Good morning. This is your security briefing for Friday, February 13, 2026, covering 4 articles analyzed overnight. All attribution is by the article authors. All article analysis is automated.
Elastic Security Labs reports that Chinese-speaking cybercrime group REF4033 has compromised over 1,800 Windows web servers globally using a malicious IIS module called BADIIS. The campaign conducts SEO poisoning by injecting keywords and redirecting users to illicit websites including gambling, pornography, and cryptocurrency scams, affecting governments, corporations, and educational institutions worldwide.
JPCERT Coordination Center reports that multiple threat actors rapidly exploited CVE-2025-55182, known as React2Shell, a critical unauthenticated remote code execution vulnerability in React Server Components disclosed on December 3, 2025. Within days of disclosure, attackers deployed coin miners, RATs, and backdoors, with over 100 IP addresses conducting suspicious network activity and some compromised servers being attacked by multiple threat actors simultaneously.
Project Zero reports that a security researcher discovered 9 bypasses for Windows' Administrator Protection feature by exploiting the UI Access flag mechanism. The vulnerabilities allowed limited users to launch High integrity UI Access processes that could compromise other High integrity processes, including those running as shadow administrator. While all reported vulnerabilities have been fixed, the underlying bypass principles remain relevant.
x64dbg announced the release of a comprehensive cookbook integrating x64dbg Automate MCP server and x64dbg-skills to enhance reverse engineering and bug hunting capabilities. The toolkit provides five core functionalities including decompilation, state analysis, in-memory deobfuscation, cryptographic fingerprinting, and API documentation to streamline vulnerability discovery and malware analysis for security researchers.
That concludes today's briefing.