<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Cybersecurity on Cowlpane</title>
    <link>https://cowlpane.com/tags/cybersecurity/</link>
    <description>Recent content in Cybersecurity on Cowlpane</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 09 May 2026 14:26:03 +0000</lastBuildDate>
    <atom:link href="https://cowlpane.com/tags/cybersecurity/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Fake OpenAI repository on Hugging Face pushes infostealer malware</title>
      <link>https://cowlpane.com/tech/fake-openai-repository-on-hugging-face-pushes-infostealer-malware/</link>
      <pubDate>Sat, 09 May 2026 14:26:03 +0000</pubDate>
      <guid>https://cowlpane.com/tech/fake-openai-repository-on-hugging-face-pushes-infostealer-malware/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/fake-openai-repository-on-hugging-face-pushes-infostealer-malware/&#34;&gt;BleepingComputer&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;A malicious Hugging Face repository that reached the platform’s trending list impersonated OpenAI’s “Privacy Filter” project to deliver information-stealing malware to Windows users.&lt;/p&gt;&#xA;&lt;p&gt;The repository briefly reached #1 on Hugging Face and accumulated 244,000 downloads before the platform responded to reports and removed it.&lt;/p&gt;&#xA;&lt;p&gt;The Hugging Face platform lets developers and researchers share AI models, datasets, and machine learning (ML) tools. Models are pre-trained AI systems hosted on the platform comprising weight files, configuration, and code.&lt;/p&gt;</description>
    </item>
    <item>
      <title>cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now</title>
      <link>https://cowlpane.com/tech/cpanel-whm-release-fixes-for-three-new-vulnerabilities-patch-now/</link>
      <pubDate>Sat, 09 May 2026 07:16:00 +0000</pubDate>
      <guid>https://cowlpane.com/tech/cpanel-whm-release-fixes-for-three-new-vulnerabilities-patch-now/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://thehackernews.com/2026/05/cpanel-whm-patch-3-new-vulnerabilities.html&#34;&gt;The Hacker News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;cPanel has released updates to address three vulnerabilities in cPanel and Web Host Manager (WHM) that could be exploited to achieve privilege escalation, code execution, and denial-of-service.&lt;/p&gt;&#xA;&lt;p&gt;The list of vulnerabilities is as follows -&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;CVE-2026-29201(CVSS score: 4.3) - An insufficient input validation of the feature file name in the &amp;ldquo;feature::LOADFEATUREFILE&amp;rdquo; adminbin call that could result in an arbitrary file read.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;CVE-2026-29202(CVSS score: 8.8) - An insufficient input validation of the &amp;ldquo;plugin&amp;rdquo; parameter in the &amp;ldquo;create_user API&amp;rdquo; call that could result in arbitrary Perl code execution on behalf of the already authenticated account&amp;rsquo;s system user.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms</title>
      <link>https://cowlpane.com/tech/tclbanker-banking-trojan-targets-financial-platforms-via-whatsapp-and-outlook-wo/</link>
      <pubDate>Fri, 08 May 2026 18:12:00 +0000</pubDate>
      <guid>https://cowlpane.com/tech/tclbanker-banking-trojan-targets-financial-platforms-via-whatsapp-and-outlook-wo/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://thehackernews.com/2026/05/tclbanker-banking-trojan-targets.html&#34;&gt;The Hacker News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;Threat hunters have flagged a previously undocumented Brazilian banking trojan dubbedTCLBANKERthat&amp;rsquo;s capable of targeting 59 banking, fintech, and cryptocurrency platforms.&lt;/p&gt;&#xA;&lt;p&gt;The activity is being tracked by Elastic Security Labs under the monikerREF3076. The malware family is assessed to be a major update of theMaverick, which is known to leverage a worm called SORVEPOTEL to spread via WhatsApp Web to a victim&amp;rsquo;s contacts. The Maverick campaign is attributed to a threat cluster that Trend Micro calls Water Saci.&lt;/p&gt;</description>
    </item>
    <item>
      <title>NVIDIA confirms GeForce NOW data breach affecting Armenian users</title>
      <link>https://cowlpane.com/tech/nvidia-confirms-geforce-now-data-breach-affecting-armenian-users/</link>
      <pubDate>Fri, 08 May 2026 16:18:31 +0000</pubDate>
      <guid>https://cowlpane.com/tech/nvidia-confirms-geforce-now-data-breach-affecting-armenian-users/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/nvidia-confirms-geforce-now-data-breach-affecting-armenian-users/&#34;&gt;BleepingComputer&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;NVIDIA has confirmed in a statement for BleepingComputer that GeForce NOW user information has been exposed in a data breach.&lt;/p&gt;&#xA;&lt;p&gt;The gaming and hardware giant has clarified that the impact is limited to Armenia, and was caused by a compromise of the infrastructure operated by a regional partner.&lt;/p&gt;&#xA;&lt;p&gt;The company added that its own network was not impacted by the incident.&lt;/p&gt;&#xA;&lt;p&gt;“Our investigation found no impact on NVIDIA-operated services. The issue is limited to systems run by a third-party GeForce NOW Alliance partner based in Armenia.  We are working closely with the partner to support their investigation and resolution. Impacted users will be notified by GFN.am,” the company said.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads</title>
      <link>https://cowlpane.com/tech/fake-call-history-apps-stole-payments-from-users-after-73-million-play-store-dow/</link>
      <pubDate>Fri, 08 May 2026 15:08:00 +0000</pubDate>
      <guid>https://cowlpane.com/tech/fake-call-history-apps-stole-payments-from-users-after-73-million-play-store-dow/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://thehackernews.com/2026/05/fake-call-history-apps-stole-payments.html&#34;&gt;The Hacker News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;Cybersecurity researchers have discovered fraudulent apps on the official Google Play Store for Android that falsely claimed to offer access to call histories for any phone number, only to trick users into joining a subscription that provided fake data and incurred financial loss.&lt;/p&gt;&#xA;&lt;p&gt;The 28 apps have collectively racked up more than 7.3 million downloads, with one of them alone accounting for over 3 million downloads, before they were taken down from the official app storefront.The activity, codenamedCallPhantomby Slovakian cybersecurity company ESET, primarily targeted Android users in India and the broader Asia-Pacific region.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Why More Analysts Won’t Solve Your SOC’s Alert Problem</title>
      <link>https://cowlpane.com/tech/why-more-analysts-wont-solve-your-socs-alert-problem/</link>
      <pubDate>Fri, 08 May 2026 14:02:12 +0000</pubDate>
      <guid>https://cowlpane.com/tech/why-more-analysts-wont-solve-your-socs-alert-problem/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/why-more-analysts-wont-solve-your-socs-alert-problem/&#34;&gt;BleepingComputer&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;By Rich Perkins, Principal Sales Engineer, Prophet Security&lt;/p&gt;&#xA;&lt;p&gt;Your security spend has roughlydoubled in six years. Your time-to-investigate and respond hasn&amp;rsquo;t moved. Your CFO is asking why the security headcount keeps growing while the metrics that matter to the business don&amp;rsquo;t.&lt;/p&gt;&#xA;&lt;p&gt;The architecture under your SOC is the reason. Not your team. Not your tooling investment. Not your hiring funnel. The operating model your program inherited assumed human-drivenalert triageat the volume the business was producing five years ago, and the business stopped producing alerts at that volume a long time ago.&lt;/p&gt;</description>
    </item>
    <item>
      <title>One Click, Total Shutdown: The &#34;Patient Zero&#34; Webinar on Killing Stealth Breaches</title>
      <link>https://cowlpane.com/tech/one-click-total-shutdown-the-patient-zero-webinar-on-killing-stealth-breaches/</link>
      <pubDate>Fri, 08 May 2026 14:01:00 +0000</pubDate>
      <guid>https://cowlpane.com/tech/one-click-total-shutdown-the-patient-zero-webinar-on-killing-stealth-breaches/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://thehackernews.com/2026/05/one-click-total-shutdown-patient-zero.html&#34;&gt;The Hacker News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;The hardest part of cybersecurity isn&amp;rsquo;t the technology, it’s the people.&lt;/p&gt;&#xA;&lt;p&gt;Every major breach you’ve read about lately usually starts the same way: one employee, one clever email, and one &amp;ldquo;Patient Zero&amp;rdquo; infection.&lt;/p&gt;&#xA;&lt;p&gt;In 2026, hackers are using AI to make these &amp;ldquo;first clicks&amp;rdquo; nearly impossible to spot. If a single laptop gets compromised on your watch, do you have a plan to stop it from taking down the whole company?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Trellix source code breach claimed by RansomHouse hackers</title>
      <link>https://cowlpane.com/tech/trellix-source-code-breach-claimed-by-ransomhouse-hackers/</link>
      <pubDate>Fri, 08 May 2026 13:23:23 +0000</pubDate>
      <guid>https://cowlpane.com/tech/trellix-source-code-breach-claimed-by-ransomhouse-hackers/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/trellix-source-code-breach-claimed-by-ransomhouse-hackers/&#34;&gt;BleepingComputer&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;The attack on the Trellix source code repository disclosed last week has been claimed by the RansomHouse threat group, which leaked a small set of images as proof of the intrusion.&lt;/p&gt;&#xA;&lt;p&gt;Yesterday, the threat actor published on their data leak site screenshots indicating access to the cybersecurity company&amp;rsquo;s appliance management system. However, BleepingComputer could not confirm the authenticity of the data.&lt;/p&gt;&#xA;&lt;p&gt;Trellix is an international cybersecurity firm with global Fortune 100 customers. In 2025, the company had more than 53,000 customers in 185 countries and 3,500 employees.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CISA gives feds four days to patch Ivanti flaw exploited as zero-day</title>
      <link>https://cowlpane.com/tech/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day/</link>
      <pubDate>Fri, 08 May 2026 12:16:32 +0000</pubDate>
      <guid>https://cowlpane.com/tech/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day/&#34;&gt;BleepingComputer&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has given U.S. federal agencies four days to secure their networks against a high-severity vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that has been exploited in zero-day attacks.&lt;/p&gt;&#xA;&lt;p&gt;Tracked as CVE-2026-6973, this security flaw allows attackers with administrative privileges to execute arbitrary code remotely on systems running EPMM 12.8.0.0 and earlier.&lt;/p&gt;&#xA;&lt;p&gt;In aThursday security advisory, Ivanti told customers they can secure their appliances by installing Ivanti EPMM 12.6.1.1, 12.7.0.1, and 12.8.0.1, and advised them to review accounts with Admin rights and rotate those credentials where necessary.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise</title>
      <link>https://cowlpane.com/tech/quasar-linux-rat-steals-developer-credentials-for-software-supply-chain-compromi/</link>
      <pubDate>Fri, 08 May 2026 11:00:00 +0000</pubDate>
      <guid>https://cowlpane.com/tech/quasar-linux-rat-steals-developer-credentials-for-software-supply-chain-compromi/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://thehackernews.com/2026/05/quasar-linux-rat-steals-developer.html&#34;&gt;The Hacker News&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;A previously undocumented Linux implant codenamedQuasar Linux RAT (QLNX)is targeting developers&amp;rsquo; systems to establish a silent foothold as well as facilitate a broad range of post-compromise functionality, such as credential harvesting, keylogging, file manipulation, clipboard monitoring, and network tunneling.&lt;/p&gt;&#xA;&lt;p&gt;&amp;ldquo;QLNX targets developers and DevOps credentials across the software supply chain,&amp;rdquo; Trend Micro researchers Aliakbar Zahravi and Ahmed Mohamed Ibrahimsaidin a technical analysis of the malware.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Canvas Breach Disrupts Schools &amp; Colleges Nationwide</title>
      <link>https://cowlpane.com/tech/canvas-breach-disrupts-schools-colleges-nationwide/</link>
      <pubDate>Fri, 08 May 2026 02:58:46 +0000</pubDate>
      <guid>https://cowlpane.com/tech/canvas-breach-disrupts-schools-colleges-nationwide/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://krebsonsecurity.com/2026/05/canvas-breach-disrupts-schools-colleges-nationwide/&#34;&gt;Krebs on Security&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;&lt;small class=&#34;photo-credit&#34;&gt;Photo by &lt;a href=&#34;https://unsplash.com/@rmrdnl?utm_source=cowlpane&amp;utm_medium=referral&#34;&gt;Daniel Romero&lt;/a&gt; on &lt;a href=&#34;https://unsplash.com/?utm_source=cowlpane&amp;utm_medium=referral&#34;&gt;Unsplash&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;&#xA;&lt;p&gt;An ongoing data extortion attack targeting the widely-used education technology platformCanvasdisrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the service’s login page with a ransom demand that threatened to leak data from 275 million students and faculty across nearly 9,000 educational institutions.&lt;/p&gt;&#xA;&lt;p&gt;A screenshot shared by a reader showing the extortion message that was shown on the Canvas login page today.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
