Category: Information Security Buzz

New Ubuntu Snap Bug Opens Door to Delayed Root Compromise

A newly disclosed flaw in Ubuntu’s Snap ecosystem is raising fresh concerns about local privilege escalation risks in default Linux environments.  Researchers at Qualys have identified CVE-2026-3888, a high-severity vulnerability that allows a low-privileged local user to escalate access to full root…

Cloud Security Controls Explained: A Definitive Guide

Most teams already have cloud security tools in place. That’s not the issue. The problem is that those tools don’t give you any real control. Infrastructure is built fast, modified constantly, and touched by too many people to track. Code…

UK’s Companies House exposed data linked to millions of firms

Companies House, the UK’s official registrar of companies, has disclosed a security flaw in its WebFiling service that exposed sensitive data tied to more than five million registered businesses.   The issue traces back to a system update rolled out in October 2025 and went unnoticed for five months…

‘CrackArmor’ Exposes Nine Vulnerabilities in Linux AppArmor

The Qualys Threat Research Unit (TRU) has identified nine vulnerabilities in AppArmor, a Linux Security Module.   The vulnerability has been present since 2017 (version v4.11). AppArmor is the default mandatory access control system for Ubuntu, Debian, SUSE, and several cloud platforms. Its presence in all…

Iranian Hacktivists Claim Attack on US Medtech Firm Stryker

Stryker, a global medical technology company based in Michigan, has fallen victim to a data-wiping attack. A hacktivist group affiliated with Iran’s intelligence services is claiming responsibility for the incident.  Reports coming from Ireland, Stryker’s largest base outside of the…

ShinyHunters Claims Responsibility for Widespread Salesforce Data Theft

Salesforce has warned customers that it has identified a campaign in which threat actors are exploiting customers’ overly permissive guest user settings to potentially access more data than targeted businesses intended.  “Evidence indicates the threat actor is leveraging a modified version of the open-source tool Aura Inspector (originally developed by Mandiant) to…

Your DSPM found the problems. Now what?

The first week after the new system went live was great.  You saw the rows of red and orange flash across your dashboard as the scans were completed.   Now, for the first time, the security team could say, with some authority, where…

Ad Fraud is Much More Than a Marketing Problem

In September, cybercriminals pulled off one of the biggest ad fraud scams in recent memory by turning scores of user devices into “ghost click farms” that generated billions of fake ad impressions daily. Then, in January, another gang did it…