Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Biometric passwordless login and EU digital wallet security platform

CISA reports four actively exploited security flaws in latest KEV update

US court bans use of OpenAI’s ‘Cameo’

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA reports four actively exploited security flaws in latest KEV update
Identity

CISA reports four actively exploited security flaws in latest KEV update

userBy userFebruary 18, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 18, 2026Threat Intelligence/Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of them being exploited in the wild.

Here is the list of vulnerabilities:

CVE-2026-2441 (CVSS score: 8.8) – Use-after-free vulnerability in Google Chrome allows remote attackers to potentially exploit heap corruption via a crafted HTML page. CVE-2024-7694 (CVSS Score: 7.2) – Arbitrary file upload vulnerability in TeamT5 ThreatSonar Anti-Ransomware versions 3.4.5 and earlier could allow an attacker to upload a malicious file and execute arbitrary system commands on the server. CVE-2020-7796 (CVSS Score: 9.8) – A server-side request forgery (SSRF) vulnerability in Synacor Zimbra Collaboration Suite (ZCS) could allow an attacker to send a crafted HTTP request to a remote host and gain unauthorized access to sensitive information. CVE-2008-0015 (CVSS Score: 8.8) – A stack-based buffer overflow vulnerability in the Microsoft Windows Video ActiveX control could allow an attacker to execute remote code by setting up a specially crafted web page.

The addition of CVE-2026-2441 to the KEV catalog comes days after Google acknowledged that “an exploit for CVE-2026-2441 does exist.” It is currently unknown how this vulnerability is being weaponized, but such information is typically withheld until the majority of users have been updated with the fix to prevent other threat actors from joining the wave of exploitation.

Regarding CVE-2020-7796, a report published in March 2025 by threat intelligence firm GreyNoise revealed that a cluster of approximately 400 IP addresses was actively exploiting multiple SSRF vulnerabilities, including CVE-2020-7796, targeting susceptible instances in the United States, Germany, Singapore, India, Lithuania, and Japan.

“When a user visits a web page containing an exploit detected as Exploit:JS/CVE-2008-0015, it may connect to a remote server and download other malware,” Microsoft notes in its Threat Encyclopedia. The company also said it is aware of cases where the exploit could be used to download and execute the Dogkild worm, which propagates through removable drives.

The worm has the ability to retrieve and execute additional binaries, overwrite certain system files, terminate a long list of security-related processes, and even replace the Windows host file to prevent users from accessing websites related to security programs.

It is currently unknown how the TeamT5 ThreatSonar Anti-Ransomware vulnerability is being exploited. Federal Civilian Executive Branch (FCEB) agencies are encouraged to apply the necessary amendments by March 10, 2026 for optimal protection.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUS court bans use of OpenAI’s ‘Cameo’
Next Article Biometric passwordless login and EU digital wallet security platform
user
  • Website

Related Posts

Researchers show Copilot and Grok can be exploited as malware C2 proxies

February 17, 2026

Keenadu firmware backdoor infects Android tablets via signed OTA update

February 17, 2026

SmartLoader attack uses Trojanized Oura MCP server to deploy StealC Infostealer

February 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Biometric passwordless login and EU digital wallet security platform

CISA reports four actively exploited security flaws in latest KEV update

US court bans use of OpenAI’s ‘Cameo’

Tesla avoids 30-day suspension in California by removing Autopilot

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.