJJwoXMJqINNdhhjAHEtBYEuRXw0y1dkicOTwxQgAG8WxcZsHPaWES8_4JaoAHpLGIxvGQbuTOCXdAeFXM6W7F_tTiVhUYlOyq-YenXzCfoR8/s16000/Figure-8.-Vanilla-Tempest-and-Fox-Tempest-attack-chain-scaled.webp" style="margin-left: auto; margin-right: auto;" title="Fox Tempest attack chain" /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Fox Tempest attack chain | Image- Microsoft&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Real-World Damage&lt;/h3&gt;&lt;p&gt;The downstream impact was severe. Ransomware groups, including Vanilla Tempest, Storm-0501, and Storm-2561, all used Fox Tempest-signed malware in active attacks. One documented chain involved Vanilla Tempest distributing a trojanized Microsoft Teams installer through paid Google Ads — victims who downloaded it got the Oyster backdoor and, in several cases, Rhysida ransomware.&lt;/p&gt;&lt;p&gt;Microsoft links Fox Tempest to proceeds in the millions, with victim organisations spanning healthcare, education, government, and financial services across the US, France, India, and China.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What You Should Do&lt;/h3&gt;&lt;p&gt;Microsoft recommends enabling cloud-delivered protection in Microsoft Defender, turning on Safe Links and Safe Attachments in Defender for Office 365, and activating attack surface reduction rules — specifically the advanced ransomware protection rule. Users should also be cautious when downloading software via search ads, even if the binary appears to be signed.&lt;/p&gt;&lt;p&gt;The takedown is significant, but the model Fox Tempest pioneered — malware-signing-as-a-service — is likely to be replicated. Security teams should treat code signatures as a trust signal, not a guarantee.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-5WmxRa0xiFNcP5CP1ZSze88SfarY4Ik68oNecLFRFgscgpp3bn5WQ-lbm0n5Wgzxo0WutpApdlbDedT0l9ofuNI6LbB9HCSiSwHTV9FvuGOL8-SiOebtyK7VhTP-FYzNdgGaJo5N-d1iwNTH9KqTnsiHeeDsv2hSgO2gFMasfijZgu7mOmjcM2MYcsw/s72-c/fox-Tempest.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Discord Calls Are Now End-to-End Encrypted — Even Discord Can't Listen In</title><link>https://www.cyberkendra.com/2026/05/discord-calls-are-now-end-to-end.html</link><category>Discord</category><category>Privacy</category><pubDate>Tue, 19 May 2026 08:34:19 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-8438075982447028630</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Call on Discord Is Now End-to-End Encrypted" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPqJI3ZnS4x5Wb-drXxQxewwDLbrnaqc32dpvHq2s-K6rXW4uOvlsiUPZLTfAMlKyU8aMLtcoKMXX7ITztxfDHreSapd6dMppb9jQg1GHdr3lhtWIt03KlaAzQ4BaQ2_qKXt6GmKm3Jg71t1O6jkUk1sobaE7G1hLvFGMkFvcAlIZdaGKQXifEHNVlJZo/s16000/discord-e2e-call.webp" title="Call on Discord Is Now End-to-End Encrypted" /&gt;&lt;/div&gt;&lt;p&gt;For years, Discord held the same uncomfortable position as every other major communication platform: it could technically access your voice and video calls if asked.&lt;br /&gt;Today, Discord has now completed the full rollout of end-to-end encryption (E2EE — where only the people in a call can decrypt it, not even the platform itself) across every voice and video call on the platform, no settings toggle required.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The change affects DMs, group DMs, server voice channels, and Go Live streams — essentially everything except Stage Channels, which are designed for large broadcast-style audiences where E2EE isn't architecturally suited.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What DAVE actually does under the hood&lt;/h3&gt;&lt;p&gt;The system is built on a custom protocol called DAVE — Discord's Audio and Video End-to-End Encryption — developed with input from cybersecurity firm Trail of Bits, using WebRTC encoded transforms and Message Layer Security (MLS) to protect calls even from Discord's own servers. In plain terms: each audio and video frame gets encrypted using a per-sender symmetric key that only the people on the call can access. External parties, including Discord, are never privy to the media encryption keys.&lt;/p&gt;&lt;p&gt;What makes DAVE technically remarkable isn't just what it does — it's where it has to do it. DAVE has been providing E2EE for tens of millions of calls on Discord every single day, spanning users simultaneously on laptops, phones, PlayStations, Xboxes, and web browsers in the same call. Getting a single encryption protocol to work seamlessly across that device diversity, without audible lag or call quality regressions, is genuinely non-trivial.&lt;/p&gt;&lt;p&gt;At one point, extending DAVE to Firefox exposed a browser-level bug that Discord couldn't simply work around. Rather than ship a patch or quietly drop Firefox support, the team went upstream — collaborated directly with Mozilla, identified the root cause in Firefox's codebase, and helped get a fix merged. That's a level of commitment to "doing it right" that most platform teams don't bother with.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;How to verify your call is actually encrypted&lt;/h3&gt;&lt;p&gt;On the desktop app, a green lock icon labeled "End-to-end encrypted" now appears in the Voice/Video Details panel, along with a new Privacy tab containing a Voice Privacy Code. That code can be compared out-of-band with other participants — on a different platform or in person — to confirm no one is being impersonated on the call. Privacy codes update whenever participants join or leave. It's an optional but meaningful layer for high-stakes conversations.&lt;/p&gt;&lt;p&gt;Each Go Live stream also has its own Stream Privacy Code accessible via the right-click context menu, letting streamers verify the encrypted state of their broadcast independently from the voice channel.&amp;nbsp;&lt;/p&gt;&lt;p&gt;This E2EE rollout landed in the middle of a period of significant trust turbulence for Discord. The platform simultaneously introduced "teen-by-default" settings globally, requiring age verification via face scan or government ID — a move that drew backlash, especially after a 2025 breach at Discord's third-party verification vendor exposed at least 70,000 government ID photos. Completing call encryption — where even Discord cannot listen in — is a direct response to exactly that kind of trust problem.&lt;/p&gt;&lt;p&gt;It's a notable split: Discord is simultaneously expanding what it can't access (your calls) while navigating controversy over what users are being asked to hand over (government IDs). Call encryption doesn't resolve that tension, but it does represent a structural, verifiable privacy guarantee that no policy document can replicate.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What's still not encrypted: text&lt;/h3&gt;&lt;p&gt;&lt;a href="https://discord.com/blog/every-voice-and-video-call-on-discord-is-now-end-to-end-encrypted" rel="nofollow" target="_blank"&gt;Discord has confirmed&lt;/a&gt; it has no current plans to extend E2EE to text messages. The reason is engineering scope, not reluctance: text-based features like message search, moderation, bots, and content filtering are all built on the assumption that messages are readable server-side.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Re-architecting that for E2EE would require rebuilding significant platform infrastructure. For now, if a conversation needs full end-to-end security — text and audio — Signal remains the better choice.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What this means for users&lt;/h3&gt;&lt;p&gt;If you're on a current version of the Discord app, your voice and video calls are now encrypted by default, with no action required on your part. Third-party applications and bots that connect to Discord voice must now implement DAVE support to continue functioning, which means some niche bots may have already broken or require updates from their developers. If a bot in your server abruptly dropped out of voice channels around March 2026, this is likely why.&lt;/p&gt;&lt;p&gt;The DAVE protocol is open-source, and the implementation has been publicly audited — which means the encryption claim isn't one you have to take on faith. That's rarer than it should be.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPqJI3ZnS4x5Wb-drXxQxewwDLbrnaqc32dpvHq2s-K6rXW4uOvlsiUPZLTfAMlKyU8aMLtcoKMXX7ITztxfDHreSapd6dMppb9jQg1GHdr3lhtWIt03KlaAzQ4BaQ2_qKXt6GmKm3Jg71t1O6jkUk1sobaE7G1hLvFGMkFvcAlIZdaGKQXifEHNVlJZo/s72-c/discord-e2e-call.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Storm-2949 Hackers Turned One Stolen Password Reset Into a Full Azure Cloud Takeover</title><link>https://www.cyberkendra.com/2026/05/storm-2949-hackers-turned-one-stolen.html</link><category>Microsoft</category><category>Security</category><pubDate>Tue, 19 May 2026 08:16:51 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-1788216183812945564</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="hackers exfiltrating data" border="0" data-original-height="4168" data-original-width="7295" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2RxByYrZ8-wOwTG6kIHSp0R00EV8WbTbvUM5EebtGB9bMZFL6e3z_mO33DbYu_Sh4eXAY7Zdn6EgnthSlZoBig8gDkAQV5GO7oN_hRLjopJVxsfIT4awyb2-LQhCdDl9iHJqKV1a1Xn-Q2fj0B1SR1Z8QfARaGkzCmpPqs5gKWGq48gqPWkuPGclxtpM/s16000/Storm-2949.webp" title="hackers exfiltrating data" /&gt;&lt;/div&gt;&lt;p&gt;A single helpdesk phone call was all it took.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Microsoft's Threat Intelligence team has &lt;a href="https://www.microsoft.com/en-us/security/blog/2026/05/18/storm-2949-turned-compromised-identity-into-cloud-wide-breach/" rel="nofollow" target="_blank"&gt;published&lt;/a&gt; a detailed breakdown of how a threat actor it tracks as Storm-2949 weaponized Microsoft's own Self-Service Password Reset (SSPR) feature — a routine IT tool — to trigger a sweeping breach across a victim organization's entire cloud environment, spanning Microsoft 365, Azure App Services, Key Vaults, SQL databases, and virtual machines.&lt;/p&gt;&lt;p&gt;The attack never used traditional malware. Instead, Storm-2949 impersonated IT support staff and called targeted employees, convincing them to approve what looked like routine multi-factor authentication (MFA) prompts.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Once victims clicked "Approve," the attacker hijacked the password reset flow, wiped the legitimate user's authentication methods, and enrolled their own device as the new trusted authenticator — effectively locking the real user out permanently.&lt;/p&gt;&lt;p&gt;Using those hijacked accounts — which held privileged Azure role-based access control (RBAC) permissions — the attackers quietly mapped the organization's tenant using automated Microsoft Graph API queries, then began draining OneDrive and SharePoint, targeting VPN configurations and remote access documentation.&lt;/p&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img alt="Storm-2949 attack diagram." border="0" data-original-height="693" data-original-width="836" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkxms8Ell_KUN6k6gZbNREnV-pnS58d9UaqJm1xNzomYgoP5WAcSnM3YA7pN7GxWaZILUJ_jOPOuOYHQcGrqYVYMn93rCgyEE1Jwksa9aQ1-SkEBN0fssE2y-Ct_JGjia3jyfAHhgrYViPA4t7IQxtid1Oi0UtR3euQo5VGoADz12mhvBLoPzF2fN80ng/s16000/image-79.webp" style="margin-left: auto; margin-right: auto;" title="Storm-2949 attack diagram." /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Storm-2949 attack diagram | Microsoft&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;That was just phase one.&lt;/p&gt;&lt;p&gt;According to Microsoft's Threat Intelligence, on the Azure side, Storm-2949 pivoted to App Service publishing profiles to harvest deployment credentials, then raided an Azure Key Vault in under four minutes, pulling database connection strings, identity credentials, and application secrets. Those secrets unlocked the crown jewel: the organization's primary production web application, whose password they changed to maintain control.&lt;/p&gt;&lt;p&gt;From there, they manipulated SQL firewall rules to extract database contents, abused Azure Storage account keys to exfiltrate blob data over multiple days using a custom Python script, and deployed ScreenConnect — a legitimate remote management tool — on virtual machines after disabling Microsoft Defender's real-time protection. Post-compromise activity included harvesting .pfx certificate files and scanning network shares for password strings.&lt;/p&gt;&lt;p&gt;The entire operation exploited legitimate administrative features rather than vulnerabilities, making detection significantly harder.&lt;/p&gt;&lt;p&gt;Microsoft's guidance is direct: enforce phishing-resistant MFA (hardware keys or certificate-based authentication) for all privileged accounts, restrict SSPR to pre-registered methods only, audit Azure RBAC assignments regularly, and deploy Defender for Cloud across Key Vault, Storage, and App Service workloads.&lt;/p&gt;&lt;p&gt;Three attacker-controlled IP addresses have been published as indicators of compromise: 176.123.4[.]44, 91.208.197[.]87, and 185.241.208[.]243 (the ScreenConnect C2 server).&lt;/p&gt;&lt;p&gt;The broader warning is hard to miss — in cloud environments, identity is the perimeter.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2RxByYrZ8-wOwTG6kIHSp0R00EV8WbTbvUM5EebtGB9bMZFL6e3z_mO33DbYu_Sh4eXAY7Zdn6EgnthSlZoBig8gDkAQV5GO7oN_hRLjopJVxsfIT4awyb2-LQhCdDl9iHJqKV1a1Xn-Q2fj0B1SR1Z8QfARaGkzCmpPqs5gKWGq48gqPWkuPGclxtpM/s72-c/Storm-2949.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>How I Deep Clean My Windows Junk Files with Advanced SystemCare 19</title><link>https://www.cyberkendra.com/2026/05/how-i-deep-clean-my-windows-junk-files.html</link><category>Tips</category><category>Windows</category><pubDate>Mon, 18 May 2026 21:45:10 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-7266849813245073962</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Delete Windows Junk Files" border="0" data-original-height="423" data-original-width="1269" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhplHDE_Z5yd-fl-fn7Y6Ae7ZIdLKzn6xHi9f56vA1z8ePSinv_BONXJczR-RNEZix3vW3LUrhbOBoNEM-fZju2WiViqfLEgECWIHO-hrj3dHfAJKZjZ-MEwstvlP27Yq0VEMsKOKQ2nTRTcyDW8qkJILGvxT1SqzHQXd0dUItjgCbN2DaLmEwuHThgN3o/s16000/windows-junk-files.webp" title="Delete Windows Junk Files" /&gt;&lt;/div&gt;&lt;p&gt;Over time, I noticed my Windows PC was becoming slower, especially after installing and testing many Windows apps. Even after uninstalling some apps, my storage space kept shrinking, and performance didn’t fully improve. That’s when I realized that Windows applications leave behind cache files, temporary files, logs, and other data that quietly accumulate over time.&lt;p&gt;&lt;/p&gt;&lt;p&gt;To solve this problem, I started using &lt;a href="https://www.iobit.com/en/advancedsystemcarefree.php?insur=enmd_cyberkendra_asc" target="_blank"&gt;Advanced SystemCare&lt;/a&gt; 19, a PC cleaner and Windows optimization tool that safely and automatically removes hidden junk files. After using it regularly, I found it much easier to clean up stored and hidden junk, free up storage space, and improve overall system responsiveness. In this tutorial, I’ll show you how I use Advanced SystemCare 19 to deep-clean Windows junk in just a few simple steps.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;Why I Started Cleaning My Windows Junk Files&lt;/h2&gt;&lt;p&gt;At first, I underestimated how much clutter Windows apps could create. Even though these apps are convenient, many continue generating unnecessary data in the background.&lt;/p&gt;&lt;p&gt;The most common junk files I found included temporary cache files, update leftovers, log files, outdated installation files, and uninstallation remnants. Over time, these files consumed a surprising amount of disk space and started affecting my PC’s startup speed and responsiveness.&lt;/p&gt;&lt;p&gt;After reading about the Junk File Clean feature in Advanced SystemCare 19, I decided to test it myself. The software claimed it could fully clean outdated data created by Windows programs, automatically improving system speed and freeing up storage space.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;My Step-by-Step Experience Cleaning Windows Programs' Junk Files&lt;/h2&gt;&lt;h3 style="text-align: left;"&gt;Step 1. Installing and Opening Advanced SystemCare 19&lt;/h3&gt;&lt;p&gt;First, I downloaded this &lt;a href="https://www.iobit.com/en/advancedsystemcarefree.php?insur=enmd_cyberkendra_asc" target="_blank"&gt;Windows cleane&lt;/a&gt;r from the official website and installed it on my Windows PC. After launching the software, I immediately noticed the dashboard offered two main cleaning modes: AI Mode and Manual Mode.&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" data-original-height="652" data-original-width="952" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYmK6Kl8z4pDcJaLUtv6uZ_0ap_Kwv7q84RWD1XxpvSZAcslDYzbBvuSDTx4OY2islEaxKLQZ3hMaTci4OkswBh4MrbAYhTQse5QXszy0jTI0wLWOqidrAMKjY7IllpFlwR3Gs3rQrty4wmmvp5x7ABIQSG3uJdTBsRCGVlbIW4nYeZSSp4Cot-YRAAeA/s16000/download%20(6).png" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;For deep cleaning Windows app junk files for the first time, I chose manual mode because it gives me more control over what gets scanned and cleaned. However, for regular maintenance, I usually use AI Mode because it automates everything intelligently. However.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Step 2. Using Junk File Clean in Manual Mode&lt;/h3&gt;&lt;p&gt;Inside Manual Mode, I found several optimization and cleanup modules. To focus on all Windows junk files, I enabled all the checkboxes, including the Privacy Sweep, for additional cleanup.&lt;/p&gt;&lt;p&gt;What impressed me most was that the professional Junk File Clean feature in version 19 could detect junk created by multiple Windows applications much more thoroughly than the default Windows cleanup tools.&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="cleanup tools" border="0" data-original-height="649" data-original-width="952" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2ISnEYq5sAFwyE-JkK7qqSjwH7K_HQU01SHf16jflVQpkA3SgHQRbUBwDwxFYVNnqc1bCD0bTcoMqCqrbEHwvncRiGIuZbZtew-ScOrtPiSmllKsgRKZT8zA5IcoBti5zv8KJ8KZh925WM9QYFN34ZcuxByMCSwd_Lq7NLOWnbrqPQQnhqpUMQooToEM/s16000/download%20(5).png" title="cleanup tools" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Step 3. Running the Scan&lt;/h3&gt;&lt;p&gt;Once the scan started, Advanced SystemCare analyzed my system for multiple types of clutter, including: temporary app cache, installation leftovers, invalid shortcuts, useless registry entries, privacy traces, and old Microsoft Store app data. The scanning process felt surprisingly fast, and I could see the amount of reclaimable disk space updating in real time.&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="disk space updating in real time" border="0" data-original-height="653" data-original-width="952" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNF7tCH1bu-ofCK2SoXz8JRJ-C8vG0VuOLfhqt0cc8-ZEl1ZUrzDSYyESIj8bolqZQATeZyh754rowyqkZLTeH1XUOZANtQnPuo8EFb2-vt9exKwDaGovZ3QXFiyYDHvGgU45RRNr_QC6si1i7R5ztriRydbMlDVIpor08GGqMdJuox_Q2ODrm6Cxw0X4/s16000/download%20(4).png" title="disk space updating in real time" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Step 4. Removing the Detected Junk Files&lt;/h3&gt;&lt;p&gt;After the scan finished, the software displayed a detailed cleanup report showing all detected junk files and leftover data. Before cleaning, I carefully reviewed the results, then clicked the Fix button. Advanced SystemCare safely removed cache files, temporary files, outdated Microsoft Store data, registry clutter, and privacy traces.&lt;/p&gt;&lt;p&gt;I appreciated that the software focused only on unnecessary files rather than deleting important system data. After the cleanup finished, I immediately noticed extra free storage space and smoother system performance.&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="smoother system performance" border="0" data-original-height="653" data-original-width="951" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbFn-MCldrNACnMukJtHqvyxY7AHzskGdnqXmsFuWY5_y6UK0Qlq8lGyYr3bVb5gOY71ACPC1P_KuMX5VsV01Qfto64hg6cK3CEAgRy19NhRVVG0QTMicwV6nFcOFywZZZjKhiYaiHaADmbHRausaFCFPOcdxfNyHB2-Vbw47LLEnLjr62W0p33MAA8UM/s16000/download%20(3).png" title="smoother system performance" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Step 5. The Cleanup Results I Noticed&lt;/h3&gt;&lt;p&gt;Once the process was completed, the confirmation screen summarized everything that had been cleaned. On my older system, the difference was noticeable almost immediately. Startup speed improved, and applications opened more smoothly.&lt;/p&gt;&lt;p&gt;The Summary screen also showed the total number of junk files removed, disk space reclaimed, problems fixed, and privacy and security improvements. For ongoing maintenance, I enabled AutoCare, which now performs cleanup automatically in the background.&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="cleanup automatically in the background" border="0" data-original-height="660" data-original-width="960" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixn95lZxG5nw_9CBwAVWMAGd8_YEnjItIiGw0H2BC3hXos5fn5-4KGwEa_pO_VZIFouYF6X4xSdO3-APUqDO3tMXE4MJ43sMgwZ623Togao8aTXyOPk-B4sxhgCTSwS39lPvN8InX6qAF1GDxldcROd7ySsf397XNhxgdmq-gh_pnk6dYkVr1JxO5GxeA/s16000/download%20(2).png" title="cleanup automatically in the background" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Why Advanced SystemCare 19 Stood Out for Me&lt;/h3&gt;&lt;p&gt;Although I originally turned to Advanced SystemCare 19 mainly to remove persistent Windows apps' junk files, I quickly realized that the software offers far more than a PC cleaner, particularly for performance and speed optimization.&amp;nbsp;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Windows apps' junk files" border="0" data-original-height="651" data-original-width="951" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuDSBTae0SDwpVRJ8EBlHdg7MsVyYrV_AQTAFfL0PXm2rhejlhA0yyxDDr3ctbzugt2oZlVPLdxGRg5AMf83bzKplSWxHH-UYap79KD4GXS7rfWoZSimwZMva2FKuuJaOqkW62Np03kIfmnBG4xqVmUxW-FdetRuVU6RUBHta4_FL5Ld9FDaf7rx4YA00/s16000/download%20(1).png" title="Windows apps' junk files" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The Startup Optimizer became an immediate asset, significantly reducing my boot times by disabling unnecessary startup programs that typically drag down system responsiveness. When I needed to push my hardware further during intensive gaming sessions or heavy multitasking, Turbo Boost proved invaluable by temporarily pausing non-essential background processes to channel raw power where it mattered most.&amp;nbsp;&lt;/p&gt;&lt;p&gt;To cap it off, the Internet Booster delivered a highly noticeable upgrade to my daily workflow, accelerating web browsing and improving download speeds by optimizing my browser settings.&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="accelerating web browsing" border="0" data-original-height="653" data-original-width="952" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvV0n-0VUZeSeNVuEx8wgAEMiQzlXJqD9e8TP4n3hcv3CarDJAmlc3CniwKppr253qkqrs2K8Kvzs2Fc74byMZR-GdfvYwx-n65HMrdts1SpVTayo7GQt_mHfwOgV2p-QvIDs6SoCoPNKbDH948Vh0M2RNieccU5F71z46_r3HoNOR0e4sgwiRa4q8Isc/s16000/download.png" title="accelerating web browsing" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Beyond sheer speed, Advanced SystemCare 19 stood out for its robust, intuitive suite of privacy and security features. The Privacy Shield acted as a secure barrier, safeguarding my sensitive files and personal data from unauthorized third-party access, while the automated Anti-Spyware Protection continuously worked in the background to root out hidden spyware and adware threats.&amp;nbsp;&lt;/p&gt;&lt;p&gt;My everyday online experience felt much cleaner and safer thanks to Browser Protection, which actively blocked intrusive ads, prevented frustrating homepage hijacking, and cleared away tracking traces.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Final Thoughts&lt;/h3&gt;&lt;p&gt;Before using Advanced SystemCare 19, I didn’t realize how much hidden junk Windows programs were leaving behind on my system. Manually searching for cache folders and leftover files felt frustrating and incomplete.&lt;/p&gt;&lt;p&gt;After switching to Advanced SystemCare 19, cleaning junk files became much easier, faster, and safer. The software helped me recover storage space, improve system responsiveness, and reduce unnecessary clutter without requiring advanced technical skills. What I personally liked most was the combination of automatic cleanup, intelligent scanning, privacy protection, and performance optimization all in one place.&lt;/p&gt;&lt;p&gt;If your PC feels slower over time or your storage space keeps disappearing unexpectedly, Windows junk files could be a hidden cause. From my experience, regular deep cleaning with Advanced SystemCare 19 can make a noticeable difference in keeping Windows fast, clean, and responsive.&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhplHDE_Z5yd-fl-fn7Y6Ae7ZIdLKzn6xHi9f56vA1z8ePSinv_BONXJczR-RNEZix3vW3LUrhbOBoNEM-fZju2WiViqfLEgECWIHO-hrj3dHfAJKZjZ-MEwstvlP27Yq0VEMsKOKQ2nTRTcyDW8qkJILGvxT1SqzHQXd0dUItjgCbN2DaLmEwuHThgN3o/s72-c/windows-junk-files.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>The Rise of Autonomous Cyber Attacks: Risks, Examples &amp; Defense</title><link>https://www.cyberkendra.com/2026/04/rise-of-autonomous-cyber-attacks.html</link><category>AI</category><category>Cyber Attack</category><category>Learn</category><pubDate>Sat, 25 Apr 2026 08:18:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-4325736887089120597</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Autonomous Cyber Attacks" border="0" data-original-height="2025" data-original-width="3600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiClDRVQdE83Z0yl4GJ5bcboSv6By5gwvuaXgk5ZqAUgikis3giqwWekHk4_tGIioYNg91Q84RTuwe14tQ5YF7lQ-jOnCTAVDLWFANRxa8agW1za-klrjF1BvuF5cfVO-FwuwUl2voSFSRemL_B9Anf3IbEIGAsZJ0cSu-pNd0EQrJZAiknoOhQ-k9zEx0/s16000/AI-cyber-attacks.webp" title="Autonomous Cyber Attacks" /&gt;&lt;/div&gt;&lt;p&gt;Last month, a mid-size financial services company ran a routine penetration test. The testers used an AI-assisted reconnaissance tool to map the network. Within 40 minutes, the tool had identified exposed services, correlated employee names with LinkedIn data, generated targeted phishing lures, and flagged three likely paths to domain admin.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The internal security team, working with traditional alert queues and weekly review cycles, would not have caught any of it in time.&lt;/p&gt;&lt;p&gt;That was a controlled test. The real attackers are running the same playbook, but they do not stop when the clock runs out.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Key Takeaways:&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Autonomous attacks operate at machine speed with no human in the loop&lt;/li&gt;&lt;li&gt;AI enables adaptive exploitation that bypasses static defenses&lt;/li&gt;&lt;li&gt;Traditional SOC workflows were not built for millisecond threat cycles&lt;/li&gt;&lt;li&gt;Defending autonomously is no longer optional; it is the only practical response&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;What Are Autonomous Cyber Attacks?&lt;/h2&gt;&lt;p&gt;Autonomous cyber attacks are &lt;a href="https://www.cyberkendra.com/2026/04/ai-powered-github-bot-quietly-targeted.html" target="_blank"&gt;AI-powered operations&lt;/a&gt; that independently plan, execute, and adapt intrusions without requiring a human operator to guide each step. Unlike traditional attacks, where a person types commands and reacts to output, these systems make decisions dynamically, shift tactics when they encounter resistance, and propagate across environments faster than most security tools can generate an alert.&lt;/p&gt;&lt;p&gt;Three characteristics define them:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;b&gt;Self-learning:&lt;/b&gt; The attack refines its approach based on what succeeds. If a port scan triggers a firewall rule, the system notes that and tries a different vector.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Decision-making capability: &lt;/b&gt;The system evaluates multiple exploitation paths and selects the most promising one without waiting for a human to weigh in.&lt;/li&gt;&lt;li&gt;&lt;b&gt;End-to-end automation:&lt;/b&gt; Reconnaissance, initial access, lateral movement, and exfiltration can all be chained together with no human touchpoints.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This is not theoretical. The tooling exists today, and significant portions of it are openly available.&lt;/p&gt;&lt;p&gt;The Autonomous Cyber Attacks are rising in 2026 due to the easy accessibility of AI tools and Large language models. Today, a moderately skilled operator can assemble one from open-source components, AI APIs, and leaked offensive toolkits in an afternoon&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;Real-World Examples of Some Autonomous Cyber Attacks&lt;/h2&gt;&lt;p&gt;Attribution in this space is difficult, and public disclosure is rare. But several documented cases give a clear picture of where things stand.&lt;/p&gt;&lt;p&gt;&lt;b&gt;The GT-1002 Campaign: &lt;/b&gt;Security researchers tracking this campaign documented a &lt;a href="https://www.cyberkendra.com/2025/11/hackers-weaponise-openais-api-to-build.html" target="_blank"&gt;threat actor using automated tooling&lt;/a&gt; to conduct reconnaissance, credential stuffing, and lateral movement across hundreds of enterprise targets. What stood out was the operational pace. Actions that would normally indicate a human operator working over days were compressed into hours. The infrastructure rotated automatically, and the attack pivoted when individual vectors were blocked, without any apparent manual intervention.&lt;/p&gt;&lt;p&gt;&lt;b&gt;AI-Assisted Espionage: &lt;/b&gt;Anthropic's own &lt;a href="https://www.cyberkendra.com/2025/11/anthropic-exposes-first-ai-powered.html" target="_blank"&gt;research has documented adversarial attempts to use AI&lt;/a&gt; systems to assist in cyber operations. In documented cases, AI platforms were queried to assist with reconnaissance, writing attack scripts, and identifying security control gaps. The significance is not that AI was the attack itself, but that it dramatically accelerated the pre-attack research phase.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Hexstrike-AI Framework: &lt;/b&gt;Circulated within offensive security communities, this framework demonstrated an end-to-end automated attack chain: from public internet reconnaissance to internal network pivot, using AI to select and sequence attack techniques based on real-time feedback from the target environment. Regardless of who ultimately uses tooling like this, its existence demonstrates that fully automated, adaptive attack chains are technically feasible today.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;How to Defend Against Autonomous Cyber Attacks&lt;/h3&gt;&lt;p&gt;The reflexive answer is "&lt;b&gt;use AI for defense too.&lt;/b&gt;" That is partially right, but it obscures what actually needs to change operationally.&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="AI Cyber Attacks" border="0" data-original-height="1688" data-original-width="3000" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiW2yB_SZFxQ3qM_65yogOu81_bO_vZX7X3D9kKV8LZAhX5gDBYAbq2KQuMAc80uI3OvTo8jJE3dOwbY2zzKAC-x2MCaeGzkvYnu-O8UHBfkHhwU_H49gqGaXGUfb9fmE_Oz-Tk84FUHkSaCe5BLloKJprz0pNlk8b1jmhXfQ3O5kW2wHxeuo6HhwLKo7g/s16000/ai%20Cyber%20Attacks.webp" title="AI Cyber Attacks" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;AI-Native Security Architecture&lt;/h4&gt;&lt;p&gt;The core problem with traditional security stacks is that they were built around human review cycles. An alert is generated, queued, triaged, and escalated. That workflow made sense when attacks moved at human speed. It does not work when an attacker can complete initial access and lateral movement before the first alert is acknowledged.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Real-time detection&lt;/b&gt; means analyzing behavior at the point of occurrence, not after log aggregation. Network detection systems, endpoint telemetry, and identity activity monitoring need to feed into decision systems that can act within seconds, not minutes.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Automated response&lt;/b&gt; is the logical extension. Isolating a compromised endpoint, revoking a suspicious session token, and blocking an anomalous outbound connection: these actions cannot wait for a security analyst to approve them when the attacker is already moving laterally.&lt;/p&gt;&lt;p&gt;The pushback from operations teams is predictable. Automated response blocks legitimate users sometimes. That is a real cost. But the alternative is accepting that human review timelines are incompatible with the threat environment.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Zero Trust and Identity Security&lt;/h4&gt;&lt;p&gt;Most security architectures still have a soft interior. Once an attacker has a valid credential and is inside the network perimeter, movement is surprisingly easy. Implicit trust based on network location is the foundational assumption that most attack chains depend on.&lt;/p&gt;&lt;p&gt;Continuous verification changes that calculus. Every access request, every API call, every privileged operation is evaluated against the current context: device health, user behavior patterns, time of day, geographic anomalies. A credential used from an unusual location at an unusual time does not automatically succeed.&lt;/p&gt;&lt;p&gt;Least privilege access removes the value of compromised credentials. If a developer's account can only access the specific resources their current work requires, a stolen credential is far less useful to an attacker. Operationalizing this requires more than a policy document; it requires an &lt;a href="https://www.miniorange.com/iam/" target="_blank"&gt;identity and access management solution for Zero Trust&lt;/a&gt; that enforces continuous verification, scopes permissions dynamically, and reduces or eliminates standing access across the environment.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Continuous Monitoring and Behavioral Analytics&lt;/h4&gt;&lt;p&gt;AI-powered attacks do not behave like human attackers in terms of pattern and timing. They often move faster, access more resources in sequence, and operate at times that fall outside normal working hours. Behavioral analytics systems that baseline normal activity can flag these anomalies even when each individual action looks legitimate in isolation.&lt;/p&gt;&lt;p&gt;A single failed authentication is noise. Fifty sequential failed authentications across different accounts from the same IP range, at 3 AM, followed by one success, is a pattern. Systems that detect and respond to the pattern, rather than the individual event, are significantly harder to bypass.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Securing AI Systems&lt;/h4&gt;&lt;p&gt;Security teams increasingly need to defend their own AI deployments. Large language models used in internal tooling can be targeted through prompt injection, where malicious input manipulates the model into performing unintended actions or disclosing sensitive information.&lt;/p&gt;&lt;p&gt;The OWASP Top 10 for LLM Applications provides a starting framework. Key concerns include prompt injection, training data poisoning, and over-reliance on AI outputs without human validation. Organizations deploying AI-assisted security tools need to treat those tools as part of the attack surface, not just part of the defense.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Role of Identity and Access Management in Defense&lt;/h3&gt;&lt;p&gt;Autonomous attacks are effective in large part because they exploit legitimate credentials and access paths. The attacker does not break in through the window; they walk through the front door with keys they found or stole.&lt;/p&gt;&lt;p&gt;Identity and Access Management (IAM) and Privileged Access Management (PAM) address this directly by:&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;MFA and Adaptive Authentication&lt;/h4&gt;&lt;p&gt;Automated credential stuffing attacks test millions of username-password combinations against login portals. Standard MFA blocks the vast majority of these because the attacker has the password but not the second factor. Adaptive MFA goes further: it evaluates context at each login attempt, flagging anomalies in location, device fingerprint, or behavioral patterns and stepping up verification requirements accordingly.&amp;nbsp;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Identity Lifecycle Management (Provisioning and Deprovisioning)&lt;/h4&gt;&lt;p&gt;Orphaned accounts are one of the most consistently exploited entry points in enterprise environments. An employee leaves, their Active Directory account persists, and six months later, an autonomous scanner finds it during credential stuffing. Automated provisioning and deprovisioning closes this loop: access is removed when roles change or employment ends, not when someone remembers to file a ticket.&amp;nbsp;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Role-Based Access Control&lt;/h4&gt;&lt;p&gt;Role-based access control makes the users hold only the minimum permissions their work requires; a compromised credential gives the attacker a narrow foothold rather than broad infrastructure access. AI malware that hijacks a user session inherits that session's permissions. Keeping those permissions tightly scoped limits how far the attack can propagate.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Single Sign-On (SSO)&lt;/h4&gt;&lt;p&gt;SSO centralizes authentication through a single control point, which means anomalous activity is easier to detect and correlate. A credential being used to authenticate against fifteen different applications in four minutes is obvious in a centralized SSO log. That same activity spread across fifteen separate authentication systems may never surface as a coherent signal&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Just-in-Time Privileged Access&amp;nbsp;&lt;/h4&gt;&lt;p&gt;Standing administrative privileges are a permanent target. Just-in-time access management makes sure privileges are granted for a specific task, for a limited window, and revoked automatically when the window closes.&amp;nbsp;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Session Monitoring and Recording&amp;nbsp;&lt;/h4&gt;&lt;p&gt;Even legitimate admin access can be abused, whether by a compromised account or a malicious insider. &lt;a href="https://www.miniorange.com/pam/privileged-session-management" target="_blank"&gt;Privileged session management&lt;/a&gt; records privileged sessions to create an auditable trail of exactly which commands were run, which files were accessed, and which systems were touched. It also creates a detection surface: behavioral analytics applied to session recordings can flag automated command sequences that look nothing like human interaction.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Credential Vaulting and Rotation&amp;nbsp;&lt;/h4&gt;&lt;p&gt;Static credentials are a gift to autonomous attackers. A password that never changes, once exfiltrated, remains valid indefinitely. Credential vaulting stores secrets in an encrypted, access-controlled store rather than in config files or developer laptops. Automated rotation changes those passwords on a regular schedule, meaning stolen credentials have a limited validity window. AI bots built around credential reuse find that the credentials they collected last month no longer work.&lt;/p&gt;&lt;p&gt;Solutions like miniOrange's IAM and PAM platform consolidate these controls: credential vaulting, just-in-time access provisioning, privileged session monitoring, and machine identity management in a single operational framework. The practical value is not just in having the controls, but in having them integrated so that signals from one layer inform decisions in another.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Future Outlook: AI vs. AI Cybersecurity&lt;/h3&gt;&lt;p&gt;The trajectory is clear. Offensive AI capabilities will continue to improve. Defensive AI capabilities will need to match that pace. The intermediate period, where attackers have sophisticated AI tooling and defenders are still running largely manual SOC operations, is the most dangerous window.&lt;/p&gt;&lt;p&gt;&lt;b&gt;AI vs. AI warfare &lt;/b&gt;is already a meaningful framing. Autonomous attack systems probing for weaknesses, automated defense systems detecting and responding, and the outcome determined by which side has better models, better data, and faster feedback loops.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Predictive threat intelligence&lt;/b&gt; is an emerging defensive capability. Rather than detecting attacks that are already in progress, systems trained on attack patterns can identify the precursors: scanning activity, credential testing and staging infrastructure registration. Acting before the attack chain reaches exploitation is significantly more effective than responding during lateral movement.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Autonomous SOCs&lt;/b&gt; are a real near-term development. Not replacing human analysts, but automating the high-volume, time-sensitive work: alert triage, initial investigation, containment actions. Human analysts focus on judgment calls and strategic decisions while automated systems handle the operational tempo.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Regulatory frameworks&lt;/b&gt; are developing in parallel. NIST's AI Risk Management Framework provides structured guidance for managing AI-related risk, including the risks of AI-powered adversaries. Compliance frameworks are likely to evolve to explicitly address autonomous threat scenarios.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Are We Ready? A Final Assessment&lt;/h3&gt;&lt;p&gt;Most organizations are not. That is not a criticism; it is an accurate description of where the industry stands.&lt;/p&gt;&lt;p&gt;Security programs built over the past decade were designed for a threat environment where attackers moved at human speed. The tooling, processes, and staffing models reflect that assumption. The threat environment has changed faster than most organizations have adapted.&lt;/p&gt;&lt;p&gt;But the gap is closeable. The starting point is honest assessment.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Organizational Readiness Checklist:&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Can your SOC detect and respond to a threat within minutes, not hours?&lt;/li&gt;&lt;li&gt;Are privileged access permissions reviewed and right-sized quarterly?&lt;/li&gt;&lt;li&gt;Do you have behavioral analytics capable of detecting anomalous patterns, not just known signatures?&lt;/li&gt;&lt;li&gt;Are machine identities (service accounts, API keys) inventoried and monitored?&lt;/li&gt;&lt;li&gt;Is MFA enforced with session-level controls, not just at login?&lt;/li&gt;&lt;li&gt;Do you have automated response capabilities for common threat scenarios?&lt;/li&gt;&lt;li&gt;Are AI tools in your environment treated as part of the attack surface?&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Maturity Levels:&lt;/p&gt;

&lt;div class="table noWrap w100"&gt;
  &lt;table border="1" cellpadding="8" cellspacing="0"&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Level&lt;/th&gt;
      &lt;th&gt;Characteristics&lt;/th&gt;
    &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;Reactive&lt;/td&gt;
      &lt;td&gt;Alert-based, human review and incident response after compromise&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;Preventive&lt;/td&gt;
      &lt;td&gt;MFA, patching, basic monitoring, policy enforcement&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;Detective&lt;/td&gt;
      &lt;td&gt;Behavioral analytics, threat hunting, anomaly detection&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;Adaptive&lt;/td&gt;
      &lt;td&gt;AI-assisted detection, automated response, continuous verification&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;Autonomous&lt;/td&gt;
      &lt;td&gt;AI-native defense, predictive intelligence, real-time autonomous response&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;&lt;p&gt;Most enterprise organizations sit between Preventive and Detective. The threat environment requires at least Adaptive.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Immediate Next Steps:&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style="text-align: left;"&gt;&lt;li&gt;Audit all privileged accounts and remove standing administrative access where not operationally necessary&lt;/li&gt;&lt;li&gt;Implement behavioral analytics on identity and privileged activity, not just network traffic&lt;/li&gt;&lt;li&gt;Introduce just-in-time access for high-risk systems, reducing the value of stolen credentials&lt;/li&gt;&lt;li&gt;Inventory and rotate machine identity credentials on a scheduled basis&lt;/li&gt;&lt;li&gt;Test your automated detection and response capabilities against a realistic autonomous attack simulation&lt;/li&gt;&lt;li&gt;Evaluate your AI systems for exposure to prompt injection and model manipulation&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;If the goal is to enforce controls like session monitoring, just-in-time access, behavioral analytics, and centralized privileged activity auditing without building each capability independently, platforms like miniOrange PAM can centralize these capabilities across hybrid and cloud environments without disrupting existing developer and operations workflows.&lt;/p&gt;&lt;p&gt;The attackers have already automated. The only viable response is to automate the defense.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Frequently Asked Questions:&amp;nbsp;&lt;/h3&gt;&lt;p&gt;&lt;b&gt;Q. What are autonomous cyber attacks?&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A. &lt;/b&gt;AI-driven attacks that independently plan, execute, and adapt cyber intrusions without human involvement. They use machine learning and automation to select targets, identify vulnerabilities, and move through environments faster than human defenders can respond.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q. What is an AI cyber attack?&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A.&amp;nbsp;&lt;/b&gt;A cyber attack that uses artificial intelligence to automate decision-making, targeting, and execution. This includes AI-generated phishing content, automated exploitation, and self-adapting malware that evades detection.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q. What are the top types of autonomous cyber attacks?&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A.&amp;nbsp;&lt;/b&gt;AI-powered phishing and deepfakes, self-adapting malware, autonomous botnets, and AI-based vulnerability discovery are the primary categories currently observed in enterprise environments.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q. Why are autonomous attacks particularly dangerous?&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A.&amp;nbsp;&lt;/b&gt;They operate at machine speed, adapt in real time when defenses block initial approaches, and can run the same campaign against thousands of targets simultaneously. Traditional security workflows built around human review cycles are poorly matched to this tempo.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q. How can organizations defend against AI cyber threats?&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;A.&amp;nbsp;&lt;/b&gt;Through AI-native detection and automated response, Zero Trust security with continuous verification, behavioral analytics that detect anomalous patterns rather than known signatures, and identity governance that limits the value of compromised credentials.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiClDRVQdE83Z0yl4GJ5bcboSv6By5gwvuaXgk5ZqAUgikis3giqwWekHk4_tGIioYNg91Q84RTuwe14tQ5YF7lQ-jOnCTAVDLWFANRxa8agW1za-klrjF1BvuF5cfVO-FwuwUl2voSFSRemL_B9Anf3IbEIGAsZJ0cSu-pNd0EQrJZAiknoOhQ-k9zEx0/s72-c/AI-cyber-attacks.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Grafana Labs Refuses Ransom After GitHub CI Flaw Exposed Its Source Code</title><link>https://www.cyberkendra.com/2026/05/grafana-labs-refuses-ransom-after.html</link><category>Data Breached</category><category>Security</category><pubDate>Sun, 17 May 2026 19:41:35 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-3373609206036922183</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Grafana Hacked" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB-HpWqGFCdtetjp_1FbGBCv6dtRHDi4sgcxDzs1LQZVx-W-MoNgGztEUkI4tZ9vaix_RsQQ2rwd-RpkuAFmqmVgAmM-W5_NQtd4qYNYwZeQuUDLQBuCB-hnf5_Oh5JtQhOwrM2nGGlbhTiFw-36zEy4GnJCpyWP2-lEBNsRp0bXjwAl_T65AKe4Hl7Mw/s16000/Grafana-hacked.webp" title="Grafana Hacked" /&gt;&lt;/div&gt;&lt;p&gt;Grafana Labs publicly confirmed this week that attackers stole a GitHub access token through a misconfigured CI/CD pipeline, downloaded private source code repositories, then attempted to extort the company — and walked away empty-handed.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The breach, announced via a &lt;a href="https://x.com/grafana/status/2055827123236171827" rel="nofollow" target="_blank"&gt;six-tweet thread on X&lt;/a&gt;, traces back to a subtle but well-known class of GitHub Actions vulnerability called a "&lt;b&gt;Pwn Request.&lt;/b&gt;" A recently enabled GitHub Action workflow configured to trigger on pull_request_target events inadvertently granted external contributors — anyone who could open a pull request — access to production secrets during CI runs.&lt;/p&gt;&lt;p&gt;The attacker's method was methodical. By forking a Grafana repository, injecting malicious code via a curl command, and dumping environment variables to a file encrypted with a private key, the threat actor extracted privileged tokens, then deleted their fork to cover their tracks before leveraging the stolen credentials against four additional private repositories.&lt;/p&gt;&lt;p&gt;What stopped the attacker from going completely undetected? Their own curiosity. One of the thousands of canary tokens — invisible tripwires Grafana embeds across its code and infrastructure — was triggered, immediately alerting the global security team. Canary tokens are decoy credentials designed to fire an alert the moment they're used, exposing access that would otherwise go unnoticed.&lt;/p&gt;&lt;p&gt;Grafana's investigation found no evidence of code modifications, unauthorized access to production systems, or exposure of customer data. The company revoked all compromised tokens, disabled the vulnerable workflows, and ran a full credential audit using tools including Trufflehog and Gato-X.&amp;nbsp;&lt;/p&gt;&lt;p&gt;That didn't stop the attacker from trying their luck. After downloading the private codebase, they escalated to extortion — demanding payment in exchange for not releasing the stolen code. Grafana refused. The company cited FBI guidance, noting that paying ransoms offers no data-recovery guarantee and only incentivizes more attacks.&lt;/p&gt;&lt;p&gt;Reports from &lt;a href="https://x.com/H4ckmanac/status/2055380899840078266" rel="nofollow" target="_blank"&gt;Hackmanac&lt;/a&gt; and Ransomware.live attribute the attack to CoinbaseCartel, a data extortion crew that emerged in September 2025 and is assessed to be an offshoot of the ShinyHunters, Scattered Spider, and LAPSUS$ ecosystems. Unlike traditional ransomware groups, CoinbaseCartel focuses exclusively on data theft and extortion, and has already claimed over 170 victims across healthcare, technology, transportation, and manufacturing.&lt;/p&gt;&lt;p&gt;The incident lands as part of a troubling pattern. It follows Instructure's controversial decision to settle with ShinyHunters after the group threatened to leak terabytes of data from thousands of U.S. schools. Grafana's refusal to pay sets a different precedent — one that the FBI has long advocated for.&lt;/p&gt;&lt;p&gt;For developers and security teams, the Grafana incident is a practical reminder: audit any GitHub Actions workflow using pull_request_target triggers in public repositories, restrict CI secrets to least-privilege scopes, and deploy canary tokens across sensitive codebases.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The tripwire is what saved Grafana from a far longer dwell time — threat intelligence from Mandiant suggests the average gap between credential theft and active exploitation is 11 days. Grafana caught it before that clock ran out.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB-HpWqGFCdtetjp_1FbGBCv6dtRHDi4sgcxDzs1LQZVx-W-MoNgGztEUkI4tZ9vaix_RsQQ2rwd-RpkuAFmqmVgAmM-W5_NQtd4qYNYwZeQuUDLQBuCB-hnf5_Oh5JtQhOwrM2nGGlbhTiFw-36zEy4GnJCpyWP2-lEBNsRp0bXjwAl_T65AKe4Hl7Mw/s72-c/Grafana-hacked.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Google's AI Search Guide Is Out — Explained Without the Hype</title><link>https://www.cyberkendra.com/2026/05/googles-ai-search-guide-is-out.html</link><category>Google</category><category>SEO</category><pubDate>Sat, 16 May 2026 09:23:46 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-8965274265211849811</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Guidance on Generative AI Content on Your Website" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLOBY84qOnOvVT93KIB5bopZp0FYtcG0onmIK81xQIxs39VOi5QrbYQXU-isH3t6M3kAiQRh0VWiGxCytMkqaBhNPgKscCaDmMdG407nPHu7BB47CyAT_O7_mupHNLmlBCLyIb7bWfc1UdxyqCKXkJ5oYEbsI-fLfN7Hu75CRxvSpn0DilKp7td2DJkPM/s16000/google-ai-content-guide.webp" title="Guidance on Generative AI Content on Your Website" /&gt;&lt;/div&gt;&lt;p&gt;If you've been following the chatter around "Generative Engine Optimization" or "Answer Engine Optimization," you've probably seen a flood of advice about llms.txt files, content chunking, AI-friendly schema, and prompt-style writing. Most of it is noise. Google's own documentation — updated in 2025 — cuts through cleanly, and the core message is both simpler and more demanding than the SEO industry tends to admit.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This article breaks down what Google actually says, explains what it means in practice, and highlights the parts most publishers miss entirely.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;First, Understand What's Actually Powering AI Overviews&lt;/h2&gt;&lt;p&gt;Before diving into optimization tactics, it helps to understand the engine underneath. Google's AI Overviews and the newer AI Mode aren't magic boxes that independently read the entire web. They work through two primary techniques:&lt;/p&gt;&lt;p&gt;&lt;b&gt;Retrieval-Augmented Generation (RAG): &lt;/b&gt;The AI doesn't generate answers from memory alone. It queries Google's core Search index — the same one used for blue-link results — fetches relevant pages, reads them, and generates a response grounded in that retrieved content. The clickable source links you see in AI Overviews are the pages that were actually retrieved.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Query fan-out:&lt;/b&gt; When someone searches for something complex, the AI doesn't just process the literal query. It generates multiple related sub-queries simultaneously. A search like "how to recover from a Google core update" might fan out into "signs your site was hit by a Google core update," "content quality signals Google uses," and "how long do core update recoveries take." Each fan-out query pulls its own results.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Why this matters:&lt;/b&gt; It means there's no separate "AI index" to get into. If your page ranks well in organic search and is crawlable with a snippet, it's already eligible for AI Overviews. You're not optimizing for a different system — you're optimizing for the same Search infrastructure you already know.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Real Divide: Commodity vs. Non-Commodity Content&lt;/h3&gt;&lt;p&gt;This is the single most important concept in Google's guidance, and it's the one most often glossed over.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Commodity content &lt;/b&gt;is information that could originate from anyone. "10 cybersecurity tips for small businesses." "What is phishing?" "How to create a strong password." These topics have been covered thousands of times, the information is widely known, and a generative AI model could produce them without consulting your site at all. If your content falls into this category, AI systems have no particular reason to cite you — they can simply generate the answer themselves.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Non-commodity content &lt;/b&gt;has something commodity content lacks: a reason to exist that's specific to you. A security researcher's first-hand analysis of a zero-day they discovered. A breakdown of an incident your team responded to. A documented test comparing five password managers using criteria you defined. A breach post-mortem with root cause analysis that only the affected organization could provide.&lt;/p&gt;&lt;p&gt;The difference isn't just about depth. It's about whether your content contains information that exists only because you produced it. First-hand experience, original research, proprietary data, expert analysis of primary sources — these are signals that your content adds something to the web rather than duplicating what's already there.&lt;/p&gt;&lt;p&gt;Consider the example Google itself provides: "7 Tips for First-Time Homebuyers" (commodity) vs. "Why We Waived the Inspection &amp;amp; Saved Money: A Look Inside the Sewer Line" (non-commodity). The second piece has a perspective that can't be replicated — the author was there, made a specific decision, and is reporting the outcome. AI can't fabricate that. It can only cite it.&lt;/p&gt;&lt;p&gt;For cybersecurity publishers specifically, a news article that simply rewrites a vendor advisory is a commodity. A piece that adds timeline analysis, compares the vulnerability to a prior incident, reaches out to affected parties for comment, or provides reproduction steps from independent testing — that's non-commodity.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What AEO and GEO Actually Mean (And Why Google Disagrees With the Industry)&lt;/h3&gt;&lt;p&gt;The SEO industry has spawned two new acronyms to describe optimization for AI systems: &lt;b&gt;AEO &lt;/b&gt;(Answer Engine Optimization) and &lt;b&gt;GEO &lt;/b&gt;(Generative Engine Optimization). Consultants have built entire service lines around these terms.&lt;/p&gt;&lt;p&gt;Google's official position: these are just SEO. The same signals. The same systems.&lt;/p&gt;&lt;p&gt;This is more significant than it sounds. It means Google is explicitly pushing back on the idea that you need a separate strategy for AI search. The implication is that anyone selling you an "AEO audit" distinct from a standard SEO audit is selling you something Google doesn't recognize as real.&lt;/p&gt;&lt;p&gt;That said, there's a practical nuance worth noting: while the underlying signals are the same, the emphasis shifts when AI is synthesizing answers. Traditional SEO rewards pages that match query intent and have authority signals. AI Overviews also reward pages that are &lt;b&gt;citable &lt;/b&gt;— meaning their content is structured clearly enough that the AI can extract a specific claim, quote an explanation, or attribute a data point. A page can rank well in organic search but never appear in an AI Overview if its content isn't written in a way that's easy to reference directly.&lt;/p&gt;&lt;p&gt;The distinction isn't about a different algorithm. It's about readability and extractability — which are good writing practices anyway.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Myth-Busting Section: Things You're Wasting Time On&lt;/h3&gt;&lt;p&gt;Google's documentation explicitly names several practices circulating in the industry as unnecessary or ineffective for Google Search. Here's the list with added context on why each one falls short:&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;llms.txt files&lt;/h4&gt;&lt;p&gt;This format, borrowed from robots.txt conventions, was proposed as a way to give AI systems a structured summary of your site. Google says directly: " You don't need this. Google can crawl and index many file types, but no special file type gets you preferential treatment in AI systems. For non-Google AI crawlers (like those from Anthropic, OpenAI, or Perplexity), llms.txt may eventually matter — but for Google, it's currently irrelevant.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;"Chunking" content&lt;/h4&gt;&lt;p&gt;Some advice tells you to break pages into small, discrete answer blocks so AI can extract them more easily. Google explicitly says this isn't required. Their systems can understand which part of a longer page is relevant to a query. Write for your readers. If shorter pages make sense for your topic and audience, great. If a 3,000-word technical deep-dive serves your readers better, that's fine too.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Rewriting content in "AI-friendly" language&lt;/h4&gt;&lt;p&gt;You don't need to adopt a Q&amp;amp;A format, use specific trigger phrases, or rephrase everything as direct answers. Google's AI understands synonyms and semantic intent. If your content genuinely answers a question, the system can figure that out without you gaming the phrasing.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Chasing inauthentic "mentions"&lt;/h4&gt;&lt;p&gt;Some practitioners advise seeding forums, comment sections, and third-party blogs with brand mentions to influence AI responses. Google's spam systems catch this, and the generative AI features inherit the same quality filters. Unearned mentions don't help; they may hurt.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Overloading structured data&lt;/h4&gt;&lt;p&gt;Structured data (schema.org markup) remains useful for rich results — it helps Google display reviews, FAQs, products, and events properly in traditional search. But there's no special schema that gets you into AI Overviews. Don't add schema, specifically hoping it unlocks AI features; it won't.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Actually Moves the Needle&lt;/h3&gt;&lt;p&gt;Strip away the myths, and you're left with a short, unglamorous list:&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;1. Be crawlable and indexable with a snippet enabled&lt;/h4&gt;&lt;p&gt;Pages blocked by noindex, those behind login walls, or those with no-snippet directives can't appear in AI Overviews regardless of content quality. This is table stakes. Run a Search Console coverage audit first.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;2. Produce genuinely first-hand or expert content&lt;/h4&gt;&lt;p&gt;The AI is looking for pages that contain information it can't synthesize on its own. Reviews written after actual use. Analysis from someone with domain expertise. Data from your own research. If your content could be generated by an AI without consulting your site, it probably won't be cited by one either.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;3. Write clearly, with a navigable structure&lt;/h4&gt;&lt;p&gt;Headings that describe what a section covers. Paragraphs that contain one idea each. Sentences that say what they mean without filler. This isn't about writing "for AI" — it's about writing well. The extractability that makes AI Overviews cite your content is the same thing that makes human readers trust it.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;4. Use high-quality images and video where relevant&lt;/h4&gt;&lt;p&gt;AI Overviews can surface image and video results, not just text. If your topic benefits from visual illustration — a hardware teardown, a vulnerability diagram, a product comparison screenshot — include original visuals with accurate alt text and descriptive filenames.&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;5. Ensure good page experience&lt;/h4&gt;&lt;p&gt;Core Web Vitals, mobile rendering, and low latency. These remain ranking signals, and they affect whether retrieved pages get surfaced prominently in AI responses.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;If You Use AI to Help Write Content: What Google Actually Requires&lt;/h3&gt;&lt;p&gt;This is where many publishers are nervous, and the guidance is worth reading carefully.&lt;/p&gt;&lt;p&gt;Google does not ban AI-assisted content. What it penalizes is scaled content abuse — producing large volumes of pages without adding value for users. The test isn't whether AI was involved in writing. The test is whether the output meets the same quality and usefulness standards Google would apply to any content.&lt;/p&gt;&lt;p&gt;In practice, this means:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Using AI to draft a structure, then filling it with first-hand knowledge, original analysis, and expert commentary: acceptable, and likely fine.&lt;/li&gt;&lt;li&gt;Using AI to generate 500 pages of product descriptions with no human review or added value violates the spam policy.&lt;/li&gt;&lt;li&gt;Using AI to speed up research or improve phrasing on content you've substantially developed yourself: acceptable.&lt;/li&gt;&lt;li&gt;Using AI to spin existing articles into slightly different versions at scale: spam policy violation.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The guidance also notes that &lt;b&gt;transparency is a good practice&lt;/b&gt;. If your publication process involves AI tools in meaningful ways, explaining that to readers (in a site-level disclosure or per-article note) builds trust. For e-commerce specifically, AI-generated images must include IPTC DigitalSourceType metadata, marking them as algorithmically produced.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;The Agentic Web Is Coming — Here's What to Watch&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Google Guidance onAI Content" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3sZQazuyj2z1I185u8Bal9qE3HEzXwGIwI8gWxImQ4K2IgTnslPXrMvf1XnQGV0__zmeUj1y8d8ERfWwZtR-ZRQoDNKsaqZQgjvA8RAIByddeUXV9w-lobW_sg3M5gKSVXNsoMd0Jd17QclIDDinPO5fdezUXJad-DgjcjGqttogYmnKXB6IDAbwrfTA/s16000/agentic-web.webp" title="Google Guidance onAI Content" /&gt;&lt;/div&gt;&lt;p&gt;Beyond AI Overviews, Google's documentation introduces something worth tracking: agentic experiences. AI agents — systems that can book reservations, fill out forms, compare products, and complete tasks autonomously — are beginning to access websites the same way browsers do, by rendering pages, reading the DOM, and interpreting accessibility trees.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Google points to the &lt;b&gt;&lt;a href="https://www.cyberkendra.com/2026/01/google-just-changed-how-youll-shop-with.html" target="_blank"&gt;Universal Commerce Protocol (UCP)&lt;/a&gt;&lt;/b&gt; as an emerging standard for how agents will interact with commerce sites. This isn't mainstream yet, but it signals where things are going: a web where the "user" visiting your site may be an AI agent acting on someone's behalf, not a human at all.&lt;/p&gt;&lt;p&gt;For publishers, this is mostly future-watch territory. For e-commerce operators, it's worth considering now: your checkout flows, product data structures, and schema markup will increasingly be navigated by agents rather than read by humans. Semantic HTML, clean DOM structure, and good accessibility practices aren't just for screen readers — they're also how agents parse your pages.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Practical SEO Checklist for AI Search Readiness&lt;/h3&gt;&lt;p&gt;For website owners who want a concrete action list:&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Content audit:&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Identify your top-traffic pages. Ask honestly: does this page contain information that exists because we produced it, or is it a restatement of commonly available facts?&lt;/li&gt;&lt;li&gt;Flag commodity pages for upgrading with first-hand data, original examples, or expert commentary.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Technical audit:&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Check Search Console for indexing issues, noindex tags on content you want crawled, and coverage errors.&lt;/li&gt;&lt;li&gt;Verify snippets aren't blocked via X-Robots-Tag or meta robots directives.&lt;/li&gt;&lt;li&gt;Review Core Web Vitals, particularly LCP and CLS.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Content creation:&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Build a process for producing non-commodity content: primary source analysis, original interviews, first-hand testing, proprietary data.&lt;/li&gt;&lt;li&gt;Stop creating "answer" pages that duplicate what's already on a dozen other sites.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;AI tools policy:&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Decide your publication's approach to AI-assisted writing and document it.&lt;/li&gt;&lt;li&gt;Ensure any AI-assisted content goes through substantive human review that adds real value before publication.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style="text-align: left;"&gt;Ignore:&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;llms.txt, content chunking, AI-specific schema, inauthentic mention campaigns.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Final Thought: The Bar Just Got Higher&lt;/h3&gt;&lt;p&gt;The honest takeaway from Google's guidance is that the bar for content that earns visibility in AI-powered search is meaningfully higher than the bar for traditional organic ranking. An article that ranks #3 for a moderately competitive query by satisfying on-page signals might never be cited in an AI Overview if it lacks a distinctive perspective.&lt;/p&gt;&lt;p&gt;That's not necessarily bad news. It's a forcing function. The content that survives this shift is the content that was always worth creating: original, authoritative, specific, and written with a real reader in mind. Publishers who've been producing commodity content at scale are the ones with the most to worry about.&lt;/p&gt;&lt;p&gt;For those doing genuine editorial work — original reporting, expert analysis, first-hand testing — the AI era may actually favor them over the SEO optimization shops that dominated the last decade.&lt;/p&gt;&lt;p class='pRef'&gt;Sources: Google Search Central — &lt;a href="https://developers.google.com/search/docs/fundamentals/ai-optimization-guide" target="_blank" rel="nofollow"&gt;Optimizing your website for generative AI features on Google Search&lt;/a&gt; and &lt;a href="https://developers.google.com/search/docs/fundamentals/using-gen-ai-content" target="_blank" rel="nofollow"&gt;Google Search's guidance on using generative AI content&lt;/a&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLOBY84qOnOvVT93KIB5bopZp0FYtcG0onmIK81xQIxs39VOi5QrbYQXU-isH3t6M3kAiQRh0VWiGxCytMkqaBhNPgKscCaDmMdG407nPHu7BB47CyAT_O7_mupHNLmlBCLyIb7bWfc1UdxyqCKXkJ5oYEbsI-fLfN7Hu75CRxvSpn0DilKp7td2DJkPM/s72-c/google-ai-content-guide.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Microsoft Exchange Zero-Day Exploited in the Wild — and Pwn2Own Researchers Just Made It Worse</title><link>https://www.cyberkendra.com/2026/05/microsoft-exchange-zero-day-exploited.html</link><category>Microsoft</category><category>Security</category><pubDate>Sat, 16 May 2026 08:19:37 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-8663774877664354641</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Exchange Server May 2026 vulnerability CVE-2026-42897" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDT1-Uf3IP5-rxRwHZtSwNFo9RAfWUmr-JMKWnQx5apbd7eqQNFXsiHOR7A7Jn0lZVtOessPtKWuV2wktlSYJLm46BNJb4tkCi-HmbMwhGzpF2_0RxT4KMPUj-QpPy_yN4phiYugFBFPVOVx2Po1KAO4iz_npNxW_qvMu_FvLXNqQDwWXcPBDFtM3xH2o/s16000/CVE-2026-42897.webp" title="Exchange Server May 2026 vulnerability CVE-2026-42897" /&gt;&lt;/div&gt;&lt;p&gt;Microsoft Exchange Server is having a very bad week. While threat actors are already exploiting a critical cross-site scripting vulnerability in the wild, elite researchers at Pwn2Own Berlin 2026 independently demonstrated full SYSTEM-level remote code execution on the same platform — all within 48 hours of each other.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Microsoft confirmed on Thursday that a critical XSS vulnerability, tracked as &lt;b&gt;CVE-2026-42897&lt;/b&gt;, is being actively exploited against on-premises Exchange Server deployments. The flaw affects Exchange Server 2016, 2019, and the Subscription Edition. Exchange Online users are not at risk.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The attack is deceptively simple: an attacker sends a specially crafted email to a target. If the victim opens it in Outlook Web Access (OWA) — the browser-based interface for accessing Exchange mailboxes — arbitrary JavaScript can execute silently in the browser context. No credentials needed, no complex setup. Just a well-timed phishing email.&lt;/p&gt;&lt;p&gt;The vulnerability appeared just two days after Microsoft's May 2026 Patch Tuesday, which addressed 138 separate flaws — a grim reminder that even the most patched environments can be blindsided by zero-days arriving between update cycles.&lt;/p&gt;&lt;p&gt;Microsoft has not identified the threat actor behind the &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42897" rel="nofollow" target="_blank"&gt;active exploitation&lt;/a&gt;, nor shared details about targets, campaign scale, or whether any attacks were successful. CVE-2026-42897 has not yet been added to CISA's Known Exploited Vulnerabilities catalog, though given its "Exploitation Detected" status, that designation could come at any time.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Pwn2Own Adds Fuel to the Fire&lt;/h3&gt;&lt;p&gt;As if the zero-day wasn't enough, on day two of Pwn2Own Berlin 2026, Orange Tsai of DEVCORE Research Team chained three bugs together to achieve remote code execution with SYSTEM privileges on Microsoft Exchange, earning $200,000 — the single largest payout of the competition so far. This is a separate, distinct attack chain from CVE-2026-42897, and per Pwn2Own rules, vendors receive a 90-day window to patch before details are made public.&lt;/p&gt;&lt;p&gt;It follows an equally impressive day-one performance, where Orange Tsai earned $175,000 by chaining four logic bugs to escape the Microsoft Edge sandbox — cementing DEVCORE's position atop the leaderboard.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Should Exchange Admins Do Right Now?&lt;/h3&gt;&lt;p&gt;Microsoft is still working on a permanent fix. In the interim, &lt;a href="https://techcommunity.microsoft.com/blog/exchange/addressing-exchange-server-may-2026-vulnerability-cve-2026-42897/4518498" rel="nofollow" target="_blank"&gt;two mitigations are available&lt;/a&gt;:&lt;/p&gt;&lt;p&gt;The Exchange Emergency Mitigation Service (EEMS) automatically applies protection via a URL rewrite configuration and is enabled by default on supported on-premises Exchange deployments. Admins should verify it's active.&lt;/p&gt;&lt;p&gt;For air-gapped or disconnected environments, Microsoft advises downloading the Exchange On-premises Mitigation Tool (EOMT) and running it via an elevated Exchange Management Shell — either per server or across all servers at once using the CVE-2026-42897 identifier.&lt;/p&gt;&lt;p&gt;Be aware that applying the mitigation introduces some side effects: OWA calendar printing may stop working, and inline images might not render correctly in the reading pane. Microsoft recommends using the Outlook desktop client as a workaround in both cases.&lt;/p&gt;&lt;p&gt;A permanent patch is planned for Exchange SE RTM, Exchange 2016 CU23, and Exchange Server 2019 CU14 and CU15. However, Exchange 2016 and 2019 updates will only be distributed to customers enrolled in the Period 2 Extended Security Update program — Period 1 ESU customers are excluded, as that program ended in April 2026.&lt;/p&gt;&lt;p&gt;With Exchange at the center of corporate email infrastructure — and often internet-exposed — organizations running on-premises deployments cannot afford to wait on this one.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDT1-Uf3IP5-rxRwHZtSwNFo9RAfWUmr-JMKWnQx5apbd7eqQNFXsiHOR7A7Jn0lZVtOessPtKWuV2wktlSYJLm46BNJb4tkCi-HmbMwhGzpF2_0RxT4KMPUj-QpPy_yN4phiYugFBFPVOVx2Po1KAO4iz_npNxW_qvMu_FvLXNqQDwWXcPBDFtM3xH2o/s72-c/CVE-2026-42897.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Linux Kernel Had a Six-Year Bug That Let Anyone Steal SSH Host Keys and Root Passwords</title><link>https://www.cyberkendra.com/2026/05/linux-kernel-had-six-year-bug-that-let.html</link><category>Linux</category><category>Security</category><pubDate>Fri, 15 May 2026 21:08:45 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-6030865485574691225</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="ssh-keysign-pwn" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu2QfnAaNVvQyBR9kE9-zqjo3OV4Ei0q-WavJQnZrBatUwfnWJXocknE_cF2RcW60Whwqy5kOzJmlq4cBX6XnYAjgPAZXSSU8lJ_r-as0L_5TpkYtFJ8mcHT5ElJvbCdU5BKPUeKeM2RjBdgrLWC9J0PqnH5HaGcLw5ZwpTWUCd1Ntwje-JlBl6cu7UK0/s16000/ssh-keysign-pwn.webp" title="ssh-keysign-pwn" /&gt;&lt;/div&gt;&lt;p&gt;A logic flaw sitting quietly in the Linux kernel since at least 2020 — possibly longer — just got a working exploit, a public proof-of-concept, and a same-day patch from Linus Torvalds.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The vulnerability, dubbed &lt;b&gt;ssh-keysign-pwn&lt;/b&gt;, was &lt;a href="https://www.openwall.com/lists/oss-security/2026/05/15/2" rel="nofollow" target="_blank"&gt;disclosed by Qualys &lt;/a&gt;on May 14, 2026, and patched by Linus Torvald the same day. The damage it could have done — and in unpatched environments still can — is significant: any unprivileged local user can silently read a server's SSH host private keys or the entire &lt;code&gt;/etc/shadow&lt;/code&gt; file containing hashed user passwords.&lt;/p&gt;&lt;p&gt;The bug lives in &lt;code&gt;__ptrace_may_access()&lt;/code&gt;, the kernel's gatekeeper for deciding whether one process can inspect another. The function skips its "dumpable" check when &lt;code&gt;task-&amp;gt;mm == NULL&lt;/code&gt; — a state that occurs briefly during process exit, after memory is released (&lt;code&gt;exit_mm()&lt;/code&gt;) but before file descriptors are closed (&lt;code&gt;exit_files()&lt;/code&gt;). That tiny window is everything.&lt;/p&gt;&lt;p&gt;An attacker uses &lt;code&gt;pidfd_getfd(2)&lt;/code&gt; — a legitimate Linux syscall introduced in kernel 5.6 — to steal open file descriptors from a dying privileged process during that gap, when the caller's UID matches the target's. No root required. No special permissions needed.&lt;/p&gt;&lt;p&gt;Two ready-to-run exploits ship with the public PoC: &lt;code&gt;sshkeysign_pwn&lt;/code&gt; targets the &lt;code&gt;ssh-keysign&lt;/code&gt; utility, which opens sensitive host key files before dropping root privileges. By racing the process exit, an unprivileged user can lift those file descriptors. &lt;code&gt;chage_pwn&lt;/code&gt; attacks the &lt;code&gt;chage&lt;/code&gt; utility to pull &lt;code&gt;/etc/shadow&lt;/code&gt;, enabling offline cracking of password hashes. The exploit reliably hits within 100–2,000 process spawns.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Six Years of Missed Warnings&lt;/h3&gt;&lt;p&gt;Google security researcher Jann Horn had already proposed a patch for the underlying FD-theft behavior back in October 2020 — but it never made it through. The &lt;code&gt;ssh-keysign&lt;/code&gt; fd-leaving pattern itself dates to 2002. &lt;code&gt;chage&lt;/code&gt;'s vulnerable &lt;code&gt;spw_open&lt;/code&gt; + &lt;code&gt;setreuid&lt;/code&gt; shape is similarly ancient. The flaw was there. The patch proposal existed. Nobody pushed it across the finish line for five years.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Who Is Affected&lt;/h3&gt;&lt;p&gt;All stable Linux kernels as of May 14, 2026, are affected — everything before commit 31e62c2ebbfd. Confirmed vulnerable distributions include Arch Linux, Debian, Ubuntu, CentOS, and Raspberry Pi OS. If you run any mainstream Linux server or desktop and haven't applied yesterday's kernel update, your SSH host keys and shadow file are readable by any local user on the box.&lt;/p&gt;&lt;p&gt;The fix is in the mainline kernel as of May 14. Until you patch, a temporary workaround is removing execute permissions from &lt;code&gt;ssh-keysign&lt;/code&gt; and &lt;code&gt;chage&lt;/code&gt; — though this doesn't fix the underlying issue and may break legitimate functionality.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Update your kernel immediately and reboot — this is the only real fix&lt;/li&gt;&lt;li&gt;Rotate all SSH host keys on any system that may have been exposed&lt;/li&gt;&lt;li&gt;Force a password reset for privileged accounts if &lt;code&gt;/etc/shadow&lt;/code&gt; was accessible&lt;/li&gt;&lt;li&gt;Run &lt;code&gt;uname -r&lt;/code&gt; to confirm your running kernel includes commit &lt;b&gt;31e62c2ebbfd&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The patch adjusts the kernel's ptrace behavior to properly handle the &lt;code&gt;mm == NULL&lt;/code&gt; case. Linus described the new logic as "slightly saner" — an understated note for a bug that spent six years one race condition away from becoming a full server compromise.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu2QfnAaNVvQyBR9kE9-zqjo3OV4Ei0q-WavJQnZrBatUwfnWJXocknE_cF2RcW60Whwqy5kOzJmlq4cBX6XnYAjgPAZXSSU8lJ_r-as0L_5TpkYtFJ8mcHT5ElJvbCdU5BKPUeKeM2RjBdgrLWC9J0PqnH5HaGcLw5ZwpTWUCd1Ntwje-JlBl6cu7UK0/s72-c/ssh-keysign-pwn.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Google Quietly Cut New Account Storage to 5GB — Your Phone Number Is Now the Price of 15GB</title><link>https://www.cyberkendra.com/2026/05/google-quietly-cut-new-account-storage.html</link><category>Google</category><pubDate>Fri, 15 May 2026 08:59:59 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-3739978039011383665</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicUC2sUmSBNvbE83SYa3xWt1Hq8AyMLzFvRxGr32PlgcGVt_uQhdv2PE5Z_b8GwW58Y94fKjX-zw-5HY7tcv2WJXOXi1bPyVm-dz3zdYUvq-DKQXoyh05CDSJh-9pt_ysDvjjnS1n8_Wedl_I9dmPJa64OiqxjbLYfzP2P4lXfyUwQvuTyX26LudakxtM/s16000/5GB-google-storage.webp" /&gt;&lt;/div&gt;&lt;p&gt;Google has changed the rules on free storage for new accounts — and most users won't notice until it's too late. New Google accounts now default to just 5GB of free storage. To unlock the full 15GB shared across Gmail, Drive, and Google Photos, users must link and verify a phone number during account setup.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The &lt;a href="https://www.reddit.com/r/degoogle/comments/1tc0j0k/gmail_now_gives_5gb_free_if_you_sign_up_without/" rel="nofollow" target="_blank"&gt;prompt users now encounter&lt;/a&gt; makes the trade-off explicit: provide your number and get 15GB, or skip it and stay capped at 5GB. Google's stated rationale, visible within the signup flow itself, is that the phone number ensures the 15GB allocation is granted "only once per person" — effectively an anti-abuse measure to stop bots and throwaway accounts from hoarding free storage indefinitely.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Change Was Already Underway in March&lt;/h3&gt;&lt;p&gt;This didn't happen overnight. Google quietly changed its language around the included storage in mid-March. Where it &lt;a href="https://web.archive.org/web/20260207120224/https://support.google.com/googleone/answer/2375123" rel="nofollow" target="_blank"&gt;previously promised an unconditional 15GB&lt;/a&gt;, it &lt;a href="https://support.google.com/googleone/answer/9312312" rel="nofollow" target="_blank"&gt;now offers "up to" 15GB across&lt;/a&gt; its services. Using the Internet Archive's WayBack Machine, the change can be traced to around March 18, 2026, and remains live today.&amp;nbsp;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Google Calls It a Regional Test&lt;/h3&gt;&lt;p&gt;A Google spokesperson &lt;a href="https://www.howtogeek.com/google-phone-number-link-for-new-accounts/" rel="nofollow" target="_blank"&gt;confirmed to How-To Geek&lt;/a&gt; that the company is "testing" a storage policy for new accounts when they're created in "select regions," although it didn't name those areas. Current reports suggest the 5GB cap is most prevalent in parts of Africa, including Kenya and Nigeria. Existing accounts are not affected — only users creating fresh accounts going forward.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Why Now? AI Costs and Account Abuse&lt;/h3&gt;&lt;p&gt;AI and automation have made multi-account abuse considerably easier — you can theoretically build a seamless storage pool without much manual effort. Malware creators could exploit this to store code and stolen data at scale. Google also isn't immune to the soaring memory prices driven by AI demand it's partly responsible for creating through Gemini.&lt;/p&gt;&lt;p&gt;The concern is that you still have to share your phone number to get 15GB of space that millions take for granted. Google and others already provide two-factor authentication without phone numbers specifically for privacy reasons — a data breach exposing your linked number is a real risk. Small business owners running dedicated work accounts without wanting to tie a personal number will also feel the friction.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What You Should Do&lt;/h3&gt;&lt;p&gt;If you're creating a new Google account, link a phone number during setup to claim the full 15GB. After setup, check your actual storage allocation in Google Account settings — if it reads 5GB rather than 15GB, the account was created without phone verification.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Some users report still receiving 15GB without linking a phone, especially on Android devices set up without a SIM card, so your experience may vary by region and device.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicUC2sUmSBNvbE83SYa3xWt1Hq8AyMLzFvRxGr32PlgcGVt_uQhdv2PE5Z_b8GwW58Y94fKjX-zw-5HY7tcv2WJXOXi1bPyVm-dz3zdYUvq-DKQXoyh05CDSJh-9pt_ysDvjjnS1n8_Wedl_I9dmPJa64OiqxjbLYfzP2P4lXfyUwQvuTyX26LudakxtM/s72-c/5GB-google-storage.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Google's Security Team Built a Zero-Click Root Exploit for the Pixel 10</title><link>https://www.cyberkendra.com/2026/05/googles-security-team-built-zero-click.html</link><category>Google</category><category>Project Zero</category><category>Security</category><pubDate>Fri, 15 May 2026 07:55:23 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-6020965769281107391</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Google Pixel 10 Hacked" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-BpAzVnSsn2XVjGbUrh6IjUm9txlJiiOPFkS_uHUDE0Q01ifH1ThCZN58eFkpjJJWciXqetsFUUD7uZ1_1_nZVoK4pCRjEctdJZ4GjB1DBXOpzTpb-RicbWhO2F3DvT2diEGps_b5VgZBr59fJ1xkRV1C9UIBD2y9p-ZsuSZT34S8-Suaravxxd3FojM/s16000/pixel10-hack.webp" title="Google Pixel 10 Hacked" /&gt;&lt;/div&gt;&lt;p&gt;Google's elite Project Zero security team has done it again — this time turning the Pixel 10 into a case study for how hardware driver vulnerabilities can silently hand an attacker full root control of your phone, no taps required.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;In a &lt;a href="https://projectzero.google/2026/05/pixel-10-exploit.html" rel="nofollow" target="_blank"&gt;research post published May 13&lt;/a&gt;, Project Zero researcher Seth Jenkins detailed a complete zero-click exploit chain for the Pixel 10, building on the team's earlier, &lt;a href="https://projectzero.google/2026/01/pixel-0-click-part-1.html" rel="nofollow" target="_blank"&gt;three-part Pixel 9 research series published&lt;/a&gt; in January 2026. That earlier work had demonstrated it was possible to go from a zero-click context to root on Android in just two exploits — and Jenkins wanted to see if the same was possible on Google's latest flagship.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Entry Point: A Dolby Audio Bug, Repurposed&lt;/h3&gt;&lt;p&gt;The first link in the chain is CVE-2025-54957, a vulnerability in the Dolby Unified Decoder (UDC) — a library for processing Dolby Digital audio formats that is integrated across Android, iOS, Windows, and media streaming devices.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The dangerous part: the Dolby UDC is part of the zero-click attack surface of most Android devices because incoming audio messages in Google Messages are transcribed before a user even opens them. A malicious audio file sent as a message triggers the exploit with no interaction from the target.&lt;/p&gt;&lt;p&gt;Adapting the Dolby exploit for Pixel 10 was straightforward, Jenkins noted, with the main hurdle being that the Pixel 10 uses RET PAC instead of -fstack-protector, a different stack protection mechanism that requires a workaround.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Escalation: A Video Driver With No Boundaries&lt;/h3&gt;&lt;p&gt;On the Pixel 9, the second exploit leveraged the BigWave AV1 decoder driver. That driver doesn't exist on Pixel 10. But Jenkins and collaborator Jann Horn found something worse. Working together, they spent just 2 hours auditing the VPU driver — used for video decoding on the Tensor G5 chip — and discovered an exceptional vulnerability.&lt;/p&gt;&lt;p&gt;The flaw in the driver's &lt;code&gt;mmap&lt;/code&gt; handler is disarmingly simple: the driver makes a call to &lt;code&gt;remap_pfn_range&lt;/code&gt; based purely on the size of the VMA (virtual memory area) and not at all bound to the size of the hardware register region, meaning a caller can map as much physical memory as they want into userland — including the entire kernel image. Making matters worse, the kernel is always at the same physical address on Pixel, so an attacker knows exactly where it is relative to the returned mmap address — no scanning required.&lt;/p&gt;&lt;p&gt;The result: achieving arbitrary read-write access to the kernel required just 5 lines of code, and the full exploit took less than a day to write.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;One Bright Spot: Faster Patching&lt;/h3&gt;&lt;p&gt;Jenkins reported the VPU bug on November 24, 2025, and it was patched 71 days later in the February Pixel security bulletin — notably the first time Android patched a driver bug Jenkins reported within 90 days. Compare that to the Pixel 9 Dolby chain, where the UDC vulnerability remained unpatched on Pixel for 82 days after public disclosure, and the BigWave driver bug took until January 6, 2026, to fix.&lt;/p&gt;&lt;p&gt;Progress — but Project Zero isn't satisfied. Jenkins noted that after flagging the BigWave driver issues, he had hoped the same development team would audit their other drivers. Five months later, a serious, extremely shallow vulnerability was immediately apparent in their VPU driver during a cursory review.&amp;nbsp;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Pixel 10 Users Should Do&lt;/h3&gt;&lt;p&gt;The VPU vulnerability was patched in the &lt;b&gt;February 2026 Pixel security update&lt;/b&gt;. If your device is running the February 2026 Security Patch Level (SPL) or later, you are protected. Check under Settings → About phone → Android security update. The Dolby exploit only affects devices on &lt;b&gt;SPL December 2025 or earlier&lt;/b&gt;.&lt;/p&gt;&lt;p&gt;The deeper lesson here goes beyond any single bug fix: as Android packs in more AI-powered features that silently process incoming media, the zero-click attack surface keeps growing — and hardware driver security hasn't kept pace.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-BpAzVnSsn2XVjGbUrh6IjUm9txlJiiOPFkS_uHUDE0Q01ifH1ThCZN58eFkpjJJWciXqetsFUUD7uZ1_1_nZVoK4pCRjEctdJZ4GjB1DBXOpzTpb-RicbWhO2F3DvT2diEGps_b5VgZBr59fJ1xkRV1C9UIBD2y9p-ZsuSZT34S8-Suaravxxd3FojM/s72-c/pixel10-hack.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>NGINX Rift: An 18-Year-Old Bug Lets Hackers Hijack One-Third of the Internet's Web Servers</title><link>https://www.cyberkendra.com/2026/05/nginx-rift-18-year-old-bug-lets-hackers.html</link><category>Internet</category><category>Security</category><pubDate>Wed, 13 May 2026 23:32:21 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-5493923747151350102</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="NGINX Rift flaw" border="0" data-original-height="1365" data-original-width="2048" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz_JehO8mTlTbFmUrkR05Hw6KRRxpBxwR4GQI4hyphenhyphenTGh2OwZ_2d7-YOMOYwdgKCitMgRjd-KF0gwU9146aHAejsFZC3AEaKZSD-AKYW_7liQ2gMkGyPgKLirIhuIYimzaAPlFCgYF0jFezj_QSCeWbfZzs28k0RuDZCTpA-7SuNPoxi9RyBgqU9zlFSACw/s16000/NGINX-Rift.webp" title="NGINX Rift flaw" /&gt;&lt;/div&gt;&lt;p&gt;A memory corruption flaw in NGINX's source code, hidden since 2008, now has a working exploit. An unauthenticated attacker anywhere on the internet can send a single crafted HTTP request to crash NGINX worker processes — or, under the right conditions, achieve full remote code execution on the server.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Researchers at depthfirst, an autonomous vulnerability analysis platform, &lt;a href="https://depthfirst.com/research/nginx-rift-achieving-nginx-rce-via-an-18-year-old-vulnerability" rel="nofollow" target="_blank"&gt;discovered the flaw&lt;/a&gt; — now tracked as &lt;b&gt;CVE-2026-42945&lt;/b&gt; — while scanning the NGINX codebase in April. Their automated system flagged it within six hours. It was introduced in 2008 and has been quietly sitting in every standard NGINX build for nearly two decades. F5, which maintains NGINX, confirmed the issue on April 24 and published a coordinated advisory today.&lt;/p&gt;&lt;p class="note"&gt;NGINX powers approximately one-third of all websites globally. If your configuration uses &lt;code&gt;rewrite&lt;/code&gt; directives with unnamed regex captures (&lt;code&gt;$1&lt;/code&gt;, &lt;code&gt;$2&lt;/code&gt;) alongside a replacement string containing a question mark, followed by another &lt;code&gt;rewrite&lt;/code&gt;, &lt;code&gt;if&lt;/code&gt;, or &lt;code&gt;set&lt;/code&gt; directive — you are exposed. No authentication is required to trigger it.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;Four CVEs, One Critical Hit&lt;/h2&gt;&lt;p&gt;Depthfirst's scan returned five findings total. Four were confirmed by NGINX. The critical one dominates:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;CVE-2026-42945 - (9.2 Critical)&lt;/li&gt;&lt;li&gt;CVE-2026-42946 - (8.3 High)&lt;/li&gt;&lt;li&gt;CVE-2026-40701 - (6.3 Medium)&lt;/li&gt;&lt;li&gt;CVE-2026-42934 - (6.3 Medium)&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;CVE-2026-42946 is also noteworthy: a state mismatch in the SCGI and uWSGI modules results in a cross-buffer pointer subtraction that yields a ~1 TB key length, causing a crash in the worker. The remaining two are a use-after-free in the SSL module and an out-of-bounds read in the charset module.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Breaks and Why&lt;/h3&gt;&lt;p&gt;The vulnerability lives in &lt;code&gt;src/http/ngx_http_script.c&lt;/code&gt;, inside &lt;code&gt;ngx_http_rewrite_module&lt;/code&gt; — a module present in every standard NGINX build. NGINX's script engine processes &lt;b&gt;rewrite&lt;/b&gt; directives in two passes: first, it calculates how much memory to allocate, then it writes the actual data. The flaw breaks the contract between those two passes.&lt;/p&gt;&lt;p&gt;When a &lt;code&gt;rewrite&lt;/code&gt; replacement string contains a question mark, a function called &lt;code&gt;ngx_http_script_start_args_code&lt;/code&gt; sets an internal flag (&lt;code&gt;e-&amp;gt;is_args = 1&lt;/code&gt;) on the main script engine and &lt;b&gt;never clears it&lt;/b&gt;.&amp;nbsp;&lt;/p&gt;&lt;p&gt;A later &lt;code&gt;set&lt;/code&gt; directive computes the buffer length using a freshly zeroed sub-engine — so it measures the capture as raw bytes, with no escaping. But when the actual write happens, the main engine still has &lt;code&gt;is_args = 1&lt;/code&gt;, so it re-escapes the data through &lt;code&gt;ngx_escape_uri&lt;/code&gt; in &lt;code&gt;NGX_ESCAPE_ARGS&lt;/code&gt; mode. Every &lt;code&gt;+&lt;/code&gt;, &lt;code&gt;%&lt;/code&gt;, or &lt;code&gt;&amp;amp;amp&lt;/code&gt;; character in an attacker's URI expands from one byte to three. The buffer was sized for the smaller value. The write runs past the allocation.&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;"The bytes written past the allocation are derived from the attacker's URI, so the corruption is shaped by the attacker rather than random." — depthfirst advisory&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;The researchers developed a working proof-of-concept demonstrating unauthenticated RCE with ASLR disabled. They also detail a theoretical technique — progressively overwriting pointer bytes across repeated requests — that could be used to defeat ASLR. NGINX's multi-process architecture actually aids exploitation: if a worker crashes, the master spawns a new one with an identical heap layout, giving attackers unlimited retries at no cost.&lt;/p&gt;&lt;p&gt;&lt;!--[ Defer iframe ]--&gt;
&lt;div class='videoYt'&gt;
  &lt;iframe title='Lazy video iframe' class='lazy' data-src='//www.youtube.com/embed/pKAkzLGptfI' allow='accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture' allowfullscreen&gt;&lt;/iframe&gt;
&lt;/div&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Who Is Affected&lt;/h3&gt;&lt;p&gt;The scope is wide. Affected products span most of the NGINX ecosystem:&lt;/p&gt;&lt;div class="table noWrap w100"&gt;&lt;table&gt;

      &lt;thead&gt;

        &lt;tr&gt;&lt;th&gt;&lt;b&gt;Product&lt;/b&gt;&lt;/th&gt;&lt;th&gt;&lt;b&gt;Vulnerable Range&lt;/b&gt;&lt;/th&gt;&lt;th&gt;&lt;b&gt;Fixed In&lt;/b&gt;&lt;/th&gt;&lt;/tr&gt;

      &lt;/thead&gt;

      &lt;tbody&gt;

        &lt;tr&gt;&lt;td&gt;NGINX Open Source&lt;/td&gt;&lt;td&gt;0.6.27 – 1.30.0&lt;/td&gt;&lt;td class="fixed"&gt;1.31.0 / 1.30.1&lt;/td&gt;&lt;/tr&gt;

        &lt;tr&gt;&lt;td&gt;NGINX Plus&lt;/td&gt;&lt;td&gt;R32 – R36&lt;/td&gt;&lt;td class="fixed"&gt;R36 P4 / R32 P6&lt;/td&gt;&lt;/tr&gt;

        &lt;tr&gt;&lt;td&gt;NGINX Instance Manager&lt;/td&gt;&lt;td&gt;2.16.0 – 2.21.1&lt;/td&gt;&lt;td&gt;Move to fixed branch&lt;/td&gt;&lt;/tr&gt;

        &lt;tr&gt;&lt;td&gt;NGINX App Protect WAF&lt;/td&gt;&lt;td&gt;4.9.0–4.16.0, 5.1.0–5.8.0&lt;/td&gt;&lt;td&gt;Move to fixed branch&lt;/td&gt;&lt;/tr&gt;

        &lt;tr&gt;&lt;td&gt;NGINX Gateway Fabric&lt;/td&gt;&lt;td&gt;1.3.0–1.6.2, 2.0.0–2.5.1&lt;/td&gt;&lt;td&gt;Move to fixed branch&lt;/td&gt;&lt;/tr&gt;

        &lt;tr&gt;&lt;td&gt;NGINX Ingress Controller&lt;/td&gt;&lt;td&gt;3.5.0–5.4.1 (multiple)&lt;/td&gt;&lt;td&gt;Move to fixed branch&lt;/td&gt;&lt;/tr&gt;

      &lt;/tbody&gt;

    &lt;/table&gt;&lt;/div&gt;&lt;p&gt;F5 BIG-IP, BIG-IQ, Distributed Cloud, and Silverline are not affected.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What You Should Do Right Now&lt;/h3&gt;&lt;p&gt;&lt;b&gt;Upgrade first.&lt;/b&gt; For NGINX Open Source, upgrade to 1.31.0 or 1.30.1 and restart to reload workers with the patched binary. NGINX Plus users should apply R36 P4 or R32 P6.&lt;/p&gt;&lt;p&gt;&lt;b&gt;If you can't patch immediately,&lt;/b&gt; convert unnamed regex captures to named captures in every affected &lt;code&gt;rewrite&lt;/code&gt; directive:&lt;/p&gt;&lt;p&gt;# Vulnerable — unnamed captures with ? in replacement rewrite ^/users/([0-9]+)/profile/(.*)$ /profile.php?id=$1&amp;amp;tab=$2 last; # Mitigated — named captures bypass the vulnerable code path rewrite ^/users/(?&lt;user_id&gt;[0-9]+)/profile/(?&lt;/user_id&gt;&lt;/p&gt;&lt;section&gt;.*)$ /profile.php?id=$user_id&amp;amp;tab=$section last;&lt;/section&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Named captures (&lt;code&gt;(?&amp;lt;name&amp;gt;...)&lt;/code&gt;) do not pass through the vulnerable escaping logic. This configuration change removes the attack surface without a binary upgrade.&lt;/p&gt;&lt;p&gt;The broader implication here is harder to ignore than the patch itself. A bug this old, in software this widely deployed, was found not by a human auditor poring over diffs, but by an automated system running for six hours. That says something uncomfortable about the gap between how long critical infrastructure has been accumulating risk and how fast the tools to find it are now moving.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz_JehO8mTlTbFmUrkR05Hw6KRRxpBxwR4GQI4hyphenhyphenTGh2OwZ_2d7-YOMOYwdgKCitMgRjd-KF0gwU9146aHAejsFZC3AEaKZSD-AKYW_7liQ2gMkGyPgKLirIhuIYimzaAPlFCgYF0jFezj_QSCeWbfZzs28k0RuDZCTpA-7SuNPoxi9RyBgqU9zlFSACw/s72-c/NGINX-Rift.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Linux Kernel Strikes Again: "Fragnesia" Is the Third Root-Level Flaw in Two Weeks</title><link>https://www.cyberkendra.com/2026/05/linux-kernel-strikes-again-fragnesia-is.html</link><category>Linux</category><category>Security</category><pubDate>Wed, 13 May 2026 22:53:21 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-3856880393494632232</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Fragnesia Linux Flaw" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhODeAKZHXOAeaApwm6ehNJakJ_0Q329Z_cPdQ65ZCrnj9gWzoF2flM_J60lJPh1YAR4Iew1fLc6wJ49TX2i0f66Gv6kK9HNdbCwzz_njqKN3D0fjgciPKOIKQQBvP3igYZp8bMtU2CFd4Bg0K5jQxxyPIH_q3YliBywK4KO8uPR1F1k-NCU2Zr27kHUcs/s16000/Fragnesia.webp" title="Fragnesia Linux Flaw" /&gt;&lt;/div&gt;&lt;p&gt;Linux administrators have barely had time to recover from Copy Fail and Dirty Frag — and now there's a third exploit joining the same dangerous family. Security researchers at V12 Security have disclosed Fragnesia, a new Linux kernel local privilege escalation (LPE) vulnerability that gives any unprivileged local user a reliable, deterministic path to root — without needing a single host-level privilege to pull it off.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The timing couldn't be worse. As we covered here on Cyber Kendra, &lt;a href="https://www.cyberkendra.com/2026/04/a-732-byte-python-script-can-get-root.html" target="_blank"&gt;&lt;b&gt;Copy Fail (CVE-2026-31431)&lt;/b&gt;&lt;/a&gt; — a 732-byte Python script that roots virtually every major Linux distribution since 2017 — dropped on April 29. Just one week later, &lt;b&gt;&lt;a href="https://www.cyberkendra.com/2026/05/dirty-frag-no-patch-no-warning-root.html" target="_blank"&gt;Dirty Frag (CVE-2026-43284 / CVE-2026-43500)&lt;/a&gt;&lt;/b&gt;, discovered by Korean researcher Hyunwoo Kim, chained two separate kernel bugs to deliver the same devastating outcome. Now, Fragnesia arrives as an unintended consequence of one of the very patches meant to fix Dirty Frag — a bitter irony that underscores just how fragile this surface area of the kernel has become.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;What Makes Fragnesia Different&lt;/h2&gt;&lt;p&gt;Fragnesia was &lt;a href="https://github.com/v12-security/pocs/blob/main/fragnesia%2FREADME.md" rel="nofollow" target="_blank"&gt;discovered&lt;/a&gt; by William Bowling and the V12 team using their agentic security tooling, V12. Like its predecessors, it targets the Linux kernel's &lt;b&gt;XFRM ESP-in-TCP subsystem&lt;/b&gt; — the component responsible for handling IPsec (encrypted network traffic) over TCP connections. The core bug is a logic flaw in how the kernel handles shared page fragments during socket buffer (skb) coalescing: the skb "forgets" that a fragment is shared, hence the name.&lt;/p&gt;&lt;p&gt;The attack is methodical and requires no race condition whatsoever. Here's what happens under the hood:&lt;/p&gt;&lt;p&gt;The exploit first calls &lt;code&gt;unshare()&lt;/code&gt; to carve out an isolated user and network namespace — a standard unprivileged operation — which grants it &lt;code&gt;CAP_NET_ADMIN&lt;/code&gt; (network administration capability) within that bubble, without any real privileges on the host. It then installs a crafted ESP security association using a known AES-128-GCM key.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Next, it builds a 256-entry lookup table mapping every possible keystream byte to a specific cryptographic nonce value. With that table in hand, the exploit splices file pages directly from the target binary — &lt;code&gt;/usr/bin/su&lt;/code&gt; — into a TCP socket buffer before enabling ESP-in-TCP mode.&amp;nbsp;&lt;/p&gt;&lt;p&gt;When the socket transitions into espintcp ULP (Upper Layer Protocol) mode, the kernel attempts to decrypt the queued data in-place. The result: the AES-GCM keystream is XORed directly into the kernel's page cache copy of the file, flipping exactly the bytes the attacker wants.&lt;/p&gt;&lt;p&gt;The exploit repeats this for each byte that needs changing, effectively overwriting the first 192 bytes of su with a small ELF stub that calls &lt;code&gt;setresuid(0,0,0)&lt;/code&gt; and executes &lt;code&gt;/bin/sh&lt;/code&gt;. Running su then drops you into a root shell. The on-disk binary is never touched — the corruption lives entirely in memory.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Who Is Affected&lt;/h3&gt;&lt;p&gt;All &lt;b&gt;Linux kernel versions affected by Dirty Frag are also affected by Fragnesia&lt;/b&gt; — specifically, any kernel without the patch published to the netdev mailing list on May 13, 2026. The exploit has been confirmed working on Ubuntu 22.04/24.04-era kernels (tested on 6.8.0-111-generic). Ubuntu's default AppArmor restrictions on unprivileged user namespaces can raise the bar slightly, but the README is explicit: that restriction only requires one additional bypass step and is out of scope for the vulnerability itself.&lt;/p&gt;&lt;p&gt;Microsoft has previously noted active in-the-wild exploitation of related techniques, observing campaigns that gain SSH access and immediately escalate privileges via su — a pattern consistent with both Dirty Frag and now Fragnesia.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What You Should Do Right Now&lt;/h3&gt;&lt;p&gt;The mitigation is the same as for Dirty Frag. If your systems don't depend on IPsec ESP or the RxRPC protocol, disabling the vulnerable modules is the fastest interim fix:&lt;/p&gt;&lt;pre&gt;rmmod esp4 esp6 rxrpc
printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' \
  &amp;gt; /etc/modprobe.d/fragnesia.conf&lt;/pre&gt;&lt;p&gt;If you believe a system has already been exploited, the modified &lt;code&gt;/usr/bin/su&lt;/code&gt; lives only in the page cache. Clear it before anyone else runs &lt;b&gt;su&lt;/b&gt;:&lt;/p&gt;&lt;pre&gt;echo 1 | tee /proc/sys/vm/drop_caches&lt;/pre&gt;&lt;p&gt;Or simply reboot. Apply kernel patches from your distribution vendor as they become available — the upstream patch for this specific bug landed on May 13, 2026.&lt;/p&gt;&lt;p&gt;Three critical Linux LPEs in two weeks is not a coincidence — it's a signal that this region of the kernel has been underexamined for a long time. Keep an eye on your patch feeds.&lt;/p&gt;&lt;p class="note"&gt;Fragnesia was discovered by William Bowling and the V12 team. Technical details and a proof-of-concept are available in the V12 Security GitHub repository.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhODeAKZHXOAeaApwm6ehNJakJ_0Q329Z_cPdQ65ZCrnj9gWzoF2flM_J60lJPh1YAR4Iew1fLc6wJ49TX2i0f66Gv6kK9HNdbCwzz_njqKN3D0fjgciPKOIKQQBvP3igYZp8bMtU2CFd4Bg0K5jQxxyPIH_q3YliBywK4KO8uPR1F1k-NCU2Zr27kHUcs/s72-c/Fragnesia.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Composer Bug Silently Dumped GitHub Tokens Into CI Logs — Patch Now</title><link>https://www.cyberkendra.com/2026/05/composer-bug-silently-dumped-github.html</link><category>GitHub</category><category>Security</category><category>Vulnerability</category><pubDate>Wed, 13 May 2026 22:23:33 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-1787016141296066132</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Immediately Update Composer" border="0" data-original-height="1010" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipKVV4F3S6vYUGv9eN8wzPgZXjvXiApWySUQzN4t4vMbaHH0qJ5pDb0U5sA1IhGYoWGV_jGH1l6grIBudyBZX3lSWBgtsFx24ysGkQRroPCQc0meXAdB0AHhkYJhQLaEx8VaVf0gsluIa7NbUDgZHpew-jmeClHm4r1nbKKgCEL4yHakHEdOOEjQKNSHU/s16000/composer-update.webp" title="Immediately Update Composer" /&gt;&lt;/div&gt;&lt;p&gt;Millions of PHP developers who rely on Composer for dependency management were silently exposed to a token-leaking vulnerability this week — one that required no misconfiguration, no attacker interaction, and no unusual setup to trigger. Just running a normal composer install inside a GitHub Actions workflow was enough.&lt;/p&gt;&lt;p&gt;The issue, tracked as &lt;a href="https://github.com/composer/composer/security/advisories/GHSA-f9f8-rm49-7jv2" rel="nofollow" target="_blank"&gt;GHSA-f9f8-rm49-7jv2&lt;/a&gt; with a CVE identifier still pending, was publicly reported on May 12, 2026, by GitHub user kesselb — first as a regular issue, then escalated to a security advisory just hours later. Fixed builds shipped within hours of the security report, on the morning of May 13.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What Actually Happened&lt;/h3&gt;&lt;p&gt;GitHub has been quietly rolling out a new format for the auto-generated &lt;b&gt;GITHUB_TOKEN&lt;/b&gt; that every Actions workflow receives. The new structure — shaped like &lt;code&gt;ghs_&amp;lt;numeric-id&amp;gt;_&amp;lt;base64url-JWT&amp;gt;&lt;/code&gt; — includes a hyphen (&lt;b&gt;-&lt;/b&gt;) character that was absent from the old format.&lt;/p&gt;&lt;p&gt;Composer has validated GitHub tokens since 2021 against an allowed character set that never included -. When the new-format token hit that validation in &lt;code&gt;BaseIO::loadConfiguration()&lt;/code&gt;, Composer threw an &lt;code&gt;UnexpectedValueException&lt;code&gt; — and critically, the exception message interpolated the full token value verbatim:&lt;/code&gt;&lt;/code&gt;&lt;/p&gt;&lt;pre&gt;// The exception that leaked everything&lt;br /&gt;
"Your github oauth token for github.com contains invalid characters: ghs_12345_ABC-xyz..."&lt;/pre&gt;&lt;p&gt;Symfony Console then wrote that message to &lt;code&gt;stderr&lt;/code&gt;. In any CI environment, &lt;code&gt;stderr&lt;/code&gt; is captured and persisted in job logs — logs that are visible to every repository collaborator, and sometimes stored by third-party log shippers, monitoring tools, or support systems.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote&gt;"Users do not need to opt into any unusual configuration; the leak occurs on the default code path whenever an affected token format is in use."&lt;/blockquote&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Three factors conspired to make this worse than a typical error message leak. GitHub Actions' built-in secret masker works by exact substring matching — but when Symfony Console renders the exception, it may wrap text or inject ANSI escape sequences, breaking the masker's pattern detection. The token sailed through unredacted.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;Who Was Exposed&lt;/h3&gt;&lt;p&gt;Any workflow that configured a &lt;b&gt;GITHUB_TOKEN&lt;/b&gt; or GitHub App installation token into Composer's authentication, then ran any Composer command, was affected if GitHub had already migrated that repository to the new token format. Crucially, popular Actions like shivammathur/setup-php do this automatically — no deliberate Composer auth setup required.&lt;/p&gt;&lt;p&gt;Packagist confirmed it is unaffected. Private Packagist also escaped exposure since GitHub had not yet issued the new token format for their GitHub App — and they've since applied the patch and audited their logs.&lt;/p&gt;&lt;p class="note"&gt;GitHub has rolled back the new token format rollout, buying the PHP ecosystem time to patch. The immediate urgency to disable GitHub Actions has passed, but the patch should still be applied before GitHub resumes the rollout.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Fix&lt;/h3&gt;&lt;p&gt;Composer 2.9.8 and 2.2.28 address both root causes. The exception message no longer includes the rejected token value — diagnostic output now identifies which credential failed without revealing its contents. Additionally, the validation character set now accepts -, matching GitHub's current structured token format. This second fix also protects against future credentials with similar character sets hitting the same error path.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What You Should Do Right Now&lt;/h3&gt;&lt;p&gt;Update Composer immediately with composer.phar self-update. If you use shivammathur/setup-php and did not pin the Composer tool to a specific version, you're likely already protected. If you pinned it, update the pin explicitly.&lt;/p&gt;&lt;p class="note tp"&gt;Run composer.phar self-update immediately to upgrade to Composer 2.9.8 (mainline) or 2.2.28 (LTS). Legacy users should target 1.10.28, though upgrading to 2.x is strongly recommended.&lt;/p&gt;&lt;p&gt;Review recent GitHub Actions job logs for any runs that printed token-shaped strings. Delete log contents where leaked tokens may not yet have expired — particularly for self-hosted runners, where the window can stretch to 24 hours. For any GitHub App installation tokens found in logs, revoke them immediately via the GitHub Apps API regardless of apparent expiry.&lt;/p&gt;&lt;p&gt;This incident is a sharp reminder that secret masking in CI is a last-resort safety net, not a primary control — and that incremental format changes in one tool can quietly break security assumptions in another, with no warning until credentials are already written to persistent logs.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipKVV4F3S6vYUGv9eN8wzPgZXjvXiApWySUQzN4t4vMbaHH0qJ5pDb0U5sA1IhGYoWGV_jGH1l6grIBudyBZX3lSWBgtsFx24ysGkQRroPCQc0meXAdB0AHhkYJhQLaEx8VaVf0gsluIa7NbUDgZHpew-jmeClHm4r1nbKKgCEL4yHakHEdOOEjQKNSHU/s72-c/composer-update.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>WhatsApp's New Incognito AI Chat Is Genuinely Private — But Read the Fine Print</title><link>https://www.cyberkendra.com/2026/05/whatsapps-new-incognito-ai-chat-is.html</link><category>Meta</category><category>Privacy</category><category>Whatsapp</category><pubDate>Wed, 13 May 2026 21:50:59 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-718691215789695544</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="WhatsApp Incognito Chat with Meta AI" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEaUttjSZHdIAoOfc2Di3Qdk4vJN3toXxqLoGI6grafE10XqvAdJllEXRujSy5A1ExVvsO0Hq6GItsk2mIpM0hyBfvDGi65gJ5gIkIxEhCAZZcRJML89B6ZGnZh7adnMVIjqsZIHD2Ar7pRl6ULti1_S6zXfgC8V8039z0tl-_qm7y4cNmU3QxNd1aCc/s16000/Incognito%20Chat.png.webp" title="WhatsApp Incognito Chat with Meta AI" /&gt;&lt;/div&gt;&lt;p&gt;WhatsApp today launched Incognito Chat with Meta AI, a mode where conversations are processed in a secure environment that even Meta cannot access, with messages disappearing by default once you close the session.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;It's a genuinely bold privacy claim from a company not historically associated with restraint when it comes to user data — and the technical architecture behind it is more sophisticated than the marketing suggests.&lt;/p&gt;&lt;p&gt;This isn't just a "delete after read" gimmick. Private Processing, the underlying system, is built on Trusted Execution Environments (&lt;a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" rel="nofollow" target="_blank"&gt;TEEs&lt;/a&gt;) — hardware-isolated enclaves where even the server operator cannot inspect what's being computed. Concretely, Meta is running AMD EPYC processors with SEV-SNP (Secure Encrypted Virtualisation-Secure Nested Paging), which encrypts virtual machine memory so that even the hypervisor — the software layer that normally has god-mode access to VMs — is locked out.&lt;/p&gt;&lt;p&gt;Your request travels from your phone through a third-party Oblivious HTTP relay (currently Fastly), which strips your IP address before it ever reaches Meta's infrastructure. An Anonymous Credentials Service authenticates you as a legitimate WhatsApp user without revealing you identity. The result: Meta's own load balancers route your request without knowing it's yours.&lt;/p&gt;&lt;p&gt;Before your device sends a single byte of conversation data, it cryptographically verifies that the server it's talking to is actually running the attested code — a process logged to a third-party transparency log operated by Cloudflare. If the code has been tampered with, your phone refuses to connect.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;How Private Processing Works — White Paper&amp;nbsp;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img border="0" data-original-height="812" data-original-width="1436" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtNd8BPwlbowDEvPcNty6vKZ6sWRIM7Txz3bQ3KaMRVSH3tS_-jIB5Q3W1jLzJXTD5kSJZCdzkBv5t3v5wM8hk3Sgpzmwz68Nrb2UGUb6qH-drH_WTfnSvtBh3vfx2dEmA7NtZpTOg_H41t-F_VO7j8GfA0Eg978ltBDOSzzYC1TuRDyCTIo-jgF_MpvM/s16000/Whatsapp-private-chat.webp" style="margin-left: auto; margin-right: auto;" /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;How Private Processing works&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/h3&gt;&lt;p&gt;Here's where it gets interesting — and where most coverage stops short. Meta's own technical white paper acknowledges two meaningful gaps.[&lt;a href="https://ai.meta.com/static-resource/private-processing-technical-whitepaper" rel="nofollow" target="_blank"&gt;PDF&lt;/a&gt;]&lt;/p&gt;&lt;p&gt;First, when AI inference requires multiple GPUs (which large language models routinely do), the NVLink interconnect between those GPUs is not encrypted on NVIDIA's Hopper platform. Meta acknowledges this is a potential interception avenue, mitigated mainly by NVLink's high bandwidth, making real-time sniffing difficult with currently available hardware. That's not a theoretical fix — it's a practical one.&lt;/p&gt;&lt;p&gt;Second, web search. When Meta AI needs real-time information, the search query leaves the TEE entirely and is sent to Meta infrastructure, which forwards it to external search providers. Queries are capped at 100 characters and limited to 5 per prompt, and Meta says searches are unlinked from user identity — but that still means data is leaving the privacy bubble. Users can disable web search, but it's on by default.&lt;/p&gt;&lt;p&gt;Prof. Alan Woodward, a cybersecurity expert at Surrey University, &lt;a href="https://www.bbc.com/news/articles/c99lmyr1dnxo" rel="nofollow" target="_blank"&gt;raised a concern&lt;/a&gt; that the disappearing, unretrievable nature of these chats creates an accountability vacuum — if an AI's response leads to harm, there's no chat history to investigate.&amp;nbsp;&lt;/p&gt;&lt;p&gt;WhatsApp head Will Cathcart acknowledged that the feature is initially text-only and that Meta AI's safety filters will refuse harmful requests more aggressively in this mode than in standard chats. Yahoo!&lt;/p&gt;&lt;p&gt;Cathcart said the mode "will steer the user towards helpful information if it can and then refuse and eventually even just stop interacting with the user completely" for harmful queries — but the inability to audit that process after the fact is a real trade-off users should understand before assuming total safety. ABC News&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What's Coming Next&lt;/h3&gt;&lt;p&gt;Meta is also building Side Chat with Meta AI, which will let users privately ask Meta AI about an ongoing WhatsApp conversation — summarising threads or answering context-aware questions — without disrupting the main chat. That feature is arriving later this year and is also protected by Private Processing. Engadget&lt;/p&gt;&lt;p&gt;The rollout of Incognito Chat is gradual across WhatsApp and the Meta AI app over the coming months. For users who routinely ask AI about health symptoms, financial decisions, or personal situations, the hardware-level privacy guarantee is meaningful — just not unconditional.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEaUttjSZHdIAoOfc2Di3Qdk4vJN3toXxqLoGI6grafE10XqvAdJllEXRujSy5A1ExVvsO0Hq6GItsk2mIpM0hyBfvDGi65gJ5gIkIxEhCAZZcRJML89B6ZGnZh7adnMVIjqsZIHD2Ar7pRl6ULti1_S6zXfgC8V8039z0tl-_qm7y4cNmU3QxNd1aCc/s72-c/Incognito%20Chat.png.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author><enclosure length="-1" type="application/pdf" url="https://ai.meta.com/static-resource/private-processing-technical-whitepaper"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>WhatsApp today launched Incognito Chat with Meta AI, a mode where conversations are processed in a secure environment that even Meta cannot access, with messages disappearing by default once you close the session.&amp;nbsp; It's a genuinely bold privacy claim from a company not historically associated with restraint when it comes to user data — and the technical architecture behind it is more sophisticated than the marketing suggests. This isn't just a "delete after read" gimmick. Private Processing, the underlying system, is built on Trusted Execution Environments (TEEs) — hardware-isolated enclaves where even the server operator cannot inspect what's being computed. Concretely, Meta is running AMD EPYC processors with SEV-SNP (Secure Encrypted Virtualisation-Secure Nested Paging), which encrypts virtual machine memory so that even the hypervisor — the software layer that normally has god-mode access to VMs — is locked out. Your request travels from your phone through a third-party Oblivious HTTP relay (currently Fastly), which strips your IP address before it ever reaches Meta's infrastructure. An Anonymous Credentials Service authenticates you as a legitimate WhatsApp user without revealing you identity. The result: Meta's own load balancers route your request without knowing it's yours. Before your device sends a single byte of conversation data, it cryptographically verifies that the server it's talking to is actually running the attested code — a process logged to a third-party transparency log operated by Cloudflare. If the code has been tampered with, your phone refuses to connect.How Private Processing Works — White Paper&amp;nbsp;How Private Processing works Here's where it gets interesting — and where most coverage stops short. Meta's own technical white paper acknowledges two meaningful gaps.[PDF] First, when AI inference requires multiple GPUs (which large language models routinely do), the NVLink interconnect between those GPUs is not encrypted on NVIDIA's Hopper platform. Meta acknowledges this is a potential interception avenue, mitigated mainly by NVLink's high bandwidth, making real-time sniffing difficult with currently available hardware. That's not a theoretical fix — it's a practical one. Second, web search. When Meta AI needs real-time information, the search query leaves the TEE entirely and is sent to Meta infrastructure, which forwards it to external search providers. Queries are capped at 100 characters and limited to 5 per prompt, and Meta says searches are unlinked from user identity — but that still means data is leaving the privacy bubble. Users can disable web search, but it's on by default. Prof. Alan Woodward, a cybersecurity expert at Surrey University, raised a concern that the disappearing, unretrievable nature of these chats creates an accountability vacuum — if an AI's response leads to harm, there's no chat history to investigate.&amp;nbsp; WhatsApp head Will Cathcart acknowledged that the feature is initially text-only and that Meta AI's safety filters will refuse harmful requests more aggressively in this mode than in standard chats. Yahoo! Cathcart said the mode "will steer the user towards helpful information if it can and then refuse and eventually even just stop interacting with the user completely" for harmful queries — but the inability to audit that process after the fact is a real trade-off users should understand before assuming total safety. ABC NewsWhat's Coming Next Meta is also building Side Chat with Meta AI, which will let users privately ask Meta AI about an ongoing WhatsApp conversation — summarising threads or answering context-aware questions — without disrupting the main chat. That feature is arriving later this year and is also protected by Private Processing. Engadget The rollout of Incognito Chat is gradual across WhatsApp and the Meta AI app over the coming months. For users who routinely ask AI about health symptoms, financial decisions, or personal situations, the hardware-level privacy guarantee is meaningful — just not unconditional.</itunes:subtitle><itunes:author>Vivek Gurung</itunes:author><itunes:summary>WhatsApp today launched Incognito Chat with Meta AI, a mode where conversations are processed in a secure environment that even Meta cannot access, with messages disappearing by default once you close the session.&amp;nbsp; It's a genuinely bold privacy claim from a company not historically associated with restraint when it comes to user data — and the technical architecture behind it is more sophisticated than the marketing suggests. This isn't just a "delete after read" gimmick. Private Processing, the underlying system, is built on Trusted Execution Environments (TEEs) — hardware-isolated enclaves where even the server operator cannot inspect what's being computed. Concretely, Meta is running AMD EPYC processors with SEV-SNP (Secure Encrypted Virtualisation-Secure Nested Paging), which encrypts virtual machine memory so that even the hypervisor — the software layer that normally has god-mode access to VMs — is locked out. Your request travels from your phone through a third-party Oblivious HTTP relay (currently Fastly), which strips your IP address before it ever reaches Meta's infrastructure. An Anonymous Credentials Service authenticates you as a legitimate WhatsApp user without revealing you identity. The result: Meta's own load balancers route your request without knowing it's yours. Before your device sends a single byte of conversation data, it cryptographically verifies that the server it's talking to is actually running the attested code — a process logged to a third-party transparency log operated by Cloudflare. If the code has been tampered with, your phone refuses to connect.How Private Processing Works — White Paper&amp;nbsp;How Private Processing works Here's where it gets interesting — and where most coverage stops short. Meta's own technical white paper acknowledges two meaningful gaps.[PDF] First, when AI inference requires multiple GPUs (which large language models routinely do), the NVLink interconnect between those GPUs is not encrypted on NVIDIA's Hopper platform. Meta acknowledges this is a potential interception avenue, mitigated mainly by NVLink's high bandwidth, making real-time sniffing difficult with currently available hardware. That's not a theoretical fix — it's a practical one. Second, web search. When Meta AI needs real-time information, the search query leaves the TEE entirely and is sent to Meta infrastructure, which forwards it to external search providers. Queries are capped at 100 characters and limited to 5 per prompt, and Meta says searches are unlinked from user identity — but that still means data is leaving the privacy bubble. Users can disable web search, but it's on by default. Prof. Alan Woodward, a cybersecurity expert at Surrey University, raised a concern that the disappearing, unretrievable nature of these chats creates an accountability vacuum — if an AI's response leads to harm, there's no chat history to investigate.&amp;nbsp; WhatsApp head Will Cathcart acknowledged that the feature is initially text-only and that Meta AI's safety filters will refuse harmful requests more aggressively in this mode than in standard chats. Yahoo! Cathcart said the mode "will steer the user towards helpful information if it can and then refuse and eventually even just stop interacting with the user completely" for harmful queries — but the inability to audit that process after the fact is a real trade-off users should understand before assuming total safety. ABC NewsWhat's Coming Next Meta is also building Side Chat with Meta AI, which will let users privately ask Meta AI about an ongoing WhatsApp conversation — summarising threads or answering context-aware questions — without disrupting the main chat. That feature is arriving later this year and is also protected by Private Processing. Engadget The rollout of Incognito Chat is gradual across WhatsApp and the Meta AI app over the coming months. For users who routinely ask AI about health symptoms, financial decisions, or personal situations, the hardware-level privacy guarantee is meaningful — just not unconditional.</itunes:summary><itunes:keywords>Computer,technology,tech,IT,security,Gadgets,Telecom</itunes:keywords></item><item><title>Microsoft's AI Just Found 16 Windows Vulnerabilities Humans Missed — And It's Only Getting Started</title><link>https://www.cyberkendra.com/2026/05/microsofts-ai-just-found-16-windows.html</link><category>AI</category><category>Microsoft</category><category>Security</category><pubDate>Wed, 13 May 2026 07:59:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-3800181595003500409</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Microsoft's MDASH AI system" border="0" data-original-height="900" data-original-width="1600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjevVcAEvnBYYVdrhhyphenhyphenFxWE00_4uXA826zRW4YJ3sGzF24-B970P1wVPi3AOJ4k5VobdejCAPf613J3_Lq1xt5DhgSLCIZ_34UFmz-Uj86GZvoRQMRszYUdHXHXhyphenhypheneXu89IyoSjLJvM4cXwGnys20XVsbc1VbhN6em_GGaJ2GjvbLnbwoB7nLr4ZNsOIrA/s16000/mdash.webp" title="Microsoft's MDASH AI system" /&gt;&lt;/div&gt;&lt;p&gt;For decades, finding dangerous bugs buried deep inside Windows has been a job for elite human researchers armed with time and hard-won instinct. Today's May 2026 Patch Tuesday quietly marks the moment that changes — because 16 of the vulnerabilities Microsoft patched this month were found not by a human, but by an AI system that argues with itself.&lt;/p&gt;&lt;p&gt;Microsoft's CEO, Satya Nadella, &lt;a href="https://x.com/satyanadella/status/2054351354156794163" rel="nofollow" target="_blank"&gt;noted&lt;/a&gt; that their new multi-model agentic security system brings together more than 100 specialized agents across frontier and custom models to find exploitable bugs, delivering top performance on the CyberGym benchmark. Microsoft used it ahead of Patch Tuesday to help find and fix 16 vulnerabilities.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Microsoft's Autonomous Code Security (ACS) team &lt;a href="new multi-model agentic security system brings together more than 100 specialized agents across frontier and custom models to find exploitable bugs, delivering top performance on the CyberGym benchmark.  We used it ahead of Patch Tuesday to help find and fix 16 vulnerabilities. Today we’re announcing that customers can sign up to test it in private preview." rel="nofollow" target="_blank"&gt;publicly revealed&lt;/a&gt; &lt;b&gt;MDASH &lt;/b&gt;— its multi-model agentic scanning harness — alongside this month's security bulletin. The system orchestrates over 100 specialized AI agents across an ensemble of frontier and distilled models, each assigned a distinct role: auditor, debater, deduplicator, or prover.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The architecture is deliberately adversarial — one agent flags a suspicious code path, another argues against it, and a finding only advances if it survives that cross-examination. The whole point is to kill false positives before they waste an engineer's morning.&lt;/p&gt;&lt;p&gt;The results are hard to argue with. On the public CyberGym benchmark — 1,507 real-world vulnerabilities drawn from 188 open-source projects — MDASH scored 88.45%, leading the leaderboard by roughly five points over the next competitor.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Tested against five years of confirmed Microsoft Security Response Center (MSRC) cases in two of Windows' most scrutinized kernel components, it achieved 96% recall on &lt;code&gt;clfs.sys&lt;/code&gt; and a clean 100% on &lt;code&gt;tcpip.sys&lt;/code&gt;. On a private test driver seeded with 21 deliberately injected vulnerabilities, it found all 21 with zero false positives.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;The Bugs That Prove the Point&lt;/h3&gt;&lt;p&gt;Two of this month's Critical findings demonstrate exactly why a single AI model — or a single human — would likely have missed them.&lt;/p&gt;&lt;p&gt;&lt;b&gt;CVE-2026-33827&lt;/b&gt; is a use-after-free (UAF) in the Windows kernel TCP/IP stack, reachable by a remote, unauthenticated attacker via specially crafted IPv4 packets that carry the SSRR routing option.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The flaw isn't obvious because the vulnerable pointer release and its later reuse are separated by multiple validation checks and alternate control flow branches. No single function view connects the dots. MDASH caught it by cross-referencing analogous patterns elsewhere in the codebase, flagging the inconsistency — exactly what a senior human researcher would do after days of staring at the same code.&lt;/p&gt;&lt;p&gt;&lt;b&gt;CVE-2026-33824&lt;/b&gt; is worse from an exploitation standpoint. It lives in &lt;code&gt;ikeext.dll&lt;/code&gt;, the Windows IKEv2 service that handles VPN keying for DirectAccess and Always-On VPN. A shallow memcpy during fragment reassembly leaves two owners holding the same heap pointer — and both eventually free it. That double-free spans six source files.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Two UDP packets, no race condition, no special timing required. Because IKEEXT runs as LocalSystem within svchost.exe, successful exploitation results in full system compromise before the attacker has authenticated to anything. Both bugs were patched in April and are now publicly disclosed.&lt;/p&gt;&lt;p&gt;These 16 CVEs don't exist in isolation. May's Patch Tuesday is a 120+ vulnerability release — fixing 120 flaws, 17 of which are rated Critical and 14 of which are remote code execution vulnerabilities. The network attack surface this month is particularly wide: high-value targets include Windows DNS Client (CVE-2026-41096), Netlogon (CVE-2026-41089), Windows Native Wi-Fi Miniport, and multiple Office and Word RCEs — components routinely exposed to untrusted network traffic and documents.&lt;/p&gt;&lt;p&gt;Critically, MDASH isn't just another scanner. Microsoft's architecture deliberately separates the system from any single model — when a better model ships, swapping it in is a configuration change, not a rebuild. That's the strategic bet: the pipeline outlasts the model.&lt;/p&gt;&lt;p&gt;The broader industry is feeling the same pressure — Anthropic's Mythos vulnerability discovery model recently surfaced 271 vulnerabilities in Firefox 150 prior to release, driving an unprecedented coalition of 12 companies, including Apple, Amazon, Cisco, and Microsoft, into a shared AI security research agreement called Project Glasswing.&amp;nbsp;&lt;/p&gt;&lt;p&gt;NIST has already announced it can no longer enrich every CVE at the current volume. Oracle moved from quarterly to monthly patch cycles. The pipeline of AI-discovered bugs is now moving faster than the industry's traditional patching machinery was designed to handle.&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;What You Should Do Right Now&lt;/h3&gt;&lt;p&gt;If you manage Windows systems, this month's priorities differ from usual. The MDASH-discovered flaws are concentrated in network-exposed kernel components — &lt;code&gt;tcpip.sys&lt;/code&gt;, &lt;code&gt;ikeext.dll&lt;/code&gt;, &lt;code&gt;netlogon.dll&lt;/code&gt;, and &lt;code&gt;dnsapi.dll&lt;/code&gt; — meaning internet-facing machines, VPN gateways, and domain controllers are the sharpest edge of risk. Patch those first. Microsoft Office RCEs exploitable via the preview pane are a close second priority for end-user environments.&lt;/p&gt;&lt;p&gt;There's also a harder deadline looming: the &lt;a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/secure-boot-playbook-for-certificates-expiring-in-2026/4469235" rel="nofollow" target="_blank"&gt;Secure Boot certificate expiration&lt;/a&gt; on June 26, 2026, gives organizations roughly 45 days to complete deployment before Windows devices enter a degraded security state. May's Patch Tuesday is the last comfortable window to handle that at scale.&lt;/p&gt;&lt;p&gt;The AI didn't just find these bugs. It proved to them — by constructing triggering inputs, validating exploitability, and handing engineers confirmed findings rather than a speculation queue. That's the real shift. The question for defenders going forward is less "can AI find bugs" and more "how fast can we patch what it finds"&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjevVcAEvnBYYVdrhhyphenhyphenFxWE00_4uXA826zRW4YJ3sGzF24-B970P1wVPi3AOJ4k5VobdejCAPf613J3_Lq1xt5DhgSLCIZ_34UFmz-Uj86GZvoRQMRszYUdHXHXhyphenhypheneXu89IyoSjLJvM4cXwGnys20XVsbc1VbhN6em_GGaJ2GjvbLnbwoB7nLr4ZNsOIrA/s72-c/mdash.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Googlebook: Google’s Android laptop platform for Gemini PCs</title><link>https://www.cyberkendra.com/2026/05/googlebook-googles-android-laptop.html</link><category>Android</category><category>Google</category><category>Googlebook</category><pubDate>Tue, 12 May 2026 21:38:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-808499986354278093</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Googlebook features" border="0" data-original-height="928" data-original-width="1650" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieQHqF_Ti1EPSCdv8ZKxnyXxpcfa1NhRhcrMhmlgonY7fuxQHC4OlkhmoCvxO2maeMvmMQLLisPqf1AzRf_iB7M7h51oa64-oRF6aAvddJzAScUE33hc8oHnQGectO_TJ0C7eC9ETVuukIgsIP-4RPNJ_1Imkff-GlcAMecA2JGmSgdhrt1rnMBVIsX3k/s16000/goodbye-chromebook-google-has-announced-a-new-generation-of-v0-e4oewrg34p0h1.webp" title="Googlebook features" /&gt;&lt;/div&gt;&lt;p&gt;&lt;b&gt;Update&lt;/b&gt;-&amp;nbsp;&lt;a href="https://www.cyberkendra.com/2026/05/google-confirms-googlebook-adding.html" target="_blank"&gt;Google Confirms Googlebook Adding Gemini Intelligence and Android apps&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Fifteen years after Chromebook redefined affordable laptops, Google is quietly retiring the concept — and replacing it with something far more ambitious.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;A leaked internal slide, first published by XDA before being pulled (a near-certain sign of a pre-announcement takedown), reveals &lt;b&gt;Googlebook&lt;/b&gt;: a new laptop platform that puts Gemini AI at the centre of the operating system itself, not as an app or assistant, but as the interface layer.&lt;/p&gt;&lt;p&gt;The most technically striking feature isn't the hardware or the branding — it's &lt;b&gt;Magic Pointer&lt;/b&gt;, developed in partnership with Google DeepMind. The AI-driven cursor doesn't just move where you click; it reads what's on your screen and proactively suggests actions. Spot a date in an email? Magic Pointer surfaces a calendar invite. Open two photos? It can composite them into a new image on the spot.&lt;/p&gt;&lt;p&gt;&lt;style&gt;
/* ── RESET (scoped) ── */
.glc-wrap*,.glc-wrap*::before,.glc-wrap*::after{box-sizing:border-box;margin:0;padding:0}
 
/* ── SHELL ── */
.glc-wrap{
  --gc-blue:#1a73e8;
  --gc-green:#3ddc84;
  --gc-navy:#0d1b2a;
  --gc-white:#fff;
  --gc-gray1:#f8f9fa;
  --gc-gray2:#e8eaed;
  --gc-gray3:#bdc1c6;
  --gc-gray4:#5f6368;
  --gc-text:#202124;
  --gc-radius:20px;
  --gc-thumb:72px;
  --gc-speed:580ms;
  font-family:'Google Sans',sans-serif;
  background:var(--gc-white);
  border-radius:var(--gc-radius);
  overflow:hidden;
  box-shadow:0 1px 3px rgba(0,0,0,.08),0 8px 40px rgba(0,0,0,.06);
  border:1px solid var(--gc-gray2);
  max-width:900px;
  margin:40px auto;
  user-select:none;
}
 
/* ── HEADER CHIP ── */
.glc-header{
  display:flex;align-items:center;justify-content:space-between;
  padding:18px 28px 14px;
  border-bottom:1px solid var(--gc-gray2);
}
.glc-chip{
  display:inline-flex;align-items:center;gap:7px;
  background:rgba(61,220,132,.1);
  border:1px solid rgba(61,220,132,.25);
  border-radius:100px;padding:5px 14px;
  font-size:12.5px;font-weight:500;color:#1e7e4a;letter-spacing:.2px;
}
.glc-chip-dot{
  width:7px;height:7px;border-radius:50%;background:var(--gc-green);
  box-shadow:0 0 0 3px rgba(61,220,132,.2);
  animation:glc-breathe 2.4s ease-in-out infinite;
}
@keyframes glc-breathe{0%,100%{box-shadow:0 0 0 3px rgba(61,220,132,.2)}50%{box-shadow:0 0 0 6px rgba(61,220,132,.12)}}
.glc-counter{
  font-size:13px;color:var(--gc-gray4);font-weight:500;letter-spacing:.2px;
}
.glc-counter span{color:var(--gc-text);font-weight:600;}
 
/* ── STAGE ── */
.glc-stage{
  position:relative;overflow:hidden;
  background:var(--gc-gray1);
  aspect-ratio:16/10;
  cursor:pointer;
}
/* subtle vignette */
.glc-stage::after{
  content:'';position:absolute;inset:0;pointer-events:none;z-index:3;
  background:radial-gradient(ellipse 120% 100% at 50% 50%,transparent 55%,rgba(0,0,0,.04) 100%);
}
 
/* ── SLIDES ── */
.glc-track{
  display:flex;width:100%;height:100%;
  transition:transform var(--gc-speed) cubic-bezier(.35,.0,.2,1);
  will-change:transform;
}
.glc-slide{
  min-width:100%;height:100%;
  display:flex;align-items:center;justify-content:center;
  overflow:hidden;position:relative;
}
.glc-slide img{
  width:100%;height:100%;
  object-fit:contain;
  transition:transform .6s cubic-bezier(.25,.46,.45,.94),
             filter .4s ease;
  transform:scale(1);
  filter:brightness(1);
}
.glc-wrap:not(.glc-dragging) .glc-slide.glc-active img{
  transform:scale(1.015);
}
.glc-slide img:hover{filter:brightness(1.02);}
 
/* light overlay on inactive */
.glc-slide::before{
  content:'';position:absolute;inset:0;z-index:2;
  background:rgba(248,249,250,.55);
  transition:opacity var(--gc-speed) ease;pointer-events:none;
}
.glc-slide.glc-active::before{opacity:0;}
 
/* ── ARROWS ── */
.glc-arrow{
  position:absolute;top:50%;transform:translateY(-50%);z-index:10;
  width:48px;height:48px;border-radius:50%;border:none;cursor:pointer;
  background:var(--gc-white);
  box-shadow:0 1px 4px rgba(0,0,0,.14),0 4px 16px rgba(0,0,0,.1);
  display:flex;align-items:center;justify-content:center;
  transition:all .2s ease;opacity:0;
  color:var(--gc-text);
}
.glc-stage:hover .glc-arrow{opacity:1;}
.glc-arrow:hover{
  background:var(--gc-blue);color:var(--gc-white);
  box-shadow:0 4px 20px rgba(26,115,232,.35);transform:translateY(-50%) scale(1.08);
}
.glc-arrow:active{transform:translateY(-50%) scale(.96);}
.glc-arrow-prev{left:16px;}
.glc-arrow-next{right:16px;}
.glc-arrow svg{width:20px;height:20px;flex-shrink:0;}
 
/* ── DOTS ── */
.glc-dots{
  display:flex;align-items:center;justify-content:center;gap:6px;
  padding:14px 0 0;
}
.glc-dot{
  width:8px;height:8px;border-radius:100px;border:none;cursor:pointer;
  background:var(--gc-gray2);
  transition:all .3s cubic-bezier(.35,0,.2,1);padding:0;
}
.glc-dot.glc-active{
  width:24px;background:var(--gc-blue);
}
.glc-dot:hover:not(.glc-active){background:var(--gc-gray3);}
 
/* ── THUMBNAILS ── */
.glc-thumbs{
  display:flex;align-items:center;gap:10px;
  padding:16px 24px 20px;overflow-x:auto;scrollbar-width:none;
}
.glc-thumbs::-webkit-scrollbar{display:none;}
.glc-thumb{
  width:var(--gc-thumb);height:var(--gc-thumb);border-radius:12px;
  overflow:hidden;flex-shrink:0;cursor:pointer;position:relative;
  border:2px solid transparent;
  transition:all .25s cubic-bezier(.35,0,.2,1);
  background:var(--gc-gray2);
}
.glc-thumb img{
  width:100%;height:100%;object-fit:cover;
  transition:transform .3s ease,filter .3s ease;
  filter:brightness(.88) saturate(.8);
}
.glc-thumb:hover img{filter:brightness(.96) saturate(1);transform:scale(1.06);}
.glc-thumb.glc-active{
  border-color:var(--gc-blue);
  box-shadow:0 0 0 3px rgba(26,115,232,.18);
}
.glc-thumb.glc-active img{filter:brightness(1) saturate(1);}
 
/* ── PROGRESS BAR ── */
.glc-progress{
  position:absolute;bottom:0;left:0;height:3px;z-index:10;
  background:linear-gradient(90deg,var(--gc-blue),var(--gc-green));
  border-radius:0 2px 2px 0;
  transition:width .1s linear;
  width:0%;
}
 
/* ── FULLSCREEN BUTTON ── */
.glc-fullscreen{
  position:absolute;bottom:14px;right:14px;z-index:10;
  width:36px;height:36px;border-radius:8px;border:none;cursor:pointer;
  background:rgba(255,255,255,.9);backdrop-filter:blur(8px);
  display:flex;align-items:center;justify-content:center;
  box-shadow:0 1px 4px rgba(0,0,0,.12);
  transition:all .2s ease;opacity:0;color:var(--gc-text);
}
.glc-stage:hover .glc-fullscreen{opacity:1;}
.glc-fullscreen:hover{background:var(--gc-white);transform:scale(1.08);}
.glc-fullscreen svg{width:16px;height:16px;}
 
/* ── LIGHTBOX ── */
.glc-lightbox{
  position:fixed;inset:0;z-index:99999;
  background:rgba(0,0,0,.92);
  display:none;align-items:center;justify-content:center;
  cursor:zoom-out;
}
.glc-lightbox.glc-open{display:flex;}
.glc-lightbox img{
  max-width:90vw;max-height:90vh;
  border-radius:12px;
  box-shadow:0 24px 80px rgba(0,0,0,.6);
  object-fit:contain;
  cursor:default;
  animation:glc-pop .28s cubic-bezier(.34,1.56,.64,1);
}
@keyframes glc-pop{from{opacity:0;transform:scale(.88)}to{opacity:1;transform:scale(1)}}
.glc-lb-close{
  position:fixed;top:20px;right:24px;
  width:44px;height:44px;border-radius:50%;border:none;cursor:pointer;
  background:rgba(255,255,255,.12);color:#fff;
  display:flex;align-items:center;justify-content:center;
  transition:background .2s;
  font-size:22px;line-height:1;
}
.glc-lb-close:hover{background:rgba(255,255,255,.22);}
.glc-lb-nav{
  position:fixed;top:50%;transform:translateY(-50%);
  width:52px;height:52px;border-radius:50%;border:none;cursor:pointer;
  background:rgba(255,255,255,.1);color:#fff;
  display:flex;align-items:center;justify-content:center;
  transition:background .2s;
}
.glc-lb-nav:hover{background:rgba(255,255,255,.22);}
.glc-lb-prev{left:20px;}
.glc-lb-next{right:20px;}
.glc-lb-nav svg{width:22px;height:22px;}
.glc-lb-counter{
  position:fixed;bottom:24px;left:50%;transform:translateX(-50%);
  font-family:'Google Sans',sans-serif;font-size:13px;font-weight:500;
  color:rgba(255,255,255,.7);letter-spacing:.5px;
}
&lt;/style&gt;
 
&lt;!--═══════════ CAROUSEL MARKUP ═══════════--&gt;
&lt;/p&gt;&lt;div aria-label="Aluminium OS Screenshots" class="glc-wrap" id="glc-main" role="region"&gt;
 
  &lt;!--Header--&gt;
  &lt;div class="glc-header"&gt;
    &lt;div class="glc-chip"&gt;
      &lt;span class="glc-chip-dot"&gt;&lt;/span&gt;
      Googlebook · First Look
    &lt;/div&gt;
    &lt;div class="glc-counter"&gt;&lt;span id="glc-cur"&gt;1&lt;/span&gt; / &lt;span id="glc-total"&gt;6&lt;/span&gt;&lt;/div&gt;
  &lt;/div&gt;
 
  &lt;!--Stage--&gt;
  &lt;div aria-live="polite" class="glc-stage" id="glc-stage"&gt;
 
    &lt;!--Slides track--&gt;
    &lt;div class="glc-track" id="glc-track"&gt;
      &lt;div class="glc-slide glc-active" data-index="0"&gt;
        &lt;img alt="Googlebook" draggable="false" loading="eager" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAcFeL19iMTGvLb4HFrCfXcHS_GK2UVyydeUfHDUcbemXKvDFcEQkRavocGBeKs8j7sb1LzwwFUfDp7lKWsjUQEZJbiCiPC_cWqSYGRkFwUljBb58OCoL3DeFJ7tLHYtqOlkWiJLB4i48rFi855aB_n3vPJzlRKl_a82c52uLeBdBcaS2IhbjdU-HTJes/s1600/googlebook.jpg" /&gt;
      &lt;/div&gt;
      &lt;div class="glc-slide" data-index="1"&gt;
        &lt;img alt="Googlebook leak" draggable="false" loading="lazy" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlkzHlrzItcfh2BDDqFjrBjJ_qy__knDxnnIxQc5p5n8Q59zR0WJn3cSIPM1o6dmcApQ9eWe-Ju346Oov9jSAVOSKBU_PhdtGe58ox6Rjc_T0Kf1oty0vSX47J_0ongLL-DoeQwqeqKQ-m7H2ptuYAU3CzwFN-h4qdBaymZXMxU2FG9c3bG9xnkbwJen8/s1650/googlebook-side-view.jpg" /&gt;
      &lt;/div&gt;
      &lt;div class="glc-slide" data-index="2"&gt;
        &lt;img alt="Googlebook look" draggable="false" loading="lazy" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh76A27sWz2ssXnOLYgwk4RZa14zCGugx1VkUVVZBxAVd_p-jkaC6aygdc9PUgaE3FZhh8SfOhnuGIhWYht9He7eRhyphenhyphenSM0hMeTYMGa3gewX2C9LCgx6nsJJcQuz8nw0fDcsvDCxTU9tUE-u1rw_RJEkYPEwWjUZ7EOLUVDkZo2OcWiY2W90wCquZuZenrQ/s1650/goodbye-chromebook-google-has-announced-a-new-generation-of-v0-sbl3vrn24p0h1.webp" /&gt;
      &lt;/div&gt;
    &lt;/div&gt;
 
    &lt;!--Arrow buttons--&gt;
    &lt;button aria-label="Previous image" class="glc-arrow glc-arrow-prev" id="glc-prev"&gt;
      &lt;svg fill="none" stroke-linecap="round" stroke-linejoin="round" stroke-width="2.2" stroke="currentColor" viewbox="0 0 24 24"&gt;
        &lt;path d="M15 18l-6-6 6-6"&gt;
      &lt;/path&gt;&lt;/svg&gt;
    &lt;/button&gt;
    &lt;button aria-label="Next image" class="glc-arrow glc-arrow-next" id="glc-next"&gt;
      &lt;svg fill="none" stroke-linecap="round" stroke-linejoin="round" stroke-width="2.2" stroke="currentColor" viewbox="0 0 24 24"&gt;
        &lt;path d="M9 18l6-6-6-6"&gt;
      &lt;/path&gt;&lt;/svg&gt;
    &lt;/button&gt;
 
    &lt;!--Fullscreen--&gt;
    &lt;button aria-label="View full size" class="glc-fullscreen" id="glc-zoom"&gt;
      &lt;svg fill="none" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" stroke="currentColor" viewbox="0 0 24 24"&gt;
        &lt;path d="M8 3H5a2 2 0 0 0-2 2v3m18 0V5a2 2 0 0 0-2-2h-3m0 18h3a2 2 0 0 0 2-2v-3M3 16v3a2 2 0 0 0 2 2h3"&gt;
      &lt;/path&gt;&lt;/svg&gt;
    &lt;/button&gt;
 
    &lt;!--Progress bar--&gt;
    &lt;div class="glc-progress" id="glc-bar"&gt;&lt;/div&gt;
  &lt;/div&gt;
 
  &lt;!--Dot indicators--&gt;
  &lt;div aria-label="Slide navigation" class="glc-dots" id="glc-dots" role="tablist"&gt;
    &lt;button aria-label="Slide 1" aria-selected="true" class="glc-dot glc-active" data-index="0" role="tab"&gt;&lt;/button&gt;
    &lt;button aria-label="Slide 2" aria-selected="false" class="glc-dot" data-index="1" role="tab"&gt;&lt;/button&gt;
    &lt;button aria-label="Slide 3" aria-selected="false" class="glc-dot" data-index="2" role="tab"&gt;&lt;/button&gt;
  &lt;/div&gt;
 
  &lt;!--Thumbnails--&gt;
  &lt;div aria-label="Image thumbnails" class="glc-thumbs" id="glc-thumbs"&gt;
    &lt;button aria-label="Go to image 1" class="glc-thumb glc-active" data-index="0"&gt;
      &lt;img alt="" loading="eager" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAcFeL19iMTGvLb4HFrCfXcHS_GK2UVyydeUfHDUcbemXKvDFcEQkRavocGBeKs8j7sb1LzwwFUfDp7lKWsjUQEZJbiCiPC_cWqSYGRkFwUljBb58OCoL3DeFJ7tLHYtqOlkWiJLB4i48rFi855aB_n3vPJzlRKl_a82c52uLeBdBcaS2IhbjdU-HTJes/s1600/googlebook.jpg" /&gt;
    &lt;/button&gt;
    &lt;button aria-label="Go to image 2" class="glc-thumb" data-index="1"&gt;
      &lt;img alt="" loading="lazy" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlkzHlrzItcfh2BDDqFjrBjJ_qy__knDxnnIxQc5p5n8Q59zR0WJn3cSIPM1o6dmcApQ9eWe-Ju346Oov9jSAVOSKBU_PhdtGe58ox6Rjc_T0Kf1oty0vSX47J_0ongLL-DoeQwqeqKQ-m7H2ptuYAU3CzwFN-h4qdBaymZXMxU2FG9c3bG9xnkbwJen8/s1650/googlebook-side-view.jpg" /&gt;
    &lt;/button&gt;
    &lt;button aria-label="Go to image 3" class="glc-thumb" data-index="2"&gt;
      &lt;img alt="" loading="lazy" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh76A27sWz2ssXnOLYgwk4RZa14zCGugx1VkUVVZBxAVd_p-jkaC6aygdc9PUgaE3FZhh8SfOhnuGIhWYht9He7eRhyphenhyphenSM0hMeTYMGa3gewX2C9LCgx6nsJJcQuz8nw0fDcsvDCxTU9tUE-u1rw_RJEkYPEwWjUZ7EOLUVDkZo2OcWiY2W90wCquZuZenrQ/s1650/goodbye-chromebook-google-has-announced-a-new-generation-of-v0-sbl3vrn24p0h1.webp" /&gt;
    &lt;/button&gt;
     &lt;/div&gt;
&lt;/div&gt;
 
&lt;!--═══════════ LIGHTBOX ═══════════--&gt;
&lt;div aria-label="Image lightbox" aria-modal="true" class="glc-lightbox" id="glc-lb" role="dialog"&gt;
  &lt;button aria-label="Close lightbox" class="glc-lb-close" id="glc-lb-close"&gt;✕&lt;/button&gt;
  &lt;button aria-label="Previous image" class="glc-lb-nav glc-lb-prev" id="glc-lb-prev"&gt;
    &lt;svg fill="none" stroke-linecap="round" stroke-linejoin="round" stroke-width="2.2" stroke="currentColor" viewbox="0 0 24 24"&gt;&lt;path d="M15 18l-6-6 6-6"&gt;&lt;/path&gt;&lt;/svg&gt;
  &lt;/button&gt;
  &lt;img alt="Full size view" id="glc-lb-img" src="" /&gt;
  &lt;button aria-label="Next image" class="glc-lb-nav glc-lb-next" id="glc-lb-next"&gt;
    &lt;svg fill="none" stroke-linecap="round" stroke-linejoin="round" stroke-width="2.2" stroke="currentColor" viewbox="0 0 24 24"&gt;&lt;path d="M9 18l6-6-6-6"&gt;&lt;/path&gt;&lt;/svg&gt;
  &lt;/button&gt;
  &lt;div class="glc-lb-counter" id="glc-lb-counter"&gt;1 / 6&lt;/div&gt;
&lt;/div&gt;
 
&lt;script&gt;
(function(){
  'use strict';
 
  /* ── Config ── */
  var AUTO_MS    = 5000;   /* autoplay interval */
  var TOTAL      = 3;
  var current    = 0;
  var isPlaying  = true;
  var timer      = null;
  var progTimer  = null;
  var progStart  = null;
  var progPaused = 0;
  var isDragging = false;
  var dragStartX = 0;
  var dragDelta  = 0;
 
  /* ── Elements ── */
  var wrap    = document.getElementById('glc-main');
  var track   = document.getElementById('glc-track');
  var slides  = [].slice.call(track.querySelectorAll('.glc-slide'));
  var dots    = [].slice.call(document.getElementById('glc-dots').querySelectorAll('.glc-dot'));
  var thumbs  = [].slice.call(document.getElementById('glc-thumbs').querySelectorAll('.glc-thumb'));
  var cur$    = document.getElementById('glc-cur');
  var bar     = document.getElementById('glc-bar');
  var lb      = document.getElementById('glc-lb');
  var lbImg   = document.getElementById('glc-lb-img');
  var lbCtr   = document.getElementById('glc-lb-counter');
  var stage   = document.getElementById('glc-stage');
 
  /* ── Go to slide ── */
  function goTo(n, skipProgress){
    n = ((n % TOTAL) + TOTAL) % TOTAL;
    slides[current].classList.remove('glc-active');
    dots[current].classList.remove('glc-active');
    dots[current].setAttribute('aria-selected','false');
    thumbs[current].classList.remove('glc-active');
 
    current = n;
 
    slides[current].classList.add('glc-active');
    dots[current].classList.add('glc-active');
    dots[current].setAttribute('aria-selected','true');
    thumbs[current].classList.add('glc-active');
    cur$.textContent = current + 1;
 
    track.style.transform = 'translateX(-' + (current * 100) + '%)';
 
    /* scroll thumb into view */
    var t = thumbs[current];
    t.parentNode.scrollTo({ left: t.offsetLeft - 24, behavior:'smooth' });
 
    if(!skipProgress){ resetProgress(); }
  }
 
  /* ── Progress bar ── */
  function resetProgress(){
    bar.style.transition = 'none';
    bar.style.width = '0%';
    progPaused = 0;
    if(isPlaying) startProgress();
  }
  function startProgress(){
    progStart = performance.now() - progPaused;
    function tick(now){
      if(!isPlaying){ progPaused = now - progStart; return; }
      var elapsed = now - progStart;
      var pct = Math.min(elapsed / AUTO_MS * 100, 100);
      bar.style.transition = 'width .1s linear';
      bar.style.width = pct + '%';
      if(pct &lt; 100){ progTimer = requestAnimationFrame(tick); }
    }
    progTimer = requestAnimationFrame(tick);
  }
  function pauseProgress(){
    if(progTimer){ cancelAnimationFrame(progTimer); progTimer = null; }
    progPaused = performance.now() - (progStart || performance.now());
  }
 
  /* ── Autoplay ── */
  function startAuto(){
    clearInterval(timer);
    timer = setInterval(function(){ goTo(current + 1); }, AUTO_MS);
    startProgress();
    isPlaying = true;
  }
  function stopAuto(){
    clearInterval(timer);
    pauseProgress();
    isPlaying = false;
  }
 
  /* ── Touch / Mouse drag ── */
  function onDragStart(clientX){
    isDragging = false;
    dragStartX = clientX;
    dragDelta  = 0;
    wrap.classList.remove('glc-dragging');
  }
  function onDragMove(clientX){
    dragDelta = clientX - dragStartX;
    if(Math.abs(dragDelta) &gt; 6){ isDragging = true; wrap.classList.add('glc-dragging'); }
  }
  function onDragEnd(){
    if(isDragging){
      if(dragDelta &lt; -50)       goTo(current + 1);
      else if(dragDelta &gt; 50)   goTo(current - 1);
      else track.style.transform = 'translateX(-'+(current*100)+'%)';
    }
    isDragging = false;
    wrap.classList.remove('glc-dragging');
  }
 
  stage.addEventListener('mousedown', function(e){ onDragStart(e.clientX); });
  document.addEventListener('mousemove', function(e){ if(dragStartX) onDragMove(e.clientX); });
  document.addEventListener('mouseup', function(e){ if(dragStartX){ onDragEnd(); dragStartX=0; } });
  stage.addEventListener('touchstart', function(e){ onDragStart(e.touches[0].clientX); }, {passive:true});
  stage.addEventListener('touchmove',  function(e){ onDragMove(e.touches[0].clientX);  }, {passive:true});
  stage.addEventListener('touchend',   function(){   onDragEnd(); dragStartX=0; });
 
  /* ── Arrow clicks ── */
  document.getElementById('glc-prev').addEventListener('click', function(){ goTo(current - 1); });
  document.getElementById('glc-next').addEventListener('click', function(){ goTo(current + 1); });
 
  /* ── Dot clicks ── */
  dots.forEach(function(d){
    d.addEventListener('click', function(){ goTo(parseInt(this.dataset.index)); });
  });
 
  /* ── Thumb clicks ── */
  thumbs.forEach(function(t){
    t.addEventListener('click', function(){ goTo(parseInt(this.dataset.index)); });
  });
 
  /* ── Pause on hover ── */
  wrap.addEventListener('mouseenter', function(){ if(isPlaying){ stopAuto(); } });
  wrap.addEventListener('mouseleave', function(){
    isPlaying = true;
    startAuto();
  });
 
  /* ── Keyboard navigation ── */
  document.addEventListener('keydown', function(e){
    if(lb.classList.contains('glc-open')){
      if(e.key==='ArrowLeft')  lbNav(-1);
      if(e.key==='ArrowRight') lbNav(+1);
      if(e.key==='Escape')     closeLb();
      return;
    }
    if(document.activeElement &amp;&amp; wrap.contains(document.activeElement)){
      if(e.key==='ArrowLeft')  { goTo(current - 1); e.preventDefault(); }
      if(e.key==='ArrowRight') { goTo(current + 1); e.preventDefault(); }
    }
  });
 
  /* ── Lightbox ── */
  var srcs = slides.map(function(s){ return s.querySelector('img').src; });
  var lbCurrent = 0;
 
  function openLb(n){
    lbCurrent = n;
    lbImg.src = srcs[n];
    lbImg.alt = 'Aluminium OS screenshot ' + (n+1);
    lbCtr.textContent = (n+1) + ' / ' + TOTAL;
    lb.classList.add('glc-open');
    document.body.style.overflow = 'hidden';
    stopAuto();
  }
  function closeLb(){
    lb.classList.remove('glc-open');
    document.body.style.overflow = '';
    startAuto();
  }
  function lbNav(dir){
    lbCurrent = ((lbCurrent + dir) % TOTAL + TOTAL) % TOTAL;
    lbImg.style.animation = 'none';
    lbImg.offsetHeight; /* reflow */
    lbImg.style.animation = '';
    lbImg.src = srcs[lbCurrent];
    lbCtr.textContent = (lbCurrent+1) + ' / ' + TOTAL;
    goTo(lbCurrent, true);
  }
 
  document.getElementById('glc-zoom').addEventListener('click', function(e){ e.stopPropagation(); openLb(current); });
  stage.addEventListener('click', function(e){
    if(!isDragging &amp;&amp; e.target !== document.getElementById('glc-prev') &amp;&amp; e.target !== document.getElementById('glc-next') &amp;&amp; e.target !== document.getElementById('glc-zoom')){
      openLb(current);
    }
  });
  document.getElementById('glc-lb-close').addEventListener('click', closeLb);
  document.getElementById('glc-lb-prev').addEventListener('click', function(e){ e.stopPropagation(); lbNav(-1); });
  document.getElementById('glc-lb-next').addEventListener('click', function(e){ e.stopPropagation(); lbNav(+1); });
  lb.addEventListener('click', function(e){ if(e.target===lb) closeLb(); });
 
  /* ── Init ── */
  document.getElementById('glc-total').textContent = TOTAL;
  startAuto();
 
})();
&lt;/script&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Create My Widget &lt;/b&gt;lets users generate live, data-connected dashboards through plain-language prompts, pulling from Gmail, Google Calendar, and other services. Meanwhile, &lt;b&gt;Cast My Apps &lt;/b&gt;streams the apps installed on your Android phone to your laptop — no local installation required. The leaked slide shows a roster including Adobe Photoshop, CapCut, Spotify, Roblox, and Uber.&lt;/p&gt;&lt;p&gt;The hardware partners confirmed on the slide — Acer, ASUS, Dell, HP, and Lenovo — mirror the original Chromebook launch playbook. Devices are expected this fall, each featuring &lt;b&gt;Glowbar&lt;/b&gt;, a Google-branded RGB light strip running along the chassis edge.&lt;/p&gt;&lt;p&gt;We can't tell whether these Googlebooks will run on the rumoured &lt;b&gt;&lt;a href="https://aluminium-os.com/" target="_blank"&gt;Aluminium OS&lt;/a&gt;&lt;/b&gt;. However, it seems possible, although official information and confirmations are still pending.&amp;nbsp;&lt;/p&gt;&lt;p&gt;In the past, we learned that a new &lt;a href="https://aluminium-os.com/aluminium-os-first-look-leaked/" target="_blank"&gt;Android-powered PC operating system is running on the latest Android 16 platform&lt;/a&gt;. Google plans to merge its ChromeOS and Android for PC projects into a single branch, resulting in an Android for PC version called "Aluminium OS." This new OS will incorporate Google's advanced AI technologies from Gemini.&lt;/p&gt;&lt;p&gt;Google is expected to formally unveil Googlebook at today's Android Show: I/O Edition. Whatever gets confirmed, the Chromebook era has effectively ended — and the age of the intelligence-first laptop is beginning.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieQHqF_Ti1EPSCdv8ZKxnyXxpcfa1NhRhcrMhmlgonY7fuxQHC4OlkhmoCvxO2maeMvmMQLLisPqf1AzRf_iB7M7h51oa64-oRF6aAvddJzAScUE33hc8oHnQGectO_TJ0C7eC9ETVuukIgsIP-4RPNJ_1Imkff-GlcAMecA2JGmSgdhrt1rnMBVIsX3k/s72-c/goodbye-chromebook-google-has-announced-a-new-generation-of-v0-e4oewrg34p0h1.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item><item><title>Google Confirms Googlebook Adding Gemini Intelligence and Android apps</title><link>https://www.cyberkendra.com/2026/05/google-confirms-googlebook-adding.html</link><category>Android</category><category>Google</category><category>Googlebook</category><pubDate>Tue, 12 May 2026 23:05:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3448621598664628523.post-1056762886710619236</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img alt="Get the Googlebook" border="0" data-original-height="720" data-original-width="1280" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjL-ZoyXyi5ewf9qB8aVFtkRPoAHx9SbswfW9WecOZQ-ziMLrkx8pHaWvQHcHf25WLzRgTmJZ00LMzwyJvxG8K1vWC4ju8x_04VRiNd3_6FnBPhRl-O0X359Peq8KcWOauvFQk2mJHhYAMkDT5V1GvZrjdYnVdJs31FTxo7pU0v4QkmCB7V9qVstpySHFY/s16000/googlebook.webp" title="Get the Googlebook" /&gt;&lt;/div&gt;&lt;p&gt;We called it. Now Google's made it official: the Chromebook era is over, and Googlebook is the intelligence-first laptop that replaces it — not with better specs, but with a fundamentally different idea of what a laptop should do.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;When we first &lt;a href="https://www.cyberkendra.com/2026/05/googlebook-googles-android-laptop.html" target="_blank"&gt;reported on the Googlebook leak&lt;/a&gt; today, it looked like a pre-I/O tease — internal slides, hardware renders, and a brand name too clean to be accidental. Today, Google's Senior Director for Laptops &amp;amp; Tablets, Alex Kuscher, confirmed everything on the official Google blog and added enough new details to change how you should think about the device entirely.&lt;/p&gt;&lt;p&gt;The headline-grabbing feature is Magic Pointer — but calling it a smarter cursor undersells what it actually is. Built in collaboration with the Google DeepMind team, Magic Pointer brings Gemini's contextual intelligence directly to the cursor itself.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The idea sounds small until you think about how little the cursor has changed since right-click was invented. Point at a date in an email, and it surfaces a calendar invite. Hover over two photos, and it can composite them into a new image right there. It's not an assistant you call; it's ambient intelligence woven into every mouse movement.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;

&lt;!--[ Defer iframe ]--&gt;
&lt;div class='videoYt'&gt;
  &lt;iframe title='Lazy video iframe' class='lazy' data-src='//www.youtube.com/embed/0zkZsbv5w-s' allow='accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture' allowfullscreen&gt;&lt;/iframe&gt;
&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;What Google didn't make explicit in the &lt;a href="https://blog.google/products-and-platforms/platforms/android/meet-googlebook/" rel="nofollow" target="_blank"&gt;blog post&lt;/a&gt; — but what's worth spelling out — is the strategic architecture here. Google is merging the best of Android (Google Play apps, a modern OS built for intelligence) with ChromeOS (the world's most popular browser) into a single platform called Googlebook. This isn't a rebrand. It's a platform consolidation that's been years in the making, and it signals that ChromeOS as a standalone OS is effectively being retired into this new combined foundation.&lt;/p&gt;&lt;p&gt;Cast My Apps — the feature that streams your Android phone's apps directly to your Googlebook without any local installation — is more disruptive than it sounds. Apps like Adobe Photoshop, CapCut, and Uber running on your laptop from your phone's install means your laptop's app library is no longer determined by what's available for that OS. It's a direct shot at the "app gap" problem that dogged Chromebooks for years.&lt;/p&gt;&lt;p&gt;The Quick Access feature extends this phone-laptop continuity further, letting users view, search, and insert files directly from their Android phone through the Googlebook file browser — no transfers, cables, or cloud sync required. For anyone who's spent time AirDropping files between devices, this will feel like a long-overdue feature that Apple hasn't cracked between iPhone and Mac.&lt;/p&gt;&lt;p&gt;Create your Widget lets users generate live, personalized dashboards by simply describing what they want in plain language. Gemini connects to Gmail, Calendar, and the web to build it — so a family reunion planner, for example, could pull in flights, hotel bookings, restaurant reservations, and a countdown into one desktop widget. It's the kind of feature that sounds like a demo until you try it in a real workflow.&lt;/p&gt;&lt;p&gt;The hardware side is deliberately premium. Acer, ASUS, Dell, HP, and Lenovo are the confirmed launch partners, with devices arriving this fall. Every Googlebook will carry the Glowbar — a branded light strip along the chassis edge that Google describes as both functional and a design statement. Whether it serves a notification purpose (think iPhone's Dynamic Island, but physical) or is purely aesthetic hasn't been spelled out yet, which is perhaps the one gap the official announcement leaves open.&lt;/p&gt;&lt;p&gt;What's still unconfirmed is the underlying OS. Our earlier reporting pointed to Aluminium OS — Google's internal Android-for-PC branch built on Android 16 — as the likely engine under the hood. Google's blog references Android and Chrome OS convergence without naming the OS directly, which aligns with the company's approach of not burying the headline under an OS name nobody's heard of yet.&lt;/p&gt;&lt;p&gt;The bigger picture: Google just drew a line between the laptop market as it was (cloud-dependent, browser-first, budget-oriented) and what it wants laptops to become — devices where the intelligence layer, not the hardware spec sheet, is the primary selling point. That's a direct challenge to Microsoft's Copilot+ PC push, and the race to define the "AI PC" category just got a serious new entrant.&lt;/p&gt;&lt;p&gt;Googlebook devices launch this fall.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjL-ZoyXyi5ewf9qB8aVFtkRPoAHx9SbswfW9WecOZQ-ziMLrkx8pHaWvQHcHf25WLzRgTmJZ00LMzwyJvxG8K1vWC4ju8x_04VRiNd3_6FnBPhRl-O0X359Peq8KcWOauvFQk2mJHhYAMkDT5V1GvZrjdYnVdJs31FTxo7pU0v4QkmCB7V9qVstpySHFY/s72-c/googlebook.webp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>protalweb@gmail.com (Vivek Gurung)</author></item></channel></rss>