// LIVE
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
nsysops@ops-intel:~$ ls -lt --range live
OPS INTEL
209 items · ARIA-monitored · page 29 of 42
209
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 0
HIGH (page) 3
MEDIUM (page) 1
LOW (page) 1
LOW 90% confidence general

My Day with Network Detection and Response

Exploring hands-on experience using Corelight's Investigator for network threat hunting and SOC workflow integration. Includes severity, confidence, and actiona

['Gain practical experience in threat hunting', 'Enhance incident response through better understanding of NDR tools']

Security Operations Center (SOC)Incident Response Teams
action items (2)
  • Familiarize with Corelight’s Investigator features
  • Implement NDR practices within SOC operations

The Hacker News · 2026-02-23T02:01

MEDIUM 85% confidence advisory

Linux Kernel 7.0 RC1 Released with Numerological Reflections

['Linus Torvalds releases Linux Kernel 7.0 RC1, musing about his future and the need for a successor who can handle version numbers beyond 20.', 'Linus. Read fu

["Understanding Linus's reflections can help operators anticipate future changes in community leadership and prepare for potential transitions.", 'Operators should consider these musings as an indicator of upcoming shift

Linux Kernel DevelopersSystem Administrators
action items (2)
  • Monitor official communications from the Linux Kernel mailing list regarding version 7.0 developments.
  • Discuss implications of leadership transitions with team members to ensure continuity of operations.

The Register · 2026-02-23T01:31

HIGH 90% confidence advisory

Webinar Insights: AI and Context for Swift Cloud Breach Investigation

['Modern SOC teams leverage AI to accelerate cloud breach investigations amid rapidly disappearing evidence.', 'Join the webinar on how advanced techniques.

['Incident response times are critical in the cloud environment due to rapid instance lifecycle management, leading to quick data loss.', 'AI-driven analysis enables more efficient and timely identification of security b

Incident Response TeamsSecurity Operations Center (SOC)
action items (2)
  • Attend the webinar on leveraging AI in cloud forensics.
  • Investigate AI solutions that can enhance current SOC capabilities.

The Hacker News · 2026-02-23T00:31

HIGH 85% confidence outage

French Bank Account Database Breach

["Unknown attacker breaches French government's database containing bank account details, exfiltrates 1.2 million records.", "France's national banking. Read fu

['The incident highlights potential vulnerabilities within critical infrastructure systems and the need for robust patch management practices.', 'Attackers exploited a possible unpatched vulnerability or misconfiguration

GovernmentFinancial Services
action items (3)
  • Review and update patching policies to ensure timely application of security updates.
  • Deploy advanced analytics tools for anomaly detection in network traffic and system access patterns.
  • Strengthen data encryption measures, especially for datasets containing highly sensitive financial information.

The Register · 2026-02-23T00:02

HIGH 95% confidence cve

ZDI-26-107: AutoCAD MODEL File Remote Code Execution Vulnerability

Remote code execution flaw in Autodesk AutoCAD could allow attackers to execute arbitrary code if users visit a malicious page or open a file. CVE-2026-0875.

["Inadequate validation of input data in AutoCAD's MODEL files handling", 'Potential use by threat actors to gain unauthorized access and control over systems']

Autodesk AutoCAD users and administrators
action items (2)
  • Apply available security updates immediately
  • Review network traffic logs for signs of suspicious activity related to this threat

Zero Day Initiative · 2026-02-22T13:31