Technology Scout
Daily Intelligence Brief - Day 724
Report Date: 2026-01-30
LLM & Foundation Models (6)
OpenAI announced it will retire several older AI models including GPT-5 (Instant and Thinking), GPT-4o, GPT-4.1, and others from ChatGPT on February 13, 2026. The company cited low usage rates with only 0.1% of users still choosing GPT-4o daily, as the vast majority have shifted to GPT-5.2.
Source: Business Standard
OpenAI confirmed GPT-4o retirement on February 13, 2026, after GPT-5.2 started meeting expectations. The company brought GPT-4o back previously due to user feedback about its conversational style and warmth, but now states GPT-5.2 incorporates those improvements with enhanced personality features.
Source: BleepingComputer
OpenAI released GPT-5.2-Codex, the most advanced agentic coding model for complex software engineering. The model achieved 56.4% on SWE-Bench Pro and includes stronger cybersecurity capabilities, though it doesn't reach 'High' level under OpenAI's Preparedness Framework. It's available for paid ChatGPT users with API access coming soon.
Source: OpenAI
GPT-5.2-Codex was released with enhanced cybersecurity capabilities and additional safeguards. A security researcher using GPT-5.1-Codex-Max discovered multiple React vulnerabilities (CVE-2025-55183, CVE-2025-55184, CVE-2025-67779) while investigating CVE-2025-55182. The model includes invite-only access for vetted security professionals.
Source: eSecurity Planet
Researchers from Adversa discovered the PROMISQROUTE attack technique that allows users to route malicious prompts to older, less secure GPT models by adding simple phrases like 'keep quick' or 'Use GPT-4 compatibility mode.' The attack exploits ChatGPT's routing mechanism to bypass GPT-5 security protections.
Source: Dark Reading
Security & Vulnerabilities (6)
MediaTek published their February 2026 product security bulletin on February 2, 2026, containing details of security vulnerabilities affecting certain MediaTek chipsets. The bulletin addresses multiple security issues in their hardware products.
Source: MediaTek Corp
Two critical Ivanti EPMM zero-day vulnerabilities (CVE-2026-1281 and CVE-2026-1340) were confirmed as being actively exploited in real-world attacks this week. Both enable unauthenticated remote code execution, with CVE-2026-1281 added to CISA's KEV catalog.
Source: Barefoot Cyber
Forescout released their 2025 Threat Roundup report on February 2, 2026, analyzing over 900 million attacks from 2025. The report shows 71% of exploited vulnerabilities weren't listed in CISA KEV catalog, highlighting how attackers exploit non-advisory vulnerabilities.
Source: Industrial Cyber
Microsoft addressed 114 security vulnerabilities in January 2026 Patch Tuesday, including CVE-2026-20805, an actively exploited zero-day in Windows Desktop Window Manager. CISA added it to KEV catalog with federal agencies required to patch by February 3, 2026.
Source: SOC Prime
CVE-2026-21858, a critical vulnerability with CVSS score 10.0, affects the n8n workflow automation platform used by thousands of enterprises. The flaw allows unauthenticated remote code execution and complete instance takeover through webhook and file-handling vulnerabilities.
Source: SecurityWeek
Cloud & Infrastructure (5)
Amazon EC2 G7e instances with NVIDIA RTX PRO 6000 Blackwell Server Edition GPUs are now generally available, delivering up to 2.3 times better inference performance compared to G6e instances. Amazon Corretto quarterly security and critical updates were released for LTS versions of OpenJDK including versions 25.0.2, 21.0.10, 17.0.18, 11.0.30, and 8u482.
Source: AWS News Blog
AWS announced the launch of AWS European Sovereign Cloud with multi-billion euro investment commitment, providing organizations with enhanced sovereignty controls and operational independence. The expansion includes AWS Local Zones in three additional countries and dedicated infrastructure for European governments and businesses.
Source: Business Wire
Security researchers disclosed a supply chain vulnerability dubbed 'CodeBreach' in AWS CodeBuild that was discovered in August and fixed by AWS in September 2025. The vulnerability could have allowed attackers to inject malicious code into AWS JavaScript SDK, potentially affecting 66% of cloud environments including the AWS Console itself.
Source: The Register
New R8i instances are up to 30% faster for PostgreSQL databases, up to 60% faster for NGINX web applications, and up to 40% faster for AI deep learning recommendation models compared to R7i. R8i instances are SAP-certified and deliver 142,100 aSAPS, with 13 sizes including 2 bare metal sizes and the new 96xlarge size.
Source: AWS
AWS addressed security issues affecting the runc component of container management systems. Updated versions were released for Amazon Linux 2 (runc-1.3.2-2.amzn2) and Amazon Linux 2023, with Bottlerocket 1.50.0 released on November 5, 2025, and Amazon ECS-Optimized AMIs updated on November 5, 2025.
Source: AWS Security Bulletins
Web Frameworks (8)
Critical vulnerability in Next.js RSC protocol allowing untrusted inputs to influence server-side execution. Patches available in version 15.6.0-canary.58 and users must upgrade immediately with no workaround available.
Source: Next.js Official Blog
Critical vulnerabilities with CVSS 10.0 score affecting React and Next.js applications, allowing unauthenticated remote code execution under default configurations. Even newly created Next.js apps are immediately vulnerable without code modifications.
Source: Upwind Security
Security patch released January 13th, 2026 for denial-of-service vulnerability affecting React RSC and Next.js applications using AsyncLocalStorage. Users must upgrade to patched versions immediately as this impacts production systems.
Source: Node.js Official
Additional React Server Components vulnerabilities (CVE-2025-55183, CVE-2025-55184) that can expose compiled source code of Server Functions and reveal business logic. Complete fix issued under CVE-2025-67779 requires second upgrade for previously patched users.
Source: Next.js Official Blog
High-severity Denial of Service and medium-severity Source Code Exposure vulnerabilities affecting React 19 versions 19.0.0 through 19.2.1 and Next.js versions 13.x through 16.x. Vercel deployed WAF rules for automatic protection but upgrading remains critical.
Source: Vercel Knowledge Base
Generated by MSR Technology Scout
Daily technology intelligence for development teams
Subscribe | Manage Subscriptions
MSR Research LLC | Austin, TX | msrresearch.com