📰 DAILY THREAT BRIEFING
Saturday, February 28, 2026
12 News Items
THN · BleepingComputer · Krebs · Dark Reading · SANS

📰 Cybersecurity News Headlines

Top stories from leading cybersecurity publications as of February 28, 2026.

  1. Life Mirrors Art: Ransomware Hits Hospitals on TV & IRL
    — Dark Reading

    HBO's "The Pitt" is showing audiences what a real Mississippi healthcare system is going through this week, thanks to a ransomware attack.
  2. Cities Hosting Major Events Need More Focus on Wireless, Drone Defense
    — Dark Reading

    Major events like the FIFA World Cup need to look beyond traditional physical and cyber security to active and passive wireless threats, say…
  3. Microsoft testing Windows 11 batch file security improvements
    — Bleeping Computer

    Microsoft is rolling out new Windows 11 Insider Preview builds that improve security and performance during batch file or CMD script executi…
  4. APT37 hackers use new malware to breach air-gapped networks
    — Bleeping Computer

    North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removabl…
  5. Europol-led crackdown on The Com hackers leads to 30 arrests
    — Bleeping Computer

    A yearlong Europol-coordinated operation dubbed "Project Compass" has led to 30 arrests and 179 suspects being tied to "The Com," an online …
  6. DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams
    — The Hacker News

    The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogu…
  7. 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
    — The Hacker News

    The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks th…
  8. The Case for Why Better Breach Transparency Matters
    — Dark Reading

    It's become a standard practice for organizations to disclose the bare minimum about a data breach, or worse — not disclose the incident a…
  9. CISA warns that RESURGE malware can be dormant on Ivanti devices
    — Bleeping Computer

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-da…
  10. Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor
    — The Hacker News

    Cybersecurity researchers have disclosed details of a malicious Go module that's designed to harvest passwords, create persistent access via…
  11. Claude Code Security Shows Promise, Not Perfection
    — Dark Reading

    Claude Code's introduction rippled across the stock market, but researchers and analysts say its impact was overstated, as they peel back th…
  12. ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks
    — The Hacker News

    The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive …

Generated by HiveNet.ai Threat Intelligence Platform · February 28, 2026 · Sources: The Hacker News, Bleeping Computer, Krebs on Security, Dark Reading, SANS ISC