Cyber threats in the Philippines are shifting toward human-centric manipulation. Organized syndicates now use sophisticated social engineering, such as impersonating government officials and hijacking technical platforms like Axios, to bypass automated security and compromise enterprises.
Cyber Risks Brief: 2026-04-01
Recent supply chain attacks on widely used development tools and severe network equipment vulnerabilities demand immediate patching. Additionally, Philippine enterprises are advised to maintain strict vigilance against persistent, state sponsored cyber espionage and data harvesting operations.
Cyber Risks Brief: 2026-03-19
Philippine authorities are intensifying crackdowns on illegal gambling and regional scam hubs, while Meta has disabled 150,000 fraudulent accounts. Concurrently, enterprises face rising threats from APT41 espionage, sophisticated VPN phishing, and critical vulnerabilities in Microsoft and Veeam.
Cyber Risks Brief: 2026-03-05
The Philippine government has shifted to monitoring Telegram, while the BSP proposes annual cyber self-assessments for banks. Regionally, the FBI is targeting industrialized scam hubs. Meanwhile, threat actors are weaponizing AI tools and malicious web apps to bypass enterprise defenses.
Write-ups
90 reports
Microsoft’s Monthly Patch February 2026: 58 Vulnerabilities, 6 Zero-days, and Infinite Restart Loop Issue Reported
The February update from Microsoft addresses fifty eight vulnerabilities including six critical zero day threats. While this release secures the Windows Shell and Microsoft Office Word from active exploits, some users report restart errors. Immediate installation is advised to protect systems.
Apple Patches First Zero-Day of 2026: Targeted Attacks Confirm Active Exploit (CVSS 7.8)
Apple disclosed a critical zero-day memory corruption flaw in its dynamic linker service, affecting iPhones, iPads, and Macs. The vulnerability allows attackers to bypass security gatekeepers and execute malicious code at the core operating system level.
Update Now: Google Patches Zero-Day Flaw Exploited in the Wild (CVSS 8.8)
Google disclosed a high-severity "use after free" vulnerability in the Chrome CSS engine. The flaw allows remote code execution via malicious webpages. With active exploitation confirmed, immediate updates are required for all Chromium-based browsers.
State-Sponsored Hackers Weaponize Gemini AI for Cyber Operations
The Google Threat Intelligence Group reported that state-sponsored hackers from Russia, China, Iran, and North Korea are weaponizing the Gemini AI model. These actors use AI to accelerate reconnaissance, automate phishing, and refine malware, significantly increasing the scale of cyberattacks.
Cybercrime Group 0APT Weaponizing Fake Breaches for Real Extortion
Researchers identified "0APT," a cybercrime group using recycled data to falsely claim breaches for extortion. This "disruption without intrusion" tactic weaponizes public trust to cause reputational harm and drain resources, especially impactful for Philippine firms with limited security budgets.
Threat Actors Utilizing Malware to Compromise Devices in Crypto-theft Attacks; Increasing macOS Infection Reported
North Korean threat actors are targeting the fintech industry using AI deepfakes and "ClickFix" tactics to deploy malware on Windows and macOS. By impersonating executives in video calls, they trick victims into executing malicious commands to steal cryptocurrency and sensitive identity data.
Chinese-Linked APT Group Targets Major Singapore Telcos
The China-linked threat actor UNC3886 targeted Singapore’s major telecommunications providers in a sophisticated espionage campaign. By exploiting zero-day vulnerabilities in edge devices, the group harvested network configurations, posing systemic supply-chain risks for the region.
SEC Flags Unregistered Online Lending Apps
Philippines Strengthens Defense Against Financial and AI-Driven Scams
The PNP-ACG and BPI formalized a partnership to combat sophisticated financial crimes through real-time fraud monitoring and intelligence sharing. Concurrently, the CICC warned of deepfake AI being used in romance scams to impersonate individuals and bypass traditional fraud detection methods.
Glassworm Malware Hits macOS Developer Tools
Threat actors hijacked a trusted publisher account on the Open VSX Registry to weaponize four popular developer extensions with the Glassworm infostealer. Impacting 22,000 downloads, the malware targets AWS credentials and GitHub tokens to gain insider access to corporate environments.
Coordinated Cyberattacks Hit Poland’s Energy Grid
Volatile Risks of OpenClaw
OpenClaw, a viral AI assistant, has been flagged for a critical remote code execution vulnerability. Due to its high-level system permissions and lack of sandboxing, attackers can use indirect prompt injection to exfiltrate API keys and sensitive corporate data.
AWS Recent Breach Demonstrates AI’ Speed in Compromising Security
An attacker used AI to escalate from a single stolen credential to full AWS administrative control in just eight minutes. This "LLMjacking" incident highlights a shift to machine-speed threats, where attackers automate reconnaissance to hijack cloud resources and bypass traditional defenses.
Two RCE Vulnerabilities in Automation Platform n8n Disclosed (CVSS 9.9 and 8.5)
The workflow automation platform n8n disclosed two critical RCE vulnerabilities. These flaws allow authenticated users to escape sandboxes and execute commands on the host server, risking credential theft and infrastructure-level control across connected services.
Sandbox Escape Vulnerability Found in vm2 NodeJS Library (CVSS 9.8)
A critical sandbox escape vulnerability was disclosed in the vm2 NodeJS library, carrying a CVSS of 9.8. The flaw allows attackers to bypass restricted environments to execute commands, install malware, and steal credentials, impacting software supply chain security.
Russian APT28 Exploiting Recently Patched Microsoft Office Flaw
Russian state-sponsored group APT28 is exploiting a Microsoft Office vulnerability to target government and defense sectors. This "Operation Neusploit" uses compromised documents to bypass security checks, deploying malware for long-term intelligence gathering and data theft.
Notepad++ Update Infrastructure Compromised by State-Sponsored Groups
Chinese state-sponsored threat actors hijacked the Notepad++ update infrastructure to distribute "Chrysalis" malware. This supply chain attack targeted developers and system administrators, weaponizing trusted software updates to maintain persistent remote access for regional espionage.
China-linked “PeckBirdy” Campaign Threatens Southeast Asian Networks
China-linked threat actors are utilizing the PeckBirdy framework to conduct fileless espionage across Southeast Asia. By mimicking legitimate traffic, the campaign targets government and energy infrastructure, including Philippine institutions, to maintain undetected access.
Fake Amazon Recruiters Exploit Job Seekers
Scammers are exploiting Amazon’s reputation to target job seekers with fraudulent offers. By mimicking official branding and moving conversations to encrypted messaging apps, threat actors trick victims into providing sensitive data or paying fake "training" fees under the guise of recruitment.
New Phishing Campaign Exploits Zoom Infrastructure
Researchers uncovered a new Telephone-Oriented Attack Delivery (TOAD) campaign that exploits Zoom’s infrastructure to bypass security filters. By abusing trusted domains to send legitimate-looking emails, attackers lure victims into fraudulent calls to bypass MFA and steal sensitive financial data.
Multiple Ransomware Groups Target Banking, Hospitality, and Tech Sectors
Multiple ransomware groups, including Qilin and Tengu, have claimed attacks on several Philippine firms, such as PSBank and Lenotech. While LM Metro Hotel confirmed a 30GB data breach, other claims remain unverified by authorities, highlighting a surge in local targeting.
SCAM ALERT: Fake Traffic Violation Text Messages
Authorities are warning of a text scam impersonating government agencies like the MMDA and LTO, claiming recipients have unpaid traffic violations. These messages use pressure tactics and malicious links to redirect victims to fake payment portals to steal banking credentials and personal data.
HoneyMyte’s Persistent Threat to Government Networks across Southeast Asia
HoneyMyte has intensified espionage in South East Asia, targeting government networks via DLL side-loading. The group bypasses security to harvest credentials and monitor activity. With 1,400 past victims in the Philippines, their persistence poses a major risk to national critical infrastructure.
New PayPal Scam: Verified Invoices With Fake Support Numbers
Cyber Risks to Monitor
Critical Takeover Attack Vulnerability in n8n Platform Disclosed (CVSS 10.0)
A critical authentication bypass vulnerability in n8n, dubbed "Ni8mare," allows unauthenticated attackers to achieve full remote code execution. With a maximum CVSS score of 10.0, the flaw enables attackers to weaponize workflows, steal credentials, and compromise connected services.
Critical Cisco Zero-Day Patched After Active Espionage Campaign
Cisco released urgent patches for a maximum-severity zero-day vulnerability in its Secure Email Gateway. Actively exploited by China-linked threat actors, the CVSS 10.0 flaw allows unauthenticated root-level command execution, enabling full device takeover and persistent network access.
China‑Linked Hackers Target North American Critical Infrastructure via Sitecore Zero‑Day
Cisco Talos reports that China-linked group UAT-8837 is exploiting a critical zero-day vulnerability in Sitecore CMS to breach North American critical infrastructure. The group uses insecure configurations to bypass controls, establish long-term persistence, and monitor operational plans.
Latest Microsoft Patch Released – January 2026 -114 Vulnerabilities, 3 Zero-days, and Operational Disruptions Reported
Microsoft's January 2026 update addresses 114 vulnerabilities, including three zero-days, most notably a memory leak in Desktop Windows Manager. Despite critical fixes, the rollout has caused operational disruptions, including Outlook freezes and Windows 11 shutdown failures.
Dangers of Free Online Converter Apps
Threat actors are using malvertising and fake online converter tools to distribute malware via deceptive "CAPTCHA" prompts. By mimicking legitimate productivity services, these fraudulent sites trick users into executing malicious commands and expose sensitive corporate documents to data theft.
Malicious Browser Extensions Steal Credentials and Breach Enterprise Systems
Malicious browser extension campaigns, including are targeting enterprise systems to steal credentials and session tokens. By masquerading as productivity tools, these extensions bypass traditional defenses to capture sensitive data and trigger social engineering attacks.
Microsoft Patches “Reprompt” Flaw: Single-click Copilot Vulnerability
Researchers uncovered a vulnerability in Microsoft Copilot which allows threat actors to exfiltrate chat histories via a single malicious link. The flaw enables silent command execution within browser-based sessions to send sensitive data to external servers without further user interaction.
Canada, AFP Conduct Joint Cybersecurity Training
The Canadian and Philippine militaries completed a five-day cyber operations course to bolster the AFP’s ability to defend critical infrastructure. Focused on detection and legal alignment, the training strengthens bilateral defense ties and regional resilience against rising cyber threats.
Philippines Lifts Grok AI Ban After Talks with xAI
The CICC lifted the ban on X’s Grok AI after xAI committed to removing deepfake and content manipulation features. The swift reversal followed similar restrictions in Malaysia and Indonesia, highlighting regional efforts to force AI developers to comply with local safety standards.
DICT to Launch “Oplan Bantay Padala” Monitoring Portal
The DICT is launching “Oplan Bantay Padala,” a centralized portal for filing complaints against courier services. Expanding on the “Oplan Bantay Signal” framework, the system aims to enhance accountability, monitor delivery performance, and professionalize the logistics industry.
KimWolf Botnet Reportedly Compromised 2 Million Android-based Streaming Devices
The "Kimwolf" campaign has compromised over two million Android streaming devices, primarily off-brand TV boxes, to build a global botnet. These infected devices facilitate DDoS attacks, credential stuffing, and bandwidth theft, often arriving pre-infected or compromised minutes after setup.
Malicious Chrome Extensions Impersonating AI Tools Steal User Data
Two malicious Chrome extensions, "Prompt Poaching," were found harvesting ChatGPT and DeepSeek chat histories. Posing as productivity tools, they bypassed security—one even holding a "Featured" badge—to exfiltrate sensitive AI data and intellectual property.
Threat Actors Exploit Google Email Cloud Features In ‘Multi-Staged’ Phishing Attacks
Threat actors are abusing Google Cloud’s “Application Integration” tool to send phishing emails from a genuine Google address. By bypassing filters and using fake CAPTCHAs, the multi-stage attack tricks users into entering Microsoft 365 credentials on fraudulent login pages.
Clickfix Attack: Fake BSOD and Booking Targeting European Hospitality Sector
The ClickFix campaign "PHALT#BLYX" targets the hospitality sector using fake BSOD errors to trick users into executing malicious code. By following "fix" instructions, victims paste commands into the Windows Run box, installing the DCRAT trojan to grant attackers remote system control.
Philippine National Police Records Fewer Cybercrime Cases in 2025
The PNP-ACG reported a decline in major cybercrime categories for 2025, including drops in online selling and investment scams. While officials credit awareness efforts, analysts note the data reflects only PNP-handled cases and not the nationwide prevalence across other agencies.
Chinese-Linked Hackers Target Taiwan’s Energy Infrastructure
Taiwan’s NSB reported that Chinese-linked actors, including Mustang Panda and APT41, average 2.63M daily intrusion attempts targeting critical sectors. The focus on energy infrastructure highlights risks for the Philippines' power grid, given its partial ownership by a Chinese state firm.