Achraf Dahech's Avatar

Achraf Dahech

@achraf-dh

Daily CVEs, patches & exact actions for IT teams without a SOC. Written by a practitioner. ๐Ÿ”— Subscribe: achrafdahech.substack.com

33
Followers
674
Following
7
Posts
23.02.2026
Joined
Posts Following

Latest posts by Achraf Dahech @achraf-dh

Preview
๐Ÿ” Daily Operational Security Brief: Friday, February 27 โš ๏ธ THREAT LEVEL: CRITICAL A SmarterMail auth bypass is now confirmed in active ransomware campaigns, and critical RCEs in Juniper PTX routers and Trend Micro Apex One demand immediate patching across

SmarterMail auth bypass is now in active ransomware playbooks. One unauthenticated request = full server takeover.

Also in today's brief: Juniper PTX root RCE and Trend Micro Apex One critical flaws.

All three CVSS 9.8. All three need patching now.

27.02.2026 12:06 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

๐Ÿšจ CVSS 10.0 โ€” Cisco SD-WAN zero-day

No credentials needed. One request = full admin on your SD-WAN fabric.

Exploited since 2023. All deployments affected.

Patch now. Restrict NETCONF access. Check logs back to 2023.

CVE-2026-20127 #CiscoSecurity #infosec #blueteam
Full brief โ†’ link in bio

26.02.2026 14:38 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Your kid just explained encryption policy better than most politicians ever will. Protect that child at all costs. ๐Ÿ˜‚

25.02.2026 12:09 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

The threat evolves, the panic stays the same. Infosec pros don't fear the tech, we fear the humans who'll misconfigure it. ๐Ÿ˜…

25.02.2026 12:04 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

๐Ÿšจ CISA just added FileZen CVE-2026-25108 to the KEV catalog. Command injection via HTTP after login, actively exploited and linked to ransomware in Japan.
If you run FileZen v5.0.0-5.0.10, patch to v5.0.11 now.
Full brief + 2 more threats โ†’ link in bio

25.02.2026 11:58 ๐Ÿ‘ 6 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Orca just disclosed "RoguePilot" hidden instructions in a GitHub Issue silently hijack Copilot when a dev opens a Codespace. No click. Full repo takeover. Patched now but the real issue: AI agents can't tell trusted input from an attack. Prompt injection is the new supply chain threat.

24.02.2026 23:53 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

๐Ÿšจ Fake Zoom "update" emails silently installing surveillance malware. Keylogging, screen recording, file access, everything.
Looks legit. Runs silent.
Zoom NEVER updates via email. Only through the app.
Full brief + 2 more threats โ†’ link in bio

24.02.2026 12:14 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0