Cyber Threat Briefing

PUBLISHED 18 February 2026, 08:25 UTC
CLASSIFICATION TLP:CLEAR
AUTO-GENERATED Varangian Cyber Intelligence
3
Critical CVEs
12
High CVEs
9
KEV Added
0
New IOCs
0
Malware Samples
1
Active C2s
CRITICAL

THREAT LEVEL ASSESSMENT

The current threat landscape is elevated to CRITICAL due to the emergence of three Critical-severity CVEs (CVSS ≥9.6) with remote code execution, credential hardcoding, and privilege escalation impacts. Active exploitation is confirmed for multiple vulnerabilities in CISA’s KEV catalog, including BeyondTrust and Zimbra flaws. High-severity issues in IBM, Windows Admin Center, and WordPress plugins further strain mitigation efforts. The Kimwolf IoT botnet’s expansion to 2M+ devices and recent zero-day exploitation in Dell and Microsoft products underscore urgent remediation needs.

CRITICAL VULNERABILITIES

CVE Product CVSS Status Impact
CVE-2026-22208 OpenS100 S-100 Viewer 9.6 Not in KEV Remote Code Execution via unrestricted Lua interpreter sandboxing.
CVE-2026-23647 Glory RBG-100 Recycler Systems (ISPK-08) 9.8 Not in KEV Remote authentication bypass via hardcoded Linux credentials, enabling privilege escalation.
CVE-2026-1937 YayMail – WooCommerce Email Customizer Plugin 9.8 Not in KEV Privilege escalation due to missing capability checks in AJAX action handling.

ACTIVE EXPLOITS & KEV

CVE Product Vendor Remediation Deadline
CVE-2026-1731 Remote Support (RS) and Privileged Remote Access (PRA) BeyondTrust 2026-03-05
CVE-2020-7796 Zimbra Collaboration Suite Synacor 2026-03-10
CVE-2024-7694 ThreatSonar Anti-Ransomware TeamT5 2026-03-10
CVE-2008-0015 Windows Video ActiveX Control Microsoft 2026-03-10
CVE-2026-2441 Chromium Google 2026-03-10
CVE-2026-20700 Multiple Products Apple 2026-03-05
CVE-2025-15556 Notepad++ Notepad++ 2026-03-05

MALWARE & THREAT ACTORS

Feodo Tracker infrastructure reports active C2 operations for QakBot at 178.62.3.223:443, currently offline. The Kimwolf IoT botnet remains a critical threat, infecting 2M+ devices globally, with campaigns targeting corporate/government networks via DDoS and data-relay operations. Recent analysis highlights its use of AI assistants as stealthy C2 relays, complicating detection. The Badbox 2.0 botnet’s control panel compromise further illustrates state-sponsored actors’ focus on IoT infrastructure.

CYBER NEWS DIGEST

[CISA Alerts] Honeywell CCTV products face vulnerabilities allowing unauthenticated changes to recovery email addresses and camera feed access. CISA adds four flaws to KEV, including BeyondTrust and Zimbra issues, with urgent remediation deadlines.

[Microsoft Patch Tuesday (Feb 2026)] Addresses 50+ flaws, including six zero-days. Critical fixes target Windows kernel and Azure Sphere OS. Prioritization urged for KEV-aligned patches.

[Krebs on Security] Kimwolf botnet disrupts I2P networks via IoT devices. Researchers link its C2 infrastructure to AI assistant abuse, enabling stealthy command relays.

[Bleeping Computer] Notepad++ implements "double-lock" update mechanism post-supply chain compromise. Chinese APTs exploit Dell’s zero-day since mid-2024, targeting Windows drivers.

[The Hacker News] Apple tests end-to-end encrypted RCS messaging in iOS 17.4 beta. Kaspersky uncovers Keenadu Android firmware backdoor, harvesting data via signed OTA updates.

[Dark Reading] Zscaler acquires SquareX to enhance secure browsing. Microsoft faces pressure to mitigate BYOVD attacks exploiting Windows driver vulnerabilities.

[Schneier on Security] LLMs demonstrate rapid zero-day detection capabilities. Opus 4.6 achieves 95% accuracy in high-severity vulnerability identification, outperforming prior models.