February delivered one of the most intense Patch Tuesdays, addressing 59 vulnerabilities, including six actively exploited zero-day vulnerabilities. Three out of six zero-days heavily targeted the client-side attack surface through social engineering. Flaws in the Windows Shell (CVE-2026-21510) and MSHTML Framework (CVE-2026-21513) allowed attackers to bypass SmartScreen and other security prompts simply by convincing users to open malicious .lnk or HTML files. A separate bypass in Microsoft Word (CVE-2026-21514) allowed attackers to evade OLE mitigations using crafted Office documents. It’s a reminder that phishing remains as dangerous as ever.
The widespread exploitation of SolarWinds Web Help Desk (exploiting CVE-2025-26399, CVE-2025-40536, and CVE-2025-40551) servers has come to light. But the real story wasn’t the initial access – it was the post-compromise tradecraft. Rather than deploying custom malware, the threat actor utilized Velociraptor, a well-known, open-source digital forensics and incident response (DFIR) tool. By turning a trusted security tool into a Command and Control (C2) framework, the attackers effectively blinded defenders, using Velociraptor to disable Microsoft Defender, stage files, and run commands.
Organisations should prioritise:
Sources:
This entry is published as part of the SOCshare project (No. 101145843), which we are running together with Vilnius City Municipality. It is partly funded by the European Union. The views and opinions expressed are those of the authors alone and do not necessarily reflect those of the European Union or the European Cyber Security Centre of Excellence. Neither the European Union nor the European Cyber Security Centre of Excellence can be held responsible for them.