A security researcher has disclosed two serious vulnerabilities in Windows, known as YellowKey and GreenPlasma. YellowKey is a BitLocker bypass that allows unauthorized access to encrypted drives, but it requires physical access to the device. GreenPlasma, on the other hand, enables attackers to elevate their privileges to System level, potentially giving them full control over the affected system. These vulnerabilities pose a significant risk to users and organizations that rely on Windows for sensitive tasks. Companies should assess their physical security measures and apply necessary updates to protect against these risks.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
A new variant of a local privilege escalation vulnerability in the Linux kernel, named Fragnesia, has been identified. This vulnerability, tracked as CVE-2026-46300 with a CVSS score of 7.8, allows local attackers to gain root access through page cache corruption. This marks the third such vulnerability discovered in the Linux kernel within just two weeks, raising concerns for users and administrators. The flaw is rooted in the kernel's XFRM component, which is responsible for managing IPsec protocols. This means that systems using affected kernel versions could be at risk if not addressed promptly, as attackers could exploit this vulnerability to gain elevated privileges and potentially take control of vulnerable systems.
Researchers have identified multiple vulnerabilities in NGINX Plus and NGINX Open, including a severe flaw that has existed for 18 years. The most critical issue, a heap buffer overflow in the ngx_http_rewrite_module (CVE-2026-42945), could allow attackers to execute arbitrary code remotely without authentication. This vulnerability has a high severity score of 9.2 on the CVSS v4 scale. Organizations using these web servers are at risk, as the flaw could lead to significant security breaches. It is crucial for affected users to address this vulnerability promptly to safeguard their systems.
Help Net Security
A recent report from Palo Alto Networks reveals that organizations currently manage an average of 109 machine identities for every human identity, with this number expected to rise significantly in the coming years. The report predicts an 85% growth in AI agents over the next year, contributing to a projected 77% increase in machine identities overall. In contrast, human identities are expected to grow by 56%. This imbalance raises concerns about how organizations are securing these machine identities, especially as they become more prevalent in business operations. The findings underscore the need for companies to enhance their identity security measures across the entire lifecycle of AI agents to mitigate potential risks associated with this rapid growth.
Recent studies by independent researchers indicate that AI models, specifically Anthropic's Claude Mythos Preview and OpenAI's GPT-5.5, have significantly exceeded all previously established benchmarks for autonomous cyber capabilities. This advancement raises questions about whether this performance is a temporary spike or a new standard in AI development. The implications for cybersecurity are profound, as these AI systems may enhance the capabilities of both defenders and attackers in the cyber landscape. As organizations adapt to this shift, they need to consider how these advancements could affect their security strategies and the potential risks involved. The ongoing evolution of AI in cybersecurity could redefine the nature of cyber threats and defenses, making it crucial for companies to stay informed and prepared.
BleepingComputer
West Pharmaceutical Services has reported a cyberattack that compromised its systems, leading to data theft and the encryption of files. The company revealed that attackers gained access to sensitive information, although specific details about the stolen data have not been disclosed. This incident raises concerns about the security of pharmaceutical supply chains and the potential impact on patient safety. Companies in the healthcare sector, like West, must prioritize cybersecurity measures to protect against such threats. The attack underscores the ongoing risks faced by organizations handling sensitive data in an increasingly digital world.
The House committee recently conducted a closed briefing with representatives from Anthropic, a company known for its AI development, specifically regarding its Mythos project and associated cyber risks. This briefing precedes an upcoming hearing where lawmakers will likely discuss potential cybersecurity implications of advanced AI technologies. The focus is on ensuring that as AI capabilities grow, appropriate safeguards are in place to protect against misuse or vulnerabilities. The interest from the House committee indicates a growing concern about how AI systems can be exploited or pose risks to national security and privacy. This scrutiny could lead to more regulatory measures in the AI space.
BleepingComputer
A serious vulnerability has been found in certain configurations of the Exim mail transfer agent, which could allow remote attackers to execute arbitrary code without authentication. This flaw poses a significant risk to systems running Exim, as it could lead to unauthorized access and control over affected servers. Organizations using Exim should take immediate action to assess their configurations, as attackers could exploit this vulnerability if not addressed promptly. The issue emphasizes the need for regular updates and security checks in mail server configurations to protect against potential breaches. Users and administrators are advised to stay vigilant and ensure they are running the latest versions of the software.
SCM feed for Latest
A recent cybersecurity incident involving the online learning platform Canvas has raised concerns after the hacking group ShinyHunters successfully breached the system twice. The attackers exploited vulnerabilities through cross-site scripting (XSS) and compromised user identities, leading to the exposure of sensitive student data. In response to these breaches, a House committee chair has called for Instructure, the parent company of Canvas, to testify about the incident. This situation is significant as it not only affects students' personal information but also raises questions about the security measures in place to protect educational platforms. The potential for misuse of the exposed data could have far-reaching implications for students and educational institutions alike.
Cybersecurity Blog | SentinelOne
SentinelOne's recent report focuses on the growing risks associated with cloud secrets and artificial intelligence systems. Researchers found that attackers are increasingly targeting sensitive information stored in cloud environments, exploiting weaknesses in how organizations manage secrets such as API keys and access tokens. This trend raises significant concerns, as improper handling of these secrets can lead to unauthorized access and data breaches. Companies must enhance their security measures to protect these critical assets, especially as reliance on cloud and AI technologies continues to rise. The findings serve as a wake-up call for businesses to reassess their security protocols and ensure that they are safeguarding their digital infrastructure effectively.
SCM feed for Latest
Recent research indicates that developers are increasingly becoming targets of supply chain attacks via npm, the package manager for JavaScript. Attackers are exploiting the trust placed in npm packages by embedding malicious code into popular libraries. This tactic allows them to compromise projects that depend on these libraries, potentially affecting thousands of applications and their users. The implications are significant, as compromised packages can lead to data breaches or system infiltrations without the end users being aware of the threat. It’s crucial for developers and organizations to scrutinize their dependencies and implement better security practices to mitigate these risks.
SCM feed for Latest
RubyGems, the popular package manager for the Ruby programming language, has temporarily halted new account registrations due to a significant attack affecting its ecosystem. This incident involves hundreds of packages, with many being specifically targeted and some containing malicious exploits. The move to pause sign-ups aims to mitigate further risks and protect users from potential harm. This situation highlights the vulnerabilities present in software supply chains and the importance of vigilance in maintaining secure coding practices. Developers and organizations using RubyGems should be particularly cautious and review their packages for any potential threats.
Hackread – Cybersecurity News, Data Breaches, AI and More
Researchers have discovered that a group known as TeamPCP hijacked OpenID Connect (OIDC) tokens, allowing them to inject a self-replicating worm named Mini Shai-Hulud into over 400 packages on popular repositories like npm and PyPI. This attack specifically targeted packages associated with TanStack, Mistral AI, and UiPath, potentially compromising users who utilize these libraries in their projects. The worm's ability to propagate itself means it could continue to spread, affecting an even wider range of applications. This incident raises serious concerns about the security of software supply chains and the need for developers to remain vigilant about the packages they use. Users and companies relying on these affected packages should take immediate action to verify their dependencies and ensure their systems are secure.
Infosecurity Magazine
Instructure, the company behind the Canvas learning management system, has reportedly reached an agreement with the cybercriminal group ShinyHunters after a ransomware attack that compromised Canvas data. The breach involved sensitive information, raising concerns for institutions and users who rely on the platform for educational purposes. While details about the agreement have not been fully disclosed, the incident underscores the challenges organizations face in handling ransomware threats. This situation serves as a reminder for educational institutions to bolster their cybersecurity measures to protect against future attacks and safeguard their data. Users and administrators should stay vigilant and be aware of potential risks following such incidents.
SCM feed for Latest
Signal, the popular messaging app, is rolling out new features aimed at enhancing user security against phishing attacks, particularly those impersonating Signal Support. These new measures come in response to increasing reports of scams targeting users, where attackers pose as official support representatives to steal personal information. The updates include improved verification processes and alerts to help users spot fraudulent messages more easily. This move is crucial as phishing remains a significant threat in the digital communication landscape, affecting user trust and safety. By implementing these features, Signal aims to create a safer messaging environment for its users.