Overview
Description
Statistics
- 22 Posts
- 6 Interactions
Fediverse
ICYMI: "Customers running Office 2021 and later will be automatically protected via a service-side change, but will be required to restart their Office applications for this to take effect."
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509
Microsoft has rushed out an emergency security update for Office (CVE‑2026‑21509) after confirming the flaw is already being exploited in the wild. 🔐
The high‑severity security feature bypass lets attackers bypass OLE protections and run malicious code via specially crafted Office files. 📄⚠️
👉 Microsoft issues emergency fix for actively exploited Office flaw:
https://cyberinsider.com/microsoft-issues-emergency-fix-for-actively-exploited-office-flaw/
#Microsoft #Office #Security #CVE202621509 #PatchNow
Threre is also #OnlyOffice
Microsoft veröffentlicht Notfall-Update für kritische Office-Sicherheitslücke CVE-2026-21509, die bereits aktiv ausgenutzt wird. Betroffen sind Versionen von Office 2016 bis #Microsoft365. https://winfuture.de/news,156440.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia
The vulnerability, tracked as CVE-2026-21509, carries a CVSS score of 7.8 out of 10.0. It has been described as a security feature bypass in Microsoft Office. https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
[VULN] ⚠️"Une faille de Microsoft Office est activement exploitée par des pirates "
(NdR : cybercriminels et/ou opérateurs malveillants agissant pour le compte d’une entité soutenant les intérêts géopolitiques d’un État)
"Microsoft alerte sur une nouvelle faille critique dans Office. Déjà exploitée par des cybercriminels, la vulnérabilité permet de désactiver la sécurité mise en place par Microsoft. L’éditeur a commencé à déployer d’urgence un correctif pour Microsoft 365 et les versions récentes d’Office.
…
Pour protéger les internautes contre les attaques en cours, Microsoft a déployé une mise à jour qui « corrige la vulnérabilité qui contourne les mesures d’atténuation » d’Office. Les utilisateurs de Microsoft 365 et Microsoft Office sont invités à installer le correctif sans tarder.
Les utilisateurs d’Office 2021 et des versions ultérieures « seront automatiquement protégés grâce à une modification côté serveur, mais devront redémarrer leurs applications Office pour que cette modification prenne effet ». Il n’y a donc rien à faire, sauf redémarrer vos applications. Enfin, Microsoft n’a pas encore corrigé le tir sur Office 2016 et 2019. En attendant un correctif, Microsoft propose des mesures d’atténuation à ses utilisateurs."
👇
https://www.01net.com/actualites/faille-microsoft-office-activement-exploitee-pirates.html
🔬
⬇️
https://vulnerability.circl.lu/vuln/CVE-2026-21509
📜
⬇️
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509
Here's a summary of recent important global, technology, and cybersecurity news:
Global: India has contained a Nipah virus outbreak (Jan 28, 2026). The EU approved a ban on Russian gas imports, effective from 2027 (Jan 27, 2026).
Technology: The EU is pressing Google to share AI and search data under new regulations (Jan 27, 2026). Samsung is nearing Nvidia approval for advanced HBM4 AI memory chips (Jan 27, 2026). Fujitsu developed AI for space weather prediction (Jan 28, 2026).
Cybersecurity: Microsoft issued emergency patches for an actively exploited Office zero-day vulnerability (CVE-2026-21509) (Jan 27, 2026). Fortinet patched a critical FortiOS SSO authentication bypass (CVE-2026-24858) under active exploitation (Jan 28, 2026). AI-powered polymorphic phishing attacks are also a growing concern (Jan 28, 2026).
Bluesky
Overview
Description
Statistics
- 16 Posts
- 20 Interactions
Fediverse
CVE-2026-24858
..... Allows an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts.....
‼️CVE-2026-24858: Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability
Severity: Critical
CVSS: 9.8
Zero Day: Yes
CVE Published: January 27th, 2026
Advisory: https://github.com/advisories/GHSA-2x38-48vp-w23x
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.
🔴 CVE-2026-24858 - Critical (9.8)
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24858/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS ...
CVE-2026-24858
An attacker with basic FortiCloud account and a registered device can log into other Fortinet devices. No, not their own devices. Devices registered to entirely different FortiCloud accounts.
Fortinet coupe le SSO en attendant les patchs pour la nouvelle faille zero-day : CVE-2026-24858 https://www.it-connect.fr/fortinet-coupe-le-sso-en-attendant-les-patchs-pour-la-nouvelle-faille-zero-day-cve-2026-24858/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet
Here's a summary of recent important global, technology, and cybersecurity news:
Global: India has contained a Nipah virus outbreak (Jan 28, 2026). The EU approved a ban on Russian gas imports, effective from 2027 (Jan 27, 2026).
Technology: The EU is pressing Google to share AI and search data under new regulations (Jan 27, 2026). Samsung is nearing Nvidia approval for advanced HBM4 AI memory chips (Jan 27, 2026). Fujitsu developed AI for space weather prediction (Jan 28, 2026).
Cybersecurity: Microsoft issued emergency patches for an actively exploited Office zero-day vulnerability (CVE-2026-21509) (Jan 27, 2026). Fortinet patched a critical FortiOS SSO authentication bypass (CVE-2026-24858) under active exploitation (Jan 28, 2026). AI-powered polymorphic phishing attacks are also a growing concern (Jan 28, 2026).
Bluesky
Overview
Description
Statistics
- 10 Posts
- 2 Interactions
Bluesky
Overview
Description
Statistics
- 7 Posts
- 8 Interactions
Fediverse
OpenSSL Security Advisory
https://openssl-library.org/news/secadv/20260127.txt
One high, one medium, and 9 low severity issues.
The high severity is a stack buffer overflow in CMS AuthEnvelopedData parsing (CVE-2025-15467): attacker provides an oversized IV, leading to buffer overflow prior to authentication, possibly leading to remote code execution if you're parsing untrusted CMS or PKCS#7 content with AEAD (e.g., AES-GCM).
Bluesky
Overview
- sebastianbergmann
- phpunit
Description
Statistics
- 2 Posts
- 3 Interactions
Fediverse
RE: https://phpc.social/@sebastian/115965753874226093
This is CVE-2026-24765 now.
🟠 CVE-2026-24765 - High (7.8)
PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24765/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
- nyariv
- SandboxJS
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
🔴 CVE-2026-23830 - Critical (10)
SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sandbox escape vulnerability due to `AsyncFunction` not being isolated in `SandboxFunction`. The library attempts to sandbox code execution by replacing the global `Func...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
- Meta
- react-server-dom-webpack
Description
Statistics
- 2 Posts
- 2 Interactions
Overview
Description
Statistics
- 2 Posts
- 1 Interaction
Overview
Description
Statistics
- 2 Posts
- 4 Interactions
Fediverse
Overview
- Beckhoff Automation
- Beckhoff.Device.Manager.XAR
Description
Statistics
- 2 Posts
Fediverse
🟠 CVE-2025-41726 - High (8.8)
A low privileged remote attacker can execute arbitrary code by sending specially crafted calls to the web service of the Device Manager or locally via an API and can cause integer overflows which then may lead to arbitrary code execution within pr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41726/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
#OT #Advisory VDE-2025-092
Beckhoff: Privilege escalation and information leak via Beckhoff Device Manager
The vulnerability CVE-2025-41726 (NN-2025-0074) allows an authenticated remote user to execute arbitrary commands on the device. This can be exploited over the web UI or via API. In one case the execution of the arbitrary command happens within a privileged process.
#CVE CVE-2025-41726, CVE-2025-41727, CVE-2025-41728
https://certvde.com/en/advisories/vde-2025-092/
#CSAF https://beckhoff.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2025-092.json