Shadow Campaigns Expose Global Espionage Exploiting SAP and Exchange Flaws
Unit42’s “Shadow Campaigns” report uncovers a coordinated espionage effort that has compromised organizations worldwide by chaining together a variety
Global Espionage Campaigns & Record DDoS Attacks 🌐🚀. AI‑driven Threat Detection & Ransomware Evolution 🤖🛡️.
Hello, here is your daily cybersecurity and AI threat intelligence roundup for February 10, 2026.
Today's headlines
* Shadow
PDFs Weaponized to Drop Remote Access Trojan via Malicious JavaScript
Security researchers observed a new phishing campaign that distributes seemingly benign PDF documents. When opened, the PDFs execute embedded JavaScript
vDefend Extends Zero‑Trust Automation to VMware Private Clouds
VMware’s security team unveiled vDefend, a solution that embeds zero‑trust principles directly into private cloud workloads. By automating
AI‑Powered Phishing Surge and New Ransomware Playbook Threaten Enterprises
Check Point’s February 2 threat‑intel brief highlights a sharp rise in AI‑generated phishing emails that mimic corporate
Record 31.4 Tbps DDoS Hits Major Service – Lessons for Defenders
In Q4 2025 Cloudflare logged a 31.4 Tbps distributed denial‑of‑service assault, the largest ever measured. The multi‑
AI‑Powered OpenClaw Generates Self‑Evolving Malware Variants
CrowdStrike’s latest research reveals OpenClaw, an AI‑driven malware framework that can automatically create new code variants, tailor its
Sophos CISO Warns: Fake Remote IT Hires Threaten Enterprise Access
During a recent Reddit AMA, Sophos CISO Ross McKerchar revealed that cybercriminals are increasingly masquerading as remote IT contractors to
CISA Flags Common Open‑Source Tools Fueling Global Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) just issued an advisory that catalogs dozens of publicly available utilities—such as
APT36 Exploits ISO Attachments to Deploy Crimson RAT in Indian Startups
Pakistan‑aligned APT36 has shifted its focus to India’s fast‑growing startup ecosystem. The group is delivering spear‑phishing