Wednesday, May 6, 2026
HomeCyber News

Cyber News

Cybercriminals Leverage DevOps Web Server Flaws to Spread Malware

The rise of DevOps practices has revolutionized software development, fostering rapid code deployment and continuous integration. However, these same advancements have also made web servers prime targets for cybercriminals. Recent incidents reveal a surge in attacks exploiting vulnerabilities in DevOps-managed web servers, resulting in...

Attackers Exploit HPE StoreOnce Flaws to Execute Malicious Code Remotely

Hewlett Packard Enterprise (HPE) has issued a critical security bulletin revealing multiple severe vulnerabilities in its StoreOnce Software, which could allow attackers to remotely execute malicious code, bypass authentication, disclose sensitive information, and perform unauthorized file operations. These flaws affect HPE StoreOnce Virtual Storage...

Lyrix Ransomware Targets Windows Systems Using Advanced Evasion Techniques

A new ransomware strain, dubbed Lyrix, has been actively targeting Windows systems worldwide, employing a range of advanced evasion techniques that set it apart from earlier ransomware families. Security researchers first identified Lyrix campaigns in late May 2025, noting the malware’s rapid evolution and its...

Fake Booking.com Sites Spread AsyncRAT Malware in Holiday-Themed Scam

With the summer travel season in full swing, cybercriminals have launched a sophisticated campaign targeting travelers through fake Booking.com websites, redirect links, and fraudulent sponsored ads. According to recent research by Malwarebytes, this campaign leverages evolving domains, fake CAPTCHAs, and dangerous clipboard hijacking techniques...

Millions of Linux Systems Worldwide Exposed by Critical Vulnerabilities Leaking Password Hashes

A pair of high-severity vulnerabilities discovered by Qualys threaten the security of millions of Linux systems worldwide, exposing hashed credentials stored in  / etc / shadow through race condition exploits in the core-dump handlers of major distributions. These vulnerabilities, tracked as CVE-2025-5054 (apport on Ubuntu)...

Study Reveals Key Strengths And Weak Spots In Cloud LLM Guardrails

Cloud-based large language models have become an indispensable tool across industries, bringing with them new challenges in maintaining safe and responsible use. A recent independent study conducted an in-depth evaluation of the built-in guardrails offered by three leading cloud LLM platforms, anonymized as Platform...