~/news vault: 164 entries last sync: 06:26 model: gemma4:26b
— Tech briefing archive

The signal
through the noise.

A locally-curated stream of what matters in software, AI, and security. Filtered, scored, summarized, indexed.

$
All 164 Ai 58 Dev-tools 29 General 19 Infra 25 Releases 2 Security 31
§ 01

Today

1 entries
8/ 10
CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV
CISA has added CVE-2026-31431, also known as "Copy Fail," to its Known Exploited Vulnerabilities (KEV) catalog due to evidence of active exploitation. This local privilege escalation (LPE) vulnerability allows...
§ 02

This week

20 entries
9/ 10
Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft
A software supply chain attack campaign attributed to the GitHub account "BufferZoneCorp" has been identified using malicious Ruby gems and Go modules. The attack utilizes "sleeper" packages to deploy payloads designed...
7/ 10
Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks
Two cybercrime groups, Cordial Spider (CL-CRI-1116, O-UNC-045, UNC6671) and Snarky Spider (O-UNC-025, UNC6661), are conducting rapid SaaS extortion attacks by abusing Single Sign-On (SSO) environments. The groups...
9/ 10
PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials
A coordinated supply chain attack targeting the PyPI, npm, and Packagist ecosystems has been identified, involving the compromise of PyTorch Lightning and Intercom-client packages. The campaign, associated with the...
8/ 10
New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials
DEEP#DOOR is a Python-based backdoor framework designed for persistent access, surveillance, and credential exfiltration. The malware utilizes a batch script to extract an embedded Python payload at runtime, leveraging...
9/ 10
New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions
CVE-2026-31431, codenamed "Copy Fail," is a high-severity (CVSS 7.8) local privilege escalation (LPE) vulnerability within the Linux kernel's cryptographic subsystem. It allows an unprivileged local user to gain root...
9/ 10
Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution
Google has patched a critical remote code execution (RCA) vulnerability in the Gemini CLI and its associated GitHub Actions workflow, which previously allowed attackers to execute commands on host systems....
8/ 10
EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades
A sophisticated malware campaign, identified in March 2026, uses SEO poisoning and a dual-stage GitHub distribution architecture to deliver malicious MSI installers to enterprise administrators. The campaign leverages...
8/ 10
SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack
A supply chain attack campaign, identified as "Mini Shai-Hulud," has compromised several npm packages within the SAP JavaScript and cloud development ecosystem to steal developer credentials and cloud secrets. The...
9/ 10
New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs
The North Korean threat actor Famous Chollima (also known as Shifty Corsair) is executing a sophisticated, multi-stage malware campaign targeting the Web3 and open-source developer ecosystem. The attack utilizes...
9/ 10
LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure
A critical SQL injection vulnerability, tracked as CVE-2026-42208 (CVSS 9.3), was identified in the LiteLLM Python package, allowing unauthenticated attackers to read from and modify the proxy database. The flaw was...
9/ 10
Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately
A critical authentication bypass vulnerability, identified as CVE-2026-41940, affects all currently supported versions of cPanel and WebHost Manager (WHM). This flaw allows unauthenticated remote attackers to gain...
8/ 10
CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV
CISA has added two actively exploited vulnerabilities—affecting ConnectWise ScreenConnect and Microsoft Windows—to its Known Exploited Vulnerabilities (KEV) catalog. These additions follow confirmed reports of...
8/ 10
VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi
VECT 2.0 is a ransomware-as-a-service (RaaS) operation that functions as a data wiper for files exceeding 131KB. Due to a critical flaw in its encryption implementation, the malware permanently destroys the majority of...
10/ 10
Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push
CVE-2026-3854 is a critical command injection vulnerability affecting GitHub.com and GitHub Enterprise Server that allows authenticated users with push access to achieve remote code execution (RCE) via a single `git...
7/ 10
Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover
Microsoft patched a vulnerability in the Entra ID "Agent ID Administrator" role that allowed for unauthorized service principal takeover. The flaw enabled users assigned this role to gain ownership of arbitrary service...
7/ 10
Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202
Microsoft has confirmed the active exploitation of CVE-2026-32202, a high-severity spoofing vulnerability within the Windows Shell. The flaw allows unauthorized attackers to access sensitive information by leveraging an...
8/ 10
Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE
A critical unauthenticated remote code execution (RCE) vulnerability, identified as CVE-2026-25874, has been discovered in Hugging Face's LeRobot robotics platform. The flaw allows an attacker to execute arbitrary...
9/ 10
Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware
Researchers have identified a campaign of 73 malicious or "sleeper" VS Code extensions on the Open VSX repository linked to the GlassWorm v2 malware. The campaign uses typosquatting and visual mimicry to distribute...
7/ 10
Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side
Anthropic's Claude Mythos Preview introduces an AI-driven system capable of large-scale vulnerability identification. This advancement significantly accelerates the discovery phase of the security lifecycle, potentially...
8/ 10
Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack
Checkmarx has confirmed that data from its GitHub repository was leaked on the dark web following a supply chain attack on March 23, 2026. While the company asserts that its customer production environments are isolated...
§ 03

Earlier

10 entries
7/ 10
Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2
The threat actor Tropic Trooper is deploying the AdaptixC2 Beacon agent through a trojanized version of the SumatraPDF reader. The campaign leverages GitHub as a command-and-control (C2) platform and utilizes Microsoft...
8/ 10
LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure
A high-severity Server-Side Request Forgery (SSRF) vulnerability, tracked as CVE-2026-33626, has been identified in the LMDeploy toolkit. The flaw allows attackers to exploit the vision-language module to access...
7/ 10
FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches
A new Linux ELF-based backdoor named FIRESTARTER has been identified targeting Cisco Firepower and Adaptive Security Appliance (ASA) devices. The malware exploits critical vulnerabilities to establish persistent remote...
7/ 10
Vercel Finds More Compromised Accounts in Context.ai-Linked Breach
Vercel has identified additional compromised customer accounts following a security breach that originated from a third-party compromise of Context.ai. The incident involved an attacker leveraging a hijacked Google...
7/ 10
ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories
This update details a series of high-impact security incidents involving the compromise of decentralized finance (DeFi) infrastructure, widespread npm supply chain attacks, and emerging vulnerabilities in AI agents and...
8/ 10
Project Glasswing Proved AI Can Find the Bugs. Who's Going to Fix Them?
Anthropic's Project Glasswing, powered by the Mythos model, has demonstrated advanced capabilities in autonomously discovering and exploiting complex software vulnerabilities across major operating systems and browsers....
9/ 10
Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign
The Bitwarden CLI package `@bitwarden/cli@2026.4.0` was compromised as part of the Checkmarx supply chain campaign, leading to the distribution of a malicious npm package. The attack leveraged a compromised GitHub...
8/ 10
Patch Tuesday, April 2026 Edition
Microsoft's April 2026 update addresses 167 vulnerabilities, including active zero-day exploits in SharePoint Server and Windows Defender. Concurrent emergency patches for Google Chrome and Adobe Reader address critical...
8/ 10
Russia Hacked Routers to Steal Microsoft Office Tokens
The threat actor Forest Blizzard (also known as APT28 or Fancy Bear) is exploiting vulnerabilities in legacy and unpatched SOHO routers to perform large-scale DNS hijacking. This technique allows attackers to intercept...
7/ 10
How AI Assistants are Moving the Security Goalposts
The proliferation of autonomous AI agents, such as OpenClaw, introduces significant security risks including credential exposure, supply chain attacks, and automated lateral movement. Because these agents possess...