<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: BeyondMachines</title>
    <description>The latest articles on DEV Community by BeyondMachines (@bsp_beyondmachines).</description>
    <link>https://dev.to/bsp_beyondmachines</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2445503%2F3faf5e64-542b-44d9-9bb9-e5bdaa993b59.png</url>
      <title>DEV Community: BeyondMachines</title>
      <link>https://dev.to/bsp_beyondmachines</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/bsp_beyondmachines"/>
    <language>en</language>
    <item>
      <title>Integrated Pain Associates Data Breach Exposes Patient Social Security Numbers and Medical Records</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 03 May 2026 09:01:28 +0000</pubDate>
      <link>https://dev.to/beyondmachines/integrated-pain-associates-data-breach-exposes-patient-social-security-numbers-and-medical-records-3m4i</link>
      <guid>https://dev.to/beyondmachines/integrated-pain-associates-data-breach-exposes-patient-social-security-numbers-and-medical-records-3m4i</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Integrated Pain Associates disclosed a data breach occurring in February 2026 that exposed sensitive patient information, including Social Security numbers and medical records.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/integrated-pain-associates-data-breach-exposes-patient-social-security-numbers-and-medical-records-j-f-1-o-r/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Zcash Foundation Releases Zebra 4.4.0 to Patch Consensus and DoS Flaws</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sun, 03 May 2026 08:01:28 +0000</pubDate>
      <link>https://dev.to/beyondmachines/zcash-foundation-releases-zebra-440-to-patch-consensus-and-dos-flaws-3e1p</link>
      <guid>https://dev.to/beyondmachines/zcash-foundation-releases-zebra-440-to-patch-consensus-and-dos-flaws-3e1p</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Zcash Foundation released Zebra 4.4.0 to address critical consensus-level vulnerabilities and denial-of-service flaws that could lead to chain forks and permanent node halts.&lt;/p&gt;

&lt;h3&gt;
  
  
  Take Action:
&lt;/h3&gt;

&lt;p&gt;If you operate a Zebra node, upgrade to version 4.4.0 ASAP, as there are no workarounds for the consensus-level flaws that could push your node onto an invalid chain. After upgrading, verify that your RPC cookie file has 0600 permissions to block unauthorized local access.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/zcash-foundation-releases-zebra-4-4-0-to-patch-critical-consensus-and-dos-flaws-2-c-s-b-d/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>DermCare Management Data Breach Exposes Sensitive Patient Records</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sat, 02 May 2026 20:01:29 +0000</pubDate>
      <link>https://dev.to/beyondmachines/dermcare-management-data-breach-exposes-sensitive-patient-records-7nf</link>
      <guid>https://dev.to/beyondmachines/dermcare-management-data-breach-exposes-sensitive-patient-records-7nf</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;DermCare Management, Inc. suffered a data breach in February 2025 that exposed the sensitive medical and financial information of thousands of patients across multiple states.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/dermcare-management-data-breach-exposes-sensitive-patient-records-p-u-m-p-1/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Trellix Confirms Unauthorized Access to Source Code Repository</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sat, 02 May 2026 19:01:29 +0000</pubDate>
      <link>https://dev.to/beyondmachines/trellix-confirms-unauthorized-access-to-source-code-repository-f75</link>
      <guid>https://dev.to/beyondmachines/trellix-confirms-unauthorized-access-to-source-code-repository-f75</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Cybersecurity firm Trellix confirmed that unauthorized actors accessed a portion of its source code repository. The company reports no evidence of impact on its software distribution or product integrity.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/trellix-confirms-unauthorized-access-to-source-code-repository-r-j-x-6-z/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Canonical and Ubuntu Infrastructure Hit by Sustained Cross-Border DDoS Attack</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sat, 02 May 2026 18:01:28 +0000</pubDate>
      <link>https://dev.to/beyondmachines/canonical-and-ubuntu-infrastructure-hit-by-sustained-cross-border-ddos-attack-28j</link>
      <guid>https://dev.to/beyondmachines/canonical-and-ubuntu-infrastructure-hit-by-sustained-cross-border-ddos-attack-28j</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Canonical and Ubuntu infrastructure suffered a sustained, cross-border DDoS attack claimed by a pro-Iran group, resulting in a nearly two-day outage of web services and primary update servers.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/canonical-and-ubuntu-infrastructure-hit-by-sustained-cross-border-ddos-attack-2-8-r-e-p/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Critical Authentication Bypass in cPanel and WHM Actively Exploited</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Sat, 02 May 2026 08:01:29 +0000</pubDate>
      <link>https://dev.to/beyondmachines/critical-authentication-bypass-in-cpanel-and-whm-actively-exploited-11o7</link>
      <guid>https://dev.to/beyondmachines/critical-authentication-bypass-in-cpanel-and-whm-actively-exploited-11o7</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;A critical authentication bypass vulnerability (CVE-2026-41940, CVSS 9.8) in cPanel and WHM is being actively exploited to grant attackers full root access to web servers.&lt;/p&gt;

&lt;h3&gt;
  
  
  Take Action:
&lt;/h3&gt;

&lt;p&gt;If you use cPanel or WHM on your servers, this is urgent, you are being hacked.  Immediately run /scripts/upcp --force to apply the emergency patch, then verify the version with /usr/local/cpanel/cpanel -V. Until you've confirmed the update, block external access to ports 2083 and 2087. If you are using cPanel as a customer, reach to your hosting provider to confirm that they have updated cPanel.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/critical-authentication-bypass-in-cpanel-and-whm-actively-exploited-t-j-b-6-s/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Prime Properties Targeted by Emerging M3rx Ransomware Group</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Fri, 01 May 2026 18:01:29 +0000</pubDate>
      <link>https://dev.to/beyondmachines/prime-properties-targeted-by-emerging-m3rx-ransomware-group-171d</link>
      <guid>https://dev.to/beyondmachines/prime-properties-targeted-by-emerging-m3rx-ransomware-group-171d</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Sydney-based Prime Properties was listed on the M3rx ransomware leak site with claims of significant amount of stolen data.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/prime-properties-targeted-by-emerging-m3rx-ransomware-group-j-5-n-y-l/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Churchill Claims Services Ransomware Attack Exposes SSNs of 2,610 Individuals</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Fri, 01 May 2026 08:01:29 +0000</pubDate>
      <link>https://dev.to/beyondmachines/churchill-claims-services-ransomware-attack-exposes-ssns-of-2610-individuals-1n3c</link>
      <guid>https://dev.to/beyondmachines/churchill-claims-services-ransomware-attack-exposes-ssns-of-2610-individuals-1n3c</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Churchill Claims Services suffered a ransomware attack by the Securotrop group that exposed the Social Security numbers and personal data of 2,610 individuals. The breach remained undetected for six months after the threat actors claimed to have stolen 240 GB of internal records.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/churchill-claims-services-ransomware-attack-exposes-ssns-of-2610-individuals-7-a-q-3-1/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Moldova National Health Insurance Company Suffers Massive Data Breach Affecting One-Third of Database</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Thu, 30 Apr 2026 20:01:28 +0000</pubDate>
      <link>https://dev.to/beyondmachines/moldova-national-health-insurance-company-suffers-massive-data-breach-affecting-one-third-of-47hc</link>
      <guid>https://dev.to/beyondmachines/moldova-national-health-insurance-company-suffers-massive-data-breach-affecting-one-third-of-47hc</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Moldova's National Health Insurance Company (CNAM) suffered a cyberattack that compromised approximately 30% of the national healthcare database, including personal and payment information. Authorities suspect the incident was a coordinated operation by Russian-linked actors aimed at data theft, not financial gain.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/moldova-national-health-insurance-company-suffers-massive-data-breach-affecting-one-third-of-database-f-d-q-y-0/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Sandhills Medical Foundation Discloses Ransomware Breach Affecting 170,000 Patients</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Thu, 30 Apr 2026 15:01:30 +0000</pubDate>
      <link>https://dev.to/beyondmachines/sandhills-medical-foundation-discloses-ransomware-breach-affecting-170000-patients-544h</link>
      <guid>https://dev.to/beyondmachines/sandhills-medical-foundation-discloses-ransomware-breach-affecting-170000-patients-544h</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;Sandhills Medical Foundation disclosed a ransomware attack by the Inc Ransom group that compromised the personal and medical data of approximately 170,000 individuals. The breach resulted in the theft and subsequent leaking of Social Security numbers, financial records, and personal health information.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/sandhills-medical-foundation-discloses-ransomware-breach-affecting-170000-patients-t-6-v-0-m/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Celebrity Private Communications Exposed in Stalkerware Database Breach</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Thu, 30 Apr 2026 14:01:30 +0000</pubDate>
      <link>https://dev.to/beyondmachines/celebrity-private-communications-exposed-in-stalkerware-database-breach-iib</link>
      <guid>https://dev.to/beyondmachines/celebrity-private-communications-exposed-in-stalkerware-database-breach-iib</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;A misconfigured database belonging to an individual using stalkerware exposed nearly 87,000 screenshots from a prominent celebrity's device, including private chats and sensitive documents. The breach highlights how spyware bypasses end-to-end encryption by capturing data directly from the device's screen.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/celebrity-private-communications-exposed-in-stalkerware-database-breach-u-y-n-m-r/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Copy Fail: Linux Kernel Flaw Grants Root Access On All Major Distributions</title>
      <dc:creator>BeyondMachines</dc:creator>
      <pubDate>Thu, 30 Apr 2026 11:01:29 +0000</pubDate>
      <link>https://dev.to/beyondmachines/copy-fail-linux-kernel-flaw-grants-root-access-on-all-major-distributions-4hnb</link>
      <guid>https://dev.to/beyondmachines/copy-fail-linux-kernel-flaw-grants-root-access-on-all-major-distributions-4hnb</guid>
      <description>&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;p&gt;A Linux kernel vulnerability called "Copy Fail" (CVE-2026-31431) allows unprivileged local users to gain root privileges with 100% reliability by corrupting the shared page cache. The flaw affects nearly all Linux distributions since 2017 and enables container escapes because the memory corruption does not modify files on disk.&lt;/p&gt;

&lt;h3&gt;
  
  
  Take Action:
&lt;/h3&gt;

&lt;p&gt;If you run Linux servers, especially shared environments like Kubernetes clusters, CI/CD runners, or multi-tenant hosts, patch your kernel immediately to a version that includes the fix (mainline commit a664bf3d603d) for CVE-2026-31431. If you can't patch right away, disable the vulnerable module by running echo "install algif_aead /bin/false" &amp;gt; /etc/modprobe.d/disable-algif.conf followed by rmmod algif_aead, and for untrusted code environments block AF_ALG socket creation via seccomp as a long-term safeguard.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;a href="https://beyondmachines.net/event_details/copy-fail-linux-kernel-flaw-grants-root-access-on-all-major-distributions-w-l-v-0-c/9uoJWdGwxq" rel="noopener noreferrer"&gt;Read the full article on BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This article was originally published on &lt;a href="https://beyondmachines.net" rel="noopener noreferrer"&gt;BeyondMachines&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
  </channel>
</rss>
