# Today's Top Stories

February 25, 2026

  1. 1
    1
    CyberScoop general Feb 24
    Ex-L3Harris executive sentenced to 87 months in prison for selling zero-day exploits to Russian broker

    Peter Williams, former L3Harris executive, was sentenced to 87 months in prison for selling eight proprietary zero-day exploits to Russian broker Aleksei Burkov and his company Cybercrime LLC. The U.S. Treasury simultaneously sanctioned Burkov's zero-day brokerage for acquiring stolen defense contractor tools and selling them to unauthorized customers.

  2. 2
    1
    Dark Reading general Feb 24
    Attackers Now Need Just 29 Minutes to Own a Network

    CrowdStrike's 2025 threat report shows attackers now move laterally through breached networks in just 29 minutes on average, representing a 65% speed increase from the previous year. The acceleration is attributed to credential misuse, AI-powered attack tools, and persistent security blind spots in enterprise environments.

  3. 3
    0
    BleepingComputer general Feb 24
    Critical SolarWinds Serv-U flaws offer root access to servers

    SolarWinds patched four critical remote code execution vulnerabilities in Serv-U that could grant attackers root access to unpatched servers. The flaws affect the file transfer protocol server and represent high-severity security risks for organizations using SolarWinds infrastructure management tools.

  4. 4
    0
    The Hacker News general Feb 24
    RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN

    Orca Security disclosed the 'RoguePilot' vulnerability in GitHub Codespaces that allowed attackers to inject malicious instructions into GitHub issues, causing Copilot to leak GITHUB_TOKEN credentials when processing repository data. Microsoft has since patched the AI-driven flaw following responsible disclosure.

  5. 5
    1
    Dark Reading general Feb 24
    Lazarus Group Picks a New Poison: Medusa Ransomware

    North Korean Lazarus Group has been observed deploying Medusa ransomware in attacks against U.S. healthcare organizations and Middle Eastern entities. The threat actors also used Comebacker backdoor, Blindingcan RAT, and Infohook stealer to establish persistence and exfiltrate data from compromised networks.

  6. 6
    0
    BleepingComputer general Feb 24
    Phishing campaign targets freight and logistics orgs in the US, Europe

    The 'Diesel Vortex' threat group conducted phishing attacks using 52 domains to steal credentials from freight and logistics operators across the U.S. and Europe. Over a five-month period, attackers compromised over 1,600 login credentials to intercept freight shipments and commit check fraud.

  7. 7
    0
    BleepingComputer general Feb 24
    CarGurus data breach exposes information of 12.4 million accounts

    ShinyHunters extortion group published personal information from 12.4 million CarGurus accounts after allegedly breaching the U.S.-based automotive platform. The exposed data includes user records from the digital car marketplace, marking another significant breach by the prolific cybercriminal organization.

  8. 8
    0
    BleepingComputer general Feb 24
    Wynn Resorts confirms employee data breach after extortion threat

    Wynn Resorts confirmed employee data was stolen from its systems after being listed on ShinyHunters extortion gang's leak site. The casino operator disclosed the breach following extortion threats, though specific details about the number of affected employees were not provided.

  9. 9
    0
    BleepingComputer general Feb 24
    UK fines Reddit $19 million for using children’s data unlawfully

    The UK Information Commissioner's Office fined Reddit £14.47 million ($19.5 million) for unlawfully collecting and using personal information of children under 13 without adequate age verification safeguards. The penalty targets Reddit's failure to implement robust age assurance mechanisms for protecting minors' data.

  10. 10
    0
    The Hacker News general Feb 24
    Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

    Anthropic identified 'industrial-scale campaigns' by Chinese AI firms DeepSeek, Moonshot AI, and MiniMax that generated over 16 million queries through 24,000 fraudulent accounts to illegally extract Claude's capabilities. The distillation attacks violated terms of service and aimed to improve competing AI models using stolen intellectual property.