State Hackers Hit 37 Countries, BeyondTrust CVSS 9.9 RCE, Signal Hijacked & More | HN Ep. 61

State Hackers Hit 37 Countries, BeyondTrust CVSS 9.9 RCE, Signal Hijacked & More | HN Ep. 61

Author: Cipherceval February 19, 2026 Duration: 21:55

A newly uncovered state-backed espionage group has compromised 70 organizations across 37 countries in a single year — and they were scanning infrastructure in 155 more. In this episode of Hacking News, we break down Palo Alto Unit 42's Shadow Campaigns investigation, a CVSS 9.9 pre-authentication RCE in BeyondTrust's remote access tools, a state-sponsored Signal phishing campaign targeting European politicians and military officials without using a single line of malware, CISA's aggressive new directive ordering federal agencies to rip out end-of-life edge devices, and an Everest ransomware claim against Iron Mountain that turned out to be far less than advertised.

Whether you're a cybersecurity professional, IT admin, or just someone who wants to stay informed about the threats facing our digital world — this episode has critical takeaways you can act on today.

🔒 Key Topics Covered:
• TGR-STA-1030 "Shadow Campaigns" — state-backed espionage across 37 countries
• BeyondTrust CVE-2026-1731 — CVSS 9.9 pre-auth RCE in remote access tools
• Signal Phishing Campaign — German BfV/BSI advisory on account hijacking
• CISA BOD 26-02 — Binding directive to eliminate end-of-support edge devices
• Iron Mountain / Everest Ransomware — 1.4TB breach claims vs. reality

⏱️ Timestamps:
0:00 — Cold Open: One group, 37 countries breached
1:10 — Forge OS Intro
1:14 — Welcome & CTA
1:38 — Shadow Campaigns: State-Backed Espionage at Unprecedented Scale
7:04 — BeyondTrust CVE-2026-1731: CVSS 9.9 Pre-Auth RCE
11:07 — Signal Phishing: Hijacking Accounts Without Malware
14:10 — CISA BOD 26-02: Rip Out Your End-of-Life Edge Devices
16:55 — Iron Mountain vs. Everest Ransomware: Claims vs. Reality
19:38 — Recap & Key Takeaways
21:40 — Outro

📌 Resources & Sources:
• Unit 42 Shadow Campaigns Report: https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/
• BeyondTrust Security Advisory BT26-02: https://www.beyondtrust.com/trust-center/security-advisories/bt26-02
• German BfV/BSI Signal Phishing Advisory: https://thehackernews.com/2026/02/german-agencies-warn-of-signal-phishing.html
• CISA BOD 26-02 Directive: https://www.cisa.gov/news-events/directives/bod-26-02-mitigating-risk-end-support-edge-devices
• Iron Mountain / Everest Coverage: https://cybernews.com/security/iron-mountain-data-breach-claims/

🎧 Listen on Spotify & Apple Podcasts — search "Exploit Brokers by Forgebound Research" and hit follow!

💬 Found this valuable? Share it with a coworker or friend who touches a computer.


Exploit Brokers by Forgebound Research
Host: Cipherceval
"Learn more about the threats we face and gain a bit more knowledge than yesterday."


Ever wonder how a hacker actually thinks when they're picking a digital lock? That's the kind of curiosity that drives Exploit Brokers By Forgebound Research. Hosted by Cipherceval, this isn't just a rundown of the week's scary headlines. Instead, it's a deep, analytical dive into the mechanics behind major cyber events. Each episode takes apart real-world incidents-from sprawling data breaches and clever malware to massive botnet takedowns-and walks through the how and why. The goal is practical: by understanding the tools and tactics used in an attack, we can all build smarter defenses. You'll find a mix of sharp commentary on breaking tech news and clear, insightful tutorials that demystify complex security concepts. Tune in for a perspective that goes beyond surface-level reporting, offering a genuine look into the mindset of both attackers and defenders. This podcast serves as a valuable resource for anyone from IT professionals to simply tech-curious listeners who want to move past fear and into comprehension.
Author: Language: en-us Episodes: 62

Exploit Brokers By Forgebound Research - Tech and Hacking News Commentary
Podcast Episodes
HN41 - Chinese Hackers Hijack US Telecom Networks [not-audio_url] [/not-audio_url]

Duration: 15:46
In this eye-opening episode of Exploit Brokers, your host Lauro dives deep into the recent cyberattacks that have compromised major U.S. telecommunications networks. Chinese state-sponsored hackers, known as Salt Typhoon…
HN38 - Is Your Tap-to-Pay Secure? The Latest Android Malware Warning [not-audio_url] [/not-audio_url]

Duration: 13:35
Is Your Tap-to-Pay Secure? The Latest Android Malware Warning 🔒 In this episode of Exploit Brokers, we dive deep into a new Android malware that targets NFC technology to steal your banking information. 📱💳 If you use tap…
HN37 - AI Manipulation: The Silent Threat to Democracy [not-audio_url] [/not-audio_url]

Duration: 16:32
🚨 AI Propaganda Exposed: How It's Influencing Elections Right Now! 🚨 In this episode of Exploit Brokers, we dive deep into the unsettling world of AI-driven misinformation campaigns. From targeting voters on both sides t…
HN36 - Fake Sites, Real Danger: The Trojan Malware in Extensions [not-audio_url] [/not-audio_url]

Duration: 15:08
In this episode of Exploit Brokers, we dive into a significant new threat spreading across the web—Trojan malware hidden in malicious browser extensions. These sneaky extensions are distributed through fake download site…