WeSearch
Hub / Tags / Exploit
TAG · #EXPLOIT

Exploit coverage.

Every story in the WeSearch catalog tagged with #exploit, chronological, with view counts. Subscribe to the per-tag RSS feed to follow this topic in your reader of choice.

47 stories tagged with #exploit, in publish-time order across the WeSearch catalog. Tag pages update as new stories ingest.

⌘ RSS feed for this tag →   or   search "Exploit"

RELATED TAGS
#cybersecurity11#vulnerability5#linux5#privilege-escalation3#sexual-exploitation3#defi3#cybercrime3#exploitation3#cpanel3#system-tools2#eth2#crypto-exploit2
WIRED

Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers

The exploit, dubbed CopyFail and tracked as CVE-2026-31431, allows hackers to take over PCs and data center servers. The Linux vulnerabilities have been patched—but many machines r…

16 views ·
#cybersecurity#linux
THE VERGE

Meta’s historic loss in court could cost a lot more than $375 million

New Mexico Attorney General Raúl Torrez won a historic sum of $375 million in a landmark child safety case against Meta earlier this year. But the next stage of the fight could be …

10 views ·
#tech policy#child safety#social media
GITHUB

Show HN: Detecting running processes using AF_ALG

Detects if any running pid uses AF_ALG, to help with https://copy.fail mitigations (seeing if its safe to turn off the AF_ALG module) - NHAS/detect-running-alg-socket…

5 views ·
#cybersecurity#networking#linux
HACKER NEWS: NEWEST

Fixing Up CopyFail on Alpine

7 views ·
#security#linux#vulnerability
YAHOO SPORTS

Arizona softball exploits Utah miscues to start series on right foot

The No. 19 Wildcats got the start they needed…

10 views ·
#softball#arizona wildcats#utah utes
HACKER NEWS (NEWEST)

Active exploitation of cPanel/WHM critical vulnerability

8 views ·
TECHMEME

A bug in popular cPanel, WHM, and WP Squared software has reportedly been exploited since Feb.; CISA it gives a 9.8 CVSS score, tells agencies to patch by May 3 (Jonathan Greig/The Record)

Jonathan Greig / The Record : A bug in popular cPanel, WHM, and WP Squared software has reportedly been exploited since Feb.; CISA it gives a 9.8 CVSS score, tells agencies to patc…

10 views ·
#cybersecurity#software vulnerability#cisa
THE HINDU — TOP

Man arrested for exploiting, blackmailing multiple women with private pictures

Bengaluru man arrested for blackmailing multiple women with private photos after exploiting their trust and relationships.…

14 views ·
#blackmail#cybercrime#sexual exploitation
THE REGISTER

First reports come in of victims of critical cPanel vuln as 'millions' of sites potentially exposed

Exploitation was underway before patches landed, at least one victim reports ransomware demand CISA has added a critical cPanel bug to its known-exploited list, confirming that att…

12 views ·
#cybersecurity#vulnerability#ransomware
THE HINDU — TOP

Labour rights yet to be fully realised, says S.K. Kanta

S.K. Kanta emphasizes ongoing exploitation of workers despite legal protections, urging unity for labor rights and dignity at May Day event.…

5 views ·
#labour rights#workers' welfare#exploitation
THE INDEPENDENT

Former Tory councillor convicted of drugging and raping wife for years admits making indecent images of children

Philip Young earlier pleaded guilty to drugging and assaulting his wife over a period of 13 years…

5 views ·
#crime#sexual assault#domestic abuse
HACKADAY

Running Linux on the PS5 with a Hypervisor Exploit

Since Sony’s PlayStation 5 console is quite literally an AMD-based gaming PC with a custom mainboard, the only thing that really keeps anyone from just installing another operating…

6 views ·
#linux#ps5
TECHRADAR

AI tools have made vulnerability exploitation faster and easier

Old risk models assume attackers need skill and time — AI has eliminated both…

6 views ·
#cybersecurity#ai threats#vulnerability management
LATEST FROM TOM'S HARDWARE

Linux exploit instantly grants administrator access on most distributions since 2017 — cryptography optimization snafu grants root privileges to local users

Zero-day exploit instantly grants administrator access on most Linux distributions since 2017…

6 views ·
#cybersecurity#linux
LE MONDE (EN)

In Chapeco, Brazil's 'slaughterhouse capital,' workers under pressure: 'The companies want us to be robots'

11 views ·
#labor rights#brazil#meat industry
GITHUB

Patch Your Kernel NOW: 732byte Python rootkit, cracks all distros since 2017

Exploit POC for CVE_2026_31431. Contribute to rootsecdev/cve_2026_31431 development by creating an account on GitHub.…

8 views ·
#linux kernel#privilege escalation#vulnerability
ARS TECHNICA

The most severe Linux threat to surface in years catches the world flat-footed

CopyFail threatens multi-tenant servers, CI/CD work flows, Kubernetes containers, and more.…

7 views ·
#linux vulnerability#privilege escalation#kernel exploit
TECHCRUNCH

Hackers are actively exploiting a bug in cPanel, used by millions of websites

Web hosts are scrambling to fix the bug under active attack by hackers. One company said hackers have been abusing the bug for months.…

8 views ·
#cybersecurity#web hosting#vulnerability
R/LINUX

New Linux Exploit “Copy Fail” - Gains Access on Almost Every Distro Since 2017

8 views ·
YAHOO SPORTS

Julian Edelman suing over claims he was exploited in Boston ad agency partnership worth $50 million

New England Patriots Hall of Famer Julian Edelman has filed a civil lawsuit, claiming he missed out on millions of dollars…

7 views ·
#julian edelman#civil lawsuit#superdigital
R/OPENAI

AI Security Institute: GPT-5.5 "may be the strongest model we have tested" for cyber exploits, including Mythos

10 views ·
GITHUB

Seg – One-command binary recon for CTFs and AI agents (Rust)

Analyze binaries and generate structured reports for AI agents and security research. - pwnwriter/seg…

7 views ·
#cybersecurity#binary analysis#ctf
THE DEFIANT — DEFI NEWS

Wasabi Loses $5M+ in Latest DeFi Exploit

On-chain perpetual futures protocol Wasabi has been hacked with attackers draining over $5 million across Ethereum, Base, Berachain, and Blast, blockchain security firm PeckShield …

8 views ·
#defi#hacking#blockchain security
THE BLOCK (CRYPTO)

Wasabi Protocol hit by more than $5 million exploit across multiple chains, security firms say

9 views ·
WIRED

These Men Allegedly Profit Off Teaching People How to Make AI Porn

Three Arizona women have filed a lawsuit against a group of men that alleges they used the women’s photos to make AI porn influencers, then offered online courses showing others ho…

8 views ·
#ai ethics#online privacy#cybercrime
THE REGISTER

Bug of the year (so far)? Nasty cPanel vulnerability probably exploited as a 0-day

: Emergency patches out now for those managing the millions of domains assumed to be affected…

6 views ·
#cpanel#vulnerability#zero-day
R/PROGRAMMING

Copy Fail: an exploit for all Linux distributions since 2017

9 views ·
TECHCRUNCH

Satya Nadella says he’s ready to ‘exploit’ the new OpenAI deal

Microsoft gets to offer OpenAI's tech to its cloud customers and doesn't have to pay for it. "We fully plan to exploit it," Nadella said.…

14 views ·
#ai#microsoft#openai
GOOGLE NEWS

Satya Nadella says he’s ready to ‘exploit’ the new OpenAI deal - TechCrunch

Comprehensive up-to-date news coverage, aggregated from sources all over the world by Google News.…

13 views ·
NEW YORK POST

Equal playing field is ‘discrimination’ to Dem exploiters after SCOTUS strikes down Louisiana congressional map

The Democrats expressing outrage at the justices’ ruling aren’t upset about fairness for their black voters; they’re upset that Democrats will no longer be able to use them to obta…

7 views ·
#supreme court#voting rights#redistricting
THE BLOCK (CRYPTO)

Syndicate suffers exploit linked to Commons bridge compromise; SYND slides 36%

8 views ·
THE REGISTER

30 ClawHub skills secretly turn AI agents into a crypto swarm

Yet another reason not to feast on OpenClaw Thirty ClawHub skills published by a single author are silently co-opting AI agents and creating a mass cryptocurrency mining swarm – wi…

33 views ·
#ai security#crypto mining#openclaw
LE MONDE (EN)

France probes return of adult website linked to mass rape and child abuse

22 views ·
#cybercrime#child abuse#online exploitation
CRYPTO BRIEFING

Fenbushi Capital moves $7.1M ETH from AAVE to Binance after exploit

Fenbushi Capital moved 3,063 ETH ($7.13M) from AAVE to Binance after an exploit. Ethereum reaching $10,000 by December 31 at 4% YES.…

9 views ·
#defi#ethereum#fenbushi capital
HACKER NEWS (NEWEST)

Hackers steal nearly $300M in biggest DeFi exploit of 2026

7 views ·
R/PS5

[Mystic] Huge Update On PS5 & PS4 DRM Issue: Sony's Attempt To Fix A Refund Exploit?

7 views ·
CALIF

Mad Bugs: QEMU and UTM Escape

In which the guest VNCs into its own host and watches the heap like a screensaver.…

6 views ·
#cybersecurity#qemu#virtualization
TECHRADAR

Hackers exploit Robinhood account creation tool to launch worrying phishing scam

The vulnerability has since been fixed and the malicious landing page is offline.…

16 views ·
#phishing scam#robinhood#cybersecurity
COINDESK

A crypto coalition releases technical proposal to save Aave users from a massive token exploit

DeFi United, a coalition of multiple blockchain projects and crypto ecosystem individuals, has laid out a detailed plan to restore the backing of rsETH after this month’s Kelp DAO …

8 views ·
#defi#ethereum#aave
CRYPTO BRIEFING

Tether freezes $344M USDT amid KelpDAO exploit fallout, USDC depeg odds steady

Tether froze $344M USDT amid KelpDAO exploit fallout, but USDC depeg by December 31 remains steady at 5% YES.…

7 views ·
#stablecoin#tether#usdc
SLATE

The Crazy Loophole DOJ Is Exploiting to Keep My Immigrant Clients Imprisoned

This is not justice. This is a lottery.…

9 views ·
#immigration detention#habeas corpus#doj
THE GLOBE AND MAIL

‘See through’ Iran war? Markets exploit permacrisis instead

A new world of rivalry, competition, conflict and tension may just see greater risk simmer and persist…

17 views ·
#geopolitical risk#market resilience#tech dominance
HINDUSTAN TIMES — TOP

‘Nida Khan taught how to offer namaz, wear hijab’: Fresh allegations emerge in TCS Nashik case

The bench of additional sessions judge K G Joshi reserved its order of anticipatory bail plea of Nida Khan on Monday.| India News…

5 views ·
#tcs nashik case#religious coercion#sexual exploitation
GTFOBINS

GTFOBins

GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.…

6 views ·
#cybersecurity#unix#privilege escalation
JAPAN TIMES

99 accused in Japan in international crackdown on child sexual abuse material

Of the 99 people, 25 are junior high school and high school students involved in cases including sharing explicit images of classmates with friends.…

7 views ·
#child sexual abuse material#japan police#international crackdown
GOOGLE NEWS

Trump administration vows crackdown on Chinese companies 'exploiting' AI models made in US - AP News

Comprehensive up-to-date news coverage, aggregated from sources all over the world by Google News.…

6 views ·
REDDIT

Litecoin rewrites three hours of history to undo its first major privacy-layer exploit (leading to double-spends)

11 views ·