State Hackers Hit 37 Countries, BeyondTrust CVSS 9.9 RCE, Signal Hijacked & More | HN Ep. 61

State Hackers Hit 37 Countries, BeyondTrust CVSS 9.9 RCE, Signal Hijacked & More | HN Ep. 61

Author: Cipherceval February 19, 2026 Duration: 21:55

A newly uncovered state-backed espionage group has compromised 70 organizations across 37 countries in a single year — and they were scanning infrastructure in 155 more. In this episode of Hacking News, we break down Palo Alto Unit 42's Shadow Campaigns investigation, a CVSS 9.9 pre-authentication RCE in BeyondTrust's remote access tools, a state-sponsored Signal phishing campaign targeting European politicians and military officials without using a single line of malware, CISA's aggressive new directive ordering federal agencies to rip out end-of-life edge devices, and an Everest ransomware claim against Iron Mountain that turned out to be far less than advertised.

Whether you're a cybersecurity professional, IT admin, or just someone who wants to stay informed about the threats facing our digital world — this episode has critical takeaways you can act on today.

🔒 Key Topics Covered:
• TGR-STA-1030 "Shadow Campaigns" — state-backed espionage across 37 countries
• BeyondTrust CVE-2026-1731 — CVSS 9.9 pre-auth RCE in remote access tools
• Signal Phishing Campaign — German BfV/BSI advisory on account hijacking
• CISA BOD 26-02 — Binding directive to eliminate end-of-support edge devices
• Iron Mountain / Everest Ransomware — 1.4TB breach claims vs. reality

⏱️ Timestamps:
0:00 — Cold Open: One group, 37 countries breached
1:10 — Forge OS Intro
1:14 — Welcome & CTA
1:38 — Shadow Campaigns: State-Backed Espionage at Unprecedented Scale
7:04 — BeyondTrust CVE-2026-1731: CVSS 9.9 Pre-Auth RCE
11:07 — Signal Phishing: Hijacking Accounts Without Malware
14:10 — CISA BOD 26-02: Rip Out Your End-of-Life Edge Devices
16:55 — Iron Mountain vs. Everest Ransomware: Claims vs. Reality
19:38 — Recap & Key Takeaways
21:40 — Outro

📌 Resources & Sources:
• Unit 42 Shadow Campaigns Report: https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/
• BeyondTrust Security Advisory BT26-02: https://www.beyondtrust.com/trust-center/security-advisories/bt26-02
• German BfV/BSI Signal Phishing Advisory: https://thehackernews.com/2026/02/german-agencies-warn-of-signal-phishing.html
• CISA BOD 26-02 Directive: https://www.cisa.gov/news-events/directives/bod-26-02-mitigating-risk-end-support-edge-devices
• Iron Mountain / Everest Coverage: https://cybernews.com/security/iron-mountain-data-breach-claims/

🎧 Listen on Spotify & Apple Podcasts — search "Exploit Brokers by Forgebound Research" and hit follow!

💬 Found this valuable? Share it with a coworker or friend who touches a computer.


Exploit Brokers by Forgebound Research
Host: Cipherceval
"Learn more about the threats we face and gain a bit more knowledge than yesterday."


Ever wonder how a hacker actually thinks when they're picking a digital lock? That's the kind of curiosity that drives Exploit Brokers By Forgebound Research. Hosted by Cipherceval, this isn't just a rundown of the week's scary headlines. Instead, it's a deep, analytical dive into the mechanics behind major cyber events. Each episode takes apart real-world incidents-from sprawling data breaches and clever malware to massive botnet takedowns-and walks through the how and why. The goal is practical: by understanding the tools and tactics used in an attack, we can all build smarter defenses. You'll find a mix of sharp commentary on breaking tech news and clear, insightful tutorials that demystify complex security concepts. Tune in for a perspective that goes beyond surface-level reporting, offering a genuine look into the mindset of both attackers and defenders. This podcast serves as a valuable resource for anyone from IT professionals to simply tech-curious listeners who want to move past fear and into comprehension.
Author: Language: en-us Episodes: 62

Exploit Brokers By Forgebound Research - Tech and Hacking News Commentary
Podcast Episodes
HN24 -  Sandwich Data Breach Alert: Jason's Deli & Subway Under Attack [not-audio_url] [/not-audio_url]

Duration: 20:19
🔒 Dive into the world of cybersecurity as we uncover the latest threats facing businesses in today's digital landscape. In this video, we dissect the Jason's Deli data breach, shedding light on the dangers of credential…
HN23 - One Click Away: The Alarming Reality of Data Theft Exploits [not-audio_url] [/not-audio_url]

Duration: 14:58
In this eye-opening episode of Exploit Brokers, we delve deep into the world of cybercrime, dissecting the sinister Phemedrone Stealer malware and its ability to pilfer your precious data. Join us as we explore the chill…
HN22 - Crypto Chaos: How a Fake SEC Tweet Triggered a Bitcoin Spike [not-audio_url] [/not-audio_url]

Duration: 19:29
In this gripping episode of Exploit Brokers, we delve deep into the intricate world of cryptocurrency and cybersecurity. Our journey begins with the astonishing SEC Twitter hack, where hackers manipulated the SEC's accou…
HN18 - AI's Silent Takeover in the CIA & IRS [not-audio_url] [/not-audio_url]

Duration: 19:45
🔍 In this episode of Exploit Brokers, we dive deep into the growing use of AI by government agencies like the CIA and IRS. Are we heading towards a world where AI is used in ways that could infringe upon our rights and p…