ARTICLE
13 March 2026

Cybersecurity Newsletter

LB
Lewis Brisbois Bisgaard & Smith LLP

Contributor

Founded in 1979 by seven lawyers from a premier Los Angeles firm, Lewis Brisbois has grown to include nearly 1,400 attorneys in 50 offices in 27 states, and dedicates itself to more than 40 legal practice areas for clients of all sizes in every major industry.
Not An Invite You Want to Receive. On February 2, 2026, security researchers identified a new scam where cybercriminals use fake party invitation emails to deceive individuals to download a remote access tool...
United States Technology
Kamran Salour’s articles from Lewis Brisbois Bisgaard & Smith LLP are most popular:
  • with readers working within the Healthcare industries
Lewis Brisbois Bisgaard & Smith LLP are most popular:
  • within Cannabis & Hemp, Finance and Banking and Strategy topic(s)

CONSIDER THIS

  • Not An Invite You Want to Receive. On February 2, 2026, security researchers identified a new scam where cybercriminals use fake party invitation emails to deceive individuals to download a remote access tool, which is used for malicious acts.
  • Under New Management. On February 2, 2026, the Senate confirmed Marine Corps Maj. Gen. Lorna Mahlock as deputy commander of U.S. Cyber Command.
  • The Band Is Back Together. On February 3, 2026, Nick Andersen, a top CISA official, discussed plans for improving the now-disbanded Critical Infrastructure Partnership Advisory Council (CIPAC) and creating an AI Information Sharing and Analysis Center.
  • You Will Comply. On February 6, 2026, CISA ordered the federal government to disconnect from unsupported edge devices to help thwart hackers from exploiting unmonitored routers and insecure Firewalls.

NEW KIDS ON THE BLOCK

  • Hoot. Hoot. On February 2, 2026, security researchers identified new threat actor group Punishing Owl. A previously unknown threat actor calling itself Punishing Owl has claimed responsibility for breaching a Russian government security agency, marking the emergence of what cybersecurity researchers believe is a new politically motivated hacktivist collective.
  • Time To Breathe Fire. On February 3, 2026, LevelBlue profiled the new ransomware group, DragonForce Raas, which deploys ransomware variants derived from LockBit/Conti¸ which attacks critical infrastructure and MSP supply chains.
  • Dyno-mite. On February 5, 2026, researchers identified a new ransomware group, TeamPcp, which targets cloud and containerized environments.

AS THE WORLD TURNS

  • Driving Automatic. On February 6, 2026, malwarebytes issued a report highlighting the 2025 threat actor landscape, urging companies to employ continuous monitoring and defense systems to thwart AI intrusion attacks.
  • Time for Summer School? On February 6, 2026, security researchers revealed that the number of education-related ransomware attacks reached 130 in 2025.
  • That's a Wrap. On February 9, 2026, a report found that the Reynolds ransomware group is leveraging "bring your own vulnerable driver" techniques to more efficiently deploy ransomware payloads.
  • Gonna Go Back In Time. On February 9, 2026, security researchers discussed threat actors reverting back to encryption only techniques as data theft tactics have not proved fruitful.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

[View Source]

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More