24h | 7d | 30d

Overview

  • BeyondTrust
  • Remote Support(RS) & Privileged Remote Access(PRA)

06 Feb 2026
Published
14 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.9)
EPSS
4.22%

Description

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Statistics

  • 7 Posts

Last activity: 7 hours ago

Fediverse

Profile picture fallback

Here's a summary of the latest critical news in technology and cybersecurity:

State-backed hackers are reportedly leveraging Google's Gemini AI for reconnaissance and attack support. A critical BeyondTrust Remote Code Execution vulnerability (CVE-2026-1731) is being actively exploited in the wild. CISA has added four new exploited vulnerabilities to its Known Exploited Vulnerabilities Catalog. In technology, Samsung commenced shipping of industry-first HBM4 memory for AI computing, and HKUST announced a major advance in calcium-ion battery technology.

#AnonNews_irc #Cybersecurity #Anonymous #News

  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback

Exploitation attempts target CVE-2026-1731, a critical unauthenticated remote code execution flaw in BeyondTrust Remote Support. securityweek.com/beyondtrust-v

  • 0
  • 0
  • 1
  • 20h ago
Profile picture fallback

Threat actors are actively exploiting a critical BeyondTrust vulnerability (CVE-2026-1731) within 24 hours of a proof-of-concept (PoC) exploit being released. This flaw, affecting BeyondTrust Remote Support and Privileged Remote Access, allows for unauthenticated remote code execution and has seen exploitation attempts from multiple IP addresses, some previously involved in other vulnerability exploits.
securityweek.com/beyondtrust-v

  • 0
  • 0
  • 0
  • 20h ago

Bluesky

Profile picture fallback
The latest update for #ArcticWolf includes "Update: Arctic Wolf Observes Threat Campaign Targeting BeyondTrust Remote Support Following CVE-2026-1731 PoC Availability". #cybersecurity #infosec #networks https://opsmtrs.com/2ZFbaTl
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
~Cisa~ CISA warns of active exploitation of a critical OS command injection vulnerability (CVE-2026-1731) in BeyondTrust products. - IOCs: CVE-2026-1731 - #BeyondTrust #CVE20261731 #ThreatIntel
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
Urgent: CVE-2026-1731, a critical BeyondTrust vulnerability (CVSS 9.9) is being actively exploited in the wild. Patch Remote Support (v21.3 - 25.3.1) and Privileged Remote Access (v22.1 - 24.X) NOW. #Cybersecurity #News
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Ivanti
  • Endpoint Manager

10 Feb 2026
Published
10 Feb 2026
Updated

CVSS v3.1
HIGH (8.6)
EPSS
0.18%

KEV

Description

An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthenticated attacker to leak specific stored credential data.

Statistics

  • 2 Posts
  • 63 Interactions

Last activity: 14 hours ago

Fediverse

Profile picture fallback

CVE-2026-1603

I refuse to believe that is a vulnerability over a purposeful backdoor, fuckin' yank products.

  • 15
  • 32
  • 0
  • 20h ago
Profile picture fallback

An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthenticated attacker to leak specific stored credential data.

#cybersecurity #ivanti #vulnerabilitymanagement #vulnerability

Thanks @reverseics for the infographics and Ivanti for the continuous source of discoveries.

db.gcve.eu/vuln/CVE-2026-1603

  • 9
  • 7
  • 0
  • 14h ago

Overview

  • Apple
  • macOS

11 Feb 2026
Published
13 Feb 2026
Updated

CVSS
Pending
EPSS
0.21%

Description

A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 and CVE-2025-43529 were also issued in response to this report.

Statistics

  • 3 Posts

Last activity: 5 hours ago

Fediverse

Profile picture fallback

Global cybersecurity remains critical: Threat actors are actively exploiting Google's Gemini AI for varied attack stages, from reconnaissance to phishing. Apple has patched a critical zero-day vulnerability (CVE-2026-20700) exploited in sophisticated attacks. CISA updated its KEV Catalog with four new vulnerabilities, urging immediate remediation. Furthermore, the EU launched a new ICT Supply Chain Security Toolbox to enhance risk mitigation. (Feb 12-13, 2026)

#Cybersecurity #AnonNews_irc #News

  • 0
  • 0
  • 0
  • 21h ago

Bluesky

Profile picture fallback
ゼロデイ脆弱性「CVE-2026-20700」はmacOS / tvOS / watchOS / visionOSにも影響/Appleがセキュリティ更新を実施 https://forest.watch.impress.co.jp/docs/news/2085724.html
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
https://forest.watch.impress.co.jp/docs/news/2085724.html Appleがセキュリティアップデートを実施しました。 特に「dyld」のゼロデイ脆弱性「CVE-2026-20700」は多くのOSに影響します。 既に対処済みのため、速やかなアップデートを推奨します。
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Google
  • Chrome

13 Feb 2026
Published
14 Feb 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 4 Posts
  • 3 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture fallback

This build has a fix for CVE-2026-2441 (Use after free in CSS), which has a known exploit in the wild.

  • 0
  • 1
  • 1
  • 14h ago
Profile picture fallback

@secbox @vivaldiversiontracker

It might seem strange but this build has a fix for CVE-2026-2441 (Use after free in CSS), which has a known exploit in the wild. 🤷

@Vivaldi

  • 0
  • 1
  • 0
  • 14h ago
Profile picture fallback

Thursday: New Chrome release! It reverts one commit, a "trivial" performance optimization suspected of causing crashes.

chromereleases.googleblog.com/

Friday: New Chrome release! A zero day! "CVE-2026-2441: Use after free in CSS."

chromereleases.googleblog.com/

  • 0
  • 1
  • 0
  • 4h ago

Overview

  • Microsoft
  • Windows Notepad

10 Feb 2026
Published
13 Feb 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.13%

KEV

Description

Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code locally.

Statistics

  • 2 Posts

Last activity: 14 hours ago

Fediverse

Profile picture fallback

Microsoft's #Notepad Got Pawned. The #vulnerability exploit #PoC code is public. Fork it while it's hot: github.com/BTtea/CVE-2026-2084

#cve2026_20841 #cyberSecurity

  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback

Windows Notepad RCE - CVE-2026-20841

A crafted Markdown link could trigger command execution via protocol handler abuse on Windows 11 Notepad.

forum.hashpwn.net/post/10031

  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Fortinet
  • FortiClientEMS

06 Feb 2026
Published
11 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.17%

KEV

Description

An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

Statistics

  • 2 Posts

Last activity: 16 hours ago

Fediverse

Profile picture fallback

🔐 CVE-2026-21643

📊 CVSS: 9.1 · Critical
📅 02/06/2026, 08:24 AM
🛡️ CWE: CWE-89
📦 Affected: Fortinet FortiClientEMS (7.4.4)
📚 fortiguard.fortinet.com/psirt/

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

  • 0
  • 0
  • 0
  • 19h ago

Bluesky

Profile picture fallback
📢 Fortinet corrige une SQLi critique dans FortiClientEMS (CVE-2026-21643) 📝 Selon un avis PSIRT de Fortinet publié le 6 février 2026, une vulnérabilité critiqu… https://cyberveille.ch/posts/2026-02-11-fortinet-corrige-une-sqli-critique-dans-forticlientems-cve-2026-21643/ #CVE_2026_21643 #Cyberveille
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Ivanti
  • Endpoint Manager Mobile

29 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
54.26%

Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Statistics

  • 2 Posts

Last activity: 6 hours ago

Bluesky

Profile picture fallback
📢 Ivanti EPMM : 83 % des exploits proviennent d’une seule IP « bulletproof » absente des IOC publiés 📝 Source : GreyNoise (Threat Signals), … https://cyberveille.ch/posts/2026-02-11-ivanti-epmm-83-des-exploits-proviennent-dune-seule-ip-bulletproof-absente-des-ioc-publies/ #CVE_2026_1281 #Cyberveille
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
The latest update for #Indusface includes "CVE-2026-1281 & CVE-2026-1340: Actively Exploited Pre-Authentication RCE in Ivanti EPMM" and "CVE-2025-11953 – Metro4Shell RCE in #ReactNative Metro Server". #cybersecurity #infosec https://opsmtrs.com/3ySs2VF
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • dani-garcia
  • vaultwarden

11 Feb 2026
Published
12 Feb 2026
Updated

CVSS v3.1
MEDIUM (6.5)
EPSS
0.02%

KEV

Description

vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Prior to 1.35.3, a regular organization member can retrieve all ciphers within an organization, regardless of collection permissions. The endpoint /ciphers/organization-details is accessible to any organization member and internally uses Cipher::find_by_org to retrieve all ciphers. These ciphers are returned with CipherSyncType::Organization without enforcing collection-level access control. This vulnerability is fixed in 1.35.3.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 19 hours ago

Fediverse

Overview

  • Hewlett Packard Enterprise
  • Integrated Lights-out 4 (iLO 4)

15 Feb 2018
Published
17 Sep 2024
Updated

CVSS
Pending
EPSS
94.25%

KEV

Description

A authentication bypass and execution of code vulnerability in HPE Integrated Lights-out 4 (iLO 4) version prior to 2.53 was found.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 18 hours ago

Overview

  • Apache Software Foundation
  • Apache Log4j2

10 Dec 2021
Published
21 Oct 2025
Updated

CVSS
Pending
EPSS
94.36%

Description

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
Log4Shell Exploit Analysis: How to Detect and Mitigate the Critical Log4j Vulnerability + Video Introduction The Log4Shell vulnerability (CVE-2021-44228) in Apache Log4j2 sent shockwaves through the cybersecurity community, allowing unauthenticated remote code execution on millions of servers.…
  • 0
  • 0
  • 0
  • 17h ago
Showing 1 to 10 of 42 CVEs