<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Don't Hack On Me: Signal]]></title><description><![CDATA[Breaking cybersecurity intelligence and rapid-response analysis on emerging threats that demand immediate attention.]]></description><link>https://www.donthackonme.com/s/signal</link><image><url>https://substackcdn.com/image/fetch/$s_!K0fs!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7ab19c9-0834-442e-a4f5-f9a9a247465a_1280x1280.png</url><title>Don&apos;t Hack On Me: Signal</title><link>https://www.donthackonme.com/s/signal</link></image><generator>Substack</generator><lastBuildDate>Thu, 16 Apr 2026 17:50:31 GMT</lastBuildDate><atom:link href="https://www.donthackonme.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Marcus J Carey]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[donthackonme@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[donthackonme@substack.com]]></itunes:email><itunes:name><![CDATA[Marcus J. Carey]]></itunes:name></itunes:owner><itunes:author><![CDATA[Marcus J. Carey]]></itunes:author><googleplay:owner><![CDATA[donthackonme@substack.com]]></googleplay:owner><googleplay:email><![CDATA[donthackonme@substack.com]]></googleplay:email><googleplay:author><![CDATA[Marcus J. Carey]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[First Chrome Zero-Day of 2026 Is Being Exploited Right Now — Update Every Chromium Browser You Own]]></title><description><![CDATA[CVE-2026-2441: A use-after-free in Chrome's CSS engine. Google won't say who's exploiting it. Patch is live. Don't wait for auto-update.]]></description><link>https://www.donthackonme.com/p/first-chrome-zero-day-of-2026-is</link><guid isPermaLink="false">https://www.donthackonme.com/p/first-chrome-zero-day-of-2026-is</guid><dc:creator><![CDATA[Marcus J. Carey]]></dc:creator><pubDate>Mon, 16 Feb 2026 17:44:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!paWo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!paWo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!paWo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!paWo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!paWo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!paWo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!paWo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png" width="1456" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:710038,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://donthackonme.substack.com/i/188140165?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!paWo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!paWo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!paWo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!paWo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Don&#8217;t Hack On Me &#8212; Signal February 16, 2026<em><br><br>The Story</em></h2><p>Google released an emergency Chrome update on Friday to patch CVE-2026-2441 &#8212; a high-severity (CVSS 8.8) use-after-free vulnerability in Chrome&#8217;s CSS engine that&#8217;s being actively exploited in the wild. It&#8217;s the first Chrome zero-day of 2026, and Google is doing what Google always does: confirming exploitation exists while saying absolutely nothing about who&#8217;s doing it or who&#8217;s being targeted.</p><p>The vulnerability is an iterator invalidation bug in CSSFontFeatureValuesMap &#8212; Chrome&#8217;s implementation of CSS font feature values. When Chrome parses stylesheets and applies them to the DOM, certain sequences of operations cause premature memory deallocation. An attacker can reallocate that freed memory with malicious data, redirecting execution flow. The attack is delivered via a crafted HTML page, meaning phishing links or compromised websites are the likely vector. Security researcher Shaheen Fazim discovered and reported the flaw on February 11. Google patched it two days later on February 13.</p><p>Here&#8217;s the part that matters: this isn&#8217;t just a Chrome problem. Every browser built on Chromium is affected &#8212; Microsoft Edge, Brave, Opera, Vivaldi, Arc, and any other Chromium-based browser you&#8217;re running. That&#8217;s roughly 70% of global browser market share running on a single engine. One vulnerability, one codebase, and most of the internet&#8217;s browsers need a patch. Chrome&#8217;s fixed versions are 145.0.7632.75/76 for Windows and Mac, and 144.0.7559.75 for Linux. Other Chromium browsers will ship their own patches as they pull in the fix.For context, Chrome had roughly 8 actively exploited zero-days in 2025 and 7 in 2024. That&#8217;s averaging close to one per month. Browser zero-days aren&#8217;t rare events anymore &#8212; they&#8217;re a recurring line item in your patching calendar.</p><h2>What Does This Mean to Me?</h2><p>If you&#8217;re in security operations: Update Chrome right now. Don&#8217;t wait for the auto-update cycle &#8212; this is an actively exploited zero-day, and you don&#8217;t know where this is going to show up. Go to chrome://settings/help, force the update, and restart your browser. If you manage endpoints, push the update through MDM immediately. Don&#8217;t rely on auto-update for a zero-day.</p><p>And it&#8217;s not just Chrome. Chromium is the backbone of almost everything. Edge, Brave, Opera, Vivaldi &#8212; and it goes beyond the obvious ones. Perplexity&#8217;s Comet browser runs on Chromium. Arc runs on Chromium. If it&#8217;s a browser and it&#8217;s not Firefox or Safari, it&#8217;s probably Chromium. Every one of those needs to be updated once their vendor ships the fix. Make sure you know which Chromium-based browsers are running in your environment, because your users might be on browsers your asset inventory doesn&#8217;t even track.</p><p>Everyone should have automatic browser updates enabled &#8212; that&#8217;s table stakes. But for an actively exploited zero-day, automatic isn&#8217;t fast enough. Manual update. Now.</p><p>If you&#8217;re in leadership: The Chromium monoculture is something worth thinking about. One vulnerability in one codebase just put ~70% of the world&#8217;s browsers at risk. Google patches fast &#8212; two days from report to fix is impressive &#8212; and Chrome&#8217;s sandbox architecture limits the blast radius of any single exploit. That&#8217;s the upside. The downside is that when the Chromium engine has a flaw, the attack surface is enormous.</p><p>This isn&#8217;t a &#8220;switch browsers&#8221; argument. The security benefits of Chromium&#8217;s architecture and update cadence are real. But it is an argument for making sure your browser patching is as tight as your OS patching. Browser zero-days are averaging one per month across 2024 and 2025. That&#8217;s not a spike &#8212; it&#8217;s the baseline. If your patching program doesn&#8217;t treat browser updates with the same urgency as OS patches, it&#8217;s time to fix that.</p><p>The bigger picture: We&#8217;ve normalized browser zero-days. Chrome had 7 in 2024, 8 in 2025, and the first one of 2026 just dropped. Google&#8217;s response is always the same &#8212; confirm exploitation, withhold details, ship a patch. The 2-day turnaround is genuinely good. But the cadence tells you something: browsers are one of the most valuable attack surfaces on the internet, and threat actors are investing heavily in finding and exploiting browser vulnerabilities. The best defense is the simplest one: keep your browser updated, and when a zero-day drops, don&#8217;t wait. Update now.</p><p>Stay alert. Don&#8217;t let them hack on you.Subscribe to Don&#8217;t Hack On Me | donthackonme.com</p><p><em>This post was researched, drafted, and edited with AI assistance. The analysis and perspective are Marcus&#8217;s. See something wrong? Leave a comment.</em></p><p></p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[OpenAI Built an AI That Can Hack Hardened Targets — Now They're Deciding Who Gets to Use It]]></title><description><![CDATA[GPT-5.3-Codex is the first AI model its own maker calls &#8216;high risk&#8217; for cyber. The Trusted Access program is their answer. Is it enough?]]></description><link>https://www.donthackonme.com/p/openai-built-an-ai-that-can-hack</link><guid isPermaLink="false">https://www.donthackonme.com/p/openai-built-an-ai-that-can-hack</guid><dc:creator><![CDATA[Marcus J. Carey]]></dc:creator><pubDate>Mon, 16 Feb 2026 01:32:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qDtA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qDtA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qDtA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!qDtA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!qDtA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!qDtA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qDtA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png" width="1456" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:710038,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://donthackonme.substack.com/i/188005234?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qDtA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!qDtA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!qDtA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!qDtA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Don&#8217;t Hack On Me &#8212; Signal February 15, 2026</p><h2>The Story</h2><p>On February 5, OpenAI released GPT-5.3-Codex &#8212; and quietly made history. It&#8217;s the first AI model that OpenAI itself classifies as &#8220;High&#8221; risk for cybersecurity under their Preparedness Framework. That classification means OpenAI believes the model can automate end-to-end cyber operations against reasonably hardened targets, or automate the discovery and exploitation of operationally relevant vulnerabilities. Read that again. The company that built it is telling you it can hack things.</p><p>The capability curve has been steep. OpenAI&#8217;s models went from a 27% success rate on capture-the-flag cybersecurity challenges (GPT-5, August 2025) to 76% (GPT-5.1-Codex-Max, November 2025). GPT-5.3-Codex pushes that further. The company also has Aardvark, an agentic security researcher in private beta that scans codebases, reasons over entire repositories, finds vulnerabilities, and proposes patches. Aardvark has already discovered and responsibly disclosed vulnerabilities that received 10 CVE identifiers in open source projects.</p><p>So what&#8217;s OpenAI&#8217;s answer to releasing a model that can hack hardened targets? A program called Trusted Access for Cyber &#8212; an identity and trust-based framework that gates enhanced cyber capabilities behind verification. Vetted security professionals get access. Everyone else gets guardrails. Individual users can verify their identity; enterprises can request trusted access for teams. There&#8217;s also an invite-only tier for security researchers who need more permissive models. OpenAI is backing it with $10 million in API credits for defensive cyber research.</p><p>Not everyone is satisfied with the safeguards. The Midas Project, an AI safety watchdog, pointed out that GPT-5.3-Codex triggered OpenAI&#8217;s own &#8220;high risk&#8221; threshold but was deployed without the specific misalignment safeguards the Preparedness Framework calls for at that level. OpenAI&#8217;s response: those safeguards are only required when high cyber capability occurs in conjunction with long-range autonomy. The model is a powerful tool, not an autonomous agent &#8212; the distinction matters.</p><p>Source:<a href="https://openai.com/index/trusted-access-for-cyber/">Trusted Access for Cyber</a> (OpenAI, February 5, 2026</p><h2>Who&#8217;s Covering This</h2><ul><li><p><a href="https://fortune.com/2026/02/05/openai-gpt-5-3-codex-warns-unprecedented-cybersecurity-risks/">Fortune</a> &#8212; &#8220;Unprecedented cybersecurity risks.&#8221; Focuses on the tension between capability advancement and safety. (February 5, 2026)</p></li><li><p><a href="https://cdn.openai.com/pdf/23eca107-a9b1-4d2c-b156-7deb4fbc697c/GPT-5-3-Codex-System-Card-02.pdf">OpenAI System Card</a> &#8212; The technical system card detailing the &#8220;High&#8221; cybersecurity risk classification and mitigation approach. (February 5, 2026)</p></li><li><p><a href="https://www.scworld.com/brief/openai-launches-trusted-access-for-cyber-initiative-to-bolster-ai-security">SC Media</a> &#8212; Covers the Trusted Access launch and $10 million in API credits for defensive research. (February 2026)</p></li><li><p><a href="https://openai.com/index/strengthening-cyber-resilience/">OpenAI &#8212; Strengthening Cyber Resilience</a> &#8212; OpenAI&#8217;s broader strategy post explaining how they&#8217;re planning for models that could develop zero-day exploits against well-defended systems. (February 2026)</p></li><li><p><a href="https://openai.com/index/introducing-aardvark/">OpenAI &#8212; Introducing Aardvar</a>k &#8212; The agentic security researcher that scans codebases and has already found 10 CVEs in open source projects. (October 2025)</p></li></ul><p>If you&#8217;re in cybersecurity operations: This is a tools story, and you should think about it the way you think about every powerful tool that&#8217;s come through this industry. Cobalt Strike was supposed to be a penetration testing tool. Metasploit was supposed to be a penetration testing tool. Both ended up in the hands of threat actors. That&#8217;s going to happen with AI cyber capabilities too &#8212; it&#8217;s not a question of if, it&#8217;s a question of when. The question is whether defenders get to use these tools first.</p><p>OpenAI&#8217;s Trusted Access program is an attempt to put these capabilities in the hands of the good guys before the bad guys figure it out on their own. If you&#8217;re a security practitioner or your team does vulnerability management, pen testing, or code review &#8212; apply. Get in early. Start experimenting with what these models can do for your workflows now, because the attackers aren&#8217;t waiting for an access program. The $10 million in API credits is real money on the table for defensive research. Take advantage of it.</p><p>If you&#8217;re in leadership: The models are getting better &#8212; fast. OpenAI went from 27% on CTF challenges to 76% in three months. GPT-5.3-Codex is even better. And OpenAI isn&#8217;t the only one: Hacktron AI found the BeyondTrust variant through AI-enabled analysis just weeks ago. This isn&#8217;t theoretical anymore. AI systems are finding real vulnerabilities at production scale.</p><p>What does that mean for your program? Vulnerability volume is going to increase. AI is going to find more bugs faster &#8212; both by the good guys doing responsible disclosure and by the bad guys scanning for exploitable targets. Your vulnerability management program needs to be ready for a world where the rate of CVE discovery accelerates. FIRST is already projecting 50,000+ CVEs in 2026 &#8212; a record. The organizations that integrate AI into their defensive workflows early will have an advantage. The ones that don&#8217;t will be patching faster just to keep up.</p><p>The safety debate around the Midas Project&#8217;s criticism is worth watching but shouldn&#8217;t distract from the practical reality: OpenAI&#8217;s logic makes sense here. A high-capability tool without autonomous agency is still just a tool &#8212; it needs a human operator. The risk profile is fundamentally different from an autonomous agent that can chain operations independently. The real risk isn&#8217;t the model itself. It&#8217;s who gets access and what they do with it.</p><p>The bigger picture: Every generation of security tooling follows the same pattern. A powerful capability emerges. It gets built for defense. It ends up in offense. The defenders who adopted early had the advantage; the ones who waited were playing catch-up. We saw it with Metasploit, we saw it with Cobalt Strike, and we&#8217;re going to see it with AI cyber capabilities. Sometimes you don&#8217;t know what software is going to be used for &#8212; even Sam Altman has said they&#8217;ve been surprised by how their models get applied. The capability is here. The question isn&#8217;t whether AI can hack things &#8212; OpenAI just told you it can. The question is whether you&#8217;re going to use it to find the holes before someone else does.</p><p></p><p><em>This post was researched, drafted, and edited with AI assistance. The analysis and perspective are Marcus&#8217;s. See something wrong? Leave a comment.</em></p><p></p>]]></content:encoded></item><item><title><![CDATA[70 Orgs Hacked Across 37 Countries — And the Vendor That Found It Won’t Say Who Did It]]></title><description><![CDATA[Unit 42's Shadow Campaigns report exposes massive state espionage. Reuters says Palo Alto stripped the China attribution. Here's why it doesn't matter.]]></description><link>https://www.donthackonme.com/p/70-orgs-hacked-across-37-countries</link><guid isPermaLink="false">https://www.donthackonme.com/p/70-orgs-hacked-across-37-countries</guid><dc:creator><![CDATA[Marcus J. Carey]]></dc:creator><pubDate>Sun, 15 Feb 2026 18:49:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_yMy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_yMy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_yMy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!_yMy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!_yMy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!_yMy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_yMy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png" width="1456" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:949442,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://donthackonme.substack.com/i/188057195?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_yMy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!_yMy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!_yMy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!_yMy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Don&#8217;t Hack On Me &#8212; Signal</p><p>February 15, 2026</p><h2>The Story</h2><p>Palo Alto&#8217;s Unit 42 dropped a report on February 5 detailing what they&#8217;re calling the &#8220;Shadow Campaigns&#8221; &#8212; a state-aligned cyberespionage operation that compromised over 70 organizations across 37 countries in the past year. The group, tracked as TGR-STA-1030 (also known as UNC6619), has been active since at least January 2024 and hit some of the highest-value targets on the board: national law enforcement agencies, ministries of finance and foreign affairs, a parliament, a senior elected official, and national telecom providers. Between November and December 2025 alone, they conducted active reconnaissance against government infrastructure in 155 countries. That&#8217;s roughly one in five nations on earth.</p><p>The technical details are serious. The group deployed a previously unknown Linux kernel rootkit called ShadowGuard &#8212; an eBPF-based rootkit that runs in kernel space without appearing as a loadable module, making it extremely difficult to detect with conventional tools. It can hide up to 32 processes simultaneously, intercept system calls, and conceal files and directories. They also rotated through Cobalt Strike, VShell (a Go-based C2), Havoc, SparkRat, and Sliver across different phases of the campaign. Their persistence toolkit included Behinder and Godzilla web shells, plus GOST and FRPS tunneling tools.</p><p>Here&#8217;s where it gets interesting &#8212; and where the story becomes about more than just TTPs. Unit 42&#8217;s published report attributed TGR-STA-1030 to a &#8220;state-aligned group that operates out of Asia&#8221; with &#8220;activity patterns aligned with GMT+8.&#8221; That&#8217;s deliberately vague. On February 12, Reuters reported that the original draft of the report attributed the campaign to China. According to Reuters, Palo Alto Networks executives &#8212; not the researchers &#8212; ordered the attribution stripped. The reason: fear of retaliation from Beijing. Palo Alto has five offices in China and was among roughly 15 U.S. and Israeli cybersecurity firms that China has banned on national security grounds. The company denied the claims.</p><p><strong>Source</strong>: <a href="https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/">The Shadow Campaigns: Uncovering Global Espionage </a>(Unit 42, February 5, 2026)</p><h2>Who&#8217;s Covering This</h2><ul><li><p><a href="https://finance.yahoo.com/news/exclusive-palo-alto-chose-not-180250244.html">Reuters</a> &#8212; Broke the exclusive that Palo Alto execs overrode researchers and stripped China attribution from the report due to fear of retaliation from Beijing. The real story behind the story. (February 12, 2026)</p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/state-actor-targets-155-countries-in-shadow-campaigns-espionage-op/">BleepingComputer</a> &#8212; Emphasizes the reconnaissance scope: 155 countries scanned, 37 compromised, critical infrastructure across the board. (February 5, 2026)</p></li><li><p><a href="https://www.securityweek.com/cyberspy-group-hacked-governments-and-critical-infrastructure-in-37-countries/">SecurityWeek</a> &#8212; Focuses on victim types &#8212; ministries, law enforcement, border control &#8212; and the ShadowGuard rootkit discovery. (February 5, 2026)</p></li><li><p><strong><a href="https://thehackernews.com/2026/02/asian-state-backed-group-tgr-sta-1030.html">The Hacker News</a> &#8212; Technical breakdown of the breach scale, phishing lures, and the Diaoyu loader malware. (February 6, 2026)</strong></p></li><li><p><strong><a href="https://www.scworld.com/brief/attribution-of-sprawling-cyberespionage-campaign-reportedly-held-back-amid-china-retaliation-fears">SC Media</a> &#8212; Covers the attribution controversy angle &#8212; corporate self-censorship in threat intelligence reporting. (February 2026)</strong></p></li></ul><h2>What Does This Mean to Me?</h2><p><strong>If you&#8217;re in the security operations: </strong>Here&#8217;s the thing that matters most: this group used zero zero-days. Every exploit in their toolkit was an N-day &#8212; known vulnerabilities with patches available, some dating back to 2019. They weaponized Microsoft Exchange RCE, SAP Solution Manager privilege escalation, Atlassian Crowd (CVE-2019-11580), and D-Link RCE, among others. A state-aligned group that compromised 70+ organizations across 37 countries did it with bugs you&#8217;ve had patches for. That&#8217;s your action item. Check your exposure against the CVEs listed in the Unit 42 report. Hunt for the IOCs &#8212; they published IP addresses, domains, and file hashes. And if you&#8217;re running Linux infrastructure, understand that eBPF-based rootkits like ShadowGuard represent a real detection gap. Traditional kernel module monitoring won&#8217;t catch it. Start looking at eBPF monitoring capabilities in your stack.</p><p>If <strong>you&#8217;re in leadership</strong>: The attribution controversy is worth paying attention to &#8212; but not for the reasons the headlines suggest. Reuters reporting that Palo Alto stripped China attribution under corporate pressure is a reminder that threat intelligence from vendors is filtered through commercial interests. That&#8217;s always been true, but it&#8217;s rarely this visible. Factor that into how you consume vendor threat intel.</p><p>But here&#8217;s the bigger point: <strong>it doesn&#8217;t matter who the adversary is.</strong> Whether this is China, Russia, or anyone else operating out of GMT+8 &#8212; the vulnerabilities they exploited are the same. The patches are the same. The defensive actions are the same. We spend too much time in this industry debating flags and not enough time patching the CVEs from 2019 that state-sponsored groups are still using to walk through the front door. The targeting in this campaign aligned with geopolitical interests &#8212; rare earth mining deals, diplomatic pressure points, trade negotiations &#8212; but the exploitation was pure opportunism against unpatched systems. Attribution is interesting. Patching is what keeps you from being in the next report.</p><p>The bigger picture: A state-aligned espionage group hit 70 organizations across 37 countries using nothing but known vulnerabilities, commodity C2 frameworks, and one novel rootkit. They compromised parliaments, ministries, and law enforcement agencies. And when the security vendor that discovered it tried to tell the world who did it, corporate leadership said no. Every part of that sentence should bother you &#8212; but the part you can actually control is whether your systems are patched. Start there.</p><p>Stay alert. Don&#8217;t let them hack on you.</p><p><a href="https://donthackonme.substack.com/">Subscribe to Don&#8217;t Hack On Me</a></p><p><em>This post was researched, drafted, and edited with AI assistance. The analysis and perspective are Marcus&#8217;s. See something wrong? Leave a comment.</em></p><p></p>]]></content:encoded></item><item><title><![CDATA[BeyondTrust's Treasury Breach Flaw Has a Sequel — And Attackers Found It in 24 Hours]]></title><description><![CDATA[CVE-2026-1731: AI found it, hackers exploited it, CISA gave you 3 days to patch.]]></description><link>https://www.donthackonme.com/p/beyondtrusts-treasury-breach-flaw</link><guid isPermaLink="false">https://www.donthackonme.com/p/beyondtrusts-treasury-breach-flaw</guid><dc:creator><![CDATA[Marcus J. Carey]]></dc:creator><pubDate>Sun, 15 Feb 2026 01:18:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dfMB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dfMB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dfMB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!dfMB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!dfMB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!dfMB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dfMB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png" width="1456" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:878223,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://donthackonme.substack.com/i/187998147?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dfMB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!dfMB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!dfMB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!dfMB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Don&#8217;t Hack On Me &#8212; Signal February 14, 2026</p><h2>The Story</h2><p>Remember the BeyondTrust vulnerability that let Chinese state-sponsored group Silk Typhoon breach the U.S. Treasury Department in late 2024? Same product. Same WebSocket endpoint. New code path. And this time it&#8217;s worse.</p><p>CVE-2026-1731 is a critical (CVSS 9.9) pre-authentication remote code execution vulnerability in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA). An unauthenticated attacker can execute arbitrary OS commands via specially crafted requests &#8212; no credentials required, no user interaction needed. It affects RS versions 25.3.1 and prior and PRA versions 24.3.4 and prior. Roughly 8,500 self-hosted instances are exposed to the internet, and BeyondTrust serves 20,000+ customers including 75% of the Fortune 100.</p><p>Here&#8217;s where it gets interesting: this vulnerability was discovered by Hacktron AI through AI-enabled variant analysis of CVE-2024-12356 &#8212; the same vulnerability class that enabled the Treasury breach. An AI system found a variant of a nation-state-exploited flaw through automated analysis. That&#8217;s a first worth paying attention to.</p><p>The timeline is aggressive. BeyondTrust published advisory BT26-02 on February 6 and auto-patched SaaS customers on February 2. A proof-of-concept exploit hit GitHub on February 10. GreyNoise detected active reconnaissance probing within 24 hours. Attackers are already in the wild &#8212; Arctic Wolf confirmed exploitation attempts deploying the SimpleHelp RMM tool for persistence and lateral movement. CISA added CVE-2026-1731 to the Known Exploited Vulnerabilities catalog on February 13 with a remediation deadline of February 16. That&#8217;s a three-day window. CISA doesn&#8217;t do that unless it&#8217;s bad.</p><p>Source:<a href="https://www.beyondtrust.com/trust-center/security-advisories/bt26-02"> BT26-02 Security Advisory</a> (BeyondTrust, February 6, 2026)</p><h2>Who&#8217;s Covering This</h2><ul><li><p><a href="https://www.rapid7.com/blog/post/etr-cve-2026-1731-critical-unauthenticated-remote-code-execution-rce-beyondtrust-remote-support-rs-privileged-remote-access-pra/">Rapid7</a> &#8212; Technical breakdown of the vulnerability, affected versions, and fix versions. (February 9, 2026)</p></li><li><p><a href="https://www.greynoise.io/blog/reconnaissance-beyondtrust-rce-cve-2026-1731">GreyNoise</a> &#8212; Active scanning detected within 24 hours of PoC release. Also observed the old Silk Typhoon exploit chain (CVE-2024-12356 + CVE-2025-1094) still being replayed as recently as January 2026. (February 12, 2026)</p></li><li><p><a href="https://thehackernews.com/2026/02/researchers-observe-in-wild.html">The Hacker News</a> &#8212; Confirmed in-the-wild exploitation of the CVSS 9.9 vulnerability. (February 2026)</p></li><li><p><a href="https://www.hacktron.ai/blog/cve-2026-1731-beyondtrust-remote-support-rce">Hacktron AI</a> &#8212; The discoverers. Describes how AI-enabled variant analysis found the flaw and the responsible disclosure process. (February 6, 2026)</p></li><li><p><a href="https://www.cisa.gov/news-events/alerts/2026/02/13/cisa-adds-one-known-exploited-vulnerability-catalog">CISA</a> &#8212; Added to KEV catalog with a February 16 remediation deadline. (February 13, 2026)</p></li><li><p><a href="https://arcticwolf.com/resources/blog/cve-2026-1731/">Arctic Wolf</a> &#8212; Detected attackers exploiting CVE-2026-1731 to deploy SimpleHelp RMM tool for persistence and lateral movement. (February 2026)</p></li></ul><h2>What Does This Mean to Me?</h2><p>If you&#8217;re in security operations: If your organization runs BeyondTrust Remote Support or Privileged Remote Access on-prem, this is a drop-everything patch. Self-hosted instances need to be updated immediately &#8212; CISA&#8217;s three-day window ends February 16. SaaS customers were auto-patched on February 2, but verify with your BeyondTrust admin. While you&#8217;re at it, hunt for indicators of the SimpleHelp RMM tool in your environment &#8212; Arctic Wolf confirmed attackers are deploying it post-exploitation for persistence and lateral movement. If you had unpatched instances exposed to the internet before the fix, assume possible compromise and scope an investigation.</p><p>Also worth noting: GreyNoise observed the old Silk Typhoon exploit chain (CVE-2024-12356) still being replayed as recently as January 2026. If you patched the first one but haven&#8217;t patched this new variant, you&#8217;re still exposed on the same endpoint.</p><p>If you&#8217;re in leadership: This is the same product that enabled a nation-state breach of the U.S. Treasury, and it&#8217;s the same vulnerability class on the same endpoint. That&#8217;s a pattern, not a coincidence. If your organization relies on BeyondTrust for privileged access &#8212; and if you&#8217;re in the Fortune 100, there&#8217;s a 75% chance you do &#8212; this should trigger a broader conversation about your architecture. Privileged access tools sit at the heart of your trust model. When they have pre-auth RCE flaws, attackers don&#8217;t need credentials. They don&#8217;t even need to knock.</p><p>The AI discovery angle matters for your strategy too. This is one of the first major CVEs discovered by an AI system through variant analysis. That&#8217;s going to accelerate. Vulnerability discovery is getting faster on both sides &#8212; AI is finding bugs before and after the bad guys. The good news: responsible disclosure worked here. Hacktron found it, reported it, BeyondTrust patched it. But the window between disclosure and exploitation is shrinking to hours, not days. Your patching programs need to match that pace.</p><p>The bigger picture: We&#8217;re going to see more of this. AI-enabled variant analysis means that when a vulnerability class is found in a product, every related code path in that product gets scrutinized at machine speed. For defenders, that&#8217;s ultimately good &#8212; bugs get found and fixed faster. For attackers, it means they can automate the same analysis. The race between discovery and exploitation is getting faster on both sides. The organizations that survive are the ones that can patch at the speed the threat demands. CISA giving a three-day remediation window is the clearest signal yet that the old &#8220;patch within 30 days&#8221; cadence is dead for critical vulns.</p><p>Stay alert. Don&#8217;t let them hack on you.</p><p><a href="https://donthackonme.substack.com/">Subscribe to Don't Hack On Me</a> </p><p><em>This post was researched, drafted, and edited with AI assistance. The analysis and perspective are Marcus&#8217;s. See something wrong? Leave a comment.</em></p>]]></content:encoded></item></channel></rss>