Normal view
Don't pay Vect a ransom - your data's likely already wiped out
'Full recovery is impossible for anyone, including the attacker'
Organizations hit by the wave of Trivy and LiteLLM supply-chain compromises that paid Vect in hopes of recovering their data likely did not get much back, according to Check Point Research. That's because the ransomware Vect uses isn't actually ransomware at all, but a wiper that destroys any file larger than 128KB.โฆ
-
The Hacker News
- Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push
Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push
Why Sharing a Screenshot Can Get You Jailed in the UAE
User interfaces as we know them are dead - 4 ways to prep for 'disposable' UIs
Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign
-
ZDNet | security RSS
- Want a free Apple Watch? T-Mobile will give you the SE 3 - how to get yours today
Want a free Apple Watch? T-Mobile will give you the SE 3 - how to get yours today
You can save 50% on this Sony soundbar right now - but the deal ends tonight
-
ZDNet | security RSS
- I tested a BlackBerry-style Android phone with a keyboard, and it's weirdly practical in 2026
I tested a BlackBerry-style Android phone with a keyboard, and it's weirdly practical in 2026
-
ZDNet | security RSS
- Canonical's approach to AI is refreshingly thoughtful - Microsoft should take note
Canonical's approach to AI is refreshingly thoughtful - Microsoft should take note
-
/r/netsec - Information Security News & Discussion
- [Research] Full-chain RCE in Microsoft Semantic Kernel & Agent Framework 1.0 (6 Bypasses)
[Research] Full-chain RCE in Microsoft Semantic Kernel & Agent Framework 1.0 (6 Bypasses)
Summary: Iโm disclosing a full-chain CVSS 10.0 RCE affecting Microsoft Semantic Kernel (.NET v1.74) and the new Agent Framework 1.0.
The Timeline & Conflict: > * March 24: Initial disclosure sent to MSRC with PoC.
- April 8: MSRC closed the case as "Developer Error / Configuration Issue."
- The Reality: Despite the rejection, Microsoft silently merged mitigations in PRs #13683 and #13702 without assigning a CVE. This results in a "False Green" for enterprise SCA tools (Snyk/Checkmarx/Dependabot) while the bypasses remain functional.
Technical Scope:
- Architectural Trust Gap (CWE-1039): Auto-invocation logic treats non-deterministic LLM output as a high-privilege system coordinator without a sandbox boundary.
- 6 Day-Zero Bypasses: Discovery of Type Confusion and Unicode homoglyphs that defeat the "hardened" baseline in the April 2026 releases.
- Versioning: Persistence confirmed from .NET v1.7x through the Agent Framework 1.0 re-baseline.
Full paper, .cast exploit recordings, and a production-ready C# remediation filter are available at the link.
[link] [comments]
89 vulnerabilities in XAPI / Citrix XenServer
-
/r/netsec - Information Security News & Discussion
- Kaspersky recently disclosed PhantomRPC, a privilege escalation technique affecting all Windows versions (tested on Server 2022/2025)
Kaspersky recently disclosed PhantomRPC, a privilege escalation technique affecting all Windows versions (tested on Server 2022/2025)
The core issue: Windows RPC runtime doesn't verify whether the server a high-privileged client connects to is legitimate. If a target RPC server is unavailable, an attacker with SeImpersonatePrivilege can spin up a fake RPC server mimicking the same endpoint, wait for a SYSTEM-level client to connect, then call RpcImpersonateClient to escalate privileges.
Five confirmed escalation paths:
- gpupdate /force โ SYSTEM (coerces Group Policy service)
- Microsoft Edge launch โ Administrator (no coercion needed)
- WDI background service โ SYSTEM (fires every 5โ15 min automatically)
- ipconfig + disabled DHCP โ Administrator
- w32tm.exe โ Administrator via non-existent named pipe
Microsoft assessed this as moderate severity, issued no CVE, and has no patch planned โ justification being that SeImpersonatePrivilege is a prerequisite.
Questions for the community:
Are you monitoring for RPC_S_SERVER_UNAVAILABLE (Event ID 1 via ETW) in your environment?
Any Sigma/Defender rules already written for this?
Do you agree with Microsoft's severity assessment given how common SeImpersonatePrivilege is on IIS/SQL servers?
Kaspersky's full write-up + PoC: https://securelist.com/phantomrpc-rpc-vulnerability/119428/
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- 89 vulnerabilities in XAPI (Citrix XenServer/Hypervisor) - 3x CVSS 9.9, 2x CVSS 9.1
Have I Been Pwned claims Pitney Bowes hit by 8.2M email address leak
Names, phone numbers, physical addresses also included in Shiny Hunters alleged data dump
Logistics technology company Pitney Bowes, which makes franking machines for US postage, is the latest scalp claimed by ShinyHunters and its ongoing spree of pay-or-leak attacks against major organizations.โฆ
-
ZDNet | security RSS
- I was not expecting a Razer keyboard to enhance my office productivity - here's how it did
I was not expecting a Razer keyboard to enhance my office productivity - here's how it did
VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi
Why virtual desktops are so useful - and my top 4 tips for beginners
-
/r/netsec - Information Security News & Discussion
- The Bot Left a Fingerprint: Detecting and Attributing LLM-Generated Passwords
The Bot Left a Fingerprint: Detecting and Attributing LLM-Generated Passwords
The Race Is on to Keep AI Agents From Running Wild With Your Credit Cards