CSO Online

Dark Reading

Dark Web Informer

Europol

Krebs on Security

NSA

Reuters

Security Affairs

The Hacker News

Wired

ZDNET

9 unverzichtbare Open-Source-Security-Tools

Thu Feb 26 2026

Diese Open-Source-Tools adressieren spezifische Security-Probleme – mit minimalem Footprint.

CSO Online

So rechtfertigen Sie Ihre Security-Investitionen

Thu Feb 26 2026

Lesen Sie, welche Aspekte entscheidend sind, um die Investitionen in die Cybersicherheit im Unternehmen zu rechtfertigen.

CSO Online

Steaelite RAT combines data theft and ransomware management capability in one tool

Thu Feb 26 2026

It’s bad enough that threat actors are leveraging AI for their attacks, but now they can also access a new remote access trojan (RAT) that makes it easy to launch data theft and ransomware attacks on

CSO Online

Untrusted repositories turn Claude code into an attack vector

Wed Feb 25 2026

Flaws in Anthropic’s Claude Code could allow remote code execution and theft of API keys when users open untrusted repositories. Check Point Research team found multiple vulnerabilities in Anthropic’s Claude Code AI coding assistant that could lead to remote code execution and API key theft. The vulnerabilities abuse features such as Hooks, MCP servers, and […]

Security Affairs

Critical Zyxel router flaw exposed devices to remote attacks

Wed Feb 25 2026

Zyxel fixed a critical flaw in multiple routers that lets unauthenticated attackers remotely execute commands on vulnerable devices. Zyxel addressed a critical remote code execution vulnerability, tracked as CVE-2025-13942 (CVSS score of 9.8), affecting more than a dozen router models. A command injection flaw in the UPnP feature of several Zyxel CPEs, Fiber ONTs, and […]

Security Affairs

Five Eyes issue emergency directive on exploited Cisco SD-WAN zero-day

Wed Feb 25 2026

Cybersecurity agencies across the Five Eyes alliance have issued an emergency directive warning that a critical Cisco SD-WAN vulnerability is being actively exploited to gain unauthorized access to fe

CSO Online

Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

Wed Feb 25 2026

Google on Wednesday disclosed that it worked with industry partners to disrupt the infrastructure of a suspected China-nexus cyber espionage group tracked as UNC2814 that breached at least 53 organizations across 42 countries. "This prolific, elusive actor has a long history of targeting international governments and global telecommunications organizations across Africa, Asia, and the Americas,"...

The Hacker News

Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Wed Feb 25 2026

Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic's Claude Code, an artificial intelligence (AI)-powered coding assistant, that could result in remote code execution and theft of API credentials. "The vulnerabilities exploit various configuration mechanisms, including Hooks, Model Context Protocol (MCP) servers, and environment variables – executing...

The Hacker News

SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

Wed Feb 25 2026

The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women to pull off social engineering attacks. The idea is to hire them for voice phishing campaigns targeting IT help desks, Dataminr said in a new threat brief. The group is said to be offering anywhere between $500 and $1,000 upfront per call, in addition to...

The Hacker News

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

Wed Feb 25 2026

Triage is supposed to make things simpler. In a lot of teams, it does the opposite. When you can’t reach a confident verdict early, alerts turn into repeat checks, back-and-forth, and “just escalate it” calls. That cost doesn’t stay inside the SOC; it shows up as missed SLAs, higher cost per case, and more room for real threats to slip through. So where does triage go wrong? Here are five triage...

The Hacker News

Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware

Wed Feb 25 2026

Cybersecurity researchers have discovered four malicious NuGet packages that are designed to target ASP.NET web application developers to steal sensitive data. The campaign, discovered by Socket, exfiltrates ASP.NET Identity data, including user accounts, role assignments, and permission mappings, as well as manipulates authorization rules to create persistent backdoors in victim applications....

The Hacker News

ShinyHunters cyberattack on CarGurus impacts 12.4 Million users

Wed Feb 25 2026

ShinyHunters leaked data from 12.4M CarGurus accounts, exposing personal information from the U.S.-based auto research and shopping platform. The ShinyHunters group published personal data from over 12 million CarGurus accounts. CarGurus is a U.S.-based digital automotive marketplace that helps users research, compare, and connect with sellers of new and used vehicles. Operating in the U.S., […]

Security Affairs

Former U.S. Defense contractor executive sentenced for selling zero-day exploits to Russian broker Operation Zero

Wed Feb 25 2026

A former employee at U.S. defense contractor L3Harris got over 7 years in prison for selling eight zero-days to a Russian broker. Peter Williams, a 39-year-old Australian former L3Harris employee, received a prison sentence of just over seven years for selling eight zero-day exploits to the Russian broker Operation Zero for millions. Williams pleaded guilty […]

Security Affairs

Microsoft warns of job‑themed repo lures targeting developers with multi‑stage backdoors

Wed Feb 25 2026

Microsoft says it has uncovered a coordinated campaign targeting software developers through malicious repositories posing as legitimate Next.

CSO Online

Manual Processes Are Putting National Security at Risk

Wed Feb 25 2026

Why automating sensitive data transfers is now a mission-critical priority More than half of national security organizations still rely on manual processes to transfer sensitive data, according to The CYBER360: Defending the Digital Battlespace report. This should alarm every defense and government leader because manual handling of sensitive data is not just inefficient, it is a systemic...

The Hacker News

How Mexico's ‘CJNG’ Drug Cartel Embraced AI, Drones, and Social Media

Wed Feb 25 2026

Drug kingpin Nemesio “El Mencho” Oseguera Cervantes may be dead, but the Jalisco cartel he ran for years will likely outlive him—thanks, in part, to the criminal group’s embrace of technology.

Wired

U.S. CISA adds a flaw in Soliton Systems K.K FileZen to its Known Exploited Vulnerabilities catalog

Wed Feb 25 2026

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Soliton Systems K.K FileZen to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Soliton Systems K.K FileZen flaw, tracked as CVE-2026-25108 (CVSS v4 score of 8.7), to its Known Exploited Vulnerabilities (KEV) catalog. Soliton Systems K.K. FileZen is a […]

Security Affairs

Lazarus APT group deployed Medusa Ransomware against Middle East target

Wed Feb 25 2026

North Korea’s Lazarus Group used Medusa ransomware in an attack on an unnamed Middle East organization, researchers report. The North Korea-linked Lazarus APT Group, also known as Diamond Sleet and Pompilus, has been spotted deploying Medusa ransomware against an unnamed organization in the Middle East, according a new report from the Symantec and Carbon Black […]

Security Affairs

Ukrainian convicted for helping fake North Korean IT workers

Wed Feb 25 2026

A Ukrainian man has been sentenced to five years in prison after helping North Korean IT workers infiltrate American companies using stolen identities, reports Bleepingcomputer.

CSO Online

Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker

Wed Feb 25 2026

A 39-year-old Australian national who was previously employed at U.S. defense contractor L3Harris has been sentenced to a little over seven years in prison for selling eight zero-day exploits to Russian exploit broker Operation Zero in exchange for millions of dollars. Peter Williams pleaded guilty to two counts of theft of trade secrets in October 2025. In addition to the jail term, Williams...

The Hacker News

SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

Wed Feb 25 2026

SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution. The vulnerabilities, all rated 9.1 on the CVSS scoring system, are listed below - CVE-2025-40538 - A broken access control vulnerability that allows an attacker to create a system admin user and execute arbitrary...

The Hacker News

Boards don’t need cyber metrics — they need risk signals

Wed Feb 25 2026

Security teams live in a world of numbers.

CSO Online

CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability

Wed Feb 25 2026

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed vulnerability in FileZen to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2026-25108 (CVSS v4 score: 8.7), is a case of operating system (OS) command injection that could allow an authenticated user to execute...

The Hacker News

Hacker knackt 600 Firewalls in einem Monat – mit KI

Wed Feb 25 2026

Bedrohungsakteure setzen zunehmend KI-Tools ein, um ihre Angriffe durchzuführen.

CSO Online

So verändert KI Ihre GRC-Strategie

Wed Feb 25 2026

Rob Schultz / Shutterstock Da Unternehmen Cybersicherheit in ihre GRC (Governance, Risk & Compliance)-Prozesse integrieren, müssen bestehende Programme überarbeitet werden.

CSO Online

New Serv-U bugs extend SolarWinds’ run of high-severity disclosures

Wed Feb 25 2026

SolarWinds continues to be besieged by security issues, this time in its Serv-U managed file transfer server.

CSO Online

Fake Zoom meeting silently installs surveillance software, says Malwarebytes

Wed Feb 25 2026

The latest fake Zoom meeting scam silently pushes surveillance software onto the Windows computers of unwitting employees.

CSO Online

VMware fixes command injection flaw in Aria Operations

Wed Feb 25 2026

VMware has released patches for several high- and medium-risk vulnerabilities that impact its Aria Operations, Cloud Foundation, Telco Cloud Platform, and Telco Cloud Infrastructure products.

CSO Online

Here’s What a Google Subpoena Response Looks Like, Courtesy of the Epstein Files

Tue Feb 24 2026

The US Justice Department disclosures give fresh clues about how tech companies handle government inquiries about your data.

Wired

What does business email compromise look like?

Tue Feb 24 2026

Business email compromise (BEC) is the digital con dressed to impress.

CSO Online

What are the types of ransomware attacks?

Tue Feb 24 2026

Ransomware isn’t an isolated, potential cyber threat—it’s like a living organism that can shapeshift with multiple strains, tactics, and targets.

CSO Online

Take control: Locking down common endpoint vulnerabilities

Tue Feb 24 2026

Attackers are constantly on the prowl, scoping out vulnerabilities of network-connected devices in your systems.

CSO Online

How to prevent business email compromise

Tue Feb 24 2026

Business email compromise (BEC) is the cyber equivalent of an expertly forged handwritten note—no malware fireworks, no flashing warnings, just a convincing request that tricks someone into wiring mon

CSO Online

SolarWinds patches four critical Serv-U flaws enabling root access

Tue Feb 24 2026

SolarWinds addressed four critical Serv-U vulnerabilities that could let attackers gain root access to unpatched servers. SolarWinds released updates fixing four critical Serv-U vulnerabilities that allow remote code execution, potentially giving attackers full root access on unpatched servers. Serv-U is a file transfer server software that allows organizations to securely transfer files over networks using […]

Security Affairs

Know the red flags: Business email compromise signs to look out for

Tue Feb 24 2026

When it comes to cyber threats, business email compromise (BEC) is one of the sneakiest, most costly scams out there.

CSO Online

Cyber defense: From reactive to proactive

Tue Feb 24 2026

When systems are attacked, we should respond.

CSO Online

RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN

Tue Feb 24 2026

A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by injecting malicious Copilot instructions in a GitHub issue. The artificial intelligence (AI)-driven vulnerability has been codenamed RoguePilot by Orca Security. It has since been patched by Microsoft following responsible disclosure. "Attackers can craft hidden instructions inside a...

The Hacker News

VMware Aria Operations flaws could enable remote attacks

Tue Feb 24 2026

Broadcom patched multiple VMware Aria Operations flaws, including high-severity issues that could enable remote code execution. Broadcom has released security updates to address multiple vulnerabilities affecting VMware Aria Operations. VMware Aria Operations is an IT operations management platform that helps organizations monitor and optimize virtual, cloud, and hybrid environments. It provides performance monitoring, capacity planning, […]

Security Affairs

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

Tue Feb 24 2026

A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling a possible expansion of the threat actor's targeting beyond Ukraine and into entities supporting the war-torn nation. The activity, which targeted an unnamed entity involved in regional...

The Hacker News

Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem

Tue Feb 24 2026

Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control check.” That approach breaks the moment your environment stops being mostly-human and mostly-onboarded. In modern enterprises, identity risk is created by a compound of factors: control posture, hygiene, business context, and intent. Any one of these can perhaps be...

The Hacker News

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

Tue Feb 24 2026

The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by the Symantec and Carbon Black Threat Hunter Team. Broadcom's threat intelligence division said it also identified the same threat actors mounting an unsuccessful attack against a healthcare...

The Hacker News

Arkanix Stealer: AI-assisted info-stealer shuts down after brief campaign

Tue Feb 24 2026

Arkanix Stealer surfaced in late 2025 as a short-lived info-stealer, likely built as an AI-assisted experiment and quickly abandoned. Arkanix Stealer emerged in late 2025 as a short-lived information-stealing malware promoted on dark web forums. Researchers believe it was likely created as an AI-assisted experiment, suggesting the operators were testing automated development techniques rather than […]

Security Affairs

Shai-Hulud-style NPM worm hits CI pipelines and AI coding tools

Tue Feb 24 2026

A massive Shai-Hulud-style npm supply chain worm is hitting the software ecosystem, burrowing through developer machines, CI pipelines, and AI coding tools.

CSO Online

UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors

Tue Feb 24 2026

The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian entities. The attacks involve the deployment of two distinct backdoors codenamed LuciDoor and MarsSnake, according to a report published by Positive Technologies last week. "The group used several...

The Hacker News

Bitcoin-Milliarden von Raubkopie-Portal im Visier der Justiz

Tue Feb 24 2026

Urheberrechtsverstöße sind ein einträglisches Geschäft.

CSO Online

Operation MacroMaze: APT28 exploits webhooks for covert data exfiltration

Tue Feb 24 2026

Russia-linked APT28 targeted European entities with a webhook-based macro malware campaign called Operation MacroMaze. Russia-linked APT28 (aka UAC-0001, aka Fancy Bear, Pawn Storm, Sofacy Group, Sednit, BlueDelta, and STRONTIUM) launched Operation MacroMaze, targeting select entities in Western and Central Europe from September 2025 to January 2026. The campaign used webhook-based macro malware, leveraging simple tools and legitimate services for infrastructure and data […]

Security Affairs

Everest ransomware hits Vikor Scientific ‘s supplier, data of 140,000 patients stolen

Tue Feb 24 2026

Everest ransomware claims an attack on diagnostic firm Vikor Scientific (Vanta Diagnostics), exposing data of nearly 140,000 people. The Everest ransomware group has claimed responsibility for a cyberattack on Vikor Scientific, now operating as Vanta Diagnostics. The healthcare diagnostic firm disclosed a data breach impacting nearly 139,964 individuals, as reported by the US Department of […]

Security Affairs

It’s time to rethink CISO reporting lines

Tue Feb 24 2026

Despite inroads in the C-suite and rising prominence across the business at large, security leaders are still more likely to operate at a remove from the organization’s executive leadership when it co

CSO Online

The rise of the evasive adversary

Tue Feb 24 2026

Since the earliest days of the internet, there has never been a let-up in adversarial activity.

CSO Online

Anthropic’s Claude Code Security rollout is an industry wakeup call

Tue Feb 24 2026

When Anthropic launched a “limited research preview” of its Claude Code Security offering on Friday, Wall Street investors sent the stocks of the largest cybersecurity vendors plunging.

CSO Online

Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

Tue Feb 24 2026

Anthropic on Monday said it identified "industrial-scale campaigns" mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude's capabilities to improve their own models. The distillation attacks generated over 16 million exchanges with its large language model (LLM) through about 24,000 fraudulent accounts in violation of its terms...

The Hacker News

OT-Security: Warum der Blick auf Open Source lohnt

Tue Feb 24 2026

Auch im OT-Security-Bereich stellen Open-Source-Lösungen eine kostengünstige Alternative zu kommerziellen Tools dar.

CSO Online

Russian group uses AI to exploit weakly-protected Fortinet firewalls, says Amazon

Tue Feb 24 2026

A Russian-speaking threat actor is using commercial generative AI services to compromise hundreds of Fortinet Fortigate firewalls, warns Amazon Threat Intelligence.

CSO Online

Wormable XMRig campaign leverages BYOVD and timed kill switch for stealth

Mon Feb 23 2026

A wormable cryptojacking campaign spreads via pirated software, using BYOVD and a time-based logic bomb to deploy a custom XMRig miner. Researchers uncovered a wormable cryptojacking campaign that spreads through pirated software bundles to deploy a custom XMRig miner. The attack uses a BYOVD exploit and a time-based logic bomb to evade detection and maximize […]

Security Affairs

Romanian hacker pleads guilty to selling access to Oregon state networks

Mon Feb 23 2026

A Romanian man pleaded guilty to selling admin access to Oregon’s state network for $3,000 in Bitcoin and repeatedly accessing it to prove control. Catalin Dragomir (45) from Romania, pleaded guilty in the U.S. for selling unauthorized admin access to an Oregon state emergency management network. He gained access in June 2021, advertised it, and […]

Security Affairs

APT28 Targeted European Entities Using Webhook-Based Macro Malware

Mon Feb 23 2026

The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe. The activity, per S2 Grupo's LAB52 threat intelligence team, was active between September 2025 and January 2026. It has been codenamed Operation MacroMaze. "The campaign relies on basic tooling and the exploitation of legitimate services...

The Hacker News

Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

Mon Feb 23 2026

Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts. "Analysis of the recovered dropper, persistence triggers, and mining payload reveals a sophisticated, multi-stage infection prioritizing maximum cryptocurrency mining hashrate, often destabilizing the victim...

The Hacker News

⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

Mon Feb 23 2026

Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some happening quietly in the background, others playing out in public view. The details are different, but the pressure points are familiar. Across devices, cloud services, research labs, and even everyday apps, the line between normal behavior and hidden risk keeps getting thinner. Tools...

The Hacker News

CVE-2026-1731 fuels ongoing attacks on BeyondTrust remote access products

Mon Feb 23 2026

Attackers are exploiting CVE-2026-1731 in BeyondTrust RS and PRA to deploy VShell, gain persistence, move laterally, and control compromised systems. Threat actors are actively exploiting a recently disclosed critical vulnerability, tracked as CVE-2026-1731 (CVSS score: 9.9), in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA). The flaw is being used to conduct a wide […]

Security Affairs

Hacker stiehlt Daten von Tausenden RTL-Mitarbeitern

Mon Feb 23 2026

Ein Hacker hat sich Zugriff auf Mitarbeiterdaten von RTL verschafft.

CSO Online

How Exposed Endpoints Increase Risk Across LLM Infrastructure

Mon Feb 23 2026

As more organizations run their own Large Language Models (LLMs), they are also deploying more internal services and Application Programming Interfaces (APIs) to support those models. Modern security risks are being introduced less from the models themselves and more from the infrastructure that serves, connects and automates the model. Each new LLM endpoint expands the attack surface, often in...

The Hacker News

New Arkanix stealer blends rapid Python harvesting with stealthier C++ payloads

Mon Feb 23 2026

A newly uncovered infostealer, suspected to be built with the help of a large language model, is targeting victims with Python and C++ variants, each tailored for a different stage of data theft.

CSO Online

AI-powered campaign compromises 600 FortiGate systems worldwide

Mon Feb 23 2026

A Russian-speaking cybercriminal used commercial generative AI tools to hack over 600 FortiGate devices across 55 countries. Amazon Threat Intelligence reports that a Russian-speaking, financially motivated threat actor used commercial generative AI services to compromise more than 600 FortiGate devices in 55 countries. The activity, observed between January 11 and February 18, 2026, highlights how […]

Security Affairs

Attackers exploit Ivanti EPMM zero-days to seize control of MDM servers

Mon Feb 23 2026

Attackers are actively exploiting two critical zero-day vulnerabilities in Ivanti’s Endpoint Manager Mobile (EPMM) to gain unauthenticated control of enterprise mobile device management infrastructure

CSO Online

Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens

Mon Feb 23 2026

Cybersecurity researchers have disclosed what they say is an active "Shai-Hulud-like" supply chain worm campaign that has leveraged a cluster of at least 19 malicious npm packages to enable credential harvesting and cryptocurrency key theft. The campaign has been codenamed SANDWORM_MODE by supply chain security company Socket. As with prior Shai-Hulud attack waves, the malicious code embedded...

The Hacker News

MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

Mon Feb 23 2026

The Iranian hacking group known as MuddyWater (aka Earth Vetala, Mango Sandstorm, and MUDDYCOAST) has targeted several organizations and individuals mainly located across the Middle East and North Africa (MENA) region as part of a new campaign codenamed Operation Olalampo. The activity, first observed on January 26, 2026, has resulted in the deployment of new malware families that share...

The Hacker News

Anthropic unveils Claude Code Security to detect and fix code bugs

Mon Feb 23 2026

Anthropic launches Claude Code Security, an AI tool that scans code for vulnerabilities and suggests how to address them. Anthropic has introduced Claude Code Security, a new AI-powered service designed to scan software codebases for vulnerabilities and recommend fixes. Built into Claude Code, the tool aims to help teams detect and remediate security flaws faster. […]

Security Affairs

Luxury hotel stays for just €0.01. Spanish police arrest hacker

Sun Feb 22 2026

Spanish police arrested a 20-year-old hacker accused of booking luxury hotel rooms worth up to €1,000 a night for just one cent before being caught. Spanish police arrested a 20-year-old man in Madrid after allegedly manipulating the online payment system of a travel and hotel booking website to secure luxury hotel stays for just €0.01 […]

Security Affairs

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 85

Sun Feb 22 2026

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter Ninja Browser & Lumma Infostealer   Ghost Tapped: Tracking the Rise of Chinese Tap-to-pay Android Malware   Hudson Rock Identifies Real-World Infostealer Infection Targeting OpenClaw Configurations   Divide and conquer: how the new Keenadu backdoor exposed links […]

Security Affairs

Security Affairs newsletter Round 564 by Pierluigi Paganini – INTERNATIONAL EDITION

Sun Feb 22 2026

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. U.S. CISA adds RoundCube Webmail flaws to its Known Exploited Vulnerabilities catalog PayPal discloses extended data […]

Security Affairs

13 ways attackers use generative AI to exploit your systems

Mon Feb 23 2026

Artificial intelligence is revolutionizing the technology industry and this is equally true for the cybercrime ecosystem, as cybercriminals are increasingly leveraging generative AI to improve their t

CSO Online

AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

Sat Feb 21 2026

A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries. That's according to new findings from Amazon Threat Intelligence, which said it observed the activity between January 11 and February 18, 2026. "No exploitation of FortiGate...

The Hacker News

Password Managers Share a Hidden Weakness

Sat Feb 21 2026

Plus: The cybersecurity community grapples with Epstein files revelations, the US State Department plans an online anti-censorship “portal” for the world, and more.

Wired

U.S. CISA adds RoundCube Webmail flaws to its Known Exploited Vulnerabilities catalog

Sat Feb 21 2026

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds RoundCube Webmail flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two RoundCube Webmail flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws added to the catalog: Roundcube is a popular webmail platform and has been repeatedly targeted […]

Security Affairs

‘Narco-Submarine’ Carrying 4 Tons of Cocaine Captured by Mexico's Navy

Sat Feb 21 2026

Following increased surveillance and patrols of routes used by transnational drug-trafficking networks, Mexican authorities have seized approximately 10 tons of cocaine in the past week alone.

Wired

Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

Sat Feb 21 2026

Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that can scan a user's software codebase for vulnerabilities and suggest patches. The capability, called Claude Code Security, is currently available in a limited research preview to Enterprise and Team customers. "It scans codebases for security vulnerabilities and suggests targeted...

The Hacker News

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

Sat Feb 21 2026

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities in question are listed below - CVE-2025-49113 (CVSS score: 9.9) - A deserialization of untrusted data vulnerability that allows remote code...

The Hacker News

PayPal discloses extended data leak linked to Loan App glitch

Fri Feb 20 2026

PayPal disclosed a six-month data breach that exposed sensitive user data, including Social Security numbers, due to a software error. PayPal has disclosed a data breach caused by a software bug in its PayPal Working Capital loan app. The flaw exposed sensitive customer information, including customers’ business contact details (name, email, phone number, address), along […]

Security Affairs

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

Sat Feb 21 2026

With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications and Certified CISO v4 help close the gap between AI adoption and workforce readiness. EC-Council, creator of the world-renowned Certified Ethical Hacker (CEH) credential and a global leader in applied cybersecurity education, today launched its Enterprise AI Credential Suite,...

The Hacker News

Compromised npm package silently installs OpenClaw on developer machines

Sat Feb 21 2026

A new security bypass has users installing AI agent OpenClaw — whether they intended to or not.

CSO Online

DHS Wants a Single Search Engine to Flag Faces and Fingerprints Across Agencies

Fri Feb 20 2026

Homeland Security aims to combine its face and fingerprint systems into one big biometric platform—after dismantling centralized privacy reviews and key limits on face recognition.

Wired

‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA

Fri Feb 20 2026

Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the target and the legitimate site -- forwarding the victim's username, password and multi-factor authentication (MFA) code to the legitimate site and returning its responses.

Krebs on Security

Metadata Exposes Authors of ICE’s ‘Mega’ Detention Center Plans

Fri Feb 20 2026

Comments and other data left on a PDF detailing Homeland Security’s proposal to build “mega” detention and processing centers reveal the personnel involved in its creation.

Wired

Don’t trust TrustConnect: This fake remote support tool only helps hackers

Fri Feb 20 2026

After breaking into a system, crooks often install legitimate remote admin tools to keep a foothold on the network — with the risk that the tool’s vendor spots them and locks them out.

CSO Online

BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

Fri Feb 20 2026

Threat actors have been observed exploiting a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products to conduct a wide range of malicious actions, including deploying VShell and  The vulnerability, tracked as CVE-2026-1731 (CVSS score: 9.9), allows attackers to execute operating system commands in the context of the...

The Hacker News

North Korean IT worker scam nets Ukrainian five-year sentence in the U.S.

Fri Feb 20 2026

A Ukrainian man was sentenced to five years in the U.S. for helping North Korean IT workers use stolen identities to get hired by U.S. firms. Oleksandr “Alexander” Didenko, a 29-year-old Ukrainian national, has been sentenced to five years in a U.S. prison for supporting North Korea’s fraudulent IT worker scheme. Didenko admitted stealing U.S. […]

Security Affairs

Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

Fri Feb 20 2026

In yet another software supply chain attack, the open-source, artificial intelligence (AI)-powered coding assistant Cline CLI was updated to stealthily install OpenClaw, a self-hosted autonomous AI agent that has become exceedingly popular in the past few months. "On February 17, 2026, at 3:26 AM PT, an unauthorized party used a compromised npm publish token to publish an update to Cline CLI...

The Hacker News

KI und Komplexität als Brandbeschleuniger für Cyberkriminelle

Fri Feb 20 2026

Cyberangriffe werden immer schneller, wodurch sich die Zeitspanne zwischen der ersten Kompromittierung und den negativen Folgen verkürzt.

CSO Online

ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware

Fri Feb 20 2026

Cybersecurity researchers have disclosed details of a new ClickFix campaign that abuses compromised legitimate sites to deliver a previously undocumented remote access trojan (RAT) called MIMICRAT (aka AstarionRAT). "The campaign demonstrates a high level of operational sophistication: compromised sites spanning multiple industries and geographies serve as delivery infrastructure, a multi-stage...

The Hacker News

FBI warns of surge in ATM Jackpotting, $20 Million lost in 2025

Fri Feb 20 2026

The FBI warns ATM jackpotting is rising nationwide, with over $20 million lost in 2025 and 1,900 incidents reported since 2020. The FBI has warned of a sharp rise in ATM jackpotting attacks across the U.S., with losses exceeding $20 million in 2025 alone. Since 2020, about 1,900 incidents have been reported, including 700 last […]

Security Affairs

Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026

Fri Feb 20 2026

With one in three cyber-attacks now involving compromised employee accounts, insurers and regulators are placing far greater emphasis on identity posture when assessing cyber risk.  For many organizations, however, these assessments remain largely opaque. Elements such as password hygiene, privileged access management, and the extent of multi-factor authentication (MFA) coverage are...

The Hacker News

Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case

Fri Feb 20 2026

A 29-year-old Ukrainian national has been sentenced to five years in prison in the U.S. for his role in facilitating North Korea's fraudulent information technology (IT) worker scheme. In November 2025, Oleksandr "Alexander" Didenko pleaded guilty to wire fraud conspiracy and aggravated identity theft for stealing the identities of U.S. citizens and selling them to IT workers to help them land...

The Hacker News

Sonderkommission ermittelt zu Cyberangriff auf Kunstsammlungen Dresden

Fri Feb 20 2026

Die Staatlichen Kunstsammlungen Dresden waren Ziel einer Cyberattacke.

CSO Online

Red Card 2.0: INTERPOL busts scam networks across Africa, seizes millions

Fri Feb 20 2026

INTERPOL’s Operation Red Card 2.0 led to 651 arrests across 16 African countries and recovered over $4.3 million from online scams. INTERPOL’s Operation Red Card 2.0, a joint effort involving law enforcement agencies from 16 African countries, resulted in 651 arrests linked to online scam networks. The operation was carried out under the African Joint […]

Security Affairs

PromptSpy abuses Gemini AI to gain persistent access on Android

Fri Feb 20 2026

PromptSpy is the first Android malware to abuse Google’s Gemini AI, enabling persistence and advanced spying features. Security researchers at ESET have uncovered PromptSpy, the first known Android malware to exploit Google’s Gemini AI to maintain persistence. The malware can capture lockscreen data, block uninstallation attempts, collect device information, take screenshots, and record screen activity […]

Security Affairs

FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025

Fri Feb 20 2026

The U.S. Federal Bureau of Investigation (FBI) has warned of an increase in ATM jackpotting incidents across the country, leading to losses of more than $20 million in 2025. The agency said 1,900 ATM jackpotting incidents have been reported since 2020, out of which 700 took place last year. In December 2025, the U.S. Department of Justice (DoJ) said about $40.73 million has been collectively...

The Hacker News

PayPal launches latest struggle to get rid of SMS for MFA

Fri Feb 20 2026

When PayPal started emailing customers this month that it was backing off unencrypted SMS for multifactor authentication (MFA) at login, it came with the typical approach-avoidance asterisk.

CSO Online

Former Google Engineers Indicted Over Trade Secret Transfers to Iran

Fri Feb 20 2026

Two former Google engineers and one of their husbands have been indicted in the U.S. for allegedly committing trade secret theft from the search giant and other tech firms and transferring the information to unauthorized locations, including Iran. Samaneh Ghandali, 41, and her husband Mohammadjavad Khosravi (aka Mohammad Khosravi), 40, along with her sister Soroor Ghandali, 32, have been accused...

The Hacker News

10 Passwordless-Optionen für Unternehmen

Fri Feb 20 2026

Um Passwörter hinter sich zu lassen, gibt es bessere Lösungen.

CSO Online

Jeffrey Epstein’s Ties to CBP Agents Sparked a DOJ Probe

Fri Feb 20 2026

Documents say customs officers in the US Virgin Islands had friendly relationships with Epstein years after his 2008 conviction, showing how the infamous sex offender tried to cultivate allies.

Wired