u/_cybersecurity_

New DirtyDecrypt Exploit Exposes Linux Kernel Vulnerability
β–² 4 r/pwnhub

New DirtyDecrypt Exploit Exposes Linux Kernel Vulnerability

A recent proof-of-concept for the DirtyDecrypt vulnerability exposes a critical flaw in the Linux kernel that can enable attackers to gain root privileges.

Key Points:

  • DirtyDecrypt vulnerability allows privileged access in Linux due to a missing copy-on-write guard.
  • Affected distributions include Arch Linux, Fedora, and openSUSE, posing significant risks to users.
  • Linked to other root access vulnerabilities like CopyFail and DirtyFrag, raising concerns for system security.

The newly identified DirtyDecrypt vulnerability, released as proof-of-concept code by the V12 security team, highlights a critical flaw in the Linux kernel. It arises from a missing copy-on-write (COW) guard within the rxgk_decrypt_skb component of the RxGK subsystem. This oversight can allow attackers to leverage oversized response authenticators to write data into the memory of privileged processes or the page cache of privileged files, including SUID binaries. As a result, attackers can elevate their privileges to root, which poses a severe risk to system integrity.

The oversight only impacts specific Linux distributions that have CONFIG_RXGK compiled and enabled, notably Arch Linux, Fedora, and openSUSE. The implications extend further in container environments, as every worker node running a vulnerable distribution could present an opportunity for attackers to escape from containers with raised privileges. Furthermore, this vulnerability has been categorized alongside other critical root access vulnerabilities that have been disclosed over recent months, such as CopyFail and Fragnesia, indicating a concerning trend that demands immediate attention from organizations reliant on affected systems.

What measures can organizations take to mitigate the risks associated with these Linux kernel vulnerabilities?

Learn More: Security Week

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

u/_cybersecurity_ β€” 20 hours ago
β–² 1 r/pwnhub

Critical Vulnerability Exposes Universal Robots' Cobots to Remote Hacking Risks

A severe vulnerability in Universal Robots' operating system allows potential remote command execution, posing risks to industrial robot fleets.

Key Points:

  • CVEs-2026-8153 is a critical OS command injection vulnerability with a CVSS score of 9.8.
  • Attackers with network access can execute commands on the robots, risking high confidentiality and integrity impacts.
  • The flaw exists in the Dashboard Server interface of PolyScope 5, but mitigations are in place by default in their design.

Universal Robots recently released a critical patch for its PolyScope 5 operating system after a vulnerability identified as CVE-2026-8153 was disclosed. This flaw allows unauthenticated attackers with access to the Dashboard Server port to execute arbitrary commands on the robot systems. The high CVSS score of 9.8 highlights the serious risks associated with this vulnerability, which could lead to significant breaches in confidentiality, integrity, and availability of the robots. Notably, while Universal Robots has structured their systems to prevent direct internet access, concerns remain due to the Ethernet ports available on their control boxes.

Vera Mens, a security researcher who uncovered the vulnerability, indicated that while many industrial robots lack remote access, the cobots from Universal Robots have exposed Ethernet connections that can be utilized for remote operations. Although these control boxes are not typically accessible over public networks, the absence of proper network segmentation could allow an attacker to gain an entry point, potentially compromising not just a single cobot, but an entire fleet. This poses severe operational risks, including potential physical harm to humans if a compromised robot is put to use.

What measures do you think industrial companies should implement to secure their robotic systems against such vulnerabilities?

Learn More: Security Week

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

u/_cybersecurity_ β€” 20 hours ago
β–² 4 r/pwnhub

Major Cybercrime Crackdown in MENA Leads to 201 Arrests

A large-scale operation across 13 nations has resulted in the arrest of 201 individuals and the identification of nearly 4,000 victims of cybercrime in the MENA region.

Key Points:

  • Operation Ramz involved law enforcement across 13 countries.
  • Authorities arrested 201 individuals and identified 382 additional suspects.
  • 53 servers were seized, revealing a significant phishing and malware infrastructure.
  • Human trafficking victims were discovered among cybercrime perpetrators in Jordan.
  • Private partners played a key role in intelligence gathering and operational support.

Operation Ramz represents a significant law enforcement initiative targeting cybercrime across the Middle East and North Africa. Conducted from October 2025 to February 2026, the coordinated effort included participation from Algeria, Bahrain, Egypt, Iraq, Jordan, Lebanon, Libya, Morocco, Oman, Palestine, Qatar, Tunisia, and the UAE, highlighting the borderless nature of cyber threats. The operation led to the arrest of 201 individuals while also uncovering 382 additional suspects, showcasing the extensive scale of cybercrime in the region. Notably, authorities seized 53 servers, a critical strike against the infrastructure that supports phishing and malware activities, and identified 3,867 victims across the participating countries, demonstrating the widespread impact of these criminal acts.

Particular attention was brought to human trafficking concerning cybercrime in Jordan, where local law enforcement found that two suspects were somberly exploiting individuals promised legitimate employment. Instead, they confiscated the victims' passports and forced their participation in financial fraud schemes. Meanwhile, in other nations like Morocco and Oman, various operations also led to the arrest of individuals involved in phishing activities and the shutdown of malware-infected servers. Such coordinated actions emphasize the importance of collaboration between law enforcement and private sector partners in combating cybercriminal activities.

What are the implications of international cooperation in tackling cybercrime?

Learn More: Security Week

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

u/_cybersecurity_ β€” 20 hours ago
β–² 3 r/pwnhub

Cyber Resilience Becomes Essential in Today's Business Landscape

Organizations must prioritize cyber resilience to maintain continuity amid various disruptions.

Key Points:

  • Business continuity is now inseparable from cyber resilience.
  • Organizations need a minimum viable business model to identify critical processes.
  • Business continuity planning must integrate supplier and cloud dependencies.
  • Effective incident response requires a seamless blend with business continuity.
  • Continuous testing is crucial for ensuring preparedness and resilience.

The complexities of business disruptions are changing, influenced by factors like ransomware attacks, identity compromises, and cloud failures. In this evolving landscape, cyber resilience has emerged as a core aspect of business continuity. Organizations are recognizing that to effectively manage risks, they must understand not just their critical processes and information dependencies, but also how various incidents can affect their operations, customer access, and compliance. The ISF Standard of Good Practice emphasizes this intersection, advocating for a systematic approach that aligns business continuity with governance and risk management.

A pivotal concept is the minimum viable business model, which identifies essential elements for operation during disruptions. This includes crucial processes, information assets, and suppliers that an organization must protect to maintain functionality. Systems resilience is also vital; effective backup and restoration mechanisms should not just be technicalities, but strategic priorities that ensure business endurance. Additionally, the convergence of incident response and business continuity underscores the need for a coordinated effort, engaging legal, IT, and communications teams, to respond effectively to crises. This synergy is critical to minimizing operational disruptions and safeguarding business continuity, emphasizing proactive planning and comprehensive supplier assessments.

How can organizations better integrate cyber resilience into their existing business continuity plans?

Learn More: Security Week

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

u/_cybersecurity_ β€” 20 hours ago
β–² 14 r/pwnhub

Massive Data Breach at Erie Family Health Centers Impacts 570,000 Individuals

A significant data breach at Erie Family Health Centers has exposed sensitive information of nearly 570,000 individuals.

Key Points:

  • Unauthorized access confirmed from December 10, 2025, to January 27, 2026.
  • Exposed data includes a wide range of personal and protected health information.
  • Complimentary credit monitoring and identity theft protection services offered to affected individuals.

Erie Family Health Centers, based in Chicago, has become the latest organization to fall victim to a data breach, revealing confidential information of approximately 570,000 individuals. Following a detection of suspicious activity on January 27, 2026, an investigation by third-party digital forensics experts disclosed that an unauthorized party had gained access to the network on December 10, 2025, maintaining that access undetected for over a month.

The breach compromised various types of personal information, including names, addresses, Social Security numbers, and medical records. Such exposure raises serious concerns about identity theft and the misuse of sensitive data. In response, Erie Family Health Centers has enhanced their network security measures and is providing affected individuals with credit monitoring services to mitigate potential risks. Notably, this incident marks the second breach reported by the organization within the same year, following an earlier incident related to a business associate.

How should healthcare organizations enhance their data security to prevent similar breaches?

Learn More: HIPAA Journal

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

reddit.com
u/_cybersecurity_ β€” 20 hours ago
β–² 1 r/pwnhub

SEPPMail Secure E-Mail Gateway Faces Major Vulnerabilities Exposing Enterprises to Attacks

Serious vulnerabilities in SEPPMail Secure E-Mail Gateway can lead to remote code execution and unauthorized access to email traffic.

Key Points:

  • CVE-2026-2743 allows remote code execution through a path traversal vulnerability.
  • Multiple vulnerabilities enable unauthorized access to sensitive system information and functionality.
  • SEPPMail versions have been released to address these critical vulnerabilities.

Recent reports from InfoGuard Labs have revealed critical vulnerabilities in the SEPPMail Secure E-Mail Gateway, a widely used email security solution. Notably, CVE-2026-2743 carries a perfect CVSS score of 10.0, allowing attackers to exploit a path traversal issue in the large file transfer feature to achieve remote code execution. This vulnerability provides a means for attackers to overwrite crucial configurations and potentially gain full control over the SEPPMail appliance, which includes the ability to read all email traffic flowing through the system.

Additionally, several other vulnerabilities were identified, such as CVE-2026-44126, which allows unauthenticated access to necessary functionalities on the new GINA UI, and CVE-2026-44127 enabling attackers to read arbitrary local files. These weaknesses collectively create a significant risk, as successful exploitation could lead to complete system takeover and prolonged access to sensitive information. Although patches have been deployed in subsequent versions to address these issues, the disclosure highlights the critical need for ongoing vigilance in securing email gateways and mitigating potential threats.

What steps should organizations take to secure their email gateways from such vulnerabilities?

Learn More: The Hacker News

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

u/_cybersecurity_ β€” 20 hours ago
β–² 21 r/pwnhub

The New Phishing Click: How OAuth Consent Bypasses MFA

A new phishing threat is exploiting OAuth consent, allowing attackers to bypass traditional MFA protections and compromise user accounts.

Key Points:

  • EvilTokens, a phishing-as-a-service platform, has compromised over 340 Microsoft 365 organizations.
  • Attackers exploit OAuth consent screens to obtain valid refresh tokens without needing user passwords.
  • Tokens issued through this method can survive password resets, extending the window of vulnerability.
  • Consent phishing blurs the lines of authorized data access, creating complex risk scenarios.
  • Emerging AI-driven security solutions could enhance visibility and control over OAuth grants and integrations.

In February 2026, a phishing platform named EvilTokens emerged, quickly targeting Microsoft 365 organizations across various countries. It employs a moderately sophisticated tactic whereby users receive prompts to complete their normal MFA challenges, mistakenly believing they are engaging in a routine log-in process. Instead, they unknowingly grant attackers access to refresh tokens linked to their mailbox, drive, calendar, and other resources. This method bypasses password entry and ulterior MFA prompts, rendering traditional security measures ineffective against such phishing attacks.

The nature of OAuth grants means that actors can secure long-term access without triggering alarms typical of credential theft. These refresh tokens remain valid well into the future, depending on tenant configurations, making traditional password management protocols less effective. Furthermore, the rising prevalence of MFA and authorized consents leads users to click through prompts without fully understanding the implications, allowing attackers to bridge access points across various applications and heightening potential risks. As organizations continue to adapt to this evolving threat landscape, they must recognize and treat OAuth consent as critical to their identity management and security framework.

How can organizations better educate employees about the risks of OAuth consent to prevent consent phishing?

Learn More: The Hacker News

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

u/_cybersecurity_ β€” 20 hours ago
β–² 2 r/pwnhub

Urgent Security Updates Coming for Drupal Users on May 20

Drupal is set to release essential core security updates, urging websites to prepare for possible vulnerabilities.

Key Points:

  • Drupal will release a core security update on May 20, 2026.
  • Websites must prepare for potential exploits that could emerge shortly after the release.
  • Sites on older, unsupported versions are at risk and should upgrade to current supported versions.

The Drupal Security Team has announced an upcoming core security release that will take place from 5-9 p.m. UTC on May 20, 2026. This update is crucial because exploits targeting the vulnerabilities could be developed within hours or days following the release. Drupal maintains that not all configurations will be affected, but it is imperative for site owners to reserve this time for necessary updates. As part of the preparations, sites running versions 11.3.x, 11.2.x, 10.6.x, or 10.5.x are encouraged to update to the latest patch immediately.

Learn More: The Hacker News

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

u/_cybersecurity_ β€” 20 hours ago
β–² 1 r/pwnhub

Transforming Incident Response: Join Tines Webinar on Automation Solutions

IT teams are overwhelmed by alerts, slowing down incident response times, as highlighted in an upcoming webinar by Tines.

Key Points:

  • IT teams face inundation of alerts, leading to operational bottlenecks during network incidents.
  • Manual workflows result in delays that can escalate service disruptions.
  • Automation and AI-assisted solutions can streamline response processes effectively.

With the growing volume of alerts from various monitoring systems, IT teams frequently find themselves struggling to keep pace during network incidents. Responders often have to navigate multiple platforms, manually diving into each system to gather essential information, determine ownership, and coordinate responses. This disjointed approach commonly results in operational bottlenecks, hindering effective incident management and potentially leading to service outages.

The upcoming webinar on June 2, 2026, hosted by BleepingComputer, aims to address these challenges. Led by Edgar Ortiz from Tines, the session will focus on identifying the breakdowns that typically occur during incident response workflows and how automation can rectify these issues. Attendees will learn how to implement AI-assisted workflows that help streamline processes across different platforms and eliminate the need for manual intervention, allowing teams to react more swiftly and efficiently to network incidents.

What strategies do you think are most effective for improving incident response times in IT teams?

Learn More: Bleeping Computer

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

u/_cybersecurity_ β€” 20 hours ago
β–² 7 r/pwnhub

CISA Leaves Digital Keys Exposed on GitHub for Six Months

The U.S. Cybersecurity and Infrastructure Security Agency accidentally exposed sensitive digital keys on GitHub, raising concerns about potential data compromise.

Key Points:

  • CISA left digital keys and passwords in plain text on GitHub for over six months.
  • The exposed repository was named 'Private-CISA', containing sensitive information about internal systems.
  • Current assessments indicate no data compromise occurred, but implications remain serious.
  • The incident underscores ongoing challenges in federal cybersecurity management.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has inadvertently exposed sensitive digital keys and passwords on GitHub, with reports stating this vulnerability existed for approximately six months. The exposed information was accessible in a repository titled 'Private-CISA', which, contrary to its name's implication, contained several significant security credentials. A key concern was the inclusion of administrative credentials for Amazon AWS GovCloud servers along with plaintext usernames and passwords for CISA's internal systems, which could have allowed unauthorized access to sensitive data.

The agency claims there is currently no evidence of compromised data, but the incident raises alarm bells regarding the protocols and safeguards in place to protect sensitive information. As part of the Department of Homeland Security, CISA's primary role involves managing cybersecurity threats. The breach was attributed to a practice by a contractor employee who used GitHub to transfer files between work and personal devices, demonstrating a lapse in security practices that could have far-reaching implications. This situation indicates pressing challenges faced by federal cybersecurity bodies to maintain integrity and operational awareness, especially in the current complex threat landscape.

What measures should be implemented to prevent similar incidents in the future?

Learn More: Gizmodo

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

u/_cybersecurity_ β€” 21 hours ago
β–² 1 r/pwnhub

7 Essential Strategies for Rapid Cyber Incident Recovery

Effective recovery strategies are crucial for organizations to bounce back quickly after a cyberattack.

Key Points:

  • Sharpen incident response team skills for quicker recovery.
  • Prioritize scoping and containment first to stop damage.
  • Establish situational awareness for informed recovery efforts.
  • Seek external support to streamline the recovery process.
  • Implement lessons learned to bolster defenses for the future.

In today’s digital landscape, the inevitability of cyber incidents makes it essential for organizations to develop a robust incident response and recovery strategy. Speed is a critical factor, as prolonged disruptions can lead to escalating costs and risks. Cyber experts emphasize that organizations must swiftly recover from attacks to mitigate potential damage and prevent future incidents.

A well-prepared incident response team is vital. This team should be trained in rapid assessment, containment, and effective communication to facilitate an efficient recovery process. It ensures that recovery actions are coordinated not just within cybersecurity, but across the organization to restore services promptly and enhance security resilience. Furthermore, prioritizing tasks based on business criticality can prevent cascading failures and ensure that revenue-impacting systems are brought back online first.

Another key aspect is the establishment of situational awareness to assess threats and coordinate recovery initiatives effectively. Organizations are encouraged to seek external support for expertise in digital forensics and incident response, which can facilitate faster restoration of services. Finally, learning from any incident is crucial, as implementing new defenses based on lessons learned can significantly strengthen an organization's posture against future cyber threats.

What steps has your organization taken to improve incident recovery times?

Learn More: CSO Online

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

u/_cybersecurity_ β€” 21 hours ago
β–² 0 r/pwnhub

SQL and NoSQL Injection Vulnerabilities in APIs Put Your Data at Risk

SQL and NoSQL injection vulnerabilities in APIs can expose sensitive data and compromise entire databases.

Key Points:

  • SQL and NoSQL injection remain critical vulnerabilities that can affect any database.
  • Attackers can exploit injection points to access or manipulate sensitive data.
  • Preventative measures include using parameterized queries and validating input types.

APIs process millions of requests daily, and among these, numerous attacks utilize SQL and NoSQL injection techniques. These vulnerabilities allow malicious actors to exploit the interactions between user inputs and the database, leading to data exposure or deletion. With major databases like MySQL, PostgreSQL, and MongoDB being potentially vulnerable, all organizations utilizing these systems must remain vigilant against these threats.

Successful exploitation can occur through various injection points, exemplified by seemingly innocent inputs like coupon codes. By strategically crafting input data, an attacker can bypass authentication and access valuable information. This poses significant ramifications for businesses as they risk losing vital data or facing compliance issues related to data privacy laws. The path to prevention is clear: implementing security best practices is critical to mitigate these risks effectively.

What measures has your organization taken to prevent SQL and NoSQL injection attacks?

Learn More: InfoSec Write-ups

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

reddit.com
u/_cybersecurity_ β€” 21 hours ago
β–² 1 r/pwnhub

Hackers Target NGINX Rift Vulnerability in F5 Products

A newly discovered high-severity vulnerability in F5's NGINX software, known as Nginx Rift, is being actively exploited by hackers just days after its public disclosure.

Key Points:

  • CVE-2026-42945, with a CVSS score of 8.1, affects numerous NGINX versions.
  • Exploitation can lead to DoS attacks, causing websites to crash.
  • Vulnerable servers number around 5.7 million, although actual exploitability is limited.
  • F5 has released patches for the vulnerable NGINX versions.
  • Experts recommend immediate audits and patches to mitigate risks.

The Nginx Rift vulnerability has been identified as a critical security flaw in F5’s NGINX web server software, affecting both open-source and commercial versions. Discovered by researchers at Depthfirst, this heap-based buffer overflow can be exploited through a specific combination of server configurations, allowing unauthenticated attackers to manipulate web requests. Such exploits could lead to denial-of-service (DoS) conditions, where affected websites may experience frequent crashes.

Following the release of the vulnerability details on May 13, 2026, active exploitation was reported just three days later, underscoring the urgency of the threat. Although around 5.7 million web servers run potentially vulnerable NGINX versions, experts suggest that the actual number of systems at risk may be relatively small due to necessary configuration requirements. Moreover, while remote code execution (RCE) is a potential concern, the practical exploitation primarily poses a significant DoS threat, prompting professionals in the field to urge immediate action for mitigation through patching and configuration adjustments.

What steps are you taking to safeguard your systems against vulnerabilities like Nginx Rift?

Learn More: Hack Read

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

u/_cybersecurity_ β€” 21 hours ago
β–² 1 r/pwnhub

Pentester Reveals Critical Vulnerabilities in API Security

A detailed examination showcases a pentester's methodology to uncover toxic vulnerability combinations that lead to mass account takeovers.

Key Points:

  • A four-phase methodology helps identify interconnected vulnerabilities.
  • Each phase interrogates the application to expose hidden risks.
  • Independent findings are transformed into a critical chain leading to mass account takeover.

In a recent assessment, a pentester utilized a structured four-phase methodology to discover severe vulnerabilities within a web application's API. This approach involves phases like Information Gathering, Vulnerability Analysis, Attack Execution, and Exploitation, each asking specific questions that ultimately build upon previous findings. The process began with a review of the JavaScript files, revealing a crucial API endpoint catalog accessible even to unauthenticated users.

Through meticulous testing, the pentester uncovered that failed login attempts leaked detailed user information, acting as a user enumeration tool. This enabled the attacker to identify registered admin accounts and directly access sensitive data through another endpoint. Furthermore, discovering a write endpoint that accepted requests without proper authentication allowed for unauthorized password changes. Each phase contributed to a toxic combination of vulnerabilities, leading to a critical outcome where an attacker could perform mass account takeovers without detection. In this scenario, legitimate authentication was misused due to the absence of proper authorization checks across the system.

What measures do you think organizations should implement to prevent such interlinked vulnerabilities?

Learn More: InfoSec Write-ups

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

reddit.com
u/_cybersecurity_ β€” 21 hours ago
β–² 1 r/pwnhub

Critical OpenHarmony Vulnerability Allows Remote Code Execution

A high-severity Remote Code Execution vulnerability found in OpenHarmony could allow attackers to run arbitrary code on affected devices.

Key Points:

  • CVE-2026-27648 affects OpenHarmony v6.0 and prior versions.
  • The vulnerability carries a CVSS score of 8.8, indicating serious risk.
  • Attackers can exploit this flaw remotely, targeting pre-installed applications.

CVE-2026-27648 is a significant vulnerability impacting OpenHarmony versions 6.0 and earlier. Published on May 19, 2026, it has garnered attention due to its high CVSS score of 8.8, which signifies the critical nature of the issue. The vulnerability permits remote attackers to execute arbitrary code within pre-installed applications, highlighting a serious flaw in how these applications manage untrusted input or interact with vital system services.

The exploitation of this vulnerability does not require local access, making it particularly concerning for users of affected devices. Although the advisory does not explicitly outline authentication requirements, it suggests that unauthenticated access to the vulnerability is probable. Without public proof of concept (PoC) available, security researchers are advised to focus on analyzing pre-installed applications within OpenHarmony and identifying input vectors that could facilitate arbitrary code execution, a task made challenging by the lack of detailed information regarding the exact nature of the weakness.

What measures do you think companies should take to secure devices using OpenHarmony?

Learn More: The Hacker Wire

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

u/_cybersecurity_ β€” 21 hours ago
β–² 1 r/pwnhub

Critical Command Injection Flaw Discovered in ngrok Versions 4.3.3 and 5.0.0-beta.2

A severe Command Injection vulnerability has been identified in specific ngrok versions, allowing remote attackers to execute arbitrary commands.

Key Points:

  • Affected versions include ngrok v4.3.3 and 5.0.0-beta.2.
  • High CVSS score of 8.8 indicates serious risk with potential for remote exploitation.
  • Exploitation does not require user authentication or interaction.
  • No public proof of concept is available, but standard command injection techniques may apply.
  • No patch or fix details have been released at this time.

CVE-2025-57282 has been identified as a critical Command Injection vulnerability affecting ngrok versions 4.3.3 and 5.0.0-beta.2. This flaw has been assigned a CVSS score of 8.8, indicating a high potential for exploitation. The nature of command injection vulnerabilities suggests that attackers can execute arbitrary operating system commands through user input that is not properly validated. The advisory does not specify the exact injection point, but the vulnerabilities generally involve variable user inputs being directly processed by a shell interpreter, which could allow malware to be executed on the server running ngrok.

Since the vulnerability permits exploitation without requiring user privileges or actions, it poses a significant risk, particularly for systems that run ngrok in a network-facing capacity. Attackers could leverage this flaw to gain control over affected systems, making it crucial for users to monitor official ngrok channels for any security updates or patches related to this issue. As of the latest information, developers and researchers interested in exploiting this command injection flaw would need to carefully analyze how ngrok processes user input to find suitable vectors for attack.

What measures can users take to protect their systems from such command injection vulnerabilities?

Learn More: The Hacker Wire

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

u/_cybersecurity_ β€” 21 hours ago
β–² 4 r/pwnhub

Grafana Confirms Data Breach Amidst Ransom Demands

Grafana has acknowledged a data breach caused by compromised credentials, asserting that no personal information was stolen.

Key Points:

  • Grafana suffered a data breach due to compromised GitHub tokens.
  • The hackers downloaded the codebase but did not access personal or customer data.
  • Grafana has refused to pay the ransom demanded by the attackers.
  • Forensic analysis is underway, and further details will be provided post-investigation.
  • The Coinbase Cartel group claims responsibility and threatens more damage.

On Sunday, Grafana confirmed a breach that stemmed from compromised tokens allowing access to their GitHub environment. The attackers managed to download the company's codebase; however, Grafana clarified that no personal or customer information was compromised. This claim is crucial for maintaining customer trust, as many organizations are increasingly concerned about data privacy and security in an era of frequent cyber threats.

The attack was linked to a cybercrime group known as the Coinbase Cartel, which has been active since September 2025. Instead of employing file-encrypting ransomware, this group exploits stolen data to extort ransom payments. Grafana decided not to acquiesce to the demands of the attackers, indicating a commitment to handling the situation in-house rather than succumbing to threats. The company has taken immediate action by resetting compromised credentials and is conducting a thorough forensic analysis to understand the full impact of the breach. Grafana plans to keep stakeholders updated as the investigation unfolds.

What steps should companies take to safeguard against similar breaches in the future?

Learn More: Security Week

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

u/_cybersecurity_ β€” 2 days ago
β–² 59 r/newyorkcity+1 crossposts

Millions Impacted as Multiple US Healthcare Organizations Report Data Breaches

Recent healthcare data breaches have affected millions of individuals, exposing sensitive personal and medical information.

Key Points:

  • New York City Health and Hospitals Corporation breach affects 1.8 million individuals.
  • Erie Family Health Centers in Chicago reports 570,000 impacted due to hackers accessing their network.
  • Florida Physician Specialists breach impacts 276,000 individuals in a two-day attack.
  • Coastal Carolina Health Care and Western Orthopaedics breaches each affect approximately 110,000 people.
  • Breach at Nacogdoches Memorial Hospital shows conflicting data, reporting up to 2.5 million affected.

Recent disclosures have highlighted significant breaches across several healthcare organizations in the United States, with millions of individuals' personal and medical information at risk. The New York City Health and Hospitals Corporation reported the largest incident, confirming unauthorized access from November 2025 to February 2026, impacting 1.8 million individuals. The breach involved sensitive data, including personal health and financial information, a serious concern given the potential for identity theft and fraud.

Similarly, the Erie Family Health Centers breach indicates that 570,000 individuals were affected due to a cyber attack that took place between December 2025 and January 2026. Information compromised in this case ranged from names and Social Security numbers to medical details. Other notable incidents include breaches at Florida Physician Specialists and Coastal Carolina Health Care, suggesting a pattern of vulnerabilities within the healthcare sector.

While various organizations have reported breaches affecting hundreds of thousands, caution should be taken as reported figures might change, evidenced by discrepancies such as the 2.5 million individuals initially indicated to be affected at Nacogdoches Memorial Hospital. The lack of claims from known cybercrime groups adds to the confusion of attributing these breaches, maintaining a high level of concern regarding cybersecurity in healthcare.

What measures do you think healthcare organizations should implement to better protect patient data?

Learn More: Security Week

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

u/RealOzSultan β€” 1 day ago
β–² 12 r/pwnhub

7-Eleven Confirms Data Breach Amid ShinyHunters Ransom Demand

7-Eleven has confirmed a data breach after the ShinyHunters hacker group claimed to have stolen sensitive information from its systems.

Key Points:

  • 7-Eleven detected an intrusion on April 8, affecting systems storing franchisee documents.
  • Unspecified personal information was compromised, with only two residents in Maine reported as affected.
  • ShinyHunters claimed to have taken over 600,000 records, threatening to leak the data unless a ransom was paid by April 21.

7-Eleven, the leading convenience store chain globally, has reported a confirmed data breach stemming from a recent intrusion into its systems. The breach was first indicated by the hacker group ShinyHunters, who boasted of stealing significant data set, including sensitive personal and corporate information. The company has started notifying affected parties about the incident, which was detected during a routine security check on April 8. Although the specific number of individuals impacted has not been disclosed, the company noted that only two residents from Maine were affected, suggesting a limited scope for this breach.

This incident highlights the escalating threats posed by cybercriminals, particularly the ShinyHunters group, which has been increasingly targeting Salesforce instances of major organizations. Their tactics typically involve phishing and exploiting third-party application misconfigurations rather than exploiting inherent vulnerabilities within Salesforce itself. Following the breach, ShinyHunters has issued ransom demands and has made threats to publicly release the stolen data if their demands are not met. This poses a risk not only to the immediate victims but also raises concerns about broader implications for data security across the franchise landscape.

What measures do you think companies should take to protect themselves from similar data breaches?

Learn More: Security Week

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

u/_cybersecurity_ β€” 2 days ago
β–² 2 r/pwnhub

OpenClaw Flaws Enable Backdoor Access Through Claw Chain Vulnerabilities

Four vulnerabilities in the OpenClaw AI assistant allow attackers to escape the sandbox and install backdoors on the host system.

Key Points:

  • Exploiting prompt injections and malicious plugins initiates the attack chain.
  • Attackers can bypass sandbox restrictions and access sensitive data like credentials and tokens.
  • Critical-severity race condition allows complete system control by modifying configurations.

A recent warning from Cyera highlights significant vulnerabilities identified in the OpenClaw AI assistant, collectively termed Claw Chain. These vulnerabilities enable an attacker to effectively escape the sandbox environment of OpenClaw, potentially gaining backdoor access to the underlying host system. By leveraging prompt injections and malicious plugins, attackers can trigger a series of exploits that allow them to manipulate the AI assistant for malicious purposes. Given that there are over 60,000 publicly accessible OpenClaw instances, the implications of these vulnerabilities are extensive.

After obtaining code execution within the OpenShell sandbox, attackers can exploit a series of flaws, including a race condition (CVE-2026-44113) and an exec allowlist analysis bug (CVE-2026-44115). These exploits enable unauthorized command execution and access to sensitive information like API keys and configuration files. Once attackers achieve elevated privileges through the MCP loopback flaw (CVE-2026-44118), they gain the ability to control critical management functions. The final stage of this chain allows them to modify system configurations and establish persistent control over the host, making detection and defense extremely challenging for cybersecurity measures.

What measures can organizations implement to detect and mitigate potential risks from vulnerabilities like those found in OpenClaw?

Learn More: Security Week

Want to stay updated on the latest cyber threats?

πŸ‘‰ Subscribe to /r/PwnHub

u/_cybersecurity_ β€” 2 days ago