<description>&lt;div&gt;
&lt;strong&gt;Top Headlines:&lt;br&gt;&lt;/strong&gt;&lt;br&gt;&lt;/div&gt;&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;The Hacker News&lt;/strong&gt; | Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging: &lt;a href="https://thehackernews.com/2026/02/microsoft-discloses-dns-based-clickfix.html?m=1"&gt;https://thehackernews.com/2026/02/microsoft-discloses-dns-based-clickfix.html?m=1&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Straiker&lt;/strong&gt; | SmartLoader Clones Oura Ring MCP to Deploy Supply Chain Attack: &lt;a href="https://www.straiker.ai/blog/smartloader-clones-oura-ring-mcp-to-deploy-supply-chain-attack"&gt;https://www.straiker.ai/blog/smartloader-clones-oura-ring-mcp-to-deploy-supply-chain-attack&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;InfoStealers&lt;/strong&gt; | Hudson Rock Identifies Real-World Infostealer Infection Targeting OpenClaw Configurations: &lt;a href="https://www.infostealers.com/article/hudson-rock-identifies-real-world-infostealer-infection-targeting-openclaw-configurations/"&gt;https://www.infostealers.com/article/hudson-rock-identifies-real-world-infostealer-infection-targeting-openclaw-configurations/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Forcepoint&lt;/strong&gt; | ScreenConnect Under Attack: SmartScreen Evasion and RMM Abuse: &lt;a href="https://www.forcepoint.com/blog/x-labs/screenconnect-attack"&gt;https://www.forcepoint.com/blog/x-labs/screenconnect-attack&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;&lt;div&gt;
&lt;p&gt;&lt;br&gt;----------&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Stay in Touch!&lt;/strong&gt;&lt;br&gt;Twitter: &lt;a href="https://twitter.com/Intel471Inc"&gt;https://twitter.com/Intel471Inc&lt;/a&gt;&lt;br&gt;LinkedIn: &lt;a href="https://www.linkedin.com/company/intel-471/"&gt;https://www.linkedin.com/company/intel-471/&lt;/a&gt;&lt;br&gt;YouTube: &lt;a href="https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg"&gt;https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg&lt;/a&gt;&lt;br&gt;Discord: &lt;a href="https://discord.gg/DR4mcW4zBr"&gt;https://discord.gg/DR4mcW4zBr&lt;/a&gt;&lt;br&gt;Facebook: &lt;a href="https://www.facebook.com/Intel471Inc/"&gt;https://www.facebook.com/Intel471Inc/&lt;br&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&lt;/div&gt;</description>

Out of the Woods: The Threat Hunting Podcast

Out of the Woods: The Threat Hunting Podcast

S3 Ep58: Keep the Classics, Cue the Chaos

FEB 19, 202646 MIN
Out of the Woods: The Threat Hunting Podcast

S3 Ep58: Keep the Classics, Cue the Chaos

FEB 19, 202646 MIN

Description

<div> <strong>Top Headlines:<br></strong><br></div><ul> <li> <strong>The Hacker News</strong> | Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging: <a href="https://thehackernews.com/2026/02/microsoft-discloses-dns-based-clickfix.html?m=1">https://thehackernews.com/2026/02/microsoft-discloses-dns-based-clickfix.html?m=1</a> </li> <li> <strong>Straiker</strong> | SmartLoader Clones Oura Ring MCP to Deploy Supply Chain Attack: <a href="https://www.straiker.ai/blog/smartloader-clones-oura-ring-mcp-to-deploy-supply-chain-attack">https://www.straiker.ai/blog/smartloader-clones-oura-ring-mcp-to-deploy-supply-chain-attack</a> </li> <li> <strong>InfoStealers</strong> | Hudson Rock Identifies Real-World Infostealer Infection Targeting OpenClaw Configurations: <a href="https://www.infostealers.com/article/hudson-rock-identifies-real-world-infostealer-infection-targeting-openclaw-configurations/">https://www.infostealers.com/article/hudson-rock-identifies-real-world-infostealer-infection-targeting-openclaw-configurations/</a> </li> <li> <strong>Forcepoint</strong> | ScreenConnect Under Attack: SmartScreen Evasion and RMM Abuse: <a href="https://www.forcepoint.com/blog/x-labs/screenconnect-attack">https://www.forcepoint.com/blog/x-labs/screenconnect-attack</a> </li> </ul><div> <p><br>----------</p><p><strong>Stay in Touch!</strong><br>Twitter: <a href="https://twitter.com/Intel471Inc">https://twitter.com/Intel471Inc</a><br>LinkedIn: <a href="https://www.linkedin.com/company/intel-471/">https://www.linkedin.com/company/intel-471/</a><br>YouTube: <a href="https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg">https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg</a><br>Discord: <a href="https://discord.gg/DR4mcW4zBr">https://discord.gg/DR4mcW4zBr</a><br>Facebook: <a href="https://www.facebook.com/Intel471Inc/">https://www.facebook.com/Intel471Inc/<br></a><br></p></div>