Iran closes Strait of Hormuz again over US blockade and fires on ships
Topic
Cybersecurity
4 active clusters / 6 articles
Coverage spread

Hackers are still exploiting the cPanel bug to gain control of thousands of websites
Nearly a week after the makers of the popular web server management software cPanel and WebHost Manager (WHM) alerted users of a critical flaw in its software, hackers are still targeting thousands of websites that use the vulnerable software. As of Monday there are more than 550,000 potentially vulnerable servers running cPanel, a number that has remained stable for days. And there are now around 2,000 cPanel instances likely compromised, down from around 44,000 on Thursday. These statistics are published by Shadowserver, a nonprofit organization that scans and monitors the internet for cyberattacks. On Thursday, security researchers alerted that hackers started compromising servers running cPanel and WHM, taking advantage of a bug that allowed the attackers to take full control of and hijack the vulnerable servers via their control panels. As Bleeping Computer reported, the extent of the damage is visible by the fact that Google has indexed dozens of websites that at some point displayed a message from a group of hackers that claimed to have encrypted the victim’s files in an apparent ransomware attack. Some of those sites now load normally. The ransom note included a chat ID for the victims to contact the hackers, who did not

Disneyland Now Uses Face Recognition on Visitors
A gunman attempted to enter the White House Correspondents’ Dinner in Washington, DC, last weekend, while President Donald Trump, Vice President JD Vance, and other administration officials were in attendance. Media reports and Trump himself quickly identified the suspected shooter as 31-year-old engineer and computer scientist Cole Tomas Allen. The California resident was arrested at the scene on Saturday and appeared Monday in the US District Court for the District of Columbia to face three federal charges: attempting to assassinate the president, transportation of a firearm in interstate commerce, and discharge of a firearm during a crime of violence.The authentication standards body known as the FIDO Alliance announced working groups this week along with Google and Mastercard to develop technical guardrails for validating and protecting transactions initiated by an AI agent. Meanwhile, given the proliferation and increasing sensitivity of some work using AI, OpenAI rolled out an “advanced” security risk mode for ChatGPT and Codex accounts facing heightened risk of attack.New research this week shed light on an incident in which 90,000 screenshots pulled from a European celebrity's phone were exposed online—underscoring the risks of commercially available spyware both as an invasion of personal privacy and a threat for widespread

Data broker opt-out steps widows should take in 90 days
NEWYou can now listen to Fox News articles! Three weeks after her husband's funeral, Carol's phone rings. The caller knows her husband's name, their address and their daughter's name, even mentioning that she lives across town.He says he's calling from a life insurance company and that there's a policy ready to be paid out. He just needs Carol's Social Security number and bank routing details to process it.This scenario draws from real scams reported by fraud investigators and elder abuse advocates across the country. The details change, but the playbook stays the same.The reason these attacks work so well comes down to something most grieving families never think to check.HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA Scammers build detailed profiles using obituaries, public records and data broker sites often within days of a loss. (Kurt "CyberGuy" Knutsson)Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com - trusted by millions who watch CyberGuy on TV daily.Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join. Why scammers target widows and
Undercovered context in Cybersecurity.
Vistoa checks this topic for light local reporting, missing primary documents, thin specialist context, regional gaps, and overreliance on repeated coverage.
More in Cybersecurity

Hackers are still exploiting the cPanel bug to gain control of thousands of websites
Nearly a week after the makers of the popular web server management software cPanel and WebHost Manager (WHM) alerted users of a critical flaw in its software, hackers are still targeting thousands of websites that use the vulnerable software. As of Monday there are more than 550,000 potentially vulnerable servers running cPanel, a number that has remained stable for days. And there are now around 2,000 cPanel instances likely compromised, down from around 44,000 on Thursday. These statistics are published by Shadowserver, a nonprofit organization that scans and monitors the internet for cyberattacks. On Thursday, security researchers alerted that hackers started compromising servers running cPanel and WHM, taking advantage of a bug that allowed the attackers to take full control of and hijack the vulnerable servers via their control panels. As Bleeping Computer reported, the extent of the damage is visible by the fact that Google has indexed dozens of websites that at some point displayed a message from a group of hackers that claimed to have encrypted the victim’s files in an apparent ransomware attack. Some of those sites now load normally. The ransom note included a chat ID for the victims to contact the hackers, who did not

Disneyland Now Uses Face Recognition on Visitors
A gunman attempted to enter the White House Correspondents’ Dinner in Washington, DC, last weekend, while President Donald Trump, Vice President JD Vance, and other administration officials were in attendance. Media reports and Trump himself quickly identified the suspected shooter as 31-year-old engineer and computer scientist Cole Tomas Allen. The California resident was arrested at the scene on Saturday and appeared Monday in the US District Court for the District of Columbia to face three federal charges: attempting to assassinate the president, transportation of a firearm in interstate commerce, and discharge of a firearm during a crime of violence.The authentication standards body known as the FIDO Alliance announced working groups this week along with Google and Mastercard to develop technical guardrails for validating and protecting transactions initiated by an AI agent. Meanwhile, given the proliferation and increasing sensitivity of some work using AI, OpenAI rolled out an “advanced” security risk mode for ChatGPT and Codex accounts facing heightened risk of attack.New research this week shed light on an incident in which 90,000 screenshots pulled from a European celebrity's phone were exposed online—underscoring the risks of commercially available spyware both as an invasion of personal privacy and a threat for widespread

Data broker opt-out steps widows should take in 90 days
NEWYou can now listen to Fox News articles! Three weeks after her husband's funeral, Carol's phone rings. The caller knows her husband's name, their address and their daughter's name, even mentioning that she lives across town.He says he's calling from a life insurance company and that there's a policy ready to be paid out. He just needs Carol's Social Security number and bank routing details to process it.This scenario draws from real scams reported by fraud investigators and elder abuse advocates across the country. The details change, but the playbook stays the same.The reason these attacks work so well comes down to something most grieving families never think to check.HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA Scammers build detailed profiles using obituaries, public records and data broker sites often within days of a loss. (Kurt "CyberGuy" Knutsson)Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com - trusted by millions who watch CyberGuy on TV daily.Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join. Why scammers target widows and

IBM security executive emerges as possible contender for federal cyber agency leadership post
Sources say Homeland Security Secretary Markwayne Mullin has been favoring a CISA director with only private sector experience. Thomas Fuller/SOPA Images/LightRocket via Getty Images David DiMolfetta Cybersecurity Reporter, Nextgov/FCW Tom Parker, a security services lead at IBM with some two decades of experience in the cybersecurity industry, has emerged as a potential contender to lead the Cybersecurity and Infrastructure Security Agency after the most recent nominee withdrew himself from consideration for the role, according to five people familiar with the matter. Parker does not have prior government experience. As of now, he is the preferred choice for the Trump administration, one of the people said. Homeland Security Secretary Markwayne Mullin has been favoring a CISA director with only private sector experience, another one of the people said.All sources spoke on the condition of anonymity because they weren’t authorized to publicly communicate details concerning the administration’s thinking. Some of the people cautioned that the process is fluid and that the White House may go in a different direction. Parker did not respond to a request for comment. Nextgov/FCW has also asked the White House and DHS for comment.Parker has held a number of roles in industry throughout his career. He founded