// LIVE
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
nsysops@ops-intel:~$ ls -lt --range live
OPS INTEL
209 items · ARIA-monitored · page 13 of 42
209
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 2
HIGH (page) 3
MEDIUM (page) 0
LOW (page) 0
CRITICAL 95% confidence cve

ZDI-26-125: Docker Desktop grpcfuse Kernel Module OOB Read Info Disclosure Vulnerability

A critical information disclosure vulnerability in Docker Desktop's grpcfuse kernel module allows local attackers to access sensitive data, requiring low. Read

['Local access is required for exploitation but can be used by attackers with low privileges.', "The flaw affects Docker Desktop's security by exposing sensitive data that could aid further attacks."]

LinuxWindows
action items (2)
  • Verify all systems running Docker Desktop are updated.
  • Monitor systems closely for any unusual activity related to the affected module.

Zero Day Initiative · 2026-02-26T04:32

CRITICAL 98% confidence cve

ZDI-26-124: claude-hovercraft executeClaudeCode Command Injection RCE Vulnerability

Remote attackers can execute arbitrary code on affected claude-hovercraft installations without requiring authentication. CVSS rating of 9.8 assigned. Includes

['Failure to update or patch systems leaves them vulnerable to RCE attacks', 'Command injection vulnerabilities allow attackers full control over targeted systems']

claude-hovercraft users and operatorsEnterprise IT environments using affected software versions
action items (2)
  • Review system configurations for any instances of claude-hovercraft
  • Update affected systems with the latest patches from official channels

Zero Day Initiative · 2026-02-26T04:32

HIGH 95% confidence cve

ZDI-26-132: Siemens SINEC NMS Privilege Escalation Vulnerability

Local attackers can escalate privileges on affected Siemens SINEC NMS installations via uncontrolled search path element. Requires initial low-privilege code.

['Enables unauthorized access and potential system compromise']

IT OperationsSecurity Teams
action items (2)
  • Apply available security patches immediately
  • Review system access controls and logging

Zero Day Initiative · 2026-02-26T04:31

HIGH 95% confidence cve

Siemens SINEC NMS Uncontrolled Search Path Element Vulnerability

Operators warned of a critical local privilege escalation in Siemens SINEC NMS. Attacker can escalate privileges after gaining low-privileged execution. Include

['Attackers need only low-privileged code execution to exploit this flaw and escalate their privileges on the system']

Industrial Control SystemsNetwork Management Systems
action items (1)
  • Update to the latest security patch for SINEC NMS as soon as possible

Zero Day Initiative · 2026-02-26T04:31

HIGH 95% confidence advisory

CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisco SD-WAN Systems

CISA warns of ongoing exploitation targeting Cisco SD-WAN systems. Read about the vulnerabilities CVE-2026-20127 and CVE-2022-20775, mitigation steps, and.

['Critical vulnerabilities in widely-used Cisco SD-WAN systems', 'Ongoing exploitation reported globally', 'Need for immediate remediation and security hardening']

Network administratorsSecurity teamsIT operations
action items (3)
  • Implement firewall rules to isolate SD-WAN interfaces
  • Update system firmware and software to latest versions
  • Enable logging to remote syslog server

CISA Current Activity · 2026-02-26T04:31