// LIVE
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
nsysops@ops-intel:~$ ls -lt --range live
OPS INTEL
209 items · ARIA-monitored · page 40 of 42
209
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 0
HIGH (page) 4
MEDIUM (page) 1
LOW (page) 0
HIGH 95% confidence outage

Poland Energy Sector Cyber Incident Emphasizes OT and ICS Security

A cyber incident in Poland's energy sector highlights critical gaps in operational technology (OT) and industrial control systems (ICS) security. Learn about.

['Vulnerable edge devices remain primary targets for threat actors', 'Default credentials exploited to pivot onto HMIs and RTUs', 'Critical infrastructure entities with unsupported devices face significant risks']

Energy sector entitiesCritical infrastructure owners/operatorsIndustrial control systems administrators
action items (3)
  • Review CISA's Binding Operational Directive BOD 26-02
  • Implement primary mitigations against cyber threats to OT
  • Consult CERT Polska’s Energy Sector Incident Report for detailed guidance

CISA Current Activity · 2026-02-20T02:30

MEDIUM 85% confidence advisory

Spotlight on SIG Architecture: API Governance

Interview with Jordan Liggitt about Kubernetes API Governance, stability vs. innovation balance, and ensuring consistency in custom resource definitions. Includ

['Ensuring consistency and stability for new and existing APIs', 'Addressing challenges of user-defined custom resources']

Kubernetes operatorsAPI developers
action items (2)
  • Review and adhere to API conventions
  • Involve API Governance in the design phase of new features

Kubernetes Blog · 2026-02-20T02:29

HIGH 95% confidence advisory

CISA Adds Four New Known Exploited Vulnerabilities to Catalog

['CISA has added four new vulnerabilities, including CVE-2024-43468, CVE-2025-15556, CVE-2025-40536, and CVE-2026-20700, to its Known Exploited Vulnerabilities.

["These vulnerabilities are critical as they represent active attack vectors for malicious actors. Immediate action is required to mitigate risks based on CISA's KEV guidelines."]

Federal Civilian Executive Branch (FCEB) agenciesAll organizations
action items (3)
  • Remediate identified vulnerabilities immediately.
  • Review BOD 22-01 for federal agency guidelines on KEV management.
  • Implement robust vulnerability management practices for all organizations.

CISA Current Activity · 2026-02-20T02:29

HIGH 85% confidence cve

CISA Adds One Known Exploited Vulnerability to Catalog

['CISA adds CVE-2026-1731 to its KEV catalog due to active exploitation. BeyondTrust Remote Support and Privileged Remote Access OS Command Injection. Read full

['The addition of a new entry in the KEV catalog requires immediate attention due to potential risks from active exploitation.', "BeyondTrust's RS and PRA have an OS Command Injection vulnerability that can be exploited

FCEB agenciesAll organizations
action items (2)
  • Review system configurations and assess exposure to CVE-2026-1731.
  • Implement necessary security measures and monitor for any signs of exploitation.

CISA Current Activity · 2026-02-20T02:29

HIGH 90% confidence advisory

AI-Powered Defense for Serverless Security

['Discover how AI can strengthen your serverless security with a defense-in-depth architecture.', 'Learn about the latest in AI-driven security measures for.

['Cyber threats evolve using AI, necessitating advanced defense strategies for serverless microservices.', 'Traditional perimeter-based security is inadequate against modern AI-driven attacks.']

Enterprise customersServerless microservices
action items (2)
  • Review current security measures for AI-assisted threats
  • Integrate AI tools to enhance threat detection capabilities

AWS Security Blog · 2026-02-20T02:29