Christian Kammler

3.1K posts

Christian Kammler banner
Christian Kammler

Christian Kammler

@ck9

Copperfield since Kindergarten | apps since 2004 | bitcoin since 2006

Saarland | Germany شامل ہوئے Şubat 2009
4.6K فالونگ866 فالوورز
DIE ZEIT
DIE ZEIT@zeitonline·
Die Auslegung des Antisemitismus-Begriffs in Deutschland schränkt die freie Meinungsäußerung laut Europarat zu stark ein. Legitime Kritik an Israel werde so unterbunden. trib.al/5Z7uVel
Deutsch
198
370
1.5K
202.2K
Auswärtiges Amt
Auswärtiges Amt@AuswaertigesAmt·
#Ägypten ist ein strategischer Partner, mit dem wir enger zusammenarbeiten wollen. Deshalb haben wir die Einrichtung eines regelmäßigen strategischen Dialogs auf Ebene der Außenminister vereinbart. – @AussenMinDE heute in Berlin mit seinem ägyptischen Amtskollegen Abdelatty. 1/3
Auswärtiges Amt tweet mediaAuswärtiges Amt tweet mediaAuswärtiges Amt tweet media
Deutsch
15
6
16
4.8K
American Red Cross
American Red Cross@RedCross·
After retiring from the U.S. Army, Brandon Hittle missed the connection and camaraderie that come with serving alongside fellow soldiers. He found that sense of purpose again through the Red Cross. Brandon is part of our expeditionary mobile workforce, a dedicated group of Red Crossers who deploy to remote locations around the world to support the needs of service members. From facilitating emergency communications to promoting wellness and respite, they help bring care and comfort wherever it’s needed most. For Brandon, joining this team offered a meaningful way to remain part of the military community. At Camp Karliki in Poland — an isolated base where soldiers have limited connection to the outside world — he built meaningful relationships during respite events like summer movie nights and cookouts. "I just want to be there as someone to lend an ear and give them inspiration," Brandon said. For many service members on base, this is their first deployment overseas. Having someone there who understands military life can be a powerful source of comfort. Brandon is proud to support service members far from home, and we’re proud to have him furthering our lifesaving mission.
American Red Cross tweet mediaAmerican Red Cross tweet media
English
10
12
41
4.9K
Julian Reichelt
Julian Reichelt@jreichelt·
Nehmt dieser Pädo-Stiftung die Steuergelder weg!
Julian Reichelt tweet media
Deutsch
230
1.9K
12.5K
443.2K
Christian Kammler
International Cyber Digest@IntCyberDigest

🚨 BREAKING: cPanel and WHM, the control panels behind an estimated 70+ million websites, have a critical security flaw that lets anyone become root admin without a password. CVE-2026-41940 affects every supported version. It’s already being exploited in the wild. watchTowr Labs published the full attack today, after the hosting company KnownHost confirmed the bug was already being used to break into a significant chunk of the internet. If you've never heard of cPanel: it's the dashboard that hosting providers and millions of website owners use to manage their servers, domains, email accounts, databases, and SSL certificates. WHM is the admin version that controls the entire server. If someone gets root access to WHM, they get the keys to the kingdom and to every apartment inside it. How the attack works, in plain English: 🔴 Step 1: The attacker sends a deliberately wrong login. cPanel still creates a temporary "you tried to log in" record on disk and gives the attacker a cookie tied to it. 🔴 Step 2: The attacker tweaks the cookie to disable cPanel's password encryption. Normally cPanel encrypts the password field on disk. With one small change to the cookie, cPanel just stores it as plain text instead. 🔴 Step 3: The attacker sends a fake login attempt where the password field secretly contains hidden line breaks. cPanel does not strip these line breaks out, so they get written straight to the session file. Each line break creates a brand new fake record. The attacker uses this to inject lines that say "this user is root" and "this user already authenticated successfully." 🔴 Step 4: The attacker visits one more random page on the site to nudge cPanel into re-reading the file. cPanel then promotes the injected fake lines into its main session memory. 🔴 Step 5: On the next request, cPanel sees a flag that says "this user already passed the password check." cPanel trusts that flag, skips checking the actual password, and lets the attacker in as root. From start to finish, the attack takes a handful of HTTP requests. If you run cPanel or WHM, the patched versions are: 🔴 cPanel/WHM 110.0.x → 11.110.0.97 🔴 cPanel/WHM 118.0.x → 11.118.0.63 🔴 cPanel/WHM 126.0.x → 11.126.0.54 🔴 cPanel/WHM 132.0.x → 11.132.0.29 🔴 cPanel/WHM 134.0.x → 11.134.0.20 🔴 cPanel/WHM 136.0.x → 11.136.0.5 If your version is older than these, assume someone has already broken in and act accordingly. Patch right now, then rotate every password and key the server touched: root passwords, API tokens, SSL private keys, SSH keys, mail passwords, and database passwords.

QAM
0
0
0
3
Sen. Bernie Sanders
Sen. Bernie Sanders@SenSanders·
Will AI become smarter than humans? If so, is humanity in danger? I went to Silicon Valley to ask some of the leading AI experts that question. Here’s what they had to say:
English
609
490
3.2K
1.3M
Muhannad from Gaza
Muhannad from Gaza@mohaneed_qsass·
Please save my daughter Basma from this illness. She suffers from a painful skin disease, and her condition worsens daily. We urgently need to raise $500 for tests and immediate treatment. "Charity never diminishes wealth," 🙏💔🥹Please leave a period 🙏chuffed.org/project/172997…
Muhannad from Gaza tweet media
English
51
176
210
7.1K