// LIVE
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
nsysops@ops-intel:~$ ls -lt --range live
OPS INTEL
209 items · ARIA-monitored · page 18 of 42
209
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 0
HIGH (page) 3
MEDIUM (page) 2
LOW (page) 0
HIGH 95% confidence cve

ZDI-26-086: Schneider Electric EcoStruxure Power Build Vulnerability

Schneider Electric EcoStruxure Power Build suffers from a memory corruption issue enabling remote code execution. CVSS rating is 7.8. Includes severity, confide

['Remote Code Execution via file manipulation', 'High severity due to potential impact on critical infrastructure']

Industrial Control SystemsPower Management Software
action items (2)
  • Update to the latest security release
  • Monitor for suspicious activity

Zero Day Initiative · 2026-02-24T23:55

HIGH 95% confidence cve

ZDI-26-085: Schneider Electric EcoStruxure Power Build Vulnerability

Schneider Electric EcoStruxure Power Build suffers from a memory corruption flaw enabling remote code execution. Requires user interaction, rated CVSS 7.8.

['User interaction needed for exploitation', 'CVSS rating indicates high severity']

Industrial control systemsEnergy management solutions
action items (2)
  • Apply patches immediately
  • Monitor for unusual activity

Zero Day Initiative · 2026-02-24T23:55

HIGH 95% confidence cve

Schneider Electric EcoStruxure Power Build Memory Corruption RCE Vulnerability

A critical memory corruption flaw in Schneider Electric EcoStruxure Power Build allows remote attackers to execute arbitrary code via malicious files or web.

['Improper handling of files can lead to remote code execution', 'User interaction is required for exploitation']

Industrial Control Systems (ICS)Power UtilitiesEnergy Sector
action items (3)
  • Apply available patches immediately
  • Review and restrict file access permissions
  • Conduct an audit of existing systems using affected software

Zero Day Initiative · 2026-02-24T23:55

MEDIUM 75% confidence cve

ZDI-26-083: Microsoft Windows searchConnector-ms NTLM Response Information Disclosure

Remote attackers can disclose NTLM responses on affected Windows systems. Requires user interaction to exploit; no patch available yet. Includes severity, confi

['Remote attackers can exploit the flaw to disclose sensitive NTLM information']

Microsoft Windows users
action items (2)
  • Monitor networks for unusual activity
  • Update configurations as patches become available

Zero Day Initiative · 2026-02-24T23:55

MEDIUM 95% confidence cve

ZDI-26-082: Microsoft Exchange InterceptorSmtpAgent Security Bypass

An unauthenticated security bypass flaw in Microsoft Exchange's InterceptorSmtpAgent allows remote attackers to circumvent a critical security feature. Read ful

['Attackers can leverage this vulnerability to perform actions on the system that should be restricted by security mechanisms', 'Exploitation does not require authentication, increasing attack surface']

Microsoft Exchange Server usersNetwork Administrators
action items (2)
  • Review system configurations related to InterceptorSmtpAgent
  • Update Exchange server installations to mitigate this vulnerability

Zero Day Initiative · 2026-02-24T23:55