Overview
Description
Statistics
- 8 Posts
Fediverse
Why CVSS Scores Don’t Always Reflect an Exploit’s Actual Severity
Today we're covering Operation Neusploit, the advanced cyberespionage campaign identified by Zscaler ThreatLabz attributed with confidence to the Russia-linked APT28 (A.K.A. Fancy Bear) threat group, we're sharing this perspective on its 7.8 score. Neusploit weaponizes CVE-2026-21509, a Microsoft Office zero-day security bypass vulnerablity, to target government and executive organizations in Ukraine,…
https://itnerd.blog/2026/02/04/why-cvss-scores-dont-always-reflect-an-exploits-actual-severity/
Bluesky
Overview
Description
Statistics
- 7 Posts
- 3 Interactions
Fediverse
CISA has added CVE-2025-40551, a critical SolarWinds Web Help Desk deserialization vulnerability, to the KEV catalog after confirming active exploitation.
The flaw enables unauthenticated remote code execution and has already been patched, though exploitation details remain undisclosed. Additional KEV inclusions span Sangoma FreePBX and GitLab, reflecting continued abuse of both enterprise and open-source platforms.
This reinforces the importance of KEV-driven prioritization and continuous monitoring beyond initial disclosure.
Source: https://thehackernews.com/2026/02/cisa-adds-actively-exploited-solarwinds.html
Community insight welcome.
Follow TechNadu for ongoing vulnerability and threat intelligence updates.
#Infosec #KEV #CISA #VulnerabilityResearch #SolarWinds #ThreatLandscape #CyberDefense
‼️ CISA has added 4 vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2025-40551: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
CVE-2019-19006: Sangoma FreePBX Improper Authentication Vulnerability
CVE-2025-64328: Sangoma FreePBX OS Command Injection Vulnerability
CVE-2021-39935: GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
Bluesky
Overview
Description
Statistics
- 3 Posts
- 4 Interactions
Fediverse
🚨 Active exploitation confirmed: CVE-2026-24061.
This isn't just theoretical, it's a massive exposure. With nearly 800,000 Telnet instances exposed globally across legacy IoT and outdated servers, the risk of a root-level compromise is real and immediate.
We have updated Pentest-Tools.com to help you validate your exposure:
📡 Network Scanner - detects exposed Telnet services across your internal and external perimeters, identifying potentially vulnerable GNU Inetutils daemons.
🎯 Sniper Auto-Exploiter - safely executes a proof-of-concept to confirm if the authentication bypass is actually exploitable on your systems, providing the evidence needed to prioritize an immediate fix.
⚠️ Crucial detail: This critical vulnerability exists because telnetd fails to sanitize the USER environment variable. An attacker can simply supply -f root to bypass the login prompt entirely and gain instant, unauthenticated root shell access.
Attacks are happening in real-time. Validate your risk before it becomes a root-level compromise.
#offensivesecurity #ethicalhacking #infosec #cybersecurity
Check out more details about this critical vulnerability: https://pentest-tools.com/vulnerabilities-exploits/telnet-inetutils-authentication-bypass_28759
Detect with Network Scanner: https://pentest-tools.com/network-vulnerability-scanning/network-security-scanner-online
Validate with Sniper Auto-Exploiter: https://pentest-tools.com/exploit-helpers/sniper
Whatever your system is you need to patch in the fix for this CVE:
https://www.cve.org/CVERecord?id=CVE-2026-24061
The attack requires no credentials, no prior system access, and no user interaction.
Geez.
Bluesky
Overview
Description
Statistics
- 4 Posts
Bluesky
Overview
Description
Statistics
- 3 Posts
- 11 Interactions
Fediverse
Two IPs now generate 56% of all CVE-2025-55182 exploitation traffic.
One deploys cryptominers. The other opens reverse shells.
We dug into the infrastructure. What we found goes back to 2020.
https://www.greynoise.io/blog/react2shell-exploitation-consolidates
Overview
- Microsoft
- Office Online Server
Description
Statistics
- 2 Posts
- 2 Interactions
Fediverse
https://blog.0patch.com/2026/02/micropatches-released-for-microsoft.html
Overview
- @react-native-community/cli-server-api
Description
Statistics
- 3 Posts
- 1 Interaction
Fediverse
#ReactNative: Critical vulnerability in Metro server for #React Native CVE-2025-11953 allows unauthenticated attackers to execute arbitrary OS commands via a POST request is actively exploited - patch now!
#Metro4Shell
#SoftwareSupplyChainSecurity
👇
https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-react-native-metro-bug-to-breach-dev-systems/
https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-react-native-metro-bug-to-breach-dev-systems/
Overview
Description
Statistics
- 1 Post
- 10 Interactions
Fediverse
Only quickly popping on here from an otherwise very nice Fediverse vacation, because NCSC-NL has just put out an “assume-breach” warning. That’s… kinda big.
#Ivanti #CVE20261281 #EPMM #MobileIron #NCSC_NL #Cybersecurity #infosec #IOC #NCSC
Overview
- OpenClaw
- OpenClaw
Description
Statistics
- 2 Posts
Bluesky
Overview
Description
Statistics
- 2 Posts
Fediverse
Bitte schnell die betroffenen Systeme aktualisieren und sich einen neuen Hersteller des Vertrauens suchen... z.B. #CheckPoint 🫳 🎤
#Fortinet #FortiCloud #FortiOS #FortiManager #FortiWeb #FortiProxy #FortiAnalyzer #Sicherheitsluecke #EUVD_2026_4712 #CVE_2026_24858