Feb 2026: Monthly Security Bytes

Welcome to our LGA Monthly Security Bytes!

Here, you’ll find bite-sized security developments and practical insights to help you stay ahead of day-to-day security operations.

High speed Data Protection.Padlock lock icon digital display over on dark blue background.Technology speed for online data access defense against hacker and virus.Internet security concept.

Over the past month, multiple internet-exploitable vulnerabilities across security monitoring, workflow automation, IoT and API management platforms have been disclosed, many with CVSS scores of 9.8-10.0, and public exploit code enabling rapid, unauthenticated attacks.

We also observed that attackers are increasingly abusing exposed management and monitoring systems, making operational platforms a primary attack path.

Without strict access control, continuous visibility and early detection, trusted systems quickly become high-impact liabilities.

Key Security Updates

1. Unauthenticated Remote Exploitation Across Critical Platforms

Several affected platforms operate in internet-facing or high-privilege environments, elevating the risk of unauthenticated remote exploitation if unpatched.

The affected platforms include Advantech IoTSuite and IoT EdgeFortinet FortiSIEM, and IBM API Connect, spanning multiple versions.

Users and administrators are strongly advised to apply vendor-released fixes promptly and review exposure of these systems to untrusted networks.

Critical Vulnerabilities were identified in:

1. Advantech
 • IoTSuite SaaSComposer prior to version 3.4.15
 • IoTSuite Growth Linux docker prior to version V2.0.2
 • IoTSuite Starter Linux docker prior to version V2.0.2
 • IoT Edge Linux docker prior to version V2.0.2
 • IoT Edge Windows prior to version V2.0.2

2. Fortinet
 • FortiSIEM 7.4.0
 •  FortiSIEM 7.3.0 through 7.3.4
 •  FortiSIEM 7.2.0 through 7.2.6
 •  FortiSIEM 7.1.0 through 7.1.8
 •  FortiSIEM 7.0.0 through 7.0.4
 •  FortiSIEM 6.7.0 through 6.7.10

3. IBM
 • IBM API Connect V10.0.8.0 through V10.0.8.5
 • IBM API Connect V10.0.11.0

2. Operational Exposure Is the Primary Risk Multiplier

1. Unauthenticated exploitation is now the dominant risk
Attackers are increasingly compromising critical platforms without credentials, making any internet-facing system a high-impact target by default.

2. Trusted platforms have become primary targets
Security, monitoring, IoT and API systems are being targeted precisely because of their elevated privileges and central role in operations.

How These Risks Can Be Actively Mitigated

Unsure about your current security posture?

Speak to our security specialists today!
We will assess your exposure and understand how we can help reduce and manage your security risk today!

Validate Your Current Security Posture

Understand what truly matters with insights from our local SOC team before it becomes an incident