Byer-Nichols Threat Brief Cybersecurity Data for February 16-31 2026
Digital Rage

Byer-Nichols Threat Brief Cybersecurity Data for February 16-31 2026

Season: 2

Published: March 4, 2026

By: Phish Tank Digital

Alex and Sarah break down the latest threat intelligence, discussing the rise of large enterprise victims, the dominance of the Qilin ransomware group, and the strange case of AI-themed malware.

Link: Byer-Nichols Threat Brief Cybersecurity Data for February 16-31 2026

Keywords:

Episode Transcript

00:00:02 - 00:00:19
[Alex] Welcome back to Digital Rage! So, okay, here's the thing... we just got the latest threat brief from the team at Byer Co. It’s written by Jeremy Nichols, and honestly, the data for the second half of February 2026 is... well, it’s a lot to process.
00:00:20 - 00:00:28
[Sarah] Oh, I bet. It feels like every time we look at these reports, the landscape just gets... messier? Is that the right word?
00:00:29 - 00:00:53
[Alex] Messy is actually perfect. Jeremy uses the word 'fragmented.' Basically, there isn’t one big cartel running the show right now. It’s a bunch of different groups all carving out their own space. But, if we're looking at the top of the leaderboard, Qilin is still the one to watch. They’re sitting at nearly twenty percent of the activity.
00:00:53 - 00:01:02
[Sarah] Twenty percent! That’s... wow. And I saw another name in there that sounded, I don’t know, almost polite? 'The Gentlemen'?
00:01:02 - 00:01:21
[Alex] Right, right. Don't let the name fool you, though. They’re holding steady at about ten percent. Then you’ve got Akira and INC Ransom. But what’s really interesting in this report is who they’re going after. Tech and Retail are the biggest targets this time around.
00:01:22 - 00:01:30
[Sarah] Wait, really? Technology? You’d think tech companies would have the best defenses, right? I mean, that’s their whole thing.
00:01:31 - 00:01:49
[Alex] You’d think! But they’re actually at the top of the list—over sixteen percent. Retail is right behind them. And here’s the stat that really jumped out at me... large enterprise victims? They’re up by two hundred and forty-five percent compared to the last period.
00:01:50 - 00:02:01
[Sarah] Wait, back up. Two hundred and forty-five percent? That’s not just a small bump, that’s... that’s a massive spike. Why the sudden shift toward the big guys?
00:02:01 - 00:02:28
[Alex] It’s... it’s kind of fascinating, actually. While small businesses still make up the majority of victims—like eighty percent—the attackers are clearly swinging for the fences more often. Sixteen large enterprises were hit just in this two-week window. It shows that these groups are getting more confident, or maybe just better at finding those enterprise-level cracks.
00:02:28 - 00:02:39
[Sarah] Mmhmm. And it's not just where they're hitting, it's where they're *from*, right? The report mentions some big-name actors coming back into the spotlight.
00:02:40 - 00:02:58
[Alex] Exactly. We’re seeing a resurgence from groups like APT37 and Lazarus. And as the Byer Co team points out, the line between 'financial motivation' and 'state-aligned' activity is getting super blurry. Like, is it a heist or is it espionage? Sometimes, it’s both.
00:02:59 - 00:03:13
[Sarah] That’s... actually a great point. It’s like they’re multitasking. Speaking of multitasking, I noticed some really specific malware names in the brief. 'PromptSpy' caught my eye. Is that what I think it is?
00:03:14 - 00:03:32
[Alex] Spot on. It’s malware that uses AI-related lures. Think about it... everyone is talking about AI right now. So, the attackers create tools or themes that look like AI productivity boosters to trick people into downloading them. It’s clever. In a dark way.
00:03:32 - 00:03:45
[Sarah] Ugh, of course. They're using our own curiosity against us. And I saw something about Microsoft Copilot in the news section? Something about... summarizing confidential emails?
00:03:45 - 00:04:11
[Alex] Yeah, that’s a big one. There was a bug where Copilot could end up summarizing confidential stuff it wasn't supposed to. It just goes to show that even the big, trusted platforms are having these 'growing pain' security issues. And then you’ve got $4.8 million in crypto stolen because a Korean tax agency exposed a wallet seed... it’s just one thing after another.
00:04:12 - 00:04:26
[Sarah] It sounds like we're just... flying blind sometimes. But, okay, let’s bring it back. If I’m a business owner listening to this—or even just an IT manager—what’s the big takeaway from Jeremy’s report?
00:04:26 - 00:04:49
[Alex] The big takeaway? Well, first, watch your vulnerabilities. The CISA KEV added eleven new ones this period, including stuff for Cisco and GitLab. If you use those, patch them yesterday. Second, realize that 'fragmentation' means the threat is coming from everywhere. You can't just watch for one specific group.
00:04:49 - 00:04:57
[Sarah] Right, right. It’s not just about the 'big bad' anymore. It’s the dozens of mid-tier groups that are gaining momentum.
00:04:58 - 00:05:14
[Alex] Exactly. And honestly, the fact that ransomware payment rates are dropping to record lows—even as attacks surge—is a good sign. It means companies are getting better at backups and recovery. They’re refusing to play the game.
00:05:14 - 00:05:29
[Sarah] Well, that’s at least a little bit of good news in a pretty heavy report! Huge thanks to Jeremy Nichols and Geoff Rehmet for putting this data together. It’s... it's a lot, but it’s better to know, right?
00:05:29 - 00:05:38
[Alex] Always. Knowledge is the first line of defense. We’ll be back next time to see where these trends go next. Stay safe out there.