π¦β οΈ Is your container adoption outpacing your security maturity? Youβre not alone.
ActiveStateβs 2026 State of Vulnerability Management & Remediation Report found 82% of DevSecOps leaders experienced a container-related breach last year and 87% expect one in 2026.
Learn how to close the βremediation gapβ and the role AI will play in securing your stack by 2026.
π₯ Download the report β https://thn.news/container-sec-guide
ActiveStateβs 2026 State of Vulnerability Management & Remediation Report found 82% of DevSecOps leaders experienced a container-related breach last year and 87% expect one in 2026.
Learn how to close the βremediation gapβ and the role AI will play in securing your stack by 2026.
π₯ Download the report β https://thn.news/container-sec-guide
π4β‘1
π¨ ThreatsDay Bulletin is live.
This weekβs signals point to a quieter but faster threat landscape:
β’ Codespaces RCE & dev workflow abuse
β’ AI-assisted cloud intrusions
β’ BYOVD driver exploitation
β’ AsyncRAT C2 exposure
β’ Sandbox escape flaws
β’ RMM persistence campaigns
β’ Crypto drainer ecosystems
β’ Botnet & DDoS scaling ops
β’ Supply-chain injection paths
β’ APT & crimeware infra overlap
Attack paths are blending into trusted environments β cloud, identity, drivers, and developer tooling.
All updates in one place β https://thehackernews.com/2026/02/threatsday-bulletin-codespaces-rce.html
This weekβs signals point to a quieter but faster threat landscape:
β’ Codespaces RCE & dev workflow abuse
β’ AI-assisted cloud intrusions
β’ BYOVD driver exploitation
β’ AsyncRAT C2 exposure
β’ Sandbox escape flaws
β’ RMM persistence campaigns
β’ Crypto drainer ecosystems
β’ Botnet & DDoS scaling ops
β’ Supply-chain injection paths
β’ APT & crimeware infra overlap
Attack paths are blending into trusted environments β cloud, identity, drivers, and developer tooling.
All updates in one place β https://thehackernews.com/2026/02/threatsday-bulletin-codespaces-rce.html
π7
AI is foundational for security teams, but operational relief still feels out of reach.
Tines just launched Voice of Security 2026, based on insights from 1,800+ security leaders and practitioners.
The data shows why workloads remain high and what it takes to unlock real AI impact π https://thn.news/security-pro-meta-fb
Tines just launched Voice of Security 2026, based on insights from 1,800+ security leaders and practitioners.
The data shows why workloads remain high and what it takes to unlock real AI impact π https://thn.news/security-pro-meta-fb
π9
πβ οΈ AISURU/Kimwolf launched a record 31.4 Tbps HTTP DDoS attack β mitigated by Cloudflare.
Same botnet drove holiday flood campaigns as Q4 hyper-volumetric attacks surged. Runs on 2M+ infected Android devices via proxy networks.
π Read β https://thehackernews.com/2026/02/aisurukimwolf-botnet-launches-record.html
Same botnet drove holiday flood campaigns as Q4 hyper-volumetric attacks surged. Runs on 2M+ infected Android devices via proxy networks.
π Read β https://thehackernews.com/2026/02/aisurukimwolf-botnet-launches-record.html
π₯13π10β‘1
π₯ Anthropicβs Claude Opus 4.6 AI found 500+ previously unknown high-severity flaws in open-source code.
Impacted: Ghostscript, OpenSC, CGIF. Bugs ranged from buffer overflows to memory corruption β all validated and patched.
π Details β https://thehackernews.com/2026/02/claude-opus-46-finds-500-high-severity.html
Impacted: Ghostscript, OpenSC, CGIF. Bugs ranged from buffer overflows to memory corruption β all validated and patched.
π Details β https://thehackernews.com/2026/02/claude-opus-46-finds-500-high-severity.html
π€―21π13π€7π±6π₯2β‘1
π Malicious updates were published to official dYdX trading packages on npm and PyPI, delivering a wallet stealer and remote access malware.
Published via compromised maintainer accounts, the malware hid inside transaction-signing and wallet code.
πRead β https://thehackernews.com/2026/02/compromised-dydx-npm-and-pypi-packages.html
Published via compromised maintainer accounts, the malware hid inside transaction-signing and wallet code.
πRead β https://thehackernews.com/2026/02/compromised-dydx-npm-and-pypi-packages.html
π6
π‘οΈ Turn intel into action with a 6-stage Threat-Informed Defense pipeline. Map adversary TTPs, simulate attacks, validate controls, and prioritize fixes that reduce real risk.
π Download Guide (Framework steps + tooling) β https://www.linkedin.com/pulse/turn-intel-action-guide-threatinformed-defense-thehackernews-hru3c/
π Download Guide (Framework steps + tooling) β https://www.linkedin.com/pulse/turn-intel-action-guide-threatinformed-defense-thehackernews-hru3c/
π9
State-linked hackers breached 70+ government & critical infrastructure networks across 37 countries, Unit 42 reports.
Targets include law enforcement, finance ministries, and border control. Initial access via phishing loaders, with payloads staged on GitHub.
π Intrusion chain, malware design, targeting scope β https://thehackernews.com/2026/02/asian-state-backed-group-tgr-sta-1030.html
Targets include law enforcement, finance ministries, and border control. Initial access via phishing loaders, with payloads staged on GitHub.
π Intrusion chain, malware design, targeting scope β https://thehackernews.com/2026/02/asian-state-backed-group-tgr-sta-1030.html
π13π€6π3β‘1
π CISA orders federal agencies to remove unsupported edge devices within 12β18 months.
Unpatched firewalls, routers, IoT, and perimeter gear are now flagged as prime entry pointsβactively exploited by state-backed actors for network access.
π Directive scope, deadlines, device list β https://thehackernews.com/2026/02/cisa-orders-removal-of-unsupported-edge.html
Unpatched firewalls, routers, IoT, and perimeter gear are now flagged as prime entry pointsβactively exploited by state-backed actors for network access.
π Directive scope, deadlines, device list β https://thehackernews.com/2026/02/cisa-orders-removal-of-unsupported-edge.html
π10β‘2
Cisco Talos exposed DKnife β a China-linked AitM framework active since 2019 on compromised routers and edge devices.
It monitors traffic, steals credentials, and hijacks app/software updates to deploy ShadowPad and DarkNimbus on PCs and phones.
π Modules and infection chain β https://thehackernews.com/2026/02/china-linked-dknife-aitm-framework.html
It monitors traffic, steals credentials, and hijacks app/software updates to deploy ShadowPad and DarkNimbus on PCs and phones.
π Modules and infection chain β https://thehackernews.com/2026/02/china-linked-dknife-aitm-framework.html
π13π€―9β‘2
German authorities warn of a state-linked phishing campaign abusing Signal account features to hijack chats.
Actors pose as support, steal PINs or trick targets into device linkingβenabling message interception and impersonation across political, military, and media networks.
π Read β https://thehackernews.com/2026/02/german-agencies-warn-of-signal-phishing.html
Actors pose as support, steal PINs or trick targets into device linkingβenabling message interception and impersonation across political, military, and media networks.
π Read β https://thehackernews.com/2026/02/german-agencies-warn-of-signal-phishing.html
π18β‘7π±6
π₯ OpenClaw now scans every ClawHub skill using π‘οΈ VirusTotal threat intel.
Uploads are hashed, analyzed via Code Insight, then auto-approved, flagged, or blocked. Daily rescans π check if clean skills turn malicious later.
β οΈ Hundreds of risky skills had slipped through earlier.
π Read β https://thehackernews.com/2026/02/openclaw-integrates-virustotal-scanning.html
Uploads are hashed, analyzed via Code Insight, then auto-approved, flagged, or blocked. Daily rescans π check if clean skills turn malicious later.
β οΈ Hundreds of risky skills had slipped through earlier.
π Read β https://thehackernews.com/2026/02/openclaw-integrates-virustotal-scanning.html
π±21π19π8β‘4π3π€3π€―3π₯2
β‘ BeyondTrust patched pre-auth RCE (CVE-2026-1731) in Remote Support and PRA.
Attackers could run OS commands via crafted requests.~11K exposed instances found. Patches released.
π Versions affected, fixes β https://thehackernews.com/2026/02/beyondtrust-fixes-critical-pre-auth-rce.html
Attackers could run OS commands via crafted requests.~11K exposed instances found. Patches released.
π Versions affected, fixes β https://thehackernews.com/2026/02/beyondtrust-fixes-critical-pre-auth-rce.html
π8
π Cloud worm malware campaign is systematically taking over cloud infrastructure.
TeamPCP exploits exposed Docker, Kubernetes, Redis, and React2Shell to mass-deploy proxies, scanners, crypto miners & ransomware across compromised clusters.
π Read β https://thehackernews.com/2026/02/teampcp-worm-exploits-cloud.html
TeamPCP exploits exposed Docker, Kubernetes, Redis, and React2Shell to mass-deploy proxies, scanners, crypto miners & ransomware across compromised clusters.
π Read β https://thehackernews.com/2026/02/teampcp-worm-exploits-cloud.html
π7
π οΈ Bloody Wolf tied to a spear-phishing campaign deploying NetSupport RAT across Central Asia and Russia.
~60 victims across government, finance, manufacturing. Malicious PDFs drop loaders that persist via scripts + scheduled tasks.
π Details β https://thehackernews.com/2026/02/bloody-wolf-targets-uzbekistan-russia.html
~60 victims across government, finance, manufacturing. Malicious PDFs drop loaders that persist via scripts + scheduled tasks.
π Details β https://thehackernews.com/2026/02/bloody-wolf-targets-uzbekistan-russia.html
π7π1
π§ͺβ‘ SOC teams arenβt failing on tools β theyβre overloaded by triage. Constant validation loops are fueling burnout and SLA drift.
CISOs are moving to sandbox-first workflows, exposing live behavior early and reducing escalations, MTTR, and senior drag.
π How evidence replaces guesswork β https://thehackernews.com/2026/02/how-top-cisos-solve-burnout-and-speed.html
CISOs are moving to sandbox-first workflows, exposing live behavior early and reducing escalations, MTTR, and senior drag.
π How evidence replaces guesswork β https://thehackernews.com/2026/02/how-top-cisos-solve-burnout-and-speed.html
π7π3
β οΈ AI tools, supply chains, and trusted platforms are now attack paths.
Malicious AI skills, Signal phishing, Docker AI RCE, update hijacks β plus a record 31.4 Tbps DDoS. All in one week.
π Read the full recap here: https://thehackernews.com/2026/02/weekly-recap-ai-skill-malware-31tbps.html
Malicious AI skills, Signal phishing, Docker AI RCE, update hijacks β plus a record 31.4 Tbps DDoS. All in one week.
π Read the full recap here: https://thehackernews.com/2026/02/weekly-recap-ai-skill-malware-31tbps.html
π9π5β‘2π±2
π¨ Microsoft traced a multi-stage intrusion to exposed SolarWinds Web Help Desk servers.
Attackers used unauthenticated RCE, moved laterally, and abused legit RMM tools for persistence β plus credential dumping and DCSync.
π Tradecraft, CVEs, and lateral movement chain β https://thehackernews.com/2026/02/solarwinds-web-help-desk-exploited-for.html
Attackers used unauthenticated RCE, moved laterally, and abused legit RMM tools for persistence β plus credential dumping and DCSync.
π Tradecraft, CVEs, and lateral movement chain β https://thehackernews.com/2026/02/solarwinds-web-help-desk-exploited-for.html
π₯13
β οΈ Singaporeβs cyber agency says China-linked UNC3886 targeted all four national telecom operators.
Attackers used a firewall zero-day and rootkits to access parts of critical systems. Espionage activity was contained. No service disruption or customer data theft found.
π Read β https://thehackernews.com/2026/02/china-linked-unc3886-targets-singapore.html
Attackers used a firewall zero-day and rootkits to access parts of critical systems. Espionage activity was contained. No service disruption or customer data theft found.
π Read β https://thehackernews.com/2026/02/china-linked-unc3886-targets-singapore.html
π₯13π5π4
π¨π‘οΈ Fortinet Fixes Critical FortiClientEMS RCE (CVE-2026-21643, CVSS 9.1).
SQL injection flaw enables unauthenticated remote command execution via crafted requests. Affects EMS 7.4.4 (patch available).
Separate FortiCloud SSO bug is actively exploited for admin persistence and firewall config theft.
π See affected versions and patch guidance β https://thehackernews.com/2026/02/fortinet-patches-critical-sqli-flaw.html
SQL injection flaw enables unauthenticated remote command execution via crafted requests. Affects EMS 7.4.4 (patch available).
Separate FortiCloud SSO bug is actively exploited for admin persistence and firewall config theft.
π See affected versions and patch guidance β https://thehackernews.com/2026/02/fortinet-patches-critical-sqli-flaw.html
π12β‘3π€―3π2
π¨ Ivanti EPMM Zero-Day Exploits Breach Dutch Regulators, Linked to Wider πͺπΊ EU Government Intrusions.
Attackers exploited CVSS 9.8 unauthenticated RCE flaws to access employee work contact data.
Related activity also impacted the European Commission and Finlandβs Valtori systems.
π Details β https://thehackernews.com/2026/02/dutch-authorities-confirm-ivanti-zero.html
Attackers exploited CVSS 9.8 unauthenticated RCE flaws to access employee work contact data.
Related activity also impacted the European Commission and Finlandβs Valtori systems.
π Details β https://thehackernews.com/2026/02/dutch-authorities-confirm-ivanti-zero.html
π±7β‘6