Feed aggregator

CISA Adds One Known Exploited Vulnerability to Catalog

US-Cert Current Activity - Fri, 02/13/2026 - 7:00am

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2026-1731 BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability

These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

Categories: US-CERT Feed

We are SuperCMMS and we plan to use HN as an alternative to Twitter / X

Hacker News - Fri, 02/13/2026 - 6:17am

We are SuperCMMS ... and we plan to use HN as an alternative to Twitter / X to broadcast public messages.

Comments URL: https://news.ycombinator.com/item?id=47001486

Points: 1

# Comments: 1

Categories: Hacker News

TFL Station Guessing Game

Hacker News - Fri, 02/13/2026 - 6:14am

Article URL: https://tflga.me

Comments URL: https://news.ycombinator.com/item?id=47001462

Points: 2

# Comments: 1

Categories: Hacker News

BegBot: AI That Begs to Survive

Hacker News - Fri, 02/13/2026 - 6:13am

Article URL: https://begbot.ai/

Comments URL: https://news.ycombinator.com/item?id=47001458

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: A tool to create merch designs without Photoshop

Hacker News - Fri, 02/13/2026 - 6:11am

Hi HN,

I built MerchBanao while trying to sell merch online.

Image generators were good at creating artwork, but the output was rarely usable. I still had to open Photoshop to fix layout, add typography, remove backgrounds, and prepare print files. The generation step was fast but the workflow around it was manual.

So I started building a tool focused on the entire merch workflow instead of just generation.

You can: • generate a design from a prompt • edit layout and typography • refine backgrounds and composition • export 300 DPI print ready files

The goal is simple: go from idea to uploadable POD design in a few minutes.

I’m especially interested in feedback from people who sell on Etsy, Redbubble, Shopify, or similar platforms.

What parts of your workflow still require manual editing after using AI tools?

Comments URL: https://news.ycombinator.com/item?id=47001445

Points: 2

# Comments: 0

Categories: Hacker News

Pure Python Rdkit Alternative

Hacker News - Fri, 02/13/2026 - 6:11am

Article URL: https://github.com/levlai/chiralipy

Comments URL: https://news.ycombinator.com/item?id=47001438

Points: 1

# Comments: 1

Categories: Hacker News

AI Outlook with JetBrains

Hacker News - Fri, 02/13/2026 - 6:01am
Categories: Hacker News

BeyondTrust Vulnerability Targeted by Hackers Within 24 Hours of PoC Release

Security Week - Fri, 02/13/2026 - 6:01am

Exploitation attempts target CVE-2026-1731, a critical unauthenticated remote code execution flaw in BeyondTrust Remote Support.

The post BeyondTrust Vulnerability Targeted by Hackers Within 24 Hours of PoC Release appeared first on SecurityWeek.

Categories: SecurityWeek

Pages