Heroes, your curated look at the current cybersecurity landscape for Feb 04, 2026.
Date & Time: 2026-02-03T21:14:49
Attackers are actively exploiting two critical zero-day vulnerabilities in Ivanti's Endpoint Manager Mobile (EPMM) software, allowing unauthorized control over mobile device management systems. These flaws enable attackers to bypass authentication and execute arbitrary commands on the network edge.
CVE: CVE-2026-1281, CVE-2026-1340 | Compliance: SOX, FISMA | Source: Cyberscoop ↗ ↗
Date & Time: 2026-02-04T05:50:00
CISA has confirmed active exploitation of a critical Remote Code Execution (RCE) vulnerability in SolarWinds Web Help Desk and added it to the Known Exploited Vulnerabilities (KEV) catalog. This flaw allows attackers to run malicious code on the server without needing valid credentials.
CVE: CVE-2025-40551 | Compliance: SOX | Source: The Hacker News ↗ ↗
Date & Time: 2026-02-03T17:13:59
A critical vulnerability with a CVSS score of 9.8 has been discovered in vLLM, a popular library for serving Large Language Models, allowing remote code execution via malicious video URLs. This flaw permits unauthenticated attackers to take over servers hosting AI models.
CVE: CVE-2026-22778 | Compliance: General Enterprise | Source: Orca Security ↗ ↗
Date & Time: 2026-02-03T16:41:00
A critical flaw in Docker's "Ask Gordon" AI assistant allowed attackers to execute code and exfiltrate data via malicious image metadata. This vulnerability highlights the risks associated with integrating AI assistants into development workflows.
CVE: n/a | Compliance: SOX | Source: The Hacker News ↗ ↗
Date & Time: 2026-02-04T07:42:00
Microsoft warns that Python-based information stealers are now actively targeting macOS users, spreading through fake advertisements and installers. This marks a significant expansion of malware campaigns that traditionally focused on Windows.
CVE: n/a | Compliance: SOX | Source: The Hacker News ↗ ↗
Date & Time: 2026-02-03T21:05:32
Varonis has acquired AllTrue.ai to enhance visibility and control over AI system behavior within the enterprise. This move addresses the growing need for AI Trust, Risk, and Security Management (AI TRiSM).
CVE: n/a | Compliance: SOX | Source: Varonis ↗ ↗
Date & Time: 2026-02-03T17:43:27
Orca Security has become the first third-party CNAPP to support agentless security assessments for Tencent Cloud workloads. This allows organizations with multi-cloud footprints in Asia to maintain consistent security posture.
CVE: n/a | Compliance: SOX | Source: Orca Security ↗ ↗
Date & Time: 2026-02-03T15:58:05 Summary & Significance: AttackIQ and Accenture are advocating for a shift to threat-informed defense by combining adversarial testing with AI-driven validation. This approach moves SOCs from reactive posturing to continuous, evidence-based verification of defensive effectiveness. Source: AttackIQ ↗. [AttackIQ +0]
Orca Security
Specialization: Cloud Native Application Protection Platform (CNAPP)
Why Orca Security Today: The threat summary details 'Cloud Malware' that utilizes fileless execution and exploits IAM misconfigurations, alongside the Google Looker cloud vulnerability. Orca's agentless SideScanning technology is specifically engineered to detect these deep cloud risks, malware, and misconfigurations across AWS and Google Cloud environments without requiring the installation of agents on workloads.
Key Capability: Agentless detection of cloud malware and IAM risks
Recommended Actions: 1. Navigate to Alerts → Malware → Filter by 'Category: Malware' and 'Cloud Provider: GCP/AWS' 2. Navigate to Risks → Attack Paths → Filter by 'Risk Category: Identity & Access Management' 3. Navigate to Vulnerabilities → All Vulnerabilities → Search/Filter for 'Looker' or specific CVE ID
Verification Steps: - Trigger an On-Demand Scan (or wait for the next daily SideScan cycle) on the affected Cloud Accounts. - Review the 'Top Risky Assets' widget in the Dashboard.
This guidance is based on general platform knowledge. Verify against current Orca Security documentation.
⚠️ Disclaimer: Test all detection logic in non-production environments before deployment.
1. Vendor Platform Configuration - Orca Security
2. YARA Rule for vLLM RCE Exploitation Attempts
rule vLLM_RCE_Exploit_Attempt_CVE_2026_22778 {
meta:
description = "Detects potential exploitation artifacts of vLLM RCE (CVE-2026-22778) involving malicious video URLs"
author = "Threat Rundown"
date = "2026-02-04"
reference = "https://orca.security/?p=70436"
severity = "high"
tlp = "white"
strings:
$s1 = "vllm" ascii wide nocase
$s2 = "video_url=" ascii wide
$s3 = "/api/generate" ascii wide
$s4 = "python" ascii wide
$h1 = { 68 74 74 70 3a 2f 2f } // http:// pattern often associated with the payload URL
condition:
($s1 and $s2) or ($s1 and $s3 and $s4) or (any of ($s*) and $h1)
}
3. SIEM Query — SolarWinds WHD RCE (CVE-2025-40551)
index=security sourcetype="solarwinds:whd:access"
uri_path="*/helpdesk/WebObjects/HelpDesk.woa*" OR uri_path="*/helpdesk/WebObjects/WHD.woa*"
| eval risk_score=case(
status=200 AND method="POST", 100,
status=500, 50,
1==1, 0)
| where risk_score >= 50
| table _time, src_ip, dest_ip, uri_path, method, status, risk_score
| sort -_time
4. PowerShell Script — Check for Ivanti EPMM Version
This rundown should provide a solid overview of the current threat landscape. Thank you to all our cyberheroes for your diligence and hard work. Stay vigilant!