Overview
Description
Statistics
- 26 Posts
- 7 Interactions
Fediverse
ICYMI: "Customers running Office 2021 and later will be automatically protected via a service-side change, but will be required to restart their Office applications for this to take effect."
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509
Microsoft has rushed out an emergency security update for Office (CVE‑2026‑21509) after confirming the flaw is already being exploited in the wild. 🔐
The high‑severity security feature bypass lets attackers bypass OLE protections and run malicious code via specially crafted Office files. 📄⚠️
👉 Microsoft issues emergency fix for actively exploited Office flaw:
https://cyberinsider.com/microsoft-issues-emergency-fix-for-actively-exploited-office-flaw/
#Microsoft #Office #Security #CVE202621509 #PatchNow
Threre is also #OnlyOffice
Microsoft veröffentlicht Notfall-Update für kritische Office-Sicherheitslücke CVE-2026-21509, die bereits aktiv ausgenutzt wird. Betroffen sind Versionen von Office 2016 bis #Microsoft365. https://winfuture.de/news,156440.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia
Microsoft a patché en urgence une faille de sécurité zero-day dans Office : CVE-2026-21509 https://www.it-connect.fr/microsoft-office-faille-zero-day-cve-2026-21509/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #Office
The vulnerability, tracked as CVE-2026-21509, carries a CVSS score of 7.8 out of 10.0. It has been described as a security feature bypass in Microsoft Office. https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
[VULN] ⚠️"Une faille de Microsoft Office est activement exploitée par des pirates "
(NdR : cybercriminels et/ou opérateurs malveillants agissant pour le compte d’une entité soutenant les intérêts géopolitiques d’un État)
"Microsoft alerte sur une nouvelle faille critique dans Office. Déjà exploitée par des cybercriminels, la vulnérabilité permet de désactiver la sécurité mise en place par Microsoft. L’éditeur a commencé à déployer d’urgence un correctif pour Microsoft 365 et les versions récentes d’Office.
…
Pour protéger les internautes contre les attaques en cours, Microsoft a déployé une mise à jour qui « corrige la vulnérabilité qui contourne les mesures d’atténuation » d’Office. Les utilisateurs de Microsoft 365 et Microsoft Office sont invités à installer le correctif sans tarder.
Les utilisateurs d’Office 2021 et des versions ultérieures « seront automatiquement protégés grâce à une modification côté serveur, mais devront redémarrer leurs applications Office pour que cette modification prenne effet ». Il n’y a donc rien à faire, sauf redémarrer vos applications. Enfin, Microsoft n’a pas encore corrigé le tir sur Office 2016 et 2019. En attendant un correctif, Microsoft propose des mesures d’atténuation à ses utilisateurs."
👇
https://www.01net.com/actualites/faille-microsoft-office-activement-exploitee-pirates.html
🔬
⬇️
https://vulnerability.circl.lu/vuln/CVE-2026-21509
📜
⬇️
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509
Here's a summary of recent important global, technology, and cybersecurity news:
Global: India has contained a Nipah virus outbreak (Jan 28, 2026). The EU approved a ban on Russian gas imports, effective from 2027 (Jan 27, 2026).
Technology: The EU is pressing Google to share AI and search data under new regulations (Jan 27, 2026). Samsung is nearing Nvidia approval for advanced HBM4 AI memory chips (Jan 27, 2026). Fujitsu developed AI for space weather prediction (Jan 28, 2026).
Cybersecurity: Microsoft issued emergency patches for an actively exploited Office zero-day vulnerability (CVE-2026-21509) (Jan 27, 2026). Fortinet patched a critical FortiOS SSO authentication bypass (CVE-2026-24858) under active exploitation (Jan 28, 2026). AI-powered polymorphic phishing attacks are also a growing concern (Jan 28, 2026).
Bluesky
Overview
Description
Statistics
- 15 Posts
- 20 Interactions
Fediverse
CVE-2026-24858
..... Allows an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts.....
‼️CVE-2026-24858: Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability
Severity: Critical
CVSS: 9.8
Zero Day: Yes
CVE Published: January 27th, 2026
Advisory: https://github.com/advisories/GHSA-2x38-48vp-w23x
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.
🔴 CVE-2026-24858 - Critical (9.8)
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24858/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS ...
CVE-2026-24858
An attacker with basic FortiCloud account and a registered device can log into other Fortinet devices. No, not their own devices. Devices registered to entirely different FortiCloud accounts.
Here's a summary of recent important global, technology, and cybersecurity news:
Global: India has contained a Nipah virus outbreak (Jan 28, 2026). The EU approved a ban on Russian gas imports, effective from 2027 (Jan 27, 2026).
Technology: The EU is pressing Google to share AI and search data under new regulations (Jan 27, 2026). Samsung is nearing Nvidia approval for advanced HBM4 AI memory chips (Jan 27, 2026). Fujitsu developed AI for space weather prediction (Jan 28, 2026).
Cybersecurity: Microsoft issued emergency patches for an actively exploited Office zero-day vulnerability (CVE-2026-21509) (Jan 27, 2026). Fortinet patched a critical FortiOS SSO authentication bypass (CVE-2026-24858) under active exploitation (Jan 28, 2026). AI-powered polymorphic phishing attacks are also a growing concern (Jan 28, 2026).
Bluesky
Overview
Description
Statistics
- 9 Posts
- 2 Interactions
Bluesky
Overview
Description
Statistics
- 6 Posts
- 8 Interactions
Fediverse
OpenSSL Security Advisory
https://openssl-library.org/news/secadv/20260127.txt
One high, one medium, and 9 low severity issues.
The high severity is a stack buffer overflow in CMS AuthEnvelopedData parsing (CVE-2025-15467): attacker provides an oversized IV, leading to buffer overflow prior to authentication, possibly leading to remote code execution if you're parsing untrusted CMS or PKCS#7 content with AEAD (e.g., AES-GCM).
Bluesky
Overview
Description
Statistics
- 3 Posts
- 1 Interaction
Bluesky
Overview
- sebastianbergmann
- phpunit
Description
Statistics
- 2 Posts
- 3 Interactions
Fediverse
RE: https://phpc.social/@sebastian/115965753874226093
This is CVE-2026-24765 now.
🟠 CVE-2026-24765 - High (7.8)
PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24765/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
- nyariv
- SandboxJS
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
🔴 CVE-2026-23830 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sandbox escape vulnerability due to `AsyncFunction` not being isolated in `SandboxFunction`. The library attempts to sandbox code execution by replacing the global `Func...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
- Meta
- react-server-dom-webpack
Description
Statistics
- 2 Posts
- 2 Interactions
Overview
Description
Statistics
- 3 Posts
Fediverse
Tracked as CVE-2024-37079 (CVSS score of 9.8), the flaw is described as an out-of-bounds write issue in the Distributed Computing Environment/Remote Procedure Calls (DCERPC) protocol implementation of vCenter Server. https://www.securityweek.com/2024-vmware-flaw-now-in-attackers-crosshairs/
Overview
Description
Statistics
- 2 Posts
- 4 Interactions