Signal

VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)

Evidence first: scan the strongest sources, then decide whether to go deeper.

Published 2026-02-19 11:56 UTCUpdated 2026-02-19 23:00 UTC
rss
securitypalo_alto_networks
Source links open
Source links and full evidence are open here. Archive history, compare-over-time, alerts, exports, API, integrations, and workflow are paid.
No card needed for the free brief.
Evidence trail (top sources)
top sources (2 domains)domains are deduped. counts indicate coverage, not truth.
2 top sources shown
limited source diversity in top sources
Overview

Security researchers have seen the vulnerabilities being exploited to deliver shells, conduct reconnaissance, and download malware. The post Ivanti Exploitation Surges as Zero-Day Attacks Traced Back to July 2025 appeared first on SecurityWeek .

Score total
0.96
Momentum 24h
2
Posts
2
Origins
2
Source types
1
Duplicate ratio
0%
All evidence
All evidence
VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)
Palo Alto Networks Unit 42 · unit42.paloaltonetworks.com · 2026-02-19 23:00 UTC
Ivanti Exploitation Surges as Zero-Day Attacks Traced Back to July 2025
SecurityWeek · securityweek.com · 2026-02-19 11:56 UTC
Show filters & breakdown
Posts loaded: 0Publishers: 2Origin domains: 2Duplicates: -
Showing 2 / 0
Top publishers (this list)
  • Palo Alto Networks Unit 42 (1)
  • SecurityWeek (1)
Top origin domains (this list)
  • unit42.paloaltonetworks.com (1)
  • securityweek.com (1)