Technology

Technology

GreyNoise: Single threat actor behind 83% of recent Ivanti EPMM RCE exploitation

Feb 15, 2026 10:36

GreyNoise telemetry shows that one source IP linked to bulletproof hosting accounted for the majority of exploitation attempts against two critical, unauthenticated RCE flaws in Ivanti Endpoint Manager Mobile (EPMM). Defenders are urged to patch/hotfix quickly and not rely solely on widely-circulated IoC lists.

Technology

Malicious Chrome extensions found stealing Meta Business data and 2FA material

Feb 15, 2026 10:36

Researchers warn that seemingly legitimate Chrome extensions can exfiltrate high-value business data and even time-based one-time password (TOTP) seeds, enabling account takeovers when paired with stolen credentials. Separate campaigns also abused “AI assistant” branding to siphon emails and browsing data at scale.

Technology

GreyNoise: Single source IP drove 83% of recent Ivanti EPMM RCE exploitation

Feb 15, 2026 10:36

GreyNoise telemetry suggests one bulletproof-hosted IP address accounted for the vast majority of active exploitation attempts against two critical Ivanti Endpoint Manager Mobile (EPMM) vulnerabilities. The activity shows heavy automation and widespread scanning behavior typical of initial access broker operations.

Technology

Malicious Chrome extensions caught stealing Meta Business data and 2FA material

Feb 15, 2026 10:36

Researchers warn that a Chrome Web Store extension marketed as a Meta Business Suite helper can exfiltrate Business Manager exports and time-based one-time password (TOTP) secrets. Separate research also highlights large-scale extension abuse targeting VK accounts and fake AI assistant add-ons.

Technology

GreyNoise: One actor accounts for 83% of observed exploitation of recent Ivanti EPMM RCEs

Feb 15, 2026 10:35

Threat intelligence data suggests a single source IP on “bulletproof” hosting is behind the majority of active exploitation attempts for two critical Ivanti Endpoint Manager Mobile vulnerabilities. Researchers observed spikes in automated probing and verification behavior consistent with initial access broker activity.