Featured image of post Cybersecurity Week in Review: February 25 – March 2, 2026

Cybersecurity Week in Review: February 25 – March 2, 2026

Cyberattacks, data breaches, zero-days, and global responses—discover the biggest cybersecurity headlines of this week.

Major Data Breaches

Healthcare Sector Targeted by Ransomware

A series of ransomware attacks continued to impact healthcare organizations globally, with hospitals and clinics reporting operational disruptions and data exposure. Notably, several incidents mirrored scenarios depicted in popular media, underscoring the real-world consequences of ransomware on patient care and data privacy. While specific victim names were withheld in some reports, the attacks resulted in the exfiltration of sensitive patient records and forced temporary service suspensions. Law enforcement agencies have been notified, and incident response teams are working to restore systems and assess the full scope of the breaches1.

Key Details:

  • Data exposed: Patient records, including personal and medical information
  • Attack vector: Ransomware, often delivered via phishing or exploitation of unpatched systems
  • Response: Service suspensions, forensic investigations, and law enforcement involvement

Cloud Security Lawsuit Highlights Breach Accountability

A high-profile lawsuit between Marquis and SonicWall has brought renewed attention to the complexities of breach responsibility in cloud environments. The case, which emerged this week, centers on a breach that exposed customer data due to alleged misconfigurations and insufficient security controls. The legal proceedings are expected to set important precedents for cloud service providers and their clients regarding shared responsibility and breach notification obligations1.

Key Details:

  • Data exposed: Customer information (specifics undisclosed)
  • Breach cause: Security misconfiguration in cloud infrastructure
  • Response: Ongoing litigation and industry debate over liability

Significant Cyberattacks

Global Law Enforcement Disrupts Major Cybercriminal Collective

In a coordinated international operation dubbed “Project Compass,” law enforcement agencies arrested 30 alleged members of “The Com,” a notorious cybercriminal group. The crackdown, which began in January and culminated this week, also identified nearly 180 additional members. Authorities seized infrastructure and digital assets, significantly disrupting the group’s operations. This action is part of a broader trend of global cooperation to combat organized cybercrime1.

Key Details:

  • Group: “The Com” cybercriminal collective
  • Arrests: 30 individuals, 180 identified
  • Impact: Disruption of cybercrime infrastructure and operations

Lazarus Group Deploys Medusa Ransomware

The North Korean-linked Lazarus Group has shifted tactics, deploying the Medusa ransomware variant in recent attacks. This week, security researchers observed the group targeting organizations across multiple sectors, leveraging sophisticated spear-phishing campaigns and exploiting known vulnerabilities. The attacks resulted in data encryption and exfiltration, with ransom demands issued to victims. The campaign highlights the evolving threat landscape and the persistent risk posed by state-sponsored actors1.

Key Details:

  • Threat actor: Lazarus Group (North Korea)
  • Malware: Medusa ransomware
  • Attack vector: Spear-phishing, vulnerability exploitation
  • Impact: Data encryption, exfiltration, ransom demands

Critical Vulnerabilities

Cisco SD-WAN Zero-Day Exploited for Three Years

A critical zero-day vulnerability in Cisco SD-WAN software has been actively exploited for at least three years, according to a report published this week. The flaw, which affects multiple versions of Cisco’s widely deployed networking solution, allows remote attackers to execute arbitrary code and gain persistent access to enterprise networks. Cisco has released patches and urged immediate updates, while security teams are advised to review logs for signs of historical compromise1.

Technical Details:

  • Product: Cisco SD-WAN
  • Vulnerability: Zero-day (CVE details pending)
  • Exploitation window: 3+ years
  • Risk: Remote code execution, persistent access
  • Mitigation: Apply latest Cisco patches, review network logs

Malicious Next.js Repositories Target Developers

Security researchers have uncovered a campaign leveraging malicious Next.js repositories to target software developers. Attackers created fake job interview scenarios to lure victims into downloading compromised code, which then established backdoors and enabled data theft. The campaign underscores the risks associated with open-source software supply chains and the importance of code provenance verification1.

Technical Details:

  • Target: Developers using Next.js
  • Attack method: Malicious repositories, social engineering (fake job interviews)
  • Impact: Backdoor installation, data theft
  • Mitigation: Verify repository authenticity, use trusted sources

Government Responses

Operation Red Card 2.0: 651 Arrests in Africa

African law enforcement agencies, in collaboration with international partners, executed “Operation Red Card 2.0,” resulting in 651 arrests related to cyber-enabled financial crimes. The operation targeted networks involved in business email compromise (BEC), online fraud, and money laundering. Authorities seized digital evidence and disrupted several major criminal operations, demonstrating the growing capacity of African nations to address cybercrime1.

Key Details:

  • Operation: Red Card 2.0
  • Arrests: 651 individuals
  • Crimes: BEC, online fraud, money laundering
  • Impact: Disruption of criminal networks, seizure of digital assets

CISA and FBI Issue Joint Advisory on Ransomware

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) released a joint advisory this week, warning organizations about the resurgence of ransomware attacks targeting critical infrastructure. The advisory provides technical indicators of compromise (IOCs), recommended mitigations, and guidance on incident response. Organizations are urged to implement multi-factor authentication, maintain offline backups, and report incidents promptly1.

Key Details:

  • Agencies: CISA, FBI
  • Focus: Ransomware targeting critical infrastructure
  • Recommendations: MFA, offline backups, incident reporting

Miscellaneous

RAMP Forum Seizure Fractures Ransomware Ecosystem

Law enforcement agencies successfully seized the RAMP cybercrime forum, a major hub for ransomware operators and affiliates. The takedown has caused significant disruption within the ransomware ecosystem, with threat actors scrambling to find alternative platforms for collaboration and data leaks. Security experts anticipate a temporary reduction in ransomware activity as criminals regroup1.

Key Details:

  • Platform: RAMP cybercrime forum
  • Action: Law enforcement seizure
  • Impact: Disruption of ransomware operations, fragmentation of criminal networks

Source List


This week’s review highlights the persistent and evolving nature of cyber threats, the importance of timely vulnerability management, and the growing effectiveness of international law enforcement collaboration. Organizations are urged to remain vigilant, prioritize patching, and foster a culture of security awareness to mitigate the risks posed by both criminal and state-sponsored actors.