Former member representing Jos South/Jos East Federal Constituency, Hon. Dachung Musa Bagos, has received the All Progressives Congress (APC) Nomination and Declaration of Interest Forms from a coalition of supporters ahead of the race for the House of Representatives seat.
The forms were presented by the Bagos Support Group, a broad-based coalition comprising youths, women, and elders from across Jos South and Jos East Federal Constituencies, in a show of confidence in his leadership and political vision.
Presenting the forms, the leader of the group, Hon. Emmanuel Dung, popularly known as Gibok, said the purchase was made possible through contributions from loyal supporters and stakeholders who believe in Bagos’ capacity to deliver effective representation. He described the gesture as a clear demonstration of the people’s trust and endorsement of Bagos as their preferred candidate.
According to him, the overwhelming support reflects the grassroots’ desire to see the former lawmaker return to the National Assembly to continue his developmental strides and quality representation.
Responding, Hon. Bagos expressed deep appreciation for the support and sacrifices made by his supporters. He urged members of Team Bagos to remain peaceful, focused, and disciplined throughout the political process, warning against inflammatory statements or actions that could create unnecessary tensions.
He also called on his supporters to continue embracing the ideals of peace, unity, and inclusive development as championed by Plateau State Governor, Barr. Caleb Manasseh Mutfwang, while sustaining their support for the administration.
The event also featured the presentation of campaign materials by various support groups, further underscoring the growing momentum behind Bagos’ aspiration and the widespread grassroots backing for his candidacy.
BY NKECHI NAECHE-ESEZOBOR—Sovereign Trust Insurance Plc has completed the structuring phase of its planned N5 billion Rights Issue, marking a significant step in its recapitalisation programme in line with the Nigerian Insurance Industry Recapitalisation Act (NIIRA).
The company disclosed this at a signing ceremony involving all transaction parties held at its corporate head office in Victoria Island, Lagos. The event signalled the conclusion of all internal processes and professional engagements required for the Rights Issue.
With the structuring phase completed, shareholders of Sovereign Trust Insurance Plc will now have the opportunity to subscribe to 2,510,848,144 ordinary shares of 50 kobo each at N2.00 per share, on the basis of three new ordinary shares for every existing holding.
The management urged shareholders to take full advantage of the offer, noting that the Rights Issue presents an opportunity to increase their stake in the company and benefit from its projected growth.
According to the Managing Director/Chief Executive Officer, Lucas Durojaiye, the company has set an ambitious growth agenda aimed at positioning itself among the top five insurance firms in Nigeria.
He noted that a strong capital base remains critical to achieving this objective, adding that full participation in the Rights Issue would strengthen the company’s capacity for expansion and long-term value creation.
“In achieving this aspiration, we have identified that a very robust capital base is critical to the success of the set agenda. We therefore call on our shareholders to fully exercise their rights and subscribe to the Rights Issue,” he said.
Durojaiye added that Sovereign Trust Insurance Plc is positioning itself to become one of the most preferred insurance companies in Nigeria, both as a service provider, an investment choice, and an employer of choice.
The Rights Issue forms part of broader efforts by the insurance sector to strengthen capitalisation, enhance competitiveness, and align with regulatory reforms under NIIRA.
Security researchers are sounding the alarm on a newly discovered vulnerability in the widely used web server management software cPanel and WebHost Manager (WHM).
The bug allows hackers to hijack and take full control of the servers running the affected software, which is thought to be used by tens of millions of website owners around the world.
Many commercial web hosting companies have patched their customers’ systems already. But the cPanel maker urged customers to ensure that their systems are patched as the bug affects all supported versions of the software.
cPanel and WHM are two software suites used for managing web servers that host websites, manage emails, and handle important configurations and databases needed to maintain an internet domain. The two suites have deep-access to the servers that they manage, allowing a malicious hacker potentially unrestricted access to data managed by the affected software.
The bug, officially tracked as CVE-2026-41940, allows malicious hackers to remotely bypass its login screen to gain full access to the software’s administration panel.
Given the ubiquity of the cPanel and WHM software across the web hosting industry, hackers could compromise potentially large numbers of websites that haven’t patched the bug.
Canada’s national cybersecurity agency said in an advisory that the bug could be exploited to compromise websites on shared hosting servers, such as large web hosting companies.
The agency said that “exploitation is highly probable” and that immediate action from cPanel customers, or their web hosts, is necessary to prevent malicious access.
Web hosting giant Namecheap, which uses cPanel to allow its customers to manage their web servers, said the company blocked access to customers’ cPanel panels after learning of the flaw to prevent exploitation, and to give it time to patch its customers’ systems.
Hostgator also said it patched its systems and is considering the bug a “critical authentication-bypass exploit.”
One web hosting company says it found evidence that hackers have been abusing the vulnerability for months before the attempts were discovered.
KnownHost CEO Daniel Pearson said in a post on Reddit that his company has seen attempts to exploit the vulnerability as far back as February 23. The company said it also briefly began blocking access to customer systems before applying patches.
According to Pearson, around 30 servers at KnownHost showed signs of unauthorized attempted access out of thousands of computers on its network. Pearson likened the efforts to attempts, and has not seen signs of active compromise. cPanel also said it rolled out a security fix for WP Squared, a similar tool for managing WordPress websites.
When you purchase through links in our articles, we may earn a small commission. This doesn’t affect our editorial independence.