State-Sized Cyber Week: Kernel Flaws, Wipers, and the Stuxnet Backstory

TL;DR Summary
This week’s security digest spans state-sponsored cyber activity from a widespread Linux kernel LPE (CopyFail) tied to IPSec, to Venezuela’s targeted wiper against PDVSA, and expanded US bans on consumer, SMB, and ISP routers. It also highlights a serious CPanel authentication bypass (CVE-2026-41940) with active exploitation, discusses AI prompt injection risks, and revisits pre-Stuxnet history with possible early state malware (Fast16) that predates the famous worm. Rounding out the week is a GitHub Enterprise remote code-execution flaw (CVE-2026-3854) quickly patched, plus observations from a security honeypot and a Google post on prompt-injection.
- This Week In Security: State Malware, State Hardware Bans, And Stuxnet Before Stuxnet Was Cool Hackaday
- CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments Microsoft
- Linux exploit instantly grants administrator access on most distributions since 2017 — cryptography optimization snafu grants root privileges to local users Tom's Hardware
- Nine-Year-Old Zero-Day Flaw in Linux Kernel Discovered by AI-Equipped Security Researcher Infosecurity Magazine
- "Copy Fail": Linux root in all major distributions with 732 bytes of Python heise online
Reading Insights
Total Reads
0
Unique Readers
19
Time Saved
20 min
vs 21 min read
Condensed
98%
4,117 → 92 words
Want the full story? Read the original article
Read on Hackaday