Category: Threat Alerts

Subscribe to Threat Alerts for real-time updates and expert insights.

Our Threat Alerts provide real-time updates on emerging cyber threats, vulnerabilities, and critical security advisories that could impact your organization. Curated by DataComm’s security experts, each alert includes actionable insights to help you respond quickly and minimize ris

Security Advisory: CVE-2026-5281 (Zero-Day)

DataComm is monitoring CVE-2026-5281, a Google Chrome zero-day confirmed as actively exploited in the wild. We strongly recommend organizations update Chrome immediately (Windows/macOS 146.0.7680.177/.178; Linux 146.0.7680.177) and verify endpoint version compliance across managed systems. Need help validating rollout or exposure? Contact support@www-prod.datacomm.com or (877) 544-3655.

Security Advisory: CVE-2026-3910 (Active Exploitation)

Google has issued a Stable Channel security update for Chrome Desktop to address CVE-2026-3910, a high-severity V8 vulnerability that is being exploited in the wild. Organizations should immediately update Chrome on Windows, macOS, and Linux, verify endpoint versions, and ensure managed systems are running the patched release.

Security Advisory: Google Chrome CVE-2026-2441 (Zero-Day)

DataComm is monitoring CVE-2026-2441, a newly disclosed Google Chrome zero-day vulnerability confirmed as actively exploited in the wild. We strongly recommend that all users and organizations update Chrome immediately and restart the browser to apply the fix. DataComm teams are prioritizing endpoint compliance and assisting customers with rapid patch validation and rollout to reduce exposure.

Security Advisory: Windows ActiveX CVE-2008-0015 (Known Exploited Vulnerability)

DataComm is monitoring CVE-2008-0015, a legacy remote code execution vulnerability in Microsoft’s Windows Video ActiveX control (msvidctl.dll) that can be triggered when a user visits a specially crafted web page. While the CVE is older, it remains relevant today because it is listed in CISA’s Known Exploited Vulnerabilities (KEV) Catalog, indicating evidence of real-world exploitation. Organizations should identify any remaining exposure (especially legacy Internet Explorer/ActiveX dependencies), apply available vendor mitigations/updates, and prioritize upgrade or decommissioning of unsupported systems to reduce risk.

Security Advisory: Apple CVE-2026-20700 (Active Exploitation)

DataComm is monitoring CVE-2026-20700, an Apple zero-day vulnerability impacting the Dynamic Link Editor component. Apple reports the issue may have been exploited in an extremely sophisticated attack against targeted individuals and that successful exploitation could enable arbitrary code execution under certain conditions. We recommend organizations and users apply Apple’s latest security updates immediately—including iOS/iPadOS 26.3 and corresponding updates for macOS Tahoe 26.3, watchOS 26.3, tvOS 26.3, and visionOS 26.3—to reduce exposure.

Security Advisory: Notepad++ CVE-2025-15556 (Actively Exploited)

DataComm is monitoring CVE-2025-15556, a vulnerability affecting Notepad++ (versions prior to 8.8.9) when using the WinGUp auto-updater. The issue stems from insufficient update integrity verification, meaning an attacker who can intercept or redirect update traffic could potentially trick systems into installing a malicious update, leading to arbitrary code execution with the user’s privileges. We recommend organizations upgrade Notepad++ to v8.8.9 or later and validate that endpoints are no longer running vulnerable versions, especially in managed environments where Notepad++ is widely deployed.

Security Advisory: Microsoft CVE-2024-43468 (Actively Exploited)

DataComm is monitoring CVE-2024-43468, a critical (CVSS 9.8) vulnerability in Microsoft Configuration Manager (SCCM) involving SQL injection that can lead to unauthenticated remote code execution. This CVE has been added to CISA’s Known Exploited Vulnerabilities (KEV) Catalog (Date Added: Feb 12, 2026; federal remediation due Mar 5, 2026), indicating active exploitation risk and elevating patch urgency. We recommend organizations apply Microsoft’s updates immediately, validate Configuration Manager site server exposure, and confirm remediation across managed environments.

Security Advisory: Microsoft Releases 6 Actively Exploited Vulnerabilities

DataComm is promoting Microsoft’s February 2026 security release that fixes six actively exploited zero-day vulnerabilities affecting Windows and related components. Organizations should prioritize deploying the latest updates, validate impacted systems using the MSRC Security Update Guide entries for CVE-2026-21510, CVE-2026-21513, CVE-2026-21514, CVE-2026-21519, CVE-2026-21525, and CVE-2026-21533, and ensure Windows 10 devices remain eligible for security updates via Extended Security Updates (ESU) where applicable. Apply patches immediately through Windows Update and confirm reboot/compliance status to reduce exposure.

Security Advisory: Fortinet CVE-2026-24858 (Active Exploitation)

DataComm is monitoring CVE-2026-24858, an actively exploited authentication-bypass vulnerability tied to FortiCloud Single Sign-On (SSO) across multiple Fortinet products (including FortiOS, FortiManager, FortiAnalyzer, FortiProxy, and FortiWeb). CISA added this CVE to its Known Exploited Vulnerabilities (KEV) Catalog on January 27, 2026, underscoring the urgency to remediate. We recommend organizations apply Fortinet’s fixes immediately, confirm whether FortiCloud SSO administrative login is enabled in your environment, and review internet-exposed Fortinet devices for signs of compromise.
contact sales

SCHEDULE AN APPOINTMENT

Strengthen your bank’s IT with trusted experts in security, compliance, and modernization. Schedule a free consultation today to discuss tailored solutions that keep your institution secure, resilient, and audit-ready.

SecurNOC

Monitor your network devices and view their configuration changes.

SecurPortal

A live look at your events, security event charts and tickets.

Ticketing Portal

Login here to easily add and managed trouble tickets.

Remote Support

Let DataComm remotely access your computer to render aid.