Latest Internet & Cybersecurity News

📅February 27, 2026 at 1:00 PM
Critical Cisco SD-WAN zero-day exploited since 2023 prompts CISA emergency directive; multiple data breaches hit telecoms and retailers; China state actors target US infrastructure; new cybersecurity products and regulations emerge.
1

CISA Issues Emergency Directive ED 26-03 for Cisco SD-WAN Vulnerability

CISA ordered federal agencies to secure Cisco Catalyst SD-WAN systems against active exploitation of CVE-2026-20127, a zero-day authentication bypass flaw exploited since at least 2023.Source 4Source 11 The directive requires inventorying systems, applying patches, and assessing for compromise by 5 PM ET on February 27, 2026.Source 4 Cisco Talos tracks this as UAT-8616 by a sophisticated threat actor.Source 4

2

ShinyHunters Claim Odido Telecom Data Breach in Netherlands

Threat group ShinyHunters alleged on BreachForums on February 27, 2026, that they breached Odido, exposing customer records and internal data after warning the company on February 24.Source 2 The claim raises risks of identity theft and fraud; Odido has not confirmed the full scope.Source 2 Kaduu team identified the post during dark web monitoring.Source 2

3

ManoMano Suffers Data Breach Affecting 38 Million Customers

DIY retailer ManoMano confirmed a third-party Zendesk breach by actor 'Indra' exposed names, emails, phones, and support data for 37.8 million customers in January 2026.Source 6 No passwords or company servers were affected; users notified of phishing risks.Source 6 The incident originated from a Tunis-based support provider.Source 6

4

China's Salt Typhoon and Volt Typhoon Target US Critical Infrastructure

FBI warns China's Salt Typhoon espionage persists in US telecom networks, while Volt Typhoon remains entrenched in energy and transport sectors.Source 1 These campaigns evolve from espionage to sabotage preparations against Western infrastructure.Source 1 Deputy Assistant Director emphasized the ongoing threat from Chinese intelligence.Source 1

5

Lazarus Group Targets Crypto Developers in Sustained Campaigns

North Korea's Lazarus Group focuses on software developers at crypto exchanges, blockchain, Web3, and fintech firms to gain trusted access and manipulate transactions.Source 1 This shifts from direct infrastructure attacks to individual compromises.Source 1 CYFIRMA's ETLM insights highlight the targeted approach.Source 1

6

Adidas Investigates Third-Party Licensing Partner Data Breach

Adidas is probing a breach at an independent licensing partner where attackers claimed access to over 800,000 rows of data including names and emails.Source 9 No impact on Adidas IT, e-commerce, or consumer data reported.Source 9 Highlights risks in supply chain partners.Source 9

7

Major Data Breach at Dutch Custodial Institutions Agency

A significant breach compromised personal details of employees at the Netherlands' Custodial Institutions Agency (DJI).Source 8 Spokesperson confirmed the incident affecting staff data.Source 8 Underscores public sector vulnerabilities.Source 8

8

European Commission Proposes New Cybersecurity Package

The EU proposed Cybersecurity Act 2 (CSA2) and NIS2 amendments to strengthen ICT supply chain security and simplify certifications across 18 critical sectors.Source 5 Enhances ENISA's role in threat management.Source 5 Aims to meet legal obligations via EU certifications.Source 5

9

UK and Japan Launch Strategic Cyber Partnership

UK PM Sir Keir Starmer announced a cyber partnership with Japan focusing on threat detection, societal resilience, and innovation.Source 5 Includes intelligence sharing and a detailed action plan.Source 5 Strengthens mutual security against shared threats.Source 5

10

New Infosec Products Launched in February 2026

Releases include Avast's deepfake detection for PCs/mobile, Portnox's passwordless ZTNA for RDP/SSH, and Aikido's AI penetration testing.Source 3 Socure's RiskOS for government ID verification and Veza's AI access agents also debuted.Source 3 Gremlin and others enhance disaster recovery and visibility.Source 3

11

IBM Report: Vulnerability Exploitation Drives 2025 Cyberattacks

The 2026 IBM X-Force Index found vulnerability exploitation as the top cause of cyberattacks in 2025.Source 10 Reflects trends in edge infrastructure targeting.Source 10 Urges urgent patching amid scaling exploitation traffic.Source 10

12

Darktrace Report Highlights AI-Speed Threats in 2026

Darktrace's 2026 Threat Report notes AI-driven attacks hitting exposures in under two minutes, demanding machine-speed defenses.Source 7 No recon phase in automated exploitations like React2Shell honeypot.Source 7 Shifts security tempo dramatically.Source 7