Latest Internet & Cybersecurity News

πŸ“…February 7, 2026 at 1:00 PM
Major cybersecurity threats include state-sponsored espionage, ransomware attacks on critical sectors, Olympic cyber disruptions, and new U.S. government directives for enhanced defenses.
1

Hackers Exploit NGINX and Baota Panel to Hijack Web Traffic

Hackers are exploiting vulnerabilities in NGINX and Baota Panel to inject malicious configurations, redirecting traffic from Asian domains, government, and educational sites for data theft.Source 1Source 4 Sophisticated scripts enable long-term undetected access, evading standard security checks.Source 1 Sources include BleepingComputer and TheHackerNews reports.Source 1

2

Asia State-Sponsored Shadow Campaign Targets Global Infrastructure

Palo Alto Networks identified TGR-STA-1030, a likely Chinese group, compromising 70 organizations in 37 countries since 2025.Source 1Source 4 They use phishing, ShadowGuard rootkit, and exploit known flaws in Microsoft, SAP, and others targeting government agencies.Source 1Source 4 The campaign poses long-term threats to national security.Source 1

3

EDR Killer Tool Abuses Signed Kernel Driver

Cybercriminals exploit revoked EnCase kernel drivers to disable endpoint detection tools and bypass protections.Source 1Source 4 Fake updates and stolen VPN credentials allow deep system access and process termination.Source 1Source 4 This maintains hidden persistence in targeted systems.Source 1

4

Iron Mountain Faces Everest Ransomware Extortion Deadline

Everest gang claims 1.4TB data theft from Iron Mountain, posting on leak site with February 11 deadline.Source 2 Includes internal documents and possible client data; company denies confidential info breach.Source 2 Source: Cybernews.Source 2

5

Panera Bread Breach Affects 5.1 Million Customers

ShinyHunters leaked 5.1 million records including emails, names, phones after failed extortion, down from initial 14 million estimate.Source 2 Breach used Microsoft Entra SSO; data on dark web.Source 2 Source: TechRadar Pro.Source 2

6

FBI Launches Operation Winter SHIELD for Cyber Resilience

FBI unveiled Operation Winter SHIELD on February 5, 2026, with 10 recommendations for IT/OT hardening based on real attacks.Source 3 Weekly guidance over 10 weeks emphasizes prevention, backups, and response.Source 3 Targets industry, government, infrastructure.Source 3

7

Russian-Linked Cyberattacks Foiled Ahead of 2026 Winter Olympics

Italian officials stopped DDoS attacks by pro-Kremlin hackers on embassies, hotels, and Olympic sites in retaliation for Ukraine support.Source 5Source 12 CISA shares real-time intel with partners.Source 5 Low-skill but high-volume threats expected.Source 5

8

Qilin Ransomware Hits Romania's Conpet Oil Pipeline Operator

Qilin claims 1TB data breach from Conpet, posting documents and passports on dark web; IT disrupted but OT/SCADA unaffected.Source 6Source 10 Most prolific 2025 ransomware with 700 attacks.Source 6 Targets critical sectors.Source 6

9

CISA Orders Removal of Unsupported Edge Devices

Binding Directive 26-02 requires federal agencies to update/catalog end-of-support edge devices within 12-18 months to curb espionage.Source 9Source 14 Immediate action on vendor-supported updates; report to CISA.Source 9 Reduces cyber risks from outdated tech.Source 9

10

Chat & Ask AI App Exposes 300M Messages and 25M Users

Security researcher found exposed database with user messages and info; developers fixed promptly across apps.Source 2 Affects popular AI mobile app privacy.Source 2 Source: Business and Human Rights Centre.Source 2

11

Portland Public Schools Data Breach Impacts 12,000

Maine school district notifies over 12,000 of 2025 breach; no identity theft reported, offering free credit monitoring.Source 2 Source: WGME Portland.Source 2 Highlights education sector vulnerabilities.Source 2

12

Google Urges Post-Quantum Cryptography Preparation

Google calls on governments and industry to adopt post-quantum crypto amid quantum computing advances.Source 11 Accelerate to counter future decryption threats.Source 11 Prepares for quantum-era cybersecurity.Source 11