BLOG
Cybersecurity Insights series: February 2026 – this month in cybersecurity

Welcome to our Cybersecurity Insights blog, where we break down the most impactful cyber events shaping today’s threat landscape. February 2026 delivered several high-profile breaches across hospitality, sports, and education – each illustrating the diverse motivations and methods driving today’s cybercriminal operations.
Craig Lusher examines three major incidents that captured attention this month.
Wynn Resorts: Employee data breach tied to ShinyHunters extortion campaign
Luxury Las-Vegas based hospitality operator Wynn Resorts confirmed a data breach after its name appeared – and was later removed – from the ShinyHunters leak site. It is believed that an unauthorized third party accessed over 800,000 employee records, including personally identifiable information such as Social Security numbers.
The ShinyHunters group claimed responsibility, threatening to publish the data unless Wynn made contact before February 24, 2026, and reportedly demanded a ransom.
Reports suggest that the ransom demand was roughly $1.5 million.
Although Wynn has not confirmed payment, the attackers later stated the stolen data had been deleted – an assertion security researchers note often implies a completed negotiation.
Wynn reports that operations and guest services were unaffected, and the company is offering credit monitoring and identity protection services to impacted employees.
The active ShinyHunters group is believed to have targeted more than 100 organizations across its campaigns, utilizing vishing and compromised SSO credentials.
C8 Secure perspective
The ShinyHunters group is well documented for using vishing (voice phishing) and compromised SSO credentials as their primary entry points. Defending against these techniques requires a combination of people, process, and technology working together.
On the human side, regular security awareness training combined with realistic phishing and vishing simulations helps staff recognize social engineering attempts before credentials are handed over. C8 Secure’s SafeBait managed service delivers exactly this, providing customized vishing, phishing, smishing, and quishing simulations tailored to an organization’s specific language, culture, and operational procedures, alongside interactive training modules that build long-term behavioral change.
From a technical standpoint, 24/7 monitoring is essential for detecting compromised credential usage. C8 Secure’s M-SOC service provides continuous monitoring across identity systems, endpoints, and network activity, using behavioral analysis and threat intelligence to flag anomalous access patterns such as unusual login locations, privilege escalation, or bulk data access that might indicate stolen credentials being put to use. When combined with our EDR/MDR solution, which prevents both known and unknown threats at the endpoint using machine learning and behavioral analysis, organizations gain the ability to detect and contain threats before large-scale data exfiltration occurs.
The scale of this breach, over 800,000 employee records including Social Security numbers, also reinforces the need for organizations to understand where their sensitive data resides and who has access to it. Regular security assessments, including VAPT exercises, help identify weaknesses in access controls and data handling before attackers find them.
Olympique Marseille: Cyberattack exposes supporter and staff data
French Ligue 1 football club Olympique de Marseille (OM) confirmed it was the target of a cyber attack after a threat actor leaked a sample of stolen data online. The attacker claims to have accessed a database of approximately 400,000 individuals, including names, addresses, emails, phone numbers, and order information, as well as over 2,050 Drupal CMS accounts.
OM stated that no banking information or passwords were compromised and that systems were quickly secured thanks to rapid mobilization of internal teams and specialist providers. The club has notified the French data protection authority (CNIL), filed a complaint, and urged supporters to remain vigilant against phishing attempts.
C8 Secure perspective
The compromise of over 2,050 Drupal CMS accounts alongside a database of approximately 400,000 individuals points to weaknesses in web application security, a common and often underestimated attack surface. Content management systems like Drupal are frequent targets because they are internet-facing, regularly contain known vulnerabilities, and are often left unpatched or misconfigured.
C8 Secure’s Cloud WAAP (Web Application and API Protection) is designed to address precisely this risk. Powered by Fortinet and deployed across our global network, it protects web applications against the OWASP Top 10, zero-day exploits, SQL injection, cross-site scripting, and malicious bot activity. AI-based machine learning self-tunes to the specific application being protected, meaning it adapts to the organization’s environment rather than relying solely on generic rule sets. For organizations running public-facing platforms, particularly those handling customer data at scale, this kind of protection should be considered a baseline rather than an optional extra.
Beyond real-time protection, regular Vulnerability Assessment and Penetration Testing (VAPT) would help identify weaknesses in CMS configurations, authentication mechanisms, and data access controls before they can be exploited. C8 Secure’s VAPT services combine manual and automated testing across web applications, APIs, and infrastructure, with findings mapped to a risk register and prioritized remediation guidance provided to both technical and executive stakeholders.
OM stated that no banking information or passwords were compromised, which is positive, but the volume of personal data exposed, names, addresses, emails, phone numbers, and order information, is more than sufficient for targeted phishing campaigns against affected supporters. Organizations holding this type of data should also consider how 24/7 SOC monitoring could detect unusual database queries or bulk data exfiltration in progress, providing the opportunity to contain a breach before its full impact is realized.
La Sapienza University, Rome: Major outage following suspected ransomware attack
One of Europe’s largest universities, La Sapienza University of Rome, was knocked offline for several days after an apparent ransomware attack. The university shut down its systems as a precaution, reporting disrupted access to email, workstations, student portals, and core academic services.
Italian outlet Il Corriere della Sera reported that the attack was carried out by a previously unknown group called “Femwar02,” allegedly using BabLock (Rorschach) ransomware. The attackers reportedly delivered a ransom demand containing a 72-hour countdown timer triggered upon opening a provided link.
Despite the disruption, exams continued with manual workarounds, and the university began restoration efforts using unaffected backups. As of reporting, the university website and several services remained down while national authorities investigated the incident.
C8 Secure perspective
The use of BabLock (also known as Rorschach) ransomware is notable here. It is recognized for its unusually fast encryption speed, which means the window between initial execution and full impact is extremely narrow. This makes prevention and early detection far more important than relying on response alone.
C8 Secure’s EDR/MDR solution addresses this directly. Unlike traditional antivirus that relies solely on signature-based detection, our endpoint protection uses machine learning, behavioral analysis, and external threat intelligence to prevent both known and unknown threats, including ransomware. Behavior-based ransomware prevention is specifically designed to block encryption activity before it can spread across a disk or network share. Our managed detection and response team works around the clock as an extension of the customer’s own team, continuously monitoring endpoints and responding to threats following customer-defined playbooks.
Sitting alongside endpoint protection, C8 Secure’s M-SOC service provides the broader visibility needed to detect the precursors to a ransomware attack, such as lateral movement, privilege escalation, or command-and-control communications, often days before the ransomware payload is deployed. Our SIEM platform correlates events across endpoints, network devices, and cloud environments in real time, with automated SOAR workflows enabling rapid containment actions such as isolating compromised devices and blocking malicious traffic.
It is worth noting that La Sapienza was able to restore services using unaffected backups, which is a positive outcome and a reminder that tested, verified backup strategies remain one of the most effective defenses against ransomware. However, backups are a last resort, not a strategy in themselves. Regular security audits and VAPT exercises help identify the gaps that ransomware operators look for during initial access and lateral movement, while ongoing vulnerability scanning ensures that known weaknesses are addressed promptly. The goal should be to stop the attack before encryption begins, and that requires layered defenses working together across prevention, detection, and response.
Final thoughts
February’s incidents share a common thread: in each case, the attackers exploited gaps that existing security measures either missed or couldn’t respond to quickly enough. Stolen SSO credentials at Wynn, an exposed CMS platform at Olympique Marseille, and rapid-encryption ransomware at La Sapienza each represent a different attack vector, but all three were preventable with the right combination of technology, monitoring, and testing in place.
Organizations must invest in:
- Layered defenses across identity, endpoints, and networks
- Continuous monitoring and rapid incident response
- Resilient operational planning and tested backup strategies
- Security awareness programs tailored to staff, fans, students, and frontline personnel
Cybersecurity solutions for a safer tomorrow
For more information on how C8 Secure can support your cybersecurity initiatives, email info@c8secure.com or fill out our Contact Us page.
DOWNLOAD BROCHURE
For more information, please download our solutions brochure




The state of play: Rising threats and escalating Costs

Hello Chand, you completed your one-year anniversary earlier this year. Can you tell us how your first year has gone?









