Hackers Weaponize Claude Code in Mexican Government Cyberattack

Hackers have reportedly weaponized Anthropic's Claude AI model to assist in a cyberattack against the Mexican government. The AI was allegedly used to generate exploit code, develop malicious tools, and facilitate the exfiltration of over 150GB of sensitive data.

Who is the Kimwolf Botmaster “Dort”?

This article investigates the identity of "Dort," the individual believed to be the botmaster behind Kimwolf, a massive botnet responsible for significant disruptive attacks. Following the disclosure of a vulnerability that enabled the creation of Kimwolf, Dort has orchestrated retaliatory DDoS, doxing, and harassment campaigns against those involved in exposing the botnet.

Cities Hosting Major Events Need More Focus on Wireless, Drone Defense

Experts are advising that major events, such as the FIFA World Cup, should enhance their security measures to include active and passive wireless threats in addition to traditional physical and cyber defenses. This involves addressing vulnerabilities related to wireless communication and drone activity to protect against potential disruptions and security breaches.

APT37 hackers use new malware to breach air-gapped networks

The North Korean APT37 hacking group is using new malware, delivered via removable drives, to bridge air-gapped networks and conduct covert surveillance. This new toolset allows them to move data between connected and isolated systems.

Europol-led crackdown on The Com hackers leads to 30 arrests

A Europol-coordinated operation, "Project Compass", targeting the online cybercrime collective known as "The Com" has resulted in 30 arrests and implicated 179 suspects. The Com specifically targets children and teenagers with cybercrime activities.

900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

Over 900 Sangoma FreePBX instances are still compromised with web shells following attacks that exploited a command injection vulnerability that began in December 2025. The majority of infected instances are located in the U.S., followed by Brazil, Canada, Germany, and France. The compromises were discovered by the Shadowserver Foundation.

Ransomware payments cratered in 2025, but attacks surged to record highs

Ransomware payments significantly decreased in 2025, despite a surge in the number of ransomware attacks reaching record levels. This suggests that while attacks are becoming more frequent, victims are less willing or able to pay the ransom demands, possibly due to improved defenses or a shift in attacker tactics.

French DIY etailer ManoMano admits customer data stolen

French DIY etailer ManoMano admitted that customer data was stolen after a cyberattack hit one of its customer support subcontractors in January. The attackers claim to have stolen data from over 37 million accounts, a significantly larger number than ManoMano initially suggested.

Chilean Carding Shop Operator Extradited to US

A 24-year-old Chilean man, suspected of operating a carding shop, has been extradited to the United States. He is accused of trafficking over 26,000 credit cards from a single brand.

Ukrainian man pleads guilty to running AI-powered fake ID site

A Ukrainian man has pleaded guilty to running OnlyFake, an AI-powered website that generated and sold fake identification documents. The website generated over 10,000 fake ID photos, highlighting the misuse of AI in enabling fraudulent activities.

Fake Fedex Email Delivers Donuts!, (Fri, Feb 27th)

A fake FedEx email is being used to deliver malware instead of just redirecting users to phishing sites. The email claims to be a delivery notification but contains a malicious payload.

Phishing Attacks Against People Seeking Programming Jobs

North Korean hackers are posing as recruiters to target job seekers in the programming field. They lure candidates into running malicious code during coding challenges, which installs malware on their systems.

US authorities punish sellers of malware and spyware

US authorities sentenced Peter Williams to 87 months in prison for selling sensitive cyber-exploit components to a Russian company. Simultaneously, the Department of the Treasury sanctioned Sergey Sergeyevich Zelenyuk and Matrix LLC (Operation Zero) for acquiring and distributing cyber tools harmful to US national security, including exploits for US products.

Ransomware groups switch to stealthy attacks and long-term access

Ransomware groups are shifting tactics towards stealthy infiltration and long-term access, focusing on data exfiltration and the threat of public exposure as their main extortion mechanism. They are using defense evasion and persistence techniques, routing command-and-control traffic through trusted enterprise services to blend in with normal business traffic, and chaining vulnerabilities for greater impact.

Risky Bulletin: Russian man investigated for extorting Conti ransomware group

This article summarizes several cybersecurity incidents, including the investigation of a Russian man for extorting the Conti ransomware group, the takedown of a Chinese espionage operation by Google, the hacking of the Mexican government using Claude, and the discovery of a Cisco zero-day exploited for three years.

Cisco SD-WAN Zero-Day Under Exploitation for 3 Years

A zero-day vulnerability, CVE-2026-20127, in Cisco SD-WAN has been under exploitation for three years by a sophisticated, unknown threat actor. The vulnerability is considered to be of maximum severity and the attacker left very little trace of their activities.

Olympique Marseille confirms 'attempted' cyberattack after data leak

Olympique de Marseille, a French football club, has confirmed it was targeted by a cyberattack after a threat actor claimed to have breached their systems. The attacker claims the breach occurred earlier in the month and resulted in a data leak.

UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor

Cisco Talos is tracking a new threat activity cluster, UAT-10027, which has been targeting the U.S. education and healthcare sectors since at least December 2025. The group deploys a novel backdoor called Dohdoor that leverages DNS-over-HTTPS (DoH) for command and control.

Ransomware payment rate drops to record low as attacks surge

The ransomware payment rate has dropped to a record low of 28% in the past year, even as the number of claimed ransomware attacks has risen significantly. This indicates that organizations are becoming more resilient to ransomware demands, potentially due to improved backup strategies, incident response plans, and a greater willingness to restore from backups rather than pay the ransom.

Hackers Compromise Networks Faster and Faster [DE]

Crowdstrike's Global Threat Report 2025 reveals that attackers are compromising networks much faster, with an average breakout time of 29 minutes, a 65% increase in speed compared to the previous year. The report attributes this acceleration to the increasing use of AI tools by cybercriminals and state-sponsored groups to automate information gathering, extract credentials, and conduct insider operations.

Five Eyes warn: Patch your Cisco SD-WAN or risk root takeover

The Five Eyes intelligence alliance has issued a rare joint alert warning organizations to patch two Cisco Catalyst SD-WAN vulnerabilities. These vulnerabilities are actively being exploited and pose a significant risk of root takeover.

China-linked hackers used Google Sheets to spy on telecoms and governments across 42 countries

A China-linked espionage group, UNC2814, has been using Google Sheets as a command and control server to spy on telecom providers and government agencies across 42 countries. Google's Threat Intelligence Group (GTIG) and Mandiant disrupted the group's activities, which involved using Google Sheets API functionality to send commands and receive stolen data.

US Sanctions Russian Exploit Broker Operation Zero

The United States has sanctioned Russian exploit broker Operation Zero. The broker acquired zero-day exploits from a US defense contractor executive who was jailed for his actions.

Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access

A zero-day vulnerability, CVE-2026-20127, affecting Cisco Catalyst SD-WAN Controller and Manager has been actively exploited since 2023. The flaw, with a CVSS score of 10.0, allows unauthenticated remote attackers to bypass authentication and gain administrative access.

Chinese Police Use ChatGPT to Smear Japan PM Takaichi

A Chinese citizen unintentionally exposed a Chinese police influence operation targeting Japan's Prime Minister Takaichi through a ChatGPT account. The operation involved using AI-generated content to spread disinformation and smear the target.

Five Eyes issue emergency directive on exploited Cisco SD-WAN zero-day

The Five Eyes alliance issued an emergency directive regarding active exploitation of a zero-day vulnerability, CVE-2026-20127, in Cisco SD-WAN controllers. Threat actors are leveraging this flaw to gain unauthorized, administrative-level access to SD-WAN control systems, potentially manipulating network configurations and establishing persistent access.

Fake Next.js job interview tests backdoor developer's devices

Microsoft Defender has uncovered a campaign where threat actors are backdooring developer's machines through malicious repositories disguised as Next.js projects and coding tests. The malicious code installs an information-stealing backdoor, enabling unauthorized access and data exfiltration.

RAMP Forum Seizure Fractures Ransomware Ecosystem

The seizure of the RAMP forum has disrupted the ransomware ecosystem, causing groups to fracture and potentially reform. Researchers advise defenders to monitor these shifts and use the intelligence to inform their security strategies.

Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023

Cisco has disclosed that CVE-2023-20177, a critical authentication bypass vulnerability in Cisco Catalyst SD-WAN, has been exploited in zero-day attacks since 2023. The vulnerability allows remote attackers to compromise controllers and add malicious peers to networks.