Blog

  • EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades

    EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades

    Intro
    A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation specifically targets the high-privilege professional accounts of enterprise administrators, DevOps engineers, and security analysts by impersonating administrative utilities they rely on for daily operations. By integrating Search Engine Order (SEO)

  • New Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major Distributions

    New Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major Distributions

    Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root.
    The high-severity vulnerability tracked as CVE-2026-31431 (CVSS score: 7.8) has been codenamed Copy Fail by Xint.io and Theori.
    “An unprivileged local user can write four controlled bytes into the page cache of any readable file on a Linux

  • Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution

    Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution

    Google has addressed a maximum severity security flaw in Gemini CLI — the “@google/gemini-cli” npm package and the “google-github-actions/run-gemini-cli” GitHub Actions workflow — that could have allowed attackers to execute arbitrary commands on host systems.
    “The vulnerability allowed an unprivileged external attacker to force their own malicious content to load as Gemini configuration,”

  • Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks

    Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks

    In February 2026, researchers uncovered a shift that completely changed the game: threat actors are now using custom AI setups to automate attacks directly into the kill chain.
    We aren’t just talking about AI writing better phishing emails anymore. We’re talking about autonomous agents mapping Active Directory and seizing Domain Admin credentials in minutes.
    The problem? Most defensive workflows

  • What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)

    What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)

    Every security team has a version of the same story. The quarter ends with hundreds of vulnerabilities closed. The dashboards are bursting with green. Then someone in a leadership meeting asks: “So, are we actually safer now?”
    Crickets.
    The room goes quiet because an honest answer requires context – which is something that patch counts and CVSS scores were never designed to provide. Exposure

  • Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately

    Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately

    cPanel has released security updates to address a security issue impacting various authentication paths that could allow an attacker to obtain access to the control panel software.
    The problem affects all currently supported versions, according to an alert released by cPanel on Tuesday. The issue has been addressed in the following versions –

    11.110.0.97
    11.118.0.63
    11.126.0.54
    11.132.0.29

  • CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

    CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
    The vulnerabilities are listed below –

    CVE-2024-1708 (CVSS score: 8.4) – A path traversal vulnerability in  ConnectWise ScreenConnect

  • LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure

    LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure

    In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI’s LiteLLM Python package has come under active exploitation in the wild within 36 hours of the bug becoming public knowledge.
    The vulnerability, tracked as CVE-2026-42208 (CVSS score: 9.3), is an SQL injection that could be exploited to modify the underlying

  • Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About

    Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About

    Every security program is betting on the same assumption: once a system is connected, the problem is solved. Open a ticket, stand up a gateway, push the data through. Done.
    That assumption is wrong. It is also a major reason Zero Trust programs stall.
    New research my team just published puts numbers on it. The Cyber360: Defending the Digital Battlespace report, based on a survey of 500 security

  • Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE

    Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE

    Cybersecurity researchers have disclosed details of a critical security flaw impacting LeRobot, Hugging Face’s open-source robotics platform with nearly 24,000 GitHub stars, that could be exploited to achieve remote code execution.
    The vulnerability in question is CVE-2026-25874 (CVSS score: 9.3), which has been described as a case of untrusted data deserialization stemming from the use of the