Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Newsletter
  3. Issue #4
NEWSLETTERIssue #4
CosmicBytez Newsletter #4 — February 2026 Security Digest

CosmicBytez Newsletter #4 — February 2026 Security Digest

Critical Exchange and FortiOS zero-days, AI deepfake phishing surge, CISA zero trust mandate, post-quantum cryptography goes live, and the expanding RaaS...

Dylan H.

CosmicBytez Labs

February 9, 2026
4 min read

Welcome to Issue #4

February 2026 has been one of the most eventful months in cybersecurity this year. From critical zero-days in Exchange Server and FortiOS to the FBI's urgent warning on AI-generated deepfakes, the threat landscape continues to evolve at an unprecedented pace.

This issue covers the most important developments from the past two weeks, along with practical guidance to protect your organization.


Top Stories

Microsoft Patch Tuesday: 3 Zero-Days, 74 CVEs

Microsoft's February Patch Tuesday addressed 74 vulnerabilities including three actively exploited zero-days:

  • CVE-2026-21478 — Exchange Server RCE (CVSS 9.1) — Unauthenticated remote code execution via deserialization. CISA KEV deadline: Feb 25.
  • CVE-2026-21412 — Windows Kernel EoP (CVSS 7.8) — Used by APT groups targeting government entities.
  • CVE-2026-21445 — SmartScreen Bypass (CVSS 8.1) — Being used in phishing campaigns to deliver info-stealers.

Action Required: Prioritize Exchange Server patching immediately. The kernel and SmartScreen patches should follow within 48 hours.

Read full analysis


FBI Warns: AI Deepfake Attacks Hit $145M in Losses

The FBI and CISA issued a joint advisory on AI-generated deepfake attacks targeting corporate executives. Since October 2025, over 400 incidents have been reported, with the largest single loss at $25.6 million — a deepfake video call impersonating a CEO on Microsoft Teams.

Key takeaway: Multi-person authorization for wire transfers and callback verification to known numbers are your best defenses.

Read full article →


Critical Fortinet SSL VPN Vulnerability (CVE-2026-0899)

A heap-based buffer overflow in FortiOS SSL VPN allows unauthenticated remote code execution with a CVSS score of 9.3. Proof-of-concept exploit code is circulating. Affected versions: FortiOS 7.2.x through 7.6.x.

Action Required: Patch to FortiOS 7.6.2, 7.4.6, or 7.2.10 immediately. If patching is delayed, disable SSL VPN.

Read security advisory →


This Month's Threat Landscape

By the Numbers

MetricValueTrend
Active ransomware groups14 RaaS platforms identified↑ 30% YoY
Critical infrastructure attacks365 in Q1 2026↑ 112% YoY
Average ransomware dwell time2.1 days (down from 5.3)Accelerating
RaaS entry costAs low as $40/monthDecreasing
AI-powered BEC losses$145M since Oct 2025New threat vector

Critical Vulnerabilities This Month

CVEProductCVSSStatus
CVE-2026-21478Exchange Server9.1Actively exploited
CVE-2026-0899FortiOS SSL VPN9.3PoC available
CVE-2026-0778PAN-OS GlobalProtect9.8Limited exploitation
CVE-2026-3098Apache Struts9.8In CISA KEV
CVE-2026-2134Cisco IOS XE8.8Actively exploited
CVE-2026-21413Exchange Server SSRF9.1Actively exploited

New Content on CosmicBytez Labs

How-To Guides

  • Active Directory Health Check — Comprehensive PowerShell diagnostic guide for AD infrastructure
  • Configuring Windows LAPS — Automated local admin password management
  • Nmap Scanning Techniques — From host discovery to NSE scripts
  • OSINT Reconnaissance Methodology — Structured approach to open-source intelligence
  • M365 Security & Compliance — Harden your Microsoft 365 tenant
  • Group Policy Security Hardening — CIS-aligned GPO baselines
  • Exchange Online Security — Email security configuration guide
  • Python for Security Automation — Essential security scripting

Projects

  • AD Penetration Testing Lab — Build a vulnerable AD environment for training
  • OSINT Investigation Workstation — Dedicated OSINT VM setup
  • M365 Security Baseline — End-to-end tenant hardening
  • Network Traffic Analysis — Zeek + Suricata + ELK stack

Quick Wins This Month

Five things you can do today to improve your security posture:

  1. Patch Exchange Server — CVE-2026-21478 is being actively exploited for unauthenticated RCE
  2. Update FortiGate appliances — CVE-2026-0899 has public exploit code
  3. Enable phishing-resistant MFA — FIDO2 security keys for all admin accounts
  4. Review wire transfer procedures — Implement multi-person authorization and callback verification
  5. Check for auto-forwarding rules — Attackers use these for persistent email access

What's Coming Next

  • Expanded IT exam prep with CompTIA Security+ (SY0-701) study materials
  • Deep dive into Azure AD Certificate Services (AD CS) attacks
  • Wireshark protocol analysis tutorial series
  • MITRE ATT&CK mapping for our security content

Stay Connected

  • Visit CosmicBytez Labs for the latest content
  • Use our Security Tools for quick calculations and lookups
  • Prepare for certifications with IT Exam Prep
  • Browse the Security Advisory Archive for latest CVEs

See you in Issue #5!

— Dylan H., CosmicBytez Labs

#Newsletter#Security Digest#February 2026#Zero-Day#AI Threats
Previous Issue

Issue #3

Next Issue

Issue #5

Enjoyed this issue?

Subscribe to get the latest security alerts and tutorials delivered to your inbox.

Subscribe for Free

Related Articles

Ex-L3Harris Executive Pleads Guilty to Selling Eight

Peter Williams, former GM of L3Harris's cyber subsidiary Trenchant, admits to selling eight zero-day exploit kits to a Russian broker for $1.3M in...

4 min read

CrowdStrike 2026 Threat Report: eCrime Breakout Time Falls

CrowdStrike's 2026 Global Threat Report reveals that AI-enabled adversary operations surged 89% year-over-year, the average eCrime breakout time dropped...

6 min read

U.S. Treasury Sanctions Russian Zero-Day Broker Operation

The U.S. Treasury sanctioned Russian zero-day exploit broker Operation Zero, its founder Sergey Zelenyuk, and affiliated entities after an FBI...

5 min read
Back to Newsletter Archive