Artificial IntelligenceCybersecurityNewswireTechnology

BeyondTrust RCE exploited post-patch, United CISO on resilience

Originally published on: February 16, 2026
▼ Summary

– Multiple critical vulnerabilities are being actively exploited, including a patched RCE flaw in BeyondTrust tools and unpatched zero-days in Microsoft and Apple products.
– Attackers are increasingly using AI to automate and scale attacks, from social engineering scams to rapidly identifying and chaining exploits.
– Security leaders emphasize the importance of resilience, third-party risk management, and securing overlooked systems like point-of-sale and edge computing.
– New open-source security tools have been released, such as OpenClaw Scanner for detecting AI agents and Brutus for credential testing.
– Regulatory actions are increasing, with the EU targeting TikTok’s addictive algorithm and Meta’s AI restrictions on WhatsApp.

Building resilience in cybersecurity requires a proactive approach that extends beyond simple prevention, focusing on continuity and modernization even within safety-critical environments. This principle is especially vital for organizations operating complex, interconnected ecosystems of vendors and partners. The recent wave of security incidents underscores the relentless pace at which threat actors operate, exploiting vulnerabilities both old and new with increasing speed and sophistication.

A critical remote code execution flaw in BeyondTrust’s Remote Support and Privileged Remote Access solutions, tracked as CVE-2026-1731, was swiftly patched but is already being actively exploited by attackers. This incident highlights the shrinking window between patch release and active exploitation, demanding immediate action from self-hosted customers. Separately, a separate zero-day in BeyondTrust Remote Support (CVE-2024-12356) was previously used by China-nexus actors to breach the US Treasury Department, illustrating the high stakes of such vulnerabilities.

The European Commission faced its own security challenge when its mobile device management platform was compromised, though officials report the incident was quickly contained. Meanwhile, unpatched SolarWinds Web Help Desk instances are under active attack as threat actors seek initial network access. In Singapore, a coordinated cyber espionage campaign linked to the advanced persistent threat group UNC3886 infiltrated the networks of the country’s four major telecommunications providers.

Microsoft’s recent Patch Tuesday addressed over fifty security holes, including six zero-day vulnerabilities already exploited in the wild. Among the critical fixes was a patch for CVE-2026-20841, a command injection flaw in Windows Notepad that could lead to remote code execution. Apple also released updates for a zero-day memory corruption issue in its dyld component, identified as CVE-2026-20700.

The exploitation landscape is further complicated by emerging threats in edge computing and autonomous AI. Security experts warn that the common promise to “patch it later” for edge devices is a dangerous fallacy, as these distributed systems often lack the monitoring and update mechanisms of cloud environments. AI-driven social engineering is eroding trust in digital communications, making tasks like research and personalized phishing cheap and automated. Furthermore, autonomous AI agents operating without centralized oversight pose a new attack vector, with tools like the open-source OpenClaw Scanner emerging to detect their presence.

The industry is responding with new tools and frameworks. Offensive security sees the release of Brutus, an open-source, multi-protocol credential testing tool designed for modern reconnaissance pipelines. For defenders, platforms like the open-source Allama aim to automate threat detection and response through visual workflows. In a significant move for privacy, DuckDuckGo has enabled AI voice chat that does not save or train on user voice data.

Governance and compliance are also in focus. The European Commission has issued preliminary findings stating that TikTok’s addictive design breaches the Digital Services Act, and is separately investigating Meta for potentially blocking rival AI assistants from WhatsApp. Discord is rolling out mandatory age verification via ID or face scans for certain features.

Other notable developments include the arrest of a distributor for the JokerOTP password-stealing bot, the sentencing of a Bitcoin trading firm CEO for a massive Ponzi scheme, and warnings about trojanized versions of popular software like 7-Zip turning home computers into proxy nodes. As attackers leverage AI to move at machine speed, reports indicate a persistent gap between organizational awareness of threats and the execution of an effective response, a challenge compounded by tool sprawl and the operational burden of securing legacy systems like Java environments.

(Source: HelpNet Security)

Topics

cybersecurity interviews 90% vulnerability exploitation 88% ai security 87% open source tools 85% Regulatory Compliance 82% patch management 80% ransomware attacks 78% third-party risk 75% Data Privacy 73% supply chain security 70%