Threat Report 2/21/25
Critical Patches Issued for Microsoft ProductS Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could...
Multiple vulnerabilities have been identified in the Google Android operating system. The most critical of these flaws could allow an attacker to execute code remotely on affected devices.
Android is a mobile operating system developed by Google and used on a wide range of devices, including smartphones, tablets, and smartwatches. If successfully exploited, the most severe vulnerability could enable attackers to run malicious code on the device. Depending on the privileges of the compromised component, attackers may be able to install applications, view or modify data, delete files, or create new accounts with full administrative rights.
Google has reported that CVE-2026-21385 may already be experiencing limited, targeted exploitation.
Affected Systems
Risk Level
Recommended Actions
Reference
https://source.android.com/docs/security/bulletin/2026/2026-03-01#framework
Multiple vulnerabilities have been discovered in several Cisco security products. The most severe of these flaws could allow an attacker to execute code remotely on affected systems.
The vulnerabilities impact several Cisco firewall and management platforms, including:
Successful exploitation of the most critical vulnerabilities could allow an attacker to execute arbitrary code with root privileges, potentially leading to a complete compromise of the affected device.
Affected Systems
Risk Level
Recommended Actions
https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75736
A vulnerability has been discovered in pac4j-jwt (JwtAuthenticator) that could allow an attacker to bypass authentication controls.
pac4j-jwt is a Java module within the pac4j security framework used to generate, validate, and manage JSON Web Tokens (JWTs) for securing web applications and services. The module supports both signed and encrypted tokens and commonly relies on the Nimbus JOSE+JWT library to handle authentication, user profile generation, and signature configuration.
Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to bypass authentication mechanisms and log in as any user—including administrators—without knowing valid credentials or secrets. This could allow attackers to gain unauthorized access and perform actions with elevated privileges.
Affected Systems
Risk Level
Recommended Actions
Reference
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29000
Researchers have identified a large-scale campaign involving an iOS exploit framework that has reportedly compromised at least 42,000 devices, according to CyberScoop.
The framework, known as “Coruna,” is believed to have originally been developed by the U.S. government before being leaked and later repurposed by cybercriminal groups and foreign nation-state actors. Security researchers from iVerify and the Google Threat Intelligence Group (GTIG) have published separate reports analyzing the toolkit and its use in ongoing attacks.
According to GTIG, the Coruna exploit kit includes five complete iOS exploit chains and a total of 23 exploits. The framework is notable for its advanced capabilities, including the use of non-public exploitation techniques and methods designed to bypass built-in iOS security protections.
Researchers have observed the toolkit being used in attacks by China-based cybercriminal groups, as well as by a Russian espionage actor targeting Ukrainian individuals and organizations.
iVerify researchers describe the activity as the first known large-scale criminal campaign exploiting mobile phones—including iOS devices—using tools likely originally developed by a nation-state.
The Iranian state-sponsored threat actor MuddyWater (also known as Seedworm or Static Kitten) has compromised several organizations in the United States and abroad, according to researchers at Symantec.
In early February 2026, the group reportedly infiltrated multiple entities, including a U.S. bank, an airport, several U.S. and Canadian non-profit organizations, and the Israeli operations of a U.S.-based software company. During these intrusions, the attackers deployed a newly identified backdoor called “Dindoor,” as well as a Python-based backdoor known as “Fakeset.”
The activity continued even after U.S. and Israeli military strikes on Iran beginning on February 28, 2026. Researchers note that it remains unclear whether the ongoing conflict has disrupted MuddyWater’s operations. However, the group’s existing access to networks in the United States and Israel prior to the escalation of hostilities places it in a potentially dangerous position to conduct further cyberattacks.
The U.S. government has attributed MuddyWater to Iran’s Ministry of Intelligence and Security (MOIS).
Critical Patches Issued for Microsoft ProductS Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could...
1 min read
Critical Google Chrome Vulnerabilities Identified Multiple vulnerabilities have been discovered in Google Chrome, including acritical flaw that...
1 min read
Critical Patches Issued for Microsoft Products Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which...