24h | 7d | 30d

Overview

  • Apple
  • macOS

11 Feb 2026
Published
13 Feb 2026
Updated

CVSS
Pending
EPSS
0.21%

Description

A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 and CVE-2025-43529 were also issued in response to this report.

Statistics

  • 11 Posts
  • 5 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

Update your iPhones to iOS 26.3, CVE-2026-20700 is pretty bad!

go.theregister.com/feed/www.th

  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback

Here's a summary of recent global, technology, and cybersecurity news from the last 24 hours:

Globally, Canada mourned 10 lives lost in a mass shooting in British Columbia (February 12).

In technology, Samsung began mass production of HBM4 with ultimate performance for AI computing (February 12). Waymo also launched fully autonomous operations with its 6th-generation Driver (February 12).

For cybersecurity, Google reported state-backed hackers are using Gemini AI for reconnaissance and attack support (February 12). Apple patched an actively exploited zero-day vulnerability (CVE-2026-20700) affecting iOS, macOS, and other devices (February 12). Additionally, Palo Alto Networks reportedly chose not to publicly link a global cyberespionage campaign to China over fears of retaliation (February 13).

#News #Anonymous #AnonNews_irc

  • 0
  • 0
  • 0
  • 6h ago
Profile picture fallback

Global cybersecurity remains critical: Threat actors are actively exploiting Google's Gemini AI for varied attack stages, from reconnaissance to phishing. Apple has patched a critical zero-day vulnerability (CVE-2026-20700) exploited in sophisticated attacks. CISA updated its KEV Catalog with four new vulnerabilities, urging immediate remediation. Furthermore, the EU launched a new ICT Supply Chain Security Toolbox to enhance risk mitigation. (Feb 12-13, 2026)

#Cybersecurity #AnonNews_irc #News

  • 0
  • 0
  • 0
  • Last hour
Profile picture fallback

‼️ CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability: Notepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an attacker-controlled installer. This could lead to arbitrary code execution with the privileges of the user.

CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability: Apple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code.

CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability: Microsoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database.

  • 2
  • 2
  • 0
  • 19h ago

Bluesky

Profile picture fallback
Apple、標的型攻撃で悪用されるゼロデイ脆弱性(CVE-2026-20700)を修正 Apple fixes zero-day flaw exploited in targeted attacks (CVE-2026-20700) #HelpNetSecurity (Feb 12) www.helpnetsecurity.com/2026/02/12/a...
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
Apple、iOS 26.3/iPadOS 26.3で複数の脆弱性を修正(CVE-2026-20700)、高度に標的化されたサイバー攻撃での悪用の可能性 rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
🚨 Apple corrige sa 1ère faille Zero-Day de 2026 ! Une vulnérabilité (CVE-2026-20700) a été exploitée dans des attaques "extrêmement sophistiquées". Le récap par ici 👇 - www.it-connect.fr/cve-2026-207... #Apple #infosec #zeroday #cybersecurite
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
ゼロデイ脆弱性「CVE-2026-20700」はmacOS / tvOS / watchOS / visionOSにも影響 - 窓の杜 https://forest.watch.impress.co.jp/docs/news/2085724.html
  • 0
  • 0
  • 0
  • 6h ago
Profile picture fallback
iOS 26.3 chiude una falla presente dal 2007 e sfruttata in attacchi zero-click Apple corregge CVE-2026-20700, una falla nel linker dyld presen... https://www.ilsoftware.it/ios-26-3-chiude-una-falla-presente-dal-2007-e-sfruttata-in-attacchi-zero-click/
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
CVE-2024-43468 Microsoft Configuration Manager SQL Injection Vulnerability CVE-2025-15556 Notepad++ Download of Code Without Integrity Check Vulnerability CVE-2025-40536 SolarWinds Web Help Desk Security Control Bypass Vulnerability CVE-2026-20700 Apple Multiple Buffer Overflow Vulnerability
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • BeyondTrust
  • Remote Support(RS) & Privileged Remote Access(PRA)

06 Feb 2026
Published
13 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.9)
EPSS
4.22%

KEV

Description

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Statistics

  • 9 Posts
  • 23 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

It took less than a day. A PoC for BeyondTrust CVE-2026-1731 hit GitHub, and GreyNoise immediately started seeing reconnaissance from multi-exploit actors hiding behind VPNs + custom tooling. See what our data reveals about who’s mapping targets + how.

🔗 greynoise.io/blog/reconnaissan

  • 6
  • 8
  • 1
  • 20h ago
Profile picture fallback

Had a case this week of a fairly secure deployment of BeyondTrust, but vulnerable to CVE-2026-1731. With basically zero egress, I implemented a timing oracle POC instead. Takes about 20 minutes to get the ls command output in this demo, but hey, it works! :D

  • 3
  • 5
  • 1
  • 5h ago
Profile picture fallback

Threat actors are actively exploiting CVE-2026-1731 (9.9) in BeyondTrust Remote Support & PRA.

Attackers extract portal data, then open WebSocket channels to trigger unauthenticated RCE.

🔗 Read → thehackernews.com/2026/02/rese

Patches are out, but exploitation started fast.

  • 0
  • 1
  • 0
  • 4h ago
Profile picture fallback

Here's a summary of the latest critical news in technology and cybersecurity:

State-backed hackers are reportedly leveraging Google's Gemini AI for reconnaissance and attack support. A critical BeyondTrust Remote Code Execution vulnerability (CVE-2026-1731) is being actively exploited in the wild. CISA has added four new exploited vulnerabilities to its Known Exploited Vulnerabilities Catalog. In technology, Samsung commenced shipping of industry-first HBM4 memory for AI computing, and HKUST announced a major advance in calcium-ion battery technology.

#AnonNews_irc #Cybersecurity #Anonymous #News

  • 0
  • 0
  • 0
  • 2h ago

Bluesky

Profile picture fallback
Critical BeyondTrust RCE CVE-2026-1731 is being actively exploited; apply provided RS and PRA patches immediately to prevent unauthorized access and data exfiltration.
  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback
Hackers probe, exploit newly patched BeyondTrust RCE flaw (CVE-2026-1731) 📖 Read more: www.helpnetsecurity.com/2026/02/13/b... #cybersecurity #cybersecuritynews #PoC #remoteaccess @beyondtrust1.bsky.social @rapid7.com @labs.watchtowr.com.web.brid.gy @greynoise.io
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
Threat actors began exploiting CVE-2026-1731 in BeyondTrust Remote Support and Privileged Remote Access soon after a public PoC, targeting thousands of exposed instances.
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Microsoft
  • Windows Notepad

10 Feb 2026
Published
12 Feb 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.13%

KEV

Description

Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code locally.

Statistics

  • 6 Posts
  • 1 Interaction

Last activity: 10 hours ago

Fediverse

Profile picture fallback
  • 1
  • 0
  • 0
  • 20h ago

Bluesky

Profile picture fallback
Windows Notepad Markdown feature opens door to RCE (CVE-2026-20841) 📖 Read more: www.helpnetsecurity.com/2026/02/12/w... #cybersecurity #cybersecuritynews #Windows #PoC #socialengineering @microsoft.com
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
Windows のメモ帳の Markdown 機能が RCE の扉を開く (CVE-2026-20841) Windows Notepad Markdown feature opens door to RCE (CVE-2026-20841) #HelpNetSecurity (Feb 12) www.helpnetsecurity.com/2026/02/12/w...
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
https://pc.watch.impress.co.jp/docs/news/2085270.html Windowsのメモ帳にリモートコード実行の脆弱性「CVE-2026-20841」が判明。 悪意あるマークダウンファイルを開かせ、リンクをクリックさせることでリモートファイルを読み込み実行可能です。 2月10日の月例セキュリティ更新プログラムで修正済みのストアアプリ版メモ帳が対象。
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
【已復現】Microsoft Windows 記事本遠程代碼執行漏洞(CVE-2026-20841)
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
Windows11のメモ帳に脆弱性。しかもリモートコード実行のヤバイやつ。原因はマークダウン | ニッチなPCゲーマーの環境構築Z https://www.nichepcgamer.com/archives/windows11-notepad-vulnerability-cve-2026-20841.html
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • HashiCorp
  • Shared library

12 Feb 2026
Published
12 Feb 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.07%

KEV

Description

The serialize function used to compile MDX in next-mdx-remote is vulnerable to arbitrary code execution due to insufficient sanitization of MDX content. This vulnerability, CVE-2026-0969, is fixed in next-mdx-remote 6.0.0.

Statistics

  • 2 Posts

Last activity: 17 hours ago

Fediverse

Profile picture fallback

Update: We’ve published free Socket Certified Patches for the next-mdx-remote RCE vulnerability (CVE-2026-0969).
No dependency upgrade required, and you don’t have to be a Socket customer to use them.

Details: socket.dev/blog/high-severity-
#NextJS

  • 0
  • 0
  • 0
  • 17h ago

Bluesky

Profile picture fallback
~Socket~ High-severity RCE (CVE-2026-0969) in next-mdx-remote < 6.0.0 allows code execution when rendering untrusted server-side MDX content. - IOCs: CVE-2026-0969 - #CVE20260969 #RCE #ThreatIntel
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • notepad-plus-plus
  • notepad-plus-plus

23 Jun 2025
Published
24 Dec 2025
Updated

CVSS v3.1
HIGH (7.3)
EPSS
0.01%

KEV

Description

Notepad++ is a free and open-source source code editor. In versions 8.8.1 and prior, a privilege escalation vulnerability exists in the Notepad++ v8.8.1 installer that allows unprivileged users to gain SYSTEM-level privileges through insecure executable search paths. An attacker could use social engineering or clickjacking to trick users into downloading both the legitimate installer and a malicious executable to the same directory (typically Downloads folder - which is known as Vulnerable directory). Upon running the installer, the attack executes automatically with SYSTEM privileges. This issue has been fixed and will be released in version 8.8.2.

Statistics

  • 2 Posts

Last activity: 10 hours ago

Fediverse

Profile picture fallback

CVE-2025-49144 is a local privilege escalation in the Notepad++ installer that abuses how regsvr32.exe is called during setup.
We break down:
• what it looks like on real systems
• why Sysmon catches it cleanly
• a high-signal Graylog search + Sigma rule
graylog.org/post/detecting-not

  • 0
  • 0
  • 0
  • 22h ago

Bluesky

Profile picture fallback
The latest update for #Graylog includes "Detecting Notepad++ CVE-2025-49144 Using Sysmon Logs" and "The Human-AI Alliance in #SecurityOperations". #monitoring #logging https://opsmtrs.com/3a4Nn4u
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • goauthentik
  • authentik

12 Feb 2026
Published
12 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.03%

KEV

Description

authentik is an open-source identity provider. From 2021.3.1 to before 2025.8.6, 2025.10.4, and 2025.12.4, when using delegated permissions, a User that has the permission Can view * Property Mapping or Can view Expression Policy is able to execute arbitrary code within the authentik server container through the test endpoint, which is intended to preview how a property mapping/policy works. authentik 2025.8.6, 2025.10.4, and 2025.12.4 fix this issue.

Statistics

  • 2 Posts

Last activity: 1 hour ago

Fediverse

Profile picture fallback

⚠️ CVE-2026-25227 (CRITICAL, CVSS 9.1): Code injection in goauthentik authentik via delegated permissions. Patch to 2025.8.6, 2025.10.4, or 2025.12.4 urgently. Audit permissions & monitor test endpoint usage. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback

🔐 CVE-2026-25227
CVE-2026-25227

📊 CVSS Score: 9.1
⚠️ Severity: Critical
📅 Published: 02/12/2026, 08:16 PM
🏷️ Aliases: CVE-2026-25227
🛡️ CWE: CWE-94
🔗 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H (security-advisories@github.com)
📚 References: github.com/goauthentik/authent github.com/goauthentik/authent

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Palo Alto Networks
  • Cloud NGFW

11 Feb 2026
Published
11 Feb 2026
Updated

CVSS v4.0
MEDIUM (6.6)
EPSS
0.02%

KEV

Description

A denial-of-service (DoS) vulnerability in the Advanced DNS Security (ADNS) feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode. Cloud NGFW and Prisma Access® are not impacted by this vulnerability.

Statistics

  • 2 Posts

Last activity: 13 hours ago

Bluesky

Profile picture fallback
認証されていない攻撃者が Palo Alto ファイアウォールをメンテナンスモードループに陥らせる可能性がある (CVE-2026-0229) Unauthenticated Attacker Can Trap Palo Alto Firewalls in Maintenance Mode Loop (CVE-2026-0229) #DailyCyberSecurity (Feb 12) securityonline.info/crash-loop-p...
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
パロアルトネットワークス、PAN-OSのAdvanced DNS SecurityにDoS脆弱性(CVE-2026-0229) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • pyca
  • cryptography

10 Feb 2026
Published
11 Feb 2026
Updated

CVSS v4.0
HIGH (8.2)
EPSS
0.01%

KEV

Description

cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Prior to 46.0.5, the public_key_from_numbers (or EllipticCurvePublicNumbers.public_key()), EllipticCurvePublicNumbers.public_key(), load_der_public_key() and load_pem_public_key() functions do not verify that the point belongs to the expected prime-order subgroup of the curve. This missing validation allows an attacker to provide a public key point P from a small-order subgroup. This can lead to security issues in various situations, such as the most commonly used signature verification (ECDSA) and shared key negotiation (ECDH). When the victim computes the shared secret as S = [victim_private_key]P via ECDH, this leaks information about victim_private_key mod (small_subgroup_order). For curves with cofactor > 1, this reveals the least significant bits of the private key. When these weak public keys are used in ECDSA , it's easy to forge signatures on the small subgroup. Only SECT curves are impacted by this. This vulnerability is fixed in 46.0.5.

Statistics

  • 2 Posts

Last activity: 15 hours ago

Bluesky

Profile picture fallback
CVE-2026-26007: Python Cryptography Flaw (CVSS 8.2) Leaks Private Keys
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
CVE-2026-26007: Pythonの暗号化の脆弱性 (CVSS 8.2) により秘密鍵が漏洩する CVE-2026-26007: Python Cryptography Flaw (CVSS 8.2) Leaks Private Keys #DailyCyberSecurity (Feb 12) securityonline.info/cve-2026-260...
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • notepad-plus-plus
  • notepad-plus-plus

03 Feb 2026
Published
13 Feb 2026
Updated

CVSS v4.0
HIGH (7.7)
EPSS
11.09%

Description

Notepad++ versions prior to 8.8.9, when using the WinGUp updater, contain an update integrity verification vulnerability where downloaded update metadata and installers are not cryptographically verified. An attacker able to intercept or redirect update traffic can cause the updater to download and execute an attacker-controlled installer, resulting in arbitrary code execution with the privileges of the user.

Statistics

  • 4 Posts
  • 4 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture fallback

CISA has added a critical code execution flaw in Notepad++ to its Known Exploited Vulnerabilities (KEV) catalog.

Notepad++ is a widely used open-source text editor popular among developers and IT teams.

The vulnerability (CVE-2025-15556) allows attackers to intercept or manipulate update traffic, tricking users into installing malicious payloads. The issue has been fixed in version 8.8.9 and all later releases.

  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback

‼️ CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-15556: Notepad++ Download of Code Without Integrity Check Vulnerability: Notepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an attacker-controlled installer. This could lead to arbitrary code execution with the privileges of the user.

CVE-2026-20700: Apple Multiple Buffer Overflow Vulnerability: Apple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code.

CVE-2024-43468: Microsoft Configuration Manager SQL Injection Vulnerability: Microsoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database.

  • 2
  • 2
  • 0
  • 19h ago

Bluesky

Profile picture fallback
~Cisa~ CISA adds four actively exploited vulnerabilities affecting Microsoft, Notepad++, SolarWinds, and Apple to its KEV catalog, requiring remediation. - IOCs: CVE-2024-43468, CVE-2025-15556, CVE-2025-40536 - #CISA #KEV #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
CVE-2024-43468 Microsoft Configuration Manager SQL Injection Vulnerability CVE-2025-15556 Notepad++ Download of Code Without Integrity Check Vulnerability CVE-2025-40536 SolarWinds Web Help Desk Security Control Bypass Vulnerability CVE-2026-20700 Apple Multiple Buffer Overflow Vulnerability
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 2 Posts
  • 3 Interactions

Last activity: 20 hours ago

Fediverse

Profile picture fallback

2 vulnerabilities in HAProxy have been fixed:
CVE-2026-26080 and CVE-2026-26081. DoS affecting QUIC

haproxy.com/blog/cves-2026-qui

  • 2
  • 1
  • 0
  • 23h ago

Bluesky

Profile picture fallback
#Debian DSA-6130-1 is out. HAProxy + QUIC = potential instant crash. Here is exactly what CVE-2026-26081 does and how to fix it without breaking your SLOs. 🧵 Read more: 👉 tinyurl.com/4s6uptr7 #Security
  • 0
  • 0
  • 0
  • 20h ago
Showing 1 to 10 of 47 CVEs