// LIVE
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
nsysops@ops-intel:~$ ls -lt --range live
OPS INTEL
209 items · ARIA-monitored · page 8 of 42
209
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 1
HIGH (page) 4
MEDIUM (page) 0
LOW (page) 0
CRITICAL 95% confidence cve

[local] Docker Desktop 4.44.3 - Unauthenticated API Exposure

Docker Desktop v4.44.3 suffers from unauthenticated API exposure, allowing unauthorized access to sensitive management operations without authentication. Includ

['Lack of proper authentication mechanisms for the API endpoints', "Inadequate security checks in Docker's management interface"]

Docker Desktop UsersDevOps Teams
action items (2)
  • Upgrade to patched version of Docker Desktop as soon as available
  • Conduct a security audit focusing on API endpoints and authentication mechanisms

Exploit-DB · 2026-02-27T04:23

HIGH 98% confidence cve

ZDI-26-061: NVIDIA Triton Inference Server Vulnerability

Remote attackers can cause a denial-of-service condition on affected installations of NVIDIA Triton Inference Server without requiring authentication. Includes

['EVBufferToJson function flaw triggers exception causing service disruption', 'Impact on inference workloads without authentication required']

Cloud InfrastructureAI/ML Platforms
action items (2)
  • Verify system configurations for Triton dependencies
  • Check for updates and apply security patches immediately

Zero Day Initiative · 2026-02-27T04:22

HIGH 95% confidence cve

ZDI-26-060 NVIDIA Megatron-LM RCE Vulnerability

NVIDIA Megatron-LM is vulnerable to remote code execution due to deserialization of untrusted data. This affects installations requiring user interaction. Inclu

['Remote attackers can gain unauthorized access to systems running NVIDIA Megatron-LM', 'Exploitation requires visiting malicious pages or opening files, limiting immediate risk but requiring vigilance']

NVIDIA Megatron-LM usersEnterprise environments with ML infrastructure
action items (3)
  • Review systems using NVIDIA Megatron-LM for potential exposure
  • Apply security updates as soon as they become available
  • Conduct a risk assessment to prioritize remediation efforts

Zero Day Initiative · 2026-02-27T04:22

HIGH 95% confidence cve

ZDI-26-068 Docker Desktop for Windows Privilege Escalation Vulnerability

Local attackers can escalate privileges on affected Docker Desktop for Windows installations via incorrect permission assignment. Requires admin interaction.

['Incorrect permission assignment exposes systems to unauthorized access and privilege escalation attempts']

Windows
action items (2)
  • Update Docker Desktop for Windows to the latest version
  • Review and adjust permission settings

Zero Day Initiative · 2026-02-27T04:06

HIGH 93% confidence cve

ZDI-26-067 Docker Desktop Windows Privilege Escalation Vulnerability

['Local attackers can escalate privileges on Docker Desktop for Windows due to incorrect permission assignment. CVSS rating: 6.7, CVE-2025-14740.', 'Requires.

["Administrators must intervene and follow mitigation steps due to this flaw's requirement for user interaction to exploit, posing a moderate risk to affected systems."]

Windows
action items (3)
  • Update Docker Desktop to a version that includes a fix for CVE-2025-14740.
  • Review and adjust user permissions to minimize exposure risk.
  • Educate staff on the importance of administrative privileges management.

Zero Day Initiative · 2026-02-27T04:06