Breaking News – Cyber Threats (last 6h)
Generated: 2026-02-24 07:00 PST
- UK fines Reddit $19 million for using children’s data unlawfully
BleepingComputer • 2026-02-24 06:54 • www.bleepingcomputer.com
The UK Information Commissioner’s Office (ICO) has fined Reddit £14.47 million (over $19.5 million) for collecting and using the personal information of children under 13 without adequate safeguards. […]
https://www.bleepingcomputer.com/news/security/uk-fines-reddit-19-million-for-using-childrens-data-unlawfully/ - Critical SolarWinds Serv-U flaws offer root access to servers
BleepingComputer • 2026-02-24 05:00 • www.bleepingcomputer.com
SolarWinds has patched four critical Serv-U remote code execution vulnerabilities that could grant attackers root access to unpatched servers. […]
https://www.bleepingcomputer.com/news/security/critical-solarwinds-serv-u-flaws-offer-root-access-to-servers/ - Is AI Good for Democracy?
Schneier on Security • 2026-02-24 04:06 • www.schneier.comPoliticians fixate on the global race for technological supremacy between US and China. They debate geopolitical implications of chip exports, latest model releases from each country, and military applications of AI. Someday, they believe, we might see advancements in AI tip the scales in a superpower conflict.
But the most important arms race of the 21st century is already happening elsewhere and, while AI is definitely the weapon of choice, combatants are distributed across dozens of domains.
https://www.schneier.com/blog/archives/2026/02/is-ai-good-for-democracy.html
- Identity Prioritization isn't a Backlog Problem – It's a Risk Math Problem
The Hacker News • 2026-02-24 03:58 • thehackernews.com
Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control check.” That approach breaks the moment your environment stops being mostly-human and mostly-onboarded.
In modern enterprises, identity risk is created by a compound of factors: control posture, hygiene, business context, and intent. Any one of these can perhaps be
https://thehackernews.com/2026/02/identity-prioritization-isnt-backlog.html - Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
The Hacker News • 2026-02-24 03:52 • thehackernews.com
The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by the Symantec and Carbon Black Threat Hunter Team.
Broadcom’s threat intelligence division said it also identified the same threat actors mounting an unsuccessful attack against a healthcare
https://thehackernews.com/2026/02/lazarus-group-uses-medusa-ransomware-in.html - ShinyHunters extortion gang claims Odido breach affecting millions
BleepingComputer • 2026-02-24 03:40 • www.bleepingcomputer.com
The ShinyHunters extortion gang has claimed responsibility for breaching Dutch telecommunications provider Odido and stealing millions of user records from its compromised systems. […]
https://www.bleepingcomputer.com/news/security/shinyhunters-extortion-gang-claims-odido-breach-affecting-millions/ - North Korean Lazarus group linked to Medusa ransomware attacks
BleepingComputer • 2026-02-24 03:00 • www.bleepingcomputer.com
North Korean state-backed hackers associated with the Lazarus threat group are targeting U.S. healthcare organizations in extortion attacks using the Medusa ransomware. […]
https://www.bleepingcomputer.com/news/security/north-korean-lazarus-group-linked-to-medusa-ransomware-attacks/ - UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors
The Hacker News • 2026-02-24 01:54 • thehackernews.com
The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian entities.
The attacks involve the deployment of two distinct backdoors codenamed LuciDoor and MarsSnake, according to a report published by Positive Technologies last week.
“The group used several
https://thehackernews.com/2026/02/unsolicitedbooker-targets-central-asian.html
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
