North Korean Threat Actors Leverage Fake IT Worker Campaigns and Contagious Interview Tactics

North Korean nation-state threat actors have been running a two-part operation — posing as job recruiters while embedding fake workers inside real companies. Since at least 2022, these actors have tricked software developers into running malicious code during fake technical interviews, using the malware families BeaverTail and OtterCookie to steal credentials, take remote control of […]
Silver Fox APT Uses DLL Sideloading and BYOVD Techniques in Sophisticated Malware Attacks

The cybersecurity community recently witnessed the emergence of targeted malware campaigns linked to the Silver Fox threat group. This operation focuses heavily on Asia, targeting local organizations with carefully localized lures. By disguising attacks as routine business communications, actors successfully distributed the Winos 4.0 malware, known as ValleyRat, into corporate networks. To compromise victim systems, […]
Cybersecurity News Weekly: PayPal Breach, Chrome 0-Day, BeyondTrust RCE Exploit, and More

Cybersecurity News Weekly Welcome to this week’s Cybersecurity Weekly Digest, your curated roundup of the most critical threats, attacks, breaches, and vulnerabilities making headlines from February 16 to 22, 2026. This week proved to be one of the most eventful of the year so far. Ransomware operators doubled down on enterprise targets, with the Hellcat […]
Multiple Hacking Groups Exploit OpenClaw Instances to Steal API key and Deploy Malware

Hacking Groups Exploit OpenClaw Instances A widespread exploitation of OpenClaw, formerly known as MoltBot and ClawdBot, by multiple hacking groups to deploy malicious payloads. OpenClaw, an open-source autonomous AI framework developed by Peter Steinberger, now at OpenAI, has become a high-severity target following its viral adoption in late January 2026. Its architecture grants significant system privileges, persistent memory access, […]
Cloudflare Down 6 Hour of Massive Global Service Outage Cause Customers Unreachable From the Internet

Cloudflare Down Cloudflare experienced a significant six-hour global service outage on February 20, 2026, causing major disruptions for customers utilizing its Bring Your Own IP (BYOIP) services. The incident, which began at 17:48 UTC and lasted for six hours and seven minutes, unintentionally withdrew customer BGP routes from the Internet, rendering numerous services and applications […]
Hackers Leveraging Multiple AI Services to Compromise 600+ FortiGate Devices

600+ FortiGate Devices Hacked A financially motivated threat actor exploited various commercial generative AI services to compromise over 600 FortiGate devices across more than 55 countries between January 11 and February 18, 2026. The campaign marks a defining demonstration of how AI is lowering the technical entry barrier to offensive cyber operations, enabling a low- […]
SuperClaw Open-Source Framework to Red-Team AI Agents for Security Testing

Superagentic AI has released SuperClaw, an open-source, pre-deployment security testing framework built specifically for autonomous AI coding agents. Announced in late 2025, SuperClaw addresses a growing blind spot in enterprise AI adoption: agents are routinely deployed with broad tool access and high privileges, yet most organizations skip structured security validation entirely before going live. The […]
PayPal Data Breach Exposes SSNs and Business PII of Customers for Over Six Months

PayPal Data Breach PayPal has issued a formal data breach notification disclosing that a coding error in its PayPal Working Capital (PPWC) loan application exposed the personally identifiable information (PII) of an undisclosed number of customers for approximately six months, from July 1, 2025, to December 13, 2025. The company detected the unauthorized exposure on […]
Grandstream VoIP Phones Vulnerability Allows Attackers to Gain Root Privileges

VoIP desk phones are trusted devices, but many are managed like office furniture. A newly disclosed flaw in Grandstream phones shows how a simple network-facing bug can turn a handset into an entry point for eavesdropping and wider access. In a typical attack, the goal is not to break the phone or stop calls. The […]
CharlieKirk Grabber Stealer Attacking Windows Systems to Exfiltrate Login Credentials

A new Python-based infostealer called CharlieKirk Grabber has been identified targeting Windows systems, with a focused goal of stealing stored login credentials, browser cookies, and session data. The malware is built to work as a “smash-and-grab” threat — it launches quickly, collects whatever sensitive data it can find, and disappears before the user notices anything […]