Cyber Feed
- ClawJacked attack let malicious websites hijack OpenClaw to steal databy Lawrence Abrams on March 1, 2026 at 9:44 pm
Security researchers have disclosed a high-severity vulnerability dubbed “ClawJacked” in the popular AI agent OpenClaw that allowed a malicious website to silently bruteforce access to a locally running instance and take control over it. […]
- Samsung TVs to stop collecting Texans’ data without express consentby Bill Toulas on March 1, 2026 at 3:23 pm
Samsung and the State of Texas have reached a settlement agreement over the alleged unlawful collection of content-viewing information through its smart TVs […]
- Hackers Weaponize Claude Code in Mexican Government Cyberattackby Ionut Arghire on March 1, 2026 at 12:30 pm
The AI was abused to write exploits, create tools, and automatically exfiltrate over 150GB of data. The post Hackers Weaponize Claude Code in Mexican Government Cyberattack appeared first on SecurityWeek.
- QuickLens Chrome extension steals crypto, shows ClickFix attackby Lawrence Abrams on February 28, 2026 at 7:18 pm
A Chrome extension named “QuickLens – Search Screen with Google Lens” has been removed from the Chrome Web Store after it was compromised to push malware and attempt to steal crypto from thousands of users. […]
- ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocketby info@thehackernews.com (The Hacker News) on February 28, 2026 at 5:21 pm
OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to a locally running artificial intelligence (AI) agent and take over control. “Our vulnerability lives in the core system itself – no plugins, no marketplace, no user-installed extensions – just the bare OpenClaw gateway, running exactly as documented,” Oasis
- $4.8M in crypto stolen after Korean tax agency exposes wallet seedby Bill Toulas on February 28, 2026 at 3:17 pm
South Korea’s National Tax Service accidentally exposed the mnemonic recovery phrase of a seized cryptocurrency wallet in an official press release, allowing hackers to steal 6.4 billion won ($4.8M) worth in cryptocurrency. […]
- Canadian Tire Data Breach Impacts 38 Million Accountsby Ionut Arghire on February 28, 2026 at 11:50 am
Names, addresses, email addresses, phone numbers, and encrypted passwords were compromised in the attack. The post Canadian Tire Data Breach Impacts 38 Million Accounts appeared first on SecurityWeek.
- Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablementby info@thehackernews.com (The Hacker News) on February 28, 2026 at 9:56 am
New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to authenticate to sensitive Gemini endpoints and access private data. The findings come from Truffle Security, which discovered nearly 3,000 Google API keys (identified by the prefix “AIza”) embedded in client-side code to provide Google-related services like
- Pentagon Designates Anthropic Supply Chain Risk Over AI Military Disputeby info@thehackernews.com (The Hacker News) on February 28, 2026 at 4:57 am
Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence (AI) upstart as a “supply chain risk.” “This action follows months of negotiations that reached an impasse over two exceptions we requested to the lawful use of our AI model, Claude: the mass domestic surveillance of Americans and fully autonomous weapons,” the
- Trump Orders All Federal Agencies to Phase Out Use of Anthropic Technologyby Associated Press on February 27, 2026 at 9:30 pm
OpenAI and Google, along with Elon Musk’s xAI, also have contracts to supply their AI models to the military. The post Trump Orders All Federal Agencies to Phase Out Use of Anthropic Technology appeared first on SecurityWeek.
- Life Mirrors Art: Ransomware Hits Hospitals on TV & IRLby Nate Nelson on February 27, 2026 at 8:48 pm
HBO’s “The Pitt” is showing audiences what a real Mississippi healthcare system is going through this week, thanks to a ransomware attack.
- Cities Hosting Major Events Need More Focus on Wireless, Drone Defenseby Robert Lemos on February 27, 2026 at 8:23 pm
Major events like the FIFA World Cup need to look beyond traditional physical and cyber security to active and passive wireless threats, say experts.
- Flaw-Finding AI Assistants Face Criticism for Speed, Accuracyby Robert Lemos on February 27, 2026 at 8:16 pm
Using AI to find security vulnerabilities holds significant promise, but the initial products fall short of the needs of enterprises and software developers, say experts.
- Microsoft testing Windows 11 batch file security improvementsby Sergiu Gatlan on February 27, 2026 at 8:00 pm
Microsoft is rolling out new Windows 11 Insider Preview builds that improve security and performance during batch file or CMD script execution. […]
- APT37 hackers use new malware to breach air-gapped networksby Bill Toulas on February 27, 2026 at 7:21 pm
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance. […]
- Europol-led crackdown on The Com hackers leads to 30 arrestsby Sergiu Gatlan on February 27, 2026 at 6:20 pm
A yearlong Europol-coordinated operation dubbed “Project Compass” has led to 30 arrests and 179 suspects being tied to “The Com,” an online cybercrime collective that targets children and teenagers. […]
- DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scamsby info@thehackernews.com (The Hacker News) on February 27, 2026 at 6:11 pm
The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogus cryptocurrency schemes known as pig butchering. The confiscated funds were traced to cryptocurrency addresses used for the laundering of criminally derived proceeds stolen from victims of cryptocurrency investment scams, the department added. “Criminal
- 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacksby info@thehackernews.com (The Hacker News) on February 27, 2026 at 5:59 pm
The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks that exploited a command injection vulnerability starting in December 2025. Of these, 401 instances are located in the U.S., followed by 51 in Brazil, 43 in Canada, 40 in Germany, and 36 in France. The non-profit entity said the compromises are likely
- Trump administration removes controversial acting CISA directorby Eric Geller on February 27, 2026 at 4:22 pm
The new agency chief, Nick Andersen, has significantly more senior cybersecurity leadership experience, which has given some demoralized employees hope.
- The Case for Why Better Breach Transparency Mattersby Elizabeth Montalbano on February 27, 2026 at 4:18 pm
It’s become a standard practice for organizations to disclose the bare minimum about a data breach, or worse — not disclose the incident at all.
- ‘Resurge’ malware can remain undetected on devicesby David Jones on February 27, 2026 at 4:08 pm
CISA previously issued an alert about attacks that exploited a vulnerability in Ivanti Connect Secure.
- CISA warns that RESURGE malware can be dormant on Ivanti devicesby Bill Toulas on February 27, 2026 at 3:57 pm
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day attacks exploiting CVE-2025-0282 to breach Ivanti Connect Secure devices. […]
- Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoorby info@thehackernews.com (The Hacker News) on February 27, 2026 at 3:33 pm
Cybersecurity researchers have disclosed details of a malicious Go module that’s designed to harvest passwords, create persistent access via SSH, and deliver a Linux backdoor named Rekoobe. The Go module, github[.]com/xinfeisoft/crypto, impersonates the legitimate “golang.org/x/crypto” codebase, but injects malicious code that’s responsible for exfiltrating secrets entered via terminal password
- In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicatorsby SecurityWeek News on February 27, 2026 at 3:23 pm
Other noteworthy stories that might have slipped under the radar: cyber valuations surge, OpenAI disrupts malicious AI use, ShinyHunters claims Odido breach. The post In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators appeared first on SecurityWeek.
- Third-Party Patching and the Business Footprint We All Shareby Sponsored by Action1 on February 27, 2026 at 3:00 pm
Everyday tools like PDF readers, email clients, and archive utilities quietly define the real attack surface. Action1 explains how third-party software drift increases exploit risk and why consistent patching reduces exposure across endpoints. […]
- Claude Code Security Shows Promise, Not Perfectionby Alexander Culafi on February 27, 2026 at 2:00 pm
Claude Code’s introduction rippled across the stock market, but researchers and analysts say its impact was overstated, as they peel back the layers.
- 38 Million Allegedly Impacted by ManoMano Data Breachby Ionut Arghire on February 27, 2026 at 1:41 pm
Hackers stole personal information such as names, email addresses, phone numbers, and other information. The post 38 Million Allegedly Impacted by ManoMano Data Breach appeared first on SecurityWeek.
- 900 Sangoma FreePBX Instances Infected With Web Shellsby Ionut Arghire on February 27, 2026 at 1:24 pm
The attacks exploited a post-authentication command injection vulnerability in the endpoint manager’s interface. The post 900 Sangoma FreePBX Instances Infected With Web Shells appeared first on SecurityWeek.
- ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networksby info@thehackernews.com (The Hacker News) on February 27, 2026 at 12:43 pm
The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay commands and breach air-gapped networks. The campaign, codenamed Ruby Jumper by Zscaler ThreatLabz, involves the deployment of malware
- Chilean Carding Shop Operator Extradited to USby Eduard Kovacs on February 27, 2026 at 12:34 pm
The 24-year-old suspect has been accused of trafficking over 26,000 cards from a single brand. The post Chilean Carding Shop Operator Extradited to US appeared first on SecurityWeek.
- Anthropic Refuses to Bend to Pentagon on AI Safeguards as Dispute Nears Deadlineby Associated Press on February 27, 2026 at 12:34 pm
Anthropic said it sought narrow assurances from the Pentagon that Claude won’t be used for mass surveillance of Americans or in fully autonomous weapons. The post Anthropic Refuses to Bend to Pentagon on AI Safeguards as Dispute Nears Deadline appeared first on SecurityWeek.
- Ukrainian man pleads guilty to running AI-powered fake ID siteby Sergiu Gatlan on February 27, 2026 at 12:30 pm
A Ukrainian man has pleaded guilty to operating OnlyFake, an AI-powered website that generated and sold more than 10,000 photos of fake identification documents to customers worldwide. […]
- Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilienceby Ionut Arghire on February 27, 2026 at 12:02 pm
Aeternum operates on smart contracts, making its command-and-control (C&C) infrastructure difficult to disrupt. The post Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience appeared first on SecurityWeek.
- Juniper Networks PTX Routers Affected by Critical Vulnerability by Eduard Kovacs on February 27, 2026 at 10:39 am
An out-of-band security update for Junos OS Evolved patches the remote code execution vulnerability CVE-2026-21902. The post Juniper Networks PTX Routers Affected by Critical Vulnerability appeared first on SecurityWeek.
- Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platformsby info@thehackernews.com (The Hacker News) on February 27, 2026 at 10:06 am
Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT). “A malicious downloader staged a portable Java runtime and executed a malicious Java archive (JAR) file named jd-gui.jar,” the Microsoft Threat Intelligence team said in a post on X. “This downloader used PowerShell
- Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scamsby info@thehackernews.com (The Hacker News) on February 27, 2026 at 7:56 am
Meta on Thursday said it’s taking legal action to tackle scams on its platforms by filing lawsuits against what it calls deceptive advertisers based in Brazil, China, and Vietnam. As part of the effort, the advertisers’ methods of payment have been suspended, related accounts have been disabled, and the website domain names used to pull off the scams have been blocked. Concurrently, the social
- Marquis v. SonicWall Lawsuit Ups the Breach Blame Gameby Nate Nelson on February 26, 2026 at 10:02 pm
When a company gets breached through a third-party security vendor, who should bear responsibility? For one FinTech company, the answer is the firewall provider.
- Cisco SD-WAN Zero-Day Under Exploitation for 3 Yearsby Rob Wright on February 26, 2026 at 9:45 pm
The maximum-severity vulnerability CVE-2026-20127 was exploited by an unknown but sophisticated threat actor who left very little evidence behind.
- Previously harmless Google API keys now expose Gemini AI databy Bill Toulas on February 26, 2026 at 8:55 pm
Google API keys for services like Maps embedded in accessible client-side code could be used to authenticate to the Gemini AI assistant and access private data. […]
- Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedownby info@thehackernews.com (The Hacker News) on February 26, 2026 at 6:00 pm
Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts. “Instead of relying on traditional servers or domains for command-and-control, Aeternum stores its instructions on the public Polygon blockchain,” Qrator Labs said in a report shared with The
- Trend Micro warns of critical Apex One code execution flawsby Sergiu Gatlan on February 26, 2026 at 5:58 pm
Trend Micro has patched two critical Apex One vulnerabilities that allow attackers to gain remote code execution (RCE) on vulnerable Windows systems. […]
- European DYI chain ManoMano data breach impacts 38 million customersby Bill Toulas on February 26, 2026 at 5:35 pm
DIY store chain ManoMano is notifying customers of a data breach personal data, which was caused by hackers compromising a third-party service provider. […]
- Critical Juniper Networks PTX flaw allows full router takeoverby Bill Toulas on February 26, 2026 at 4:42 pm
A critical vulnerability in the Junos OS Evolved network operating system running on PTX Series routers from Juniper Networks could allow an unauthenticated attacker to execute code remotely with root privileges. […]
- Olympique Marseille confirms ‘attempted’ cyberattack after data leakby Sergiu Gatlan on February 26, 2026 at 4:11 pm
French professional football club Olympique de Marseille has confirmed a cyberattack after a threat actor claimed on Monday that it breached the club’s systems earlier this month. […]
- UFP Technologies investigating cyberattack that impacted company databy David Jones on February 26, 2026 at 4:03 pm
The medical device maker warned of short-term shipment delays, but does not see a material impact.
- UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoorby info@thehackernews.com (The Hacker News) on February 26, 2026 at 3:17 pm
A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025. The campaign is being tracked by Cisco Talos under the moniker UAT-10027. The end goal of the attacks is to deliver a never-before-seen backdoor codenamed Dohdoor. “Dohdoor utilizes the DNS-over-HTTPS (DoH)
- AI accelerates lateral movement in cyberattacksby Eric Geller on February 26, 2026 at 3:06 pm
New research paints a grim picture of how the technology is making cyberattacks faster and easier for threat actors.
- ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Storiesby info@thehackernews.com (The Hacker News) on February 26, 2026 at 2:28 pm
Nothing here looks dramatic at first glance. That’s the point. Many of this week’s threats begin with something ordinary, like an ad, a meeting invite, or a software update. Behind the scenes, the tactics are sharper. Access happens faster. Control is established sooner. Cleanup becomes harder. Here is a quick look at the signals worth paying attention to. AI-powered […]
- Expert Recommends: Prepare for PQC Right Nowby info@thehackernews.com (The Hacker News) on February 26, 2026 at 12:06 pm
Introduction: Steal It Today, Break It in a Decade Digital evolution is unstoppable, and though the pace may vary, things tend to fall into place sooner rather than later. That, of course, applies to adversaries as well. The rise of ransomware and cyber extortion generated funding for a complex and highly professional criminal ecosystem. The era of the cloud brought general availability of
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malwareby info@thehackernews.com (The Hacker News) on February 26, 2026 at 10:35 am
A “coordinated developer-targeting campaign” is using malicious repositories disguised as legitimate Next.js projects and technical assessments to trick victims into executing them and establish persistent access to compromised machines. “The activity aligns with a broader cluster of threats that use job-themed lures to blend into routine developer workflows and increase the likelihood of code
- Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokensby info@thehackernews.com (The Hacker News) on February 26, 2026 at 10:09 am
Cybersecurity researchers have disclosed details of a new malicious package discovered on the NuGet Gallery, impersonating a library from financial services firm Stripe in an attempt to target the financial sector. The package, codenamed StripeApi.Net, attempts to masquerade as Stripe.net, a legitimate library from Stripe that has over 75 million downloads. It was uploaded by a user named
- Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Accessby info@thehackernews.com (The Hacker News) on February 26, 2026 at 6:13 am
A newly disclosed maximum-severity security flaw in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage) has come under active exploitation in the wild as part of malicious activity that dates back to 2023. The vulnerability, tracked as CVE-2026-20127 (CVSS score: 10.0), allows an unauthenticated remote attacker to bypass authentication and obtain
- Chinese Police Use ChatGPT to Smear Japan PM Takaichiby Nate Nelson on February 26, 2026 at 12:00 am
A Chinese keyboard warrior inadvertently leaked information about politically motivated influence operations through a ChatGPT account.
- Flaws in Claude Code Put Developers’ Machines at Riskby Jai Vijayan on February 25, 2026 at 10:02 pm
The vulnerabilities highlight a big drawback to integrating AI into software development workflows and the potential impact on supply chains.
- RAMP Forum Seizure Fractures Ransomware Ecosystemby Alexander Culafi on February 25, 2026 at 9:14 pm
Researchers suggest defenders monitor how these malicious groups re-form and leverage the useful threat intel to guide their next moves.
- PCI Council Says Threats to Payments Systems Are Speeding Upby Arielle Waldman on February 25, 2026 at 7:15 pm
The PCI Security Standards Council experienced a record year in many regards, but its first annual report shows it needs to work even faster to stay ahead of attackers.
- Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countriesby info@thehackernews.com (The Hacker News) on February 25, 2026 at 5:46 pm
Google on Wednesday disclosed that it worked with industry partners to disrupt the infrastructure of a suspected China-nexus cyber espionage group tracked as UNC2814 that breached at least 53 organizations across 42 countries. “This prolific, elusive actor has a long history of targeting international governments and global telecommunications organizations across Africa, Asia, and the Americas,”
- CISA orders agencies to patch Cisco devices now under attackby Eric Geller on February 25, 2026 at 5:06 pm
The vulnerabilities, scored as critical, affect the company’s software-defined wide-area networking (SD-WAN) systems.
- Claude Code Flaws Allow Remote Code Execution and API Key Exfiltrationby info@thehackernews.com (The Hacker News) on February 25, 2026 at 5:00 pm
Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic’s Claude Code, an artificial intelligence (AI)-powered coding assistant, that could result in remote code execution and theft of API credentials. “The vulnerabilities exploit various configuration mechanisms, including Hooks, Model Context Protocol (MCP) servers, and environment variables – executing
- Malicious Next.js Repos Target Developers Via Fake Job Interviewsby Elizabeth Montalbano on February 25, 2026 at 4:42 pm
Linked to North Korean fake job-recruitment campaigns, the poisoned repositories are aimed at establishing persistent access to infected machines.
- Software vulnerabilities are being weaponized faster than everby David Jones on February 25, 2026 at 4:26 pm
A report by VulnCheck shows threat groups are exploiting a small percentage of critical flaws well before security teams can mitigate.
- China-linked hackers breached dozens of telecoms, government agenciesby Eric Geller on February 25, 2026 at 3:40 pm
The cyberattacks used a clever technique: malware that hid in plain sight on Google Sheets.
- SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacksby info@thehackernews.com (The Hacker News) on February 25, 2026 at 3:06 pm
The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women to pull off social engineering attacks. The idea is to hire them for voice phishing campaigns targeting IT help desks, Dataminr said in a new threat brief. The group is said to be offering anywhere between $500 and $1,000 upfront per call, in addition to
- Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing Itby info@thehackernews.com (The Hacker News) on February 25, 2026 at 2:30 pm
Triage is supposed to make things simpler. In a lot of teams, it does the opposite. When you can’t reach a confident verdict early, alerts turn into repeat checks, back-and-forth, and “just escalate it” calls. That cost doesn’t stay inside the SOC; it shows up as missed SLAs, higher cost per case, and more room for real threats to slip through. So where does triage go wrong? Here are five […]
- Why ‘Call This Number’ TOAD Emails Beat Gatewaysby Alexander Culafi on February 25, 2026 at 2:00 pm
Attackers are bypassing email gateways through telephone-oriented attack delivery (TOAD), in which the only email payload is a phone number.
- Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malwareby info@thehackernews.com (The Hacker News) on February 25, 2026 at 12:43 pm
Cybersecurity researchers have discovered four malicious NuGet packages that are designed to target ASP.NET web application developers to steal sensitive data. The campaign, discovered by Socket, exfiltrates ASP.NET Identity data, including user accounts, role assignments, and permission mappings, as well as manipulates authorization rules to create persistent backdoors in victim applications.
- ‘Richter Scale’ Model Measures Magnitude of OT Cyber Incidentsby Kelly Jackson Higgins on February 25, 2026 at 12:00 pm
ICS/OT experts have devised a scoring system for rating the severity and effects of cybersecurity events in operational technology environments.
- Manual Processes Are Putting National Security at Riskby info@thehackernews.com (The Hacker News) on February 25, 2026 at 11:00 am
Why automating sensitive data transfers is now a mission-critical priority More than half of national security organizations still rely on manual processes to transfer sensitive data, according to The CYBER360: Defending the Digital Battlespace report. This should alarm every defense and government leader because manual handling of sensitive data is not just inefficient, it is a systemic
- Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Brokerby info@thehackernews.com (The Hacker News) on February 25, 2026 at 8:49 am
A 39-year-old Australian national who was previously employed at U.S. defense contractor L3Harris has been sentenced to a little over seven years in prison for selling eight zero-day exploits to Russian exploit broker Operation Zero in exchange for millions of dollars. Peter Williams pleaded guilty to two counts of theft of trade secrets in October 2025. In addition to the jail term, Williams
- Operation Red Card 2.0 Leads to 651 Arrests in Africaby Robert Lemos on February 25, 2026 at 8:00 am
In the latest operation targeting cybercrime groups, African law enforcement agencies cooperated with Interpol and cybersecurity firms to recover more than $4.3 million.
- SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Executionby info@thehackernews.com (The Hacker News) on February 25, 2026 at 7:04 am
SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution. The vulnerabilities, all rated 9.1 on the CVSS scoring system, are listed below – CVE-2025-40538 – A broken access control vulnerability that allows an attacker to create a system admin user and execute arbitrary
- CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerabilityby info@thehackernews.com (The Hacker News) on February 25, 2026 at 5:23 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed vulnerability in FileZen to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2026-25108 (CVSS v4 score: 8.7), is a case of operating system (OS) command injection that could allow an authenticated user to execute
- Attackers Now Need Just 29 Minutes to Own a Networkby Jai Vijayan on February 24, 2026 at 9:38 pm
Credential misuse, AI tools, and security blind spots help attackers move through breached networks faster than ever, CrowdStrike finds.
- Lazarus Group Picks a New Poison: Medusa Ransomwareby Rob Wright on February 24, 2026 at 9:18 pm
The North Korean threat group also leveraged Comebacker backdoor, Blindingcan RAT, and info stealer Infohook in its recent attacks.
- RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKENby info@thehackernews.com (The Hacker News) on February 24, 2026 at 6:52 pm
A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by injecting malicious Copilot instructions in a GitHub issue. The artificial intelligence (AI)-driven vulnerability has been codenamed RoguePilot by Orca Security. It has since been patched by Microsoft following responsible disclosure. “Attackers can craft hidden instructions inside a
- In the AI era, CISOs worry about data leaks and doubt tech will solve skills gapsby Eric Geller on February 24, 2026 at 3:56 pm
CISOs see AI as necessary but insufficient technology and fraught with risks, a new report found.
- Threat groups move at record speeds, as AI helps scale attacksby David Jones on February 24, 2026 at 3:49 pm
A report by CrowdStrike shows cybercrime groups are outpacing security teams and increasingly abusing legitimate tools.
- UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malwareby info@thehackernews.com (The Hacker News) on February 24, 2026 at 2:21 pm
A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling a possible expansion of the threat actor’s targeting beyond Ukraine and into entities supporting the war-torn nation. The activity, which targeted an unnamed entity involved in regional
- As Cybersecurity Firms Chase AI, VC Market Skyrocketsby Robert Lemos on February 24, 2026 at 1:04 pm
Investments in cybersecurity startups took off in 2025 as venture capital firms focused not just on AI-native tech but on talent as well.
- Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problemby info@thehackernews.com (The Hacker News) on February 24, 2026 at 11:58 am
Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control check.” That approach breaks the moment your environment stops being mostly-human and mostly-onboarded. In modern enterprises, identity risk is created by a compound of factors: control posture, hygiene, business context, and intent. Any one of these can perhaps be
- Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacksby info@thehackernews.com (The Hacker News) on February 24, 2026 at 11:52 am
The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by the Symantec and Carbon Black Threat Hunter Team. Broadcom’s threat intelligence division said it also identified the same threat actors mounting an unsuccessful attack against a healthcare
- UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoorsby info@thehackernews.com (The Hacker News) on February 24, 2026 at 9:54 am
The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian entities. The attacks involve the deployment of two distinct backdoors codenamed LuciDoor and MarsSnake, according to a report published by Positive Technologies last week. “The group used several
- Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Modelby info@thehackernews.com (The Hacker News) on February 24, 2026 at 6:04 am
Anthropic on Monday said it identified “industrial-scale campaigns” mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude’s capabilities to improve their own models. The distillation attacks generated over 16 million exchanges with its large language model (LLM) through about 24,000 fraudulent accounts in violation of its terms
- Spitting Cash: ATM Jackpotting Attacks Surged in 2025by Jai Vijayan on February 23, 2026 at 10:20 pm
The attacks cost banks more than $20 million in losses last year, as criminals used many of the same tools and tactics they have wielded for more than a decade.
- More Than Dashboards: AI Decisions Must Be Provableby James Urquhart on February 23, 2026 at 10:18 pm
AI systems have to be able to show a record of what happened and how.
- Iran’s MuddyWater Targets Orgs With Fresh Malware as Tensions Mountby Elizabeth Montalbano on February 23, 2026 at 8:35 pm
The long-active Iranian threat group debuted various attack strains and payloads in attacks against organizations in the Middle East and Africa.
- Enigma Cipher Device Still Holds Secrets for Cyber Prosby Becky Bracken on February 23, 2026 at 8:11 pm
The Nazi relic’s history is riddled with resilience errors, and those lessons still apply to defending against modern cyber threats.
- APT28 Targeted European Entities Using Webhook-Based Macro Malwareby info@thehackernews.com (The Hacker News) on February 23, 2026 at 7:41 pm
The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe. The activity, per S2 Grupo’s LAB52 threat intelligence team, was active between September 2025 and January 2026. It has been codenamed Operation MacroMaze. “The campaign relies on basic tooling and the exploitation of legitimate services
- 600+ FortiGate Devices Hacked by AI-Armed Amateurby Alexander Culafi on February 23, 2026 at 7:37 pm
A Russian-speaking hacker used generative AI to compromise the FortiGate firewalls, targeting credentials and backups for possible follow-on ransomware attacks.
- Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bombby info@thehackernews.com (The Hacker News) on February 23, 2026 at 5:59 pm
Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts. “Analysis of the recovered dropper, persistence triggers, and mining payload reveals a sophisticated, multi-stage infection prioritizing maximum cryptocurrency mining hashrate, often destabilizing the victim
- Hackers target vulnerabilities in Roundcube Webmailby David Jones on February 23, 2026 at 4:30 pm
CISA has added the flaws, one of which is considered critical, to its Known Exploited Vulnerabilities catalog.
- ⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & Moreby info@thehackernews.com (The Hacker News) on February 23, 2026 at 1:00 pm
Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some happening quietly in the background, others playing out in public view. The details are different, but the pressure points are familiar. Across devices, cloud services, research labs, and even everyday apps, the line between normal behavior and hidden risk keeps getting thinner. Tools
- How Exposed Endpoints Increase Risk Across LLM Infrastructureby info@thehackernews.com (The Hacker News) on February 23, 2026 at 11:58 am
As more organizations run their own Large Language Models (LLMs), they are also deploying more internal services and Application Programming Interfaces (APIs) to support those models. Modern security risks are being introduced less from the models themselves and more from the infrastructure that serves, connects and automates the model. Each new LLM endpoint expands the attack surface, often in
- Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokensby info@thehackernews.com (The Hacker News) on February 23, 2026 at 10:20 am
Cybersecurity researchers have disclosed what they say is an active “Shai-Hulud-like” supply chain worm campaign that has leveraged a cluster of at least 19 malicious npm packages to enable credential harvesting and cryptocurrency key theft. The campaign has been codenamed SANDWORM_MODE by supply chain security company Socket. As with prior Shai-Hulud attack waves, the malicious code embedded
- MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIPby info@thehackernews.com (The Hacker News) on February 23, 2026 at 7:25 am
The Iranian hacking group known as MuddyWater (aka Earth Vetala, Mango Sandstorm, and MUDDYCOAST) has targeted several organizations and individuals mainly located across the Middle East and North Africa (MENA) region as part of a new campaign codenamed Operation Olalampo. The activity, first observed on January 26, 2026, has resulted in the deployment of new malware families that share
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countriesby info@thehackernews.com (The Hacker News) on February 21, 2026 at 2:49 pm
A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries. That’s according to new findings from Amazon Threat Intelligence, which said it observed the activity between January 11 and February 18, 2026. “No exploitation of FortiGate
- Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanningby info@thehackernews.com (The Hacker News) on February 21, 2026 at 7:58 am
Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that can scan a user’s software codebase for vulnerabilities and suggest patches. The capability, called Claude Code Security, is currently available in a limited research preview to Enterprise and Team customers. “It scans codebases for security vulnerabilities and suggests targeted
- CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalogby info@thehackernews.com (The Hacker News) on February 21, 2026 at 7:21 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities in question are listed below – CVE-2025-49113 (CVSS score: 9.9) – A deserialization of untrusted data vulnerability that allows remote code
- EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Securityby info@thehackernews.com (The Hacker News) on February 21, 2026 at 4:30 am
With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications and Certified CISO v4 help close the gap between AI adoption and workforce readiness. EC-Council, creator of the world-renowned Certified Ethical Hacker (CEH) credential and a global leader in applied cybersecurity education, today launched its Enterprise AI Credential Suite,
- Attackers Use New Tool to Scan for React2Shell Exposureby Nate Nelson on February 20, 2026 at 9:07 pm
Researchers say threat actors wielded the sophisticated — and unfortunately named — toolkit to target high-value networks for React2Shell exploitation.