BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Critical Infrastructure Vulnerabilities and Evolving Attack Vectors: Weekly Threat Roundup

Critical Infrastructure Vulnerabilities and Evolving Attack Vectors: Weekly Threat Roundup

February 27, 2026Malware & Threats4 min readcritical

Originally reported by BleepingComputer, Graham Cluley, Cisco Talos, Malwarebytes Labs

#vulnerabilities#ransomware#data-breach#api-security#social-engineering#insider-threats#browser-attacks#apt
Share

TL;DR

This week brought critical remote code execution vulnerabilities in Juniper PTX routers and Trend Micro Apex One, alongside sophisticated social engineering campaigns abusing Google APIs and trusted video conferencing brands. Ransomware payment rates have dropped to historic lows despite increased attack volume.

Why critical?

The roundup includes critical infrastructure vulnerabilities in Juniper routers and Trend Micro enterprise security software that enable remote code execution, representing immediate threats to organizational security posture.

Critical Infrastructure Vulnerabilities

Juniper Networks PTX Router RCE Vulnerability

Juniper Networks disclosed a critical vulnerability in Junos OS Evolved affecting PTX Series routers that enables unauthenticated remote code execution with root privileges. The flaw represents a significant threat to network infrastructure, allowing attackers to completely compromise affected routing equipment without authentication.

Trend Micro Apex One Critical Flaws

Trend Micro patched two critical vulnerabilities in Apex One that permit remote code execution on Windows systems. The security vendor's advisory emphasizes the severity of these flaws, which could allow attackers to compromise systems protected by the enterprise security platform itself.

API Security and AI Exposure

Google API Keys Expose Gemini AI Data

Researchers discovered that Google API keys originally intended for services like Maps, when embedded in client-side code, can now authenticate to Gemini AI assistant services and potentially access private data. This represents an expansion of attack surface as organizations integrate AI services without updating their API security practices.

Data Breaches and Organizational Compromises

ManoMano Breach Impacts 38 Million Customers

European DIY retailer ManoMano disclosed a data breach affecting 38 million customers through a compromised third-party service provider. The incident highlights supply chain security risks in customer data handling.

Olympique Marseille Confirms Cyberattack

French football club Olympique de Marseille confirmed a cyberattack after threat actors claimed to have breached the organization's systems and leaked data. The club characterized the incident as an "attempted" attack while acknowledging the data exposure.

Ransomware Landscape Evolution

Payment Rates Drop to Historic Lows

New research indicates ransomware victim payment rates fell to 28% in the previous year, marking an all-time low despite increased attack volumes. This trend suggests improved organizational resilience and backup strategies, though threat actors continue expanding their targeting scope.

Ransomware Gang Extortion Incident

In an unusual turn of events, a Russian man allegedly attempted to extort money from a notorious ransomware group while impersonating an FSB officer, highlighting the criminal ecosystem's internal dynamics and trust issues.

Social Engineering and Browser-Based Attacks

Fake Google Security Check Browser RAT

Malwarebytes researchers analyzed a sophisticated browser-based remote access trojan (RAT) disguised as a Google security check. The attack leverages browser permissions to harvest sensitive data including contacts and location information without traditional malware installation.

Teramind Abuse via Fake Video Conferencing

Attackers are distributing the legitimate Teramind employee monitoring software through fake Zoom and Google Meet installation prompts. The campaign demonstrates how threat actors increasingly leverage trusted brands and legitimate tools to bypass security controls.

Insider Threat Landscape

AI Amplifying Insider Risk Costs

A new Fortra report indicates insider security incident costs have surged 20% over two years, reaching an average of $19.5 million annually per organization. The research suggests AI tools are exacerbating existing insider threat vectors by providing more sophisticated attack capabilities.

Enterprise Security Updates

Microsoft Expands Windows Restore Capabilities

Microsoft expanded its Windows restore functionality to additional enterprise devices, allowing users to restore personal settings and Microsoft Store applications from previous Windows 11 installations. The feature aims to improve user experience during device transitions while maintaining security controls.

Educational Resources

APT Understanding and Mitigation

Malwarebytes published educational content on Advanced Persistent Threat (APT) understanding and avoidance strategies, providing practitioners with foundational knowledge for defending against sophisticated, long-term attack campaigns.

Cybersecurity Leadership Perspectives

Cisco Talos released commentary drawing parallels between Shakespeare's Hotspur character and cybersecurity leadership challenges, emphasizing the importance of calculated risk-taking and learning from security failures.

Sources

  • Previously harmless Google API keys now expose Gemini AI data
  • Trend Micro warns of critical Apex One code execution flaws
  • European DYI chain ManoMano data breach impacts 38 million customers
  • Critical Juniper Networks PTX flaw allows full router takeover
  • Olympique Marseille confirms 'attempted' cyberattack after data leak
  • Ransomware payment rate drops to record low as attacks surge
  • Microsoft expands Windows restore to more enterprise devices
  • Your staff are your biggest security risk: AI is making it worse
  • Notorious ransomware gang allegedly blackmailed by fake FSB officer
  • Henry IV, Hotspur, Hal, and hallucinations
  • Inside a fake Google security check that becomes a browser RAT
  • Fake Zoom and Google Meet scams install Teramind: A technical deep dive
  • How to understand and avoid Advanced Persistent Threats

Originally reported by BleepingComputer, Graham Cluley, Cisco Talos, Malwarebytes Labs

Tags

#vulnerabilities#ransomware#data-breach#api-security#social-engineering#insider-threats#browser-attacks#apt

Tracked Companies

🇺🇸Google

Related Intelligence

  • Threat Intelligence Digest: Chinese APT Campaign, Critical Router RCE, and Agent Tesla Resurgence

    highFeb 26, 2026
  • Treasury Sanctions Russian Exploit Broker as Critical SolarWinds Flaws Hit Servers

    criticalFeb 25, 2026
  • Critical Infrastructure Under Fire: AWS Drone Strikes, Android Zero-Day, and AI-Powered Attack Tools

    criticalMar 3, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Industry Roundup: Three-Year Cisco Zero-Day, Law Enforcement Wins, and UK Policy Shifts

Next Article

Wiz Outlines Secure-by-Design Approaches for FedRAMP Compliance in Part 3 of Agile Playbook →