Cyber Briefing: 2026.02.09
Spear-phishing and cloud worms spread RATs and botnets, critical RCEs patched, ransomware hits payments, breaches surface, and cybercrime arrests follow.
👉 What’s trending in cybersecurity today?
Welcome to Cyber Briefing, the newsletter that informs you about the latest cybersecurity advisories, alerts, incidents and news every weekday.
First time seeing this? Please Subscribe
🚨 Cyber Alerts
1. Bloody Wolf Uses NetSupport RAT in Attacks
The threat actor Bloody Wolf, also known as Stan Ghouls, is conducting a widespread spear-phishing campaign across Russia and Uzbekistan to deploy the NetSupport remote access trojan. While primarily motivated by financial gain, the group’s extensive use of surveillance tools and expanded arsenal suggests a growing interest in long-term cyber espionage and IoT exploitation.
2. TeamPCP Worm Abuses Cloud To Build Botnets
Security experts have identified an extensive, worm-like operation by the threat group TeamPCP that exploits misconfigured cloud environments and a critical React2Shell vulnerability to build malicious infrastructure. This automated campaign leverages compromised Docker and Kubernetes systems to facilitate widespread data theft, ransomware deployment, and unauthorized cryptocurrency mining.
3. BeyondTrust Fixes Critical Pre-Auth RCE
BeyondTrust has issued critical updates for its Remote Support and Privileged Remote Access products to fix a pre-authentication command injection vulnerability. This flaw, tracked as CVE-2026-1731 with a severity rating of 9.9, allows unauthenticated attackers to execute remote code and potentially gain full control over affected systems.
For more alerts click here!
💥 Cyber Incidents
4. SFlickr Discloses Potential User Data Breach
Flickr recently notified its users of a potential data breach stemming from a security flaw at a third-party email service provider. While sensitive data like passwords and credit card numbers remained secure, the incident may have exposed personal details including names, email addresses, and account activity.
5. BridgePay Confirms Ransomware Attack
A significant ransomware attack against the payment gateway provider BridgePay has resulted in a nationwide outage that knocked critical systems offline. The disruption began on Friday and has forced many merchants to revert to cash-only transactions while federal authorities and forensic experts investigate the breach.
6. Loxam Reports Data Breach Incident
Loxam announced on February 4 that a security breach involving a third-party delivery planning software may have resulted in the theft of customer data. The company confirmed that the incident has been contained and noted that the stolen information is unlikely to cause harm to its clients or disrupt ongoing operations.
For more incidents click here!
📢 Cyber News
7. EU Commission Probes Staff Mobile System Intrusion
European authorities are investigating a cyberattack on the mobile device management systems of the European Commission that may have exposed staff contact information. Although the breach was detected and contained within nine hours, officials are still working to determine the full extent of the data accessed by the intruders.
8. Lyft Launches Teen Accounts With Safety Features
Lyft has launched a new feature allowing teenagers between 13 and 17 to book their own rides while providing parents with real-time tracking and account management. This service mirrors similar offerings from competitors and includes specialized safety protocols such as mandatory PIN verification and automatic audio recording for every trip.
9. Men Charged In FanDuel Identity Theft Scheme
Two residents of Connecticut have been charged in a federal case for allegedly using approximately 3,000 stolen identities to defraud online gambling platforms of 3 million dollars. Amitoj Kapoor and Siddharth Lillaney are accused of exploiting promotional bonuses on sites like FanDuel and DraftKings by creating thousands of fraudulent accounts using information purchased from the darknet.
For more news click here!
📈Cyber Stocks
On Monday, 9 February 2026, cybersecurity stocks saw a mixed session as broader tech markets navigated rotation pressures while core enterprise security demand remained supportive. Cloud and identity security names held relative interest, though investors balanced near-term valuation concerns with ongoing structural growth themes in threat detection, zero-trust adoption and AI-enabled protections.
CrowdStrike Holdings finished around 395.50 dollars and moved up, supported by strength in cloud-native endpoint and identity security adoption.
Okta Inc closed at 86.74 dollars and was higher, reflecting continued interest in identity and access management solutions.
Zscaler Inc ended near 167.33 dollars and was slightly lower, as cloud zero-trust security names faced mixed flows.
Fortinet Inc closed at 82.76 dollars and moved up, with network security hardware and converged solutions attracting selective buying.
Check Point Software Technologies Ltd. finished around 180.91 dollars and was higher, supported by defensive security demand and steady threat prevention interests.
💡 Cyber Tip
🚨 BeyondTrust Fixes Critical Pre-Auth RCE
BeyondTrust has released emergency patches for its Remote Support and Privileged Remote Access products to fix a critical pre-authentication command injection flaw. The vulnerability allows unauthenticated attackers to execute remote commands and potentially take full control of exposed systems, posing a serious risk to enterprise environments.
🛠️ What You Should Do
Patch affected BeyondTrust products immediately
Verify the exact product version and apply the correct update or hotfix
Restrict internet exposure of Remote Support and Privileged Remote Access instances
Monitor for unusual command execution or administrative activity
Treat this update as emergency maintenance, especially for on-prem deployments
⚠️ Why This Matters
Pre-authentication RCE vulnerabilities are among the most dangerous. Attackers do not need credentials to gain control, making exposed systems prime targets for data theft, lateral movement, and long-term compromise if patches are delayed.
📚 Cyber Book
Wireless Network Security A Beginner's Guide by Tyler Wrightson
Copyright © 2026 CyberMaterial. All Rights Reserved.
Follow CyberMaterial on:
Substack, LinkedIn, Twitter, Reddit, Instagram, Facebook, YouTube, and Medium










