Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Highlights Four Actively Exploited Security Vulnerabilities

CISA Highlights Four Actively Exploited Security Vulnerabilities

Posted on February 18, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its Known Exploited Vulnerabilities (KEV) catalog to include four new security flaws. These vulnerabilities are reportedly being actively exploited, prompting CISA to take swift action to inform and protect affected parties.

Details on the Newly Identified Vulnerabilities

The vulnerabilities added to the KEV catalog include CVE-2026-2441, a critical use-after-free flaw in Google Chrome with a CVSS score of 8.8. This issue could enable remote attackers to exploit heap corruption through specially crafted HTML content. Another notable vulnerability is CVE-2024-7694 found in TeamT5 ThreatSonar Anti-Ransomware, which affects versions 3.4.5 and earlier. This flaw allows attackers to upload harmful files and execute arbitrary commands on the server.

Additionally, CVE-2020-7796, a server-side request forgery vulnerability in Synacor Zimbra Collaboration Suite, has been flagged. This vulnerability, with a CVSS score of 9.8, permits unauthorized access to sensitive data by sending crafted HTTP requests. Lastly, CVE-2008-0015, a stack-based buffer overflow in Microsoft Windows Video ActiveX Control, poses a significant risk of remote code execution.

Exploitation Reports and Mitigation Efforts

The inclusion of CVE-2026-2441 follows Google’s acknowledgment of its active exploitation. While specifics on the exploitation methods remain undisclosed, this is a strategic measure to allow users time to update their systems. For CVE-2020-7796, a March 2025 report by GreyNoise revealed coordinated exploitation by 400 IP addresses targeting systems in several countries, including the U.S. and Germany.

Microsoft has highlighted the risks associated with CVE-2008-0015, noting its capability to download additional malware, such as the Dogkild worm, which can spread via removable drives and compromise system integrity. Although the exploitation of the TeamT5 ThreatSonar vulnerability remains unclear, the Federal Civilian Executive Branch is advised to implement updates by March 10, 2026.

Implications and Recommended Actions

The alert from CISA underscores the critical nature of these vulnerabilities and the need for timely action. Organizations and individuals using affected products are strongly urged to apply the latest security patches to mitigate potential risks. Keeping systems up-to-date is crucial in defending against these active threats.

Moving forward, continuous monitoring and adherence to cybersecurity best practices are essential to safeguard against emerging vulnerabilities. CISA’s proactive updates serve as a reminder of the ever-evolving landscape of cyber threats and the importance of vigilance in cybersecurity efforts.

The Hacker News Tags:CISA, Cybersecurity, Google Chrome, KEV update, Microsoft Windows, security flaws, Synacor Zimbra, TeamT5, threat intelligence, Vulnerabilities

Post navigation

Previous Post: Critical Flaw in Windows Admin Center Enables Privilege Escalation
Next Post: Dell RecoverPoint Exploited by Chinese Hackers

Related Posts

APT28 Exploits Microsoft Office Flaw in Malware Attacks APT28 Exploits Microsoft Office Flaw in Malware Attacks The Hacker News
Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware The Hacker News
How Leading CISOs are Getting Budget Approval How Leading CISOs are Getting Budget Approval The Hacker News
Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations The Hacker News
New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale The Hacker News
China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Flaw in Popular VS Code Extension Exposes Developers
  • Notepad++ Secures Update Process Against Malware Threat
  • CISA Alerts on Active Exploitation of Google Chromium Vulnerability
  • Palo Alto Networks to Acquire Koi for Enhanced AI Security
  • CRESCENTHARVEST Malware Targets Iran Protesters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Flaw in Popular VS Code Extension Exposes Developers
  • Notepad++ Secures Update Process Against Malware Threat
  • CISA Alerts on Active Exploitation of Google Chromium Vulnerability
  • Palo Alto Networks to Acquire Koi for Enhanced AI Security
  • CRESCENTHARVEST Malware Targets Iran Protesters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News