Skip to main content
Mallory

Security roundups covering multiple unrelated breaches, exploited vulnerabilities, and malware activity

actively-exploited-vulnerabilitygovernment-vulnerability-catalogransomware-group-operationenforcement-actionoperational-disruption
Updated March 21, 2026 at 02:32 PM3 sources
Share:
Security roundups covering multiple unrelated breaches, exploited vulnerabilities, and malware activity

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

The referenced items are weekly newsletter/roundup posts that aggregate multiple, unrelated cybersecurity developments rather than reporting a single discrete incident. They highlight a mix of data breaches, ransomware, active exploitation and KEV additions, and malware campaigns—including mentions of BeyondTrust RS/PRA vulnerabilities (including CVE-2026-1731) being exploited, CISA adding various flaws to the Known Exploited Vulnerabilities (KEV) catalog, and ongoing malware activity such as LummaStealer, NetSupport RAT targeting, and Linux botnet activity (e.g., SSHStalker).

Separately, the roundup coverage also includes public-sector and critical-service disruptions and regulatory action: a reported cyberattack on the European Commission’s mobile device management (MDM) environment with potential exposure of staff contact details, a ransomware incident disrupting Senegal’s national identity services, and an Australian court penalty against FIIG Securities tied to inadequate cybersecurity controls following a prior ransomware breach and data exposure. Overall, the content is best treated as situational awareness across many stories, not as a cohesive incident requiring a single-issue response plan.

Timeline

  1. Feb 20, 2026

    India's AI-generated content handling rules take effect

    India introduced formal rules for labeling and handling AI-generated content, with the measures becoming effective on 2026-02-20. The policy was highlighted as a notable regulatory development in the roundup.

  2. Feb 15, 2026

    Security Affairs publishes malware roundup covering new campaigns and tools

    On 2026-02-15, Security Affairs published Malware Newsletter Round 84, aggregating reporting on campaigns and malware including NetSupport RAT activity, ZeroDayRAT, SSHStalker, AgreeToSteal, LummaStealer, CastleLoader, BADIIS, and VoidLink-linked operations. The piece compiled previously reported technical developments rather than announcing one discrete incident.

  3. Feb 15, 2026

    Security Affairs highlights active exploitation and major breach disclosures

    On 2026-02-15, Security Affairs' weekly international newsletter summarized ongoing exploitation of multiple vulnerabilities, recent vendor patches, and breach disclosures affecting organizations including Odido, ApolloMD, Conduent/Volvo Group, Figure, Flickr, and Senegal’s national ID-related office. The item was a roundup rather than a single newly reported incident.

  4. Feb 13, 2026

    Daren Li sentenced in absentia for $73 million pig-butchering scam

    In the United States, Daren Li was sentenced in absentia to 20 years in prison for a $73 million cryptocurrency pig-butchering fraud scheme. The case involved laundering nearly $60 million through U.S. shell companies.

  5. Feb 13, 2026

    Australia fines FIIG Securities over cybersecurity control failures

    Australian authorities imposed a landmark AU$2.5 million penalty on FIIG Securities, plus AU$500,000 in legal costs, over inadequate cybersecurity controls. The action was tied to control failures that preceded a 2023 ransomware breach exposing 385GB of client data.

  6. Feb 13, 2026

    Senegal identity services disrupted by ransomware incident

    Senegal’s Directorate of File Automation suffered a ransomware attack that halted identity card production and disrupted national ID, passport, and electoral services. Authorities said personal data was not compromised and the investigation remained ongoing.

  7. Jan 30, 2026

    European Commission contains MDM breach within nine hours

    The European Commission said the January 30 intrusion was contained within nine hours of detection. Its disclosure indicated the impact was limited to data exposure involving staff contact details.

  8. Jan 30, 2026

    European Commission mobile device management system attacked

    On 2026-01-30, the European Commission disclosed a cyberattack affecting its mobile device management system. The incident may have exposed staff names and mobile phone numbers, but officials said no devices were compromised.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

February 15, 2026 at 01:57 PM
February 13, 2026 at 10:53 AM

Related Stories

Weekly Cybersecurity Roundups Highlighting New Vulnerabilities and Incidents

Weekly Cybersecurity Roundups Highlighting New Vulnerabilities and Incidents

Multiple outlets published **weekly cybersecurity roundups** summarizing a mix of vulnerability disclosures, ransomware/breach reporting, and policy developments rather than a single discrete incident. TechTarget highlighted a surge in reported vulnerabilities (citing **48,000+ new CVEs in 2025**) and called out several high-impact issues, including a **critical ServiceNow weakness** tied to weak authentication in the legacy *Virtual Agent* chatbot that became more dangerous when paired with agentic AI (*Now Assist*), potentially enabling impersonation and **admin-level access** into connected enterprise systems. Other roundup coverage aggregated unrelated security events across sectors. Sherpa Intelligence’s “Five for Friday” compiled items including ransomware claims (e.g., **Everest** targeting Nissan; **Nightspire** claiming an attack on a Hyatt Place property) and breach reporting (e.g., a **Korean Air** employee-data breach attributed to **Clop**). The Cyber Express weekly roundup similarly mixed disparate topics (platform policy changes around AI abuse, senior government appointments, and national-level connectivity disruptions), reinforcing that the common thread is **curation of multiple stories** rather than new primary reporting on one specific cyber event.

1 months ago
Weekly security roundups highlight exploited enterprise vulnerabilities and energy-sector attacks

Weekly security roundups highlight exploited enterprise vulnerabilities and energy-sector attacks

The items provided are **editorial roundups/newsletters** aggregating multiple, unrelated security stories rather than reporting a single discrete incident. Across the roundups, recurring high-priority themes include **actively exploited vulnerabilities** (e.g., Microsoft Office zero-day `CVE-2026-21509`, Fortinet SSO authentication bypass `CVE-2026-24858`, and a critical SmarterMail code-execution flaw), plus broader reporting on exploitation activity (e.g., nation-state and criminal use of a WinRAR flaw) and supply-chain/package-manager risk (e.g., “PackageGate” bypass issues affecting NPM/PNPM/VLT/Bun). These are not marketing/event promotions, but they are **not a cohesive single event**; they function as curated link collections. The roundups also surface operational threat activity, including reporting that **Poland faced disruptive/wiper-style attacks against energy-related systems** in late December 2025 (targeting combined heat and power plants and renewable-energy management systems), and multiple malware/campaign writeups (e.g., KONNI using AI to generate PowerShell backdoors, Android trojan delivery via Hugging Face hosting, and other multi-stage Windows malware and extension-based abuse). For CISOs, the actionable takeaway is to treat the referenced **KEV-listed and in-the-wild exploited** issues as patch/mitigation priorities while monitoring energy-sector TTPs and malware delivery trends highlighted in the linked research.

1 months ago
Weekly Cybersecurity Roundups Covering Breaches, Zero-Days, and AI-Driven Threats

Weekly Cybersecurity Roundups Covering Breaches, Zero-Days, and AI-Driven Threats

Two weekly “roundup” articles summarized a broad set of security developments rather than a single incident. Reported items included **data breaches** (e.g., PayPal, SpyX, California Cryobank), **active exploitation of multiple vulnerabilities** (including a **Google Chrome 0-day** and critical issues in products such as *BeyondTrust*, *Ivanti EPMM*, *Splunk Enterprise*, and *Windows Admin Center*), and **ransomware activity** (e.g., **Hellcat** reportedly breaching Ascom’s ticketing infrastructure and exfiltrating ~44GB of data). The digest also highlighted availability risk via a reported **Cloudflare** global outage attributed to a cascading password-rotation failure. The week-in-review content also mixed security news with interviews and tool/project updates, including discussion of the evolving CISO role amid **agentic AI**, the release of *REMnux v8* (malware analysis distro) with AI integration, and commentary on “harvest now, decrypt later” **quantum** risk. It additionally referenced separate security headlines such as a **firmware-level Android backdoor** on tablets and a **Dell zero-day** reportedly exploited since 2024, but did not provide a unified, single-event narrative across the items.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.