30Articles
6Categories
2026-02-24Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-25108 Soliton Systems K.K. FileZen OS Command Injection Vulnerability This type of vulnerability is a frequent attack vector for maliciou…
KEV
⚠️
APT28 Targeted European Entities Using Webhook-Based Macro Malware
⚠️
Celebrating Two Years of CSF 2.0!
⚠️
Open Redirects: A Forgotten Vulnerability?, (Tue, Feb 24th)
⚠️
Developer-targeting campaign using malicious Next.js repositories
⚠️
Treasury sanctions Russian zero-day broker accused of buying exploits stolen from US defense contractor
⚠️
News alert: Sendmarc highlights impact of DMARC update on evolving email security standards
⚠️
Helping Users with Practical Advice to Protect their Digital Devices - Runa Sandvik - ASW #371
⚠️
January 2026 CVE Landscape: 23 Critical Vulnerabilities Mark 5% Increase, APT28 Exploits Microsoft Office Zero-Day
KEV
🔥
The Ghost in the Shell: Why Agentic AI is a Corporate Security Nightmare
🔥
Weekly Update 492
🔥
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
🔥
Scaling security operations with Microsoft Defender autonomous defense and expert-led services
🔥
CarGurus data breach affects 12.5 million accounts
🔥
Marquis sues firewall provider SonicWall, alleges security failings with its firewall backup led to ransomware attack
🔥
Conduent data breach grows, affecting at least 25M people
🔥
Preparing for Russia’s New Generation Warfare in Europe
🕵️
Is AI Good for Democracy?
🕵️
UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware
🕵️
ISC Stormcast For Tuesday, February 24th, 2026 https://isc.sans.edu/podcastdetail/9822, (Tue, Feb 24th)
🕵️
Fake Video Meeting Invites Trick Users Into Installing RMM Tools
🕵️
CyberheistNews Vol 16 #08 Do Passwords Need to Be 25+ Characters Due to AI and Quantum Attacks?
🕵️
Introducing the AIDA Orchestration Agent: Always-On Human Risk Management Has Arrived
🕵️
A Joint Vision for Simplified SASE Management at Scale
🕵️
Hidden Risks in Security Defaults
🕵️
Signal vs WhatsApp: Privacy Choice
🌐
UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors
📡
Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem
📡
Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model
📡
Former L3Harris Trenchant boss jailed for selling hacking tools to Russian broker