<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"><title>CERT.at - Tagesberichte</title><link rel="alternate" href="https://www.cert.at"/><subtitle>Dieser Feed beinhaltet die Tagesberichte von www.CERT.at</subtitle><entry><title>Tageszusammenfassung - 13.03.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/3/tagesberichte-13032026"/><author><name>CERT.at</name></author><updated>2026-03-13T18:12:18Z</updated><published>2026-03-13T18:12:18Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Donnerstag 12-03-2026 18:00 - Freitag 13-03-2026 18:00
Handler:     Guenes Holler
Co-Handler:  n/a


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Investigating a New Click-Fix Variant&lt;/h3&gt;

Atos Researchers identified a new variant of the popular ClickFix technique, where attackers convince the user to execute a malicious command on their own device through the Win + R shortcut.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/03/investigating-new-click-fix-variant.html&quot;&gt;https://thehackernews.com/2026/03/investigating-new-click-fix-variant.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Rogue AI agents can work together to hack systems and steal secrets&lt;/h3&gt;

AI agents work together to bypass security controls and stealthily steal sensitive data from within the enterprise systems in which they operate, according to tests carried out by frontier security lab Irregular.
&lt;p /&gt;
&lt;A HREF=&quot;https://go.theregister.com/feed/www.theregister.com/2026/03/12/rogue_ai_agents_worked_together/&quot;&gt;https://go.theregister.com/feed/www.theregister.com/2026/03/12/rogue_ai_agents_worked_together/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;A React-based phishing page with credential exfiltration via EmailJS, (Fri, Mar 13th)&lt;/h3&gt;

On Wednesday, a phishing message made its way into our handler inbox that contained a fairly typical low-quality lure, but turned out to be quite interesting in the end nonetheless. That is because the accompanying credential stealing web page was dynamically constructed using React and used a legitimate e-mail service for credential collection.
&lt;p /&gt;
&lt;A HREF=&quot;https://isc.sans.edu/diary/rss/32794&quot;&gt;https://isc.sans.edu/diary/rss/32794&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks&lt;/h3&gt;

Cybersecurity researchers have disclosed details of a suspected artificial intelligence (AI)-generated malware codenamed Slopoly put to use by a financially motivated threat actor named Hive0163.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/03/hive0163-uses-ai-assisted-slopoly.html&quot;&gt;https://thehackernews.com/2026/03/hive0163-uses-ai-assisted-slopoly.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Ivanti EPMM -Sleeper Shells- not so sleepy?&lt;/h3&gt;

In late January 2026 an advisory covering two remote code execution vulnerabilities (CVE-2026-1281 &amp; CVE-2026-1340) in Ivanti Endpoint Manager Mobile (EPMM) was published. Shortly after reports (in example by tenable) mentioned publicly available proof-of-concept exploits.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.nviso.eu/2026/03/13/ivanti-epmm-sleeper-shells-not-so-sleepy/&quot;&gt;https://blog.nviso.eu/2026/03/13/ivanti-epmm-sleeper-shells-not-so-sleepy/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;-Handala Hack- - Unveiling Group-s Modus Operandi&lt;/h3&gt;

Handala Hack, also tracked by Check Point Research as Void Manticore, is an Iranian threat actor that is known for multiple destructive wiping attacks combined with -hack and leak- operations. The threat actor operates several online personas, with the most prominent among them being Homeland Justice, maintained from mid-2022 specifically for multiple attacks.
&lt;p /&gt;
&lt;A HREF=&quot;https://research.checkpoint.com/2026/handala-hack-unveiling-groups-modus-operandi/&quot;&gt;https://research.checkpoint.com/2026/handala-hack-unveiling-groups-modus-operandi/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;6 Malicious Packagist Themes Ship Trojanized jQuery and FUNNULL Redirect Payloads&lt;/h3&gt;

Six malicious Packagist packages posing as OphimCMS themes contain trojanized jQuery that exfiltrates URLs, injects ads, and loads FUNNULL-linked redirects.
&lt;p /&gt;
&lt;A HREF=&quot;https://socket.dev/blog/6-malicious-packagist-themes-ship-trojanized-jquery?utm_medium=feed&quot;&gt;https://socket.dev/blog/6-malicious-packagist-themes-ship-trojanized-jquery?utm_medium=feed&lt;/a&gt;

&lt;hr&gt;


&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Mehrere Sicherheitslücken in AppArmor (&quot;CrackArmor&quot;) - Updates verfügbar&lt;/h3&gt;

Sicherheitsforscher:innen des Unternehmens Qualys haben insgesamt neun Schwachstellen in AppArmor entdeckt welche von den Expert:innen zusammengefasst als &quot;CrackArmor&quot; bezeichnet werden.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cert.at/de/aktuelles/2026/3/mehrere-sicherheitslucken-in-apparmor-crackarmor-updates-verfugbar&quot;&gt;https://www.cert.at/de/aktuelles/2026/3/mehrere-sicherheitslucken-in-apparmor-crackarmor-updates-verfugbar&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Veeam warns of critical flaws exposing backup servers to RCE attacks&lt;/h3&gt;

Data protection company Veeam Software has patched multiple flaws in its Backup &amp; Replication solution, including four critical remote code execution (RCE) vulnerabilities.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/veeam-warns-of-critical-flaws-exposing-backup-servers-to-rce-attacks/&quot;&gt;https://www.bleepingcomputer.com/news/security/veeam-warns-of-critical-flaws-exposing-backup-servers-to-rce-attacks/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Chrome-Notfallupdate: Zwei attackierte Codeschmuggel-Lücken gestopft&lt;/h3&gt;

Google hat in der Nacht zum Freitag ein Notfallupdate für Chrome herausgegeben. Es stopft zwei im Internet angegriffene Sicherheitslecks. 
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11209626&quot;&gt;https://heise.de/-11209626&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Veeam Backup &amp; Replication: Kritische Schadcode-Sicherheitslücken entdeckt&lt;/h3&gt;

In Veeam Backup &amp; Replication schließt das Unternehmen mit Updates mehrere kritische Sicherheitslücken. Sie erlauben Codeschmuggel. 
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11209818&quot;&gt;https://heise.de/-11209818&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN Security updates for Friday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1062775/&quot;&gt;https://lwn.net/Articles/1062775/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-03-13T18:12:18Z</dc:date></entry><entry><title>Tageszusammenfassung - 12.03.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/3/tagesberichte-12032026"/><author><name>CERT.at</name></author><updated>2026-03-12T19:08:04Z</updated><published>2026-03-12T19:08:04Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Mittwoch 11-03-2026 18:00 - Donnerstag 12-03-2026 18:00
Handler:     Alexander Riepl
Co-Handler:  Felician Fuchs


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;New PhantomRaven NPM attack wave steals dev data via 88 packages&lt;/h3&gt;

New attack waves from the PhantomRaven supply-chain campaign are hitting the npm registry, with dozens of malicious packages that exfiltrate sensitive data from JavaScript developers.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/new-phantomraven-npm-attack-wave-steals-dev-data-via-88-packages/&quot;&gt;https://www.bleepingcomputer.com/news/security/new-phantomraven-npm-attack-wave-steals-dev-data-via-88-packages/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;US disrupts SocksEscort proxy network powered by Linux malware&lt;/h3&gt;

Law enforcement agencies in the U.S. and Europe along with private partners have disrupted the SocksEscort cybercrime proxy network that used only edge devices compromised via the AVRecon malware for Linux.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/us-disrupts-socksescort-proxy-network-powered-by-linux-malware/&quot;&gt;https://www.bleepingcomputer.com/news/security/us-disrupts-socksescort-proxy-network-powered-by-linux-malware/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Vollzugriff in zwei Stunden: KI-Agent hackt eigenständig KI-Plattform von McKinsey&lt;/h3&gt;

Forscher haben einen KI-Agenten auf McKinseys Lilli-Plattform angesetzt. Er konnte Millionen von Chatnachrichten und andere Daten auslesen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/vollzugriff-in-zwei-stunden-ki-agent-hackt-eigenstaendig-ki-plattform-von-mckinsey-2603-206407.html&quot;&gt;https://www.golem.de/news/vollzugriff-in-zwei-stunden-ki-agent-hackt-eigenstaendig-ki-plattform-von-mckinsey-2603-206407.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;When your IoT Device Logs in as Admin, It?s too Late!&lt;/h3&gt;

Have you ever installed a new device on your home or company router? Even when setup instructions are straightforward, end users often skip the step that matters most: changing default credentials. The excitement of deploying a new device frequently outweighs the discipline of securing it.
&lt;p /&gt;
&lt;A HREF=&quot;https://isc.sans.edu/diary/rss/32788&quot;&gt;https://isc.sans.edu/diary/rss/32788&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Researchers Trick Perplexitys Comet AI Browser Into Phishing Scam in Under Four Minutes&lt;/h3&gt;

Agentic web browsers that leverage artificial intelligence (AI) capabilities to autonomously execute actions across multiple websites on behalf of a user could be trained and tricked into falling prey to phishing and scam traps.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/03/researchers-trick-perplexitys-comet-ai.html&quot;&gt;https://thehackernews.com/2026/03/researchers-trick-perplexitys-comet-ai.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets&lt;/h3&gt;

Cybersecurity researchers have discovered half-a-dozen new Android malware families that come with capabilities to steal data from compromised devices and conduct financial fraud.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/03/six-android-malware-families-target-pix.html&quot;&gt;https://thehackernews.com/2026/03/six-android-malware-families-target-pix.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Exploitkit-Gefahr: Apple aktualisiert ältere iOS- und iPadOS-Versionen&lt;/h3&gt;

Apple hat in der Nacht zum Donnerstag wichtige Aktualisierungen für Nutzer von iOS und iPadOS 15 und 16 veröffentlicht. Sie sollten schnell eingespielt werden.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Exploitkit-Gefahr-Apple-aktualisiert-aeltere-iOS-und-iPadOS-Versionen-11208159.html&quot;&gt;https://www.heise.de/news/Exploitkit-Gefahr-Apple-aktualisiert-aeltere-iOS-und-iPadOS-Versionen-11208159.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Taming the dragon: reverse engineering firmware with Ghidra&lt;/h3&gt;

I stumbled into infosec the same year the NSA graced us with Ghidra. It-s by far become the most used tool in my arsenal for reverse engineering and vulnerability research. It-s free, extensible, and supports some of the quirkier architectures we come across. But its learning curve is steep. This blog post is the culmination of my learnings from spending what may be too many hours in front of Ghidra-s glaring and dated UI.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.pentestpartners.com/security-blog/taming-the-dragon-reverse-engineering-firmware-with-ghidra/&quot;&gt;https://www.pentestpartners.com/security-blog/taming-the-dragon-reverse-engineering-firmware-with-ghidra/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Abo-Falle auf der Handyrechnung: So reagieren Sie richtig&lt;/h3&gt;

Plötzlich ist Ihre Handyrechnung höher als gewohnt? Ein Blick auf die Rechnung zeigt: Der Grund ist ein Abo, das Sie gar nicht bewusst abgeschlossen haben. Solche Kostenfallen kommen immer wieder vor. Wir erklären, was dahinter steckt und was Sie dagegen tun können.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/abo-falle-auf-der-handyrechnung-so-reagieren-sie-richtig/&quot;&gt;https://www.watchlist-internet.at/news/abo-falle-auf-der-handyrechnung-so-reagieren-sie-richtig/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Internationales Cybercrime-Netz zerschlagen, 700 Opfer in Österreich&lt;/h3&gt;

Tausende private Router waren gekapert worden. Dadurch wurden anonym Attacken auf IT-Systeme durchgeführt und Darstellungen von Kindesmissbrauch verbreitet
&lt;p /&gt;
&lt;A HREF=&quot;https://www.derstandard.at/story/3000000312309/internationales-cybercrime-netz-zerschlagen-700-opfer-in-214sterreich&quot;&gt;https://www.derstandard.at/story/3000000312309/internationales-cybercrime-netz-zerschlagen-700-opfer-in-214sterreich&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Announcing Pwn2Own Berlin for 2026&lt;/h3&gt;

Willkommen zurück, meine Damen und Herren, zu unserem zweiten Wettbewerb in Berlin! That-s correct (if Google translate didn-t steer me wrong). After our inaugural competition last year, Pwn2Own returns to Berlin and OffensiveCon. Outside of our shipping troubles, we had an amazing time and can-t wait to get back.Last year, we added Artificial Intelligence as a category with great results.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.thezdi.com/blog/2026/3/11/announcing-pwn2own-berlin-for-2026&quot;&gt;https://www.thezdi.com/blog/2026/3/11/announcing-pwn2own-berlin-for-2026&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;A Nerds Life: Weeks of Firmware Teardown to Prove We Were Right&lt;/h3&gt;

This blog post is a follow-up to our previous post describing how we managed to extract the firmware of asmartwatch. It contains many references and detailsintroduced in our previous post, readers are therefore advised to read it first.
&lt;p /&gt;
&lt;A HREF=&quot;http://blog.quarkslab.com/nerd-life-weeks-firmware-teardown-we-were-right.html&quot;&gt;http://blog.quarkslab.com/nerd-life-weeks-firmware-teardown-we-were-right.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;InTune Compromise Allows Attackers to Remotely Wipe Medical Supply Company Devices&lt;/h3&gt;

A hacktivist group with links to Iran-s intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker-s largest hub outside of the United States, said the company sent home more than 5,000 workers there today.
&lt;p /&gt;
&lt;A HREF=&quot;https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/&quot;&gt;https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;SQLi flaw in Elementor Ally plugin impacts 250k+ WordPress sites&lt;/h3&gt;

An SQL injection vulnerability in Ally, a WordPress plugin from Elementor for web accessibility and usability with more than 400,000 installations, could be exploited to steal sensitive data without authentication.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/sqli-flaw-in-elementor-ally-plugin-impacts-250k-plus-wordpress-sites/&quot;&gt;https://www.bleepingcomputer.com/news/security/sqli-flaw-in-elementor-ally-plugin-impacts-250k-plus-wordpress-sites/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Zero Click Unauthenticated RCE in n8n: A Contact Form That Executes Shell Commands&lt;/h3&gt;

Pillar Research team found a zero-click, unauthenticated RCE in n8n. Anyone who can reach a public multi-step form with an HTML rendering can execute shell commands on the server. We worked with the n8n team to fix it. If you use n8n Cloud, youre already protected. If youre self-hosting, update to 2.10.1 / 2.9.3 / 1.123.22 now.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.pillar.security/blog/zero-click-unauthenticated-rce-in-n8n-a-contact-form-that-executes-shell-commands&quot;&gt;https://www.pillar.security/blog/zero-click-unauthenticated-rce-in-n8n-a-contact-form-that-executes-shell-commands&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Aruba-Switches mit AOS-CX: Angreifer können Admin-Passwort zurücksetzen&lt;/h3&gt;

HPEs Netzwerkbetriebssystem Aruba Networking AOS-CX ist verwundbar. Die Entwickler haben mehrere Sicherheitslücken geschlossen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Aruba-Switches-mit-AOS-CX-Angreifer-koennen-Admin-Passwort-zuruecksetzen-11208000.html&quot;&gt;https://www.heise.de/news/Aruba-Switches-mit-AOS-CX-Angreifer-koennen-Admin-Passwort-zuruecksetzen-11208000.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;HP-PCs: Angreifer können sich höhere Rechte über UEFI-Lücken verschaffen&lt;/h3&gt;

Computer von HP sind über mehrere Schwachstellen im UEFI und Device Manager angreifbar.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/HP-PCs-Angreifer-koennen-sich-hoehere-Rechte-ueber-UEFI-Luecken-verschaffen-11208417.html&quot;&gt;https://www.heise.de/news/HP-PCs-Angreifer-koennen-sich-hoehere-Rechte-ueber-UEFI-Luecken-verschaffen-11208417.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Zoom: Netzwerkangriffe auf kritische Sicherheitslücke möglich&lt;/h3&gt;

In der Videokonferenzsoftware von Zoom finden sich teils kritische Sicherheitslücken. Angreifer aus dem Netz können Rechte ausweiten.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Zoom-Videokonferenzsoftware-ermoeglicht-Angreifern-Rechteausweitung-11208902.html&quot;&gt;https://www.heise.de/news/Zoom-Videokonferenzsoftware-ermoeglicht-Angreifern-Rechteausweitung-11208902.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN Security updates for Thursday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1062570/&quot;&gt;https://lwn.net/Articles/1062570/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-03-12T19:08:04Z</dc:date></entry><entry><title>Tageszusammenfassung - 11.03.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/3/tagesberichte-11032026"/><author><name>CERT.at</name></author><updated>2026-03-11T18:36:41Z</updated><published>2026-03-11T18:36:41Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Dienstag 10-03-2026 18:00 - Mittwoch 11-03-2026 18:00
Handler:     Michael Schlagenhaufer
Co-Handler:  Guenes Holler


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Analyzing &quot;Zombie Zip&quot; Files (CVE-2026-0866), (Wed, Mar 11th)&lt;/h3&gt;

A new vulnerability (CVE-2026-0866) has been published: Zombie Zip. It's a method to create a malformed ZIP file that will bypass detection by most anti-virus engines. The malformed ZIP file can not be opened with a ZIP utility, a custom loader is required. [..] I will show you how to use my tools to analyze such a malformed ZIP file.
&lt;p /&gt;
&lt;A HREF=&quot;https://isc.sans.edu/diary/rss/32786&quot;&gt;https://isc.sans.edu/diary/rss/32786&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Claude Tried to Hack 30 Companies. Nobody Asked It To.&lt;/h3&gt;

We gave AI agents simple research tasks on cloned corporate websites. When the legitimate path was broken, the agents autonomously discovered and exploited SQL injection vulnerabilities to complete the task - with zero hacking instructions in any prompt.
&lt;p /&gt;
&lt;A HREF=&quot;https://trufflesecurity.com/blog/claude-tried-to-hack-30-companies-nobody-asked-it-to&quot;&gt;https://trufflesecurity.com/blog/claude-tried-to-hack-30-companies-nobody-asked-it-to&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Sextortion -I recorded you- emails reuse passwords found in disposable inboxes&lt;/h3&gt;

I found that one particular sender using the name Jenny Green and the Gmail address JennyGreen64868@gmail.com sent many of these emails to people that use the FakeMailGenerator service. [..] My guess is that the scammer searched these public inboxes for passwords and then reused those passwords in their sextortion emails.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.malwarebytes.com/blog/news/2026/03/sextortion-i-recorded-you-emails-reuse-passwords-found-in-disposable-inboxes&quot;&gt;https://www.malwarebytes.com/blog/news/2026/03/sextortion-i-recorded-you-emails-reuse-passwords-found-in-disposable-inboxes&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Bitpanda-Falle: Warnung vor unautorisiertem Wallet-Transfer ist ein Phishing-Versuch!&lt;/h3&gt;

Seit längerer Zeit nutzen nun bereits Kriminelle den Finanzdienstleister Bitpanda als Deckmantel für eine massive Phishing-Welle. Mithilfe von Meldungen zu angeblich unautorisierten Wallet-Transfers oder Auszahlungsversuchen üben sie Druck auf ihre Opfer aus. Die Ziele sind der Zugriff auf das Bankkonto und die Freigabe von Überweisungen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/bitpanda-wallet-transfer-phishing/&quot;&gt;https://www.watchlist-internet.at/news/bitpanda-wallet-transfer-phishing/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Sednit reloaded: Back in the trenches&lt;/h3&gt;

In this blogpost, we have shown that Sednit-s advanced development team is active once again, operating an arsenal centered on two implants - BeardShell and Covenant - deployed in tandem and each leveraging a different cloud provider. This setup enables operators to reestablish access quickly if the infrastructure for one is taken down. We believe that this dual-implant strategy is not new. [..] The Sednit group - also known as APT28, Fancy Bear, Forest Blizzard, or Sofacy - has been operating since at least 2004.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.welivesecurity.com/en/eset-research/sednit-reloaded-back-trenches/&quot;&gt;https://www.welivesecurity.com/en/eset-research/sednit-reloaded-back-trenches/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;BlackSanta Malware Targets HR Staff with Fake CV Downloads&lt;/h3&gt;

It is a classic case of hackers exploiting the one thing recruiters have to do every day: open files from strangers. [..] The threat, dubbed the BlackSanta malware [..] they target the specific workflows of recruiters, sending harmless-looking emails with links to CVs on sites like Dropbox. [..] the attackers are using a technique called steganography. For your information, this involves hiding malicious code inside a normal-looking image. 
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/blacksanta-malware-hr-staff-fake-cv-downloads/&quot;&gt;https://hackread.com/blacksanta-malware-hr-staff-fake-cv-downloads/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;RondoDox Botnet: From Zero to 174 Exploited Vulnerabilities&lt;/h3&gt;

A deep dive into the RondoDox botnet, examining its infrastructure, exploit adoption timeline, and methods used to target internet-exposed systems.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bitsight.com/blog/rondodox-botnet-infrastructure-analysis&quot;&gt;https://www.bitsight.com/blog/rondodox-botnet-infrastructure-analysis&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft releases Windows 10 KB5078885 extended security update&lt;/h3&gt;

Microsoft has released the Windows 10 KB5078885 extended security update to fix the March 2026 Patch Tuesday vulnerabilities, including 2 zero-days and an issue that prevent some devices from shutting down.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-windows-10-kb5078885-extended-security-update/&quot;&gt;https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-windows-10-kb5078885-extended-security-update/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Microsoft Patch Tuesday for March 2026 - Snort rules and prominent vulnerabilities&lt;/h3&gt;

Microsoft has released its monthly security update for March 2026 which includes 79 vulnerabilities, including three that Microsoft marked as -critical.-
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.talosintelligence.com/microsoft-patch-tuesday-march-2026/&quot;&gt;https://blog.talosintelligence.com/microsoft-patch-tuesday-march-2026/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;HPE warns of critical AOS-CX flaw allowing admin password resets&lt;/h3&gt;

Hewlett Packard Enterprise (HPE) has patched multiple security vulnerabilities in the Aruba Networking AOS-CX operating system, including several authentication and code execution issues. [..] The most severe security flaw today is a critical authentication bypass vulnerability (tracked as CVE-2026-23813) that attackers without privileges can exploit in low-complexity attacks to reset admin passwords.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/hpe-warns-of-critical-aos-cx-flaw-allowing-admin-password-resets/&quot;&gt;https://www.bleepingcomputer.com/news/security/hpe-warns-of-critical-aos-cx-flaw-allowing-admin-password-resets/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Adobe-Patchday: Schadcodeschmuggel in Reader, Illustrator und weiteren möglich&lt;/h3&gt;

Die Patchday-Übersicht von Adobe listet die acht Sicherheitsmitteilungen zu den einzelnen Produkten auf. In Adobe Commerce, Commerce B2B und Magento Open Source schließen die Entwickler 19 Sicherheitslücken.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Adobe-Patchday-Schadcodeschmuggel-in-Reader-Illustrator-und-weiteren-moeglich-11206633.html&quot;&gt;https://www.heise.de/news/Adobe-Patchday-Schadcodeschmuggel-in-Reader-Illustrator-und-weiteren-moeglich-11206633.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Passwort-Manager KeePassXC 2.7.12: Was Nutzer beim Update beachten müssen&lt;/h3&gt;

Der quelloffene Passwort-Manager KeePassXC ist in Version 2.7.12 erschienen. [..] Wie die Entwickler in ihrem Release-Blog mitteilen, enthält die neue Version Mitigationen gegen Exploits über manipulierte OpenSSL-Konfigurationsdateien auf Windows.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/KeePassXC-2-7-12-DLL-Schutz-Passkey-Aenderungen-und-TOTP-in-Auto-Type-11206934.html&quot;&gt;https://www.heise.de/news/KeePassXC-2-7-12-DLL-Schutz-Passkey-Aenderungen-und-TOTP-in-Auto-Type-11206934.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Fortinet schließt Brute-Force- und Befehlsschmuggel-Lücken in FortiWeb &amp; Co.&lt;/h3&gt;

Fortinet schließt Lücken in FortiWeb oder FortiManager, die etwa Einschleusen von Befehlen erlauben. [..] Unzureichende Prüfung der Interaktionsfrequenz ermöglicht nicht authentifizierten Angreifern, das Authentifizierungs-Rate-Limit von FortiWeb mit manipulierten Anfragen auszuhebeln (CVE-2026-24017, CVSS 7.3, Risiko -hoch-).
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Fortinet-schliesst-Brute-Force-und-Befehlsschmuggel-Luecken-in-FortiWeb-Co-11207011.html&quot;&gt;https://www.heise.de/news/Fortinet-schliesst-Brute-Force-und-Befehlsschmuggel-Luecken-in-FortiWeb-Co-11207011.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Drupal: Unpublished Node Permissions - Critical - Access bypass - SA-CONTRIB-2026-029&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.drupal.org/sa-contrib-2026-029&quot;&gt;https://www.drupal.org/sa-contrib-2026-029&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Drupal: AI (Artificial Intelligence) - Moderately critical - Information Disclosure - SA-CONTRIB-2026-028&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.drupal.org/sa-contrib-2026-028&quot;&gt;https://www.drupal.org/sa-contrib-2026-028&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cisco: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrncs-epni-int-dos-TWMffUsN&quot;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrncs-epni-int-dos-TWMffUsN&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cisco: Cisco Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-xss-MrNAH5Jh&quot;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-xss-MrNAH5Jh&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cisco: Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-privesc-bF8D5U4W&quot;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-privesc-bF8D5U4W&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cisco: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-dos-kDMxpSzK&quot;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-dos-kDMxpSzK&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Splunk: Security Advisories 2026-03-11&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://advisory.splunk.com//advisories&quot;&gt;https://advisory.splunk.com//advisories&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;WordPress 6.9.4 Release&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://wordpress.org/news/2026/03/wordpress-6-9-4-release/&quot;&gt;https://wordpress.org/news/2026/03/wordpress-6-9-4-release/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN: Security updates for Wednesday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1062403/&quot;&gt;https://lwn.net/Articles/1062403/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Paloalto: CVE-2026-0230 Cortex XDR Agent: Local Administrator can disable the agent on macOS (Severity: MEDIUM)&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://security.paloaltonetworks.com/CVE-2026-0230&quot;&gt;https://security.paloaltonetworks.com/CVE-2026-0230&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Paloalto: CVE-2026-0231 Cortex XDR Broker VM: Sensitive Information Disclosure Vulnerability (Severity: MEDIUM)&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://security.paloaltonetworks.com/CVE-2026-0231&quot;&gt;https://security.paloaltonetworks.com/CVE-2026-0231&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-03-11T18:36:41Z</dc:date></entry><entry><title>Tageszusammenfassung - 10.03.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/3/tagesberichte-10032026"/><author><name>CERT.at</name></author><updated>2026-03-10T18:17:32Z</updated><published>2026-03-10T18:17:32Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Montag 09-03-2026 18:00 - Dienstag 10-03-2026 18:00
Handler:     Guenes Holler
Co-Handler:  Michael Schlagenhaufer


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Lock the Ghost&lt;/h3&gt;

In the software world, -remove- is not equal to &quot;gone.&quot; This is crystal clear. There is always a good reason for that, but even the best reason does not have to be intuitive or expected by the users. Let-s take a short trip through how Python Package Index handles removals and how we can lock the ghost in an uv.lock file - forever!
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cert.at/en/blog/2026/3/lock-the-ghost&quot;&gt;https://www.cert.at/en/blog/2026/3/lock-the-ghost&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft Teams phishing targets employees with A0Backdoor malware&lt;/h3&gt;

Hackers contacted employees at financial and healthcare organizations over Microsoft Teams to trick them into granting remote access through Quick Assist and deploy a new piece of malware called A0Backdoor.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/&quot;&gt;https://www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;APT28 hackers deploy customized variant of Covenant open-source tool&lt;/h3&gt;

The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/apt28-hackers-deploy-customized-variant-of-covenant-open-source-tool/&quot;&gt;https://www.bleepingcomputer.com/news/security/apt28-hackers-deploy-customized-variant-of-covenant-open-source-tool/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft to enable Windows hotpatch security updates by default&lt;/h3&gt;

Microsoft will turn on hotpatch security updates by default for all eligible Windows devices managed through Microsoft Intune and the Microsoft Graph API, beginning with the May 2026 Windows security update.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/microsoft/microsoft-to-enable-hotpatch-security-updates-by-default-in-may/&quot;&gt;https://www.bleepingcomputer.com/news/microsoft/microsoft-to-enable-hotpatch-security-updates-by-default-in-may/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials&lt;/h3&gt;

Cybersecurity researchers have discovered a malicious npm package that masquerades as an OpenClaw installer to deploy a remote access trojan (RAT) and steal sensitive data from compromised hosts.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/03/malicious-npm-package-posing-as.html&quot;&gt;https://thehackernews.com/2026/03/malicious-npm-package-posing-as.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet&lt;/h3&gt;

Cybersecurity researchers have discovered a new malware called KadNap that's primarily targeting Asus routers to enlist them into a botnet for proxying malicious traffic.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/03/kadnap-malware-infects-14000-edge.html&quot;&gt;https://thehackernews.com/2026/03/kadnap-malware-infects-14000-edge.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Bawag-Phishing: Debitkarte, PIN-Code und Zugangsdaten für Onlinebanking in Gefahr!&lt;/h3&gt;

Eine altbekannte Phishing-Masche ist gerade wieder besonders häufig zu beobachten. Die Drahtzieher versenden Fake-Mails im Namen der Bawag, die vor einem Ablaufen der Debitkarte warnen. Mit dem vermeintlichen Bestellvorgang der neuen Card fragen sie sensibelste Daten ab. Zudem werden die Opfer aufgefordert, ihre alte Karte per Post an eine Wiener Adresse zu schicken.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/bawag-phishing-debitkarte/&quot;&gt;https://www.watchlist-internet.at/news/bawag-phishing-debitkarte/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Iranian MOIS Actors &amp; the Cyber Crime Connection&lt;/h3&gt;

Iran-linked actors are increasingly engaging with the cyber crime ecosystem. Their activity suggests a growing reliance on criminal tools, services, and operational models in support of state objectives. Iranian actors have long used cyber crime and hacktivism as cover for destructive activity, but the trend now suggests direct engagement with the criminal ecosystem. The post Iranian MOIS Actors &amp; the Cyber Crime Connection appeared first on Check Point Research.
&lt;p /&gt;
&lt;A HREF=&quot;https://research.checkpoint.com/2026/iranian-mois-actors-the-cyber-crime-connection/&quot;&gt;https://research.checkpoint.com/2026/iranian-mois-actors-the-cyber-crime-connection/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;OpenClaw Advisory Surge Highlights Gaps Between GHSA and CVE Tracking&lt;/h3&gt;

A recent burst of security disclosures in the OpenClaw project is drawing attention to how vulnerability information flows across advisory and CVE systems.
&lt;p /&gt;
&lt;A HREF=&quot;https://socket.dev/blog/openclaw-advisory-surge-highlights-gaps-between-ghsa-and-cve-tracking?utm_medium=feed&quot;&gt;https://socket.dev/blog/openclaw-advisory-surge-highlights-gaps-between-ghsa-and-cve-tracking?utm_medium=feed&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cyberattack Forces Polish Hospital Revert to Paper-Based Operations&lt;/h3&gt;

The Independent Public Regional Hospital in the western Polish city of Szczecin has been compelled to switch back to a paper-based workflow after suffering a cyberattack over the weekend. Hospital authorities confirmed that the incident, which struck the facility-s IT system on the night of March 7-8, 2026, has temporarily disrupted digital operations, though patients- health remains uncompromised.
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/szczecin-public-regional-hospital-cyberattack/&quot;&gt;https://thecyberexpress.com/szczecin-public-regional-hospital-cyberattack/&lt;/a&gt;

&lt;hr&gt;

&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;SAP-Patchday: NetWeaver-Lücke ermöglicht Einschleusen von Schadcode&lt;/h3&gt;

Im März behandelt SAP in 15 Sicherheitsmitteilungen teils kritische Sicherheitslücken in diversen Produkten. Admins müssen handeln.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11205008&quot;&gt;https://heise.de/-11205008&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;30,000 WordPress Sites Affected by Authentication Bypass Vulnerability in Tutor LMS Pro WordPress Plugin&lt;/h3&gt;

On December 30th, 2025, we received a submission for an Authentication Bypass vulnerability in Tutor LMS Pro, a WordPress plugin estimated to have more than 30,000 active installations. The vulnerability makes it possible for an unauthenticated attacker to gain access to any account on a site including accounts used to administer the site, if the attacker knows, or can find, the associated email address.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.wordfence.com/blog/2026/03/30000-wordpress-sites-affected-by-authentication-bypass-vulnerability-in-tutor-lms-pro-wordpress-plugin/&quot;&gt;https://www.wordfence.com/blog/2026/03/30000-wordpress-sites-affected-by-authentication-bypass-vulnerability-in-tutor-lms-pro-wordpress-plugin/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN Security updates for Tuesday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1062260/&quot;&gt;https://lwn.net/Articles/1062260/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CISA Adds Three Known Exploited Vulnerabilities to Catalog&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/alerts/2026/03/09/cisa-adds-three-known-exploited-vulnerabilities-catalog&quot;&gt;https://www.cisa.gov/news-events/alerts/2026/03/09/cisa-adds-three-known-exploited-vulnerabilities-catalog&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Ivanti March 2026 Security Update&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.ivanti.com/blog/march-2026-security-update&quot;&gt;https://www.ivanti.com/blog/march-2026-security-update&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-03-10T18:17:32Z</dc:date></entry><entry><title>Tageszusammenfassung - 09.03.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/3/tagesberichte-09032026"/><author><name>CERT.at</name></author><updated>2026-03-09T19:03:39Z</updated><published>2026-03-09T19:03:39Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Freitag 06-03-2026 18:00 - Montag 09-03-2026 18:00
Handler:     Michael Schlagenhaufer
Co-Handler:  Felician Fuchs


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Microsoft: Hackers abusing AI at every stage of cyberattacks&lt;/h3&gt;

Microsoft says threat actors are increasingly using artificial intelligence in their operations to accelerate attacks, scale malicious activity, and lower technical barriers across all aspects of a cyberattack.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/microsoft-hackers-abusing-ai-at-every-stage-of-cyberattacks/&quot;&gt;https://www.bleepingcomputer.com/news/security/microsoft-hackers-abusing-ai-at-every-stage-of-cyberattacks/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Termite ransomware breaches linked to ClickFix CastleRAT attacks&lt;/h3&gt;

Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/termite-ransomware-breaches-linked-to-clickfix-castlerat-attacks/&quot;&gt;https://www.bleepingcomputer.com/news/security/termite-ransomware-breaches-linked-to-clickfix-castlerat-attacks/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;VU#976247: Antivirus and Endpoint Detection and Response Archive Scanning Engines may not properly scan malformed zip archives&lt;/h3&gt;

Malformed ZIP headers can cause antivirus and endpoint detection and response software (EDR) to produce false negatives. Despite the presence of malformed headers, some extraction software is still able to decompress the ZIP archive, allowing potentially malicious payloads to run upon file decompression.
&lt;p /&gt;
&lt;A HREF=&quot;https://kb.cert.org/vuls/id/976247&quot;&gt;https://kb.cert.org/vuls/id/976247&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model&lt;/h3&gt;

Anthropic on Friday said it discovered 22 new security vulnerabilities in the Firefox web browser as part of a security partnership with Mozilla. Of these, 14 have been classified as high, seven have been classified as moderate, and one has been rated low in severity.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html&quot;&gt;https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft&lt;/h3&gt;

Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering attackers a way to push malware to downstream customers, inject arbitrary code, and harvest sensitive data.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/03/chrome-extension-turns-malicious-after.html&quot;&gt;https://thehackernews.com/2026/03/chrome-extension-turns-malicious-after.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device&lt;/h3&gt;

The North Korean threat actor known as UNC4899 is suspected to be behind a sophisticated cloud compromise campaign targeting a cryptocurrency organization in 2025 to steal millions of dollars in cryptocurrency.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/03/unc4899-used-airdrop-file-transfer-and.html&quot;&gt;https://thehackernews.com/2026/03/unc4899-used-airdrop-file-transfer-and.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Spyware disguised as emergency-alert app sent to Israeli smartphones&lt;/h3&gt;

Steals SMS messages, location data, contacts and delivers it to Hamas-linked crew Hamas-linked attackers are dropping spyware disguised as an emergency-alert app on Israelis smartphones via SMS messages, according to security researchers.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.theregister.com/2026/03/06/spyware_disguised_as_emergency_alert/&quot;&gt;https://www.theregister.com/2026/03/06/spyware_disguised_as_emergency_alert/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Russian cybercrims phish their way into officials Signal and WhatsApp accounts&lt;/h3&gt;

Dutch spies flag large-scale campaign to hijack secure messaging accounts Russian-linked hackers are trying to break into the Signal and WhatsApp accounts of government officials, journalists, and military personnel globally - not by cracking encryption, but by simply tricking people into handing over the keys.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.theregister.com/2026/03/09/dutch_spies_say_russian_cybercrims/&quot;&gt;https://www.theregister.com/2026/03/09/dutch_spies_say_russian_cybercrims/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Middle East Conflict Fuels Opportunistic Cyber Attacks&lt;/h3&gt;

Threat actors often take advantage of major global events to fuel interest in their malicious activities. Zscaler ThreatLabz is diligently tracking a surge in cybercriminal activity that capitalizes on the elevated political climate in the Middle East. This increased malicious activity includes discoveries that are directly tied to the ongoing conflict, alongside other related findings.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.zscaler.com/blogs/security-research/middle-east-conflict-fuels-opportunistic-cyber-attacks&quot;&gt;https://www.zscaler.com/blogs/security-research/middle-east-conflict-fuels-opportunistic-cyber-attacks&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;NIS2: Warum sich so wenige Unternehmen registrieren&lt;/h3&gt;

Die NIS2-Registrierungsfrist ist verstrichen, doch viele Unternehmen haben sich noch nicht angemeldet. Darum stockt die Umsetzung der Security-Richtlinie.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Douglas-Adams-wuerde-NIS2-lieben-11204285.html&quot;&gt;https://www.heise.de/news/Douglas-Adams-wuerde-NIS2-lieben-11204285.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;DumpBrowserSecrets - Browser Credential Harvesting with App-Bound Encryption Bypass&lt;/h3&gt;

DumpBrowserSecrets extracts saved passwords, cookies, OAuth tokens and autofill data from Chrome, Edge, Firefox, Opera and Vivaldi, bypassing App-Bound Encryption via Early Bird APC injection.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.darknet.org.uk/2026/03/dumpbrowsersecrets-browser-credential-harvesting-with-app-bound-encryption-bypass/&quot;&gt;https://www.darknet.org.uk/2026/03/dumpbrowsersecrets-browser-credential-harvesting-with-app-bound-encryption-bypass/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LTR101 - Getting into Industry in 2026&lt;/h3&gt;

Breaking into cybersecurity in 2026: SOC roles, blue team skills, labs, certifications, and practical advice to help you land your first job.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.zsec.uk/ltr101-getting-into-industry-in-2026/&quot;&gt;https://blog.zsec.uk/ltr101-getting-into-industry-in-2026/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;AI Bot Hackerbot-Claw Targets Microsoft, DataDog and CNCF GitHub Repos&lt;/h3&gt;

Security firm Pillar reveals the Chaos Agent in which Hackerbot-Claw, an AI agent, used natural language to compromise major GitHub projects and hijack developer tools.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/ai-bot-hackerbot-claw-microsoft-datadog-github-repos/&quot;&gt;https://hackread.com/ai-bot-hackerbot-claw-microsoft-datadog-github-repos/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Behind the console: Active phishing campaign targeting AWS console credentials&lt;/h3&gt;

Datadog Security Research identified an active adversary-in-the-middle (AiTM) phishing campaign targeting AWS Console credentials via typosquatted domains that mimic AWS infrastructure.
&lt;p /&gt;
&lt;A HREF=&quot;https://securitylabs.datadoghq.com/articles/behind-the-console-aws-aitm-phishing-campaign/&quot;&gt;https://securitylabs.datadoghq.com/articles/behind-the-console-aws-aitm-phishing-campaign/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;The first AI agent worm is months away, if that&lt;/h3&gt;

I'm convinced that the first AI worm/virus is months away, if that. We've seen the first major evidence of &quot;claw&quot; style agents, which have only been around very briefly, acting in highly malicious ways.
&lt;p /&gt;
&lt;A HREF=&quot;https://dustycloud.org/blog/the-first-ai-agent-worm-is-months-away-if-that/&quot;&gt;https://dustycloud.org/blog/the-first-ai-agent-worm-is-months-away-if-that/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;ClipXDaemon Malware, a Stealthy Cryptocurrency Clipboard Hijacker on Linux&lt;/h3&gt;

Security researchers have identified a new Linux malware strain called ClipXDaemon, a stealthy threat designed to target cryptocurrency users by manipulating copied wallet addresses.   Cyble-s Research &amp; Intelligence Labs (CRIL) found the malware delivered through a loader structure previously associated with ShadowHS activity.
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/clipxdaemon-linux-malware/&quot;&gt;https://thecyberexpress.com/clipxdaemon-linux-malware/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Nextcloud: Codeschmuggel durch Lücke in Flow möglich&lt;/h3&gt;

In Nextcloud Flow können Angreifer eine Sicherheitslücke missbrauchen, um die Instanz zu kompromittieren. Ein Update steht bereit.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11203404&quot;&gt;https://heise.de/-11203404&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Critical Nginx UI Vulnerability Exposes Server Backups and Sensitive Data&lt;/h3&gt;

A newly disclosed vulnerability in Nginx UI, tracked as CVE-2026-27944, has raised major security concerns after researchers confirmed that attackers can download and decrypt server backups without authentication. The flaw, which carries a CVSS score of 9.8, represents a critical security risk for organizations that expose their Nginx UI management interface to the public internet.
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/cve-2026-27944-nginx-ui-backup-vulnerability/&quot;&gt;https://thecyberexpress.com/cve-2026-27944-nginx-ui-backup-vulnerability/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN Security updates for Monday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1062103/&quot;&gt;https://lwn.net/Articles/1062103/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-03-09T19:03:39Z</dc:date></entry><entry><title>Tageszusammenfassung - 06.03.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/3/tagesberichte-06032026"/><author><name>CERT.at</name></author><updated>2026-03-06T18:36:46Z</updated><published>2026-03-06T18:36:46Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Donnerstag 05-03-2026 18:00 - Freitag 06-03-2026 18:00
Handler:     Felician Fuchs
Co-Handler:  Michael Schlagenhaufer


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Wikipedia hit by self-propagating JavaScript worm that vandalized pages&lt;/h3&gt;

The Wikimedia Foundation suffered a security incident today after a self-propagating JavaScript worm began vandalizing pages and modifying user scripts across multiple wikis.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/wikipedia-hit-by-self-propagating-javascript-worm-that-vandalized-pages/&quot;&gt;https://www.bleepingcomputer.com/news/security/wikipedia-hit-by-self-propagating-javascript-worm-that-vandalized-pages/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Fake Claude Code install guides push infostealers in InstallFix attacks&lt;/h3&gt;

Threat actors are employing a new variation of the ClickFix social engineering technique called InstallFix to convince users into running malicious commands under the pretext of installing legitimate command line interface (CLI) tools.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/fake-claude-code-install-guides-push-infostealers-in-installfix-attacks/&quot;&gt;https://www.bleepingcomputer.com/news/security/fake-claude-code-install-guides-push-infostealers-in-installfix-attacks/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cyberangriff: Das FBI hat offenbar Hacker im Netzwerk&lt;/h3&gt;

Beim FBI ist offenbar ein System zur Verwaltung von Überwachungsmaßnahmen kompromittiert worden. Die Behörde untersucht verdächtige Aktivitäten.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/cyberangriff-das-fbi-hat-offenbar-hacker-im-netzwerk-2603-206170.html&quot;&gt;https://www.golem.de/news/cyberangriff-das-fbi-hat-offenbar-hacker-im-netzwerk-2603-206170.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Datenschutz: FBI gelangt an Zahlungsdaten von Protonmail&lt;/h3&gt;

Durch Rechtshilfeabkommen können persönliche Daten auch aus der Schweiz an Strafverfolgungsbehörden in den USA gelangen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/datenschutz-fbi-gelangt-an-zahlungsdaten-von-protonmail-2603-206199.html&quot;&gt;https://www.golem.de/news/datenschutz-fbi-gelangt-an-zahlungsdaten-von-protonmail-2603-206199.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer&lt;/h3&gt;

Microsoft on Thursday disclosed details of a new widespread ClickFix social engineering campaign that has leveraged the Windows Terminal app as a way to activate a sophisticated attack chain and deploy the Lumma Stealer malware.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/03/microsoft-reveals-clickfix-campaign.html&quot;&gt;https://thehackernews.com/2026/03/microsoft-reveals-clickfix-campaign.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT&lt;/h3&gt;

Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various encrypted remote access trojan (RATs) payloads that correspond to XWorm, AsyncRAT, and Xeno RAT.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html&quot;&gt;https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Warnung vor Angriffen auf Hikvision, Rockwell Automation und Apple-Produkte&lt;/h3&gt;

Die US-amerikanische IT-Sicherheitsbehörde CISA warnt vor aktuellen Angriffen auf Hikvision, Rockwell Automation und Apple-Produkte.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Warnung-vor-Angriffen-auf-Hikvision-Rockwell-Automation-und-Apple-Produkte-11201384.html&quot;&gt;https://www.heise.de/news/Warnung-vor-Angriffen-auf-Hikvision-Rockwell-Automation-und-Apple-Produkte-11201384.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;London: Bei Cyberangriff auf Verkehrsbehörde zehn Millionen Datensätze gestohlen&lt;/h3&gt;

2024 gab es einen Cyberangriff auf die britische Behörde TfL. Nun ist herausgekommen: Dabei wurden auch Daten von zehn Millionen Kundinnen und Kunden gestohlen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/London-Zehn-Millionen-Datensaetze-bei-Cyberangriff-auf-Verkehrsbehoerde-gestohlen-11202301.html&quot;&gt;https://www.heise.de/news/London-Zehn-Millionen-Datensaetze-bei-Cyberangriff-auf-Verkehrsbehoerde-gestohlen-11202301.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;BSI: 11.500 kritische Einrichtungen unter NIS2 registriert&lt;/h3&gt;

Zum Registrierungsfristende haben tausende Unternehmen den Prozess abgeschlossen - doch knapp 20.000 fehlen wohl noch.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/BSI-11-500-kritische-Einrichtungen-unter-NIS2-registriert-11202673.html&quot;&gt;https://www.heise.de/news/BSI-11-500-kritische-Einrichtungen-unter-NIS2-registriert-11202673.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Fake CleanMyMac site installs SHub Stealer and backdoors crypto wallets&lt;/h3&gt;

We uncovered a fake CleanMyMac site delivering SHub Stealer, a macOS infostealer that steals credentials and silently backdoors crypto wallets.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.malwarebytes.com/blog/threat-intel/2026/03/fake-cleanmymac-site-installs-shub-stealer-and-backdoors-crypto-wallets&quot;&gt;https://www.malwarebytes.com/blog/threat-intel/2026/03/fake-cleanmymac-site-installs-shub-stealer-and-backdoors-crypto-wallets&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;An Investigation Into Years of Undetected Operations Targeting High-Value Sectors&lt;/h3&gt;

In-depth analysis of threat activity we call CL-UNK-1068. We discuss their toolset, including tunneling, reconnaissance and credential theft.
&lt;p /&gt;
&lt;A HREF=&quot;https://unit42.paloaltonetworks.com/cl-unk-1068-targets-critical-sectors/&quot;&gt;https://unit42.paloaltonetworks.com/cl-unk-1068-targets-critical-sectors/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;The Hidden Cyber Risks of Remote Work Infrastructure&lt;/h3&gt;

Hidden cyber risks in remote work include insecure home Wi-Fi, phishing attacks, and data exposure, leaving businesses and employees vulnerable to breaches.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/hidden-cyber-risks-remote-work-infrastructure/&quot;&gt;https://hackread.com/hidden-cyber-risks-remote-work-infrastructure/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Avira: Deserialize, Delete and Escalate - The Proper Way to Use an AV&lt;/h3&gt;

Avira Internet Security ships with a handful of modules that quietly handle privileged operations in the background: software updates, performance monitoring and system cleanup. Each one runs parts of its workflow as SYSTEM. Three of them dont bother checking what they are actually operating on.
&lt;p /&gt;
&lt;A HREF=&quot;http://blog.quarkslab.com/avira-deserialize-delete-and-escalate-the-proper-way-to-use-an-av.html&quot;&gt;http://blog.quarkslab.com/avira-deserialize-delete-and-escalate-the-proper-way-to-use-an-av.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;A GitHub Issue Title Compromised 4,000 Developer Machines&lt;/h3&gt;

The attack - which Snyk named &quot;Clinejection&quot;2 - composes five well-understood vulnerabilities into a single exploit that requires nothing more than opening a GitHub issue.
&lt;p /&gt;
&lt;A HREF=&quot;https://grith.ai/blog/clinejection-when-your-ai-tool-installs-another&quot;&gt;https://grith.ai/blog/clinejection-when-your-ai-tool-installs-another&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Fake imToken Chrome Extension Steals Seed Phrases via Phishing Redirects&lt;/h3&gt;

Socket-s Threat Research Team uncovered a malicious Chrome extension, lm-oken Chromophore (extension ID bbhaganppipihlhjgaaeeeefbaoihcgi), that impersonates imToken while presenting itself as a hex color visualizer in the Chrome Web Store. Instead of providing the harmless tool it promises, the extension automatically opens a threat actor-controlled phishing site as soon as it is installed, and again whenever the user clicks it.
&lt;p /&gt;
&lt;A HREF=&quot;https://socket.dev/blog/fake-imtoken-chrome-extension-steals-seed-phrases-via-phishing-redirects&quot;&gt;https://socket.dev/blog/fake-imtoken-chrome-extension-steals-seed-phrases-via-phishing-redirects&lt;/a&gt;

&lt;hr&gt;
&lt;h3&gt;A Satellite Receiver Trusted by Pentagon, ESA Has More Than 20 Security Flaws - and the Maker Never Responded&lt;/h3&gt;

A penetration tester found more than 20 vulnerabilities in a satellite receiver deployed by the U.S. Department of Defense (also referred to as the Department of War), the European Space Agency, and other critical infrastructure operators worldwide - and the device-s manufacturer, International Data Casting Corporation (IDC), did not respond to a single disclosure attempt over several months.
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/satellite-receiver-vulnerabilities-unpatched/&quot;&gt;https://thecyberexpress.com/satellite-receiver-vulnerabilities-unpatched/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;WordPress membership plugin bug exploited to create admin accounts&lt;/h3&gt;

Hackers are exploiting a critical vulnerability in the User Registration &amp; Membership plugin, which is installed on more than 60,000 WordPress sites.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/wordpress-membership-plugin-bug-exploited-to-create-admin-accounts/&quot;&gt;https://www.bleepingcomputer.com/news/security/wordpress-membership-plugin-bug-exploited-to-create-admin-accounts/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Acronis warnt vor zig Sicherheitslücken in Cyber Protect&lt;/h3&gt;

Vor mehr als 20 Sicherheitslücken in Cyber Protect warnt Acronis aktuell. Admins sollten bereitstehende Updates rasch anwenden.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Acronis-Cyber-Protect-Zig-Schwachstellen-gefaehrden-Unternehmenssoftware-11201761.html&quot;&gt;https://www.heise.de/news/Acronis-Cyber-Protect-Zig-Schwachstellen-gefaehrden-Unternehmenssoftware-11201761.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN Security updates for Friday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1061738/&quot;&gt;https://lwn.net/Articles/1061738/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-03-06T18:36:46Z</dc:date></entry><entry><title>Tageszusammenfassung - 05.03.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/3/tagesberichte-05032026"/><author><name>CERT.at</name></author><updated>2026-03-05T19:24:39Z</updated><published>2026-03-05T19:24:39Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Mittwoch 04-03-2026 18:00 - Donnerstag 05-03-2026 18:00
Handler:     Michael Schlagenhaufer
Co-Handler:  Felician Fuchs


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers&lt;/h3&gt;

A maximum severity vulnerability in the FreeScout helpdesk platform allows hackers to achieve remote code execution without any user interaction or authentication. [..] The flaw is tracked as CVE-2026-28289 and bypasses a fix for another remote code execution (RCE) security issue (CVE-2026-27636) that could be exploited by authenticated users with upload permissions.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/mail2shell-zero-click-attack-lets-hackers-hijack-freescout-mail-servers/&quot;&gt;https://www.bleepingcomputer.com/news/security/mail2shell-zero-click-attack-lets-hackers-hijack-freescout-mail-servers/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Kritische Sicherheitslücken in Cisco Secure Firewall Produkten - Updates verfügbar&lt;/h3&gt;

Cisco hat am 4. März 2026 mehrere Advisories veröffentlicht, die insgesamt 17 Schwachstellen in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, Cisco Secure Firewall Threat Defense (FTD) Software und Cisco Secure Firewall Management Center (FMC) Software adressieren.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cert.at/de/warnungen/2026/3/kritische-sicherheitslucken-in-cisco-secure-firewall-produkten-updates-verfugbar&quot;&gt;https://www.cert.at/de/warnungen/2026/3/kritische-sicherheitslucken-in-cisco-secure-firewall-produkten-updates-verfugbar&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Google says 90 zero-days were exploited in attacks last year&lt;/h3&gt;

Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/google-says-90-zero-days-were-exploited-in-attacks-last-year/&quot;&gt;https://www.bleepingcomputer.com/news/security/google-says-90-zero-days-were-exploited-in-attacks-last-year/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Malware-laced OpenClaw installers get Bing AI search boost&lt;/h3&gt;

Think before you download OpenClaw, the AI agent that can manage just about anything, is risky all by itself, but now fake installers for it are wreaking havoc. Users who searched Bing-s AI results for -OpenClaw Windows- were directed to a malicious GitHub repository that delivered information stealers and GhostSocks onto their machines.
&lt;p /&gt;
&lt;A HREF=&quot;https://go.theregister.com/feed/www.theregister.com/2026/03/04/fake_openclaw_installers_malware/&quot;&gt;https://go.theregister.com/feed/www.theregister.com/2026/03/04/fake_openclaw_installers_malware/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cybercrime: Behörden schalten das Datenleak-Forum LeakBase ab&lt;/h3&gt;

Nach der Beschlagnahmung der LeakBase-Datenbank, einem der weltweit größten Cybercrime-Foren, identifizierten und verhafteten die Behörden mehrere Verdächtige.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Cybercrime-Behoerden-schalten-das-Datenleak-Forum-LeakBase-ab-11199616.html&quot;&gt;https://www.heise.de/news/Cybercrime-Behoerden-schalten-das-Datenleak-Forum-LeakBase-ab-11199616.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Europäische Strafverfolger zerschlagen Phishing-Plattform&lt;/h3&gt;

Tycoon2FA gehörte zu den weltweit größten Phishing-Operationen. Sie ermöglichte Kriminellen unbemerkten Zugriff auf E-Mail-Konten. Nun wurde sie abgeschaltet.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Europaeische-Strafverfolgungsbehoerden-zerschlagen-Phishing-Plattform-11199550.html&quot;&gt;https://www.heise.de/news/Europaeische-Strafverfolgungsbehoerden-zerschlagen-Phishing-Plattform-11199550.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;New BoryptGrab Stealer Targets Windows Users via Deceptive GitHub Pages&lt;/h3&gt;

The BoryptGrab campaign illustrates an evolving threat ecosystem targeting users through deceptive software downloads and fake GitHub repositories. Across its many variants, the stealer demonstrates extensive data-harvesting capabilities, with its ability to dynamically stage payloads, bypass analysis through anti-VM and anti-debug checks and offload sensitive operations to encrypted payloads showing a level of engineering sophistication that continues to increase.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.trendmicro.com/en_us/research/26/c/boryptgrab-stealer-targets-users-via-deceptive-github-pages.html&quot;&gt;https://www.trendmicro.com/en_us/research/26/c/boryptgrab-stealer-targets-users-via-deceptive-github-pages.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Fake Zoom, Teams Meeting Invites Use Compromised Certificates to Drop Malware&lt;/h3&gt;

A new phishing campaign is using stolen certificates from TrustConnect Software PTY LTD to sign malware. By impersonating updates for Zoom and Microsoft Teams, hackers install RMM tools to gain persistent, privileged access to networks.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/fake-zoom-teams-invites-malware-certificates/&quot;&gt;https://hackread.com/fake-zoom-teams-invites-malware-certificates/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cyberangriffe im Jahr 2026: Der Login als Waffe&lt;/h3&gt;

Cyberkriminelle und nationalstaatliche Akteure verlagern ihren Fokus zunehmend weg vom aufwendigen Eindringen in Systeme, wie aus Cloudflares Bedrohungsbericht 2026 hervorgeht. Stattdessen setzen sie eher auf das effizientere Einloggen mit gestohlenen Zugangsdaten.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11200132&quot;&gt;https://heise.de/-11200132&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Drupal: AJAX Dashboard - Critical - Access bypass - SA-CONTRIB-2026-022&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.drupal.org/sa-contrib-2026-022&quot;&gt;https://www.drupal.org/sa-contrib-2026-022&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Drupal: Google Analytics GA4 - Moderately critical - Cross-site Scripting - SA-CONTRIB-2026-024&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.drupal.org/sa-contrib-2026-024&quot;&gt;https://www.drupal.org/sa-contrib-2026-024&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN: Security updates for Thursday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1061464/&quot;&gt;https://lwn.net/Articles/1061464/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-03-05T19:24:39Z</dc:date></entry><entry><title>Tageszusammenfassung - 04.03.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/3/tagesberichte-04032026"/><author><name>CERT.at</name></author><updated>2026-03-04T18:56:43Z</updated><published>2026-03-04T18:56:43Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Dienstag 03-03-2026 18:00 - Mittwoch 04-03-2026 18:00
Handler:     Guenes Holler
Co-Handler:  Michael Schlagenhaufer


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations&lt;/h3&gt;

The intrusions, identified by Huntress last month across five partner organizations, involved the threat actors using email spam as lures, followed by a phone call from an IT desk that activates a layered malware delivery pipeline.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/03/fake-tech-support-spam-deploys.html&quot;&gt;https://thehackernews.com/2026/03/fake-tech-support-spam-deploys.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Angriffe auf VMware Aria Operations beobachtet&lt;/h3&gt;

In der vergangenen Woche hatte Broadcom eine Warnung veröffentlicht, die Sicherheitslecks in VMware Aria Operations betraf. Die Software kommt auch in Cloud Foundation, Telco Cloud Platform, Telco Cloud Infrastructure und vSphere Foundation zum Einsatz, sodass auch diese verwundbar sind. Die CISA meldet nun Angriffe auf eine Schwachstelle, die nicht authentifizierten Akteuren das Ausführen beliebiger Befehle und in der Folge von beliebigem Schadcode aus dem Netz in VMware Aria Operations ermöglicht. 
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Angriffe-auf-VMware-Aria-Operations-beobachtet-11198060.html&quot;&gt;https://www.heise.de/news/Angriffe-auf-VMware-Aria-Operations-beobachtet-11198060.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;ESC-Tickets: Hohes Risiko bei Kauf über hellotickets.de!&lt;/h3&gt;

Bis zum großen Spektakel des Eurovision Song Contest (ESC) sind es noch knapp zwei Monate. Alle Shows sind bereits ausverkauft. Dennoch werden auf der Website hellotickets.de vermeintlich weiterhin Eintrittskarten angeboten.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/esc-tickets-hohes-risiko-helloticketsde/&quot;&gt;https://www.watchlist-internet.at/news/esc-tickets-hohes-risiko-helloticketsde/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Telegram Increasingly Used to Sell Access, Malware and Stolen Logs&lt;/h3&gt;

Cybercriminals are now increasingly using Telegram to sell corporate access, malware subscriptions, and stealer logs, turning the messaging app into a fast cybercrime hub.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/telegram-used-sell-access-malware-stolen-logs/&quot;&gt;https://hackread.com/telegram-used-sell-access-malware-stolen-logs/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Cisco Security Advisories 2026 Mar 04&lt;/h3&gt;

On March 4, 2026, Cisco released 27 new security advisories. Two of these advisories impact the Cisco Firewall Management Center and have been classified as critical (Authentication Bypass CVE-2026-20079 and Remote Code Execution CVE-2026-20131).
&lt;p /&gt;
&lt;A HREF=&quot;https://sec.cloudapps.cisco.com/security/center/publicationListing.x&quot;&gt;https://sec.cloudapps.cisco.com/security/center/publicationListing.x&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Vulnerability &amp; Patch Roundup - February 2026&lt;/h3&gt;

To help educate website owners about potential threats to their environments, we-ve compiled a list of important security updates and vulnerability patches for the WordPress ecosystem this past month.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.sucuri.net/2026/02/vulnerability-patch-roundup-february-2026.html&quot;&gt;https://blog.sucuri.net/2026/02/vulnerability-patch-roundup-february-2026.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN: Security updates for Wednesday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1061295/&quot;&gt;https://lwn.net/Articles/1061295/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;[R1] Nessus Manager Versions 10.10.3 and 10.11.3 Fix One Vulnerability&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.tenable.com/security/tns-2026-08&quot;&gt;https://www.tenable.com/security/tns-2026-08&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-03-04T18:56:43Z</dc:date></entry><entry><title>Tageszusammenfassung - 03.03.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/3/tagesberichte-03032026"/><author><name>CERT.at</name></author><updated>2026-03-03T19:25:44Z</updated><published>2026-03-03T19:25:44Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Montag 02-03-2026 18:00 - Dienstag 03-03-2026 18:00
Handler:     Felician Fuchs
Co-Handler:  Michael Schlagenhaufer


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;LLMs can unmask pseudonymous users at scale with surprising accuracy&lt;/h3&gt;

Pseudonymity has never been perfect for preserving privacy. Soon it may be pointless.
&lt;p /&gt;
&lt;A HREF=&quot;https://arstechnica.com/security/2026/03/llms-can-unmask-pseudonymous-users-at-scale-with-surprising-accuracy/&quot;&gt;https://arstechnica.com/security/2026/03/llms-can-unmask-pseudonymous-users-at-scale-with-surprising-accuracy/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Fake Google Security site uses PWA app to steal credentials, MFA codes&lt;/h3&gt;

A phishing campaign is using a fake Google Account security page to deliver a web-based app capable of stealing one-time passcodes, harvesting cryptocurrency wallet addresses, and proxying attacker traffic through victims browsers.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/fake-google-security-site-uses-pwa-app-to-steal-credentials-mfa-codes/&quot;&gt;https://www.bleepingcomputer.com/news/security/fake-google-security-site-uses-pwa-app-to-steal-credentials-mfa-codes/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets&lt;/h3&gt;

Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers. The activity, the company said, targets government and public-sector organizations with the end goal of redirecting victims to attacker-controlled infrastructure without stealing their tokens.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/03/microsoft-warns-oauth-redirect-abuse.html&quot;&gt;https://thehackernews.com/2026/03/microsoft-warns-oauth-redirect-abuse.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries&lt;/h3&gt;

The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/03/open-source-cyberstrikeai-deployed-in.html&quot;&gt;https://thehackernews.com/2026/03/open-source-cyberstrikeai-deployed-in.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Until last month, attackers couldve stolen info from Perplexity Comet users just by sending a calendar invite&lt;/h3&gt;

AI browsing agent left local files open for the taking If you wanted to steal local files from someone using Perplexitys Comet browser, until last month you could just schedule the theft by sending your victim a calendar event.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.theregister.com/2026/03/03/perplexity_comet_browser_hole_cal_invite/&quot;&gt;https://www.theregister.com/2026/03/03/perplexity_comet_browser_hole_cal_invite/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Breaking Out of Citrix and other Restricted Desktop Environments&lt;/h3&gt;

Many organisations are turning to virtualisation of apps and desktops. This often involves virtualisation platforms such as Citrix to deliver these services. Get your configuration or lock-down wrong and you-ll find users -breaking out- of the environment you thought you had secured.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.pentestpartners.com/security-blog/breaking-out-of-citrix-and-other-restricted-desktop-environments/&quot;&gt;https://www.pentestpartners.com/security-blog/breaking-out-of-citrix-and-other-restricted-desktop-environments/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Fake-Hotelwebsite als Basis für Kombi-Betrugsmasche&lt;/h3&gt;

Über den gefälschten Online-Auftritt eines Hotels versuchen Kriminelle an die Kontaktdaten und (vermutlich) das Geld ihrer Opfer zu gelangen. Zusätzlich nutzen sie die Domain der Fake-Seite für den Versand von Phishing-Mails.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/fake-hotelwebsite-kombi-betrugsmasche/&quot;&gt;https://www.watchlist-internet.at/news/fake-hotelwebsite-kombi-betrugsmasche/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Anonymous credentials: an illustrated primer&lt;/h3&gt;

This post has been on my back burner for well over a year. This has bothered me, because every month that goes by I become more convinced that anonymous authentication the most important topic we could be talking about as cryptographers. This is because I-m very worried that we-re headed into a bit of a privacy dystopia, driven largely by bad legislation and the proliferation of AI.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.cryptographyengineering.com/2026/03/02/anonymous-credentials-an-illustrated-primer/&quot;&gt;https://blog.cryptographyengineering.com/2026/03/02/anonymous-credentials-an-illustrated-primer/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran&lt;/h3&gt;

Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations for defenders.
&lt;p /&gt;
&lt;A HREF=&quot;https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/&quot;&gt;https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Silver Dragon: China Nexus Cyber Espionage Group Targeting Governments in Asia and Europe&lt;/h3&gt;

Silver Dragon is a China nexus cyber espionage group targeting government ministries and public sector organizations across Southeast Asia, with additional victims identified in Europe. The group gains initial access through exploitation of public-facing servers and targeted phishing campaigns aimed at government entities.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.checkpoint.com/research/silver-dragon-china-nexus-cyber-espionage-group-targeting-governments-in-asia-and-europe/&quot;&gt;https://blog.checkpoint.com/research/silver-dragon-china-nexus-cyber-espionage-group-targeting-governments-in-asia-and-europe/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hackers Abuse .arpa Top-Level Domain to Host Phishing Scams&lt;/h3&gt;

Hackers abuse the .arpa Top-Level Domain to host phishing scams, using IPv6 tunnels, reverse DNS tricks, and shadow domains to bypass security checks.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/hackers-arpa-top-level-domain-phishing-scams/&quot;&gt;https://hackread.com/hackers-arpa-top-level-domain-phishing-scams/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit&lt;/h3&gt;

Google Threat Intelligence Group (GTIG) has identified a new and powerful exploit kit targeting Apple iPhone models running iOS version 13.0 (released in September 2019) up to version 17.2.1 (released in December 2023). The exploit kit, named -Coruna- by its developers, contained five full iOS exploit chains and a total of 23 exploits.
&lt;p /&gt;
&lt;A HREF=&quot;https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit/&quot;&gt;https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Analysis of an Integrated Phishing Campaign Utilizing Google Cloud Infrastructure&lt;/h3&gt;

In recent weeks, a highly organized phishing campaign has surfaced, characterized by its use of legitimate Google infrastructure to bypass standard security filters. I have identified more than 25 distinct phishing emails targeting a single account, all of which ultimately direct users to a specific URL: hxxps://storage[.]googleapis[.]com/whilewait/comessuccess.html.
&lt;p /&gt;
&lt;A HREF=&quot;https://malwr-analysis.com/2026/03/03/analysis-of-an-integrated-phishing-campaign-utilizing-google-cloud-infrastructure/&quot;&gt;https://malwr-analysis.com/2026/03/03/analysis-of-an-integrated-phishing-campaign-utilizing-google-cloud-infrastructure/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Sometimes, You Can Just Feel The Security In The Design (Juniper Junos Evolved CVE-2026-21902 Pre-Auth RCE)&lt;/h3&gt;

On today-s -good news disguised as other things- segment, we-re turning our gaze to CVE-2026-21902 - a recently disclosed -Incorrect Permission Assignment for Critical Resource- vulnerability affecting Juniper-s Junos OS Evolved platform. This vulnerability affects only Juniper-s PTX Series of devices, apparently.
&lt;p /&gt;
&lt;A HREF=&quot;https://labs.watchtowr.com/sometimes-you-can-just-feel-the-security-in-the-design-junos-os-evolved-cve-2026-21902-rce/&quot;&gt;https://labs.watchtowr.com/sometimes-you-can-just-feel-the-security-in-the-design-junos-os-evolved-cve-2026-21902-rce/&lt;/a&gt;

&lt;hr&gt;

&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Gefährliche Sicherheitslücke: Angriffe auf Android-Nutzer beobachtet&lt;/h3&gt;

Eine gefährliche Sicherheitslücke in einer Grafikkomponente von Qualcomm wird aktiv ausgenutzt. Android-Nutzer sollten so bald wie möglich updaten.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/gefaehrliche-sicherheitsluecke-angriffe-auf-android-nutzer-beobachtet-2603-206025.html&quot;&gt;https://www.golem.de/news/gefaehrliche-sicherheitsluecke-angriffe-auf-android-nutzer-beobachtet-2603-206025.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;HPE AutoPass License Server erlaubt Umgehung der Authentifizierung&lt;/h3&gt;

HPE warnt vor einer gravierenden Sicherheitslücke im HPE AutoPass Lizenzserver (APLS). Die Authentifizierung lässt sich umgehen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/HPE-AutoPass-License-Server-erlaubt-Umgehung-der-Authentifizierung-11196562.html&quot;&gt;https://www.heise.de/news/HPE-AutoPass-License-Server-erlaubt-Umgehung-der-Authentifizierung-11196562.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;HCL BigFix: Angreifer können auf Daten im Dateisystem zugreifen&lt;/h3&gt;

Die Endpoint-Management-Plattform HCL BigFix ist verwundbar. Sicherheitsupdates sind verfügbar.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/HCL-BigFix-Angreifer-koennen-auf-Daten-im-Dateisystem-zugreifen-11196966.html&quot;&gt;https://www.heise.de/news/HCL-BigFix-Angreifer-koennen-auf-Daten-im-Dateisystem-zugreifen-11196966.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN Security updates for Tuesday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1061043/&quot;&gt;https://lwn.net/Articles/1061043/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-03-03T19:25:44Z</dc:date></entry><entry><title>Tageszusammenfassung - 02.03.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/3/tagesberichte-02032026"/><author><name>CERT.at</name></author><updated>2026-03-02T19:26:53Z</updated><published>2026-03-02T19:26:53Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Freitag 27-02-2026 18:00 - Montag 02-03-2026 18:00
Handler:     Felician Fuchs
Co-Handler:  Michael Schlagenhaufer


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Microsoft testing Windows 11 batch file security improvements&lt;/h3&gt;

Microsoft is rolling out new Windows 11 Insider Preview builds that improve security and performance during batch file or CMD script execution.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/microsoft/microsoft-testing-windows-11-batch-file-security-improvements/&quot;&gt;https://www.bleepingcomputer.com/news/microsoft/microsoft-testing-windows-11-batch-file-security-improvements/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;QuickLens Chrome extension steals crypto, shows ClickFix attack&lt;/h3&gt;

A Chrome extension named &quot;QuickLens - Search Screen with Google Lens&quot; has been removed from the Chrome Web Store after it was compromised to push malware and attempt to steal crypto from thousands of users.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/quicklens-chrome-extension-steals-crypto-shows-clickfix-attack/&quot;&gt;https://www.bleepingcomputer.com/news/security/quicklens-chrome-extension-steals-crypto-shows-clickfix-attack/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;UK warns of Iranian cyberattack risks amid Middle-East conflict&lt;/h3&gt;

The United Kingdoms National Cyber Security Centre (NCSC) alerted British organizations to a heightened risk of Iranian cyberattacks amid the ongoing conflict in the Middle East.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/uk-warns-of-iranian-cyberattack-risks-amid-middle-east-conflict/&quot;&gt;https://www.bleepingcomputer.com/news/security/uk-warns-of-iranian-cyberattack-risks-amid-middle-east-conflict/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;A fake FileZilla site hosts a malicious download&lt;/h3&gt;

A tampered copy of FileZilla quietly contacts attacker-controlled servers using encrypted DNS traffic that can slip past traditional monitoring.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.malwarebytes.com/blog/threat-intel/2026/03/a-fake-filezilla-site-hosts-a-malicious-download&quot;&gt;https://www.malwarebytes.com/blog/threat-intel/2026/03/a-fake-filezilla-site-hosts-a-malicious-download&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;FinanzOnline-Phishing: Kriminelle drohen mit Hausratpfändung&lt;/h3&gt;

Oh Schreck: Eine Pfändung des Hausrats droht, weil ein offener Betrag trotz mehrerer Mahnungen nicht bezahlt worden sein soll. Genau das behauptet derzeit eine E-Mail, die angeblich von FinanzOnline stammt. Tatsächlich handelt es sich dabei aber nicht um eine echte Zahlungsaufforderung.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/finanzonline-phishing-hausratpfaendung/&quot;&gt;https://www.watchlist-internet.at/news/finanzonline-phishing-hausratpfaendung/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel&lt;/h3&gt;

A high-severity CVE-2026-0628 in Chromes Gemini allowed local file access and privacy invasion. Google quickly patched the flaw.
&lt;p /&gt;
&lt;A HREF=&quot;https://unit42.paloaltonetworks.com/gemini-live-in-chrome-hijacking/&quot;&gt;https://unit42.paloaltonetworks.com/gemini-live-in-chrome-hijacking/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Active Reconnaissance Campaign Targets SonicWall Firewalls Through Commercial Proxy Infrastructure&lt;/h3&gt;

84,000+ scanning sessions targeting SonicWall SonicOS infrastructure in four days. GreyNoise details a coordinated reconnaissance campaign using rotating proxy infrastructure.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.greynoise.io/blog/active-reconnaissance-campaign-targets-sonicwall-firewalls-through-commercial-proxy-infrastructure&quot;&gt;https://www.greynoise.io/blog/active-reconnaissance-campaign-targets-sonicwall-firewalls-through-commercial-proxy-infrastructure&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cultivating a robust and efficient quantum-safe HTTPS&lt;/h3&gt;

Today we're announcing a new program in Chrome to make HTTPS certificates secure against quantum computers. The Internet Engineering Task Force (IETF) recently created a working group, PKI, Logs, And Tree Signatures (-PLANTS-), aiming to address the performance and bandwidth challenges that the increased size of quantum-resistant cryptography introduces into TLS connections requiring Certificate Transparency (CT).
&lt;p /&gt;
&lt;A HREF=&quot;https://security.googleblog.com/2026/02/cultivating-robust-and-efficient.html&quot;&gt;https://security.googleblog.com/2026/02/cultivating-robust-and-efficient.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Stop Putting Secrets in .env Files&lt;/h3&gt;

[..] Why do we still store credentials in plaintext .env files?
&lt;p /&gt;
&lt;A HREF=&quot;https://jonmagic.com/posts/stop-putting-secrets-in-dotenv-files/&quot;&gt;https://jonmagic.com/posts/stop-putting-secrets-in-dotenv-files/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Fooling Gos X.509 Certificate Verification&lt;/h3&gt;

Below are two X.509 certificates. The first is the Certificate Authority (CA) root certificate, and the second is a leaf certifcate signed by the private key of the CA.
&lt;p /&gt;
&lt;A HREF=&quot;https://danielmangum.com/posts/fooling-go-x509-certificate-verification/&quot;&gt;https://danielmangum.com/posts/fooling-go-x509-certificate-verification/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Agents attacking agents: AI-powered bot exploiting GitHub Actions&lt;/h3&gt;

A week-long automated attack campaign targeted CI/CD pipelines across major open source repositories, achieving remote code execution in multiple targets. The attacker, an autonomous bot called hackerbot-claw, used 5 different exploitation techniques and successfully exfiltrated a GitHub token with write permissions from one of the most popular repositories on GitHub.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.stepsecurity.io/blog/hackerbot-claw-github-actions-exploitation&quot;&gt;https://www.stepsecurity.io/blog/hackerbot-claw-github-actions-exploitation&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Checkmk: Hochriskante Cross-Site-Scripting-Lücke in Netzwerk-Monitor-Software&lt;/h3&gt;

Die Entwickler haben aktualisierte Checkmk-Versionen herausgegeben. Sie schließen eine mindestens hochriskante Cross-Site-Scripting-Lücke.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Checkmk-Hochriskante-Cross-Site-Scripting-Luecke-in-Netzwerk-Monitor-Software-11194483.html&quot;&gt;https://www.heise.de/news/Checkmk-Hochriskante-Cross-Site-Scripting-Luecke-in-Netzwerk-Monitor-Software-11194483.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Unauthorized AI Agent Execution Code Published to OpenVSX in Aqua Trivy VS Code Extension&lt;/h3&gt;

On February 27 and 28, 2026, versions 1.8.12 and 1.8.13 of the Aqua Trivy VS Code extension were published to the OpenVSX registry under the aquasecurityofficial.trivy-vulnerability-scanner namespace. Socket identified suspicious behavior in these versions shortly after publication and began investigating the releases.
&lt;p /&gt;
&lt;A HREF=&quot;https://socket.dev/blog/unauthorized-ai-agent-execution-code-published-to-openvsx-in-aqua-trivy-vs-code-extension&quot;&gt;https://socket.dev/blog/unauthorized-ai-agent-execution-code-published-to-openvsx-in-aqua-trivy-vs-code-extension&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN Security updates for Monday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1060911/&quot;&gt;https://lwn.net/Articles/1060911/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-03-02T19:26:53Z</dc:date></entry><entry><title>Tageszusammenfassung - 27.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-27022026"/><author><name>CERT.at</name></author><updated>2026-02-27T18:28:56Z</updated><published>2026-02-27T18:28:56Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Donnerstag 26-02-2026 18:00 - Freitag 27-02-2026 18:00
Handler:     Wolfgang Menezes
Co-Handler:  n/a


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises&lt;/h3&gt;

New research shows that behaviors that occur at the very lowest levels of the network stack make encryption-in any form, not just those that have been broken in the past-incapable of providing client isolation, an encryption-enabled protection promised by all router makers, that is intended to block direct communication between two or more connected clients. The isolation can effectively be nullified through AirSnitch, the name the researchers gave to a series of attacks that capitalize on the newly discovered weaknesses. 
&lt;p /&gt;
&lt;A HREF=&quot;https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/&quot;&gt;https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Log4j am Limit: KI-Schrott lähmt Open-Source-Projekt&lt;/h3&gt;

Über das Bug-Bounty-Programm des Projekts werden den Angaben zufolge immer mehr KI-generierte Schwachstellenmeldungen eingereicht. [..] Karwasz schlägt vor, Schwachstellenmeldungen bei Log4j in Zukunft kurzfristig Prioritäten zuzuordnen und vorerst nur noch die wichtigen Fälle zu bearbeiten.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/log4j-am-limit-ki-schrott-laehmt-open-source-projekt-2602-205903.html&quot;&gt;https://www.golem.de/news/log4j-am-limit-ki-schrott-laehmt-open-source-projekt-2602-205903.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Heimliches Fahrzeug-Tracking: Spionage durch das Reifendruckkontrollsystem&lt;/h3&gt;

Reifendruckkontrollsysteme moderner Fahrzeuge bieten Spionen weitreichende Möglichkeiten zur Überwachung - und das schon seit etlichen Jahren. [..] Angriffspunkt sind nach Angaben der Forscher Funksignale, die von den TPMS ausgestrahlt werden und eine eindeutige Kennung enthalten. [..] Um Autos anhand der TPMS-Signale zu tracken, wird nach Angaben der Forscher nur ein einfacher Funkempfänger benötigt, der zu Preisen von lediglich rund 100 US-Dollar erhältlich ist. [..] &quot;Solche Informationen könnten Aufschluss über tägliche Routinen geben, wie beispielsweise Arbeitszeiten oder Reisegewohnheiten&quot; , warnte das Forschungsteam.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/heimliches-fahrzeug-tracking-spionage-durch-das-reifendruckkontrollsystem-2602-205913.html&quot;&gt;https://www.golem.de/news/heimliches-fahrzeug-tracking-spionage-durch-das-reifendruckkontrollsystem-2602-205913.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms&lt;/h3&gt;

Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT). &quot;A malicious downloader staged a portable Java runtime and executed a malicious Java archive (JAR) file named jd-gui.jar,&quot; the Microsoft Threat Intelligence team said in a post on X.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/trojanized-gaming-tools-spread-java.html&quot;&gt;https://thehackernews.com/2026/02/trojanized-gaming-tools-spread-java.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Fake Zoom and Google Meet scams install Teramind: A technical deep dive&lt;/h3&gt;

In this article, we-ll provide the deeper technical analysis [..] On February 24, 2026, we published an article about how a fake Zoom meeting -update- silently installs monitoring software, documenting a campaign that used a convincing fake Zoom waiting room to push a legitimate Teramind installer abused for unauthorized surveillance onto Windows machines. [..] Despite the takedown, our continued monitoring shows the campaign is not only still active but growing: we have now identified a parallel operation impersonating Google Meet, running from a different domain and infrastructure.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.malwarebytes.com/blog/threat-intel/2026/02/fake-zoom-and-google-meet-scams-install-teramind-a-technical-deep-dive&quot;&gt;https://www.malwarebytes.com/blog/threat-intel/2026/02/fake-zoom-and-google-meet-scams-install-teramind-a-technical-deep-dive&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hook, line, and vault: A technical deep dive into the 1Phish kit&lt;/h3&gt;

We analyze the evolution of the 1Phish phishing kit from a basic credential harvester into an MFA-aware, multi-stage phishing kit targeting 1Password users.
&lt;p /&gt;
&lt;A HREF=&quot;https://securitylabs.datadoghq.com/articles/hook-line-vault-a-deep-dive-into-1phish/&quot;&gt;https://securitylabs.datadoghq.com/articles/hook-line-vault-a-deep-dive-into-1phish/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Malicious Go -crypto- Module Steals Passwords and Deploys Rekoobe Backdoor&lt;/h3&gt;

Socket-s Threat Research Team uncovered a malicious Go module, github[.]com/xinfeisoft/crypto, that imitates the legitimate golang.org/x/crypto codebase but inserts a backdoor in ssh/terminal/terminal.go. That choice was strategic: golang.org/x/crypto is one of the Go ecosystem-s foundational cryptography codebases, maintained by the Go project and widely relied on for primitives and packages such as bcrypt, argon2, chacha20, and ssh, which makes it a high-trust impersonation target in dependency graphs.
&lt;p /&gt;
&lt;A HREF=&quot;https://socket.dev/blog/malicious-go-crypto-module-steals-passwords-and-deploys-rekoobe-backdoor&quot;&gt;https://socket.dev/blog/malicious-go-crypto-module-steals-passwords-and-deploys-rekoobe-backdoor&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;GitLab Patch Release: 18.9.1, 18.8.5, 18.7.5&lt;/h3&gt;

These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.
&lt;p /&gt;
&lt;A HREF=&quot;https://about.gitlab.com/releases/2026/02/25/patch-release-gitlab-18-9-1-released/&quot;&gt;https://about.gitlab.com/releases/2026/02/25/patch-release-gitlab-18-9-1-released/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN: Security updates for Friday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1060645/&quot;&gt;https://lwn.net/Articles/1060645/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-27T18:28:56Z</dc:date></entry><entry><title>Tageszusammenfassung - 26.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-26022026"/><author><name>CERT.at</name></author><updated>2026-02-26T19:04:16Z</updated><published>2026-02-26T19:04:16Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Mittwoch 25-02-2026 18:00 - Donnerstag 26-02-2026 18:00
Handler:     Michael Schlagenhaufer
Co-Handler:  Felician Fuchs


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Fake Next.js job interview tests backdoor developers devices&lt;/h3&gt;

The Microsoft Defender team has discovered a coordinated campaign targeting software developers through malicious repositories posing as legitimate Next.js projects and technical assessment materials, including recruiting coding tests.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/fake-nextjs-job-interview-tests-backdoor-developers-devices/&quot;&gt;https://www.bleepingcomputer.com/news/security/fake-nextjs-job-interview-tests-backdoor-developers-devices/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Ransomware payment rate drops to record low as attacks surge&lt;/h3&gt;

The number of ransomware victims paying threat actors has dropped to 28% last year, an all-time low, despite a significant increase in the number of claimed attacks.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/ransomware-payment-rate-drops-to-record-low-despite-attack-surge/&quot;&gt;https://www.bleepingcomputer.com/news/security/ransomware-payment-rate-drops-to-record-low-despite-attack-surge/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Datenpanne mit Openclaw: KI-Agent leakt interne Daten einer Cybersecurityfirma&lt;/h3&gt;

Abermals ist es in Verbindung mit einem KI-Agenten zu einer Datenpanne gekommen. Der Betreiber hat offenbar zu viele Zugriffsrechte eingeräumt.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/datenpanne-mit-openclaw-ki-agent-leakt-interne-daten-einer-cybersecurityfirma-2602-205873.html&quot;&gt;https://www.golem.de/news/datenpanne-mit-openclaw-ki-agent-leakt-interne-daten-einer-cybersecurityfirma-2602-205873.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Finding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)&lt;/h3&gt;

Over the past several months, I have gained practical insight into the challenges of deploying and operating a honeypot, even within a relatively simple environment. This work highlighted how varying hardware, software, and network design-can significantly alter outcomes. Through this process, I observed both the value and the limitations of log collection.  
&lt;p /&gt;
&lt;A HREF=&quot;https://isc.sans.edu/diary/rss/32744&quot;&gt;https://isc.sans.edu/diary/rss/32744&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens&lt;/h3&gt;

Cybersecurity researchers have disclosed details of a new malicious package discovered on the NuGet Gallery, impersonating a library from financial services firm Stripe in an attempt to target the financial sector. The package, codenamed StripeApi.Net, attempts to masquerade as Stripe.net, a legitimate library from Stripe that has over 75 million downloads.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/malicious-stripeapi-nuget-package.html&quot;&gt;https://thehackernews.com/2026/02/malicious-stripeapi-nuget-package.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor&lt;/h3&gt;

A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025.The campaign is being tracked by Cisco Talos under the moniker UAT-10027. The end goal of the attacks is to deliver a never-before-seen backdoor codenamed Dohdoor.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/uat-10027-targets-us-education-and.html&quot;&gt;https://thehackernews.com/2026/02/uat-10027-targets-us-education-and.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;APT37 Adds New Capabilities for Air-Gapped Networks&lt;/h3&gt;

In December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign, tracked as Ruby Jumper by ThreatLabz, APT37 uses Windows shortcut (LNK) files to initiate an attack that utilizes a set of newly discovered tools. These tools, RESTLEAF, SNAKEDROPPER, THUMBSBD, and VIRUSTASK, download a payload that delivers FOOTWINE and BLUELIGHT, which enable surveillance on a victim-s system.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.zscaler.com/blogs/security-research/apt37-adds-new-capabilities-air-gapped-networks&quot;&gt;https://www.zscaler.com/blogs/security-research/apt37-adds-new-capabilities-air-gapped-networks&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft Authenticator stellt Funktion bei erkanntem Jailbreak/Root-Zugriff ein&lt;/h3&gt;

Microsoft kündigt an, dass die Authenticator-App Jailbreaks und Rootzugang erkennen soll. Entra-Zugänge sollen dann gelöscht werden.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Microsoft-Authenticator-bekommt-Jailbreak-und-Root-Erkennung-11190598.html&quot;&gt;https://www.heise.de/news/Microsoft-Authenticator-bekommt-Jailbreak-und-Root-Erkennung-11190598.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Apache ActiveMQ Exploit Leads to LockBit Ransomware&lt;/h3&gt;

This intrusion began in mid-February 2024 after a threat actor exploited a vulnerability (CVE-2023-46604) on an exposed Apache ActiveMQ server. The threat actor was able to perform remote code execution (RCE) by using a Java Spring class and a custom Java Spring bean configuration XML file.
&lt;p /&gt;
&lt;A HREF=&quot;https://thedfirreport.com/2026/02/23/apache-activemq-exploit-leads-to-lockbit-ransomware/&quot;&gt;https://thedfirreport.com/2026/02/23/apache-activemq-exploit-leads-to-lockbit-ransomware/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;EWS-Apps und deren Nutzung vor der EWS-Abschaltung identifizieren&lt;/h3&gt;

Microsoft ist dabei, Exchange Web Services (EWS) in den Ruhestand zu schicken. Dieser Vorgang beginnt im Oktober 2026 und endet mit einer vollständigen Abschaltung von EWS im Jahr 2027.
&lt;p /&gt;
&lt;A HREF=&quot;https://borncity.com/blog/2026/02/26/ews-apps-und-deren-nutzung-vor-der-ews-abschaltung-identifizieren/&quot;&gt;https://borncity.com/blog/2026/02/26/ews-apps-und-deren-nutzung-vor-der-ews-abschaltung-identifizieren/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Buy A Help Desk, Bundle A Remote Access Solution? (SolarWinds Web Help Desk Pre-Auth RCE Chain(s))&lt;/h3&gt;

It-s been a while, but we-re back - in time for story time. Gather round, strap in, and prepare for another depressing journey of -all we wanted to do was reproduce an N-day, and here we are with 0-days-.
&lt;p /&gt;
&lt;A HREF=&quot;https://labs.watchtowr.com/buy-a-help-desk-bundle-a-remote-access-solution-solarwinds-web-help-desk-pre-auth-rce-chain-s/&quot;&gt;https://labs.watchtowr.com/buy-a-help-desk-bundle-a-remote-access-solution-solarwinds-web-help-desk-pre-auth-rce-chain-s/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Kritische Sicherheitslücken in Cisco Catalyst SD-WAN - aktiv ausgenutzt - Updates verfügbar&lt;/h3&gt;

26. Februar 2026 Beschreibung In Cisco Catalyst SD-WAN existieren mehrere kritische Sicherheitslücken. Die schwerwiegendste Schwachstelle (CVE-2026-20127) ermöglicht es einem nicht authentifizierten Angreifer aus der Ferne, die Authentifizierung zu umgehen und administrative Berechtigungen auf einem betroffenen System zu erlangen. Weitere Schwachstellen betreffen den Cisco Catalyst SD-WAN Manager und ermöglichen unter anderem Authentication Bypass, Privilege Escalation,
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cert.at/de/warnungen/2026/2/kritische-sicherheitslucken-in-cisco-catalyst-sd-wan-aktiv-ausgenutzt-updates-verfugbar&quot;&gt;https://www.cert.at/de/warnungen/2026/2/kritische-sicherheitslucken-in-cisco-catalyst-sd-wan-aktiv-ausgenutzt-updates-verfugbar&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Critical Juniper Networks PTX flaw allows full router takeover&lt;/h3&gt;

A critical vulnerability in the Junos OS Evolved network operating system running on PTX Series routers from Juniper Networks could allow an unauthenticated attacker to execute code remotely with root privileges.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/critical-juniper-networks-ptx-flaw-allows-full-router-takeover/&quot;&gt;https://www.bleepingcomputer.com/news/security/critical-juniper-networks-ptx-flaw-allows-full-router-takeover/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Automatisierungs-Tool n8n: Angreifer können Schadcode einschleusen&lt;/h3&gt;

Im Automatisierungs-Tool n8n klaffen elf Sicherheitslücken. Davon gelten drei als kritisches Risiko. Admins sollten rasch aktualisieren.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Automatisierungs-Tool-n8n-Updates-stopfen-Codeschmuggel-Lecks-11190464.html&quot;&gt;https://www.heise.de/news/Automatisierungs-Tool-n8n-Updates-stopfen-Codeschmuggel-Lecks-11190464.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN Security updates for Thursday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1060391/&quot;&gt;https://lwn.net/Articles/1060391/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-26T19:04:16Z</dc:date></entry><entry><title>Tageszusammenfassung - 25.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-25022026"/><author><name>CERT.at</name></author><updated>2026-02-25T19:43:02Z</updated><published>2026-02-25T19:43:02Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Dienstag 24-02-2026 18:00 - Mittwoch 25-02-2026 18:00
Handler:     Felician Fuchs
Co-Handler:  Guenes Holler


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;1Campaign platform helps malicious Google ads evade detection&lt;/h3&gt;

A newly identified cybercrime service known as 1Campaign is enabling threat actors to run malicious Google Ads that remain online for extended periods while evading scrutiny from security researchers.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/1campaign-platform-helps-malicious-google-ads-evade-detection/&quot;&gt;https://www.bleepingcomputer.com/news/security/1campaign-platform-helps-malicious-google-ads-evade-detection/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Phishing campaign targets freight and logistics orgs in the US, Europe&lt;/h3&gt;

A financially motivated threat group dubbed &quot;Diesel Vortex&quot; is stealing credentials from freight and logistics operators in the U.S. and Europe in phishing attacks using 52 domains.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/phishing-campaign-targets-freight-and-logistics-orgs-in-the-us-europe/&quot;&gt;https://www.bleepingcomputer.com/news/security/phishing-campaign-targets-freight-and-logistics-orgs-in-the-us-europe/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;The OpenClaw Hype: Analysis of Chatter from Open-Source Deep and Dark Web&lt;/h3&gt;

OpenClaw has sparked heavy Telegram and dark web chatter, but Flares data shows more research hype than mass exploitation. Flare explains how its telemetry found real supply-chain risk in the skills marketplace, yet limited signs of large-scale criminal operationalization.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/the-openclaw-hype-analysis-of-chatter-from-open-source-deep-and-dark-web/&quot;&gt;https://www.bleepingcomputer.com/news/security/the-openclaw-hype-analysis-of-chatter-from-open-source-deep-and-dark-web/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Marquis sues SonicWall over backup breach that led to ransomware attack&lt;/h3&gt;

Marquis Software Solutions has filed a lawsuit against SonicWall, accusing the cybersecurity company of gross negligence and misrepresentation that allegedly led to a ransomware attack disrupting operations at 74 U.S. banks.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/marquis-sues-sonicwall-over-backup-breach-that-led-to-ransomware-attack/&quot;&gt;https://www.bleepingcomputer.com/news/security/marquis-sues-sonicwall-over-backup-breach-that-led-to-ransomware-attack/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Chinese cyberspies breached dozens of telecom firms, govt agencies&lt;/h3&gt;

Googles Threat Intelligence Group (GTIG), Mandiant, and partners disrupted a global espionage campaign attributed to a suspected Chinese threat actor that used SaaS API calls to hide malicious traffic in attacks targeting telecom and government networks.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/chinese-cyberspies-breached-dozens-of-telecom-firms-govt-agencies/&quot;&gt;https://www.bleepingcomputer.com/news/security/chinese-cyberspies-breached-dozens-of-telecom-firms-govt-agencies/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware&lt;/h3&gt;

A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling a possible expansion of the threat actors targeting beyond Ukraine and into entities supporting the war-torn nation.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/uac-0050-targets-european-financial.html&quot;&gt;https://thehackernews.com/2026/02/uac-0050-targets-european-financial.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN&lt;/h3&gt;

A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by injecting malicious Copilot instructions in a GitHub issue. The artificial intelligence (AI)-driven vulnerability has been codenamed RoguePilot by Orca Security. It has since been patched by Microsoft following responsible disclosure.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/roguepilot-flaw-in-github-codespaces.html&quot;&gt;https://thehackernews.com/2026/02/roguepilot-flaw-in-github-codespaces.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware&lt;/h3&gt;

Cybersecurity researchers have discovered four malicious NuGet packages that are designed to target ASP.NET web application developers to steal sensitive data. The campaign, discovered by Socket, exfiltrates ASP.NET Identity data, including user accounts, role assignments, and permission mappings, as well as manipulates authorization rules to create persistent backdoors in victim applications.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/malicious-nuget-packages-stole-aspnet.html&quot;&gt;https://thehackernews.com/2026/02/malicious-nuget-packages-stole-aspnet.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Spyware kann Kamera- und Mikrofonanzeige beim iPhone abdrehen&lt;/h3&gt;

Eigentlich sollte man bei jeder iOS-App sehen können, dass Kamera- oder Mikrofonaufzeichnung laufen. Predator, ein Spionageprogramm, hackt diese aber.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Spyware-kann-Kamera-und-Mikrofonanzeige-beim-iPhone-abdrehen-11188076.html&quot;&gt;https://www.heise.de/news/Spyware-kann-Kamera-und-Mikrofonanzeige-beim-iPhone-abdrehen-11188076.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Best Western Hotels warnt vor Phishing-Attacken&lt;/h3&gt;

Betrüger haben offenbar Zugang zu aktuellen Buchungsdaten von Best Western Hotels. Das Unternehmen warnt vor einer Phishingwelle.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Best-Western-Hotels-warnt-vor-Phishing-Attacken-11188923.html&quot;&gt;https://www.heise.de/news/Best-Western-Hotels-warnt-vor-Phishing-Attacken-11188923.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Der Cloudspeicher ist voll?! Was sich wirklich hinter den Warnungen verbirgt&lt;/h3&gt;

Wenn dubiose E-Mails und hartnäckige PopUp-Fenster vor einem vollen Cloudspeicher warnen, ist allerhöchste Vorsicht angebracht. Während in manchen Fällen real existierende Softwareanbieter ein kostspieliges Abo unter die Leute bringen wollen, verstecken sich hinter anderen Varianten Kriminelle, die es auf die Kontodaten ihrer Opfer abgesehen haben.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/cloudspeicher-ist-voll/&quot;&gt;https://www.watchlist-internet.at/news/cloudspeicher-ist-voll/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Phishing operation with links to Russia, Armenia compromised Western cargo companies, researchers find&lt;/h3&gt;

Over a five-month period, the group, dubbed Diesel Vortex, stole more than 1,600 login credentials from accounts at logistics platforms, which allowed thieves to intercept and divert freight shipments and commit check fraud.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/phishing-operation-russia-armenia-targeting-us-european-cargo&quot;&gt;https://therecord.media/phishing-operation-russia-armenia-targeting-us-european-cargo&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852&lt;/h3&gt;

Check Point Research has discovered critical vulnerabilities in Anthropic-s Claude Code that allow attackers to achieve remote code execution and steal API credentials through malicious project configurations. The vulnerabilities exploit various configuration mechanisms including Hooks, Model Context Protocol (MCP) servers, and environment variables -executing arbitrary shell commands and exfiltrating Anthropic API keys when users clone and open untrusted repositories.
&lt;p /&gt;
&lt;A HREF=&quot;https://research.checkpoint.com/2026/rce-and-api-token-exfiltration-through-claude-code-project-files-cve-2025-59536/&quot;&gt;https://research.checkpoint.com/2026/rce-and-api-token-exfiltration-through-claude-code-project-files-cve-2025-59536/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;2026 GreyNoise State of the Edge Report: Where Attacks Concentrate and Defenses Fall Short&lt;/h3&gt;

GreyNoise analyzed 2.97 billion malicious sessions over 162 days - and the patterns challenge assumptions about where edge defenses are strongest. From VPN targeting to infrastructure concentration to attackers rapidly rotating through fresh IPs, new research quantifies where the gaps are and what to do about it. Read the full findings.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.greynoise.io/blog/2026-greynoise-state-of-the-edge-report-where-attacks-concentrate-defenses-fall-short&quot;&gt;https://www.greynoise.io/blog/2026-greynoise-state-of-the-edge-report-where-attacks-concentrate-defenses-fall-short&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Unmasking Agent Tesla: A Deep Dive into a Multi-Stage Campaign&lt;/h3&gt;

Agent Tesla remains one of the most persistent threats in the cyber landscape today. It allows even low-skilled threat actors to harvest sensitive data through a highly sophisticated delivery pipeline. This research blog breaks down a recent multi-stage infection chain that utilizes a blend of phishing, obfuscated and encrypted scripts, and advanced in-memory execution and evasion techniques.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.fortinet.com/blog/threat-research/unmasking-agent-tesla-deep-dive-into-multi-stage-campaign&quot;&gt;https://www.fortinet.com/blog/threat-research/unmasking-agent-tesla-deep-dive-into-multi-stage-campaign&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CVE-2025-59201 - Network Connection Status Indicator (NCSI) EoP&lt;/h3&gt;

It-s been a while since I last dug into a Patch Tuesday release. With an extraordinarily high number of 177 CVEs, including 6 that were either already public or exploited in the wild, the October 2025 one seemed like a good opportunity to get back at it. The one I ended up investigating in depth was CVE-2025-59201, an elevation of privilege in the -Network Connection Status Indicator-.
&lt;p /&gt;
&lt;A HREF=&quot;https://itm4n.github.io/cve-2025-59201-ncsi-eop/&quot;&gt;https://itm4n.github.io/cve-2025-59201-ncsi-eop/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Cisco Catalyst SD-WAN Vulnerabilities&lt;/h3&gt;

Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an attacker to access an affected system, elevate privileges to root, gain access to sensitive information, and overwrite arbitrary files. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at
&lt;p /&gt;
&lt;A HREF=&quot;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v&quot;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisco SD-WAN Systems&lt;/h3&gt;

The purpose of this Alert is to provide resources for organizations with Cisco Software-Defined Wide-Area Networking (SD-WAN) systems, including Federal Civilian Executive Branch (FCEB) agencies, to address ongoing exploitation of multiple vulnerabilities. Notably, the Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-20127 and CVE-2022-20775 to its Known Exploited Vulnerabilities (KEV) Catalog on Feb. 25, 2026.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/alerts/2026/02/25/cisa-and-partners-release-guidance-ongoing-global-exploitation-cisco-sd-wan-systems&quot;&gt;https://www.cisa.gov/news-events/alerts/2026/02/25/cisa-and-partners-release-guidance-ongoing-global-exploitation-cisco-sd-wan-systems&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Zyxel warns of critical RCE flaw affecting over a dozen routers&lt;/h3&gt;

Taiwan networking provider Zyxel has released security updates to address a critical vulnerability affecting over a dozen router models that can allow unauthenticated attackers to gain remote command execution on unpatched devices.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/zyxel-warns-of-critical-rce-flaw-affecting-over-a-dozen-routers/&quot;&gt;https://www.bleepingcomputer.com/news/security/zyxel-warns-of-critical-rce-flaw-affecting-over-a-dozen-routers/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Schadcode-Lücken in Dell Repository Manager, Wyse Management Suite geschlossen&lt;/h3&gt;

Dells Fernwartungstools Repository Manager und Wyse Management Suite sind verwundbar. Sicherheitsupdates schließen mehrere Lücken.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Schadcode-Luecken-in-Dell-Repository-Manager-Wyse-Management-Suite-geschlossen-11188796.html&quot;&gt;https://www.heise.de/news/Schadcode-Luecken-in-Dell-Repository-Manager-Wyse-Management-Suite-geschlossen-11188796.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Drupal UI Icons - Critical - Cross-site Scripting - SA-CONTRIB-2026-010&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.drupal.org/sa-contrib-2026-010&quot;&gt;https://www.drupal.org/sa-contrib-2026-010&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN: Security updates for Wednesday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1060185/&quot;&gt;https://lwn.net/Articles/1060185/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-25T19:43:02Z</dc:date></entry><entry><title>Tageszusammenfassung - 24.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-24022026"/><author><name>CERT.at</name></author><updated>2026-02-24T18:08:06Z</updated><published>2026-02-24T18:08:06Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Montag 23-02-2026 18:00 - Dienstag 24-02-2026 18:00
Handler:     Guenes Holler
Co-Handler:  n/a


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Disovery is not the bottleneck!&lt;/h3&gt;

There is a seductive logic to the current surge of optimism around AI-supported vulnerability discovery - a logic that is entirely based on a fundamental misunderstanding of the situation at hand.
&lt;p /&gt;
&lt;A HREF=&quot;https://bytesandborscht.com/disovery-is-not-the-bottleneck/&quot;&gt;https://bytesandborscht.com/disovery-is-not-the-bottleneck/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft beendet Unterstützung für Windows-Versionen aus 2016&lt;/h3&gt;

Windows-Versionen aus 2016 erhalten in Kürze keinen Support mehr. Erweiterte Sicherheits-Updates (ESU) sind jedoch in Planung. 
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Microsoft-beendet-Unterstuetzung-fuer-Windows-Versionen-aus-2016-11187147.html&quot;&gt;https://www.heise.de/news/Microsoft-beendet-Unterstuetzung-fuer-Windows-Versionen-aus-2016-11187147.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;FinanzOnline-Phishing: Krypto- und Unternehmensdaten im Visier&lt;/h3&gt;

Eine neue Variante des Phishing-Klassikers im Namen des Finanzministeriums macht die Runde. Sie zielt neben klassischen Adress- und Bankdaten auf weitere sensible Informationen ab. Kriminelle wollen alles über mögliche Krypto-Bestände ihrer Opfer erfahren und erkundigen sich zusätzlich nach etwaigen Unternehmensdetails.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/finanzonline-phishing-krypto-unternehmensdaten/&quot;&gt;https://www.watchlist-internet.at/news/finanzonline-phishing-krypto-unternehmensdaten/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;40 Sicherheitslücken in ImageMagick geschlossen&lt;/h3&gt;

Die Bildbearbeitungssoftware ImageMagick ist an mehreren Stellen verwundbar. Sicherheitspatches stehen zur Installation bereit. 
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11186935&quot;&gt;https://heise.de/-11186935&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Critical SolarWinds Serv-U flaws offer root access to servers&lt;/h3&gt;

SolarWinds has released security updates to patch four critical Serv-U remote code execution vulnerabilities that could grant attackers root access to unpatched servers.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/critical-solarwinds-serv-u-flaws-offer-root-access-to-servers/&quot;&gt;https://www.bleepingcomputer.com/news/security/critical-solarwinds-serv-u-flaws-offer-root-access-to-servers/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN Security updates for Tuesday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1060018/&quot;&gt;https://lwn.net/Articles/1060018/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-24T18:08:06Z</dc:date></entry><entry><title>Tageszusammenfassung - 23.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-23022026"/><author><name>CERT.at</name></author><updated>2026-02-23T19:13:23Z</updated><published>2026-02-23T19:13:23Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Freitag 20-02-2026 18:00 - Montag 23-02-2026 18:00
Handler:     Guenes Holler
Co-Handler:  Michael Schlagenhaufer


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Incident Reporting: EU-Wide Statistics&lt;/h3&gt;

At the last CSIRTs Network meeting we got treated to a powerpoint versions of the statistics that ENISA publishes under https://ciras.enisa.europa.eu/ The mathematician inside me was not impressed, and as I-m prone to do, I did not withhold my opinion. This blog post explains why I-m so unhappy with ENISA-s analysis.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cert.at/en/blog/2026/2/incident-reporting-eu-wide-statistics&quot;&gt;https://www.cert.at/en/blog/2026/2/incident-reporting-eu-wide-statistics&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Predator spyware hooks iOS SpringBoard to hide mic, camera activity&lt;/h3&gt;

US-sanctioned surveillance firm Intellexa developed the Predator commercial spyware and delivered it in attacks that exploited Apple and Chrome zero-day flaws and through 0-click infection mechanisms. [..] The malware does not exploit any iOS vulnerability but leverages previously obtained kernel-level access to hijack system indicators that would otherwise expose its surveillance operation.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/predator-spyware-hooks-ios-springboard-to-hide-mic-camera-activity/&quot;&gt;https://www.bleepingcomputer.com/news/security/predator-spyware-hooks-ios-springboard-to-hide-mic-camera-activity/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Amazon: AI-assisted hacker breached 600 Fortinet firewalls in 5 weeks&lt;/h3&gt;

A new report by CJ Moses, CISO of Amazon Integrated Security, says that the hacking campaign occurred between January 11 and February 18, 2026, and did not rely on any exploits to breach Fortinet firewalls. Instead, the threat actor targeted exposed management interfaces and weak credentials that lacked MFA protection, then used AI to help automate access to other devices on the breached network.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/&quot;&gt;https://www.bleepingcomputer.com/news/security/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CarGurus: Have I Been Pwned integriert Daten von 12,5 Millionen Kunden&lt;/h3&gt;

Have I Been Pwned ist um 12,5 Millionen Einträge von CarGurus-Nutzern und -Nutzerinnen reicher. Die haben ShinyHunters geklaut. [..] Zudem sind Nutzerkonten-IDs enthalten, Daten aus finanziellen Vorprüfungen, Händlerkonten sowie Abo-Informationen. Hunt führt weiter aus, dass auch Namen, Telefonnummern, Anschriften und IP-Adressen sowie der Ausgang von Finanzierungsanfragen betroffen sind.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/CarGurus-ShinyHunters-kopieren-Datensaetze-von-12-5-Millionen-Nutzern-11185847.html&quot;&gt;https://www.heise.de/news/CarGurus-ShinyHunters-kopieren-Datensaetze-von-12-5-Millionen-Nutzern-11185847.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;-Starkiller- Phishing Service Proxies Real Login Pages, MFA&lt;/h3&gt;

Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised links to load the target brand-s real website, and then acts as a relay between the victim and the legitimate site - forwarding the victim-s username, password and multi-factor authentication (MFA) code to the legitimate site and returning its responses.
&lt;p /&gt;
&lt;A HREF=&quot;https://krebsonsecurity.com/2026/02/starkiller-phishing-service-proxies-real-login-pages-mfa/&quot;&gt;https://krebsonsecurity.com/2026/02/starkiller-phishing-service-proxies-real-login-pages-mfa/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hackers Hide Pulsar RAT Inside PNG Images in New NPM Supply Chain Attack&lt;/h3&gt;

Cybersecurity researchers at Veracode reveal a typosquatting attack that disguises Pulsar RAT as images to bypass Windows security and antivirus programs.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/hackers-pulsar-rat-png-images-npm-supply-chain-attack/&quot;&gt;https://hackread.com/hackers-pulsar-rat-png-images-npm-supply-chain-attack/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Roundcube Webmail: Angriffe auf Sicherheitslücken laufen&lt;/h3&gt;

Die zweite Sicherheitslücke wurde kurz vor Weihnachten bekannt. Sie ermöglicht Cross-Site-Scripting-Angriffe. Die Schwachstelle betrifft die Verarbeitung des -Animate--Tag in SVG-Dateien. [..] IT-Verantwortliche sollten ihre Systeme absichern, indem sie zumindest auf die fehlerkorrigierten Versionen 1.5.12 und 1.6.12 installieren.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11185535&quot;&gt;https://heise.de/-11185535&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;SANDWORM_MODE: Shai-Hulud-Style npm Worm Hijacks CI Workflows and Poisons AI Toolchains&lt;/h3&gt;

An active Shai-Hulud-like supply chain worm campaign spreads via typosquatting and AI toolchain poisoning, across at least 19 malicious npm packages and linked to two npm aliases. The sample retains Shai-Hulud hallmarks and adds GitHub API exfiltration with DNS fallback, hook-based persistence, SSH propagation fallback, MCP server injection with embedded prompt injection targeting AI coding assistants, and LLM API Key harvesting.
&lt;p /&gt;
&lt;A HREF=&quot;https://socket.dev/blog/sandworm-mode-npm-worm-ai-toolchain-poisoning&quot;&gt;https://socket.dev/blog/sandworm-mode-npm-worm-ai-toolchain-poisoning&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Pi-hole: Update schließt Sicherheitslücken und liefert mehr Performance&lt;/h3&gt;

Zum einen hätten als Admin angemeldete Angreifer eine -Stored HTML-Injection--Schwachstelle missbrauchen können, um HTML-Code einzuschleusen, der bei der Anzeige der DNS-Eintragstabelle angezeigt wird (CVE-2026-26952, CVSS 5.4, Risiko -mittel-). Zum anderen gelingt dies auch auf der API-Einstellungswebseite (CVE-2026-26953, CVSS 5.4, Risiko -mittel-).
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11185637&quot;&gt;https://heise.de/-11185637&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN: Security updates for Monday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1059864/&quot;&gt;https://lwn.net/Articles/1059864/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-23T19:13:23Z</dc:date></entry><entry><title>Tageszusammenfassung - 20.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-20022026"/><author><name>CERT.at</name></author><updated>2026-02-20T18:41:34Z</updated><published>2026-02-20T18:41:34Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Donnerstag 19-02-2026 18:00 - Freitag 20-02-2026 18:00
Handler:     Guenes Holler
Co-Handler:  n/a


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT RAT&lt;/h3&gt;

Cybersecurity researchers have disclosed details of a new ClickFix campaign that abuses compromised legitimate sites to deliver a previously undocumented remote access trojan (RAT) called MIMICRAT (aka AstarionRAT).
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/clickfix-campaign-abuses-compromised.html&quot;&gt;https://thehackernews.com/2026/02/clickfix-campaign-abuses-compromised.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;PromptSpy läutet mit GenAI die Ära der Android-Bedrohungen ein&lt;/h3&gt;

ESET-Forscher entdecken PromptSpy, die erste bekannte Android-Malware, die generative KI in ihrem Ausführungsablauf nutzt.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.welivesecurity.com/de/eset-research/promptspy-lautet-mit-genai-die-ara-der-android-bedrohungen-ein/&quot;&gt;https://www.welivesecurity.com/de/eset-research/promptspy-lautet-mit-genai-die-ara-der-android-bedrohungen-ein/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Windows-Editor: Details zur Markdown-Sicherheitslücke&lt;/h3&gt;

Die Patchday-Updates schließen eine Lücke im Windows-Editor, die das Einschleusen von Schadcode erlaubt. Nun gibt es Details zum Leck. 
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11183516&quot;&gt;https://heise.de/-11183516&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Crims create fake remote management vendor that actually sells a RAT&lt;/h3&gt;

Researchers at Proofpoint late last month uncovered what they describe as a &quot;weird twist&quot; on the growing trend of criminals abusing remote monitoring and management software (RMM) as their preferred attack tools.
&lt;p /&gt;
&lt;A HREF=&quot;https://go.theregister.com/feed/www.theregister.com/2026/02/19/rmm_rat_trustconnect/&quot;&gt;https://go.theregister.com/feed/www.theregister.com/2026/02/19/rmm_rat_trustconnect/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)&lt;/h3&gt;

On Feb. 6, 2026, BeyondTrust released a security advisory regarding CVE-2026-1731. BeyondTrust is an identity and access management platform. This specific vulnerability involves a pre-authentication remote code execution (RCE) issue within BeyondTrust remote support software. It could allow attackers to execute operating system commands in the context of the site user, which may lead to system compromise, including unauthorized access, data exfiltration and service disruption.
&lt;p /&gt;
&lt;A HREF=&quot;https://unit42.paloaltonetworks.com/beyondtrust-cve-2026-1731/&quot;&gt;https://unit42.paloaltonetworks.com/beyondtrust-cve-2026-1731/&lt;/a&gt;

&lt;hr&gt;

&lt;h2&gt; Vulnerabilities &lt;/h2&gt;



&lt;h3&gt;Atlassian-Sicherheitsupdates: Bamboo und Confluence sind verwundbar&lt;/h3&gt;

Um zu verhindern, dass Angreifer mehrere Sicherheitslücken in Atlassian Bamboo Data Center and Server, Confluence Data Center and Server sowie Crowd Data Center und Server ausnutzen, sollten Admins die nun verfügbaren Patches umgehend installieren.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11183534&quot;&gt;https://heise.de/-11183534&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Zahlreiche Kernel-Lücken in Dell PowerProtect Data Manager geschlossen&lt;/h3&gt;

Dells Backuplösung PowerProtect Data Manager ist unter anderem für Schadcode-Attacken anfällig. Sicherheitspatches stehen zum Download bereit. 
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11184164&quot;&gt;https://heise.de/-11184164&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN Security updates for Friday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1059638/&quot;&gt;https://lwn.net/Articles/1059638/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-20T18:41:34Z</dc:date></entry><entry><title>Tageszusammenfassung - 19.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-19022026"/><author><name>CERT.at</name></author><updated>2026-02-19T19:17:58Z</updated><published>2026-02-19T19:17:58Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Mittwoch 18-02-2026 18:00 - Donnerstag 19-02-2026 18:00
Handler:     Guenes Holler
Co-Handler:  Felician Fuchs


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Lawful access to encrypted data: General Considerations&lt;/h3&gt;

Last week, I wrote a blog post on why the problem of lawful access to encrypted data is so tricky, this week I want to continue with a discussion on the general considerations you should keep in mind when thinking about this topic. Important note: I think LE is well aware of these considerations and agrees with most of my conclusions.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cert.at/en/blog/2026/2/lawful-access-to-encrypted-data-general-considerations&quot;&gt;https://www.cert.at/en/blog/2026/2/lawful-access-to-encrypted-data-general-considerations&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hackers target Microsoft Entra accounts in device code vishing attacks&lt;/h3&gt;

Threat actors are targeting technology, manufacturing, and financial organizations in campaigns that combine device code phishing and voice phishing (vishing) to abuse the OAuth 2.0 Device Authorization flow and compromise Microsoft Entra accounts.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/hackers-target-microsoft-entra-accounts-in-device-code-vishing-attacks/&quot;&gt;https://www.bleepingcomputer.com/news/security/hackers-target-microsoft-entra-accounts-in-device-code-vishing-attacks/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;How infostealers turn stolen credentials into real identities&lt;/h3&gt;

Infostealer dumps increasingly tie stolen credentials to real identities, linking usernames, cookies, and behavior across personal and enterprise accounts. Specops explains how analyzing 90,000 dumps shows reuse fuels enterprise risk and how continuous AD scanning disrupts that cycle.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/how-infostealers-turn-stolen-credentials-into-real-identities/&quot;&gt;https://www.bleepingcomputer.com/news/security/how-infostealers-turn-stolen-credentials-into-real-identities/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Arkanix Stealer: a C++ &amp; Python infostealer&lt;/h3&gt;

Kaspersky researchers analyze a C++ and Python stealer dubbed &quot;Arkanix Stealer&quot;, which was active for several months, targeted wide range of data, was distributed as MaaS and offered referral program to its partners.
&lt;p /&gt;
&lt;A HREF=&quot;https://securelist.com/arkanix-stealer/119006/&quot;&gt;https://securelist.com/arkanix-stealer/119006/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Frankreich: Angreifer griffen auf Daten von 1,2 Millionen Bankkonten zu&lt;/h3&gt;

In Frankreich haben sich Angreifer Zugriff auf eine nationale Datenbank verschafft und Daten zu 1,2 Millionen Bankkonten ausgelesen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Frankreich-Angreifer-griffen-auf-Daten-von-1-2-Millionen-Bankkonten-zu-11182323.html&quot;&gt;https://www.heise.de/news/Frankreich-Angreifer-griffen-auf-Daten-von-1-2-Millionen-Bankkonten-zu-11182323.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Die Uhr tickt: Frist zur NIS2-Registrierung beim BSI läuft am 6. März 2026 ab&lt;/h3&gt;

Der TÜV SÜD warnt, dass in zwei Wochen die Registrierungsfrist beim BSI für NIS2-pflichtige Unternehmen endet. Betroffen sind rund 29.000 deutsche Unternehmen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Die-Uhr-tickt-Frist-zur-NIS2-Registrierung-beim-BSI-laeuft-am-6-Maerz-2026-ab-11182499.html&quot;&gt;https://www.heise.de/news/Die-Uhr-tickt-Frist-zur-NIS2-Registrierung-beim-BSI-laeuft-am-6-Maerz-2026-ab-11182499.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Betrugsmasche: Falsche -Gemini--Chatbots verkaufen falschen -Google Coin-&lt;/h3&gt;

Eine neue Betrugsmasche beruht auf angepassten KI-Chatbots. Diese drängen Opfer dazu, wertlose Kryptowährungen zu kaufen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Betrugsmasche-Falsche-Gemini-Chatbots-verkaufen-falschen-Google-Coin-11182685.html&quot;&gt;https://www.heise.de/news/Betrugsmasche-Falsche-Gemini-Chatbots-verkaufen-falschen-Google-Coin-11182685.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Kubernetes project issues warning on Ingress NGINX retirement&lt;/h3&gt;

The Kubernetes project is urging organizations to migrate away from Ingress NGINX before its retirement in March 2026, with new high-severity CVEs underscoring the urgency.
&lt;p /&gt;
&lt;A HREF=&quot;https://securitylabs.datadoghq.com/articles/kubernetes-ingress-nginx-retirement-warning/&quot;&gt;https://securitylabs.datadoghq.com/articles/kubernetes-ingress-nginx-retirement-warning/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cline CLI npm Package Compromised via Suspected Cache Poisoning Attack&lt;/h3&gt;

On February 17, 2026, an unauthorized party used a compromised npm publish token to push cline@2.3.0 to the npm registry. Cline is a popular AI coding agent CLI in the developer ecosystem, with around 90,000 weekly downloads from npm. The malicious version contained a modified package.json with an added postinstall script: npm install -g openclaw@latest.
&lt;p /&gt;
&lt;A HREF=&quot;https://socket.dev/blog/cline-cli-npm-package-compromised-via-suspected-cache-poisoning-attack&quot;&gt;https://socket.dev/blog/cline-cli-npm-package-compromised-via-suspected-cache-poisoning-attack&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Critical infra Honeywell CCTVs vulnerable to auth bypass flaw&lt;/h3&gt;

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of a critical vulnerability in multiple Honeywell CCTV products that allows unauthorized access to feeds or account hijacking.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/critical-infra-honeywell-cctvs-vulnerable-to-auth-bypass-flaw/&quot;&gt;https://www.bleepingcomputer.com/news/security/critical-infra-honeywell-cctvs-vulnerable-to-auth-bypass-flaw/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution&lt;/h3&gt;

Cybersecurity researchers have disclosed a critical security flaw in the Grandstream GXP1600 series of VoIP phones that could allow an attacker to seize control of susceptible devices.The vulnerability, tracked as CVE-2026-2329, carries a CVSS score of 9.3 out of a maximum of 10.0.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/grandstream-gxp1600-voip-phones-exposed.html&quot;&gt;https://thehackernews.com/2026/02/grandstream-gxp1600-voip-phones-exposed.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Nvidia-KI-Tools Megatron Bridge und NeMo Framework als Einfallstor für Angreifer&lt;/h3&gt;

Nvidias Entwickler haben unter anderem Schadcode-Schlupflöcher in Megatron Bridge und NeMo Framework geschlossen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Nvidia-KI-Tools-Megatron-Bridge-und-NeMo-Framework-als-Einfallstor-fuer-Angreifer-11182013.html&quot;&gt;https://www.heise.de/news/Nvidia-KI-Tools-Megatron-Bridge-und-NeMo-Framework-als-Einfallstor-fuer-Angreifer-11182013.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147&lt;/h3&gt;

Mozilla has released an out-of-band security update to address a critical vulnerability affecting its browser. The update, issued as Firefox v147.0.4, resolves a high-impact Heap buffer overflow flaw in the libvpx video codec library. The issue is tracked under CVE-2026-2447 and was identified by security researcher jayjayjazz.
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/firefox-v147-cve-2026-2447/&quot;&gt;https://thecyberexpress.com/firefox-v147-cve-2026-2447/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN Security updates for Thursday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1059500/&quot;&gt;https://lwn.net/Articles/1059500/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-19T19:17:58Z</dc:date></entry><entry><title>Tageszusammenfassung - 18.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-18022026"/><author><name>CERT.at</name></author><updated>2026-02-18T18:25:57Z</updated><published>2026-02-18T18:25:57Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Dienstag 17-02-2026 18:00 - Mittwoch 18-02-2026 18:00
Handler:     Guenes Holler
Co-Handler:  Michael Schlagenhaufer


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Data breach at fintech firm Figure affects nearly 1 million accounts&lt;/h3&gt;

Hackers have stolen the personal and contact information of nearly 1 million accounts after breaching the systems of Figure Technology Solutions, a self-described blockchain-native financial technology company.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/data-breach-at-fintech-firm-figure-affects-nearly-1-million-accounts/&quot;&gt;https://www.bleepingcomputer.com/news/security/data-breach-at-fintech-firm-figure-affects-nearly-1-million-accounts/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft: Anti-phishing rules mistakenly blocked emails, Teams messages&lt;/h3&gt;

Microsoft says an Exchange Online issue that mistakenly quarantined legitimate emails last week was triggered by faulty heuristic detection rules designed to block credential phishing campaigns.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/microsoft/microsoft-anti-phishing-rules-mistakenly-blocked-emails-teams-messages/&quot;&gt;https://www.bleepingcomputer.com/news/microsoft/microsoft-anti-phishing-rules-mistakenly-blocked-emails-teams-messages/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;&quot;Keine alltägliche Dimension&quot;: AWS kann DDoS-Attacke auf die Bahn nicht abfangen&lt;/h3&gt;

Einen Tag lang ist es Hackern gelungen, den DB Navigator und bahn.de lahmzulegen. Die geschäftskritischen Systeme liegen bei Amazon Web Services.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/die-groessere-kante-aws-kann-ddos-attacke-auf-die-bahn-nicht-abfangen-2602-205569.html&quot;&gt;https://www.golem.de/news/die-groessere-kante-aws-kann-ddos-attacke-auf-die-bahn-nicht-abfangen-2602-205569.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies&lt;/h3&gt;

Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2) relays, a technique that could allow attackers to blend into legitimate enterprise communications and evade detection.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/researchers-show-copilot-and-grok-can.html&quot;&gt;https://thehackernews.com/2026/02/researchers-show-copilot-and-grok-can.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Your AI-generated password isnt random, it just looks that way&lt;/h3&gt;

Seemingly complex strings are actually highly predictable, crackable within hours Generative AI tools are surprisingly poor at suggesting strong passwords, experts say.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.theregister.com/2026/02/18/generating_passwords_with_llms/&quot;&gt;https://www.theregister.com/2026/02/18/generating_passwords_with_llms/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Red Vulns Rising: Examining Chinese National Vulnerability Databases&lt;/h3&gt;

Learn how the Chinese vulnerability databases (CNVD and CNNVD) compare to CVE, including early disclosures, policy shifts, and data quality differences.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bitsight.com/blog/chinese-vulnerability-database-analysis-cnvd-cnnvd&quot;&gt;https://www.bitsight.com/blog/chinese-vulnerability-database-analysis-cnvd-cnnvd&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Flaws in popular VSCode extensions expose developers to attacks&lt;/h3&gt;

Vulnerabilities with high to critical severity ratings affecting popular Visual Studio Code (VSCode) extensions collectively downloaded more than 128 million times could be exploited to steal local files and execute code remotely.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/flaws-in-popular-vscode-extensions-expose-developers-to-attacks/&quot;&gt;https://www.bleepingcomputer.com/news/security/flaws-in-popular-vscode-extensions-expose-developers-to-attacks/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware&lt;/h3&gt;

Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from China to hijack the software update mechanism to selectively deliver malware to targets of interest.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/notepad-fixes-hijacked-update-mechanism.html&quot;&gt;https://thehackernews.com/2026/02/notepad-fixes-hijacked-update-mechanism.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft warnt vor kritischer Rechteausweitungslücke in Windows Admin Center&lt;/h3&gt;

Im Windows Admin Center können Angreifer ihre Rechte ausweiten. Microsoft stuft das als kritisch ein und rät Admins zum Aktualisieren.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Microsoft-warnt-vor-kritischer-Rechteausweitungsluecke-in-Windows-Admin-Center-11180525.html&quot;&gt;https://www.heise.de/news/Microsoft-warnt-vor-kritischer-Rechteausweitungsluecke-in-Windows-Admin-Center-11180525.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day&lt;/h3&gt;

Mandiant and Google Threat Intelligence Group (GTIG) have identified the zero-day exploitation of a high-risk vulnerability in Dell RecoverPoint for Virtual Machines, tracked as CVE-2026-22769, with a CVSSv3.0 score of 10.0.
&lt;p /&gt;
&lt;A HREF=&quot;https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day/&quot;&gt;https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Multiple Security-Updates for Splunk DB Connect - February 2026&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://advisory.splunk.com&quot;&gt;https://advisory.splunk.com&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;[R2] Stand-alone Security Patches Available for Tenable Security Center versions 6.5.1, 6.6.0 and 6.7.2: SC-202602.1 + SC-202602.2&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.tenable.com/security/tns-2026-06&quot;&gt;https://www.tenable.com/security/tns-2026-06&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN Security updates for Wednesday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1059333/&quot;&gt;https://lwn.net/Articles/1059333/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-18T18:25:57Z</dc:date></entry><entry><title>Tageszusammenfassung - 17.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-17022026"/><author><name>CERT.at</name></author><updated>2026-02-17T18:16:42Z</updated><published>2026-02-17T18:16:42Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Montag 16-02-2026 18:00 - Dienstag 17-02-2026 18:00
Handler:     Michael Schlagenhaufer
Co-Handler:  Guenes Holler


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets&lt;/h3&gt;

Kaspersky experts have uncovered Keenadu, a sophisticated new backdoor targeting tablet firmware as well as system-level and Google Play apps. They also revealed connections between the worlds most prolific Android botnets.
&lt;p /&gt;
&lt;A HREF=&quot;https://securelist.com/keenadu-android-backdoor/118913/&quot;&gt;https://securelist.com/keenadu-android-backdoor/118913/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;IT-Sicherheitsbehörde CISA im Notbetrieb&lt;/h3&gt;

Die zum Wochenende ausgelaufene Finanzierung des DHS betrifft auch die IT-Sicherheitsbehörde CISA. Diese befindet sich nun im Notbetrieb.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/IT-Sicherheitsbehoerde-CISA-im-Notbetrieb-11179136.html&quot;&gt;https://www.heise.de/news/IT-Sicherheitsbehoerde-CISA-im-Notbetrieb-11179136.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Sicherheitsbedenken: EU-Parlament deaktiviert KI-Tools auf Diensthandys&lt;/h3&gt;

EU-Abgeordnete und ihre Angestellte können auf dienstlichen Smartphones und Tablets keine KI-Funktionen mehr nutzen. Man wisse zu wenig zur Datensicherheit.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11179064&quot;&gt;https://heise.de/-11179064&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Passwortmanager bieten weniger Schutz als versprochen &lt;/h3&gt;

Forschende der ETH Zürich haben bei drei populären, cloudbasierten Passwortmanagern gravierende Sicherheitslücken entdeckt. In Tests konnten sie gespeicherte Passwörter einsehen und sogar verändern.  
&lt;p /&gt;
&lt;A HREF=&quot;https://ethz.ch/de/news-und-veranstaltungen/eth-news/news/2026/02/passwortmanager-bieten-weniger-schutz-als-versprochen.html&quot;&gt;https://ethz.ch/de/news-und-veranstaltungen/eth-news/news/2026/02/passwortmanager-bieten-weniger-schutz-als-versprochen.html&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Mehr als 60 Sicherheitsprobleme in KI-Assistent OpenClaw gelöst&lt;/h3&gt;

Angreifer können im Kontext von OpenClaw unter anderem Schadcode auf Systeme schieben und ausführen. Sicherheitspatches sind verfügbar.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11179150&quot;&gt;https://heise.de/-11179150&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CleanTalk WordPress Plugin Vulnerability Puts 200,000 Sites at Risk&lt;/h3&gt;

A WordPress plugin vulnerability has placed as many as 200,000 websites at potential risk, following the disclosure of a severe flaw in the CleanTalk Anti-Spam plugin.  The issue, tracked as CVE-2026-1490, carries a CVSS severity rating of 9.8 out of 10 and could allow unauthenticated attackers to install arbitrary plugins, opening the door to remote code execution under certain conditions.
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/cleantalk-cve-2026-1490/&quot;&gt;https://thecyberexpress.com/cleantalk-cve-2026-1490/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN Security updates for Tuesday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1059176/&quot;&gt;https://lwn.net/Articles/1059176/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-17T18:16:42Z</dc:date></entry><entry><title>Tageszusammenfassung - 16.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-16022026"/><author><name>CERT.at</name></author><updated>2026-02-16T18:11:58Z</updated><published>2026-02-16T18:11:58Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Freitag 13-02-2026 18:00 - Montag 16-02-2026 18:00
Handler:     Alexander Riepl
Co-Handler:  Guenes Holler


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Pastebin comments push ClickFix JavaScript attack to hijack crypto swaps&lt;/h3&gt;

Threat actors are abusing Pastebin comments to distribute a new ClickFix-style attack that tricks cryptocurrency users into executing malicious JavaScript in their browser, allowing attackers to hijack Bitcoin swap transactions and redirect funds to attacker-controlled wallets.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/pastebin-comments-push-clickfix-javascript-attack-to-hijack-crypto-swaps/&quot;&gt;https://www.bleepingcomputer.com/news/security/pastebin-comments-push-clickfix-javascript-attack-to-hijack-crypto-swaps/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Romo: DJI-Staubsaugerroboter gehackt&lt;/h3&gt;

Eine Sicherheitslücke im DJI Romo Saugroboter erlaubte den Zugriff auf rund 7.000 Geräte weltweit - inklusive Live-Kameras und Wohnungsgrundrissen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/romo-dji-staubsaugerroboter-gehackt-2602-205411.html&quot;&gt;https://www.golem.de/news/romo-dji-staubsaugerroboter-gehackt-2602-205411.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Gefälschte E-Mail zur Kryptomeldepflicht: Neue Betrugsmasche im Umlauf&lt;/h3&gt;

In zahlreichen Postfächern taucht derzeit eine E-Mail auf, die angeblich vom Bundesministerium für Finanzen stammt und eine -dringende Meldepflicht- für Kryptovermögen ankündigt. Selbst Personen ohne Kryptowährungen sollen demnach ein Formular ausfüllen. Die Nachricht wirkt seriös, ist aber eine gut gemachte Phishing-Falle.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/gefaelschte-e-mail-zur-kryptomeldepflicht/&quot;&gt;https://www.watchlist-internet.at/news/gefaelschte-e-mail-zur-kryptomeldepflicht/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Phishing on the Edge of the Web and Mobile Using QR Codes&lt;/h3&gt;

We discuss the extensive use of malicious QR codes using URL shorteners, in-app deep links and direct APK downloads to bypass mobile security.The post Phishing on the Edge of the Web and Mobile Using QR Codes appeared first on Unit 42.
&lt;p /&gt;
&lt;A HREF=&quot;https://unit42.paloaltonetworks.com/qr-codes-as-attack-vector/&quot;&gt;https://unit42.paloaltonetworks.com/qr-codes-as-attack-vector/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Sicherheitslücke im Browser: Attacken auf Chrome-Nutzer beobachtet&lt;/h3&gt;

Eine gefährliche Sicherheitslücke lässt Angreifer Schadcode in Chrome einschleusen. Es reicht der Besuch einer speziell gestalteten Webseite.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/sicherheitsluecke-im-browser-attacken-auf-chrome-nutzer-beobachtet-2602-205443.html&quot;&gt;https://www.golem.de/news/sicherheitsluecke-im-browser-attacken-auf-chrome-nutzer-beobachtet-2602-205443.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;ClickFix-Attacken nutzen Schadcode in DNS-Antworten&lt;/h3&gt;

Microsoft hat eine neue Variante der Malware-Verteilung in ClickFix-Angriffen entdeckt. Die Angreifer liefern Schadcode mittels DNS aus.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/ClickFix-Attacken-nutzen-Schadcode-in-DNS-Antworten-11177592.html&quot;&gt;https://www.heise.de/news/ClickFix-Attacken-nutzen-Schadcode-in-DNS-Antworten-11177592.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN Security updates for Monday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1058989/&quot;&gt;https://lwn.net/Articles/1058989/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-16T18:11:58Z</dc:date></entry><entry><title>Tageszusammenfassung - 13.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-13022026"/><author><name>CERT.at</name></author><updated>2026-02-13T18:28:16Z</updated><published>2026-02-13T18:28:16Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Donnerstag 12-02-2026 18:00 - Freitag 13-02-2026 18:00
Handler:     Michael Schlagenhaufer
Co-Handler:  Felician Fuchs


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Microsoft: New Windows LNK spoofing issues arent vulnerabilities&lt;/h3&gt;

Today, at Wild West Hackin Fest, security researcher Wietze Beukema disclosed multiple vulnerabilities in Windows LK shortcut files that allow attackers to deploy malicious payloads.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/microsoft/microsoft-new-windows-lnk-spoofing-issues-arent-vulnerabilities/&quot;&gt;https://www.bleepingcomputer.com/news/microsoft/microsoft-new-windows-lnk-spoofing-issues-arent-vulnerabilities/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Ivanti EPMM Zero-Day Bugs Spark Exploit Frenzy - Again&lt;/h3&gt;

A handful of European government agencies have been compromised by hackers in recent weeks, thanks to a new round of critical vulnerabilities in an Ivanti product - and it's another grim reminder of the heyday attackers have been having with edge devices.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.darkreading.com/endpoint-security/ivanti-epmm-zero-day-bugs-exploit&quot;&gt;https://www.darkreading.com/endpoint-security/ivanti-epmm-zero-day-bugs-exploit&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;37 Millionen Downloads: 287 Chrome-Extensions bei der Spionage erwischt&lt;/h3&gt;

Forscher haben den Traffic zahlreicher Chrome-Erweiterungen analysiert. 287 davon spionieren für Datenbroker das Surfverhalten aus.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/37-millionen-downloads-287-chrome-extensions-bei-der-spionage-erwischt-2602-205381.html&quot;&gt;https://www.golem.de/news/37-millionen-downloads-287-chrome-extensions-bei-der-spionage-erwischt-2602-205381.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Bypassing Administrator Protection by Abusing UI Access&lt;/h3&gt;

In my last blog post I introduced the new Windows feature, Administrator Protection and how it aimed to create a secure boundary for UAC where one didn-t exist. I described one of the ways I was able to bypass the feature before it was released. In total I found 9 bypasses during my research that have now all been fixed.In this blog post I wanted to describe the root cause of 5 of those 9 issues, specifically the implementation of UI Access, how this has been a long standing problem with UAC that-s been under-appreciated, and how it-s being fixed now.
&lt;p /&gt;
&lt;A HREF=&quot;https://projectzero.google/2026/02/windows-administrator-protection.html&quot;&gt;https://projectzero.google/2026/02/windows-administrator-protection.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;IPFire stellt freie Domain-Blockliste DBL vor&lt;/h3&gt;

Die IPFire-Entwickler haben mit DBL eine kategorisierte Domain-Blockliste veröffentlicht. Sie soll Malware, Phishing und Tracker blockieren.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/IPFire-stellt-freie-Domain-Blockliste-DBL-vor-11175994.html&quot;&gt;https://www.heise.de/news/IPFire-stellt-freie-Domain-Blockliste-DBL-vor-11175994.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;How to find and remove credential-stealing Chrome extensions&lt;/h3&gt;

Researchers have uncovered 30 Chrome extensions stealing user data. Here-s how to check your browser and remove any malicious extensions step by step.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.malwarebytes.com/blog/news/2026/02/how-to-find-and-remove-credential-stealing-chrome-extensions&quot;&gt;https://www.malwarebytes.com/blog/news/2026/02/how-to-find-and-remove-credential-stealing-chrome-extensions&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Vorsicht, Trojaner! Kursierende Nachrichten zu Urheberrechtsverletzungen sind Fakes!&lt;/h3&gt;

Mit Phishing-Nachrichten im Namen real existierender Unternehmen versuchen Kriminelle aktuell, Schadsoftware auf die Endgeräte ihrer Opfer zu schummeln. Die erhobenen Anschuldigungen sind natürlich frei erfunden, das angehängte Dokument ist allerdings hochgefährlich.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/vorsicht-trojaner-urheberrechtsverletzungen/&quot;&gt;https://www.watchlist-internet.at/news/vorsicht-trojaner-urheberrechtsverletzungen/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Urgent warnings from UK and US cyber agencies after Polish energy grid attack&lt;/h3&gt;

A coordinated cyberattack that targeted Polands energy infrastructure in late December 2025 has prompted cybersecurity agencies to issue urgent warnings to critical national infrastructure operators on both sides of the Atlantic.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.fortra.com/blog/urgent-warnings-uk-and-us-cyber-agencies-after-polish-energy-grid-attack&quot;&gt;https://www.fortra.com/blog/urgent-warnings-uk-and-us-cyber-agencies-after-polish-energy-grid-attack&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Naming and shaming: How ransomware groups tighten the screws on victims&lt;/h3&gt;

When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.welivesecurity.com/en/ransomware/naming-shaming-ransomware-groups-tighten-screws-victims/&quot;&gt;https://www.welivesecurity.com/en/ransomware/naming-shaming-ransomware-groups-tighten-screws-victims/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Lawful access to encrypted data: why is this so hard to do?&lt;/h3&gt;

As I am now a member of the  EU expert group which is tasked with coming up with a solution, I have been thinking a lot about this problem. An interesting train of thought turned out to be the question -We managed to give Law Enforcement (LE) wiretapping powers in old-style phone networks, but not in modern, Internet-based communication services. Why?-
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cert.at/en/blog/2026/2/lawful-access-to-encrypted-data-why-is-this-so-hard-to-do&quot;&gt;https://www.cert.at/en/blog/2026/2/lawful-access-to-encrypted-data-why-is-this-so-hard-to-do&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;8,000+ ChatGPT API Keys Left Publicly Accessible&lt;/h3&gt;

The rapid integration of artificial intelligence into mainstream software development has introduced a new category of security risk, one that many organizations are still unprepared to manage. According to research conducted by Cyble Research and Intelligence Labs (CRIL), thousands of exposed ChatGPT API keys are currently accessible across public infrastructure, dramatically lowering the barrier for abuse.  CRIL identified more than 5,000 publicly accessible GitHub repositories containing
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/exposed-chatgpt-api-keys-github-websites/&quot;&gt;https://thecyberexpress.com/exposed-chatgpt-api-keys-github-websites/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Jetzt patchen! Angreifer attackieren BeyondTrust-Fernwartungslösungen&lt;/h3&gt;

Angreifer nutzen eine kritische Schadcode-Lücke in BeyondTrust Remote Support und Privileged Remote Access aus. Sicherheitspatches sind verfügbar.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Jetzt-patchen-Angreifer-attackieren-BeyondTrust-Fernwartungsloesungen-11175384.html&quot;&gt;https://www.heise.de/news/Jetzt-patchen-Angreifer-attackieren-BeyondTrust-Fernwartungsloesungen-11175384.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Qnap-NAS: Unbefugte Dateisystemzugriffe möglich&lt;/h3&gt;

Sicherheitspatches für die NAS-Betriebssysteme QTS und QuTS hero von Qnap schließen mehrere Lücken.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Qnap-NAS-Unbefugte-Dateisystemzugriffe-moeglich-11175677.html&quot;&gt;https://www.heise.de/news/Qnap-NAS-Unbefugte-Dateisystemzugriffe-moeglich-11175677.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN Security updates for Friday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1058642/&quot;&gt;https://lwn.net/Articles/1058642/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-13T18:28:16Z</dc:date></entry><entry><title>Tageszusammenfassung - 12.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-12022026"/><author><name>CERT.at</name></author><updated>2026-02-12T19:22:45Z</updated><published>2026-02-12T19:22:45Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Mittwoch 11-02-2026 18:00 - Donnerstag 12-02-2026 18:00
Handler:     Michael Schlagenhaufer
Co-Handler:  Felician Fuchs


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Crazy ransomware gang abuses employee monitoring tool in attacks&lt;/h3&gt;

A member of the Crazy ransomware gang is abusing legitimate employee monitoring software and the SimpleHelp remote support tool to maintain persistence in corporate networks, evade detection, and prepare for ransomware deployment.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/crazy-ransomware-gang-abuses-employee-monitoring-tool-in-attacks/&quot;&gt;https://www.bleepingcomputer.com/news/security/crazy-ransomware-gang-abuses-employee-monitoring-tool-in-attacks/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft Store Outlook add-in hijacked to steal 4,000 Microsoft accounts&lt;/h3&gt;

The AgreeTo add-in for Outlook has been hijacked and turned into a phishing kit that stole more than 4,000 Microsoft account credentials. [..] Office add-ins are just URLs pointing to content loaded into Microsoft products from the developer's server. In the case of AgreeTo, the developer used a Vercel-hosted URL (outlook-one.vercel.app) but abandoned the project, despite the userbase it formed. [..] The case of AgreeTo stands out, though, as it is likely the first to be hosted on Microsoft-s Marketplace.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/microsoft-store-outlook-add-in-hijacked-to-steal-4-000-microsoft-accounts/&quot;&gt;https://www.bleepingcomputer.com/news/security/microsoft-store-outlook-add-in-hijacked-to-steal-4-000-microsoft-accounts/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Betrügerische Post-Emails im Umlauf&lt;/h3&gt;

Rechnungen von der Post per E-Mail sind häufig Fake. Aktuell kursiert eine Variante, bei der 9,30 Euro für eine Sendung beglichen werden sollen. Ein Klick auf den Button führt auf eine Phishing-Website, auf der Kreditkartendaten gestohlen werden können.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/betruegerische-post-emails-im-umlauf/&quot;&gt;https://www.watchlist-internet.at/news/betruegerische-post-emails-im-umlauf/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Nation-State Actors Exploit Notepad++ Supply Chain&lt;/h3&gt;

Between June and December 2025, the official hosting infrastructure for the text editor Notepad++ was compromised by a state-sponsored threat group known as Lotus Blossom. The attackers breached the shared hosting provider-s environment. [..] We-ve identified additional unreported infrastructure, which is linked to this campaign.
&lt;p /&gt;
&lt;A HREF=&quot;https://unit42.paloaltonetworks.com/notepad-infrastructure-compromise/&quot;&gt;https://unit42.paloaltonetworks.com/notepad-infrastructure-compromise/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Kritische Schwachstellen in diversen Routern von Linksys&lt;/h3&gt;

Linksys-Router beinhalten Schwachstellen, die bis zu einer unauthentifizierten und vollständigen Kompromittierung der Geräte über das Internet führen. Der Hersteller Linksys hat für betroffene Geräte ein Update bereitgestellt, welches allerdings nur eine Ausnutzung über das Internet verhindert. [..] Shortly after discovering the vulnerabilities, a -quick- scan of the internet showed about 12.000 vulnerable devices. Around six months after the fix was available, this number shrunk to around 4.000. A reason for this large drop is probably because the Linksys routers support auto-update, which is enabled by default and installs new firmware updates without any user interaction.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.syss.de/pentest-blog/schwachstellen-in-linksys-routern&quot;&gt;https://www.syss.de/pentest-blog/schwachstellen-in-linksys-routern&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;US wants cyber partnerships to send -coordinated, strategic message- to adversaries&lt;/h3&gt;

National Cyber Director Sean Cairncross told attendees of the Munich Cyber Security Conference that Washington is looking to deepen cooperation with partners rather than act alone.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/us-wants-cyber-partnerships-to-send-message-to-adversaries&quot;&gt;https://therecord.media/us-wants-cyber-partnerships-to-send-message-to-adversaries&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use&lt;/h3&gt;

In the final quarter of 2025, Google Threat Intelligence Group (GTIG) observed threat actors increasingly integrating artificial intelligence (AI) to accelerate the attack lifecycle, achieving productivity gains in reconnaissance, social engineering, and malware development. This report serves as an update to our November 2025 findings regarding the advances in threat actor usage of AI tools.
&lt;p /&gt;
&lt;A HREF=&quot;https://cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use/&quot;&gt;https://cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Scary Agent Skills: Hidden Unicode Instructions in Skills ...And How To Catch Them ·&lt;/h3&gt;

There is a lot of talk about Skills recently, both in terms of capabilities and security concerns. However, so far I haven-t seen anyone bring up hidden prompt injection. So, I figured to demo a Skills supply chain backdoor that survives human review.
&lt;p /&gt;
&lt;A HREF=&quot;https://embracethered.com/blog/posts/2026/scary-agent-skills/&quot;&gt;https://embracethered.com/blog/posts/2026/scary-agent-skills/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices&lt;/h3&gt;

Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to address a zero-day flaw that it said has been exploited in sophisticated cyber attacks.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/apple-fixes-exploited-zero-day.html&quot;&gt;https://thehackernews.com/2026/02/apple-fixes-exploited-zero-day.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Dell schließt unzählige Sicherheitslücken in Avamar, iDRAC und NetWorker&lt;/h3&gt;

In drei Warnmeldungen listet Dell die nun geschlossenen Sicherheitslücken in Komponenten von Drittanbietern auf, die Avamar und NetWorker betreffen. [..] Darunter fallen Komponenten wie Apache HTTP Server, Expat, OpenSSL und Vim. Der Großteil der geschlossenen Lücken stammt aus dem Jahr 2025. Darunter sind auch -kritische- Schwachstellen (etwa Samba CVE-2025-10230), über die Schadcode auf Systeme gelangen kann.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Dell-schliesst-unzaehlige-Sicherheitsluecken-in-Avamar-iDRAC-und-NetWorker-11173829.html&quot;&gt;https://www.heise.de/news/Dell-schliesst-unzaehlige-Sicherheitsluecken-in-Avamar-iDRAC-und-NetWorker-11173829.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Fortinet: LDAP authentication bypass in Agentless VPN and FSSO&lt;/h3&gt;

An Authentication Bypass by Primary Weakness vulnerability [CWE-305] in FortiOS fnbamd may allow an unauthenticated attacker to bypass LDAP authentication of Agentless VPN or FSSO policy, under specific LDAP server configuration. CVE-2026-22153
&lt;p /&gt;
&lt;A HREF=&quot;https://www.fortiguard.com/psirt/FG-IR-25-1052&quot;&gt;https://www.fortiguard.com/psirt/FG-IR-25-1052&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;High-Severity RCE Vulnerability Disclosed in next-mdx-remote&lt;/h3&gt;

HashiCorp has published HCSEC-2026-01, disclosing a high-severity vulnerability in the popular next-mdx-remote library that can lead to arbitrary code execution when rendering untrusted MDX content on the server. The issue is tracked as CVE-2026-0969 (GHSA-g4xw-jxrg-5f6m) and carries a CVSS 3.1 score of 8.8 (High). [..] It is fixed in version 6.0.0. [..] For clarity, this is not a vulnerability in Next.js itself. It affects applications that use next-mdx-remote to compile untrusted MDX content on the server.
&lt;p /&gt;
&lt;A HREF=&quot;https://socket.dev/blog/high-severity-rce-vulnerability-disclosed-in-next-mdx-remote&quot;&gt;https://socket.dev/blog/high-severity-rce-vulnerability-disclosed-in-next-mdx-remote&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Multiple Vulnerabilities in various Solax Power Pocket WiFi models&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-various-solax-power-pocket-wifi-models/&quot;&gt;https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-various-solax-power-pocket-wifi-models/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN Security updates for Thursday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1058473/&quot;&gt;https://lwn.net/Articles/1058473/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-12T19:22:45Z</dc:date></entry><entry><title>Tageszusammenfassung - 11.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-11022026"/><author><name>CERT.at</name></author><updated>2026-02-11T19:13:57Z</updated><published>2026-02-11T19:13:57Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Dienstag 10-02-2026 18:00 - Mittwoch 11-02-2026 18:00
Handler:     Guenes Holler
Co-Handler:  Felician Fuchs


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;New Linux botnet SSHStalker uses old-school IRC for C2 comms&lt;/h3&gt;

A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/new-linux-botnet-sshstalker-uses-old-school-irc-for-c2-comms/&quot;&gt;https://www.bleepingcomputer.com/news/security/new-linux-botnet-sshstalker-uses-old-school-irc-for-c2-comms/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;In Bypassing MFA, ZeroDayRAT Is Textbook Stalkerware&lt;/h3&gt;

With access to SIM, location data, and a preview of recent SMSes, attackers have everything they need for account takeover or targeted social engineering.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.darkreading.com/threat-intelligence/zerodayrat-brings-commercial-spyware-to-mass-market&quot;&gt;https://www.darkreading.com/threat-intelligence/zerodayrat-brings-commercial-spyware-to-mass-market&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies&lt;/h3&gt;

The information technology (IT) workers associated with the Democratic Peoples Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals theyre impersonating, marking a new escalation of the fraudulent scheme.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/dprk-operatives-impersonate.html&quot;&gt;https://thehackernews.com/2026/02/dprk-operatives-impersonate.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Kimwolf Botnet Swamps Anonymity Network I2P&lt;/h3&gt;

For the past week, the massive &quot;Internet of Things&quot; (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentralized, encrypted communications network designed to anonymize and secure online communications. I2P users started reporting disruptions in the network around the same time the Kimwolf botmasters began relying on it to evade takedown attempts against the botnets control servers.
&lt;p /&gt;
&lt;A HREF=&quot;https://krebsonsecurity.com/2026/02/kimwolf-botnet-swamps-anonymity-network-i2p/&quot;&gt;https://krebsonsecurity.com/2026/02/kimwolf-botnet-swamps-anonymity-network-i2p/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Shelly IoT door controller config fail: leaving your garage, home and security exposed&lt;/h3&gt;

I love my Shelly devices. They are an essential part of my smart home setup. I use them for everything from lights and plugs to garage doors and garden sprinkler control! One of the first Shelly devices I installed about five years ago recently stopped working, so I replaced it with one of their new fourth-generation Shelly 1 devices. That-s when I noticed an issue I hadn-t seen in previous generations.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.pentestpartners.com/security-blog/shelly-iot-door-controller-config-fail-leaving-your-garage-home-and-security-exposed/&quot;&gt;https://www.pentestpartners.com/security-blog/shelly-iot-door-controller-config-fail-leaving-your-garage-home-and-security-exposed/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Recovery Scam: Wie Betrugsopfer erneut geschädigt werden&lt;/h3&gt;

Durch Onlinebetrug verlorenes Geld zurückzuholen, das wünschen sich viele Opfer. Und genau diesen Wunsch versuchen Kriminelle für ihre Zwecke zu nutzen. Mit dem sogenannten -Recovery Scam- ziehen sie bereits Geschädigten zusätzlich Geld aus der Tasche. Im Beispielfall geht es um angeblich wiedergefundene Krypto-Assets und für die Rücküberweisung notwendige Vorauszahlungen. Der Köder: Die Website betrugsrecht(.)de.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/recovery-scam-erneut-geschaedigt/&quot;&gt;https://www.watchlist-internet.at/news/recovery-scam-erneut-geschaedigt/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;A Peek Into Muddled Libra-s Operational Playbook&lt;/h3&gt;

Explore the tools Unit 42 found on a Muddled Libra rogue host. Learn how they target domain controllers and use search engines to aid their attacks.
&lt;p /&gt;
&lt;A HREF=&quot;https://unit42.paloaltonetworks.com/muddled-libra-ops-playbook/&quot;&gt;https://unit42.paloaltonetworks.com/muddled-libra-ops-playbook/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cybersicherheit Zuhause: Privathaushalte als unterschätzte Angriffsfläche&lt;/h3&gt;

Smartphones, Smarthome-Systeme, Cloud-Dienste und vernetzte Haushaltsgeräte sind längst fester Bestandteil des Alltags. Doch während Unternehmen und Behörden auf etablierte Standards, definierte Prozesse und vorhandene Expertise setzen können, bleibt IT-Sicherheit im privaten Umfeld meistens ungeregelt: Unzureichendes Knowhow, geteilte Passwörter und eine unsichere Konfiguration der gemeinsam genutzten Geräte erhöhen in vielen Familien und Wohngemeinschaften das digitale Risiko erheblich.
&lt;p /&gt;
&lt;A HREF=&quot;https://certitude.consulting/blog/de/cybersicherheit-zuhause-privathaushalte-als-unterschatzte-angriffsflache/&quot;&gt;https://certitude.consulting/blog/de/cybersicherheit-zuhause-privathaushalte-als-unterschatzte-angriffsflache/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure&lt;/h3&gt;

This joint Cybersecurity Advisory is being published as an addition to the Cybersecurity and Infrastructure Security Agency (CISA) May 6, 2025, joint fact sheet Primary Mitigations to Reduce Cyber Threats to Operational Technology and European Cybercrime Centre-s (EC3) Operation Eastwood, in which CISA, Federal Bureau of Investigation (FBI), Department of Energy (DOE), Environmental Protection Agency (EPA), and EC3 shared information about cyber incidents affecting the operational technology (OT) and industrial control systems (ICS) of critical infrastructure entities in the United States and globally.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-343a&quot;&gt;https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-343a&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Love Is in the Air - and So Are Scammers: Valentine-s Day 2026 Threats to Watch For&lt;/h3&gt;

As Valentine-s Day 2026 approaches, people are turning to online shopping, digital dating, and last-minute gift ideas. Unfortunately, cyber criminals are doing the same. Check Point researchers have identified a sharp rise in Valentine-themed phishing websites, fraudulent stores, and fake dating platforms designed to steal personal data and payment information.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.checkpoint.com/research/love-is-in-the-air-and-so-are-scammers-valentines-day-2026-threats-to-watch-for/&quot;&gt;https://blog.checkpoint.com/research/love-is-in-the-air-and-so-are-scammers-valentines-day-2026-threats-to-watch-for/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Active Ivanti Exploitation Traced to Single Bulletproof IP-Published IOC Lists Point Elsewhere&lt;/h3&gt;

The GreyNoise Global Observation Grid observed active exploitation of two critical Ivanti Endpoint Manager Mobile vulnerabilities, and 83% of that exploitation traces to a single IP address on bulletproof hosting infrastructure that does not appear on widely circulated IOC lists.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.greynoise.io/blog/active-ivanti-exploitation&quot;&gt;https://www.greynoise.io/blog/active-ivanti-exploitation&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hope Is Not a Security Strategy: Why Secure-by-Default Beats Hardening&lt;/h3&gt;

Security has always assumed deterministic behavior. We can-t write policy to prevent bad outcomes when we don-t even know what the agent will do. Sandboxing is the natural answer: everyone is buying Mac Minis to run Moltbot (OpenClaw now), Docker is using microVMs for coding agent sandboxes, and countless projects offer sandboxing tools for AI agents.
&lt;p /&gt;
&lt;A HREF=&quot;https://tuananh.net/2026/02/09/hope-is-not-a-security-strategy/&quot;&gt;https://tuananh.net/2026/02/09/hope-is-not-a-security-strategy/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Sicherheitslücken: Attacken auf Windows, Office und den Internet Explorer&lt;/h3&gt;

Der Februar fällt im Hinblick auf die Anzahl der zum Microsoft-Patchday geschlossenen Sicherheitslücken wieder etwas milder aus als der Januar. Jedoch befinden sich darunter gleich sechs Lücken, die bereits aktiv ausgenutzt werden. Betroffen sind nicht nur Windows-Systeme, sondern ebenso Microsoft Office und der totgeglaubte Internet Explorer. Nutzer sollten zügig patchen, um sich zu schützen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/microsoft-patchday-zero-day-luecken-in-windows-office-und-im-internet-explorer-2602-205258.html&quot;&gt;https://www.golem.de/news/microsoft-patchday-zero-day-luecken-in-windows-office-und-im-internet-explorer-2602-205258.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Patchday bei Adobe: After Effects &amp; Co. für Schadcode-Attacken anfällig&lt;/h3&gt;

Sicherheitspatches schließen mehrere Schwachstellen in Anwendungen von Adobe. Bislang gibt es keine Berichte zu Attacken.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Patchday-bei-Adobe-After-Effects-Co-fuer-Schadcode-Attacken-anfaellig-11172390.html&quot;&gt;https://www.heise.de/news/Patchday-bei-Adobe-After-Effects-Co-fuer-Schadcode-Attacken-anfaellig-11172390.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;800,000 WordPress Sites Affected by Arbitrary File Upload Vulnerability in WPvivid Backup WordPress Plugin&lt;/h3&gt;

On January 12th, 2026, we received a submission for an Arbitrary File Upload vulnerability in WPvivid Backup, a WordPress plugin with more than 800,000 active installations. This vulnerability can be used by unauthenticated attackers to upload arbitrary files to a vulnerable site and achieve remote code execution, which is typically leveraged for a complete site takeover.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.wordfence.com/blog/2026/02/800000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-wpvivid-backup-wordpress-plugin/&quot;&gt;https://www.wordfence.com/blog/2026/02/800000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-wpvivid-backup-wordpress-plugin/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;TP-Link Systems Inc. VIGI Series IP Camera&lt;/h3&gt;

Successful exploitation of this vulnerability could result in unauthorized users gaining administrative access to affected closed circuit television cameras.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-036-01&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-036-01&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LWN Security updates for Wednesday&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1058265/&quot;&gt;https://lwn.net/Articles/1058265/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-11T19:13:57Z</dc:date></entry><entry><title>Tageszusammenfassung - 10.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-10022026"/><author><name>CERT.at</name></author><updated>2026-02-10T18:40:14Z</updated><published>2026-02-10T18:40:14Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Montag 09-02-2026 18:00 - Dienstag 10-02-2026 18:00
Handler:     Guenes Holler
Co-Handler:  Felician Fuchs


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Hackers breach SmarterTools network using flaw in its own software&lt;/h3&gt;

SmarterTools confirmed last week that the Warlock ransomware gang breached its network after compromising an email system, but did not impact business applications or account data.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/hackers-breach-smartertools-network-using-flaw-in-its-own-software/&quot;&gt;https://www.bleepingcomputer.com/news/security/hackers-breach-smartertools-network-using-flaw-in-its-own-software/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;ZeroDayRAT malware grants full access to Android, iOS devices&lt;/h3&gt;

A new commercial mobile spyware platform dubbed ZeroDayRAT is being advertised to cybercriminals on Telegram as a tool that provides full remote control over compromised Android and iOS devices.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/zerodayrat-malware-grants-full-access-to-android-ios-devices/&quot;&gt;https://www.bleepingcomputer.com/news/security/zerodayrat-malware-grants-full-access-to-android-ios-devices/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Trojaner an Bord: Mit Schadcode verseuchte 7-Zip-Version in Umlauf&lt;/h3&gt;

Wer das Packprogramm 7-Zip herunterlädt, sollte dringend auf die korrekte Domain achten. Eine mit Malware verseuchte Version wurde gesichtet.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/trojaner-an-bord-mit-schadcode-verseuchte-7-zip-versionen-in-umlauf-2602-205223.html&quot;&gt;https://www.golem.de/news/trojaner-an-bord-mit-schadcode-verseuchte-7-zip-versionen-in-umlauf-2602-205223.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data&lt;/h3&gt;

The Netherlands Dutch Data Protection Authority (AP) and the Council for the Judiciary confirmed both agencies (Rvdr) have disclosed that their systems were impacted by cyber attacks that exploited the recently disclosed security flaws in Ivanti Endpoint Manager Mobile (EPMM), according to a notice sent to the countrys parliament on Friday.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/dutch-authorities-confirm-ivanti-zero.html&quot;&gt;https://thehackernews.com/2026/02/dutch-authorities-confirm-ivanti-zero.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools&lt;/h3&gt;

Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) component for defense evasion purposes within the ransomware payload itself.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/reynolds-ransomware-embeds-byovd-driver.html&quot;&gt;https://thehackernews.com/2026/02/reynolds-ransomware-embeds-byovd-driver.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;More than 135,000 OpenClaw instances exposed to internet in latest vibe-coded disaster&lt;/h3&gt;

By default, the bot listens on all network interfaces, and many users never change it Its a day with a name ending in Y, so you know what that means: Another OpenClaw cybersecurity disaster.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.theregister.com/2026/02/09/openclaw_instances_exposed_vibe_code/&quot;&gt;https://www.theregister.com/2026/02/09/openclaw_instances_exposed_vibe_code/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Introducing Augustus: Open Source LLM Prompt Injection Tool&lt;/h3&gt;

Last month we released Julius, a tool that answers the question: -what LLM service is running on this endpoint?- Julius identifies the infrastructure. But identification is only the first step. The natural follow-up: -now that I know what-s running, how do I test whether it-s secure?- That-s what Augustus does.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.praetorian.com/blog/introducing-augustus-open-source-llm-prompt-injection/&quot;&gt;https://www.praetorian.com/blog/introducing-augustus-open-source-llm-prompt-injection/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Jetzt patchen! Abermals Attacken auf SolarWinds Web Help Desk beobachtet&lt;/h3&gt;

Sicherheitsforschern zufolge nutzen Angreifer derzeit kritische Schadcode-Lücken in SolarWinds Web Help Desk aus.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Jetzt-patchen-Abermals-Attacken-auf-SolarWinds-Web-Help-Desk-beobachtet-11170887.html&quot;&gt;https://www.heise.de/news/Jetzt-patchen-Abermals-Attacken-auf-SolarWinds-Web-Help-Desk-beobachtet-11170887.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Archive.today: Betreiber setzt Nutzer für DDoS-Attacke ein&lt;/h3&gt;

Der Betreiber von Archive.today setzt Besucher seiner Seite unwissentlich für eine DDoS-Attacke. Betroffener ist ein finnischer Blogger.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Archive-today-Betreiber-setzt-Nutzer-fuer-DDoS-Attacke-ein-11170623.html&quot;&gt;https://www.heise.de/news/Archive-today-Betreiber-setzt-Nutzer-fuer-DDoS-Attacke-ein-11170623.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;North Korean hackers targeted crypto exec with fake Zoom meeting, ClickFix scam&lt;/h3&gt;

The scam involved a ClickFix attack where hackers install malware on a device by having the victim try to resolve fictitious technical issues.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/north-korean-hackers-targeted-crypto-exec-clickfix&quot;&gt;https://therecord.media/north-korean-hackers-targeted-crypto-exec-clickfix&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Pride Month Phishing Targets Employees via Trusted Email Services&lt;/h3&gt;

Attackers are using Pride Month themed phishing emails to target employees worldwide, abusing trusted email platforms like SendGrid to harvest credentials.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/pride-month-phishing-employees-trusted-email-services/&quot;&gt;https://hackread.com/pride-month-phishing-employees-trusted-email-services/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;New Cybercrime Group 0APT Accused of Faking Hundreds of Breach Claims&lt;/h3&gt;

Researchers reveal the new 0APT cyber group is fabricating attacks on large organisations. Learn how they use fake data to trick companies into paying.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/cybercrime-group-0apt-faking-breach-claims/&quot;&gt;https://hackread.com/cybercrime-group-0apt-faking-breach-claims/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Beyond the Battlefield: Threats to the Defense Industrial Base&lt;/h3&gt;

Introduction In modern warfare, the front lines are no longer confined to the battlefield; they extend directly into the servers and supply chains of the industry that safeguards the nation. Today, the defense sector faces a relentless barrage of cyber operations conducted by state-sponsored actors and criminal groups alike.
&lt;p /&gt;
&lt;A HREF=&quot;https://cloud.google.com/blog/topics/threat-intelligence/threats-to-defense-industrial-base/&quot;&gt;https://cloud.google.com/blog/topics/threat-intelligence/threats-to-defense-industrial-base/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps&lt;/h3&gt;

The purpose of this Alert is to amplify Poland-s Computer Emergency Response Team (CERT Polska-s) Energy Sector Incident Report published on Jan. 30, 2026, and highlight key mitigations for Energy Sector stakeholders.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/alerts/2026/02/10/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps&quot;&gt;https://www.cisa.gov/news-events/alerts/2026/02/10/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Deep Dive into New XWorm Campaign Utilizing Multiple-Themed Phishing Emails&lt;/h3&gt;

FortiGuard Labs recently captured a phishing campaign in the wild delivering a new variant of XWorm. XWorm is a multi-functional Remote Access Trojan (RAT) first identified in 2022 that remains actively distributed, including through Telegram-based marketplaces. Once deployed, it provides attackers with full remote control of compromised Windows systems.
&lt;p /&gt;
&lt;A HREF=&quot;https://feeds.fortinet.com/~/945702296/0/fortinet/blogs~Deep-Dive-into-New-XWorm-Campaign-Utilizing-MultipleThemed-Phishing-Emails&quot;&gt;https://feeds.fortinet.com/~/945702296/0/fortinet/blogs~Deep-Dive-into-New-XWorm-Campaign-Utilizing-MultipleThemed-Phishing-Emails&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Tech impersonators: ClickFix and MacOS infostealers&lt;/h3&gt;

Datadog identified an active campaign employing fake GitHub repositories impersonating software companies and leveraging the ClickFix initial access technique to deliver macOS infostealers.
&lt;p /&gt;
&lt;A HREF=&quot;https://securitylabs.datadoghq.com/articles/tech-impersonators-clickfix-and-macos-infostealers/&quot;&gt;https://securitylabs.datadoghq.com/articles/tech-impersonators-clickfix-and-macos-infostealers/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Security updates for Tuesday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (fence-agents, firefox, fontforge, freerdp, kernel-rt, keylime, libsoup, libsoup3, nodejs22, nodejs24, opentelemetry-collector, osbuild-composer, python3.12-wheel, qemu-kvm, resource-agents, thunderbird, and util-linux), Debian (kernel, rlottie, shaarli, and usbmuxd), Fedora (asciinema, atuin, bustle, cef, envision, glycin, greetd, helix, java-21-openjdk, java-25-openjdk, java-latest-openjdk, keylime-agent-rust, maturin, mirrorlist-server, ntpd-rs, python3.6, rust-add-determinism, rust-afterburn, rust-ambient-id, rust-app-store-connect, rust-bat, rust-below, rust-btrd, rust-busd, rust-bytes, rust-cargo-c, rust-cargo-deny, rust-coreos-installer, rust-crypto-auditing-agent, rust-crypto-auditing-client, rust-crypto-auditing-event-broker, rust-crypto-auditing-log-parser, rust-dua-cli, rust-eif_build, rust-git-delta, rust-git-interactive-rebase-tool, rust-git2, rust-gst-plugin-dav1d, rust-gst-plugin-reqwest, rust-heatseeker, rust-ingredients, rust-jsonwebtoken, rust-lsd, rust-monitord, rust-monitord-exporter, rust-muvm, rust-nu, rust-num-conv, rust-onefetch, rust-oo7-cli, rust-pleaser, rust-pore, rust-pretty-git-prompt, rust-procs, rust-rbspy, rust-rbw, rust-rd-agent, rust-rd-hashd, rust-redlib, rust-resctl-bench, rust-resctl-demo, rust-routinator, rust-sccache, rust-scx_layered, rust-scx_rustland, rust-scx_rusty, rust-sequoia-chameleon-gnupg, rust-sequoia-keystore-server, rust-sequoia-octopus-librnp, rust-sequoia-sq, rust-sevctl, rust-shadow-rs, rust-sigul-pesign-bridge, rust-snpguest, rust-speakersafetyd, rust-tealdeer, rust-time, rust-time-core, rust-time-macros, rust-tokei, rust-weezl, rust-wiremix, rust-ybaas, rustup, sad, tbtools, tuigreet, and uv), Mageia (fontforge and nginx), Oracle (firefox, fontforge, freerdp, kernel, keylime, libsoup, python, thunderbird, and uek-kernel), SUSE (abseil-cpp and kernel), and Ubuntu (freerdp2 and libsoup3).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1057993/&quot;&gt;https://lwn.net/Articles/1057993/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;XSS via back button&lt;/h3&gt;

An Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) vulnerability [CWE-79] in FortiSandbox may allow an unauthenticated attacker to execute commands via crafted requests. FortiSandbox PaaS versions 4.4.8 and 5.0.5 contains the fix for this vulnerability.
&lt;p /&gt;
&lt;A HREF=&quot;https://fortiguard.fortinet.com/psirt/FG-IR-25-093&quot;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-25-093&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Schwerwiegende Schwachstellen in Google Looker aufgedeckt&lt;/h3&gt;

Noch ein kleiner Nachtrag zu einer Information, die mich vor einigen Tagen erreichte. Sicherheitsforscher von Tenable Research habe zwei schwerwiegende Sicherheitslücken in in Google Looker entdeckt und als &quot;LookOut&quot; bezeichnet. Angreifer können ganze Systeme kapern, um Firmengeheimnisse zu stehlen.
&lt;p /&gt;
&lt;A HREF=&quot;https://borncity.com/blog/2026/02/09/schwerwiegende-schwachstellen-in-google-looker-aufgedeckt/&quot;&gt;https://borncity.com/blog/2026/02/09/schwerwiegende-schwachstellen-in-google-looker-aufgedeckt/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;February 2026 Security Update&lt;/h3&gt;

Ivanti releases standard security patches on the second Tuesday of every month. Our vulnerability management program is central to our commitment to maintaining secure products. Our philosophy is simple: discovering and communicating vulnerabilities, and sharing that information with defenders, is not an indication of weakness; rather it is evidence of rigorous scrutiny and a proactive vulnerability management program.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.ivanti.com/blog/february-2026-security-update&quot;&gt;https://www.ivanti.com/blog/february-2026-security-update&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Roundcube 1.7 RC3 released&lt;/h3&gt;

We just published the third release candidate for the next major version 1.7 of Roundcube webmail. This release fixes two security issues, and contains a few more fixes for several issues.
&lt;p /&gt;
&lt;A HREF=&quot;https://roundcube.net/news/2026/02/09/roundcube-1.7-rc3-released&quot;&gt;https://roundcube.net/news/2026/02/09/roundcube-1.7-rc3-released&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Attacken auf BeyondTrust Remote Support und Privileged Remote Access möglich&lt;/h3&gt;

Zwei Fernwartungslösungen von BeyondTrust sind verwundbar. Sicherheitsupdates schließen eine kritische Lücke.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11171444&quot;&gt;https://heise.de/-11171444&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;SAP Security Patch Day February 2026&lt;/h3&gt;

SAP has released its February 2026 security patch package containing 27 security notes addressing critical vulnerabilities across enterprise SAP environments. This release includes two HotNews vulnerabilities with CVSS ratings up to 9.9, seven High priority issues, sixteen Medium priority fixes, and two Low priority updates.
&lt;p /&gt;
&lt;A HREF=&quot;https://redrays.io/blog/sap-security-patch-day-february-2026/&quot;&gt;https://redrays.io/blog/sap-security-patch-day-february-2026/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Yokogawa FAST/TOOLS&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-041-01&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-041-01&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;AVEVA PI Data Archive&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-041-03&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-041-03&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;ZLAN Information Technology Co. ZLAN5143D&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-041-02&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-041-02&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-10T18:40:14Z</dc:date></entry><entry><title>Tageszusammenfassung - 09.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-09022026"/><author><name>CERT.at</name></author><updated>2026-02-09T18:31:49Z</updated><published>2026-02-09T18:31:49Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Freitag 06-02-2026 18:00 - Montag 09-02-2026 18:00
Handler:     Alexander Riepl
Co-Handler:  Guenes Holler


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Datenabfluss vermutet: Cyberangriff trifft EU-Kommission&lt;/h3&gt;

Hackern ist ein Cyberangriff auf die EU-Kommission gelungen. Angriffspunkt war ein System zur Verwaltung mobiler Endgeräte - vermutlich von Ivanti.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/datenabfluss-moeglich-cyberangriff-trifft-eu-kommission-2602-205154.html&quot;&gt;https://www.golem.de/news/datenabfluss-moeglich-cyberangriff-trifft-eu-kommission-2602-205154.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure&lt;/h3&gt;

Cybersecurity researchers have called attention to a &quot;massive campaign&quot; that has systematically targeted cloud native environments to set up malicious infrastructure for follow-on exploitation.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/teampcp-worm-exploits-cloud.html&quot;&gt;https://thehackernews.com/2026/02/teampcp-worm-exploits-cloud.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Technical Analysis of GuLoader Obfuscation Techniques&lt;/h3&gt;

In this blog post, Zscaler ThreatLabz explores the anti-analysis techniques that GuLoader employs including polymorphic code to dynamically construct constant and string values, as well as complex exception-based control flow obfuscation.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.zscaler.com/blogs/security-research/technical-analysis-guloader-obfuscation-techniques&quot;&gt;https://www.zscaler.com/blogs/security-research/technical-analysis-guloader-obfuscation-techniques&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Novel Technique to Detect Cloud Threat Actor Operations&lt;/h3&gt;

Cloud-based alerting systems often struggle to distinguish between normal cloud activity and targeted malicious operations by known threat actors. The difficulty doesn-t lie in an inability to identify complex alerting operations across thousands of cloud resources or in a failure to follow identity resources, the problem lies in the accurate detection of known persistent threat actor group techniques specifically within cloud environments.
&lt;p /&gt;
&lt;A HREF=&quot;https://unit42.paloaltonetworks.com/tracking-threat-groups-through-cloud-logging/&quot;&gt;https://unit42.paloaltonetworks.com/tracking-threat-groups-through-cloud-logging/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;KI-Assistent OpenClaw bekommt VirusTotal an die Seite&lt;/h3&gt;

Der Entwickler von OpenClaw beabsichtigt mit einer VirusTotal-Partnerschaft die Verbreitung von Malware-Skills einzudämmen. 
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11169414&quot;&gt;https://heise.de/-11169414&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Evaluating and mitigating the growing risk of LLM-discovered 0-days&lt;/h3&gt;

Claude Opus 4.6, released today, continues a trajectory of meaningful improvements in AI models- cybersecurity capabilities. Last fall, we wrote that we believed we were at an inflection point for AI's impact on cybersecurity-that progress could become quite fast, and now was the moment to accelerate defensive use of AI. The evidence since then has only reinforced that view. AI models can now find high-severity vulnerabilities at scale. Our view is this is a moment to move quickly-to empower defenders and secure as much code as possible while the window exists.
&lt;p /&gt;
&lt;A HREF=&quot;https://red.anthropic.com/2026/zero-days/&quot;&gt;https://red.anthropic.com/2026/zero-days/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Security updates for Monday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (fontforge, kernel, and osbuild-composer), Debian (debian-security-support, sudo, wireshark, xrdp, and zabbix), Fedora (bind, bind-dyndb-ldap, chromium, k9s, libgit2, mingw-glib2, node-exporter, open-vm-tools, plantuml, xorgxrdp, and xrdp), Oracle (fence-agents, image-builder, kernel, libsoup3, and osbuild-composer), Red Hat (image-builder and osbuild-composer), Slackware (openssl and p11), SUSE (chromium, cockpit-354, cockpit-machines, cockpit-machines-346, cockpit-packages, cockpit-podman, cockpit-subscriptions, govulncheck-vulndb, kubernetes-old, libsnmp45-32bit, libxml2, localsearch, micropython, opencloud-server, python-django, python-djangorestframework, python-maturin, python311-Django, python311-wheel, python315, sqlite3, and xrdp), and Ubuntu (linux-fips, linux-aws-fips, linux-gcp-fips and python-pip).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1057759/&quot;&gt;https://lwn.net/Articles/1057759/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Ivanti EPMM (CVE-2026-1281 &amp; CVE-2026-1340) Exploitation Detection RPM Package&lt;/h3&gt;

Ivanti has released updates for Endpoint Manager Mobile (EPMM) which addresses two critical severity vulnerabilities. Successful exploitation could lead to unauthenticated remote code execution. We are aware of a very limited number of customers whose solution has been exploited at the time of disclosure. 
&lt;p /&gt;
&lt;A HREF=&quot;https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US&quot;&gt;https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;BeyondTrust warns of critical RCE flaw in remote support software&lt;/h3&gt;

BeyondTrust warned customers to patch a critical security flaw in its Remote Support (RS) and Privileged Remote Access (PRA) software that could allow unauthenticated attackers to execute arbitrary code remotely.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/beyondtrust-warns-of-critical-rce-flaw-in-remote-support-software/&quot;&gt;https://www.bleepingcomputer.com/news/security/beyondtrust-warns-of-critical-rce-flaw-in-remote-support-software/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft kümmert sich um kritische Sicherheitslücke im Azure-Umfeld&lt;/h3&gt;

Microsofts Multi-Cloud-Verwaltungslösung Azure Arc, die serverlose Entwicklungsumgebung Azure Functions und das Content Delivery Network (CDN) Azure Front Door waren verwundbar. Das Technologieunternehmen stuft die Gefahr insgesamt als kritisch ein.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Microsoft-kuemmert-sich-um-kritische-Sicherheitsluecke-im-Azure-Umfeld-11169145.html&quot;&gt;https://www.heise.de/news/Microsoft-kuemmert-sich-um-kritische-Sicherheitsluecke-im-Azure-Umfeld-11169145.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Schadcode-Lücke in FortiClient EMS kann PCs kompromittieren&lt;/h3&gt;

Admins, die in Firmen Computer mit FortiClient Endpoint Management Server (EMS) verwalten, sollten die Anwendung aus Sicherheitsgründen zeitnah auf den aktuellen Stand bringen. Eine Schwachstelle in einer bestimmten Version kann Schadcode auf Systeme lassen.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11170228&quot;&gt;https://heise.de/-11170228&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security updates 1.6.13 and 1.5.13 released&lt;/h3&gt;

We just published security updates to the 1.6 and 1.5 LTS versions of Roundcube Webmail. They both contain fixes for recently reported two security vulnerabilities.
&lt;p /&gt;
&lt;A HREF=&quot;https://roundcube.net/news/2026/02/08/security-updates-1.6.13-and-1.5.13&quot;&gt;https://roundcube.net/news/2026/02/08/security-updates-1.6.13-and-1.5.13&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Firewalls und mehr: Fast 4.000 deutsche Edge-Devices hängen ohne Support im Netz&lt;/h3&gt;

Deutsche Organisationen betreiben Tausende angreifbarer Edge-Devices wie Firewalls und VPN-Appliances. Es besteht dringender Handlungsbedarf.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/firewalls-und-mehr-fast-4-000-deutsche-edge-devices-haengen-ohne-support-im-netz-2602-205159.html&quot;&gt;https://www.golem.de/news/firewalls-und-mehr-fast-4-000-deutsche-edge-devices-haengen-ohne-support-im-netz-2602-205159.html&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-09T18:31:49Z</dc:date></entry><entry><title>Tageszusammenfassung - 06.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-06022026"/><author><name>CERT.at</name></author><updated>2026-02-06T18:14:37Z</updated><published>2026-02-06T18:14:37Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Donnerstag 05-02-2026 18:00 - Freitag 06-02-2026 18:00
Handler:     Guenes Holler
Co-Handler:  Alexander Riepl


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;No Pain, No Gain - How Impunity Perpetuates Failure&lt;/h3&gt;

It-s time to treat cybersecurity incidents and data breaches like preventable disasters, not the inevitable cost of doing business.
&lt;p /&gt;
&lt;A HREF=&quot;https://bytesandborscht.com/no-pain-no-gain-how-impunity-perpetuates-failure/&quot;&gt;https://bytesandborscht.com/no-pain-no-gain-how-impunity-perpetuates-failure/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Ransomware gang uses ISPsystem VMs for stealthy payload delivery&lt;/h3&gt;

Ransomware operators are hosting and delivering malicious payloads at scale by abusing virtual machines (VMs) provisioned by ISPsystem, a legitimate virtual infrastructure management provider.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/ransomware-gang-uses-ispsystem-vms-for-stealthy-payload-delivery/&quot;&gt;https://www.bleepingcomputer.com/news/security/ransomware-gang-uses-ispsystem-vms-for-stealthy-payload-delivery/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Spains Ministry of Science shuts down systems after breach claims&lt;/h3&gt;

Spain's Ministry of Science (Ministerio de Ciencia) announced a partial shutdown of its IT systems, affecting several citizen- and company-facing services.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/spains-ministry-of-science-shuts-down-systems-after-breach-claims/&quot;&gt;https://www.bleepingcomputer.com/news/security/spains-ministry-of-science-shuts-down-systems-after-breach-claims/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CISA orders federal agencies to replace end-of-life edge devices&lt;/h3&gt;

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new binding operational directive requiring federal agencies to identify and remove network edge devices that no longer receive security updates from manufacturers.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/cisa-orders-federal-agencies-to-replace-end-of-life-edge-devices/&quot;&gt;https://www.bleepingcomputer.com/news/security/cisa-orders-federal-agencies-to-replace-end-of-life-edge-devices/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware&lt;/h3&gt;

Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI) repository have been compromised to push malicious versions to facilitate wallet credential theft and remote code execution.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/compromised-dydx-npm-and-pypi-packages.html&quot;&gt;https://thehackernews.com/2026/02/compromised-dydx-npm-and-pypi-packages.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries&lt;/h3&gt;

Artificial intelligence (AI) company Anthropic revealed that its latest large language model (LLM), Claude Opus 4.6, has found more than 500 previously unknown high-severity security flaws in open-source libraries, including Ghostscript, OpenSC, and CGIF.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/claude-opus-46-finds-500-high-severity.html&quot;&gt;https://thehackernews.com/2026/02/claude-opus-46-finds-500-high-severity.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Datenleck bei Substack: Datensatz mit knapp 700.000 Einträgen im Netz&lt;/h3&gt;

Cyberkriminelle haben Daten bei Substack abgezogen. Der Datensatz umfasst rund 700.000 Einträge und ist im Netz verfügbar. 
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11167482&quot;&gt;https://heise.de/-11167482&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Angriff per Signal: BfV und BSI warnen Politiker, Militärs und Diplomaten&lt;/h3&gt;

Ein vergangene Woche bekannt gewordener Angriff auf Nutzer des Messengers Signal zielt auf Bundestagsabgeordnete und andere wichtige Personen ab. 
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11168254&quot;&gt;https://heise.de/-11168254&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Security updates for Friday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (freerdp, kernel, python3, and python3.12-wheel), Debian (alsa-lib, chromium, openjdk-25, phpunit, tomcat10, tomcat11, and tomcat9), Fedora (openqa, pgadmin4, phpunit10, phpunit11, phpunit12, phpunit8, phpunit9, and yarnpkg), Mageia (python-django), SUSE (alloy, cups, dpdk, expat, glib2, java-1_8_0-ibm, java-1_8_0-openj9, java-25-openjdk, kernel, libpainter0, libsoup, libxml2, openssl-3, python-filelock, python-wheel, python312-Django6, thunderbird, traefik2, udisks2, wireshark, and xen), and Ubuntu (glib2.0, linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15, python3.14, python3.13, python3.12, python3.11, python3.10, python3.9, python3.8, python3.7, python3.6, python3.5, python3.4, and tracker-miners). 
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1057506/&quot;&gt;https://lwn.net/Articles/1057506/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;TeamViewer: Lücke erlaubt Zugriffe ohne vorherige Bestätigung&lt;/h3&gt;

In TeamViewer wurde eine Sicherheitslücke entdeckt, die angemeldeten Angreifern Zugriffe auf Ressourcen erlaubt, bevor diese Berechtigung lokal bestätigt wurde. Aktualisierte Software-Pakete stehen bereit, um die Schwachstelle zu beheben. IT-Verantwortliche, die TeamViewer einsetzen, sollten zügig updaten.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/TeamViewer-Luecke-erlaubt-Zugriffe-ohne-vorherige-Bestaetigung-11167398.html&quot;&gt;https://www.heise.de/news/TeamViewer-Luecke-erlaubt-Zugriffe-ohne-vorherige-Bestaetigung-11167398.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Sicherheitsupdates F5 BIG-IP: Angreifer können Datenverkehr lahmlegen&lt;/h3&gt;

Setzen Angreifer erfolgreich an Sicherheitslücken in BIG-IP-Appliances wie Advanced WAF/ASM oder APM an, können sie Abstürze auslösen oder eigentlich geschützte Daten einsehen. Dagegen stehen abgesicherte Versionen zum Download bereit. Bislang gibt es keine Berichte zu Attacken.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11167422&quot;&gt;https://heise.de/-11167422&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;DSA-6122-1 chromium - security update&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lists.debian.org/debian-security-announce/2026/msg00031.html&quot;&gt;https://lists.debian.org/debian-security-announce/2026/msg00031.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;TP-Link Systems Inc. VIGI Series IP Camera&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-036-01&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-036-01&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-06T18:14:37Z</dc:date></entry><entry><title>Tageszusammenfassung - 05.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-05022026"/><author><name>CERT.at</name></author><updated>2026-02-05T18:22:56Z</updated><published>2026-02-05T18:22:56Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Mittwoch 04-02-2026 18:00 - Donnerstag 05-02-2026 18:00
Handler:     Guenes Holler
Co-Handler:  Michael Schlagenhaufer


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Zendesk spam wave returns, floods users with Activate account emails&lt;/h3&gt;

A fresh wave of spam is hitting inboxes worldwide, with users reporting that they are once again being bombarded by automated emails generated through companies unsecured Zendesk support systems. Some recipients say they are receiving hundreds of messages with strange or alarming subject lines.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/zendesk-spam-wave-returns-floods-users-with-activate-account-emails/&quot;&gt;https://www.bleepingcomputer.com/news/security/zendesk-spam-wave-returns-floods-users-with-activate-account-emails/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CISA: VMware ESXi flaw now exploited in ransomware attacks&lt;/h3&gt;

CISA confirmed on Wednesday that ransomware gangs have begun exploiting a high-severity VMware ESXi sandbox escape vulnerability that was used in zero-day attacks since at least February 2024. Broadcom patched this ESXi arbitrary-write vulnerability (tracked as CVE-2025-22225) almost one year ago, in March 2025, alongside a memory leak (CVE-2025-22226) and a TOCTOU flaw (CVE-2025-22224), and tagged them all as actively exploited zero-days.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/cisa-vmware-esxi-flaw-now-exploited-in-ransomware-attacks/&quot;&gt;https://www.bleepingcomputer.com/news/security/cisa-vmware-esxi-flaw-now-exploited-in-ransomware-attacks/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Broken Phishing URLs, (Thu, Feb 5th)&lt;/h3&gt;

For a few days, many phishing emails that landed into my mailbox contain strange URLs. [..] But the format of the URLs is broken! In a URL, parameters are extra pieces of information added after a question mark (?) to tell a website more details about a request; they are written as name=value pairs (for example -email=user@domain-), and multiple parameters are separated by an ampersand (&amp;). [..] Threat actors implement this to break security controls.
&lt;p /&gt;
&lt;A HREF=&quot;https://isc.sans.edu/diary/rss/32686&quot;&gt;https://isc.sans.edu/diary/rss/32686&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Three clues that your LLM may be poisoned with a sleeper-agent back door&lt;/h3&gt;

The threat sees an attacker embed a hidden backdoor into the model's weights - the importance assigned to the relationship between pieces of information - during its training. Attackers can activate the backdoor using a predefined phrase. [..] In a research paper [PDF] published this week, Kumar and coauthors detailed a lightweight scanner to help enterprises detect backdoored models.
&lt;p /&gt;
&lt;A HREF=&quot;https://go.theregister.com/feed/www.theregister.com/2026/02/05/llm_poisoned_how_to_tell/&quot;&gt;https://go.theregister.com/feed/www.theregister.com/2026/02/05/llm_poisoned_how_to_tell/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Technical Analysis of Marco Stealer&lt;/h3&gt;

Zscaler ThreatLabz has discovered an information stealer that we named Marco Stealer, which was first observed in June 2025. Marco Stealer primarily targets browser data, cryptocurrency wallet information, files from popular cloud services like Dropbox and Google Drive, and other sensitive files stored on the victim-s system. Marco Stealer implements several anti-analysis techniques including string encryption and terminating security tools.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.zscaler.com/blogs/security-research/technical-analysis-marco-stealer&quot;&gt;https://www.zscaler.com/blogs/security-research/technical-analysis-marco-stealer&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;The Shadow Campaigns: Uncovering Global Espionage&lt;/h3&gt;

This investigation unveils a new cyberespionage group that Unit 42 tracks as TGR-STA-1030. We refer to the group-s activity as the Shadow Campaigns. [..] Over the past year, this group has compromised government and critical infrastructure organizations across 37 countries. This means that approximately one out of every five countries has experienced a critical breach from this group in the past year.
&lt;p /&gt;
&lt;A HREF=&quot;https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/&quot;&gt;https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Black Basta: Defense Evasion Capability Embedded in Ransomware Payload&lt;/h3&gt;

Normally the BYOVD defense evasion component of an attack would involve a distinct tool that would be deployed on the system prior to the ransomware payload in order to disable security software. However, in this attack, the vulnerable driver (an NsecSoft NSecKrnl driver) was bundled with the ransomware itself.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.security.com/threat-intelligence/black-basta-ransomware-byovd&quot;&gt;https://www.security.com/threat-intelligence/black-basta-ransomware-byovd&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework&lt;/h3&gt;

Cisco Talos uncovered -DKnife,- a fully featured gateway-monitoring and adversary-in-the-middle (AitM) framework comprising seven Linux-based implants that perform deep-packet inspection, manipulate traffic, and deliver malware via routers and edge devices. [..] DKnife-s attacks target a wide range of devices, including PCs, mobile devices, and Internet of Things (IoT) devices. It delivers and interacts with the ShadowPad and DarkNimbus backdoors by hijacking binary downloads and Android application updates.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.talosintelligence.com/knife-cutting-the-edge/&quot;&gt;https://blog.talosintelligence.com/knife-cutting-the-edge/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Sanctioned Bulletproof Host Linked to Hijacking of Old Home Routers&lt;/h3&gt;

Compromised home routers in 30+ countries had DNS traffic redirected, sending users to malicious sites while normal browsing appeared unaffected. [..] According to Infoblox, the manipulated DNS traffic was routed to resolvers hosted by Aeza International, a Russian bulletproof hosting provider sanctioned by the US government in July 2025.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/sanctioned-bulletproof-host-hijack-old-home-routers/&quot;&gt;https://hackread.com/sanctioned-bulletproof-host-hijack-old-home-routers/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;How to write your first obfuscator of Java Bytecode&lt;/h3&gt;

In this article I describe Java bytecode obfuscation, using one of the challenges I did in 2023 as part of the interviews with Quarkslab for the position of Java compiler engineer in QShield.
&lt;p /&gt;
&lt;A HREF=&quot;http://blog.quarkslab.com/how-to-write-your-first-obfuscator-of-java-bytecode.html&quot;&gt;http://blog.quarkslab.com/how-to-write-your-first-obfuscator-of-java-bytecode.html&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Cisco Security Advisories 05.02.2026&lt;/h3&gt;

Cisco Meeting Management, Cisco Secure Web Appliance, Cisco TelePresence Collaboration Endpoint Software and RoomOS, Cisco Prime Infrastructure, Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure,
&lt;p /&gt;
&lt;A HREF=&quot;https://sec.cloudapps.cisco.com/security/center/Search.x?publicationTypeIDs=1&amp;firstPublishedStartDate=2026%2F02%2F04&amp;firstPublishedEndDate=2026%2F02%2F05&amp;pageNum=1&amp;isRenderingBugList=false&amp;isRenderingCveList=false&amp;isRenderingCveAdvisoryList=false&quot;&gt;https://sec.cloudapps.cisco.com/security/center/Search.x?publicationTypeIDs=1&amp;firstPublishedStartDate=2026%2F02%2F04&amp;firstPublishedEndDate=2026%2F02%2F05&amp;pageNum=1&amp;isRenderingBugList=false&amp;isRenderingCveList=false&amp;isRenderingCveAdvisoryList=false&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security updates for Thursday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (brotli, curl, kernel, python-wheel, and python3.12), Debian (containerd), Fedora (gnupg2, pgadmin4, phpunit10, phpunit11, phpunit12, phpunit8, phpunit9, and yarnpkg), Mageia (expat), Oracle (qemu-kvm and util-linux), Red Hat (kernel, kernel-rt, opentelemetry-collector, and python3.12-wheel), SUSE (abseil-cpp, dpdk, freerdp, glib2, ImageMagick, java-11-openj9, java-17-openj9, java-1_8_0-ibm, java-1_8_0-openj9, java-1_8_0-openjdk, java-21-openj9, kernel, libsoup, libsoup-3_0-0, openssl-3, patch, python-Django, rekor, rizin, udisks2, and xrdp), and Ubuntu (gh, linux, linux-aws, linux-azure, linux-azure-5.15, linux-gcp, linux-gke, linux-gkeop, linux-hwe-5.15, linux-ibm, linux-ibm-5.15, linux-intel-iotg, linux-intel-iotg-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-nvidia-tegra, linux-nvidia-tegra-5.15, linux-oracle, linux-raspi, linux, linux-aws, linux-azure, linux-gcp, linux-oem-6.17, linux-oracle, linux-raspi, linux-realtime, linux, linux-gke, linux-gkeop, linux-hwe-6.8, linux-oracle, linux-oracle-6.8, linux-raspi, linux-fips, linux-aws-fips, linux-azure-fips, linux-gcp-fips, linux-nvidia, linux-nvidia-6.8, linux-nvidia-lowlatency, linux-realtime, linux-intel-iot-realtime, and linux-realtime, linux-realtime-6.8, linux-raspi-realtime).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1057381/&quot;&gt;https://lwn.net/Articles/1057381/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Automatisierungstool n8n: Weitere kritische Lücken gestopft&lt;/h3&gt;

Im Automatisierungstool n8n haben die Entwickler weitere Sicherheitslücken gestopft. Ein Update auf die jüngste Fassung ist empfehlenswert. [..] Eine Auflistung der neuen CVE-Einträge nach Schweregrad sortiert bietet jedoch einen Überblick, Details finden sich auf der n8n-Sicherheitsseite.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11165845&quot;&gt;https://heise.de/-11165845&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Splunk: SVD-2026-0201: Third-Party Package Updates in Splunk SOAR - February 2026&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://advisory.splunk.com//advisories/SVD-2026-0201&quot;&gt;https://advisory.splunk.com//advisories/SVD-2026-0201&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Splunk: SVD-2025-1205: Incorrect permissions assignment on Splunk Enterprise for Windows during new installation or upgrade&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://advisory.splunk.com//advisories/SVD-2025-1205&quot;&gt;https://advisory.splunk.com//advisories/SVD-2025-1205&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Zyxel security advisory for post-authentication command injection vulnerability in the DDNS configuration CLI command of ZLD firewalls&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-command-injection-vulnerability-in-the-ddns-configuration-cli-command-of-zld-firewalls-02-05-2026&quot;&gt;https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-command-injection-vulnerability-in-the-ddns-configuration-cli-command-of-zld-firewalls-02-05-2026&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Patchday Android: Treiberlücke gefährdet Pixel-Smartphones&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11165905&quot;&gt;https://heise.de/-11165905&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-05T18:22:56Z</dc:date></entry><entry><title>Tageszusammenfassung - 04.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-04022026"/><author><name>CERT.at</name></author><updated>2026-02-04T18:24:13Z</updated><published>2026-02-04T18:24:13Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Dienstag 03-02-2026 18:00 - Mittwoch 04-02-2026 18:00
Handler:     Alexander Riepl
Co-Handler:  n/a


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Wave of Citrix NetScaler scans use thousands of residential proxies&lt;/h3&gt;

A coordinated reconnaissance campaign targeting Citrix NetScaler infrastructure over the past week used tens of thousands of residential proxies to discover login panels.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/wave-of-citrix-netscaler-scans-use-thousands-of-residential-proxies/&quot;&gt;https://www.bleepingcomputer.com/news/security/wave-of-citrix-netscaler-scans-use-thousands-of-residential-proxies/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Schlüssel kaputt: Weitere Ransomware-Panne führt zu Totalverlust&lt;/h3&gt;

In der Nitrogen-Ransomware klafft ein Bug, der alle Lösegeldverhandlungen ad absurdum führt. Die Daten können nicht mehr entschlüsselt werden.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/schluessel-kaputt-weitere-ransomware-panne-fuehrt-zu-totalverlust-2602-204974.html&quot;&gt;https://www.golem.de/news/schluessel-kaputt-weitere-ransomware-panne-fuehrt-zu-totalverlust-2602-204974.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;AI agents cant yet pull off fully autonomous cyberattacks - but they are already very helpful to crims&lt;/h3&gt;

Dont relax: This is a when, not if scenario AI agents and other systems cant yet conduct cyberattacks fully on their own - but they can help criminals in many stages of the attack chain, according to the International AI Safety report.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.theregister.com/2026/02/03/autonomous_cyberattacks_not_real_yet/&quot;&gt;https://www.theregister.com/2026/02/03/autonomous_cyberattacks_not_real_yet/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Clouds rush to deliver OpenClaw-as-a-service offerings&lt;/h3&gt;

As analyst house Gartner declares AI tool -comes with unacceptable cybersecurity risk- and urges admins to snuff it out If you-re brave enough to want to run the demonstrably insecure AI assistant OpenClaw, several clouds have already started offering it as a service.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.theregister.com/2026/02/04/cloud_hosted_openclaw/&quot;&gt;https://www.theregister.com/2026/02/04/cloud_hosted_openclaw/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Angriffe auf Solarwinds Web Help Desk, FreePBX und Gitlab beobachtet&lt;/h3&gt;

Die CISA warnt vor jüngst beobachteten Angriffen auf Sicherheitslücken in Solarwinds Web Help Desk, FreePBX und Gitlab.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Angriffe-auf-Solarwinds-Web-Help-Desk-FreePBX-und-Gitlab-beobachtet-11164498.html&quot;&gt;https://www.heise.de/news/Angriffe-auf-Solarwinds-Web-Help-Desk-FreePBX-und-Gitlab-beobachtet-11164498.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Phishing: Falsche Cloud-Speicher-Warnung nachverfolgt&lt;/h3&gt;

Phishing-Mails zielen nicht nur direkt auf Zugangsdaten ab, sondern bringen Opfer öfter zu Affiliate-Marketing-Seiten.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Phishing-Falsche-Cloud-Speicher-Warnung-nachverfolgt-11164973.html&quot;&gt;https://www.heise.de/news/Phishing-Falsche-Cloud-Speicher-Warnung-nachverfolgt-11164973.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Gesucht: Notfallhandwerksdienst, Gefunden: Vermittlungsagentur&lt;/h3&gt;

Hinter zahlreichen Webseiten von Notfallinstallateuren, Schlüsseldiensten und ähnlichen Unternehmen stecken gar keine Handwerksbetriebe, sondern lediglich Vermittlungsagenturen. Das ist nicht illegal, kann für Betroffene aber dennoch unangenehme Folgen haben. Woran man die Webauftritte der Agenturen erkennt und wie man am besten für den Ernstfall vorsorgt.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/vermittlungsagentur-statt-handwerksdienst/&quot;&gt;https://www.watchlist-internet.at/news/vermittlungsagentur-statt-handwerksdienst/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Exclusive: US used cyber weapons to disrupt Iranian air defenses during 2025 strikes&lt;/h3&gt;

The U.S. military digitally disrupted Iranian air missile defense systems during its operation last year against the country-s nuclear program, some of the most sophisticated action Cyber Command has taken to date against Iran.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/iran-nuclear-cyber-strikes-us&quot;&gt;https://therecord.media/iran-nuclear-cyber-strikes-us&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Phishing Campaigns Abuse Trusted Cloud Platforms, Raising New Risks for Enterprises&lt;/h3&gt;

ANY.RUN experts report a surge in phishing campaigns abusing trusted cloud and CDN platforms to bypass security controls and target enterprise users.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/phishing-campaigns-cloud-platforms-enterprises-risks/&quot;&gt;https://hackread.com/phishing-campaigns-cloud-platforms-enterprises-risks/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;React Server Components Exploitation Consolidates as Two IPs Generate Majority of Attack Traffic&lt;/h3&gt;

Two months after CVE-2025-55182 was disclosed on December 3, 2025, exploitation activity targeting React Server Components has consolidated significantly.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.greynoise.io/blog/react2shell-exploitation-consolidates&quot;&gt;https://www.greynoise.io/blog/react2shell-exploitation-consolidates&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Native Sysmon-Integration in Windows rückt näher&lt;/h3&gt;

Microsoft hat Windows-Insider-Vorschauen veröffentlicht, die das mächtige Sysmon-Protokollierungstool als Windows-Feature mitbringen.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11164696&quot;&gt;https://heise.de/-11164696&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Phishing: Falsche Cloud-Speicher-Warnung nachverfolgt&lt;/h3&gt;

Phishing-Mails zielen nicht nur direkt auf Zugangsdaten ab, sondern bringen Opfer öfter zu Affiliate-Marketing-Seiten.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11164973&quot;&gt;https://heise.de/-11164973&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Web Traffic Hijacking: When Your Nginx Configuration Turns Malicious&lt;/h3&gt;

Datadog Security Research has identified an active web traffic hijacking campaign that targets NGINX installations and management panels like Baota (BT). In this post, we provide our analysis of the techniques this campaign uses and share indicators of compromise you can check for in your NGINX configurations.
&lt;p /&gt;
&lt;A HREF=&quot;https://securitylabs.datadoghq.com/articles/web-traffic-hijacking-nginx-configuration-malicious/&quot;&gt;https://securitylabs.datadoghq.com/articles/web-traffic-hijacking-nginx-configuration-malicious/&lt;/a&gt;

&lt;hr&gt;


&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Critical Vulnerability Alert: CVE-2025-40551 in SolarWinds Web Help Desk&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bitsight.com/blog/cve-2025-40551-solarwinds-critical-vulnerability&quot;&gt;https://www.bitsight.com/blog/cve-2025-40551-solarwinds-critical-vulnerability&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-04T18:24:13Z</dc:date></entry><entry><title>Tageszusammenfassung - 03.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-03022026"/><author><name>CERT.at</name></author><updated>2026-02-03T19:23:28Z</updated><published>2026-02-03T19:23:28Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Montag 02-02-2026 18:00 - Dienstag 03-02-2026 18:00
Handler:     Felician Fuchs
Co-Handler:  Michael Schlagenhaufer


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Aktive Ausnutzung von Sicherheitslücken in Ivanti Endpoint Manager Mobile (CVE-2026-1281, CVE-2026-1340)&lt;/h3&gt;

Zwei kürzlich behobene Sicherheitslücken in Ivanti Endpoint Manager Mobile (CVE-2026-1281 und CVE-2026-1340, siehe dazu unsere Warnung vom 31.01.2026 sowie eine technische Analyse der Sicherheitsexpert:innen von Watchtowr) werden bereits von Bedrohungsakteuren ausgenutzt. Laut Ivanti selbst ist die Untersuchung der bisher bekannten Vorfälle noch im Gange und verlässliche technische Indikatoren liegen noch nicht vor. 
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cert.at/de/aktuelles/2026/2/aktive-ausnutzung-von-sicherheitslucken-in-ivanti-endpoint-manager-mobile-cve-2026-1281-cve-2026-1340&quot;&gt;https://www.cert.at/de/aktuelles/2026/2/aktive-ausnutzung-von-sicherheitslucken-in-ivanti-endpoint-manager-mobile-cve-2026-1281-cve-2026-1340&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hackers exploit critical React Native Metro bug to breach dev systems&lt;/h3&gt;

Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious payloads for Windows and Linux.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/hackers-use-critical-react-native-metro-bug-to-breach-dev-systems/&quot;&gt;https://www.bleepingcomputer.com/news/security/hackers-use-critical-react-native-metro-bug-to-breach-dev-systems/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Iron Mountain: Data breach mostly limited to marketing materials&lt;/h3&gt;

Iron Mountain, a leading data storage and recovery services company, says that a recent breach claimed by the Everest extortion gang is limited to mostly marketing materials.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/iron-mountain-data-breach-mostly-limited-to-marketing-materials/&quot;&gt;https://www.bleepingcomputer.com/news/security/iron-mountain-data-breach-mostly-limited-to-marketing-materials/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Attackers Harvest Dropbox Logins Via Fake PDF Lures&lt;/h3&gt;

A malware-free phishing campaign targets corporate inboxes and asks employees to view &quot;request orders,&quot; ultimately leading to Dropbox credential theft.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.darkreading.com/cloud-security/attackers-harvest-dropbox-logins-fake-pdf-lures&quot;&gt;https://www.darkreading.com/cloud-security/attackers-harvest-dropbox-logins-fake-pdf-lures&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Detecting and Monitoring OpenClaw (clawdbot, moltbot)&lt;/h3&gt;

Last week, a new AI agent framework was introduced to automate &quot;live&quot;. It targets office work in particular, focusing on messaging and interacting with systems. The tool has gone viral not so much because of its features, which are similar to those of other agent frameworks, but because of a stream of security oversights in its design.
&lt;p /&gt;
&lt;A HREF=&quot;https://isc.sans.edu/diary/rss/32678&quot;&gt;https://isc.sans.edu/diary/rss/32678&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users&lt;/h3&gt;

A security audit of 2,857 skills on ClawHub has found 341 malicious skills across multiple campaigns, according to new findings from Koi Security, exposing users to new supply chain risks. ClawHub is a marketplace designed to make it easy for OpenClaw users to find and install third-party skills.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/researchers-find-341-malicious-clawhub.html&quot;&gt;https://thehackernews.com/2026/02/researchers-find-341-malicious-clawhub.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;APT28 Leverages CVE-2026-21509 in Operation Neusploit&lt;/h3&gt;

In January 2026, Zscaler ThreatLabz identified a new campaign in-the-wild, tracked as Operation Neusploit, targeting countries in the Central and Eastern European region. In this campaign, the threat actor leveraged specially crafted Microsoft RTF files to exploit CVE-2026-21509 and deliver malicious backdoors in a multi-stage infection chain.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.zscaler.com/blogs/security-research/apt28-leverages-cve-2026-21509-operation-neusploit&quot;&gt;https://www.zscaler.com/blogs/security-research/apt28-leverages-cve-2026-21509-operation-neusploit&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Neue Runde für den Dauerbrenner: Phishing-SMS im Namen von FinanzOnline&lt;/h3&gt;

Wirklich zum Stillstand kam die Betrugsmasche ohnehin nie, aktuell ist aber eine Welle von besonderem Ausmaß zu beobachten. Es geht um die fast schon klassischen Phishing-SMS im Namen von FinanzOnline, die vor einem Ablaufen der Registrierung warnen. In Wahrheit haben es Kriminelle auf die Kontakt- und Bankdaten ihrer Opfer abgesehen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/phishing-sms-finanzonline/&quot;&gt;https://www.watchlist-internet.at/news/phishing-sms-finanzonline/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;WhatsApp Encryption, a Lawsuit, and a Lot of Noise&lt;/h3&gt;

It-s not every day that we see mainstream media get excited about encryption apps! For that reason, the past several days have been fascinating, since we-ve been given not one but several unusual stories about the encryption used in WhatsApp.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.cryptographyengineering.com/2026/02/02/whatsapp-encryption-a-lawsuit-and-a-lot-of-noise/&quot;&gt;https://blog.cryptographyengineering.com/2026/02/02/whatsapp-encryption-a-lawsuit-and-a-lot-of-noise/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;The art of the invisible key: Passkey global breakthrough&lt;/h3&gt;

Introduction Passkeys now protects billions of accounts, redefining how the world signs in through stronger, more secure authentication without a password. Yet this global movement runs deeper.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cyberark.com/resources/threat-research-blog/the-art-of-the-invisible-key-passkey-global-breakthrough&quot;&gt;https://www.cyberark.com/resources/threat-research-blog/the-art-of-the-invisible-key-passkey-global-breakthrough&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;The Chrysalis Backdoor: A Deep Dive into Lotus Blossom-s toolkit&lt;/h3&gt;

Rapid7 Labs, together with the Rapid7 MDR team, has uncovered a sophisticated campaign attributed to the Chinese APT group Lotus Blossom. Active since 2009, the group is known for its targeted espionage campaigns primarily impacting organizations across Southeast Asia and more recently Central America, focusing on government, telecom, aviation, critical infrastructure, and media sectors.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/&quot;&gt;https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Sicherheitsupdate: Unbefugte Zugriffe auf WatchGuard Firebox vorstellbar&lt;/h3&gt;

Angreifer können auf Firebox-Firewalls von WatchGuard zugreifen. Reparierte Fireware-OS-Version stehen zum Download bereit.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Sicherheitsupdate-Unbefugte-Zugriffe-auf-WatchGuard-Firebox-vorstellbar-11163128.html&quot;&gt;https://www.heise.de/news/Sicherheitsupdate-Unbefugte-Zugriffe-auf-WatchGuard-Firebox-vorstellbar-11163128.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Critical vLLM Flaw Exposes Millions of AI Servers to Remote Code Execution&lt;/h3&gt;

A newly disclosed security flaw has placed millions of AI servers at risk after researchers identified a critical vulnerability in vLLM, a widely deployed Python package for serving large language models. The issue, tracked as CVE-2026-22778 (GHSA-4r2x-xpjr-7cvv), enables remote code execution (RCE) by submitting a malicious video URL to a vulnerable vLLM API endpoint. The vulnerability affects vLLM versions 0.8.3 through 0.14.0 and was patched in version 0.14.1.
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/cve-2026-22778-vllm-rce-malicious-video-link/&quot;&gt;https://thecyberexpress.com/cve-2026-22778-vllm-rce-malicious-video-link/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;ZDI-26-043: (0Day) npm cli Uncontrolled Search Path Element Local Privilege Escalation Vulnerability&lt;/h3&gt;

This vulnerability allows local attackers to escalate privileges on affected installations of npm cli. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2026-0775.
&lt;p /&gt;
&lt;A HREF=&quot;http://www.zerodayinitiative.com/advisories/ZDI-26-043/&quot;&gt;http://www.zerodayinitiative.com/advisories/ZDI-26-043/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Micropatches released for Microsoft Excel Remote Code Execution Vulnerability (CVE-2025-62203)&lt;/h3&gt;

November 2025 Windows Updates brought a patch for CVE-2025-62203, a remote code execution vulnerability in Microsoft Excel that could allow a remote attacker to have their malicious code executed on users computer upon opening an Excel file. The vulnerability was discovered and reported to Microsoft by Quan Jin with DBAPPSecurity.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.0patch.com/2026/02/micropatches-released-for-microsoft.html&quot;&gt;https://blog.0patch.com/2026/02/micropatches-released-for-microsoft.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security updates for Tuesday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (fence-agents, gcc-toolset-15-binutils, golang-github-openprinting-ipp-usb, iperf3, kernel, kernel-rt, openssl, osbuild-composer, php:8.2, python3, util-linux, and wireshark), Debian (clamav and xrdp), Fedora (gimp and openttd), Mageia (docker-containerd), Oracle (gimp:2.8, golang-github-openprinting-ipp-usb, grafana-pcp, image-builder, iperf3, kernel, openssl, osbuild-composer, php, php:8.2, php:8.3, python3.9, util-linux, and wireshark), SUSE (cockpit-subscriptions, elemental-register, elemental-toolkit, glibc, gpg2, logback, openssl-1_1, python-urllib3, ucode-amd, and unbound), and Ubuntu (inetutils, libpng1.6, mysql-8.0, mysql-8.4, openjdk-17, openjdk-17-crac, openjdk-21, openjdk-21-crac, openjdk-25, openjdk-25-crac, openjdk-8, openjdk-lts, and thunderbird).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1057047/&quot;&gt;https://lwn.net/Articles/1057047/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Jetzt updaten! Angreifer übernehmen SmarterMail-Instanzen als Admin&lt;/h3&gt;

Alle drei mittlerweile in SmarterMail 100.0.9511 geschlossenen Sicherheitslücken (CVE-2026-23760), CVE-2026-24423, CVE-2025-52691) sind mit dem Bedrohungsgrad -kritisch- eingestuft. Alle vorigen Ausgaben sollen verwundbar sein. Der US-Sicherheitsbehörde CISA zufolge nutzen Angreifer die ersten beiden Schwachstellen bereits aus.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11163471&quot;&gt;https://heise.de/-11163471&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Improper file access permission settings in Mitsubishi Small-Capacity UPS Shutdown Software FREQSHIP-mini for Windows&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://jvn.jp/en/jp/JVN64883963/&quot;&gt;https://jvn.jp/en/jp/JVN64883963/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Kubernetes CVE-2026-24514: ingress-nginx Admission Controller denial of service&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://github.com/kubernetes/kubernetes/issues/136680&quot;&gt;https://github.com/kubernetes/kubernetes/issues/136680&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Kubernetes CVE-2026-24513: ingress-nginx auth-url protection bypass&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://github.com/kubernetes/kubernetes/issues/136679&quot;&gt;https://github.com/kubernetes/kubernetes/issues/136679&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Kubernetes CVE-2026-24512: ingress-nginx rules.http.paths.path nginx configuration injection&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://github.com/kubernetes/kubernetes/issues/136678&quot;&gt;https://github.com/kubernetes/kubernetes/issues/136678&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Kuberenetes CVE-2026-1580: ingress-nginx auth-method nginx configuration injection***
&lt;p /&gt;
&lt;A HREF=&quot;https://github.com/kubernetes/kubernetes/issues/136677&quot;&gt;https://github.com/kubernetes/kubernetes/issues/136677&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-03T19:23:28Z</dc:date></entry><entry><title>Tageszusammenfassung - 02.02.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/2/tagesberichte-02022026"/><author><name>CERT.at</name></author><updated>2026-02-02T19:51:16Z</updated><published>2026-02-02T19:51:16Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Freitag 30-01-2026 18:00 - Montag 02-02-2026 18:00
Handler:     Felician Fuchs
Co-Handler:  Alexander Riepl


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Cloud storage payment scam floods inboxes with fake renewals&lt;/h3&gt;

Over the past few months, a large-scale cloud storage subscription scam campaign has been targeting users worldwide with repeated emails falsely warning recipients that their photos, files, and accounts are about to be blocked or deleted due to an alleged payment failure.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/cloud-storage-payment-scam-floods-inboxes-with-fake-renewals/&quot;&gt;https://www.bleepingcomputer.com/news/security/cloud-storage-payment-scam-floods-inboxes-with-fake-renewals/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;NationStates confirms data breach, shuts down game site&lt;/h3&gt;

NationStates, a multiplayer browser-based game, has confirmed a data breach after taking its website offline earlier this week to investigate a security incident.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/nationstates-confirms-data-breach-shuts-down-game-site/&quot;&gt;https://www.bleepingcomputer.com/news/security/nationstates-confirms-data-breach-shuts-down-game-site/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Panera Bread breach impacts 5.1 million accounts, not 14 million customers&lt;/h3&gt;

The data breach notification service Have I Been Pwned says that a data breach at the U.S. food chain Panera Bread affected 5.1 million accounts, not 14 million customers as previously reported.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/panera-bread-data-breach-impacts-51-million-accounts-not-14-million-customers/&quot;&gt;https://www.bleepingcomputer.com/news/security/panera-bread-data-breach-impacts-51-million-accounts-not-14-million-customers/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Spionagegefahr: Verfassungsschutz warnt vor E-Autos aus China&lt;/h3&gt;

E-Autos aus China könnten theoretisch ferngesteuert werden. Die technischen Risiken sind dokumentiert - doch auch Tesla sammelt massenhaft Daten.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/spionagegefahr-verfassungsschutz-warnt-vor-e-autos-aus-china-2602-204851.html&quot;&gt;https://www.golem.de/news/spionagegefahr-verfassungsschutz-warnt-vor-e-autos-aus-china-2602-204851.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Texteditor: Notepad++-Server gehackt und Update-Traffic manipuliert&lt;/h3&gt;

Angreifern ist es gelungen, die Update-Infrastruktur von Notepad++ zu kompromittieren und Traffic umzuleiten. Der Entwickler entschuldigt sich.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/texteditor-notepad-server-gehackt-und-update-traffic-manipuliert-2602-204876.html&quot;&gt;https://www.golem.de/news/texteditor-notepad-server-gehackt-und-update-traffic-manipuliert-2602-204876.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529&lt;/h3&gt;

In the first part of this series, I detailed my journey into macOS security research, which led to the discovery of a type confusion vulnerability (CVE-2024-54529) and a double-free vulnerability (CVE-2025-31235) in the coreaudiod system daemon through a process I call knowledge-driven fuzzing. While the first post focused on the process of finding the vulnerabilities, this post dives into the intricate process of exploiting the type confusion vulnerability.
&lt;p /&gt;
&lt;A HREF=&quot;https://projectzero.google/2026/01/sound-barrier-2.html&quot;&gt;https://projectzero.google/2026/01/sound-barrier-2.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Google Presentations Abused for Phishing&lt;/h3&gt;

Charlie, one of our readers, has forwarded an interesting phishing email. The email was sent to users of the Vivladi Webmail service.
&lt;p /&gt;
&lt;A HREF=&quot;https://isc.sans.edu/diary/rss/32668&quot;&gt;https://isc.sans.edu/diary/rss/32668&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;AI Coding Assistants Secretly Copying All Code to China&lt;/h3&gt;

There-s a new report about two AI coding assistants, used by 1.5 million developers, that are surreptitiously sending a copy of everything they ingest to China.Maybe avoid using them.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.schneier.com/blog/archives/2026/02/ai-coding-assistants-secretly-copying-all-code-to-china.html&quot;&gt;https://www.schneier.com/blog/archives/2026/02/ai-coding-assistants-secretly-copying-all-code-to-china.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Shadow Directories: A Unique Method to Hijack WordPress Permalinks&lt;/h3&gt;

Last month, while working on a WordPress cleanup case, a customer reached out with a strange complaint: their website looked completely normal to them and their visitors, but Google search results were showing something very different. Instead of normal titles and descriptions, Google was displaying casino and gambling-related content. We have been seeing rising cases of spam on WordPress websites. What made this even more confusing was where the spam was appearing.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.sucuri.net/2026/01/shadow-directories-a-unique-method-to-hijack-wordpress-permalinks.html&quot;&gt;https://blog.sucuri.net/2026/01/shadow-directories-a-unique-method-to-hijack-wordpress-permalinks.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup&lt;/h3&gt;

A former Google engineer accused of stealing thousands of the companys confidential documents to build a startup in China has been convicted in the U.S., the Department of Justice (DoJ) announced Thursday.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/ex-google-engineer-convicted-for.html&quot;&gt;https://thehackernews.com/2026/01/ex-google-engineer-convicted-for.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm&lt;/h3&gt;

Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors compromised a legitimate developers resources to push malicious updates to downstream users.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/open-vsx-supply-chain-attack-used.html&quot;&gt;https://thehackernews.com/2026/02/open-vsx-supply-chain-attack-used.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware&lt;/h3&gt;

The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been compromised by unknown attackers to deliver a persistent downloader to enterprise and consumer systems.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/02/escan-antivirus-update-servers.html&quot;&gt;https://thehackernews.com/2026/02/escan-antivirus-update-servers.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Sicherheitslücke: Tausch weiterer elektronischer Heilberufsausweise in Arbeit&lt;/h3&gt;

Kunden von D-Trust und SHC+Care müssen ihre bereits ECC-fähigen elektronischen Heilberufsausweise (eHBA) tauschen. Wie viele das betrifft, ist unklar.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Digital-Health-Tausch-weiterer-E-Heilberufsausweise-wegen-Sicherheitsluecke-11161151.html&quot;&gt;https://www.heise.de/news/Digital-Health-Tausch-weiterer-E-Heilberufsausweise-wegen-Sicherheitsluecke-11161151.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Anonymisierendes Linux: Notfall-Update Tails 7.4.1 erschienen&lt;/h3&gt;

Die auf Anonymität im Netz ausgerichtete Linux-Distribution Tails ist in Version 7.4.1 erschienen - ein Notfall-Update.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Anonymisierendes-Linux-Notfall-Update-Tails-7-4-1-erschienen-11162314.html&quot;&gt;https://www.heise.de/news/Anonymisierendes-Linux-Notfall-Update-Tails-7-4-1-erschienen-11162314.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Please Don-t Feed the Scattered Lapsus Shiny Hunters&lt;/h3&gt;

A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while notifying journalists and regulators about the extent of the intrusion.
&lt;p /&gt;
&lt;A HREF=&quot;https://krebsonsecurity.com/2026/02/please-dont-feed-the-scattered-lapsus-shiny-hunters/&quot;&gt;https://krebsonsecurity.com/2026/02/please-dont-feed-the-scattered-lapsus-shiny-hunters/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;How fake party invitations are being used to install remote access tools&lt;/h3&gt;

-You-re invited!- It sounds friendly, familiar and quite harmless. But in a scam we recently spotted, that simple phrase is being used to trick victims into installing a full remote access tool on their Windows computers-giving attackers complete control of the system. 
&lt;p /&gt;
&lt;A HREF=&quot;https://www.malwarebytes.com/blog/threat-intel/2026/02/how-fake-party-invitations-are-being-used-to-install-remote-access-tools&quot;&gt;https://www.malwarebytes.com/blog/threat-intel/2026/02/how-fake-party-invitations-are-being-used-to-install-remote-access-tools&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft erklärt NTLM als &quot;deprecated&quot; - Deaktivierung in nächster Windows-Version&lt;/h3&gt;

Microsoft hat die veraltete NTLM-Authentifizierung in Windows als &quot;deprecated&quot; erklärt. In der nächsten Windows Version (Server und Client) wird NTLM standardmäßig deaktiviert und die Kerberos-Authentifizierung Standard. Damit neigt sich die Verwendung von NTLM seinem Ende zu.
&lt;p /&gt;
&lt;A HREF=&quot;https://borncity.com/blog/2026/02/01/microsoft-erklaert-ntlm-als-deprecated-deaktivierung-in-naechster-server-version/&quot;&gt;https://borncity.com/blog/2026/02/01/microsoft-erklaert-ntlm-als-deprecated-deaktivierung-in-naechster-server-version/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;US Seizes $400 Million Linked to Helix Dark Web Crypto Mixer&lt;/h3&gt;

US authorities take control of over $400 million in crypto, cash, and property tied to Helix, a major darknet bitcoin mixing service used by drug markets.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/us-seizes-400m-helix-dark-web-crypto-mixer/&quot;&gt;https://hackread.com/us-seizes-400m-helix-dark-web-crypto-mixer/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Windows Malware Uses Pulsar RAT for Live Chats While Stealing Data&lt;/h3&gt;

We usually think of computer viruses as silent, invisible programs running in the background, but a worrying discovery shows that modern hackers are getting much more personal.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/windows-malware-pulsar-rat-live-chats-steal-data/&quot;&gt;https://hackread.com/windows-malware-pulsar-rat-live-chats-steal-data/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS&lt;/h3&gt;

Mandiant is tracking a significant expansion and escalation in the operations of threat clusters associated with ShinyHunters-branded extortion. As detailed in our companion report, 'Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft', these campaigns leverage evolved voice phishing (vishing) and victim-branded credential harvesting to successfully compromise single sign-on (SSO) credentials and enroll unauthorized devices into victim multi-factor authentication (MFA) solutions.
&lt;p /&gt;
&lt;A HREF=&quot;https://cloud.google.com/blog/topics/threat-intelligence/defense-against-shinyhunters-cybercrime-saas/&quot;&gt;https://cloud.google.com/blog/topics/threat-intelligence/defense-against-shinyhunters-cybercrime-saas/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft&lt;/h3&gt;

Mandiant has identified an expansion in threat activity that uses tactics, techniques, and procedures (TTPs) consistent with prior ShinyHunters-branded extortion operations. These operations primarily leverage sophisticated voice phishing (vishing) and victim-branded credential harvesting sites to gain initial access to corporate environments by obtaining single sign-on (SSO) credentials and multi-factor authentication (MFA) codes.
&lt;p /&gt;
&lt;A HREF=&quot;https://cloud.google.com/blog/topics/threat-intelligence/expansion-shinyhunters-saas-data-theft/&quot;&gt;https://cloud.google.com/blog/topics/threat-intelligence/expansion-shinyhunters-saas-data-theft/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Manic Monday: A Day in the Life of Threat Hunting&lt;/h3&gt;

Discover a day in the life of threat hunting with Bitsight Adversary Intelligence. Learn how security teams detect and disrupt threats before damage is done.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bitsight.com/blog/day-in-the-life-threat-hunting&quot;&gt;https://www.bitsight.com/blog/day-in-the-life-threat-hunting&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 &amp; CVE-2026-1340)&lt;/h3&gt;

When Ivanti removed the embargoes from CVE-2026-1281 and CVE-2026-1340 - actively exploited pre-auth Remote Command Execution vulnerabilities in Ivanti-s Endpoint Manager Mobile (EPMM) solution - we sighed with relief. Clearly, the universe had decided to continue mocking Secure-By-Design signers right on schedule - every January.
&lt;p /&gt;
&lt;A HREF=&quot;https://labs.watchtowr.com/someone-knows-bash-far-too-well-and-we-love-it-ivanti-epmm-pre-auth-rces-cve-2026-1281-cve-2026-1340/&quot;&gt;https://labs.watchtowr.com/someone-knows-bash-far-too-well-and-we-love-it-ivanti-epmm-pre-auth-rces-cve-2026-1281-cve-2026-1340/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;The European Space Agency got hacked, and now we own the domain used!&lt;/h3&gt;

It's not often that two of my interests align so well, but we're talking about space rockets and cyber security! Whilst Magecart and Magecart-style attacks might not be the most common attack vector at the moment, they are still happening with worrying frequency, and they are still catching out some pretty big organisations.
&lt;p /&gt;
&lt;A HREF=&quot;https://scotthelme.ghost.io/the-european-space-agency-got-hacked-and-now-we-own-the-domain-used/&quot;&gt;https://scotthelme.ghost.io/the-european-space-agency-got-hacked-and-now-we-own-the-domain-used/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;archive.today is directing a DDOS attack against my blog&lt;/h3&gt;

Around January 11, 2026, archive.today (aka archive.is, archive.md, etc) started using its users as proxies to conduct a distributed denial of service (DDOS) attack against Gyrovague, my personal blog. 
&lt;p /&gt;
&lt;A HREF=&quot;https://gyrovague.com/2026/02/01/archive-today-is-directing-a-ddos-attack-against-my-blog/&quot;&gt;https://gyrovague.com/2026/02/01/archive-today-is-directing-a-ddos-attack-against-my-blog/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Exploiting MediaTeks Download Agent&lt;/h3&gt;

In September 2025, Chimera quietly announced -world-first- support for MediaTek-s latest Dimensity 9400 and 8400 SoCs running DAs compiled months after MediaTek had patched Carbonara. So we figured they-d either found a way around the patches, or they were sitting on something entirely new. We had to find out.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.r0rt1z2.com/posts/exploiting-mediatek-datwo/&quot;&gt;https://blog.r0rt1z2.com/posts/exploiting-mediatek-datwo/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hacking Moltbook: The AI Social Network Any Human Can Control&lt;/h3&gt;

1 exposed database. 35,000 emails. 1.5M API keys. And 17,000 humans behind the not-so-autonomous AI network.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.wiz.io/blog/exposed-moltbook-database-reveals-millions-of-api-keys&quot;&gt;https://www.wiz.io/blog/exposed-moltbook-database-reveals-millions-of-api-keys&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Inside Lodash-s Security Reset and Maintenance Reboot&lt;/h3&gt;

For more than a decade, Lodash has been one of the most widely deployed libraries in the JavaScript ecosystem. Its utilities are deeply embedded in frameworks, build systems, and production applications across the web. Like many foundational dependencies, Lodash evolved into critical infrastructure long before the ecosystem had strong models for funding, governance, or long-term security operations.
&lt;p /&gt;
&lt;A HREF=&quot;https://socket.dev/blog/inside-lodash-security-reset?utm_medium=feed&quot;&gt;https://socket.dev/blog/inside-lodash-security-reset?utm_medium=feed&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Britain and Japan Join Forces on Cybersecurity and Strategic Minerals&lt;/h3&gt;

Japan and Britain have agreed to expand cooperation on cybersecurity and critical mineral supply chains, framing the move as a strategic response to intensifying geopolitical, economic, and technological pressures. The British and Japanese cybersecurity strategy and agreement were confirmed during British Prime Minister Keir Starmer-s overnight visit to Tokyo, where leaders from both countries reaffirmed their commitment to collective security and economic resilience.
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/britain-japanese-cybersecurity-cooperation/&quot;&gt;https://thecyberexpress.com/britain-japanese-cybersecurity-cooperation/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Russian APT28 Exploit Zero-Day Hours After Microsoft Discloses Office Vulnerability&lt;/h3&gt;

Ukraines cyber defenders warn Russian hackers weaponized a Microsoft zero-day within 24 hours of public disclosure, targeting government agencies with malicious documents delivering Covenant framework backdoors.
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/russian-apt28-exploit-zero-day-cve-2026-21509/&quot;&gt;https://thecyberexpress.com/russian-apt28-exploit-zero-day-cve-2026-21509/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Default Credentials, Vulnerable Devices Exploited in Polish Energy Grid Attack&lt;/h3&gt;

A cyberattack by Russian state-sponsored threat actors that targeted at least 30 wind and solar farms in Poland relied on default credentials, lack of multi-factor authentication (MFA) and outdated and misconfigured devices, according to a new report on the December 2025 incident by CERT Polska, the Polish computer emergency response team.
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/default-credentials-polish-energy-grid-attack/&quot;&gt;https://thecyberexpress.com/default-credentials-polish-energy-grid-attack/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;OpenSSL: 12 Sicherheitslecks, eines erlaubt Schadcodeausführung und ist kritisch&lt;/h3&gt;

In OpenSSL wurden 12 Sicherheitslücken entdeckt - mit KI-Tools. Eine davon gilt als kritisch. Aktualisierte Software steht bereit.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/OpenSSL-12-Sicherheitslecks-eines-erlaubt-Schadcodeausfuehrung-und-ist-kritisch-11161775.html&quot;&gt;https://www.heise.de/news/OpenSSL-12-Sicherheitslecks-eines-erlaubt-Schadcodeausfuehrung-und-ist-kritisch-11161775.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Sicherheitspatches: Root-Attacken auf IBM Db2 möglich&lt;/h3&gt;

Mehrere Sicherheitslücken gefährden IBMs Datenbankmanagementsystem Db2. Primär können Instanzen abstürzen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Sicherheitspatches-Root-Attacken-auf-IBM-Db2-moeglich-11161723.html&quot;&gt;https://www.heise.de/news/Sicherheitspatches-Root-Attacken-auf-IBM-Db2-moeglich-11161723.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Dell Unity: Angreifer können Schadcode mit Root-Rechten ausführen&lt;/h3&gt;

Admins sollten zeitnah ein wichtiges Sicherheitsupdate für Dell Unity Operating Environment installieren.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Dell-Unity-Angreifer-koennen-Schadcode-mit-Root-Rechten-ausfuehren-11162412.html&quot;&gt;https://www.heise.de/news/Dell-Unity-Angreifer-koennen-Schadcode-mit-Root-Rechten-ausfuehren-11162412.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security updates for Monday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (iperf3, kernel, and php), Debian (ceph, pillow, pyasn1, python-django, and python-tornado), Fedora (bind9-next, cef, chromium, fontforge, java-21-openjdk, java-25-openjdk, java-latest-openjdk, mingw-python-urllib3, mingw-python-wheel, nodejs20, nodejs22, nodejs24, opencc, openssl, python-wheel, and qownnotes), Red Hat (binutils, gcc-toolset-13-binutils, gcc-toolset-14-binutils, gcc-toolset-15-binutils, java-1.8.0-openjdk, and java-25-openjdk), Slackware (expat), SUSE (bind, cacti, cacti-spine, chromedriver, chromium, dirmngr, fontforge-20251009, glib2, golang-github-prometheus-prometheus, govulncheck-vulndb, icinga2, ImageMagick, kernel, logback, openCryptoki, openssl-1_1, python311-djangorestframework, python311-pypdf, python314, python315, qemu, and xen), and Ubuntu (linux, linux-aws, linux-aws-5.4, linux-gcp, linux-gcp-5.4, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-iot, linux-kvm and linux-aws-fips, linux-fips, linux-gcp-fips).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1056923/&quot;&gt;https://lwn.net/Articles/1056923/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Privileged File System Vulnerability Present in a SCADA System&lt;/h3&gt;

We detail our discovery of CVE-2025-0921. This privileged file system flaw in SCADA system Iconics Suite could lead to a denial-of-service (DoS) attack.
&lt;p /&gt;
&lt;A HREF=&quot;https://unit42.paloaltonetworks.com/iconics-suite-cve-2025-0921/&quot;&gt;https://unit42.paloaltonetworks.com/iconics-suite-cve-2025-0921/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Vulnerability &amp; Patch Roundup - January 2026&lt;/h3&gt;

Vulnerability reports and responsible disclosures are essential for website security awareness and education. Automated attacks targeting known software vulnerabilities are one of the leading causes of website compromises.To help educate website owners about potential threats to their environments, we-ve compiled a list of important security updates and vulnerability patches for the WordPress ecosystem this past month.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.sucuri.net/2026/01/vulnerability-patch-roundup-january-2026.html&quot;&gt;https://blog.sucuri.net/2026/01/vulnerability-patch-roundup-january-2026.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Multiple vulnerabilities in Cybozu Garoon&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://jvn.jp/en/jp/JVN35265756/&quot;&gt;https://jvn.jp/en/jp/JVN35265756/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Multiple Microsoft Office products vulnerable to untrusted search path&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://jvn.jp/en/jp/JVN04984838/&quot;&gt;https://jvn.jp/en/jp/JVN04984838/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Sonatype Nexus Repository vulnerable to server-side request forgery&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://jvn.jp/en/jp/JVN64861120/&quot;&gt;https://jvn.jp/en/jp/JVN64861120/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;OS command injection in raspap-webgui&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://jvn.jp/en/jp/JVN27202136/&quot;&gt;https://jvn.jp/en/jp/JVN27202136/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;ZDI-26-050: GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;http://www.zerodayinitiative.com/advisories/ZDI-26-050/&quot;&gt;http://www.zerodayinitiative.com/advisories/ZDI-26-050/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;KI-Bot: OpenClaw (Moltbot) mit hochriskanter Codeschmuggel-Lücke&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/KI-Bot-OpenClaw-Moltbot-mit-hochriskanter-Codeschmuggel-Luecke-11161705.html&quot;&gt;https://www.heise.de/news/KI-Bot-OpenClaw-Moltbot-mit-hochriskanter-Codeschmuggel-Luecke-11161705.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Multiple vulnerabilities in Native Instruments Native Access (MacOS)&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-native-instruments-native-access-macos/&quot;&gt;https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-native-instruments-native-access-macos/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CVE-2025-60021 (CVSS 9.8): command injection in Apache bRPC heap profiler&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cyberark.com/resources/threat-research-blog/cve-2025-60021-cvss-9-8-command-injection-in-apache-brpc-heap-profiler&quot;&gt;https://www.cyberark.com/resources/threat-research-blog/cve-2025-60021-cvss-9-8-command-injection-in-apache-brpc-heap-profiler&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-02-02T19:51:16Z</dc:date></entry><entry><title>Tageszusammenfassung - 30.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-30012026"/><author><name>CERT.at</name></author><updated>2026-01-30T18:20:59Z</updated><published>2026-01-30T18:20:59Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Donnerstag 29-01-2026 18:00 - Freitag 30-01-2026 18:00
Handler:     Guenes Holler
Co-Handler:  Michael Schlagenhaufer


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 &amp; CVE-2026-1340)&lt;/h3&gt;

When Ivanti removed the embargoes from CVE-2026-1281 and CVE-2026-1340 - pre-auth Remote Command Execution vulnerabilities in Ivanti-s Endpoint Manager Mobile (EPMM) solution - we sighed with relief. Clearly, the universe had decided to continue mocking Secure-By-Design signers right on schedule - every January. [..] As we are always keen to remind everyone, today-s blog post didn-t ruin your weekend. Firstly, the APT currently exploiting these vulnerabilities, and secondly, your lack of response to the warnings from Ivanti and CISA did.
&lt;p /&gt;
&lt;A HREF=&quot;https://labs.watchtowr.com/someone-knows-bash-far-too-well-and-we-love-it-ivanti-epmm-pre-auth-rces-cve-2026-1281-cve-2026-1340/&quot;&gt;https://labs.watchtowr.com/someone-knows-bash-far-too-well-and-we-love-it-ivanti-epmm-pre-auth-rces-cve-2026-1281-cve-2026-1340/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hugging Face abused to spread thousands of Android malware variants&lt;/h3&gt;

A new Android malware campaign is using the Hugging Face platform as a repository for thousands of variations of an APK payload that collects credentials for popular financial and payment services.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/hugging-face-abused-to-spread-thousands-of-android-malware-variants/&quot;&gt;https://www.bleepingcomputer.com/news/security/hugging-face-abused-to-spread-thousands-of-android-malware-variants/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft fixes Outlook bug blocking access to encrypted emails&lt;/h3&gt;

Microsoft has fixed a known issue that prevented Microsoft 365 customers from opening encrypted emails in classic Outlook after a recent update.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-outlook-bug-blocking-access-to-encrypted-emails/&quot;&gt;https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-outlook-bug-blocking-access-to-encrypted-emails/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Undocumented &quot;TelnetEnable&quot; functionality of End of Service NETGEAR products&lt;/h3&gt;

Some end of service NETGEAR products provide &quot;TelnetEnable&quot; functionality, which allows a magic packet to activate telnet service on the box. [..] Stop using the end of service products, including NETGEAR PR2000.
&lt;p /&gt;
&lt;A HREF=&quot;https://jvn.jp/en/jp/JVN46722282/&quot;&gt;https://jvn.jp/en/jp/JVN46722282/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries&lt;/h3&gt;

Ollama is an open-source framework that allows users to easily download, run, and manage large language models (LLMs) locally on Windows, macOS, and Linux. While the service binds to the localhost address at 127.0.0[.]1:11434 by default, it's possible to expose it to the public internet by means of a trivial change: configuring it to bind to 0.0.0[.]0 or a public interface. The fact that Ollama, like the recently popular Moltbot (formerly Clawdbot), is hosted locally and operates outside of the enterprise security perimeter, poses new security concerns.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/researchers-find-175000-publicly.html&quot;&gt;https://thehackernews.com/2026/01/researchers-find-175000-publicly.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;ShadowHS: A Fileless Linux Post-Exploitation Framework Built on a Weaponized hackshell&lt;/h3&gt;

Cyble Research &amp; Intelligence Labs (CRIL) has identified a Linux intrusion chain leveraging a highly obfuscated, fileless loader that deploys a weaponized variant of hackshell entirely from memory. Cyble tracks this activity under the name ShadowHS, reflecting its fileless execution model and lineage from the original hackshell utility.
&lt;p /&gt;
&lt;A HREF=&quot;https://cyble.com/blog/shadowhs-fileless-linux-post-exploitation-framework/&quot;&gt;https://cyble.com/blog/shadowhs-fileless-linux-post-exploitation-framework/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cybersicherheitschef der USA lädt vertrauliche Dokumente bei ChatGPT hoch&lt;/h3&gt;

Offenbar hatte sich ausgerechnet der Boss eine Ausnahmegenehmigung für die Nutzung des Tools geholt und agierte damit umgehend fahrlässig.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.derstandard.at/story/3000000306469/cybersicherheitschef-der-usa-laedt-vertrauliche-dokumente-bei-chatgpt-hoch&quot;&gt;https://www.derstandard.at/story/3000000306469/cybersicherheitschef-der-usa-laedt-vertrauliche-dokumente-bei-chatgpt-hoch&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Arsink Spyware Posing as WhatsApp, YouTube, Instagram, TikTok Hits 143 Countries&lt;/h3&gt;

The interesting thing about this campaign is that hackers are not using the official Google Play Store to spread this, but posting links on Telegram and Discord or using the file-sharing site MediaFire. [..] They basically offer -Pro- or -Mod- versions of these apps, promising special features that the real apps don-t have. But, as soon as you download one, the app immediately asks for a long list of permissions.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/arsink-spyware-whatsapp-youtube-instagram-tiktok/&quot;&gt;https://hackread.com/arsink-spyware-whatsapp-youtube-instagram-tiktok/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Security updates for Friday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (curl, gimp:2.8, glibc, grafana, grafana-pcp, kernel, osbuild-composer, php:8.3, python-urllib3, python3.11, and python3.12), Debian (chromium), Mageia (ceph, gpsd, libxml2, openjdk, openssl, and xen), SUSE (abseil-cpp, assertj-core, coredns, freerdp, java-11-openjdk, java-25-openjdk, libxml2, openssl-1_0_0, openssl-1_1, python, python-filelock, and python311-sse-starlette), and Ubuntu (kernel, linux, linux-aws, linux-aws-hwe, linux-hwe, linux-kvm, linux-oracle, linux, linux-aws, linux-kvm, linux-lts-xenial, linux-aws-fips, linux-fips, linux-fips, and texlive-bin).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1056692/&quot;&gt;https://lwn.net/Articles/1056692/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Kritische Schwachstellen in Ivanti Endpoint Manager Mobile - Updates empfohlen&lt;/h3&gt;

Ivanti hat ein Security Advisory bezüglich kritischer Schwachstellen im Endpoint Manager Mobile veröffentlicht. Diese Sicherheitslücken werden bereits aktiv ausgenutzt. Die Schwachstellen ermöglichen einem*einer entfernten, nicht authentifizierten Angreifer:in, beliebigen Code auf dem betroffenen System auszuführen (Remote Code Execution), was die vollständige Kompromittierung des Servers erlaubt. CVE-2026-1281, CVE-2026-1340
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cert.at/de/warnungen/2026/1/kritische-schwachstellen-in-ivanti-endpoint-manager-mobile-updates-empfohlen&quot;&gt;https://www.cert.at/de/warnungen/2026/1/kritische-schwachstellen-in-ivanti-endpoint-manager-mobile-updates-empfohlen&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;BoidCMS v2.1.2 Apache .htaccess Rule Bypass Leading to Information Disclosure&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://cxsecurity.com/issue/WLB-2026010019&quot;&gt;https://cxsecurity.com/issue/WLB-2026010019&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Lexmark Security Advisory&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.lexmark.com/content/dam/support/collateral/security-alerts/CVE-2025-65083.pdf&quot;&gt;https://www.lexmark.com/content/dam/support/collateral/security-alerts/CVE-2025-65083.pdf&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;KiloView Encoder Series&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-029-01&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-029-01&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Rockwell Automation ArmorStart LT&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-029-02&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-029-02&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Rockwell Automation ControlLogix&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-029-03&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-029-03&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-30T18:20:59Z</dc:date></entry><entry><title>Tageszusammenfassung - 29.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-29012026"/><author><name>CERT.at</name></author><updated>2026-01-29T18:29:40Z</updated><published>2026-01-29T18:29:40Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Mittwoch 28-01-2026 18:00 - Donnerstag 29-01-2026 18:00
Handler:     Alexander Riepl
Co-Handler:  Guenes Holler


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Aisuru botnet sets new record with 31.4 Tbps DDoS attack&lt;/h3&gt;

The Aisuru/Kimwolf botnet launched a new massive distributed denial of service (DDoS) attack that peaked at 31.4 Tbps and 200 million requests per second, setting a new record.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/aisuru-botnet-sets-new-record-with-314-tbps-ddos-attack/&quot;&gt;https://www.bleepingcomputer.com/news/security/aisuru-botnet-sets-new-record-with-314-tbps-ddos-attack/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Von wegen Virenschutz: Malware über Update-Server von Antivirus-Tool verteilt&lt;/h3&gt;

Angreifer haben über das Antivirus-Tool eScan Malware auf Nutzersysteme geschleust. Ein Update-Server des Anbieters war kompromittiert.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/von-wegen-virenschutz-malware-ueber-update-server-von-antivirus-tool-verteilt-2601-204754.html&quot;&gt;https://www.golem.de/news/von-wegen-virenschutz-malware-ueber-update-server-von-antivirus-tool-verteilt-2601-204754.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Theres a Rash of Scam Spam Coming From a Real Microsoft Address&lt;/h3&gt;

There are reports that a legitimate Microsoft email address -- which Microsoft explicitly says customers should add to their allow list -- is delivering scam spam.
&lt;p /&gt;
&lt;A HREF=&quot;https://it.slashdot.org/story/26/01/28/1849206/theres-a-rash-of-scam-spam-coming-from-a-real-microsoft-address?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed&quot;&gt;https://it.slashdot.org/story/26/01/28/1849206/theres-a-rash-of-scam-spam-coming-from-a-real-microsoft-address?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Ransomware crims forced to take off-RAMP as FBI seizes forum&lt;/h3&gt;

Ransomware crims have just lost one of their best business platforms. US law enforcement has seized the notorious RAMP cybercrime forum's dark web and clearnet domains.
&lt;p /&gt;
&lt;A HREF=&quot;https://go.theregister.com/feed/www.theregister.com/2026/01/28/fbi_seizes_ramp_forum/&quot;&gt;https://go.theregister.com/feed/www.theregister.com/2026/01/28/fbi_seizes_ramp_forum/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Patch or perish: Vulnerability exploits now dominate intrusions&lt;/h3&gt;

Apply fixes within a few hours or face the music, say the pros.
&lt;p /&gt;
&lt;A HREF=&quot;https://go.theregister.com/feed/www.theregister.com/2026/01/29/faster_patching_please_cry_infoseccers/&quot;&gt;https://go.theregister.com/feed/www.theregister.com/2026/01/29/faster_patching_please_cry_infoseccers/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;ConsentFix (a.k.a. AuthCodeFix): Detecting OAuth2 Authorization Code Phishing&lt;/h3&gt;

ConsentFix (a.k.a. AuthCodeFix) is the latest variant of the fix-type phishing attacks, initially identified by Push Security1. In this technique, the adversary tricks the victim into generating an OAuth authorization code that is part of a localhost URL by signing in to the Azure CLI instance (or other vulnerable applications). Then, the victim is instructed to copy that URL and paste it into a phishing website, essentially handing over the authorization code to the adversary, who is now able to exchange it for an access token. Using the access token, the adversary gets access to the victim-s Microsoft account.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.nviso.eu/2026/01/29/consentfix-a-k-a-authcodefix-detecting-oauth2-authorization-code-phishing/&quot;&gt;https://blog.nviso.eu/2026/01/29/consentfix-a-k-a-authcodefix-detecting-oauth2-authorization-code-phishing/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Dissecting UAT-8099: New persistence mechanisms and regional focus&lt;/h3&gt;

Cisco Talos observed new activity from UAT-8099 spanning from August 2025 through early 2026. Analysis of Cisco's file census and DNS traffic indicates that compromised IIS servers are located across India, Pakistan, Thailand, Vietnam, and Japan, with a distinct concentration of attacks in Thailand and Vietnam. Furthermore, this activity significantly overlaps with the WEBJACK campaign; we have identified high-confidence correlations across malware hashes, C2 infrastructure, victimology, and the promoted gambling sites.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.talosintelligence.com/uat-8099-new-persistence-mechanisms-and-regional-focus/&quot;&gt;https://blog.talosintelligence.com/uat-8099-new-persistence-mechanisms-and-regional-focus/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Malicious Google Ads Target Mac Users with Fake Mac Cleaner Pages&lt;/h3&gt;

Researchers at MacKeeper have found malicious Google Ads for -Mac cleaner- tools that trick users into running dangerous Terminal commands. Stay safe by learning how to spot these fake Apple sites.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/malicious-google-ads-mac-fake-mac-cleaner/&quot;&gt;https://hackread.com/malicious-google-ads-mac-fake-mac-cleaner/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Unveiling the Weaponized Web Shell EncystPHP&lt;/h3&gt;

FortiGuard Labs has discovered a web shell that we named -EncystPHP.- It features several advanced capabilities, including remote command execution, persistence mechanisms, and web shell deployment. Incidents were launched in early December last year and propagated via exploitation of the FreePBX vulnerability CVE-2025-64328.
&lt;p /&gt;
&lt;A HREF=&quot;https://feeds.fortinet.com/~/943094408/0/fortinet/blogs~Unveiling-the-Weaponized-Web-Shell-EncystPHP&quot;&gt;https://feeds.fortinet.com/~/943094408/0/fortinet/blogs~Unveiling-the-Weaponized-Web-Shell-EncystPHP&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Nvidia Sicherheitslücken: Attacken auf GPU-Treiber können zu Abstürzen führen&lt;/h3&gt;

Softwareschwachstellen gefährden PCs mit Grafikkarten von Nvidia. Sicherheitspatches sind verfügbar. 
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Nvidia-Sicherheitsluecken-Attacken-auf-GPU-Treiber-koennen-zu-Abstuerzen-fuehren-11158836.html&quot;&gt;https://www.heise.de/news/Nvidia-Sicherheitsluecken-Attacken-auf-GPU-Treiber-koennen-zu-Abstuerzen-fuehren-11158836.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security updates for Thursday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (java-25-openjdk, openssl, and python3.9), Debian (gimp, libmatio, pyasn1, and python-django), Fedora (perl-HarfBuzz-Shaper, python-tinycss2, and weasyprint), Mageia (glib2.0), Oracle (curl, fence-agents, gcc-toolset-15-binutils, glibc, grafana, java-1.8.0-openjdk, kernel, mariadb, osbuild-composer, perl, php:8.2, python-urllib3, python3.11, python3.11-urllib3, python3.12, and python3.12-urllib3), SUSE (alloy, avahi, bind, buildah, busybox, container-suseconnect, coredns, gdk-pixbuf, gimp, go1.24, go1.24-openssl, go1.25, helm, kernel, kubernetes, libheif, libpcap, libpng16, openjpeg2, openssl-1_0_0, openssl-1_1, openssl-3, php8, python-jaraco.context, python-marshmallow, python-pyasn1, python-urllib3, python-virtualenv, python311, python313, rabbitmq-server, xen, zli, and zot-registry), and Ubuntu (containerd, containerd-app and wlc). 
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1056544/&quot;&gt;https://lwn.net/Articles/1056544/&lt;/a&gt;

&lt;hr&gt;&lt;h3&gt;ZDI-26-049: Delta Electronics DIAView Exposed Dangerous Method Remote Code Execution Vulnerability&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;http://www.zerodayinitiative.com/advisories/ZDI-26-049/&quot;&gt;http://www.zerodayinitiative.com/advisories/ZDI-26-049/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;ZDI-26-048: Fortinet FortiSandbox fortisandbox Server-Side Request Forgery Remote Code Execution Vulnerability&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;http://www.zerodayinitiative.com/advisories/ZDI-26-048/&quot;&gt;http://www.zerodayinitiative.com/advisories/ZDI-26-048/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;ZDI-26-047: Hancom Office DOC File Parsing Type Confusion Remote Code Execution Vulnerability&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;http://www.zerodayinitiative.com/advisories/ZDI-26-047/&quot;&gt;http://www.zerodayinitiative.com/advisories/ZDI-26-047/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;ZDI-26-046: Cisco Snort _bnfa_search_csparse_nfa Use-After-Free Remote Code Execution Vulnerability&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;http://www.zerodayinitiative.com/advisories/ZDI-26-046/&quot;&gt;http://www.zerodayinitiative.com/advisories/ZDI-26-046/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-29T18:29:40Z</dc:date></entry><entry><title>Tageszusammenfassung - 28.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-28012026"/><author><name>CERT.at</name></author><updated>2026-01-28T19:17:19Z</updated><published>2026-01-28T19:17:19Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Dienstag 27-01-2026 18:00 - Mittwoch 28-01-2026 18:30
Handler:     Felician Fuchs
Co-Handler:  Alexander Riepl


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Fortinet blocks exploited FortiCloud SSO zero day until patch is ready&lt;/h3&gt;

Fortinet has confirmed a new, actively exploited critical FortiCloud single sign-on (SSO) authentication bypass vulnerability, tracked as CVE-2026-24858, and says it has mitigated the zero-day attacks by blocking FortiCloud SSO connections from devices running vulnerable firmware versions.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/fortinet-blocks-exploited-forticloud-sso-zero-day-until-patch-is-ready/&quot;&gt;https://www.bleepingcomputer.com/news/security/fortinet-blocks-exploited-forticloud-sso-zero-day-until-patch-is-ready/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Slovakian man pleads guilty to operating darknet marketplace&lt;/h3&gt;

A Slovakian national admitted on Tuesday to helping operate a darknet marketplace that sold narcotics, cybercrime tools and services, fake government IDs, and stolen personal information for more than two years.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/slovakian-man-pleads-guilty-to-operating-kingdown-market-cybercrime-marketplace/&quot;&gt;https://www.bleepingcomputer.com/news/security/slovakian-man-pleads-guilty-to-operating-kingdown-market-cybercrime-marketplace/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hackers hijack exposed LLM endpoints in Bizarre Bazaar operation&lt;/h3&gt;

A malicious campaign is actively targeting exposed LLM (Large Language Model) service endpoints to commercialize unauthorized access to AI infrastructure.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/hackers-hijack-exposed-llm-endpoints-in-bizarre-bazaar-operation/&quot;&gt;https://www.bleepingcomputer.com/news/security/hackers-hijack-exposed-llm-endpoints-in-bizarre-bazaar-operation/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Vibe-Coded Sicarii Ransomware Cant Be Decrypted&lt;/h3&gt;

A new ransomware strain that entered the scene last year has poorly designed code and an odd &quot;Hebrew&quot; identity that might be a false flag.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.darkreading.com/endpoint-security/vibe-coded-sicarii-ransomware-decrypted&quot;&gt;https://www.darkreading.com/endpoint-security/vibe-coded-sicarii-ransomware-decrypted&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware&lt;/h3&gt;

Meta on Tuesday announced its adding Strict Account Settings on WhatsApp to secure certain users against advanced cyber attacks because of who they are and what they do.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/whatsapp-rolls-out-lockdown-style.html&quot;&gt;https://thehackernews.com/2026/01/whatsapp-rolls-out-lockdown-style.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan&lt;/h3&gt;

Cybersecurity researchers have discovered two malicious packages in the Python Package Index (PyPI) repository that masquerade as spellcheckers but contain functionality to deliver a remote access trojan (RAT).
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/fake-python-spellchecker-packages-on.html&quot;&gt;https://thehackernews.com/2026/01/fake-python-spellchecker-packages-on.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks&lt;/h3&gt;

Threat actors with ties to China have been observed using an updated version of a backdoor called COOLCLIENT in cyber espionage attacks in 2025 to facilitate comprehensive data theft from infected endpoints.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/mustang-panda-deploys-updated.html&quot;&gt;https://thehackernews.com/2026/01/mustang-panda-deploys-updated.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Leder-Unikate von -maronellis.com-: Alles Schwindel!&lt;/h3&gt;

Sobald Werbeanzeigen von einem kleinen Familienbetrieb berichten, der leider schließen muss, ist Vorsicht angebracht. Besonders dann, wenn eine angebliche Reportage Eindrücke vom großen Ansturm auf die letzten handgefertigten Einzelstücke liefert. Wie problematische Onlineshops funktionieren und wie die Kriminellen ihre Opfer anlocken - eine Analyse am Beispiel -maronellis.com-.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/leder-unikate-maronelliscom/&quot;&gt;https://www.watchlist-internet.at/news/leder-unikate-maronelliscom/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Open Source statt Big Tech: Frankreich will Microsoft Teams, Zoom und Co loswerden&lt;/h3&gt;

Visio entsteigt der Pilotphase und soll bis 2027 von 200.000 Beamten genutzt werden. Das Streben nach Souveränität, aber auch Kosteneinsparungen liefern die Motivation
&lt;p /&gt;
&lt;A HREF=&quot;https://www.derstandard.at/story/3000000306024/open-source-statt-big-tech-frankreich-will-microsoft-teams-zoom-und-co-loswerden&quot;&gt;https://www.derstandard.at/story/3000000306024/open-source-statt-big-tech-frankreich-will-microsoft-teams-zoom-und-co-loswerden&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;EU fordert Öffnung von Android für andere KI - innerhalb von sechs Monaten&lt;/h3&gt;

Die exklusive, tiefgehende Integration von Gemini in das Betriebssystem sei ein Verstoß gegen den Digital Markets Act. Zudem will die EU, dass Google Suchdaten an Konkurrenten herausgibt
&lt;p /&gt;
&lt;A HREF=&quot;https://www.derstandard.at/story/3000000306105/eu-fordert-oeffnung-von-android-fuer-andere-ki-innerhalb-von-sechs-monaten&quot;&gt;https://www.derstandard.at/story/3000000306105/eu-fordert-oeffnung-von-android-fuer-andere-ki-innerhalb-von-sechs-monaten&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Angriffswelle auf Journalisten über Signal-Messenger&lt;/h3&gt;

Auch andere zivilgesellschaftliche Akteure betroffen. Bösartige Phishing-Nachricht fordert wegen &quot;verdächtiger Aktivitäten&quot; zur &quot;Verifizierung&quot; auf.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.derstandard.at/story/3000000306125/angriffswelle-auf-journalisten-ueber-signal-messenger&quot;&gt;https://www.derstandard.at/story/3000000306125/angriffswelle-auf-journalisten-ueber-signal-messenger&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Beware! Fake ChatGPT browser extensions are stealing your login credentials&lt;/h3&gt;

If youve installed a browser extension to enhance your ChatGPT experience, you might want to think again. Read more in my article on the Hot for Security blog.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bitdefender.com/en-us/blog/hotforsecurity/beware-fake-chatgpt-browser-extensions-are-stealing-your-login-credentials&quot;&gt;https://www.bitdefender.com/en-us/blog/hotforsecurity/beware-fake-chatgpt-browser-extensions-are-stealing-your-login-credentials&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cyberattack on Poland-s power grid hit around 30 facilities, new report says&lt;/h3&gt;

Adding to previous research about an operation against Polands electrical grid, analysts at Dragos say it affected dozens of facilities and disrupted operational technology.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/poland-electrical-grid-cyberattack-30-facilities-affected&quot;&gt;https://therecord.media/poland-electrical-grid-cyberattack-30-facilities-affected&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Exchange Online: Microsoft verschiebt SMTP AUTH Basic Authentication-Abschaltung&lt;/h3&gt;

Eigentlich wollte Microsoft in Exchange Online die Unterstützung für die Basisauthentifizierung mit Client-Übermittlung (SMTP AUTH) bereits im September 2025 einstellen. Dann hieß es, dass die Einstellung zwischen 1. März 2026 bis zum 30. April 2026 schrittweise einstellen.
&lt;p /&gt;
&lt;A HREF=&quot;https://borncity.com/blog/2026/01/28/exchange-online-microsoft-verschiebt-smtp-auth-basic-authentication-abschaltung/&quot;&gt;https://borncity.com/blog/2026/01/28/exchange-online-microsoft-verschiebt-smtp-auth-basic-authentication-abschaltung/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;ShinyHunters Target 100+ Firms Using Phone Calls to Bypass SSO Security&lt;/h3&gt;

ShinyHunters is driving attacks on 100+ organisations, using vishing and fake login pages with allied groups to bypass SSO and steal company data, reports Silent Push.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/shinyhunters-target-firms-bypass-sso-security/&quot;&gt;https://hackread.com/shinyhunters-target-firms-bypass-sso-security/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Russian Cybercrime Platform RAMP Forum Seized by Feds&lt;/h3&gt;

US authorities have seized the RAMP cybercrime forum, taking down both its clearnet and dark web domains in a major hit to the ransomware infrastructure.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/russian-cybercrime-ramp-forum-seized-feds/&quot;&gt;https://hackread.com/russian-cybercrime-ramp-forum-seized-feds/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;OpenSSL January 2026 Security Update: CMS and PKCS#12 Buffer Overflows&lt;/h3&gt;

A deep dive into OpenSSL-s January 2026 CMS and PKCS#12 vulnerabilities, including a pre-auth stack overflow and a PKCS#12 parsing bug.
&lt;p /&gt;
&lt;A HREF=&quot;https://securitylabs.datadoghq.com/articles/openssl-january-2026-security-update-cms-and-pkcs12-buffer-overflows/&quot;&gt;https://securitylabs.datadoghq.com/articles/openssl-january-2026-security-update-cms-and-pkcs12-buffer-overflows/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Administrative FortiCloud SSO authentication bypass&lt;/h3&gt;

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS, FortiManager, FortiAnalyzer may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.
&lt;p /&gt;
&lt;A HREF=&quot;https://fortiguard.fortinet.com/psirt/FG-IR-26-060&quot;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-26-060&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;SolarWinds warns of critical Web Help Desk RCE, auth bypass flaws&lt;/h3&gt;

SolarWinds has released security updates to patch critical authentication bypass and remote command execution vulnerabilities in its Web Help Desk IT help desk software.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/&quot;&gt;https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution&lt;/h3&gt;

Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation platform, including a crucial vulnerability that could result in remote code execution.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/two-high-severity-n8n-flaws-allow.html&quot;&gt;https://thehackernews.com/2026/01/two-high-severity-n8n-flaws-allow.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution&lt;/h3&gt;

A critical sandbox escape vulnerability has been disclosed in the popular vm2 Node.js library that, if successfully exploited, could allow attackers to run arbitrary code on the underlying operating system. The vulnerability, tracked as CVE-2026-22709, carries a CVSS score of 9.8 out of 10.0 on the CVSS scoring system.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/critical-vm2-nodejs-flaw-allows-sandbox.html&quot;&gt;https://thehackernews.com/2026/01/critical-vm2-nodejs-flaw-allows-sandbox.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Netzwerkmanagementlösung HPE Aruba Fabric Composer ist angreifbar&lt;/h3&gt;

Angreifer können Systeme mit HPE Aruba Networking Fabric Composer mit Schadcode attackieren.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Netzwerkmanagementloesung-HPE-Aruba-Fabric-Composer-ist-angreifbar-11156836.html&quot;&gt;https://www.heise.de/news/Netzwerkmanagementloesung-HPE-Aruba-Fabric-Composer-ist-angreifbar-11156836.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;A critical GnuPG security update&lt;/h3&gt;

There is a new GnuPG update for a &quot;critical security bug&quot; in recentGnuPG releases. A crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack buffer overflow in gpg-agent during the PKDECRYPT--kem=CMS handling. This can easily be used for a DoS but, worse, the memory corruption can very likley also be used to mount a remote code execution attack. The bug was introduced while changing an internal API to the FIPS required KEM API.
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1056209/&quot;&gt;https://lwn.net/Articles/1056209/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security updates for Wednesday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (java-1.8.0-openjdk), Debian (openssl), Fedora (assimp, chromium, curl, freerdp, gimp, and harfbuzz), Mageia (glibc, haproxy, iperf, and python-pyasn1), Red Hat (image-builder, openssl, and osbuild-composer), Slackware (mozilla), SUSE (avahi, cups, gio-branding-upstream, google-osconfig-agent, java-11-openjdk, java-17-openjdk, java-21-openjdk, kernel-firmware, libmatio-devel, libopenjp2-7, nodejs22, php8, python-python-multipart, python311-urllib3_1, qemu, and xen), and Ubuntu (ffmpeg, jaraco.context, openssl, and openssl, openssl1.0).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1056330/&quot;&gt;https://lwn.net/Articles/1056330/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security Vulnerabilities fixed in Thunderbird 140.7.1&lt;/h3&gt;

CSS-based exfiltration of the content from partially encrypted emails when allowing remote content.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.mozilla.org/en-US/security/advisories/mfsa2026-08/&quot;&gt;https://www.mozilla.org/en-US/security/advisories/mfsa2026-08/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;[R1] Tenable Network Monitor Version 6.5.3 Fixes Multiple Vulnerabilities&lt;/h3&gt;

Nessus Network Monitor leverages third-party software to help provide underlying functionality. Several of the third-party components (libxml2, libxslt, expat, c-ares, curl, sqlite) were found to contain vulnerabilities, and updated versions have been made available by the providers.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.tenable.com/security/tns-2026-02&quot;&gt;https://www.tenable.com/security/tns-2026-02&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Notification about the vulnerability in beat-access for Windows - Privilege Escalation Risk&lt;/h3&gt;

A vulnerability has been identified in beat-access for Windows, a remote access software provided as part of the beat service, which may allow malicious code to be executed from the local environment. At the time of posting this notice, no attacks exploiting this vulnerability have been confirmed. However, we strongly recommend that customers using beat-access for Windows promptly update to the latest version (4.0.0 or later).
&lt;p /&gt;
&lt;A HREF=&quot;https://www.fujifilm.com/fbglobal/eng/company/news/notice/2026/0127_announce.html&quot;&gt;https://www.fujifilm.com/fbglobal/eng/company/news/notice/2026/0127_announce.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CVE-2025-60021 (CVSS 9.8): Command injection in Apache bRPC heap profiler&lt;/h3&gt;

CVE-2025-60021, a critical command injection issue in Apache bRPC-s /pprof/heap profiler endpoint, was identified during broader analysis of diagnostic and debugging surfaces in the framework.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cyberark.com/resources/threat-research-blog/cve-2025-60021-cvss-9-8-command-injection-in-apache-brpc-heap-profiler&quot;&gt;https://www.cyberark.com/resources/threat-research-blog/cve-2025-60021-cvss-9-8-command-injection-in-apache-brpc-heap-profiler&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Chrome: Stable Channel Update for Desktop&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;http://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_27.html&quot;&gt;http://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_27.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Johnson Controls Products&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-027-04&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-027-04&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Festo Didactic SE MES PC&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-027-02&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-027-02&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;iba Systems ibaPDA&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-027-01&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-027-01&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Schneider Electric Zigbee Products&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-027-03&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-027-03&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-28T19:17:19Z</dc:date></entry><entry><title>Tageszusammenfassung - 27.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-27012026"/><author><name>CERT.at</name></author><updated>2026-01-27T18:19:10Z</updated><published>2026-01-27T18:19:10Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Montag 26-01-2026 18:00 - Dienstag 27-01-2026 18:00
Handler:     Guenes Holler
Co-Handler:  Alexander Riepl


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Over 6,000 SmarterMail servers exposed to automated hijacking attacks&lt;/h3&gt;

Nonprofit security organization Shadowserver has found over 6,000 SmarterMail servers exposed online and likely vulnerable to attacks exploiting a critical authentication bypass vulnerability.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/over-6-000-smartermail-servers-exposed-to-automated-hijacking-attacks/&quot;&gt;https://www.bleepingcomputer.com/news/security/over-6-000-smartermail-servers-exposed-to-automated-hijacking-attacks/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Nike investigates data breach after extortion gang leaks files&lt;/h3&gt;

Nike is investigating what it described as a &quot;potential cyber security incident&quot; after the World Leaks ransomware gang leaked 1.4 TB of files allegedly stolen from the sportswear giant.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/nike-investigates-data-breach-after-extortion-gang-leaks-files/&quot;&gt;https://www.bleepingcomputer.com/news/security/nike-investigates-data-breach-after-extortion-gang-leaks-files/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft bringt Notfallpatch: Office-Nutzer werden über Zero-Day-Lücke attackiert&lt;/h3&gt;

Eine gefährliche Sicherheitslücke betrifft alle gängigen Office-Versionen. Angesichts der aktiven Ausnutzung sollten Anwender zügig patchen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/microsoft-bringt-notfallpatch-office-nutzer-werden-ueber-zero-day-luecke-attackiert-2601-204646.html&quot;&gt;https://www.golem.de/news/microsoft-bringt-notfallpatch-office-nutzer-werden-ueber-zero-day-luecke-attackiert-2601-204646.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Attacken beobachtet: Uralte Telnetd-Lücke gefährdet Hunderttausende Systeme&lt;/h3&gt;

Seit über zehn Jahren können sich Angreifer via Telnet Root-Zugriff auf unzählige Geräte verschaffen. Neue Scans zeigen das Ausmaß.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/attacken-beobachtet-uralte-telnetd-luecke-gefaehrdet-hunderttausende-systeme-2601-204656.html&quot;&gt;https://www.golem.de/news/attacken-beobachtet-uralte-telnetd-luecke-gefaehrdet-hunderttausende-systeme-2601-204656.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Bypassing Windows Administrator Protection&lt;/h3&gt;

A headline feature introduced in the latest release of Windows 11, 25H2 is Administrator Protection. The goal of this feature is to replace User Account Control (UAC) with a more robust and importantly, securable system to allow a local user to access administrator privileges only when necessary.This blog post will give a brief overview of the new feature, how it works and how it-s different from UAC. I-ll then describe some of the security research I undertook while it was in the ..
&lt;p /&gt;
&lt;A HREF=&quot;https://projectzero.google/2026/26/windows-administrator-protection.html&quot;&gt;https://projectzero.google/2026/26/windows-administrator-protection.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns&lt;/h3&gt;

Kaspersky researchers analyze updated CoolClient backdoor and new tools and scripts used in HoneyMyte (aka Mustang Panda or Bronze President) APT campaigns, including three variants of a browser data stealer.
&lt;p /&gt;
&lt;A HREF=&quot;https://securelist.com/honeymyte-updates-coolclient-uses-browser-stealers-and-scripts/118664/&quot;&gt;https://securelist.com/honeymyte-updates-coolclient-uses-browser-stealers-and-scripts/118664/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Canva among ~100 targets of ShinyHunters Okta identity-theft campaign&lt;/h3&gt;

Atlassian, RingCentral, ZoomInfo also among tech targets ShinyHunters has targeted around 100 organizations in its latest Okta single sign-on (SSO) credential stealing campaign, according to researchers and the criminal group itself.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.theregister.com/2026/01/26/shinyhunters_okta_sso_campaign/&quot;&gt;https://www.theregister.com/2026/01/26/shinyhunters_okta_sso_campaign/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Threat actors use FortiCloud SSO bypass to collect LDAP connection passwords&lt;/h3&gt;

CERT.at gained access to a toolkit of an unknown threat actor targeting FortiCloud SSO bypass in Fortinet appliances (CVE-2025-59718/CVE-2025-59719). We are releasing under TLP:CLEAR key findings about likely post-exploitation goals of the attacker. The obtained exploit works only for the original vulnerability [1] and is not effective against patched ..
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cert.at/en/blog/2026/1/threat-actors-use-forticloud-to-collect-ldap-connection-passwords&quot;&gt;https://www.cert.at/en/blog/2026/1/threat-actors-use-forticloud-to-collect-ldap-connection-passwords&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Russian security systems firm Delta hit by cyberattack, services disrupted&lt;/h3&gt;

Building and car alarm systems managed by Russian company Delta have been disrupted by a cyberattack blamed on a &quot;hostile foreign state.&quot;
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/russia-delta-security-alarm-company-cyberattack&quot;&gt;https://therecord.media/russia-delta-security-alarm-company-cyberattack&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Clawdbot: Ein OpenSource KI-Assistent - cool und ein Sicherheitsdesaster&lt;/h3&gt;

Bisher dominierten AI-Dienste wie ChatGPT, Gemini etc. den Bereich der LLMs - und Bots setzen auf diesen LLMs auf. Peter Steinberger hat mit seinem Team einen OpenSource Bot, Clawdbot, gebaut, der lokal läuft, Schnittstellen zu diversen Diensten und Modellen bietet ..
&lt;p /&gt;
&lt;A HREF=&quot;https://borncity.com/blog/2026/01/26/clawdbot-ein-opensource-ki-assistent/&quot;&gt;https://borncity.com/blog/2026/01/26/clawdbot-ein-opensource-ki-assistent/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088&lt;/h3&gt;

The Google Threat Intelligence Group (GTIG) has identified widespread, active exploitation of the critical vulnerability CVE-2025-8088 in WinRAR, a popular file archiver tool for Windows, to establish initial access and deliver diverse payloads. Discovered and patched in July 2025, government-backed threat actors linked to Russia and China as well as financially motivated threat actors continue to exploit this n-day across disparate operations. The consistent exploitation method, a ..
&lt;p /&gt;
&lt;A HREF=&quot;https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability/&quot;&gt;https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Apache Hadoop: Fehler im HDFS-Native-Client lässt Schadcode passieren&lt;/h3&gt;

Das Framework Apache Hadoop ist verwundbar. Attacken können im Kontext des HDFS-Dateisystems geschehen. Ein Sicherheitspatch ist verfügbar.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11155241&quot;&gt;https://heise.de/-11155241&lt;/a&gt;

&lt;hr&gt;


&lt;h2&gt; Vulnerabilities &lt;/h2&gt;



&lt;h3&gt;DSA-6112-1 openjdk-21 - security update&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lists.debian.org/debian-security-announce/2026/msg00021.html&quot;&gt;https://lists.debian.org/debian-security-announce/2026/msg00021.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;DSA-6111-1 imagemagick - security update&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://lists.debian.org/debian-security-announce/2026/msg00020.html&quot;&gt;https://lists.debian.org/debian-security-announce/2026/msg00020.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security Vulnerabilities fixed in Firefox 147.0.2&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.mozilla.org/en-US/security/advisories/mfsa2026-06/&quot;&gt;https://www.mozilla.org/en-US/security/advisories/mfsa2026-06/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Kubernetes Remote Code Execution Via Nodes/Proxy GET Permission&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://grahamhelton.com/blog/nodes-proxy-rce&quot;&gt;https://grahamhelton.com/blog/nodes-proxy-rce&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-27T18:19:10Z</dc:date></entry><entry><title>Tageszusammenfassung - 26.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-26012026"/><author><name>CERT.at</name></author><updated>2026-01-26T18:59:21Z</updated><published>2026-01-26T18:59:21Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Freitag 23-01-2026 18:00 - Montag 26-01-2026 18:00
Handler:     Michael Schlagenhaufer
Co-Handler:  Guenes Holler


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Hackers can bypass npm-s Shai-Hulud defenses via Git dependencies&lt;/h3&gt;

The defense mechanisms that NPM introduced after the Shai-Hulud supply-chain attacks have weaknesses that allow threat actors to bypass them via Git dependencies. [..]  the vulnerabilities were discovered in multiple utilities in the JavaScript ecosystem that allow managing dependencies, like pnpm, vlt, Bun, and NPM. [..] They say that the problems were addressed in all tools except for NPM, who closed the report stating that the behavior &quot;works as expected.&quot;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/hackers-can-bypass-npms-shai-hulud-defenses-via-git-dependencies/&quot;&gt;https://www.bleepingcomputer.com/news/security/hackers-can-bypass-npms-shai-hulud-defenses-via-git-dependencies/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Nearly 800,000 Telnet servers exposed to remote attacks&lt;/h3&gt;

Internet security watchdog Shadowserver tracks nearly 800,000 IP addresses with Telnet fingerprints amid ongoing attacks exploiting a critical authentication bypass vulnerability in the GNU InetUtils telnetd server.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/nearly-800-000-telnet-servers-exposed-to-remote-attacks/&quot;&gt;https://www.bleepingcomputer.com/news/security/nearly-800-000-telnet-servers-exposed-to-remote-attacks/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers&lt;/h3&gt;

As recently as this month, Konni has been observed distributing spear-phishing emails containing malicious links that are disguised as harmless advertising URLs associated with Google and Naver's advertising platforms to bypass security filters and deliver a remote access trojan codenamed EndRAT. [..] The email messages have been found to masquerade as financial notices, such as transaction confirmations or wire transfer requests, to trick recipients into downloading ZIP archives hosted on WordPress sites. The ZIP file comes with a Windows shortcut (LNK) that's designed to execute an AutoIt script disguised as a PDF document.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/konni-hackers-deploy-ai-generated.html&quot;&gt;https://thehackernews.com/2026/01/konni-hackers-deploy-ai-generated.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code&lt;/h3&gt;

Cybersecurity researchers have discovered two malicious Microsoft Visual Studio Code (VS Code) extensions that are advertised as artificial intelligence (AI)-powered coding assistants [..] The extensions, which have 1.5 million combined installs and are still available for download from the official Visual Studio Marketplace, are listed below - ChatGPT - *** [..] ChatGPT - ChatMoss
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/malicious-vs-code-ai-extensions-with-15.html&quot;&gt;https://thehackernews.com/2026/01/malicious-vs-code-ai-extensions-with-15.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;BitLocker: Microsoft gibt Schlüssel an Strafverfolger heraus&lt;/h3&gt;

Wer seine Festplatte oder SSD verschlüsselt, darf eigentlich davon ausgehen, dass nur er diese auch wieder entschlüsseln kann. Bei der Verschlüsselungstechnologie BitLocker von Microsoft scheint dies aber nicht unbedingt der Fall zu sein, weil das Unternehmen den Schlüssel in der Home-Edition von Windows automatisch im Online-Account des Nutzers abspeichert.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Microsoft-gibt-BitLocker-Schluessel-an-Strafverfolgungsbehoerden-11152988.html&quot;&gt;https://www.heise.de/news/Microsoft-gibt-BitLocker-Schluessel-an-Strafverfolgungsbehoerden-11152988.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft SharePoint/OneDrive: IDCRL-Authentication endet ab 31. Jan. 2026 - OpenID Connect und OAuth kommt (MC1184649)&lt;/h3&gt;

Microsoft lässt bei den Online-Versionen das IDCRL-Authentication Protocol zum 31. Januar 2026 auslaufen. Die Authentifizierung erfolgt dann über OpenID Connect und OAuth - lässt sich aber noch einige Wochen wieder umstellen. Microsoft hat die Änderung bereits im November 2025 angekündigt, das Ganze aber als Erinnerung nochmals zum 20. Januar 2026 im Microsoft 365 Message Center unter MC1184649 - Microsoft SharePoint: Retirement of IDCRL authentication protocol and enforcement of OpenID Connect and OAuth protocols eingestellt.
&lt;p /&gt;
&lt;A HREF=&quot;https://borncity.com/blog/2026/01/25/microsoft-sharepoint-onedrive-idcrl-authentication-endet-ab-31-jan-2026-openid-connect-und-oauth-kommt-mc1184649/&quot;&gt;https://borncity.com/blog/2026/01/25/microsoft-sharepoint-onedrive-idcrl-authentication-endet-ab-31-jan-2026-openid-connect-und-oauth-kommt-mc1184649/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;$6,000 -Stanley- Toolkit Sold on Russian Forums Fakes Secure URLs in Chrome&lt;/h3&gt;

Varonis researchers discovered that Stanley uses a clever trick of disguising itself as a simple note-taking tool called Notely. Once a person installs it, the app can display a fake login page directly over a real website. [..] What is most concerning for the average user is that this toolkit isn-t just a piece of software but a full-featured service. The most expensive version comes with a guarantee that the malicious app will pass the official security checks of the Chrome Web Store. 
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/stanley-toolkit-russia-forum-fakes-chrome-urls/&quot;&gt;https://hackread.com/stanley-toolkit-russia-forum-fakes-chrome-urls/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;New Fake CAPTCHA Scam Abuses Microsoft Tools to Install Amatera Stealer&lt;/h3&gt;

Blackpoint Cyber discovered a new Fake CAPTCHA campaign that tricks users into installing Amatera Stealer. By abusing legitimate Microsoft scripts and hiding malicious code in Google Calendar and PNG images, this attack bypasses standard security to harvest private passwords and browser data.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/fake-captcha-scam-microsoft-tools-amatera-stealer/&quot;&gt;https://hackread.com/fake-captcha-scam-microsoft-tools-amatera-stealer/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;F5: K000159681: Credential harvesting campaign targeting F5 VPN users&lt;/h3&gt;

On January 13, 2026, researchers identified a large-scale credential harvesting campaign targeting several VPN providers, including F5. The threat actors behind the campaign registered numerous doppelgänger domains designed to mimic legitimate F5 domains. These domains are used to deceive victims into downloading counterfeit BIG-IP VPN client installers. [..] IOCs, C2 servers, and the malicious script hash value
&lt;p /&gt;
&lt;A HREF=&quot;https://my.f5.com/manage/s/article/K000159681&quot;&gt;https://my.f5.com/manage/s/article/K000159681&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Screeps: How a game about programming exposed thousands of players to remote code execution&lt;/h3&gt;

In Screeps (short for &quot;Scripting Creeps&quot;), you cannot click on a unit (&quot;creep&quot;) and tell it what to do. If you place a building on the map, your builders will stand next to it and do nothing. There are no buttons to give your creeps instructions. Instead, you must write code to define their behavior. [..] In Multiplayer Screeps worlds, all of the code to progress the game runs on the server, including the AI for your units. [..] Screeps is on Steam, and the native client reuses the browser code but with no sandboxing. nw.require('child_process').exec('your command here') will get you full command line access to the target machine. [..] It is fixed now, which was the primary goal of my writing this.
&lt;p /&gt;
&lt;A HREF=&quot;https://outsidetheasylum.blog/screeps/&quot;&gt;https://outsidetheasylum.blog/screeps/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;The end of the curl bug-bounty&lt;/h3&gt;

There is no longer a curl bug-bounty program. It officially stops on January 31, 2026. [..] We saw an explosion in AI slop reports combined with a lower quality even in the reports that were not obvious slop - presumably because they too were actually misled by AI but with that fact just hidden better. [..] The never-ending slop submissions take a serious mental toll to manage and sometimes also a long time to debunk.
&lt;p /&gt;
&lt;A HREF=&quot;https://daniel.haxx.se/blog/2026/01/26/the-end-of-the-curl-bug-bounty/&quot;&gt;https://daniel.haxx.se/blog/2026/01/26/the-end-of-the-curl-bug-bounty/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Hands-Free Lockpicking: Critical Vulnerabilities in dormakaba-s Physical Access Control System&lt;/h3&gt;

In this post, Clemens Stockenreitner and Werner Schober of the SEC Consult Vulnerability Lab highlight several critical vulnerabilities found in dormakaba-s physical access control systems based on exos 9300. This access control system originates from the manufacturer's enterprise product line for door and access systems and is predominantly used by large enterprises in Europe, including industrial and service companies, logistics operators, energy providers, and airport operators.
&lt;p /&gt;
&lt;A HREF=&quot;https://sec-consult.com/blog/detail/hands-free-lockpicking-critical-vulnerabilities-in-dormakabas-physical-access-control-system/&quot;&gt;https://sec-consult.com/blog/detail/hands-free-lockpicking-critical-vulnerabilities-in-dormakabas-physical-access-control-system/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security updates for Monday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (gimp, glib2, go-toolset:rhel8, golang, java-17-openjdk, java-21-openjdk, kernel, net-snmp, pcs, and thunderbird), Debian (apache2, imagemagick, incus, inetutils, libuev, openjdk-17, php7.4, python3.9, shapelib, taglib, and zvbi), Fedora (mingw-glib2, mingw-harfbuzz, mingw-libsoup, mingw-openexr, pgadmin4, python3.11, python3.12, python3.9, and wireshark), Gentoo (Asterisk, Commons-BeanUtils, GIMP, inetutils, and Vim, gVim), Mageia (kernel), Oracle (glib2, java-17-openjdk, java-21-openjdk, and libpng), Red Hat (java-17-openjdk, java-21-openjdk, kernel, and kernel-rt), SUSE (azure-cli-core, bind, buildah, chromium, coredns, glib2, harfbuzz, kernel, kernel-firmware, libheif, libvirt, openCryptoki, openvswitch, podman, python, python-urllib3, rabbitmq-server, and vlang), and Ubuntu (cjson).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1055958/&quot;&gt;https://lwn.net/Articles/1055958/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Beckhoff Security Advisory 2025-003: Vulnerabilities in Beckhoff Device Manager&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2025-003.pdf&quot;&gt;https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2025-003.pdf&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-26T18:59:21Z</dc:date></entry><entry><title>Tageszusammenfassung - 23.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-23012026"/><author><name>CERT.at</name></author><updated>2026-01-23T18:25:27Z</updated><published>2026-01-23T18:25:27Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Donnerstag 22-01-2026 18:00 - Freitag 23-01-2026 18:00
Handler:     Guenes Holler
Co-Handler:  Michael Schlagenhaufer


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Analysis of Single Sign On (SSO) abuse on FortiOS&lt;/h3&gt;

Fortinet product security has identified the issue, and the company is working on a fix to remediate this occurrence. An advisory will be issued as the fix scope and timeline is available. It is important to note that while, at this time, only exploitation of FortiCloud SSO has been observed, this issue is applicable to all SAML SSO implementations. In the meantime, Fortinet recommends taking the mitigating actions described below.
&lt;p /&gt;
&lt;A HREF=&quot;https://feeds.fortinet.com/~/941387753/0/fortinet/blogs~Analysis-of-Single-Sign-On-SSO-abuse-on-FortiOS&quot;&gt;https://feeds.fortinet.com/~/941387753/0/fortinet/blogs~Analysis-of-Single-Sign-On-SSO-abuse-on-FortiOS&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Okta SSO accounts targeted in vishing-based data theft attacks&lt;/h3&gt;

Okta is warning about custom phishing kits built specifically for voice-based social engineering (vishing) attacks. BleepingComputer has learned that these kits are being used in active attacks to steal Okta SSO credentials for data theft.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/okta-sso-accounts-targeted-in-vishing-based-data-theft-attacks/&quot;&gt;https://www.bleepingcomputer.com/news/security/okta-sso-accounts-targeted-in-vishing-based-data-theft-attacks/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Datenlecks analysiert: Solche Passwörter sollten Nutzer besser meiden&lt;/h3&gt;

Forscher haben rund sechs Milliarden Passwörter aus mehreren Datenlecks untersucht. Ihr Bericht zeigt Muster auf, die besonders häufig vorkommen. 
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/datenlecks-analysiert-solche-passwoerter-sollten-nutzer-besser-meiden-2601-204548.html&quot;&gt;https://www.golem.de/news/datenlecks-analysiert-solche-passwoerter-sollten-nutzer-besser-meiden-2601-204548.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access&lt;/h3&gt;

Cybersecurity researchers have disclosed details of a new dual-vector campaign that leverages stolen credentials to deploy legitimate Remote Monitoring and Management (RMM) software for persistent remote access to compromised hosts. [..] The attack unfolds in two distinct waves, where the threat actors leverage fake invitation notifications to steal victim credentials, and then leverage those pilfered credentials to deploy RMM tools to establish persistent access.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/phishing-attack-uses-stolen-credentials.html&quot;&gt;https://thehackernews.com/2026/01/phishing-attack-uses-stolen-credentials.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Crims compromised energy firms Microsoft accounts, sent 600 phishing emails&lt;/h3&gt;

Unknown attackers are abusing Microsoft SharePoint file-sharing services to target multiple energy-sector organizations, harvest user credentials, take over corporate inboxes, and then send hundreds of phishing emails from compromised accounts to contacts inside and outside those organizations. The attackers likely used previously-compromised email addresses to gain initial access to &quot;multiple&quot; energy-sector organizations targeted in this campaign, according to Redmond, which detailed the digital intrusions in a Wednesday report. 
&lt;p /&gt;
&lt;A HREF=&quot;https://go.theregister.com/feed/www.theregister.com/2026/01/22/crims_compromised_energy_firms_microsoft/&quot;&gt;https://go.theregister.com/feed/www.theregister.com/2026/01/22/crims_compromised_energy_firms_microsoft/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;149 Million Usernames and Passwords Exposed by Unsecured Database&lt;/h3&gt;

This -dream wish list for criminals- includes millions of Gmail, Facebook, banking logins, and more. The researcher who discovered it suspects they were collected using infostealing malware.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.wired.com/story/149-million-stolen-usernames-passwords/&quot;&gt;https://www.wired.com/story/149-million-stolen-usernames-passwords/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;URL fritz.box leitet seit 22.1.2026 auf 91.195.240.12 um&lt;/h3&gt;

Die von der früheren AVM, heute FRITZ, erworbene Domain fritz.box ist wohl wieder auf &quot;Abwegen&quot;. [..] Die Whois-Daten zeigen, dass heute (22.1.2026) die Domain-Registrierung abgelaufen ist.
&lt;p /&gt;
&lt;A HREF=&quot;https://borncity.com/blog/2026/01/22/url-fritz-box-leitet-seit-22-1-2026-auf-91-195-240-12-um/&quot;&gt;https://borncity.com/blog/2026/01/22/url-fritz-box-leitet-seit-22-1-2026-auf-91-195-240-12-um/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;KI und Security: Zero-Day-Exploits durch KI sind bereits Realität&lt;/h3&gt;

Eine Studie zeigt: KIs können komplexe Zero-Day-Exploits erstellen. Die Folge: Die Suche nach Sicherheitslücken wird erfolgreich industrialisiert und skaliert.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11151838&quot;&gt;https://heise.de/-11151838&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Exploit Cursor Agents to create persistent, distributed threats&lt;/h3&gt;

Yesterday a VSCode exploit was written up. When a programmer simply opens a folder that contains a malicious tasks.json file, the malicious code will silently run from inside the editor itself - where all their work lives. That got me thinking: could I use this to re-program a developer's AI agents and get them to do what I want? Even worse - could I do this to all their code repositories? Turns out: hell yes.
&lt;p /&gt;
&lt;A HREF=&quot;https://ike.io/open-a-folder-all-your-agents-are-mine/&quot;&gt;https://ike.io/open-a-folder-all-your-agents-are-mine/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Security updates for Friday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (kernel), Debian (bind9, chromium, osslsigncode, and python-urllib3), Fedora (freerdp, ghostscript, hcloud, rclone, rust-rkyv0.7, rust-rkyv_derive0.7, and vsftpd), Mageia (avahi and harfbuzz), SUSE (alloy, avahi, busybox, cargo-c, corepack22, corepack24, curl, docker, dpdk, exiv2-0_26, ffmpeg-4, firefox, glib2, go1.24, go1.25, gpg2, haproxy, kernel, kernel-firmware, keylime, libpng16, librsvg, libsodium, libsoup, libsoup2, libtasn1, log4j, net-snmp, open-vm-tools, openldap2_5, ovmf, pgadmin4, php7, podman, python-filelock, python-marshmallow, python-pyasn1, python-tornado, python-urllib3, python-virtualenv, python3, python311-pyasn1, python311-weasyprint, rust1.91, rust1.92, util-linux, webkit2gtk3, and wireshark), and Ubuntu (libxml2 and pyasn1).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1055671/&quot;&gt;https://lwn.net/Articles/1055671/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Videokonferenzsoftware: Zoom Node möglicher Ansatzpunkt für Schadcode-Attacken&lt;/h3&gt;

 In einer Warnmeldung führen die Entwickler aus, dass die nun geschlossene Sicherheitslücke (CVE-2026-22844) mit dem Bedrohungsgrad -kritisch- eingestuft ist. Die Schwachstelle betrifft konkret die Komponente Multimedia Routers (MMRs). Damit eine Attacke gelingt, muss ein Angreifer Teilnehmer eines Meetings sein. Ist das gegeben, kann er auf einem nicht näher beschriebenen Weg Schadcode ausführen.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11151434&quot;&gt;https://heise.de/-11151434&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Rockwell Automation CompactLogix 5370&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-03&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-03&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Schneider Electric EcoStruxure Process Expert&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-01&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-01&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;EVMAPA&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-08&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-08&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Weintek cMT X Series HMI EasyWeb Service&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-05&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-05&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Delta Electronics DIAView&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-07&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-07&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-04&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-04&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;AutomationDirect CLICK Programmable Logic Controller&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-02&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-02&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hubitat Elevation Hubs&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-06&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-06&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-23T18:25:27Z</dc:date></entry><entry><title>Tageszusammenfassung - 22.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-22012026"/><author><name>CERT.at</name></author><updated>2026-01-22T18:11:51Z</updated><published>2026-01-22T18:11:51Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Mittwoch 21-01-2026 18:00 - Donnerstag 22-01-2026 18:00
Handler:     Michael Schlagenhaufer
Co-Handler:  Guenes Holler


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;A patch for the NIS2 Directive&lt;/h3&gt;

On January 20th, 2026 the EU Commission presented a package of legislative proposals, including an update to the NIS2 directive.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cert.at/en/blog/2026/1/a-patch-for-the-nis2-directive&quot;&gt;https://www.cert.at/en/blog/2026/1/a-patch-for-the-nis2-directive&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Look at FortiCloud SSO Bypass Exploitation (CVE-2025-59718/59719)&lt;/h3&gt;

In December last year, Fortinet disclosed [1] a vulnerability in SAML processing, which allowed full bypass of authentication to management interfaces with FortiCloud SSO enabled. According to new, still not officially confirmed reports, the vulnerability may not have been fully patched [10]. As affected devices are represented in my small high-interactive honeypots network, we have an opportunity to take a look at what the attackers do.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cert.at/en/blog/2026/1/look-at-forticloud-sso-bypass-exploitation&quot;&gt;https://www.cert.at/en/blog/2026/1/look-at-forticloud-sso-bypass-exploitation&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;New Android malware uses AI to click on hidden browser ads&lt;/h3&gt;

A new family of Android click-fraud trojans leverages TensorFlow machine learning models to automatically detect and interact with specific advertisement elements.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/new-android-malware-uses-ai-to-click-on-hidden-browser-ads/&quot;&gt;https://www.bleepingcomputer.com/news/security/new-android-malware-uses-ai-to-click-on-hidden-browser-ads/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Chainlit AI framework bugs let hackers breach cloud environments&lt;/h3&gt;

Two high-severity vulnerabilities in Chainlit, a popular open-source framework for building conversational AI applications, allow reading any file on the server and leaking sensitive information.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/chainlit-ai-framework-bugs-let-hackers-breach-cloud-environments/&quot;&gt;https://www.bleepingcomputer.com/news/security/chainlit-ai-framework-bugs-let-hackers-breach-cloud-environments/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Is AI-Generated Code Secure?, (Thu, Jan 22nd)&lt;/h3&gt;

The title of this diary is perhaps a bit catchy but the question is important. I don-t consider myself as a good developer. That-s not my day job and I-m writing code to improve my daily tasks. I like to say -I-m writing sh*ty code! It works for me, no warranty that it will for for you-. Today, most of my code (the skeleton of the program) is generated by AI, probably like most of you.
&lt;p /&gt;
&lt;A HREF=&quot;https://isc.sans.edu/diary/rss/32648&quot;&gt;https://isc.sans.edu/diary/rss/32648&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts&lt;/h3&gt;

A new malicious package discovered in the Python Package Index (PyPI) has been found to impersonate a popular library for symbolic mathematics to deploy malicious payloads, including a cryptocurrency miner, on Linux hosts.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/malicious-pypi-package-impersonates.html&quot;&gt;https://thehackernews.com/2026/01/malicious-pypi-package-impersonates.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Preparing for the EU Cyber Resilience Act (CRA)&lt;/h3&gt;

Product security has matured significantly over the last decade. Secure defaults, defined ownership of security risk, reliable update mechanisms, and structured vulnerability handling are now mainstream and well understood by experienced engineering and security teams. These practices are no longer aspirational. They are now the minimum required to build and operate digital products responsibly.  
&lt;p /&gt;
&lt;A HREF=&quot;https://www.pentestpartners.com/security-blog/preparing-for-the-eu-cyber-resilience-act-cra/&quot;&gt;https://www.pentestpartners.com/security-blog/preparing-for-the-eu-cyber-resilience-act-cra/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Phishing-Falle: Verlust des Zugriffs auf ChatGPT&lt;/h3&gt;

Eine aktuell kursierende Phishing-Mail warnt vor einer Kündigung des ChatGPT-Kontos. Schuld sei eine ausgebliebene Zahlung. Das Problem ließe sich aber mit einer Aktualisierung der notwendigen Daten aus der Welt schaffen. Wer dem entsprechenden Pfad folgt, übermittelt den Kriminellen allerdings Kreditkarten- und Kontaktinformationen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/phishing-falle-chatgpt/&quot;&gt;https://www.watchlist-internet.at/news/phishing-falle-chatgpt/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;European Space Agency-s cybersecurity in freefall as yet another breach exposes spacecraft and mission data&lt;/h3&gt;

It has just been a few weeks since reports emerged of the Christmas cyber attack suffered by the European Space Agency (ESA), and the situation has already become worse.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bitdefender.com/en-us/blog/hotforsecurity/european-space-agencys-cybersecurity-in-freefall-as-yet-another-breach-exposes-spacecraft-and-mission-data&quot;&gt;https://www.bitdefender.com/en-us/blog/hotforsecurity/european-space-agencys-cybersecurity-in-freefall-as-yet-another-breach-exposes-spacecraft-and-mission-data&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time&lt;/h3&gt;

Imagine visiting a webpage that looks perfectly safe. It has no malicious code, no suspicious links. Yet, within seconds, it transforms into a personalized phishing page.
&lt;p /&gt;
&lt;A HREF=&quot;https://unit42.paloaltonetworks.com/real-time-malicious-javascript-through-llms/&quot;&gt;https://unit42.paloaltonetworks.com/real-time-malicious-javascript-through-llms/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Osiris: New Ransomware, Experienced Attackers?&lt;/h3&gt;

Poortry driver and modified Rustdesk tool used in recent attack campaign, which bears similarities to previous Inc ransomware attacks.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.security.com/threat-intelligence/new-ransomware-osiris&quot;&gt;https://www.security.com/threat-intelligence/new-ransomware-osiris&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Watering Hole Attack Targets EmEditor Users with Information-Stealing Malware&lt;/h3&gt;

TrendAI- Research provides a technical analysis of a compromised EmEditor installer used to deliver multistage malware that performs a range of malicious actions. 
&lt;p /&gt;
&lt;A HREF=&quot;https://www.trendmicro.com/en_us/research/26/a/watering-hole-attack-targets-emeditor-users.html&quot;&gt;https://www.trendmicro.com/en_us/research/26/a/watering-hole-attack-targets-emeditor-users.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cyber Is What We Make of It&lt;/h3&gt;

Cyber Is What We Make of It &quot;Its not what happens to you, but how you react to it that matters.&quot; - EpictetusNot long ago an Atlantic Council op-ed in CyberScoop outlined ten key reforms to close Americas cybersecurity gaps. The recommendations are sensible: migrate to memory-safe languages, apply formal verification to critical systems, establish zero trust architectures, build data resilience, conduct proactive threat hunting. Laudable, uncontroversial, and comprehensive;
&lt;p /&gt;
&lt;A HREF=&quot;https://buttondown.com/grugq/archive/cyber-is-what-we-make-of-it/&quot;&gt;https://buttondown.com/grugq/archive/cyber-is-what-we-make-of-it/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;SmarterMail Auth Bypass Exploited in the Wild Two Days After Patch Release&lt;/h3&gt;

A new security flaw in SmarterTools SmarterMail email software has come under active exploitation in the wild, two days after the release of a patch.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/smartermail-auth-bypass-exploited-in.html&quot;&gt;https://thehackernews.com/2026/01/smartermail-auth-bypass-exploited-in.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security updates for Thursday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (gpsd), Debian (inetutils and modsecurity-crs), Fedora (cpp-httplib, curl, mariadb11.8, mingw-libtasn1, mingw-libxslt, mingw-python3, rclone, and rpki-client), Oracle (gimp, glib2, go-toolset:rhel8, golang, kernel, mariadb-devel:10.3, and thunderbird), Red Hat (buildah, go-toolset:rhel8, golang, grafana, kernel, kernel-rt, multiple packages, openssl, osbuild-composer, podman, and skopeo), Slackware (bind), SUSE (ffmpeg-4, libsodium, libvirt, net-snmp, open-vm-tools, ovmf, postgresql17, postgresql18, python-FontTools, python-weasyprint, and webkit2gtk3), and Ubuntu (glib2.0 and opencc). 
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1055484/&quot;&gt;https://lwn.net/Articles/1055484/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Jetzt handeln! Angreifer umgehen offenbar Fortinet-Sicherheitspatch&lt;/h3&gt;

Medienberichten zufolge ist ein Sicherheitspatch für diverse Fortinet-Produkte defekt. Admins können Instanzen aber trotzdem schützen. 
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11149777&quot;&gt;https://heise.de/-11149777&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Updaten! Angriffsversuche auf Sicherheitslücken in Cisco Unified Communications&lt;/h3&gt;

In mehreren Unified-Communications-Produkten von Cisco klafft eine Sicherheitslücke, die Angreifern ohne Anmeldung das Einschleusen von Schadcode aus dem Netz und dessen Ausführung mit Root-Rechten ermöglicht. Admins sollten die bereitstehenden Aktualisierungen zügig anwenden, da Cisco bereits Angriffsversuche aus dem Netz auf die Schwachstelle beobachtet hat.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11149877&quot;&gt;https://heise.de/-11149877&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Dell Data Protection Advisor über unzählige Sicherheitslücken angreifbar&lt;/h3&gt;

Dell schließt teilweise sechzehn Jahre alte Schwachstellen in Data Protection Advisor, über die Angreifer Systeme kompromittieren können. 
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11150421&quot;&gt;https://heise.de/-11150421&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;SSA-864900 V1.6 (Last Update: 2026-01-22): Multiple Vulnerabilities in Fortigate NGFW on RUGGEDCOM APE1808 Devices&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://cert-portal.siemens.com/productcert/html/ssa-864900.html&quot;&gt;https://cert-portal.siemens.com/productcert/html/ssa-864900.html&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-22T18:11:51Z</dc:date></entry><entry><title>Tageszusammenfassung - 21.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-21012026"/><author><name>CERT.at</name></author><updated>2026-01-21T18:41:58Z</updated><published>2026-01-21T18:41:58Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Dienstag 20-01-2026 18:00 - Mittwoch 21-01-2026 18:00
Handler:     Michael Schlagenhaufer
Co-Handler:  Guenes Holler


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;EU plans cybersecurity overhaul to block foreign high-risk suppliers&lt;/h3&gt;

The European Commission has proposed new cybersecurity legislation mandating the removal of high-risk suppliers to secure telecommunications networks and strengthening defenses against state-backed and cybercrime groups targeting critical infrastructure.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/eu-plans-cybersecurity-overhaul-to-block-foreign-high-risk-suppliers/&quot;&gt;https://www.bleepingcomputer.com/news/security/eu-plans-cybersecurity-overhaul-to-block-foreign-high-risk-suppliers/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;VoidLink cloud malware shows clear signs of being AI-generated&lt;/h3&gt;

The recently discovered cloud-focused VoidLink malware framework is believed to have been developed by a single person with the help of an artificial intelligence model.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/voidlink-cloud-malware-shows-clear-signs-of-being-ai-generated/&quot;&gt;https://www.bleepingcomputer.com/news/security/voidlink-cloud-malware-shows-clear-signs-of-being-ai-generated/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hackers exploit security testing apps to breach Fortune 500 firms&lt;/h3&gt;

Threat actors are exploiting misconfigured web applications used for security training and internal penetration testing, such as DVWA, OWASP Juice Shop, Hackazon, and bWAPP, to gain access to cloud environments of Fortune 500 companies and security vendors.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/hackers-exploit-security-testing-apps-to-breach-fortune-500-firms/&quot;&gt;https://www.bleepingcomputer.com/news/security/hackers-exploit-security-testing-apps-to-breach-fortune-500-firms/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Mass Spam Attacks Leverage Zendesk Instances&lt;/h3&gt;

The CRM vendor advised ignoring or deleting suspicious emails and said the attacks were not tied to any breach or software vulnerability.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.darkreading.com/threat-intelligence/mass-spam-attacks-zendesk-instances&quot;&gt;https://www.darkreading.com/threat-intelligence/mass-spam-attacks-zendesk-instances&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Jetzt abschalten: Zehn Jahre alte Telnetd-Lücke macht jeden Client zum Root&lt;/h3&gt;

Seit 2015 kann sich über Telnetd jeder Client einen Root-Zugriff verschaffen. Einen Patch gibt es zwar, empfohlen wird jedoch die Abschaltung.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/jetzt-abschalten-zehn-jahre-alte-telnetd-luecke-macht-jeden-client-zum-root-2601-204433.html&quot;&gt;https://www.golem.de/news/jetzt-abschalten-zehn-jahre-alte-telnetd-luecke-macht-jeden-client-zum-root-2601-204433.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;LastPass Warns of Fake Maintenance Messages Targeting Users- Master Passwords&lt;/h3&gt;

LastPass is alerting users to a new active phishing campaign that's impersonating the password management service, which aims to trick users into giving up their master passwords.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/lastpass-warns-of-fake-maintenance.html&quot;&gt;https://thehackernews.com/2026/01/lastpass-warns-of-fake-maintenance.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Curl shutters bug bounty program to remove incentive for submitting AI slop&lt;/h3&gt;

The maintainer of popular open-source data transfer tool cURL has ended the project-s bug bounty program after maintainers struggled to assess a flood of AI-generated contributions.
&lt;p /&gt;
&lt;A HREF=&quot;https://go.theregister.com/feed/www.theregister.com/2026/01/21/curl_ends_bug_bounty/&quot;&gt;https://go.theregister.com/feed/www.theregister.com/2026/01/21/curl_ends_bug_bounty/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Einschränkung der Anzeigenauslieferung auf Facebook? Unternehmens-Profile im Visier von Kriminellen&lt;/h3&gt;

Mit vermeintlich vom Meta-Konzern stammenden E-Mails versuchen Betrüger:innen, sich Zugang zu Unternehmens-Accounts zu erschleichen. Dafür haben sie eine gefälschte Login-Seite gebaut. Wie läuft die Masche konkret ab? Woran ist die Betrugsabsicht zu erkennen? Dieser Artikel liefert Antworten.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/einschraenkung-der-anzeigenauslieferung-facebook/&quot;&gt;https://www.watchlist-internet.at/news/einschraenkung-der-anzeigenauslieferung-facebook/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;DNS OverDoS: Are Private Endpoints Too Private?&lt;/h3&gt;

We discovered an aspect of Azure-s Private Endpoint architecture that could expose Azure resources to denial of service (DoS) attacks. In this article, we explore how both intentional and inadvertent acts could result in limited access to Azure resources through the Azure Private Link mechanism. We uncovered this issue while investigating irregular behavior in Azure test environments.
&lt;p /&gt;
&lt;A HREF=&quot;https://unit42.paloaltonetworks.com/dos-attacks-and-azure-private-endpoint/&quot;&gt;https://unit42.paloaltonetworks.com/dos-attacks-and-azure-private-endpoint/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;IT-Sicherheit: Roter Draht zwischen Peking und London&lt;/h3&gt;

Ein neues, geheimes Forum soll die Kommunikation zwischen britischen und chinesischen Diensten verbessern. Es könnte das erste seiner Art sein. 
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11148209&quot;&gt;https://heise.de/-11148209&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Introducing &gt; PowerShell.Exposed&lt;/h3&gt;

PowerShell (PS) isn-t just a -Windows admin tool.- Once shell access is established, this is the cheapest and most powerful hands-on-keyboard control an attacker can have.
&lt;p /&gt;
&lt;A HREF=&quot;https://detect.fyi/introducing-powershell-exposed-4974fe712117?source=rssd5fd8f494f6a4&quot;&gt;https://detect.fyi/introducing-powershell-exposed-4974fe712117?source=rssd5fd8f494f6a4&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;New EU Vulnerability Platform GCVE Goes Live, Reducing Reliance on Global Systems&lt;/h3&gt;

Europe-s long-running conversation about digital autonomy quietly crossed a milestone with the launch of a new public vulnerability platform. The EU Vulnerability Database, created under the GCVE initiative, is now live. This signals a deliberate shift in how software weaknesses are identified, cataloged, and shared across Europe.  
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/eu-launches-gcve-vulnerability-database/&quot;&gt;https://thecyberexpress.com/eu-launches-gcve-vulnerability-database/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Critical Vulnerability in Advanced Custom Fields: Extended Plugin Puts 100,000 WordPress Sites at Risk&lt;/h3&gt;

A critical security flaw has been discovered in a widely used ACF add-on plugin for WordPress, placing up to 100,000 websites at risk of a full site takeover. The vulnerability affects the Advanced Custom Fields: Extended plugin, an add-on designed to extend the functionality of the popular Advanced Custom Fields ecosystem. An advisory issued about the flaw assigns a severity rating of 9.8, emphasizing the serious impact it can have if exploited. 
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/acf-add-on-vulnerability-wordpress/&quot;&gt;https://thecyberexpress.com/acf-add-on-vulnerability-wordpress/&lt;/a&gt;

&lt;hr&gt;


&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Aktuelle Angriffswelle gegen CVE-2025-59718, Patches unzureichend&lt;/h3&gt;

Im Dezember des vergangenen Jahres hat Fortinet Informationen über einen Login Bypass in mehreren Produkten des Unternehmens veröffentlicht (siehe dazu auch unser Warning vom 19.12.2025) und gleichzeitig Patches zur Verfügung gestellt welche das Problem beheben sollten.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cert.at/de/aktuelles/2026/1/aktuelle-angriffswelle-gegen-cve-2025-59718-patch-unzureichend&quot;&gt;https://www.cert.at/de/aktuelles/2026/1/aktuelle-angriffswelle-gegen-cve-2025-59718-patch-unzureichend&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;GitLab Patch Release: 18.8.2, 18.7.2, 18.6.4&lt;/h3&gt;

Learn more about GitLab Patch Release: 18.8.2, 18.7.2, 18.6.4 for GitLab Community Edition (CE) and Enterprise Edition (EE). 
&lt;p /&gt;
&lt;A HREF=&quot;https://about.gitlab.com/releases/2026/01/21/patch-release-gitlab-18-8-2-released/#cve-2026-0723unchecked-return-value-issue-in-authentication-services-impacts-gitlab-ceee&quot;&gt;https://about.gitlab.com/releases/2026/01/21/patch-release-gitlab-18-8-2-released/#cve-2026-0723unchecked-return-value-issue-in-authentication-services-impacts-gitlab-ceee&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Sicherheitslücken: Nvidia CUDA Toolkit lässt Schadcode passieren&lt;/h3&gt;

Nvidias Programmierschnittstelle CUDA weist Sicherheitslücken auf, wodurch unter anderem Schadcode auf Systeme gelangen kann. Davon sind je nach Sicherheitslücke Linux und Windows bedroht. Eine reparierte Ausgabe von CUDA Toolkit schafft Abhilfe.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Sicherheitsluecken-Nvidia-CUDA-Toolkit-laesst-Schadcode-passieren-11148301.html&quot;&gt;https://www.heise.de/news/Sicherheitsluecken-Nvidia-CUDA-Toolkit-laesst-Schadcode-passieren-11148301.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Sicherheitspatches: Atlassian sichert Confluence &amp; Co. gegen mögliche Attacken&lt;/h3&gt;

Atlassian hat für Bamboo, Bitbucket, Confluence, Crowd, Jira und Jira Service Management Data Center und Server wichtige Sicherheitsupdates veröffentlicht. Nach erfolgreichen Attacken können Angreifer in erster Linie DoS-Zustände und somit Abstürze auslösen. 
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Sicherheitspatches-Atlassian-sichert-Confluence-Co-gegen-moegliche-Attacken-11149011.html&quot;&gt;https://www.heise.de/news/Sicherheitspatches-Atlassian-sichert-Confluence-Co-gegen-moegliche-Attacken-11149011.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security updates for Wednesday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (brotli and container-tools:rhel8), Debian (python-keystonemiddleware and python3.9), Fedora (cef, freerdp, golang-github-tetratelabs-wazero, and libpcap), Oracle (brotli, gpsd, kernel, and transfig), Red Hat (freerdp, golang, java-11-openjdk with Extended Lifecycle Support, libpng, libssh, mingw-libpng, and runc), SUSE (abseil-cpp, alloy, apache2, bind, cpp-httplib, curl, erlang, firefox, gpg2, grafana, haproxy, hauler, hawk2, libblkid-devel, libpng16, libraylib550, python-keystonemiddleware-doc, python-uv, python-weasyprint, squid, and tomcat), and Ubuntu (crawl and iperf3).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1055322/&quot;&gt;https://lwn.net/Articles/1055322/&lt;/a&gt;

&lt;hr&gt;
&lt;h3&gt;VU#458022: Open5GS WebUI uses a hard-coded secrets including JSON Web Token signing key&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://kb.cert.org/vuls/id/458022&quot;&gt;https://kb.cert.org/vuls/id/458022&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;VU#102648: Code Injection Vulnerability in binary-parser library&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://kb.cert.org/vuls/id/102648&quot;&gt;https://kb.cert.org/vuls/id/102648&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;VU#481830: libheif Uncompressed Codec Lacks Bounds Check Leading to Application Crash&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://kb.cert.org/vuls/id/481830&quot;&gt;https://kb.cert.org/vuls/id/481830&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Oracle Critical Patch Update Advisory - January 2026&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.oracle.com/security-alerts/cpujan2026.html&quot;&gt;https://www.oracle.com/security-alerts/cpujan2026.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cisco Unified Communications Products Remote Code Execution Vulnerability&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b&quot;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Schneider Electric EcoStruxure Foxboro DCS&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-020-01&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-020-01&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Rockwell Automation Verve Asset Manager&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-020-03&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-020-03&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Schneider Electric devices using CODESYS Runtime&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-020-02&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-020-02&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-21T18:41:58Z</dc:date></entry><entry><title>Tageszusammenfassung - 20.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-20012026"/><author><name>CERT.at</name></author><updated>2026-01-20T18:31:21Z</updated><published>2026-01-20T18:31:21Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Montag 19-01-2026 18:00 - Dienstag 20-01-2026 18:00
Handler:     Guenes Holler
Co-Handler:  Michael Schlagenhaufer


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites&lt;/h3&gt;

Cybersecurity researchers have disclosed details of a security flaw that leverages indirect prompt injection targeting Google Gemini as a way to bypass authorization guardrails and use Google Calendar as a data extraction mechanism.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/google-gemini-prompt-injection-flaw.html&quot;&gt;https://thehackernews.com/2026/01/google-gemini-prompt-injection-flaw.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers&lt;/h3&gt;

Cloudflare has addressed a security vulnerability impacting its Automatic Certificate Management Environment (ACME) validation logic that made it possible to bypass security controls and access origin servers. [..] The web infrastructure company said it found no evidence that the vulnerability was ever exploited in a malicious context. [..] The vulnerability was addressed by Cloudflare on October 27, 2025, with a code change that serves the response and disables WAF features only when the request matches a valid ACME HTTP-01 challenge token for that hostname.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/cloudflare-fixes-acme-validation-bug.html&quot;&gt;https://thehackernews.com/2026/01/cloudflare-fixes-acme-validation-bug.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading&lt;/h3&gt;

Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads, likely with the intent to deploy a remote access trojan (RAT).
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/hackers-use-linkedin-messages-to-spread.html&quot;&gt;https://thehackernews.com/2026/01/hackers-use-linkedin-messages-to-spread.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;EU-Kommission arbeitet an Open-Source-Strategie und fragt Community nach Feedback&lt;/h3&gt;

Einzelpersonen und Gruppen haben bis zum 3. Februar Zeit, um Hinweise einzureichen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.derstandard.at/story/3000000304870/eu-kommission-arbeitet-an-open-source-strategie-und-fragt-community-nach-feedback&quot;&gt;https://www.derstandard.at/story/3000000304870/eu-kommission-arbeitet-an-open-source-strategie-und-fragt-community-nach-feedback&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft &amp; Anthropic MCP Servers At Risk of RCE, Cloud Takeovers&lt;/h3&gt;

Researchers found the popular model context protocol (MCP) servers, which are integral components of AI services, carry serious vulnerabilities. [..] When they analyzed more than 7,000 MCP servers, they found that the same SSRF exposure might be latent in around 36.7% of all MCP servers on the Web today. [..] The company reported its findings to Anthropic last June. Half a year later, in December, Anthropic released the 2025.12.18 version of the Git MCP server, which better enforced path validation (in response to CVE-2025-68145), addressed argument handling (CVE-2025-68144), and completely removed the git_init tool (CVE-2025-68143).
&lt;p /&gt;
&lt;A HREF=&quot;https://www.darkreading.com/application-security/microsoft-anthropic-mcp-servers-risk-takeovers&quot;&gt;https://www.darkreading.com/application-security/microsoft-anthropic-mcp-servers-risk-takeovers&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Inside a Multi-Stage Windows Malware Campaign&lt;/h3&gt;

The attack begins with social engineering lures delivered via business-themed documents crafted to appear routine and benign. These documents and accompanying scripts serve as visual distractions, diverting victims to fake tasks or status messages while malicious activity runs silently in the background.
&lt;p /&gt;
&lt;A HREF=&quot;https://feeds.fortinet.com/~/940900697/0/fortinet/blogs~Inside-a-MultiStage-Windows-Malware-Campaign&quot;&gt;https://feeds.fortinet.com/~/940900697/0/fortinet/blogs~Inside-a-MultiStage-Windows-Malware-Campaign&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Sicherheitslücke bei TP-Link: Überwachungskameras per Passwort-Reset knackbar&lt;/h3&gt;

Der Netzwerkgerätehersteller TP-Link warnt vor einer gefährlichen Sicherheitslücke in seinen Vigi-Überwachungskameras. [..] Laut Schwachstellenbeschreibung basiert die Lücke auf einem Bug in der Passwortwiederherstellungsfunktion der Webschnittstelle betroffener Kameras. [..] Angreifer können mittels CVE-2026-0629 das Admin-Passwort zurücksetzen, ohne dass eine Überprüfung erfolgt. [..] Angreifer brauchen für die Ausnutzung von CVE-2026-0629 zwar einen Zugriff auf das lokale Netzwerk, mit dem die anvisierte Kamera verbunden ist.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/tp-link-admin-konten-zahlloser-ueberwachungskameras-knackbar-2601-204385.html&quot;&gt;https://www.golem.de/news/tp-link-admin-konten-zahlloser-ueberwachungskameras-knackbar-2601-204385.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security updates for Tuesday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (gpsd-minimal, jmc, kernel, kernel-rt, and net-snmp), Debian (apache-log4j2 and dcmtk), Fedora (exim, gpsd, mysql8.0, mysql8.4, python-biopython, and rust-lru), Mageia (firefox, nss and thunderbird), Oracle (container-tools:rhel8, gpsd-minimal, jmc, kernel, net-snmp, and uek-kernel), Red Hat (net-snmp), SUSE (chromium, go, harfbuzz-devel, kernel, libsoup, rust1.91, rust1.92, and thunderbird), and Ubuntu (apache2, avahi, and python-urllib3).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1055152/&quot;&gt;https://lwn.net/Articles/1055152/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;VU#244846: Server-Side Template Injection (SSTI) vulnerability exist in Genshi&lt;/h3&gt;

A Server-Side Template Injection (SSTI) vulnerability exists in the Genshi template engine due to unsafe evaluation of template expressions. [..] Genshi is a Python library developed by Edgewall, it provides an integrated set of components for parsing, generating, and processing HTML, XML, or other textual content for output generation on the web. [..] If an attacker can influence or inject template expressions, this vulnerability allows arbitrary code execution with the privileges of the running application. [..] At the time of publication, Genshi has not released an update addressing this issue.
&lt;p /&gt;
&lt;A HREF=&quot;https://kb.cert.org/vuls/id/244846&quot;&gt;https://kb.cert.org/vuls/id/244846&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;VU#271649: Stack-based buffer overflow in libtasn1 versions v4.20.0 and earlier&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://kb.cert.org/vuls/id/271649&quot;&gt;https://kb.cert.org/vuls/id/271649&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Beckhoff Security Advisory 2025-002&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2025-002.pdf&quot;&gt;https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2025-002.pdf&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-20T18:31:21Z</dc:date></entry><entry><title>Tageszusammenfassung - 19.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-19012026"/><author><name>CERT.at</name></author><updated>2026-01-19T18:20:51Z</updated><published>2026-01-19T18:20:51Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Freitag 16-01-2026 18:00 - Montag 19-01-2026 18:00
Handler:     Michael Schlagenhaufer
Co-Handler:  Guenes Holler


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;StealC hackers hacked as researchers hijack malware control panels&lt;/h3&gt;

A cross-site scripting (XSS) flaw in the web-based control panel used by operators of the StealC info-stealing malware allowed researchers to observe active sessions and gather intelligence on the attackers- hardware.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/stealc-hackers-hacked-as-researchers-hijack-malware-control-panels/&quot;&gt;https://www.bleepingcomputer.com/news/security/stealc-hackers-hacked-as-researchers-hijack-malware-control-panels/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Autotype: Windows-11-Update macht beliebte Keepass-Funktion kaputt&lt;/h3&gt;

Seit dem Januar-Patchday kann Keepass in einigen Windows-Dialogen keine Zugangsdaten mehr per Autotype einfügen. Ein Fix ist nicht zu erwarten.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/autotype-windows-11-update-macht-beliebte-keepass-funktion-kaputt-2601-204337.html&quot;&gt;https://www.golem.de/news/autotype-windows-11-update-macht-beliebte-keepass-funktion-kaputt-2601-204337.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;What Happened After Security Researchers Found 60 Flock Cameras Livestreaming to the Internet&lt;/h3&gt;

A couple months ago, YouTuber Benn Jordan &quot;found vulnerabilities in some of Flock's license plate reader cameras,&quot; reports 404 Media's Jason Koebler. &quot;He reached out to me to tell me he had learned that some of Flock's Condor cameras were left live-streaming to the open internet.&quot;
&lt;p /&gt;
&lt;A HREF=&quot;https://yro.slashdot.org/story/26/01/17/0718211/what-happened-after-security-researchers-found-60-flock-cameras-livestreaming-to-the-internet?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed&quot;&gt;https://yro.slashdot.org/story/26/01/17/0718211/what-happened-after-security-researchers-found-60-flock-cameras-livestreaming-to-the-internet?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;China-Linked APT Exploited Sitecore Zero-Day in Critical Infrastructure Intrusions&lt;/h3&gt;

A threat actor likely aligned with China has been observed targeting critical infrastructure sectors in North America since at least last year.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/china-linked-apt-exploits-sitecore-zero.html&quot;&gt;https://thehackernews.com/2026/01/china-linked-apt-exploits-sitecore-zero.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures&lt;/h3&gt;

Cybersecurity researchers have disclosed details of an ongoing campaign dubbed KongTuke that used a malicious Google Chrome extension masquerading as an ad blocker to deliberately crash the web browser and trick victims into running arbitrary commands using ClickFix-like lures to deliver a previously undocumented remote access trojan (RAT) dubbed ModeloRAT.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/crashfix-chrome-extension-delivers.html&quot;&gt;https://thehackernews.com/2026/01/crashfix-chrome-extension-delivers.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Fehlende Postleitzahl? Nachricht von DPD ist eine Phishing-Falle&lt;/h3&gt;

Ein Klassiker des Online-Betrugs. Ein Paketdienstleister meldet sich aus heiterem Himmel. Angeblich war ein Zustellversuch aufgrund einer fehlenden Postleitzahl nicht erfolgreich. Tatsächlich versuchen Kriminelle über ein gefälschtes Portal an Kreditkartendaten zu kommen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/dpd-phishing-falle/&quot;&gt;https://www.watchlist-internet.at/news/dpd-phishing-falle/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Windows Januar 2026 Update tauscht Secure Boot Zertifikate&lt;/h3&gt;

Im Juni 2026 laufen UEFI Secure Boot-Zertifikate für Windows ab. Im Oktober 2026 trifft es dann das nächste ablaufende UEFI-Zertifikat für den Secure Boot. Microsoft hat zum 13. Januar 2026 im Rahmen des Patchday erneut den Ansatz unternommen, das Secure Boot-Zertifikat im UEFI auszutauschen. Hier eine kurze Nachlese zum Sachstand.
&lt;p /&gt;
&lt;A HREF=&quot;https://borncity.com/blog/2026/01/17/windows-januar-2026-update-tauscht-secure-boot-zertifikate/&quot;&gt;https://borncity.com/blog/2026/01/17/windows-januar-2026-update-tauscht-secure-boot-zertifikate/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;From Extension to Infection: An In-Depth Analysis of the Evelyn Stealer Campaign Targeting Software Developers&lt;/h3&gt;

This blog entry provides an in-depth analysis of the multistage delivery of the Evelyn information stealer, which was used in a campaign targeting software developers.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.trendmicro.com/en_us/research/26/a/analysis-of-the-evelyn-stealer-campaign.html&quot;&gt;https://www.trendmicro.com/en_us/research/26/a/analysis-of-the-evelyn-stealer-campaign.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hackers Exploiting PDF24 App to Deploy Stealthy PDFSIDER Backdoor&lt;/h3&gt;

Resecurity has identified PDFSIDER malware that exploits the legitimate PDF24 App to covertly steal data and allow remote access. Learn how this APT-level campaign targets corporate networks through spear-phishing and encrypted communications. 
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/hackers-exploit-pdf24-app-pdfsider-backdoor/&quot;&gt;https://hackread.com/hackers-exploit-pdf24-app-pdfsider-backdoor/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Blink and youll miss them: 6-day certificates are here!&lt;/h3&gt;

What a great way to start 2026! Let's Encrypt have now made their short-lived certificates available, so you can go and start using them right away.
&lt;p /&gt;
&lt;A HREF=&quot;https://scotthelme.ghost.io/blink-and-youll-miss-them-6-day-certificates-are-here/&quot;&gt;https://scotthelme.ghost.io/blink-and-youll-miss-them-6-day-certificates-are-here/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft startet mit Identifizierung von unsicherer RC4-Verschlüsselung&lt;/h3&gt;

Die Windows-Sicherheitsupdates aus dem Januar läuten den Rauswurf unsicherer RC4-Verschlüsselung ein. Eine Lücke erfordert Maßnahmen.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11145332&quot;&gt;https://heise.de/-11145332&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Malware Peddlers Are Now Hijacking Snap Publisher Domains&lt;/h3&gt;

tl;dr: There-s a relentless campaign by scammers to publish malware in the Canonical Snap Store. Some gets caught by automated filters, but plenty slips through. Recently, these miscreants have changed tactics - they-re now registering expired domains belonging to legitimate snap publishers, taking over their accounts, and pushing malicious updates to previously trustworthy applications. This is a significant escalation.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.popey.com/2026/01/malware-purveyors-taking-over-published-snap-email-domains/&quot;&gt;https://blog.popey.com/2026/01/malware-purveyors-taking-over-published-snap-email-domains/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;TPM on Embedded Systems: Pitfalls and Caveats&lt;/h3&gt;

Trusted Platform Module (TPM) chips have been around since the release of the TPM 1.2 specification more than 20 years ago, and the TPM 2.0 specification1 was released in 2014. The technology is now seeing widespread adoption in various computing sectors. TPMs have been a standard feature in PCs, particularly notebooks, for some time. With integration into tools like systemd-s tooling for LUKS/dm-crypt and legal requirements like EU-s CRA, TPM functionality is also now making its way into the embedded Linux sector. In this post, we-ll highlight common pitfalls and considerations for using TPM chips on embedded devices.
&lt;p /&gt;
&lt;A HREF=&quot;https://sigma-star.at/blog/2026/01/tpm-on-embedded-systems-pitfalls-and-caveats/&quot;&gt;https://sigma-star.at/blog/2026/01/tpm-on-embedded-systems-pitfalls-and-caveats/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;How to Remove Saved Passwords From Google Chrome (And Why You Should)&lt;/h3&gt;

It usually starts with a small convenience. You log into a site once, Chrome offers to remember the password, and you click -Save- without thinking twice. Weeks turn into months, devices multiply, and before you know it, your browser knows more about your digital life than you do. This is exactly how many users end up relying on Chrome-s built-in tools without ever learning how to delete passwords from Chrome when it actually matters.
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/how-to-delete-saved-passwords-in-google-chrome/&quot;&gt;https://thecyberexpress.com/how-to-delete-saved-passwords-in-google-chrome/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;All In One SEO Plugin Flaw Exposes AI Token to Low-Privilege WordPress Users&lt;/h3&gt;

A newly disclosed security vulnerability in the All In One SEO ecosystem has drawn attention across the WordPress community due to its potential reach and impact. The flaw affects the widely used AIOSEO plugin, which is active on more than 3 million WordPress websites. It allows low-privileged users to access a site-wide AI access token tied to the plugin-s artificial intelligence features. 
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/all-in-one-seo-wordpress-ai-token/&quot;&gt;https://thecyberexpress.com/all-in-one-seo-wordpress-ai-token/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Security updates for Monday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (cups, libpq, libsoup3, podman, and postgresql16), Debian (ffmpeg, gpsd, python-urllib3, and thunderbird), Fedora (chromium, foomuuri, forgejo, freerdp, harfbuzz, libtpms, musescore, python-biopython, and python3.12), Mageia (gimp, libpng, nodejs, and python-urllib3), and SUSE (alloy, avahi, bind, chromedriver, chromium, cpp-httplib, docker, erlang, fluidsynth, freerdp, go-sendxmpp, govulncheck-vulndb, kernel, libwireshark19, NetworkManager-applet-l2tp, python, python311-virtualenv, thunderbird, and zk). 
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1054992/&quot;&gt;https://lwn.net/Articles/1054992/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Unberechtigte Zugriffe möglich: Lücken in Dells OneFS-NAS-Betriebssystem&lt;/h3&gt;

Dells NAS-Betriebssystem PowerScale OneFS ist über mehrere Sicherheitslücken angreifbar. Dagegen stehen abgesicherte Ausgaben zum Download bereit.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11145497&quot;&gt;https://heise.de/-11145497&lt;/a&gt;

&lt;hr&gt;
&lt;h3&gt;Wireshark 4.6.3 Released, (Sat, Jan 17th)&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://isc.sans.edu/diary/rss/32636&quot;&gt;https://isc.sans.edu/diary/rss/32636&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;K000159600: Rack vulnerability CVE-2022-30123&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://my.f5.com/manage/s/article/K000159600&quot;&gt;https://my.f5.com/manage/s/article/K000159600&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;K000159077: GNU Tar vulnerability CVE-2019-9923&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://my.f5.com/manage/s/article/K000159077&quot;&gt;https://my.f5.com/manage/s/article/K000159077&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-19T18:20:51Z</dc:date></entry><entry><title>Tageszusammenfassung - 16.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-16012026"/><author><name>CERT.at</name></author><updated>2026-01-16T18:29:42Z</updated><published>2026-01-16T18:29:42Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Donnerstag 15-01-2026 18:00 - Freitag 16-01-2026 18:00
Handler:     Alexander Riepl
Co-Handler:  Felician Fuchs


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Per Bitflip zum Root-Zugriff: Lücke in AMD-CPUs ermöglicht Einbruch in Cloud-VMs&lt;/h3&gt;

Eine neue Angriffstechnik namens Stackwarp lässt Angreifer über AMD-CPUs virtuelle Maschinen kapern. Vor allem Cloud-Umgebungen sind gefährdet.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/per-bitflip-zum-root-zugriff-luecke-in-amd-cpus-ermoeglicht-einbruch-in-cloud-vms-2601-204279.html&quot;&gt;https://www.golem.de/news/per-bitflip-zum-root-zugriff-luecke-in-amd-cpus-ermoeglicht-einbruch-in-cloud-vms-2601-204279.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks&lt;/h3&gt;

A critical misconfiguration in Amazon Web Services (AWS) CodeBuild could have allowed complete takeover of the cloud service providers own GitHub repositories, including its AWS JavaScript SDK, putting every AWS environment at risk.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/aws-codebuild-misconfiguration-exposed.html&quot;&gt;https://thehackernews.com/2026/01/aws-codebuild-misconfiguration-exposed.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts&lt;/h3&gt;

Cybersecurity researchers have discovered five new malicious Google Chrome web browser extensions that masquerade as human resources (HR) and enterprise resource planning (ERP) platforms like Workday, NetSuite, and SuccessFactors to take control of victim accounts.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/five-malicious-chrome-extensions.html&quot;&gt;https://thehackernews.com/2026/01/five-malicious-chrome-extensions.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Chinese spies used Maduros capture as a lure to phish US govt agencies&lt;/h3&gt;

Whats next for Venezuela? Click on the file and see What policy wonk wouldnt want to click on an attachment promising to unveil US plans for Venezuela? Chinese cyberspies used just such a lure to target US government agencies and policy-related organizations in a phishing campaign that began just days after an American military operation captured Venezuelan President Nicolás Maduro.
&lt;p /&gt;
&lt;A HREF=&quot;https://go.theregister.com/feed/www.theregister.com/2026/01/15/chinese_spies_used_maduros_capture/&quot;&gt;https://go.theregister.com/feed/www.theregister.com/2026/01/15/chinese_spies_used_maduros_capture/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Bankrupt scooter startup left one private key to rule them all&lt;/h3&gt;

An Estonian e-scooter owner locked out of his own ride after the manufacturer went bust did what any determined engineer might do. He reverse-engineered it, and claims he ended up discovering the master key that unlocks every scooter the company ever sold.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.theregister.com/2026/01/16/bankrupt_scooter_startup_key/&quot;&gt;https://www.theregister.com/2026/01/16/bankrupt_scooter_startup_key/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;RondoDox botnet linked to large-scale exploit of critical HPE OneView bug&lt;/h3&gt;

Check Point observes 40K+ attack attempts in our hours, with government organizations under fire A critical HPE OneView flaw is now being exploited at scale, with Check Point tying mass, automated attacks to the RondoDox botnet.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.theregister.com/2026/01/16/rondodox_botnet_hpe_oneview/&quot;&gt;https://www.theregister.com/2026/01/16/rondodox_botnet_hpe_oneview/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;German cops add Black Basta boss to EU most-wanted list&lt;/h3&gt;

Ransomware kingpin who escaped Armenian custody is believed to be lying low back home German cops have added Russian national Oleg Evgenievich Nefekov to their list of most-wanted criminals for his services to ransomware.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.theregister.com/2026/01/16/black_basta_boss_wanted/&quot;&gt;https://www.theregister.com/2026/01/16/black_basta_boss_wanted/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Jetzt patchen! Kritische Cisco-Lücke seit Dezember 2025 ausgenutzt&lt;/h3&gt;

Angreifer kompromittieren Cisco Secure Email Gateway und Secure Email und Web Manager über eine Root-Schwachstelle. Nun gibt es Sicherheitsupdates.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Jetzt-patchen-Kritische-Cisco-Luecke-seit-Dezember-2025-ausgenutzt-11143359.html&quot;&gt;https://www.heise.de/news/Jetzt-patchen-Kritische-Cisco-Luecke-seit-Dezember-2025-ausgenutzt-11143359.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Die lernende Bedrohung: Predator-Spyware ist raffinierter als gedacht&lt;/h3&gt;

Die Spähsoftware Predator von Intellexa gewinnt selbst aus gescheiterten Infektionsversuchen wertvolle Daten und macht gezielt Jagd auf IT-Sicherheitsforscher.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Die-lernende-Bedrohung-Predator-Spyware-ist-raffinierter-als-gedacht-11144402.html&quot;&gt;https://www.heise.de/news/Die-lernende-Bedrohung-Predator-Spyware-ist-raffinierter-als-gedacht-11144402.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Chinese hackers targeting -high value- North American critical infrastructure, Cisco says&lt;/h3&gt;

Chinese hackers successfully breached multiple critical infrastructure organizations in North America over the last year using a combination of compromised credentials and exploitable servers, researchers at Cisco Talos found.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/china-hackers-apt-cisco-talos&quot;&gt;https://therecord.media/china-hackers-apt-cisco-talos&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Canadian investment regulator confirms hackers hit 750,000 investors&lt;/h3&gt;

The nongovernmental Canadian Investment Regulatory Organization, which oversees the countrys debt and equity marketplaces as well as some financial institutions, released details about an August 2025 data breach.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/canada-ciro-investing-regulator-confirms-data-breach&quot;&gt;https://therecord.media/canada-ciro-investing-regulator-confirms-data-breach&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CVE-2025-55182: React2Shell Analysis, Proof-of-Concept Chaos, and In-the-Wild Exploitation&lt;/h3&gt;

CVE-2025-55182 is a CVSS 10.0 pre-authentication RCE affecting React Server Components. Amid the flood of fake proof-of-concept exploits, scanners, exploits, and widespread misconceptions, this technical analysis intends to cut through the noise.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.trendmicro.com/en_us/research/25/l/CVE-2025-55182-analysis-poc-itw.html&quot;&gt;https://www.trendmicro.com/en_us/research/25/l/CVE-2025-55182-analysis-poc-itw.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;New PayPal Scam Sends Verified Invoices With Fake Support Numbers&lt;/h3&gt;

Scammers are using verified PayPal invoices to launch callback phishing attacks. Learn how the &quot;Alexzander&quot; invoice bypasses Google filters.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/paypal-scam-verified-invoices-fake-support-numbers/&quot;&gt;https://hackread.com/paypal-scam-verified-invoices-fake-support-numbers/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Operation Endgame: Dutch Police Arrest Alleged AVCheck Operator&lt;/h3&gt;

Dutch police arrest the alleged AVCheck operator at Schiphol as part of Operation Endgame, a global effort targeting malware services and cybercrime.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/operation-endgame-dutch-police-arrest-avcheck-operator/&quot;&gt;https://hackread.com/operation-endgame-dutch-police-arrest-avcheck-operator/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation&lt;/h3&gt;

Mandiant is publicly releasing a comprehensive dataset of Net-NTLMv1 rainbow tables to underscore the urgency of migrating away from this outdated protocol. Despite Net-NTLMv1 being deprecated and known to be insecure for over two decades-with cryptanalysis dating back to 1999-Mandiant consultants continue to identify its use in active environments.
&lt;p /&gt;
&lt;A HREF=&quot;https://cloud.google.com/blog/topics/threat-intelligence/net-ntlmv1-deprecation-rainbow-tables/&quot;&gt;https://cloud.google.com/blog/topics/threat-intelligence/net-ntlmv1-deprecation-rainbow-tables/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Das Meldeportal in der AWS-Cloud: Warum nur, BSI?&lt;/h3&gt;

Schön, dass das BSI ein neues Portal für IT-Sicherheit bietet. Aber muss das unbedingt über die AWS-Cloud laufen, fragt sich Tobias Glemser.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11142071&quot;&gt;https://heise.de/-11142071&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;How to Use Pareto Principle to Fine-Tune Alerts and Reduce False Positives Wisely&lt;/h3&gt;

False positives were not only consuming analyst time - they were also diluting attention and slowing response on the few alerts that actually mattered.
&lt;p /&gt;
&lt;A HREF=&quot;https://detect.fyi/how-to-use-pareto-principle-to-fine-tune-alerts-and-reduce-false-positives-wisely-2c171356fe5b&quot;&gt;https://detect.fyi/how-to-use-pareto-principle-to-fine-tune-alerts-and-reduce-false-positives-wisely-2c171356fe5b&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Hackers exploit Modular DS WordPress plugin flaw for admin access&lt;/h3&gt;

Hackers are actively exploiting a maximum severity flaw in the Modular DS WordPress plugin that allows them to bypass authentication remotely and access the vulnerable sites with admin-level privileges.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/hackers-exploit-modular-ds-wordpress-plugin-flaw-for-admin-access/&quot;&gt;https://www.bleepingcomputer.com/news/security/hackers-exploit-modular-ds-wordpress-plugin-flaw-for-admin-access/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Critical flaw lets hackers track, eavesdrop via Bluetooth audio devices&lt;/h3&gt;

A critical vulnerability in Googles Fast Pair protocol can allow attackers to hijack Bluetooth audio accessories like wireless headphones and earbuds, track users, and eavesdrop on their conversations.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/critical-whisperpair-flaw-lets-hackers-track-eavesdrop-via-bluetooth-audio-devices/&quot;&gt;https://www.bleepingcomputer.com/news/security/critical-whisperpair-flaw-lets-hackers-track-eavesdrop-via-bluetooth-audio-devices/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;VU#383552: thelibrarian does not secure its interface, allowing for access to internal system data&lt;/h3&gt;

Multiple vulnerabilities were discovered in The Librarian, an AI-powered personal assistant tool provided by the company TheLibrarian.io. The Librarian can be used to manage personal email, calendar, documents, and other information through external services, such as Gmail and Google Drive, and also summarize meetings and schedule emails.
&lt;p /&gt;
&lt;A HREF=&quot;https://kb.cert.org/vuls/id/383552&quot;&gt;https://kb.cert.org/vuls/id/383552&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;VU#650657: Livewire Filemanager contains an insecure .php component that allows for unauthenticated RCE in Laravel Products&lt;/h3&gt;

A vulnerability, tracked as CVE-2025-14894, has been discovered within Livewire Filemanager, a tool designed for usage within Laravel applications. The Livewire Filemanager tool allows for users to upload various files, including PHP files, and host them within the Laravel application.
&lt;p /&gt;
&lt;A HREF=&quot;https://kb.cert.org/vuls/id/650657&quot;&gt;https://kb.cert.org/vuls/id/650657&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Juniper Networks: Zahlreiche Sicherheitsupdates für diverse Produkte&lt;/h3&gt;

Juniper Networks hat Sicherheitsaktualisierungen für zahlreiche Produkte veröffentlicht. IT-Admins sollten sie rasch anwenden.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Juniper-Networks-Zahlreiche-Sicherheitsupdates-fuer-diverse-Produkte-11143432.html&quot;&gt;https://www.heise.de/news/Juniper-Networks-Zahlreiche-Sicherheitsupdates-fuer-diverse-Produkte-11143432.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security updates for Friday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (gnupg2), Debian (firefox-esr), Oracle (cups, gnupg2, libpq, net-snmp, postgresql, postgresql:15, postgresql:16, transfig, and vsftpd), Red Hat (firefox), SUSE (apache2, curl, firefox, gpg2, hawk2, libcryptopp-devel, openCryptoki, python310, python311-urllib3, rke2, squid, and tomcat), and Ubuntu (cpp-httplib, git, python-apt, and simgear).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1054683/&quot;&gt;https://lwn.net/Articles/1054683/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-16T18:29:42Z</dc:date></entry><entry><title>Tageszusammenfassung - 15.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-15012026"/><author><name>CERT.at</name></author><updated>2026-01-15T18:36:27Z</updated><published>2026-01-15T18:36:27Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Mittwoch 14-01-2026 18:00 - Donnerstag 15-01-2026 18:00
Handler:     Alexander Riepl
Co-Handler:  Felician Fuchs


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Exploit code public for critical FortiSIEM command injection flaw&lt;/h3&gt;

Technical details and a public exploit have been published for a critical vulnerability affecting Fortinets Security Information and Event Management (SIEM) solution that could be leveraged by a remote, unauthenticated attacker to execute commands or code.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/exploit-code-public-for-critical-fortisiem-command-injection-flaw/&quot;&gt;https://www.bleepingcomputer.com/news/security/exploit-code-public-for-critical-fortisiem-command-injection-flaw/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Critical flaw lets hackers track, eavesdrop via Bluetooth audio devices&lt;/h3&gt;

A critical vulnerability in Googles Fast Pair protocol can allow attackers to hijack Bluetooth audio accessories like wireless headphones and earbuds, track users, and eavesdrop on their conversations.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/critical-flaw-lets-hackers-track-eavesdrop-via-bluetooth-audio-devices/&quot;&gt;https://www.bleepingcomputer.com/news/security/critical-flaw-lets-hackers-track-eavesdrop-via-bluetooth-audio-devices/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Most Severe AI Vulnerability to Date Hits ServiceNow&lt;/h3&gt;

The ITSM giant tacked agentic AI onto a largely unguarded legacy chatbot, exposing customers data and connected systems.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.darkreading.com/remote-workforce/ai-vulnerability-servicenow&quot;&gt;https://www.darkreading.com/remote-workforce/ai-vulnerability-servicenow&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Januar-Patchday: Windows-Updates machen Remote-Anmeldung kaputt&lt;/h3&gt;

Einige Anwender haben neuerdings Probleme, sich mit der Windows-App bei Azure Virtual Desktop oder Windows 365 anzumelden. Ein Fix ist in Arbeit.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/januar-patchday-windows-updates-machen-windows-app-kaputt-2601-204213.html&quot;&gt;https://www.golem.de/news/januar-patchday-windows-updates-machen-windows-app-kaputt-2601-204213.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Ransomware-Boss gesucht: Dieser Mann soll der Anführer von Black Basta sein&lt;/h3&gt;

Interpol, Europol und das BKA fahnden nach dem Boss der Ransomware-Gruppe Black Basta, die allein in Deutschland über 100 Organisationen geschädigt hat.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/ransomware-boss-gesucht-dieser-mann-soll-der-anfuehrer-von-black-basta-sein-2601-204218.html&quot;&gt;https://www.golem.de/news/ransomware-boss-gesucht-dieser-mann-soll-der-anfuehrer-von-black-basta-sein-2601-204218.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby&lt;/h3&gt;

Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messages. One effect of this change is increased 0-click attack surface, as efficient analysis often requires message media to be decoded before the message is opened by the user. One such feature is audio transcription. 
&lt;p /&gt;
&lt;A HREF=&quot;https://projectzero.google/2026/01/pixel-0-click-part-1.html&quot;&gt;https://projectzero.google/2026/01/pixel-0-click-part-1.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;A 0-click exploit chain for the Pixel 9 Part 2: Cracking the Sandbox with a Big Wave&lt;/h3&gt;

With the advent of a potential Dolby Unified Decoder RCE exploit, it seemed prudent to see what kind of Linux kernel drivers might be accessible from the resulting userland context, the mediacodec context.
&lt;p /&gt;
&lt;A HREF=&quot;https://projectzero.google/2026/01/pixel-0-click-part-2.html&quot;&gt;https://projectzero.google/2026/01/pixel-0-click-part-2.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;A 0-click exploit chain for the Pixel 9 Part 3: Where do we go from here?&lt;/h3&gt;

While our previous two blog posts provided technical recommendations for increasing the effort required by attackers to develop 0-click exploit chains, our experience finding, reporting and exploiting these vulnerabilities highlighted some broader issues in the Android ecosystem. This post describes the problems we encountered and recommendations for improvement.
&lt;p /&gt;
&lt;A HREF=&quot;https://projectzero.google/2026/01/pixel-0-click-part-3.html&quot;&gt;https://projectzero.google/2026/01/pixel-0-click-part-3.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers&lt;/h3&gt;

The Black Lotus Labs team at Lumen Technologies said it null-routed traffic to more than 550 command-and-control (C2) nodes associated with the AISURU/Kimwolf botnet since early October 2025.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/kimwolf-botnet-infected-over-2-million.html&quot;&gt;https://thehackernews.com/2026/01/kimwolf-botnet-infected-over-2-million.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Verizon Outage Knocks Out US Mobile Service, Including Some 911 Calls&lt;/h3&gt;

A major Verizon outage appeared to impact customers across the United States starting around noon ET on Wednesday. Calls to Verizon customers from other carriers may also be impacted.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.wired.com/story/verizon-outage-knocks-out-us-mobile-service-including-some-911-calls/&quot;&gt;https://www.wired.com/story/verizon-outage-knocks-out-us-mobile-service-including-some-911-calls/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Razzia in Deutschland: Behörden machen Cybercrime-Hoster RedVDS dicht&lt;/h3&gt;

Internationalen Ermittlern und Microsoft ist ein Schlag gegen die Infrastruktur des Cybercrime-Hosters RedVDS gelungen. Die Server standen auch in Deutschland.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Razzia-in-Deutschland-Behoerden-machen-Cybercrime-Hoster-RedVDS-dicht-11141431.html&quot;&gt;https://www.heise.de/news/Razzia-in-Deutschland-Behoerden-machen-Cybercrime-Hoster-RedVDS-dicht-11141431.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Chrome: Google kappt Support für älteres macOS&lt;/h3&gt;

Das vor weniger als fünf Jahren erschienene macOS 12 alias Monterey ist bei Googles Browser bald raus. Sicherheitslücken bleiben bestehen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Chrome-Google-kappt-Support-fuer-aelteres-macOS-11140713.html&quot;&gt;https://www.heise.de/news/Chrome-Google-kappt-Support-fuer-aelteres-macOS-11140713.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;curl: Projekt beendet Bug-Bounty-Programm&lt;/h3&gt;

curl-Maintainer Daniel Stenberg hat das Ende des Bug-Bounty-Programms angekündigt. Unbrauchbare KI-Meldungen nahmen wohl überhand.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/curl-Projekt-beendet-Bug-Bounty-Programm-11142345.html&quot;&gt;https://www.heise.de/news/curl-Projekt-beendet-Bug-Bounty-Programm-11142345.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Kriminelle imitieren Banknummern: Vorsicht vor Spoofing&lt;/h3&gt;

Kriminelle suchen ständig nach neuen Methoden, um an Kontodaten zu gelangen. Leider sind sie fündig geworden: Mit Spoofing täuschen sie die Nummer von Banken vor und erschleichen so das Vertrauen ihrer Opfer.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/kriminelle-imitieren-banknummern-spoofing/&quot;&gt;https://www.watchlist-internet.at/news/kriminelle-imitieren-banknummern-spoofing/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft disrupts RedVDS cybercrime platform behind $40 million in scam losses&lt;/h3&gt;

Microsoft and law enforcement partners took down a popular cybercriminal subscription service called RedVDS that was used to enable more than $40 million in fraud losses in the United States alone.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/microsoft-redvds-cybercrime-scam&quot;&gt;https://therecord.media/microsoft-redvds-cybercrime-scam&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;UAT-8837 targets critical infrastructure sectors in North America&lt;/h3&gt;

Cisco Talos is closely tracking UAT-8837, a threat actor we assess with medium confidence is a China-nexus advanced persistent threat (APT) actor.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.talosintelligence.com/uat-8837/&quot;&gt;https://blog.talosintelligence.com/uat-8837/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;GhostPoster Browser Malware Hid for 5 Years With 840,000 Installs&lt;/h3&gt;

Researchers uncover a 5-year malware campaign using browser extensions on Chrome, Firefox and Edge, relying on hidden payloads and shared infrastructure.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/ghostposter-browser-malware-840000-installs/&quot;&gt;https://hackread.com/ghostposter-browser-malware-840000-installs/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation&lt;/h3&gt;

Mandiant is publicly releasing a comprehensive dataset of Net-NTLMv1 rainbow tables to underscore the urgency of migrating away from this outdated protocol. Despite Net-NTLMv1 being deprecated and known to be insecure for over two decades-with cryptanalysis dating back to 1999-Mandiant consultants continue to identify its use in active environments.
&lt;p /&gt;
&lt;A HREF=&quot;https://cloud.google.com/blog/topics/threat-intelligence/net-ntlmv1-deprecation-rainbow-tables/&quot;&gt;https://cloud.google.com/blog/topics/threat-intelligence/net-ntlmv1-deprecation-rainbow-tables/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;New Remcos Campaign Distributed Through Fake Shipping Document&lt;/h3&gt;

FortiGuard Labs discovered a new phishing campaign in the wild. The campaign delivers a new variant of Remcos, a commercial lightweight remote access tool  (RAT) with a wide range of capabilities, including system resource management, remote surveillance, network management, and Remcos agent management.
&lt;p /&gt;
&lt;A HREF=&quot;https://feeds.fortinet.com/~/940295429/0/fortinet/blogs~New-Remcos-Campaign-Distributed-Through-Fake-Shipping-Document&quot;&gt;https://feeds.fortinet.com/~/940295429/0/fortinet/blogs~New-Remcos-Campaign-Distributed-Through-Fake-Shipping-Document&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;I-m The Captain Now: Hijacking a global ocean supply chain network&lt;/h3&gt;

There-s a good chance you have never heard of BLUVOYIX or Bluspark Global, and that-s ok! Not every company that powers global commerce is a household name. Despite their low profile, companies like these have an important role to play in keeping the global supply chain running in the background. Breaches at companies you haven-t heard of can often have the worst impacts.
&lt;p /&gt;
&lt;A HREF=&quot;https://eaton-works.com/2026/01/14/bluspark-bluvoyix-hack/&quot;&gt;https://eaton-works.com/2026/01/14/bluspark-bluvoyix-hack/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Malicious Chrome Extension Steals MEXC API Keys for Account Takeover&lt;/h3&gt;

A malicious Chrome extension steals newly created MEXC API keys, exfiltrates them to Telegram, and enables full account takeover with trading and withdrawal rights.
&lt;p /&gt;
&lt;A HREF=&quot;https://socket.dev/blog/malicious-chrome-extension-steals-mexc-api-keys&quot;&gt;https://socket.dev/blog/malicious-chrome-extension-steals-mexc-api-keys&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access&lt;/h3&gt;

A maximum-severity security flaw in a WordPress plugin called Modular DS has come under active exploitation in the wild, according to Patchstack. The vulnerability, tracked as CVE-2026-23550 (CVSS score: 10.0), has been described as a case of unauthenticated privilege escalation impacting all versions of the plugin prior to and including 2.5.1. It has been patched in version 2.5.2.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/critical-wordpress-modular-ds-plugin.html&quot;&gt;https://thehackernews.com/2026/01/critical-wordpress-modular-ds-plugin.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Role Delegation - Moderately critical - Access bypass - SA-CONTRIB-2026-002&lt;/h3&gt;

This module allows site administrators to grant specific roles the authority to assign selected roles to users, without them needing the &quot;administer permissions&quot; permission. The module contains an access bypass vulnerability when used in combination with the Views Bulk Operations module. A user with the ability to delegate a role is also able to assign the administrator role, including to their own user.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.drupal.org/sa-contrib-2026-002&quot;&gt;https://www.drupal.org/sa-contrib-2026-002&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Group invite - Moderately critical - Access bypass - SA-CONTRIB-2026-001&lt;/h3&gt;

This module enables allows group managers to invite people into their group. The module doesn't sufficiently check access under certain circumstances, allowing unauthorized users to access the group's content.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.drupal.org/sa-contrib-2026-001&quot;&gt;https://www.drupal.org/sa-contrib-2026-001&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft Entra ID SSO Login - Critical - Access bypass - SA-CONTRIB-2026-005&lt;/h3&gt;

This module enables Drupal sites to authenticate users via Microsoft Entra ID (formerly Azure AD) using OAuth 2.0. The module doesn't sufficiently validate API responses from Microsoft allowing complete account takeover of any user, including site administrators, without requiring any credentials or access to the target's email account.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.drupal.org/sa-contrib-2026-005&quot;&gt;https://www.drupal.org/sa-contrib-2026-005&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Fortinet: Heap-based buffer overflow in cw_acd daemon (FortiOS, FortiSASE, FortiSwitchManager)&lt;/h3&gt;

A heap-based buffer overflow vulnerability [CWE-122] in FortiOS and FortiSwitchManager cw_acd daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests. CVE-2025-25249 / CVSSv3 Score 7.4
&lt;p /&gt;
&lt;A HREF=&quot;https://fortiguard.fortinet.com/psirt/FG-IR-25-084&quot;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-25-084&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Angreifer können Palo-Alto-Firewalls in Wartungsmodus zwingen&lt;/h3&gt;

Unter bestimmten Bedingungen können Angreifer an einer Sicherheitslücke in PAN-OS ansetzen und so Firewalls von Palo Alto Networks attackieren. Bislang gibt es dem IT-Sicherheitsunternehmen zufolge keine Hinweise auf Attacken.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Angreifer-koennen-Palo-Alto-Firewalls-in-Wartungsmodus-zwingen-11142149.html&quot;&gt;https://www.heise.de/news/Angreifer-koennen-Palo-Alto-Firewalls-in-Wartungsmodus-zwingen-11142149.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CVE-2026-0227 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal (Severity: HIGH)&lt;/h3&gt;

A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode.
&lt;p /&gt;
&lt;A HREF=&quot;https://security.paloaltonetworks.com/CVE-2026-0227&quot;&gt;https://security.paloaltonetworks.com/CVE-2026-0227&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security Vulnerabilities fixed in Thunderbird 140.7&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.mozilla.org/en-US/security/advisories/mfsa2026-05/&quot;&gt;https://www.mozilla.org/en-US/security/advisories/mfsa2026-05/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security Vulnerabilities fixed in Thunderbird 147&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.mozilla.org/en-US/security/advisories/mfsa2026-04/&quot;&gt;https://www.mozilla.org/en-US/security/advisories/mfsa2026-04/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-15T18:36:27Z</dc:date></entry><entry><title>Tageszusammenfassung - 14.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-14012026"/><author><name>CERT.at</name></author><updated>2026-01-14T18:52:57Z</updated><published>2026-01-14T18:52:57Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Dienstag 13-01-2026 18:00 - Mittwoch 14-01-2026 18:30
Handler:     Felician Fuchs
Co-Handler:  n/a


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Target employees confirm leaked source code is authentic&lt;/h3&gt;

Multiple current and former Target employees confirmed that leaked source code samples posted by a threat actor match real internal systems. The company also rolled out an &quot;accelerated&quot; lockdown of its Git server, requiring VPN access, a day after being contacted by BleepingComputer.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/target-employees-confirm-leaked-source-code-is-authentic/&quot;&gt;https://www.bleepingcomputer.com/news/security/target-employees-confirm-leaked-source-code-is-authentic/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft: Windows 365 update blocks access to Cloud PC sessions&lt;/h3&gt;

Microsoft confirmed that a recent Windows 365 update is blocking customers from accessing their Microsoft 365 Cloud PC sessions.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-365-update-blocks-access-to-cloud-pc-sessions/&quot;&gt;https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-365-update-blocks-access-to-cloud-pc-sessions/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cloud marketplace Pax8 accidentally exposes data on 1,800 MSP partners&lt;/h3&gt;

Cloud marketplace and distributor Pax8 has confirmed that it mistakenly sent an email to fewer than 40 UK-based partners containing a spreadsheet with internal business information, including MSP customer and Microsoft licensing data.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/cloud-marketplace-pax8-accidentally-exposes-data-on-1-800-msp-partners/&quot;&gt;https://www.bleepingcomputer.com/news/security/cloud-marketplace-pax8-accidentally-exposes-data-on-1-800-msp-partners/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Reprompt attack let hackers hijack Microsoft Copilot sessions&lt;/h3&gt;

Researchers identified an attack method dubbed &quot;Reprompt&quot; that could allow attackers to infiltrate a users Microsoft Copilot session and issue commands to exfiltrate sensitive data.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/reprompt-attack-let-hackers-hijack-microsoft-copilot-sessions/&quot;&gt;https://www.bleepingcomputer.com/news/security/reprompt-attack-let-hackers-hijack-microsoft-copilot-sessions/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;ConsentFix debrief: Insights from the new OAuth phishing attack&lt;/h3&gt;

ConsentFix is an OAuth phishing technique abusing  browser-based authorization flows to hijack Microsoft accounts. Push Security shares new insights from continued tracking, community research, and evolving attacker techniques.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/consentfix-debrief-insights-from-the-new-oauth-phishing-attack/&quot;&gt;https://www.bleepingcomputer.com/news/security/consentfix-debrief-insights-from-the-new-oauth-phishing-attack/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft updates Windows DLL that triggered security alerts&lt;/h3&gt;

Microsoft has resolved a known issue that was causing security applications to incorrectly flag a core Windows component, the company said in a service alert posted this week.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/microsoft/microsoft-updates-windows-dll-that-triggered-security-alerts/&quot;&gt;https://www.bleepingcomputer.com/news/microsoft/microsoft-updates-windows-dll-that-triggered-security-alerts/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Ohne Authentifizierung: Broadcom-Lücke lässt Angreifer ganze WLAN-Netze lahmlegen&lt;/h3&gt;

Zahlreiche WLAN-Netze, die auf Broadcom-Chipsätzen basieren, lassen sich mit nur einem Datenpaket lahmlegen. Angreifer brauchen dafür keinen Schlüssel.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/ohne-authentifizierung-broadcom-luecke-laesst-angreifer-ganze-wlan-netze-lahmlegen-2601-204166.html&quot;&gt;https://www.golem.de/news/ohne-authentifizierung-broadcom-luecke-laesst-angreifer-ganze-wlan-netze-lahmlegen-2601-204166.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Corrupting LLMs Through Weird Generalizations&lt;/h3&gt;

Abstract LLMs are useful because they generalize so well. But can you have too much of a good thing? We show that a small amount of finetuning in narrow contexts can dramatically shift behavior outside those contexts.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.schneier.com/blog/archives/2026/01/corrupting-llms-through-weird-generalizations.html&quot;&gt;https://www.schneier.com/blog/archives/2026/01/corrupting-llms-through-weird-generalizations.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Malware Intercepts Googlebot via IP-Verified Conditional Logic&lt;/h3&gt;

Some attackers are increasingly moving away from simple redirects in favor of more -selective- methods of payload delivery. This approach filters out regular human visitors, allowing attackers to serve malicious content to search engine crawlers while remaining invisible to the website owner.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.sucuri.net/2026/01/malware-intercepts-googlebot-via-ip-verified-conditional-logic.html&quot;&gt;https://blog.sucuri.net/2026/01/malware-intercepts-googlebot-via-ip-verified-conditional-logic.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool&lt;/h3&gt;

Cybersecurity researchers have disclosed details of a malicious Google Chrome extension thats capable of stealing API keys associated with MEXC, a centralized cryptocurrency exchange (CEX) available in over 170 countries, while masquerading as a tool to automate trading on the platform.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/malicious-chrome-extension-steals-mexc.html&quot;&gt;https://thehackernews.com/2026/01/malicious-chrome-extension-steals-mexc.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification&lt;/h3&gt;

Research analyzing 4,700 leading websites reveals that 64% of third-party applications now access sensitive data without business justification, up from 51% in 2024. Government sector malicious activity spiked from 2% to 12.9%, while 1 in 7 Education sites show active compromise.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/new-research-64-of-3rd-party.html&quot;&gt;https://thehackernews.com/2026/01/new-research-64-of-3rd-party.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware&lt;/h3&gt;

Security experts have disclosed details of an active malware campaign thats exploiting a DLL side-loading vulnerability in a legitimate binary associated with the open-source c-ares library to bypass security controls and deliver a wide range of commodity trojans and stealers.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/hackers-exploit-c-ares-dll-side-loading.html&quot;&gt;https://thehackernews.com/2026/01/hackers-exploit-c-ares-dll-side-loading.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Interrail meldet Datenleck: Auch Ausweisdaten betroffen&lt;/h3&gt;

Bei Eurail flossen mutmaßlich Daten ab. Der Anbieter stellt Interrail-Pässe auch im Auftrag der deutschen, österreichischen und Schweizer Bahn aus.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Interrail-meldet-Datenleck-Auch-Ausweisdaten-betroffen-11140218.html&quot;&gt;https://www.heise.de/news/Interrail-meldet-Datenleck-Auch-Ausweisdaten-betroffen-11140218.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Kritik an GnuPG und seinem Umgang mit gemeldeten Lücken&lt;/h3&gt;

Die auf dem 39C3 demonstrierten Probleme in der PGP-Implementierung GnuPG riefen vielfältige Kritik an GnuPGs Umgang damit, aber auch an PGP insgesamt hervor.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/hintergrund/Kritik-an-GnuPG-und-seinem-Umgang-mit-gemeldeten-Luecken-11132888.html&quot;&gt;https://www.heise.de/hintergrund/Kritik-an-GnuPG-und-seinem-Umgang-mit-gemeldeten-Luecken-11132888.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Malware-Masche: Jobangebote jubeln Entwicklern bösartige Repositories unter&lt;/h3&gt;

Entwickler müssen bei Jobangeboten inzwischen aufpassen. Kriminelle versuchen, Infostealer darüber zu verteilen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Malware-Masche-Jobangebote-jubeln-Entwicklern-boesartige-Repositories-unter-11140776.html&quot;&gt;https://www.heise.de/news/Malware-Masche-Jobangebote-jubeln-Entwicklern-boesartige-Repositories-unter-11140776.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;How real software downloads can hide remote backdoors&lt;/h3&gt;

Attackers use legitimate open-source software as cover, relying on user trust to compromise systems. We dive into an example.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.malwarebytes.com/blog/threat-intel/2026/01/how-real-software-downloads-can-hide-remote-backdoors&quot;&gt;https://www.malwarebytes.com/blog/threat-intel/2026/01/how-real-software-downloads-can-hide-remote-backdoors&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Instagram dementiert Hack nach massenhaften Passwort-Reset-Mails&lt;/h3&gt;

Zuvor waren Berichte über entwendete Daten von 17 Millionen Usern kursiert. Das Unternehmen widerspricht und rät zum Ignorieren der Mails
&lt;p /&gt;
&lt;A HREF=&quot;https://www.derstandard.at/story/3000000303975/instagram-dementiert-hack-nach-massenhaften-passwort-reset-mails&quot;&gt;https://www.derstandard.at/story/3000000303975/instagram-dementiert-hack-nach-massenhaften-passwort-reset-mails&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Ransomware: Tactical Evolution Fuels Extortion Epidemic&lt;/h3&gt;

New whitepaper reveals record number of attacks as threat landscape evolves with new players and new tactics.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.security.com/threat-intelligence/ransomware-extortion-epidemic&quot;&gt;https://www.security.com/threat-intelligence/ransomware-extortion-epidemic&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;More than 40 countries impacted by North Korea IT worker scams, crypto thefts&lt;/h3&gt;

Eleven countries led a session at the UN headquarters in New York centered around a 140-page report released last fall that covered North Korea-s extensive cyber-focused efforts to fund its nuclear and ballistic weapons program.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/40-countries-impacted-nk-it-thefts-united-nations&quot;&gt;https://therecord.media/40-countries-impacted-nk-it-thefts-united-nations&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Poland says it repelled major cyberattack on power grid, blames Russia&lt;/h3&gt;

Poland narrowly avoided a large-scale power outage by thwarting what officials described as the most serious cyberattack on its energy infrastructure in years.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/poland-cyberattack-grid-russia&quot;&gt;https://therecord.media/poland-cyberattack-grid-russia&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Western cyber agencies warn about threats to industrial operational technology&lt;/h3&gt;

New guidance issued by Britain-s National Cyber Secure Centre (NCSC), a part of signals and cyber intelligence agency GCHQ, sets out how organizations should securely connect equipment such as industrial control systems, sensors and other critical services.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/cyber-agencies-warn-of-industrial-system-threats&quot;&gt;https://therecord.media/cyber-agencies-warn-of-industrial-system-threats&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Telegram to Add Warning for Proxy Links After IP Leak Concerns&lt;/h3&gt;

Telegram will add a warning for proxy links after reports showed they can expose user IP addresses with a single click, bypassing VPN or privacy settings.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/telegram-add-warning-proxy-links-ip-leak/&quot;&gt;https://hackread.com/telegram-add-warning-proxy-links-ip-leak/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hacker Claims Full Breach of Russia-s Max Messenger, Threatens Public Leak&lt;/h3&gt;

A hacker claims a full breach of Russia-s Max Messenger, threatening to leak user data and backend systems if demands are not met.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/hacker-russia-max-messenger-breach-data-leak/&quot;&gt;https://hackread.com/hacker-russia-max-messenger-breach-data-leak/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Secure Connectivity Principles for Operational Technology (OT)&lt;/h3&gt;

CISA and the UK National Cyber Security Centre (NCSC-UK), in collaboration with federal and international partners, have released Secure Connectivity Principles for Operational Technology (OT) guidance to help asset owners address increasing business and regulatory pressures for connectivity into operational technology (OT) networks.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/resources-tools/resources/secure-connectivity-principles-operational-technology-ot&quot;&gt;https://www.cisa.gov/resources-tools/resources/secure-connectivity-principles-operational-technology-ot&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Unpatchable Vulnerabilities of Kubernetes: CVE-2020-8554&lt;/h3&gt;

This blog is the first part of a mini-series looking at the four unpatchable CVEs in every Kubernetes cluster.
&lt;p /&gt;
&lt;A HREF=&quot;https://securitylabs.datadoghq.com/articles/unpatchable-kubernetes-vulnerabilities-cve-2020-8554/&quot;&gt;https://securitylabs.datadoghq.com/articles/unpatchable-kubernetes-vulnerabilities-cve-2020-8554/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Wireless-(in)Fidelity: Pentesting Wi-Fi in 2025&lt;/h3&gt;

Despite the advancements that have been made in Wi-Fi security with the arrival of WPA3, some misconfigurations and legacy protocols still remain. In this blogpost, we share insights into Wi-Fi related findings encountered during penetration testing engagements.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.synacktiv.com/en/publications/wireless-infidelity-pentesting-wi-fi-in-2025.html&quot;&gt;https://www.synacktiv.com/en/publications/wireless-infidelity-pentesting-wi-fi-in-2025.html&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Multiple vulnerabilities in EATON UPS Companion&lt;/h3&gt;

EATON UPS Companion provided by Eaton contains multiple vulnerabilities.
&lt;p /&gt;
&lt;A HREF=&quot;https://jvn.jp/en/jp/JVN48187396/&quot;&gt;https://jvn.jp/en/jp/JVN48187396/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Patchday Microsoft: Attacken auf Windows und Windows Server beobachtet&lt;/h3&gt;

Es sind wichtige Sicherheitsupdates für Office, Windows &amp; Co. erschienen. Angreifer nutzen bereits eine Lücke aus. Weitere Attacken können bevorstehen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Patchday-Microsoft-Angreifer-spionieren-Speicherbereiche-in-Windows-aus-11140152.html&quot;&gt;https://www.heise.de/news/Patchday-Microsoft-Angreifer-spionieren-Speicherbereiche-in-Windows-aus-11140152.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Patchday Adobe: Schadcode-Lücken bedrohen Dreamweaver &amp; Co.&lt;/h3&gt;

Wichtige Sicherheitsupdates reparieren unter anderem Adobe ColdFusion und InDesign.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Patchday-Adobe-Schadcode-Luecken-bedrohen-Dreamweaver-Co-11140224.html&quot;&gt;https://www.heise.de/news/Patchday-Adobe-Schadcode-Luecken-bedrohen-Dreamweaver-Co-11140224.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security updates for Wednesday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (sssd), Debian (linux-6.1 and python-parsl), Fedora (chezmoi, complyctl, composer, and firefox), Oracle (kernel), Red Hat (buildah, libpq, podman, postgresql, postgresql16, postgresql:13, postgresql:15, and postgresql:16), SUSE (avahi, curl, ffmpeg-4, ffmpeg-7, firefox, istioctl, k6, kubelogin, libmicrohttpd, libpcap-devel, libpng16, libtasn1-6-32bit, matio, ovmf, python-tornado6, python311-Authlib, and teleport), and Ubuntu (angular.js, python-urllib3, and webkit2gtk).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1054167/&quot;&gt;https://lwn.net/Articles/1054167/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Mitigating Denial-of-Service Vulnerability from Unrecoverable Stack Space Exhaustion for React, Next.js, and APM Users&lt;/h3&gt;

This bug highlights how deeply async_hooks has become embedded in the Node.js ecosystem. What started as a low-level debugging API is now a critical dependency for React Server Components, Next.js, every major APM tool, and any code using AsyncLocalStorage.
&lt;p /&gt;
&lt;A HREF=&quot;https://nodejs.org/en/blog/vulnerability/january-2026-dos-mitigation-async-hooks&quot;&gt;https://nodejs.org/en/blog/vulnerability/january-2026-dos-mitigation-async-hooks&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;F5: K000159546, Python vulnerability CVE-2024-5642&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://my.f5.com/manage/s/article/K000159546&quot;&gt;https://my.f5.com/manage/s/article/K000159546&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-14T18:52:57Z</dc:date></entry><entry><title>Tageszusammenfassung - 13.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-13012026"/><author><name>CERT.at</name></author><updated>2026-01-13T18:50:40Z</updated><published>2026-01-13T18:50:40Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Montag 12-01-2026 18:00 - Dienstag 13-01-2026 18:00
Handler:     Felician Fuchs
Co-Handler:  n/a


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Targets dev server offline after hackers claim to steal source code&lt;/h3&gt;

Hackers are claiming to be selling internal source code belonging to Target Corporation, after publishing what appears to be a sample of stolen code repositories on a public software development platform. After BleepingComputer notified Target, the files were taken offline and the retailers developer Git server was inaccessible.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/&quot;&gt;https://www.bleepingcomputer.com/news/security/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CISA orders feds to patch Gogs RCE flaw exploited in zero-day attacks&lt;/h3&gt;

CISA has ordered government agencies to secure their systems against a high-severity Gogs vulnerability that was exploited in zero-day attacks.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-gogs-rce-flaw-exploited-in-zero-day-attacks/&quot;&gt;https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-gogs-rce-flaw-exploited-in-zero-day-attacks/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Facebook login thieves now using browser-in-browser trick&lt;/h3&gt;

Hackers over the past six months have relied increasingly more on the browser-in-the-browser (BitB) method to trick users into providing Facebook account credentials.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/facebook-login-thieves-now-using-browser-in-browser-trick/&quot;&gt;https://www.bleepingcomputer.com/news/security/facebook-login-thieves-now-using-browser-in-browser-trick/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Convincing LinkedIn comment-reply tactic used in new phishing&lt;/h3&gt;

Scammers are flooding LinkedIn posts with fake &quot;reply&quot; comments that appear to come from the platform, warning of bogus policy violations and urging users to click external links. Some even abuse LinkedIns official lnkd.in shortener, making the phishing attempts harder to spot.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/convincing-linkedin-comment-reply-tactic-used-in-new-phishing/&quot;&gt;https://www.bleepingcomputer.com/news/security/convincing-linkedin-comment-reply-tactic-used-in-new-phishing/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;What we know about Iran-s Internet shutdown&lt;/h3&gt;

Cloudflare Radar data shows Internet traffic from Iran has effectively dropped to zero since January 8, signaling a complete shutdown in the country and disconnection from the global Internet.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.cloudflare.com/iran-protests-internet-shutdown/&quot;&gt;https://blog.cloudflare.com/iran-protests-internet-shutdown/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;GoBruteforcer Botnet Targets 50K-plus Linux Servers&lt;/h3&gt;

Researchers detailed a souped-up version of the GoBruteforcer botnet that preys on servers with weak credentials and AI-generated configurations.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.darkreading.com/threat-intelligence/gobruteforcer-botnet-targets-50k-plus-linux-servers&quot;&gt;https://www.darkreading.com/threat-intelligence/gobruteforcer-botnet-targets-50k-plus-linux-servers&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;10-Punkte-Papier: BDEW fordert Maßnahmen zum Schutz kritischer Infrastruktur&lt;/h3&gt;

In einem Positionspapier fordert der Bundesverband der Energie- und Wasserwirtschaft die Stärkung der Resilienz kritischer Infrastrukturen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/10-punkte-papier-bdew-fordert-massnahmen-zum-schutz-kritischer-infrastruktur-2601-204140.html&quot;&gt;https://www.golem.de/news/10-punkte-papier-bdew-fordert-massnahmen-zum-schutz-kritischer-infrastruktur-2601-204140.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens&lt;/h3&gt;

Threat actors have been observed uploading a set of eight packages on the npm registry that masqueraded as integrations targeting the n8n workflow automation platform to steal developers OAuth credentials.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/n8n-supply-chain-attack-abuses.html&quot;&gt;https://thehackernews.com/2026/01/n8n-supply-chain-attack-abuses.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack&lt;/h3&gt;

Cybersecurity researchers have disclosed details of a new campaign dubbed SHADOW#REACTOR that employs an evasive multi-stage attack chain to deliver a commercially available remote administration tool called Remcos RAT and establish persistent, covert remote access.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/new-malware-campaign-delivers-remcos.html&quot;&gt;https://thehackernews.com/2026/01/new-malware-campaign-delivers-remcos.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;New Advanced Linux VoidLink Malware Targets Cloud and container Environments&lt;/h3&gt;

Cybersecurity researchers have disclosed details of a previously undocumented and feature-rich malware framework codenamed VoidLink thats specifically designed for long-term, stealthy access to Linux-based cloud environments.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/new-advanced-linux-voidlink-malware.html&quot;&gt;https://thehackernews.com/2026/01/new-advanced-linux-voidlink-malware.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Businesses in 2026: Maybe we should finally look into that AI security stuff&lt;/h3&gt;

Survey finds security checks nearly doubled in a year as leaders wise up. The number of organizations that have implemented methods for identifying security risks in the AI tools they use has almost doubled in the space of a year.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.theregister.com/2026/01/12/ai_security_wef_survey/&quot;&gt;https://www.theregister.com/2026/01/12/ai_security_wef_survey/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Mandiant open sources tool to prevent leaky Salesforce misconfigs&lt;/h3&gt;

AuraInspector automates the most common abuses and generates fixes for customers Mandiant has released an open source tool to help Salesforce admins detect misconfigurations that could expose sensitive data.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.theregister.com/2026/01/13/mandiant_salesforce_tool/&quot;&gt;https://www.theregister.com/2026/01/13/mandiant_salesforce_tool/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Dutch cops cuff alleged AVCheck malware kingpin in Amsterdam&lt;/h3&gt;

33-year-old was under surveillance for some time before returning home from the UAE Dutch police believe they have arrested a man behind the AVCheck online platform - a service used by cybercrims that Operation Endgame shuttered in May.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.theregister.com/2026/01/13/avcheck_arrest/&quot;&gt;https://www.theregister.com/2026/01/13/avcheck_arrest/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Start der ersten ESC-Ticketwelle: Vorsicht vor unseriösen Angeboten!&lt;/h3&gt;

Endlich ist es so weit: Der Vorverkauf für den Eurovision Song Contest 2026 hat begonnen! Doch Fans sollten besonders vorsichtig sein, denn unseriöse Anbieter versuchen, außerhalb der offiziellen Verkaufsplattformen Profit zu schlagen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/start-der-ersten-esc-ticketwelle-vorsicht-vor-unserioesen-angeboten/&quot;&gt;https://www.watchlist-internet.at/news/start-der-ersten-esc-ticketwelle-vorsicht-vor-unserioesen-angeboten/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Neue Phishing-Welle: Ausstehende Zahlungen ans Finanzamt&lt;/h3&gt;

Einmal mehr geben sich Kriminelle als das Bundesministerium für Finanzen aus. Aktuell nehmen sie sowohl Privatpersonen als auch Unternehmen ins Visier. In beiden Fällen sollen angeblich offene Zahlungen mit einer Überweisung beglichen werden - auf ein Konto im Ausland.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/phishing-ausstehende-zahlungen-finanzamt/&quot;&gt;https://www.watchlist-internet.at/news/phishing-ausstehende-zahlungen-finanzamt/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Latin America Sees Sharpest Rise in Cyber Attacks in December 2025 as Ransomware Activity Accelerates&lt;/h3&gt;

In December 2025, organizations experienced an average of 2,027 cyber attacks per organization per week. This represents a 1% month-over-month increase and a 9% year-over-year increase. While overall growth remained moderate, Latin America recorded the sharpest regional increase, with organizations experiencing an average of 3,065 attacks per week, a 26% increase year over year.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.checkpoint.com/research/latin-america-sees-sharpest-rise-in-cyber-attacks-in-december-2025-as-ransomware-activity-accelerates/&quot;&gt;https://blog.checkpoint.com/research/latin-america-sees-sharpest-rise-in-cyber-attacks-in-december-2025-as-ransomware-activity-accelerates/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;VoidLink: The Cloud-Native Malware Framework Weaponizing Linux Infrastructure&lt;/h3&gt;

Key Points: VoidLink is a cloud-native Linux malware framework built to maintain long-term, stealthy access to cloud infrastructure rather than targeting individual endpoints. It reflects a shift in attacker focus away from Windows systems toward the Linux environments that power cloud services and critical operations. Its modular, plug-in-driven design allows threat actors to customize capabilities over time, expanding attacks quietly as objectives evolve. 
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.checkpoint.com/research/voidlink-the-cloud-native-malware-framework-weaponizing-linux-infrastructure/&quot;&gt;https://blog.checkpoint.com/research/voidlink-the-cloud-native-malware-framework-weaponizing-linux-infrastructure/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Sweden detains ex-military IT consultant suspected of spying for Russia&lt;/h3&gt;

A 33-year-old former IT consultant for Sweden-s Armed Forces has been detained on suspicions of spying for Russian intelligence, Swedish prosecutors said.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/sweden-detains-it-consultant-russia&quot;&gt;https://therecord.media/sweden-detains-it-consultant-russia&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;0patch Micropatch für CredSSP-Schwachstelle CVE-2025-47987&lt;/h3&gt;

Noch ein kleiner Nachtrag von letzter Woche und vor dem Januar 2026 Patchday. ACROS Security hat einen 0patch Micropatch für eine Elevation of Privilege (EoP)-Schwachstelle CVE-2025-47987 im Credential Security Support Provider Protocol (CredSSP) veröffentlicht.
&lt;p /&gt;
&lt;A HREF=&quot;https://borncity.com/blog/2026/01/13/0patch-micropatch-fuer-credssp-schwachstelle-cve-2025-47987/&quot;&gt;https://borncity.com/blog/2026/01/13/0patch-micropatch-fuer-credssp-schwachstelle-cve-2025-47987/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;End of Support für Microsoft-Produkte in 2026&lt;/h3&gt;

Das Jahr 2026 bringt für Nutzer von Microsoft Produkten einige Termine, an denen der Support endet. Das reicht von diversen Windows-Versionen, die dann nicht mehr durch Updates unterstützt werden, bis hin zu Microsoft Office 2021.
&lt;p /&gt;
&lt;A HREF=&quot;https://borncity.com/blog/2026/01/13/end-of-support-fuer-microsoft-produkte-in-2026/&quot;&gt;https://borncity.com/blog/2026/01/13/end-of-support-fuer-microsoft-produkte-in-2026/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Russian BlueDelta (Fancy Bear) Uses PDFs to Steal Logins in Just 2 Seconds&lt;/h3&gt;

New research from Recorded Future reveals how Russian state hackers (BlueDelta) are using fake Microsoft and Google login portals to steal credentials. The campaign involves using legitimate PDF lures from GRC and EcoClimate to trick victims.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/russian-bluedelta-fancy-bear-pdfs-steal-login/&quot;&gt;https://hackread.com/russian-bluedelta-fancy-bear-pdfs-steal-login/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Widespread Magecart Campaign Targets Users of All Major Credit Cards&lt;/h3&gt;

Researchers at Silent Push have exposed a global Magecart campaign stealing credit card data since 2022. Learn how this invisible web-skimming attack targets major networks like Mastercard and Amex, and how to stay safe.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/magecart-targets-all-credit-cards-users/&quot;&gt;https://hackread.com/magecart-targets-all-credit-cards-users/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;K7 Antivirus: Named pipe abuse, registry manipulation and privilege escalation (CVE-2025-67826)&lt;/h3&gt;

When hunting for privilege escalation vulnerabilities, named pipes are a goldmine. Antivirus products often use named pipes to allow unprivileged users to trigger privileged operations, making them especially promising targets for this class of vulnerability.
&lt;p /&gt;
&lt;A HREF=&quot;http://blog.quarkslab.com/k7-antivirus-named-pipe-abuse-registry-manipulation-and-privilege-escalation.html&quot;&gt;http://blog.quarkslab.com/k7-antivirus-named-pipe-abuse-registry-manipulation-and-privilege-escalation.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;How GitHub could secure npm&lt;/h3&gt;

In 2025, npm experienced an unprecedented number of compromised packages in a series of coordinated attacks on the JavaScript open source supply chain. These packages ranged from crypto-stealing malware1 to credential-stealing exploits2. While GitHub announced changes3 to address these attacks, many maintainers (myself included) found the response insufficient.
&lt;p /&gt;
&lt;A HREF=&quot;https://humanwhocodes.com/blog/2026/01/how-github-could-secure-npm/&quot;&gt;https://humanwhocodes.com/blog/2026/01/how-github-could-secure-npm/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Shai Hulud 2.0 Campaign&lt;/h3&gt;

Shai-Hulud 2.0 represents one of the most severe supply chain compromises observed in the modern cloud-native ecosystem.
The campaign involved the manipulation of hundreds of publicly available packages and specifically targeted developer workstations, CI/CD pipelines, and cloud workloads to harvest credentials and sensitive configuration data.
&lt;p /&gt;
&lt;A HREF=&quot;https://detect.fyi/shai-hulud-2-0-campaign-be390e502f28?source=rssd5fd8f494f6a4&quot;&gt;https://detect.fyi/shai-hulud-2-0-campaign-be390e502f28?source=rssd5fd8f494f6a4&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Malicious Chrome Extension Steals MEXC API Keys for Account Takeover&lt;/h3&gt;

Socket-s Threat Research Team identified a malicious Chrome extension, MEXC API Automator, published to the Chrome Web Store on September 1, 2025, by a threat actor under the alias jorjortan142.
&lt;p /&gt;
&lt;A HREF=&quot;https://socket.dev/blog/malicious-chrome-extension-steals-mexc-api-keys?utm_medium=feed&quot;&gt;https://socket.dev/blog/malicious-chrome-extension-steals-mexc-api-keys?utm_medium=feed&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Fixing ESC1 - Enrollee supplies subject and template allows client authentication&lt;/h3&gt;

ADCS misconfigurations are one of the most common privilege escalation vectors we encounter. This article covers steps to remediate ESC1 flaws.
&lt;p /&gt;
&lt;A HREF=&quot;https://projectblack.io/blog/fixing-esc1-enrollee-supplies-subject-and-template-allows-client-authentication/&quot;&gt;https://projectblack.io/blog/fixing-esc1-enrollee-supplies-subject-and-template-allows-client-authentication/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Lack of isolation in agentic browsers resurfaces old vulnerabilities&lt;/h3&gt;

With browser-embedded AI agents, we-re essentially starting the security journey over again. We exploited a lack of isolation mechanisms in multiple agentic browsers to perform attacks ranging from the dissemination of false information to cross-site data leaks.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.trailofbits.com/2026/01/13/lack-of-isolation-in-agentic-browsers-resurfaces-old-vulnerabilities/&quot;&gt;https://blog.trailofbits.com/2026/01/13/lack-of-isolation-in-agentic-browsers-resurfaces-old-vulnerabilities/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Unauthenticated access to local configuration&lt;/h3&gt;

CVSSv3 Score: 9.3. An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in FortiFone Web Portal page may allow an unauthenticated attacker to obtain the device configuration via crafted HTTP or HTTPS requests.
&lt;p /&gt;
&lt;A HREF=&quot;https://fortiguard.fortinet.com/psirt/FG-IR-25-260&quot;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-25-260&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Unauthenticated remote command injection&lt;/h3&gt;

CVSSv3 Score: 9.4. An improper neutralization of special elements used in an OS command (OS Command Injection) vulnerability [CWE-78] in FortiSIEM may allow an unauthenticated attacker to execute unauthorized code or commands via crafted TCP requests.
&lt;p /&gt;
&lt;A HREF=&quot;https://fortiguard.fortinet.com/psirt/FG-IR-25-772&quot;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-25-772&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;SAP Security Patch Day January 2026&lt;/h3&gt;

SAP has released its January 2026 security patch package containing 17 security notes addressing critical vulnerabilities across enterprise SAP environments. This release includes four HotNews vulnerabilities with CVSS ratings up to 9.9, four High priority issues, seven Medium priority fixes, and two Low priority updates. The patches affect SAP S/4HANA, SAP HANA database, SAP NetWeaver, SAP Wily Introscope, and various application components.
&lt;p /&gt;
&lt;A HREF=&quot;https://redrays.io/blog/sap-security-patch-day-january-2026/&quot;&gt;https://redrays.io/blog/sap-security-patch-day-january-2026/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;TinyWeb: Windows-Web-Server ermöglicht Codeschmuggel&lt;/h3&gt;

In dem schlanken Web-Server TinyWeb für Windows können Angreifer aus dem Netz beliebigen Code einschleusen. Ein Update hilft.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/TinyWeb-Windows-Web-Server-ermoeglicht-Codeschmuggel-11138924.html&quot;&gt;https://www.heise.de/news/TinyWeb-Windows-Web-Server-ermoeglicht-Codeschmuggel-11138924.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;TYPO3-CORE-SA-2026-003: Broken Access Control in Recycler Module&lt;/h3&gt;

It has been discovered that TYPO3 CMS is susceptible to broken access control.
&lt;p /&gt;
&lt;A HREF=&quot;https://typo3.org/security/advisory/typo3-core-sa-2026-003&quot;&gt;https://typo3.org/security/advisory/typo3-core-sa-2026-003&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation&lt;/h3&gt;

ServiceNow has disclosed details of a now-patched critical security flaw impacting its ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform arbitrary actions as that user. The vulnerability, tracked as CVE-2025-12420, carries a CVSS score of 9.3 out of 10.0.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/servicenow-patches-critical-ai-platform.html&quot;&gt;https://thehackernews.com/2026/01/servicenow-patches-critical-ai-platform.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security updates for Tuesday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (mariadb10.11, mariadb:10.11, mariadb:10.3, mariadb:10.5, and tar), Debian (net-snmp), Fedora (coturn, NetworkManager-l2tp, openssh, and tuxanci), Mageia (libtasn1), Oracle (buildah, cups, httpd, kernel, libpq, libsoup, libsoup3, mariadb:10.11, mariadb:10.3, openssl, and podman), SUSE (cpp-httplib, ImageMagick, libtasn1, python-cbor2, util-linux, valkey, and wget2), and Ubuntu (google-guest-agent, linux-iot, and python-urllib3).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1053988/&quot;&gt;https://lwn.net/Articles/1053988/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Remote Code Execution With Modern AI/ML Formats and Libraries&lt;/h3&gt;

We identified remote code execution vulnerabilities in open-source AI/ML libraries published by Apple, Salesforce and NVIDIA.
&lt;p /&gt;
&lt;A HREF=&quot;https://unit42.paloaltonetworks.com/rce-vulnerabilities-in-ai-python-libraries/&quot;&gt;https://unit42.paloaltonetworks.com/rce-vulnerabilities-in-ai-python-libraries/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;YoSmart YoLink Smart Hub&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-013-03&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-013-03&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Rockwell Automation FactoryTalk DataMosaix Private Cloud&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-013-02&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-013-02&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Rockwell Automation 432ES-IG3 Series A&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-013-01&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-013-01&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security Vulnerabilities fixed in Firefox 147&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/&quot;&gt;https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-13T18:50:40Z</dc:date></entry><entry><title>Tageszusammenfassung - 12.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-12012026"/><author><name>CERT.at</name></author><updated>2026-01-12T18:25:46Z</updated><published>2026-01-12T18:25:46Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Freitag 09-01-2026 18:00 - Montag 12-01-2026 18:00
Handler:     Felician Fuchs
Co-Handler:  Alexander Riepl


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Max severity Ni8mare flaw impacts nearly 60,000 n8n instances&lt;/h3&gt;

Nearly 60,000 n8n instances exposed online remain unpatched against a maximum-severity vulnerability dubbed &quot;Ni8mare.&quot;
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-impacts-nearly-60-000-n8n-instances/&quot;&gt;https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-impacts-nearly-60-000-n8n-instances/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Spanish energy giant Endesa discloses data breach affecting customers&lt;/h3&gt;

Spanish energy provider Endesa and its Energía XXI operator are notifying customers that hackers accessed the companys systems and accessed contract-related information, which includes personal details.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/spanish-energy-giant-endesa-discloses-data-breach-affecting-customers/&quot;&gt;https://www.bleepingcomputer.com/news/security/spanish-energy-giant-endesa-discloses-data-breach-affecting-customers/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hidden Telegram proxy links can reveal your IP address in one click&lt;/h3&gt;

A single click on what may appear to be a Telegram username or harmless link is all it takes to expose your real IP address to attackers due to how proxy links are handled. Telegram says it will add warnings to proxy links after researchers demonstrated that such one-click interactions could reveal a Telegram users real IP address.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/hidden-telegram-proxy-links-can-reveal-your-ip-address-in-one-click/&quot;&gt;https://www.bleepingcomputer.com/news/security/hidden-telegram-proxy-links-can-reveal-your-ip-address-in-one-click/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Illicit Crypto Economy Surges Amid Increased Nation-State Activity&lt;/h3&gt;

Cybercriminal cryptocurrency transactions totaled billions in 2025, with activity from sanctioned countries like Russia and Iran causing the largest jump.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.darkreading.com/cyber-risk/illicit-crypto-economy-surges-nation-states&quot;&gt;https://www.darkreading.com/cyber-risk/illicit-crypto-economy-surges-nation-states&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Russia-s Fancy Bear APT Doubles Down on Global Secrets Theft&lt;/h3&gt;

The notorious state-sponsored group relies on basic techniques that are highly effective, often delivering greater ROI than more complex malware-heavy operations.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.darkreading.com/cyberattacks-data-breaches/russian-apt-credentials-global-targets&quot;&gt;https://www.darkreading.com/cyberattacks-data-breaches/russian-apt-credentials-global-targets&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Two Separate Campaigns Target Exposed LLM Services&lt;/h3&gt;

A total of 91,403 sessions targeted public LLM endpoints to find leaks in organizations use of AI and map an expanding attack surface.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.darkreading.com/endpoint-security/separate-campaigns-target-exposed-llm-services&quot;&gt;https://www.darkreading.com/endpoint-security/separate-campaigns-target-exposed-llm-services&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cybersecurity Act: EU-Kommission will hartes Verbot von Huawei&lt;/h3&gt;

Bisher freiwillige Beschränkungen gegen chinesische Ausrüster will die EU-Kommission nun zwangsweise umsetzen. Das ist in der EU stark umstritten und erscheint aus der Zeit gefallen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/cybersecurity-act-eu-kommission-will-hartes-verbot-von-huawei-2601-204031.html&quot;&gt;https://www.golem.de/news/cybersecurity-act-eu-kommission-will-hartes-verbot-von-huawei-2601-204031.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Lohnabrechnungen falsch verschickt: DSGVO-Vorfall bei der Datev&lt;/h3&gt;

Nach einer technischen Störung bei der Datev-Lohnabrechnung sind Kundendaten in falsche Hände gelangt. Auslöser war ausgerechnet ein Problemlösungsversuch.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/lohnabrechnungen-falsch-verschickt-dsgvo-vorfall-bei-der-datev-2601-204034.html&quot;&gt;https://www.golem.de/news/lohnabrechnungen-falsch-verschickt-dsgvo-vorfall-bei-der-datev-2601-204034.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud&lt;/h3&gt;

Cybersecurity researchers have shed light on two service providers that supply online criminal networks with the necessary tools and infrastructure to fuel the pig butchering-as-a-service (PBaaS) economy.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/researchers-uncover-service-providers.html&quot;&gt;https://thehackernews.com/2026/01/researchers-uncover-service-providers.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials&lt;/h3&gt;

A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and blockchain projects to co-opt them into a botnet thats capable of brute-forcing user passwords for services such as FTP, MySQL, PostgreSQL, and phpMyAdmin on Linux servers.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/gobruteforcer-botnet-targets-crypto.html&quot;&gt;https://thehackernews.com/2026/01/gobruteforcer-botnet-targets-crypto.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;UK government exempting itself from flagship cyber law inspires little confidence&lt;/h3&gt;

Ministers promise equivalent standards just without the legal obligation ANALYSIS From Mays cyberattack on the Legal Aid Agency to the Foreign Office breach months later, cyber incidents have become increasingly common in UK government.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.theregister.com/2026/01/10/csr_bill_analysis/&quot;&gt;https://www.theregister.com/2026/01/10/csr_bill_analysis/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Instagram-Datenleck: Daten von 6,2 Millionen Konten bei Have-I-Been-Pwned&lt;/h3&gt;

Daten von 6,2 Millionen Instagram-Nutzern sind beim Have-I-Been-Pwned-Projekt gelandet.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Instagram-6-2-Millionen-Nutzerdaten-mittels-Scraping-abgegriffen-11137222.html&quot;&gt;https://www.heise.de/news/Instagram-6-2-Millionen-Nutzerdaten-mittels-Scraping-abgegriffen-11137222.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;ÖIAT-Schwerpunkterhebung deckt auf: Massive Präsenz von Abo-Fallen in Google-Anzeigen&lt;/h3&gt;

Bei einer eingehenden Analyse der Google Werbebibliothek entdeckte das Österreichische Institut für angewandte Telekommunikation (ÖIAT) eine große Menge an gefährlichen Ads. Insgesamt waren es weit über 27.000 problematische Werbeanzeigen, die als Köder für Abo-Fallen dienten. Auf Beschwerden reagierte Google bisher nicht.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/schwerpunkterhebung-abo-fallen-google/&quot;&gt;https://www.watchlist-internet.at/news/schwerpunkterhebung-abo-fallen-google/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Basketball player arrested for alleged ransomware ties freed in Russia-France prisoner swap&lt;/h3&gt;

Daniil Kasatkin, 26, was seen in a video shared by Russian state news outlet TASS emerging from a plane that was then used to send French researcher Laurent Vinatier back to France.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/france-frees-russian-basketball-player-ransomware-swap&quot;&gt;https://therecord.media/france-frees-russian-basketball-player-ransomware-swap&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;MC1215070: MFA für Microsoft 365 Admin Center ab Feb. 2026 Pflicht&lt;/h3&gt;

Noch eine kurze Information für Administratoren von Microsoft 365-Tenants. Microsoft erzwingt aus Sicherheitsgründen ab dem 9. Februar 2026 eine Multifaktor-Authentifizierung (MFA) zur Administratoranmeldung am Microsoft 365 Admin Center. Ohne entsprechende Maßnahmen scheitert dann die Anmeldung.
&lt;p /&gt;
&lt;A HREF=&quot;https://borncity.com/blog/2026/01/11/mc1215070-mfa-fuer-microsoft-365-admin-center-kuenftig-pflicht/&quot;&gt;https://borncity.com/blog/2026/01/11/mc1215070-mfa-fuer-microsoft-365-admin-center-kuenftig-pflicht/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Database of 323,986 BreachForums Users Leaked as Admin Disputes Scope&lt;/h3&gt;

Database of 323,986 BreachForums users leaked online as forum admins claim the exposed data is partial and dates back to August 2025.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/breachforums-database-users-leak-admin-disputes/&quot;&gt;https://hackread.com/breachforums-database-users-leak-admin-disputes/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Everest Ransomware Claims Breach at Nissan, Says 900GB of Data Stolen&lt;/h3&gt;

Everest ransomware claims to have breached Nissan Motor Corporation, alleging the theft of 900GB of internal data, including documents and screenshots.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/everest-ransomware-nissan-data-breach/&quot;&gt;https://hackread.com/everest-ransomware-nissan-data-breach/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;How Safe is the Rust Ecosystem? A Deep Dive into crates.io&lt;/h3&gt;

The relentless wave of high-impact supply chain attacks throughout 2025-most notably the major incident within npm [..] -suggests this trend is far from peaking. In fact, with the rapid adoption of AI and LLMs in development workflows, we are likely facing an acceleration of these threats rather than a decline, in my opinion.
&lt;p /&gt;
&lt;A HREF=&quot;https://mr-leshiy-blog.web.app/blog/crates_io_analysis/&quot;&gt;https://mr-leshiy-blog.web.app/blog/crates_io_analysis/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Detection of Kerberos Golden Ticket Attacks via Velociraptor&lt;/h3&gt;

Kerberos is a strange technology. Over the years, I-ve gone through its internal workings again and again, yet parts of it always seem to slip away. It has been a while since I did my OSCP, so inevitably I-ve found myself back in this topic to refresh my knowledge.
&lt;p /&gt;
&lt;A HREF=&quot;https://detect.fyi/detection-of-kerberos-golden-ticket-attacks-via-velociraptor-cfe7cc26d3eb&quot;&gt;https://detect.fyi/detection-of-kerberos-golden-ticket-attacks-via-velociraptor-cfe7cc26d3eb&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Sicherheitsupdate: Dell-Laptops mit Adreno-GPU sind verwundbar&lt;/h3&gt;

Der Treiber von Qualcomms Adreno GPU ist löchrig und gefährdet die Sicherheit verschiedener Dell-Laptops. Ein reparierter Treiber steht zum Download bereit.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Sicherheitsupdate-Dell-Laptops-mit-Adreno-GPU-sind-verwundbar-11137255.html&quot;&gt;https://www.heise.de/news/Sicherheitsupdate-Dell-Laptops-mit-Adreno-GPU-sind-verwundbar-11137255.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security updates for Monday&lt;/h3&gt;

Security updates have been issued by Debian (chromium and sogo), Fedora (chromium, foomuuri, libpng, libsodium, mariadb10.11, musescore, nginx, python-pdfminer, python-urllib3, python3.12, seamonkey, wasmedge, and wget2), Mageia (curl, libpcap, sodium, wget2, and zlib), Slackware (lcms2), SUSE (chromedriver, chromium, noopenh264, coredns, curl, dcmtk, fontforge, gdk-pixbuf-loader-libheif, gimp, kernel, libheif, libpng16, libsoup-2_4-1, libvirt, mariadb, php8, poppler, python-filelock, python-tornado6, python311-aiohttp, qemu, sssd, and traefik), and Ubuntu (libheif, libtasn1-6, linux-azure-nvidia, linux-kvm, linux-raspi, linux-raspi-realtime, and php7.2, php7.4, php8.1, php8.3, php8.4).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1053820/&quot;&gt;https://lwn.net/Articles/1053820/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-12T18:25:46Z</dc:date></entry><entry><title>Tageszusammenfassung - 09.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-09012026"/><author><name>CERT.at</name></author><updated>2026-01-09T18:57:52Z</updated><published>2026-01-09T18:57:52Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Donnerstag 08-01-2026 18:00 - Freitag 09-01-2026 18:00
Handler:     Felician Fuchs
Co-Handler:  n/a


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;VMware ESXi zero-days likely exploited a year before disclosure&lt;/h3&gt;

Chinese-speaking threat actors used a compromised SonicWall VPN appliance to deliver a VMware ESXi exploit toolkit that seems to have been developed more than a year before the targeted vulnerabilities became publicly known.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/vmware-esxi-zero-days-likely-exploited-a-year-before-disclosure/&quot;&gt;https://www.bleepingcomputer.com/news/security/vmware-esxi-zero-days-likely-exploited-a-year-before-disclosure/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;FBI warns about Kimsuky hackers using QR codes to phish U.S. orgs&lt;/h3&gt;

The North Korean state-sponsored hacker group Kimsuki is using malicious QR codes in spearphishing campaigns that target U.S. organizations, the Federal Bureau of Investigation warns in a flash alert.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/fbi-warns-about-kimsuky-hackers-using-qr-codes-to-phish-us-orgs/&quot;&gt;https://www.bleepingcomputer.com/news/security/fbi-warns-about-kimsuky-hackers-using-qr-codes-to-phish-us-orgs/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;New China-linked hackers breach telcos using edge device exploits&lt;/h3&gt;

A sophisticated threat actor that uses Linux-based malware to target telecommunications providers has recently broadened its operations to include organizations in Southeastern Europe.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/new-china-linked-hackers-breach-telcos-using-edge-device-exploits/&quot;&gt;https://www.bleepingcomputer.com/news/security/new-china-linked-hackers-breach-telcos-using-edge-device-exploits/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Defeating KASLR by Doing Nothing at All&lt;/h3&gt;

I-ve recently been researching Pixel kernel exploitation and as part of this research I found myself with an excellent arbitrary write primitive-but without a KASLR leak. As necessity is the mother of all invention, on a hunch, I started researching the Linux kernel linear mapping.
&lt;p /&gt;
&lt;A HREF=&quot;https://projectzero.google/2025/11/defeating-kaslr-by-doing-nothing-at-all.html&quot;&gt;https://projectzero.google/2025/11/defeating-kaslr-by-doing-nothing-at-all.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Google Sees Spam, You See Your Site: A Cloaked SEO Spam Attack&lt;/h3&gt;

We recently handled a case where a customer reported strange SEO behavior on their website. Regular visitors saw a normal site. No popups. No redirects. No visible spam. However, when they checked their site on Google, the search results were flooded with eBay-type-looking websites and -Situs Toto- gambling spam. This is a professional-grade SEO cloaking attack.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.sucuri.net/2026/01/google-sees-spam-you-see-your-site-a-cloaked-seo-spam-attack.html&quot;&gt;https://blog.sucuri.net/2026/01/google-sees-spam-you-see-your-site-a-cloaked-seo-spam-attack.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations&lt;/h3&gt;

Russian state-sponsored threat actors have been linked to a fresh set of credential harvesting attacks targeting individuals associated with a Turkish energy and nuclear research agency, as well as staff affiliated with a European think tank and organizations in North Macedonia and Uzbekistan.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/russian-apt28-runs-credential-stealing.html&quot;&gt;https://thehackernews.com/2026/01/russian-apt28-runs-credential-stealing.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Auslegungssache 150: Auf digitaler Spurensuche&lt;/h3&gt;

Im ct-Datenschutz-Podcast erklärt eine IT-Forensikerin, wie sie nach Vorfällen Spuren sichert, mit Erpressern verhandelt und den Datenschutz im Blick behält.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/hintergrund/Auslegungssache-150-Auf-digitaler-Spurensuche-11134668.html&quot;&gt;https://www.heise.de/hintergrund/Auslegungssache-150-Auf-digitaler-Spurensuche-11134668.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Von München bis Sevilla: Internationaler Schlag gegen Cyber-Mafia -Black Axe-&lt;/h3&gt;

Ermittlern gelang in Spanien ein empfindlicher Schlag gegen die als -Black Axe- bekannte nigerianische Cyber-Mafia.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Von-Muenchen-bis-Sevilla-Internationaler-Schlag-gegen-Cyber-Mafia-Black-Axe-11135925.html&quot;&gt;https://www.heise.de/news/Von-Muenchen-bis-Sevilla-Internationaler-Schlag-gegen-Cyber-Mafia-Black-Axe-11135925.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Who Benefited from the Aisuru and Kimwolf Botnets?&lt;/h3&gt;

Our first story of 2026 revealed how a destructive new botnet called Kimwolf rapidly grew to infect more than two million devices by mass-compromising a vast number of unofficial Android TV streaming boxes. Today, well dig through digital clues left behind by the hackers, network operators, and cybercrime services that appear to have benefitted from Kimwolfs spread.
&lt;p /&gt;
&lt;A HREF=&quot;https://krebsonsecurity.com/2026/01/who-benefited-from-the-aisuru-and-kimwolf-botnets/&quot;&gt;https://krebsonsecurity.com/2026/01/who-benefited-from-the-aisuru-and-kimwolf-botnets/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CPPA fines data broker selling lists of Alzheimers patients&lt;/h3&gt;

Datamasters bought and resold the names, addresses, phone numbers and email addresses of millions of people with Alzheimer-s disease, drug addiction, bladder incontinence and other medical conditions for targeted advertising, according to the CPPA.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/ccpa-fines-data-broker-selling-lists-alzheimers&quot;&gt;https://therecord.media/ccpa-fines-data-broker-selling-lists-alzheimers&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Russian Hacktivists hack CCTV Cameras in Denmark&lt;/h3&gt;

The hacktivists had recorded part of the video stream from the CCTV as proof of the hack and published it. It was reported that no individuals were identifiable on the recording.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.truesec.com/hub/blog/russian-hacktivists-hack-cctv-cameras-in-denmark&quot;&gt;https://www.truesec.com/hub/blog/russian-hacktivists-hack-cctv-cameras-in-denmark&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CISCO-Switches gehen wegen DNS-Fehler in Boot-Schleifen&lt;/h3&gt;

Weltweit kämpfen Administratoren wohl damit, dass bestimmte Switches des Herstellers CISCO in einer Neustart-Schleife (Boot-Loop) gefangen sind. Das tritt auf, nachdem die Geräte einen DNS-Client-Fehler protokolliert haben.
&lt;p /&gt;
&lt;A HREF=&quot;https://borncity.com/blog/2026/01/09/cisco-switches-gehen-wegen-dns-fehler-in-boot-schleifen/&quot;&gt;https://borncity.com/blog/2026/01/09/cisco-switches-gehen-wegen-dns-fehler-in-boot-schleifen/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hacker Behind Wired.com Leak Now Selling Full 40M Condé Nast Records&lt;/h3&gt;

A hacker claims to be selling nearly 40 million Condé Nast user records after leaking Wired.com data, with multiple major brands allegedly affected.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/wired-com-hacker-data-leak-conde-nast-records/&quot;&gt;https://hackread.com/wired-com-hacker-data-leak-conde-nast-records/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Threat Actors Actively Targeting LLMs&lt;/h3&gt;

Our Ollama honeypot infrastructure captured 91,403 attack sessions between October 2025 and January 2026. Buried in that data: two distinct campaigns that reveal how threat actors are systematically mapping the expanding surface area of AI deployments.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.greynoise.io/blog/threat-actors-actively-targeting-llms&quot;&gt;https://www.greynoise.io/blog/threat-actors-actively-targeting-llms&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Do Smart People Ever Say They-re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691)&lt;/h3&gt;

Welcome to 2026! While we are all waiting for the scheduled SSLVPN ITW exploitation programming that occurs every January, we-re back from Christmas and idle hands, idle minds, yada yada. In December, we were alerted to a vulnerability in SmarterTools- SmarterMail solution, accompanied by an advisory from Singapore-s Cyber Security Agency (CSA) - CVE-2025-52691, a pre-auth RCE that obtained full marks (10/10) on the industry-s scale.
&lt;p /&gt;
&lt;A HREF=&quot;https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/&quot;&gt;https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Fake Windows Update and BSOD Alerts Used in a Tech Support Scam&lt;/h3&gt;

While reviewing submissions received through the WordPress feedback form on my website, I came across a URL that initially appeared unremarkable. Such submissions are common and often contain benign questions or comments, but this particular link stood out enough to warrant closer inspection.
&lt;p /&gt;
&lt;A HREF=&quot;https://malwr-analysis.com/2026/01/09/fake-windows-update-and-bsod-alerts-used-in-a-tech-support-scam/&quot;&gt;https://malwr-analysis.com/2026/01/09/fake-windows-update-and-bsod-alerts-used-in-a-tech-support-scam/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;VU#361400: BeeS Software Solutions BeeS Examination Tool (BET) portal contains SQL injection vulnerability&lt;/h3&gt;

The BeeS Examination Tool (BET) portal from BeeS Software Solutions contains an SQL injection vulnerability in its website login functionality. More than 100 universities use the BET portal for test administration and other academic tasks.
&lt;p /&gt;
&lt;A HREF=&quot;https://kb.cert.org/vuls/id/361400&quot;&gt;https://kb.cert.org/vuls/id/361400&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;RICOH Streamline NX vulnerable to improper authorization&lt;/h3&gt;

RICOH Streamline NX provided by Ricoh Company, Ltd. contains an improper authorization vulnerability.
&lt;p /&gt;
&lt;A HREF=&quot;https://jvn.jp/en/jp/JVN12770174/&quot;&gt;https://jvn.jp/en/jp/JVN12770174/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions&lt;/h3&gt;

Trend Micro has released security updates to address multiple security vulnerabilities impacting on-premise versions of Apex Central for Windows, including a critical bug that could result in arbitrary code execution. The vulnerability, tracked as CVE-2025-69258, carries a CVSS score of 9.8 out of a maximum of 10.0.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/trend-micro-apex-central-rce-flaw.html&quot;&gt;https://thehackernews.com/2026/01/trend-micro-apex-central-rce-flaw.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Mediaplayer VLC: Aktualisierte Version stopft zahlreiche Lücken&lt;/h3&gt;

Die Version 3.0.23 des VLC Media Player bessert diverse Schwachstellen aus, die möglicherweise Unterschieben von Schadcode erlauben.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/VLC-stopft-diverse-Sicherheitslecks-11135921.html&quot;&gt;https://www.heise.de/news/VLC-stopft-diverse-Sicherheitslecks-11135921.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security updates for Friday&lt;/h3&gt;

Security updates have been issued by Debian (pdfminer and vlc), Red Hat (kernel, kernel-rt, and microcode_ctl), Slackware (libtasn1), SUSE (apptainer, curl, ImageMagick, libpcap, libvirt, libwget4, php8, podman, python311-cbor2, qemu, and rsync), and Ubuntu (gnupg, gnupg2, gpsd, libsodium, and python-tornado).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1053492/&quot;&gt;https://lwn.net/Articles/1053492/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hitachi Energy Asset Suite&lt;/h3&gt;

Hitachi Energy is aware of a Jasper Report vulnerability that affects the Asset Suite product versions mentioned in this document below. This vulnerability can be exploited to carry out remote code execution (RCE) attack on the product. Please refer to the Recommended Immediate Actions for information about the mitigation/remediation.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cisa.gov/news-events/ics-advisories/icsa-26-008-01&quot;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-26-008-01&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;K000159018: Linux kernel vulnerability CVE-2023-53178&lt;/h3&gt;

A local unprivileged user may exploit this vulnerability and cause data integrity issues or system instability under specific conditions.
&lt;p /&gt;
&lt;A HREF=&quot;https://my.f5.com/manage/s/article/K000159018&quot;&gt;https://my.f5.com/manage/s/article/K000159018&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-09T18:57:52Z</dc:date></entry><entry><title>Tageszusammenfassung - 08.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-08012026"/><author><name>CERT.at</name></author><updated>2026-01-08T19:11:30Z</updated><published>2026-01-08T19:11:30Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Mittwoch 07-01-2026 18:00 - Donnerstag 08-01-2026 18:00
Handler:     Felician Fuchs
Co-Handler:  n/a


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;New GoBruteforcer attack wave targets crypto, blockchain projects&lt;/h3&gt;

A new wave of GoBruteforcer botnet malware attacks is targeting databases of cryptocurrency and blockchain projects on exposed servers believed to be configured using AI-generated examples.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/new-gobruteforcer-attack-wave-targets-crypto-blockchain-projects/&quot;&gt;https://www.bleepingcomputer.com/news/security/new-gobruteforcer-attack-wave-targets-crypto-blockchain-projects/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Cisco warns of Identity Service Engine flaw with exploit code&lt;/h3&gt;

Cisco has patched an ISE vulnerability with public proof-of-concept exploit code that can be abused by attackers with admin privileges.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/cisco-warns-of-identity-service-engine-flaw-with-exploit-code/&quot;&gt;https://www.bleepingcomputer.com/news/security/cisco-warns-of-identity-service-engine-flaw-with-exploit-code/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Dringend MFA aktivieren: Massenhaft Daten aus Cloud-Instanzen abgeflossen&lt;/h3&gt;

Betroffen sind self-hosted Instanzen von Owncloud, Nextcloud und Sharefile. Daten von 50 Organisationen stehen zum Verkauf, weil die MFA nicht aktiv war.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/dringend-mfa-aktivieren-massenhaft-daten-aus-cloud-instanzen-abgeflossen-2601-203932.html&quot;&gt;https://www.golem.de/news/dringend-mfa-aktivieren-massenhaft-daten-aus-cloud-instanzen-abgeflossen-2601-203932.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;NIS-2-Umsetzung: BSI schaltet Meldeportal auf Amazon-Servern frei&lt;/h3&gt;

Fast 30.000 Firmen und Behörden der kritischen Infrastruktur müssen sich beim BSI registrieren. Das Portal läuft auf Clouddiensten von AWS.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/nis-2-umsetzung-bsi-schaltet-meldeportal-auf-amazon-servern-frei-2601-203957.html&quot;&gt;https://www.golem.de/news/nis-2-umsetzung-bsi-schaltet-meldeportal-auf-amazon-servern-frei-2601-203957.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;BSI warnt: 40 Prozent der deutschen Zimbra-Server sind angreifbar&lt;/h3&gt;

Ein Großteil aller Zimbra-Server in Deutschland basiert noch auf einer veralteten Version, die anfällig für gefährliche Sicherheitslücken ist.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.golem.de/news/bsi-warnt-40-prozent-der-deutschen-zimbra-server-sind-angreifbar-2601-203959.html&quot;&gt;https://www.golem.de/news/bsi-warnt-40-prozent-der-deutschen-zimbra-server-sind-angreifbar-2601-203959.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Fake Browser Updates Targeting WordPress Administrators via Malicious Plugin&lt;/h3&gt;

We recently investigated a case involving a WordPress website where a customer reported persistent fake pop-up notifications appearing on their site. The warnings were urging them to update their browser (Chrome or Firefox), even though their software was already fully up-to-date.
&lt;p /&gt;
&lt;A HREF=&quot;https://blog.sucuri.net/2026/01/fake-browser-updates-targeting-wordpress-administrators-via-malicious-plugin.html&quot;&gt;https://blog.sucuri.net/2026/01/fake-browser-updates-targeting-wordpress-administrators-via-malicious-plugin.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited&lt;/h3&gt;

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting Microsoft Office and Hewlett Packard Enterprise (HPE) OneView to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/cisa-flags-microsoft-office-and-hpe.html&quot;&gt;https://thehackernews.com/2026/01/cisa-flags-microsoft-office-and-hpe.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packages&lt;/h3&gt;

Cybersecurity researchers have discovered three malicious npm packages that are designed to deliver a previously undocumented malware called NodeCordRAT.
&lt;p /&gt;
&lt;A HREF=&quot;https://thehackernews.com/2026/01/researchers-uncover-nodecordrat-hidden.html&quot;&gt;https://thehackernews.com/2026/01/researchers-uncover-nodecordrat-hidden.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;IBMs AI agent Bob easily duped to run malware, researchers show&lt;/h3&gt;

Prompt injection lets risky commands slip past guardrails IBM describes its coding agent thus: &quot;Bob is your AI software development partner that understands your intent, repo, and security standards.&quot; Unfortunately, Bob doesnt always follow those security standards.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.theregister.com/2026/01/07/ibm_bob_vulnerability/&quot;&gt;https://www.theregister.com/2026/01/07/ibm_bob_vulnerability/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Gemeinsam gegen Cyber-Kriminalität: Info-Offensive zum ESC-Ticketkauf&lt;/h3&gt;

Vor dem Start der ersten Ticket-Verkaufswelle am 13. Jänner sensibilisieren ORF, EBU, BMI, Stadt Wien, Polizei und -Watchlist Internet- für Cyber-Gefahren und richten eine zentrale Meldestelle für Betrugsversuche ein.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.watchlist-internet.at/news/gemeinsam-gegen-cyber-kriminalitaet-info-offensive-zum-esc-ticketkauf/&quot;&gt;https://www.watchlist-internet.at/news/gemeinsam-gegen-cyber-kriminalitaet-info-offensive-zum-esc-ticketkauf/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Stalkerware operator pleads guilty in rare prosecution&lt;/h3&gt;

The owner of a Michigan-based stalkerware company pleaded guilty to federal charges for selling a product designed to spy on people without their consent.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/stalkerware-guilty-plea-fleming&quot;&gt;https://therecord.media/stalkerware-guilty-plea-fleming&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Fake ChatGPT and DeepSeek Extensions Spied on Over 1 Million Chrome Users&lt;/h3&gt;

Security researchers have identified two malicious Chrome extensions recording AI chats. Learn how to identify and remove these tools to protect your privacy.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/fake-chatgpt-deepseek-extensions-spy-chrome-users/&quot;&gt;https://hackread.com/fake-chatgpt-deepseek-extensions-spy-chrome-users/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Discord Controlled NodeCordRAT Steals Chrome Data via NPM Packages&lt;/h3&gt;

Zscaler ThreatLabz identifies three malicious NPM packages mimicking Bitcoin libraries. The NodeCordRAT virus uses Discord commands to exfiltrate MetaMask data and Chrome passwords.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/discord-nodecordrat-steal-chrome-data-npm-packages/&quot;&gt;https://hackread.com/discord-nodecordrat-steal-chrome-data-npm-packages/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;The Ransomware Ground Game: How A Christmas Scanning Campaign Will Fuel 2026 Attacks&lt;/h3&gt;

Over four days in December, one operator scanned the internet with 240+ exploits, logging confirmed vulnerabilities that could power targeted intrusions in 2026.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.greynoise.io/blog/christmas-scanning-campaign-fuel-2026-attacks&quot;&gt;https://www.greynoise.io/blog/christmas-scanning-campaign-fuel-2026-attacks&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Decoding the GitHub recommendations for npm maintainers&lt;/h3&gt;

This blog post explores the rationale and implementation behind GitHubs security recommendations for npm maintainers following numerous high-profile supply-chain incidents. It details how hardening publishing infrastructure through trusted publishing, enforced two-factor authentication, and WebAuthn-based protocols can meaningfully increase the resilience of the ecosystem.
&lt;p /&gt;
&lt;A HREF=&quot;https://securitylabs.datadoghq.com/articles/decoding-the-recommendations-for-npm-maintainers/&quot;&gt;https://securitylabs.datadoghq.com/articles/decoding-the-recommendations-for-npm-maintainers/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Abusing ROPC to Bypass MFA - and How I Built a Detection for It in Microsoft Sentinel&lt;/h3&gt;

Among all the OAuth2 grant types available in Azure AD (now Microsoft Entra ID), the Resource Owner Password Credential (ROPC) flow remains one of the most misunderstood - and most abused.
&lt;p /&gt;
&lt;A HREF=&quot;https://detect.fyi/abusing-ropc-to-bypass-mfa-and-how-i-built-a-detection-for-it-in-microsoft-sentinel-135e46aeb7c9&quot;&gt;https://detect.fyi/abusing-ropc-to-bypass-mfa-and-how-i-built-a-detection-for-it-in-microsoft-sentinel-135e46aeb7c9&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Preparing for Post-Quantum Cryptography&lt;/h3&gt;

Learn what you can do today to prepare for Q-Day.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.wiz.io/blog/preparing-for-post-quantum-cryptography&quot;&gt;https://www.wiz.io/blog/preparing-for-post-quantum-cryptography&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;npm to Implement Staged Publishing After Turbulent Shift Off Classic Tokens&lt;/h3&gt;

The JavaScript ecosystem spent much of 2025 responding to a sustained run of supply chain attacks, but it was the multi-wave Shai-Hulud campaign that ultimately reset expectations for what large-scale, automated compromise looks like. By the end of the year, organizations with JavaScript-heavy infrastructure were no longer treating supply chain malware as an edge case, but as an operational risk that could spread faster than human review. Now, npm says it is preparing its next major response.
&lt;p /&gt;
&lt;A HREF=&quot;https://socket.dev/blog/npm-to-implement-staged-publishing&quot;&gt;https://socket.dev/blog/npm-to-implement-staged-publishing&lt;/a&gt;

&lt;hr&gt;
&lt;h3&gt;Crimson Collective Claims to Disconnect Brightspeed Internet Users After Hack&lt;/h3&gt;

The hacking group Crimson Collective claims to have access to Brightspeed-s infrastructure and is disconnecting users from the company-s home internet services. The group made its latest claims in a post on Telegram yesterday. -Hey BrightSpeed, we disconnected alot of your users home internet.. they might be complaining you should check,- the Telegram post says.
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/crimson-collective-disconnects-brightspeed/&quot;&gt;https://thecyberexpress.com/crimson-collective-disconnects-brightspeed/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions&lt;/h3&gt;

President Donald Trump has ordered the immediate withdrawal of the United States from several premier international bodies dedicated to cybersecurity, digital human rights, and countering hybrid warfare, as part of a major restructuring of American defense and diplomatic posture.
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/trump-orders-us-exit-from-cyber-coalitions/&quot;&gt;https://thecyberexpress.com/trump-orders-us-exit-from-cyber-coalitions/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan&lt;/h3&gt;

The UK government has revealed the Government Cyber Action Plan as a renewed effort to close the growing gap between escalating cyber threats and the public sector-s ability to respond effectively. The move comes amid a series of cyberattacks targeting UK retail and manufacturing sectors, incidents that have underscored broader vulnerabilities affecting critical services and government operations.
&lt;p /&gt;
&lt;A HREF=&quot;https://thecyberexpress.com/uk-government-cyber-action-plan/&quot;&gt;https://thecyberexpress.com/uk-government-cyber-action-plan/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Max severity Ni8mare flaw lets hackers hijack n8n servers&lt;/h3&gt;

A maximum severity vulnerability dubbed &quot;Ni8mare&quot; allows remote, unauthenticated attackers to take control over locally deployed instances of the N8N workflow automation platform.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-lets-hackers-hijack-n8n-servers/&quot;&gt;https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-lets-hackers-hijack-n8n-servers/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Critical jsPDF flaw lets hackers steal secrets via generated PDFs&lt;/h3&gt;

The jsPDF library for generating PDF documents in JavaScript applications is vulnerable to a critical vulnerability that allows an attacker to steal sensitive data from the local filesystem by including it in generated files.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/critical-jspdf-flaw-lets-hackers-steal-secrets-via-generated-pdfs/&quot;&gt;https://www.bleepingcomputer.com/news/security/critical-jspdf-flaw-lets-hackers-steal-secrets-via-generated-pdfs/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;The installers for multiple PIONEER products may insecurely load Dynamic Link Libraries&lt;/h3&gt;

The installers for multiple products provided by PIONEER CORPORATION may insecurely load Dynamic Link Libraries. Arbitrary code may be executed with the privileges of the running installer.
&lt;p /&gt;
&lt;A HREF=&quot;https://jvn.jp/en/jp/JVN17956874/&quot;&gt;https://jvn.jp/en/jp/JVN17956874/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;zlib: Kritische Sicherheitslücke ermöglicht Codeschmuggel - noch kein Update&lt;/h3&gt;

In einem Werkzeug der Kompressionsbibliothek zlib, die in zahlreichen Programmen und Betriebssystemen enthalten ist, haben IT-Forscher eine kritische Sicherheitslücke entdeckt. Sie ermöglicht unter Umständen das Einschleusen und Ausführen von Schadcode. Ein Update zum Stopfen des Sicherheitslecks gibt es bislang noch nicht.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/zlib-Kritische-Sicherheitsluecke-ermoeglicht-Codeschmuggel-noch-kein-Update-11133774.html&quot;&gt;https://www.heise.de/news/zlib-Kritische-Sicherheitsluecke-ermoeglicht-Codeschmuggel-noch-kein-Update-11133774.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Sieben kritische Sicherheitslücken mit Höchstwertung bedrohen Coolify&lt;/h3&gt;

Admins von Platform-as-a-Service-Umgebungen auf der Basis von Coolify sollten ihre Instanzen zügig auf den aktuellen Stand bringen. Geschieht das nicht, können Angreifer unter anderem an sieben -kritischen- Sicherheitslücken mit Höchstwertung (CVSS Score 10 von 10) ansetzen, um Server vollständig zu kompromittieren.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Sieben-kritische-Sicherheitsluecken-mit-Hoechstwertung-bedrohen-Coolify-11134510.html&quot;&gt;https://www.heise.de/news/Sieben-kritische-Sicherheitsluecken-mit-Hoechstwertung-bedrohen-Coolify-11134510.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Kanboard-Sicherheitslücke ermöglicht Anmeldung als beliebiger User&lt;/h3&gt;

Das Open-Source-Kanban Kanboard ist von drei Schwachstellen betroffen. Eine davon gilt den Entwicklern als kritisches Risiko und ermöglicht die Anmeldung als beliebiger User - sofern eine bestimmte Konfigurationsoption gesetzt ist.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Kanboard-Sicherheitsluecke-ermoeglicht-Anmeldung-als-beliebiger-User-11134247.html&quot;&gt;https://www.heise.de/news/Kanboard-Sicherheitsluecke-ermoeglicht-Anmeldung-als-beliebiger-User-11134247.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security updates for Thursday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (gcc-toolset-14-binutils, gcc-toolset-15-binutils, httpd, kernel, libpng, mariadb, mingw-libpng, poppler, python3.12, and ruby:3.3), Debian (foomuuri and libsodium), Fedora (python-pdfminer and wget2), Oracle (audiofile, bind, gcc-toolset-15-binutils, libpng, mariadb, mariadb10.11, mariadb:10.11, mariadb:10.5, mingw-libpng, poppler, and python3.12), Red Hat (git-lfs, kernel, libpng, libpq, mariadb:10.3, osbuild-composer, postgresql, postgresql:13, and postgresql:15), Slackware (curl), SUSE (c-ares-devel, capstone, curl, gpsd, ImageMagick, libpcap, log4j, python311-filelock, and python314), and Ubuntu (libcaca, libxslt, and net-snmp).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1053277/&quot;&gt;https://lwn.net/Articles/1053277/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;[R1] Nessus Agent Versions 11.0.3 and 10.9.3 Fix One Vulnerability&lt;/h3&gt;

A vulnerability has been identified in the installation/uninstallation of the Nessus Agent Tray App on Windows Hosts which could lead to escalation of privileges. Tenable has released Nessus Agent 11.0.3 and Nessus Agent 10.9.3 to address these issues.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.tenable.com/security/tns-2026-01&quot;&gt;https://www.tenable.com/security/tns-2026-01&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CVE-2025-42877: Memory Corruption in SAP Web Dispatcher&lt;/h3&gt;

SAP Web Dispatcher and Internet Communication Manager (ICM) contain a critical memory corruption vulnerability in the HTTP header parsing function. The vulnerability allows an unauthenticated attacker to cause heap corruption and lead to Denial of Service through specially crafted HTTP requests.
&lt;p /&gt;
&lt;A HREF=&quot;https://redrays.io/blog/cve-2025-42877-sap-web-dispatcher-memory-corruption-analysis/&quot;&gt;https://redrays.io/blog/cve-2025-42877-sap-web-dispatcher-memory-corruption-analysis/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Case opened: DIVD-2025-00011 - Severe vulnerabilities in Growatt portal&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://csirt.divd.nl/cases/DIVD-2025-00011/&quot;&gt;https://csirt.divd.nl/cases/DIVD-2025-00011/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-08T19:11:30Z</dc:date></entry><entry><title>Tageszusammenfassung - 07.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-07012026"/><author><name>CERT.at</name></author><updated>2026-01-07T18:14:42Z</updated><published>2026-01-07T18:14:42Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Montag 05-01-2026 18:00 - Mittwoch 07-01-2026 18:00
Handler:     Alexander Riepl
Co-Handler:  n/a


&lt;h2&gt;      News       &lt;/h2&gt;



&lt;h3&gt;New D-Link flaw in legacy DSL routers actively exploited in attacks&lt;/h3&gt;

Threat actors are exploiting a recently discovered command injection vulnerability that affects multiple D-Link DSL gateway routers that went out of support years ago.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/new-d-link-flaw-in-legacy-dsl-routers-actively-exploited-in-attacks/&quot;&gt;https://www.bleepingcomputer.com/news/security/new-d-link-flaw-in-legacy-dsl-routers-actively-exploited-in-attacks/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;ownCloud urges users to enable MFA after credential theft reports&lt;/h3&gt;

File-sharing platform ownCloud warned users today to enable multi-factor authentication (MFA) to block attackers using compromised credentials from stealing their data.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/owncloud-urges-users-to-enable-mfa-after-credential-theft-reports/&quot;&gt;https://www.bleepingcomputer.com/news/security/owncloud-urges-users-to-enable-mfa-after-credential-theft-reports/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Microsoft: Classic Outlook bug prevents opening encrypted emails&lt;/h3&gt;

Microsoft has confirmed a known issue that prevents recipients from opening encrypted emails in classic Outlook.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/microsoft/microsoft-classic-outlook-bug-prevents-opening-encrypted-emails/&quot;&gt;https://www.bleepingcomputer.com/news/microsoft/microsoft-classic-outlook-bug-prevents-opening-encrypted-emails/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Founder of Spyware Maker PcTattletale Pleads Guilty To Hacking, Advertising Surveillance Software&lt;/h3&gt;

An anonymous reader quotes a report from TechCrunch: The founder of a U.S.-based spyware company, whose surveillance products allowed customers to spy on the phones and computers of unsuspecting victims, pleaded guilty to federal charges linked to his long-running operation. pcTattletale founder Bryan Fleming entered a guilty plea in a San Diego federal ..
&lt;p /&gt;
&lt;A HREF=&quot;https://yro.slashdot.org/story/26/01/07/0033238/founder-of-spyware-maker-pctattletale-pleads-guilty-to-hacking-advertising-surveillance-software&quot;&gt;https://yro.slashdot.org/story/26/01/07/0033238/founder-of-spyware-maker-pctattletale-pleads-guilty-to-hacking-advertising-surveillance-software&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;UK injects just £210M into cyber plan to stop Whitehall getting pwnd&lt;/h3&gt;

Central government will supposedly be as secure as energy facilities and datacenters under new proposals The UK today launches its Government Cyber Action Plan, committing £210 million ($282 million) to strengthen defenses across digital public services and hold itself to the same cybersecurity standards its imposing on critical infrastructure operators.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.theregister.com/2026/01/06/government_cyber_action_plan/&quot;&gt;https://www.theregister.com/2026/01/06/government_cyber_action_plan/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Malicious NPM Packages Deliver NodeCordRAT&lt;/h3&gt;

Zscaler ThreatLabz regularly monitors the npm database for suspicious packages. In November 2025, ThreatLabz identified three malicious packages: bitcoin-main-lib, bitcoin-lib-js, and bip40. The bitcoin-main-lib and bitcoin-lib-js packages execute a postinstall.cjs script during installation, which installs bip40, the package that contains the ..
&lt;p /&gt;
&lt;A HREF=&quot;https://www.zscaler.com/blogs/security-research/malicious-npm-packages-deliver-nodecordrat&quot;&gt;https://www.zscaler.com/blogs/security-research/malicious-npm-packages-deliver-nodecordrat&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;CISA-Katalog attackierter Schwachstellen wuchs 2025 um 20 Prozent&lt;/h3&gt;

Die US-amerikanische IT-Sicherheitsbehörde CISA pflegt einen Katalog angegriffener Schwachstellen. Der wuchs 2025 etwas schneller.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/CISA-Katalog-attackierter-Schwachstellen-wuchs-2025-um-20-Prozent-11130460.html&quot;&gt;https://www.heise.de/news/CISA-Katalog-attackierter-Schwachstellen-wuchs-2025-um-20-Prozent-11130460.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Patchday: Dolby-Digital-Sicherheitslücke in Android geschlossen&lt;/h3&gt;

Androidgeräte sind für eine Zero-Click-Attacke anfällig. Dieses Sicherheitsproblem wurde nun gelöst.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Patchday-Dolby-Digital-Sicherheitsluecke-in-Android-geschlossen-11130450.html&quot;&gt;https://www.heise.de/news/Patchday-Dolby-Digital-Sicherheitsluecke-in-Android-geschlossen-11130450.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Ubiquiti UniFi Protect: Sicherheitslücke ermöglicht Zugriff auf Kameras&lt;/h3&gt;

In der UniFi Protect Application können Angreifer Schwachstellen für unbefugten Zugriff auf Kameras und DoS-Attacken missbrauchen.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Ubiquiti-UniFi-Protect-Sicherheitsluecke-ermoeglicht-Zugriff-auf-Kameras-11131097.html&quot;&gt;https://www.heise.de/news/Ubiquiti-UniFi-Protect-Sicherheitsluecke-ermoeglicht-Zugriff-auf-Kameras-11131097.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Mehrere Sicherheitslücken bedrohen Veeam Back &amp; Replication&lt;/h3&gt;

Ein wichtiges Sicherheitsupdate schließt mehrere Schwachstellen in Veeam Back &amp; Replication. Bislang sind keine Attacken bekannt.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Mehrere-Sicherheitsluecken-bedrohen-Veeam-Back-Replication-11132196.html&quot;&gt;https://www.heise.de/news/Mehrere-Sicherheitsluecken-bedrohen-Veeam-Back-Replication-11132196.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Krypto-Phishing mit angeblicher Mail des Bundeszentralamts für Steuern&lt;/h3&gt;

Eine aktuelle Phishing-Welle behauptet Abweichungen bei -Krypto-Angaben- beim Bundeszentralamt für Steuern.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Krypto-Phishing-mit-angeblicher-Mail-des-Bundeszentralamts-fuer-Steuern-11132880.html&quot;&gt;https://www.heise.de/news/Krypto-Phishing-mit-angeblicher-Mail-des-Bundeszentralamts-fuer-Steuern-11132880.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;2025, the year of the Infostealer&lt;/h3&gt;

TL;DR Introduction Infostealers are not new malware. They have been around for decades. What has changed is how effective they have become, and how easily they blend into normal user behaviour. In 2025, infostealers became the fastest growing malware category, overtaking ransomware in terms of deployment and spread. The H1 2025 reports highlighted a sharp rise in simple ..
&lt;p /&gt;
&lt;A HREF=&quot;https://www.pentestpartners.com/security-blog/2025-the-year-of-the-infostealer/&quot;&gt;https://www.pentestpartners.com/security-blog/2025-the-year-of-the-infostealer/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Russian hackers target European hospitality industry with -blue screen of death- malware&lt;/h3&gt;

The scheme starts with a fake reservation cancellation that impersonates a popular booking site, and eventually prompts victims with an error message and -Blue Screen of Death- page.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/russian-hackers-europe-hospitality-blue-screen&quot;&gt;https://therecord.media/russian-hackers-europe-hospitality-blue-screen&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Alleged cyber scam kingpin arrested, extradited to China&lt;/h3&gt;

Chen Zhi-s arrest is the latest chapter in the remarkable downfall of one of the country-s most prominent businesses, with holdings in the real estate, banking, entertainment and airline industries.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/alleged-cyber-scam-kingpin-cambodia-arrested-extradited&quot;&gt;https://therecord.media/alleged-cyber-scam-kingpin-cambodia-arrested-extradited&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Analysis of a Fake Cloudflare Turnstile Used as a Traffic Filtering Gate&lt;/h3&gt;

During analysis of a phishing URL chain, I observed a fake Cloudflare Turnstile verification page acting as an intelligent traffic filtering gate. Rather than protecting a website, this page selectively blocks, redirects, or allows access based on geolocation, proxy usage, and browser fingerprinting. This phishing infrastructure demonstrates Traffic Distribution System like behavior ..
&lt;p /&gt;
&lt;A HREF=&quot;https://malwr-analysis.com/2026/01/07/analysis-of-a-fake-cloudflare-turnstile-used-as-a-traffic-filtering-gate/&quot;&gt;https://malwr-analysis.com/2026/01/07/analysis-of-a-fake-cloudflare-turnstile-used-as-a-traffic-filtering-gate/&lt;/a&gt;

&lt;hr&gt;


&lt;h2&gt; Vulnerabilities &lt;/h2&gt;



&lt;h3&gt;Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability&lt;/h3&gt;

A vulnerability in the licensing features of&amp;nbsp;Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information.&amp;nbsp; This vulnerability is due to improper parsing of XML that is processed by the web-based management interface of Cisco ISE and Cisco ISE-PIC. An attacker could exploit this vulnerability by uploading a malicious file to ..
&lt;p /&gt;
&lt;A HREF=&quot;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt&quot;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities&lt;/h3&gt;

Multiple Cisco products are affected by vulnerabilities in the processing of Distributed Computing Environment Remote Procedure Call (DCE/RPC) requests that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to leak sensitive information or to restart, which would result in an interruption of packet inspection. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address ..
&lt;p /&gt;
&lt;A HREF=&quot;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-dcerpc-vulns-J9HNF4tH&quot;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-dcerpc-vulns-J9HNF4tH&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;[20260101] - Core - Inadequate content filtering for data URLs&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://developer.joomla.org/security-centre/1016-20260101-core-inadequate-content-filtering-for-data-urls.html&quot;&gt;https://developer.joomla.org/security-centre/1016-20260101-core-inadequate-content-filtering-for-data-urls.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;[20260102] - Core - XSS vector in the pagebreak plugin&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://developer.joomla.org/security-centre/1017-20260102-core-xss-vector-in-the-pagebreak-plugin.html&quot;&gt;https://developer.joomla.org/security-centre/1017-20260102-core-xss-vector-in-the-pagebreak-plugin.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;[20260102] - Core - XSS vectors in the pagebreak and pagenavigation plugins&lt;/h3&gt;
&lt;p /&gt;
&lt;A HREF=&quot;https://developer.joomla.org/security-centre/1017-20260102-core-xss-vector-in-the-pagebreak-plugin.html&quot;&gt;https://developer.joomla.org/security-centre/1017-20260102-core-xss-vector-in-the-pagebreak-plugin.html&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-07T18:14:42Z</dc:date></entry><entry><title>Tageszusammenfassung - 05.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-05012026"/><author><name>CERT.at</name></author><updated>2026-01-05T18:06:37Z</updated><published>2026-01-05T18:06:37Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Freitag 02-01-2026 18:00 - Montag 05-01-2026 18:00
Handler:     Alexander Riepl
Co-Handler:  n/a


&lt;h2&gt;      News       &lt;/h2&gt;



&lt;h3&gt;Hackers claim to hack Resecurity, firm says it was a honeypot&lt;/h3&gt;

The ShinyHunters hacking group claims it breached the systems of cybersecurity firm Resecurity and stole internal data, while Resecurity says the attackers only accessed a deliberately deployed honeypot containing fake information used to monitor their activity.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/hackers-claim-resecurity-hack-firm-says-it-was-a-honeypot/&quot;&gt;https://www.bleepingcomputer.com/news/security/hackers-claim-resecurity-hack-firm-says-it-was-a-honeypot/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;How to Protect Your iPhone or Android Device From Spyware&lt;/h3&gt;

Being targeted by sophisticated spyware is relatively rare, but experts say that everyone needs to stay vigilant as this dangerous malware continues to proliferate worldwide.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.wired.com/story/how-to-protect-your-iphone-or-android-device-from-spyware/&quot;&gt;https://www.wired.com/story/how-to-protect-your-iphone-or-android-device-from-spyware/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Plex Media Server: Noch ungepatchte Zugriffsschwachstellen&lt;/h3&gt;

Im Plex Media Server klaffen Sicherheitslecks, durch die Angreifer sich unbefugt Zugriff verschaffen können. Updates stehen aus.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/Plex-Media-Server-Noch-ungepatchte-Zugriffsschwachstellen-11128582.html&quot;&gt;https://www.heise.de/news/Plex-Media-Server-Noch-ungepatchte-Zugriffsschwachstellen-11128582.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;MongoBleed-Scanner für Admins&lt;/h3&gt;

Viele MongoDB-Instanzen sind oder waren potenziell für MongoBleed anfällig. Ein Tool hilft bei der Server-Analyse auf Angriffsspuren.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.heise.de/news/MongoBleed-Scanner-fuer-Admins-11129291.html&quot;&gt;https://www.heise.de/news/MongoBleed-Scanner-fuer-Admins-11129291.html&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Taiwan: 2,6 Millionen Cyberangriffe Chinas pro Tag&lt;/h3&gt;

Die Angriffe haben laut Taiwan in zeitlicher Nähe zu Militärübungen stattgefunden. China dementiert
&lt;p /&gt;
&lt;A HREF=&quot;https://www.derstandard.at/story/3000000302832/taiwan-26-millionen-cyberangriffe-chinas-pro-tag&quot;&gt;https://www.derstandard.at/story/3000000302832/taiwan-26-millionen-cyberangriffe-chinas-pro-tag&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Aktuelle Angriffe gegen alte Sicherheitslücke in Fortinet-Geräten (CVE-2020-12812)&lt;/h3&gt;

Eine bereits seit Juli 2020 bekannte Sicherheitslücke in Fortinet-Firewalls, CVE-2020-12812, wird aktuell aktiv ausgenutzt. Durch Ausnutzung der Schwachstelle können Angreifer:innen durch eine simple Manipulation von Groß- und Kleinbuchstaben in Benutzernamen (z. B. &quot;Mmueller&quot; statt &quot;mmueller&quot;) die Zwei-Faktor-Authentifizierung (2FA) über Fortitoken umgehen. Besonders gefährdet sind Systeme, die lokale Nutzer:innen über einen ..
&lt;p /&gt;
&lt;A HREF=&quot;https://www.cert.at/de/aktuelles/2026/1/aktuelle-angriffe-gegen-alte-sicherheitslucke-in-fortinet-geraten-cve-2020-12812&quot;&gt;https://www.cert.at/de/aktuelles/2026/1/aktuelle-angriffe-gegen-alte-sicherheitslucke-in-fortinet-geraten-cve-2020-12812&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Nearly 480,000 impacted by Covenant Health data breach&lt;/h3&gt;

A cyberattack last year against the Catholic healthcare organization Covenant Health exposed the sensitive information of more than 478,000 people.
&lt;p /&gt;
&lt;A HREF=&quot;https://therecord.media/covenant-health-breach-qilin&quot;&gt;https://therecord.media/covenant-health-breach-qilin&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;NordVPN Denies Breach After Hacker Claims Access to Salesforce Dev Data&lt;/h3&gt;

A hacker using the alias 1011 has claimed to breach a NordVPN development server, posting what appears to-
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/nordvpn-denies-breach-hacker-salesforce-dev-data/&quot;&gt;https://hackread.com/nordvpn-denies-breach-hacker-salesforce-dev-data/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Schlappe für Softwarebauer: BSI darf Sicherheitskonzept als -auffällig- rügen&lt;/h3&gt;

Das Verwaltungsgericht Köln hat den Eilantrag eines Herstellers gegen eine drohende behördliche Warnung abgewiesen und die BSI-Informationsbefugnisse gestärkt.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11127661&quot;&gt;https://heise.de/-11127661&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Sicherheitsupdates: Verschiedene Attacken auf Qnap-NAS möglich&lt;/h3&gt;

Stimmten die Voraussetzungen, können Angreifer Netzwerkspeicher von Qnap mit weitreichenden Folgen attackieren.
&lt;p /&gt;
&lt;A HREF=&quot;https://heise.de/-11129647&quot;&gt;https://heise.de/-11129647&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;The Kimwolf Botnet is Stalking Your Local Network&lt;/h3&gt;

The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and it-s time for a broader awareness of the threat. The short version is that everything you thought you knew about the security of the internal network behind your Internet router probably is now dangerously out of date.
&lt;p /&gt;
&lt;A HREF=&quot;https://krebsonsecurity.com/2026/01/the-kimwolf-botnet-is-stalking-your-local-network/&quot;&gt;https://krebsonsecurity.com/2026/01/the-kimwolf-botnet-is-stalking-your-local-network/&lt;/a&gt;

&lt;hr&gt;


&lt;h2&gt; Vulnerabilities &lt;/h2&gt;



&lt;h3&gt;Security updates for Monday&lt;/h3&gt;

Security updates have been issued by AlmaLinux (tar), Debian (curl and gimp), Fedora (doctl, gitleaks, gnupg2, grpcurl, nginx, nginx-mod-brotli, nginx-mod-fancyindex, nginx-mod-headers-more, nginx-mod-modsecurity, nginx-mod-naxsi, nginx-mod-vts, and usd), Mageia (cups), Red Hat (container-tools:rhel8, go-toolset:rhel8, grafana, and skopeo), and SUSE (dirmngr, fluidsynth, gnu-recutils, libmatio-devel, python311-marshmallow, python312-Django6, rsync, and thunderbird).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1052795/&quot;&gt;https://lwn.net/Articles/1052795/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-05T18:06:37Z</dc:date></entry><entry><title>Tageszusammenfassung - 02.01.2026</title><link rel="alternate" href="https://www.cert.at/de/tagesberichte/2026/1/tagesberichte-02012026"/><author><name>CERT.at</name></author><updated>2026-01-02T18:22:02Z</updated><published>2026-01-02T18:22:02Z</published><summary type="html">&lt;h2&gt;End-of-Day report&lt;/h2&gt;


Timeframe:   Dienstag 30-12-2025 18:00 - Freitag 02-01-2026 18:00
Handler:     Michael Schlagenhaufer
Co-Handler:  Alexander Riepl


&lt;h2&gt;      News       &lt;/h2&gt;


&lt;h3&gt;Over 10K Fortinet firewalls exposed to actively exploited 2FA bypass&lt;/h3&gt;

Fortinet released FortiOS versions 6.4.1, 6.2.4, and 6.0.10 in July 2020 to address this flaw (tracked as CVE-2020-12812) and advised admins who couldn't immediately patch to turn off username-case-sensitivity to block 2FA bypass attempts targeting their devices. [..] On Friday, Internet security watchdog Shadowserver revealed that it currently tracks over 10,000 Fortinet firewalls still exposed on the Internet that are unpatched against CVE-2020-12812 and vulnerable to these ongoing attacks ...
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/over-10-000-fortinet-firewalls-exposed-to-ongoing-2fa-bypass-attacks/&quot;&gt;https://www.bleepingcomputer.com/news/security/over-10-000-fortinet-firewalls-exposed-to-ongoing-2fa-bypass-attacks/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;The Kimwolf Botnet is Stalking Your Local Network&lt;/h3&gt;

The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and its time for a broader awareness of the threat. The short version is that everything you thought you knew about the security of the internal network behind your Internet router probably is now dangerously out of date.
&lt;p /&gt;
&lt;A HREF=&quot;https://krebsonsecurity.com/2026/01/the-kimwolf-botnet-is-stalking-your-local-network/&quot;&gt;https://krebsonsecurity.com/2026/01/the-kimwolf-botnet-is-stalking-your-local-network/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Everest Ransomware Leaks 1TB of Stolen ASUS Data&lt;/h3&gt;

On December 2, 2025, Hackread.com exclusively reported that the Everest ransomware group claimed to have stolen 1TB of sensitive ASUS data, including information related to the company-s AI models, memory dumps, and calibration files. [..] Everest has now leaked the entire dataset online.
&lt;p /&gt;
&lt;A HREF=&quot;https://hackread.com/everest-ransomware-asus-data-leak/&quot;&gt;https://hackread.com/everest-ransomware-asus-data-leak/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;RondoDox botnet exploits React2Shell flaw to breach Next.js servers&lt;/h3&gt;

The RondoDox botnet has been observed exploiting the critical React2Shell flaw (CVE-2025-55182) to infect vulnerable Next.js servers with malware and cryptominers.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/rondodox-botnet-exploits-react2shell-flaw-to-breach-nextjs-servers/&quot;&gt;https://www.bleepingcomputer.com/news/security/rondodox-botnet-exploits-react2shell-flaw-to-breach-nextjs-servers/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;The biggest cybersecurity and cyberattack stories of 2025&lt;/h3&gt;

2025 was a big year for cybersecurity, with cyberattacks, data breaches, threat groups reaching new notoriety levels, and, of course, zero-day flaws exploited in breaches. Some stories, though, were more impactful or popular with our readers than others. This article explores 15 of the biggest cybersecurity stories of 2025.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2025/&quot;&gt;https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2025/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Hong Kong-s newest anti-scam technology is over-the-counter banking&lt;/h3&gt;

Hong Kong-s banks have a new weapon against scams: Accounts that require customers to visit a branch to access their funds.
&lt;p /&gt;
&lt;A HREF=&quot;https://go.theregister.com/feed/www.theregister.com/2025/12/31/hong_kong_antiscam_money_safe/&quot;&gt;https://go.theregister.com/feed/www.theregister.com/2025/12/31/hong_kong_antiscam_money_safe/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;How AI made scams more convincing in 2025&lt;/h3&gt;

Several AI-related stories in 2025 highlighted how quickly AI systems can move beyond meaningful human control.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.malwarebytes.com/blog/news/2026/01/how-ai-made-scams-more-convincing-in-2025&quot;&gt;https://www.malwarebytes.com/blog/news/2026/01/how-ai-made-scams-more-convincing-in-2025&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;VVS Discord Stealer Using Pyarmor for Obfuscation and Detection Evasion&lt;/h3&gt;

Discord is a social messaging and communications platform that has become a popular target for malware, like VVS stealer. VVS stealer is designed to steal a victim's Discord information and browser data. [..] The stealer also achieves persistence by automatically installing itself on startup. It operates stealthily by displaying fake error messages and capturing screenshots.
&lt;p /&gt;
&lt;A HREF=&quot;https://unit42.paloaltonetworks.com/vvs-stealer/&quot;&gt;https://unit42.paloaltonetworks.com/vvs-stealer/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Snipping the Long Tail of Shai-Hulud 2.0&lt;/h3&gt;

Wiz Research reveals the data behind Shai-Huluds 2.0 long tail, the massive gap in cloud credential rotation, a potential link to the Trust Wallet incident, and how we finally &quot;snipped the tail&quot; on a month of ongoing infections.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.wiz.io/blog/snipping-the-long-tail-of-shai-hulud-2-0&quot;&gt;https://www.wiz.io/blog/snipping-the-long-tail-of-shai-hulud-2-0&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;RMM Abuse in a Crypto Wallet Distribution Campaign&lt;/h3&gt;

A professionally written announcement email titled -Eternl Desktop Is Live - Secure Execution for Atrium &amp; Diffusion Participants- is currently circulating within the Cardano community. [..] This campaign exhibits multiple overlapping indicators consistent with supply-chain abuse and trojanized wallet distribution, combined with pre positioning techniques that leverage RMM tools to establish persistent access.
&lt;p /&gt;
&lt;A HREF=&quot;https://malwr-analysis.com/2025/12/31/rmm-abuse-in-a-crypto-wallet-distribution-campaign/&quot;&gt;https://malwr-analysis.com/2025/12/31/rmm-abuse-in-a-crypto-wallet-distribution-campaign/&lt;/a&gt;




&lt;h2&gt; Vulnerabilities &lt;/h2&gt;


&lt;h3&gt;Gambio: Wichtiges Security Update 2025-12 v1.0.0 für alle Versionen bis GX5 v5.0.1.0&lt;/h3&gt;

Wir haben soeben ein neues Security Update Paket veröffentlicht, dessen Installation wir allen Shopbetreibern dringend empfehlen. Wichtig: Nutzer der Gambio Cloud müssen nichts unternehmen, alle Shops wurden bereits vollständig von uns abgesichert! [..] Bitte versteht, dass wir keine Details beschreiben werden, die Angreifern als Blaupause für einen Angriff dienen könnten.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.gambio.de/forum/threads/wichtiges-security-update-2025-12-v1-0-0-fuer-alle-versionen-bis-gx5-v5-0-1-0.52593/&quot;&gt;https://www.gambio.de/forum/threads/wichtiges-security-update-2025-12-v1-0-0-fuer-alle-versionen-bis-gx5-v5-0-1-0.52593/&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;QNAP Security Advisories 3. Jan&lt;/h3&gt;

QNAP has released 7 new security advisories.
&lt;p /&gt;
&lt;A HREF=&quot;https://www.qnap.com/en-us/security-advisories&quot;&gt;https://www.qnap.com/en-us/security-advisories&lt;/a&gt;

&lt;hr&gt;

&lt;h3&gt;Security updates for Friday&lt;/h3&gt;

Security updates have been issued by Debian (smb4k), Fedora (direwolf, gh, usd, and webkitgtk), Slackware (libpcap and seamonkey), and SUSE (kepler).
&lt;p /&gt;
&lt;A HREF=&quot;https://lwn.net/Articles/1052600/&quot;&gt;https://lwn.net/Articles/1052600/&lt;/a&gt;</summary><dc:creator>CERT.at</dc:creator><dc:date>2026-01-02T18:22:02Z</dc:date></entry></feed>
