themissingsunday
#tech-news

Weekly Scan: Cloud, Cybersecurity, AI News — Mar 01, 2026

Weekly Scan: Cloud, Cybersecurity, AI News — Mar 01, 2026

⚠️ Audio playback is not supported in your browser. Please try Chrome, Edge, or Safari for the best experience.

#This Week in Security: Your News Briefing

Welcome to your weekly security roundup. We’ve tracked down the 10 most important stories this week—the ones everyone’s talking about, from critical threats to emerging trends that could shape your security posture. Leading the news this week is CVE-2025-10891, which has sparked conversation across 10 sources. Meanwhile, the industry is closely tracking CVE-2026-28561 | gVectors wpForo Forum up to 2.4.15 cross site… with 5 mentions, along with emerging details on Aeternum botnet hides commands in Polygon smart contracts, CVE-2026-3413 | itsourcecode University Management System 1.0…, and Promoting AI Security — Acting Assistant Privacy Commissioner…. Here’s the full breakdown of what you need to know.

#🚨 Critical Threats This Week

First, the stories that demand your immediate attention:

1. CVE-2025-10891 Mentioned across 10 industry sources this week. Currently trending CVE - Hype Score: 19 - Integer overflow in V8 in Google Chrome prior to 140. Get the details →

2. CVE-2026-28561 | gVectors wpForo Forum up to 2.4.15 cross site scripting (EUVD-2026-9110) Mentioned across 5 industry sources this week. A vulnerability marked as problematic has been reported in gVectors wpForo Forum up to 2. Get the details →

3. CVE-2026-3413 | itsourcecode University Management System 1.0 admin_single_student.php ID sql injection Mentioned across 3 industry sources this week. A vulnerability, which was classified as critical , has been found in itsourcecode University Management System 1. Get the details →

#🛠️ Tools, Updates & Releases

New capabilities and releases worth knowing about:

1. Aeternum botnet hides commands in Polygon smart contracts Aeternum botnet uses Polygon blockchain smart contracts for C&C, making its infrastructure harder to. Referenced in 4 stories this week. Explore →

2. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium . Referenced in 2 stories this week. Explore →

3. Trump administration bans Anthropic, seemingly embraces OpenAI The Trump administration on Friday moved to ban the use of products from artificial intelligence com. Referenced in 2 stories this week. Explore →

#What You Should Do Next

Monitor these in your environment next week:

  • Any new CVE announcements related to systems you operate
  • Emerging attack techniques being discussed in the community
  • Updates and patches for tools your team uses

Have a look at the full deep-dives in the trending stories below. Each one provides context that could inform your security decisions this week.


1. Key Threat Intel & Vulnerability Stories (18 mentions)
2. Aeternum botnet hides commands in Polygon smart contracts (4 mentions)

Aeternum botnet uses Polygon blockchain smart contracts for C&C, making its infrastructure harder to detect and disrupt. Qrator Labs researchers uncovered Aeternum, a botnet that runs its command-and-control infrastructure through smart contracts ...

Read Full Article →
3. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium (2 mentions)
4. Lazarus Group Picks a New Poison: Medusa Ransomware (3 mentions)

The North Korean threat group also leveraged Comebacker backdoor, Blindingcan RAT, and info stealer Infohook in its recent attacks.

Read Full Article →
5. Trump administration bans Anthropic, seemingly embraces OpenAI (2 mentions)

The Trump administration on Friday moved to ban the use of products from artificial intelligence company Anthropic by federal businesses, escalating a high-stakes clash over whether private AI makers can limit how the US military uses their system...

Read Full Article →
6. ManoMano data breach: massive DIY chain incident impacts 38 million customers - here's what we know (2 mentions)

French ecommerce site suffers third-party breach, losing data on millions of customers.

Read Full Article →
7. Notorious ransomware gang allegedly blackmailed by fake FSB officer (2 mentions)

There is a certain poetic justice in a cybersecurity-related story that has emerged from Moscow this week: A man has been accused of trying to extort money... from a notorious Russian ransomware gang. Read more in my article on the Hot for Securit...

Read Full Article →
8. Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access (2 mentions)

A newly disclosed maximum-severity security flaw in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage) has come under active exploitation in the wild as part of malicious activity that dates back to 2...

Read Full Article →

#Article Summary

Category Article Count
AI & LLM 6
Cloud 4
Cyber Regulatory 0
Cybersecurity 123
Security Vendor Blog 3
Tech 15
Threat Intel & Vulnerability 11
Total Articles Scanned 162

#AI & LLM

Scaling Search Relevance: Augmenting App Store Ranking with LLM-Generated Judgments

Large-scale commercial search systems optimize for relevance to drive successful sessions that help users find what they are looking for. To maximize relevance, we leverage two complementary objectives: behavioral relevance (results users tend to click or download) and textual relevance (a result...

Read Full Article →
Closing the Gap Between Text and Speech Understanding in LLMs

Large Language Models (LLMs) can be adapted to extend their text capabilities to speech inputs. However, these speech-adapted LLMs consistently underperform their text-based counterparts—and even cascaded pipelines—on language understanding tasks. We term this shortfall the text-speech understand...

Read Full Article →
From Radiology to Drug Discovery, Survey Reveals AI Is Delivering Clear Return on Investment in Healthcare

AI is accelerating every aspect of healthcare — from radiology and drug discovery to medical device manufacturing and new treatment methods enabled by digital twins of the human body. NVIDIA’s second annual “State of AI in Healthcare and Life Sciences” survey report reveals how the industry is mo...

Read Full Article →
Beyond a Single Extractor: Re-thinking HTML-to-Text Extraction for LLM Pretraining

One of the first pre-processing steps for constructing web-scale LLM pretraining datasets involves extracting text from HTML. Despite the immense diversity of web content, existing open-source datasets predominantly apply a single fixed extractor to all webpages. In this work, we investigate whet...

Read Full Article →
AMUSE: Audio-Visual Benchmark and Alignment Framework for Agentic Multi-Speaker Understanding

Recent multimodal large language models (MLLMs) such as GPT-4o and Qwen3-Omni show strong perception but struggle in multi-speaker, dialogue-centric settings that demand agentic reasoning tracking who speaks, maintaining roles, and grounding events across time. These scenarios are central to mult...

Read Full Article →
Import AI 446: Nuclear LLMs; China’s big AI benchmark; measurement and AI policy

Welcome to Import AI, a newsletter about AI research. Import AI runs on arXiv and feedback from readers. If you’d like to support this, please subscribe. Subscribe now Want to make AI go better? Figure out how to measure it:…One simple policy intervention that works well…Jacob Steinhardt, an AI r...

Read Full Article →

#Cloud

Amazon Bedrock announces OpenAI-compatible Projects API

Amazon Bedrock now supports OpenAI-compatible Projects API in the Mantle inference engine in Amazon Bedrock. Amazon Bedrock is a fully managed service that offers a broad selection of best-in-class foundation models from leading AI companies like Anthropic, Meta, and OpenAI, along with a broad se...

Read Full Article →
AWS WAF announces AI activity dashboard for visibility into AI bot and agent traffic

Today, AWS WAF announced a new AI activity dashboard that provides centralized visibility into AI bot and agent traffic reaching your applications. With this launch, AWS WAF Bot Control expands its detection coverage to track more than 650 unique bots and agents, offering one of the most comprehe...

Read Full Article →
The Rise of the AI Security Engineer: A New Discipline for an AI-Native World

As autonomous AI systems transform business, a new profession is emerging to protect them: the AI Security Engineer. Discover why this specialized discipline is becoming a survival imperative for organizations in an AI-native world.

Read Full Article →
Amazon announces generative AI-based artifacts in Amazon Q Developer for visualizing resource and cost data

Today, AWS announces the general availability of Amazon Q Developer artifacts in the AWS Management Console. Amazon Q artifacts is a generative AI-based user experience that enables customers to visualize resource data in tables and cost data in charts. The launch also moves the Q icon to the nav...

Read Full Article →

#Cyber Regulatory

#Cybersecurity

Hacker erpressen weniger Lösegeld

immer mehr betroffene Unternehmen und Organisationen folgen dem Rat, kein Lösegeld zu zahlen . fadfebrian – shutterstock.com Laut einem neuen Bericht des Analyseunternehmens Chainalysis konnten Hacker im Jahr 2025 im Zusammenhang mit Ransomware-Angriffen insgesamt 820 Millionen Dollar erbeuten. A...

Read Full Article →
When cyber threats start thinking for themselves

In this Help Net Security video, Jason Rivera, Field CISO & Head of Solution Engineering at SimSpace, discusses how autonomous AI agents are changing cyber threats. Drawing on experience in the US Army, NSA, Deloitte, and CrowdStrike, he describes how security teams have traditionally measured ri...

Read Full Article →
AI risk moves into the security budget spotlight

Enterprises are pushing AI deeper into workflows that touch sensitive data across cloud platforms and SaaS apps. The 2026 Thales Data Threat Report, based on a survey of 3,120 respondents in 20 countries, places that shift alongside growing pressure on data protection, identity controls, and clou...

Read Full Article →
Vulnerability Finding: An Inflection Point

LLM-driven vuln finding has reached an inflection

Read Full Article →
Security Advisory SA-26-01 GPS Attacks

GPS attacks trigger revisiting threat models

Read Full Article →
LLMs as Compilers

What if we think about LLM coding as if it’s a compiler stage?

Read Full Article →
The Cyber Resilience Act (CRA)!

The CRA is coming and it's going to be a dramatic change for technology producers

Read Full Article →
Threat modeling as a dial, not a switch

Thinking of threat modeling with a knob helps you get more out of it.

Read Full Article →
A few thoughts on CVE

Thoughts on the CVE funding crisis

Read Full Article →
Introducing the DEF CON 32 Hackers' Almanack

Grateful to introduce the Hackers' Almanack!

Read Full Article →
Security Researcher Comments on HIPAA Security Rule

A group of us have urged HHS to require better handling of security reports

Read Full Article →
Inside Man

Some thoughts on the Voyager Episode ‘Inside Man’

Read Full Article →
Appsec Roundup - July 2024

The most important stories around threat modeling, appsec and secure by design for June, 2024.

Read Full Article →
Lockbit, a study in public health

Why is it hard to count lockbit infections?

Read Full Article →
Eternal sunshine of the spotless LLM

Making an LLM forget is harder than it seems

Read Full Article →
CSRB Report on Microsoft

The CSRB has released its report into an intrusion at Microsoft, and...it’s a doozy.

Read Full Article →
Introducing Magic Security Dust!
The NVD Crisis

The NVD is in crisis, and so is patch management. It’s time to modernize.

Read Full Article →
Solving Hallucinations

Solving hallucinations in legal briefs is playing on easy mode —— and still too hard

Read Full Article →
Microsoft Can Fix Ransomware Tomorrow

My latest at Dark Reading draws attention to how Microsoft can fix ransomware tomorrow.

Read Full Article →
Phishing Defenses

Phishing behaviors, as observed in the wild.

Read Full Article →
Darkreading: Threat Modeling in the Age of OpenAI's Chatbot

Pointer to Adam’s latest Darkreading article

Read Full Article →
GPT-3

Text captured from GPT-3

Read Full Article →
What are we going to do: CO2 edition

What happened when Microsoft tried to buy climate abatements

Read Full Article →
Ransomware is Not the Problem

Arbitrarily powerful software -- applications, operating systems -- is a problem, as is preventing it from running on enterprise systems.

Read Full Article →
Colonial Pipeline, Darkside and Models

The Colonial Pipeline shutdown story is interesting in all sorts of ways, and I can't delve into all of it.I did want to talk about one small aspect, which is the way responders talk about Darkside.

Read Full Article →
The Updates Must Go Through

The timing of updates is not coincidental.

Read Full Article →
Ever Given & Suez

Thoughts on the issues with the Ever Given blocking the Suez Canal.

Read Full Article →
Threat Modeling and Social Issues

For Data Breach Today, I spoke with Anna Delaney about threat modeling for issues that are in the news right now.

Read Full Article →
Vaccines

You may have noticed that my end of the year posts are all science focused. Today, a set of resources on the COVID vaccines.

Read Full Article →
Interesting reads

Sharing for you, bookmarking for me.

Read Full Article →
Episode 9 Spoilers

Today is the last Star Wars Day before Episode 9 comes out, and brings the Skywalker saga to its end.

Read Full Article →
Leave Those Numbers for April 1st

Over-inflated numbers won't scare me into buying your ‘solution’.

Read Full Article →
High ROI Security Advisory Boards

Discussing the value of Security Advisory Boards

Read Full Article →
CVE Funding and Process

[no description provided]

Read Full Article →
Carpenter!

[no description provided]

Read Full Article →
The DREAD Pirates

[no description provided]

Read Full Article →
Pen Testing The Empire

[no description provided]

Read Full Article →
Threat Modeling Tooling from 2017

[no description provided]

Read Full Article →
20 Year Software: Engineering and Updates

[no description provided]

Read Full Article →
Hospital Ransomware

[no description provided]

Read Full Article →
Warrants for Cleaning Malware in Kelihos

[no description provided]

Read Full Article →
Threat Modeling & IoT

[no description provided]

Read Full Article →
People are The Weakest Link In Security?

[no description provided]

Read Full Article →
Modeling Attackers and Their Motives

There are a number of reports out recently, breathlessly presenting their analysis of one threatening group of baddies or another. Most readers should, at most, skim their analysis of the perpetrators. Read on for why.

Read Full Article →
Risky Bulletin: LLMs can deanonymize internet users based on their comments

LLMs can deanonymize internet users based on their comments, CISA gets a new acting director, hackers steal 15 million records from the French Ministry of Health, and Google takes down an ad fraud botnet.

Read Full Article →
How proactive is your AI in detecting cyber threats

How Do Non-Human Identities Enhance AI Threat Detection? Is your organization leveraging Non-Human Identities (NHIs) to elevate its cybersecurity strategy? Managing NHIs becomes a pivotal factor in ensuring robust cloud security and improving AI threat detection capabilities. Understanding and ma...

Read Full Article →
Who is the Kimwolf Botmaster “Dort”?

In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world's largest and most disruptive botnet. Since then, the person in control of Kimwolf -- who goes by the handle "Dort" -- has coordinated a barrage of dist...

Read Full Article →
Canadian Tire Data Breach Impacts 38 Million Accounts

Names, addresses, email addresses, phone numbers, and encrypted passwords were compromised in the attack. The post Canadian Tire Data Breach Impacts 38 Million Accounts appeared first on SecurityWeek .

Read Full Article →
Looking for a holiday bargain? Don't get caught out — experts warn of dark web travel agencies using stolen credit cards to buy hotels, flights, and more

Cybercriminal networks resell real travel bookings bought with stolen credit cards.

Read Full Article →
Iran ’s Internet near-totally blacked out amid US, Israeli strikes

Iran experienced a near-total internet blackout as Israel and the U.S. launched strikes, according to NetBlocks. Internet access across Iran was drastically reduced on Saturday as Israel and the United States carried out strikes against the country, according to independent and non-partisan globa...

Read Full Article →
Microsoft warns of RAT delivered through trojanized gaming utilities

Attackers spread trojanized gaming tools to deliver a stealthy RAT using PowerShell, LOLBins, and Defender evasion tactics. Threat actors are tricking users into running trojanized gaming utilities shared through browsers and chat platforms to deploy a remote access trojan. “Microsoft Defender re...

Read Full Article →
Life Mirrors Art: Ransomware Hits Hospitals on TV & IRL

HBO's "The Pitt" is showing audiences what a real Mississippi healthcare system is going through this week, thanks to a ransomware attack.

Read Full Article →
Europol-led crackdown on The Com hackers leads to 30 arrests

A yearlong Europol-coordinated operation dubbed "Project Compass" has led to 30 arrests and 179 suspects being tied to "The Com," an online cybercrime collective that targets children and teenagers. [...]

Read Full Article →
Watch out - that Google Tasks email could be a scam, and land you in hot water at work

Hackers found a new legitimate tool to abuse, and this time it's Google Tasks.

Read Full Article →
Ransomware payments drop to record low, even as attacks surge

Fewer businesses are paying, but ransomware groups are growing in number.

Read Full Article →
The Case for Why Better Breach Transparency Matters

It's become a standard practice for organizations to disclose the bare minimum about a data breach, or worse — not disclose the incident at all.

Read Full Article →
CISA warns that RESURGE malware can be dormant on Ivanti devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day attacks exploiting CVE-2025-0282 to breach Ivanti Connect Secure devices. [...]

Read Full Article →
38 Million Allegedly Impacted by ManoMano Data Breach

Hackers stole personal information such as names, email addresses, phone numbers, and other information. The post 38 Million Allegedly Impacted by ManoMano Data Breach appeared first on SecurityWeek .

Read Full Article →
ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay commands and breach air-gapped networks....

Read Full Article →
Phishing Attacks Against People Seeking Programming Jobs

This is new. North Korean hackers are posing as company recruiters, enticing job candidates to participate in coding challenges. When they run the code they are supposed to work on, it installs malware on their system. News article .

Read Full Article →
Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience

Aeternum operates on smart contracts, making its command-and-control (C&C) infrastructure difficult to disrupt. The post Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience appeared first on SecurityWeek .

Read Full Article →
Europol goes after The Com’s ransomware and extortion networks

Law enforcement agencies across 28 countries have spent the past year building cases against a loosely organized collective known as The Com, a decentralized network of mostly teenagers and young adults linked to high-profile ransomware attacks, financial extortion, and the coercion of vulnerable...

Read Full Article →
Your personal OpenClaw agent may also be taking orders from malicious websites

If you thought running an AI agent locally kept it safely inside your machine’s walls, you’re in for a surprise. Researchers at Oasis Security have disclosed a flaw chain that allowed a malicious website to quietly connect to a locally running OpenClaw agent and take full control. The issue stems...

Read Full Article →
‘Project Compass’ Cracks Down on ‘The Com’: 30 Members of Notorious Cybercrime Gang Arrested

International law enforcement operation led by Europol targets network of teenagers and young adults involved in ransomware attacks, extortion and other crimes

Read Full Article →
Juniper Networks PTX Routers Affected by Critical Vulnerability

An out-of-band security update for Junos OS Evolved patches the remote code execution vulnerability CVE-2026-21902. The post Juniper Networks PTX Routers Affected by Critical Vulnerability appeared first on SecurityWeek .

Read Full Article →
How to make LLMs a defensive advantage without creating a new attack surface

Large language models (LLMs) have arrived in security in three different forms at once: as productivity tools that sit beside analysts, as components embedded inside products and workflows and as targets that attackers can probe, manipulate and steal. That convergence is why the conversation feel...

Read Full Article →
Hacker kompromittieren immer schneller

Der Einsatz von KI-Tools macht Cyberangriffe nicht nur schneller, sondern erhöht auch die Taktzahl. Color4260 / Shutterstock Crowdstrike hat die aktuelle Ausgabe seines Global Threat Report veröffentlicht – mit mehreren bemerkenswerten Erkenntnissen. So benötigte ein Angreifer im Jahr 2025 im Sch...

Read Full Article →
Risky Bulletin: Russian man extorts Conti ransomware group

A Russian man prosecuted for extorting the Conti ransomware group, Google takes down a Chinese cyber-espionage operation, Anthropic tells Department of War to pound sand over AI restrictions, and a Cisco zero-day was exploited in the wild for three years.

Read Full Article →
Cisco SD-WAN Zero-Day Under Exploitation for 3 Years

The maximum-severity vulnerability CVE-2026-20127 was exploited by an unknown but sophisticated threat actor who left very little evidence behind.

Read Full Article →
Project Compass is Europol’s new playbook for taking on The Com

Officials said 30 perpetrators have been arrested in the past year, and global law enforcement cooperation is closing the gap. The post Project Compass is Europol’s new playbook for taking on The Com appeared first on CyberScoop .

Read Full Article →
New Aeternum C2 Botnet Evades Takedowns via Polygon Blockchain

Qrator Research Lab has identified Aeternum C2, a botnet that uses the Polygon blockchain for commands, making it nearly impossible to shut down.

Read Full Article →
Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts. "Instead of relying on traditional servers or domains for command-and-control, Aeternum stores ...

Read Full Article →
Trend Micro warns of critical Apex One code execution flaws

Trend Micro has patched two critical Apex One vulnerabilities that allow attackers to gain remote code execution (RCE) on vulnerable Windows systems. [...]

Read Full Article →
European DYI chain ManoMano data breach impacts 38 million customers

DIY store chain ManoMano is notifying customers of a data breach personal data, which was caused by hackers compromising a third-party service provider. [...]

Read Full Article →
Fake Avast Website Targets Users With €499 Phishing Refund Scam

Fraudsters clone Avast’s website to target French users with a €499 phishing scam, using urgency tactics, live chat, and card validation to steal payment data.

Read Full Article →
Critical Juniper Networks PTX flaw allows full router takeover

A critical vulnerability in the Junos OS Evolved network operating system running on PTX Series routers from Juniper Networks could allow an unauthenticated attacker to execute code remotely with root privileges. [...]

Read Full Article →
Google takes down telecom hackers using Sheets and SaaS apps to spread mayhem

A decade-old threat actor is up to some new shenanigans, but Google is having none of it.

Read Full Article →
Olympique Marseille confirms 'attempted' cyberattack after data leak

French professional football club Olympique de Marseille has confirmed a cyberattack after a threat actor claimed on Monday that it breached the club's systems earlier this month. [...]

Read Full Article →
Aeternum Botnet Shifts Command Control to Polygon Blockchain

New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts

Read Full Article →
Hackers are harnessing AI to exploit security flaws faster than ever

As AI gets integrated, attacks speed up and grow in severity, so buisnesses should shape up.

Read Full Article →
Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks Intensify

2025 saw 32M phishing emails, with identity threats surpassing vulnerabilities

Read Full Article →
Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign

UNC2814 hit 53 victims in 42 countries with novel backdoor in decade long cyber espionage operation

Read Full Article →
LLMs Generate Predictable Passwords

LLMs are bad at generating passwords: There are strong noticeable patterns among these 50 passwords that can be seen easily: All of the passwords start with a letter, usually uppercase G, almost always followed by the digit 7. Character choices are highly uneven ­ for example, L , 9, m, 2, $ and ...

Read Full Article →
China-linked hackers used Google Sheets to spy on telecoms and governments across 42 countries

Google has disrupted a China-linked espionage group that used Google’s spreadsheet application as a covert spy tool to compromise telecom providers and government agencies across 42 countries, sending commands and receiving stolen data through it, Google’s Threat Intelligence Group (GTIG) said on...

Read Full Article →
9 unverzichtbare Open-Source-Security-Tools

Diese Open-Source-Tools adressieren spezifische Security-Probleme – mit minimalem Footprint. Foto: N Universe | shutterstock.com Cybersicherheitsexperten verlassen sich in diversen Bereichen auf Open-Source-Lösungen – nicht zuletzt weil diese im Regelfall von einer lebendigen und nutzwertigen Com...

Read Full Article →
Srsly Risky Biz: Is Claude too woke for war?

Tom Uren and Amberleigh Jack talk about the argy-bargy between the Pentagon and AI company Anthropic. US Defense Secretary Pete Hegseth is demanding that all safeguards are lifted from Claude, while Anthropic CEO Dario Amodei is insisting on protections against mass surveillance of Americans and ...

Read Full Article →
Smashing Security podcast #456: How to lose friends and DDoS people

When the mysterious operator of an internet archiving-service decided to silence a curious Finnish blogger, they didn’t just send a stroppy email - they allegedly weaponised their own CAPTCHA page to launch a DDoS attack, threatened to invent an entirely new genre of AI porn, and tampered with pa...

Read Full Article →
Governments issue warning over Cisco zero-day attacks dating back to 2023

The global campaign marks the second series of multiple actively exploited zero-day vulnerabilities in Cisco edge technology since last spring. The similarities don’t end there. The post Governments issue warning over Cisco zero-day attacks dating back to 2023 appeared first on CyberScoop .

Read Full Article →
RAMP Forum Seizure Fractures Ransomware Ecosystem

Researchers suggest defenders monitor how these malicious groups re-form and leverage the useful threat intel to guide their next moves.

Read Full Article →
Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

Google on Wednesday disclosed that it worked with industry partners to disrupt the infrastructure of a suspected China-nexus cyber espionage group tracked as UNC2814 that breached at least 53 organizations across 42 countries. "This prolific, elusive actor has a long history of targeting internat...

Read Full Article →
Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic's Claude Code, an artificial intelligence (AI)-powered coding assistant, that could result in remote code execution and theft of API credentials. "The vulnerabilities exploit various configuration mechanisms, ...

Read Full Article →
This new cybercrime platform lets hackers run malicious Google Ads and hide from Google's screening process

1Campaign has been around for three years and comes with a fancy dashboard.

Read Full Article →
SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women to pull off social engineering attacks. The idea is to hire them for voice phishing campaigns targeting IT help desks, Dataminr said in a new threat brief....

Read Full Article →
Vulnerabilities grew like weeds in 2025, but only 1% were weaponized in attacks

Too many defenders and researchers are paying attention to defects and unsubstantiated exploit concepts that aren’t worth their time, VulnCheck’s Caitlin Condon said. The post Vulnerabilities grew like weeds in 2025, but only 1% were weaponized in attacks appeared first on CyberScoop .

Read Full Article →
Across party lines and industry, the verdict is the same: CISA is in trouble

The agency lost a third of its people in a year. Now industry and lawmakers on both sides say it's unprepared for a potential crisis. The post Across party lines and industry, the verdict is the same: CISA is in trouble appeared first on CyberScoop .

Read Full Article →
SolarWinds Serv-U has some critical security flaws, so users should update now or face attack

Four critical flaws were addressed, all of which could lead to remote code execution.

Read Full Article →
Operation Red Card 2.0 Leads to 651 Arrests in Africa

In the latest operation targeting cybercrime groups, African law enforcement agencies cooperated with Interpol and cybersecurity firms to recover more than $4.3 million.

Read Full Article →
SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution. The vulnerabilities, all rated 9.1 on the CVSS scoring system, are listed below - CVE-2025-40538 - A broken access c...

Read Full Article →
CarGurus data breach affects 12.5 million accounts

Automotive marketplace CarGurus was the target of a data breach in which the names, email addresses, phone numbers, and physical addresses of millions of customers were stolen.

Read Full Article →
Multiple mental health apps riddled with high severity security flaws — data of millions put at risk, so be on your guard

Researchers found 1,500 vulnerabilities in 10 popular apps, including dozens of high-severity flaws.

Read Full Article →
Marquis sues firewall provider SonicWall, alleges security failings with its firewall backup led to ransomware attack

Fintech giant Marquis is suing its firewall provider SonicWall, claiming that an earlier breach with SonicWall allowed hackers to deploy ransomware on Marquis' network.

Read Full Article →
Top ad tech firm Optimizely hit by data breach - around 10,000 companies possibly affected

Attack points to another breach by ShinyHunters, but the group has not yet claimed responsibility.

Read Full Article →
Multifaceted Phishing Scheme Deceives Bitpanda Customers

Phishing attack mimicking Bitpanda targets users, harvesting credentials and personal information

Read Full Article →
Russian hackers target European firms with new spear-phishing cyberattacks

APT28 resurfaces once again, targeting Western organizations with spear-phishing lures.

Read Full Article →
North Korean Lazarus Group Expands Ransomware Activity With Medusa

Ransomware Medusa linked to North Korean hackers targets US healthcare amid ongoing attacks

Read Full Article →
UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling a possible expansion of the threat actor's targeting beyond Ukraine and into entities support...

Read Full Article →
Conduent data breach grows, affecting at least 25M people

The number of people affected by a data breach at government contractor giant Conduent is growing, as millions of people continue to receive notices warning them that hackers stole their personal data.

Read Full Article →
NYC transit workers hit by Qilin ransomware - thousands of members possibly affected

Qilin hits the Local 100 of TWA, leaking sensitive member data to the dark web.

Read Full Article →
'Social advertising is being used to defraud at scale across some of the largest platforms.': Nearly one in three Meta ads reportedly point to a scam, phishing or malware

Scam ads create millions of impressions every month, tricking users into downloading malware, and more.

Read Full Article →
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by the Symantec and Carbon Black Threat Hunter Team. Broadcom's threat intelligence division said ...

Read Full Article →
CrowdStrike says attackers are moving through networks in under 30 minutes

The average time from intrusion to network movement in 2025 was 29 minutes, a 65% increase in speed from the year prior. The post CrowdStrike says attackers are moving through networks in under 30 minutes appeared first on CyberScoop .

Read Full Article →
Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

Anthropic on Monday said it identified "industrial-scale campaigns" mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude's capabilities to improve their own models. The distillation attacks generated over 16 million exchanges wit...

Read Full Article →
Why I Hate Anthropic and You Should Too

[![Why I Hate Anthropic and You Should Too](/images/why-you-should-hate-anthropic.webp)](/images/why-you-should-hate-anthropic.webp) All the best influencers hate Anthropic right now, and for good reason. They ruined everything, and they're worthy of every bit of hate they get. Quick recap: - T...

Read Full Article →
Between Two Nerds: How NSA will use AI

In this edition of Between Two Nerds Tom Uren and The Grugq talk about how ‘professional’ Five Eyes cyber espionage agencies like NSA will use AI. These agencies place a premium on stealth and won’t yolo AI. This episode is available on Youtube.

Read Full Article →
APT28 Targeted European Entities Using Webhook-Based Macro Malware

The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe. The activity, per S2 Grupo's LAB52 threat intelligence team, was active between September 2025 and January 2026. It has been codenamed O...

Read Full Article →
600+ FortiGate Devices Hacked by AI-Armed Amateur

A Russian-speaking hacker used generative AI to compromise the FortiGate firewalls, targeting credentials and backups for possible follow-on ransomware attacks.

Read Full Article →
Major Japanese semiconductor supplier hit by ransomware attack

Advantest confirms being hit by ransomware, but says investigation is currently ongoing.

Read Full Article →
Top Las Vegas hotel is the latest ShinyHunters ransomware victim - hackers demand $1.5 million to not leak data

ShinyHunters claim to have hit Wynn Resorts, stealing 800,000 recors.

Read Full Article →
Russian hacker uses multiple AI tools to break hundreds of firewalls

A low-skilled threat actor was able to do a lot with the help of AI, Amazon researchers warn.

Read Full Article →
Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls

A low-skilled Russian-speaking attacker has used GenAI tools to help deploy a successful attack workflow targeting FortiGate instances

Read Full Article →
Leading Semiconductor Supplier Advantest Hit by Ransomware Attack

Advantest, a Japanese specialist in testing computer chips for major semiconductor manufacturers, has deployed incident response protocols following a cybersecurity incident

Read Full Article →
University of Mississippi Medical Center Still Offline After Ransomware Attack

University of Mississippi Medical Center is still scrambling to respond to a ransomware attack last Thursday

Read Full Article →

#Security Vendor Blog

PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers

Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.

Read Full Article →
Threats Making WAVs - Incident Response to a Cryptomining Attack

Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident res...

Read Full Article →
When Uptime Is Non-Negotiable: Rethinking Zero Trust for OT Environments

#Tech

AMD will bring its "Ryzen AI" processors to standard desktop PCs for the first time

First wave of Ryzen AI desktop CPUs targets business PCs rather than DIYers.

Read Full Article →
Trump administration bans Anthropic, seemingly embraces OpenAI

The Trump administration on Friday moved to ban the use of products from artificial intelligence company Anthropic by federal businesses, escalating a high-stakes clash over whether private AI makers can limit how the US military uses their systems. Just hours later, Anthropic rival OpenAI’s CEO,...

Read Full Article →
OpenAI launches stateful AI on AWS, signaling a control plane power shift

Stateless AI, in which a model offers one-off answers without context from previous sessions, can be helpful in the short-term but lacking for more complex, multi-step scenarios. To overcome these limitations, OpenAI is introducing what it is calling, naturally, “stateful AI.” The company has ann...

Read Full Article →
Double whammy: Steaelite RAT bundles data theft, ransomware in one evil tool

Credential and cryptocurrency theft, live surveillance, ransomware - an attacker's Swiss Army knife A new remote access trojan (RAT) being sold on cybercrime networks enables double extortion attacks on Windows machines by bundling ransomware and data theft, along with credential and cryptocurren...

Read Full Article →
Claude 3 snares itself regular writing gig

Claude Opus 3, which has been replaced by Claude Opus 4.6 as Anthropic’s most powerful AI model, has managed to find a new position. The “newly retired” AI model has launched its own Substack blog, Claude’s Corner , which it is aiming to publish it weekly. Claude set out its purpose in writing th...

Read Full Article →
El Hospital Provincial de Castellón convierte la ciberseguridad en seguridad del paciente

La transformación digital del sector sanitario ha abierto una nueva frontera para la atención médica, pero también para los ciberdelincuentes. Hospitales, centros de salud y laboratorios se han convertido en uno de los objetivos prioritarios de los ataques informáticos por una razón evidente: man...

Read Full Article →
Anthropic to US DoD: No compromise on AI ethics

Faced with demands from the US Department of Defense to allow its technology to be used for purposes the company considers unsafe or antidemocratic, Anthropic CEO Dario Amodei ’s stance remains firm: “We cannot in good conscience accede to their request,” he wrote in a statement published on the ...

Read Full Article →
New IT roles emerge to tackle AI evaluation

New IT jobs are emerging to help organizations better evaluate AI outputs as they move from AI pilots to full-scale deployments. Many organizations are now considering assembling or hiring AI evaluation teams, with some experts calling these recently created roles an essential safety net for comp...

Read Full Article →
Anthropic launches new marketing blog, pretends it's being 'written' by 'retired' LLM

Pretending the software is sentient makes it sound more powerful As with any piece of obsolete software, you might expect an outdated AI model to just be switched off. Anthropic, however, argues that simply pulling the plug has downsides. After “retirement” interviews, Claude Opus 3 said it wante...

Read Full Article →
US orders diplomats to push back on data sovereignty

The US government has ordered its diplomats to actively oppose other countries’ attempts to introduce so-called data sovereignty laws that restrict how and where foreign technology companies can store and handle citizens’ data, according to Reuters . In an internal memo from Secretary of State Ma...

Read Full Article →
Do NOT use AI-generated passwords, security experts warn

Choosing a secure password isn’t always easy. That’s why some people are turning to “artificial intelligence” (e.g., chatbots like ChatGPT and Google Gemini) to create secure passwords for them. But security experts at Irregular warn against this approach. After some tests, they’ve discovered tha...

Read Full Article →
I hate that we need scam protection in ChatGPT. But we do

AI doesn’t always give accurate answers—much less specific. Meanwhile, security software sometimes gets outright ignored. You wouldn’t think combining the two would make for a solid match, but Malwarebytes is proving me wrong. Recently, the venerable security software maker launched a ChatGPT int...

Read Full Article →
Chrome update fixes 3 more high-risk security vulnerabilities

In the new Chrome versions 145.0.7632.116/117 for Windows and macOS and 145.0.7632.116 for Linux, the developers have fixed 3 newly reported security vulnerabilities. According to Google, none of these vulnerabilities are being exploited for attacks in the wild. In the Chrome Releases blog post ,...

Read Full Article →
New phishing hacks aren’t sloppy—they’re personalized

Scams keep coming at us—and they’re getting harder to spot. How? Scammers have begun making them more tailored to their marks. That is… us. Personalized scams, as security experts call them, use details about you in the hope of tricking you more easily. This information comes from illicit sources...

Read Full Article →
Android malware alert: Fake IPTV apps will steal your bank details

A new Android malware called “Massiv” is on the rise. Security researchers at ThreatFabric uncovered the large-scale campaign, in which hackers disguised and distributed the malware as a harmless IPTV streaming app. Once installed, however, the app was able to read screen inputs to steal password...

Read Full Article →

#Threat Intel & Vulnerability

Introducing "AI Unlocked: Decoding Prompt Injection," a New Interactive Challenge
CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security
Connecticut Senate Bill Raises the Stakes on Data Breach Response

Hayley Steele and Gregory Szewczyk of Ballard Spahr write: A new bill introduced in Connecticut—Connecticut Senate Bill 117, An Act Concerning Breaches of Security Involving Electronic Personal Information—would create mandatory forensic examination requirements for entities that experience a “ma...

Read Full Article →
Court Refuses to Slice Up CiCi’s Cyber Extortion Coverage

Andrea DeField and S. Alice Weeks of Hunton Andrews Kurth write: In the rarely litigated space of cyber insurance, the Northern District of Texas issued a win for cyber policyholders this week, offering a clear reminder to insurers that if they want to restrict coverage, they must draft the polic...

Read Full Article →
Israel plunges Iran into darkness with largest cyberattack in history during attack against Iran

The Jerusalem Post reports: As fighter jets and cruise missiles struck IRGC command centers, a parallel front reportedly paralyzed the Islamic Republic from within. Reports on Saturday, February 28, 2026, indicated that Iran entered an almost complete digital fog, in what appeared to be a large-s...

Read Full Article →
Fake Fedex Email Delivers Donuts!, (Fri, Feb 27th)

It's Friday, let's have a look at another simple piece of malware to close a busy week! I received a Fedex notification about a delivery. Usually, such emails are simple phishing attacks that redirect you to a fake login page to collect your credentials. Here, it was a bit different:

Read Full Article →
Inside a fake Google security check that becomes a browser RAT

Disguised as a security check, this fake Google alert uses browser permissions to harvest contacts, location data, and more.

Read Full Article →
The CLAIR Model: A Synthesized Conceptual Framework for Mapping Critical Infrastructure Interdependencies [Guest Diary], (Wed, Feb 25th)
New Dohdoor malware campaign targets education and health care

Cisco Talos discovered an ongoing malicious campaign since at least as early as December 2025 by a threat actor we track as “UAT-10027,” delivering a previously undisclosed backdoor dubbed “Dohdoor.”

Read Full Article →
Active exploitation of Cisco Catalyst SD-WAN by UAT-8616

Cisco Talos is tracking the active exploitation of CVE-2026-20127, a vulnerability in Cisco Catalyst SD-WAN Controller, formerly vSmart, that allows an unauthenticated remote attacker to bypass authentication and obtain administrative privileges.

Read Full Article →
Refund scam impersonates Avast to harvest credit card details

A convincing fake Avast site displays a €499.99 charge and promises a refund. Instead, it harvests your name, address, and full credit card details.

Read Full Article →
📋 CVE Reference Bulletin (59 vulnerabilities)

⚠️ Reference material: Click CVE IDs for full details. Severity indicators are approximate classifications.

CVE IDSeverityProductSource
CVE-2026-28562⚪ UnknownEUVD-2026-9111VulnDB
CVE-2026-28561⚪ UnknownEUVD-2026-9110VulnDB
CVE-2026-28560⚪ UnknownEUVD-2026-9109VulnDB
CVE-2026-28559⚪ UnknownEUVD-2026-9108VulnDB
CVE-2026-28558⚪ UnknownEUVD-2026-9107VulnDB
CVE-2026-28557⚪ UnknownEUVD-2026-9106VulnDB
CVE-2026-28556⚪ UnknownEUVD-2026-9105VulnDB
CVE-2026-28555⚪ UnknownEUVD-2026-9104VulnDB
CVE-2026-28554⚪ UnknownEUVD-2026-9103VulnDB
CVE-2026-25108⚪ UnknownVulnerabilityThe Hacker News
CVE-2026-20127⚪ UnknownExploited Since 2023The Hacker News
CVE-2026-3422🔴 CRITICALe-Excellence U-Office
CVE-2026-3413⚪ Unknownitsourcecode University
CVE-2026-3412⚪ Unknownitsourcecode University
CVE-2026-3411⚪ Unknownitsourcecode University
CVE-2026-3410⚪ Unknownitsourcecode Society
CVE-2026-3409🔵 LOWeosphoros-ai db-gpt
CVE-2026-3408⚪ UnknownIssue 2848VulnDB
CVE-2026-3407🔵 LOWEUVD-2026-9140VulnDB
CVE-2026-3406⚪ UnknownEUVD-2026-9139VulnDB
CVE-2026-3405⚪ UnknownEUVD-2026-9138VulnDB
CVE-2026-3404⚪ UnknownEUVD-2026-9137VulnDB
CVE-2026-3403⚪ UnknownEUVD-2026-9136VulnDB
CVE-2026-3401⚪ UnknownEUVD-2026-9134VulnDB
CVE-2026-3400🔵 LOWEUVD-2026-9133VulnDB
CVE-2026-3399🔵 LOWEUVD-2026-9132VulnDB
CVE-2026-3398🔵 LOWEUVD-2026-9131VulnDB
CVE-2026-3395🔴 CRITICALEUVD-2026-9130VulnDB
CVE-2026-3394⚪ UnknownIssue 401 / EUVD-2026-9129VulnDB
CVE-2026-3393🔵 LOWIssue 401 / EUVD-2026-9128VulnDB
CVE-2026-3392⚪ UnknownIssue 384 / EUVD-2026-9127VulnDB
CVE-2026-3391⚪ UnknownIssue 383 / EUVD-2026-9126VulnDB
CVE-2026-3390⚪ UnknownIssue 382 / EUVD-2026-9125VulnDB
CVE-2026-3389⚪ UnknownIssue 314 / EUVD-2026-9124VulnDB
CVE-2026-3388⚪ UnknownIssue 312 / EUVD-2026-9123VulnDB
CVE-2026-3387⚪ UnknownIssue 1220 / EUVD-2026-9122VulnDB
CVE-2026-3386⚪ UnknownEUVD-2026-9121VulnDB
CVE-2026-3385⚪ UnknownIssue 1218 / EUVD-2026-9120VulnDB
CVE-2026-3384⚪ UnknownIssue 633 / EUVD-2026-9119VulnDB
CVE-2026-3383⚪ UnknownIssue 634 / EUVD-2026-9118VulnDB
CVE-2026-3382⚪ UnknownIssue 635 / EUVD-2026-9117VulnDB
CVE-2026-3180⚪ UnknownContest Gallery
CVE-2026-3132⚪ UnknownMaster Addons
CVE-2026-3010⚪ UnknownEUVD-2026-9102VulnDB
CVE-2026-3000⚪ UnknownChanging IDExpert
CVE-2026-2999⚪ UnknownChanging IDExpert
CVE-2026-2844⚪ UnknownEUVD-2026-9101VulnDB
CVE-2026-2329⚪ UnknownIntruder Intel
CVE-2026-1731⚪ UnknownIntruder Intel
CVE-2025-68613⚪ UnknownIntruder Intel
CVE-2025-64328⚪ Unknownexploitation impacts 900Security Affair
CVE-2025-40554⚪ UnknownIntruder Intel
CVE-2025-40553⚪ UnknownIntruder Intel
CVE-2025-40552⚪ UnknownIntruder Intel
CVE-2025-15598⚪ UnknownDataease SQLBot
CVE-2025-15597⚪ UnknownGHSA-h4xm-3q3p-5g6rVulnDB
CVE-2025-10891⚪ UnknownIntruder Intel
CVE-2025-7544⚪ UnknownIntruder Intel
CVE-2024-37032⚪ UnknownIntruder Intel
<p class="text-muted-foreground text-xs mt-3 italic">💡 Tip: Use the <strong>CVE ID</strong> column as a quick reference. For detailed analysis, also check the editorial sections above for deeper coverage of significant vulnerabilities.</p>

Share this post