週次サイバーセキュリティ動向(直近7日)

日付見出し要点(1行)出典URL
2026/02/13CISA Warns of Exploited SolarWinds, Notepad++, Microsoft VulnerabilitiesCISA KEVにSolarWinds WHDやNotepad++更新機構など複数の“実被害前提”項目が追加され、即時対処が必要。https://www.securityweek.com/cisa-warns-of-exploited-solarwinds-notepad-microsoft-vulnerabilities/
2026/02/13BeyondTrust Vulnerability Targeted by Hackers Within 24 Hours of PoC ReleaseBeyondTrust RS/PRAのCVE-2026-1731(CVSS 9.9)にPoC公開後すぐ攻撃試行が観測され、公開面の棚卸しが最優先。https://www.securityweek.com/beyondtrust-vulnerability-targeted-by-hackers-within-24-hours-of-poc-release/
2026/02/11Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-DaysMicrosoftが“悪用中”ゼロデイ6件を含む修正を公開、Windows運用は月例より前倒しの緊急適用判断が必要。https://thehackernews.com/2026/02/microsoft-patches-59-vulnerabilities.html
2026/02/10Patch Tuesday, February 2026 EditionMicrosoft月例で50件超+悪用中ゼロデイ6件、WSUS/Intuneの段階展開でも“先に止血”する優先順位付けが鍵。https://krebsonsecurity.com/2026/02/patch-tuesday-february-2026-edition/
2026/02/12Apple Patches iOS Zero-Day Exploited in ‘Extremely Sophisticated Attack’AppleがdyldのゼロデイCVE-2026-20700を修正、MDM配下端末はOS更新の強制タイミング設計が重要。https://www.securityweek.com/apple-patches-ios-zero-day-exploited-in-extremely-sophisticated-attack/
2026/02/08SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed ServersSolarWinds WHDが侵入起点にされ、正規ツール(トンネル/会議/フォレンジック)悪用で居座る“運用者泣かせ”が進行。https://thehackernews.com/2026/02/solarwinds-web-help-desk-exploited-for.html
2026/02/12Uncovering the Sophisticated Phishing Campaign Bypassing M365 MFAOAuth 2.0 Device Authorization Grantを悪用しM365のMFAを迂回するフィッシングが確認され、条件付きアクセスの見直しが必要。https://blog.knowbe4.com/uncovering-the-sophisticated-phishing-campaign-bypassing-m365-mfa
2026/02/09New Zero-Click Flaw in Claude Desktop Extensions (DXT) Could Allow RCE“ゼロクリック”でRCEに至り得る拡張機構の欠陥が報告され、AI/拡張の導入基準(許可制・署名・隔離)が焦点。https://www.infosecurity-magazine.com/news/zeroclick-flaw-claude-dxt/
2026/02/10Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server未パッチのSmarterMailが侵害起点となりランサムに波及、インターネット公開資産のSLA管理が直撃。https://thehackernews.com/2026/02/warlock-ransomware-breaches.html
2026/02/13Hackers turn bossware against the bosses監視系“業務ソフト”とRMMが攻撃に転用され、正規ツールの棚卸しと実行制御(許可リスト)が有効。https://www.csoonline.com/article/4131789/hackers-turn-bossware-against-the-bosses.html
2026/02/10Chipmaker Patch Tuesday: Over 80 Vulnerabilities Addressed by Intel and AMDCPU/チップセット系の修正が大量に出ており、サーバ更改計画と保守窓の設計(再起動前提)が必要。https://www.securityweek.com/chipmaker-patch-tuesday-over-80-vulnerabilities-addressed-by-intel-and-amd/
2026/02/13Chrome 145 Patches 11 Vulnerabilitiesブラウザは攻撃面の中心であり、安定版更新を“任意”から“必須”に格上げ(期限設定)すべき。https://www.securityweek.com/chrome-145-patches-11-vulnerabilities/
2026/02/05NICTER観測レポート2025の公開国内観測に基づく攻撃関連通信の実態が公開され、境界防御だけでなく探索行動の常態化を前提に設計が必要。https://www.nict.go.jp/press/2026/02/05-1.html
2026/02/04OWASP Vendor Evaluation Criteria for AI Red Teaming Providers & Tooling v1.0AIレッドチーミングの調達基準が整理され、評価軸(範囲・測定・再現性)を契約要件に落とし込める。https://genai.owasp.org/resource/owasp-vendor-evaluation-criteria-for-ai-red-teaming-providers-tooling-v1-0/