// LIVE
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
nsysops@ops-intel:~$ ls -lt --range live
OPS INTEL
209 items · ARIA-monitored · page 21 of 42
209
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 1
HIGH (page) 3
MEDIUM (page) 1
LOW (page) 0
MEDIUM 85% confidence advisory

Open Redirects: A Forgotten Vulnerability

['Unvalidated redirects are often overlooked but can lead to serious security issues.', 'Learn about the risks and mitigation strategies for open redirect.

['Unvalidated redirects can lead to unauthorized access or injection attacks by directing users to malicious sites bypassing authentication checks.', 'While often considered low risk, these vulnerabilities can be exploit

Web applicationsIT infrastructure
action items (3)
  • Review and update security policies regarding open redirects.
  • Conduct thorough audits of existing web application codebases for vulnerable redirect functions.
  • Educate developers about the risks associated with unvalidated redirects and forwards.

SANS ISC · 2026-02-24T19:27

HIGH 85% confidence outage

Lazarus Group Uses Medusa Ransomware Against Healthcare Orgs

["North Korea's Lazarus Group deploys new Medusa ransomware targeting US healthcare organizations and Middle Eastern entities, highlighting evolving cyber.

['Healthcare organizations are critical targets due to sensitive data and high-pressure situations.', 'The use of new ransomware indicates a proactive approach by Lazarus Group to avoid detection and maintain operational

Healthcare providersCritical infrastructure operatorsData security professionals
action items (3)
  • Review and enhance backup protocols to ensure quick recovery from ransomware attacks.
  • Deploy advanced threat detection solutions capable of identifying unknown malware like Medusa.
  • Strengthen cybersecurity awareness programs within healthcare organizations

The Register · 2026-02-24T19:26

CRITICAL 95% confidence cve

ZDI-26-076: GFI Archiver MARC.Store Deserialization Vulnerability

Remote attackers can execute arbitrary code on affected GFI Archiver installations via a deserialization of untrusted data vulnerability, CVSS rating 8.8. Inclu

['Exploits allow unauthorized access and command execution', 'Potentially leads to data theft or system compromise']

GFI Archiver users
action items (2)
  • Update to the latest version with security fixes
  • Review and adjust authentication protocols

Zero Day Initiative · 2026-02-24T16:26

HIGH 90% confidence outage

Lazarus Group Uses Medusa Ransomware in Healthcare Attacks

The Lazarus Group, linked to North Korea, used Medusa ransomware in attacks targeting U.S. and Middle East healthcare entities. Includes severity, confidence, a

['Ransomware poses significant data exfiltration risk', 'Medusa variant may evade traditional detection']

Healthcare organizationsIT security teams
action items (3)
  • Review security logs for suspicious activity
  • Increase monitoring of healthcare IT infrastructure
  • Educate staff on ransomware prevention

The Hacker News · 2026-02-24T16:26

HIGH 90% confidence outage

West Midlands Police and Generative AI Misstep

["UK Parliament delivers official review of West Midlands Police's use of Copilot AI, highlighting risks in AI-driven public order decisions.", 'Case study on.

['The misuse of generative AI in critical systems underscores the importance of rigorous testing and validation processes before deployment.', 'Lack of oversight and understanding of AI limitations led to inappropriate i

Public safetyLaw enforcement
action items (2)
  • Conduct a thorough review of existing AI implementations in public order contexts.
  • Develop guidelines and best practices for the ethical use of generative AI in law enforcement operations.

The Register · 2026-02-24T11:56