Breaking: Microsoft Office Zero-Day Actively Exploited – Emergency Patches Released
Complete Cloud Security in Minutes – Orca Security
2026-01-29 01:22:08
收藏
Quick Overview CVE-ID: CVE-2026-21509 CVSS Score: 7.8 (High) Affected Products: Microsoft Office 2016, 2019, LTSC 2021, LTSC 2024, Microsoft 365 Apps Attack Vector: Malicious Office document (user must open file) Active Exploitation: Confirmed active exploitation in the wild PoC Available: No CISA KEV: Yes—Remediation deadline February 16, 2026 Fix: Emergency out-of-band patches available for all […]
The post Breaking: Microsoft Office Zero-Day Actively Exploited – Emergency Patches Released appeared first on Orca Security.
目录
最新
- HackerBot-Claw: An AI-Assisted Campaign Targeting GitHub Actions Pipelines
- Post-Exploitation at Scale: The Rise of AILM
- Top 5 Takeaways from the Webinar on Agentic AI and Cloud Native Protection
- Unlocking Kubernetes Security: Insights from Our Session at SANS Kubernetes & CNAPP Forum
- Four Critical SolarWinds Serv-U RCE Flaws Enable Root Access
- The Future of AppSec: AI, Context, and Action
- Breaking: Actively Exploited Chrome Zero-Day May Impact Enterprise, Developer, and Automation Environments
- Building Application Security from the Ground Up: An Organizational Approach