// LIVE
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
nsysops@ops-intel:~$ ls -lt --range live
OPS INTEL
209 items · ARIA-monitored · page 12 of 42
209
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 0
HIGH (page) 4
MEDIUM (page) 1
LOW (page) 0
HIGH 95% confidence cve

IceWarp Directory Traversal Vulnerability ZDI-26-130

ZDI-26-130 discloses a critical information disclosure vulnerability in IceWarp collaboration software allowing unauthorized access to sensitive data. Read full

['Exploitation can lead to unauthorized access and disclosure of sensitive data', 'Potentially exposing configuration details or private user information']

IceWarp users and administrators
action items (2)
  • Scan systems for this specific vulnerability using available tools
  • Update affected IceWarp installations with patches or hotfixes

Zero Day Initiative · 2026-02-26T04:35

HIGH 95% confidence general

ZDI-26-129: Socomec DIRIS A-40 HTTP API Authentication Bypass Vulnerability

Learn about the critical ZDI-26-129 vulnerability affecting Socomec DIRIS A-40 power monitoring devices, enabling unauthorized access through an authentication.

['Impact on network security due to unauthorized access', 'Risk of data theft or disruption']

Network administratorsIT security professionals
action items (2)
  • Review security configurations and implement mitigations
  • Contact Socomec for updates or patches

Zero Day Initiative · 2026-02-26T04:34

HIGH 90% confidence cve

ZDI-26-128: Ubiquiti AI Pro Uncaught Exception DoS Vulnerability

Network-adjacent attackers can cause a denial-of-service condition on Ubiquiti Networks AI Pro without requiring authentication. CVSS rating: 6.5. Includes seve

["Lack of proper exception handling in Ubiquiti Networks' AI Pro leads to uncaught exceptions that an attacker can exploit for DoS attacks", 'Unauthenticated network access is sufficient for exploitation']

Network administratorsIT security teams
action items (2)
  • Update AI Pro installations with latest security patch available from Ubiquiti Networks
  • Monitor for unusual network activity indicative of attempted exploitation

Zero Day Initiative · 2026-02-26T04:34

HIGH 90% confidence cve

ZDI-26-127: Ubiquiti Networks AI Pro Cleartext Transmission Vulnerability

Network-adjacent attackers can disclose sensitive information on Ubiquiti Networks AI Pro without requiring authentication. CVSS rating of 5.3 assigned. Include

['Sensitive data exposure risk', 'Unauthorized access possible without credentials']

Network administratorsSecurity teams
action items (2)
  • Review security configurations
  • Update to the latest version

Zero Day Initiative · 2026-02-26T04:34

MEDIUM 95% confidence cve

(Pwn2Own) Ubiquiti Networks AI Pro Discovery Protocol Missing Encryption Protocol Downgrade Vulnerability

Network-adjacent attackers can downgrade the communication protocol on affected Ubiquiti Networks AI Pro installations without requiring authentication. Read fu

['Allows unauthorized downgrading of security protocols', 'Exposes systems to unencrypted communication risks']

Network administratorsSecurity operations teams
action items (2)
  • Verify system configuration for proper protocol usage
  • Monitor network traffic for unencrypted communications

Zero Day Initiative · 2026-02-26T04:34