themissingsunday
#tech-news

Weekly Scan: Cloud, Cybersecurity, AI News — Feb 22, 2026

Weekly Scan: Cloud, Cybersecurity, AI News — Feb 22, 2026

⚠️ Audio playback is not supported in your browser. Please try Chrome, Edge, or Safari for the best experience.

#This Week in Security: Your News Briefing

Welcome to your weekly security roundup. We’ve tracked down the 10 most important stories this week—the ones everyone’s talking about, from critical threats to emerging trends that could shape your security posture. Leading the news this week is CVE-2025-38352, which has sparked conversation across 10 sources. Meanwhile, the industry is closely tracking Major Japanese semiconductor supplier hit by ransomware attack with 3 mentions, along with emerging details on CVE-2026-3016 | UTT HiPER 810G up to 1.7.7-171114…, Promoting AI Security — Acting Assistant Privacy Commissioner…, and Russian-speaking hackers used gen AI tools to compromise 600…. Here’s the full breakdown of what you need to know.

#🚨 Critical Threats This Week

First, the stories that demand your immediate attention:

1. CVE-2025-38352 Mentioned across 10 industry sources this week. Currently trending CVE - Hype Score: 11 - In the Linux kernel, the following vulnerability has been resolved: posix-cpu-. Get the details →

2. Major Japanese semiconductor supplier hit by ransomware attack Mentioned across 3 industry sources this week. Advantest confirms being hit by ransomware, but says investigation is currently ongoing. Get the details →

3. CVE-2026-3016 | UTT HiPER 810G up to 1.7.7-171114 formP2PLimitConfig strcpy except buffer overflow Mentioned across 4 industry sources this week. A vulnerability was found in UTT HiPER 810G up to 1. Get the details →

#🛠️ Tools, Updates & Releases

New capabilities and releases worth knowing about:

1. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium . Referenced in 2 stories this week. Explore →

#What You Should Do Next

Monitor these in your environment next week:

  • Any new CVE announcements related to systems you operate
  • Emerging attack techniques being discussed in the community
  • Updates and patches for tools your team uses

Have a look at the full deep-dives in the trending stories below. Each one provides context that could inform your security decisions this week.


1. Key Threat Intel & Vulnerability Stories (19 mentions)
2. Major Japanese semiconductor supplier hit by ransomware attack (3 mentions)

Advantest confirms being hit by ransomware, but says investigation is currently ongoing.

Read Full Article →
3. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium (2 mentions)
4. Russian-speaking hackers used gen AI tools to compromise 600 firewalls, Amazon says (2 mentions)

A Russian-speaking threat actor used commercial generative artificial intelligence tools to help compromise more than 600 FortiGate firewall devices across more than 55 countries earlier this year, researchers have found.

Read Full Article →
5. Mississippi Hospital System Closes All Clinics After Ransomware Attack (2 mentions)

A ransomware attack forced the University of Mississippi Medical Center to close all of its roughly three dozen clinics around the state and cancel elective procedures. The post Mississippi Hospital System Closes All Clinics After Ransomware Attac...

Read Full Article →
6. Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems (2 mentions)

In yet another software supply chain attack, the open-source, artificial intelligence (AI)-powered coding assistant Cline CLI was updated to stealthily install OpenClaw, a self-hosted autonomous AI agent that has become exceedingly popular in the ...

Read Full Article →
7. Best-in-Class 'Starkiller' Phishing Kit Bypasses MFA (2 mentions)

A user-friendly PhaaS tool beats standard methods for detecting phishing attacks by live-proxying legitimate login sites.

Read Full Article →

#Article Summary

Category Article Count
AI & LLM 2
Cloud 1
Cyber Regulatory 0
Cybersecurity 118
Security Vendor Blog 5
Tech 14
Threat Intel & Vulnerability 16
Total Articles Scanned 156

#AI & LLM

Import AI 446: Nuclear LLMs; China’s big AI benchmark; measurement and AI policy

Welcome to Import AI, a newsletter about AI research. Import AI runs on arXiv and feedback from readers. If you’d like to support this, please subscribe. Subscribe now Want to make AI go better? Figure out how to measure it:…One simple policy intervention that works well…Jacob Steinhardt, an AI r...

Read Full Article →
Survey Reveals AI Advances in Telecom: Networks and Automation in Driver’s Seat as Return on Investment Climbs

AI is accelerating the telecommunications industry’s transformation, becoming the backbone of autonomous networks and AI-native wireless infrastructure. At the same time, the technology is unlocking new business and revenue opportunities, as telecom operators accelerate AI adoption across consume...

Read Full Article →

#Cloud

How “Clinejection” Turned an AI Bot into a Supply Chain Attack

The Clinejection vulnerability chain illustrates a dangerous new era of supply chain attacks where AI agents are turned into exploit vectors. By combining indirect prompt injection with GitHub Actions cache poisoning, attackers successfully pushed unauthorized code to thousands of developers. Thi...

Read Full Article →

#Cyber Regulatory

#Cybersecurity

How are cloud security teams supported by Agentic AI

Is Your Organization Prepared for the Surge of Non-Human Identities in Cloud Security? When businesses increasingly shift their operations to the cloud, the complexities of cybersecurity also grow. A little-discussed aspect of this transition is the management of Non-Human Identities (NHIs). Thes...

Read Full Article →
Between Two Nerds: How NSA will use AI

In this edition of Between Two Nerds Tom Uren and The Grugq talk about how ‘professional’ Five Eyes cyber espionage agencies like NSA will use AI. These agencies place a premium on stealth and won’t yolo AI. This episode is available on Youtube.

Read Full Article →
APT28 Targeted European Entities Using Webhook-Based Macro Malware

The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe. The activity, per S2 Grupo's LAB52 threat intelligence team, was active between September 2025 and January 2026. It has been codenamed O...

Read Full Article →
600+ FortiGate Devices Hacked by AI-Armed Amateur

A Russian-speaking hacker used generative AI to compromise the FortiGate firewalls, targeting credentials and backups for possible follow-on ransomware attacks.

Read Full Article →
Vulnerability Finding: An Inflection Point

LLM-driven vuln finding has reached an inflection

Read Full Article →
Security Advisory SA-26-01 GPS Attacks

GPS attacks trigger revisiting threat models

Read Full Article →
LLMs as Compilers

What if we think about LLM coding as if it’s a compiler stage?

Read Full Article →
The Cyber Resilience Act (CRA)!

The CRA is coming and it's going to be a dramatic change for technology producers

Read Full Article →
Threat modeling as a dial, not a switch

Thinking of threat modeling with a knob helps you get more out of it.

Read Full Article →
A few thoughts on CVE

Thoughts on the CVE funding crisis

Read Full Article →
Introducing the DEF CON 32 Hackers' Almanack

Grateful to introduce the Hackers' Almanack!

Read Full Article →
Security Researcher Comments on HIPAA Security Rule

A group of us have urged HHS to require better handling of security reports

Read Full Article →
Inside Man

Some thoughts on the Voyager Episode ‘Inside Man’

Read Full Article →
Appsec Roundup - July 2024

The most important stories around threat modeling, appsec and secure by design for June, 2024.

Read Full Article →
Lockbit, a study in public health

Why is it hard to count lockbit infections?

Read Full Article →
Eternal sunshine of the spotless LLM

Making an LLM forget is harder than it seems

Read Full Article →
CSRB Report on Microsoft

The CSRB has released its report into an intrusion at Microsoft, and...it’s a doozy.

Read Full Article →
Introducing Magic Security Dust!
The NVD Crisis

The NVD is in crisis, and so is patch management. It’s time to modernize.

Read Full Article →
Solving Hallucinations

Solving hallucinations in legal briefs is playing on easy mode —— and still too hard

Read Full Article →
Microsoft Can Fix Ransomware Tomorrow

My latest at Dark Reading draws attention to how Microsoft can fix ransomware tomorrow.

Read Full Article →
Phishing Defenses

Phishing behaviors, as observed in the wild.

Read Full Article →
Darkreading: Threat Modeling in the Age of OpenAI's Chatbot

Pointer to Adam’s latest Darkreading article

Read Full Article →
GPT-3

Text captured from GPT-3

Read Full Article →
What are we going to do: CO2 edition

What happened when Microsoft tried to buy climate abatements

Read Full Article →
Ransomware is Not the Problem

Arbitrarily powerful software -- applications, operating systems -- is a problem, as is preventing it from running on enterprise systems.

Read Full Article →
Colonial Pipeline, Darkside and Models

The Colonial Pipeline shutdown story is interesting in all sorts of ways, and I can't delve into all of it.I did want to talk about one small aspect, which is the way responders talk about Darkside.

Read Full Article →
The Updates Must Go Through

The timing of updates is not coincidental.

Read Full Article →
Ever Given & Suez

Thoughts on the issues with the Ever Given blocking the Suez Canal.

Read Full Article →
Threat Modeling and Social Issues

For Data Breach Today, I spoke with Anna Delaney about threat modeling for issues that are in the news right now.

Read Full Article →
Vaccines

You may have noticed that my end of the year posts are all science focused. Today, a set of resources on the COVID vaccines.

Read Full Article →
Interesting reads

Sharing for you, bookmarking for me.

Read Full Article →
Episode 9 Spoilers

Today is the last Star Wars Day before Episode 9 comes out, and brings the Skywalker saga to its end.

Read Full Article →
Leave Those Numbers for April 1st

Over-inflated numbers won't scare me into buying your ‘solution’.

Read Full Article →
High ROI Security Advisory Boards

Discussing the value of Security Advisory Boards

Read Full Article →
CVE Funding and Process

[no description provided]

Read Full Article →
Carpenter!

[no description provided]

Read Full Article →
The DREAD Pirates

[no description provided]

Read Full Article →
Pen Testing The Empire

[no description provided]

Read Full Article →
Threat Modeling Tooling from 2017

[no description provided]

Read Full Article →
20 Year Software: Engineering and Updates

[no description provided]

Read Full Article →
Hospital Ransomware

[no description provided]

Read Full Article →
Warrants for Cleaning Malware in Kelihos

[no description provided]

Read Full Article →
Threat Modeling & IoT

[no description provided]

Read Full Article →
People are The Weakest Link In Security?

[no description provided]

Read Full Article →
Modeling Attackers and Their Motives

There are a number of reports out recently, breathlessly presenting their analysis of one threatening group of baddies or another. Most readers should, at most, skim their analysis of the perpetrators. Read on for why.

Read Full Article →
Wormable XMRig campaign leverages BYOVD and timed kill switch for stealth

A wormable cryptojacking campaign spreads via pirated software, using BYOVD and a time-based logic bomb to deploy a custom XMRig miner. Researchers uncovered a wormable cryptojacking campaign that spreads through pirated software bundles to deploy a custom XMRig miner. The attack uses a BYOVD exp...

Read Full Article →
Ad tech firm Optimizely confirms data breach after vishing attack

New York-based ad tech company Optimizely has notified an undisclosed number of customers of a data breach after threat actors compromised some of its systems in a voice phishing attack. [...]

Read Full Article →
Top Las Vegas hotel is the latest ShinyHunters ransomware victim - hackers demand $1.5 million to not leak data

ShinyHunters claim to have hit Wynn Resorts, stealing 800,000 recors.

Read Full Article →
Air Côte d'Ivoire confirms cyberattack following ransomware claims

Air Côte d'Ivoire did not respond to requests for comment but released a statement on Friday confirming reports that hackers had breached its systems on February 8. Last week, the INC ransomware gang claimed it stole 208 GB of data from the airline.

Read Full Article →
Global data protection authorities warn generative AI companies against replicating real people

The joint statement comes on the heels of the Grok AI chatbot creating and sharing millions of images of “nudified” real people.

Read Full Article →
US Healthcare Diagnostic Firm Says 140,000 Affected by Data Breach

The Everest ransomware group has taken credit for a hacker attack on Vikor Scientific, now called Vanta Diagnostics. The post US Healthcare Diagnostic Firm Says 140,000 Affected by Data Breach appeared first on SecurityWeek .

Read Full Article →
Fake troubleshooting tip on ClawHub leads to infostealer infection

A new malware delivery campaign has hit ClawHub, the official online repository for “skills” that augment the capabilities of the popular OpenClaw AI agent. Unlike previous ones, this campaign does not aim to trick users into downloading a bogus, malicious skill. Instead, the threat actor is leav...

Read Full Article →
Russian hacker uses multiple AI tools to break hundreds of firewalls

A low-skilled threat actor was able to do a lot with the help of AI, Amazon researchers warn.

Read Full Article →
When identity isn’t the weak link, access still is

Stolen tokens and compromised devices let attackers reuse trust without breaking authentication. Specops Software explains why identity alone isn't enough and how continuous device verification strengthens Zero Trust. [...]

Read Full Article →
Japanese chip-testing toolmaker Advantest suffers ransomware attack

Japanese tech testing company Advantest has suffered a ransomware attack, the company confirmed last Thursday, after detecting unusual activity within its IT environment on February 15, 2026. What happened? Tokyo-based Advantest is a leading manufacturer of automatic test and measurement equipmen...

Read Full Article →
Autonomous AI Agents Provide New Class of Supply Chain Attack

While this campaign targets crypto wallets and steals money, the methodology has far wider potential that could be used by other attackers. The post Autonomous AI Agents Provide New Class of Supply Chain Attack appeared first on SecurityWeek .

Read Full Article →
Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls

A low-skilled Russian-speaking attacker has used GenAI tools to help deploy a successful attack workflow targeting FortiGate instances

Read Full Article →
Hacker stiehlt Daten von Tausenden RTL-Mitarbeitern

Ein Hacker hat sich Zugriff auf Mitarbeiterdaten von RTL verschafft. nitpicker – shutterstock.com Die RTL Group wurde offenbar Opfer einer Cyberattacke. Wie Cybernews berichtet, brüstet sich ein Cyberkrimineller namens LuneBF mit gestohlenen Daten von mehr als 27.000 Mitarbeitern der Mediengruppe...

Read Full Article →
New Arkanix stealer blends rapid Python harvesting with stealthier C++ payloads

A newly uncovered infostealer, suspected to be built with the help of a large language model, is targeting victims with Python and C++ variants, each tailored for a different stage of data theft. Kaspersky researchers discovered a stealer dubbed “Arkanix,” which is capable of harvesting credentia...

Read Full Article →
Hackers Use Excel Exploit to Hide XWorm 7.2 in JPEG Files, Hijack PCs

A new phishing campaign is spreading XWorm 7.2 via malicious Excel files, hiding the malware in Windows processes, and using AES encryption to steal passwords and Wi-Fi keys.

Read Full Article →
Leading Semiconductor Supplier Advantest Hit by Ransomware Attack

Advantest, a Japanese specialist in testing computer chips for major semiconductor manufacturers, has deployed incident response protocols following a cybersecurity incident

Read Full Article →
Police seize 100,000 stolen Facebook credentials in cybercrime raid

Officers from Poland’s Central Bureau for Combating Cybercrime (CBZC) dismantled an organized group that used phishing to seize Facebook accounts and extract BLIK payment codes from victims. Arrest (Source: Poland’s Central Bureau for Combating Cybercrime) Eleven members of an organized criminal ...

Read Full Article →
University of Mississippi Medical Center Still Offline After Ransomware Attack

University of Mississippi Medical Center is still scrambling to respond to a ransomware attack last Thursday

Read Full Article →
Enterprises are racing to secure agentic AI deployments

AI assistants are tied into ticketing systems, source code repositories, chat platforms, and cloud dashboards across many enterprises. In some environments, these systems can open pull requests, query internal databases, book services, and trigger automated workflows with limited human involvemen...

Read Full Article →
Arkanix Stealer pops up as short-lived AI info-stealer experiment

An information-stealing malware operation named Arkanix Stealer, promoted on multiple dark web forums towards the end of 2025, was likely developed as an AI-assisted experiment. [...]

Read Full Article →
Hackers Hide Pulsar RAT Inside PNG Images in New NPM Supply Chain Attack

Cybersecurity researchers at Veracode reveal a typosquatting attack that disguises Pulsar RAT as images to bypass Windows security and antivirus programs.

Read Full Article →
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries. That's according to new findings from Amazon Threat Intelligence, which said i...

Read Full Article →
Amazon: AI-assisted hacker breached 600 Fortinet firewalls in 5 weeks

Amazon is warning that a Russian-speaking hacker used multiple generative AI services as part of a campaign that breached more than 600 FortiGate firewalls across 55 countries in five weeks. [...]

Read Full Article →
U.S. CISA adds RoundCube Webmail flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds RoundCube Webmail flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two RoundCube Webmail flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below ...

Read Full Article →
CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities in question are listed below - CVE-2025-49113 ...

Read Full Article →
‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA

Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cle...

Read Full Article →
Japanese tech giant Advantest hit by ransomware attack

Advantest Corporation disclosed that its corporate network has been targeted in a ransomware attack that may have affected customer or employee data. [...]

Read Full Article →
Lessons From AI Hacking: Every Model, Every Layer Is Risky

After two years of finding flaws in AI infrastructure, two Wiz researchers advise security pros to worry less about prompt injection and more about vulnerabilities.

Read Full Article →
CISA: BeyondTrust RCE flaw now exploited in ransomware attacks

Hackers are actively exploiting the CVE-2026-1731 vulnerability in the BeyondTrust Remote Support product, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns. [...]

Read Full Article →
Data breach at French bank registry impacts 1.2 million accounts

The French Ministry of Finance has published an announcement informing of a cybersecurity incident that has impacted 1.2 million accounts. [...]

Read Full Article →
BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

Threat actors have been observed exploiting a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products to conduct a wide range of malicious actions, including deploying VShell and The vulnerability, tracked as CVE-2026-1731 (C...

Read Full Article →
Friend or foe? AI: The new cybersecurity threat and solutions

Understanding the risks now emerging at every layer of the AI stack.

Read Full Article →
Latin America's Cyber Maturity Lags Threat Landscape

The slower pace of upgrades has the unintended impact of creating a haven for attackers, especially for initial access brokers and ransomware gangs.

Read Full Article →
KI und Komplexität als Brandbeschleuniger für Cyberkriminelle

Cyberangriffe werden immer schneller, wodurch sich die Zeitspanne zwischen der ersten Kompromittierung und den negativen Folgen verkürzt. andrey_l – shutterstock.com Der Einzug von KI hat den benötigten Zeitaufwand für Cyberattacken massiv verkürzt, so dass menschliche Verteidiger nicht mehr mith...

Read Full Article →
Mississippi medical center closes all clinics after ransomware attack

The University of Mississippi Medical Center (UMMC) closed all its clinic locations statewide on Thursday following a ransomware attack. [...]

Read Full Article →
Risky Bulletin: RPKI infrastructure sits on shaky ground

RPKI relies on vulnerable servers, the French Ministry of Economy discloses a data breach, the UK gives tech platforms 48 hours to remove revenge porn, and ClickFix-attacks are responsible for 50% of malware infections.

Read Full Article →
Major CarGurus data breach reportedly sees 1.7 million corporate records stolen

CarGurus reportedly hit by ShinyHunters - with devastating effect.

Read Full Article →
Emerging Chiplet Designs Spark Fresh Cybersecurity Challenges

As scaled-down circuits with limited functions redefine computing for AI systems and autonomous vehicles, their flexibility demands new approaches to safeguard critical infrastructure.

Read Full Article →
Supply Chain Attack Secretly Installs OpenClaw for Cline Users

The malicious version of Cline's npm package — 2.3.0 — was downloaded more than 4,000 times before it was removed.

Read Full Article →
FBI: Threats from Salt Typhoon are ‘still very much ongoing’

A top FBI cyber official said Salt Typhoon, the Chinese cyber espionage group behind the widespread compromise of U.S. telecommunications infrastructure in 2024, continues to pose a broad threat to both America’s private and public sectors. Michael Machtinger, deputy assistant director for cyber ...

Read Full Article →
ONCD official says Trump administration aims to bolster AI use for defense without increasing risk

Alexandra Seymour also talked about cyber workforce goals, including emulating Israel’s Unit 8200. The post ONCD official says Trump administration aims to bolster AI use for defense without increasing risk appeared first on CyberScoop .

Read Full Article →
INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown

An international cybercrime operation against online scams has led to 651 arrests and recovered more than $4.3 million as part of an effort led by law enforcement agencies from 16 African countries. The initiative, codenamed Operation Red Card 2.0, took place between December 8, 2025 and January ...

Read Full Article →
Keeping Google Play & Android app ecosystems safe in 2025

Posted by Vijaya Kaza, VP and GM, App & Ecosystem Trust The Android ecosystem is a thriving global community built on trust, giving billions of users the confidence to download the latest apps. In order to maintain that trust, we’re focused on ensuring that apps do not cause real-world harm, such...

Read Full Article →
Cybercrime-as-a-service forces a security rethink

With AI-powered tools readily available, sophisticated attacks no longer require sophisticated attackers.

Read Full Article →
Batten down the hatches - ransomware attacks are increasingly targeting firewalls, experts claim

Make sure to secure your firewalls - or face the risk of ransomware attack.

Read Full Article →
Six flaws found hiding in OpenClaw’s plumbing

Security researchers have uncovered six high-to-critical flaws affecting the open-source AI agent framework OpenClaw , popularly known as a “social media for AI agents.” The flaws were discovered by Endor Labs as its researchers ran the platform through an AI-driven static application security te...

Read Full Article →
Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA

A new cybercriminal toolkit uses proxies to mimic popular online services and represents a “significant escalation in phishing infrastructure,” warn researchers at Abnormal

Read Full Article →
PromptSpy ushers in the era of Android threats using GenAI

ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow

Read Full Article →
Cybersicherheit braucht Reife und keine Checklisten

Wenn CISOs stärkere Programme, bessere Widerstandsfähigkeit und eine sicherere Zukunft wollen, müssen sie ihren Ansatz weiterentwickeln. Overearth – shutterstock.com Cybersicherheit wird oft wie ein Spiel behandelt. Unternehmen jagen schnellen Erfolgen hinterher, haken Compliance-Listen ab oder k...

Read Full Article →
Smashing Security podcast #455: Face off: Meta’s Glasses and America’s internet kill switch

Could America turn off Europe's internet? That’s one of the questions that Graham and special guest James Ball will be exploring as they discuss tech sovereignty. Could Gmail, cloud services, and critical infrastructure really become geopolitical leverage? And is anyone actually building a Plan B...

Read Full Article →
Nigerian man sentenced to 8 years in prison for running phony tax refund scheme

Matthew Akande was living in Mexico when he and at least three co-conspirators broke into the networks of tax preparation firms and filed more than 1,000 fraudulent tax returns seeking tax refunds. The post Nigerian man sentenced to 8 years in prison for running phony tax refund scheme appeared f...

Read Full Article →
AI is helping hackers make new malware faster and more complex than ever - and things may only get tougher

Social engineering is still the number one attack vector, but ransomware operators are stepping away from encryptors.

Read Full Article →
Critical Grandstream VoIP Bug Highlights SMB Security Blind Spot

CVE-2026-2329 allows unauthenticated root-level access to SMB phone infrastructure, so attackers can intercept calls, commit toll fraud, and impersonate users.

Read Full Article →
Data breach at fintech giant Figure affects close to a million customers

The Figure data breach allowed hackers to steal customer names, dates of birth, physical addresses, phone numbers, and email addresses.

Read Full Article →
‘An all-time high’: Number of ransomware groups exploded in 2025 as victim growth rate doubled - with Qilin dominating the landscape

Ransomware groups reached a record high in 2025, and claimed a record number of victims in the process.

Read Full Article →
AI Found Twelve New Vulnerabilities in OpenSSL

The title of the post is” What AI Security Research Looks Like When It Works ,” and I agree: In the latest OpenSSL security release> on January 27, 2026, twelve new zero-day vulnerabilities (meaning unknown to the maintainers at time of disclosure) were announced. Our AI system is responsible for...

Read Full Article →
Record Number of Ransomware Victims and Groups in 2025

Searchlight Cyber reports a 30% annual increase in ransomware victim numbers in 2025

Read Full Article →
“Good enough” emulation: Fuzzing a single thread to uncover vulnerabilities

A Talos researcher used targeted emulation of the Socomec DIRIS M-70 gateway’s Modbus thread to uncover six patched vulnerabilities, showcasing efficient tools and methods for IoT security testing.

Read Full Article →
Chinese APT Group Exploits Dell Zero-Day for Two Years

Mandiant reveals campaign featuring exploit of a CVSS 10.0 CVE in Dell RecoverPoint for Virtual Machines

Read Full Article →
Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from China to hijack the software update mechanism to selectively deliver malware to targets of interest. The version 8.9.2 update incorporates what maintainer Don Ho calls a "double lock" design th...

Read Full Article →
CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows - CVE-2026-2441 (CVSS score: 8.8) - A use-after...

Read Full Article →
Risky Business #825 -- Palo Alto Networks blames it on the boogie

On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover: Palo Alto threat researchers want to attribute to China, but management says shush An increasing proportion of ransomware is data extortion. Is this good? Cambodia says it’s going t...

Read Full Article →
Risky Bulletin: Supply chain attack plants backdoor on Android tablets

A supply chain attack plants backdoors on Android tablets, the EU blocks AI from lawmakers’ devices, Cellebrite was used against a Kenyan politician, and a Chinese APT is exploiting a Dell zero-day.

Read Full Article →
OpenCFD OpenFOAM Code Stream directive arbitrary code execution vulnerability
Supply Chain Attack Embeds Malware in Android Devices

Keenadu downloads payloads that hijack browser searches, commit ad fraud, and execute other actions without user knowledge.

Read Full Article →
Low-Skilled Cybercriminals Use AI to Perform "Vibe Extortion" Attacks

Unit 42 researchers observed a low-skilled threat actor using an LLM to script a professional extortion strategy, complete with deadlines and pressure tactics

Read Full Article →
Top Japanese hotel brand reveals cyberattack - Washington hotels hit by ransomware

An investigation is underway into Washington hotel attackers, but no group has claimed responsibility yet.

Read Full Article →
Significant Rise in Ransomware Attacks Targeting Industrial Operations

Dragos annual report warns of a surge in ransomware attacks causing increased operational disruption in industrial environments

Read Full Article →
My Day Getting My Hands Dirty with an NDR System

My objective As someone relatively inexperienced with network threat hunting, I wanted to get some hands-on experience using a network detection and response (NDR) system. My goal was to understand how NDR is used in hunting and incident response, and how it fits into the daily workflow of a Secu...

Read Full Article →
Eurail confirms stolen traveler data is on sale in the dark web - and it still doesn't know who is behind the attack

The January 2026 Eurail breach just got worse, as hackers have started selling the stolen data.

Read Full Article →
Adopting AI is a major priority for businesses - but employees are falling behind on education

All worker types, including CEOs, are showing a lack of readiness when it comes to using AI in cybersecurity.

Read Full Article →
Sex toy firm hit by data breach - Tenga says hacker infiltrated systems, stole customer data

A Tenga employee fell for a phishing email, and gave away access to a company email account.

Read Full Article →

#Security Vendor Blog

PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers

Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.

Read Full Article →
Threats Making WAVs - Incident Response to a Cryptomining Attack

Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident res...

Read Full Article →
PromptSpy ushers in the era of Android threats using GenAI

ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow

Read Full Article →
Zero Trust Switching: Why Firewalls Alone Can’t Secure AI Workloads
Critical Vulnerabilities in Ivanti EPMM Exploited

We discuss widespread exploitation of Ivanti EPMM zero-day vulns CVE-2026-1281 and CVE-2026-1340. Attackers are deploying web shells and backdoors. The post Critical Vulnerabilities in Ivanti EPMM Exploited appeared first on Unit 42 .

Read Full Article →

#Tech

Android malware alert: Fake IPTV apps will steal your bank details

A new Android malware called “Massiv” is on the rise. Security researchers at ThreatFabric uncovered the large-scale campaign, in which hackers disguised and distributed the malware as a harmless IPTV streaming app. Once installed, however, the app was able to read screen inputs to steal password...

Read Full Article →
4 tips to help the new innovator’s struggle with AI and traditional code

What most people thought was going to be another year of agentic AI is quickly turning into a more practical focus on simultaneously dealing with probabilistic (AI/ML-driven) and deterministic (traditional rule-based) code. Not a portfolio of both, but a growing number of hybrid applications that...

Read Full Article →
젯브레인, VS 코드용 ‘자바→코틀린’ 변환기 공개···코틀린 전환 지원

자바 개발자의 코틀린 도입을 확대하기 위해, 젯브레인이 마이크로소프트(MS)의 비주얼 스튜디오 코드(Visual Studio Code)용 ‘자바→코틀린’ 변환기 확장 프로그램을 공개했다. 코틀린은 오랫동안 자바의 대안 언어로 자리매김해 왔으며, 안드로이드 모바일 애플리케이션 개발 등 자바 기반 생태계 전반에서 폭넓게 활용되고 있다. 2월 19일 공개된 이 확장 프로그램은 비주얼 스튜디오 마켓플레이스에서 내려받을 수 있다. 개발자는 컨텍스트 메뉴를 통해 개별 자바 파일을 코틀린 코드로 변환할 수 있다. 이를 통해 레거시 코드베이...

Read Full Article →
“채용 기준이 달라진다” AI가 뒤흔드는 IT 일자리의 현주소

AI가 비즈니스 전반에 깊숙이 스며들면서 IT 인력 시장도 빠른 속도로 재편되고 있다. 지난 1년 동안 IT 업계는 AI로 인한 업무 환경의 변화를 겪었다. AI는 필요한 기술 역량의 수요를 바꾸고, 일부 IT 경력 개발 과정을 재정의했으며, 거의 모든 기업에서 일상 운영 방식까지 흔들어 놓았다. IT 리더와 구성원들이 워크플로우와 프로세스에 AI를 끼워 넣는 과정에서 업무 방식 자체가 달라지고 있다는 의미다. 최근 다시 감원 소식이 헤드라인을 장식하는 가운데, 기업은 AI를 구현·도입·보호·최적화하는 데 필요한 ‘특정 역량’...

Read Full Article →
파일럿은 성공, 확장은 실패···전문가들이 본 ‘에이전틱 AI의 생존 조건’

‘에이전틱 AI’는 최근 기업 기술 분야에서 가장 주목받는 용어가 됐다. 벤더는 스스로 판단하고 행동하는 시스템을 내세우며, AI를 단순한 보조 도구에서 실행 주체로 끌어올리겠다고 약속하고 있다. AI 투자에서 가시적인 성과를 내야 한다는 압박을 받는 CIO에게 이런 제안은 매력적으로 들릴 수밖에 없다. 그러나 이런 기대와 달리, 현장에서는 프로젝트를 잠시 멈추는 기업도 늘고 있다. 가트너(Gartner) 는 2027년 말까지 에이전틱 AI 프로젝트의 40% 이상이 중단될 것으로 내다봤다. 가트너의 시니어 디렉터 애널리스트 아...

Read Full Article →
UK council faces data breach claim after mishandling trans complaints

Confidential complainant details passed to local politician following debate A UK councillor has dubbed her local authority's data breach "crazy" after the personal details of individuals behind a series of complaints were revealed to her.…

Read Full Article →
AI coding assistant Cline compromised to create more OpenClaw chaos

4K unintended installs in very odd supply chain attack Someone compromised open source AI coding assistant Cline CLI's npm package earlier this week in an odd supply chain attack that secretly installed OpenClaw on developers' machines without their knowledge. …

Read Full Article →
ShinyHunters demands $1.5M not to leak Vegas casino and resort chain data

What happens in Vegas… Las Vegas hotel and casino giant Wynn Resorts appears to be the latest victim of data-grabbing and extortion gang ShinyHunters.…

Read Full Article →
Your password manager isn’t as safe as you think

Bitwarden, LastPass, and Dashlane are less secure than you might expect, at least if you go by the findings of security researchers at ETH Zurich and the Università della Svizzera italiana (USI) in Lugano. They’ve allegedly discovered serious security vulnerabilities in these popular password man...

Read Full Article →
EFF policy says bots can code but humans must write the docs

'Just trust us' – Big Tech's hackneyed catchphrase makes an unwelcome return The Electronic Frontier Foundation says it will accept LLM generated code from contributors to its open source projects but will draw the line at non-human generated comments and documentation.…

Read Full Article →
Is AI killing technology?

We’re living through the single biggest tech disruption in history (and, if not the biggest, definitely the fastest). The AI revolution promises huge productivity gains by automating complex tasks, accelerating scientific breakthroughs in medicine, biotech, materials science, and democratizing ac...

Read Full Article →
ChatGPT gets ‘Lockdown Mode’ mode for extra security and privacy

OpenAI is launching two new security features in ChatGPT to address growing threats to its AI systems, according to a recent blog post . As AI services increasingly connect to wider parts of the web and more external apps, the risk of so-called “prompt injection attacks” also increases. A prompt ...

Read Full Article →
30 fake AI Chrome extensions caught stealing passwords and more

Security experts have uncovered a number of dangerous extensions for the Chrome browser. A total of 30 extensions belonging to the AiFrame campaign have been identified as dangerous, appearing to offer AI services but actually designed to intercept sensitive information. To date, the extensions h...

Read Full Article →
Update Chrome ASAP! The first zero-day flaw of 2026 is patched

A zero-day vulnerability is a flaw in software that goes undiscovered by the developers, which can then be found and exploited by hackers before anyone gets wind of it. You might’ve heard about zero-day flaws in Chrome because it happens a lot—oh boy, does it happen a lot . Well, the first one th...

Read Full Article →

#Threat Intel & Vulnerability

Introducing "AI Unlocked: Decoding Prompt Injection," a New Interactive Challenge
CarGurus - 12,461,887 breached accounts

In February 2026, the automotive marketplace CarGurus was the target of a data breach attributed to the threat actor ShinyHunters . Following an attempted extortion, the data was published publicly and contained more than 12M email addresses across multiple files including user account ID mapping...

Read Full Article →
Japanese-Language Phishing Emails, (Sat, Feb 21st)

Introduction

Read Full Article →
Hospitals at Risk of BeyondTrust Ransomware Hacks

Marianne Kolbasuk McGee reports: U.S. federal authorities and industry officials are urging hospitals and clinics to address a critical flaw in BeyondTrust Remote Support and Privileged Remote Access software, which if exploited, could give an attacker a foothold inside a corporate network. The U...

Read Full Article →
Resource: Privacy Law Directory — Codamail

Regular readers of my companion privacy-oriented site, PogoWasRight.org, may recall that the site recently noted The Data Broker Directory: Who has your data, where they got it, and who they sell it to by Codamail’s Stephen K. Gielda of Packetderm. Instead of taking a well-deserved break after al...

Read Full Article →
Facebook ads spread fake Windows 11 downloads that steal passwords and crypto wallets

Attackers are weaponizing Facebook ads to distribute password-stealing malware masked as a Windows download.

Read Full Article →
CarMax - 431,371 breached accounts

In January 2026, data allegedly sourced from US automotive retailer CarMax was published online following a failed extortion attempt . The data included 431k unique email addresses along with names, phone numbers and physical addresses.

Read Full Article →
UK Urges Small Businesses to ‘Lock the Door’ on Cybercrime

The UK government has launched a new cybersecurity campaign aimed at small and medium-sized businesses urging them to “lock the door” on cyber criminals as digital threats escalate. The initiative — backed by the National Cyber Security Centre (NCSC) and the Department for Science, Innovation & T...

Read Full Article →
Meta patents AI that could keep you posting from beyond the grave

Hopefully Meta really will file this in the "just because we can do it doesn't mean we should" drawer.

Read Full Article →
Job scam uses fake Google Forms site to harvest Google logins

Phishers are using fake Google Forms pages hosted on lookalike domains to trick job seekers into handing over their Google credentials.

Read Full Article →
“Good enough” emulation: Fuzzing a single thread to uncover vulnerabilities

A Talos researcher used targeted emulation of the Socomec DIRIS M-70 gateway’s Modbus thread to uncover six patched vulnerabilities, showcasing efficient tools and methods for IoT security testing.

Read Full Article →
GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack

GrayCharlie turns compromised WordPress sites into malware delivery machines. Discover how this threat actor chains fake browser updates and ClickFix lures to deploy NetSupport RAT, Stealc, and SectopRAT.

Read Full Article →
Scam Guard for desktop: A second set of eyes for suspicious moments

Malwarebytes Scam Guard is now on Windows and Mac, bringing AI-powered scam detection to your desktop.

Read Full Article →
Update Chrome now: Zero-day bug allows code execution via malicious webpages

Google has released an emergency update to patch an actively exploited zero-day—the first Chrome zero-day of the year.

Read Full Article →
Fake Incident Report Used in Phishing Campaign, (Tue, Feb 17th)

This morning, I received an interesting phishing email. I&#;x26;#;xe2;&#;x26;#;x80;&#;x26;#;x99;ve a &#;x26;#;xe2;&#;x26;#;x80;&#;x26;#;x9c;love &#;x26; hate&#;x26;#;xe2;&#;x26;#;x80;&#;x9d; relation with such emails because I always have the impression to lose time when reviewing them but someti...

Read Full Article →
Canada Goose - 581,877 breached accounts

In February 2026, a data breach allegedly containing data relating to Canada Goose customers was published publicly . The data contained 920k records with 582k unique email addresses and included names, phone numbers, IP addresses, physical addresses and partial credit card data, specifically car...

Read Full Article →
📋 CVE Reference Bulletin (113 vulnerabilities)

⚠️ Reference material: Click CVE IDs for full details. Severity indicators are approximate classifications.

CVE IDSeverityProductSource
CVE-2026-27514⚪ UnknownTenda F3
CVE-2026-27513⚪ UnknownTenda F3
CVE-2026-27512⚪ UnknownTenda F3
CVE-2026-27511⚪ UnknownTenda F3
CVE-2026-26464⚪ UnknownKashipara Society
CVE-2026-26365⚪ UnknownAkamai Ghost
CVE-2026-26119⚪ UnknownPrivilege Escalation inThe Hacker News
CVE-2026-24494⚪ UnknownOrder Up
CVE-2026-22769⚪ UnknownExploited Since Mid-2024The Hacker News
CVE-2026-22568⚪ UnknownZscaler ZIA
CVE-2026-22567⚪ UnknownZscaler ZIA
CVE-2026-21420⚪ Unknowndsa-2026-059VulnDB
CVE-2026-3070⚪ UnknownSourceCodester Modern
CVE-2026-3069⚪ Unknownitsourcecode Document
CVE-2026-3068⚪ Unknownitsourcecode Document
CVE-2026-3067⚪ UnknownHummerRisk up
CVE-2026-3066⚪ UnknownHummerRisk up
CVE-2026-3065⚪ UnknownHummerRisk up
CVE-2026-3064⚪ UnknownHummerRisk up
CVE-2026-3057⚪ Unknowna54552239 pearProjectApi
CVE-2026-3054⚪ UnknownAlinto SOGo
CVE-2026-3053⚪ UnknownDataLinkDC dinky
CVE-2026-3052⚪ UnknownDataLinkDC dinky
CVE-2026-3051⚪ UnknownDataLinkDC dinky
CVE-2026-3050⚪ Unknownhorilla-opensource horilla
CVE-2026-3049⚪ Unknownhorilla-opensource horilla
CVE-2026-3046⚪ Unknownitsourcecode E-Logbook
CVE-2026-3044🔵 LOWTenda AC8
CVE-2026-3043⚪ Unknownitsourcecode Event
CVE-2026-3042⚪ Unknownitsourcecode Event
CVE-2026-3041⚪ Unknownxingfuggz BaykeShop
CVE-2026-3040⚪ UnknownDrayTek Vigor
CVE-2026-3028⚪ Unknownerzhongxmu JEEWMS
CVE-2026-3027⚪ Unknownerzhongxmu JEEWMS
CVE-2026-3026⚪ Unknownerzhongxmu JEEWMS
CVE-2026-3025⚪ UnknownShuoRen Smart
CVE-2026-3016🔵 LOWUTT HiPER
CVE-2026-3015🔵 LOWUTT HiPER
CVE-2026-2998⚪ UnknowneAI ERP
CVE-2026-2997⚪ UnknownWisdomGarden Tronclass
CVE-2026-2985⚪ UnknownTiandy Video
CVE-2026-2984⚪ UnknownSourceCodester Student
CVE-2026-2983⚪ UnknownSourceCodester Student
CVE-2026-2981🔵 LOWUTT HiPER
CVE-2026-2980🔵 LOWUTT HiPER
CVE-2026-2979⚪ UnknownFastApiAdmin up
CVE-2026-2978⚪ UnknownFastApiAdmin up
CVE-2026-2977⚪ UnknownFastApiAdmin up
CVE-2026-2976⚪ UnknownFastApiAdmin up
CVE-2026-2975⚪ UnknownFastApiAdmin up
CVE-2026-2972⚪ Unknowna466350665 Smart-SSO
CVE-2026-2971⚪ Unknowna466350665 Smart-SSO
CVE-2026-2970⚪ Unknowndatapizza-labs datapizza-ai
CVE-2026-2969⚪ Unknowndatapizza-labs datapizza-ai
CVE-2026-2968⚪ UnknownCesanta Mongoose
CVE-2026-2967⚪ UnknownCesanta Mongoose
CVE-2026-2966⚪ UnknownCesanta Mongoose
CVE-2026-2965⚪ Unknown07FLYCMS/07FLY-CMS/07FlyCRM up
CVE-2026-2964⚪ Unknownhiguma web-audio-recorder-js
CVE-2026-2963⚪ UnknownJinher OA
CVE-2026-2962🔵 LOWD-Link DWR-M960
CVE-2026-2961🔵 LOWD-Link DWR-M960
CVE-2026-2960🔵 LOWD-Link DWR-M960
CVE-2026-2959🔵 LOWD-Link DWR-M960
CVE-2026-2698⚪ UnknownNessus ID 299698VulnDB
CVE-2026-2697⚪ UnknownNessus ID 299698VulnDB
CVE-2026-2588🔵 LOWTIMLEGGE Crypt::NaCl::Sodium
CVE-2026-2329🔴 CRITICALFIXEDRapid7 Vulnerab
CVE-2026-1731🔴 CRITICALCVE-2026-1731Palo Alto Netwo
CVE-2026-1367⚪ UnknownZoho ManageEngine
CVE-2025-70058⚪ UnknownYMFE yapi
CVE-2025-70045⚪ Unknownjxcore jxm
CVE-2025-70044⚪ Unknownfofolee uTools-quickcommand
CVE-2025-70043⚪ UnknownAyms TLS/SSL
CVE-2025-69700🔵 LOWTenda FH1203
CVE-2025-69403⚪ UnknownIntruder Intel
CVE-2025-68461⚪ UnknownIntruder Intel
CVE-2025-61146⚪ Unknownsaitoha libsixel
CVE-2025-61145⚪ Unknownlibtiff up
CVE-2025-61144🔵 LOWlibtiff up
CVE-2025-61143⚪ Unknownlibtiff up
CVE-2025-59873⚪ UnknownKB0128902VulnDB
CVE-2025-49113⚪ UnknownIntruder Intel
CVE-2025-41002⚪ UnknownManantial de
CVE-2025-40986⚪ UnknownPideTuCita 6.0.52
CVE-2025-40701⚪ UnknownSote Soteshop
CVE-2025-38352⚪ UnknownIntruder Intel
CVE-2025-34291⚪ UnknownIntruder Intel
CVE-2025-29969⚪ UnknownIntruder Intel
CVE-2025-27555🔵 LOWApache Airflow
CVE-2025-14905🔵 LOW389-ds-base schema.c
CVE-2025-12543⚪ UnknownIntruder Intel
CVE-2025-11730⚪ UnknownIntruder Intel
CVE-2025-3248⚪ UnknownIntruder Intel
CVE-2024-54222⚪ UnknownIntruder Intel
CVE-2019-25462⚪ UnknownExploit 47144VulnDB
CVE-2019-25461⚪ UnknownExploit 47140VulnDB
CVE-2019-25460⚪ UnknownExploit 47140VulnDB
CVE-2019-25459⚪ UnknownExploit 47142VulnDB
CVE-2019-25458⚪ UnknownExploit 47143VulnDB
CVE-2019-25457⚪ UnknownExploit 47145VulnDB
CVE-2019-25456⚪ UnknownExploit 47141VulnDB
CVE-2019-25455⚪ UnknownExploit 47139VulnDB
CVE-2019-25452⚪ UnknownExploit 47362 / EDB-47362VulnDB
CVE-2019-25450⚪ UnknownExploit 47370 / EDB-47370VulnDB
CVE-2019-25446⚪ UnknownExploit 47401 / EDB-47401VulnDB
CVE-2019-25443⚪ UnknownExploit 47356 / EDB-47356VulnDB
CVE-2019-25442⚪ UnknownExploit 47284 / EDB-47284VulnDB
CVE-2019-25440⚪ UnknownExploit 47199 / EDB-47199VulnDB
CVE-2019-25439⚪ UnknownExploit 47152 / EDB-47152VulnDB
CVE-2019-25433⚪ UnknownExploit 46835 / EDB-46835VulnDB
CVE-2019-25391⚪ UnknownExploit 46681 / EDB-46681VulnDB
CVE-2019-25366⚪ UnknownExploit 46799 / EDB-46799VulnDB
<p class="text-muted-foreground text-xs mt-3 italic">💡 Tip: Use the <strong>CVE ID</strong> column as a quick reference. For detailed analysis, also check the editorial sections above for deeper coverage of significant vulnerabilities.</p>

Share this post