# Today's Top Stories
February 24, 2026
-
1Dark Reading general Feb 23600+ FortiGate Devices Hacked by AI-Armed Amateur
A Russian-speaking threat actor used generative AI tools to compromise over 600 FortiGate firewalls across 55+ countries, targeting credentials and backups for potential ransomware follow-on attacks. Amazon's threat intelligence team discovered the campaign, highlighting how adversaries are leveraging AI to scale traditional firewall exploitation techniques.
-
2BleepingComputer general Feb 23Android mental health apps with 14.7M installs filled with security flaws
Security researchers identified critical vulnerabilities in several Android mental health apps with 14.7 million combined Google Play downloads that expose users' sensitive medical information. The flaws demonstrate how healthcare-related mobile applications continue to lack proper security controls despite handling highly sensitive patient data.
-
3The Hacker News general Feb 23APT28 Targeted European Entities Using Webhook-Based Macro Malware
APT28 conducted Operation MacroMaze between September 2025 and January 2026, targeting Western and Central European entities using webhook-based macro malware and legitimate services exploitation. The Russian state-sponsored group's campaign demonstrates continued evolution in their attack methodology while maintaining focus on European targets.
-
4Dark Reading general Feb 23Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount
Iran's MuddyWater threat group deployed new malware strains including GhostFetch, CHAR, and HTTP_VIP in Operation Olalampo, targeting organizations across the Middle East and Africa starting January 26, 2026. The campaign showcases the group's continued development of fresh attack tools amid escalating regional tensions.
-
5BleepingComputer general Feb 23CISA: Recently patched RoundCube flaws now exploited in attacks
CISA added two recently patched RoundCube Webmail vulnerabilities to its Known Exploited Vulnerabilities catalog after detecting active exploitation in attacks, ordering federal agencies to patch within three weeks. The XSS flaws in the widely-used webmail platform affect SVG document processing capabilities.
-
ADSponsoredProtect Your Business
Expert cybersecurity solutions to safeguard your organization from evolving threats.
Get Protected → -
6Dark Reading general Feb 23Spitting Cash: ATM Jackpotting Attacks Surged in 2025
ATM jackpotting attacks surged in 2025, costing banks over $20 million in losses as criminals continue using decade-old tools and tactics to force cash dispensers to dispense money. The resurgence demonstrates how legacy ATM security vulnerabilities remain exploitable despite years of awareness.
-
7SecurityWeek general Feb 23Mississippi Hospital System Closes All Clinics After Ransomware Attack
The University of Mississippi Medical Center closed all 36 clinics statewide and canceled elective procedures following a ransomware attack, demonstrating the severe operational impact on healthcare delivery. The incident highlights healthcare's continued vulnerability to ransomware disrupting patient care across entire regional networks.
-
8SecurityWeek general Feb 23US Healthcare Diagnostic Firm Says 140,000 Affected by Data Breach
The Everest ransomware group breached Vikor Scientific (now Vanta Diagnostics), a US healthcare diagnostic firm, affecting 140,000 individuals' personal and medical information. The attack on the laboratory services provider adds to the growing list of healthcare data breaches exposing sensitive patient records.
-
9The Hacker News general Feb 23Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens
Socket discovered the SANDWORM_MODE supply chain campaign using at least 19 malicious npm packages to harvest cryptocurrency keys, CI secrets, and API tokens in a Shai-Hulud-like worm attack. The active campaign targets developers' credentials and cryptocurrency wallets through compromised JavaScript packages.
-
10SecurityWeek general Feb 23Romanian Hacker Pleads Guilty to Selling Access to US State Network
Romanian hacker Catalin Dragomir pleaded guilty in US court to selling network access to an Oregon state government office, demonstrating how cybercriminals monetize compromised government infrastructure. The case highlights the ongoing threat of initial access brokers targeting state and local government networks.