<?xml version='1.0' encoding='UTF-8'?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Kagi News - Cybersecurity</title>
    <link>https://kite.kagi.com/cybersecurity.xml</link>
    <description>Latest news from Kagi News for Cybersecurity category. Items include subcategory tags for filtering (e.g., Sports/NFL, World/Middle East)</description>
    <atom:link href="https://kite.kagi.com/cybersecurity.xml" rel="self"/>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <lastBuildDate>Thu, 30 Apr 2026 12:04:37 +0000</lastBuildDate>
    <item>
      <title>CISA issues zero-trust guidance for operational technology</title>
      <link>https://kite.kagi.com/183856c2-34b4-4f7a-a575-efc8cd69c070/cybersecurity/3</link>
      <description>&lt;p&gt;The U.S. Cybersecurity and Infrastructure Security Agency and federal partners released joint guidance for organizations applying zero-trust principles to operational technology systems. CISA said the document is intended to help OT owners and operators move toward zero-trust architecture in operational environments.&lt;/p&gt;&lt;h3&gt;Highlights:&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;Transition limits: The guidance says legacy infrastructure gaps, operational constraints and safety requirements present challenges unique to OT environments.&lt;/li&gt;&lt;li&gt;Asset visibility: CISA’s document focuses on establishing comprehensive asset visibility for OT environments.&lt;/li&gt;&lt;li&gt;Supply chain: The agencies identify proactive supply-chain risk management as part of OT zero-trust planning.&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Sources:&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;&lt;a href='https://www.cisa.gov/resources-tools/resources/adapting-zero-trust-principles-operational-technology'&gt;Adapting Zero Trust Principles to Operational Technology&lt;/a&gt; - cisa.gov&lt;/li&gt;&lt;li&gt;&lt;a href='https://news.google.com/rss/articles/CBMilwFBVV95cUxPZ0pqeUg0Rjd1SkFSbEdDMXBKUkN2REVyeldZRlNKQzU0YnctQVJQOER3U3J6OG5qa2FCUVlyVU5BN3RYOUlqWkU2NmRZZ2V6TzVLcmpzNlFPeVhNbHlkMW1oT3BsbGRiWkNrV25hZFRiRGdpSU9iSWhaTXBXcDJWdm54bzhrcjdGZ0pJTzZiN0EtNDMxc3NN'&gt;New Guidance - Adapting Zero Trust Principles To Operational Technology - LinkedIn&lt;/a&gt; - google.com&lt;/li&gt;&lt;/ul&gt;</description>
      <guid isPermaLink="true">https://kite.kagi.com/183856c2-34b4-4f7a-a575-efc8cd69c070/cybersecurity/3</guid>
      <category>Cybersecurity</category>
      <category>Cybersecurity/Zero Trust</category>
      <category>Zero Trust</category>
      <pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate>
    </item>
    <item>
      <title>cPanel fixes critical WHM authentication bypass flaw</title>
      <link>https://kite.kagi.com/183856c2-34b4-4f7a-a575-efc8cd69c070/cybersecurity/2</link>
      <description>&lt;p&gt;cPanel issued security updates for cPanel &amp;amp; WHM and WP Squared after a critical authentication-bypass flaw was disclosed in supported versions of the web-hosting control panel software. Rapid7 said the vulnerability, assigned CVE-2026-41940 on April 29, carries a CVSS score of 9.8 and allows unauthenticated remote attackers to bypass authentication and gain unauthorized administrative access to affected systems. The flaw affects software used to manage hosting servers, websites, configurations and databases; WHM provides root-level administration, while cPanel serves as the user-facing interface. Cyber Security News reported active exploitation and a public proof-of-concept exploit. Rapid7 cited managed cPanel host KnownHost as saying exploitation was occurring in the wild, and said widespread exploitation was expected to be imminent after watchTowr published technical analysis and exploit code.&lt;/p&gt;&lt;h3&gt;Highlights:&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;Scope detail: WebPros said all currently supported cPanel &amp;amp; WHM versions were affected by an issue involving various authentication paths.&lt;/li&gt;&lt;li&gt;Exposure estimate: Rapid7 said a naive Shodan query returned about 1.5 million internet-exposed cPanel instances that could be potential targets.&lt;/li&gt;&lt;li&gt;Vendor wording: cPanel release notes initially described the bug as “an issue with session loading and saving,” according to Rapid7.&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Sources:&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;&lt;a href='https://thehackernews.com/2026/04/critical-cpanel-authentication.html'&gt;Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately&lt;/a&gt; - thehackernews.com&lt;/li&gt;&lt;li&gt;&lt;a href='https://cybersecuritynews.com/cpanel-0-day-authentication-bypass-vulnerability/'&gt;cPanel 0-Day Authentication Bypass Vulnerability Actively Exploited in the Wild — PoC Released&lt;/a&gt; - cybersecuritynews.com&lt;/li&gt;&lt;li&gt;&lt;a href='https://www.rapid7.com/blog/post/etr-cve-2026-41940-cpanel-whm-authentication-bypass'&gt;CVE-2026-41940: cPanel &amp;amp; WHM Authentication Bypass&lt;/a&gt; - rapid7.com&lt;/li&gt;&lt;li&gt;&lt;a href='https://www.heise.de/news/cPanel-WHM-Unbefugte-Zugriffe-auf-Webserver-Konfigurationstool-moeglich-11277580.html'&gt;cPanel/WHM: Unbefugte Zugriffe auf Webserver-Konfigurationstool möglich&lt;/a&gt; - heise.de&lt;/li&gt;&lt;/ul&gt;</description>
      <guid isPermaLink="true">https://kite.kagi.com/183856c2-34b4-4f7a-a575-efc8cd69c070/cybersecurity/2</guid>
      <category>Cybersecurity</category>
      <category>Cybersecurity/Vulnerabilities</category>
      <category>Vulnerabilities</category>
      <pubDate>Wed, 29 Apr 2026 09:37:00 +0000</pubDate>
    </item>
    <item>
      <title>AI firms split over access to cyber-defense models</title>
      <link>https://kite.kagi.com/183856c2-34b4-4f7a-a575-efc8cd69c070/cybersecurity/1</link>
      <description>&lt;p&gt;OpenAI’s new cybersecurity plan highlighted a policy split among AI companies over how widely to distribute frontier models with cyber capabilities. OpenAI described a five-part plan for cybersecurity in the “Intelligence Age,” while reports from CNN and Egypt Independent said its access-expansion approach contrasts with Anthropic’s more restrictive stance. Reports on Anthropic’s Claude Mythos focused on AI-aided attack and defense, including reactions in regulated industries and operational risks around frontier AI.&lt;/p&gt;&lt;h3&gt;Highlights:&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;Attack tempo: Help Net Security said OpenAI warned that the time to keep up with AI-driven attacks is narrowing.&lt;/li&gt;&lt;li&gt;Preparedness push: Marketplace framed the response as a scramble to prepare for AI “super-hackers”.&lt;/li&gt;&lt;li&gt;Defender disadvantage: Asahi quoted a security expert saying defenders are currently overwhelmingly disadvantaged.&lt;/li&gt;&lt;li&gt;Private-sector scope: Egypt Independent said OpenAI is expanding access to advanced models to help businesses shore up cyber defenses.&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Perspectives:&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;OpenAI: OpenAI described a five-part action plan for strengthening cybersecurity in the “Intelligence Age,” focused on defensive deployment and critical systems. (&lt;a href='https://openai.com/index/cybersecurity-in-the-intelligence-age'&gt;OpenAI&lt;/a&gt;)&lt;/li&gt;&lt;li&gt;Anthropic: Egypt Independent described Anthropic as arguing that controlled access to advanced models is itself a cybersecurity measure, not an obstacle to defense. (&lt;a href='https://www.egyptindependent.com/openai-wants-to-put-its-most-powerful-model-at-all-levels-of-government-to-fight-hackers/'&gt;Egypt Independent&lt;/a&gt;)&lt;/li&gt;&lt;li&gt;Cybersecurity experts: Dark Reading said experts were less alarmed than financial institutions reacting to Claude Mythos. (&lt;a href='https://www.darkreading.com/cyber-risk/claude-mythos-startle-japans-financial-sector'&gt;Dark Reading&lt;/a&gt;)&lt;/li&gt;&lt;li&gt;The Economist: The outlet reported from a hacking conference on how machines could be used for cyber defense. (&lt;a href='https://www.economist.com/science-and-technology/2026/04/29/a-glimpse-into-cyber-securitys-ai-driven-future'&gt;The Economist&lt;/a&gt;)&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Sources:&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;&lt;a href='https://www.darkreading.com/cyber-risk/claude-mythos-startle-japans-financial-sector'&gt;Claude Mythos Fears Startle Japan&amp;#x27;s Financial Services Sector&lt;/a&gt; - darkreading.com&lt;/li&gt;&lt;li&gt;&lt;a href='https://news.google.com/rss/articles/CBMicEFVX3lxTE8zTmJINXN6MVZ2b3g5ZW9pNTRhUFN4bjJjSEFDMjFsTWNxSy1qZXZHVEVScWotbk5CdDNlNU5HSUNOS0F6OGFxbFdmLURtNnlMd3kzMkF6SWdPNmdoekFmWmJzMWRfckVhMGctWDV6ZEk'&gt;Cybersecurity in the Intelligence Age - OpenAI&lt;/a&gt; - google.com&lt;/li&gt;&lt;li&gt;&lt;a href='https://www.economist.com/science-and-technology/2026/04/29/a-glimpse-into-cyber-securitys-ai-driven-future'&gt;A glimpse into cyber-security’s AI-driven future&lt;/a&gt; - economist.com&lt;/li&gt;&lt;li&gt;&lt;a href='https://openai.com/index/cybersecurity-in-the-intelligence-age'&gt;Cybersecurity in the Intelligence Age&lt;/a&gt; - openai.com&lt;/li&gt;&lt;li&gt;&lt;a href='https://indianexpress.com/article/technology/artificial-intelligence/why-ai-still-struggles-to-defend-against-cyberattacks-even-in-the-age-of-mythos-10663367/'&gt;Why AI still struggles to defend against cyberattacks even in the age of Mythos&lt;/a&gt; - indianexpress.com&lt;/li&gt;&lt;li&gt;&lt;a href='http://www.asahi.com/articles/ASV4X4CF4V4XUTFL022M.html'&gt;「防御側は今、圧倒的に不利」AIミュトスにセキュリティー専門家&lt;/a&gt; - asahi.com&lt;/li&gt;&lt;li&gt;&lt;a href='https://www.dn.se/podd/spotlight/utklassar-hackare-hur-farlig-ar-ai-modellen/'&gt;Utklassar hackare – hur farlig är AI-modellen?&lt;/a&gt; - dn.se&lt;/li&gt;&lt;li&gt;&lt;a href='https://www.egyptindependent.com/openai-wants-to-put-its-most-powerful-model-at-all-levels-of-government-to-fight-hackers/'&gt;OpenAI wants to put its most powerful model at all levels of government to fight hackers&lt;/a&gt; - egyptindependent.com&lt;/li&gt;&lt;/ul&gt;</description>
      <guid isPermaLink="true">https://kite.kagi.com/183856c2-34b4-4f7a-a575-efc8cd69c070/cybersecurity/1</guid>
      <category>Cybersecurity</category>
      <category>Cybersecurity/Ai Security</category>
      <category>Ai Security</category>
      <pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>CISA adds exploited Microsoft, ConnectWise flaws to catalog</title>
      <link>https://kite.kagi.com/183856c2-34b4-4f7a-a575-efc8cd69c070/cybersecurity/0</link>
      <description>&lt;p&gt;The U.S. Cybersecurity and Infrastructure Security Agency on Tuesday added actively exploited vulnerabilities affecting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities catalog. The update followed public reports of exploitation and reports about Windows patch reliability and remote support software security.&lt;/p&gt;&lt;h3&gt;Highlights:&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;ConnectWise score: The ConnectWise ScreenConnect entry carries a CVSS score of 8.4, according to The Hacker News.&lt;/li&gt;&lt;li&gt;Windows component: Heise identified the Microsoft issue as involving Windows Shell in its report on the observed attacks.&lt;/li&gt;&lt;li&gt;Sensitive-information exposure: The Register said the Windows flaw can expose sensitive information on vulnerable systems.&lt;/li&gt;&lt;li&gt;Threat actors: Cybersecurity Dive reported that security experts said Russia has used one of the flaws and North Korea has used the other.&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Sources:&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;&lt;a href='https://thehackernews.com/2026/04/cisa-adds-actively-exploited.html'&gt;CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV&lt;/a&gt; - thehackernews.com&lt;/li&gt;&lt;li&gt;&lt;a href='https://www.heise.de/news/CISA-Warnung-Angriffe-auf-ConnectWise-ScreenConnect-und-Windows-Shell-11276026.html'&gt;CISA-Warnung: Angriffe auf ConnectWise ScreenConnect und Windows Shell&lt;/a&gt; - heise.de&lt;/li&gt;&lt;li&gt;&lt;a href='https://www.cybersecuritydive.com/news/cisa-microsoft-connectwise-kev-update/818817/'&gt;CISA adds Microsoft, ConnectWise vulnerabilities to active exploitation catalog&lt;/a&gt; - cybersecuritydive.com&lt;/li&gt;&lt;li&gt;&lt;a href='https://news.google.com/rss/articles/CBMijAFBVV95cUxPOE1Va2tYemwyT25NbVpTNDRqUVFkRVNBNzFnX2VmeWlWOGthNDJaV3JzVmdhYmlnS3VCTGpYTmpZM3NaX0FPc2NIdlQxQXAwTVQ3SHE5Yko2bmF4TndHSmhkR2x5YXl4akFkS3duNUlTX25PQmdJMHJNN3BNVm1yZE43cGl4ZlI2T2xtSw'&gt;CISA adds Microsoft, ConnectWise vulnerabilities to active exploitation catalog - Cybersecurity Dive&lt;/a&gt; - google.com&lt;/li&gt;&lt;li&gt;&lt;a href='https://www.techrepublic.com/article/news-microsoft-windows-zero-click-flaw-incomplete-patch/'&gt;Microsoft Confirms Windows Flaw Is Being Exploited After Incomplete Patch&lt;/a&gt; - techrepublic.com&lt;/li&gt;&lt;li&gt;&lt;a href='https://go.theregister.com/feed/www.theregister.com/2026/04/29/microsoft_zero_click_exploit/'&gt;Microsoft&amp;#x27;s patch for a 0-day exploited by Russian spies fell short. Another Windows flaw is under attack&lt;/a&gt; - theregister.com&lt;/li&gt;&lt;/ul&gt;</description>
      <guid isPermaLink="true">https://kite.kagi.com/183856c2-34b4-4f7a-a575-efc8cd69c070/cybersecurity/0</guid>
      <category>Cybersecurity</category>
      <category>Cybersecurity/Vulnerabilities</category>
      <category>Vulnerabilities</category>
      <pubDate>Wed, 29 Apr 2026 08:46:00 +0000</pubDate>
    </item>
  </channel>
</rss>
