Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ivanti Zero-Day Vulnerability Impacts Dutch and EU Agencies

Ivanti Zero-Day Vulnerability Impacts Dutch and EU Agencies

Posted on February 10, 2026 By CWS

Recent disclosures from the Netherlands’ Dutch Data Protection Authority (AP) and the Council for the Judiciary (Rvdr) highlight a significant cybersecurity incident. Both entities confirmed their systems were compromised due to vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM). A notice sent to the Dutch parliament on Friday elaborated on the situation, emphasizing the breach of employee contact data.

Details of the Cybersecurity Breach

On January 29, 2026, Ivanti notified the National Cyber Security Center (NCSC) about security flaws in its EPMM product. This software plays a crucial role in managing mobile devices and ensuring their security. Unauthorized access to work-related information, including names, business email addresses, and phone numbers of AP employees, has been confirmed.

The European Commission has similarly reported a potential breach, stating that traces of a cyber attack were identified within its central mobile device management infrastructure. Despite the rapid containment of the incident within nine hours, the European Commission remains vigilant, assuring that none of its mobile devices were compromised.

Wider Implications Across Europe

Alongside the Dutch and EU incidents, Finland’s Valtori, the state information and communications technology provider, disclosed a breach affecting up to 50,000 government employees. This attack exploited a zero-day vulnerability within their mobile device management service, further illustrating the widespread impact of the Ivanti flaws.

Valtori’s investigation revealed that vulnerabilities, specifically CVE-2026-1281 and CVE-2026-1340, were used to execute unauthorized remote code execution. Despite the immediate application of patches provided by Ivanti, the breach still resulted in exposure of sensitive work-related data.

Response and Future Measures

The affected agencies have undertaken measures to secure their systems and prevent future attacks. The European Commission stressed its commitment to the security and resilience of its internal systems. Both the Dutch authorities and Valtori are conducting thorough investigations to mitigate the impact and prevent recurrence.

It has become evident that the management system failed to permanently erase deleted data, merely marking it as removed. This oversight has potentially compromised device and user data across multiple organizations. The situation underscores the critical need for robust data management policies and proactive security measures to safeguard sensitive information.

As investigations continue, the emphasis remains on enhancing cybersecurity frameworks and ensuring that vulnerabilities like these are swiftly addressed to protect organizational data from unauthorized access.

The Hacker News Tags:cyber attack, Cybersecurity, data breach, data protection, Dutch authorities, EU agencies, Ivanti, mobile device management, security flaw, zero-day

Post navigation

Previous Post: Bloody Wolf Hackers Use NetSupport RAT in Targeted Attacks
Next Post: Chinese Cyberattack Hits Singapore’s Telecom Sector

Related Posts

 Google Sues China-Based Hackers Behind  Billion Lighthouse Phishing Platform  Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform The Hacker News
Turning Disruptive Technology into a Strategic Advantage Turning Disruptive Technology into a Strategic Advantage The Hacker News
WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor The Hacker News
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms The Hacker News
Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session The Hacker News
Can your SOC Save You? Can your SOC Save You? The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • APT36 and SideCopy Target Indian Defense with RATs
  • Prometei Botnet Targets Windows Servers with Advanced Tactics
  • Zast.AI Secures $6 Million for Advanced Code Security
  • Critical MSHTML Vulnerability Spurs Urgent Microsoft Patch
  • Defend Against Identity Threats: Join Our Webinar

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • APT36 and SideCopy Target Indian Defense with RATs
  • Prometei Botnet Targets Windows Servers with Advanced Tactics
  • Zast.AI Secures $6 Million for Advanced Code Security
  • Critical MSHTML Vulnerability Spurs Urgent Microsoft Patch
  • Defend Against Identity Threats: Join Our Webinar

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark