Heroes, your curated look at the current cybersecurity landscape for Feb 03, 2026.
Date & Time: 2026-02-02T13:35:05
MicroWorld Technologies, the maker of eScan antivirus, suffered a supply-chain compromise where malicious updates were pushed to users via the legitimate update mechanism. This allows attackers to distribute malware under the guise of trusted security software updates.
CVE: n/a | Compliance: SOX, HIPAA | Source: Check Point Research ↗ ↗
Date & Time: 2026-02-03T15:41:57
Attackers are actively exploiting a critical vulnerability in the React Native CLI Metro server to execute remote commands and deploy stealthy Rust-based malware onto developer systems. This exploitation occurred weeks before the public disclosure, targeting the software supply chain at the development level.
CVE: CVE-2025-11953 | Compliance: SOX, GDPR | Source: Security Affairs ↗ ↗
Date & Time: 2026-02-03T16:27:43
Russian state-sponsored actors (APT28/Forest Blizzard) are actively exploiting a newly disclosed Microsoft Office vulnerability to deploy malware against targets in Ukraine and the European Union. The campaign utilizes sophisticated loaders like PixyNetLoader and MiniDoor to establish persistent access.
CVE: CVE-2026-21509 | Compliance: GDPR | Source: The Record ↗ ↗
Date & Time: 2026-02-03T14:50:00
A critical remote code execution vulnerability in Microsoft Excel is being addressed with micropatches after being discovered in November 2025 updates. Opening a malicious Excel file can allow remote attackers to execute arbitrary code on the victim's machine.
CVE: CVE-2025-62203 | Compliance: SOX | Source: 0patch Blog ↗ ↗
Date & Time: 2026-02-02T19:39:00
The persistent njRAT trojan is now being used to deploy MassLogger, a sophisticated keylogger and credential stealer. Analysis of Command and Control (C2) traffic reveals the extraction of screenshots and credentials.
CVE: n/a | Compliance: SOX | Source: Security Boulevard ↗ ↗
Date & Time: 2026-02-03T08:40:17
AWS has released new privileged permissions focused on Network Firewall, Route 53, and EC2 networking. This expansion of privileges increases the attack surface if cloud roles are not properly scoped and monitored.
CVE: n/a | Compliance: SOX | Source: Sonrai Security ↗ ↗
Date & Time: 2026-02-03T06:00:00
A local vulnerability in macOS allows attackers with low-privileged code execution to disclose sensitive information via the AppleIntelKBLGraphics component. While it requires local access, it can be chained with other exploits.
CVE: n/a | Compliance: HIPAA | Source: Source verification pending ↗
Date & Time: 2026-02-03T14:23:34 Summary & Significance: Rapid7 leaders discuss shaping cybersecurity trends, including agentic AI and the ROI of Managed Detection and Response (MDR). These insights are valuable for strategic planning and budget allocation in 2026. Source: YouTube ↗. [YouTube +0]
Date & Time: 2026-02-03T13:39:40 Summary & Significance: A look into the growing field of autonomous penetration testing, which leverages AI to simulate attacks continuously. This technology offers a way to scale security validation beyond traditional manual testing cycles. Source: Cybersecurity Ventures ↗. [Cybersecurity Ventures +0]
SentinelOne
Specialization: Endpoint Protection (EPP) & XDR
Why SentinelOne Today: Russian state hackers are exploiting the new Microsoft Office flaw (CVE-2026-21509) and deploying stealthy Rust-based malware via the React Native exploit. SentinelOne's Singularity platform relies on behavioral AI rather than just signatures, making it highly effective at blocking novel Rust malware and preventing zero-day document exploits on endpoints.
Key Capability: Behavioral AI detection for novel Rust malware and zero-day exploits
Recommended Actions: 1. Navigate to Sentinels → Policy → [Target Group] → Protection Mode 2. Navigate to Sentinels → Policy → [Target Group] → Engines 3. Navigate to Visibility → STAR → New Rule
Verification Steps: - Navigate to Sentinels → Endpoints and filter by 'Policy Status' - Review Incidents → Threat Details for any blocked Office-based executions
This guidance assumes standard Singularity Control or Complete licensing. UI paths may vary slightly based on the specific console version (e.g., Singularity vs. DataSet integration).
⚠️ Disclaimer: Test all detection logic in non-production environments before deployment.
1. Vendor Platform Configuration - SentinelOne
2. YARA Rule for Russian State Malware (Covenant/MiniDoor)
rule APT28_Covenant_MiniDoor_Indicators {
meta:
description = "Detects artifacts related to APT28/Forest Blizzard campaign exploiting CVE-2026-21509"
author = "Threat Rundown"
date = "2026-02-03"
reference = "https://therecord.media/russian-state-hackers-exploit-new-microsoft-flaw"
severity = "high"
tlp = "white"
strings:
$s1 = "MiniDoor" ascii wide
$s2 = "PixyNetLoader" ascii wide
$s3 = "NotDoor" ascii wide
$s4 = "BlueDelta" ascii wide
$s5 = "Forest Blizzard" ascii wide
$m1 = "Covenant" ascii wide
condition:
any of ($s*) or $m1
}
3. SIEM Query — React Native CLI / Rust Malware Activity
index=security sourcetype="process_execution"
(process_name="*metro*" OR process_name="*react-native*")
(command_line="*rust*" OR command_line="*cargo*" OR command_line="*DeepData*" OR command_line="*LightSpy*")
| eval risk_score=case(
like(command_line, "%DeepData%"), 100,
like(command_line, "%LightSpy%"), 100,
like(process_name, "%metro%") AND like(command_line, "%rust%"), 75,
1==1, 25)
| where risk_score >= 75
| table _time, src_ip, user, process_name, command_line, risk_score
| sort -_time
4. PowerShell Script — Check for mObywatel Vulnerability Exposure (iOS Mgmt)
This rundown should provide a solid overview of the current threat landscape. Thank you to all our cyberheroes for your diligence and hard work. Stay vigilant!