// LIVE
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
nsysops@ops-intel:~$ ls -lt --range live
OPS INTEL
209 items · ARIA-monitored · page 16 of 42
209
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 3
HIGH (page) 2
MEDIUM (page) 0
LOW (page) 0
HIGH 85% confidence cve

ZDI-26-091: Schneider Electric EcoStruxure Power Build Vulnerability

Remote attackers can execute arbitrary code on affected installations of Schneider Electric EcoStruxure Power Build via malicious file parsing. CVE-2025-13845.

['Requires user interaction, increasing risk of exploitation in targeted attacks', 'CVSS rating indicates high severity and potential impact on system integrity and availability']

Industrial Control SystemsEnterprise Networks
action items (2)
  • Review system configurations for potential exposure
  • Develop a plan to update affected systems

Zero Day Initiative · 2026-02-25T14:31

CRITICAL 90% confidence cve

ZDI-26-090: Schneider EcoStruxure Power Build RCE Vulnerability

Schneider Electric's EcoStruxure Power Build contains a file parsing flaw enabling remote code execution with user interaction. CVSS rating of 7.8. Includes sev

['Affects software responsible for industrial control systems', 'Exploitation requires minimal user action, increasing risk of attack']

Industrial Control Systems (ICS) operatorsManufacturing facilities using Schneider Electric products
action items (2)
  • Identify and inventory all instances of EcoStruxure Power Build in use
  • Update to the latest version available from Schneider Electric

Zero Day Initiative · 2026-02-25T14:31

CRITICAL 97% confidence cve

ZDI-26-089 Schneider Electric EcoStruxure Power Build Vulnerability

Schneider Electric EcoStruxure Power Build is vulnerable to a memory corruption flaw allowing remote code execution via file parsing. CVE-2025-13845. Includes s

['Failure to address this vulnerability can result in remote code execution on affected systems.', 'User interaction required reduces the immediate threat but does not eliminate it completely.']

Industrial Control SystemsCritical Infrastructure
action items (2)
  • Update EcoStruxure Power Build software immediately to address CVE-2025-13845.
  • Monitor system logs for any signs of suspicious activity related to SSD files.

Zero Day Initiative · 2026-02-25T14:31

HIGH 90% confidence outage

Ex-L3Harris Exec Jailed Seven Years for Selling Exploits

['Former L3Harris executive jailed for selling US cyber tools and trade secrets to Russia. The Register reports the seven-year sentence following a major. Read

['The exploitation of cyber tools designed exclusively for US use has led to severe national security breaches, impacting the integrity of defense technologies and intelligence. This raises concerns about data exfiltrati

national_securitydefense_industry
action items (2)
  • Review and strengthen security protocols related to classified information
  • Conduct thorough audits on export compliance

The Register · 2026-02-25T14:31

CRITICAL 95% confidence cve

ZDI-26-088: Schneider Electric EcoStruxure Power Build Vulnerability

['Schneider Electric EcoStruxure Power Build is vulnerable to remote code execution via memory corruption in file parsing. CVE-2025-13845, CVSS score of 7.8']

['Operators must address this issue due to its potential impact on system integrity and confidentiality, especially in industrial settings where automation systems are crucial.']

industrial control systemsutilities
action items (3)
  • Review system configurations to identify potential exposure points.
  • Update software to the latest versions with security patches applied.
  • Educate staff about the risks of executing unknown or suspicious files or visiting untrusted websites.

Zero Day Initiative · 2026-02-25T13:06