CSO Online
Dark Reading
Dark Web Informer
Europol
Krebs on Security
NSA
Reuters
Security Affairs
The Hacker News
Wired
ZDNET
French Ministry confirms data access to 1.2 Million bank accounts
Wed Feb 18 2026
A hacker accessed data from 1.2 million French bank accounts using stolen official credentials, the Economy Ministry said. A hacker gained access to data from 1.2 million French bank accounts using stolen credentials belonging to a government official, according to the French Economy Ministry. French authorities said affected account holders will be notified in the […]
Security Affairs
Notepad++ patches flaw used to hijack update system
Wed Feb 18 2026
Notepad++ patched a vulnerability that attackers used to hijack its update system and deliver malware to targeted users. Notepad++ fixed a vulnerability that allowed a China-linked APT group to hijack its update mechanism and selectively push malware to chosen targets. In early February, the Notepad++ maintainer revealed that nation-state hackers compromised the hosting provider’s infrastructure, […]
Security Affairs

Notepad++ author says fixes make update mechanism ‘effectively unexploitable’
Wed Feb 18 2026
The recently compromised update mechanism for the popular open source text editor Notepad ++ has been hardened so it’s now ‘effectively unexploitable’, says the application’s author.
CSO Online

Chinese hackers exploited zero-day Dell RecoverPoint flaw for 1.5 years
Wed Feb 18 2026
For the past 18 months, a Chinese cyberespionage group has been exploiting a prevously unknown vulnerability in Dell’s RecoverPoint for Virtual Machines, a VM disaster recovery solution.
CSO Online

Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody
Wed Feb 18 2026
New research from the Citizen Lab has found signs that Kenyan authorities used a commercial forensic extraction tool manufactured by Israeli company Cellebrite to break into a prominent dissident's phone, making it the latest case of abuse of the technology targeting civil society. The interdisciplinary research unit at the University of Toronto's Munk School of Global Affairs & Public...
The Hacker News

A Vast Trove of Exposed Social Security Numbers May Put Millions at Risk of Identity Theft
Wed Feb 18 2026
A database left accessible to anyone online contained billions of records, including sensitive personal data that criminals appear to have not yet exploited.
Wired

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution
Wed Feb 18 2026
Cybersecurity researchers have disclosed a critical security flaw in the Grandstream GXP1600 series of VoIP phones that could allow an attacker to seize control of susceptible devices. The vulnerability, tracked as CVE-2026-2329, carries a CVSS score of 9.3 out of a maximum of 10.0. It has been described as a case of unauthenticated stack-based buffer overflow that could result in remote code...
The Hacker News

Millionen Chrome-Erweiterungen geben Browserverlauf preis
Wed Feb 18 2026
width="2489" height="1400" sizes="auto, (max-width: 2489px) 100vw, 2489px">Eine Sicherheitslücke in beliebten Chrome-Erweiterungen führt dazu, dass der Browserverlauf der Anwender offengelegt ist.
CSO Online
VS Code extensions with 125M+ installs expose users to cyberattacks
Wed Feb 18 2026
Four popular VS Code extensions with 125M+ installs have flaws that could let hackers steal files and run code remotely. OX Security researchers warn that security flaws in four widely used VS Code extensions (Live Server, Code Runner, Markdown Preview Enhanced, and Microsoft Live Preview) could allow attackers to steal local files and execute code […]
Security Affairs
China-linked APT weaponized Dell RecoverPoint zero-day since 2024
Wed Feb 18 2026
A suspected Chinese state-linked group exploited a critical Dell RecoverPoint flaw (CVE-2026-22769) in zero-day attacks starting mid-2024. Mandiant and Google’s Threat Intelligence Group (GTIG) reported that a suspected China-linked APT group quietly exploited a critical zero-day flaw in Dell RecoverPoint for Virtual Machines starting in mid-2024. “Mandiant and Google Threat Intelligence Group (GTIG) have identified […]
Security Affairs

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs
Wed Feb 18 2026
Cybersecurity researchers have disclosed multiple security vulnerabilities in four popular Microsoft Visual Studio Code (VS Code) extensions that, if successfully exploited, could allow threat actors to steal local files and execute code remotely. The extensions, which have been collectively installed more than 125 million times, are Live Server, Code Runner, Markdown Preview Enhanced, and...
The Hacker News

Flaws in four popular VS Code extensions left 128 million installs open to attack
Wed Feb 18 2026
Critical and high-severity vulnerabilities were found in four widely used Visual Studio Code extensions with a combined 128 million downloads, exposing developers to file theft, remote code execution,
CSO Online

Keenadu: Android malware that comes preinstalled and can’t be removed by users
Wed Feb 18 2026
There’s too little a user can do when hit with a complex Android malware that comes preinstalled on their new smartphone or tablet.
CSO Online

Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability
Wed Feb 18 2026
In 2025, navigating the digital seas still felt like a matter of direction. Organizations charted routes, watched the horizon, and adjusted course to reach safe harbors of resilience, trust, and compliance. In 2026, the seas are no longer calm between storms. Cybersecurity now unfolds in a state of continuous atmospheric instability: AI-driven threats that adapt in real time, expanding...
The Hacker News

Cyberangriff auf Bahn stört Auskunftssysteme
Wed Feb 18 2026
Der Angriff konnte zurückgeschlagen werden.
CSO Online

Discipline is the new power move in cybersecurity leadership
Wed Feb 18 2026
For years, I was fortunate to live many years, earning enough budget to deploy cybersecurity programs.
CSO Online
U.S. CISA adds Google Chromium CSS, Microsoft Windows, TeamT5 ThreatSonar Anti-Ransomware, and Zimbra flaws to its Known Exploited Vulnerabilities catalog
Wed Feb 18 2026
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chromium CSS, Microsoft Windows, TeamT5 ThreatSonar Anti-Ransomware, and Zimbra flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Google Chromium CSS, Microsoft Windows, TeamT5 ThreatSonar Anti-Ransomware, and Zimbra flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws […]
Security Affairs

Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024
Wed Feb 18 2026
A maximum severity security vulnerability in Dell RecoverPoint for Virtual Machines has been exploited as a zero-day by a suspected China-nexus threat cluster dubbed UNC6201 since mid-2024, according to a new report from Google Mandiant and Google Threat Intelligence Group (GTIG). The activity involves the exploitation of CVE-2026-22769 (CVSS score: 10.0), a case of hard-coded credentials...
The Hacker News

3 Ways to Start Your Intelligent Workflow Program
Wed Feb 18 2026
Security, IT, and engineering teams today are under relentless pressure to accelerate outcomes, cut operational drag, and unlock the full potential of AI and automation. But simply investing in tools isn’t enough. 88% of AI proofs-of-concept never make it to production, even though 70% of workers cite freeing time for high-value work as the primary AI automation motivation. Real impact comes...
The Hacker News

A new approach for GenAI risk protection
Wed Feb 18 2026
When generative AI (GenAI) hit the consumer market with the release of OpenAI’s ChatGPT, users worldwide flocked to the product and started experimenting with the tool’s capabilities across industries.
CSO Online
Keenadu backdoor found preinstalled on Android devices, powers Ad fraud campaign
Wed Feb 18 2026
Kaspersky uncovered Keenadu, an Android backdoor used for ad fraud that can even take full control of devices. Kaspersky has identified a new Android malware called Keenadu. It can be preinstalled in device firmware, hidden inside system apps, or even distributed via official stores like Google Play. Currently used for ad fraud by turning infected […]
Security Affairs
The new paradigm for raising up secure software engineers
Wed Feb 18 2026
CISOs were already struggling to help developers keep up with secure code principles at the speed of DevOps.
CSO Online

Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware
Wed Feb 18 2026
Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from China to hijack the software update mechanism to selectively deliver malware to targets of interest. The version 8.9.2 update incorporates what maintainer Don Ho calls a "double lock" design that aims to make the update process "robust and effectively unexploitable." This includes verification...
The Hacker News

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update
Wed Feb 18 2026
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows - CVE-2026-2441 (CVSS score: 8.8) - A use-after-free vulnerability in Google Chrome that could allow a remote attacker to potentially exploit heap...
The Hacker News

13 Fragen gegen Drittanbieterrisiken
Wed Feb 18 2026
Drum prüfe…Miljan Zivkovic | shutterstock.
CSO Online
SmartLoader hackers clone Oura MCP project to spread StealC malware
Tue Feb 17 2026
Hackers used a fake Oura MCP server to trick users into downloading malware that installs the StealC info-stealer. Straiker’s AI Research (STAR) Labs team uncovered a SmartLoader campaign in which attackers cloned a legitimate MCP server linked to Oura Health to spread the StealC information stealer. The fake project appeared credible, complete with bogus forks […]
Security Affairs

Cyber attacks enabled by basic failings, Palo Alto analysis finds
Tue Feb 17 2026
Cyberattacks are moving faster, shrinking the gap between initial compromise and bad consequences, and the advent of AI is accelerating their timelines in a way that human defenders can no longer keep
CSO Online

Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster
Tue Feb 17 2026
Cloud attacks move fast — faster than most incident response teams. In data centers, investigations had time. Teams could collect disk images, review logs, and build timelines over days. In the cloud, infrastructure is short-lived. A compromised instance can disappear in minutes. Identities rotate. Logs expire. Evidence can vanish before analysis even begins. Cloud forensics is fundamentally...
The Hacker News

Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
Tue Feb 17 2026
Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2) relays, a technique that could allow attackers to blend into legitimate enterprise communications and evade detection. The attack method, which has been demonstrated against Microsoft Copilot and xAI Grok...
The Hacker News
Polish cybercrime Police arrest man linked to Phobos ransomware operation
Tue Feb 17 2026
Officers from Poland’s Central Bureau of Cybercrime Control (CBZC) police arrested a 47-year-old man linked to the Phobos ransomware operation. Polish authorities arrested a 47-year-old man suspected of involvement in cybercrime and linked him to the Phobos ransomware operation. Police said they discovered evidence of illegal activities on his seized devices. “Officers from the Central […]
Security Affairs
Poorly crafted phishing campaign leverages bogus security incident report
Tue Feb 17 2026
Attackers used a fake PDF incident report hosted on AWS to scare victims into enabling 2FA, though a poorly crafted phishing campaign. Freelance security consultant Xavier Mertens reported a phishing campaign using a fake PDF security incident report hosted on AWS to scare victims into enabling 2FA. The researchers pointed out that the campaign appears poorly […]
Security Affairs

Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates
Tue Feb 17 2026
A new Android backdoor that's embedded deep into the device firmware can silently harvest data and remotely control its behavior, according to new findings from Kaspersky. The Russian cybersecurity vendor said it discovered the backdoor, dubbed Keenadu, in the firmware of devices associated with various brands, including Alldocube, with the compromise occurring during the firmware build phase....
The Hacker News

MCSC 2026: „Politik und Wirtschaft müssen zusammenarbeiten“
Tue Feb 17 2026
Das Motto der Munich Cybersecurity Conference 2026: “Command Control, Really? Confronting The Illusion Of Deterrence In The Age Of Relentless Cyber Threats.
CSO Online

SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer
Tue Feb 17 2026
Cybersecurity researchers have disclosed details of a new SmartLoader campaign that involves distributing a trojanized version of a Model Context Protocol (MCP) server associated with Oura Health to deliver an information stealer known as StealC. "The threat actors cloned a legitimate Oura MCP Server – a tool that connects AI assistants to Oura Ring health data – and built a deceptive...
The Hacker News
South Korea slaps $25M fine on Dior, Louis Vuitton, Tiffany over Salesforce breach
Tue Feb 17 2026
South Korea fined Dior, Louis Vuitton, and Tiffany $25M after hackers breached their Salesforce systems, exposing customer data. South Korea’s Personal Information Protection Commission fined luxury brands including Dior, Louis Vuitton, and Tiffany & Co. a total of 36 billion Korean won ($25 million) after hackers compromised their Salesforce systems. The attack, linked to Scattered […]
Security Affairs
Encrypted RCS messaging support lands in Apple’s iOS 26.4 developer build
Tue Feb 17 2026
Apple is testing end-to-end encrypted Rich Communications Services (RCS) messaging in the iOS 26.4 developer beta. Apple has added end-to-end encrypted RCS messaging to the iOS and iPadOS 26.4 developer beta. The feature, still in testing, will roll out in a future update across iOS, iPadOS, macOS, and watchOS. Apple notes that E2EE is not […]
Security Affairs
Hackers steal OpenClaw configuration in emerging AI agent threat
Tue Feb 17 2026
Researchers found an infostealer stole a victim’s OpenClaw configuration, marking a shift toward targeting personal AI agents. Cybersecurity researchers have uncovered a new information stealer that exfiltrated a victim’s OpenClaw configuration environment, previously known as Clawdbot and Moltbot. According to cybersecurity firm Hudson Rock, the case highlights a new shift in infostealer activity, moving beyond […]
Security Affairs

ZeroDayRAT spyware targets Android and iOS devices via commercial toolkit
Tue Feb 17 2026
A new cross-platform spyware sold openly through Telegram is lowering the barrier for hackers seeking remote access to mobile devices.
CSO Online

My Day Getting My Hands Dirty with an NDR System
Tue Feb 17 2026
My objective As someone relatively inexperienced with network threat hunting, I wanted to get some hands-on experience using a network detection and response (NDR) system. My goal was to understand how NDR is used in hunting and incident response, and how it fits into the daily workflow of a Security Operations Center (SOC). Corelight’s Investigator software, part of its Open NDR Platform, is...
The Hacker News

With CISOs stretched thin, re-envisioning enterprise risk may be the only fix
Tue Feb 17 2026
A majority of enterprise security leaders view their roles as “no longer fully manageable,” according to a recent report, and security consultants concede that the increasingly over-scoped nature of c
CSO Online
Hackers sell stolen Eurail traveler information on dark web
Tue Feb 17 2026
Eurail B.V. revealed that traveler data were stolen in a recent security breach, and are now being sold on the dark web. Eurail B.V. confirmed that the traveler data stolen in a breach earlier this year is now being offered for sale on the dark web. The company disclosed the development as part of its […]
Security Affairs

Why 2025’s agentic AI boom is a CISO’s worst nightmare
Tue Feb 17 2026
By late 2025, the enterprise AI landscape had shifted.
CSO Online

Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot Recommendations
Tue Feb 17 2026
New research from Microsoft has revealed that legitimate businesses are gaming artificial intelligence (AI) chatbots via the "Summarize with AI" button that's being increasingly placed on websites in ways that mirror classic search engine poisoning (SEO). The new AI hijacking technique has been codenamed AI Recommendation Poisoning by the Microsoft Defender Security Research Team. The tech giant...
The Hacker News

Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta
Tue Feb 17 2026
Apple on Monday released a new developer beta of iOS and iPadOS with support for end-to-end encryption (E2EE) in Rich Communications Services (RCS) messages. The feature is currently available for testing in iOS and iPadOS 26.4 Beta, and is expected to be shipped to customers in a future update for iOS, iPadOS, macOS, and watchOS. "End-to-end encryption is in beta and is not available for all...
The Hacker News
Was CISOs über OpenClaw wissen sollten
Mon Feb 16 2026
Lesen Sie, welches Sicherheitsrisiko die Verwendung von OpenClaw in Unternehmen mit sich bringt.
CSO Online
A security flaw at DavaIndia Pharmacy allowed attackers to access customers’ data and more
Mon Feb 16 2026
A security flaw at DavaIndia Pharmacy exposed customer data and gave outsiders full admin control of its systems. DavaIndia is a large Indian pharmacy retail chain focused on selling affordable generic medicines. Operated by Zota Health Care Ltd., the brand promotes low-cost alternatives to branded drugs to make healthcare more accessible across India. DavaIndia runs […]
Security Affairs

Exploit available for new Chrome zero-day vulnerability, says Google
Tue Feb 17 2026
Threat actors now have the ability to exploit a new zero-day vulnerability in the Chrome browser, Google has advised IT administrators.
CSO Online

Open source maintainers being targeted by AI agent as part of ‘reputation farming’
Mon Feb 16 2026
AI agents able to submit huge numbers of pull requests (PRs) to open-source project maintainers risk creating the conditions for future supply chain attacks targeting important software projects, deve
CSO Online

Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens
Mon Feb 16 2026
Cybersecurity researchers disclosed they have detected a case of an information stealer infection successfully exfiltrating a victim's OpenClaw (formerly Clawdbot and Moltbot) configuration environment. "This finding marks a significant milestone in the evolution of infostealer behavior: the transition from stealing browser credentials to harvesting the 'souls' and identities of personal AI [...
The Hacker News
ShinyHunters leaked 600K+ Canada Goose customer records, but the firm denies it was breached
Mon Feb 16 2026
ShinyHunters leaked 600,000+ Canada Goose customer records, though the company insists its systems were not breached. Data extortion group ShinyHunters has published over 600,000 Canada Goose customer records on its data leak site. Canada Goose is a Canadian luxury outerwear company best known for high‑end, cold‑weather jackets and parkas. Founded in 1957 and headquartered in […]
Security Affairs
Microsoft alerts on DNS-based ClickFix variant delivering malware via nslookup
Mon Feb 16 2026
Microsoft warns of a new ClickFix variant that tricks users into running DNS commands to fetch malware via nslookup. Microsoft has revealed a new ClickFix variant that deceives users into running a malicious nslookup command through the Windows Run dialog to retrieve a second-stage payload via DNS. ClickFix typically uses fake CAPTCHA or error messages […]
Security Affairs

Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers
Mon Feb 16 2026
A new study has found that multiple cloud-based password managers, including Bitwarden, Dashlane, and LastPass, are susceptible to password recovery attacks under certain conditions. "The attacks range in severity from integrity violations to the complete compromise of all vaults in an organization," researchers Matteo Scarlata, Giovanni Torrisi, Matilda Backendal, and Kenneth G. Paterson said....
The Hacker News

Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware
Mon Feb 16 2026
This week’s recap shows how small gaps are turning into big entry points. Not always through new exploits, often through tools, add-ons, cloud setups, or workflows that people already trust and rarely question. Another signal: attackers are mixing old and new methods. Legacy botnet tactics, modern cloud abuse, AI assistance, and supply-chain exposure are being used side by side, whichever path...
The Hacker News

Safe and Inclusive E‑Society: How Lithuania Is Bracing for AI‑Driven Cyber Fraud
Mon Feb 16 2026
Technologies are evolving fast, reshaping economies, governance, and daily life. Yet, as innovation accelerates, so do digital risks. Technological change is no longer abstract for such a country as Lithuania, as well. From e-signatures to digital health records, the country depends on secure systems. Cybersecurity has become not only a technical challenge but a societal one – demanding...
The Hacker News

The El Paso No-Fly Debacle Is Just the Beginning of a Drone Defense Mess
Mon Feb 16 2026
Fears over a drug cartel drone over Texas sparked a recent airspace shutdown in El Paso and New Mexico, highlighting just how tricky it can be to deploy anti-drone weapons near cities.
Wired

Leaky Chrome extensions with 37M installs caught divulging your browsing history
Mon Feb 16 2026
An estimated 37 million worldwide installations of a clutch of leaky Chrome extensions are transmitting users’ browsing histories to external servers.
CSO Online

New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft
Mon Feb 16 2026
Cybersecurity researchers have disclosed details of a new mobile spyware platform dubbed ZeroDayRAT that's being advertised on Telegram as a way to grab sensitive data and facilitate real-time surveillance on Android and iOS devices. "The developer runs dedicated channels for sales, customer support, and regular updates, giving buyers a single point of access to a fully operational spyware...
The Hacker News
Google fixes first actively exploited Chrome zero-day of 2026
Mon Feb 16 2026
Google patched Chrome zero-day CVE-2026-2441, a high-severity CSS use-after-free flaw actively exploited in the wild. Google has released urgent security updates to address a high-severity zero-day vulnerability, tracked as CVE-2026-2441, in Chrome that is already being exploited in real-world attacks. The flaw is a use-after-free bug in the browser’s CSS component. This is the first […]
Security Affairs
Japanese sex toys maker Tenga discloses data breach
Mon Feb 16 2026
Sex toy maker Tenga says a hacker accessed an employee’s email account, potentially exposing customer names, emails, and order details. TENGA Co., Ltd. is a Tokyo-based Japanese sexual wellness and lifestyle company known for its innovative adult products. It employs roughly 125–200 people worldwide across its Japan headquarters and international offices. Tenga operates in personal […]
Security Affairs

Finding a common language around risk
Mon Feb 16 2026
Here’s what nobody tells you about risk management: your cyber team speaks Klingon, your operations folks speak Elvish and your strategy people speak ancient Greek.
CSO Online

Neue Kooperation soll souveräne Cloud-Lösungen bringen
Mon Feb 16 2026
v.
CSO Online

CISO Julie Chatman offers insights for you to take control of your security leadership role
Mon Feb 16 2026
Julie Chatman never planned to get into cybersecurity.
CSO Online

10 years later, Bangladesh Bank cyberheist still offers cyber-resiliency lessons
Mon Feb 16 2026
Ten years on, the Bangladesh Bank cyberheist — a landmark cybersecurity incident that rewrote the rules of nation state–sponsored hacking — continues to offer lessons for the cybersecurity community.
CSO Online

New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Released
Mon Feb 16 2026
Google on Friday released security updates for its Chrome browser to address a security flaw that it said has been exploited in the wild. The high-severity vulnerability, tracked as CVE-2026-2441 (CVSS score: 8.8), has been described as a use-after-free bug in CSS. Security researcher Shaheen Fazim has been credited with discovering and reporting the shortcoming on February 11, 2026. "Use after...
The Hacker News

SIEM-Kaufratgeber
Mon Feb 16 2026
Die kontextuellen Daten, die SIEM-Lösungen liefern, sind eine grundlegende Komponente moderner Security-Stacks.
CSO Online
Malicious npm and PyPI packages linked to Lazarus APT fake recruiter campaign
Sun Feb 15 2026
Researchers found malicious npm and PyPI packages tied to a fake recruitment campaign linked to North Korea’s Lazarus Group. ReversingLabs researcher uncovered new malicious packages on npm and PyPI connected to a fake job recruitment campaign attributed to the North Korea-linked Lazarus Group. The campaign uses deceptive hiring themes to trick developers into downloading infected […]
Security Affairs
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 84
Sun Feb 15 2026
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT Breaking Down ZeroDayRAT – New Spyware Targeting Android and iOS Old-School IRC, New Victims: Inside the Newly Discovered SSHStalker Linux Botnet Reynolds: Defense Evasion Capability […]
Security Affairs
Security Affairs newsletter Round 563 by Pierluigi Paganini – INTERNATIONAL EDITION
Sun Feb 15 2026
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Fintech firm Figure disclosed data breach after employee phishing attack U.S. CISA adds a flaw in […]
Security Affairs
Fintech firm Figure disclosed data breach after employee phishing attack
Sat Feb 14 2026
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an employee and steal a limited number of files. Blockchain-based lending firm Figure confirmed a data breach after an employee fell victim to a social engineering attack. According to a company spokesperson, the incident allowed hackers to access and steal a […]
Security Affairs
U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog
Sat Feb 14 2026
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an BeyondTrust RS and PRA vulnerability, tracked as CVE-2026-1731 (CVSS score of 9.9), to its Known Exploited Vulnerabilities (KEV) catalog. This week BeyondTrust released security updates to […]
Security Affairs
Suspected Russian hackers deploy CANFAIL malware against Ukraine
Sat Feb 14 2026
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL malware. Google Threat Intelligence Group identified a previously undocumented threat actor behind attacks on Ukrainian organizations using CANFAIL malware. The group is possibly linked to Russian intelligence services and has targeted defense, military, government, and energy entities at both regional […]
Security Affairs

Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging
Sun Feb 15 2026
Microsoft has disclosed details of a new version of the ClickFix social engineering tactic in which the attackers trick unsuspecting users into running commands that carry out a Domain Name System (DNS) lookup to retrieve the next-stage payload. Specifically, the attack relies on using the "nslookup" (short for nameserver lookup) command to execute a custom DNS lookup triggered via the Windows...
The Hacker News

Ring Kills Flock Safety Deal After Super Bowl Ad Uproar
Sat Feb 14 2026
Plus: Meta plans to add face recognition to its smart glasses, Jared Kushner named as part of whistleblower’s mysterious national security complaint, and more.
Wired

Robot Dogs Are on Going on Patrol at the 2026 World Cup in Mexico
Sat Feb 14 2026
The Mexican city of Guadalupe, which will host portions of the 2026 World Cup, recently showed off four new robot dogs that will help provide security during matches at BBVA Stadium.
Wired
New threat actor UAT-9921 deploys VoidLink against enterprise sectors
Fri Feb 13 2026
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial organizations, Cisco Talos reports. Cisco Talos spotted a previously unknown threat actor, tracked as UAT-9921, using a new modular attack framework called VoidLink. The group targets organizations in the technology and financial services sectors. The flexible design of VoidLink suggests […]
Security Affairs
Researchers unearth 30-year-old vulnerability in libpng library
Fri Feb 13 2026
Developers have resolved a legacy flaw in the widely used libpng open-source library that existed since the software was released nearly 30 years ago.
CSO Online

Critical BeyondTrust RS vulnerability exploited in active attacks
Fri Feb 13 2026
Researchers warn that a critical vulnerability patched this week in BeyondTrust Remote Support is being exploited in the wild to compromise self-hosted deployments, including Bomgar remote support app
CSO Online

South Korea fines Louis Vuitton, Christian Dior, Tiffany $25M for SaaS security failures
Fri Feb 13 2026
South Korea’s data protection authority has handed down a combined KRW 36 billion (approximately US$25 million) in administrative fines to the local subsidiaries of three global luxury houses, after f
CSO Online

Battling bots face off in cybersecurity arena
Fri Feb 13 2026
AI agents are increasingly seen as a way to reinforce the capabilities of cybersecurity teams — but which can do the best job? Wiz has developed a benchmark suite of 257 real-world challenges spanning
CSO Online

Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
Fri Feb 13 2026
A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google Threat Intelligence Group (GTIG) described the hacking group as possibly affiliated with Russian intelligence services. The threat actor is assessed to have targeted defense, military, government, and energy organizations within the Ukrainian regional and...
The Hacker News

Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
Fri Feb 13 2026
Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights on the defense industrial base (DIB) sector, according to findings from Google Threat Intelligence Group (GTIG). The tech giant's threat intelligence division said the adversarial targeting of the sector is centered around four key themes: striking defense...
The Hacker News

Four new reasons why Windows LNK files cannot be trusted
Fri Feb 13 2026
The number of ways that Windows shortcut (.
CSO Online
Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release
Fri Feb 13 2026
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code execution. Threat actors rapidly began exploiting a newly patched BeyondTrust vulnerability, tracked as CVE-2026-1731 (CVSS score of 9.9), soon after a proof-of-concept exploit became public. This week BeyondTrust released security updates to address the critical flaw in its Remote Support […]
Security Affairs
The foundation problem: How a lack of accountability is destroying cybersecurity
Fri Feb 13 2026
A tale of two industries The United States Navy takes 18-year-olds fresh out of high school and trains them to operate nuclear reactors in 18 months.
CSO Online

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors
Fri Feb 13 2026
A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the technology and financial services sectors, according to findings from Cisco Talos. "This threat actor seems to have been active since 2019, although they have not necessarily used VoidLink over the duration of their activity," researchers Nick...
The Hacker News

BSI läutet Ende der klassischen Verschlüsselung ein
Fri Feb 13 2026
width="1743" height="980" sizes="auto, (max-width: 1743px) 100vw, 1743px">Das BSI empfiehlt traditionelle Verschlüsselungsverfahren mit Post-Quanten-Kryptographie zu kombinieren.
CSO Online

Google fears massive attempt to clone Gemini AI through model extraction
Fri Feb 13 2026
Google detected and blocked a campaign involving more than 100,000 prompts that it claimed were designed to copy the proprietary reasoning capabilities of its Gemini AI model, according to a quarterly
CSO Online
Google: state-backed hackers exploit Gemini AI for cyber recon and attacks
Fri Feb 13 2026
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations. Google DeepMind and GTIG report a rise in model extraction or “distillation” attacks aimed at stealing AI intellectual property, which Google has detected and blocked. While APT groups have not breached frontier models, private firms and researchers have tried to […]
Security Affairs

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
Fri Feb 13 2026
Cybersecurity researchers have discovered a malicious Google Chrome extension that's designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl), is marketed as a way to scrape Meta Business Suite data, remove verification pop-ups, and generate two-factor authentication (2FA) codes....
The Hacker News

The democratization of AI data poisoning and how to protect your organization
Fri Feb 13 2026
Smart organizations have spent the last three years protecting their AI tools from skilled prompt injection-style attacks.
CSO Online

npm’s Update to Harden Their Supply Chain, and Points to Consider
Fri Feb 13 2026
In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain attacks. While the overhaul is a solid step forward, the changes don’t make npm projects immune from supply-chain attacks. npm is still susceptible to malware attacks – here’s what you need to know for a safer Node community. Let’s start with the original...
The Hacker News
U.S. CISA adds SolarWinds Web Help Desk, Notepad++, Microsoft Configuration Manager, and Apple devices flaws to its Known Exploited Vulnerabilities catalog
Fri Feb 13 2026
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SolarWinds Web Help Desk, Notepad++, Microsoft Configuration Manager, and Apple devices flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added SolarWinds Web Help Desk, Notepad++, Microsoft Configuration Manager, and Apple devices flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws […]
Security Affairs

Why key management becomes the weakest link in a post-quantum and AI-driven security world
Fri Feb 13 2026
When people talk about cryptography, they usually talk about algorithms.
CSO Online

Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability
Fri Feb 13 2026
Threat actors have started to exploit a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products, according to watchTowr. "Overnight we observed first in-the-wild exploitation of BeyondTrust across our global sensors," Ryan Dewhurst, head of threat intelligence at watchTowr, said in a post on X. "Attackers are abusing...
The Hacker News

5 key trends reshaping the SIEM market
Fri Feb 13 2026
Security information and event management (SIEM) platforms have evolved far beyond their basic log collection and correlation roots.
CSO Online

Security-Infotainment: Die besten Hacker-Dokus
Fri Feb 13 2026
Sie fühlen sich leer ohne Security-Dashboard? Diese Dokumentationen überbrücken den Schmerz bis zum nächsten Arbeitstag.
CSO Online

Hackers turn bossware against the bosses
Fri Feb 13 2026
A threat actor is abusing an employee monitoring application and a remote monitoring and management platform in an attempt to deploy ransomware and steal cryptocurrency.
CSO Online

Why identity recovery is now central to cyber resilience
Thu Feb 12 2026
Ransomware has permanently changed how security leaders think about risk.
CSO Online
Odido confirms massive breach; 6.2 Million customers impacted
Thu Feb 12 2026
Hackers accessed data from 6.2 million Odido accounts, exposing names, contacts, bank details, and ID numbers. Subsidiary Ben also warned customers. Hackers broke into Dutch telecom firm Odido and accessed data from 6.2 million accounts. The company confirmed the breach and said attackers took names, addresses, phone numbers, email addresses, bank account details, dates of […]
Security Affairs
