Latest security news
- Windows Notepad Markdown feature opens door to RCE (CVE-2026-20841)
- 1Password open sources a benchmark to stop AI agents from leaking credentials
- World Leaks Ransomware Group Adds Stealthy, Custom Malware ‘RustyRocket’ to Attacks
- Nation-State Hackers Embrace Gemini AI for Malicious Campaigns, Google Finds
- Apple fixes zero-day flaw exploited in targeted attacks (CVE-2026-20700)
- AI Skills Represent Dangerous New Attack Surface, Says TrendAI
- Microsoft Store updated with a new CLI, analytics, and Web Installer improvements
- Time to Exploit Plummets as N-Day Flaws Dominate
- OpenVPN releases version 2.7.0 with expanded protocol and platform updates
- When security decisions come too late, and attackers know it
- OpenClaw Scanner: Open-source tool detects autonomous AI agents
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms
- US Court Hands Crypto Scammer 20 Years in $73m Case
- FIRST Forecasts Record-Breaking 50,000+ CVEs in 2026
- Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday
- Phorpiex Phishing Delivers Low-Noise Global Group Ransomware
- “Digital Parasite” Warning as Attackers Favor Stealth for Extortion
- New Mobile Spyware ZeroDayRAT Targets Android and iOS
- Singapore Takes Down Chinese Hackers Targeting Telco Networks
- NCSC Issues Warning Over “Severe” Cyber-Attacks Targeting Critical National Infrastructure
- European Governments Breached in Zero-Day Attacks Targeting Ivanti
- New Zero-Click Flaw in Claude Desktop Extensions, Anthropic Declines Fix
Among the many security fixes released by Microsoft on February 2026 Patch Tuesday is one for CVE-2026-20841, a command injection vulnerability in Notepad that could be exploited by attackers to achieve remote code execution on targets’ Windows system. About CVE-2026-20841 For many, many years, Windows Notepad was a simple text editor and a staple tool for everyone who wanted a no-frills way to work with plain text, but in early 2022, Microsoft started redesigning it …
(C) Do-Know.com (http://do-know.com/). Do not copy without permission from info at do-know.com.