Logo
Search
Login
Sign Up

Archive

InfoSec.Watch - Issue #125

Feb 16, 2026

BridgePay ransomware outage + BeyondTrust pre-auth RCE scanning + a packed KEV week

Read More

InfoSec.Watch — Issue #124

Feb 9, 2026

This week’s brief is a reminder that identity-adjacent features and device-management control planes are still prime time for exploitation. When SSO becomes an alternate auth path, and MDM sits in front of your mobile fleet, patching is only step one — validation and hunt is step two.

Read More

InfoSec.Watch – Issue 123

Feb 2, 2026

FortiCloud SSO auth bypass and Ivanti EPMM pre-auth RCE are actively exploited — plus what to hunt for after patching.

Read More

InfoSec.Watch — Issue #122

Jan 26, 2026

This week’s brief reinforces a familiar truth: control planes and trusted third parties remain the fastest path to root. Unified comms, infrastructure management, and patch pipelines were all in the blast radius within days.

Read More

InfoSec.Watch — Issue #121

Jan 19, 2026

This week’s brief reinforces a simple reality: defenders don’t get to choose where the next outage starts. Email gateways, desktop components, and hospital IT all became pressure points within days. Patch fast — and validate with logs.

Read More

InfoSec.Watch — Issue #120

Jan 12, 2026

OneView exploitation, Apex Central RCE, and D‐Link EOL zero‐day

Read More

InfoSec.Watch — Issue #119

Jan 5, 2026

WatchGuard VPN RCE, MongoDB MongoBleed, and WebRAT GitHub traps

Read More

InfoSec.Watch — Issue #118

Dec 29, 2025

Cisco AsyncOS zero-day exploited in the wild; record crypto theft and infrastructure threats highlight evolving cyber risk

Read More

InfoSec.Watch — Issue #117

Dec 22, 2025

Cisco email gateway zero-day, Apple WebKit exploits, and $2B DPRK crypto theft

Read More

InfoSec.Watch — Weekly Issue #116

Dec 15, 2025

React2Shell Exploitation Surges, React RCE Malware, Apple & Windows 0‐Days

Read More
Load more

Join the Watch

Actionable insights on threats, vulnerabilities, and industry shifts — delivered weekly.

© 2026 InfoSec.Watch.
Report abusePrivacy policyTerms of use
beehiivPowered by beehiiv