ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories Explained (2026)

The Slow Burn: Uncovering the Stealthy Threats in Our Digital World

In a world where technology advances at lightning speed, it's easy to overlook the small, incremental changes that can lead to significant security issues. This week's bulletin is a testament to that, highlighting how seemingly minor shifts can create major problems.

These updates serve as a reminder that threats often lurk in the shadows, quietly evolving and adapting. It's not always the loud, headline-grabbing incidents that pose the greatest danger; sometimes, it's the subtle, ongoing trends that go unnoticed until they become a full-blown crisis.

1. Major Cybercrime Forum Takedown

The FBI has dealt a significant blow to the notorious RAMP cybercrime forum, a hub for illicit activities. The forum's administrator, Stallman, expressed dismay at the takedown, acknowledging years of work to create a free platform. The forum's launch in 2021 followed bans on ransomware operations by Exploit and XSS. Its creator, Orange (aka Mikhail Pavlovich Matveev), has been unmasked, and groups like Nova and DragonForce are reportedly shifting to alternative spaces like Rehub, showcasing the underground's resilience.

But here's where it gets controversial... Is this a temporary setback for cybercriminals, or a sign of a more robust law enforcement effort? Will they adapt and find new platforms, or has the takedown disrupted their operations significantly?

2. WhatsApp's Privacy Claims Challenged

A new lawsuit against Meta alleges that WhatsApp's privacy claims are misleading. The lawsuit argues that Meta has access to users' private communications, defrauding them of their trust. Meta denies these claims, calling the lawsuit frivolous. Will Cathcart, head of WhatsApp, emphasizes that encryption keys are stored on users' phones, inaccessible to Meta. However, the lawsuit contends that an internal team has unlimited access, raising concerns about WhatsApp's security measures.

And this is the part most people miss... The debate revolves around whether WhatsApp's security is a technical safeguard or a policy-based lock. Is it a matter of technology or trust? What do you think? Is WhatsApp's encryption truly secure, or is it a policy that can be bypassed?

3. Post-Quantum Shift Accelerates

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published an initial list of hardware and software categories supporting post-quantum cryptography (PQC) standards. The guidance aims to help organizations prepare for the threat of quantum computing, which could break classical encryption. CISA's Acting Director, Madhu Gottumukkala, emphasizes the urgency of adopting PQC-capable technologies to protect sensitive data.

A thought-provoking question: Are we doing enough to prepare for the quantum computing era? With the potential for quantum computers to break encryption, how can we ensure the security of our data in the future? Share your thoughts in the comments!

4. Physical Access Systems Exposed

Over 20 vulnerabilities in Dormakaba physical access control systems could have allowed hackers remote access to major organizations' doors. The flaws included hard-coded credentials, weak passwords, and lack of authentication. While there's no evidence of exploitation in the wild, these vulnerabilities highlight the importance of secure access control systems.

A potential game-changer: What if these vulnerabilities had been exploited? Could it have led to a major security breach? Discuss the potential impact and how we can prevent such incidents in the future.

5. Fake Hiring Lures Steal Logins

A phishing campaign is targeting job seekers with fake recruitment emails, impersonating well-known employers. The messages, in multiple languages, offer easy jobs and fast interviews. Clicking the confirmation link leads to credential harvesting or malicious content. This campaign highlights the need for caution when dealing with job offers, especially online.

A controversial interpretation: Is it the responsibility of job seekers to be vigilant, or should employers and staffing companies do more to protect their applicants' data? How can we ensure a safer job-seeking experience?

6. Trusted Cloud Domains Abused

A novel campaign has exploited the trust associated with *.vercel.app domains to bypass email filters and deceive users with financially themed lures. The activity, observed from November 2025 to January 2026, delivers a legitimate remote access tool, GoTo Resolve. This campaign showcases the evolving tactics of threat actors, using trusted domains to their advantage.

A potential counterpoint: Could this campaign be seen as a clever use of resources, or is it a clear abuse of trust? Where do we draw the line between innovation and exploitation in the digital world? Share your views!

7. Cellular Location Precision Reduced

With iOS 26.3, Apple is enhancing user privacy by reducing the location data available to cellular networks. This setting limits the precision of location data, providing a less precise location, such as a neighborhood, rather than a street address. This feature is expected to be available in Germany, the U.K., the U.S., and Thailand.

A potential impact: How might this feature impact emergency services and location-based apps? Is the trade-off between privacy and functionality worth it? Discuss the potential consequences and your thoughts on this feature.

8. Legacy iOS Support Extended

Apple has released security updates for iOS 12 and iOS 15, extending the digital certificate required by features like iMessage and FaceTime. This update ensures these features continue working after January 2027. This move highlights Apple's commitment to supporting older iOS versions, providing ongoing security and functionality.

A potential discussion point: Should tech companies prioritize supporting older versions of their software, or focus on encouraging users to upgrade to the latest versions for better security and features? Share your thoughts on Apple's approach!

9. SEO Poisoning-for-Hire Exposed

A backlink marketplace, HxSEO, has been discovered, helping customers rank malicious web pages higher in search results. The group, Haxor, operates on Telegram and WhatsApp, targeting WordPress sites with plugin flaws. By purchasing backlinks from compromised domains, threat actors can boost search rankings, leading unsuspecting visitors to phishing pages.

A potential solution: How can search engines and security experts work together to combat this issue? Can we develop better algorithms to identify and flag such malicious practices? Discuss potential strategies to tackle this emerging threat.

10. Phishing Hijacks Ad Accounts

A new phishing campaign targets Meta business accounts, aiming to seize control for malicious activities. The campaign begins with urgent, concerning messages, mimicking Meta's branding. Once an account is compromised, the attacker changes billing information, launches scam ads, and removes legitimate administrators.

A potential prevention strategy: How can we educate users and businesses about these phishing attempts? What steps can be taken to verify the authenticity of such urgent messages? Share your ideas on how to stay vigilant and protect your online accounts.

11. Kernel Bug Flagged as Exploited

CISA has added a security flaw impacting the Linux kernel to its Known Exploited Vulnerabilities catalog. The vulnerability, CVE-2018-14634, has a CVSS score of 7.8. While there are no reports of exploitation in the wild, CISA requires Federal Civilian Executive Branch agencies to apply patches by February 16, 2026.

A potential concern: With no reports of exploitation, is the urgency to patch this vulnerability justified? Discuss the potential risks and benefits of such a requirement, and whether it's an overreaction or a necessary precaution.

12. France Pushes Video Sovereignty

The French government is replacing U.S. videoconferencing apps like Zoom and Microsoft Teams with a homegrown alternative, Visio, to improve security and strengthen digital resilience. Minister David Amiel emphasizes the risk of exposing sensitive data and strategic innovations to non-European actors.

A potential debate: Is this a wise move towards digital sovereignty, or a step towards isolationism? Can a homegrown solution truly provide better security, or is it a risky experiment? Share your opinions on France's decision!

13. Student Data Tracking Blocked

Microsoft has been ordered to cease tracking cookies in Microsoft 365 Education after illegally installing them on minors' devices without consent. The Austrian data protection authority found Microsoft in violation of EU laws. This decision highlights the importance of user consent and data privacy.

A potential impact assessment: How might this decision affect Microsoft's operations and reputation? Discuss the potential consequences and whether this is a step towards better data protection practices.

14. Cross-Border Swatting Ring Busted

Hungarian and Romanian police have arrested four young suspects for bomb threats, false emergency calls, and personal data misuse. The suspects, aged 17 to 20, approached victims on Discord, obtained their details, and made false emergency calls in their names. This operation highlights the global nature of cybercrime and the need for international cooperation.

A potential collaboration: How can law enforcement agencies across borders work together more effectively to combat such crimes? Discuss potential strategies and the challenges of international collaboration in cybercrime investigations.

15. Latin America Hit Hardest

According to Check Point, organizations in Latin America experienced the sharpest increase in cyber attacks in December 2025, with an average of 3,065 attacks per week. This regional increase highlights the need for improved cybersecurity measures and awareness.

A potential focus area: How can Latin American organizations and governments enhance their cybersecurity defenses? Discuss potential strategies and initiatives to mitigate the risk of cyber attacks in the region.

16. Crypto Laundering Ring Punished

The U.S. Department of Justice announced that Chinese national Jingliang Su was sentenced to 46 months in prison for laundering over $36.9 million from victims in a digital asset investment scam. Su was part of an international criminal network that scammed U.S. victims. This case highlights the global nature of crypto-related crimes and the need for international cooperation in combating them.

A potential global effort: How can we improve international collaboration to tackle crypto-related crimes? Discuss potential initiatives and strategies to enhance global coordination in this fight against financial fraud.

17. Major Dark Web Operator Convicted

Raheim Hamilton, 30, pleaded guilty to operating a dark web marketplace, Empire Market, between 2018 and 2020. The marketplace facilitated over four million transactions, valued at over $430 million, making it one of the largest dark web marketplaces at the time. This conviction highlights the ongoing efforts to disrupt dark web criminal activities.

A potential deterrent: Can such convictions serve as a deterrent to potential dark web operators? Discuss the impact of these convictions on the dark web ecosystem and whether they are effective in reducing criminal activities.

18. Darknet Operator Admits Role

Alan Bill, 33, pleaded guilty to his involvement in a darknet market called Kingdom Market, which sold drugs and stolen personal information between 2021 and 2023. Bill admitted to receiving cryptocurrency and assisting with the creation of Kingdom's forum pages. This admission highlights the ongoing efforts to bring darknet operators to justice.

A potential impact assessment: How might Bill's plea and subsequent sentencing impact the darknet market ecosystem? Discuss the potential consequences and whether it will deter others from engaging in similar activities.

19. Android Theft Defenses Expanded

Google has announced an expanded set of Android theft-protection features, building upon existing protections like Theft Detection Lock and Offline Device Lock. These features include granular controls to enable or disable Failed Authentication Lock and stronger protections against PIN/pattern/password guessing.

A potential game-changer: How might these expanded theft-protection features impact the Android ecosystem? Discuss the potential benefits and challenges of implementing such measures and whether they will effectively deter thieves.

20. AI-Linked Malware Tooling Spotted

A PureRAT campaign has targeted job seekers using malicious ZIP archives, leveraging DLL side-loading to launch a batch script. Broadcom's analysis suggests that these tools were authored using artificial intelligence (AI). This campaign highlights the evolving use of AI in cyber attacks.

A potential concern: With AI being used to develop malware, how can we enhance our cybersecurity defenses? Discuss potential strategies and technologies to counter AI-powered cyber threats.

21. UK-China Cyber Talks Launched

The UK and China have established a forum called Cyber Dialogue to discuss cyber attacks and manage threats to each other's national security. This deal aims to improve communication and prevent escalation. This initiative highlights the importance of diplomatic efforts in the cyber realm.

A potential outcome: Can this forum lead to better cyber relations between the UK and China? Discuss the potential benefits and challenges of such diplomatic initiatives and whether they can effectively reduce cyber tensions.

22. Poor OPSEC Unmasks Broker

Feras Khalil Ahmad Albashiti pleaded guilty to selling access to the networks of at least 50 companies through a cybercriminal forum. His online aliases and personal details, including his LinkedIn profile URL, led to his unmasking. This case highlights the importance of OPSEC (Operational Security) in the cybercriminal world.

A potential lesson: What can we learn from Albashiti's case about the importance of OPSEC? Discuss the potential consequences of poor OPSEC and how it can impact cybercriminals' operations.

23. Encryption Flaw Traps Victims

Cybersecurity company Halcyon identified a critical flaw in the encryption process of Sicarii ransomware, making data recovery impossible even if the organization pays a ransom. This flaw highlights the importance of robust encryption practices.

A potential solution: How can organizations ensure their encryption processes are secure and robust? Discuss potential strategies and technologies to enhance encryption practices and protect against such flaws.

24. Human-in-the-Loop MFA Bypass

Google-owned Mandiant is tracking a wave of voice-phishing attacks targeting single sign-on tools, resulting in data theft and extortion attempts. Threat actors are combining voice calls and custom phishing kits to gain unauthorized access and enroll threat actor-controlled devices into victim MFA for persistent access.

A potential prevention strategy: How can we enhance our MFA security measures to prevent such attacks? Discuss potential technologies and practices to strengthen MFA and protect against human-led phishing attempts.

25. React Flaw Fuels Crypto-Mining Attacks

Threat actors have exploited the recently disclosed security flaw in React Server Components to infect Russian companies with XMRig-based cryptominers. Other payloads include botnets and the Sliver implant. This exploitation highlights the ongoing threat of crypto-mining attacks.

A potential impact assessment: How might these crypto-mining attacks impact Russian companies and the wider economy? Discuss the potential consequences and strategies to mitigate the risk of such attacks.

26. Malware Flood Hits Open Source

Supply chain security company Sonatype logged 454,600 open-source malware packages in 2025, taking the total to over 1.233 million packages across various platforms. This flood of malware highlights the evolving threat landscape and the need for robust supply chain security.

A potential focus area: How can we enhance our supply chain security to protect against open-source malware? Discuss potential strategies and technologies to mitigate the risk of malware infiltration in the software supply chain.

27. Ransomware Ecosystem Doubles

A new analysis from Emsisoft revealed a significant increase in ransomware groups and victims in 2025. The number of active groups surged from about 70 in 2023 to nearly 140 in 2025. This analysis highlights the growing ransomware threat and the need for robust defense strategies.

A potential discussion point: How can we effectively combat the rising ransomware threat? Discuss potential strategies, technologies, and international cooperation efforts to disrupt ransomware groups and protect organizations.

28. ATM Malware Ring Charged

The DoJ has announced charges against 31 individuals accused of involvement in a massive ATM jackpotting scheme, resulting in the theft of millions of dollars. The attacks involved the use of Ploutus malware to hack ATMs and force them to dispense cash. This scheme highlights the ongoing threat of ATM malware.

A potential impact assessment: How might this ATM malware scheme impact the financial sector and consumers? Discuss the potential consequences and strategies to mitigate the risk of such attacks.

29. Blockchain-Based C2 Evasion

A ransomware strain called DeadLock has been observed using Polygon smart contracts for proxy server address rotation or distribution. DeadLock also uses AnyDesk as a remote management tool and a previously unknown loader to exploit the Baidu Antivirus driver vulnerability. This ransomware showcases the evolving tactics of threat actors, leveraging blockchain technology.

A potential countermeasure: How can we enhance our blockchain security measures to prevent such ransomware attacks? Discuss potential strategies and technologies to secure blockchain-based systems and protect against C2 evasion techniques.

30. Crypto Laundering Networks Scale Up

Chainalysis' report highlights the dominance of Chinese-language money laundering networks (CMLNs) in crypto money laundering, processing an estimated 20% of illicit cryptocurrency funds over the past five years. These networks use various mechanisms, including gambling platforms and P2P services, to launder funds. This report highlights the growing threat of crypto money laundering.

A potential global effort: How can we enhance international cooperation to combat crypto money laundering? Discuss potential strategies, technologies, and regulatory measures to disrupt CMLNs and protect the integrity of the crypto ecosystem.

31. SMS Fraud Hits Canadians

Threat actors are impersonating government services and trusted national brands in Canada, using SMS messages and malicious ads to enable account takeovers and direct financial fraud. This campaign highlights the need for caution when dealing with government-related communications and online transactions.

A potential awareness campaign: How can we educate Canadians about these SMS fraud attempts? Discuss potential awareness initiatives and strategies to help citizens recognize and avoid such scams.

These stories collectively showcase the slow, steady build-up of threats, highlighting the need for ongoing vigilance and proactive security measures. It's crucial to stay informed and adapt to the ever-evolving digital landscape. Stay safe, and keep an eye out for these emerging threats!

ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories Explained (2026)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Virgilio Hermann JD

Last Updated:

Views: 6749

Rating: 4 / 5 (61 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Virgilio Hermann JD

Birthday: 1997-12-21

Address: 6946 Schoen Cove, Sipesshire, MO 55944

Phone: +3763365785260

Job: Accounting Engineer

Hobby: Web surfing, Rafting, Dowsing, Stand-up comedy, Ghost hunting, Swimming, Amateur radio

Introduction: My name is Virgilio Hermann JD, I am a fine, gifted, beautiful, encouraging, kind, talented, zealous person who loves writing and wants to share my knowledge and understanding with you.