
Loading summary
A
From the CISO series, it's Cybersecurity Headlines
B
these are the cybersecurity headlines for Wednesday, Feb. 25, 2026. I'm Rich Strofalino Threat actors break out in under 30 minutes according to CrowdStrike's annual global threat Report, the average breakout time for initial network intrusion to other Systems fell to 29 minutes in 2025, 65% faster than last year. The fastest time seen was 27 seconds. Of these incidents, 82% didn't involve malware. Most exploited legitimate credentials or social engineering. But don't forget good old vulnerabilities exploited zero days increased by 42%. Activity from nation state affiliated groups increased 266% year over year, with attacks attributed to North Korea up 130%. We have a link to the full report in our show notes. You should check it out. Claude allegedly hit with Distillation attacks In a blog post, Anthropic claimed that three Chinese firms, Deepseek, Moonshot and Minimax, attempted to copy their CLAUDE models using so called distillation attacks. Model distillation is a technique in which a less proficient model is trained on outputs of a more advanced one isn't necessarily malicious. It is a legitimate technique. But this approach allegedly saw the firms engage in over 15 million exchanges with Claude using roughly 24,000 accounts. These distillation attacks weren't coordinated. Each firm was pursuing a different goal, like improving coding performance or reasoning capabilities. In response, Anthropic rolled out stronger account verification procedures, a more advanced detection system for API traffic, and a tool to detect chain of thought elicitation activity. Defi platform shutting down after Crypto Theft earlier this month, the decentralized finance platform Step Finance disclosed that on January 31, Threat Actors stole US$40 million from its treasury compromise devices from its executive team. After exploring every possible path forward, Step Finance announced it will shut down all operations by the end of the week, along with the associated projects, Solana Floor and the Remora Markets trading platform. The company is still working out details on a buyback program for Stepcoin and Remora Token holders using about $4.7 million worth of recovered crypto assets. UK finds Reddit for age check failings the UK's Information Commissioner's Office we know it as the ICO find Reddit 14.47 million pounds after finding that from May 5, 2018 through July 8, 2025, it processed the personal information of children under 13 unlawfully. In response to the fine, Reddit released a statement saying it didn't require users to share information about their identities, regardless of age, because we are deeply committed to their privacy and and safety. In July 2025, Reddit began age verification of users to comply with the UK's Online Safety Act. The ICO cautioned, though, that more action could be forthcoming, saying Reddit's account creation process made age declaration easy to bypass. And now a huge thanks to our sponsor Adaptive Security this episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI powered social engineering. Picture a new hire who interviews well, except they're synthetic AI, video AI voice AI backstory. Once they're in, they go after payroll, internal docs and access. That's the new reality. The attack surface is trust itself. Adaptive fights back with realistic deepfake simulations and training that actually sticks. Learn more@adaptivesecurity.com Pentagon gives Grok the green light A US Department of Defense official confirmed to Axios that XAI signed an agreement to allow the Pentagon to use its GROK model on classified systems. The agreement allows the Pentagon to use it for all lawful use, unlike claude, which makes carveouts, preventing its use for autonomous weapons development and mass surveillance. Up until now, Anthropic was the only model cleared for classified use by the Dodge. In related news, an axios source says DoD informed Anthropic CEO Dario Amodi that it had until February 27 to comply with similar unfettered access to its models, or it will either label the company a supply chain risk or invoke the Defense Production act to force the company to offer a version tailored for military use. Go maintainer decries GitHub's noise machine Filippo Valsorda maintains the cryptography packages in the GO standard library and previously headed Google's Go security team. After publishing a security fix on GitHub, he saw the repository's Dependabot tool send thousands of pull requests against unaffected repositories, generate a nonsensical CVSS score, and warned that a change in one line of rarely used code had a 27% chance of breaking existing code using it. Valsorta characterized Dependabot as both too noisy with irrelevant alerts compared to things like static analysis tools or other vulnerability scanners, and insufficient because it doesn't consider the impact of a flawless. He recommended for anyone using Go to disable the feature, saying it reduces security by creating alert fatigue. UAE stops attacks on critical infrastructure the United Arab Emirates Cybersecurity Council released a statement saying it successfully thwarted organized cyberattacks of a terrorist nature that targeted the country's digital infrastructure and vital sectors in an attempt to destabilize the nation and disrupt essential services. Last week, a member of the Cybersecurity Council, Mohamed Hamed al kuwaidi, claimed that 70% of threat actors targeting the country were state sponsored. Since signing a cyber cooperation agreement with the US treasury in 2023, the UAE has faced several attacks allegedly originating from Iran. Lazarus Group Expands the Gaze of Medusa Ransomware Researchers from Synmantek and Carbon Black noted that an unknown subgroup within the prolific North Korean operation began using the Medus of ransomware as a service platform for attacks in the Middle east and on several US healthcare organizations since November 2025. The average ransom demanded in these attacks against the US was $260,000. Tactics used in this campaign do align with previous operations by the Stonefly subgroup within Lazarus, also known as Andariel, but there's no reason to believe these are used exclusively. North Korea typically uses ransomware revenue to fund espionage operations Cargurus Data Leaked the Shiny Hunters extortion group published a 6.1 gigabyte trove of data with over 12 million records. They claim the data was stolen from the US auto platform CarGurus. This includes emails, IP addresses, financing applications and outcomes, and dealer account details. No statement from Cargurus about this publication, but the data has been added to the have I Been Pwned dataset, which found 3.7 million records were new to its service. No word on how it breached Cargurus, but of late Shiny Hunter's primary tactic is voice phishing. Hey, are you going to be in Central Florida next week? Then there's a good chance you can join us for a live CISO Series podcast recording. We'll be in Clearwater, Florida on March 3rd as part of the Convene Conference, and then we'll be in Orlando on March 6th for Zero Trust World. For more information on how to join and some discount codes to register for both events, head on over to our events page@cisoseries.com and if you have some thoughts about the news from today or about the show in general, be sure to reach out to us. Feedbackisoseries.com we would love to hear from you. Reporting for the CISO Series, I'm Rich Stroffolino, reminding you to have a super sparkly day.
A
Cybersecurity headlines are available every weekday. Head to cisoseries.com for the full stories. Behind the headlines. It.
Host: Rich Stroffolino
Podcast: CISO Series
Episode: Hacked in 30 minutes, Claude distillation, DeFi shutdown after attack
Date: February 25, 2026
This episode delivers a rapid-fire roundup of the latest pressing stories in the cybersecurity world, emphasizing faster threat actor operations, AI risks, continuing DeFi vulnerabilities, major privacy fines, ransomware developments, and heated discussions on open source security tooling. The host distills key data, quotes officials and researchers, and provides broader industry context—all in a newsy and direct tone.
[00:07 – 01:08]
“The fastest time seen was 27 seconds. Of these incidents, 82% didn't involve malware. Most exploited legitimate credentials or social engineering.” – Rich Stroffolino [00:30]
[01:09 – 02:13]
“These distillation attacks weren't coordinated. Each firm was pursuing a different goal…” – Rich Stroffolino [01:39]
[02:13 – 02:54]
“After exploring every possible path forward, Step Finance announced it will shut down all operations by the end of the week…” – Rich Stroffolino [02:31]
[02:55 – 03:41]
“Reddit's account creation process made age declaration easy to bypass.” – Rich Stroffolino [03:33]
[04:19 – 05:02]
"The agreement allows the Pentagon to use it for all lawful use, unlike Claude, which makes carveouts, preventing its use for autonomous weapons development and mass surveillance." – Rich Stroffolino [04:35]
[05:03 – 05:48]
“He recommended for anyone using Go to disable the feature, saying it reduces security by creating alert fatigue.” – Rich Stroffolino [05:46]
[05:49 – 06:13]
“70% of threat actors targeting the country were state sponsored.” – Rich Stroffolino [06:03]
[06:14 – 06:41]
“North Korea typically uses ransomware revenue to fund espionage operations.” – Rich Stroffolino [06:39]
[06:42 – 07:20]
“No word on how it breached Cargurus, but of late Shiny Hunter's primary tactic is voice phishing.” – Rich Stroffolino [07:17]
This concise episode delivers fast-moving, actionable threat intelligence and commentary that reflects ongoing shifts in attacker strategies and the cyber risk landscape.