Threat Advisories:
Critical Threat Research : Middle-East at WAR: The Rapidly Escalating Iranian Cyber Threat Download the Report
March 5, 2026

Monthly Threat Digest FEBRUARY 2026

For a detailed threat digest, download the pdf file here




February reshaped the cybersecurity landscape with active exploitation of  13 zero-days. A rising cyber-espionage threat is gaining attention: APT28’s Operation Neusploit. This campaign is intensifying attacks across Central and Eastern Europe, using carefully crafted phishing documents that exploit a Microsoft Office vulnerability (CVE-2026-21509) to silently infiltrate targeted systems.

Meanwhile, Amaranth-Dragon, a China-linked APT group tied to the APT-41 ecosystem, is carrying out highly targeted espionage against Southeast Asia’s government and law enforcement sectors. By exploiting the CVE-2025-8088 vulnerability in WinRAR, they can execute arbitrary code and gain unauthorized access.

In response, Apple has urgently patched CVE-2026-20700, a critical zero-day memory corruption flaw in its Dynamic Link Editor (dyld) that affects all Apple platforms. On another front, the UNC6201 group has been exploiting CVE-2026-22769, a zero-day in Dell’s RecoverPoint for Virtual Machines, since mid-2024, allowing unauthorized root-level access to trusted infrastructure appliances.

Finally, MuddyWater, an Iranian state-aligned APT group tied to Iran’s Ministry of Intelligence and Security (MOIS), has launched Operation Olalampo. This campaign targets organizations and individuals across the MENA region, underscoring the growing threat landscape. With these increasing risks, strengthening defensive measures is more critical than ever in today’s digital landscape.


Subscribe to receive our weekly threat digests and alerts directly in your inbox.

Recent Resources

Dive into our library of resources for expert insights, guides, and in-depth analysis on maximizing Uni5 Xposure’s capabilities

Book a demo and find out more about how Hive Pro can double your operational efficiency

Book a Demo