Lowest ticket prices to TechCrunch Disrupt 2026 end February 27. Up to $680 off individual passes and up to 30% off group passes. Register before they go up to join 10,000 founders, tech operators, and VCs. This article has been indexed…
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries. That’s according to new findings from Amazon Threat Intelligence, which said it…
New Shai-Hulud–like npm Worm Attack 19+ Packages to Steal dev/CI Secrets
A new supply chain worm is actively targeting the npm ecosystem, with a research team identifying at least 19 malicious npm packages designed to steal developer and CI/CD secrets and automatically spread across repositories and workflows. The campaign, tracked as…
Cybersecurity Companies’ Stocks Fall Sharply as Anthropic Releases Claude Security Tool
Shares of major cybersecurity companies nosedived on Friday after AI startup Anthropic unveiled Claude Code Security, a new AI-powered tool capable of autonomously scanning codebases for software vulnerabilities and suggesting targeted patches sparking fears that artificial intelligence could begin displacing…
IT Security News Hourly Summary 2026-02-21 15h : 2 posts
2 posts were published in the last hour 13:34 : Global Data Indicates Slowdown in Ransomware Targeting Education 13:34 : Cloudflare Launches Moltworker to Run Self-Hosted AI Agent Moltbot on Its Developer Platform
Global Data Indicates Slowdown in Ransomware Targeting Education
It is evident on campuses once defined by open exchange and quiet routine that a new kind of disruption has taken hold, one that does not arrive in force but rather with encrypted files, locked networks, and terse ransom…
Cloudflare Launches Moltworker to Run Self-Hosted AI Agent Moltbot on Its Developer Platform
Cloudflare has unveiled Moltworker, an open-source framework designed to run Moltbot—a self-hosted personal AI agent—directly on its Developer Platform, eliminating the requirement for dedicated on-premise hardware. Moltbot, formerly known as Clawdbot, functions as a customizable personal assistant that operates…
Scientists may have found the holy grail of quantum computing
Scientists may have spotted a long-sought triplet superconductor — a material that can transmit both electricity and electron spin with zero resistance. That ability could dramatically stabilize quantum computers while slashing their energy use. Early experiments suggest the alloy NbRe…
Generative AI analyzes medical data faster than human research teams
Researchers tested whether generative AI could handle complex medical datasets as well as human experts. In some cases, the AI matched or outperformed teams that had spent months building prediction models. By generating usable analytical code from precise prompts, the…
Password Managers Share a Hidden Weakness
Plus: The cybersecurity community grapples with Epstein files revelations, the US State Department plans an online anti-censorship “portal” for the world, and more. This article has been indexed from Security Latest Read the original article: Password Managers Share a Hidden…
Critical Grandstream Phone Vulnerability Exposes Calls to Interception
The flaw tracked as CVE-2026-2329 can be exploited without authentication for remote code execution with root privileges. The post Critical Grandstream Phone Vulnerability Exposes Calls to Interception appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Anthropic Debuts Claude Code Security – AI Now Scan Vulnerabilities in Your Entire Codebase
Anthropic has quietly flipped the script on application security. On February 20, the company launched Claude Code Security, a new capability baked directly into Claude Code on the web that automatically scans entire repositories for sophisticated vulnerabilities and delivers ready-to-review patch…
U.S. CISA adds RoundCube Webmail flaws to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds RoundCube Webmail flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two RoundCube Webmail flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws…
IT Security News Hourly Summary 2026-02-21 12h : 1 posts
1 posts were published in the last hour 10:34 : ‘Narco-Submarine’ Carrying 4 Tons of Cocaine Captured by Mexico’s Navy
‘Narco-Submarine’ Carrying 4 Tons of Cocaine Captured by Mexico’s Navy
Following increased surveillance and patrols of routes used by transnational drug-trafficking networks, Mexican authorities have seized approximately 10 tons of cocaine in the past week alone. This article has been indexed from Security Latest Read the original article: ‘Narco-Submarine’ Carrying…
Anthropic Launches Claude Code Security to Scan Codebases for Security Vulnerabilities
A new feature inside Claude Code enables developers and security teams to identify and remediate vulnerabilities across their codebases, known as Claude Code Security. Currently available in a limited research preview, the tool offers AI-powered code scanning that goes beyond…
CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities in question are listed below – CVE-2025-49113 (CVSS…
Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning
Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that can scan a user’s software codebase for vulnerabilities and suggest patches. The capability, called Claude Code Security, is currently available in a…
Best Cyber Security Consulting Companies
With rapid technological progress, it is estimated that nearly 200 billion connected devices, ranging from medical equipment and industrial machines to cars, smartphones, and home appliances, will be communicating through the Internet of Things (IoT) and Industrial IoT (IIoT). This…
Japanese-Language Phishing Emails, (Sat, Feb 21st)
Introduction This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: Japanese-Language Phishing Emails, (Sat, Feb 21st)
Agentic AI Security Is Broken and How To Fix It: Ido Shlomo, Co-founder and CTO of Token Security
Jim Love discusses how rapid adoption of agentic AI is repeating the industry pattern of shipping technology without security, citing issues like vulnerabilities in Anthropic’s MCP and insecure open-source agent tools. He interviews Ido Shlomo, co-founder and CTO of Token…
PayPal Flaw Exposed Email Addresses, Social Security Numbers for 6 Months
PayPal disclosed a software error in its Working Capital platform that exposed sensitive customer data, including Social Security numbers, for months in 2025. The post PayPal Flaw Exposed Email Addresses, Social Security Numbers for 6 Months appeared first on TechRepublic.…
University of Mississippi Medical Center Closes Clinics After Ransomware Attack
A ransomware attack disrupted UMMC’s EMR system, forcing clinic closures and manual patient documentation. The post University of Mississippi Medical Center Closes Clinics After Ransomware Attack appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…
IT Security News Hourly Summary 2026-02-21 00h : 7 posts
7 posts were published in the last hour 22:55 : IT Security News Daily Summary 2026-02-20 22:34 : PayPal discloses extended data leak linked to Loan App glitch 22:34 : PayPal app code error leaked personal info and a ‘few’…