Threat Intel Newsletter
Welcome to Newsletter! This section covers the most relevant vulnerabilities, campaigns, and adversary tradecraft observed right now, with a focus on what defenders should do next. Each section summarizes impact, exploitation context, and practical mitigation and detection guidance.
Threat Newsletter February, 9 2026
Threat Newsletter February, 9 2026
Welcome to this week’s Threat Intelligence Newsletter. This edition focuses on high-impact vulnerabilities and active tradecraft that shorten the path from initial access to full compromise, including multiple remote code execution (RCE) scenarios with low user interaction, and a notable software supply chain incident. We cover a one-click RCE

Threat Newsletter February 16, 2026
Threat Newsletter Febuary 16, 2026
Welcome to this week’s Threat Intel Newsletter. In this edition, the common thread is that compromise is increasingly happening through places defenders are forced to trust: edge infrastructure, virtualization layers, software update paths, and extension ecosystems. We break down China-linked targeting of Singapore’s telecom sector and leaked evidence
Threat Newsletter February 23, 2026
Threat Newsletter February 23, 2026
Welcome to this week’s Threat Intel Newsletter. This week we cover the most urgent threats where exploitation is happening fast and at scale. We start with mass exploitation of Ivanti EPMM—driven largely by a single bulletproof-hosted IP. Then we explain how trust is being abused in modern workflows, including


