$ cipherwatch --feed live --domains all β–ˆ

Decoding Threats.
Watching the Wire.

Daily security intelligence curated from the world's leading sources, mapped across 8 core security disciplines β€” from threat intelligence to application security.

8

Security Domains

Daily

Updates

CVEs

Tracked Live

Latest Intelligence

Recent Articles

πŸ—„οΈAssets

DPRK Scales npm Malware Campaign With AI-Generated Code, Fake Tech Firms, and Remote RAT Deployment

North Korean threat actors have launched a new wave of npm supply chain attacks using AI-generated malicious package code that bypasses static analysis tools, fake software development firms as cover identities, and a multi-stage RAT that exfiltrates source code, cryptographic keys, and credentials from developer workstations. The campaign targets blockchain, DeFi, and fintech developers β€” organisations in these sectors should audit npm dependencies and developer machine security.

#dprk +7
βš–οΈRisk Mgmt

FBI Warns of $725M Cyber-Enabled Cargo Theft Wave Targeting Transportation and Logistics

The FBI has issued a warning documenting a sharp surge in cyber-enabled cargo theft targeting the US transportation and logistics industry, with losses exceeding $725 million in 2025. Criminal organisations use phishing, broker impersonation, and freight marketplace account takeovers to divert physical shipments. Supply chain security teams and freight brokers should treat this advisory as a direct threat to physical goods in transit.

#fbi-advisory +5
πŸ’»AppSec

GitHub Enterprise Server CVE-2026-3854 β€” Critical RCE via Single Git Push, No Authentication Required

CVE-2026-3854, a critical-severity remote code execution vulnerability in GitHub Enterprise Server, allows an attacker to execute arbitrary code on the server with a single specially crafted Git push, requiring no authentication. Any internet-exposed or internally-accessible GHES instance is vulnerable. GitHub has released hotfixes across all supported branches; apply immediately.

#github-enterprise +6
πŸ›οΈArchitecture

Linux 'CopyFail' Kernel Privilege Escalation β€” Root Access on All Major Distributions Since 2017

A newly weaponised local privilege escalation vulnerability in the Linux kernel's copy-on-write mechanism allows unprivileged local users to gain root access on virtually all major Linux distributions running kernels from 2017 onwards. A working public exploit has been released. Kernel patches are available; organisations running Linux servers, containers, and cloud instances should patch immediately.

#linux +6
πŸ”¬Assessment

PhantomRPC β€” Unpatched Windows Privilege Escalation Technique Abuses COM Server Activation

Security researchers have disclosed PhantomRPC, an unpatched local privilege escalation technique in Windows that abuses the COM server activation mechanism to elevate from standard user to SYSTEM without triggering standard EDR alerts. Microsoft has acknowledged the report but not committed to a patch timeline. Defenders should implement mitigation controls; red teams should incorporate this technique into assessments.

#windows +7
πŸ›‘οΈSecOps

VECT 2.0 Ransomware Irreversibly Corrupts Files Over 131KB on Windows, Linux, and ESXi

VECT 2.0 is a new cross-platform ransomware variant that partially corrupts files larger than 131KB rather than encrypting them β€” rendering files permanently unrecoverable even after ransom payment, as the overwritten data cannot be reconstructed. Active campaigns have targeted manufacturing, logistics, and healthcare. Standard backup-based recovery strategies may fail against VECT 2.0 if backups were mounted or reachable at the time of attack.

#ransomware +6
πŸ”¬Assessment

cPanel and WHM CVE-2026-41940 β€” CVSS 9.8 Authentication Bypass Exploited as Zero-Day Before Patch

CVE-2026-41940, a CVSS 9.8 authentication bypass in cPanel and WHM web hosting control panel software, was exploited in the wild before the vendor issued a patch. All versions from 11.40 onwards are affected. Proof-of-concept code is now public. Web hosting providers, managed service providers, and any organisation running cPanel/WHM for server management should apply the emergency patch immediately.

#cpanel +6
πŸ’»AppSec

Jenkins GitHub Plugin CVE-2026-42523 β€” CVSS 9.0 Stored XSS Enables Pipeline Hijacking and Secret Extraction

CVE-2026-42523, rated CVSS 9.0, is a stored cross-site scripting vulnerability in the Jenkins GitHub Plugin 1.46.0 and earlier. Exploitation allows an attacker with job creation rights to inject malicious JavaScript that executes in the browser of any Jenkins administrator who views the affected job β€” enabling session hijacking, secret extraction, and full pipeline takeover. Update to GitHub Plugin 1.46.1 or later.

#jenkins +6

Opinion & Analysis

Commentary

For CISOs, CIOs & Board Members

CIO Briefings

Security events translated into business language β€” financial exposure, regulatory obligations, and board-ready summaries.

Critical Impact

VECT 2.0 Ransomware Permanently Destroys Data β€” Backups and Ransom Payment Cannot Recover Files

VECT 2.0 is a new cross-platform ransomware that deliberately corrupts large files beyond recovery before encrypting them, rendering both ransom payment and standard backup restoration ineffective. Active campaigns are hitting manufacturing, logistics, and healthcare. Organisations should immediately verify that at least one backup tier is fully isolated from production systems.

Read briefing β†’
Critical Impact

cPanel Zero-Day Exploited Before Patch β€” Hosting Infrastructure Under Active Attack

A critical authentication bypass in cPanel and WHM web hosting management software was exploited in the wild before the vendor issued a patch. The vulnerability gives attackers full administrative control of affected servers without needing a password. Organisations running cPanel/WHM directly or using cPanel-based hosting providers need immediate action.

Critical Impact

Milesight AIOT Camera Fleet: Shared SSL Key Means Every Unit Is Compromised If One Is

CISA advisory ICSA-26-113-03 covers five CVEs in Milesight AIOT network cameras, including a CVSS 9.8 flaw where all cameras in a model family share a single factory-embedded SSL private key. Any attacker who extracts this key β€” achievable from any unit, including from publicly available firmware β€” can silently intercept and replace video feeds and steal management credentials across the entire deployed fleet without triggering certificate warnings. Camera firmware patches are available; immediate isolation and patching is required for safety-critical and OT-adjacent deployments.

View all CIO Briefings β†’

Stay Vigilant

Intelligence is your first line of defence.

CipherWatch compiles and synthesises security news daily from Krebs on Security, The Hacker News, BleepingComputer, CISA advisories, and more β€” so you stay ahead of the threat curve.

Learn how it works β†’