<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security on Cowlpane</title>
    <link>https://cowlpane.com/tags/security/</link>
    <description>Recent content in Security on Cowlpane</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 09 May 2026 14:26:03 +0000</lastBuildDate>
    <atom:link href="https://cowlpane.com/tags/security/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Fake OpenAI repository on Hugging Face pushes infostealer malware</title>
      <link>https://cowlpane.com/tech/fake-openai-repository-on-hugging-face-pushes-infostealer-malware/</link>
      <pubDate>Sat, 09 May 2026 14:26:03 +0000</pubDate>
      <guid>https://cowlpane.com/tech/fake-openai-repository-on-hugging-face-pushes-infostealer-malware/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/fake-openai-repository-on-hugging-face-pushes-infostealer-malware/&#34;&gt;BleepingComputer&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;A malicious Hugging Face repository that reached the platform’s trending list impersonated OpenAI’s “Privacy Filter” project to deliver information-stealing malware to Windows users.&lt;/p&gt;&#xA;&lt;p&gt;The repository briefly reached #1 on Hugging Face and accumulated 244,000 downloads before the platform responded to reports and removed it.&lt;/p&gt;&#xA;&lt;p&gt;The Hugging Face platform lets developers and researchers share AI models, datasets, and machine learning (ML) tools. Models are pre-trained AI systems hosted on the platform comprising weight files, configuration, and code.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hackable Robot Lawn Mower Unlocks a New Nightmare</title>
      <link>https://cowlpane.com/tech/hackable-robot-lawn-mower-unlocks-a-new-nightmare/</link>
      <pubDate>Sat, 09 May 2026 10:30:00 +0000</pubDate>
      <guid>https://cowlpane.com/tech/hackable-robot-lawn-mower-unlocks-a-new-nightmare/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://www.wired.com/story/security-news-this-week-hackable-robot-lawnmower-unlocks-a-new-nightmare/&#34;&gt;Wired&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;Cramming for finalsis bad enough without the platform you use to do your schoolwork suddenly shutting down. Unfortunately for countless students across the US, that’s exactly what they faced on Thursday afterCanvas went into “maintenance mode”following a ransomware attack on education tech firm Instructure. Hackers using the nameShinyHuntersclaimed responsibility for the breach, and experts say the chaos they caused shows how far these actors will go to extort their victims.&lt;/p&gt;</description>
    </item>
    <item>
      <title>5,000 vibe-coded apps just proved shadow AI is the new S3 bucket crisis</title>
      <link>https://cowlpane.com/tech/5000-vibe-coded-apps-just-proved-shadow-ai-is-the-new-s3-bucket-crisis/</link>
      <pubDate>Fri, 08 May 2026 20:57:01 +0000</pubDate>
      <guid>https://cowlpane.com/tech/5000-vibe-coded-apps-just-proved-shadow-ai-is-the-new-s3-bucket-crisis/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://venturebeat.com/security/vibe-coded-apps-shadow-ai-s3-bucket-crisis-ciso-audit-framework&#34;&gt;VentureBeat&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;Most enterprise security programs were built to protect servers, endpoints, and cloud accounts. None of them was built to find a customer intake form that a product manager vibe coded on Lovable over a weekend, connected to a live Supabase database, and deployed on a public URL indexed by Google. Th&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;div class=&#34;affiliate-pick&#34;&gt;&lt;div class=&#34;affiliate-badge&#34;&gt;Recommended&lt;/div&gt;&lt;a href=&#34;https://www.amazon.com/dp/0593716736?tag=cowlpane-21&#34; target=&#34;_blank&#34; rel=&#34;nofollow noopener sponsored&#34; class=&#34;affiliate-link&#34;&gt;&lt;div class=&#34;affiliate-icon&#34;&gt;🛒&lt;/div&gt;&lt;div class=&#34;affiliate-info&#34;&gt;&lt;span class=&#34;affiliate-title&#34;&gt;Co-Intelligence: Living and Working with AI&lt;/span&gt;&lt;span class=&#34;affiliate-cta&#34;&gt;View on Amazon →&lt;/span&gt;&lt;/div&gt;&lt;/a&gt;&lt;/div&gt;&#xA;&lt;p&gt;&lt;small class=&#34;affiliate-disclosure&#34;&gt;As an Amazon Associate, we earn from qualifying purchases at no extra cost to you.&lt;/small&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>An AI agent rewrote a Fortune 50 security policy. Here&#39;s how to govern AI agents before one does the same.</title>
      <link>https://cowlpane.com/tech/an-ai-agent-rewrote-a-fortune-50-security-policy-heres-how-to-govern-ai-agents-b/</link>
      <pubDate>Fri, 08 May 2026 17:55:03 +0000</pubDate>
      <guid>https://cowlpane.com/tech/an-ai-agent-rewrote-a-fortune-50-security-policy-heres-how-to-govern-ai-agents-b/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://venturebeat.com/security/cisco-crowdstrike-rsac-2026-agent-identity-iam-gap-maturity-model&#34;&gt;VentureBeat&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;A CEO’s AI agent rewrote the company’s security policy. Not because it was compromised, but because it wanted to fix a problem, lacked permissions, and removed the restriction itself. Every identity check passed. CrowdStrike CEO George Kurtzdisclosed the incident and a second one at his RSAC 2026 ke&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;div class=&#34;affiliate-pick&#34;&gt;&lt;div class=&#34;affiliate-badge&#34;&gt;Recommended&lt;/div&gt;&lt;a href=&#34;https://www.amazon.com/dp/0593716736?tag=cowlpane-21&#34; target=&#34;_blank&#34; rel=&#34;nofollow noopener sponsored&#34; class=&#34;affiliate-link&#34;&gt;&lt;div class=&#34;affiliate-icon&#34;&gt;🛒&lt;/div&gt;&lt;div class=&#34;affiliate-info&#34;&gt;&lt;span class=&#34;affiliate-title&#34;&gt;Co-Intelligence: Living and Working with AI&lt;/span&gt;&lt;span class=&#34;affiliate-cta&#34;&gt;View on Amazon →&lt;/span&gt;&lt;/div&gt;&lt;/a&gt;&lt;/div&gt;&#xA;&lt;p&gt;&lt;small class=&#34;affiliate-disclosure&#34;&gt;As an Amazon Associate, we earn from qualifying purchases at no extra cost to you.&lt;/small&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>NVIDIA confirms GeForce NOW data breach affecting Armenian users</title>
      <link>https://cowlpane.com/tech/nvidia-confirms-geforce-now-data-breach-affecting-armenian-users/</link>
      <pubDate>Fri, 08 May 2026 16:18:31 +0000</pubDate>
      <guid>https://cowlpane.com/tech/nvidia-confirms-geforce-now-data-breach-affecting-armenian-users/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/nvidia-confirms-geforce-now-data-breach-affecting-armenian-users/&#34;&gt;BleepingComputer&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;NVIDIA has confirmed in a statement for BleepingComputer that GeForce NOW user information has been exposed in a data breach.&lt;/p&gt;&#xA;&lt;p&gt;The gaming and hardware giant has clarified that the impact is limited to Armenia, and was caused by a compromise of the infrastructure operated by a regional partner.&lt;/p&gt;&#xA;&lt;p&gt;The company added that its own network was not impacted by the incident.&lt;/p&gt;&#xA;&lt;p&gt;“Our investigation found no impact on NVIDIA-operated services. The issue is limited to systems run by a third-party GeForce NOW Alliance partner based in Armenia.  We are working closely with the partner to support their investigation and resolution. Impacted users will be notified by GFN.am,” the company said.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Why More Analysts Won’t Solve Your SOC’s Alert Problem</title>
      <link>https://cowlpane.com/tech/why-more-analysts-wont-solve-your-socs-alert-problem/</link>
      <pubDate>Fri, 08 May 2026 14:02:12 +0000</pubDate>
      <guid>https://cowlpane.com/tech/why-more-analysts-wont-solve-your-socs-alert-problem/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/why-more-analysts-wont-solve-your-socs-alert-problem/&#34;&gt;BleepingComputer&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;By Rich Perkins, Principal Sales Engineer, Prophet Security&lt;/p&gt;&#xA;&lt;p&gt;Your security spend has roughlydoubled in six years. Your time-to-investigate and respond hasn&amp;rsquo;t moved. Your CFO is asking why the security headcount keeps growing while the metrics that matter to the business don&amp;rsquo;t.&lt;/p&gt;&#xA;&lt;p&gt;The architecture under your SOC is the reason. Not your team. Not your tooling investment. Not your hiring funnel. The operating model your program inherited assumed human-drivenalert triageat the volume the business was producing five years ago, and the business stopped producing alerts at that volume a long time ago.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Trellix source code breach claimed by RansomHouse hackers</title>
      <link>https://cowlpane.com/tech/trellix-source-code-breach-claimed-by-ransomhouse-hackers/</link>
      <pubDate>Fri, 08 May 2026 13:23:23 +0000</pubDate>
      <guid>https://cowlpane.com/tech/trellix-source-code-breach-claimed-by-ransomhouse-hackers/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/trellix-source-code-breach-claimed-by-ransomhouse-hackers/&#34;&gt;BleepingComputer&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;The attack on the Trellix source code repository disclosed last week has been claimed by the RansomHouse threat group, which leaked a small set of images as proof of the intrusion.&lt;/p&gt;&#xA;&lt;p&gt;Yesterday, the threat actor published on their data leak site screenshots indicating access to the cybersecurity company&amp;rsquo;s appliance management system. However, BleepingComputer could not confirm the authenticity of the data.&lt;/p&gt;&#xA;&lt;p&gt;Trellix is an international cybersecurity firm with global Fortune 100 customers. In 2025, the company had more than 53,000 customers in 185 countries and 3,500 employees.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CISA gives feds four days to patch Ivanti flaw exploited as zero-day</title>
      <link>https://cowlpane.com/tech/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day/</link>
      <pubDate>Fri, 08 May 2026 12:16:32 +0000</pubDate>
      <guid>https://cowlpane.com/tech/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day/</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published by &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day/&#34;&gt;BleepingComputer&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;p&gt;The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has given U.S. federal agencies four days to secure their networks against a high-severity vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that has been exploited in zero-day attacks.&lt;/p&gt;&#xA;&lt;p&gt;Tracked as CVE-2026-6973, this security flaw allows attackers with administrative privileges to execute arbitrary code remotely on systems running EPMM 12.8.0.0 and earlier.&lt;/p&gt;&#xA;&lt;p&gt;In aThursday security advisory, Ivanti told customers they can secure their appliances by installing Ivanti EPMM 12.6.1.1, 12.7.0.1, and 12.8.0.1, and advised them to review accounts with Admin rights and rotate those credentials where necessary.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
