# Today's Top Stories
February 25, 2026
-
1CyberScoop general Feb 24Ex-L3Harris executive sentenced to 87 months in prison for selling zero-day exploits to Russian broker
Peter Williams, former L3Harris executive, was sentenced to 87 months in prison for selling eight proprietary zero-day exploits to Russian broker Aleksei Burkov and his company Cybercrime LLC. The U.S. Treasury simultaneously sanctioned Burkov's zero-day brokerage for acquiring stolen defense contractor tools and selling them to unauthorized customers.
-
2Dark Reading general Feb 24Attackers Now Need Just 29 Minutes to Own a Network
CrowdStrike's 2025 threat report shows attackers now move laterally through breached networks in just 29 minutes on average, representing a 65% speed increase from the previous year. The acceleration is attributed to credential misuse, AI-powered attack tools, and persistent security blind spots in enterprise environments.
-
3BleepingComputer general Feb 24Critical SolarWinds Serv-U flaws offer root access to servers
SolarWinds patched four critical remote code execution vulnerabilities in Serv-U that could grant attackers root access to unpatched servers. The flaws affect the file transfer protocol server and represent high-severity security risks for organizations using SolarWinds infrastructure management tools.
-
4The Hacker News general Feb 24RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN
Orca Security disclosed the 'RoguePilot' vulnerability in GitHub Codespaces that allowed attackers to inject malicious instructions into GitHub issues, causing Copilot to leak GITHUB_TOKEN credentials when processing repository data. Microsoft has since patched the AI-driven flaw following responsible disclosure.
-
5Dark Reading general Feb 24Lazarus Group Picks a New Poison: Medusa Ransomware
North Korean Lazarus Group has been observed deploying Medusa ransomware in attacks against U.S. healthcare organizations and Middle Eastern entities. The threat actors also used Comebacker backdoor, Blindingcan RAT, and Infohook stealer to establish persistence and exfiltrate data from compromised networks.
-
ADSponsoredProtect Your Business
Expert cybersecurity solutions to safeguard your organization from evolving threats.
Get Protected → -
6BleepingComputer general Feb 24Phishing campaign targets freight and logistics orgs in the US, Europe
The 'Diesel Vortex' threat group conducted phishing attacks using 52 domains to steal credentials from freight and logistics operators across the U.S. and Europe. Over a five-month period, attackers compromised over 1,600 login credentials to intercept freight shipments and commit check fraud.
-
7BleepingComputer general Feb 24CarGurus data breach exposes information of 12.4 million accounts
ShinyHunters extortion group published personal information from 12.4 million CarGurus accounts after allegedly breaching the U.S.-based automotive platform. The exposed data includes user records from the digital car marketplace, marking another significant breach by the prolific cybercriminal organization.
-
8BleepingComputer general Feb 24Wynn Resorts confirms employee data breach after extortion threat
Wynn Resorts confirmed employee data was stolen from its systems after being listed on ShinyHunters extortion gang's leak site. The casino operator disclosed the breach following extortion threats, though specific details about the number of affected employees were not provided.
-
9BleepingComputer general Feb 24UK fines Reddit $19 million for using children’s data unlawfully
The UK Information Commissioner's Office fined Reddit £14.47 million ($19.5 million) for unlawfully collecting and using personal information of children under 13 without adequate age verification safeguards. The penalty targets Reddit's failure to implement robust age assurance mechanisms for protecting minors' data.
-
10The Hacker News general Feb 24Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model
Anthropic identified 'industrial-scale campaigns' by Chinese AI firms DeepSeek, Moonshot AI, and MiniMax that generated over 16 million queries through 24,000 fraudulent accounts to illegally extract Claude's capabilities. The distillation attacks violated terms of service and aimed to improve competing AI models using stolen intellectual property.