• Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push

    Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push

    Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an authenticated user to obtain remote code execution with a single “git push” command. The flaw, tracked as CVE-2026-3854 (CVSS score: 8.7), is a case of command injection that could allow an attacker with push access…

    Read More

  • Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign

    Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign

    A cybercrime group of Brazilian origin has resurfaced after more than three years to orchestrate a campaign that targets Minecraft players with a new stealer called LofyStealer (aka GrabBot). “The malware disguises itself as a Minecraft hack called ‘Slinky,'” Brazil-based cybersecurity company ZenoX said in a technical report. “It uses the official game icon to…

    Read More

  • VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi

    VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi

    Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw in its encryption implementation across Windows, Linux, and ESXi variants that renders recovery impossible even for the threat actors. The fact that VECT’s locker permanently destroys large files rather than…

    Read More

  • Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About

    Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About

    Every security program is betting on the same assumption: once a system is connected, the problem is solved. Open a ticket, stand up a gateway, push the data through. Done. That assumption is wrong. It is also a major reason Zero Trust programs stall. New research my team just published puts numbers on it. The…

    Read More

  • Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE

    Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE

    Cybersecurity researchers have disclosed details of a critical security flaw impacting LeRobot, Hugging Face’s open-source robotics platform with nearly 24,000 GitHub stars, that could be exploited to achieve remote code execution. The vulnerability in question is CVE-2026-25874 (CVSS score: 9.3), which has been described as a case of untrusted data deserialization stemming from the use…

    Read More

  • After Mythos: New Playbooks For a Zero-Window Era

    After Mythos: New Playbooks For a Zero-Window Era

    When patching isn’t fast enough, NDR helps contain the next era of threats. If you’ve been tracking advancements in AI, you know the exploit window, the short buffer that organizations relied on to patch and protect after a vulnerability disclosure, is closing fast. Anthropic’s new model, Claude Mythos, and its Project Glasswing, showed that finding…

    Read More

  • Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks

    Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks

    A Chinese national accused of being a member of the Silk Typhoon hacking group has been extradited to the U.S. from Italy.  Xu Zewei, 34, was arrested in July 2025 by Italian authorities for his alleged links to the Chinese state-sponsored threat group and for orchestrating cyber attacks against American organizations and government agencies between…

    Read More

  • Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover

    Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover

    An administrative role meant for artificial intelligence (AI) agents within Microsoft Entra ID could enable privilege escalation and identity takeover attacks, according to new findings from Silverfort. Agent ID Administrator is a privileged built-in role introduced by Microsoft as part of its agent identity platform to handle all aspects of an AI agent’s identity lifecycle…

    Read More

  • HD 52 Candidate David Osborn campaign comes to Hood River

    HD 52 Candidate David Osborn campaign comes to Hood River

    Free news: HOOD RIVER — David Osborn’s campaign marked the beginning of the final month of the House District 52 primary with a major canvass in Hood River on Saturday, bringing together a broad coalition of supporters, endorsing organizations, and…

    Read More

  • Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

    Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

    Checkmarx has disclosed that its ongoing investigation tied to the supply chain security incident has revealed that a cybercriminal group published data related to the company on the dark web. “Based on current evidence, we believe this data originated from Checkmarx’s GitHub repository, and that access to that repository was facilitated through the initial supply…

    Read More