Tuesday, May 5, 2026
HomeCyber News

Cyber News

Amazon EKS Vulnerabilities Put AWS Credentials at Risk and Allow Privilege Escalation

A critical vulnerabilities in Amazon Elastic Kubernetes Service (EKS) environments that allow attackers to exploit misconfigured containers to access sensitive AWS credentials and escalate privileges. The findings highlight significant security risks in cloud-native applications where overprivileged containers can facilitate unauthorized access through packet sniffing...

Critical Meshtastic Vulnerability Allows Attackers to Read Encrypted Messages

A critical security vulnerability has been discovered in Meshtastic, the popular open-source mesh networking platform, that could allow attackers to decrypt private direct messages and compromise remote administration features. The vulnerability, tracked as GHSA-gq7v-jr8c-mfr7, affects all versions above 2.5.0 and stems from duplicated cryptographic...

CoinMarketCap Vulnerability in Doodle Image Allows Malicious Code Execution via API

CoinMarketCap, one of the world's leading cryptocurrency data platforms, experienced a security incident on June 20, 2025, when its security team identified a critical vulnerability involving a doodle image displayed on the company's homepage. The compromised image contained embedded malicious code that executed through...

Historic 7.3 Tbps DDoS Attack Delivers 37.4 Terabytes of Data in Just 45 Seconds

The largest distributed denial-of-service (DDoS) attack ever recorded in mid-May 2025, reaching an unprecedented 7.3 terabits per second (Tbps) and delivering 37.4 terabytes of data in just 45 seconds. This record-breaking cyber assault targeted a hosting provider customer using Cloudflare's Magic Transit service and...

Massive Data Breach: 16 Billion Passwords from Apple, Facebook, Google Exposed

A staggering breach of digital privacy, discovering 30 massive datasets containing over 16 billion login credentials from major platforms including Apple, Facebook, Google, GitHub, Telegram, and various government services. The Cybernews research team's investigation reveals an unprecedented scale of exposed personal data that poses...

Azure Misconfigurations Allow Complete Cloud Infrastructure Takeover

A critical analysis of recent attack simulations reveals how misconfigured Azure environments allow threat actors to escalate from anonymous access to full control of cloud infrastructure. Security researchers at Improsec documented an attack path exploiting common Azure misconfigurations, demonstrating how attackers can compromise credentials,...