2/26/2026 February 26, 2026March 2, 2026 ~ The Cyber Beat ~ Leave a comment UAT-10027 Targets U.S. Education and Healthcare with Dohdoor BackdoorRansomware Payment Rate Drops to Record Low as Attacks Surge…Scattered Lapsus$ Hunters Auditioning Female Voices to Sharpen Social EngineeringThis AI Agent Is Designed to Not Go RogueMomentum Builds for Offensive Private-Sector Cyber RolesNATO Says iPhones & iPads Are Secure Enough to Handle Classified DataGreece’s Watergate: Four Convicted Over Spyware Scandal That Shook GreeceFormer Air Force Officer Arrested for Conspiring With Hacker to Provide Flight Training to Chinese MilitaryJustice Department Exposed Cooperating Witnesses in Epstein FilesNew York Sues Valve for Promoting Illegal Gambling via Game Loot BoxesOlympique Marseille Confirms ‘Attempted’ Cyberattack After Data LeakEuropean DYI Chain ManoMano Data Breach Impacts 38 Million CustomersShinyHunters Hacking Group Begins Leaking Customer Data in Dutch Telecom Odido HackAeternum Botnet Shifts Command Control to Polygon BlockchainNew AirSnitch Attack Breaks Wi-Fi Encryption in Homes, Offices, and EnterprisesPreviously Harmless Google API Keys Now Expose Gemini AI DataCritical Juniper Networks PTX Flaw Allows Full Router TakeoverTrend Micro Warns of Critical Apex One Code Execution FlawsExploitable Vulnerabilities Present in 87% of OrganizationsMicrosoft Expands Windows Restore to More Enterprise DevicesWyden Blocks Rudd Confirmation to Lead Cyber Command, NSA
2/25/2026 February 25, 2026February 25, 2026 ~ The Cyber Beat ~ Leave a comment Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries…Chinese Cyberspies Breached Dozens of Telecom Firms, Gov’t AgenciesIran-Linked Group Claims Hack of Israel’s Largest Healthcare NetworkCritical Cisco SD-WAN Bug Exploited in Zero-Day Attacks Since 2023U.S. Orders Diplomats to Fight Data Sovereignty InitiativesHow Mexico’s ‘CJNG’ Drug Cartel Embraced AI, Drones, and Social MediaHere’s What a Google Subpoena Response Looks Like, Courtesy of the Epstein FilesADT Just Bought the Company That Invented Wi-Fi Motion SensingCyber Startups Ride AI Wave to Funding HighsIsraeli AI-Cyber Firm Gambit Security Raises $61 MillionNvidia Beats Back Bubble Fears With Record $68 Billion in Sales in Fourth QuarterFormer Defense Contractor Boss Gets 7+ Years for Selling Zero Days…Inside the Story of the U.S. Defense Contractor Who Leaked Hacking Tools to RussiaMoscow Man Accused of Posing as FSB Officer to Extort Conti Ransomware GangPopular Sex Toy Company Tenga Admits Hacker Stole Sensitive Customer InformationMedical Device Maker UFP Technologies Warns of Data Stolen in CyberattackHealth Insurance Tech Provider TriZetto Says More Than 3 Million Impacted by 2024 BreachPhishing Campaign ‘Diesel Vortex’ Targets Freight and Logistics Orgs in the U.S., EuropeNew York City Transit Union Purportedly Targeted by QilinMalicious NuGet Package Targets Stripe DevelopersFake ‘Interview’ Repos Lure Next.js Devs Into Running Secret-Stealing MalwareCISA Confirms Active Exploitation of FileZen CVE-2026-25108 VulnerabilityClaude Code Flaws Allow Remote Code Execution and API Key ExfiltrationZyxel Warns of Critical RCE Flaw Affecting Over a Dozen RoutersU.S. Cybersecurity Agency CISA Reportedly in Dire Shape Amid Trump Cuts and LayoffsFTC Says It Won’t Enforce COPPA Against Proper Use of Age Verification ToolsDiscord Puts Global Age Verification Policy on Hold After BacklashChinese Prosecutors Raise Alarm About Growth of Domestic IP Theft
2/24/2026 February 24, 2026February 24, 2026 ~ The Cyber Beat ~ Leave a comment North Korean Lazarus Group Expands Ransomware Activity With MedusaPhishing Operation With Links to Russia, Armenia Compromised Western Cargo Companies, Researchers FindChinese AI Firms Hit Claude with Distillation Attacks, Anthropic WarnsAI Has Gotten Good at Finding Bugs, Not So Good at Swatting ThemAI Is Transformative, but Won’t Replace Established Software Anytime SoonCost of Insider Incidents Surges 20% to Nearly $20mUK Fines Reddit $19 Million for Using Children’s Data UnlawfullyMarquis Sues Firewall Provider SonicWall, Alleges Security Failings With Its Firewall Backup Led to Ransomware AttackBinance Fired Staff Who Flagged $1 Billion Moving to Sanctioned Iran EntitiesU.S. ‘Committed’ to Fighting Transnational Gangs Behind Southeast Asian Scam Compounds: FBIU.S. Sanctions Russian Exploit Broker for Buying Cyber Tools Stolen From Defense ContractorUkraine Pushes Tighter Telegram Regulation, Citing Russian Recruitment of LocalsCarGurus Data Breach Exposes Information of 12.4 Million AccountsConduent Data Breach Grows, Affecting at Least 25M PeopleWynn Resorts Says Hackers Stole Employee DataShinyHunters Extortion Gang Claims Odido Breach Affecting MillionsUniversity of Mississippi Medical Center Clinics Remain Closed Nearly a Week After Cyber AttackCrypto Platform Step Finance Shutting Down After $40 Million TheftMultifaceted Phishing Scheme Deceives Bitpanda CustomersUAC-0050 Targets European Financial Institution With Spoofed Domain and RMS MalwareUnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors1Campaign Platform Helps Malicious Google Ads Evade DetectionAndroid Mental Health Apps With 14.7m Installs Filled With Security FlawsRoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKENCritical SolarWinds Serv-U Flaws Offer Root Access to Servers
2/23/2026 February 23, 2026February 23, 2026 ~ The Cyber Beat ~ Leave a comment APT28 Targeted European Entities Using Webhook-Based Macro MalwareUkraine Says Cyberattacks on Energy Grid Now Used to Guide Missile StrikesRansomware Gangs Advancing Moscow’s Geopolitical Aims, Romanian Cyber Chief WarnsMuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIPCybersecurity Stocks Drop for a Second Day as New Anthropic Tool Fuels AI Disruption FearsIQM Quantum Computers to List Shares in Us at Initial $1.8 Billion ValuationSuspected Anonymous Members Detained in Spain Over Post-Flood DDoS BlitzAir Côte d’Ivoire Confirms Cyberattack Following Ransomware ClaimsAd Tech Firm Optimizely Confirms Data Breach Affecting Customers After Vishing AttackSupply Chain Shai-Hulud-Like Worm Targets Developers via npm and AI ToolsWormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic BombPayPal Fraud Investigation Reveals Sophisticated Python MalwareCISA: Two Recently Patched RoundCube Webmail Flaws Now Exploited in AttacksGlobal Data Protection Authorities Warn Generative AI Companies Against Replicating Real People
2/20-22/2026 February 22, 2026February 22, 2026 ~ The Cyber Beat ~ Leave a comment UAE Foils Cyber Attacks, State News Agency SaysHackers Breach Contractor Linked to Ukraine’s Central Bank Collectible Coin StoreRussia Stepping up Hybrid Attacks, Preparing for Long Standoff With West, Dutch Intelligence WarnsDramatic Escalation in Frequency and Power of DDoS AttacksPredator Spyware Hooks iOS SpringBoard to Hide Mic, Camera ActivityKrebs: ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFADHS Wants a Single Search Engine to Flag Faces and Fingerprints Across AgenciesNew Cybersecurity Rules for U.S. Defense Industry Create Barrier for Some Small SuppliersUkrainian National Sentenced to 5 Years in North Korea IT Worker Fraud CaseTwo Former Google Engineers and Spouse Indicted Over Trade Secret Transfers to IranShinyHunters Demands $1.5m Not to Leak Vegas Casino Wynn Resorts and Resort Chain DataJapanese Tech Giant Advantest Hit by Ransomware AttackAI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 CountriesPayPal App Code Error Leaked Personal Info and a ‘Few’ Unauthorized TransactionsClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT MalwareCline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer SystemsArkanix Stealer Pops up as Short-Lived AI Info-Stealer ExperimentBeyondTrust Flaw Used for Web Shells, Backdoors, and Data ExfiltrationCISA Adds Two Actively Exploited Roundcube Flaws to KEV CatalogRomanian Hacker Faces up to 7 Years for Breaching Oregon Emergency Management Dept
2/19/2026 February 19, 2026February 19, 2026 ~ The Cyber Beat ~ Leave a comment Researchers Warn Volt Typhoon Still Embedded in U.S. Utilities and Some Breaches May Never Be FoundNation-State Hackers Hit Businesses For Commercial EdgeIndustrial Control System Vulnerabilities Hit Record HighsThe AI Security Nightmare Is Here and It Looks Suspiciously Like Lobster…Researchers Reveal Six New OpenClaw VulnerabilitiesHow to Organize Safely in the Age of SurveillanceCrims Hit a $20M Jackpot via Malware-Stuffed ATMsINTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime CrackdownNigerian Man Gets Eight Years in Prison for Hacking Tax FirmsUK to Demand Social Platforms Take Down Abusive Intimate Images Within 48 HoursWest Virginia Sues Apple for Alleged Child Sexual Abuse Material FailuresGoogle Blocked Over 1.75 Million Play Store App Submissions From Obtaining Excessive Access in 2025Orange Shares Hit 16-Year High on Profit Beat, New Targets and M&A HopesCyberattack Cripples University of Mississippi Medical Center Systems, Forces Clinic ClosuresAttackers Breach France’s National Bank Account DatabaseRhysida Ransomware Gang Threatens Cheyenne and Arapaho Tribes After Shutting Down SchoolsMicrosoft Error Sees Confidential Emails Exposed to AI Tool CopilotBug in Student Admissions Website Ravenna Hub Exposed Children’s Personal InformationBillions of Records Exposed by Unsecured IDMerit DatabaseIndustrial-Scale Fake Coretax Apps Drive $2m Fraud in IndonesiaStarkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFAHackers Target Microsoft Entra Accounts in Device Code Vishing AttacksFake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking UsersPromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps PersistenceRemcos RAT Expands Real-Time Surveillance CapabilitiesMicrosoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center
2/18/2026 February 18, 2026February 18, 2026 ~ The Cyber Beat ~ Leave a comment New Backdoor Found in Android Tablets Targeting Users in Russia, Germany and JapanPredator Spyware Used to Infect Phone Belonging to Angolan JournalistParents Angered by Lack of Online Safety StrategySpain Orders NordVPN, ProtonVPN to Block LaLiga Piracy SitesGlendale Man Gets 5 Years in Prison for Role in Darknet Drug RingFraudster Hacked Hotel System, Paid 1 Cent for Luxury Rooms, Spanish Cops SayTexas Sues TP-Link Over China Links and Security VulnerabilitiesPoland Bans Chinese-Made Cars From Entering Military SitesHacking Conference Def Con Bans Three People Linked to Jeffrey EpsteinA Vast Trove of Exposed Social Security Numbers May Put Millions at Risk of Identity TheftData Breach at Fintech Firm Figure Affects Nearly 1 Million AccountsShinyHunters Allegedly Drove off With 1.7m Cargurus RecordsCryptojacking Campaign Exploits Driver to Boost Monero MiningTelegram Channels Expose Rapid Weaponization of SmarterMail FlawsFed Agencies Ordered to Patch Dell Bug by Saturday After Exploitation Warning…Dell’s Hard-Coded Flaw: A Nation-State GoldmineGrandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code ExecutionCritical Infra Honeywell CCTVs Vulnerable to Auth Bypass Flaw
2/17/2026 February 17, 2026February 17, 2026 ~ The Cyber Beat ~ Leave a comment China Remains Embedded in U.S. Energy Networks ‘For the Purpose of Taking It Down’Chinese Hackers Exploiting Dell Zero-Day Flaw Since Mid-2024A Defector Explains the Remote-Work Scam Helping North Korea Pay for NukesLow-Skilled Cybercriminals Use AI to Perform “Vibe Extortion” AttacksResearchers Show Copilot and Grok Can Be Abused as Malware C2 ProxiesStudy Uncovers 25 Password Recovery Attacks in Major Cloud Password ManagersSignificant Rise in Ransomware Attacks Targeting Industrial OperationsWrongly Sent Emails ‘Most Common Data Breach’Palo Alto Networks Slumps 6% as Third Quarter Profit Guidance Falls ShortU.S. Lawyers Fire Up Privacy Class Action Accusing Lenovo of Bulk Data Transfers to ChinaPoland Arrests Suspect Linked to Phobos Ransomware OperationHackers Target Supporters of Iran Protests in New Espionage CampaignCitizen Lab: Kenyan Authorities Used Cellebrite to Break Into Phone of DissidentFake Milano Cortina Sites Target Thousands With Discount Scams, Cybersecurity Firm SaysSmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC InfostealerKeenadu Firmware Backdoor Infects Android Tablets via Signed OTA UpdatesRMM Abuse Explodes as Hackers Ditch MalwareFlaws in Popular VSCode Extensions Expose Developers to AttacksNotepad++ Boosts Update Security With ‘Double-Lock’ MechanismAndroid 17 Beta Introduces Secure-By-Default ArchitectureApple Expands RCS Encryption and Memory Protections in iOS 26.4Ireland Now Also Investigating X Over Grok-Made Sexual Images
2/13-16/2026 February 16, 2026February 16, 2026 ~ The Cyber Beat ~ Leave a comment Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber OperationsChina May Be Rehearsing a Digital Siege, Taiwan WarnsGoogle Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian OrgsUAT-9921 Deploys VoidLink Malware to Target Technology and Financial SectorsMunich Security Conference: Cyber Threats Lead G7 Risk Index, Disinformation Ranks ThirdNATO Must Impose Costs on Russia, China Over Cyber and Hybrid Attacks, Says Deputy ChiefEurope Must Adapt to ‘Permanent’ Cyber and Hybrid Threats, Sweden WarnsEU Can’t Be ‘Naive’ About Enemies Shutting Down Critical Infrastructure, Warns Tech OfficialSpace Emerges as New Front in Great Power Competition, Officials WarnAI Coding Platform’s Flaws Allow BBC Reporter to Be HackedVulnerabilities in Password Managers Allow Hackers to View and Change PasswordsThe El Paso No-Fly Debacle Is Just the Beginning of a Drone Defense MessRobot Dogs Are on Going on Patrol at the 2026 World Cup in MexicoRing Ends Partnership Plans With Flock Days After Privacy Blowback From Super Bowl AdDutch Cops Arrest Man After Sending Him Confidential Files by MistakeLouis Vuitton, Dior, and Tiffany Fined $25 Million Over Data BreachesU.S. Needs to Impose ‘Real Costs’ on Bad Actors, State Department Cyber Official SaysWashington Hotel in Japan Discloses Ransomware Infection IncidentCanada Goose Ruffles Feathers Over 600K Record Dump, Says Leak Is Old NewsEurail Says Stolen Traveler Data Now up for Sale on Dark WebOver 500,000 Vkontakte Accounts Hijacked Through Malicious Chrome ExtensionsOperation DoppelBrand Weaponizes Trusted Brands For Credential TheftSnail Mail Letters Target Trezor and Ledger Users in Crypto-Theft AttacksPastebin Comments Push ClickFix JavaScript Attack to Hijack Crypto SwapsMicrosoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware StagingNew ClickFix Attack Abuses Nslookup to Retrieve Powershell Payload via DNSClaude LLM Artifacts Abused to Push Mac Infostealers in ClickFix AttackInfostealer Steals OpenClaw AI Agent Configuration Files and Gateway TokensOysterLoader Evolves With New C2 Infrastructure and ObfuscationCISA Flags Critical Microsoft Sccm Flaw as Exploited in AttacksCISA Gives Feds 3 Days to Patch Actively Exploited BeyondTrust FlawNew Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch ReleasedStarlink Restrictions Hit Russian Forces as Moscow Seeks WorkaroundsInfosec Exec Sold Eight Zero-Day Exploit Kits to Russia, Says DOJ
2/12/2026 February 12, 2026February 12, 2026 ~ The Cyber Beat ~ Leave a comment Palo Alto Chose Not to Tie China to Hacking Campaign for Fear of Retaliation From Beijing, Sources SayNation-State Hackers Embrace Gemini AI for Malicious Campaigns, Google FindsLazarus Campaign Plants Malicious Packages in npm and PyPI EcosystemsKim Jong Un Chooses Teen Daughter as Heir, Says SeoulCloudflare Rises 5% as AI Agent Wave Led by Viral Moltbot Boosts Security DemandCheck Point Software Lifts Profit Outlook as AI-Driven Cyber Threats SurgeAI Skills Represent Dangerous New Attack Surface, Says TrendAIThose ‘Summarize With AI’ Buttons May Be Lying to YouCrypto-Funded Human Trafficking Is ExplodingGuthrie Doorbell Video Delayed by Difficult Data Recovery, but Privacy Advocates Still WorryFTC Push for Age Verification a ‘Major Landmark’ for Spread of the ToolWhatsApp Says Russia Tried to Fully Block Platform, Push Users to State AppOdido Data Breach Exposes Personal Info of 6.2 Million CustomersRomania’s Oil Pipeline Operator Conpet Confirms Data Stolen in AttackFake AI Chrome Extensions With 300K Users Steal Credentials, EmailsWorld Leaks Ransomware Group Adds Stealthy, Custom Malware ‘RustyRocket’ to Attacks83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting InfrastructureCritical BeyondTrust RCE Flaw Now Exploited in Attacks, Patch NowWordPress Plugin With 900K Installs Vulnerable to Critical RCE FlawApple Fixes Exploited Zero-Day Affecting iOS, macOS, and Other DevicesMicrosoft: New Windows LNK Spoofing Issues Aren’t VulnerabilitiesBitwarden Introduces ‘Cupid Vault’ for Secure Password SharingA Hard Truth in Munich: Cyber Defense Runs Through Silicon ValleyU.S. Wants Cyber Partnerships to Send ‘Coordinated, Strategic Message’ to Adversaries
2/11/2026 February 12, 2026February 12, 2026 ~ The Cyber Beat ~ Leave a comment APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian EntitiesKrebs: Kimwolf Botnet Swamps Anonymity Network I2PPosting AI-Generated Caricatures on Social Media Is Risky, Infosec Killjoys WarnCBP Signs Clearview AI Deal to Use Face Recognition for ‘Tactical Targeting’AI Rising: Do We Know Enough About the Data Populating It?40 State AGs Warn House KOSA Bill Falls Short of Protecting Children OnlinePolice Arrest Seller of JokerOTP MFA Passcode Capturing ToolMoscow Moves to Throttle Telegram as Kremlin Pushes Its Own Messaging AppUK Blames Legacy Systems as Ministers Promise No Repeat of Afghan BreachGeorgia Healthcare Company ApolloMD Data Breach Impacts More Than 620,000Tulsa International Airport Hit With Ransomware AttackLummaStealer Infections Surge After Castleloader Malware CampaignsCrazy Ransomware Gang Abuses Employee Monitoring Tool in AttacksFirst Malicious Outlook Add-In Found Stealing 4,000+ Microsoft CredentialsMicrosoft Fixes Notepad Flaw That Could Trick Users Into Clicking Malicious Markdown LinksOver 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network PlatformsInterim CISA Chief: ‘When the Government Shuts Down, Cyber Threats Do Not’Is Spyware Hiding on Your Phone? How to Find Out and Remove It – Fast
2/10/2026 February 11, 2026February 11, 2026 ~ The Cyber Beat ~ Leave a comment DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate CompaniesNorth Korean Hackers Use New macOS Malware in Crypto-Theft Attacks“Digital Parasite” Warning as Attackers Favor Stealth for ExtortionWhite House to Meet With GOP Lawmakers on FISA Section 702 RenewalCyber Command, NSA Nominee Rudd Advances to Senate FloorBritish Army Splashes $86M on AI Gear to Speed up the Battlefield Kill ChainFugitive Behind $73M ‘Pig Butchering’ Scheme Gets 20 Years in PrisonGoogle Secures EU Antitrust Approval for $32 Billion Wiz AcquisitionMicrosoft Announces New Mobile-Style Windows Security ControlsNearly 17,000 Volvo Staff Dinged in Supplier BreachPhorpiex Phishing Delivers Low-Noise Global Group RansomwareNew Mobile Spyware ZeroDayRAT Targets Android and iOSMalicious 7-Zip Site Distributes Installer Laced With Proxy ToolReynolds Ransomware Embeds BYOVD Driver to Disable EDR Security ToolsNew Linux Botnet SSHStalker Uses Old-School IRC for C2 CommsFortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code ExecutionKrebs: Patch Tuesday, February 2026 EditionMicrosoft Is Keeping Secure Boot Alive With Windows UpdatesWhat Organizations Need to Change When Managing Printers
2/9/2026 February 9, 2026February 9, 2026 ~ The Cyber Beat ~ Leave a comment China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage CampaignBloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing CampaignSenegal Confirms Breach of National ID Card Department After Ransomware ClaimsEU, Dutch Government Announce Hacks Following Ivanti Zero-DaysEuropean Commission Discloses Breach That Exposed Staff DataLeaked Technical Documents Show China Rehearsing Cyberattacks on Neighbors’ Critical InfrastructureIran’s Digital Surveillance Machine Is Almost CompleteAI Is Here to Replace Nuclear Treaties. Scared Yet?Researchers Find 40,000+ Exposed OpenClaw InstancesSocial Media Platforms Earn Billions from Scam AdsHacked, Leaked, Exposed: Why You Should Never Use Stalkerware AppsTwo Connecticut Men Charged In Alleged $3m Gambling Fraud SchemeHackers Breach SmarterTools Network Using Flaw in Its Own SoftwareSolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed ServersDiscord Faces Backlash Over Age Checks After Data Breach Exposed 70,000 IDsPayment Tech Provider for Texas, Florida Governments BridgePay Working With FBI to Resolve Ransomware AttackSuspected Sabotage Disrupts Trains in Northern Italy as Winter Games BeginTeamPCP Worm Exploits Cloud Infrastructure to Build Criminal InfrastructureVoidLink Malware Exhibits Multi-Cloud Capabilities and AI CodeNew Zero-Click Flaw in Claude Desktop Extensions, Anthropic Declines FixBeyondTrust Warns of Critical RCE Flaw in Remote Support SoftwareMicrosoft: Exchange Online Flags Legitimate Emails as PhishingRussia Grants Asylum to Spanish Professor Wanted for Alleged Pro-Moscow Cyber Operations
2/6-8/2026 February 9, 2026February 9, 2026 ~ The Cyber Beat ~ Leave a comment German Agencies Warn of Signal Phishing Targeting Politicians, Military, JournalistsNorwegian Intelligence Discloses Country Hit by Salt Typhoon CampaignUnsettled Cyber Intel Law Erodes Private-Sector TrustU.S. Software Stocks Slammed on Mounting Fears Over AI Disruption, Lose $1 Trillion in WeekNYC Explores Using AI Cameras to Spot Subway Fare EvadersEU Says TikTok Faces Large Fine Over “Addictive Design”Illinois Man Pleads Guilty to Hacking Nearly 600 Women’s Snapchat AccountsDKnife: Chinese-Made Malware Kit Targets Chinese-Based Routers and Edge DevicesFlickr Emails Users About Data Breach, PINs It on 3rd PartyPayments Platform BridgePay Confirms Ransomware Attack Behind OutageCompromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT MalwareCISA Warns of SmarterMail RCE Flaw Used in Ransomware AttacksOpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub SkillsNew Tool Blocks Imposter Attacks Disguised as Safe Commands
2/5/2026 February 5, 2026February 5, 2026 ~ The Cyber Beat ~ Leave a comment Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout EndsProtests Don’t Impede Iranian Spying on Expats, Syrians, IsraelisRussian Hackers Attacking European Maritime and Transport Orgs Using Microsoft Office ExploitAsia-Based Government Spies TGR-STA-1030 Quietly Broke Into Critical Networks Across 37 CountriesICE and CBP’s Face-Recognition App Can’t Actually Verify Who People AreSmartphones Now Involved in Nearly Every Police InvestigationAI-Enabled Voice and Virtual Meeting Fraud Surges 1000%+UNICEF Calls for Criminalization of AI Content Depicting Child Sex AbuseDark Patterns Undermine Security, One Click at a TimeCISA Gives Federal Agencies One Year to Rip Out End-Of-Life DevicesSpain’s Ministry of Science Shuts Down Systems After Breach ClaimsRomanian Oil Pipeline Operator Conpet Discloses CyberattackItalian University la Sapienza Goes Offline After CyberattackSubstack Data Breach Exposed Users’ Emails and Phone NumbersData Breach at Govtech Giant Conduent Balloons, Affecting Millions More AmericansBetterment Breach May Expose 1.4m Users After Social Engineering AttackZendesk Spam Wave Returns, Floods Users With ‘Activate Account’ EmailsAISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS AttackRansomware Gang Uses ISPsystem VMs for Stealthy Payload DeliveryMalicious Commands in GitHub Codespaces Enable RCE
2/4/2026 February 5, 2026February 5, 2026 ~ The Cyber Beat ~ Leave a comment U.S. Used Cyber Weapons to Disrupt Iranian Air Defenses During 2025 StrikesUkraine Tightens Controls on Starlink Terminals to Counter Russian DronesItaly Foiled Russia-Linked Cyberattacks on Embassies, Olympic Sites, Minister Says…How 2026 Winter Olympics Security Is Preparing for the Opening CeremonyChina-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage CampaignsOpenClaw’s AI ‘Skill’ Extensions Are a Security NightmareMicrosoft Develops Scanner to Detect Backdoors in Open-Weight Large Language ModelsGoogle Cloud’s Customer Chief Returns to Microsoft as Head of SecurityWith AI Accountability Stalling, Boards Must Push Tech Giants for Greater TransparencySuper Bowl Prepares for Potential AI Cybersecurity ThreatOwner of Incognito Dark Web Drugs Market Gets 30 Years in PrisonDragonForce Ransomware Gang Goes Full ‘Godfather’ With CartelHackers Compromise NGINX Servers to Redirect User TrafficCoinbase Confirms Insider Breach Linked to Leaked Support Tool ScreenshotsCybercrime Group Claims Responsibility for Penn Email Hack, Leaks Additional Internal Files…Hackers Publish Personal Information Stolen During Harvard, UPenn Data BreachesMicrosoft Warns Python Infostealers Target macOS via Fake Ads and InstallersGlobal SystemBC Botnet Found Active Across 10,000 Infected SystemsNew Technical Markers Reveal Expanding ShadowSyndicate Cybercriminal InfrastructureEDR Killer Tool Uses Signed Kernel Driver From Forensic SoftwareNitrogen Ransomware Is So Broken Even the Crooks Can’t Unlock Your FilesCISA Warns of Five-Year-Old GitLab Flaw Exploited in AttacksCISA: VMware ESXi Flaw Now Exploited in Ransomware AttacksCritical n8n Flaws Disclosed Along With Public Exploits
2/3/2026 February 3, 2026February 5, 2026 ~ The Cyber Beat ~ Leave a comment Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking GroupRussian Hackers Weaponize Microsoft Office Bug in Just 3 DaysPoland Detains Defense Ministry Employee on Suspicion of Spying for RussiaU.S. Senator Says AT&T, Verizon Blocking Release of Salt Typhoon Security Assessment ReportsCISA Official Says CIRCIA Cyber Reporting Update Is ‘Weeks’ AwayCISA Updated Ransomware Intel on 59 Bugs Last Year Without Telling DefendersTrump Administration Eyes 10-Year Extension of Cybersecurity LawHow Data Brokers Can Fuel Violence Against Public ServantsX Marks the Raid: French Cops Swoop on Musk’s Paris Ops…UK ICO Launches Investigation into X Over AI Generated Non-Consensual Sexual ImageryUK Investigating First Suspected Breach of Cyber SanctionsPolish Cops Bail 20-Year-Old Bedroom Botnet OperatorVaronis to Acquire AllTrue as AI Security Concerns MountOpenAI CEO Altman Dismisses Moltbook as Likely Fad, Backs the Tech Behind It…The Rise of Moltbook Suggests Viral AI Prompts May Be the Next Big Security ThreatIron Mountain: Data Breach Mostly Limited to Marketing MaterialsStep Finance Says Compromised Execs’ Devices Led to $40M Crypto TheftNew Password-Stealing Phishing Campaign Targets Corporate Dropbox CredentialsWave of Citrix NetScaler Scans Use Thousands of Residential ProxiesResearchers Warn of New “Vect” RaaS VariantDockerDash Exposes AI Supply Chain Weakness In Docker’s Ask GordonCritical React Native Metro Dev Server Bug Under Attack as Researchers Scream Into the Void…Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm PackageCISA Flags Critical SolarWinds RCE Flaw as Exploited in AttacksSQL Injection Flaw Affects 40,000 WordPress Sites8-Minute Access: AI Accelerates Breach of AWS EnvironmentMicrosoft Finally Sends TLS 1.0 and 1.1 to the Cloud Retirement HomeCalifornia City Turns off Flock Cameras After Company Shared Data Without AuthorizationMozilla Adds One-Click Option to Disable Generative AI Features in FirefoxSpain Will Ban Social Media for Kids Under 16
2/2/2026 February 2, 2026February 2, 2026 ~ The Cyber Beat ~ Leave a comment Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-AttacksNotepad++ Updates Got Hijacked for Months and Could Have Spied for ChinaSpyware Maker Is Hijacking Diplomatic Efforts to Limit Commercial Hacking, Civil Society WarnsFrom Clawdbot to Moltbot to OpenClaw: Meet the AI Agent Generating Buzz and Fear Globally…OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link…Malicious MoltBot Skills Used to Push Password-Stealing Malware…Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw UsersExposed Moltbook Database Let Anyone Take Control of Any AI Agent on the SiteHackers Recruit Unhappy Insiders to Bypass Data SecurityDrone Sightings Have Doubled Near UK Military Bases, Warns British GovernmentKrebs: Please Don’t Feed the Scattered Lapsus ShinyHuntersHackers Attempt to Extort Parents After School Refuses to Pay Ransom FeeStopICE Hacked to Send Alarming Text Messages, Admins Accuse Border Patrol Agent of SabotagePanera Bread Breach Impacts 5.1 Million Accounts, Not 14 Million CustomersMcDonald’s Is Not Lovin’ Your BigMac, Happy Meal, and McNuggets McPasswordsNationStates Confirms Data Breach, Shuts Down Game SiteOpen VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWormMicrosoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to KerberosNSA Publishes New Zero Trust Implementation GuidelinesNetherlands Latest European Country to Mull Social Media Ban for Children
1/30-2/1/2026 February 2, 2026February 2, 2026 ~ The Cyber Beat ~ Leave a comment Labyrinth Chollima Evolves into Three North Korean Hacking GroupsChina-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO MalwareRedKitten: New AI-Developed Malware SloppyMIO Campaign Targets Iranian ProtestsI Mocked the Saudi Leader on YouTube – Then My Phone Was Hacked and I Was Beaten up in LondonInformant Told FBI That Jeffrey Epstein Had a ‘Personal Hacker’Ex-Google Engineer Convicted for Stealing AI Secrets for China StartupCoupang CEO Questioned by Police Investigating Obstruction of Probe Into Data BreachThoma Bravo Explores Sale of Identity Software Firm Imprivata, Sources SayOperation Switch Off Dismantles Major Pirate TV Streaming ServicesDepartment of Justice Seizes Domains for Bulgarian Piracy SitesCrypto Wallets Received a Record $158 Billion in Illicit Funds Last YearNew Britain (CT) ‘Network Disruption’ Was Due to Ransomware Attack, Mayor SaysMandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS PlatformsCloud Storage Payment Scam Floods Inboxes With Fake RenewalsNational Crime Agency and NatWest Issue Joint Warning Over Invoice Fraud ThreatExposed MongoDB Instances Still Targeted in Data Extortion AttacksResearcher Reveals Evidence of Private Instagram Profiles Leaking PhotosResearchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT AccessSmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 ScoreNew Apple Privacy Feature Limits Location Tracking on iPhones, iPadsAI Security Startup CEO Posts a Job. Deepfake Candidate Applies, Inner Turmoil Ensues.Open-Source AI Is a Global Security Nightmare Waiting to Happen, Say Researchers