Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ivanti Zero-Day Vulnerability Impacts Dutch and EU Agencies

Ivanti Zero-Day Vulnerability Impacts Dutch and EU Agencies

Posted on February 10, 2026 By CWS

Recent disclosures from the Netherlands’ Dutch Data Protection Authority (AP) and the Council for the Judiciary (Rvdr) highlight a significant cybersecurity incident. Both entities confirmed their systems were compromised due to vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM). A notice sent to the Dutch parliament on Friday elaborated on the situation, emphasizing the breach of employee contact data.

Details of the Cybersecurity Breach

On January 29, 2026, Ivanti notified the National Cyber Security Center (NCSC) about security flaws in its EPMM product. This software plays a crucial role in managing mobile devices and ensuring their security. Unauthorized access to work-related information, including names, business email addresses, and phone numbers of AP employees, has been confirmed.

The European Commission has similarly reported a potential breach, stating that traces of a cyber attack were identified within its central mobile device management infrastructure. Despite the rapid containment of the incident within nine hours, the European Commission remains vigilant, assuring that none of its mobile devices were compromised.

Wider Implications Across Europe

Alongside the Dutch and EU incidents, Finland’s Valtori, the state information and communications technology provider, disclosed a breach affecting up to 50,000 government employees. This attack exploited a zero-day vulnerability within their mobile device management service, further illustrating the widespread impact of the Ivanti flaws.

Valtori’s investigation revealed that vulnerabilities, specifically CVE-2026-1281 and CVE-2026-1340, were used to execute unauthorized remote code execution. Despite the immediate application of patches provided by Ivanti, the breach still resulted in exposure of sensitive work-related data.

Response and Future Measures

The affected agencies have undertaken measures to secure their systems and prevent future attacks. The European Commission stressed its commitment to the security and resilience of its internal systems. Both the Dutch authorities and Valtori are conducting thorough investigations to mitigate the impact and prevent recurrence.

It has become evident that the management system failed to permanently erase deleted data, merely marking it as removed. This oversight has potentially compromised device and user data across multiple organizations. The situation underscores the critical need for robust data management policies and proactive security measures to safeguard sensitive information.

As investigations continue, the emphasis remains on enhancing cybersecurity frameworks and ensuring that vulnerabilities like these are swiftly addressed to protect organizational data from unauthorized access.

The Hacker News Tags:cyber attack, Cybersecurity, data breach, data protection, Dutch authorities, EU agencies, Ivanti, mobile device management, security flaw, zero-day

Post navigation

Previous Post: Bloody Wolf Hackers Use NetSupport RAT in Targeted Attacks
Next Post: Chinese Cyberattack Hits Singapore’s Telecom Sector

Related Posts

CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation The Hacker News
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts The Hacker News
State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability The Hacker News
How To Automate Ticket Creation, Device Identification and Threat Triage With Tines How To Automate Ticket Creation, Device Identification and Threat Triage With Tines The Hacker News
Rethinking AI Data Security: A Buyer’s Guide  Rethinking AI Data Security: A Buyer’s Guide  The Hacker News
Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News