# Today's Top Stories

February 24, 2026

  1. 1
    1
    Dark Reading general Feb 23
    600+ FortiGate Devices Hacked by AI-Armed Amateur

    A Russian-speaking threat actor used generative AI tools to compromise over 600 FortiGate firewalls across 55+ countries, targeting credentials and backups for potential ransomware follow-on attacks. Amazon's threat intelligence team discovered the campaign, highlighting how adversaries are leveraging AI to scale traditional firewall exploitation techniques.

  2. 2
    1
    BleepingComputer general Feb 23
    Android mental health apps with 14.7M installs filled with security flaws

    Security researchers identified critical vulnerabilities in several Android mental health apps with 14.7 million combined Google Play downloads that expose users' sensitive medical information. The flaws demonstrate how healthcare-related mobile applications continue to lack proper security controls despite handling highly sensitive patient data.

  3. 3
    1
    The Hacker News general Feb 23
    APT28 Targeted European Entities Using Webhook-Based Macro Malware

    APT28 conducted Operation MacroMaze between September 2025 and January 2026, targeting Western and Central European entities using webhook-based macro malware and legitimate services exploitation. The Russian state-sponsored group's campaign demonstrates continued evolution in their attack methodology while maintaining focus on European targets.

  4. 4
    0
    Dark Reading general Feb 23
    Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

    Iran's MuddyWater threat group deployed new malware strains including GhostFetch, CHAR, and HTTP_VIP in Operation Olalampo, targeting organizations across the Middle East and Africa starting January 26, 2026. The campaign showcases the group's continued development of fresh attack tools amid escalating regional tensions.

  5. 5
    0
    BleepingComputer general Feb 23
    CISA: Recently patched RoundCube flaws now exploited in attacks

    CISA added two recently patched RoundCube Webmail vulnerabilities to its Known Exploited Vulnerabilities catalog after detecting active exploitation in attacks, ordering federal agencies to patch within three weeks. The XSS flaws in the widely-used webmail platform affect SVG document processing capabilities.

  6. 6
    0
    Dark Reading general Feb 23
    Spitting Cash: ATM Jackpotting Attacks Surged in 2025

    ATM jackpotting attacks surged in 2025, costing banks over $20 million in losses as criminals continue using decade-old tools and tactics to force cash dispensers to dispense money. The resurgence demonstrates how legacy ATM security vulnerabilities remain exploitable despite years of awareness.

  7. 7
    0
    SecurityWeek general Feb 23
    Mississippi Hospital System Closes All Clinics After Ransomware Attack

    The University of Mississippi Medical Center closed all 36 clinics statewide and canceled elective procedures following a ransomware attack, demonstrating the severe operational impact on healthcare delivery. The incident highlights healthcare's continued vulnerability to ransomware disrupting patient care across entire regional networks.

  8. 8
    0
    SecurityWeek general Feb 23
    US Healthcare Diagnostic Firm Says 140,000 Affected by Data Breach

    The Everest ransomware group breached Vikor Scientific (now Vanta Diagnostics), a US healthcare diagnostic firm, affecting 140,000 individuals' personal and medical information. The attack on the laboratory services provider adds to the growing list of healthcare data breaches exposing sensitive patient records.

  9. 9
    0
    The Hacker News general Feb 23
    Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens

    Socket discovered the SANDWORM_MODE supply chain campaign using at least 19 malicious npm packages to harvest cryptocurrency keys, CI secrets, and API tokens in a Shai-Hulud-like worm attack. The active campaign targets developers' credentials and cryptocurrency wallets through compromised JavaScript packages.

  10. 10
    0
    SecurityWeek general Feb 23
    Romanian Hacker Pleads Guilty to Selling Access to US State Network

    Romanian hacker Catalin Dragomir pleaded guilty in US court to selling network access to an Oregon state government office, demonstrating how cybercriminals monetize compromised government infrastructure. The case highlights the ongoing threat of initial access brokers targeting state and local government networks.