Critical Linux Kernel LPE Flaw and Long‑Running cPanel 0‑Day Exposed

0
10

Key Takeaways

  • AI agents are now being hired on gig‑platform‑style marketplaces and are increasingly used in cyber‑crime schemes.
  • A large proportion of arXiv submissions still expose confidential material in their LaTeX source files.
  • IPFire’s latest update adds DNS‑layer domain blocking, replacing older URL‑filter and Pi‑hole components.
  • U.S. state privacy regulators collected a record $3.425 billion in fines in 2025, nearly double the 2024 total.
  • Many organisations continue to misconfigure Exchange Online, leaving legacy protocols such as SMTP AUTH exposed.
  • Cisco released an open‑source toolkit to verify AI model lineage and mitigate supply‑chain risks.
  • Social‑engineering attacks now abuse Microsoft Teams and fake “Mailbox Repair Utility” tools, while Robinhood users faced a phishing wave.
  • Traditional SOC metrics based on ticket counts can undermine real‑time threat detection; better measures are needed.
  • Critical zero‑click Windows Shell spoofing (CVE‑2026‑32202), a long‑standing Linux kernel LPE (“Copy Fail”), cPanel auth bypass, and GitHub Enterprise Server RCE flaws are actively exploited.
  • A bug in the Vect Ransomware‑as‑a‑Service turns affiliates into unintentional data wipers.
  • Identity‑and‑access‑management systems built for humans struggle to govern AI agents; identity discovery and a unified control plane are emerging priorities.
  • High‑profile data leaks include ADT customer data, UK Biobank volunteers’ medical records on Alibaba, Udemy’s 1.4 million‑record breach, and stolen Roblox accounts.
  • Industrial‑control‑system intrusion detection still suffers from blind spots; new GPS‑spoofing detectors and backup‑server updates aim to close gaps.
  • Open‑source privacy and security utilities are evolving: BleachBit 6.0.0, Kiji Privacy Proxy, LuLu macOS firewall, SimpleX Chat, Stratis 3.9.0, and Warp’s AI terminal.
  • AI‑driven traffic is growing, bad bots now represent ~40 % of internet traffic, and a significant share of employees use AI without employer training.
  • Law‑enforcement actions have disrupted SMS‑blaster operations, scam call‑centers, Black Axe members, and a Chinese hacker accused of COVID‑19 research espionage.
  • Platform updates include Fedora Linux 44, deeper Visual Studio/GitHub Copilot integration, VS Code 1.118 auto‑model selection, OpenAI’s Symphony for Codex, and a flood of new infosec products announced for April 2026.

AI Agents Enter Gig Economy and Cybercrime
The emerging “RentAHuman” platform extends the gig‑economy model to autonomous agents via a Model Context Protocol server. Users with a credit card can post tasks such as attending meetings, photographing sites, delivering items, or surveying physical locations, and AI agents autonomously fulfill them. This capability is already being abused by threat actors who hire AI to conduct reconnaissance, social‑engineering, and even low‑level physical‑world operations, signalling a new frontier where artificial labour can be commodified for both legitimate and malicious purposes.

Research Exposes Hidden Data in Academic Preprints
A study from RWTH Aachen University, slated for presentation at the 2026 IEEE Symposium on Security and Privacy, examined 2.7 million arXiv submissions dating back to 1991. Roughly 93 % of papers include LaTeX source files, and the analysis revealed that 88 % of those sources contain material never intended for public release—such as drafts, comments, figures, or residual project data. The finding underscores a pervasive leakage risk in scholarly communication, where supplementary files can unintentionally expose proprietary or sensitive research details.

Open‑Source Firewall Enhances DNS‑Layer Protection
IPFire’s Core Update 201 for the 2.29 release line introduces native DNS‑layer domain blocking, consolidating functions previously handled by the built‑in URL Filter and separate Pi‑hole deployments. By enforcing blocklists directly within the firewall’s DNS proxy, the update simplifies administration, reduces latency, and provides a more cohesive defence against malware and phishing domains at the resolver level—an important step for organizations seeking lightweight, open‑source perimeter security.

US State Privacy Penalties Surge
In 2025, U.S. state privacy regulators amassed $3.425 billion in fines from companies, nearly double the $1.827 billion recorded in 2024. Gartner projects the upward trajectory to continue through 2028, driven by expanding state‑level legislation, heightened enforcement vigor, and increasing corporate data‑handling complexities. The spike signals that privacy compliance is becoming a costly liability for firms operating across multiple jurisdictions.

Exchange Online Misconfigurations Persist
Microsoft MVP Scott Schnoll, in a Help Net Security interview, reminded organisations that the Shared Responsibility Model leaves cloud‑service security to Microsoft while customers must protect their own data, identities, and configurations. Common oversights include retaining legacy protocols such as SMTP AUTH—kept alive by printer, scanner, and ERP integrations—and failing to harden default settings. These gaps leave Exchange Online environments vulnerable to credential harvesting and unauthorized mailbox access despite Microsoft’s underlying platform hardening.

Cisco Toolkit Addresses AI Model Lineage Gaps
Enterprises frequently pull models from Hugging Face and similar repositories without tracking subsequent modifications, creating blind spots in AI supply‑chain security. Cisco’s newly released open‑source toolkit enables verification of model lineage, helping teams confirm that the version running in production matches the approved artifact. The tool aligns with Cisco’s State of AI Security 2026 findings, which flag AI supply‑chain exposure as a persistent risk as models become deeply embedded in core business processes.

Social Engineering Evolves via Teams and Fake Utilities
Threat group UNC6692, identified by Google’s Threat Intelligence Group, impersonated IT helpdesk staff on Microsoft Teams to lure employees into downloading malware and divulging credentials through a counterfeit “Mailbox Repair Utility.” Concurrently, a phishing campaign targeted Robinhood users, delivering deceptive emails that began arriving on April 26 and prompted numerous reports on Reddit and to the broker’s support channels. These incidents illustrate how attackers are blending trusted collaboration platforms with socially engineered lures to bypass traditional email‑centric defences.

SOC Metrics Mislead Defenders
Dave Chismon, CTO for Architecture at the UK’s National Cyber Security Centre, warns that measuring security‑operations‑centre performance with ticket‑based metrics—borrowed from IT service desks—can actively hinder the SOC’s core mission of detecting and responding to genuine attacks. Such metrics incentivise volume over quality, encouraging analysts to close tickets quickly rather than pursue thorough investigations. Chismon advocates for outcome‑oriented indicators, such as mean‑time‑to‑detect/respond, threat‑hunting yield, and reduction in dwell time, to align SOC evaluation with actual risk mitigation.

Critical Windows and Linux Vulnerabilities Disclosed
Several high‑impact flaws surfaced recently: CVE‑2026‑32202, a zero‑click Windows Shell spoofing vulnerability that lets attackers force victim systems to authenticate to their server, is being actively exploited and stems from an incomplete patch for CVE‑2026‑21510. Separately, researchers at Theori disclosed a long‑standing Linux kernel local‑privilege‑escalation bug (CVE‑2026‑31431), nicknamed “Copy Fail,” affecting virtually every major distribution since 2017, with a public proof‑of‑concept available. Additionally, cPanel suffered an authentication‑bypass zero‑day (CVE‑2026‑41940) exploited since February 23, and Wiz disclosed a trivially exploitable GitHub Enterprise Server RCE (CVE‑2026‑3854) that remained unpatched on many self‑hosted installations despite a rapid fix for GitHub.com.

Ransomware Bug Turns into Data Wiper
The Vect Ransomware‑as‑a‑Service operation contains a coding defect that causes its affiliates to irreversibly encrypt victims’ data rather than hold it for ransom. After Vect announced a partnership with BreachForums and began distributing an “affiliate key” to forum members, Check Point researchers obtained access to the ransomware builder and confirmed the bug’s wiper effect. The flaw transforms what should be a profit‑driven extortion tool into a destructive weapon, highlighting how software quality issues can pivot threat actors’ objectives.

Identity Management Struggles with AI Agents
Traditional IAM frameworks were designed for human authentication, relying on simple “who are you?” checks. AI agents, however, operate without human intuition, exposing gaps in credential provisioning, session governance, and privilege enforcement. Experts argue that organisations must invest in identity discovery—continually mapping human, service, and agent identities—and adopt a unified identity control plane that spans cloud, Kubernetes, databases, and legacy servers. Such a layer would provide the visibility and policy granularity needed to prevent agents from over‑privileging or laterally moving undetected.

High‑Profile Data Breaches and Leaks
ADT disclosed that unauthorized access on April 20 exposed a limited set of customer and prospective‑customer data. Simultaneously, the UK government confirmed that medical records from roughly 500,000 volunteers in the UK Biobank were offered for sale on Alibaba, jeopardizing a globally used resource for disease research. The ShinyHunters group claimed to have stolen 1.4 million records from Udemy, encompassing emails, names, addresses, phone numbers, employer data, and instructor payout details. In a separate incident, Ukrainian police arrested three suspects for hacking and reselling 600,000 Roblox accounts, using stolen credentials and malware disguised as game‑related tools.

Industrial Control and OT Security Gaps
A new paper from RWTH Aachen University outlines three reasons why intrusion‑detection systems for industrial control systems often fall short: limited visibility into physical‑process signals, excessive reliance on network‑traffic heuristics, and difficulty correlating anomalies across IT and OT domains. Complementary advances include an ORNL‑developed portable detector that spots GPS signal spoofing in real time—even during motion—to protect transportation networks, and Proxmox Backup Server 4.2, which adds S3‑compatible storage and parallel sync jobs to improve backup resilience for virtualised environments.

Open‑Source Tools and Privacy Utilities Evolve
BleachBit reached version 6.0.0, introducing over 100 changes that enhance browser‑cleaning, command‑line usability, secure deletion, and platform‑specific fixes for Windows and Linux. Dataiku’s Kiji Privacy Proxy operates as a local gateway that scans outgoing prompts for personally identifiable information and masks it before reaching external LLMs, addressing a common oversight in AI‑integration pipelines. On macOS, the open‑source firewall LuLu continues to monitor outbound connections, filling a gap left by the native inbound‑only firewall. Meanwhile, SimpleX Chat offers identifier‑free, end‑to‑end encrypted messaging across mobile and desktop platforms, and Stratis 3.9.0 adds online encryption and cache‑less pool startup to Linux storage management. Finally, Warp’s AI‑centric terminal client has been released under the AGPL license, with OpenAI as a founding sponsor, broadening access to AI‑assisted command‑line workflows.

Emerging Threats: AI‑Generated Traffic, Bad Bots, Shadow AI
The Thales 2026 Bad Bot Report notes that bad bots now constitute roughly 40 % of internet traffic, with AI agents emerging as a distinct third category alongside “good” and “bad” bots. As AI workflows shift large volumes of data between fewer endpoints, network traffic becomes more bursty and high‑bandwidth, complicating traditional anomaly detection. A global survey of 6,000 enterprise employees found that between one‑fifth and one‑third use AI outside IT governance, revealing a significant Shadow‑AI training gap. Researchers at Capital One propose Adaptive Instruction Composition for automated LLM red‑teaming, adding a learning layer that prioritises the most promising attack combinations based on historical crowdsourced data.

Law Enforcement and Policy Actions
Italian authorities extradited Chinese national Xu Zewei to the United States to face charges tied to an alleged cyber‑espionage campaign targeting COVID‑19 research; his alleged co‑conspirator Zhang Yu remains at large. Swiss police arrested ten suspected members of the Black Axe cybercrime network, including its Southern Europe regional head, most of whom are of Nigerian origin. Canadian law enforcement apprehended three individuals operating an SMS blaster that mimicked cellular towers across the Greater Toronto Area, resulting in 44 charges. Austrian and Albanian authorities jointly dismantled a call‑center fraud ring responsible for over €50 million in losses, seizing nearly €900 k and arresting ten suspects. In London, the Metropolitan Police Federation warned officers about undisclosed use of Palantir AI to monitor internal conduct, raising concerns over privacy and labour relations. The FIDO Alliance issued guidance on preventing AI agents from going rogue during online payments, urging stronger authentication and transaction‑level controls for autonomous actors.

Product and Platform Updates
Fedora Linux 44 shipped with GNOME 50 and KDE Plasma 6.6, delivering refreshed desktop experiences and underlying system improvements. Microsoft’s April update to Visual Studio enables cloud‑agent sessions to launch directly from GitHub Copilot, allowing scalable, isolated task execution. Visual Studio Code 1.118 adds auto‑model selection to the Copilot CLI, refined session management in the Agents app, and an opt‑in path for TypeScript 7.0. OpenAI released Symphony, an open‑source specification that ties Codex agents to issue trackers, reducing manual oversight for engineering teams. A guide on Automating Pentest Delivery was made available, promising continuous, collaborative testing workflows. Regular cybersecurity‑job listings and a roundup of new infosec products for April 2026 (including releases from Advenica, Aptori, Axonius, Broadcom, GlobalSign, Intruder, IP Fabric, Mallory, Secureframe, Siemens, Sitehop, and Virtue AI) round out the month’s developments.

SignUpSignUp form

LEAVE A REPLY

Please enter your comment!
Please enter your name here