Cyber Threat Briefing

PUBLISHED 18 February 2026, 08:23 UTC
CLASSIFICATION TLP:CLEAR
AUTO-GENERATED Varangian Cyber Intelligence
3
Critical CVEs
13
High CVEs
9
KEV Added
0
New IOCs
0
Malware Samples
1
Active C2s
CRITICAL

THREAT LEVEL ASSESSMENT

The current threat landscape is elevated to CRITICAL due to the emergence of four critical-severity CVEs (CVSS ≥9.6) and 11 high-severity vulnerabilities within the past 24–12 hours. Key vulnerabilities in OpenS100, Glory RBG-100, and WordPress plugins enable remote code execution, privilege escalation, and credential exposure. Additionally, CISA has added 10 new Known Exploited Vulnerabilities (KEV) with imminent remediation deadlines (≤28 days), including critical flaws in Microsoft Windows, BeyondTrust, and Apple products. Active C2 infrastructure for QakBot and the rapid spread of the Kimwolf IoT botnet (2M+ devices) further heighten risk. Organizations must prioritize patching and monitoring for actively exploited threats.

CRITICAL VULNERABILITIES

CVE Product CVSS Status Impact
CVE-2026-22208 OpenS100 S-100 Viewer 9.6 No active exploitation confirmed Remote code execution via unrestricted Lua interpreter
CVE-2026-23647 Glory RBG-100 Recycler 9.8 No active exploitation confirmed Hard-coded credentials enable remote Linux system authentication
CVE-2026-1937 YayMail WordPress Plugin 9.8 No active exploitation confirmed Missing capability check allows privilege escalation via AJAX actions

ACTIVE EXPLOITS & KEV

CVE Product Deadline
CVE-2026-1731 BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) 2026-02-16
CVE-2026-2441 Google Chromium 2026-03-10
CVE-2026-20700 Apple Multiple Products 2026-03-05
CVE-2024-7694 TeamT5/ThreatSonar Anti-Ransomware 2026-03-10
CVE-2008-0015 Microsoft Windows Video ActiveX Control 2026-03-10

MALWARE & THREAT ACTORS

Feodo Tracker identifies active C2 infrastructure for QakBot (178.62.3.223:443), currently offline. The Kimwolf IoT botnet (2M+ devices) is actively conducting DDoS attacks and data exfiltration, with CISA and Krebs reporting corporate/government network infiltration. Keenadu Android firmware backdoors (CVE-2025-40536) are being exploited for persistent data harvesting. Aisuru and Kimwolf botnets are prioritized targets under CISA’s KEV remediation mandates.

CYBER NEWS DIGEST

CISA Alerts: Added four critical KEV entries, including Microsoft Windows Video ActiveX and BeyondTrust OS command injection flaws, with remediation deadlines by March 2026 [CISA Alerts].

Krebs on Security: Microsoft’s February 2026 Patch Tuesday addresses 50+ vulnerabilities, including six zero-days, with emphasis on remote code execution and credential exposure [Krebs on Security].

The Hacker News: CISA flags active exploitation of four KEV flaws, including Apple buffer overflows and SolarWinds SQL injection, requiring urgent mitigation [The Hacker News].

Bleeping Computer: Chinese hackers exploit a Dell zero-day flaw (mid-2024 onset) targeting enterprise infrastructure, with no patch yet available [Bleeping Computer].

Dark Reading: RMM abuse rises as hackers leverage legitimate tools for persistence, bypassing traditional malware detection methods [Dark Reading].

Schneier on Security: LLMs demonstrate accelerated zero-day discovery capabilities, with Opus 4.6 automating high-severity vulnerability detection [Schneier on Security].