24h | 7d | 30d

Overview

  • Google
  • Chrome

13 Feb 2026
Published
14 Feb 2026
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 29 Posts
  • 5 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

RT @TheHackersNews
🚨 Google patched Chrome zero-day CVE-2026-2441, a CVSS 8.8 bug already exploited in attacks.

The CSS use-after-free flaw allows sandboxed remote code execution via malicious pages.

🔗 Read → thehackernews.com/2026/02/new-

First active Chrome zero-day fixed this year. Update now.

  • 1
  • 1
  • 0
  • 11h ago
Profile picture fallback

Recent reports confirm Google issued an urgent patch for an actively exploited Chrome zero-day vulnerability (CVE-2026-2441). Geopolitically, the Munich Security Conference 2026 highlighted cyber threats as a leading risk for G7 nations. In technology news, India is currently hosting the AI Impact Summit 2026, convening global leaders to discuss the future of AI.

#AnonNews_irc #Cybersecurity #News

  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback

Chrome 0-day (CVE-2026-2441) actively exploited.

Use After Free in CSS → RCE via malicious webpage.
Patch immediately:
Win/macOS → 145.0.7632.75/.76
Linux → 144.0.7559.75

Details:
technadu.com/high-severity-chr

How are you enforcing browser patching?

  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback

⚠️ @Vivaldi :vivaldi_red: propose depuis trois jours une mise à jour pour sa version #Desktop :windows: :apple_inc: :linux: corrigeant une faille critique de #Chomium : CVE-2026-2441

Vérifiez (vivaldi://about) que vous êtes bien en version 7.8.3925.66, sinon mettez à jour manuellement !

vivaldi.com/blog/desktop/minor

  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback

Google has released security updates for its Chrome browser to address a security flaw that it said has been exploited in the wild. The high-severity vulnerability has been described as a use-after-free bug in CSS.

thehackernews.com/2026/02/new-

  • 0
  • 0
  • 0
  • 6h ago
Profile picture fallback
  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback

Recent intelligence (Feb 15-16, 2026): Google patched an actively exploited Chrome zero-day (CVE-2026-2441), and a critical FileZen flaw (CVE-2026-25108) also sees in-the-wild exploitation. Microsoft unveiled an AI Security Dashboard for enterprises. Geopolitically, China's Russian oil imports surged 21%, and Indonesia considers deploying 8,000 troops to Gaza. A Trusted Tech Alliance formed to secure digital infrastructure. AI ethics concerns continue to be prominent.

#Cybersecurity #TechNews #Geopolitics

  • 0
  • 0
  • 0
  • 4h ago

Bluesky

Profile picture fallback
New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Released reconbee.com/new-chrome-z... #chrome #zeroday #CyberSecurity #CyberSecurityAwareness #cyberattack #zeroday #zerodayattack #googlechrome
  • 0
  • 1
  • 0
  • 8h ago
Profile picture fallback
Google fixes actively exploited Chrome zero-day CVE-2026-2441, a high-severity CSS use-after-free flaw enabling sandboxed remote code execution.
  • 0
  • 1
  • 0
  • 8h ago
Profile picture fallback
Google、Chrome へ緊急アップデート、CSSのUse-after-freeの脆弱性を修正(CVE-2026-2441)既に悪用確認 rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
Google patched an actively exploited high-severity CSS use-after-free zero-day (CVE-2026-2441) in Chrome and advises updating to the latest versions.
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
Google has released security updates for its Chrome browser to address a security flaw that it said has been exploited in the wild. https://thehackernews.com/2026/02/new-chrome-zero-day-cve-2026-2441-under.html
  • 0
  • 0
  • 1
  • 13h ago
Profile picture fallback
New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Released #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
An actively exploited high-severity use-after-free vulnerability in Chrome's CSS component (CVE-2026-2441) has been patched in emergency updates for Windows, Mac, and Linux.
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
Google issued an emergency Chrome patch for an actively exploited zero-day vulnerability, tracked as CVE-2026-2441. The high-severity flaw is a […]
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
Important security update: Opera's browsers have received a security fix for Chromium's latest 0-day: CVE-2026-2441 Update now: Opera One: 127.0.5778.64 Opera GX: 127.0.5778.67 Opera Air: 127.0.5778.66 Opera Neon: 127.0.5778.65 Opera for Android: 95.1 blogs.opera.com/security/202...
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
Google patches Chrome vulnerability with in-the-wild exploit (CVE-2026-2441) 📖 Read more: www.helpnetsecurity.com/2026/02/16/g... #cybersecurity #cybersecuritynews #Chrome #vulnerability
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
Full report: www.technadu.com/high-severit... Are you relying on automatic updates, or do you enforce centralized browser patching policies? Comment your approach below. #CyberSecurity #Chrome #ZeroDay #CVE20262441 #VulnerabilityManagement
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
Active Chrome 0-day (CVE-2026-2441). Use After Free in CSS → Remote Code Execution just by visiting a malicious page. Patch to: 145.0.7632.75/.76 (Win/macOS) 144.0.7559.75 (Linux) Have you updated your fleet? #CyberSecurity #ZeroDay\
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
⚠️ Google Chrome - CVE-2026-2441 : la première faille zero-day de 2026 a été patchée ! 👇 Notre article à ce sujet - www.it-connect.fr/google-chrom... #Google #Chrome #infosec #cybersecurite
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
A use-after-free zero-day in Chrome's CSS (CVE-2026-2441) enables remote arbitrary code execution; Google released emergency updates for Windows, Mac, and Linux.
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
VulnWatch Monday: CVE-2026-2441 🔓 Google has released a security update to patch a newly discovered zero-day in Chrome. The tech giant also confirmed that it “is aware that an exploit for CVE-2026-2441 exists in the wild.” www.infosecurity-magazine.com/news/google-...
  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback
The Hacker News 16 Feb. includes: "New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Released" thehackernews.com #cybersec #natsec
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
Chrome zero-day (CVE-2026-2441) is being actively exploited. All it takes is just visiting a malicious site that could lead to code execution. No downloads needed. Update Chrome now and verify auto-updates are working. thehackernews.com/2026/02/new-... #CyberSecurity #ZeroDay #PatchNow
  • 0
  • 0
  • 1
  • 2h ago
Profile picture fallback
The high-severity vulnerability, tracked as CVE-2026-2441 (CVSS score: 8.8), has been described as a use-after-free bug in CSS. Security researcher Shaheen Fazim has been credited with discovering and reporting the shortcoming on February 11, 2026. thehackernews.com/2026/02/ne...
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
📢 CVE-2026-2441 : faille RCE dans Google Chrome corrigée en urgence 📝 Selon The Cyber Express, une **vulnérabilité critique (CVE-2026-2441)** affectant **Google Chrom… https://cyberveille.ch/posts/2026-02-16-cve-2026-2441-faille-rce-dans-google-chrome-corrigee-en-urgence/ #CVE_2026_2441 #Cyberveille
  • 0
  • 0
  • 0
  • Last hour

Overview

  • BeyondTrust
  • Remote Support(RS) & Privileged Remote Access(PRA)

06 Feb 2026
Published
14 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.9)
EPSS
61.03%

Description

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Statistics

  • 7 Posts

Last activity: 3 hours ago

Fediverse

Profile picture fallback

Recent geopolitical discussions at the Munich Security Conference addressed EU strategic autonomy and India's commitment to cease Russian oil purchases. In technology, Microsoft released a Windows 11 update (KB5077181) fixing 58 critical flaws. The Pentagon is also reportedly reconsidering its AI partnership with Anthropic over military use restrictions. Cybersecurity concerns escalated as Gartner highlighted AI agents and quantum threats for 2026, and CISA warned of active exploitation of a BeyondTrust RCE vulnerability (CVE-2026-1731).

#AnonNews_irc #Cybersecurity #News

  • 0
  • 0
  • 1
  • 23h ago
Profile picture fallback

Headline: 🚨 FINAL ALERT: The BeyondTrust Perimeter has a 'Logic Failure' — Action Required Today.

The window for discussion is closed. Today, February 16, 2026, is the federal deadline for CISA’s Binding Operational Directive 22-01 regarding CVE-2026-1731.

thecybermind.co/2026/02/16/urg

  • 0
  • 0
  • 0
  • 6h ago

Bluesky

Profile picture fallback
ハッカーが新たに修正されたBeyondTrustのRCE脆弱性(CVE-2026-1731)を調査し、悪用 Hackers probe, exploit newly patched BeyondTrust RCE flaw (CVE-2026-1731) #HelpNetSecurity (Feb 13) www.helpnetsecurity.com/2026/02/13/b...
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
CISAが既知の脆弱性1件をカタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (Feb 13) CVE-2026-1731 BeyondTrust リモートサポート (RS) および特権リモートアクセス (PRA) OS コマンドインジェクションの脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
The latest update for #CyCognito includes "What is CVE-2026-1731?" and "Moving From Activity to Impact: How CTEM Refocuses Security KPIs". #cybersecurity #AttackSurfaceManagement #EASM https://opsmtrs.com/44Srq0X
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
📢 Faille critique CVE-2026-1731 dans BeyondTrust exploitée pour prendre le contrôle d’Active Directory 📝 GBHackers Security rapporte… https://cyberveille.ch/posts/2026-02-16-faille-critique-cve-2026-1731-dans-beyondtrust-exploitee-pour-prendre-le-controle-dactive-directory/ #BeyondTrust #Cyberveille
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • OpenClaw
  • OpenClaw

01 Feb 2026
Published
03 Feb 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.04%

KEV

Description

OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.

Statistics

  • 3 Posts

Last activity: 12 hours ago

Bluesky

Profile picture fallback
The OpenClaw Nightmare: Why Giving AI Agents Root Access Is the 2026 Security Disaster We Deserved + Video Introduction The lines between human workflows and autonomous machine execution have officially blurred into a security horror show. Late January 2026 saw the disclosure of CVE-2026-25253, a…
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
Architectural Isolation Tradeoffs in the OpenClaw Ecosystem After CVE-2026-25253
  • 0
  • 0
  • 1
  • 12h ago

Overview

  • Pending

25 Jun 2023
Published
05 Dec 2024
Updated

CVSS
Pending
EPSS
6.43%

KEV

Description

Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix).

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 4 hours ago

Fediverse

Profile picture fallback

@Archie1
The vulnerability found on my machine was the one with the triple 6's (666 = number of the beast):

CVE-2023-36664

Those are good links you shared. This exploit looks like a serious threat to so many machines, and I just learned about it yesterday.

  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback

@Earl

Are you referring to venerability CVE-2024-29510 that was patched in Ghost script version 10.03.1?

Or are you referring to CVE-2023-36664 that was found in Ghost Script version 10.01.2?

Or something else entirely?

tuxcare.com/blog/ghostscript-v
kroll.com/en/publications/cybe

  • 0
  • 1
  • 0
  • 15h ago

Overview

  • Soliton Systems K.K.
  • FileZen

13 Feb 2026
Published
13 Feb 2026
Updated

CVSS v3.0
HIGH (8.8)
EPSS
0.25%

KEV

Description

FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.

Statistics

  • 2 Posts

Last activity: 4 hours ago

Fediverse

Profile picture fallback

Recent intelligence (Feb 15-16, 2026): Google patched an actively exploited Chrome zero-day (CVE-2026-2441), and a critical FileZen flaw (CVE-2026-25108) also sees in-the-wild exploitation. Microsoft unveiled an AI Security Dashboard for enterprises. Geopolitically, China's Russian oil imports surged 21%, and Indonesia considers deploying 8,000 troops to Gaza. A Trusted Tech Alliance formed to secure digital infrastructure. AI ethics concerns continue to be prominent.

#Cybersecurity #TechNews #Geopolitics

  • 0
  • 0
  • 0
  • 4h ago

Bluesky

Profile picture fallback
FileZenのログオン後画面にコマンドインジェクション 脆弱性、被害報告(CVE-2026-25108、JVN#84622767) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Apple
  • iPadOS

30 Apr 2025
Published
30 Apr 2025
Updated

CVSS
Pending
EPSS
0.05%

KEV

Description

An app could impersonate system notifications. Sensitive notifications now require restricted entitlements. This issue is fixed in iOS 18.3 and iPadOS 18.3, iPadOS 17.7.3. An app may be able to cause a denial-of-service.

Statistics

  • 1 Post
  • 31 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture fallback

Apple has made it impossible for third-party apps to suppress the system volume/brightness HUD in macOS 26.3 via a simple notify_post, which is precisely what I was doing in AirBuddy. To do that, they used a new security feature that was introduced because of CVE-2025-24091 😅

  • 2
  • 29
  • 0
  • 4h ago

Overview

  • Apple
  • macOS

11 Feb 2026
Published
13 Feb 2026
Updated

CVSS
Pending
EPSS
0.13%

Description

A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 and CVE-2025-43529 were also issued in response to this report.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture fallback

#Apple Patches Decade-Old #IOS #ZeroDay , Possibly #Exploited By Commercial #Spyware

This week Apple patched iOS and #macOS against what it called "an extremely sophisticated attack against specific targeted individuals." #Security Week reports that the bugs "could be exploited for information exposure, denial-of-service ( #DoS ), arbitrary file write, privilege escalation, network traffic interception, sandbox escape, and code execution."
#CVE-2026-20700

apple.slashdot.org/story/26/02

  • 1
  • 1
  • 0
  • 15h ago

Overview

  • Lodash
  • Lodash
  • lodash

21 Jan 2026
Published
21 Jan 2026
Updated

CVSS v4.0
MEDIUM (6.9)
EPSS
0.06%

KEV

Description

Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes. The issue permits deletion of properties but does not allow overwriting their original behavior. This issue is patched on 4.17.23

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 7 hours ago

Bluesky

Profile picture fallback
Critical Patch Alert for #SUSE Linux Enterprise Server 16.0 The SUSE security team has released an urgent update for cockpit-packages to fix CVE-2025-13465, a prototype pollution flaw in the _.unset and _.omit functions. Read more: 👉 tinyurl.com/3d8jna9k #Security
  • 0
  • 1
  • 0
  • 7h ago
Profile picture fallback
Deep-dive: #SUSE security update for Cockpit (CVE-2025-13465) is out. 🔒 Read more: 👉 tinyurl.com/mtuszecr #Security
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • SolarWinds
  • Web Help Desk

28 Jan 2026
Published
04 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
79.32%

Description

SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

Statistics

  • 1 Post

Last activity: 7 hours ago

Bluesky

Profile picture fallback
【CVE-2025-40551】:Solarwinds Web Help Desk又一處反序列化漏洞
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Flos Freeware
  • Notepad2

16 Feb 2026
Published
16 Feb 2026
Updated

CVSS v4.0
HIGH (7.3)
EPSS
0.01%

KEV

Description

A security flaw has been discovered in Flos Freeware Notepad2 4.2.22/4.2.23/4.2.24/4.2.25. Affected is an unknown function in the library Msimg32.dll. Performing a manipulation results in uncontrolled search path. Attacking locally is a requirement. The attack's complexity is rated as high. The exploitability is told to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post

Last activity: 11 hours ago

Fediverse

Profile picture fallback

🚩 CVE-2026-2538: High-severity vuln in Notepad2 (v4.2.22 – 4.2.25). Uncontrolled search path in Msimg32.dll lets local users execute code or escalate privileges. No patch yet — restrict local access & monitor endpoints. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 11h ago
Showing 1 to 10 of 34 CVEs