Cyber Daily 2/13: Apple Zero-Day Exploit, Microsoft Notepad Flaw, Palo Alto Firewall Reboot, Telnet Traffic Drop Signals Warning

Cyber Daily 2/13: Apple Zero-Day Exploit, Microsoft Notepad Flaw, Palo Alto Firewall Reboot, Telnet Traffic Drop Signals Warning

Welcome to the ONSEC Cyber Daily, where today's issue unfolds a gripping narrative of vulnerabilities and warnings that echo across the digital landscape. As Telnet traffic mysteriously drops, hinting at an advance warning, the cybersecurity world braces for impact. Nucleus Security, a beacon in exposure management, continues to correlate vulnerabilities, assets, and risk signals, while Palo Alto Networks faces a critical firewall vulnerability that could send systems into a reboot loop. Meanwhile, Huntress Labs shines a light on a SolarWinds flaw, and Microsoft races to patch a critical Notepad vulnerability. Amidst this, Apple urgently addresses a zero-day flaw in a sophisticated attack, urging rapid patching. As the cyber world grapples with these threats, ZAST.AI secures $6 million to redefine cybersecurity standards. Join us as we delve into these stories and more, weaving a tale of caution and resilience in the face of digital adversity.

Exploits Alert

  1. Telnet Vulnerability: Traffic Drop Suggests Advance Warning: A critical vulnerability in Telnet has been identified, leading to a significant drop in traffic, which suggests that there might have been an advance warning of the exploit. This vulnerability could potentially allow attackers to intercept or manipulate data transmitted over Telnet connections. Organizations using Telnet are advised to review their security measures and consider alternative protocols. Source: SC Media.
  2. Palo Alto Networks Firewall Vulnerability Allows an Attacker to Force Firewalls into a Reboot Loop: A newly discovered vulnerability in Palo Alto Networks firewalls can be exploited to force the devices into a continuous reboot loop, effectively disrupting network operations. This flaw poses a significant risk to organizations relying on these firewalls for network security. Immediate patching and mitigation strategies are recommended to prevent potential exploitation. Source: Cyber Security News.
  3. Huntress Labs Identify SolarWinds Cybersecurity Vulnerability: Huntress Labs has identified a critical vulnerability in SolarWinds' Web Help Desk software, which has been listed on the Cybersecurity and Infrastructure Security Agency's known exploited vulnerabilities. This vulnerability could be leveraged by threat actors to gain unauthorized access to sensitive systems. Organizations using this software should prioritize applying security patches. Source: The National Law Review.
  4. Microsoft Patches Critical Notepad Vulnerability Allowing Code Execution: Microsoft has released a patch for a critical vulnerability in Notepad that could allow attackers to execute arbitrary code on affected systems. This vulnerability highlights the importance of keeping even seemingly benign applications up to date with the latest security patches. Users are urged to apply the update immediately to protect their systems. Source: SC Media.
  5. Time to Exploit Plummets as N-Day Flaws Dominate: The cybersecurity landscape is witnessing a significant reduction in the time it takes for attackers to exploit known vulnerabilities, particularly N-Day flaws. This trend underscores the urgent need for organizations to adopt proactive vulnerability management and rapid patch deployment strategies to mitigate risks. Source: Infosecurity Magazine.

Vulnerabilities & Patches

  1. Critical BeyondTrust RCE Flaw Now Exploited in Attacks, Patch Now: A critical remote code execution vulnerability, tracked as CVE-2026-1731, has been discovered in BeyondTrust Remote Support versions 25.3.1 and earlier. With a CVSS score of 9.9, this flaw is being actively exploited, making it imperative for users to apply the patch immediately to prevent potential attacks. The U.S. accounts for over half of the exposed hosts, highlighting the widespread nature of this vulnerability. Source: Bleeping Computer
  2. Windows 11 Notepad Bug Lets Markdown Links Run Files Without Warning: A vulnerability in Windows 11's Notepad, identified as CVE-2026-20841, allows attackers to execute files via Markdown links without user warning. This flaw was addressed in the February 2026 Patch Tuesday updates, underscoring the importance of keeping systems updated to mitigate such risks. Users are advised to apply the latest patches to safeguard against potential exploitation. Source: gHacks
  3. Microsoft's February Patch Tuesday Fixes 6 Zero-Days Under Attack: Microsoft's latest Patch Tuesday includes fixes for 59 vulnerabilities, with six zero-days actively exploited in the wild. These vulnerabilities span across Windows, Office, and Remote Desktop components, emphasizing the critical need for users to update their systems promptly. The updates aim to protect against potential exploitation and enhance overall system security. Source: TechRepublic
  4. Chrome Security Update - Patch for Vulnerabilities that Enables Code Execution Attacks: Google has released a security update for Chrome, addressing several high-severity vulnerabilities, including one that allows code execution attacks. Users are urged to update their browsers immediately to protect against potential threats. The update will roll out over the coming weeks, ensuring enhanced security for Chrome users worldwide. Source: Cybersecurity News
  5. Microsoft Patches Critical Notepad Vulnerability Allowing Code Execution: A critical vulnerability in Microsoft's Notepad, tracked as CVE-2026-20841, has been patched, preventing potential code execution attacks. Discovered by security researchers Cristian Papa, Alasdair Gorniak, and Chen, this flaw highlights the importance of regular software updates to maintain system security. Users are encouraged to apply the latest patches to mitigate the risk of exploitation. Source: SC Media

Podcasts

  1. Cyber Security: A Month In Retrospect And Our Latest Podcast: This podcast features Professor Ciaran Martin, a renowned cyber thought leader, discussing the latest trends and challenges in cybersecurity. The episode provides insights into how governments and organizations can better prepare for cyber threats. Source.
  2. When Security Becomes an Afterthought: In this milestone 100th episode of the Threat Vector podcast, Nikesh Arora discusses the common oversight of cybersecurity in technology development. The episode emphasizes the importance of integrating security from the outset to prevent vulnerabilities. Source.
  3. Cybersecurity's Broken Hiring Process: This episode from the CISO Series delves into the challenges and inefficiencies in hiring for cybersecurity roles. It highlights the need for a more streamlined and effective recruitment process to address the growing demand for skilled professionals. Source.
  4. Cybersecurity News: Crazy Gang Abuses Employee Tool: This podcast episode covers recent cybersecurity news, including the misuse of employee monitoring tools and new data classification regulations in Nevada. It provides a comprehensive overview of current events impacting the cybersecurity landscape. Source.
  5. The Connected AI Podcast: Raluca Saceanu on How AI is Changing Cyber Security: Raluca Saceanu, CEO of Smartech247, discusses the transformative role of AI in cybersecurity. The episode explores how AI technologies are being leveraged to enhance threat detection and response capabilities. Source.

Final Words

As we wrap up today's edition of ONSEC Cyber Daily, it's clear that the digital landscape is ever-evolving, with vulnerabilities like the Telnet issue and the Palo Alto Networks firewall reboot loop serving as stark reminders of the challenges we face. Companies like Nucleus Security are at the forefront, helping us manage these exposures by connecting vulnerabilities, assets, and risk signals. Meanwhile, the cybersecurity community continues to adapt, with firms like ZAST.AI securing funding to push the boundaries of vulnerability detection. In this interconnected world, staying informed is crucial. That's why we encourage you to share ONSEC Cyber Daily with your friends and colleagues. By spreading the word, you help build a more informed and resilient community, ready to tackle the cyber threats of today and tomorrow. Together, let's stay ahead of the curve and keep our digital world secure. Until next time, stay safe and vigilant!

ONSEC.io | LinkedIn
ONSEC.io | 1,839 followers on LinkedIn. Information security audits and penetration testing by a team of experts with an average experience of more than 7 years | ONSEC.io - is a penetration testing & in-depth security audit company with more than 13 years of experience on the market. Our team has already helped more than 300 companies be aware about possible system's vulnerabilities, including Republic, DMarket, LegionFarm, Parallels, Xsolla, Acronis, Manyсhat, Global Fashion Group and others. Our main goal is to increase the customer security level by finding and fixing security issues as well as improve security awareness inside the company, including developers, DevOps, and other teams to build a sustainable engineering culture with security knowledge.