(Adobe Stock) Google disrupts decade-long China-linked UNC2814 espionage campaignSteve ZurierFebruary 25, 2026GTIG points out that this campaign had no overlaps with other PRC activities, such as Salt Typhoon.
Living between breakdown and build: America’s infrastructure is being built in plain sightCory SimpsonFebruary 23, 2026
Georgia Tech researchers highlight vulnerabilities in threat intelligence sharingSC StaffFebruary 25, 2026
Druva enhances DruAI platform with Deep Analysis Agents for automated investigationsSC StaffFebruary 25, 2026
From perimeter to protocol: Reducing telecom attack surface with privacy-first mobile technologySC StaffFebruary 13, 2026
ICIT’s Center for FCEB Resilience: Strengthening federal civilian agenciesPaul WagenseilFebruary 3, 2026
Threat ManagementCrowdStrike: Average cyberattack breakout time now under 30 minutesLaura FrenchFebruary 25, 2026Attackers gained speed as AI-enabled attacks and zero-day exploitation significantly increased.
Threat ManagementNorth Korea’s Lazarus Group targets US, Middle East healthcare sectorsSteve ZurierFebruary 24, 2026Threat actor focuses on identity-based attacks followed by a ransomware drop.
Application securitySANDWORM_MODE: Shai-Hulud with an AI twistLaura FrenchFebruary 24, 2026A new npm supply chain attack injects a malicious MCP server and targets LLM API keys.
Application securityThreat group leverages LLMs to compromise 600 FortiGate firewallsSteve ZurierFebruary 23, 2026Amazon Threat Intelligence said the attacks happened over five weeks in 55 countries.
Threat IntelligenceFBI posts ATM jackpotting prevention guidance after $20M stolen in 2025Laura FrenchFebruary 20, 2026The FBI FLASH alert highlights the threat of Ploutus malware, which exploits XFS software.
Vulnerability ManagementCISA update: BeyondTrust RCE exploited in ransomware attacksSteve ZurierFebruary 20, 2026Experts say if teams can’t patch right away, take the portal offline to protect against potential ransomware attacks.
MalwareNew malware-as-a-service fronts as legit RMM providerLaura FrenchFebruary 20, 2026Proofpoint worked with industry partners to take down the TrustConnect MaaS, but it quickly reemerged under a different brand.
Vulnerability ManagementAttacks on 2 critical Ivanti EPMM bugs surge worldwideSteve ZurierFebruary 19, 2026Experts warn teams to check their logs, as dormant backdoors are designed to survive patching.