Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2026-1731: Unauthenticated OS Command Injection Vulnerability in BeyondTrust Remote Support and Privileged Remote Access

On February 6, 2026, BeyondTrust released fixes for a critical vulnerability affecting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA), tracked as CVE‑2026‑1731. This vulnerability allows unauthenticated remote threat actors to execute operating system commands in the context of the site user via specially crafted requests.

What Are Insider Threats?

Cybersecurity isn’t only about defending against external attackers. Some of the most damaging risks come from within an organization. These are known as insider threats. An insider threat occurs when someone with authorized access—whether intentionally malicious or simply negligent—compromises systems, exposes data, or undermines security controls. This can result in data breaches, financial loss, regulatory issues, and long‑term reputational damage.

What Is Phishing?

Phishing remains one of the most widespread and damaging cyber threats facing organizations today. Attackers craft deceptive messages designed to trick users into revealing credentials, financial information, or installing malware. To make matters worse, the tactics continue to evolve. Originating in the mid‑1990s, phishing has grown into a sophisticated weapon. Modern attackers now use AI, social media intelligence, and high‑quality impersonation techniques to create convincing campaigns that are harder than ever to detect.

The Role of Artificial Intelligence in Zero Trust Cybersecurity Frameworks

Artificial intelligence (AI) is no longer an experimental capability in cybersecurity; it is foundational to modern security operations. Organizations are operating in environments defined by cloud-first infrastructure, remote and hybrid workforces, SaaS sprawl, and identity-centric attack patterns. At the same time, threat actors increasingly rely on automation and AI to accelerate reconnaissance, credential abuse, and post-compromise activity.

Notepad++ Publishes Full Details of 2025 Compromise

On February 2, 2026, the Notepad++ open source project disclosed new details about a supply chain compromise that impacted its update delivery infrastructure between June and December 2025. The attack was attributed to state-sponsored threat actors with links to China. In this campaign, the threat actors had gained access to a third-party hosting provider used by Notepad++ to distribute updates.

CVE-2026-1281 and CVE-2026-1340: Unauthenticated RCE Zero-Day Vulnerabilities in Ivanti Endpoint Manager Mobile

On January 29, 2026, Ivanti released fixes for two critical zero-day code injection vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM). The vulnerabilities, tracked as CVE-2026-1281 and CVE-2026-1340, impact the In-House Application Distribution and Android File Transfer Configuration features and allow unauthenticated remote threat actors to achieve remote code execution.

Multiple Critical Authentication Bypass and Remote Code Execution Vulnerabilities Fixed in SolarWinds Web Help Desk

On January 28, 2026, SolarWinds released fixes for multiple vulnerabilities impacting Web Help Desk (WHD). WHD is an IT service management platform that may contain sensitive information, making it a valuable target for threat actors if compromised. Among the vulnerabilities addressed, four were rated as critical: At the time of writing, Arctic Wolf has not observed exploitation of these vulnerabilities in the wild, nor identified a publicly available proof-of-concept exploit.

CVE-2026-24858: FortiCloud SSO Authentication Bypass Vulnerability Exploited

On January 27, 2026, Fortinet released an advisory detailing a critical authentication bypass vulnerability affecting FortiOS, FortiAnalyzer, FortiManager, and FortiProxy products. Designated CVE-2026-24858, the vulnerability allows an unauthenticated threat actor with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.

How to Integrate ITSM in Managed Risk for Better Visibility and Faster Remediation

See how Arctic Wolf Managed Risk turns risk visibility into remediation through seamless integrations with partners like ServiceNow and ConnectWise. This demo shows how automated ticketing, unified workflows, and prioritized findings help security and IT teams accelerate remediation without added workload.