π¨ Microsoft traced a multi-stage intrusion to exposed SolarWinds Web Help Desk servers.
Attackers used unauthenticated RCE, moved laterally, and abused legit RMM tools for persistence β plus credential dumping and DCSync.
π Tradecraft, CVEs, and lateral movement chain β https://thehackernews.com/2026/02/solarwinds-web-help-desk-exploited-for.html
Attackers used unauthenticated RCE, moved laterally, and abused legit RMM tools for persistence β plus credential dumping and DCSync.
π Tradecraft, CVEs, and lateral movement chain β https://thehackernews.com/2026/02/solarwinds-web-help-desk-exploited-for.html
π₯13
β οΈ Singaporeβs cyber agency says China-linked UNC3886 targeted all four national telecom operators.
Attackers used a firewall zero-day and rootkits to access parts of critical systems. Espionage activity was contained. No service disruption or customer data theft found.
π Read β https://thehackernews.com/2026/02/china-linked-unc3886-targets-singapore.html
Attackers used a firewall zero-day and rootkits to access parts of critical systems. Espionage activity was contained. No service disruption or customer data theft found.
π Read β https://thehackernews.com/2026/02/china-linked-unc3886-targets-singapore.html
π₯13π5π4
π¨π‘οΈ Fortinet Fixes Critical FortiClientEMS RCE (CVE-2026-21643, CVSS 9.1).
SQL injection flaw enables unauthenticated remote command execution via crafted requests. Affects EMS 7.4.4 (patch available).
Separate FortiCloud SSO bug is actively exploited for admin persistence and firewall config theft.
π See affected versions and patch guidance β https://thehackernews.com/2026/02/fortinet-patches-critical-sqli-flaw.html
SQL injection flaw enables unauthenticated remote command execution via crafted requests. Affects EMS 7.4.4 (patch available).
Separate FortiCloud SSO bug is actively exploited for admin persistence and firewall config theft.
π See affected versions and patch guidance β https://thehackernews.com/2026/02/fortinet-patches-critical-sqli-flaw.html
π12β‘3π€―3π2
π¨ Ivanti EPMM Zero-Day Exploits Breach Dutch Regulators, Linked to Wider πͺπΊ EU Government Intrusions.
Attackers exploited CVSS 9.8 unauthenticated RCE flaws to access employee work contact data.
Related activity also impacted the European Commission and Finlandβs Valtori systems.
π Details β https://thehackernews.com/2026/02/dutch-authorities-confirm-ivanti-zero.html
Attackers exploited CVSS 9.8 unauthenticated RCE flaws to access employee work contact data.
Related activity also impacted the European Commission and Finlandβs Valtori systems.
π Details β https://thehackernews.com/2026/02/dutch-authorities-confirm-ivanti-zero.html
π±7β‘6
Three practical questions security teams should answer before selecting an SSE platform:
βοΈ Deployment complexity
ποΈ In-session visibility
π‘οΈ Real session risk coverage
π Framework, tradeoffs, rollout risks β https://thehackernews.com/expert-insights/2026/02/3-questions-to-ask-before-your-next-sse.html
βοΈ Deployment complexity
ποΈ In-session visibility
π‘οΈ Real session risk coverage
π Framework, tradeoffs, rollout risks β https://thehackernews.com/expert-insights/2026/02/3-questions-to-ask-before-your-next-sse.html
π6
β οΈπ οΈ Warlock ransomware breached SmarterTools via unpatched SmarterMail VM.
Attackers entered Jan 29, moved laterally, seized Active Directory, and staged Velociraptor pre-encryption. ~12 servers and a QC data center were hit; core apps and customer data stayed unaffected.
π See exploited CVEs β https://thehackernews.com/2026/02/warlock-ransomware-breaches.html
Attackers entered Jan 29, moved laterally, seized Active Directory, and staged Velociraptor pre-encryption. ~12 servers and a QC data center were hit; core apps and customer data stayed unaffected.
π See exploited CVEs β https://thehackernews.com/2026/02/warlock-ransomware-breaches.html
π6π3
Earn and learn at Infosec Compliance Now 2026!
Registration for the 6th annual Infosec Compliance Now virtual event is live! Attend and earn up to 4 free CPE credits while learning about AI-powered GRC, cyber resilience, continuous control monitoring using automation, and more.
Register Now β https://thn.news/infosec-risk-summit
Registration for the 6th annual Infosec Compliance Now virtual event is live! Attend and earn up to 4 free CPE credits while learning about AI-powered GRC, cyber resilience, continuous control monitoring using automation, and more.
Register Now β https://thn.news/infosec-risk-summit
π8
π΅οΈββοΈβ οΈ Ransomware Persists β But Encryption Is No Longer the Main Signal of Attack!
Picus reviewed 1.1M malware samples and found a shift toward stealth access over disruption. Encryption attacks fell 38% YoY as extortion moves to data theft and credential abuse.
π Explore the full stealth-attack dataset β https://thehackernews.com/2026/02/from-ransomware-to-residency-inside.html
Picus reviewed 1.1M malware samples and found a shift toward stealth access over disruption. Encryption attacks fell 38% YoY as extortion moves to data theft and credential abuse.
π Explore the full stealth-attack dataset β https://thehackernews.com/2026/02/from-ransomware-to-residency-inside.html
π₯10π4
β οΈπ οΈ Reynolds ransomware embeds its own BYOVD evasion, bundling a vulnerable driver to disable EDR before encryption.
It drops the NSecKrnl driver (CVE-2025-68947) to kill security tools, reducing detection and affiliate effort.
π Read full attack chain and defense insights β https://thehackernews.com/2026/02/reynolds-ransomware-embeds-byovd-driver.html
It drops the NSecKrnl driver (CVE-2025-68947) to kill security tools, reducing detection and affiliate effort.
π Read full attack chain and defense insights β https://thehackernews.com/2026/02/reynolds-ransomware-embeds-byovd-driver.html
π13
π§βπ»π» North Korean operatives are using real LinkedIn accounts to land remote IT jobs in Western firms.
With impersonated profiles and verified emails, DPRK actors secure roles to fund weapons programs and conduct espionageβsome gain admin access, steal data, and maintain persistence.
π Read the full investigation β https://thehackernews.com/2026/02/dprk-operatives-impersonate.html
With impersonated profiles and verified emails, DPRK actors secure roles to fund weapons programs and conduct espionageβsome gain admin access, steal data, and maintain persistence.
π Read the full investigation β https://thehackernews.com/2026/02/dprk-operatives-impersonate.html
π20π9π±9π₯6π€2
π΅οΈββοΈπ° North Korea-linked UNC1069 used deepfake Zoom calls to hack crypto firms.
Posing via Telegram, attackers lured victims into fake meetings, triggering ClickFix commands that deployed multi-stage malware on macOS & Windows to steal wallets and credentials.
π Read β https://thehackernews.com/2026/02/north-korea-linked-unc1069-uses-ai.html
Posing via Telegram, attackers lured victims into fake meetings, triggering ClickFix commands that deployed multi-stage malware on macOS & Windows to steal wallets and credentials.
π Read β https://thehackernews.com/2026/02/north-korea-linked-unc1069-uses-ai.html
π₯18π±4
This media is not supported in your browser
VIEW IN TELEGRAM
Security startup @zast_ai secured new backing to scale AI-driven vulnerability validation.
Its research led to 119 CVE assignments after uncovering hundreds of zero-days. Affected targets included Azure SDK, Apache Struts, and Alibaba Nacos.
π Funding, research scope, enterprise impact β https://thehackernews.com/2026/02/zastai-raises-6m-pre-to-scale-zero.html
Its research led to 119 CVE assignments after uncovering hundreds of zero-days. Affected targets included Azure SDK, Apache Struts, and Alibaba Nacos.
π Funding, research scope, enterprise impact β https://thehackernews.com/2026/02/zastai-raises-6m-pre-to-scale-zero.html
π8
π§ Researchers uncovered SSHStalker, a Linux botnet using IRC for control and mass SSH compromise.
It exploits 16 legacy kernel flaws to infect unpatched systems, wipes logs, and maintains silent persistence.
π Details β https://thehackernews.com/2026/02/sshstalker-botnet-uses-irc-c2-to.html
It exploits 16 legacy kernel flaws to infect unpatched systems, wipes logs, and maintains silent persistence.
π Details β https://thehackernews.com/2026/02/sshstalker-botnet-uses-irc-c2-to.html
π13π₯3π€―1
π¨ Microsoft Patches 59 Flaws β 6 Actively Exploited in the Wild!
Fixes hit Windows Shell, MSHTML, Office, and Remote Desktop, with privilege escalation leading the risk landscape.
π Read Full CVEs, exploitation details & patch scope β https://thehackernews.com/2026/02/microsoft-patches-59-vulnerabilities.html
Fixes hit Windows Shell, MSHTML, Office, and Remote Desktop, with privilege escalation leading the risk landscape.
π Read Full CVEs, exploitation details & patch scope β https://thehackernews.com/2026/02/microsoft-patches-59-vulnerabilities.html
π14π1
On February 25 at 9:00 AM PT, Semgrep is hosting its first-ever virtual keynote - Semgrep Secure 2026: Code Security Rebuilt for the AI Era
AI is now writing more code than humans, and most of it is never reviewed line by line. That reality breaks the assumptions behind traditional AppSec tools, which were built for a world where every line of code was human-authored and inspected.
This isnβt βAI added to security.β Itβs security rebuilt for how code is actually created today.
Register now and join us live: https://thn.news/semgrep-secure-2026
AI is now writing more code than humans, and most of it is never reviewed line by line. That reality breaks the assumptions behind traditional AppSec tools, which were built for a world where every line of code was human-authored and inspected.
This isnβt βAI added to security.β Itβs security rebuilt for how code is actually created today.
Register now and join us live: https://thn.news/semgrep-secure-2026
π3π2
π οΈ Patch Tuesday extended across enterprise tech stacks, with "60+ vendors" releasing coordinated security fixes.
Widely used platforms β from SAP and Windows to Chrome, Linux, Cisco, and Fortinet β patched zero-days, SQL injection, privilege escalation, and auth bypass vulnerabilities.
π Full vendor list and CVEs β https://thehackernews.com/2026/02/over-60-software-vendors-issue-security.html
Widely used platforms β from SAP and Windows to Chrome, Linux, Cisco, and Fortinet β patched zero-days, SQL injection, privilege escalation, and auth bypass vulnerabilities.
π Full vendor list and CVEs β https://thehackernews.com/2026/02/over-60-software-vendors-issue-security.html
π11π₯7
Five attacks. Five lessons. One goal: resilience.
From Boeing to Ascension, cybersecurity experts from Halcyon examined #ransomware incidents that reshaped cyber strategy - and the takeaways defenders can apply today.
Curious which decisions changed the outcome? Swipe β to see the high-level hits.
Donβt wait for an incident to learn from one.
Download the full guide: https://thn.news/attacks-changed-everything
From Boeing to Ascension, cybersecurity experts from Halcyon examined #ransomware incidents that reshaped cyber strategy - and the takeaways defenders can apply today.
Curious which decisions changed the outcome? Swipe β to see the high-level hits.
Donβt wait for an incident to learn from one.
Download the full guide: https://thn.news/attacks-changed-everything
π8
β οΈ Indian defense and government networks are under coordinated espionage campaigns using cross-platform RAT malware.
Linked to SideCopy and APT36, the attacks use phishing lures, decoy files, and stealth persistence across Windows and Linux for long-term access.
π Inside the malware toolkit and intrusion chain β https://thehackernews.com/2026/02/apt36-and-sidecopy-launch-cross.html
Linked to SideCopy and APT36, the attacks use phishing lures, decoy files, and stealth persistence across Windows and Linux for long-term access.
π Inside the malware toolkit and intrusion chain β https://thehackernews.com/2026/02/apt36-and-sidecopy-launch-cross.html
π±8π7π5π₯4
π€π Identity security is shifting from static controls to AI-run decisions.
As outlined by SailPoint CISO Rex Booth, AI-driven identity governance will automate access in real time, replacing manual reviews and standing privileges. Passkeys and decentralized IDs will further reshape authentication.
π 9 forecasts shaping access, trust, and risk β https://thehackernews.com/expert-insights/2026/02/9-identity-security-predictions-for-2026.html
As outlined by SailPoint CISO Rex Booth, AI-driven identity governance will automate access in real time, replacing manual reviews and standing privileges. Passkeys and decentralized IDs will further reshape authentication.
π 9 forecasts shaping access, trust, and risk β https://thehackernews.com/expert-insights/2026/02/9-identity-security-predictions-for-2026.html
π9π₯4π3π€―3
π¨ Apple shipped emergency updates after confirming exploitation of a zero-day in dyld.
The bug (CVE-2026-20700) could allow attackers to execute arbitrary code on vulnerable Apple devices.
π Read: https://thehackernews.com/2026/02/apple-fixes-exploited-zero-day.html
Fixes extend across iOS, macOS, visionOS, and legacy platforms.
The bug (CVE-2026-20700) could allow attackers to execute arbitrary code on vulnerable Apple devices.
π Read: https://thehackernews.com/2026/02/apple-fixes-exploited-zero-day.html
Fixes extend across iOS, macOS, visionOS, and legacy platforms.
β‘9π2π€2
π€ One bulletproof-hosted IP drove 346 of 417 Ivanti EPMM exploit attempts.
Activity targeted CVSS 9.8 RCE flaws, rotating 300+ user agents while scanning other enterprise platforms in parallel. Signals automated initial-access reconnaissance.
π Read β https://thehackernews.com/2026/02/83-of-ivanti-epmm-exploits-linked-to.html
Activity targeted CVSS 9.8 RCE flaws, rotating 300+ user agents while scanning other enterprise platforms in parallel. Signals automated initial-access reconnaissance.
π Read β https://thehackernews.com/2026/02/83-of-ivanti-epmm-exploits-linked-to.html
π6