Weekly threat intelligence digest — 2026-W09
Weekly security intelligence digest covering 36 items, 57 CVEs. 29 critical, 1 low, 5 high, 1 medium.
Weekly threat intelligence digest: February 27 - March 5, 2026
Executive summary
This week saw a surge in critical vulnerabilities across multiple industries, including electric vehicle (EV) charging stations, industrial control systems, and AI gateways. Malicious actors demonstrated increased sophistication, targeting air-gapped networks and exploiting third-party software weaknesses. A notable data exposure incident in South Korea highlighted the risks of poor security practices in government agencies. Defenders must prioritize patching and monitoring to mitigate these threats.
Critical & high priority
1. Critical Vulnerabilities in EV Energy Charging Stations
- What happened: Multiple critical vulnerabilities were discovered in EV Energy's charging stations, allowing attackers to gain administrative control or disrupt services. These flaws pose significant risks to the growing EV infrastructure.
- Who’s affected: EV charging networks and electric vehicle users relying on these stations.
- What to do: Apply patches immediately and conduct thorough security audits of charging station firmware.
2. Multiple Critical Vulnerabilities in Copeland XWEB Devices
- What happened: Over 30 critical vulnerabilities were identified in Copeland’s XWEB and XWEB Pro devices, enabling attackers to bypass authentication, cause denial-of-service (DoS), and execute arbitrary code.
- Who’s affected: Industrial facilities and critical infrastructure using these devices.
- What to do: Update firmware to the latest version and disable unnecessary features or services.
3. APT37 Exploits New Malware for Air-Gap Network Attacks
- What happened: North Korean state-sponsored group APT37 is leveraging new malware to breach air-gapped networks, focusing on removable drives and covert surveillance.
- Who’s affected: Industrial and government organizations with air-gapped systems.
- What to do: Enforce strict policies around removable media and monitor for unusual network activity.
4. South Korea Tax Agency Crypto Wallet Seed Exposure
- What happened: The National Tax Service inadvertently exposed a cryptocurrency wallet seed in a press release, leading to a $4.8 million theft.
- Who’s affected: South Korean taxpayers and cryptocurrency holders.
- What to do: Strengthen internal security protocols and conduct regular audits of sensitive data disclosures.
Notable developments
1. Windows 11 Enhances Batch File Security
- Microsoft introduced improvements in Windows 11 Insider Preview builds to mitigate script-based attacks via batch files and CMD scripts. This move addresses a common attack vector for malicious actors.
2. Third-Party Software Risks
- Third-party software, such as PDF readers and email clients, continues to pose significant risks. Organizations must prioritize consistent patching and consider adopting zero-trust principles for external tools.
Vulnerability landscape
This week saw a sharp increase in tracked CVEs, with 332 new vulnerabilities reported. The severity distribution highlights:
- Critical: 57 (17%)
- High: 185 (56%)
- Medium/Low/Unknown: 90 (27%)
The top affected vendors include:
- Mozilla (44 CVEs)
- Copeland (23 CVEs)
- ImageMagick (8 CVEs)
- Yokogawa (6 CVEs)
The trend suggests a growing focus on industrial and IoT systems, with vulnerabilities in EV infrastructure, AI gateways, and industrial control systems dominating the landscape.
Recommended actions
- Patch Critical Vulnerabilities: Prioritize updates for Copeland XWEB devices, EV Energy charging stations, and any other systems with known critical flaws.
- Monitor Air-Gap Networks: Implement additional security measures for air-gapped environments to counter APT37’s new malware capabilities.
- Secure Third-Party Software: Regularly update third-party tools like PDF readers and email clients, and consider adopting zero-trust policies.
- Review Internal Security Practices: Following the South Korea tax agency incident, ensure your organization has robust data handling protocols to prevent sensitive information exposure.
Looking ahead
Next week, expect:
- More vulnerabilities in industrial control systems (ICS) as attackers target critical infrastructure.
- Increased activity from APT37 and similar groups targeting air-gapped networks.
- Potential exploitation of newly disclosed vulnerabilities in EV charging stations and AI gateways.
Defenders should remain vigilant and prepare for a continued rise in sophisticated attacks targeting niche industries and emerging technologies.
Newsletter
One email a week. Security research, engineering deep-dives and AI security insights - written for practitioners. No noise.