Security Affairs Read, think, share … Security is everyone’s responsibility
- Identity security firm SailPoint discloses GitHub repository breachby Pierluigi Paganini on May 11, 2026 at 6:05 pm
SailPoint disclosed a GitHub repository breach on April 20. The company contained the incident and said no customer data was affected. SailPoint is a cybersecurity company that provides identity security and identity governance solutions for enterprises. Its products help organizations manage and control user access to systems, applications, and sensitive data. SailPoint revealed a cybersecurity
- Google warns artificial intelligence is accelerating cyberattacks and zero-day exploitsby Pierluigi Paganini on May 11, 2026 at 2:06 pm
Google says hackers now use AI to create exploits, automate attacks, evade defenses, and target AI supply chains at scale. Artificial intelligence is rapidly changing the cyber threat landscape, and a new report from the Google Cloud Threat Intelligence team highlights how attackers already use AI to improve vulnerability exploitation and gain initial access to
- Crimenetwork returns after takedown, dismantled again by German authoritiesby Pierluigi Paganini on May 11, 2026 at 11:25 am
German police shut down a revived Crimenetwork marketplace with 22,000 users and 100+ sellers months after the original takedown. German police dismantled a resurrected version of the German-language cybercrime marketplace Crimenetwork, just months after the original platform was taken down. The second iteration of the site had already attracted more than 22,000 users and over
- U.S. CISA adds a flaw in BerriAI LiteLLM to its Known Exploited Vulnerabilities catalogby Pierluigi Paganini on May 11, 2026 at 9:14 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BerriAI LiteLLM to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in BerriAI LiteLLM, tracked as CVE-2026-42208 (CVSS score of 9.3), to its Known Exploited Vulnerabilities (KEV) catalog. At the end of April, attackers rapidly exploited the critical
- Instagram removed end-to-end encryption for DMs. What should users do?by Pierluigi Paganini on May 11, 2026 at 7:04 am
Instagram removes direct messages (DM) end-to-end encryption May 8, 2026, letting Meta access chats. Users should download backups amid privacy concerns and U.S. law pressure. Starting May 8, 2026, Instagram users who previously enabled end-to-end encryption in direct messages will lose that protection, marking a significant shift in how private conversations are handled on the
- New cPanel vulnerabilities could allow file access and remote code executionby Pierluigi Paganini on May 10, 2026 at 3:59 pm
cPanel fixed three flaws that could allow file reads, code execution, and privilege escalation. No active exploitation has been reported yet. cPanel has released security updates to fix three vulnerabilities affecting cPanel & WHM that could allow attackers to read files, execute code, or escalate privileges on vulnerable systems. Below are the descriptions for these
- Official JDownloader site served malware to Windows and Linux users between May 6 and May 7by Pierluigi Paganini on May 10, 2026 at 12:33 pm
JDownloader website was hacked to distribute malicious Windows and Linux installers carrying a Python RAT between May 6–7, 2026. JDownloader official website was compromised in a supply chain attack that replaced legitimate Windows and Linux installers with malicious files between May 6 and May 7, 2026. JDownloader is a free, open-source download management application designed
- SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 96by Pierluigi Paganini on May 10, 2026 at 11:49 am
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter CloudZ RAT potentially steals OTP messages using Pheno plugin Backdoored PyTorch Lightning package drops credential stealer A rigged game: ScarCruft compromises gaming platform in a supply-chain attack Muddying the Tracks: The State-Sponsored Shadow Behind
- Security Affairs newsletter Round 576 by Pierluigi Paganini – INTERNATIONAL EDITIONby Pierluigi Paganini on May 10, 2026 at 8:20 am
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Quasar Linux RAT (QLNX): A Fileless Linux Implant Built for Stealth and Persistence Braintrust security incident
- Quasar Linux RAT (QLNX): A Fileless Linux Implant Built for Stealth and Persistenceby Pierluigi Paganini on May 9, 2026 at 1:11 pm
Researchers uncovered QLNX, a Linux RAT targeting developers to steal credentials, log keystrokes, monitor systems, and enable remote access. Security researchers discovered a previously undocumented Linux malware called Quasar Linux RAT (QLNX) that targets developers and DevOps environments. The malicious code can steal credentials, log keystrokes, manipulate files, monitor clipboard activity, and create network tunnels






