<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: BeyondMachines</title>
    <description>The latest articles on DEV Community by BeyondMachines (@bsp_beyondmachines).</description>
    <link>https://dev.to/bsp_beyondmachines</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2445503%2F3faf5e64-542b-44d9-9bb9-e5bdaa993b59.png</url>
      <title>DEV Community: BeyondMachines</title>
      <link>https://dev.to/bsp_beyondmachines</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/bsp_beyondmachines"/>
    <language>en</language>
    <item>
      <title>Charter Communications Investigates Data Breach Claims Potentially Exposing 42 Million Records</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 24 May 2026 16:01:08 +0000</pubDate>
      <link>https://dev.to/beyondmachines/charter-communications-investigates-data-breach-claims-potentially-exposing-42-million-records-3aln</link>
      <guid>https://dev.to/beyondmachines/charter-communications-investigates-data-breach-claims-potentially-exposing-42-million-records-3aln</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Charter Communications is investigating a data breach claimed by the ShinyHunters group, who allege they stole 42 million customer records via compromised cloud infrastructure.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/charter-communications-investigates-data-breach-claims-potentially-exposing-42-million-records-k-z-0-p-z/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Matferline Data Breach Exposes 703,000 Student Records and Plaintext Passwords</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 24 May 2026 15:01:08 +0000</pubDate>
      <link>https://dev.to/beyondmachines/matferline-data-breach-exposes-703000-student-records-and-plaintext-passwords-52op</link>
      <guid>https://dev.to/beyondmachines/matferline-data-breach-exposes-703000-student-records-and-plaintext-passwords-52op</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Spanish road safety platform Matferline suffered a SQL injection attack that exposed the personal data and plaintext passwords of over 703,000 students across 1,200 driving schools. The stolen database, which includes DNI numbers and profile photos, is currently being sold on the dark web by a threat actor named Macaroni.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/matferline-data-breach-exposes-703000-student-records-and-plaintext-passwords-9-i-9-4-g/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>LiteSpeed cPanel Plugin Zero-Day Exploited for Root Access</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 24 May 2026 14:01:08 +0000</pubDate>
      <link>https://dev.to/beyondmachines/litespeed-cpanel-plugin-zero-day-exploited-for-root-access-oli</link>
      <guid>https://dev.to/beyondmachines/litespeed-cpanel-plugin-zero-day-exploited-for-root-access-oli</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;LiteSpeed Technologies patched a critical, actively exploited vulnerability (CVE-2026-48172, CVSS 10.0) in its cPanel plugin that allows any user to run scripts with root privileges. Attackers are currently using this flaw to gain full control over web hosting servers.&lt;/p&gt;

&lt;h3&gt;
  
  
  Take Action:
&lt;/h3&gt;

&lt;p&gt;If you use LiteSpeed on cPanel immediately upgrade to LiteSpeed WHM Plugin version 5.3.1.0 (which includes the patched cPanel plugin v2.4.7) or temporarily uninstall the user-end plugin to prevent a complete server takeover. Run the grep -rE "cpanel_jsonapi_func=redisAble" /var/cpanel/logs /usr/local/cpanel/logs/ 2&amp;gt;/dev/null command, block suspicious IPs, and audit your system. If you can't update right away, uninstall the user-end plugin to prevent a total server takeover.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/litespeed-cpanel-plugin-zero-day-exploited-for-root-access-6-l-t-k-n/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Laravel-Lang Supply Chain Attack: Every Tag Across Multiple Composer Packages Rewritten to Steal CI Secrets</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 24 May 2026 13:01:07 +0000</pubDate>
      <link>https://dev.to/beyondmachines/laravel-lang-supply-chain-attack-every-tag-across-multiple-composer-packages-rewritten-to-steal-ci-211o</link>
      <guid>https://dev.to/beyondmachines/laravel-lang-supply-chain-attack-every-tag-across-multiple-composer-packages-rewritten-to-steal-ci-211o</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;A supply chain attack on Laravel-Lang involved rewriting all git tags across four Composer packages to inject a secret-stealing payload that triggers during the PHP autoload process.&lt;/p&gt;

&lt;h3&gt;
  
  
  Take Action:
&lt;/h3&gt;

&lt;p&gt;If your project uses any Laravel-Lang Composer packages (laravel-lang/lang, http-statuses, actions, or attributes), do not run &lt;code&gt;composer update&lt;/code&gt; and check whether your lockfile points to a tag pulled on or after May 22, 2026. If you did, assume every secret reachable from that build environment (CI tokens, cloud keys, GitHub PATs, deploy keys, database credentials) is stolen and rotate them all immediately. Block the domain flipboxstudio.info at your DNS and firewall, and only restore builds by pinning to a pre-attack commit SHA you've verified against a local clone.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/laravel-lang-supply-chain-attack-every-tag-across-multiple-composer-packages-rewritten-to-steal-ci-secrets-l-n-i-d-r/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Makivvik Corporation Discloses Data Breach Exposing SSNs and Banking Details</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 24 May 2026 12:01:08 +0000</pubDate>
      <link>https://dev.to/beyondmachines/makivvik-corporation-discloses-data-breach-exposing-ssns-and-banking-details-2nb1</link>
      <guid>https://dev.to/beyondmachines/makivvik-corporation-discloses-data-breach-exposing-ssns-and-banking-details-2nb1</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Makivvik Corporation, a Canadian Inuit land claims organization, suffered a data breach in February 2026 that exposed the social insurance numbers and banking information of its employees and members.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/makivvik-corporation-discloses-data-breach-exposing-ssns-and-banking-details-h-o-b-0-v/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Hartford HealthCare HUSKY Portal Data Breach Exposes 22,500 Patients</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 24 May 2026 11:01:07 +0000</pubDate>
      <link>https://dev.to/beyondmachines/hartford-healthcare-husky-portal-data-breach-exposes-22500-patients-1425</link>
      <guid>https://dev.to/beyondmachines/hartford-healthcare-husky-portal-data-breach-exposes-22500-patients-1425</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Hartford HealthCare and the Connecticut DSS reported a data breach affecting 22,500 HUSKY Medicaid patients after attackers used stolen employee credentials to access a provider portal.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/hartford-healthcare-husky-portal-data-breach-exposes-22500-patients-v-a-t-5-v/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Radiology Associates of Richmond Reports Data Breach Affecting 266,000 Patients</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 24 May 2026 10:01:07 +0000</pubDate>
      <link>https://dev.to/beyondmachines/radiology-associates-of-richmond-reports-data-breach-affecting-266000-patients-1ghh</link>
      <guid>https://dev.to/beyondmachines/radiology-associates-of-richmond-reports-data-breach-affecting-266000-patients-1ghh</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Radiology Associates of Richmond reports a data breach affecting 266,000 individuals after an unauthorized actor accessed its network in July 2025.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/radiology-associates-of-richmond-reports-data-breach-affecting-266000-patients-0-s-9-s-q/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Osage County District Court Data Breach</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 24 May 2026 09:01:06 +0000</pubDate>
      <link>https://dev.to/beyondmachines/osage-county-district-court-data-breach-465j</link>
      <guid>https://dev.to/beyondmachines/osage-county-district-court-data-breach-465j</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;The Osage County District Court in Kansas suffered a data breach that exposed misdemeanor probation and felony sentencing records after hackers accessed its network in August 2025.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/osage-county-district-court-data-breach-a-q-s-j-x/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Nginx-poolslip Vulnerability Enables DoS and Code Execution Attacks</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 24 May 2026 08:01:06 +0000</pubDate>
      <link>https://dev.to/beyondmachines/nginx-poolslip-vulnerability-enables-dos-and-code-execution-attacks-26cj</link>
      <guid>https://dev.to/beyondmachines/nginx-poolslip-vulnerability-enables-dos-and-code-execution-attacks-26cj</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;NGINX has disclosed a critical heap buffer overflow vulnerability (CVE-2026-9256) in its rewrite module that allows unauthenticated attackers to cause denial-of-service or execute arbitrary code. The flaw, known as nginx-poolslip, affects both Open Source and Plus versions and requires immediate patching or configuration changes.&lt;/p&gt;

&lt;h3&gt;
  
  
  Take Action:
&lt;/h3&gt;

&lt;p&gt;If you're running NGINX (Open Source or Plus), upgrade immediately to a patched version (1.30.2, 1.31.1, NGINX Plus R36 P5, R32 P7, or R37.0.1.1). If you can't patch right away, edit your config files to replace unnamed numeric capture groups (like $1, $2) in rewrite directives with named captures (like $user_id) as a temporary workaround.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/nginx-poolslip-vulnerability-enables-dos-and-code-execution-attacks-c-4-k-x-4/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>RondoDox Botnet Hijacks Over One Million ASUS Routers via 2018 Vulnerability</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sat, 23 May 2026 18:01:07 +0000</pubDate>
      <link>https://dev.to/beyondmachines/rondodox-botnet-hijacks-over-one-million-asus-routers-via-2018-vulnerability-3dp1</link>
      <guid>https://dev.to/beyondmachines/rondodox-botnet-hijacks-over-one-million-asus-routers-via-2018-vulnerability-3dp1</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;The RondoDox botnet is exploiting a critical 2018 vulnerability (CVE-2018-5999) in over one million ASUS routers to gain unauthorized control and launch DDoS attacks.&lt;/p&gt;

&lt;h3&gt;
  
  
  Take Action:
&lt;/h3&gt;

&lt;p&gt;If you own an ASUS router, first make sure it is isolated from the internet and only accessible from trusted networks, with the management interface never exposed to the public internet. Then check if your model still receives official firmware updates and apply the latest version - if it's end-of-life, replace it with a supported model, and disable the &lt;code&gt;infosvr&lt;/code&gt; service.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/rondodox-botnet-hijacks-over-one-million-asus-routers-via-2018-vulnerability-0-0-l-l-u/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Eversource Energy Data Breach Following Phishing Attack</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sat, 23 May 2026 14:01:07 +0000</pubDate>
      <link>https://dev.to/beyondmachines/eversource-energy-data-breach-following-phishing-attack-378i</link>
      <guid>https://dev.to/beyondmachines/eversource-energy-data-breach-following-phishing-attack-378i</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Eversource Energy disclosed a data breach affecting 3,049 customers after a phishing campaign in April 2026 allowed attackers to use stolen credentials to access sensitive files.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/eversource-energy-data-breach-following-phishing-attack-s-x-n-h-3/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>German University Hospitals Suffer Data Breach via Third-Party Billing Provider</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sat, 23 May 2026 13:01:08 +0000</pubDate>
      <link>https://dev.to/beyondmachines/german-university-hospitals-suffer-data-breach-via-third-party-billing-provider-2d6i</link>
      <guid>https://dev.to/beyondmachines/german-university-hospitals-suffer-data-breach-via-third-party-billing-provider-2d6i</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;A third-party data breach at billing provider Unimed compromised the sensitive personal and medical information of nearly 100,000 patients across several German university hospitals.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/german-university-hospitals-suffer-data-breach-via-third-party-billing-provider-0-j-d-1-u/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
  </channel>
</rss>
