Entries by Joseph Lee

New High-Severity Linux Flaws: Copy Fail, Copy Fail 2, and Dirty Frag Offer Local Privilege Escalation to Root

Three new high-severity local privilege escalation (LPE) vulnerabilities affecting Linux were recently disclosed, creating significant global risk. Although user-level access is a prerequisite for their exploitation, the new CVEs allow command execution as the root user and full system takeover. The CVEs are considered reliably exploitable on all major Linux distributions. The name “Copy Fail” […]

April 2026 Threat Report: Mythos or Reality? Time to Find Out

In April 2026, the cyber security landscape was flooded with news about Anthropic’s new Mythos bug-hunting AI and Project Glasswing. The rose-colored takeaway is that one year from now, software will be free from vulnerabilities because AI will find all of the flaws and vendors will patch. Major software companies will scan all their products […]

Emergency Patch! CVE-2026-41940 in cPanel & WHM Enables Full Server Takeover

! Update May 18, 2026 Three additional CVEs have been discovered in cPanel & WHM that could allow attackers to read files, execute arbitrary code, or escalate privileges on unpatched systems. The issues have been patched in cPanel & WHM versions 11.136.0.9, 11.134.0.25, 11.132.0.31, and WP Squared. Greenbone’s OPENVAS ENTERPRISE FEED provides users with alerts […]

Fortinet’s Disclosure Includes Two Critical Unauthenticated RCE Flaws Affecting FortiSandbox And More

On April 14th and 15th, Fortinet disclosed 27 new vulnerabilities affecting a wide range of its products. The most severe of the new flaws, CVE-2026-39808 (CVSS 9.8) and CVE-2026-39813 (CVSS 9.8) allow unauthenticated remote code execution (RCE) on the FortiSandbox service. FortiSandbox is Fortinet’s remote sandboxing and malware analysis service, distributed as on premises hardware […]

Patch Now! Critical-Severity Flaws in Cisco SSM On-Prem and IMC, Plus More

In early April, Cisco announced two critical-severity CVEs along with additional high and medium-severity vulnerabilities. Collectively, the flaws allow authentication bypass, privilege escalation to an Administrator account, unauthenticated remote code execution (RCE) as the root user, information disclosure, and Denial of Service conditions. The two critical flaws are CVE-2026-20160 (CVSS 9.8) affecting Cisco Smart Software […]

Patch Now! CVE-2026-35616 and CVE-2026-21643: Fortinet EMS Actively Exploited

Fortinet FortiClient EMS faces immediate risk from two critical severity CVEs: CVE-2026-35616 in versions 7.4.5-7.4.6 and CVE-2026-21643 in 7.4.4. CVE-2026-35616 (CVSS 9.8) is an actively exploited vulnerability in Fortinet FortiClient Enterprise Management Server (EMS) 7.4.5 through 7.4.6, published on April 4, 2026. The flaw is an improper access control [CWE-284] that can be exploited for […]

March 2026 Threat Report: New Critical Risks Span the Enterprise Attack Surface

This month exposed new cyber security risks at all levels of enterprise IT infrastructure. New critical vulnerability exposure emerged in perimeter networking gear and core network appliances. Other risks included actively exploited flaws in major browsers, enterprise email clients, agentic workflow platforms, core OS components, and virtually every other aspect of the enterprise IT ecosystem. […]

Patch Now! 7 New Critical Vulnerabilities in Veeam Backup & Replication

On March 12th, 2026, Veeam published two security advisories containing 7 critical and one high-severity vulnerability in its Backup & Replication server. The flaws cumulatively affect the version 12 and 13 builds. Although there are no reports of active exploitation or public proof-of-concept (PoC) exploits available yet, Veeam has appeared on CISA’s Known Exploited Vulnerabilities […]

February 2026 Threat Report: A River of Perpetual Risk

February 2026’s cyber security headlines were dominated by the sudden emerging risk of CVE-2026-20127, a critical-severity vulnerability in Cisco Catalyst SD-WAN. However, this month, other high-risk vulnerabilities impacting widely deployed enterprise software also opened new gaps for attackers to exploit. To effectively defend IT infrastructure, security teams need granular visibility, reliable threat intelligence for prioritization, […]