themissingsunday
#tech-news

Weekly Scan: Cloud, Cybersecurity, AI News — Feb 25, 2026

Weekly Scan: Cloud, Cybersecurity, AI News — Feb 25, 2026

⚠️ Audio playback is not supported in your browser. Please try Chrome, Edge, or Safari for the best experience.

#This Week in Security: Your News Briefing

Welcome to your weekly security roundup. We’ve tracked down the 10 most important stories this week—the ones everyone’s talking about, from critical threats to emerging trends that could shape your security posture. Leading the news this week is CVE-2025-59536, which has sparked conversation across 10 sources. Meanwhile, the industry is closely tracking CVE-2026-26935 | Elastic Kibana up to 8.19.11/9.2.5/9.3.0 Internal… with 3 mentions, along with emerging details on CVE-2026-2680 | A3factura Web Platform 4.111.2-rev.1…, Cisco SD-WAN Zero-Day Under Exploitation for 3 Years, and Promoting AI Security — Acting Assistant Privacy Commissioner…. Here’s the full breakdown of what you need to know.

#🚨 Critical Threats This Week

First, the stories that demand your immediate attention:

1. CVE-2025-59536 Mentioned across 10 industry sources this week. Currently trending CVE - Hype Score: 27 - Claude Code is an agentic coding tool. Get the details →

2. CVE-2026-26935 | Elastic Kibana up to 8.19.11/9.2.5/9.3.0 Internal Content Connectors Search Endpoint denial of service Mentioned across 3 industry sources this week. A vulnerability has been found in Elastic Kibana up to 8. Get the details →

3. CVE-2026-2680 | A3factura Web Platform 4.111.2-rev.1 salesDeliveryNotes customerVATNumber cross site scripting (EUVD-2026-8852) Mentioned across 4 industry sources this week. A vulnerability described as problematic has been identified in A3factura Web Platform 4. Get the details →

#🛠️ Tools, Updates & Releases

New capabilities and releases worth knowing about:

1. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium . Referenced in 2 stories this week. Explore →

2. New Aeternum C2 Botnet Evades Takedowns via Polygon Blockchain Qrator Research Lab has identified Aeternum C2, a botnet that uses the Polygon blockchain for comman. Referenced in 2 stories this week. Explore →

3. Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign UNC2814 hit 53 victims in 42 countries with novel backdoor in decade long cyber espionage operation. Referenced in 2 stories this week. Explore →

#What You Should Do Next

Monitor these in your environment next week:

  • Any new CVE announcements related to systems you operate
  • Emerging attack techniques being discussed in the community
  • Updates and patches for tools your team uses

Have a look at the full deep-dives in the trending stories below. Each one provides context that could inform your security decisions this week.


1. Key Threat Intel & Vulnerability Stories (17 mentions)
2. Cisco SD-WAN Zero-Day Under Exploitation for 3 Years (2 mentions)

The maximum-severity vulnerability CVE-2026-20127 was exploited by an unknown but sophisticated threat actor who left very little evidence behind.

Read Full Article →
3. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium (2 mentions)
4. New Aeternum C2 Botnet Evades Takedowns via Polygon Blockchain (2 mentions)

Qrator Research Lab has identified Aeternum C2, a botnet that uses the Polygon blockchain for commands, making it nearly impossible to shut down.

Read Full Article →
5. Lazarus Group Picks a New Poison: Medusa Ransomware (3 mentions)

The North Korean threat group also leveraged Comebacker backdoor, Blindingcan RAT, and info stealer Infohook in its recent attacks.

Read Full Article →
6. Notorious ransomware gang allegedly blackmailed by fake FSB officer (2 mentions)

There is a certain poetic justice in a cybersecurity-related story that has emerged from Moscow this week: A man has been accused of trying to extort money... from a notorious Russian ransomware gang. Read more in my article on the Hot for Securit...

Read Full Article →
7. Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign (2 mentions)

UNC2814 hit 53 victims in 42 countries with novel backdoor in decade long cyber espionage operation

Read Full Article →
8. Marquis sues SonicWall over backup breach that led to ransomware attack (2 mentions)

Marquis Software Solutions has filed a lawsuit against SonicWall, accusing the cybersecurity company of gross negligence and misrepresentation that allegedly led to a ransomware attack disrupting operations at 74 U.S. banks. [...]

Read Full Article →

#Article Summary

Category Article Count
AI & LLM 5
Cloud 3
Cyber Regulatory 0
Cybersecurity 113
Security Vendor Blog 3
Tech 13
Threat Intel & Vulnerability 17
Total Articles Scanned 154

#AI & LLM

Closing the Gap Between Text and Speech Understanding in LLMs

Large Language Models (LLMs) can be adapted to extend their text capabilities to speech inputs. However, these speech-adapted LLMs consistently underperform their text-based counterparts—and even cascaded pipelines—on language understanding tasks. We term this shortfall the text-speech understand...

Read Full Article →
From Radiology to Drug Discovery, Survey Reveals AI Is Delivering Clear Return on Investment in Healthcare

AI is accelerating every aspect of healthcare — from radiology and drug discovery to medical device manufacturing and new treatment methods enabled by digital twins of the human body. NVIDIA’s second annual “State of AI in Healthcare and Life Sciences” survey report reveals how the industry is mo...

Read Full Article →
Beyond a Single Extractor: Re-thinking HTML-to-Text Extraction for LLM Pretraining

One of the first pre-processing steps for constructing web-scale LLM pretraining datasets involves extracting text from HTML. Despite the immense diversity of web content, existing open-source datasets predominantly apply a single fixed extractor to all webpages. In this work, we investigate whet...

Read Full Article →
AMUSE: Audio-Visual Benchmark and Alignment Framework for Agentic Multi-Speaker Understanding

Recent multimodal large language models (MLLMs) such as GPT-4o and Qwen3-Omni show strong perception but struggle in multi-speaker, dialogue-centric settings that demand agentic reasoning tracking who speaks, maintaining roles, and grounding events across time. These scenarios are central to mult...

Read Full Article →
Import AI 446: Nuclear LLMs; China’s big AI benchmark; measurement and AI policy

Welcome to Import AI, a newsletter about AI research. Import AI runs on arXiv and feedback from readers. If you’d like to support this, please subscribe. Subscribe now Want to make AI go better? Figure out how to measure it:…One simple policy intervention that works well…Jacob Steinhardt, an AI r...

Read Full Article →

#Cloud

AWS WAF announces AI activity dashboard for visibility into AI bot and agent traffic

Today, AWS WAF announced a new AI activity dashboard that provides centralized visibility into AI bot and agent traffic reaching your applications. With this launch, AWS WAF Bot Control expands its detection coverage to track more than 650 unique bots and agents, offering one of the most comprehe...

Read Full Article →
The Rise of the AI Security Engineer: A New Discipline for an AI-Native World

As autonomous AI systems transform business, a new profession is emerging to protect them: the AI Security Engineer. Discover why this specialized discipline is becoming a survival imperative for organizations in an AI-native world.

Read Full Article →
Amazon announces generative AI-based artifacts in Amazon Q Developer for visualizing resource and cost data

Today, AWS announces the general availability of Amazon Q Developer artifacts in the AWS Management Console. Amazon Q artifacts is a generative AI-based user experience that enables customers to visualize resource data in tables and cost data in charts. The launch also moves the Q icon to the nav...

Read Full Article →

#Cyber Regulatory

#Cybersecurity

Your Drug Formulas, Clinical Trials, and Manufacturing Lines Are Under Attack. Here’s How to Fight Back.

Detect pharmaceutical IP theft, ransomware campaigns, and supply chain breaches in real time with Morpheus AI SOC. The post Your Drug Formulas, Clinical Trials, and Manufacturing Lines Are Under Attack. Here’s How to Fight Back. appeared first on D3 Security . The post Your Drug Formulas, Clinica...

Read Full Article →
Vulnerability Finding: An Inflection Point

LLM-driven vuln finding has reached an inflection

Read Full Article →
Security Advisory SA-26-01 GPS Attacks

GPS attacks trigger revisiting threat models

Read Full Article →
LLMs as Compilers

What if we think about LLM coding as if it’s a compiler stage?

Read Full Article →
The Cyber Resilience Act (CRA)!

The CRA is coming and it's going to be a dramatic change for technology producers

Read Full Article →
Threat modeling as a dial, not a switch

Thinking of threat modeling with a knob helps you get more out of it.

Read Full Article →
A few thoughts on CVE

Thoughts on the CVE funding crisis

Read Full Article →
Introducing the DEF CON 32 Hackers' Almanack

Grateful to introduce the Hackers' Almanack!

Read Full Article →
Security Researcher Comments on HIPAA Security Rule

A group of us have urged HHS to require better handling of security reports

Read Full Article →
Inside Man

Some thoughts on the Voyager Episode ‘Inside Man’

Read Full Article →
Appsec Roundup - July 2024

The most important stories around threat modeling, appsec and secure by design for June, 2024.

Read Full Article →
Lockbit, a study in public health

Why is it hard to count lockbit infections?

Read Full Article →
Eternal sunshine of the spotless LLM

Making an LLM forget is harder than it seems

Read Full Article →
CSRB Report on Microsoft

The CSRB has released its report into an intrusion at Microsoft, and...it’s a doozy.

Read Full Article →
Introducing Magic Security Dust!
The NVD Crisis

The NVD is in crisis, and so is patch management. It’s time to modernize.

Read Full Article →
Solving Hallucinations

Solving hallucinations in legal briefs is playing on easy mode —— and still too hard

Read Full Article →
Microsoft Can Fix Ransomware Tomorrow

My latest at Dark Reading draws attention to how Microsoft can fix ransomware tomorrow.

Read Full Article →
Phishing Defenses

Phishing behaviors, as observed in the wild.

Read Full Article →
Darkreading: Threat Modeling in the Age of OpenAI's Chatbot

Pointer to Adam’s latest Darkreading article

Read Full Article →
GPT-3

Text captured from GPT-3

Read Full Article →
What are we going to do: CO2 edition

What happened when Microsoft tried to buy climate abatements

Read Full Article →
Ransomware is Not the Problem

Arbitrarily powerful software -- applications, operating systems -- is a problem, as is preventing it from running on enterprise systems.

Read Full Article →
Colonial Pipeline, Darkside and Models

The Colonial Pipeline shutdown story is interesting in all sorts of ways, and I can't delve into all of it.I did want to talk about one small aspect, which is the way responders talk about Darkside.

Read Full Article →
The Updates Must Go Through

The timing of updates is not coincidental.

Read Full Article →
Ever Given & Suez

Thoughts on the issues with the Ever Given blocking the Suez Canal.

Read Full Article →
Threat Modeling and Social Issues

For Data Breach Today, I spoke with Anna Delaney about threat modeling for issues that are in the news right now.

Read Full Article →
Vaccines

You may have noticed that my end of the year posts are all science focused. Today, a set of resources on the COVID vaccines.

Read Full Article →
Interesting reads

Sharing for you, bookmarking for me.

Read Full Article →
Episode 9 Spoilers

Today is the last Star Wars Day before Episode 9 comes out, and brings the Skywalker saga to its end.

Read Full Article →
Leave Those Numbers for April 1st

Over-inflated numbers won't scare me into buying your ‘solution’.

Read Full Article →
High ROI Security Advisory Boards

Discussing the value of Security Advisory Boards

Read Full Article →
CVE Funding and Process

[no description provided]

Read Full Article →
Carpenter!

[no description provided]

Read Full Article →
The DREAD Pirates

[no description provided]

Read Full Article →
Pen Testing The Empire

[no description provided]

Read Full Article →
Threat Modeling Tooling from 2017

[no description provided]

Read Full Article →
20 Year Software: Engineering and Updates

[no description provided]

Read Full Article →
Hospital Ransomware

[no description provided]

Read Full Article →
Warrants for Cleaning Malware in Kelihos

[no description provided]

Read Full Article →
Threat Modeling & IoT

[no description provided]

Read Full Article →
People are The Weakest Link In Security?

[no description provided]

Read Full Article →
Modeling Attackers and Their Motives

There are a number of reports out recently, breathlessly presenting their analysis of one threatening group of baddies or another. Most readers should, at most, skim their analysis of the perpetrators. Read on for why.

Read Full Article →
Project Compass is Europol’s new playbook for taking on The Com

Officials said 30 perpetrators have been arrested in the past year, and global law enforcement cooperation is closing the gap. The post Project Compass is Europol’s new playbook for taking on The Com appeared first on CyberScoop .

Read Full Article →
UAT-10027 campaign hits U.S. education and healthcare with stealthy Dohdoor backdoor

UAT-10027 campaign is targeting U.S. education and healthcare sectors to deploy a new Dohdoor backdoor. Cisco Talos has identified a new threat cluster, tracked as UAT-10027, targeting U.S. education and healthcare organizations since at least December 2025 to deploy a previously unseen backdoor ...

Read Full Article →
Trend Micro warns of critical Apex One code execution flaws

Trend Micro has patched two critical Apex One vulnerabilities that allow attackers to gain remote code execution (RCE) on vulnerable Windows systems. [...]

Read Full Article →
European DYI chain ManoMano data breach impacts 38 million customers

DIY store chain ManoMano is notifying customers of a data breach personal data, which was caused by hackers compromising a third-party service provider. [...]

Read Full Article →
Fake Avast Website Targets Users With €499 Phishing Refund Scam

Fraudsters clone Avast’s website to target French users with a €499 phishing scam, using urgency tactics, live chat, and card validation to steal payment data.

Read Full Article →
Critical Juniper Networks PTX flaw allows full router takeover

A critical vulnerability in the Junos OS Evolved network operating system running on PTX Series routers from Juniper Networks could allow an unauthenticated attacker to execute code remotely with root privileges. [...]

Read Full Article →
Google takes down telecom hackers using Sheets and SaaS apps to spread mayhem

A decade-old threat actor is up to some new shenanigans, but Google is having none of it.

Read Full Article →
Google disrupts Сhina-linked cyberespionage campaign spanning dozens of countries

A cyberespionage campaign carried out by a China-linked threat actor affected at least 53 government and telecom organizations across 42 countries, Google said.

Read Full Article →
Olympique Marseille confirms 'attempted' cyberattack after data leak

French professional football club Olympique de Marseille has confirmed a cyberattack after a threat actor claimed on Monday that it breached the club's systems earlier this month. [...]

Read Full Article →
Aeternum Botnet Shifts Command Control to Polygon Blockchain

New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts

Read Full Article →
Hackers are harnessing AI to exploit security flaws faster than ever

As AI gets integrated, attacks speed up and grow in severity, so buisnesses should shape up.

Read Full Article →
Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks Intensify

2025 saw 32M phishing emails, with identity threats surpassing vulnerabilities

Read Full Article →
Ransomware payment rate drops to record low as attacks surge

The number of ransomware victims paying threat actors has dropped to 28% last year, an all-time low, despite a significant increase in the number of claimed attacks. [...]

Read Full Article →
Scattered Lapsus$ Hunters seeks women for vishing attacks

The Scattered Lapsus$ Hunters (SLH) hacking collective has launched a recruitment push aimed specifically at women, offering cash payments for participating in voice-phishing (vishing) attacks. A few days ago, threat intelligence firm Dataminr detected posts on a public Telegram channel advertisi...

Read Full Article →
Hacker kompromittieren immer schneller

Der Einsatz von KI-Tools macht Cyberangriffe nicht nur schneller, sondern erhöht auch die Taktzahl. Color4260 / Shutterstock Crowdstrike hat die aktuelle Ausgabe seines Global Threat Report veröffentlicht – mit mehreren bemerkenswerten Erkenntnissen. So benötigte ein Angreifer im Jahr 2025 im Sch...

Read Full Article →
Zyxel Patches Critical Vulnerability in Many Device Models

The issue impacts the UPnP function of multiple device models and could be exploited for remote code execution. The post Zyxel Patches Critical Vulnerability in Many Device Models appeared first on SecurityWeek .

Read Full Article →
LLMs Generate Predictable Passwords

LLMs are bad at generating passwords: There are strong noticeable patterns among these 50 passwords that can be seen easily: All of the passwords start with a letter, usually uppercase G, almost always followed by the digit 7. Character choices are highly uneven ­ for example, L , 9, m, 2, $ and ...

Read Full Article →
China-linked hackers used Google Sheets to spy on telecoms and governments across 42 countries

Google has disrupted a China-linked espionage group that used Google’s spreadsheet application as a covert spy tool to compromise telecom providers and government agencies across 42 countries, sending commands and receiving stolen data through it, Google’s Threat Intelligence Group (GTIG) said on...

Read Full Article →
Wireshark 4.6.4 resolves dissector flaws, plugin compatibility issue

Packet inspection remains a routine activity across enterprise networks, incident response workflows, and malware investigations. Continuous use places long-term stability and parsing accuracy at the center of daily operations. Wireshark version 4.6.4 addresses two vulnerabilities affecting proto...

Read Full Article →
Google GTIG disrupted China-linked APT UNC2814 halting attacks on 53 orgs in 42 countries

Google and partners disrupted UNC2814, a suspected China-linked group that hacked 53 organizations across 42 countries. Google, with industry partners, disrupted the infrastructure of UNC2814, a suspected China-linked cyber espionage group that breached at least 53 organizations in 42 countries. ...

Read Full Article →
9 unverzichtbare Open-Source-Security-Tools

Diese Open-Source-Tools adressieren spezifische Security-Probleme – mit minimalem Footprint. Foto: N Universe | shutterstock.com Cybersicherheitsexperten verlassen sich in diversen Bereichen auf Open-Source-Lösungen – nicht zuletzt weil diese im Regelfall von einer lebendigen und nutzwertigen Com...

Read Full Article →
Srsly Risky Biz: Is Claude too woke for war?

Tom Uren and Amberleigh Jack talk about the argy-bargy between the Pentagon and AI company Anthropic. US Defense Secretary Pete Hegseth is demanding that all safeguards are lifted from Claude, while Anthropic CEO Dario Amodei is insisting on protections against mass surveillance of Americans and ...

Read Full Article →
Smashing Security podcast #456: How to lose friends and DDoS people

When the mysterious operator of an internet archiving-service decided to silence a curious Finnish blogger, they didn’t just send a stroppy email - they allegedly weaponised their own CAPTCHA page to launch a DDoS attack, threatened to invent an entirely new genre of AI porn, and tampered with pa...

Read Full Article →
Steaelite RAT combines data theft and ransomware management capability in one tool

It’s bad enough that threat actors are leveraging AI for their attacks, but now they can also access a new remote access trojan (RAT) that makes it easy to launch data theft and ransomware attacks on Windows computers from a single management pane. The tool is called Steaelite, and according to r...

Read Full Article →
Governments issue warning over Cisco zero-day attacks dating back to 2023

The global campaign marks the second series of multiple actively exploited zero-day vulnerabilities in Cisco edge technology since last spring. The similarities don’t end there. The post Governments issue warning over Cisco zero-day attacks dating back to 2023 appeared first on CyberScoop .

Read Full Article →
RAMP Forum Seizure Fractures Ransomware Ecosystem

Researchers suggest defenders monitor how these malicious groups re-form and leverage the useful threat intel to guide their next moves.

Read Full Article →
Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023

Cisco is warning that a critical authentication bypass vulnerability in Cisco Catalyst SD-WAN, tracked as CVE-2026-20127, was actively exploited in zero-day attacks that allowed remote attackers to compromise controllers and add malicious rogue peers to targeted networks. [...]

Read Full Article →
Chinese cyberspies breached dozens of telecom firms, govt agencies

Google's Threat Intelligence Group (GTIG), Mandiant, and partners disrupted a global espionage campaign attributed to a suspected Chinese threat actor that used SaaS API calls to hide malicious traffic in attacks targeting telecom and government networks. [...]

Read Full Article →
ShinyHunters Claims Odido NL and Ben.nl Breach as Company Confirms Cyberattack

ShinyHunters claims 21 million records stolen in Odido NL and Ben.nl data breach as telecom company confirms cyberattack impacting customer contact system data.

Read Full Article →
Google Disrupts Chinese Hackers Targeting Telecoms, Governments

The UNC2814 threat actor has been active since at least 2017, targeting organizations across 42 countries. The post Google Disrupts Chinese Hackers Targeting Telecoms, Governments appeared first on SecurityWeek .

Read Full Article →
This new cybercrime platform lets hackers run malicious Google Ads and hide from Google's screening process

1Campaign has been around for three years and comes with a fancy dashboard.

Read Full Article →
The OpenClaw Hype: Analysis of Chatter from Open-Source Deep and Dark Web

OpenClaw has sparked heavy Telegram and dark web chatter, but Flare's data shows more research hype than mass exploitation. Flare explains how its telemetry found real supply-chain risk in the skills marketplace, yet limited signs of large-scale criminal operationalization. [...]

Read Full Article →
Vulnerabilities grew like weeds in 2025, but only 1% were weaponized in attacks

Too many defenders and researchers are paying attention to defects and unsubstantiated exploit concepts that aren’t worth their time, VulnCheck’s Caitlin Condon said. The post Vulnerabilities grew like weeds in 2025, but only 1% were weaponized in attacks appeared first on CyberScoop .

Read Full Article →
Zyxel warns of critical RCE flaw affecting over a dozen routers

Taiwan networking provider Zyxel has released security updates to address a critical vulnerability affecting over a dozen router models that can allow unauthenticated attackers to gain remote command execution on unpatched devices. [...]

Read Full Article →
Across party lines and industry, the verdict is the same: CISA is in trouble

The agency lost a third of its people in a year. Now industry and lawmakers on both sides say it's unprepared for a potential crisis. The post Across party lines and industry, the verdict is the same: CISA is in trouble appeared first on CyberScoop .

Read Full Article →
SolarWinds Serv-U has some critical security flaws, so users should update now or face attack

Four critical flaws were addressed, all of which could lead to remote code execution.

Read Full Article →
U.S. CISA adds a flaw in Soliton Systems K.K FileZen to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Soliton Systems K.K FileZen to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Soliton Systems K.K FileZen flaw, tracked as CVE-2026-25108 (CVSS v4...

Read Full Article →
Operation Red Card 2.0 Leads to 651 Arrests in Africa

In the latest operation targeting cybercrime groups, African law enforcement agencies cooperated with Interpol and cybersecurity firms to recover more than $4.3 million.

Read Full Article →
So verändert KI Ihre GRC-Strategie

Rob Schultz / Shutterstock Da Unternehmen Cybersicherheit in ihre GRC ( Governance, Risk & Compliance )-Prozesse integrieren, müssen bestehende Programme überarbeitet werden. Nur so lässt sich sicherstellen, dass der zunehmende Einsatz und die Risiken von Generative und Agentic AI Berücksichtigun...

Read Full Article →
VMware fixes command injection flaw in Aria Operations

VMware has released patches for several high- and medium-risk vulnerabilities that impact its Aria Operations, Cloud Foundation, Telco Cloud Platform, and Telco Cloud Infrastructure products. The most serious of these flaws allows unauthenticated attackers to execute arbitrary commands on the und...

Read Full Article →
What does business email compromise look like?

Business email compromise (BEC) is the digital con dressed to impress. It’s clean, calculated, and ready to fool even the sharpest eyes. These scammers don’t tell on themselves with sloppy hacks. They whisper in familiar voices, posing as your CEO, HR, or a trusted vendor. And, unlike phishing , ...

Read Full Article →
CarGurus data breach affects 12.5 million accounts

Automotive marketplace CarGurus was the target of a data breach in which the names, email addresses, phone numbers, and physical addresses of millions of customers were stolen.

Read Full Article →
Multiple mental health apps riddled with high severity security flaws — data of millions put at risk, so be on your guard

Researchers found 1,500 vulnerabilities in 10 popular apps, including dozens of high-severity flaws.

Read Full Article →
Marquis sues firewall provider SonicWall, alleges security failings with its firewall backup led to ransomware attack

Fintech giant Marquis is suing its firewall provider SonicWall, claiming that an earlier breach with SonicWall allowed hackers to deploy ransomware on Marquis' network.

Read Full Article →
Top ad tech firm Optimizely hit by data breach - around 10,000 companies possibly affected

Attack points to another breach by ShinyHunters, but the group has not yet claimed responsibility.

Read Full Article →
Multifaceted Phishing Scheme Deceives Bitpanda Customers

Phishing attack mimicking Bitpanda targets users, harvesting credentials and personal information

Read Full Article →
Russian hackers target European firms with new spear-phishing cyberattacks

APT28 resurfaces once again, targeting Western organizations with spear-phishing lures.

Read Full Article →
North Korean Lazarus Group Expands Ransomware Activity With Medusa

Ransomware Medusa linked to North Korean hackers targets US healthcare amid ongoing attacks

Read Full Article →
Conduent data breach grows, affecting at least 25M people

The number of people affected by a data breach at government contractor giant Conduent is growing, as millions of people continue to receive notices warning them that hackers stole their personal data.

Read Full Article →
NYC transit workers hit by Qilin ransomware - thousands of members possibly affected

Qilin hits the Local 100 of TWA, leaking sensitive member data to the dark web.

Read Full Article →
'Social advertising is being used to defraud at scale across some of the largest platforms.': Nearly one in three Meta ads reportedly point to a scam, phishing or malware

Scam ads create millions of impressions every month, tricking users into downloading malware, and more.

Read Full Article →
CrowdStrike says attackers are moving through networks in under 30 minutes

The average time from intrusion to network movement in 2025 was 29 minutes, a 65% increase in speed from the year prior. The post CrowdStrike says attackers are moving through networks in under 30 minutes appeared first on CyberScoop .

Read Full Article →
Why I Hate Anthropic and You Should Too

[![Why I Hate Anthropic and You Should Too](/images/why-you-should-hate-anthropic.webp)](/images/why-you-should-hate-anthropic.webp) All the best influencers hate Anthropic right now, and for good reason. They ruined everything, and they're worthy of every bit of hate they get. Quick recap: - T...

Read Full Article →
Between Two Nerds: How NSA will use AI

In this edition of Between Two Nerds Tom Uren and The Grugq talk about how ‘professional’ Five Eyes cyber espionage agencies like NSA will use AI. These agencies place a premium on stealth and won’t yolo AI. This episode is available on Youtube.

Read Full Article →
600+ FortiGate Devices Hacked by AI-Armed Amateur

A Russian-speaking hacker used generative AI to compromise the FortiGate firewalls, targeting credentials and backups for possible follow-on ransomware attacks.

Read Full Article →
Major Japanese semiconductor supplier hit by ransomware attack

Advantest confirms being hit by ransomware, but says investigation is currently ongoing.

Read Full Article →
Top Las Vegas hotel is the latest ShinyHunters ransomware victim - hackers demand $1.5 million to not leak data

ShinyHunters claim to have hit Wynn Resorts, stealing 800,000 recors.

Read Full Article →
Russian hacker uses multiple AI tools to break hundreds of firewalls

A low-skilled threat actor was able to do a lot with the help of AI, Amazon researchers warn.

Read Full Article →
Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls

A low-skilled Russian-speaking attacker has used GenAI tools to help deploy a successful attack workflow targeting FortiGate instances

Read Full Article →
Leading Semiconductor Supplier Advantest Hit by Ransomware Attack

Advantest, a Japanese specialist in testing computer chips for major semiconductor manufacturers, has deployed incident response protocols following a cybersecurity incident

Read Full Article →
University of Mississippi Medical Center Still Offline After Ransomware Attack

University of Mississippi Medical Center is still scrambling to respond to a ransomware attack last Thursday

Read Full Article →
‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA

Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cle...

Read Full Article →
Lessons From AI Hacking: Every Model, Every Layer Is Risky

After two years of finding flaws in AI infrastructure, two Wiz researchers advise security pros to worry less about prompt injection and more about vulnerabilities.

Read Full Article →
Friend or foe? AI: The new cybersecurity threat and solutions

Understanding the risks now emerging at every layer of the AI stack.

Read Full Article →
Latin America's Cyber Maturity Lags Threat Landscape

The slower pace of upgrades has the unintended impact of creating a haven for attackers, especially for initial access brokers and ransomware gangs.

Read Full Article →
Risky Bulletin: RPKI infrastructure sits on shaky ground

RPKI relies on vulnerable servers, the French Ministry of Economy discloses a data breach, the UK gives tech platforms 48 hours to remove revenge porn, and ClickFix-attacks are responsible for 50% of malware infections.

Read Full Article →
Major CarGurus data breach reportedly sees 1.7 million corporate records stolen

CarGurus reportedly hit by ShinyHunters - with devastating effect.

Read Full Article →
Emerging Chiplet Designs Spark Fresh Cybersecurity Challenges

As scaled-down circuits with limited functions redefine computing for AI systems and autonomous vehicles, their flexibility demands new approaches to safeguard critical infrastructure.

Read Full Article →
Supply Chain Attack Secretly Installs OpenClaw for Cline Users

The malicious version of Cline's npm package — 2.3.0 — was downloaded more than 4,000 times before it was removed.

Read Full Article →
Best-in-Class 'Starkiller' Phishing Kit Bypasses MFA

A user-friendly PhaaS tool beats standard methods for detecting phishing attacks by live-proxying legitimate login sites.

Read Full Article →

#Security Vendor Blog

PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers

Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.

Read Full Article →
Threats Making WAVs - Incident Response to a Cryptomining Attack

Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident res...

Read Full Article →
When Uptime Is Non-Negotiable: Rethinking Zero Trust for OT Environments

#Tech

Anthropic launches new marketing blog, pretends it's being 'written' by 'retired' LLM

Pretending the software is sentient makes it sound more powerful As with any piece of obsolete software, you might expect an outdated AI model to just be switched off. Anthropic, however, argues that simply pulling the plug has downsides. After “retirement” interviews, Claude Opus 3 said it wante...

Read Full Article →
Google reveals Nano Banana 2 AI image model, coming to Gemini today

Google's new image model replaces the previous versions immediately.

Read Full Article →
Claude collaboration tools left the door wide open to remote code execution

Anthropic fixed the flaws – but the AI-enabled attack surfaces remain Security vulnerabilities in Claude Code could have allowed attackers to remotely execute code on users' machines and steal API keys by injecting malicious configurations into repositories, and then waiting for a developer to cl...

Read Full Article →
US orders diplomats to push back on data sovereignty

The US government has ordered its diplomats to actively oppose other countries’ attempts to introduce so-called data sovereignty laws that restrict how and where foreign technology companies can store and handle citizens’ data, according to Reuters . In an internal memo from Secretary of State Ma...

Read Full Article →
MWC: When it comes to 6G, Apple is a leader, not a follower

Does anyone remember when Apple was about to collapse because it didn’t offer 5G iPhones? Well, things have changed since then and as we make our way toward the 6G network transition expected in 2030 or so, Apple is ready to take part. How do I know this? Because Apple will have a presence at thi...

Read Full Article →
Do NOT use AI-generated passwords, security experts warn

Choosing a secure password isn’t always easy. That’s why some people are turning to “artificial intelligence” (e.g., chatbots like ChatGPT and Google Gemini) to create secure passwords for them. But security experts at Irregular warn against this approach. After some tests, they’ve discovered tha...

Read Full Article →
I hate that we need scam protection in ChatGPT. But we do

AI doesn’t always give accurate answers—much less specific. Meanwhile, security software sometimes gets outright ignored. You wouldn’t think combining the two would make for a solid match, but Malwarebytes is proving me wrong. Recently, the venerable security software maker launched a ChatGPT int...

Read Full Article →
Recycling biz reckons AI features are destroying smartphone resale values

Galaxy S25 sheds 63% in 12 months as reseller questions LLM emphasis Smartphone makers love touting AI, but the technology may be quietly destroying resale values.…

Read Full Article →
3 future Android features you can give yourself today

Here in the land o’ Android, things are always evolving — and it isn’t only because of big operating system updates. Thanks to the way Google’s for years now been deconstructing Android and pulling OS-level pieces out of the operating system itself — so they exist as regular ol’ apps and can cons...

Read Full Article →
Chrome update fixes 3 more high-risk security vulnerabilities

In the new Chrome versions 145.0.7632.116/117 for Windows and macOS and 145.0.7632.116 for Linux, the developers have fixed 3 newly reported security vulnerabilities. According to Google, none of these vulnerabilities are being exploited for attacks in the wild. In the Chrome Releases blog post ,...

Read Full Article →
New phishing hacks aren’t sloppy—they’re personalized

Scams keep coming at us—and they’re getting harder to spot. How? Scammers have begun making them more tailored to their marks. That is… us. Personalized scams, as security experts call them, use details about you in the hope of tricking you more easily. This information comes from illicit sources...

Read Full Article →
Android malware alert: Fake IPTV apps will steal your bank details

A new Android malware called “Massiv” is on the rise. Security researchers at ThreatFabric uncovered the large-scale campaign, in which hackers disguised and distributed the malware as a harmless IPTV streaming app. Once installed, however, the app was able to read screen inputs to steal password...

Read Full Article →
Your password manager isn’t as safe as you think

Bitwarden, LastPass, and Dashlane are less secure than you might expect, at least if you go by the findings of security researchers at ETH Zurich and the Università della Svizzera italiana (USI) in Lugano. They’ve allegedly discovered serious security vulnerabilities in these popular password man...

Read Full Article →

#Threat Intel & Vulnerability

Odido - 316,912 breached accounts

In February 2026, the Dutch telco Odido was the victim of a data breach and subsequent extortion attempt . Following the incident, 1M records containing 317k unique email addresses was published publicly, with a threat by the attackers to continue leaking more data in the following days. The data...

Read Full Article →
Introducing "AI Unlocked: Decoding Prompt Injection," a New Interactive Challenge
CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security
Extorting the Extorters? Moscow man accused of posing as FSB officer to extort Conti ransomware gang

Daryna Antoniuk reports: A Moscow resident has been accused of trying to extort money from the notorious Conti ransomware group by posing as an officer of Russia’s Federal Security Service (FSB), according to local media reports. Russian outlet RBC, citing sources familiar with the investigation,...

Read Full Article →
The CLAIR Model: A Synthesized Conceptual Framework for Mapping Critical Infrastructure Interdependencies [Guest Diary], (Wed, Feb 25th)
New Dohdoor malware campaign targets education and health care

Cisco Talos discovered an ongoing malicious campaign since at least as early as December 2025 by a threat actor we track as “UAT-10027,” delivering a previously undisclosed backdoor dubbed “Dohdoor.”

Read Full Article →
Active exploitation of Cisco Catalyst SD-WAN by UAT-8616

Cisco Talos is tracking the active exploitation of CVE-2026-20127, a vulnerability in Cisco Catalyst SD-WAN Controller, formerly vSmart, that allows an unauthenticated remote attacker to bypass authentication and obtain administrative privileges.

Read Full Article →
UAE claims it stopped ‘terrorist’ ransomware attack

Jonathan Greig reports: The United Arab Emirates said it stopped a ransomware attack this weekend that allegedly targeted the country’s digital infrastructure. The country’s Cyber Security Council published a statement on Saturday that said they “successfully thwarted organized cyberattacks of a ...

Read Full Article →
Wynn Resorts Confirms Data Breach After Hackers Remove It From Leak Site

Eduard Kovacs reports that the Wynn Resorts listing on the ShinyHunters leak site, previously noted on this site, has been removed, suggesting that the resort paid an extortion demand to get data deleted. “The unauthorized third party has stated that the stolen data has been deleted,” the company...

Read Full Article →
Greater Pittsburgh Orthopaedic Associates disclosed a 2025 breach, but was there also one in 2024?

Greater Pittsburgh Orthopaedic Associates (GPOA) recently began notifying patients of a breach that occurred on or about August 10, 2025. Although their notification letter to patients does not indicate that this was an incident involving encryption, on August 20, 2025, Ransomhouse had added GPOA...

Read Full Article →
Lazarus hackers adopt Medusa ransomware for extortion campaigns, targeting healthcare and nonprofits

Anna Ribeiro reports: A joint investigation by the Symantec and Carbon Black Threat Hunter teams details evidence that operators linked to the Lazarus hacker group are deploying Medusa ransomware in ongoing extortion campaigns targeting the U.S. healthcare sector and a Middle East entity, indicat...

Read Full Article →
Fake Instagram login pages: How phishing hijacks your account

Instagram phishing via fake login pages steals passwords and 2FA codes, leading to account takeovers and identity abuse.

Read Full Article →
Refund scam impersonates Avast to harvest credit card details

A convincing fake Avast site displays a €499.99 charge and promises a refund. Instead, it harvests your name, address, and full credit card details.

Read Full Article →
CarGurus - 12,461,887 breached accounts

In February 2026, the automotive marketplace CarGurus was the target of a data breach attributed to the threat actor ShinyHunters . Following an attempted extortion, the data was published publicly and contained more than 12M email addresses across multiple files including user account ID mapping...

Read Full Article →
Japanese-Language Phishing Emails, (Sat, Feb 21st)

Introduction

Read Full Article →
Facebook ads spread fake Windows 11 downloads that steal passwords and crypto wallets

Attackers are weaponizing Facebook ads to distribute password-stealing malware masked as a Windows download.

Read Full Article →
CarMax - 431,371 breached accounts

In January 2026, data allegedly sourced from US automotive retailer CarMax was published online following a failed extortion attempt . The data included 431k unique email addresses along with names, phone numbers and physical addresses.

Read Full Article →
📋 CVE Reference Bulletin (101 vulnerabilities)

⚠️ Reference material: Click CVE IDs for full details. Severity indicators are approximate classifications.

CVE IDSeverityProductSource
CVE-2026-28296⚪ UnknownRed Hat
CVE-2026-28295⚪ UnknownRed Hat
CVE-2026-28138⚪ UnknownEUVD-2026-8847VulnDB
CVE-2026-28136🔴 CRITICALEUVD-2026-8846VulnDB
CVE-2026-28132⚪ UnknownEUVD-2026-8845VulnDB
CVE-2026-28131⚪ UnknownEUVD-2026-8844VulnDB
CVE-2026-28083⚪ UnknownEUVD-2026-8843VulnDB
CVE-2026-27510⚪ UnknownUnitreeRobotics Unitree
CVE-2026-27509⚪ UnknownUnitreeRobotics Unitree
CVE-2026-27141⚪ Unknownx-net-http2 up
CVE-2026-26938🔴 CRITICALElastic Kibana
CVE-2026-26937🔴 CRITICALElastic Kibana
CVE-2026-26936🔴 CRITICALElastic Kibana
CVE-2026-26935🔴 CRITICALElastic Kibana
CVE-2026-26934🔴 CRITICALElastic Kibana
CVE-2026-26932🔴 CRITICALElastic Packetbeat
CVE-2026-26682⚪ UnknownfastCMS up
CVE-2026-26365⚪ Unknown: Incorrect processingAkamai Blog
CVE-2026-26228⚪ UnknownVideoLAN VLC
CVE-2026-26227⚪ UnknownVideoLAN VLC
CVE-2026-25851⚪ Unknownicsa-26-057-05VulnDB
CVE-2026-25711⚪ Unknownicsa-26-057-05VulnDB
CVE-2026-23939⚪ Unknownhexpm lib/hexpm/store/local.ex
CVE-2026-23750🔵 LOW1b2219a1VulnDB
CVE-2026-23749⚪ UnknownGolioth Firmware
CVE-2026-23748🔵 LOWGolioth Firmware
CVE-2026-23747🔵 LOWGolioth Firmware
CVE-2026-22722⚪ UnknownVMware Workstation
CVE-2026-22715🔴 CRITICALVMware Workstation/Fusion
CVE-2026-22207⚪ Unknown0251c70VulnDB
CVE-2026-22206⚪ UnknownSPIP up
CVE-2026-22205⚪ UnknownSPIP up
CVE-2026-21852⚪ UnknownIntruder Intel
CVE-2026-21513⚪ UnknownAkamai Blog
CVE-2026-20792⚪ Unknownicsa-26-057-05VulnDB
CVE-2026-20791⚪ Unknownicsa-26-057-05VulnDB
CVE-2026-3302⚪ UnknownSourceCodester Doctor
CVE-2026-3301⚪ UnknownTotolink N300RH
CVE-2026-3293⚪ UnknownIssue 2505VulnDB
CVE-2026-3292⚪ UnknownjizhiCMS up
CVE-2026-3289⚪ UnknownSanluan PublicCMS
CVE-2026-3287⚪ Unknownyoulaitech youlai-mall
CVE-2026-3286⚪ Unknownitwanger paicoding
CVE-2026-3285⚪ UnknownIssue 509VulnDB
CVE-2026-3284🔴 CRITICALIssue 4879VulnDB
CVE-2026-3283🔴 CRITICALIssue 4880VulnDB
CVE-2026-3282🔴 CRITICALIssue 4881VulnDB
CVE-2026-3281🔴 CRITICALIssue 4878VulnDB
CVE-2026-3275🔵 LOWTenda F453
CVE-2026-3274🔵 LOWTenda F453
CVE-2026-3273🔵 LOWTenda F453
CVE-2026-3272🔵 LOWTenda F453
CVE-2026-3271🔵 LOWTenda F453
CVE-2026-3270⚪ Unknownpsi-probe PSI
CVE-2026-3269⚪ Unknownpsi-probe PSI
CVE-2026-3268⚪ UnknownEUVD-2026-8926VulnDB
CVE-2026-3265⚪ UnknownEUVD-2026-8925VulnDB
CVE-2026-3264⚪ Unknowngo2ismail Free-CRM
CVE-2026-3263🔴 CRITICALgo2ismail Asp.Net-Core-Inventory-
CVE-2026-3262🔴 CRITICALgo2ismail Asp.Net-Core-Inventory-
CVE-2026-3261⚪ Unknownitsourcecode School
CVE-2026-3071⚪ UnknownEUVD-2026-8855VulnDB
CVE-2026-2680⚪ UnknownEUVD-2026-8852VulnDB
CVE-2026-2679⚪ UnknownEUVD-2026-8851VulnDB
CVE-2026-2678⚪ UnknownEUVD-2026-8850VulnDB
CVE-2026-2677⚪ UnknownEUVD-2026-8849VulnDB
CVE-2026-2428⚪ UnknownFluent Forms
CVE-2026-2383⚪ UnknownSimple Download
CVE-2026-2362⚪ UnknownWP Accessibility
CVE-2026-2244⚪ UnknownEUVD-2026-8853 / WID-SEC-2026-0541VulnDB
CVE-2026-2239⚪ UnknownGIMP PSD
CVE-2026-1731🔴 CRITICALCVE-2026-1731Palo Alto Netwo
CVE-2026-1698⚪ UnknownEUVD-2026-8842VulnDB
CVE-2026-1697⚪ UnknownEUVD-2026-8841VulnDB
CVE-2026-1696⚪ Unknownarcinfo PcVue
CVE-2026-1695⚪ Unknownarcinfo PcVue
CVE-2026-1694⚪ Unknownarcinfo PcVue
CVE-2026-1692⚪ Unknownarcinfo PcVue
CVE-2026-1558⚪ UnknownWP Recipe
CVE-2026-1241⚪ Unknownicsa-26-057-02VulnDB
CVE-2026-1198⚪ UnknownSimple SA
CVE-2025-71210⚪ UnknownIntruder Intel
CVE-2025-71057⚪ UnknownD-Link Wireless
CVE-2025-64999⚪ UnknownCheckmk up
CVE-2025-59536⚪ UnknownIntruder Intel
CVE-2025-56605⚪ UnknownPuneethReddyHC Event
CVE-2025-50857⚪ UnknownZenTaoPMS up
CVE-2025-40538⚪ UnknownIntruder Intel
CVE-2025-14343⚪ UnknownDokuzsoft E-Commerce
CVE-2025-14149⚪ UnknownXpro Addons
CVE-2025-14142⚪ UnknownElectric Enquiries
CVE-2025-14040⚪ UnknownAutomotive Car
CVE-2025-13942⚪ UnknownIntruder Intel
CVE-2025-12981⚪ UnknownListee Plugin
CVE-2025-5959⚪ UnknownIntruder Intel
CVE-2024-10938⚪ UnknownOVRI Payment
CVE-2023-46604⚪ UnknownIntruder Intel
CVE-2023-34044⚪ UnknownIntruder Intel
CVE-2023-31364⚪ UnknownAMD EPYC
CVE-2023-20870⚪ UnknownIntruder Intel
CVE-2023-20869⚪ UnknownIntruder Intel
<p class="text-muted-foreground text-xs mt-3 italic">💡 Tip: Use the <strong>CVE ID</strong> column as a quick reference. For detailed analysis, also check the editorial sections above for deeper coverage of significant vulnerabilities.</p>

Share this post