Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

2nd March – Threat Intelligence Report

0
Low
Vulnerability
Published: Mon Mar 02 2026 (03/02/2026, 16:29:11 UTC)
Source: Check Point Research

Description

The 2nd March Threat Intelligence Report from Check Point Research details multiple cyber threats and vulnerabilities impacting diverse sectors globally. Notable incidents include data breaches at Wynn Resorts and ManoMano, ransomware attacks targeting the Transport Workers Union of America by the Qilin group, and critical vulnerabilities in AI platforms such as Anthropic's Claude Code enabling remote code execution and credential theft. High-severity vulnerabilities in widely used software like Roundcube Webmail and SolarWinds Web Help Desk allow remote code execution and authentication bypass, with some exploited in the wild. A critical authentication bypass in Cisco Catalyst SD-WAN Controller has been actively exploited for years, prompting emergency patching directives. The report also highlights ongoing threat actor activity linked to Iranian groups, Lazarus-linked ransomware operations, and emerging AI misuse attempts. Protection is available through Check Point’s IPS and endpoint solutions. Organizations worldwide face risks to data confidentiality, operational integrity, and service availability from these multifaceted threats.

AI-Powered Analysis

AILast updated: 03/02/2026, 16:42:21 UTC

Technical Analysis

The Check Point Research 2nd March Threat Intelligence Report provides an extensive overview of recent cyber threats and vulnerabilities affecting multiple industries and geographies. Key incidents include a data breach at Wynn Resorts where employee HR data was accessed following extortion attempts linked to the ShinyHunters group, though operational disruption was avoided. UFP Technologies suffered a cyberattack causing data exfiltration and operational disruptions. The Transport Workers Union of America was targeted by the Qilin ransomware group, exposing personal data of 67,000 members. European marketplace ManoMano reported a breach via a third-party support portal, exposing customer contact information but not payment data. Critical vulnerabilities were discovered in AI systems, notably Anthropic’s Claude Code, allowing remote code execution and API key theft, which could enable attackers to manipulate shared workspaces and extract sensitive workflows. These vulnerabilities were patched (e.g., CVE-2025-59536). Malicious AI usage attempts, including influence operations linked to Chinese law enforcement targeting Japan’s prime minister, were also reported. Two Roundcube Webmail vulnerabilities (CVE-2025-49113 and CVE-2025-68461) enable post-auth remote code execution and unauthenticated cross-site scripting, affecting global deployments including cPanel environments. SolarWinds Web Help Desk suffers from a pre-authentication remote code execution chain (CVE-2025-40552, CVE-2025-40554, CVE-2025-40553) allowing full server takeover without credentials. A critical authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller (CVE-2026-20127, CVSS 10) has been exploited in the wild for years, enabling attackers to gain high privileges and root access, prompting CISA emergency directives. The report also outlines Iranian threat actor clusters active in the Middle East and US, Lazarus-linked ransomware campaigns using Medusa ransomware, and GrayCharlie malware targeting WordPress sites through JavaScript injection and fake updates. Check Point’s IPS and endpoint security solutions provide protection against many of these threats. The report underscores the evolving threat landscape involving ransomware, AI exploitation, and sophisticated state-linked operations.

Potential Impact

The threats detailed in this report pose significant risks to organizations worldwide across multiple sectors including hospitality, manufacturing, transportation, e-commerce, and critical infrastructure. Data breaches at Wynn Resorts and ManoMano compromise employee and customer personal information, increasing risks of identity theft, fraud, and reputational damage. Ransomware attacks on the Transport Workers Union threaten operational continuity and expose sensitive member data, potentially disrupting essential transit services. Vulnerabilities in widely deployed software like Roundcube Webmail and SolarWinds Web Help Desk enable attackers to execute remote code and gain unauthorized access, risking full system compromise, data theft, and service outages. The critical Cisco Catalyst SD-WAN Controller flaw allows persistent, high-privilege access to network infrastructure, threatening network integrity and availability. AI platform vulnerabilities and misuse attempts raise concerns about intellectual property theft, unauthorized data access, and manipulation of AI-driven workflows, potentially impacting organizations relying on AI for critical operations. State-linked threat actor activity and ransomware campaigns increase geopolitical risk and complicate defense efforts. Collectively, these threats can lead to financial losses, operational disruptions, regulatory penalties, and erosion of stakeholder trust.

Mitigation Recommendations

Organizations should implement a multi-layered defense strategy tailored to the specific threats identified. Immediate patching of critical vulnerabilities is essential, particularly for Cisco Catalyst SD-WAN Controllers, SolarWinds Web Help Desk, and Roundcube Webmail deployments, prioritizing those exposed to external networks. Employ network segmentation and strict access controls to limit lateral movement in case of compromise. Deploy advanced endpoint protection and intrusion prevention systems, such as Check Point Harmony Endpoint and IPS, to detect and block ransomware and remote code execution attempts. For AI platforms, enforce strict project configuration validation, rotate API credentials regularly, and monitor for anomalous usage patterns indicative of credential theft or model extraction. Conduct thorough third-party risk assessments, especially for customer support portals and outsourced services, to prevent supply chain breaches. Enhance monitoring and incident response capabilities to rapidly detect and contain breaches, including anomaly detection for unusual authentication or data exfiltration activities. Educate employees on phishing and social engineering tactics linked to ransomware and credential theft. Finally, maintain comprehensive backups with offline copies to mitigate ransomware impact and ensure business continuity.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://research.checkpoint.com/2026/2nd-march-threat-intelligence-report/","fetched":true,"fetchedAt":"2026-03-02T16:42:03.368Z","wordCount":940}

Threat ID: 69a5bddb32ffcdb8a2768b71

Added to database: 3/2/2026, 4:42:03 PM

Last enriched: 3/2/2026, 4:42:21 PM

Last updated: 3/2/2026, 9:06:18 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses