InfoSec.Watch — Newsletter

🚨 Top Stories

Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their privileges. Windows Admin Center is a locally deployed, browser-based management tool set that lets users manage their Windows Clients, Servers, and Clust...

Source: https://thehackernews.com/2026/02/microsoft-patches-cve-2026-26119.html

💡 Key Takeaway: Identify exposure, prioritize patching/mitigations for internet-facing or high-privilege paths, and add detections for exploit attempts.

Total Takeover Threat: Critical Icewarp Flaws Trigger Emergency Server Patches

IceWarp urges immediate patching for critical flaws allowing unauthorized server access, XSS, and arbitrary file reading. Update your instances today.

Source: https://securityonline.info/total-takeover-threat-critical-icewarp-flaws-trigger-emergency-server-patches/

💡 Key Takeaway: Identify exposure, prioritize patching/mitigations for internet-facing or high-privilege paths, and add detections for exploit attempts.

The CAPTCHA Trap: How a Fake “clickfix” Prompt Unleashed Latrodectus & Supper Malware

CERT Polska reveals how a fake "ClickFix" CAPTCHA campaign tricked users into deploying evasive Latrodectus and Supper malware. Protect your network now.

Source: https://securityonline.info/the-captcha-trap-how-a-fake-clickfix-prompt-unleashed-latrodectus-supper-malware/

💡 Key Takeaway: Validate controls around initial access (MFA, phishing-resistant auth), review logs for IOCs, and rehearse containment for the affected TTPs.

🛡️ Vulnerability Spotlight

Vshell and Sparkrat Observed in Exploitation of Beyondtrust Critical Vulnerability (CVE-2026-1731)

CVE-2026-1731 is an RCE vulnerability in identity platform BeyondTrust. This flaw allows attackers control of systems without login credentials.

Source: https://unit42.paloaltonetworks.com/beyondtrust-cve-2026-1731/

💡 Key Takeaway: Identify exposure, prioritize patching/mitigations for internet-facing or high-privilege paths, and add detections for exploit attempts.

CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 Voip Phones (FIXED)

Overview Rapid7 Labs conducted a zero-day research project against the Grandstream GXP1600 series of Voice over Internet Protocol (VoIP) phones. This research resulted in the discovery of a critical unauthenticated stack-based buffer overflow vulnerability, CVE-2026-2329.

Source: https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed

💡 Key Takeaway: Identify exposure, prioritize patching/mitigations for internet-facing or high-privilege paths, and add detections for exploit attempts.

Dell Recoverpoint for Vms Zero-day CVE-2026-22769 Exploited Since Mid-2024

A maximum severity security vulnerability in Dell RecoverPoint for Virtual Machines has been exploited as a zero-day by a suspected China-nexus threat cluster dubbed UNC6201 since mid-2024, according to a new report from Google Mandiant and Google Threat Intelligence Group (GT...

Source: https://thehackernews.com/2026/02/dell-recoverpoint-for-vms-zero-day-cve.html

💡 Key Takeaway: Identify exposure, prioritize patching/mitigations for internet-facing or high-privilege paths, and add detections for exploit attempts.

📈 Trend to Watch

Clickfix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware

Cybersecurity researchers have disclosed details of a new ClickFix campaign that abuses compromised legitimate sites to deliver a previously undocumented remote access trojan (RAT) called MIMICRAT (aka AstarionRAT). "The campaign demonstrates a high level of operational sophis...

Source: https://thehackernews.com/2026/02/clickfix-campaign-abuses-compromised.html

💡 Key Takeaway: Validate controls around initial access (MFA, phishing-resistant auth), review logs for IOCs, and rehearse containment for the affected TTPs.

🏛️ Policy & Regulation Watch

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

Source: https://thehackernews.com/2026/02/cisa-adds-two-actively-exploited.html

💡 Key Takeaway: Track obligations and deadlines, map requirements to existing controls, and document evidence collection before audits/enforcement tighten.

CISA: Beyondtrust RCE Flaw Now Exploited in Ransomware Attacks

Hackers are actively exploiting the CVE-2026-1731 vulnerability in the BeyondTrust Remote Support product, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns.

Source: https://www.bleepingcomputer.com/news/security/cisa-beyondtrust-rce-flaw-now-exploited-in-ransomware-attacks/

💡 Key Takeaway: Track obligations and deadlines, map requirements to existing controls, and document evidence collection before audits/enforcement tighten.

🧰 Tool / Resource of the Week

Don’t Trust Trustconnect: This Fake Remote Support Tool Only Helps Hackers

After breaking into a system, crooks often install legitimate remote admin tools to keep a foothold on the network — with the risk that the tool’s vendor spots them and locks them out. Now they have a new option: a fake remote monitoring and management (RMM) tool, complete wit...

Source: https://www.csoonline.com/article/4135307/dont-trust-trustconnect-this-fake-remote-support-tool-only-helps-hackers.html

💡 Key Takeaway: Pilot in a sandbox, validate coverage against your environment, and add it to a repeatable workflow (CI, detection engineering, or hardening).

⚡ Quick Hits

Critical Grandstream Phone Vulnerability Exposes Calls to Interception

The flaw tracked as CVE-2026-2329 can be exploited without authentication for remote code execution with root privileges.

Source: https://www.securityweek.com/critical-grandstream-phone-vulnerability-exposes-calls-to-interception/

💡 Key Takeaway: Identify exposure, prioritize patching/mitigations for internet-facing or high-privilege paths, and add detections for exploit attempts.

New Phishing Campaign Tricks Employees Into Bypassing Microsoft 365 MFA

Another device code phishing campaign that abuses OAuth device registration to bypass multifactor authentication login protections has been discovered. Researchers at KnowBe4 say the campaign is largely targeting North American businesses and professionals by tricking unwittin...

Source: https://www.csoonline.com/article/4134874/new-phishing-campaign-tricks-employees-into-bypassing-microsoft-365-mfa.html

💡 Key Takeaway: Validate controls around initial access (MFA, phishing-resistant auth), review logs for IOCs, and rehearse containment for the affected TTPs.

CVE-2026-0229 PAN-OS: Denial of Service in Advanced DNS Security Feature (severity: MEDIUM)

Palo Alto Networks Security Advisory: CVE-2026-0229 PAN-OS: Denial of Service in Advanced DNS Security Feature A denial-of-service (DoS) vulnerability in the Advanced DNS Security (ADNS) feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to init...

Source: https://security.paloaltonetworks.com/CVE-2026-0229

💡 Key Takeaway: Identify exposure, prioritize patching/mitigations for internet-facing or high-privilege paths, and add detections for exploit attempts.

CISA Orders Feds to Patch Actively Exploited Dell Flaw Within 3 Days

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies to patch their systems within three days against a maximum-severity Dell vulnerability that has been under active exploitation since mid-2024.

Source: https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-actively-exploited-dell-flaw-within-3-days/

💡 Key Takeaway: Identify exposure, prioritize patching/mitigations for internet-facing or high-privilege paths, and add detections for exploit attempts.

CRESCENTHARVEST Campaign Targets Iran Protest Supporters with RAT Malware

Cybersecurity researchers have disclosed details of a new campaign dubbed CRESCENTHARVEST, likely targeting supporters of Iran's ongoing protests to conduct information theft and long-term espionage. The Acronis Threat Research Unit (TRU) said it observed the activity after Ja...

Source: https://thehackernews.com/2026/02/crescentharvest-campaign-targets-iran.html

💡 Key Takeaway: Validate controls around initial access (MFA, phishing-resistant auth), review logs for IOCs, and rehearse containment for the affected TTPs.

⚔️ Actionable Defense Move of the Week

One-week Tier-zero Validation Loop

For every Tier-Zero patch this week (firewalls, MDM/EMM, VPN, IAM, backup): 1) verify the new version on-box, 2) confirm exposure is removed/allowlisted with an external check, 3) review 14 days of admin/auth/config logs for anomalies, and 4) rotate secrets if compromise is plausible.

💡 Key Takeaway: Patching is step one—validation + assumed-breach log review is step two.

🧠 Final Word

This week’s theme: control planes and edge surfaces keep driving real-world blast radius. Treat exposure management as continuous—tighten identity, reduce reachable admin surfaces, and ship detections that assume exploitation attempts will happen.

💡 Key Takeaway: Treat control planes like production attack surface: reduce exposure, patch fast, and validate with logs—not hope.

Keep Reading