Weekly Cybersecurity Recap - 16 February 2026

Major Vulnerabilities, Exploits and Industry Updates

01 / Blog Article

Weekly Cybersecurity Recap - 16 February 2026
    Weekly Recap

    Introduction

    The latest cybersecurity developments reflect a rapidly evolving threat landscape shaped by AI-enabled exploits, escalating ransomware campaigns, and mounting supply-chain risk. Attackers are blending social engineering, infrastructure abuse, and open-source compromise while defenders race to modernize protections and strengthen resilience.

    From nation-state activity targeting defense infrastructure to malicious browser extensions with tens of millions of downloads, this week’s events highlight how digital risk continues to expand across ecosystems, platforms, and sectors.

    Malware, Exploits and Technical Threats

    Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging

    Microsoft disclosed a new iteration of the ClickFix social engineering campaign in which victims are tricked into executing DNS lookups via the Windows Run dialog. The attackers abuse the legitimate "nslookup" command to retrieve second-stage malware payloads.

    By leveraging trusted system tools, the campaign blends malicious activity into normal administrative behavior, making detection more difficult for security teams.

    AI-Generated Malware Exploits React2Shell for Tiny Profit

    Researchers detected AI-generated malware exploiting CVE-2025-55182, known as React2Shell, a vulnerability in Next.js server components that enables remote command execution. The campaign successfully compromised 91 hosts.

    The incident highlights how generative AI tools are lowering the barrier for exploit development, enabling individuals with limited coding expertise to weaponize known vulnerabilities.

    Microsoft Under Pressure to Bolster Defenses for BYOVD Attacks

    BYOVD attacks continue to rise as ransomware groups exploit vulnerable Windows drivers to disable endpoint protection tools. Attackers deploy legitimately signed but vulnerable drivers to gain kernel-level access and terminate security processes.

    The technique presents a complex challenge for Microsoft, as blocking vulnerable drivers risks disrupting legitimate systems while leaving defensive gaps if unaddressed.

    83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure

    GreyNoise observed that 83% of exploitation attempts targeting Ivanti EPMM originated from a single IP address hosted by bulletproof provider PROSPERO. Between February 1 and 9, researchers recorded 417 exploitation sessions.

    The concentration of activity underscores how attackers leverage resilient hosting infrastructure to sustain coordinated exploitation campaigns.

    Supply Chain and Ecosystem Security

    Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

    Researchers linked malicious npm and PyPI packages to a recruitment-themed campaign attributed to the North Korea-linked Lazarus Group. The operation, dubbed “graphalgo,” has reportedly been active since May 2025.

    By embedding malicious code in open-source ecosystems, attackers continue to exploit developer trust and software supply chains to infiltrate enterprise environments.

    Over 300 Malicious Chrome Extensions Caught Leaking or Stealing User Data

    Security analysts uncovered more than 300 Chrome extensions transmitting browsing histories and search data, with a combined 37 million downloads. Some extensions exposed data over unsecured networks, while others monetized or maliciously collected user information.

    The scale of the discovery reinforces persistent risks within browser ecosystems, particularly where extension oversight remains limited.

    Ransomware, Extortion and Sector Targeting

    Ransomware attacks increase against IT and food sectors

    Ransomware incidents in the IT sector surged to nearly 750 cases in 2025, more than doubling the prior year’s total. Analysts attribute the rise to attackers pivoting toward supply-chain weaknesses and leveraging faster social engineering and zero-day exploitation tactics.

    The food sector has also experienced increased targeting, reflecting broader industry-wide exposure.

    Extortion attacks on the rise as hackers prioritize supply-chain weaknesses

    Extortion-related cyberattacks rose by approximately 63% in 2025, reaching 6,800 incidents, according to Intel 471. Consulting firms and manufacturing companies were among the most frequently listed victims on dark-web leak sites.

    The trend reflects attackers’ focus on supply-chain dependencies to maximize leverage and impact.

    Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns

    Google Threat Intelligence Group reported escalating attacks against the global defense industrial base. The activity includes operations from China, Russia, Iran, and North Korea-linked actors, as well as ransomware groups targeting manufacturing supply chains.

    The findings point to a sustained and multifaceted campaign targeting contractors, suppliers, and defense personnel.

    AI Security and Industry Strategy

    Check Point Buys 3 Startups to Bolster AI Security

    Check Point acquired three early-stage startups to expand capabilities in exposure management, AI security, and workspace protection. The move reflects growing enterprise demand for AI-native security solutions.

    Proofpoint Purchases Startup Acuvity to Bolster AI Security

    Proofpoint announced its acquisition of Acuvity to better understand AI prompt intent and detect adversarial or data-leaking behaviors. The company said the technology enhances visibility across browsers, endpoints, and AI agents.

    As organizations integrate AI into workflows, vendors are racing to address emerging risks tied to model misuse and oversharing.

    02/ Related Posts

    view all
    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 24 March 2025

    This Week in Cybersecurity: Phishing, Ransomware, and a $32B Acquisition

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 7 April 2025

    AI Weaknesses, Airport Ransomware, Cloud Gaps & Phishing PhaaS

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 14 April 2025

    Fake Apps, Data Leaks, Ransomware Tactics & WordPress Plugin Exploits

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 21 April 2025

    Multi-stage malware, GPS spoofing, ClickFix campaigns, and Shadow AI adoption—this week’s cybersecurity recap has it all

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 28 April 2025

    QR code scams, GenAI hallucinations, mobile spyware, and double extortion — it’s another action-packed week in cybersecurity.

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 5 May 2025

    TikTok fined €530M, hackers breach CNI, and top 2025 cyber threats – your weekly cyber update

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 12 May 2025

    FreeDrain Crypto Phishing, Qilin Ransomware Surge & Google’s AI Moves

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 19 May 2025

    Botnets, Bounties, and the AI Balancing Act

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 26 May 2025

    Fake Installers, Ransomware Fallout & Malicious Extensions: Last Week’s Cyber Recap

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 2 June 2025

    Malware campaigns, breaches, and the $111B cloud security boom

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 9 June 2025

    From a massive AT&T data leak to new macOS malware and a takedown of a notorious carding site - here's what happened last week.

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 16 June 2025

    Discord Malware, Salesforce Risks, SME Pressures and more

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 23 June 2025

    Cybercriminal Innovation, Record-Breaking DDoS, and Retail Breaches - What You Missed Last Week

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 30 June 2025

    Emerging Quantum Threats, UAE Cyber Trends, and Critical Exploits – Last Week’s Cybersecurity Recap

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 7 July 2025

    Weekly Cybersecurity Recap: AI-Enhanced Phishing, Android Fraud, and Emerging Risks

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 14 July 2025

    Weekly Cybersecurity Recap: Human Weakness, AI Risks, and Critical Vulnerabilities

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 11 August 2025

    Weekly Cybersecurity Recap: AI-Powered Scams, Vault Flaws, Airline Breaches & GPT-5 Jailbreaks

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 25 August 2025

    Weekly Cybersecurity Recap: Wi-Fi Breaches, AI Risks, and Major Exploits

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 1 September 2025

    AI Ransomware, WhatsApp Zero-Click Exploit, and Salesforce Credential Theft

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 8 September 2025

    AI-powered Threats, Global Partnerships, Zero-Day Exploits & Record DDoS Attack

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 15 September 2025

    npm Breach, Zero-Days, AI Jailbreaks and More

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 22 September 2025

    AI-powered threats, airport cyberattacks, phishing surges & critical vulnerabilities

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 6 October 2025

    Oracle Extortion, Red Hat Breach, and AI Browser Exploits

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 13 October 2025

    New Malware Strains, Supply Chain Risks, and Massive Breaches

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 20 October 2025

    Smart Contract Malware, Corporate Breaches, and Ransomware Disruptions

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 27 October 2025

    GlassWorm Supply Chain Attack, WSUS Exploited, and a $2.5B JLR Fallout

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 3 November 2025

    AI Advances, Cloud Disruptions, and Global Threat Campaigns

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 17 November 2025

    AI Framework Flaws, Mass Supply Chain Abuse, and Rising Ransomware Complexity

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 24 November 2025

    Cloud Outages, AI Botnets, 7-Zip Exploits, and Rising Gulf Security Spend

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 8 December 2025

    AI Risks, RCE Threats, Supply-Chain Abuse & Global Outages

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 15 December 2025

    Zero-Days, AI Risk Warnings, and Escalating Exploits

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 19 January 2026

    Malware Innovation, Zero-Days, and Cloud-Focused Threats

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 26 January 2026

    Identity Attacks, Exploited Trust, and Emerging Global Defenses

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 2 February 2026

    Cyber Risks Escalate Across Industry, Infrastructure, and AI as Attack Surfaces Expand

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 9 February 2026

    Credential Theft, Supply Chain Risks, and Critical Exploits

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 23 February 2026

    Cyber threats are accelerating across both national infrastructure and enterprise environments. While governments strengthen defensive posture against organized cyberattacks, ransomware operators and AI-enabled adversaries continue to compress response timelines and expand sector targeting.

    Protect your business with Paratus

    Ready to get started? Fill out the form below and we'll get back to you in no time!

    To: Paratus

    risk decrease

    96% Risks from dealing with clients and traders decrease by 96%