{"id":11890,"date":"2026-02-17T12:56:22","date_gmt":"2026-02-17T12:56:22","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=11890"},"modified":"2026-02-17T12:56:23","modified_gmt":"2026-02-17T12:56:23","slug":"information-transient-6-microsoft-zero-days-and-a-warning-from-cisa","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=11890","title":{"rendered":"Information transient: 6 Microsoft zero days and a warning from CISA"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"content-body\">&#13;<\/p>\n<p>Enterprises are more and more in a race towards time to handle vulnerabilities earlier than attackers exploit them.<\/p>\n<p>The dangerous guys are getting sooner, and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchenterprisedesktop\/definition\/patch-management\">patch administration<\/a> is not maintaining. Menace intelligence companies supplier Flashpoint discovered the typical time to take advantage of &#8212; the interval between a vulnerability&#8217;s disclosure and its weaponization within the wild &#8212; plummeted from 745 days in 2020 to only 44 days in 2025. Worryingly, in keeping with Statista analysis, organizations delay patching important vulnerabilities for a mean of 165 days final 12 months.<\/p>\n<p>The velocity with which attackers now barrel by means of comfortable spots in enterprise defenses makes this week&#8217;s featured information articles all of the extra pressing. Moderately than routine upkeep actions, patching important zero days and retiring insecure gadgets are more and more high-stakes protection sprints.<\/p>\n<section class=\"section main-article-chapter\" data-menu-title=\"Not a drill: Microsoft patches 6 zero days under active exploitation\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>Not a drill: Microsoft patches 6 zero days underneath energetic exploitation<\/h2>\n<p>Microsoft&#8217;s newest safety replace consists of patches for six actively exploited zero days and 5 extra CVEs the supplier stated malicious actors are comparatively prone to exploit. Three of the zero days contain safety characteristic bypass flaws in numerous Microsoft merchandise, enabling attackers to bypass built-in defensive controls. The February replace addressed 59 flaws in whole.<\/p>\n<p>Microsoft emphasised the significance of making use of these patches promptly to guard programs from potential exploitation. This replace highlights the rising sophistication of cyberthreats and the necessity for organizations to keep up <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/5-enterprise-patch-management-best-practices\">sturdy patch administration practices<\/a> to safeguard their infrastructure.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/microsoft-fixes-6-actively-exploited-zero-days\" rel=\"noopener\"><i>Learn the complete article by Jai Vijayan on Darkish Studying<\/i><\/a>.<\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"CISA orders federal agencies to remove unsupported edge devices\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>CISA orders federal businesses to take away unsupported edge gadgets<\/h2>\n<p>CISA has issued a binding operational directive requiring federal businesses to cease utilizing unsupported community edge gadgets, similar to firewalls and routers, inside a 12 months. CISA stated end-of-support (EOS) gadgets pose a considerable and fixed &#8220;imminent risk.&#8221;<\/p>\n<p>Companies should replace outdated gadgets, report their utilization and decommission these with expired assist. Inside 24 months, processes have to be established to trace and take away unsupported gadgets earlier than their EOS dates.<\/p>\n<p>Whereas the directive targets federal businesses, CISA encourages broader adoption by native governments and companies. Regardless of restricted enforcement energy, CISA will collaborate with the White Home to watch compliance and supply assist.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" href=\"https:\/\/www.cybersecuritydive.com\/news\/cisa-edge-devices-binding-operational-directive\/811539\/\" rel=\"noopener\"><i>Learn the complete article by Eric Gellar on Cybersecurity Dive<\/i><\/a>.<\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"Attack on Poland's energy grid prompts warning to U.S. critical infrastructure operators\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>Assault on Poland&#8217;s power grid prompts warning to U.S. important infrastructure operators<\/h2>\n<p>A current cyberattack on Poland&#8217;s power grid, attributed to Russian hacker teams Berserk Bear and Sandworm, underscores the hazards posed by weak edge gadgets in operational know-how (OT) environments. CISA warned U.S. important infrastructure operators to take notice.<\/p>\n<p>Within the December 2025 assault, malicious hackers exploited internet-facing FortiGate gadgets with reused passwords, enabling them to entry quite a lot of OT gadgets with default passwords. The attackers have been then in a position to deploy <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/How-to-mitigate-wiper-malware\">wiper malware<\/a>, corrupt firmware and disrupt system operations. Whereas renewable power programs continued manufacturing, operators misplaced management and monitoring capabilities.<\/p>\n<p>In an advisory, CISA emphasised the necessity for <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/What-CISOs-need-to-know-to-build-an-OT-cybersecurity-program\">OT asset operators<\/a> to implement stronger cybersecurity measures, together with altering default passwords and enabling firmware verification on OT gadgets. The incident additionally highlights the pressing want for important infrastructure operators to boost defenses towards cyberthreats.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" href=\"https:\/\/www.cybersecuritydive.com\/news\/cisa-critical-infrastructure-warning-poland-energy-hack\/811819\/\" rel=\"noopener\"><i>Learn the complete story by Eric Geller on Cybersecurity Dive<\/i><\/a>.<\/p>\n<p><b>Editor&#8217;s notice:<\/b>\u00a0<i>An editor used AI instruments to help within the era of this information transient. Our professional editors at all times assessment and edit content material earlier than publishing.<\/i><\/p>\n<p><i>Alissa Irei is senior website editor of Informa TechTarget Safety.<\/i><\/p>\n<\/section>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>&#13; Enterprises are more and more in a race towards time to handle vulnerabilities earlier than attackers exploit them. The dangerous guys are getting sooner, and patch administration is not maintaining. Menace intelligence companies supplier Flashpoint discovered the typical time to take advantage of &#8212; the interval between a vulnerability&#8217;s disclosure and its weaponization within [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":11892,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[1359,925,618,121,5291],"class_list":["post-11890","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cisa","tag-days","tag-microsoft","tag-news","tag-warning"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11890"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11890\/revisions"}],"predecessor-version":[{"id":11891,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11890\/revisions\/11891"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/11892"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69c6f7b5190636d50e9f6768. Config Timestamp: 2026-03-27 21:33:41 UTC, Cached Timestamp: 2026-04-10 06:45:22 UTC -->