Overview
Description
Statistics
- 10 Posts
- 2 Interactions
Fediverse
The CISA has updated its Known Exploited Vulnerabilities (KEV) catalog for a BeyondTrust vulnerability (CVE-2026-1731) indicating its exploitation in ransomware attacks. This critical flaw allows for unauthenticated remote code execution and has been observed in attacks targeting various sectors globally, with threat intelligence firms noting its use in reconnaissance, data theft, and malware deployment.
https://www.securityweek.com/beyondtrust-vulnerability-exploited-in-ransomware-attacks/
"CISA: BeyondTrust RCE flaw now exploited in ransomware attacks"
"[...] Cybersecurity and Infrastructure Security Agency (CISA) warns. Hackers are actively exploiting the CVE-2026-1731 vulnerability in the BeyondTrust Remote Support product, the U.S."
Critical CVE-2026-1731 in BeyondTrust RS/PRA is under active exploitation.
Web shells. RATs. PostgreSQL dumps.
Now listed in CISA KEV & tied to ransomware.
Remote support appliances are high-value targets.
Are we giving PAM systems enough monitoring visibility?
Source: https://thehackernews.com/2026/02/beyondtrust-flaw-used-for-web-shells.html
Follow @technadu for independent cybersecurity reporting.
Like and join the discussion below.
#CyberSecurity #Infosec #ZeroDay #Ransomware #PAM #ThreatIntel #SecurityCommunity #CVE20261731
Bluesky
Description
Statistics
- 4 Posts
- 1 Interaction
Fediverse
CSS Cyberattacks
Hackers sneak malicious code into CSS to hide attacks, steal data & evade detection: injection for phishing, keylogging via selectors, clickjacking overlays, hidden malware, even zero-day Chrome flaw (CVE-2026-2441) patched Feb 2026.
Protect: sanitize inputs, strong CSP, keep updated, monitor traffic.
Stay safe
A proof-of-concept exploit has been released for CVE-2026-2441, a critical use-after-free zero-day vulnerability in Google Chrome's Blink CSS engine that is actively being exploited in the wild. Users are urged to update Chrome immediately to the latest versions to patch this vulnerability.
https://cybersecuritynews.com/chrome-0-day-vulnerability-poc/
Bluesky
Overview
- Microsoft
- Windows 10 Version 1507
Description
Statistics
- 4 Posts
- 2 Interactions
Fediverse
https://www.safebreach.com/blog/safebreach_labs_discovers_cve-2025-29969/
(Windows MS-EVEN RPC Remote Code Execution Vulnerability)
Overview
- Microsoft
- Windows Admin Center
Description
Statistics
- 3 Posts
Bluesky
Overview
- Honeywell
- I-HIB2PI-UL 2MP IP
Description
Statistics
- 2 Posts
- 4 Interactions
Fediverse
Why TF does the NVD not include the CVE title, vendor, or other useful information. If you look at the following you have no what's impacted and have to hunt details in the links.
https://nvd.nist.gov/vuln/detail/CVE-2026-1670
The backing CVE data contains all of this:
CRITICAL INTEL: Honeywell CVSS 9.8 (CVE-2026-1670) is here. 🚨 Unauthenticated API exploitation means total compromise. I’m breaking down the Sovereign Sentry strategy using Raspberry Pi & Suricata to harden your network. https://thecybermind.co/2026/02/20/cve-2026-1670-honeywell-exploit/
#exploit
Overview
- hcaptcha
- hCaptcha for WP
- hcaptcha-for-forms-and-more
Description
Statistics
- 3 Posts
Bluesky
Overview
Description
Statistics
- 2 Posts
Bluesky
Overview
- Grandstream
- GXP1610
Description
Statistics
- 2 Posts
Fediverse
Hacking like the 1990s (cvss 9.8) —
A Cold War Style Vulnerability in Modern VoIP
Presented by LowLevelTV –
[Invidious](https://yewtu.be/watch?v=I4brAvpjbrg)
[YouTube](https://youtube.com/watch?v=I4brAvpjbrg)
Writeups:
Douglas McKee
[The Phone is Listening: A Cold War–Style Vulnerability in Modern VoIP](https://www.rapid7.com/blog/post/ve-phone-listening-cold-war-vulnerability-modern-voip/)
Stephen Fewer:
[CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones](https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed/)
Overview
Description
Statistics
- 1 Post
- 4 Interactions
Fediverse
Here's the good read of the day, more interesting part is the exploitation tricks at the end of the post https://soez.github.io/posts/CVE-2022-22265-Samsung-npu-driver/ by @javierprtd
Overview
- librenms
- librenms
Description
Statistics
- 1 Post
- 1 Interaction