Critical Linux Kernel Vulnerability Exploited in Linux Update and cPanel Breach
Critical Security Updates
A series of critical security vulnerabilities have been uncovered, affecting widely used software and platforms.
cPanel Authentication Bypass Vulnerability
A critical authentication bypass vulnerability, identified as CVE-2026-41940, has been exploited in the popular web-based control panel, cPanel. This vulnerability allows attackers to bypass authentication checks and access sensitive areas of the panel, potentially leading to unauthorized modifications or data exposure.
The vulnerability affects virtually all versions of cPanel since 2017 and a working proof-of-concept (PoC) exploit is publicly available.
Linux Kernel Flaw Enables Reliable Local Privilege Escalation
Security researchers at Theori have disclosed a high-severity local privilege escalation (LPE) vulnerability, identified as CVE-2026-31431, in the Linux kernel. This vulnerability, nicknamed “Copy Fail,” affects virtually every major Linux distribution shipped since 2017 and has been assigned a severity rating of 8.8/10.
Github Remote Code Execution Flaw Exposes Thousands of Self-Hosted Servers
Researchers at Wiz reported an easily exploitable Github remote code execution flaw, identified as CVE-2026-3854, on March 4. The company confirmed the vulnerability within 40 minutes and pushed a fix to Github.com in under two hours. However, for thousands of organizations running Github Enterprise Server on their own infrastructure, the vulnerability still represents a risk.
Automated Red Teaming Gets a Learning Layer
Automated red teaming of large language models has evolved significantly over the past two years, with two dominant approaches emerging. One relies on trial and error, while the other, like WildTeaming, combines crowdsourced attack data at random. Researchers at Capital One propose Adaptive Instruction Composition, which builds on these inputs and adds a learning layer to prioritize the most promising attack combinations.
AI Traffic Getting Bigger, Louder, and Less Predictable
AI workflows require storage that supports repeated movement across the model lifecycle. Large datasets are ingested, transformed, exported for training, pulled back for evaluation, and refreshed as models evolve. This creates a shift from diffuse internet-style traffic to large, high-bandwidth flows between fewer endpoints.
Cybersecurity Jobs Available Right Now
- We’ve scoured the market to bring you a selection of roles that span various skill levels within the cybersecurity field. Check out this weekly selection of cybersecurity jobs available right now.
New Infosec Products of the Month
- Here’s a look at the most interesting products from the past month, featuring releases from Advenica, Aptori, Axonius, Broadcom, GlobalSign, Intruder, IP Fabric, Mallory, Secureframe, Siemens, Sitehop, and Virtue AI.
