<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Don't Hack On Me: SitReps]]></title><description><![CDATA[Weekly cybersecurity intelligence briefings covering the most critical threats, vulnerabilities, and incidents commanders need to know about.]]></description><link>https://www.donthackonme.com/s/sitrep</link><image><url>https://substackcdn.com/image/fetch/$s_!K0fs!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7ab19c9-0834-442e-a4f5-f9a9a247465a_1280x1280.png</url><title>Don&apos;t Hack On Me: SitReps</title><link>https://www.donthackonme.com/s/sitrep</link></image><generator>Substack</generator><lastBuildDate>Thu, 16 Apr 2026 17:54:19 GMT</lastBuildDate><atom:link href="https://www.donthackonme.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Marcus J Carey]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[donthackonme@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[donthackonme@substack.com]]></itunes:email><itunes:name><![CDATA[Marcus J. Carey]]></itunes:name></itunes:owner><itunes:author><![CDATA[Marcus J. Carey]]></itunes:author><googleplay:owner><![CDATA[donthackonme@substack.com]]></googleplay:owner><googleplay:email><![CDATA[donthackonme@substack.com]]></googleplay:email><googleplay:author><![CDATA[Marcus J. Carey]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[DHOM SitRep #002: First Chrome Zero-Day of 2026, Singapore Evicts Chinese Hackers from All 4 Telcos, and AI-Built Malware Goes Multi-Cloud]]></title><description><![CDATA[CVE-2026-2441 hits 70% of browsers. UNC3886 owned Singapore's telecom backbone. VoidLink is the first malware framework built by AI. Plus: PANW closes $25B CyberArk deal, two security pros convicted]]></description><link>https://www.donthackonme.com/p/dhom-sitrep-002-first-chrome-zero</link><guid isPermaLink="false">https://www.donthackonme.com/p/dhom-sitrep-002-first-chrome-zero</guid><dc:creator><![CDATA[Marcus J. Carey]]></dc:creator><pubDate>Tue, 17 Feb 2026 13:00:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XDNL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XDNL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XDNL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!XDNL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!XDNL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!XDNL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XDNL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png" width="1456" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:710038,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.donthackonme.com/i/188226034?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XDNL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png 424w, https://substackcdn.com/image/fetch/$s_!XDNL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png 848w, https://substackcdn.com/image/fetch/$s_!XDNL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png 1272w, https://substackcdn.com/image/fetch/$s_!XDNL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62612532-771b-4170-afdc-39cee60a4eda_5000x3000.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Don&#8217;t Hack On Me -- Situation Report February 18, 2026 // Weekly Security Operations Brief</em></p><h2>TL;DR</h2><p>&#8226; Situation: Chrome zero-day CVE-2026-2441 is being exploited now &#8212; update every Chromium browser you own</p><p>&#8226; Enemy Activity: Singapore telecom espionage, Shadow Campaigns across 37 countries, BeyondTrust exploited in hours, exfiltration-only ransomware surging 450%, Ivanti sleeper shells in European governments</p><p>&#8226; Friendly Forces: CISA adds 10+ vulns to KEV, Darktrace publishes BeyondTrust detection logic, 10 ICS advisories dropped</p><p>&#8226; Logistics: Palo Alto Networks closes $25B CyberArk acquisition &#8212; largest deal in security history</p><p>&#8226; AI Operations: OpenAI&#8217;s GPT-5.3-Codex rated &#8220;High&#8221; cyber risk, VoidLink is first AI-built malware framework, Microsoft discovers AI memory poisoning</p><p>&#8226; Personnel: Two cybersecurity pros convicted as BlackCat ransomware operators; CISA faces 40% workforce cuts</p><h2>Situation</h2><p>Google released an emergency Chrome update on Friday to patch CVE-2026-2441 &#8212; a high-severity (CVSS 8.8) use-after-free vulnerability in the Blink rendering engine&#8217;s CSS implementation that&#8217;s being actively exploited in the wild. It&#8217;s the first Chrome zero-day of 2026. Google confirmed exploitation exists while saying absolutely nothing about who&#8217;s doing it or who&#8217;s being targeted.</p><p>Here&#8217;s what makes this matter to everyone reading this: it&#8217;s not just Chrome. Every browser built on Chromium is affected. Edge, Brave, Opera, Vivaldi, Arc, Perplexity&#8217;s Comet browser &#8212; roughly 70% of global browser market share runs on a single engine. One vulnerability, one codebase, most of the internet&#8217;s browsers need a patch. Chrome&#8217;s fixed versions are 145.0.7632.75/76 for Windows and Mac, and 144.0.7559.75 for Linux. Don&#8217;t wait for auto-update on an actively exploited zero-day. Go to chrome://settings/help, force the update, restart.</p><h2>Enemy Activity</h2><p><a href="https://www.channelnewsasia.com/singapore/cyber-attack-telecoms-starhub-m1-simba-singtel-4881301">Singapore Mounts Largest Cyber Operation After UNC3886 Breaches All 4 Telcos</a> - China-linked APT UNC3886 compromised all four of Singapore&#8217;s major telecom providers &#8212; Singtel, M1, StarHub, and SIMBA &#8212; using a zero-day firewall exploit. This is the most significant nation-state telecom compromise disclosed this year.</p><p><a href="https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/">70 Orgs Hacked Across 37 Countries &#8212; Unit 42&#8217;s Shadow Campaigns</a> - State-aligned cyberespionage group TGR-STA-1030 compromised over 70 organizations across 37 countries using only N-day exploits with patches available, some dating back to 2019.</p><p><a href="https://www.helpnetsecurity.com/2026/02/13/beyondtrust-cve-2026-1731-poc-exploit-activity/">BeyondTrust CVE-2026-1731: Exploited Within Hours of PoC Release</a> - BeyondTrust patched CVE-2026-1731 (CVSS 9.9) &#8212; a critical pre-auth RCE. By February 13, exploitation was confirmed in the wild.</p><p><a href="https://www.morphisec.com/blog/ransomware-without-encryption-why-pure-exfiltration-attacks-are-surging-and-why-theyre-so-hard-to-catch/)">Exfiltration-Only Ransomware Surging 450% </a>- Attackers are abandoning encryption entirely &#8212; no data locker needed, no EDR triggers.</p><p><a href="https://thehackernews.com/2026/02/83-of-ivanti-epmm-exploits-linked-to.html">Ivanti EPMM &#8220;Sleeper Shells&#8221;</a> &#8212; European Commission, Dutch and Finnish Governments Breached - Ivanti EPMM vulnerabilities are under widespread exploitation with dormant &#8220;sleeper&#8221; web shells planted.</p><h2>Friendly Forces</h2><p><a href="https://www.cisa.gov/news-events/alerts/2026/02/10/cisa-adds-six-known-exploited-vulnerabilities-catalog">CISA Adds 10+ Vulnerabilities to KEV Catalog in February</a> - CISA added vulnerabilities including SolarWinds Web Help Desk, six Microsoft zero-days, and BeyondTrust CVE-2026-1731. If you&#8217;re not using KEV as a private-sector patching signal, start.</p><p><a href="https://www.darktrace.com/blog/cve-2026-1731-how-darktrace-sees-the-beyondtrust-exploitation-wave-unfolding">Darktrace Publishes BeyondTrust CVE-2026-1731 Detection Analysis</a> - Actionable content for security teams building detections.</p><p><a href="https://www.cisa.gov/news-events/ics-advisories">CISA Releases 10+ ICS Advisories for Critical Infrastructure</a> - OT/ICS teams should review these immediately.</p><h2>Logistics</h2><p><a href="https://www.paloaltonetworks.com/company/press/2026/palo-alto-networks-completes-acquisition-of-cyberark-to-secure-the-ai-era">Palo Alto Networks Closes $25B CyberArk Acquisition</a> &#8212; Largest in Security History - Identity Security becomes PANW&#8217;s third core pillar. Machine identities already outnumber human identities 80-to-1, and AI agent identities are the next frontier.</p><h2>AI Operations</h2><p><a href="https://openai.com/index/trusted-access-for-cyber/">OpenAI Built an AI That Can Hack Hardened Targets</a> - GPT-5.3-Codex is the first AI model OpenAI classifies as &#8220;High&#8221; risk for cybersecurity. Their answer: Trusted Access for Cyber, backed by $10M in API credits for defensive research.</p><p><a href="https://research.checkpoint.com/2026/voidlink-the-cloud-native-malware-framework/)">VoidLink: First Malware Framework Built by AI</a> - 88,000 lines of code, targets AWS, Azure, GCP, Alibaba, and Tencent cloud environments. A single developer produced what would normally require a team.</p><p><a href="https://www.microsoft.com/en-us/security/blog/2026/02/10/ai-recommendation-poisoning/">Microsoft Discovers AI Recommendation Poisoning</a> - One click can poison an AI assistant&#8217;s memory, causing subtly biased recommendations.</p><h2>Personnel</h2><p><a href="https://www.securityweek.com/two-us-cybersecurity-pros-plead-guilty-over-ransomware-attacks/">Two Cybersecurity Pros Plead Guilty as BlackCat/ALPHV Ransomware Affiliates</a> - A ransomware negotiator and an incident responder were secretly running attacks. This is the insider threat case that should make every security organization reconsider vetting.</p><p><a href="https://www.scworld.com/perspective/a-sober-look-at-the-recent-cuts-at-cisa)">CISA Faces 40% Workforce Cuts</a> &#8212; Red Teams Dismantled - Up to 1,300 positions on the chopping block. The irony is not lost on anyone.</p><h2>What Does This Mean to Me?</h2><p>If you&#8217;re in security operations: Update Chrome and every Chromium-based browser in your environment right now. Check exposure against BeyondTrust and Ivanti vulnerabilities. Hunt for IOCs from the Unit 42 Shadow Campaigns report.</p><p>If you&#8217;re in leadership: Three themes - the Chromium monoculture risk, identity as the new perimeter (PANW/CyberArk deal), and the insider threat conviction that should be a board-level conversation.</p><p>If you&#8217;re breaking in: Pay attention to VoidLink. Learn cloud security. The gap between &#8220;one person with AI&#8221; and &#8220;a team without it&#8221; is closing fast.</p><h2>The Debrief</h2><p>This week&#8217;s SitRep has AI fingerprints all over it. VoidLink proved that a single developer with an AI coding agent can produce an 88,000-line malware framework. AI is the multiplier on both sides. The teams that adopt AI into their security workflows now will be setting the pace. Everyone else will be patching to keep up.</p><p>End of SitRep. Stay alert. Don&#8217;t let them hack on you.</p><p>Subscribe to <a href="https://donthackonme.substack.com)">Don&#8217;t Hack On Me</a> | <a href="https://donthackonme.com">donthackonme.com</a></p><p><em>This post was researched, drafted, and edited with AI assistance. The analysis and perspective are Marcus&#8217;s. See something wrong? Leave a comment.</em></p>]]></content:encoded></item><item><title><![CDATA[DHOM SitRep #001: OpenClaw Exposes 135K Agents, Notepad++ Supply Chain Owned for 6 Months, and Microsoft Patches 6 Zero-Days]]></title><description><![CDATA[AI agents are the new shadow IT. Plus, a state-sponsored supply chain attack hid in plain sight, and Patch Tuesday brings six actively exploited zero-days.]]></description><link>https://www.donthackonme.com/p/dhom-sitrep-001-openclaw-exposes</link><guid isPermaLink="false">https://www.donthackonme.com/p/dhom-sitrep-001-openclaw-exposes</guid><dc:creator><![CDATA[Marcus J. Carey]]></dc:creator><pubDate>Fri, 13 Feb 2026 01:29:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Uzs5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F655eaae0-7029-49d2-ba23-8953d5c86c88_5000x3000.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Don&#8217;t Hack On Me -- Situation Report</p><p>February 11, 2026 // Weekly Security Operations Brief</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.donthackonme.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Don't Hack On Me! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="image-gallery-embed" data-attrs="{&quot;gallery&quot;:{&quot;images&quot;:[{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/655eaae0-7029-49d2-ba23-8953d5c86c88_5000x3000.png&quot;}],&quot;caption&quot;:&quot;&quot;,&quot;alt&quot;:&quot;&quot;,&quot;staticGalleryImage&quot;:{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/655eaae0-7029-49d2-ba23-8953d5c86c88_5000x3000.png&quot;}},&quot;isEditorNode&quot;:true}"></div><h2>TL;DR</h2><ul><li><p>Situation: 135K OpenClaw AI agents exposed with critical RCE vulns &#8212; AI agents are the new shadow IT</p></li><li><p>Enemy Activity: Notepad++ supply chain owned by Lotus Blossom for 6 months; Microsoft patches 6 zero-days; Google disrupts massive proxy network; Signal phishing warning</p></li><li><p>Friendly Forces: SANS Protocol SIFT brings MCP to forensics; Wiz maps 70+ SDLC attack techniques; EDR silencing detection rules; security scorecarding guide</p></li><li><p>Logistics: Trail of Bits releases sandboxed Claude Code container; Cisco drops AI skill scanner</p></li><li><p>AI Operations: Google reports on threat actor AI misuse; Microsoft&#8217;s top 10 Copilot agent risks; the agent identity crisis</p></li><li><p>Personnel: SANS ICS Command Briefing 2026</p></li><li><p>The Debrief: Marcus&#8217;s take on the AI agent era</p></li></ul><h2>Situation</h2><p>This week, the security industry woke up to a problem it should have seen coming: AI agents are everywhere, and nobody&#8217;s securing them.</p><p>Over 135,000 OpenClaw AI agents were found exposed to the internet with critical RCE vulnerabilities. Researchers at Bitdefender and SecurityScorecard flagged the exposure. Roughly 386 malicious Skills were discovered on ClawHub targeting crypto wallets, LinkedIn, and Reddit -- racking up over 7,000 downloads before anyone noticed. Kaspersky published a deep-dive showing that default OpenClaw settings ship with no authentication on admin interfaces, and misconfigured reverse proxies expose everything. A fake ClawdBot VS Code extension was caught installing ScreenConnect RAT. And Moltbook, the AI-only social network, had a Supabase misconfiguration leaking every agent&#8217;s secret API keys.</p><p>This isn&#8217;t a single vulnerability. It&#8217;s a systemic failure. AI agents behave like users but execute like software. They have persistent memory, tool autonomy, and the ability to chain actions across systems -- and our security models were never built for that. As 1Password put it this week: agent identities need to be treated like new hires, with time-bound, revocable access. If your org is deploying AI agents and you haven&#8217;t thought about identity, permissions, and monitoring for them, this is your wake-up call.</p><h2>Enemy Activity</h2><p><a href="https://thehackernews.com/2026/02/notepad-hosting-breach-attributed-to.html">Notepad++ Supply Chain Compromised by Chinese State Hackers (Lotus Blossom)</a></p><p>The Notepad++ project disclosed that its sole update server was compromised by Lotus Blossom, a China-linked APT, between June and December 2025. Attackers selectively pushed malicious updates to targets in Vietnam, El Salvador, Australia, and the Philippines. Kaspersky found they rotated C2 servers, downloaders, and payloads monthly -- using Cobalt Strike, Metasploit, and a novel &#8220;Chrysalis&#8221; backdoor. IT admins running Notepad++ with elevated privileges were prime targets. Six months of access before detection. That&#8217;s the real story here.</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-february-2026-patch-tuesday-fixes-6-zero-days-58-flaws/">Microsoft February 2026 Patch Tuesday: 6 Zero-Days, 58 Flaws</a></p><p>Microsoft patched 58 vulnerabilities including six actively exploited zero-days and five Critical-rated flaws. The standout: CVE-2026-21510, a Windows Shell Security Feature Bypass that lets attackers bypass SmartScreen and Shell warning dialogs through crafted shortcut files. Microsoft also began rolling out new Secure Boot certificates ahead of the June 2026 legacy cert expiration. Patch now.</p><p><a href="https://cloud.google.com/blog/topics/threat-intelligence/disrupting-largest-residential-proxy-network">Google GTIG Disrupts IPIDEA, One of the World&#8217;s Largest Residential Proxy Networks</a></p><p>Google&#8217;s Threat Intelligence Group took down IPIDEA, which controlled 13 proxy/VPN brands and used malicious SDKs distributed through trojanized VPNs and uncertified Android TV boxes. Over 550 threat groups from China, DPRK, Iran, and Russia were observed using IPIDEA exit nodes in a single week. Google Play Protect removed 600+ Android apps. This is what large-scale infrastructure takedowns look like.</p><p><a href="https://thehackernews.com/2026/02/german-agencies-warn-of-signal-phishing.html">German BfV and BSI Warn of State-Sponsored Signal Phishing</a></p><p>Germany&#8217;s domestic intelligence agency (BfV) and federal cybersecurity agency (BSI) issued a joint advisory warning of state-sponsored phishing attacks targeting Signal users. If your org uses Signal for sensitive comms, share this advisory with your team.</p><h2>Friendly Forces</h2><p><a href="https://robtlee73.substack.com/p/introducing-protocol-sift-meeting">SANS Protocol SIFT: First Autonomous Framework Integrating MCP</a></p><p>SANS released Protocol SIFT, an autonomous forensics framework built on the Model Context Protocol (MCP). It orchestrates 200+ utilities in the SIFT Workstation, letting analysts match the velocity of AI-powered threats with deterministic, court-admissible evidence. This is the kind of tooling that changes how DFIR teams operate.</p><p><a href="https://www.wiz.io/blog/sitf-sdlc-threat-framework">Wiz SITF: SDLC Infrastructure Threat Framework</a></p><p>New open-source framework from Wiz mapping 70+ attack techniques across five SDLC pillars (Endpoint/IDE, VCS, CI/CD, Registry, Production). Includes an Attack Flow Visualizer for drag-and-drop threat modeling that runs entirely client-side. If you&#8217;re building or securing CI/CD pipelines, this is worth a look.</p><p><a href="https://ipurple.team/2026/01/12/edr-silencing/">EDR Silencing Techniques and Detection</a></p><p>Purple Team published an overview of six EDR silencing methods -- WFP abuse, hosts file modification, NRPT manipulation, IPSec filters, routing table tampering, and IPMute -- along with a SIGMA detection rule for WFP-blocked outbound connections. If you run an EDR, you should know how attackers try to blind it.</p><p><a href="https://ramimac.me/scorecarding">Security Scorecarding Programs That Work</a></p><p>Rami McCarthy published an overview of scorecarding in security programs with real-world examples from Chime, Netflix, GitHub, and Atlassian. Practical guidance for teams trying to measure security posture without drowning in vanity metrics.</p><h2>Logistics</h2><p><a href="https://github.com/trailofbits/claude-code-devcontainer">Trail of Bits: Claude Code DevContainer for Security Audits</a></p><p>Trail of Bits released a sandboxed devcontainer for running Claude Code in bypass mode safely during security audits. They also dropped Dropkit, a CLI for managing DigitalOcean droplets with automated setup and lifecycle management. Security-conscious AI tooling from a team that understands the risks.</p><p><a href="https://github.com/cisco-ai-defense/skill-scanner">Cisco Releases Skill Scanner for AI Agent Security</a></p><p>Cisco published Skill Scanner, an open-source tool for analyzing Claude and OpenAI skills for prompt injection, data exfiltration, and malicious code. As AI agent ecosystems grow, tools like this become essential for supply chain security.</p><h2>AI Operations</h2><p><a href="https://blog.google/innovation-and-ai/infrastructure-and-cloud/google-cloud/gtig-report-ai-cyber-attacks-feb-2026/">Google GTIG: How Threat Actors Are Misusing AI</a></p><p>Google&#8217;s Threat Intelligence Group published a new report on how threat actors use AI for gathering information, creating realistic phishing, and developing malware. The report also flagged frequent model extraction attacks -- corporate espionage targeting private AI models. Notably, APT actors aren&#8217;t yet directly attacking frontier models. They&#8217;re using them as tools, just like everyone else.</p><p><a href="https://www.microsoft.com/en-us/security/blog/2026/01/23/runtime-risk-realtime-defense-securing-ai-agents/">Microsoft: Top 10 Security Risks for Copilot Studio Agents</a></p><p>Microsoft published a guide on the top 10 security risks for Copilot Studio agents and how to detect and prevent them. Organizations are rapidly deploying these agents, and threat actors are equally fast at exploiting misconfigured AI workflows. If your org is building Copilot agents, this is required reading.</p><p><a href="https://newsletter.danielmiessler.com/p/unsupervised-learning-no-515">The Identity Problem for AI Agents</a></p><p>Multiple sources converged on the same theme this week: legacy IAM is static, but AI agents are non-deterministic. Daniel Miessler published security hardening recommendations for OpenClaw. 1Password argued that agent identities need the same rigor as human identities -- time-bound access, revocable credentials, full audit trails. The consensus is clear: agents should not inherit human permissions. They need their own identity layer.</p><h2>Personnel</h2><p>SANS ICS Command Briefing 2026</p><p>SANS announced the ICS Command Briefing 2026 and a virtual roundtable on Agile Incident Response spanning SOC, cloud, OT, and executive teams. If you&#8217;re in ICS/OT security or leading cross-functional IR, these are worth putting on the calendar.</p><h2>The Debrief</h2><p>Issue #001 lands in a week that makes one thing clear: the AI agent era didn&#8217;t announce itself. It just showed up -- with 135,000 exposed instances, malicious Skills on agent marketplaces, and security models that haven&#8217;t caught up.</p><p>We&#8217;ve been here before. Shadow IT. Cloud sprawl. Container explosion. Every time a new paradigm arrives, security teams are the last to know and the first expected to secure it. The difference this time is velocity. AI agents don&#8217;t wait for change management. They chain tools, make decisions, and act autonomously -- which is exactly what makes them useful and exactly what makes them dangerous.</p><p>The organizations that get ahead of this won&#8217;t be the ones that ban AI agents. They&#8217;ll be the ones that treat agent identity, agent permissions, and agent monitoring with the same rigor they apply to human users. Start there.</p><p>Stay alert. Don&#8217;t let them hack on you.</p><p>Subscribe to Don&#8217;t Hack On Me | donthackonme.com</p><p></p><p>This post was researched, drafted, and edited with AI assistance. The analysis and perspective are Marcus&#8217;s. See something wrong? Leave a comment.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.donthackonme.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Don't Hack On Me! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>