Tuesday, April 28, 2026
HomeCyber News

Cyber News

Researchers Uncover N-day Vulnerabilities in SonicWall SMA100 Series

Three critical vulnerabilities in SonicWall's SMA100 series SSL-VPN appliances, highlighting persistent security vulnerabilities in network infrastructure devices. The vulnerabilities, affecting firmware version 10.2.1.15, include two pre-authentication buffer overflow conditions and a cross-site scripting vulnerability, demonstrating what researchers describe as "trivially avoidable" programming errors that...

Apple’s New Containerization Feature Enhances Kali Linux Integration on macOS

Apple's newly announced Containerization framework, introduced at WWDC 2025, represents a significant advancement for cybersecurity professionals and developers working on macOS systems. This open-source Swift framework enables native Linux container execution through lightweight virtual machines, offering seamless integration with popular penetration testing distributions like...

2.8M Weekly Downloads – How the npm Package Became a Targeting Tool for Developers

A sophisticated phishing campaign targeting the open-source Node.js ecosystem has rocked the developer community, exposing millions to risk by hijacking widely used npm packages. The attack, first observed with a typosquatted phishing domain (npnjscom) and spoofed support@npmjs.org emails, now includes a direct compromise of the massively...

PyPI Issues Warning About Phishing Attack Targeting Developers with Fake Site

The Python Package Index (PyPI) has issued an urgent warning about an ongoing phishing campaign targeting developers who have published projects on the platform. While PyPI itself has not been compromised, attackers are exploiting user trust through sophisticated domain spoofing techniques, attempting to steal...

Linux 6.16 Released – Optimized for Better Performance and Networking

Linux kernel development continues at a rapid pace, with the latest discussions and patches indicating significant improvements coming to the Linux 6.16 development cycle. Based on recent activity in the Linux Kernel Mailing List (LKML), developers are focusing heavily on networking enhancements, memory management...

New macOS Vulnerability Allows Attackers to Steal Private Data by Bypassing TCC

A critical macOS vulnerability that enables attackers to steal sensitive private data normally protected by Apple's Transparency, Consent, and Control (TCC) framework. The vulnerability, dubbed "Sploitlight," exploits Spotlight plugins to access protected files including those in the Downloads folder and Apple Intelligence caches containing...