<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="3.10.0">Jekyll</generator><link href="https://shimiscyberworld.com/feed.xml" rel="self" type="application/atom+xml" /><link href="https://shimiscyberworld.com/" rel="alternate" type="text/html" /><updated>2026-04-08T21:25:29+03:00</updated><id>https://shimiscyberworld.com/feed.xml</id><title type="html">Shimi’s Cyber World</title><subtitle>A cyber ecosystem built around a strong community. Real updates, real discussions, tools, and insights from the field.</subtitle><entry><title type="html">CISA Mandates Urgent Patch for Exploited Ivanti EPMM Flaw</title><link href="https://shimiscyberworld.com/posts/telegram-1323386230-248493/" rel="alternate" type="text/html" title="CISA Mandates Urgent Patch for Exploited Ivanti EPMM Flaw" /><published>2026-04-08T21:24:35+03:00</published><updated>2026-04-08T21:24:35+03:00</updated><id>https://shimiscyberworld.com/posts/telegram-1323386230-248493</id><content type="html" xml:base="https://shimiscyberworld.com/posts/telegram-1323386230-248493/"><![CDATA[<p>Federal agencies are under the gun, facing a tight deadline to patch a critical vulnerability in Ivanti Endpoint Manager Mobile (EPMM). CISA has added CVE-2026-1340 to its Known Exploited Vulnerabilities (KEV) catalog, demanding federal civilian executive branch (FCEB) agencies secure their systems by midnight Saturday. This critical code injection flaw, exploited in the wild since January, allows unauthenticated attackers to achieve remote code execution on exposed EPMM appliances.</p>

<p>Ivanti itself flagged this bug, along with CVE-2026-1281, as zero-day threats back in late January, pushing out updates and strongly urging customers to apply them immediately. The company acknowledged then that a limited number of customers had already fallen victim. The Shadowserver Foundation is currently tracking nearly 950 internet-facing Ivanti EPMM instances, with a significant portion located in Europe and North America, though the patch status for these systems remains unknown.</p>]]></content><author><name></name></author><category term="threat-intel" /><category term="vulnerability" /><summary type="html"><![CDATA[Federal agencies are under the gun, facing a tight deadline to patch a critical vulnerability in Ivanti Endpoint Manager Mobile (EPMM). CISA has added CVE-2026-1340 to its Known Ex]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" /><media:content medium="image" url="https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">ShinyHunters Targets Anodot, Snowflake Accounts Compromised</title><link href="https://shimiscyberworld.com/posts/telegram-1427288221-8736/" rel="alternate" type="text/html" title="ShinyHunters Targets Anodot, Snowflake Accounts Compromised" /><published>2026-04-08T21:15:34+03:00</published><updated>2026-04-08T21:15:34+03:00</updated><id>https://shimiscyberworld.com/posts/telegram-1427288221-8736</id><content type="html" xml:base="https://shimiscyberworld.com/posts/telegram-1427288221-8736/"><![CDATA[<p>The cybercrime group ShinyHunters is claiming responsibility for an attack on Anodot, an Israeli company specializing in anomaly detection and monitoring. Anodot was recently acquired by fellow Israeli firm Glassbox. According to claims made byחדשות סייבר - ארז דסה, ShinyHunters allegedly gained access to Anodot’s network, subsequently obtaining authentication tokens for Snowflake accounts belonging to Anodot’s clients.</p>

<p>The group purports that several of Anodot’s customers have already been impacted, with their data reportedly stolen and ransom demands issued. However, these claims currently lack official independent verification. In parallel, Snowflake has confirmed to BleepingComputer that it observed “unusual activity within a small number of Snowflake customer accounts linked to a specific third-party integration.” This statement from Snowflake aligns with the scenario described byחדשות סייבר - ארז דסה, suggesting a potential supply chain compromise impacting Anodot’s integration and subsequently affecting Snowflake customers.</p>]]></content><author><name></name></author><category term="israel" /><summary type="html"><![CDATA[The cybercrime group ShinyHunters is claiming responsibility for an attack on Anodot, an Israeli company specializing in anomaly detection and monitoring. Anodot was recently acqui]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" /><media:content medium="image" url="https://images.unsplash.com/photo-1590971862391-06cac0657603?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Anthropic’s ‘Mythos’ AI Model: Too Dangerous for Public Release</title><link href="https://shimiscyberworld.com/posts/telegram-1427288221-8734/" rel="alternate" type="text/html" title="Anthropic’s ‘Mythos’ AI Model: Too Dangerous for Public Release" /><published>2026-04-08T20:39:51+03:00</published><updated>2026-04-08T20:39:51+03:00</updated><id>https://shimiscyberworld.com/posts/telegram-1427288221-8734</id><content type="html" xml:base="https://shimiscyberworld.com/posts/telegram-1427288221-8734/"><![CDATA[<p>Anthropic, a major AI safety and research company, has reportedly developed a new large language model codenamed ‘Mythos’ (also referred to as Project Glasswing), which they deem too risky for public deployment. According to reports citing ‘חדשות סייבר - ארז דסה’, the model exhibits concerning capabilities that raise significant safety and security red flags.</p>

<p>While details on Mythos’ specific functionalities remain somewhat guarded, the assessment from ‘חדשות סייבר - ארז דסה’ suggests that its potential for misuse, particularly in generating harmful content or facilitating malicious activities, outweighs its current benefits. This cautious approach from Anthropic underscores the ongoing challenges in developing advanced AI responsibly, balancing innovation with the imperative to prevent widespread negative consequences.</p>]]></content><author><name></name></author><category term="israel" /><summary type="html"><![CDATA[Anthropic, a major AI safety and research company, has reportedly developed a new large language model codenamed 'Mythos' (also referred to as Project Glasswing), which they deem t]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" /><media:content medium="image" url="https://images.unsplash.com/photo-1558459654-c430be5b0a44?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Google Chrome’s New Screen Recorder: Convenience Meets Potential Risk</title><link href="https://shimiscyberworld.com/posts/telegram-1427288221-8733/" rel="alternate" type="text/html" title="Google Chrome’s New Screen Recorder: Convenience Meets Potential Risk" /><published>2026-04-08T20:39:39+03:00</published><updated>2026-04-08T20:39:39+03:00</updated><id>https://shimiscyberworld.com/posts/telegram-1427288221-8733</id><content type="html" xml:base="https://shimiscyberworld.com/posts/telegram-1427288221-8733/"><![CDATA[<p>Google has quietly rolled out a new, free screen recording extension for its Chrome browser. According to ‘חדשות סייבר - ארז דסה’, this tool allows users to easily capture video of their screen activity directly within Chrome. The extension integrates seamlessly, offering a straightforward way to create tutorials, document processes, or share visual information without needing third-party software. This move by Google aims to enhance user productivity and streamline content creation for everyday tasks.</p>

<p>While the convenience factor is undeniable, the introduction of a built-in screen recorder, especially from a major player like Google, warrants a closer look from a security perspective. ‘חדשות סייבר - ארז דסה’ highlighted the potential for misuse, noting that any tool capable of recording screen activity could be exploited if it falls into the wrong hands or is compromised. Unauthorized recording can lead to sensitive data exposure, privacy violations, and a significant security risk if malicious actors gain control.</p>]]></content><author><name></name></author><category term="israel" /><summary type="html"><![CDATA[Google has quietly rolled out a new, free screen recording extension for its Chrome browser. According to 'חדשות סייבר - ארז דסה', this tool allows users to easily capture video of]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://images.unsplash.com/photo-1642133516482-e99ea85011b3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" /><media:content medium="image" url="https://images.unsplash.com/photo-1642133516482-e99ea85011b3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Node.js Module Resolution Flaw: A Windows LPE Nightmare</title><link href="https://shimiscyberworld.com/posts/telegram-1233397458-73799/" rel="alternate" type="text/html" title="Node.js Module Resolution Flaw: A Windows LPE Nightmare" /><published>2026-04-08T20:25:26+03:00</published><updated>2026-04-08T20:25:26+03:00</updated><id>https://shimiscyberworld.com/posts/telegram-1233397458-73799</id><content type="html" xml:base="https://shimiscyberworld.com/posts/telegram-1233397458-73799/"><![CDATA[<p>Pentesting News has highlighted a persistent design flaw within Node.js’s module resolution mechanism on Windows, which continues to pose a significant local privilege escalation (LPE) risk. The issue stems from Node.js’s default behavior of checking for packages in <code class="language-plaintext highlighter-rouge">C:\node_modules</code> during its module search path. Because low-privileged users can create this directory and populate it with malicious modules, any Node.js application that has missing or optional dependencies becomes a potential target for attackers seeking to escalate their privileges.</p>

<p>This isn’t a new revelation; discussions around Node.js’s module search path have been ongoing since 2013-2014. Node.js maintainers have historically considered this behavior intentional, stating, “Node.js trusts the file system,” and do not classify it as a vulnerability like CWE-427 (Uncontrolled Search Path Element). Instead, they place the onus on application developers to secure their code against this potential abuse.</p>

<p>Pentesting News points to this stance as having dangerous real-world consequences. Developers often remain unaware of this attack surface, leading to widespread exploitable applications. While specific examples like npm CLI and the Discord desktop app (CVE-2026-0776, reportedly unpatched) are cited, it’s highly probable that numerous other Node.js applications are susceptible to LPE attacks via this module resolution quirk.</p>]]></content><author><name></name></author><category term="red-team" /><category term="tools" /><category term="microsoft" /><summary type="html"><![CDATA[Pentesting News has highlighted a persistent design flaw within Node.js's module resolution mechanism on Windows, which continues to pose a significant local privilege escalation (]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://images.unsplash.com/photo-1542831371-29b0f74f9713?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" /><media:content medium="image" url="https://images.unsplash.com/photo-1542831371-29b0f74f9713?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">TeamPCP Exploits Trivy for Cisco Source Code Breach</title><link href="https://shimiscyberworld.com/posts/telegram-1323386230-248489/" rel="alternate" type="text/html" title="TeamPCP Exploits Trivy for Cisco Source Code Breach" /><published>2026-04-08T20:19:20+03:00</published><updated>2026-04-08T20:19:20+03:00</updated><id>https://shimiscyberworld.com/posts/telegram-1323386230-248489</id><content type="html" xml:base="https://shimiscyberworld.com/posts/telegram-1323386230-248489/"><![CDATA[<p>Cyber Threat Intelligence has shed light on a sophisticated supply chain attack campaign dubbed “TeamPCP.” The threat actor, identified by Google’s Threat Analysis Group (TAG) as UNC6780, has successfully pilfered source code from Cisco. The breach appears to have been facilitated through a compromise involving the Trivy vulnerability scanner, a tool commonly used for identifying security flaws in container images and software dependencies. This highlights a concerning trend where attackers are weaponizing popular developer tools to infiltrate enterprise environments.</p>

<p>This incident underscores the critical importance of securing the software supply chain. By compromising Trivy, TeamPCP gained a potential backdoor into numerous systems that rely on the scanner for security validation. The stolen Cisco source code could be leveraged for further attacks, intellectual property theft, or to uncover additional vulnerabilities within Cisco’s product ecosystem. The campaign serves as a stark reminder that even foundational security tools can become attack vectors if not properly hardened and monitored.</p>]]></content><author><name></name></author><category term="threat-intel" /><category term="vulnerability" /><category term="data-breach" /><summary type="html"><![CDATA[Cyber Threat Intelligence has shed light on a sophisticated supply chain attack campaign dubbed "TeamPCP." The threat actor, identified by Google's Threat Analysis Group (TAG) as U]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" /><media:content medium="image" url="https://images.unsplash.com/photo-1548092372-0d1bd40894a3?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Iranian Hackers Target US Critical Infrastructure Via Exposed PLCs</title><link href="https://shimiscyberworld.com/posts/telegram-1323386230-248488/" rel="alternate" type="text/html" title="Iranian Hackers Target US Critical Infrastructure Via Exposed PLCs" /><published>2026-04-08T20:14:20+03:00</published><updated>2026-04-08T20:14:20+03:00</updated><id>https://shimiscyberworld.com/posts/telegram-1323386230-248488</id><content type="html" xml:base="https://shimiscyberworld.com/posts/telegram-1323386230-248488/"><![CDATA[<p>Cyber Threat Intelligence is flagging a concerning trend: Iranian threat actors are actively probing and potentially disrupting US critical infrastructure by exploiting exposed Programmable Logic Controllers (PLCs). These devices, the brains behind many industrial control systems (ICS), are often found with weak security configurations or left accessible online, creating a ripe target for sophisticated attackers.</p>

<p>The modus operandi appears to involve scanning for internet-facing PLCs, likely from vendors like Unitronics, and then attempting to gain unauthorized access. Once inside, these actors could manipulate industrial processes, disrupt operations, or even cause physical damage. This isn’t just theoretical; Cyber Threat Intelligence points to evidence suggesting these actors have successfully infiltrated and disrupted systems within the US, underscoring the tangible threat to essential services. The implications are significant, potentially impacting everything from water treatment facilities to energy grids.</p>]]></content><author><name></name></author><category term="threat-intel" /><category term="data-breach" /><summary type="html"><![CDATA[Cyber Threat Intelligence is flagging a concerning trend: Iranian threat actors are actively probing and potentially disrupting US critical infrastructure by exploiting exposed Pro]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://images.unsplash.com/photo-1771061863061-8ffdddb28098?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" /><media:content medium="image" url="https://images.unsplash.com/photo-1771061863061-8ffdddb28098?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Hack-for-hire spyware campaign targets journalists in Middle East, North Africa</title><link href="https://shimiscyberworld.com/posts/telegram-1323386230-248487/" rel="alternate" type="text/html" title="Hack-for-hire spyware campaign targets journalists in Middle East, North Africa" /><published>2026-04-08T19:49:21+03:00</published><updated>2026-04-08T19:49:21+03:00</updated><id>https://shimiscyberworld.com/posts/telegram-1323386230-248487</id><content type="html" xml:base="https://shimiscyberworld.com/posts/telegram-1323386230-248487/"><![CDATA[<p>Access Now, Lookout and SMEX joined research forces to find a campaign involving suspected Indian government-connected group Bitter, ProSpy spyware and more.</p>

<p>Geopolitics Hack-for-hire spyware campaign targets journalists in Middle East, North Africa Access Now, Lookout and SMEX joined research forces to find a campaign involving suspected Indian government-connected group Bitter, ProSpy spyware and more. By Tim Starks April 8, 2026 Listen to this article 0:00 Learn more. This feature uses an automated voice, which may result in occasional errors in pronunciation, tone, or sentiment. Malte Mueller, Getty Images An apparent hack-for-hire campaign from a group with suspected Indian government connections targeted Middle Eastern and North African journalists and activists using spyware, three collaborating organizations said in reports published Wednesday. The attacks shared infrastructure that pointed to the advanced persistent threat group known as Bitter, which most frequently targets government, military, diplomatic and critical infrastructure sectors across South Asia, according to conclusions from researchers at Access Now, Lookout and SMEX. Each group took on a different piece of the puzzle: Access Now got calls on its helpline that led it to examine a spearphishing campaign in 2023 and 2024. It contacted Lookout for technical support about the malware it encountered. Lookout attributed the malware to Bitter, concluding it was a likely hack-for-hire campaign, using the Android ProSpy spyware. SMEX dived into a spearphishing campaign targeting a prominent Lebanese journalist last year, collaborating with Access Now to discover shared infrastructure between the campaigns. Advertisement One of the victims, independent Egyptian journalist Mostafa Al-A’sar, said he contacted Access Now after receiving a suspicious link from someone he’d been talking to about a job position. He was skeptical because his phone had been targeted before, when he was arrested</p>

<p><strong>Reference:</strong></p>
<ul>
  <li><a href="https://cyberscoop.com/hack-for-hire-spyware-campaign-targets-journalists-in-middle-east-north-africa/">https://cyberscoop.com/hack-for-hire-spyware-campaign-targets-journalists-in-middle-east-north-africa/</a></li>
</ul>]]></content><author><name></name></author><category term="threat-intel" /><summary type="html"><![CDATA[Access Now, Lookout and SMEX joined research forces to find a campaign involving suspected Indian government-connected group Bitter, ProSpy spyware and more. Geopolitics Hack-for-h]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://images.unsplash.com/photo-1680992045535-95919d4971a9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" /><media:content medium="image" url="https://images.unsplash.com/photo-1680992045535-95919d4971a9?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Syntx Command Approval Flaw Opens Door to RCE</title><link href="https://shimiscyberworld.com/posts/telegram-1129491012-158471/" rel="alternate" type="text/html" title="Syntx Command Approval Flaw Opens Door to RCE" /><published>2026-04-08T19:27:00+03:00</published><updated>2026-04-08T19:27:00+03:00</updated><id>https://shimiscyberworld.com/posts/telegram-1129491012-158471</id><content type="html" xml:base="https://shimiscyberworld.com/posts/telegram-1129491012-158471/"><![CDATA[<p>CVE Notify is flagging a critical OS command injection vulnerability in Syntx’s command auto-approval module. This flaw completely bypasses the module’s whitelist security, which is designed to prevent malicious commands from being executed. The core issue lies in Syntx’s reliance on weak regular expressions for parsing command structures. While it tries to block dangerous operations, it misses standard shell command substitution syntax, specifically <code class="language-plaintext highlighter-rouge">$(...)</code> and backticks.</p>

<p>An attacker could exploit this by crafting a command like <code class="language-plaintext highlighter-rouge">git log --grep="$(malicious_command)"</code>. Syntx’s flawed parsing would misinterpret this as a safe Git operation, leading to automatic approval. The underlying shell, however, would prioritize executing the injected code within the arguments, granting the attacker Remote Code Execution (RCE) without any user interaction. This is a classic example of input validation gone wrong, where a seemingly innocuous function can be weaponized.</p>]]></content><author><name></name></author><category term="vulnerability" /><category term="cve" /><summary type="html"><![CDATA[CVE Notify is flagging a critical OS command injection vulnerability in Syntx's command auto-approval module. This flaw completely bypasses the module's whitelist security, which i]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" /><media:content medium="image" url="https://images.unsplash.com/photo-1563206767-5b18f218e8de?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Splunk Optimization: Taming Data Overload for Better Security</title><link href="https://shimiscyberworld.com/posts/telegram-1233397458-73797/" rel="alternate" type="text/html" title="Splunk Optimization: Taming Data Overload for Better Security" /><published>2026-04-08T19:26:20+03:00</published><updated>2026-04-08T19:26:20+03:00</updated><id>https://shimiscyberworld.com/posts/telegram-1233397458-73797</id><content type="html" xml:base="https://shimiscyberworld.com/posts/telegram-1233397458-73797/"><![CDATA[<p>The sheer volume of security data can be overwhelming, but a Splunk architect’s perspective offers a clear path to optimization. Recent insights, shared via Pentesting News, highlight that effective data management isn’t just about storage; it’s about making that data actionable. The core idea is shifting from a ‘collect everything’ mentality to a ‘collect what matters’ strategy. This involves understanding the ‘why’ behind data collection – what specific threats are you looking for? What compliance requirements must be met? By focusing on relevant data sources and tuning ingestion, organizations can drastically reduce noise and improve the efficiency of their security operations.</p>

<p>Pentesting News points to the importance of defining clear use cases <em>before</em> data ingestion. Are you trying to detect advanced persistent threats (APTs), meet GDPR logging requirements, or troubleshoot a specific application? Each use case demands different data. The architect’s approach emphasizes granular control over what data enters Splunk, when it’s indexed, and how long it’s retained. This isn’t about cutting corners; it’s about smart resource allocation. Over-ingesting irrelevant or low-value data not only inflates costs but also buries critical alerts in a sea of noise, making threat detection a much harder game.</p>]]></content><author><name></name></author><category term="red-team" /><category term="tools" /><summary type="html"><![CDATA[The sheer volume of security data can be overwhelming, but a Splunk architect's perspective offers a clear path to optimization. Recent insights, shared via Pentesting News, highli]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://images.unsplash.com/photo-1583695477819-357b45d15825?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" /><media:content medium="image" url="https://images.unsplash.com/photo-1583695477819-357b45d15825?w=800&amp;h=400&amp;fit=crop&amp;auto=format&amp;q=80" xmlns:media="http://search.yahoo.com/mrss/" /></entry></feed>