Overview
Description
Statistics
- 23 Posts
- 19 Interactions
Fediverse
RE: https://mastodon.social/@campuscodi/116006284031729445
More on this campaign from Zscaler: https://www.zscaler.com/blogs/security-research/apt28-leverages-cve-2026-21509-operation-neusploit
Other targets also include Romania and Slovakia
"Microsoft Office zero-day actively exploited" 🕵️ 🙄
(CVSS 7.8)
https://hackingpassion.com/office-zero-day-cve-2026-21509
#cve202621509 #cybersec #cybersecurity #infosec #microsoft #office #microsoftoffice #ole
Latest News (Feb 2-3, 2026):
Global: India and the US have finalized a trade deal. Pakistani forces killed 145 militants in Balochistan after coordinated attacks.
Tech: SpaceX merged with xAI, announcing plans for space-based AI data centers. Oracle plans a $50B expansion for AI cloud infrastructure.
Cybersecurity: A Russian hacker alliance, "Russian Legion," threatens a major cyberattack on Denmark. Russia-linked APT28 exploits a new Microsoft Office flaw (CVE-2026-21509) in attacks across Ukraine and the EU.
Russian hackers, identified as APT28, are actively exploiting a recently patched Microsoft Office vulnerability (CVE-2026-21509) to deploy malware, including the COVENANT framework, via malicious documents. These attacks, targeting Ukrainian and other EU organizations, utilize a complex download chain involving COM hijacking and cloud storage for command-and-control.
https://www.bleepingcomputer.com/news/security/russian-hackers-exploit-recently-patched-microsoft-office-bug-in-attacks/
Bluesky
Overview
- OpenClaw
- OpenClaw
Description
Statistics
- 5 Posts
- 3 Interactions
Fediverse
OpenClaw – CVE-2026-25253 : un lien malveillant suffit à exécuter du code à distance en 1-clic https://www.it-connect.fr/openclaw-cve-2026-25253-un-lien-malveillant-suffit-a-executer-du-code-a-distance-en-1-clic/ #ActuCybersécurité #Cybersécurité #IA
Bluesky
Overview
- @react-native-community/cli-server-api
Description
Statistics
- 6 Posts
- 3 Interactions
Fediverse
Our team wrote about in-the-wild exploitation of React Metro Server CVE-2025-11953, which VulnCheck's Canary Intelligence network detected for the first time in December 2025.
🚨 Researchers detect active exploitation of a critical React Native CLI flaw.
CVE-2025-11953 allows unauthenticated OS command execution on exposed Metro dev servers, with attacks deploying PowerShell and a Rust payload.
🔗 Read → https://thehackernews.com/2026/02/hackers-exploit-metro4shell-rce-flaw-in.html
Hackers are actively exploiting a critical remote code execution vulnerability (CVE-2025-11953) in React Native's Metro Development Server to deliver malware on Windows and Linux systems. The vulnerability, dubbed Metro4Shell, stems from an OS command injection flaw in the /open-url endpoint and has a critical CVSS score of 9.8, yet exploitation is occurring before widespread public awareness.
https://cybersecuritynews.com/react-native-metro-server-exploit/
Bluesky
Overview
- Kubernetes
- ingress-nginx
Description
Statistics
- 4 Posts
- 2 Interactions
Fediverse
CVE-2026-24512: ingress-nginx rules.http.paths.path nginx configuration injection - https://github.com/kubernetes/kubernetes/issues/136678
Overview
- Kubernetes
- ingress-nginx
Description
Statistics
- 4 Posts
- 1 Interaction
Overview
- Microsoft
- Office Online Server
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
https://blog.0patch.com/2026/02/micropatches-released-for-microsoft.html
Overview
Description
Statistics
- 2 Posts
- 9 Interactions
Fediverse
Two IPs now generate 56% of all CVE-2025-55182 exploitation traffic.
One deploys cryptominers. The other opens reverse shells.
We dug into the infrastructure. What we found goes back to 2020.
https://www.greynoise.io/blog/react2shell-exploitation-consolidates
Overview
Description
Statistics
- 1 Post
- 5 Interactions
Fediverse
Patch diffing + RCA for clfs.sys can take awhile.
I gave the diff + binary to a local LLM.
It mapped the UAF path, race condition, all IOCTLs in <20 min
LLMs don't replace the work, they are momentum.
New blog post following the UAF trail of CVE-2025-29824:
https://clearbluejar.github.io/posts/how-llms-feed-your-re-habit-following-the-uaf-trail-in-clfs/
Overview
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
omg 69420 what a CVE number :blobcat_engineer: https://security-tracker.debian.org/tracker/CVE-2025-69420
Overview
Description
Statistics
- 2 Posts
- 1 Interaction