24h | 7d | 30d

Overview

  • BeyondTrust
  • Remote Support(RS) & Privileged Remote Access(PRA)

06 Feb 2026
Published
14 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.9)
EPSS
4.22%

Description

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Statistics

  • 13 Posts
  • 13 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

Had a case this week of a fairly secure deployment of BeyondTrust, but vulnerable to CVE-2026-1731. With basically zero egress, I implemented a timing oracle POC instead. Takes about 20 minutes to get the ls command output in this demo, but hey, it works! :D

  • 5
  • 7
  • 1
  • 22h ago
Profile picture fallback

Threat actors are actively exploiting CVE-2026-1731 (9.9) in BeyondTrust Remote Support & PRA.

Attackers extract portal data, then open WebSocket channels to trigger unauthenticated RCE.

🔗 Read → thehackernews.com/2026/02/rese

Patches are out, but exploitation started fast.

  • 0
  • 1
  • 0
  • 21h ago
Profile picture fallback

Here's a summary of the latest critical news in technology and cybersecurity:

State-backed hackers are reportedly leveraging Google's Gemini AI for reconnaissance and attack support. A critical BeyondTrust Remote Code Execution vulnerability (CVE-2026-1731) is being actively exploited in the wild. CISA has added four new exploited vulnerabilities to its Known Exploited Vulnerabilities Catalog. In technology, Samsung commenced shipping of industry-first HBM4 memory for AI computing, and HKUST announced a major advance in calcium-ion battery technology.

#AnonNews_irc #Cybersecurity #Anonymous #News

  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback

Exploitation attempts target CVE-2026-1731, a critical unauthenticated remote code execution flaw in BeyondTrust Remote Support. securityweek.com/beyondtrust-v

  • 0
  • 0
  • 1
  • 16h ago
Profile picture fallback

Threat actors are actively exploiting a critical BeyondTrust vulnerability (CVE-2026-1731) within 24 hours of a proof-of-concept (PoC) exploit being released. This flaw, affecting BeyondTrust Remote Support and Privileged Remote Access, allows for unauthenticated remote code execution and has seen exploitation attempts from multiple IP addresses, some previously involved in other vulnerability exploits.
securityweek.com/beyondtrust-v

  • 0
  • 0
  • 0
  • 16h ago

Bluesky

Profile picture fallback
Critical BeyondTrust RCE CVE-2026-1731 is being actively exploited; apply provided RS and PRA patches immediately to prevent unauthorized access and data exfiltration.
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
Hackers probe, exploit newly patched BeyondTrust RCE flaw (CVE-2026-1731) 📖 Read more: www.helpnetsecurity.com/2026/02/13/b... #cybersecurity #cybersecuritynews #PoC #remoteaccess @beyondtrust1.bsky.social @rapid7.com @labs.watchtowr.com.web.brid.gy @greynoise.io
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
Threat actors began exploiting CVE-2026-1731 in BeyondTrust Remote Support and Privileged Remote Access soon after a public PoC, targeting thousands of exposed instances.
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
The latest update for #ArcticWolf includes "Update: Arctic Wolf Observes Threat Campaign Targeting BeyondTrust Remote Support Following CVE-2026-1731 PoC Availability". #cybersecurity #infosec #networks https://opsmtrs.com/2ZFbaTl
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
~Cisa~ CISA warns of active exploitation of a critical OS command injection vulnerability (CVE-2026-1731) in BeyondTrust products. - IOCs: CVE-2026-1731 - #BeyondTrust #CVE20261731 #ThreatIntel
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
Urgent: CVE-2026-1731, a critical BeyondTrust vulnerability (CVSS 9.9) is being actively exploited in the wild. Patch Remote Support (v21.3 - 25.3.1) and Privileged Remote Access (v22.1 - 24.X) NOW. #Cybersecurity #News
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Apple
  • macOS

11 Feb 2026
Published
13 Feb 2026
Updated

CVSS
Pending
EPSS
0.21%

Description

A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 and CVE-2025-43529 were also issued in response to this report.

Statistics

  • 7 Posts
  • 2 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

Here's a summary of recent global, technology, and cybersecurity news from the last 24 hours:

Globally, Canada mourned 10 lives lost in a mass shooting in British Columbia (February 12).

In technology, Samsung began mass production of HBM4 with ultimate performance for AI computing (February 12). Waymo also launched fully autonomous operations with its 6th-generation Driver (February 12).

For cybersecurity, Google reported state-backed hackers are using Gemini AI for reconnaissance and attack support (February 12). Apple patched an actively exploited zero-day vulnerability (CVE-2026-20700) affecting iOS, macOS, and other devices (February 12). Additionally, Palo Alto Networks reportedly chose not to publicly link a global cyberespionage campaign to China over fears of retaliation (February 13).

#News #Anonymous #AnonNews_irc

  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback

Global cybersecurity remains critical: Threat actors are actively exploiting Google's Gemini AI for varied attack stages, from reconnaissance to phishing. Apple has patched a critical zero-day vulnerability (CVE-2026-20700) exploited in sophisticated attacks. CISA updated its KEV Catalog with four new vulnerabilities, urging immediate remediation. Furthermore, the EU launched a new ICT Supply Chain Security Toolbox to enhance risk mitigation. (Feb 12-13, 2026)

#Cybersecurity #AnonNews_irc #News

  • 0
  • 0
  • 0
  • 17h ago

Bluesky

Profile picture fallback
ゼロデイ脆弱性「CVE-2026-20700」はmacOS / tvOS / watchOS / visionOSにも影響 - 窓の杜 https://forest.watch.impress.co.jp/docs/news/2085724.html
  • 1
  • 0
  • 0
  • 23h ago
Profile picture fallback
iOS 26.3 chiude una falla presente dal 2007 e sfruttata in attacchi zero-click Apple corregge CVE-2026-20700, una falla nel linker dyld presen... https://www.ilsoftware.it/ios-26-3-chiude-una-falla-presente-dal-2007-e-sfruttata-in-attacchi-zero-click/
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
ゼロデイ脆弱性「CVE-2026-20700」はmacOS / tvOS / watchOS / visionOSにも影響/Appleがセキュリティ更新を実施 https://forest.watch.impress.co.jp/docs/news/2085724.html
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
https://forest.watch.impress.co.jp/docs/news/2085724.html Appleがセキュリティアップデートを実施しました。 特に「dyld」のゼロデイ脆弱性「CVE-2026-20700」は多くのOSに影響します。 既に対処済みのため、速やかなアップデートを推奨します。
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Ivanti
  • Endpoint Manager

10 Feb 2026
Published
10 Feb 2026
Updated

CVSS v3.1
HIGH (8.6)
EPSS
0.18%

KEV

Description

An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthenticated attacker to leak specific stored credential data.

Statistics

  • 2 Posts
  • 61 Interactions

Last activity: 10 hours ago

Fediverse

Profile picture fallback

CVE-2026-1603

I refuse to believe that is a vulnerability over a purposeful backdoor, fuckin' yank products.

  • 15
  • 32
  • 0
  • 16h ago
Profile picture fallback

An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthenticated attacker to leak specific stored credential data.

#cybersecurity #ivanti #vulnerabilitymanagement #vulnerability

Thanks @reverseics for the infographics and Ivanti for the continuous source of discoveries.

db.gcve.eu/vuln/CVE-2026-1603

  • 8
  • 6
  • 0
  • 10h ago

Overview

  • Ivanti
  • Endpoint Manager Mobile

29 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
54.26%

Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Statistics

  • 3 Posts
  • 9 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

Das BSI hat seinen IT-Sicherheitshinweis zu Ivanti EPMM aktualisiert:
bsi.bund.de/SharedDocs/Cybersi

Es liegen Hinweise vor, dass die Schwachstellen CVE-2026-1281 und CVE-2026-1340 bereits seit Mitte 2025 ausgenutzt wurden. ALLE Betreiber von Ivanti EPMMs sollten daher bei der Prüfung ihrer Systeme auf Kompromittierungen den Untersuchungszeitraum bis Juli 2025 zurück ausweiten. Es muss davon ausgegangen werden, dass die Anzahl kompromittierter Systeme deutlich höher ist als ursprünglich angenommen.

  • 6
  • 3
  • 0
  • 22h ago

Bluesky

Profile picture fallback
📢 Ivanti EPMM : 83 % des exploits proviennent d’une seule IP « bulletproof » absente des IOC publiés 📝 Source : GreyNoise (Threat Signals), … https://cyberveille.ch/posts/2026-02-11-ivanti-epmm-83-des-exploits-proviennent-dune-seule-ip-bulletproof-absente-des-ioc-publies/ #CVE_2026_1281 #Cyberveille
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
The latest update for #Indusface includes "CVE-2026-1281 & CVE-2026-1340: Actively Exploited Pre-Authentication RCE in Ivanti EPMM" and "CVE-2025-11953 – Metro4Shell RCE in #ReactNative Metro Server". #cybersecurity #infosec https://opsmtrs.com/3ySs2VF
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Google
  • Chrome

13 Feb 2026
Published
14 Feb 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 4 Posts
  • 1 Interaction

Last activity: Last hour

Fediverse

Profile picture fallback

This build has a fix for CVE-2026-2441 (Use after free in CSS), which has a known exploit in the wild.

  • 0
  • 1
  • 1
  • 9h ago
Profile picture fallback

@secbox @vivaldiversiontracker

It might seem strange but this build has a fix for CVE-2026-2441 (Use after free in CSS), which has a known exploit in the wild. 🤷

@Vivaldi

  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback

Thursday: New Chrome release! It reverts one commit, a "trivial" performance optimization suspected of causing crashes.

chromereleases.googleblog.com/

Friday: New Chrome release! A zero day! "CVE-2026-2441: Use after free in CSS."

chromereleases.googleblog.com/

  • 0
  • 0
  • 0
  • Last hour

Overview

  • Microsoft
  • Windows Notepad

10 Feb 2026
Published
13 Feb 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.13%

KEV

Description

Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code locally.

Statistics

  • 2 Posts

Last activity: 10 hours ago

Fediverse

Profile picture fallback

Microsoft's #Notepad Got Pawned. The #vulnerability exploit #PoC code is public. Fork it while it's hot: github.com/BTtea/CVE-2026-2084

#cve2026_20841 #cyberSecurity

  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback

Windows Notepad RCE - CVE-2026-20841

A crafted Markdown link could trigger command execution via protocol handler abuse on Windows 11 Notepad.

forum.hashpwn.net/post/10031

  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Fortinet
  • FortiClientEMS

06 Feb 2026
Published
11 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.17%

KEV

Description

An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

Statistics

  • 2 Posts

Last activity: 12 hours ago

Fediverse

Profile picture fallback

🔐 CVE-2026-21643

📊 CVSS: 9.1 · Critical
📅 02/06/2026, 08:24 AM
🛡️ CWE: CWE-89
📦 Affected: Fortinet FortiClientEMS (7.4.4)
📚 fortiguard.fortinet.com/psirt/

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

  • 0
  • 0
  • 0
  • 15h ago

Bluesky

Profile picture fallback
📢 Fortinet corrige une SQLi critique dans FortiClientEMS (CVE-2026-21643) 📝 Selon un avis PSIRT de Fortinet publié le 6 février 2026, une vulnérabilité critiqu… https://cyberveille.ch/posts/2026-02-11-fortinet-corrige-une-sqli-critique-dans-forticlientems-cve-2026-21643/ #CVE_2026_21643 #Cyberveille
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • dani-garcia
  • vaultwarden

11 Feb 2026
Published
12 Feb 2026
Updated

CVSS v3.1
MEDIUM (6.5)
EPSS
0.02%

KEV

Description

vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Prior to 1.35.3, a regular organization member can retrieve all ciphers within an organization, regardless of collection permissions. The endpoint /ciphers/organization-details is accessible to any organization member and internally uses Cipher::find_by_org to retrieve all ciphers. These ciphers are returned with CipherSyncType::Organization without enforcing collection-level access control. This vulnerability is fixed in 1.35.3.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 14 hours ago

Fediverse

Overview

  • Ivanti
  • Endpoint Manager Mobile

29 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
40.23%

KEV

Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Statistics

  • 2 Posts
  • 9 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

Das BSI hat seinen IT-Sicherheitshinweis zu Ivanti EPMM aktualisiert:
bsi.bund.de/SharedDocs/Cybersi

Es liegen Hinweise vor, dass die Schwachstellen CVE-2026-1281 und CVE-2026-1340 bereits seit Mitte 2025 ausgenutzt wurden. ALLE Betreiber von Ivanti EPMMs sollten daher bei der Prüfung ihrer Systeme auf Kompromittierungen den Untersuchungszeitraum bis Juli 2025 zurück ausweiten. Es muss davon ausgegangen werden, dass die Anzahl kompromittierter Systeme deutlich höher ist als ursprünglich angenommen.

  • 6
  • 3
  • 0
  • 22h ago

Bluesky

Profile picture fallback
The latest update for #Indusface includes "CVE-2026-1281 & CVE-2026-1340: Actively Exploited Pre-Authentication RCE in Ivanti EPMM" and "CVE-2025-11953 – Metro4Shell RCE in #ReactNative Metro Server". #cybersecurity #infosec https://opsmtrs.com/3ySs2VF
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Hewlett Packard Enterprise
  • Integrated Lights-out 4 (iLO 4)

15 Feb 2018
Published
17 Sep 2024
Updated

CVSS
Pending
EPSS
94.25%

KEV

Description

A authentication bypass and execution of code vulnerability in HPE Integrated Lights-out 4 (iLO 4) version prior to 2.53 was found.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 14 hours ago
Showing 1 to 10 of 44 CVEs