Skip to main content
Mallory

Weekly security roundups highlight exploited enterprise vulnerabilities and energy-sector attacks

actively-exploited-vulnerabilitygovernment-vulnerability-catalogcritical-infrastructure-threatstate-sponsored-disruptionpackage-repository-poisoning
Updated March 21, 2026 at 02:41 PM1 sources
Share:
Weekly security roundups highlight exploited enterprise vulnerabilities and energy-sector attacks

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

The items provided are editorial roundups/newsletters aggregating multiple, unrelated security stories rather than reporting a single discrete incident. Across the roundups, recurring high-priority themes include actively exploited vulnerabilities (e.g., Microsoft Office zero-day CVE-2026-21509, Fortinet SSO authentication bypass CVE-2026-24858, and a critical SmarterMail code-execution flaw), plus broader reporting on exploitation activity (e.g., nation-state and criminal use of a WinRAR flaw) and supply-chain/package-manager risk (e.g., “PackageGate” bypass issues affecting NPM/PNPM/VLT/Bun). These are not marketing/event promotions, but they are not a cohesive single event; they function as curated link collections.

The roundups also surface operational threat activity, including reporting that Poland faced disruptive/wiper-style attacks against energy-related systems in late December 2025 (targeting combined heat and power plants and renewable-energy management systems), and multiple malware/campaign writeups (e.g., KONNI using AI to generate PowerShell backdoors, Android trojan delivery via Hugging Face hosting, and other multi-stage Windows malware and extension-based abuse). For CISOs, the actionable takeaway is to treat the referenced KEV-listed and in-the-wild exploited issues as patch/mitigation priorities while monitoring energy-sector TTPs and malware delivery trends highlighted in the linked research.

Timeline

  1. Feb 2, 2026

    North Korea-linked KONNI uses AI to generate malware tooling

    Reporting indicated that the North Korea-linked KONNI group used AI to help generate malware tooling. This revealed a new technical detail about how the threat actor was developing or supporting its operations.

  2. Feb 2, 2026

    Amnesia RAT phishing campaign targets Russian users

    A phishing campaign distributing Amnesia RAT was reported as targeting users in Russia. The activity added a malware-delivery operation to the week's threat landscape.

  3. Feb 2, 2026

    PackageGate zero-days reported across JavaScript package managers

    Researchers disclosed 'PackageGate' zero-day issues affecting several JavaScript package managers. The finding exposed a supply-chain risk spanning multiple developer ecosystems.

  4. Feb 2, 2026

    Threat actors exploit WinRAR in multiple campaigns

    The newsletter notes that diverse threat actors were exploiting WinRAR vulnerabilities in separate campaigns. This reflects ongoing real-world abuse of the archiving software by multiple adversaries.

  5. Feb 2, 2026

    SolarWinds Web Help Desk flaws disclosed

    Security reporting highlighted vulnerabilities affecting SolarWinds Web Help Desk. The disclosure added another enterprise product to the week's notable patching and exposure concerns.

  6. Feb 2, 2026

    Researchers report critical SmarterMail flaws and broad exposure

    Critical vulnerabilities in SmarterTools SmarterMail were reported, with more than 6,000 exposed servers said to be likely vulnerable. The reporting highlighted both the severity of the flaws and the scale of internet exposure.

  7. Feb 2, 2026

    Fortinet discloses FortiOS SSO auth bypass vulnerability

    Fortinet disclosed an authentication bypass vulnerability in FortiOS SSO tracked as CVE-2026-24858. The vendor response made the flaw a distinct vulnerability disclosure and remediation event.

  8. Feb 2, 2026

    CISA adds Ivanti EPMM and Fortinet flaws to KEV catalog

    CISA added actively exploited vulnerabilities affecting Ivanti EPMM and multiple Fortinet products to its Known Exploited Vulnerabilities catalog. The listing signaled confirmed exploitation and increased urgency for defenders to patch.

  9. Feb 2, 2026

    OpenSSL releases updates fixing 12 flaws including an RCE

    OpenSSL issued security updates to address 12 vulnerabilities, including a remote code execution flaw. The release constituted a major patching event for widely used cryptographic software.

  10. Feb 2, 2026

    Court and law-enforcement developments emerge in Empire Market case

    The newsletter references new legal and law-enforcement developments related to Empire Market and other cybercrime cases. These actions represent official judicial or enforcement progress in a major dark-web marketplace matter.

  11. Feb 2, 2026

    Nike investigates breach claim by WorldLeaks

    Nike began investigating a possible breach after a threat actor using the name WorldLeaks claimed responsibility. At the time referenced, the matter was under investigation rather than fully confirmed.

  12. Feb 2, 2026

    Crunchbase confirms breach after ShinyHunters claim

    Threat actor ShinyHunters claimed to have compromised Crunchbase, and Crunchbase confirmed that it had suffered a breach. The confirmation turned the criminal claim into a verified incident.

  13. Feb 2, 2026

    Sandworm linked to major attack on Poland's power grid

    Reporting cited Russia-linked Sandworm as responsible for a major attack on Poland's power grid, adding attribution to a significant critical-infrastructure incident. This represents a notable development in understanding the threat actor behind the attack.

  14. Feb 2, 2026

    Polish energy facilities hit by cyberattacks disrupting communications

    Cyberattacks disrupted communications at energy facilities in Poland, marking a significant operational impact on the country's energy sector. The newsletter references this as a notable incident in the reporting period.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Security roundups covering multiple unrelated breaches, exploited vulnerabilities, and malware activity

Security roundups covering multiple unrelated breaches, exploited vulnerabilities, and malware activity

The referenced items are **weekly newsletter/roundup posts** that aggregate multiple, unrelated cybersecurity developments rather than reporting a single discrete incident. They highlight a mix of **data breaches**, **ransomware**, **active exploitation and KEV additions**, and **malware campaigns**—including mentions of BeyondTrust RS/PRA vulnerabilities (including `CVE-2026-1731`) being exploited, CISA adding various flaws to the **Known Exploited Vulnerabilities (KEV)** catalog, and ongoing malware activity such as **LummaStealer**, **NetSupport RAT** targeting, and Linux botnet activity (e.g., **SSHStalker**). Separately, the roundup coverage also includes public-sector and critical-service disruptions and regulatory action: a reported cyberattack on the **European Commission’s mobile device management (MDM)** environment with potential exposure of staff contact details, a **ransomware** incident disrupting Senegal’s national identity services, and an Australian court penalty against **FIIG Securities** tied to inadequate cybersecurity controls following a prior ransomware breach and data exposure. Overall, the content is best treated as situational awareness across many stories, not as a cohesive incident requiring a single-issue response plan.

1 months ago
Weekly Cyber Threat Intelligence Roundup: Microsoft Patch Tuesday, FortiSIEM Exploitation, and Emerging Malware/Phishing Trends

Weekly Cyber Threat Intelligence Roundup: Microsoft Patch Tuesday, FortiSIEM Exploitation, and Emerging Malware/Phishing Trends

A weekly threat-intelligence roundup highlighted **Microsoft’s January Patch Tuesday** release addressing **112 vulnerabilities** across Windows and *Microsoft Edge*, spanning multiple classes including elevation of privilege, remote code execution, and information disclosure. The same briefing reported active interest in **CVE-2025-64155**, a **critical FortiSIEM** vulnerability, with observed exploitation activity against honeypot environments following an out-of-band alert from Kroll Threat Intelligence—an indicator of likely broader scanning and attempted exploitation. The update also covered multiple threat developments: Check Point research described **VOIDLINK**, a Linux-focused malware framework (implants/rootkits/loaders) designed for long-term access, including in cloud environments; **North Korean-linked KTA082 (Kimsuky/APT43)** was reported using **QR-code phishing (“quishing”)** to target government, education, and think tanks; and **Iran-linked KTA060 (MuddyWater)** was associated with development of the **RUSTYWATER RAT**. Separately, detection-engineering updates noted new and refined rules for **OAuth/Entra ID consent phishing** patterns (including *ConsentFix*-style authorization flows), correlations between Entra ID risk events and privileged actions (e.g., PIM elevation/device-code auth), Windows persistence/defense-evasion behaviors (e.g., scheduled tasks by unsigned executables, Chrome security feature tampering), and updated YARA/behavioral detections for malware families (e.g., **Agent Tesla**, **MintsLoader**) and **Cobalt Strike** TTPs; the briefing also referenced a leak of a database purportedly containing ~**324,000 BreachForums** user records posted to `shinyhunte[.]rs`.

1 months ago
Weekly Cybersecurity Roundups Highlighting Government Campaigns, Nation-State Activity, and Emerging Vulnerabilities

Weekly Cybersecurity Roundups Highlighting Government Campaigns, Nation-State Activity, and Emerging Vulnerabilities

Multiple weekly cybersecurity roundups and newsletters highlighted a mix of policy, threat, and vulnerability developments rather than a single discrete incident. UK government messaging featured prominently, including a campaign urging businesses to “lock the door” against cyber criminals and publication of longitudinal survey results indicating most organizations continue to experience cyber incidents (with reported rates in the 70–80% range across businesses and charities). Separately, commentary from European security circles emphasized growing calls for **offensive cyber capabilities** (“strike back”) amid concerns about Russian aggression and sabotage activity across Europe, including references to cyber operations targeting critical infrastructure. Threat reporting in the same period emphasized escalating **nation-state and proxy activity** against critical infrastructure and the defense industrial base, citing research that espionage groups (including those linked to China, Russia, and North Korea) have compromised organizations by exploiting **zero-day vulnerabilities in edge devices** (e.g., VPNs and gateways). Additional reporting pointed to newly identified OT-focused threat groups (e.g., **Sylvanite**, **Azurite**, **Pyroxene**) and a broad set of emerging technical risks and product/security changes, including discussion of an **OpenSSL RCE** risk, **Foxit 0-days**, and analysis of **LockBit 5.0** ransomware techniques (e.g., ETW tampering, process hollowing, log clearing) alongside Android platform security changes (e.g., deprecating cleartext traffic defaults and adding HPKE support).

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.