<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>CosmicBytez Labs</title>
    <link>https://labs.cosmicbytez.ca</link>
    <description>IT &amp; Cybersecurity Intelligence - News, Security Alerts, HOWTOs, and Project Guides</description>
    <language>en-ca</language>
    <lastBuildDate>Wed, 13 May 2026 12:41:21 GMT</lastBuildDate>
    <atom:link href="https://labs.cosmicbytez.ca/api/rss" rel="self" type="application/rss+xml"/>
    <image>
      <url>https://labs.cosmicbytez.ca/images/icon.png</url>
      <title>CosmicBytez Labs</title>
      <link>https://labs.cosmicbytez.ca</link>
    </image>
    
    <item>
      <title><![CDATA[CVE-2021-47923: OpenCart 3.0.3.8 Session Fixation Enables Account Takeover]]></title>
      <link>https://labs.cosmicbytez.ca/security/cve-2021-47923</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/security/cve-2021-47923</guid>
      <description><![CDATA[OpenCart 3.0.3.8 fails to regenerate the OCSESSID session cookie after authentication, allowing attackers to inject a known session ID and hijack any user account including administrators. CVSS 9.8 critical.]]></description>
      <pubDate>Mon, 11 May 2026 00:00:00 GMT</pubDate>
      <category>security</category>
      <category>CVE-2021-47923</category>
      <category>OpenCart</category>
      <category>Session Fixation</category>
      <category>Account Takeover</category>
      <category>Cookie Injection</category>
      <category>CWE-384</category>
      <category>eCommerce</category>
    </item>
    <item>
      <title><![CDATA[CVE-2021-47936: OpenCATS 0.9.4 Unauthenticated RCE via PHP File Upload]]></title>
      <link>https://labs.cosmicbytez.ca/security/cve-2021-47936</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/security/cve-2021-47936</guid>
      <description><![CDATA[OpenCATS 0.9.4 allows unauthenticated attackers to upload malicious PHP files through the careers job application endpoint, achieving remote code execution via resume attachment spoofing. CVSS 9.8 critical.]]></description>
      <pubDate>Mon, 11 May 2026 00:00:00 GMT</pubDate>
      <category>security</category>
      <category>CVE-2021-47936</category>
      <category>OpenCATS</category>
      <category>Remote Code Execution</category>
      <category>File Upload</category>
      <category>PHP</category>
      <category>CWE-434</category>
      <category>ATS</category>
    </item>
    <item>
      <title><![CDATA[CrowdSec: Deploy a Community-Powered Intrusion Prevention System]]></title>
      <link>https://labs.cosmicbytez.ca/howtos/2026-05-11-crowdsec-community-ips-setup</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/howtos/2026-05-11-crowdsec-community-ips-setup</guid>
      <description><![CDATA[Install and configure CrowdSec on Linux to detect and block attacks using crowdsourced threat intelligence, custom scenarios, and iptables/nftables bouncers.]]></description>
      <pubDate>Mon, 11 May 2026 00:00:00 GMT</pubDate>
      <category>howto</category>
      <category>crowdsec</category>
      <category>intrusion-prevention</category>
      <category>security</category>
      <category>linux</category>
      <category>ips</category>
      <category>threat-intelligence</category>
      <category>networking</category>
    </item>
    <item>
      <title><![CDATA[American Duo Sentenced for Hosting Laptop Farms for North Korean IT Workers]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-10-american-duo-sentenced-for-hosting-laptop-farms-for-north-korean-it-workers</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-10-american-duo-sentenced-for-hosting-laptop-farms-for-north-korean-it-workers</guid>
      <description><![CDATA[Two U.S. men have been sentenced for operating laptop farms that helped North Korean IT workers fraudulently obtain employment at nearly 70 American companies, generating $1.2 million for the Pyongyang regime.]]></description>
      <pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>APT</category>
      <category>North Korea</category>
      <category>Nation-State</category>
      <category>DOJ</category>
      <category>Fraud</category>
    </item>
    <item>
      <title><![CDATA[Canvas Breach Disrupts Schools & Colleges Nationwide]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-10-canvas-breach-disrupts-schools-038-colleges-nationwide</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-10-canvas-breach-disrupts-schools-038-colleges-nationwide</guid>
      <description><![CDATA[A data extortion attack against Canvas LMS defaced login pages with a ransom demand, disrupting classes and coursework at school districts and universities across the United States.]]></description>
      <pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Data Breach</category>
      <category>Education</category>
      <category>Extortion</category>
      <category>Ransomware</category>
      <category>Canvas</category>
      <category>KrebsOnSecurity</category>
    </item>
    <item>
      <title><![CDATA[Canvas Login Portals Hacked in Mass ShinyHunters Extortion Campaign]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-10-canvas-login-portals-hacked-in-mass-shinyhunters-extortion-campaign</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-10-canvas-login-portals-hacked-in-mass-shinyhunters-extortion-campaign</guid>
      <description><![CDATA[ShinyHunters has struck education technology giant Instructure again, exploiting a fresh vulnerability to deface Canvas login portals across hundreds of colleges and universities in a sweeping new extortion campaign.]]></description>
      <pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Data Breach</category>
      <category>ShinyHunters</category>
      <category>Education</category>
      <category>Vulnerability</category>
      <category>Extortion</category>
    </item>
    <item>
      <title><![CDATA[Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-10-critical-apache-http2-flaw-cve-2026-23918-enables-dos-and-potential-rce</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-10-critical-apache-http2-flaw-cve-2026-23918-enables-dos-and-potential-rce</guid>
      <description><![CDATA[The Apache Software Foundation has released urgent security updates for the Apache HTTP Server addressing a severe vulnerability in the HTTP/2 protocol...]]></description>
      <pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Vulnerability</category>
      <category>CVE</category>
      <category>Apache</category>
      <category>HTTP/2</category>
      <category>Remote Code Execution</category>
      <category>Security Updates</category>
    </item>
    <item>
      <title><![CDATA[Exploit Frenzy Threatens Millions via Critical cPanel Vulnerability]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-10-exploit-cyber-frenzy-threatens-millions-via-critical-cpanel-vulnerability</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-10-exploit-cyber-frenzy-threatens-millions-via-critical-cpanel-vulnerability</guid>
      <description><![CDATA[A critical authentication bypass flaw in cPanel/WHM has triggered a wave of exploit activity, with multiple proof-of-concept exploits now public and researchers warning of zero-day exploitation for at least a month before disclosure.]]></description>
      <pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Zero-Day</category>
      <category>Vulnerability</category>
      <category>cPanel</category>
      <category>Web Hosting</category>
    </item>
    <item>
      <title><![CDATA[GM to Pay Over $12 Million in California Privacy Settlement Involving Driver Data]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-10-gm-to-pay-over-12-million-in-california-privacy-settlement-involving-driver-data</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-10-gm-to-pay-over-12-million-in-california-privacy-settlement-involving-driver-data</guid>
      <description><![CDATA[General Motors has agreed to pay over $12 million to settle California privacy violations under the CCPA after sharing detailed driver behavior data —...]]></description>
      <pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Privacy</category>
      <category>CCPA</category>
      <category>Data Breach</category>
      <category>Automotive</category>
      <category>Regulatory</category>
    </item>
    <item>
      <title><![CDATA[Hackers Abuse Google Ads and Claude.ai Chats to Push Mac Malware]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-10-hackers-abuse-google-ads-claudeai-chats-to-push-mac-malware</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-10-hackers-abuse-google-ads-claudeai-chats-to-push-mac-malware</guid>
      <description><![CDATA[Attackers are running a sophisticated malvertising campaign that hijacks Google Ads and legitimate Claude.ai shared chat sessions to deliver Mac malware to users searching for AI applications.]]></description>
      <pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Malware</category>
      <category>Google</category>
      <category>macOS</category>
      <category>Malvertising</category>
    </item>
    <item>
      <title><![CDATA[Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-10-ivanti-epmm-cve-2026-6973-rce-under-active-exploitation-grants-admin-level-acces</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-10-ivanti-epmm-cve-2026-6973-rce-under-active-exploitation-grants-admin-level-acces</guid>
      <description><![CDATA[Ivanti has disclosed a high-severity improper input validation vulnerability in Endpoint Manager Mobile (EPMM) that is being actively exploited in the wild, granting attackers remote code execution with admin-level access.]]></description>
      <pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Vulnerability</category>
      <category>CVE</category>
      <category>Ivanti</category>
      <category>EPMM</category>
      <category>RCE</category>
      <category>Zero-Day</category>
      <category>Mobile Security</category>
      <category>The Hacker News</category>
    </item>
    <item>
      <title><![CDATA[Multiple Universities Forced to Reschedule Final Exams After Canvas Cyber Incident]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-10-multiple-universities-forced-to-reschedule-final-exams-after-canvas-cyber-incide</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-10-multiple-universities-forced-to-reschedule-final-exams-after-canvas-cyber-incide</guid>
      <description><![CDATA[Dozens of universities were forced to reschedule final examinations after a cybercriminal group displayed threatening messages through Canvas, the widely used Instructure learning management system, disrupting end-of-term academic activities across multiple institutions.]]></description>
      <pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Education</category>
      <category>Cybercrime</category>
      <category>Canvas</category>
      <category>Instructure</category>
      <category>LMS Security</category>
      <category>Data Breach</category>
      <category>Higher Education</category>
    </item>
    <item>
      <title><![CDATA[Ollama Out-of-Bounds Read Flaw Allows Remote Process Memory Leak]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-10-ollama-out-of-bounds-read-vulnerability-allows-remote-process-memory-leak</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-10-ollama-out-of-bounds-read-vulnerability-allows-remote-process-memory-leak</guid>
      <description><![CDATA[Researchers have disclosed a critical out-of-bounds read vulnerability in Ollama that enables remote unauthenticated attackers to leak the entire process memory, potentially exposing model data and sensitive credentials across 300,000+ exposed servers globally.]]></description>
      <pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Vulnerability</category>
      <category>Ollama</category>
      <category>AI Security</category>
      <category>Memory Leak</category>
      <category>Remote Code Execution</category>
      <category>CVE</category>
      <category>LLM Security</category>
    </item>
    <item>
      <title><![CDATA[One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-10-one-missed-threat-per-week-what-25m-alerts-reveal-about-low-severity-risk</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-10-one-missed-threat-per-week-what-25m-alerts-reveal-about-low-severity-risk</guid>
      <description><![CDATA[Analysis of more than 25 million security alerts across enterprise SOCs reveals a troubling pattern: organizations are institutionalizing the practice of...]]></description>
      <pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Threat Intelligence</category>
      <category>SOC</category>
      <category>Alert Fatigue</category>
      <category>Security Operations</category>
      <category>Risk Management</category>
    </item>
    <item>
      <title><![CDATA[PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-10-pan-os-rce-exploit-under-active-use-enabling-root-access-and-espionage</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-10-pan-os-rce-exploit-under-active-use-enabling-root-access-and-espionage</guid>
      <description><![CDATA[Palo Alto Networks has disclosed that CVE-2026-0300, a critical CVSS 9.3 buffer overflow in the PAN-OS User-ID Authentication service, is being actively exploited to gain root-level remote code execution on network firewalls in what appear to be espionage-motivated campaigns.]]></description>
      <pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Vulnerability</category>
      <category>CVE</category>
      <category>Palo Alto Networks</category>
      <category>PAN-OS</category>
      <category>RCE</category>
      <category>Espionage</category>
      <category>Zero-Day</category>
      <category>The Hacker News</category>
    </item>
    <item>
      <title><![CDATA[Police Shut Down Reboot of Crimenetwork Marketplace, Arrest Admin]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-10-police-shut-down-reboot-of-crimenetwork-marketplace-arrest-admin</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-10-police-shut-down-reboot-of-crimenetwork-marketplace-arrest-admin</guid>
      <description><![CDATA[German authorities have seized a relaunched version of the notorious Crimenetwork criminal marketplace that generated over 3.6 million euros, arresting its operator in a coordinated law enforcement operation.]]></description>
      <pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Law Enforcement</category>
      <category>Dark Web</category>
      <category>Criminal Marketplace</category>
      <category>Germany</category>
      <category>Cybercrime Takedown</category>
      <category>BKA</category>
    </item>
    <item>
      <title><![CDATA[Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-10-quasar-linux-rat-steals-developer-credentials-for-software-supply-chain-compromi</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-10-quasar-linux-rat-steals-developer-credentials-for-software-supply-chain-compromi</guid>
      <description><![CDATA[A newly discovered Linux implant called Quasar Linux RAT (QLNX) is silently targeting software developers to harvest credentials, log keystrokes, and...]]></description>
      <pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Supply Chain</category>
      <category>Linux</category>
      <category>Malware</category>
      <category>Credential Theft</category>
      <category>Remote Access Trojan</category>
    </item>
    <item>
      <title><![CDATA[ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-10-threatsday-bulletin-edge-plaintext-passwords-ics-0-days-patch-or-die-alerts-and-</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-10-threatsday-bulletin-edge-plaintext-passwords-ics-0-days-patch-or-die-alerts-and-</guid>
      <description><![CDATA[This week's ThreatsDay threat roundup covers Microsoft Edge storing passwords in plaintext, industrial control system zero-days under active exploitation, critical patch-or-die alerts across major platforms, and over 25 additional cybersecurity stories.]]></description>
      <pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Zero-Day</category>
      <category>Weekly Roundup</category>
      <category>ICS</category>
      <category>Microsoft Edge</category>
      <category>Patch Tuesday</category>
      <category>The Hacker News</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-42569: phpVMS Critical Unauthenticated Legacy Import Access]]></title>
      <link>https://labs.cosmicbytez.ca/security/cve-2026-42569</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/security/cve-2026-42569</guid>
      <description><![CDATA[A critical vulnerability (CVSS 9.4) in phpVMS before version 7.0.6 allows unauthenticated attackers to access a legacy import feature, potentially exposing the entire virtual airline database and administrative controls.]]></description>
      <pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate>
      <category>security</category>
      <category>CVE-2026-42569</category>
      <category>phpVMS</category>
      <category>Authentication Bypass</category>
      <category>PHP</category>
      <category>Virtual Airline</category>
      <category>Critical Vulnerability</category>
      <category>Unauthenticated Access</category>
    </item>
    <item>
      <title><![CDATA[cPanel & WHM Release Fixes for Three New Vulnerabilities — Patch Now]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-09-cpanel-whm-release-fixes-for-three-new-vulnerabilities-patch-now</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-09-cpanel-whm-release-fixes-for-three-new-vulnerabilities-patch-now</guid>
      <description><![CDATA[cPanel has released security updates addressing three vulnerabilities in cPanel and Web Host Manager (WHM), including flaws enabling privilege escalation,...]]></description>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>cPanel</category>
      <category>WHM</category>
      <category>Patch Tuesday</category>
      <category>Web Hosting</category>
      <category>Security Updates</category>
    </item>
    <item>
      <title><![CDATA[Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-09-fake-call-history-apps-stole-payments-from-users-after-73-million-play-store-dow</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-09-fake-call-history-apps-stole-payments-from-users-after-73-million-play-store-dow</guid>
      <description><![CDATA[Cybersecurity researchers discovered 28 fraudulent Android apps on Google Play claiming to offer call history lookups, which instead enrolled users in...]]></description>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Android</category>
      <category>Google Play</category>
      <category>Malware</category>
      <category>Subscription Fraud</category>
      <category>Mobile Security</category>
      <category>Fake Apps</category>
      <category>The Hacker News</category>
      <category>Fleeceware</category>
    </item>
    <item>
      <title><![CDATA[Fake OpenAI Repository on Hugging Face Pushes Infostealer Malware]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-09-fake-openai-repository-on-hugging-face-pushes-infostealer-malware</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-09-fake-openai-repository-on-hugging-face-pushes-infostealer-malware</guid>
      <description><![CDATA[A malicious repository impersonating OpenAI's "Privacy Filter" project climbed to Hugging Face's trending list and delivered information-stealing malware...]]></description>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Malware</category>
      <category>Windows</category>
      <category>BleepingComputer</category>
      <category>Hugging Face</category>
      <category>OpenAI</category>
      <category>Infostealer</category>
      <category>AI Platform</category>
      <category>Supply Chain</category>
    </item>
    <item>
      <title><![CDATA[GM to Pay Over $12 Million in Largest-Ever CCPA Fine Over Driver Data]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-09-gm-to-pay-over-12-million-in-california-privacy-settlement-involving-driver-data</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-09-gm-to-pay-over-12-million-in-california-privacy-settlement-involving-driver-data</guid>
      <description><![CDATA[California regulators have issued a record $12 million settlement against General Motors for sharing OnStar driving behavior data with insurers without...]]></description>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Privacy</category>
      <category>CCPA</category>
      <category>Data Breach</category>
      <category>Automotive</category>
      <category>Regulatory</category>
      <category>General Motors</category>
    </item>
    <item>
      <title><![CDATA[Ivanti Warns of New EPMM Flaw Exploited in Zero-Day Attacks]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-09-ivanti-warns-of-new-epmm-flaw-exploited-in-zero-day-attacks</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-09-ivanti-warns-of-new-epmm-flaw-exploited-in-zero-day-attacks</guid>
      <description><![CDATA[Ivanti has issued an urgent advisory warning customers to patch a high-severity remote code execution vulnerability in Endpoint Manager Mobile (EPMM) that...]]></description>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Zero-Day</category>
      <category>Ivanti</category>
      <category>EPMM</category>
      <category>Remote Code Execution</category>
      <category>Mobile Device Management</category>
    </item>
    <item>
      <title><![CDATA[JDownloader Site Hacked to Replace Installers with Python RAT Malware]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-09-jdownloader-site-hacked-to-replace-installers-with-python-rat-malware</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-09-jdownloader-site-hacked-to-replace-installers-with-python-rat-malware</guid>
      <description><![CDATA[The official website for JDownloader, one of the most widely-used open-source download managers, was compromised to distribute malicious Windows and Linux...]]></description>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Malware</category>
      <category>Windows</category>
      <category>Linux</category>
      <category>BleepingComputer</category>
      <category>Supply Chain</category>
      <category>RAT</category>
      <category>JDownloader</category>
      <category>Open Source</category>
    </item>
    <item>
      <title><![CDATA[New Linux 'Dirty Frag' Zero-Day Gives Root on All Major Distros]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-09-new-linux-dirty-frag-zero-day-gives-root-on-all-major-distros</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-09-new-linux-dirty-frag-zero-day-gives-root-on-all-major-distros</guid>
      <description><![CDATA[A new unpatched Linux zero-day exploit dubbed 'Dirty Frag' allows local attackers to gain root privileges on virtually all major Linux distributions with...]]></description>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Zero-Day</category>
      <category>Linux</category>
      <category>Privilege Escalation</category>
      <category>Kernel</category>
      <category>Exploit</category>
    </item>
    <item>
      <title><![CDATA[Trellix Source Code Breach Highlights Growing Supply Chain Threats]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-09-trellix-source-code-breach-highlights-growing-supply-chain-threats</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-09-trellix-source-code-breach-highlights-growing-supply-chain-threats</guid>
      <description><![CDATA[Trellix, the enterprise security vendor formed from the merger of McAfee Enterprise and FireEye, has suffered a source code breach claimed by the...]]></description>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Data Breach</category>
      <category>Supply Chain</category>
      <category>Trellix</category>
      <category>RansomHouse</category>
      <category>edr</category>
      <category>Source Code</category>
      <category>Dark Reading</category>
    </item>
    <item>
      <title><![CDATA[Zara Data Breach Exposed Personal Information of 197,000 People]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-09-zara-data-breach-exposed-personal-information-of-197000-people</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-09-zara-data-breach-exposed-personal-information-of-197000-people</guid>
      <description><![CDATA[Hackers gained access to Zara's customer databases and stole personal information belonging to more than 197,000 individuals, with the breach surfacing...]]></description>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Data Breach</category>
      <category>Zara</category>
      <category>Inditex</category>
      <category>Retail</category>
      <category>Have I Been Pwned</category>
      <category>Consumer Data</category>
      <category>Spain</category>
      <category>BleepingComputer</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-25199: Apache CloudStack Proxmox Extension Allows Unauthorized Cross-Tenant Instance Access]]></title>
      <link>https://labs.cosmicbytez.ca/security/cve-2026-25199</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/security/cve-2026-25199</guid>
      <description><![CDATA[A critical tenant isolation vulnerability in Apache CloudStack's Proxmox extension (CVSS 9.1) allows one tenant to access and control VM instances...]]></description>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <category>security</category>
      <category>CVE-2026-25199</category>
      <category>Apache CloudStack</category>
      <category>Proxmox</category>
      <category>Tenant Isolation</category>
      <category>Cloud Security</category>
      <category>Multi-Tenancy</category>
      <category>Virtualization</category>
      <category>Unauthorized Access</category>
      <category>CWE-284</category>
      <category>Critical</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-37431: Beauty Parlour Management System SQL Injection (CVSS 9.8)]]></title>
      <link>https://labs.cosmicbytez.ca/security/cve-2026-37431</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/security/cve-2026-37431</guid>
      <description><![CDATA[A critical unauthenticated SQL injection vulnerability in Beauty Parlour Management System v1.1 allows attackers to dump the entire backend database via a...]]></description>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <category>security</category>
      <category>CVE</category>
      <category>SQL Injection</category>
      <category>Web Application</category>
      <category>CVSS Critical</category>
      <category>NVD</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-41583: ZEBRA Zcash Node Consensus Rule Bypass (CVSS 9.1)]]></title>
      <link>https://labs.cosmicbytez.ca/security/cve-2026-41583</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/security/cve-2026-41583</guid>
      <description><![CDATA[A missing sighash validation in ZEBRA, the Rust-based Zcash node, allowed invalid V5 transactions to pass consensus checks — patched in zebrad 4.3.1 and...]]></description>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <category>security</category>
      <category>CVE</category>
      <category>Blockchain</category>
      <category>Zcash</category>
      <category>Consensus Bug</category>
      <category>Cryptocurrency</category>
      <category>CVSS Critical</category>
      <category>NVD</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-41588: RELATE Courseware Timing Attack in Authentication (CVSS 9.0)]]></title>
      <link>https://labs.cosmicbytez.ca/security/cve-2026-41588</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/security/cve-2026-41588</guid>
      <description><![CDATA[A timing attack vulnerability in RELATE's check_sign_in_key() function could allow attackers to infer valid sign-in keys through response time differences...]]></description>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <category>security</category>
      <category>CVE</category>
      <category>Timing Attack</category>
      <category>authentication</category>
      <category>Education Software</category>
      <category>CVSS Critical</category>
      <category>NVD</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-42193: Plunk Email Platform SNS Webhook Forgery]]></title>
      <link>https://labs.cosmicbytez.ca/security/cve-2026-42193</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/security/cve-2026-42193</guid>
      <description><![CDATA[A critical unauthenticated vulnerability in Plunk, the open-source AWS SES email platform, allows attackers to forge Amazon SNS webhook payloads without...]]></description>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <category>security</category>
      <category>CVE</category>
      <category>AWS</category>
      <category>Cloud Security</category>
      <category>NVD</category>
      <category>Email Security</category>
      <category>Webhook</category>
      <category>SNS</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-42296: Argo Workflows templateReferencing Strict Mode Bypass]]></title>
      <link>https://labs.cosmicbytez.ca/security/cve-2026-42296</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/security/cve-2026-42296</guid>
      <description><![CDATA[A high-severity security bypass in Argo Workflows (CVSS 8.1) allows users with Workflow creation permissions to escape templateReferencing: Strict mode,...]]></description>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <category>security</category>
      <category>CVE</category>
      <category>Kubernetes</category>
      <category>Argo Workflows</category>
      <category>Privilege Escalation</category>
      <category>Container Security</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-8153: Universal Robots PolyScope OS Command Injection — Unauthenticated RCE on Industrial Robots]]></title>
      <link>https://labs.cosmicbytez.ca/security/cve-2026-8153</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/security/cve-2026-8153</guid>
      <description><![CDATA[A critical OS command injection flaw in Universal Robots PolyScope Dashboard Server (CVSS 9.8) allows unauthenticated attackers to execute arbitrary...]]></description>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <category>security</category>
      <category>CVE-2026-8153</category>
      <category>Universal Robots</category>
      <category>PolyScope</category>
      <category>OS Command Injection</category>
      <category>CWE-78</category>
      <category>OT/ICS</category>
      <category>Robotics</category>
      <category>Unauthenticated RCE</category>
      <category>Industrial Security</category>
      <category>Critical Infrastructure</category>
    </item>
    <item>
      <title><![CDATA[CISA Gives Federal Agencies Four Days to Patch Actively Exploited Ivanti Zero-Day]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-08-cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-08-cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day</guid>
      <description><![CDATA[CISA has added a high-severity Ivanti Endpoint Manager Mobile vulnerability to the Known Exploited Vulnerabilities catalog and issued an emergency...]]></description>
      <pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Zero-Day</category>
      <category>Ivanti</category>
      <category>CISA</category>
      <category>EPMM</category>
      <category>Federal</category>
      <category>Patch Tuesday</category>
      <category>KEV</category>
    </item>
    <item>
      <title><![CDATA[Ivanti Customers Confront Yet Another Actively Exploited Zero-Day in EPMM]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-08-ivanti-customers-confront-yet-another-actively-exploited-zero-day</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-08-ivanti-customers-confront-yet-another-actively-exploited-zero-day</guid>
      <description><![CDATA[Attackers are actively exploiting a new zero-day vulnerability in Ivanti Endpoint Manager Mobile (EPMM), the latest in a long series of critical flaws...]]></description>
      <pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Zero-Day</category>
      <category>Ivanti</category>
      <category>EPMM</category>
      <category>Mobile Security</category>
      <category>Network Edge</category>
      <category>Vulnerability</category>
      <category>CyberScoop</category>
    </item>
    <item>
      <title><![CDATA[NVIDIA Confirms GeForce NOW Data Breach Affecting Armenian Users]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-08-nvidia-confirms-geforce-now-data-breach-affecting-armenian-users</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-08-nvidia-confirms-geforce-now-data-breach-affecting-armenian-users</guid>
      <description><![CDATA[NVIDIA has confirmed that GeForce NOW user data was exposed in a data breach, with the incident specifically affecting users in Armenia. The company...]]></description>
      <pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Data Breach</category>
      <category>NVIDIA</category>
      <category>GeForce NOW</category>
      <category>Cloud Gaming</category>
      <category>BleepingComputer</category>
    </item>
    <item>
      <title><![CDATA[Trellix Source Code Breach Claimed by RansomHouse Hackers]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-08-trellix-source-code-breach-claimed-by-ransomhouse-hackers</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-08-trellix-source-code-breach-claimed-by-ransomhouse-hackers</guid>
      <description><![CDATA[The RansomHouse threat group has claimed responsibility for the Trellix source code repository breach disclosed last week, leaking a set of proof images...]]></description>
      <pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Data Breach</category>
      <category>Trellix</category>
      <category>RansomHouse</category>
      <category>Ransomware</category>
      <category>Source Code</category>
      <category>Threat Intelligence</category>
      <category>BleepingComputer</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-33109: Azure Managed Instance for Apache Cassandra Remote Code Execution (CVSS 9.9)]]></title>
      <link>https://labs.cosmicbytez.ca/security/cve-2026-33109</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/security/cve-2026-33109</guid>
      <description><![CDATA[A critical improper access control flaw in Azure Managed Instance for Apache Cassandra allows an authorized network attacker to execute arbitrary code,...]]></description>
      <pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate>
      <category>security</category>
      <category>CVE</category>
      <category>Azure</category>
      <category>Apache Cassandra</category>
      <category>Cloud Security</category>
      <category>NVD</category>
      <category>Remote Code Execution</category>
      <category>Access Control</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-41500: electerm macOS Command Injection via Install Script]]></title>
      <link>https://labs.cosmicbytez.ca/security/cve-2026-41500</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/security/cve-2026-41500</guid>
      <description><![CDATA[A critical command injection vulnerability in the electerm terminal client allows remote attackers to achieve unauthenticated code execution on macOS...]]></description>
      <pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate>
      <category>security</category>
      <category>CVE</category>
      <category>Command Injection</category>
      <category>RCE</category>
      <category>macOS</category>
      <category>Terminal</category>
      <category>Supply Chain</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-41501: electerm Linux Command Injection via Install Script]]></title>
      <link>https://labs.cosmicbytez.ca/security/cve-2026-41501</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/security/cve-2026-41501</guid>
      <description><![CDATA[A critical command injection flaw in electerm's Linux installer allows remote attackers to execute arbitrary shell commands by injecting into unsanitized...]]></description>
      <pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate>
      <category>security</category>
      <category>CVE</category>
      <category>Command Injection</category>
      <category>RCE</category>
      <category>Linux</category>
      <category>Terminal</category>
      <category>Supply Chain</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-42208: LiteLLM AI Gateway Pre-Auth SQL Injection]]></title>
      <link>https://labs.cosmicbytez.ca/security/cve-2026-42208</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/security/cve-2026-42208</guid>
      <description><![CDATA[A critical SQL injection vulnerability in LiteLLM's proxy server allows unauthenticated attackers to manipulate database queries during API key...]]></description>
      <pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate>
      <category>security</category>
      <category>CVE</category>
      <category>SQL Injection</category>
      <category>AI Gateway</category>
      <category>LiteLLM</category>
      <category>Pre-Auth</category>
      <category>LLM Security</category>
    </item>
    <item>
      <title><![CDATA[CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-03-cisa-adds-actively-exploited-linux-root-access-bug-cve-2026-31431-to-kev</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-03-cisa-adds-actively-exploited-linux-root-access-bug-cve-2026-31431-to-kev</guid>
      <description><![CDATA[The U.S. Cybersecurity and Infrastructure Security Agency has added CVE-2026-31431, a Linux kernel privilege escalation flaw enabling root access, to its...]]></description>
      <pubDate>Sun, 03 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Vulnerability</category>
      <category>CVE</category>
      <category>Linux</category>
      <category>CISA</category>
      <category>KEV</category>
      <category>Privilege Escalation</category>
      <category>The Hacker News</category>
    </item>
    <item>
      <title><![CDATA[New Bluekit Phishing Kit Features AI Assistant and Automated Domain Registration]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-03-new-bluekit-phishing-kit-features-ai-assistant</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-03-new-bluekit-phishing-kit-features-ai-assistant</guid>
      <description><![CDATA[A newly discovered phishing-as-a-service toolkit called Bluekit is emerging on underground forums, offering threat actors an AI assistant for campaign...]]></description>
      <pubDate>Sun, 03 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Phishing</category>
      <category>Threat Intelligence</category>
      <category>AI</category>
      <category>Cybercrime</category>
      <category>SecurityWeek</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-5324: WordPress Brizy Page Builder Unauthenticated Stored XSS]]></title>
      <link>https://labs.cosmicbytez.ca/security/cve-2026-5324</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/security/cve-2026-5324</guid>
      <description><![CDATA[The Brizy Page Builder plugin for WordPress contains a critical unauthenticated Stored Cross-Site Scripting flaw in versions up to 2.8.11, enabling...]]></description>
      <pubDate>Sun, 03 May 2026 00:00:00 GMT</pubDate>
      <category>security</category>
      <category>CVE</category>
      <category>WordPress</category>
      <category>XSS</category>
      <category>NVD</category>
      <category>Vulnerability</category>
      <category>Web Security</category>
    </item>
    <item>
      <title><![CDATA[ConsentFix v3 Automates Azure OAuth Abuse With Mass Compromise Potential]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-02-consentfix-v3-attacks-target-azure-with-automated-oauth-abuse</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-02-consentfix-v3-attacks-target-azure-with-automated-oauth-abuse</guid>
      <description><![CDATA[A new iteration of the ConsentFix attack toolkit has surfaced on cybercriminal forums, adding automation and scaling capabilities to OAuth consent...]]></description>
      <pubDate>Sat, 02 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Azure</category>
      <category>OAuth</category>
      <category>Microsoft 365</category>
      <category>Entra ID</category>
      <category>Identity Security</category>
      <category>Phishing</category>
      <category>Attack Technique</category>
    </item>
    <item>
      <title><![CDATA[Critical cPanel Flaw Mass-Exploited in 'Sorry' Ransomware Attacks]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-02-critrical-cpanel-flaw-mass-exploited-in-sorry-ransomware-attacks</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-02-critrical-cpanel-flaw-mass-exploited-in-sorry-ransomware-attacks</guid>
      <description><![CDATA[A newly disclosed critical vulnerability in cPanel and WHM tracked as CVE-2026-41940 is being mass-exploited by ransomware actors to breach web hosting...]]></description>
      <pubDate>Sat, 02 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Ransomware</category>
      <category>CVE</category>
      <category>cPanel</category>
      <category>Web Hosting</category>
      <category>Data Breach</category>
      <category>Cybercrime</category>
    </item>
    <item>
      <title><![CDATA[Edu-Tech Firm Instructure Discloses Cyber Incident, Probes Impact on Canvas LMS]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-02-edu-tech-firm-instructure-discloses-cyber-incident-probes-impact</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-02-edu-tech-firm-instructure-discloses-cyber-incident-probes-impact</guid>
      <description><![CDATA[Instructure, the company behind the widely used Canvas learning management system, has disclosed a cybersecurity incident and is investigating its scope....]]></description>
      <pubDate>Sat, 02 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Data Breach</category>
      <category>Instructure</category>
      <category>Canvas</category>
      <category>Education</category>
      <category>Cybersecurity</category>
      <category>LMS</category>
    </item>
    <item>
      <title><![CDATA[In Other News: Scattered Spider Member Arrested, SOC Metrics, NSA Tool Flaw]]></title>
      <link>https://labs.cosmicbytez.ca/news/2026-05-02-in-other-news-scattered-spider-hacker-arrested-soc-effectiveness-metrics-nsa-too</link>
      <guid isPermaLink="true">https://labs.cosmicbytez.ca/news/2026-05-02-in-other-news-scattered-spider-hacker-arrested-soc-effectiveness-metrics-nsa-too</guid>
      <description><![CDATA[A Scattered Spider threat actor has been arrested, a vulnerability in an NSA tool is disclosed, SOC effectiveness metrics get a rethink, and OFAC...]]></description>
      <pubDate>Sat, 02 May 2026 00:00:00 GMT</pubDate>
      <category>news</category>
      <category>Scattered Spider</category>
      <category>Law Enforcement</category>
      <category>NSA</category>
      <category>SOC</category>
      <category>OFAC</category>
      <category>Iran</category>
      <category>Security Roundup</category>
    </item>
  </channel>
</rss>