Jan 2026: Monthly Security Bytes

Welcome to the first edition of LGA Monthly Security Bytes!

Here, you’ll find bite-sized security developments and practical insights to help you stay ahead of day-to-day security operations.

Over the past month, we saw a surge in critical, internet-exploitable vulnerabilities, with many scoring CVSS 9.8-10.0. Several enable unauthenticated remote code execution, while others stem from legacy systems and exposed configurations.

In parallel, government-impersonation scams continue to rise locally, relying on urgency and fear rather than technical exploits.

The pattern is clear: security risk today is driven as much by operational gaps as by the software vulnerabilities themselves.

Key Security Updates

1. Rise in Critical Remote Exploitation Risks

These vulnerabilities enable unauthenticated attackers to execute code, bypass authentication or gain system-level access over the internet, making exposure immediate and high impact.

Critical Vulnerabilities were identified in:

 •  SmarterTools (SmarterMail Software)

 •  Hewlett Packard Enterprise OneView Software

 •  WatchGuard Fireware Operating System

 •  Cisco Secure Email Gateway and Cisco Secure Email and Web Manager.

 •  Adobe ColdFusion and Adobe Experience Manager (AEM)

 •  Fortinet FortiOS, FortiProxy, FortiSwitchManager and FortiWeb

 •  Ivanti Endpoint Manager

 •  SAP Solution Manager ST 720, SAP Commerce Cloud and SAP jConnect

 •  React Server Components and Next.js

 

Zero-day Vulnerabilities were observed in:

 •  Apple WebKit

2. Legacy, End-of-Life & Configuration Risks

These risks arise from unsupported hardware, insecure defaults, or exposed management interfaces, often overlooked in day-to-day operations.

Affected Platforms include:

 •  Linksys: E9450-SG Router (EOL)

 •  ASUS: AiCloud Router

How These Risks Can Be Actively Mitigated

Our security solutions are designed to reduce exposure across endpoints, networks and applications through continuous visibility and proactive response.

Unsure where your real exposure lies?

Speak to our security specialists today!
We will assess your current risk surface, identify critical gaps, and recommend practical next steps to strengthen your security posture.

Validate Your Current Security Posture

Understand what truly matters with insights from our local SOC team before it becomes an incident