February Release Rollup: Egnyte MCP Server, Egnyte Sign Enhancements, and More

We’re excited to share new updates and enhancements for February, including: For more info on these updates, check out the list below and dive into the detailed articles. Please join the Egnyte Community to get the latest updates, chat with experts, share feedback, and learn from other users.

SloppyLemming Deploys BurrowShell and Rust-Based RAT to Target Pakistan and Bangladesh

Between January 2025 and January 2026, Arctic Wolf tracked an extensive cyber espionage campaign that we assess was conducted by SloppyLemming (also known as Outrider Tiger and Fishing Elephant), an India-nexus threat actor, targeting government entities and critical infrastructure operators in Pakistan and Bangladesh.

Bringing SharePoint Goodness into Drupal

Microsoft SharePoint - one of the most used platforms for storing, organizing, sharing, and accessing information across multiple devices. It is widely used by enterprises big and small; and across a range of industries be it Healthcare, Finance and Insurance, Government and more. And if there’s one CMS that shines in those industries, that’s Drupal. So how about we bring SharePoint capabilities into Drupal? That’s exactly what we’ve achieved.

Last call on 398-day certificates

The bell rings. Last call for 398-day certificates is March 15. After that, every CA is required to cut you off at 200 days. Some have already stopped serving them early. The rest follow in two weeks. The irony of good certificate management is that when it works, nobody notices. No alerts, no outages, no 2am pages. The only time it gets attention is when something expires. Which means the teams doing it well rarely have the budget or the political capital to fix the process before it breaks.

Health Insurance Portals: Client-Side PHI Exposure Under HIPAA and State Laws

For marketing, a JavaScript tag is a growth lever. Something that’ll allow your business to target the right people, run personalized campaigns, and onboard more customers with less spend. For your security team, though, it’s a different story. The third-party scripts and tags on your pages can be a shadow PHI disclosure pipeline that quietly avoids detection, sidesteps your server-side controls, and transmits sensitive member data to third parties without triggering a single alert.

Top 10 Threat Intelligence Tools for 2026

In 2026, threat intelligence isn’t just about tracking malware families or IP reputation. It’s about catching the earliest signals of identity abuse: stolen credentials, suspicious logins, token misuse, and privilege escalation attempts that move fast through cloud and SaaS environments. Credential abuse remains a key initial access vector, accounting for 70% of breaches. In response, modern threat intelligence tools are prioritizing identity signals.

Heightened Cyber Risk Following February 2026 U.S./Israel-Iran Escalation

On February 28, 2026, the United States, in coordination with Israel, launched a large-scale military campaign against Iran known as Operation Epic Fury, marking a significant escalation in direct hostilities. The operation involved coordinated air, missile, naval, and cyber strikes targeting Iranian military and nuclear facilities across the country. Iran retaliated with ballistic missile and drone strikes targeting Israeli territory and U.S.