Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak

10/05/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed a critical security vulnerability in Ollama that, if successfully exploited, could allow a remote, unauthenticated attacker to leak its entire process memory. The out-of-bounds read flaw,

cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now

09/05/2026 0 Comments 0 tags

cPanel has released updates to address three vulnerabilities in cPanel and Web Host Manager (WHM) that could be exploited to achieve privilege escalation, code execution, and denial-of-service. The list of

TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms

08/05/2026 0 Comments 0 tags

Threat hunters have flagged a previously undocumented Brazilian banking trojan dubbed TCLBANKER that’s capable of targeting 59 banking, fintech, and cryptocurrency platforms. The activity is being tracked by Elastic Security

Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads

08/05/2026 0 Comments 0 tags

Cybersecurity researchers have discovered fraudulent apps on the official Google Play Store for Android that falsely claimed to offer access to call histories for any phone number, only to trick

Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise

08/05/2026 0 Comments 0 tags

A previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) is targeting developers’ systems to establish a silent foothold as well as facilitate a broad range of post-compromise functionality, such

New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials

08/05/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new Linux backdoor named PamDOORa that’s being advertised on the Rehub Russian cybercrime forum for $1,600 by a threat actor called “darkworm.” The

One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk

08/05/2026 0 Comments 0 tags

The dark secret of enterprise security operations is that defenders have quietly institutionalized the practice of not looking. This is not just anecdotal, but rather backed by a recent report

Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions

08/05/2026 0 Comments 0 tags

Details have emerged about a new, unpatched local privilege escalation (LPE) vulnerability impacting the Linux kernel. Dubbed Dirty Frag, it has been described as a successor to Copy Fail (CVE-2026-31431,

PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems

07/05/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new credential theft framework dubbed PCPJack that targets exposed cloud infrastructure and ousts any artifacts linked to TeamPCP from the environments. “The toolset

Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access

07/05/2026 0 Comments 0 tags

Ivanti is warning that a new security flaw impacting Endpoint Manager Mobile (EPMM) has been explored in limited attacks in the wild. The high-severity vulnerability, CVE-2026-6973 (CVSS score: 7.2), is