<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>InfoQ - Security Vulnerabilities - News</title>
    <link>https://www.infoq.com</link>
    <description>InfoQ Security Vulnerabilities News feed</description>
    <item>
      <title>Copy Fail and Dirty Frag: Linux Page-Cache Exploits Target Every Major Distribution</title>
      <link>https://www.infoq.com/news/2026/05/copy-fail-dirty-frag-linux/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Security+Vulnerabilities-news</link>
      <description>&lt;img src="https://res.infoq.com/news/2026/05/copy-fail-dirty-frag-linux/en/headerimage/generatedHeaderImage-1778536323907.jpg"/&gt;&lt;p&gt;Two recent Linux kernel vulnerabilities have been disclosed: Copy Fail (CVE-2026-31431) on April 29, 2026, and Dirty Frag (CVE-2026-43284 and CVE-2026-43500) on May 7, 2026. Both allow local users to gain root access, affecting multiple Linux distributions. These vulnerabilities exploit flaws in the page cache via different subsystems, necessitating immediate patching by affected organizations.&lt;/p&gt; &lt;i&gt;By Matt Saunders&lt;/i&gt;</description>
      <category>Linux</category>
      <category>Security Vulnerabilities</category>
      <category>DevOps</category>
      <category>news</category>
      <pubDate>Tue, 12 May 2026 08:00:00 GMT</pubDate>
      <guid>https://www.infoq.com/news/2026/05/copy-fail-dirty-frag-linux/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Security+Vulnerabilities-news</guid>
      <dc:creator>Matt Saunders</dc:creator>
      <dc:date>2026-05-12T08:00:00Z</dc:date>
      <dc:identifier>/news/2026/05/copy-fail-dirty-frag-linux/en</dc:identifier>
    </item>
    <item>
      <title>Attacker Bought 30 WordPress Plugins on Flippa and Backdoored All of Them</title>
      <link>https://www.infoq.com/news/2026/05/wordpress-plugins-supply-chain/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Security+Vulnerabilities-news</link>
      <description>&lt;img src="https://res.infoq.com/news/2026/05/wordpress-plugins-supply-chain/en/headerimage/generatedHeaderImage-1777874069748.jpg"/&gt;&lt;p&gt;An attacker purchased 30+ WordPress plugins on Flippa for six figures, planted a PHP deserialization backdoor in the first commit, and waited eight months before activating it across 400,000 installations. The attack used Ethereum smart contracts to resolve C2. WordPress.org has no mechanism for reviewing plugin ownership transfers, a gap that npm and PyPI addressed years ago.&lt;/p&gt; &lt;i&gt;By Steef-Jan Wiggers&lt;/i&gt;</description>
      <category>Software Supply Chain</category>
      <category>Application Security</category>
      <category>Dependency Management</category>
      <category>Security Vulnerabilities</category>
      <category>Development</category>
      <category>Architecture &amp; Design</category>
      <category>news</category>
      <pubDate>Wed, 06 May 2026 10:00:00 GMT</pubDate>
      <guid>https://www.infoq.com/news/2026/05/wordpress-plugins-supply-chain/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Security+Vulnerabilities-news</guid>
      <dc:creator>Steef-Jan Wiggers</dc:creator>
      <dc:date>2026-05-06T10:00:00Z</dc:date>
      <dc:identifier>/news/2026/05/wordpress-plugins-supply-chain/en</dc:identifier>
    </item>
    <item>
      <title>Cloudflare Processes 10M+ Daily Insights with New Security Overview Dashboard</title>
      <link>https://www.infoq.com/news/2026/05/cloudflare-security-dashboard/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Security+Vulnerabilities-news</link>
      <description>&lt;img src="https://res.infoq.com/news/2026/05/cloudflare-security-dashboard/en/headerimage/cloudflaredashboard-1776822044625.jpeg"/&gt;&lt;p&gt;Cloudflare has launched a Security Overview dashboard that consolidates security signals into prioritized action items. It surfaces millions of daily insights, helping teams identify and remediate critical risks faster. Built on distributed checkers and real-time event processing, it integrates analytics workflows to reduce investigation overhead and improve response efficiency.&lt;/p&gt; &lt;i&gt;By Leela Kumili&lt;/i&gt;</description>
      <category>Threat detection</category>
      <category>Security</category>
      <category>Observability</category>
      <category>Incident Response</category>
      <category>Real Time</category>
      <category>Threats</category>
      <category>Security Assessment</category>
      <category>Cloudflare</category>
      <category>Security Vulnerabilities</category>
      <category>AI, ML &amp; Data Engineering</category>
      <category>Development</category>
      <category>Architecture &amp; Design</category>
      <category>news</category>
      <pubDate>Mon, 04 May 2026 14:33:00 GMT</pubDate>
      <guid>https://www.infoq.com/news/2026/05/cloudflare-security-dashboard/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Security+Vulnerabilities-news</guid>
      <dc:creator>Leela Kumili</dc:creator>
      <dc:date>2026-05-04T14:33:00Z</dc:date>
      <dc:identifier>/news/2026/05/cloudflare-security-dashboard/en</dc:identifier>
    </item>
  </channel>
</rss>
