Daily Recap, CISA added multiple high-severity flaws to the Known Exploited Vulnerabilities catalog, warning that the Ivanti EPM CVE-2026-1603 is actively exploited with over 700 internet-facing instances and federal patching deadlines. The report also notes a critical Nginx UI flaw CVE-2026-27944 fixed in 2.3.3, and coverage of APT campaigns and loader trends including PlugX against Qatar, UAT9244 implants such as PeerTime, TernDoor and BruteEntry, Seedworm and Dust Specter campaigns, UNC4899 breach, and malware like GhostLoader, ClipXDaemon, A0Backdoor, and LummaStealer. #IvantiEPM #CVE-2026-1603 #NginxUI #CVE-2026-27944 #PlugX #UAT9244 #PeerTime #TernDoor #BruteEntry #Seedworm #DustSpecter #Dindoor #UNC4899 #GhostLoader #ClipXDaemon #A0Backdoor #LummaStealer #SalesforceAura #EricssonBreach #React2Shell
Vulnerabilities & CISA Alerts
- CISA added multiple highâseverity flaws to its Known Exploited Vulnerabilities catalog, warning that the recently patched Ivanti Endpoint Manager bug CVE-2026-1603 is being actively exploited and noting over 700 Internetâfacing EPM instances while ordering federal patching deadlines. â Ivanti EPM, CISA Alerts
- A critical Nginx UI flaw CVE-2026-27944 lets unauthenticated attackers download server backups and obtain encryption keys via the /api/backup endpoint and is fixed in 2.3.3. â Nginx UI
APT Campaigns & Malware
- Chinaânexus actors rapidly pivoted to regional tensions, deploying a PlugX variant and a Rust-based loader against Qatar, while another Chinaâlinked group (UATâ9244) has targeted South American telecoms using implants like PeerTime, TernDoor and BruteEntry. â PlugX Campaign, UAT-9244
- Iranânexus operators (Seedworm and Dust Specter) escalated espionage using a newly documented Dindoor backdoor, custom .NET droppers, socialâengineering lures, and AIâassisted malware development against U.S. and Iraqi targets. â Seedworm Dindoor, Dust Specter
- North Koreaâlinked UNC4899 breached a crypto firm after social engineering a developer via AirDrop, then abused DevOps workflows, Kubernetes and Cloud SQL to steal millions. â UNC4899 Breach
- Multiple delivery and loader trends surfaced: a malicious npm package deploys the GhostLoader RAT to steal macOS credentials, Linux clipboard hijacker ClipXDaemon replaces crypto addresses, Microsoft Teams phishing is linked to an A0Backdoor, and ClickFix campaigns are now using Windows Terminal to deliver Lumma Stealer. â GhostLoader npm, ClipXDaemon, Teams Phish, ClickFix Attack
Cloud & Infrastructure
- Google warns attackers increasingly exploit newly disclosed thirdâparty flaws to gain rapid access to cloud environmentsâshortening the exploitation window to daysâand highlights trends like bug exploits and supplyâchain compromises (e.g., React2Shell, UNC4899). â Cloud Exploits
- Misconfigurations and thirdâparty incidents are driving data loss: attackers exploit Salesforce Experience Cloud /s/sfsites/aura guest settings (ShinyHunters claims), Ericsson discloses a serviceâprovider breach exposing employee/customer PII, and threat actors are abusing the .arpa TLD to host phishing sites. â Salesforce Aura, Ericsson Breach, .arpa Abuse
- Cylake raised $45 million to build an AIânative security platform for organizations that cannot rely on public cloud, targeting data and operational sovereignty with GA planned for early 2027. â Cylake Raises
Phishing, Scams & Account Hijacks
- The FBI warns scammers impersonate city/county planning officials to fraudulently request permit fees via wire, P2P or crypto and urges domain verification and IC3 reporting. â FBI Phishing
- New Social Security scam emails use fake tax documents to trick victims into opening malicious files that hijack PCs. â Social Security Scam
- AI chatbots have been found recommending unlicensed offshore gambling sites and providing tips to access them, steering users toward illegal casinos with limited protections. â AI Casinos
- Dutch authorities warn Russian actors are hijacking Signal and WhatsApp accounts of officials via fake support messages, SMS PIN prompts and malicious QR/deviceâlinking methods. â Signal/WhatsApp Hijack
- A fake Google Meet update can abuse Windowsâ ms-device-enrollment deep link to silently enroll PCs into an attackerâcontrolled MDM and grant remote management without traditional malware. â Fake Meet Update
Data Breaches & Theft
- Salesforce warns attackers are scanning misconfigured Experience Cloud sites to exploit the Aura API and steal CRM data, a technique ShinyHunters claims to be using. â Salesforce Aura
- Ericsson Inc. disclosed a breach at a thirdâparty service provider that exposed employee and customer PII (including SSNs and driverâs licenses) from April 17â22, 2025, and is offering free identity protection. â Ericsson Breach
Policy & Leadership
- The White House released a fourâpage National Cyber Strategy pledging offensive cyber operations, reduced regulation, federal network hardening and incentives for the private sector while promising to âimpose costsâ on bad actors. â US Cyber Strategy
- An executive order proposes a wholeâofâgovernment effort against transnational scam centers and a Victim Restoration Program to return seized funds, backed by a 120âday agency action plan. â Victim Restoration
- Senate cloture advances Army Lt. Gen. Joshua Rudd toward confirmation to lead U.S. Cyber Command and the NSA, despite objections over signalsâintelligence experience. â Rudd Nomination
- The Kids Internet and Digital Safety Act advanced in House committee hearings as lawmakers push for stronger child online protections, though critics warn of loopholes and preemption concerns. â Kids Safety Act
- Nasscom urged vigilance as firms prepare for operational and security impacts from the West Asia conflict. â Nasscom Advisory
Business & Market
- Cyber M&A activity remains brisk with 42 deals announced in February 2026, signaling ongoing consolidation and investment in security technologies. â M&A Roundup
Advice & Analysis
- CISO Hannah Suarez argues cyber risk management must be businessâfacing, with clear cloud ownership, businessâdriven framework prioritization, and urgent supplyâchain risk attention to enable secure growth. â CISO Advice
- Password audits often miss what attackers really wantâreused/breached credentials, orphaned and service accountsâand should add breachedâpassword screening, riskâbased prioritization and continuous monitoring. â Password Audits