<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Don't Hack On Me]]></title><description><![CDATA[Cybersecurity insights for defenders, builders, and leaders.]]></description><link>https://www.donthackonme.com</link><image><url>https://substackcdn.com/image/fetch/$s_!K0fs!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7ab19c9-0834-442e-a4f5-f9a9a247465a_1280x1280.png</url><title>Don&apos;t Hack On Me</title><link>https://www.donthackonme.com</link></image><generator>Substack</generator><lastBuildDate>Thu, 16 Apr 2026 18:04:20 GMT</lastBuildDate><atom:link href="https://www.donthackonme.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Marcus J Carey]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[donthackonme@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[donthackonme@substack.com]]></itunes:email><itunes:name><![CDATA[Marcus J. Carey]]></itunes:name></itunes:owner><itunes:author><![CDATA[Marcus J. Carey]]></itunes:author><googleplay:owner><![CDATA[donthackonme@substack.com]]></googleplay:owner><googleplay:email><![CDATA[donthackonme@substack.com]]></googleplay:email><googleplay:author><![CDATA[Marcus J. Carey]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[DHOM SitRep #002: First Chrome Zero-Day of 2026, Singapore Evicts Chinese Hackers from All 4 Telcos, and AI-Built Malware Goes Multi-Cloud]]></title><description><![CDATA[CVE-2026-2441 hits 70% of browsers. UNC3886 owned Singapore's telecom backbone. VoidLink is the first malware framework built by AI. Plus: PANW closes $25B CyberArk deal, two security pros convicted]]></description><link>https://www.donthackonme.com/p/dhom-sitrep-002-first-chrome-zero</link><guid isPermaLink="false">https://www.donthackonme.com/p/dhom-sitrep-002-first-chrome-zero</guid><dc:creator><![CDATA[Marcus J. Carey]]></dc:creator><pubDate>Tue, 17 Feb 2026 13:00:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XDNL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XDNL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XDNL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!XDNL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!XDNL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!XDNL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XDNL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png" width="1456" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:710038,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.donthackonme.com/i/188226034?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XDNL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!XDNL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!XDNL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!XDNL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Don&#8217;t Hack On Me -- Situation Report February 18, 2026 // Weekly Security Operations Brief</em></p><h2>TL;DR</h2><p>&#8226; Situation: Chrome zero-day CVE-2026-2441 is being exploited now &#8212; update every Chromium browser you own</p><p>&#8226; Enemy Activity: Singapore telecom espionage, Shadow Campaigns across 37 countries, BeyondTrust exploited in hours, exfiltration-only ransomware surging 450%, Ivanti sleeper shells in European governments</p><p>&#8226; Friendly Forces: CISA adds 10+ vulns to KEV, Darktrace publishes BeyondTrust detection logic, 10 ICS advisories dropped</p><p>&#8226; Logistics: Palo Alto Networks closes $25B CyberArk acquisition &#8212; largest deal in security history</p><p>&#8226; AI Operations: OpenAI&#8217;s GPT-5.3-Codex rated &#8220;High&#8221; cyber risk, VoidLink is first AI-built malware framework, Microsoft discovers AI memory poisoning</p><p>&#8226; Personnel: Two cybersecurity pros convicted as BlackCat ransomware operators; CISA faces 40% workforce cuts</p><h2>Situation</h2><p>Google released an emergency Chrome update on Friday to patch CVE-2026-2441 &#8212; a high-severity (CVSS 8.8) use-after-free vulnerability in the Blink rendering engine&#8217;s CSS implementation that&#8217;s being actively exploited in the wild. It&#8217;s the first Chrome zero-day of 2026. Google confirmed exploitation exists while saying absolutely nothing about who&#8217;s doing it or who&#8217;s being targeted.</p><p>Here&#8217;s what makes this matter to everyone reading this: it&#8217;s not just Chrome. Every browser built on Chromium is affected. Edge, Brave, Opera, Vivaldi, Arc, Perplexity&#8217;s Comet browser &#8212; roughly 70% of global browser market share runs on a single engine. One vulnerability, one codebase, most of the internet&#8217;s browsers need a patch. Chrome&#8217;s fixed versions are 145.0.7632.75/76 for Windows and Mac, and 144.0.7559.75 for Linux. Don&#8217;t wait for auto-update on an actively exploited zero-day. Go to chrome://settings/help, force the update, restart.</p><h2>Enemy Activity</h2><p><a href="https://www.channelnewsasia.com/singapore/cyber-attack-telecoms-starhub-m1-simba-singtel-4881301">Singapore Mounts Largest Cyber Operation After UNC3886 Breaches All 4 Telcos</a> - China-linked APT UNC3886 compromised all four of Singapore&#8217;s major telecom providers &#8212; Singtel, M1, StarHub, and SIMBA &#8212; using a zero-day firewall exploit. This is the most significant nation-state telecom compromise disclosed this year.</p><p><a href="https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/">70 Orgs Hacked Across 37 Countries &#8212; Unit 42&#8217;s Shadow Campaigns</a> - State-aligned cyberespionage group TGR-STA-1030 compromised over 70 organizations across 37 countries using only N-day exploits with patches available, some dating back to 2019.</p><p><a href="https://www.helpnetsecurity.com/2026/02/13/beyondtrust-cve-2026-1731-poc-exploit-activity/">BeyondTrust CVE-2026-1731: Exploited Within Hours of PoC Release</a> - BeyondTrust patched CVE-2026-1731 (CVSS 9.9) &#8212; a critical pre-auth RCE. By February 13, exploitation was confirmed in the wild.</p><p><a href="https://www.morphisec.com/blog/ransomware-without-encryption-why-pure-exfiltration-attacks-are-surging-and-why-theyre-so-hard-to-catch/)">Exfiltration-Only Ransomware Surging 450% </a>- Attackers are abandoning encryption entirely &#8212; no data locker needed, no EDR triggers.</p><p><a href="https://thehackernews.com/2026/02/83-of-ivanti-epmm-exploits-linked-to.html">Ivanti EPMM &#8220;Sleeper Shells&#8221;</a> &#8212; European Commission, Dutch and Finnish Governments Breached - Ivanti EPMM vulnerabilities are under widespread exploitation with dormant &#8220;sleeper&#8221; web shells planted.</p><h2>Friendly Forces</h2><p><a href="https://www.cisa.gov/news-events/alerts/2026/02/10/cisa-adds-six-known-exploited-vulnerabilities-catalog">CISA Adds 10+ Vulnerabilities to KEV Catalog in February</a> - CISA added vulnerabilities including SolarWinds Web Help Desk, six Microsoft zero-days, and BeyondTrust CVE-2026-1731. If you&#8217;re not using KEV as a private-sector patching signal, start.</p><p><a href="https://www.darktrace.com/blog/cve-2026-1731-how-darktrace-sees-the-beyondtrust-exploitation-wave-unfolding">Darktrace Publishes BeyondTrust CVE-2026-1731 Detection Analysis</a> - Actionable content for security teams building detections.</p><p><a href="https://www.cisa.gov/news-events/ics-advisories">CISA Releases 10+ ICS Advisories for Critical Infrastructure</a> - OT/ICS teams should review these immediately.</p><h2>Logistics</h2><p><a href="https://www.paloaltonetworks.com/company/press/2026/palo-alto-networks-completes-acquisition-of-cyberark-to-secure-the-ai-era">Palo Alto Networks Closes $25B CyberArk Acquisition</a> &#8212; Largest in Security History - Identity Security becomes PANW&#8217;s third core pillar. Machine identities already outnumber human identities 80-to-1, and AI agent identities are the next frontier.</p><h2>AI Operations</h2><p><a href="https://openai.com/index/trusted-access-for-cyber/">OpenAI Built an AI That Can Hack Hardened Targets</a> - GPT-5.3-Codex is the first AI model OpenAI classifies as &#8220;High&#8221; risk for cybersecurity. Their answer: Trusted Access for Cyber, backed by $10M in API credits for defensive research.</p><p><a href="https://research.checkpoint.com/2026/voidlink-the-cloud-native-malware-framework/)">VoidLink: First Malware Framework Built by AI</a> - 88,000 lines of code, targets AWS, Azure, GCP, Alibaba, and Tencent cloud environments. A single developer produced what would normally require a team.</p><p><a href="https://www.microsoft.com/en-us/security/blog/2026/02/10/ai-recommendation-poisoning/">Microsoft Discovers AI Recommendation Poisoning</a> - One click can poison an AI assistant&#8217;s memory, causing subtly biased recommendations.</p><h2>Personnel</h2><p><a href="https://www.securityweek.com/two-us-cybersecurity-pros-plead-guilty-over-ransomware-attacks/">Two Cybersecurity Pros Plead Guilty as BlackCat/ALPHV Ransomware Affiliates</a> - A ransomware negotiator and an incident responder were secretly running attacks. This is the insider threat case that should make every security organization reconsider vetting.</p><p><a href="https://www.scworld.com/perspective/a-sober-look-at-the-recent-cuts-at-cisa)">CISA Faces 40% Workforce Cuts</a> &#8212; Red Teams Dismantled - Up to 1,300 positions on the chopping block. The irony is not lost on anyone.</p><h2>What Does This Mean to Me?</h2><p>If you&#8217;re in security operations: Update Chrome and every Chromium-based browser in your environment right now. Check exposure against BeyondTrust and Ivanti vulnerabilities. Hunt for IOCs from the Unit 42 Shadow Campaigns report.</p><p>If you&#8217;re in leadership: Three themes - the Chromium monoculture risk, identity as the new perimeter (PANW/CyberArk deal), and the insider threat conviction that should be a board-level conversation.</p><p>If you&#8217;re breaking in: Pay attention to VoidLink. Learn cloud security. The gap between &#8220;one person with AI&#8221; and &#8220;a team without it&#8221; is closing fast.</p><h2>The Debrief</h2><p>This week&#8217;s SitRep has AI fingerprints all over it. VoidLink proved that a single developer with an AI coding agent can produce an 88,000-line malware framework. AI is the multiplier on both sides. The teams that adopt AI into their security workflows now will be setting the pace. Everyone else will be patching to keep up.</p><p>End of SitRep. Stay alert. Don&#8217;t let them hack on you.</p><p>Subscribe to <a href="https://donthackonme.substack.com)">Don&#8217;t Hack On Me</a> | <a href="https://donthackonme.com">donthackonme.com</a></p><p><em>This post was researched, drafted, and edited with AI assistance. The analysis and perspective are Marcus&#8217;s. See something wrong? Leave a comment.</em></p>]]></content:encoded></item><item><title><![CDATA[First Chrome Zero-Day of 2026 Is Being Exploited Right Now — Update Every Chromium Browser You Own]]></title><description><![CDATA[CVE-2026-2441: A use-after-free in Chrome's CSS engine. Google won't say who's exploiting it. Patch is live. Don't wait for auto-update.]]></description><link>https://www.donthackonme.com/p/first-chrome-zero-day-of-2026-is</link><guid isPermaLink="false">https://www.donthackonme.com/p/first-chrome-zero-day-of-2026-is</guid><dc:creator><![CDATA[Marcus J. Carey]]></dc:creator><pubDate>Mon, 16 Feb 2026 17:44:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!paWo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!paWo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!paWo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!paWo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!paWo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!paWo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!paWo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png" width="1456" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:710038,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://donthackonme.substack.com/i/188140165?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!paWo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!paWo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!paWo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!paWo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66a2335b-f3c9-40a5-9d58-5b1a32f95eb8_5000x3000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Don&#8217;t Hack On Me &#8212; Signal February 16, 2026<em><br><br>The Story</em></h2><p>Google released an emergency Chrome update on Friday to patch CVE-2026-2441 &#8212; a high-severity (CVSS 8.8) use-after-free vulnerability in Chrome&#8217;s CSS engine that&#8217;s being actively exploited in the wild. It&#8217;s the first Chrome zero-day of 2026, and Google is doing what Google always does: confirming exploitation exists while saying absolutely nothing about who&#8217;s doing it or who&#8217;s being targeted.</p><p>The vulnerability is an iterator invalidation bug in CSSFontFeatureValuesMap &#8212; Chrome&#8217;s implementation of CSS font feature values. When Chrome parses stylesheets and applies them to the DOM, certain sequences of operations cause premature memory deallocation. An attacker can reallocate that freed memory with malicious data, redirecting execution flow. The attack is delivered via a crafted HTML page, meaning phishing links or compromised websites are the likely vector. Security researcher Shaheen Fazim discovered and reported the flaw on February 11. Google patched it two days later on February 13.</p><p>Here&#8217;s the part that matters: this isn&#8217;t just a Chrome problem. Every browser built on Chromium is affected &#8212; Microsoft Edge, Brave, Opera, Vivaldi, Arc, and any other Chromium-based browser you&#8217;re running. That&#8217;s roughly 70% of global browser market share running on a single engine. One vulnerability, one codebase, and most of the internet&#8217;s browsers need a patch. Chrome&#8217;s fixed versions are 145.0.7632.75/76 for Windows and Mac, and 144.0.7559.75 for Linux. Other Chromium browsers will ship their own patches as they pull in the fix.For context, Chrome had roughly 8 actively exploited zero-days in 2025 and 7 in 2024. That&#8217;s averaging close to one per month. Browser zero-days aren&#8217;t rare events anymore &#8212; they&#8217;re a recurring line item in your patching calendar.</p><h2>What Does This Mean to Me?</h2><p>If you&#8217;re in security operations: Update Chrome right now. Don&#8217;t wait for the auto-update cycle &#8212; this is an actively exploited zero-day, and you don&#8217;t know where this is going to show up. Go to chrome://settings/help, force the update, and restart your browser. If you manage endpoints, push the update through MDM immediately. Don&#8217;t rely on auto-update for a zero-day.</p><p>And it&#8217;s not just Chrome. Chromium is the backbone of almost everything. Edge, Brave, Opera, Vivaldi &#8212; and it goes beyond the obvious ones. Perplexity&#8217;s Comet browser runs on Chromium. Arc runs on Chromium. If it&#8217;s a browser and it&#8217;s not Firefox or Safari, it&#8217;s probably Chromium. Every one of those needs to be updated once their vendor ships the fix. Make sure you know which Chromium-based browsers are running in your environment, because your users might be on browsers your asset inventory doesn&#8217;t even track.</p><p>Everyone should have automatic browser updates enabled &#8212; that&#8217;s table stakes. But for an actively exploited zero-day, automatic isn&#8217;t fast enough. Manual update. Now.</p><p>If you&#8217;re in leadership: The Chromium monoculture is something worth thinking about. One vulnerability in one codebase just put ~70% of the world&#8217;s browsers at risk. Google patches fast &#8212; two days from report to fix is impressive &#8212; and Chrome&#8217;s sandbox architecture limits the blast radius of any single exploit. That&#8217;s the upside. The downside is that when the Chromium engine has a flaw, the attack surface is enormous.</p><p>This isn&#8217;t a &#8220;switch browsers&#8221; argument. The security benefits of Chromium&#8217;s architecture and update cadence are real. But it is an argument for making sure your browser patching is as tight as your OS patching. Browser zero-days are averaging one per month across 2024 and 2025. That&#8217;s not a spike &#8212; it&#8217;s the baseline. If your patching program doesn&#8217;t treat browser updates with the same urgency as OS patches, it&#8217;s time to fix that.</p><p>The bigger picture: We&#8217;ve normalized browser zero-days. Chrome had 7 in 2024, 8 in 2025, and the first one of 2026 just dropped. Google&#8217;s response is always the same &#8212; confirm exploitation, withhold details, ship a patch. The 2-day turnaround is genuinely good. But the cadence tells you something: browsers are one of the most valuable attack surfaces on the internet, and threat actors are investing heavily in finding and exploiting browser vulnerabilities. The best defense is the simplest one: keep your browser updated, and when a zero-day drops, don&#8217;t wait. Update now.</p><p>Stay alert. Don&#8217;t let them hack on you.Subscribe to Don&#8217;t Hack On Me | donthackonme.com</p><p><em>This post was researched, drafted, and edited with AI assistance. The analysis and perspective are Marcus&#8217;s. See something wrong? Leave a comment.</em></p><p></p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[OpenAI Built an AI That Can Hack Hardened Targets — Now They're Deciding Who Gets to Use It]]></title><description><![CDATA[GPT-5.3-Codex is the first AI model its own maker calls &#8216;high risk&#8217; for cyber. The Trusted Access program is their answer. Is it enough?]]></description><link>https://www.donthackonme.com/p/openai-built-an-ai-that-can-hack</link><guid isPermaLink="false">https://www.donthackonme.com/p/openai-built-an-ai-that-can-hack</guid><dc:creator><![CDATA[Marcus J. Carey]]></dc:creator><pubDate>Mon, 16 Feb 2026 01:32:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qDtA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qDtA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qDtA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!qDtA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!qDtA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!qDtA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qDtA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png" width="1456" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:710038,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://donthackonme.substack.com/i/188005234?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qDtA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!qDtA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!qDtA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!qDtA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c06c8a9-6196-4900-9e9e-d23e5c6dc3c2_5000x3000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Don&#8217;t Hack On Me &#8212; Signal February 15, 2026</p><h2>The Story</h2><p>On February 5, OpenAI released GPT-5.3-Codex &#8212; and quietly made history. It&#8217;s the first AI model that OpenAI itself classifies as &#8220;High&#8221; risk for cybersecurity under their Preparedness Framework. That classification means OpenAI believes the model can automate end-to-end cyber operations against reasonably hardened targets, or automate the discovery and exploitation of operationally relevant vulnerabilities. Read that again. The company that built it is telling you it can hack things.</p><p>The capability curve has been steep. OpenAI&#8217;s models went from a 27% success rate on capture-the-flag cybersecurity challenges (GPT-5, August 2025) to 76% (GPT-5.1-Codex-Max, November 2025). GPT-5.3-Codex pushes that further. The company also has Aardvark, an agentic security researcher in private beta that scans codebases, reasons over entire repositories, finds vulnerabilities, and proposes patches. Aardvark has already discovered and responsibly disclosed vulnerabilities that received 10 CVE identifiers in open source projects.</p><p>So what&#8217;s OpenAI&#8217;s answer to releasing a model that can hack hardened targets? A program called Trusted Access for Cyber &#8212; an identity and trust-based framework that gates enhanced cyber capabilities behind verification. Vetted security professionals get access. Everyone else gets guardrails. Individual users can verify their identity; enterprises can request trusted access for teams. There&#8217;s also an invite-only tier for security researchers who need more permissive models. OpenAI is backing it with $10 million in API credits for defensive cyber research.</p><p>Not everyone is satisfied with the safeguards. The Midas Project, an AI safety watchdog, pointed out that GPT-5.3-Codex triggered OpenAI&#8217;s own &#8220;high risk&#8221; threshold but was deployed without the specific misalignment safeguards the Preparedness Framework calls for at that level. OpenAI&#8217;s response: those safeguards are only required when high cyber capability occurs in conjunction with long-range autonomy. The model is a powerful tool, not an autonomous agent &#8212; the distinction matters.</p><p>Source:<a href="https://openai.com/index/trusted-access-for-cyber/">Trusted Access for Cyber</a> (OpenAI, February 5, 2026</p><h2>Who&#8217;s Covering This</h2><ul><li><p><a href="https://fortune.com/2026/02/05/openai-gpt-5-3-codex-warns-unprecedented-cybersecurity-risks/">Fortune</a> &#8212; &#8220;Unprecedented cybersecurity risks.&#8221; Focuses on the tension between capability advancement and safety. (February 5, 2026)</p></li><li><p><a href="https://cdn.openai.com/pdf/23eca107-a9b1-4d2c-b156-7deb4fbc697c/GPT-5-3-Codex-System-Card-02.pdf">OpenAI System Card</a> &#8212; The technical system card detailing the &#8220;High&#8221; cybersecurity risk classification and mitigation approach. (February 5, 2026)</p></li><li><p><a href="https://www.scworld.com/brief/openai-launches-trusted-access-for-cyber-initiative-to-bolster-ai-security">SC Media</a> &#8212; Covers the Trusted Access launch and $10 million in API credits for defensive research. (February 2026)</p></li><li><p><a href="https://openai.com/index/strengthening-cyber-resilience/">OpenAI &#8212; Strengthening Cyber Resilience</a> &#8212; OpenAI&#8217;s broader strategy post explaining how they&#8217;re planning for models that could develop zero-day exploits against well-defended systems. (February 2026)</p></li><li><p><a href="https://openai.com/index/introducing-aardvark/">OpenAI &#8212; Introducing Aardvar</a>k &#8212; The agentic security researcher that scans codebases and has already found 10 CVEs in open source projects. (October 2025)</p></li></ul><p>If you&#8217;re in cybersecurity operations: This is a tools story, and you should think about it the way you think about every powerful tool that&#8217;s come through this industry. Cobalt Strike was supposed to be a penetration testing tool. Metasploit was supposed to be a penetration testing tool. Both ended up in the hands of threat actors. That&#8217;s going to happen with AI cyber capabilities too &#8212; it&#8217;s not a question of if, it&#8217;s a question of when. The question is whether defenders get to use these tools first.</p><p>OpenAI&#8217;s Trusted Access program is an attempt to put these capabilities in the hands of the good guys before the bad guys figure it out on their own. If you&#8217;re a security practitioner or your team does vulnerability management, pen testing, or code review &#8212; apply. Get in early. Start experimenting with what these models can do for your workflows now, because the attackers aren&#8217;t waiting for an access program. The $10 million in API credits is real money on the table for defensive research. Take advantage of it.</p><p>If you&#8217;re in leadership: The models are getting better &#8212; fast. OpenAI went from 27% on CTF challenges to 76% in three months. GPT-5.3-Codex is even better. And OpenAI isn&#8217;t the only one: Hacktron AI found the BeyondTrust variant through AI-enabled analysis just weeks ago. This isn&#8217;t theoretical anymore. AI systems are finding real vulnerabilities at production scale.</p><p>What does that mean for your program? Vulnerability volume is going to increase. AI is going to find more bugs faster &#8212; both by the good guys doing responsible disclosure and by the bad guys scanning for exploitable targets. Your vulnerability management program needs to be ready for a world where the rate of CVE discovery accelerates. FIRST is already projecting 50,000+ CVEs in 2026 &#8212; a record. The organizations that integrate AI into their defensive workflows early will have an advantage. The ones that don&#8217;t will be patching faster just to keep up.</p><p>The safety debate around the Midas Project&#8217;s criticism is worth watching but shouldn&#8217;t distract from the practical reality: OpenAI&#8217;s logic makes sense here. A high-capability tool without autonomous agency is still just a tool &#8212; it needs a human operator. The risk profile is fundamentally different from an autonomous agent that can chain operations independently. The real risk isn&#8217;t the model itself. It&#8217;s who gets access and what they do with it.</p><p>The bigger picture: Every generation of security tooling follows the same pattern. A powerful capability emerges. It gets built for defense. It ends up in offense. The defenders who adopted early had the advantage; the ones who waited were playing catch-up. We saw it with Metasploit, we saw it with Cobalt Strike, and we&#8217;re going to see it with AI cyber capabilities. Sometimes you don&#8217;t know what software is going to be used for &#8212; even Sam Altman has said they&#8217;ve been surprised by how their models get applied. The capability is here. The question isn&#8217;t whether AI can hack things &#8212; OpenAI just told you it can. The question is whether you&#8217;re going to use it to find the holes before someone else does.</p><p></p><p><em>This post was researched, drafted, and edited with AI assistance. The analysis and perspective are Marcus&#8217;s. See something wrong? Leave a comment.</em></p><p></p>]]></content:encoded></item><item><title><![CDATA[70 Orgs Hacked Across 37 Countries — And the Vendor That Found It Won’t Say Who Did It]]></title><description><![CDATA[Unit 42's Shadow Campaigns report exposes massive state espionage. Reuters says Palo Alto stripped the China attribution. Here's why it doesn't matter.]]></description><link>https://www.donthackonme.com/p/70-orgs-hacked-across-37-countries</link><guid isPermaLink="false">https://www.donthackonme.com/p/70-orgs-hacked-across-37-countries</guid><dc:creator><![CDATA[Marcus J. Carey]]></dc:creator><pubDate>Sun, 15 Feb 2026 18:49:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_yMy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_yMy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_yMy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!_yMy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!_yMy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!_yMy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_yMy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png" width="1456" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:949442,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://donthackonme.substack.com/i/188057195?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_yMy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!_yMy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!_yMy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!_yMy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8131aa7-4885-45cb-a46c-cb268351b389_5000x3000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Don&#8217;t Hack On Me &#8212; Signal</p><p>February 15, 2026</p><h2>The Story</h2><p>Palo Alto&#8217;s Unit 42 dropped a report on February 5 detailing what they&#8217;re calling the &#8220;Shadow Campaigns&#8221; &#8212; a state-aligned cyberespionage operation that compromised over 70 organizations across 37 countries in the past year. The group, tracked as TGR-STA-1030 (also known as UNC6619), has been active since at least January 2024 and hit some of the highest-value targets on the board: national law enforcement agencies, ministries of finance and foreign affairs, a parliament, a senior elected official, and national telecom providers. Between November and December 2025 alone, they conducted active reconnaissance against government infrastructure in 155 countries. That&#8217;s roughly one in five nations on earth.</p><p>The technical details are serious. The group deployed a previously unknown Linux kernel rootkit called ShadowGuard &#8212; an eBPF-based rootkit that runs in kernel space without appearing as a loadable module, making it extremely difficult to detect with conventional tools. It can hide up to 32 processes simultaneously, intercept system calls, and conceal files and directories. They also rotated through Cobalt Strike, VShell (a Go-based C2), Havoc, SparkRat, and Sliver across different phases of the campaign. Their persistence toolkit included Behinder and Godzilla web shells, plus GOST and FRPS tunneling tools.</p><p>Here&#8217;s where it gets interesting &#8212; and where the story becomes about more than just TTPs. Unit 42&#8217;s published report attributed TGR-STA-1030 to a &#8220;state-aligned group that operates out of Asia&#8221; with &#8220;activity patterns aligned with GMT+8.&#8221; That&#8217;s deliberately vague. On February 12, Reuters reported that the original draft of the report attributed the campaign to China. According to Reuters, Palo Alto Networks executives &#8212; not the researchers &#8212; ordered the attribution stripped. The reason: fear of retaliation from Beijing. Palo Alto has five offices in China and was among roughly 15 U.S. and Israeli cybersecurity firms that China has banned on national security grounds. The company denied the claims.</p><p><strong>Source</strong>: <a href="https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/">The Shadow Campaigns: Uncovering Global Espionage </a>(Unit 42, February 5, 2026)</p><h2>Who&#8217;s Covering This</h2><ul><li><p><a href="https://finance.yahoo.com/news/exclusive-palo-alto-chose-not-180250244.html">Reuters</a> &#8212; Broke the exclusive that Palo Alto execs overrode researchers and stripped China attribution from the report due to fear of retaliation from Beijing. The real story behind the story. (February 12, 2026)</p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/state-actor-targets-155-countries-in-shadow-campaigns-espionage-op/">BleepingComputer</a> &#8212; Emphasizes the reconnaissance scope: 155 countries scanned, 37 compromised, critical infrastructure across the board. (February 5, 2026)</p></li><li><p><a href="https://www.securityweek.com/cyberspy-group-hacked-governments-and-critical-infrastructure-in-37-countries/">SecurityWeek</a> &#8212; Focuses on victim types &#8212; ministries, law enforcement, border control &#8212; and the ShadowGuard rootkit discovery. (February 5, 2026)</p></li><li><p><strong><a href="https://thehackernews.com/2026/02/asian-state-backed-group-tgr-sta-1030.html">The Hacker News</a> &#8212; Technical breakdown of the breach scale, phishing lures, and the Diaoyu loader malware. (February 6, 2026)</strong></p></li><li><p><strong><a href="https://www.scworld.com/brief/attribution-of-sprawling-cyberespionage-campaign-reportedly-held-back-amid-china-retaliation-fears">SC Media</a> &#8212; Covers the attribution controversy angle &#8212; corporate self-censorship in threat intelligence reporting. (February 2026)</strong></p></li></ul><h2>What Does This Mean to Me?</h2><p><strong>If you&#8217;re in the security operations: </strong>Here&#8217;s the thing that matters most: this group used zero zero-days. Every exploit in their toolkit was an N-day &#8212; known vulnerabilities with patches available, some dating back to 2019. They weaponized Microsoft Exchange RCE, SAP Solution Manager privilege escalation, Atlassian Crowd (CVE-2019-11580), and D-Link RCE, among others. A state-aligned group that compromised 70+ organizations across 37 countries did it with bugs you&#8217;ve had patches for. That&#8217;s your action item. Check your exposure against the CVEs listed in the Unit 42 report. Hunt for the IOCs &#8212; they published IP addresses, domains, and file hashes. And if you&#8217;re running Linux infrastructure, understand that eBPF-based rootkits like ShadowGuard represent a real detection gap. Traditional kernel module monitoring won&#8217;t catch it. Start looking at eBPF monitoring capabilities in your stack.</p><p>If <strong>you&#8217;re in leadership</strong>: The attribution controversy is worth paying attention to &#8212; but not for the reasons the headlines suggest. Reuters reporting that Palo Alto stripped China attribution under corporate pressure is a reminder that threat intelligence from vendors is filtered through commercial interests. That&#8217;s always been true, but it&#8217;s rarely this visible. Factor that into how you consume vendor threat intel.</p><p>But here&#8217;s the bigger point: <strong>it doesn&#8217;t matter who the adversary is.</strong> Whether this is China, Russia, or anyone else operating out of GMT+8 &#8212; the vulnerabilities they exploited are the same. The patches are the same. The defensive actions are the same. We spend too much time in this industry debating flags and not enough time patching the CVEs from 2019 that state-sponsored groups are still using to walk through the front door. The targeting in this campaign aligned with geopolitical interests &#8212; rare earth mining deals, diplomatic pressure points, trade negotiations &#8212; but the exploitation was pure opportunism against unpatched systems. Attribution is interesting. Patching is what keeps you from being in the next report.</p><p>The bigger picture: A state-aligned espionage group hit 70 organizations across 37 countries using nothing but known vulnerabilities, commodity C2 frameworks, and one novel rootkit. They compromised parliaments, ministries, and law enforcement agencies. And when the security vendor that discovered it tried to tell the world who did it, corporate leadership said no. Every part of that sentence should bother you &#8212; but the part you can actually control is whether your systems are patched. Start there.</p><p>Stay alert. Don&#8217;t let them hack on you.</p><p><a href="https://donthackonme.substack.com/">Subscribe to Don&#8217;t Hack On Me</a></p><p><em>This post was researched, drafted, and edited with AI assistance. The analysis and perspective are Marcus&#8217;s. See something wrong? Leave a comment.</em></p><p></p>]]></content:encoded></item><item><title><![CDATA[BeyondTrust's Treasury Breach Flaw Has a Sequel — And Attackers Found It in 24 Hours]]></title><description><![CDATA[CVE-2026-1731: AI found it, hackers exploited it, CISA gave you 3 days to patch.]]></description><link>https://www.donthackonme.com/p/beyondtrusts-treasury-breach-flaw</link><guid isPermaLink="false">https://www.donthackonme.com/p/beyondtrusts-treasury-breach-flaw</guid><dc:creator><![CDATA[Marcus J. Carey]]></dc:creator><pubDate>Sun, 15 Feb 2026 01:18:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dfMB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dfMB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dfMB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!dfMB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!dfMB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!dfMB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dfMB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png" width="1456" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:878223,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://donthackonme.substack.com/i/187998147?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dfMB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!dfMB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!dfMB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!dfMB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa65e1b0-4d13-468a-bad7-0befd39da5ca_5000x3000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Don&#8217;t Hack On Me &#8212; Signal February 14, 2026</p><h2>The Story</h2><p>Remember the BeyondTrust vulnerability that let Chinese state-sponsored group Silk Typhoon breach the U.S. Treasury Department in late 2024? Same product. Same WebSocket endpoint. New code path. And this time it&#8217;s worse.</p><p>CVE-2026-1731 is a critical (CVSS 9.9) pre-authentication remote code execution vulnerability in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA). An unauthenticated attacker can execute arbitrary OS commands via specially crafted requests &#8212; no credentials required, no user interaction needed. It affects RS versions 25.3.1 and prior and PRA versions 24.3.4 and prior. Roughly 8,500 self-hosted instances are exposed to the internet, and BeyondTrust serves 20,000+ customers including 75% of the Fortune 100.</p><p>Here&#8217;s where it gets interesting: this vulnerability was discovered by Hacktron AI through AI-enabled variant analysis of CVE-2024-12356 &#8212; the same vulnerability class that enabled the Treasury breach. An AI system found a variant of a nation-state-exploited flaw through automated analysis. That&#8217;s a first worth paying attention to.</p><p>The timeline is aggressive. BeyondTrust published advisory BT26-02 on February 6 and auto-patched SaaS customers on February 2. A proof-of-concept exploit hit GitHub on February 10. GreyNoise detected active reconnaissance probing within 24 hours. Attackers are already in the wild &#8212; Arctic Wolf confirmed exploitation attempts deploying the SimpleHelp RMM tool for persistence and lateral movement. CISA added CVE-2026-1731 to the Known Exploited Vulnerabilities catalog on February 13 with a remediation deadline of February 16. That&#8217;s a three-day window. CISA doesn&#8217;t do that unless it&#8217;s bad.</p><p>Source:<a href="https://www.beyondtrust.com/trust-center/security-advisories/bt26-02"> BT26-02 Security Advisory</a> (BeyondTrust, February 6, 2026)</p><h2>Who&#8217;s Covering This</h2><ul><li><p><a href="https://www.rapid7.com/blog/post/etr-cve-2026-1731-critical-unauthenticated-remote-code-execution-rce-beyondtrust-remote-support-rs-privileged-remote-access-pra/">Rapid7</a> &#8212; Technical breakdown of the vulnerability, affected versions, and fix versions. (February 9, 2026)</p></li><li><p><a href="https://www.greynoise.io/blog/reconnaissance-beyondtrust-rce-cve-2026-1731">GreyNoise</a> &#8212; Active scanning detected within 24 hours of PoC release. Also observed the old Silk Typhoon exploit chain (CVE-2024-12356 + CVE-2025-1094) still being replayed as recently as January 2026. (February 12, 2026)</p></li><li><p><a href="https://thehackernews.com/2026/02/researchers-observe-in-wild.html">The Hacker News</a> &#8212; Confirmed in-the-wild exploitation of the CVSS 9.9 vulnerability. (February 2026)</p></li><li><p><a href="https://www.hacktron.ai/blog/cve-2026-1731-beyondtrust-remote-support-rce">Hacktron AI</a> &#8212; The discoverers. Describes how AI-enabled variant analysis found the flaw and the responsible disclosure process. (February 6, 2026)</p></li><li><p><a href="https://www.cisa.gov/news-events/alerts/2026/02/13/cisa-adds-one-known-exploited-vulnerability-catalog">CISA</a> &#8212; Added to KEV catalog with a February 16 remediation deadline. (February 13, 2026)</p></li><li><p><a href="https://arcticwolf.com/resources/blog/cve-2026-1731/">Arctic Wolf</a> &#8212; Detected attackers exploiting CVE-2026-1731 to deploy SimpleHelp RMM tool for persistence and lateral movement. (February 2026)</p></li></ul><h2>What Does This Mean to Me?</h2><p>If you&#8217;re in security operations: If your organization runs BeyondTrust Remote Support or Privileged Remote Access on-prem, this is a drop-everything patch. Self-hosted instances need to be updated immediately &#8212; CISA&#8217;s three-day window ends February 16. SaaS customers were auto-patched on February 2, but verify with your BeyondTrust admin. While you&#8217;re at it, hunt for indicators of the SimpleHelp RMM tool in your environment &#8212; Arctic Wolf confirmed attackers are deploying it post-exploitation for persistence and lateral movement. If you had unpatched instances exposed to the internet before the fix, assume possible compromise and scope an investigation.</p><p>Also worth noting: GreyNoise observed the old Silk Typhoon exploit chain (CVE-2024-12356) still being replayed as recently as January 2026. If you patched the first one but haven&#8217;t patched this new variant, you&#8217;re still exposed on the same endpoint.</p><p>If you&#8217;re in leadership: This is the same product that enabled a nation-state breach of the U.S. Treasury, and it&#8217;s the same vulnerability class on the same endpoint. That&#8217;s a pattern, not a coincidence. If your organization relies on BeyondTrust for privileged access &#8212; and if you&#8217;re in the Fortune 100, there&#8217;s a 75% chance you do &#8212; this should trigger a broader conversation about your architecture. Privileged access tools sit at the heart of your trust model. When they have pre-auth RCE flaws, attackers don&#8217;t need credentials. They don&#8217;t even need to knock.</p><p>The AI discovery angle matters for your strategy too. This is one of the first major CVEs discovered by an AI system through variant analysis. That&#8217;s going to accelerate. Vulnerability discovery is getting faster on both sides &#8212; AI is finding bugs before and after the bad guys. The good news: responsible disclosure worked here. Hacktron found it, reported it, BeyondTrust patched it. But the window between disclosure and exploitation is shrinking to hours, not days. Your patching programs need to match that pace.</p><p>The bigger picture: We&#8217;re going to see more of this. AI-enabled variant analysis means that when a vulnerability class is found in a product, every related code path in that product gets scrutinized at machine speed. For defenders, that&#8217;s ultimately good &#8212; bugs get found and fixed faster. For attackers, it means they can automate the same analysis. The race between discovery and exploitation is getting faster on both sides. The organizations that survive are the ones that can patch at the speed the threat demands. CISA giving a three-day remediation window is the clearest signal yet that the old &#8220;patch within 30 days&#8221; cadence is dead for critical vulns.</p><p>Stay alert. Don&#8217;t let them hack on you.</p><p><a href="https://donthackonme.substack.com/">Subscribe to Don't Hack On Me</a> </p><p><em>This post was researched, drafted, and edited with AI assistance. The analysis and perspective are Marcus&#8217;s. See something wrong? Leave a comment.</em></p>]]></content:encoded></item><item><title><![CDATA[DHOM SitRep #001: OpenClaw Exposes 135K Agents, Notepad++ Supply Chain Owned for 6 Months, and Microsoft Patches 6 Zero-Days]]></title><description><![CDATA[AI agents are the new shadow IT. Plus, a state-sponsored supply chain attack hid in plain sight, and Patch Tuesday brings six actively exploited zero-days.]]></description><link>https://www.donthackonme.com/p/dhom-sitrep-001-openclaw-exposes</link><guid isPermaLink="false">https://www.donthackonme.com/p/dhom-sitrep-001-openclaw-exposes</guid><dc:creator><![CDATA[Marcus J. Carey]]></dc:creator><pubDate>Fri, 13 Feb 2026 01:29:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Uzs5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F655eaae0-7029-49d2-ba23-8953d5c86c88_5000x3000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Don&#8217;t Hack On Me -- Situation Report</p><p>February 11, 2026 // Weekly Security Operations Brief</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.donthackonme.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Don't Hack On Me! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="image-gallery-embed" data-attrs="{&quot;gallery&quot;:{&quot;images&quot;:[{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/655eaae0-7029-49d2-ba23-8953d5c86c88_5000x3000.png&quot;}],&quot;caption&quot;:&quot;&quot;,&quot;alt&quot;:&quot;&quot;,&quot;staticGalleryImage&quot;:{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/655eaae0-7029-49d2-ba23-8953d5c86c88_5000x3000.png&quot;}},&quot;isEditorNode&quot;:true}"></div><h2>TL;DR</h2><ul><li><p>Situation: 135K OpenClaw AI agents exposed with critical RCE vulns &#8212; AI agents are the new shadow IT</p></li><li><p>Enemy Activity: Notepad++ supply chain owned by Lotus Blossom for 6 months; Microsoft patches 6 zero-days; Google disrupts massive proxy network; Signal phishing warning</p></li><li><p>Friendly Forces: SANS Protocol SIFT brings MCP to forensics; Wiz maps 70+ SDLC attack techniques; EDR silencing detection rules; security scorecarding guide</p></li><li><p>Logistics: Trail of Bits releases sandboxed Claude Code container; Cisco drops AI skill scanner</p></li><li><p>AI Operations: Google reports on threat actor AI misuse; Microsoft&#8217;s top 10 Copilot agent risks; the agent identity crisis</p></li><li><p>Personnel: SANS ICS Command Briefing 2026</p></li><li><p>The Debrief: Marcus&#8217;s take on the AI agent era</p></li></ul><h2>Situation</h2><p>This week, the security industry woke up to a problem it should have seen coming: AI agents are everywhere, and nobody&#8217;s securing them.</p><p>Over 135,000 OpenClaw AI agents were found exposed to the internet with critical RCE vulnerabilities. Researchers at Bitdefender and SecurityScorecard flagged the exposure. Roughly 386 malicious Skills were discovered on ClawHub targeting crypto wallets, LinkedIn, and Reddit -- racking up over 7,000 downloads before anyone noticed. Kaspersky published a deep-dive showing that default OpenClaw settings ship with no authentication on admin interfaces, and misconfigured reverse proxies expose everything. A fake ClawdBot VS Code extension was caught installing ScreenConnect RAT. And Moltbook, the AI-only social network, had a Supabase misconfiguration leaking every agent&#8217;s secret API keys.</p><p>This isn&#8217;t a single vulnerability. It&#8217;s a systemic failure. AI agents behave like users but execute like software. They have persistent memory, tool autonomy, and the ability to chain actions across systems -- and our security models were never built for that. As 1Password put it this week: agent identities need to be treated like new hires, with time-bound, revocable access. If your org is deploying AI agents and you haven&#8217;t thought about identity, permissions, and monitoring for them, this is your wake-up call.</p><h2>Enemy Activity</h2><p><a href="https://thehackernews.com/2026/02/notepad-hosting-breach-attributed-to.html">Notepad++ Supply Chain Compromised by Chinese State Hackers (Lotus Blossom)</a></p><p>The Notepad++ project disclosed that its sole update server was compromised by Lotus Blossom, a China-linked APT, between June and December 2025. Attackers selectively pushed malicious updates to targets in Vietnam, El Salvador, Australia, and the Philippines. Kaspersky found they rotated C2 servers, downloaders, and payloads monthly -- using Cobalt Strike, Metasploit, and a novel &#8220;Chrysalis&#8221; backdoor. IT admins running Notepad++ with elevated privileges were prime targets. Six months of access before detection. That&#8217;s the real story here.</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-february-2026-patch-tuesday-fixes-6-zero-days-58-flaws/">Microsoft February 2026 Patch Tuesday: 6 Zero-Days, 58 Flaws</a></p><p>Microsoft patched 58 vulnerabilities including six actively exploited zero-days and five Critical-rated flaws. The standout: CVE-2026-21510, a Windows Shell Security Feature Bypass that lets attackers bypass SmartScreen and Shell warning dialogs through crafted shortcut files. Microsoft also began rolling out new Secure Boot certificates ahead of the June 2026 legacy cert expiration. Patch now.</p><p><a href="https://cloud.google.com/blog/topics/threat-intelligence/disrupting-largest-residential-proxy-network">Google GTIG Disrupts IPIDEA, One of the World&#8217;s Largest Residential Proxy Networks</a></p><p>Google&#8217;s Threat Intelligence Group took down IPIDEA, which controlled 13 proxy/VPN brands and used malicious SDKs distributed through trojanized VPNs and uncertified Android TV boxes. Over 550 threat groups from China, DPRK, Iran, and Russia were observed using IPIDEA exit nodes in a single week. Google Play Protect removed 600+ Android apps. This is what large-scale infrastructure takedowns look like.</p><p><a href="https://thehackernews.com/2026/02/german-agencies-warn-of-signal-phishing.html">German BfV and BSI Warn of State-Sponsored Signal Phishing</a></p><p>Germany&#8217;s domestic intelligence agency (BfV) and federal cybersecurity agency (BSI) issued a joint advisory warning of state-sponsored phishing attacks targeting Signal users. If your org uses Signal for sensitive comms, share this advisory with your team.</p><h2>Friendly Forces</h2><p><a href="https://robtlee73.substack.com/p/introducing-protocol-sift-meeting">SANS Protocol SIFT: First Autonomous Framework Integrating MCP</a></p><p>SANS released Protocol SIFT, an autonomous forensics framework built on the Model Context Protocol (MCP). It orchestrates 200+ utilities in the SIFT Workstation, letting analysts match the velocity of AI-powered threats with deterministic, court-admissible evidence. This is the kind of tooling that changes how DFIR teams operate.</p><p><a href="https://www.wiz.io/blog/sitf-sdlc-threat-framework">Wiz SITF: SDLC Infrastructure Threat Framework</a></p><p>New open-source framework from Wiz mapping 70+ attack techniques across five SDLC pillars (Endpoint/IDE, VCS, CI/CD, Registry, Production). Includes an Attack Flow Visualizer for drag-and-drop threat modeling that runs entirely client-side. If you&#8217;re building or securing CI/CD pipelines, this is worth a look.</p><p><a href="https://ipurple.team/2026/01/12/edr-silencing/">EDR Silencing Techniques and Detection</a></p><p>Purple Team published an overview of six EDR silencing methods -- WFP abuse, hosts file modification, NRPT manipulation, IPSec filters, routing table tampering, and IPMute -- along with a SIGMA detection rule for WFP-blocked outbound connections. If you run an EDR, you should know how attackers try to blind it.</p><p><a href="https://ramimac.me/scorecarding">Security Scorecarding Programs That Work</a></p><p>Rami McCarthy published an overview of scorecarding in security programs with real-world examples from Chime, Netflix, GitHub, and Atlassian. Practical guidance for teams trying to measure security posture without drowning in vanity metrics.</p><h2>Logistics</h2><p><a href="https://github.com/trailofbits/claude-code-devcontainer">Trail of Bits: Claude Code DevContainer for Security Audits</a></p><p>Trail of Bits released a sandboxed devcontainer for running Claude Code in bypass mode safely during security audits. They also dropped Dropkit, a CLI for managing DigitalOcean droplets with automated setup and lifecycle management. Security-conscious AI tooling from a team that understands the risks.</p><p><a href="https://github.com/cisco-ai-defense/skill-scanner">Cisco Releases Skill Scanner for AI Agent Security</a></p><p>Cisco published Skill Scanner, an open-source tool for analyzing Claude and OpenAI skills for prompt injection, data exfiltration, and malicious code. As AI agent ecosystems grow, tools like this become essential for supply chain security.</p><h2>AI Operations</h2><p><a href="https://blog.google/innovation-and-ai/infrastructure-and-cloud/google-cloud/gtig-report-ai-cyber-attacks-feb-2026/">Google GTIG: How Threat Actors Are Misusing AI</a></p><p>Google&#8217;s Threat Intelligence Group published a new report on how threat actors use AI for gathering information, creating realistic phishing, and developing malware. The report also flagged frequent model extraction attacks -- corporate espionage targeting private AI models. Notably, APT actors aren&#8217;t yet directly attacking frontier models. They&#8217;re using them as tools, just like everyone else.</p><p><a href="https://www.microsoft.com/en-us/security/blog/2026/01/23/runtime-risk-realtime-defense-securing-ai-agents/">Microsoft: Top 10 Security Risks for Copilot Studio Agents</a></p><p>Microsoft published a guide on the top 10 security risks for Copilot Studio agents and how to detect and prevent them. Organizations are rapidly deploying these agents, and threat actors are equally fast at exploiting misconfigured AI workflows. If your org is building Copilot agents, this is required reading.</p><p><a href="https://newsletter.danielmiessler.com/p/unsupervised-learning-no-515">The Identity Problem for AI Agents</a></p><p>Multiple sources converged on the same theme this week: legacy IAM is static, but AI agents are non-deterministic. Daniel Miessler published security hardening recommendations for OpenClaw. 1Password argued that agent identities need the same rigor as human identities -- time-bound access, revocable credentials, full audit trails. The consensus is clear: agents should not inherit human permissions. They need their own identity layer.</p><h2>Personnel</h2><p>SANS ICS Command Briefing 2026</p><p>SANS announced the ICS Command Briefing 2026 and a virtual roundtable on Agile Incident Response spanning SOC, cloud, OT, and executive teams. If you&#8217;re in ICS/OT security or leading cross-functional IR, these are worth putting on the calendar.</p><h2>The Debrief</h2><p>Issue #001 lands in a week that makes one thing clear: the AI agent era didn&#8217;t announce itself. It just showed up -- with 135,000 exposed instances, malicious Skills on agent marketplaces, and security models that haven&#8217;t caught up.</p><p>We&#8217;ve been here before. Shadow IT. Cloud sprawl. Container explosion. Every time a new paradigm arrives, security teams are the last to know and the first expected to secure it. The difference this time is velocity. AI agents don&#8217;t wait for change management. They chain tools, make decisions, and act autonomously -- which is exactly what makes them useful and exactly what makes them dangerous.</p><p>The organizations that get ahead of this won&#8217;t be the ones that ban AI agents. They&#8217;ll be the ones that treat agent identity, agent permissions, and agent monitoring with the same rigor they apply to human users. Start there.</p><p>Stay alert. Don&#8217;t let them hack on you.</p><p>Subscribe to Don&#8217;t Hack On Me | donthackonme.com</p><p></p><p>This post was researched, drafted, and edited with AI assistance. The analysis and perspective are Marcus&#8217;s. See something wrong? Leave a comment.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.donthackonme.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Don't Hack On Me! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>