Operation Cronos: How Law Enforcement Dismantled LockBit, the World's Largest Ransomware Operation
On February 20, 2024, a 10-country task force seized LockBit's infrastructure, identified 194 affiliates, and froze $112 million in cryptocurrency in the most significant ransomware takedown in history.
Clop Exploits Oracle E-Business Suite Zero-Days in Massive Extortion Campaign
The Clop ransomware group weaponized CVE-2025-61882 and CVE-2025-61884 to breach nearly 100 organizations including Allianz UK, GlobalLogic, Envoy Air, Harvard, and Washington Post, with ransom demands reaching $50 million.
Coupang Data Breach Expands: 33.7 Million Accounts Compromised, 165,000 Additional Users Affected
South Korean e-commerce giant Coupang confirmed an additional 165,000 user accounts were exposed in the massive data breach affecting 33.7 million total accounts, triggered by a former employee using valid authentication keys.
China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asian Espionage Campaigns
Check Point Research documents a new threat cluster weaponizing CVE-2025-8088 within days of disclosure to target government and law enforcement agencies across Cambodia, Thailand, Philippines, and neighboring countries.
DEAD#VAX Campaign Uses IPFS-Hosted VHD Files to Deploy AsyncRAT via Fileless Execution
Securonix researchers document a sophisticated malware campaign that chains IPFS hosting, virtual hard disk abuse, and in-memory shellcode injection to deliver AsyncRAT while evading traditional detection.
Metro4Shell: Critical React Native CLI Vulnerability Actively Exploited Against Developers
CVE-2025-11953 in React Native CLI's Metro Development Server is being exploited in the wild to deploy Rust-based malware on developer systems, with attacks observed since December 2025.
APT28 Deploys LAMEHUG: First Known Malware Using LLMs in Live Operations
Russia's APT28 has deployed LAMEHUG and PROMPTSTEAL malware that queries large language models via Hugging Face to dynamically generate attack commands, marking the first confirmed use of AI-powered malware in active cyber operations.
ShinyHunters Publishes Harvard and UPenn Data: 2 Million Records Exposed
The ShinyHunters cybercriminal group published stolen data from Harvard University and the University of Pennsylvania after ransom demands went unpaid, exposing over 2 million alumni, donor, and student records.
New n8n Vulnerability CVE-2026-25049 Bypasses Previous Patch to Enable Remote Code Execution
A critical flaw in n8n (CVSS 9.4) exploits TypeScript/JavaScript type mismatch to bypass sanitization from a December 2025 patch, enabling authenticated remote command execution via webhook workflows.
React2Shell Exploitation Enables Massive NGINX Web Traffic Hijacking Campaign
Threat actors are using CVE-2025-55182 exploitation to inject malicious NGINX configurations that silently redirect web traffic through attacker infrastructure, targeting Asian TLDs and government sites.
APT28 Exploits Microsoft Office Zero-Day in Operation Neusploit Targeting Ukraine
Russia's APT28 weaponized CVE-2026-21509 within three days of Microsoft's disclosure, deploying MiniDoor email stealers and PixyNetLoader against Ukraine, Slovakia, and Romania.
Mozilla Adds One-Click Option to Disable All AI Features in Firefox
Firefox 148 introduces a 'Block AI enhancements' toggle that disables all current and future generative AI features, plus individual controls for translations, tab grouping, link previews, and chatbot access.