It's been a busy 24 hours in the cyber world with significant updates on actively exploited vulnerabilities, recent data breaches, and a deep dive into evolving nation-state tactics. Let's take a look:
Actively Exploited Vulnerabilities & Zero-Days โ ๏ธ
- A critical pre-authentication RCE (CVE-2026-1731, CVSS 9.9) in BeyondTrust Remote Support and Privileged Remote Access appliances is now being actively exploited. Attackers are using specially crafted client requests to extract `x-ns-company` values and establish WebSocket channels for command execution. On-premise customers must patch immediately.
- A critical SQL injection vulnerability (CVE-2024-43468, CVSS 9.8) in Microsoft Configuration Manager, patched in October 2024, is now under active exploitation. This allows unauthenticated remote attackers to execute commands on the server or underlying database. CISA has added it to their KEV catalog, urging federal agencies to patch by March 5th.
- Apple has disclosed its first actively exploited zero-day of 2026, a memory corruption flaw (CVE-2026-20700) in `dyld` affecting iPhones and iPads running iOS versions prior to 26. This vulnerability was used in "extremely sophisticated attacks against specific targeted individuals," likely for commercial spyware.
- Two critical RCE vulnerabilities (CVE-2026-1281, CVE-2026-1340, CVSS 9.8) in Ivanti Endpoint Manager Mobile (EPMM) are being actively exploited, leading to compromises of several European government agencies, including the European Commission and Dutch and Finnish governments. This highlights the ongoing challenge of securing widely deployed edge devices.
- CISA also added CVE-2025-15556 (Notepad++ download integrity bypass) and CVE-2025-40536 (SolarWinds Web Help Desk security control bypass) to its KEV catalog. The Notepad++ flaw was exploited by the China-linked Lotus Blossom APT to deliver the Chrysalis backdoor via trojanised installers, targeting specific high-value individuals.
๐ค Bleeping Computer | https://www.bleepingcomputer.com/news/security/critical-beyondtrust-rce-flaw-now-exploited-in-attacks-patch-now/
๐ต๐ผ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/13/critical_microsoft_bug_from_2024/
๐ค Bleeping Computer | https://www.bleepingcomputer.com/news/security/cisa-flags-microsoft-configmgr-rce-flaw-as-exploited-in-attacks/
๐คซ CyberScoop | https://cyberscoop.com/apple-zero-day-vulnerability-cve-2026-20700/
๐ฐ The Hacker News | https://thehackernews.com/2026/02/researchers-observe-in-wild.html
๐ป Dark Reading | https://www.darkreading.com/endpoint-security/ivanti-epmm-zero-day-bugs-exploit
Recent Cyber Attacks & Breaches ๐จ
- Louis Vuitton, Christian Dior Couture, and Tiffany have been collectively fined $25 million by South Korea for inadequate security leading to data exposure for over 5.5 million customers. Breaches stemmed from malware on an employee device and phishing attacks compromising a shared cloud-based customer management service.
- The Netherlands' largest mobile network operator, Odido, disclosed a breach of its customer contact system affecting approximately 6.2 million people. Stolen data includes names, addresses, phone numbers, dates of birth, bank account numbers, and ID document details, prompting warnings about potential impersonation and phishing scams.
๐ค Bleeping Computer | https://www.bleepingcomputer.com/news/security/louis-vuitton-dior-and-tiffany-fined-25-million-over-data-breaches/
๐ต๐ผ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/13/odido_breach/
New Threat Research & Techniques ๐ฌ
- Google's Threat Intelligence Group (GTIG) has attributed a previously undocumented, possibly Russian intelligence-affiliated threat actor to attacks on Ukrainian defense, military, government, and energy organisations using CANFAIL malware. This group is noted for using Large Language Models (LLMs) for reconnaissance, lure creation, and basic technical questions for C2 setup.
- Threat actors are leveraging Claude LLM artifacts and Google Ads in "ClickFix" campaigns to deliver Mac infostealer malware. Malicious search results lead users to public Claude guides or fake Apple Support pages instructing them to execute shell commands in Terminal, which fetches the MacSync infostealer to exfiltrate sensitive system data.
- Nation-state actors, particularly China and Russia, are aggressively targeting the Defense Industrial Base (DIB), employing zero-day exploits against edge devices (VPNs, security gateways) for initial access and "pre-positioning" in networks. This strategy aims for persistent intelligence collection during peacetime and disruption options during crises, with a focus on devices often slower to patch and less monitored.
- Microsoft faces increasing pressure over Bring-Your-Own-Vulnerable-Driver (BYOVD) attacks, where threat actors exploit legitimate, but vulnerable, drivers to disable security products with kernel-level access. Despite Microsoft's efforts, gaps exist, such as allowing drivers with revoked certificates, and slow blocklist updates, making it a persistent challenge for defenders.
- A security researcher demonstrated multiple techniques to manipulate Windows LNK shortcut files, allowing attackers to display a benign target in file properties while executing a malicious payload. Microsoft's Security Response Center declined to classify these as vulnerabilities, citing user interaction, despite historical exploitation of similar LNK flaws.
- npm has overhauled its authentication, revoking classic tokens and defaulting to short-lived, session-based tokens with MFA for publishing, and encouraging OIDC Trusted Publishing. While a significant step, risks remain as MFA phishing can still yield short-lived tokens, and optional MFA bypass for 90-day tokens leaves a vulnerability similar to previous classic tokens.
๐ฐ The Hacker News | https://thehackernews.com/2026/02/google-ties-suspected-russian-actor-to.html
๐ค Bleeping Computer | https://www.bleepingcomputer.com/news/security/claude-llm-artifacts-abused-to-push-mac-infostealers-in-clickfix-attack/
๐ป Dark Reading | https://www.darkreading.com/cyber-risk/nation-state-hackers-defense-industrial-base-under-siege
๐ป Dark Reading | https://www.darkreading.com/application-security/microsoft-under-pressure-defenses-byovd-attacks
๐ค Bleeping Computer | https://www.bleepingcomputer.com/news/microsoft/microsoft-new-windows-lnk-spoofing-issues-arent-vulnerabilities/
๐ฐ The Hacker News | https://thehackernews.com/2026/02/npms-update-to-harden-their-supply.html
Threat Landscape & Geopolitics ๐
- Estonia's foreign intelligence chief urged European governments and industry to invest in homegrown offensive cyber capabilities, arguing that Europe is too reliant on non-European tools and needs to match adversaries' ability to penetrate, disrupt, or manipulate digital systems.
- Taiwan warns that China may be rehearsing a "digital siege" using platforms like "Expedition Cloud" to simulate attacks on critical infrastructure. This suggests a shift from espionage to disruption, with Taiwan serving as a proving ground for new, aggressive cyber tactics.
- NATO's deputy secretary general stated that the alliance must be ready to impose costs on Russia and China for cyber and hybrid attacks, which increasingly target critical infrastructure and government services. This includes strengthening defense, boosting innovation, and integrating military, civilian, and industry efforts.
- The EU's top tech official warned that Europe can no longer be "naive" about adversaries' ability to shut down critical infrastructure. She called for tougher rules, more investment, and phasing out high-risk suppliers (like Huawei/ZTE) to protect against coordinated cyber and physical threats.
- Officials and executives at the Munich Cyber Security Conference highlighted space as the next arena of great power competition, vulnerable to disruption. Concerns include the reliance of modern life on satellites and the vulnerability of subsea cables, with calls for independent "outernet" satellite networks to ensure resilience.
- Sweden's Ministry of Defence states that cyber and hybrid threats are now a permanent feature of Europe's security environment. Societies must be built to function under sustained pressure, rather than assuming disruptions are rare, emphasising a "total defense" concept with strong public-private cooperation.
๐๏ธ The Record | https://therecord.media/estonia-spy-chief-calls-on-europe-to-invest-in-own-offense
๐๏ธ The Record | https://therecord.media/china-taiwan-digital-siege-munich
๐๏ธ The Record | https://therecord.media/nato-must-impost-costs-russia-china-cyber-hybrid-deputy-secretary
๐๏ธ The Record | https://therecord.media/eu-cyber-critical-infrastructure-tech
๐๏ธ The Record | https://therecord.media/space-cybersecurity-new-front-war
๐๏ธ The Record | https://therecord.media/sweden-cyber-threats-europe-permanent
Regulatory & Communication Blockades ๐
- The Russian government is intensifying its crackdown on communication platforms outside its control, attempting to fully block WhatsApp and aggressively throttling Telegram. This move aims to encourage citizens to use the Kremlin-controlled MAX messenger app, which has raised privacy concerns.
๐ค Bleeping Computer | https://www.bleepingcomputer.com/news/security/russia-tries-to-block-whatsapp-telegram-in-communication-blockade/
Industry News / Acquisitions ๐ค
- Proofpoint has acquired AI security startup Acuvity to address the growing security risks associated with widespread corporate adoption of agentic AI. This move aims to strengthen Proofpoint's capabilities in monitoring and securing AI-powered systems, tackling new attack vectors like prompt injection and model manipulation.
๐คซ CyberScoop | https://cyberscoop.com/proofpoint-acuvity-deal-agentic-ai-security/
#CyberSecurity #ThreatIntelligence #Vulnerabilities #ZeroDay #RCE #DataBreach #NationState #APT #Malware #AI #LLM #SupplyChainSecurity #CriticalInfrastructure #Geopolitics #InfoSec #CyberAttack #IncidentResponse