165 posts were published in the last hour
- 22:34 : MVP Development in the Age of AI: How Startups Can Build Smarter, Faster and Leaner
- 22:34 : Cellebrite cut off Serbia citing abuse of its phone unlocking tools. Why not others?
- 22:11 : MLSecOps: Bridging security and AI development processes
- 22:11 : AI Governance Becomes Critical as Agentic AI Moves Into Production
- 22:11 : Why must healthcare embrace Agentic AI for data protection
- 22:11 : What are the latest advancements in Non-Human Identity security
- 22:11 : How can Agentic AI improve cybersecurity in financial services
- 22:11 : How are new AI secrets vaulting methods empowering better security?
- 21:36 : Google says its AI systems helped deter Play Store malware in 2025
- 21:11 : Texas Sues TP-Link Over Alleged Security Risks and Supply Chain Deception
- 20:34 : NDSS 2025 – NDSS 2025 – BARBIE: Robust Backdoor Detection Based On Latent Separability
- 20:13 : Under the Hood of DynoWiper, (Thu, Feb 19th)
- 20:13 : Ask Me Anything Cyber: Pursuing a Degree in Cybersecurity
- 20:13 : CryptoCore / UNC1069
- 20:5 : IT Security News Hourly Summary 2026-02-19 21h : 11 posts
- 19:34 : MCP Servers Expose a Hidden AI Attack Surface in Enterprise Environments
- 19:34 : Germany’s national rail operator Deutsche Bahn hit by a DDoS attack
- 19:34 : Why LLMs Make Terrible Databases and Why That Matters for Trusted AI
- 19:18 : Wordfence Intelligence Weekly WordPress Vulnerability Report (February 9, 2026 to February 15, 2026)
- 19:18 : Using AI to defeat AI
- 19:18 : OpenClaw’s Top Skill is a Malware that Stole SSH Keys and Opened Reverse Shells in 1,184 Packages
- 19:18 : Adidas Investigates Alleged Data Breach – 815,000 Records of Customer Data Stolen
- 19:18 : Crims hit a $20M jackpot via malware-stuffed ATMs
- 19:18 : Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center
- 19:17 : INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown
- 19:17 : PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence
- 18:40 : Automating Unix Security Across Hybrid Clouds
- 18:40 : News alert: Link11’s ‘AI Management Dashboard’ makes AI traffic, AI access policies enforceable
- 18:20 : Keeping Google Play & Android app ecosystems safe in 2025
- 17:39 : better-auth Flaw Allows Unauthenticated API Key Creation
- 17:39 : Valmet DNA Engineering Web Tools
- 17:39 : Jinan USR IOT Technology Limited (PUSR) USR-W610
- 17:39 : Welker OdorEyes EcoSystem Pulse Bypass System with XL4 Controller
- 17:38 : EnOcean SmartServer IoT
- 17:38 : OpenClaw’s Top Skill is a Malware that Stole SSH Keys, and Opened Reverse Shells in 1,184 Packages
- 17:38 : Flickr Discloses Third-Party Breach Exposing User Names, Emails
- 17:38 : Spain Ministry of Science Cyberattack Triggers IT Shutdown, Hacker Claims Data Breach
- 17:38 : China Raises Security Concerns Over Rapidly Growing OpenClaw AI Tool
- 17:38 : Running OpenClaw safely: identity, isolation, and runtime risk
- 17:38 : New e-book: Establishing a proactive defense with Microsoft Security Exposure Management
- 17:16 : Huntress, Microsoft Detail the Continued Popularity, Evolution of ClickFix Attacks
- 17:15 : The Chicken Littles of Silicon Valley: Why AI Doomsayers Are Repeating History’s Greatest Mistake
- 17:15 : The AI world’s ‘connective tissue’ is woefully insecure, Cisco warns
- 17:15 : Palo Alto Networks CEO sees AI as demand driver, not a threat
- 17:5 : IT Security News Hourly Summary 2026-02-19 18h : 8 posts
- 16:34 : Figure Data Breach Exposes Nearly 1 Million Customers Online
- 16:34 : INTERPOL Operation Red Card 2.0: Turning Collaboration into Real-World Cybercrime Disruption
- 16:34 : Beyond CVE China’s Dual Vulnerability Databases Reveal a Different Disclosure Timeline
- 16:34 : Android malware taps Gemini to navigate infected devices
- 16:34 : NDSS 2025 – Defending Against Backdoor Attacks On Graph Neural Networks Via Discrepancy Learning
- 16:34 : Microsoft reveals critical Windows Admin Center vulnerability (CVE-2026-26119)
- 16:34 : Remcos RAT Expands Real-Time Surveillance Capabilities
- 16:7 : Sex toys maker Tenga says hacker stole customer information
- 15:35 : Adapt, Protect, and Extend: How Partners Can Help Orgs Unlock ROI from AI
- 15:35 : Ivanti EPMM Vulnerabilities Actively Exploited in the Wild
- 15:34 : Bug in student admissions website exposed children’s personal information
- 15:34 : U.S. CISA adds Dell RecoverPoint and GitLab flaws to its Known Exploited Vulnerabilities catalog
- 15:34 : PromptSpy – First Known Android AI Malware Uses Google’s Gemini for Decision-making
- 15:34 : Selective Thread Emulation and Fuzzing Expose DoS Flaws in Socomec DIRIS M-70 IIoT Device
- 15:34 : French Government Says 1.2 Million Bank Accounts Exposed in Breach
- 15:34 : Abstract Security Launches AI SIEM Platform to Analyze Threats In Real Time
- 15:34 : Poland restricts Chinese-made cars at protected military sites
- 15:34 : Simbian AI Pentest Agent delivers continuous, context-aware penetration testing
- 15:34 : Industrial-Scale Fake Coretax Apps Drive $2m Fraud in Indonesia
- 15:34 : Cyber Briefing: 2026.02.19
- 15:13 : China-Linked Hackers Use Dell RecoverPoint Flaw to Drop GrimBolt Malware
- 15:13 : Forescout research points to record number of ICS vulnerabilities in 2025
- 15:13 : AI-generated passwords are a security risk
- 15:13 : Data on 1.2 million French bank accounts accessed in registry breach
- 15:13 : ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories
- 15:13 : Spanish Police Arrest Hotel Hacker
- 15:13 : Irish Regulator Probes X Over Grok
- 14:34 : Keenadu Firmware Backdoor Hits Android
- 14:34 : Adidas Probes Third-Party Data Breach
- 14:34 : Cyberattack Leaks 115K Asahi Records
- 14:34 : Hacker Accessed 1.2M Bank Accounts
- 14:34 : DEF CON Bans Named Epstein Files
- 14:9 : AI Under Control: Link11 Launches AI Management Dashboard for Clean Traffic
- 14:9 : Adidas investigates alleged data breach affecting 815,000 records
- 14:5 : IT Security News Hourly Summary 2026-02-19 15h : 8 posts
- 13:32 : Hackers Leveraging Emoji Code to Hide Malicious Code and Evade Security Detections
- 13:32 : XWorm Malware Delivered via Fake Financial Receipts Targeting Windows Systems to Steal Logins and Sessions
- 13:32 : DEF CON bans three Epstein-linked men from future events
- 13:32 : Nearly 1 Million User Records Compromised in Figure Data Breach
- 13:31 : How Modern Security Platforms Organize Rules
- 13:31 : The Growing Threat of DNS Powered Email and Web Attacks
- 13:22 : China’s Parallel CVE Systems Expose Alternate Vulnerability Disclosure Timeline
- 13:22 : Industrial Control System Vulnerabilities Hit Record Highs
- 12:32 : CISA alerts to critical auth bypass CVE-2026-1670 in Honeywell CCTVs
- 12:32 : Malicious AI
- 12:32 : Venice Security Emerges From Stealth With $33M Funding for Privileged Access Management
- 12:32 : How AI Agents Are Transforming Identity Verification and Authentication Systems
- 12:32 : PromptSpy: First Android malware to use generative AI in its execution flow
- 12:32 : Bug in widely used VoIP phones allows stealthy network footholds, call interception (CVE-2026-2329)
- 12:32 : From Exposure to Exploitation: How AI Collapses Your Response Window
- 12:32 : Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA
- 12:18 : Intimate products producer Tenga spilled customer data
- 12:18 : Ivanti Exploitation Surges as Zero-Day Attacks Traced Back to July 2025
- 12:18 : SPF Alignment: Why is it Important for Improving DMARC
- 11:36 : Citizen Lab Finds Evidence of Mobile Data Extraction from Detained Kenyan Activist
- 11:36 : UK to demand social platforms take down abusive intimate images within 48 hours
- 11:36 : Meta patents AI that could keep you posting from beyond the grave
- 11:36 : Healthcare security: Write login details on whiteboard, hope for the best
- 11:36 : Men sentenced to 8 years in $1.3 million computer intrusion and tax fraud scheme
- 11:9 : Researchers Uncover DoS Vulnerabilities in Socomec DIRIS M-70 IIoT Power Meter via Thread Emulation & Fuzzing
- 11:9 : Arkanix Stealer: a C++ & Python infostealer
- 11:9 : AI Dev Tool Cline’s npm Token Hijacked by Hackers for 8 Hours
- 11:9 : Critical Authentication Bypass in better-auth API Keys Plugin Allows Unauthenticated Account Takeover
- 11:9 : OpenClaw Security Issues Continue as SecureClaw Open Source Tool Debuts
- 11:9 : UK sounds alarm on rising cyber risks to businesses
- 11:9 : Flaws in Popular Software Development App Extensions Allow Data Exfiltration
- 11:5 : IT Security News Hourly Summary 2026-02-19 12h : 7 posts
- 10:34 : How to Organize Safely in the Age of Surveillance
- 10:34 : Irish regulator probes X after Grok allegedly generated sexual images of children
- 10:34 : Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users
- 10:34 : Copilot summarizes confidential emails, ShinyHunters targets CarGurus, Texas sues TP-Link
- 10:11 : Infostealer Found Stealing OpenClaw AI Identity and Memory Files
- 10:11 : Must-Have Investments for Security-Aware & Productive Teams
- 10:11 : Researchers Reveal Six New OpenClaw Vulnerabilities
- 9:35 : Microsoft Defender Introduces Centralized Script Library Powered by Copilot for Live Response
- 9:35 : Microsoft Defender Unveils Centralized Script Library with Copilot Analysis for Enhanced Live Response
- 9:34 : Advanced Crypto Mining Malware Spreads Through External Drives and Air-Gapped Systems
- 9:34 : German Rail Giant Deutsche Bahn Hit by Large-Scale DDoS Attack
- 9:20 : Threat Actors Using Fake Google Forms Site to Harvest Google Logins
- 9:20 : CISA Alerts Organizations to Honeywell CCTV Flaw Enabling Account Takeovers
- 9:20 : Open-source benchmark EVMbench tests how well AI agents handle smart contract exploits
- 9:20 : Microsoft signals breakthrough in data storage that can last for generations
- 9:20 : CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware
- 8:32 : Intellexa’s Predator spyware infected Angolan journalist’s device, Amnesty reports
- 8:32 : Why the US–EU Privacy Divide Still Matters in the Age of AI
- 8:32 : Virtana expands MCP Server to bring full-stack enterprise context to AI agents
- 8:31 : Protectt.ai enhances AppProtectt with advanced RASP and AI-driven mobile threat protection
- 8:31 : Redpanda brings identity, policy control, and data governance to AI agents
- 8:14 : Anthropic Researcher Departs To Study Poetry
- 8:14 : AI Camera Nabs Driver Petting Dog
- 8:13 : Hackers Abuse nslookup.exe in ClickFix Campaign to Deliver Malware via DNS
- 8:13 : Hackers Hide Malware in Emoji-Based Code to Bypass Security Defenses
- 8:13 : MCP Servers can be Exploited to Execute Arbitrary Code and Exfiltrate Sensitive Data
- 8:13 : Microsoft Teams to Prompt Mobile Users for Browser Choice with Non-Office and PDF Links
- 8:13 : Compliance Scorecard v10 delivers context-driven AI for explainable compliance decisions
- 8:5 : IT Security News Hourly Summary 2026-02-19 09h : 3 posts
- 7:18 : Stealthy Crypto-Mining Malware Jumps Air-Gaps, Spreads via External Drives
- 7:18 : Poland bans camera-packing cars made in China from military bases
- 7:17 : Empowering a Global SaaS Workforce: From Identity Security to Financial Access
- 6:31 : OpenAI Launches EVMbench: A New Framework to Detect and Exploit Blockchain Vulnerabilities
- 6:31 : Public mobile networks are being weaponized for combat drone operations
- 6:15 : New Threat Emerges as Attackers Leverage Grok and Copilot to Evade Security Monitoring
- 6:15 : Researchers Expose DigitStealer C2 Infrastructure Targeting macOS Users
- 6:15 : Poland bans camera-packing cars made in China cars from military bases
- 5:38 : Attackers keep finding the same gaps in security programs
- 5:38 : Consumers feel less judged by AI debt collectors
- 5:26 : Microsoft 365 Copilot Vulnerability Exposes Sensitive Emails Through AI Summaries
- 5:26 : Critical MCP Server Enables Arbitrary Code Execution and Sensitive Data Exfiltration
- 5:26 : Who Can You Trust?
- 5:26 : Guardian AI-Penetration Testing Tool Connects Gemini, GPT-4 with 19 Security Tools Including Nmap
- 5:26 : OpenAI Launches EVMbench to Detect, Patch, and Exploit Vulnerabilities in Blockchain Environments
- 3:20 : Hackers Can Leverage Grok and Copilot for Stealthy Malware Communication and Control
- 2:36 : A Busy Week for Cybersecurity Speaking Engagements
- 2:15 : ISC Stormcast For Thursday, February 19th, 2026 https://isc.sans.edu/podcastdetail/9816, (Thu, Feb 19th)
- 0:34 : Microsoft: Critical Windows Admin Center Flaw Allows Privilege Escalation
- 0:13 : Adidas investigates third-party data breach after criminals claim they pwned the sportswear giant
- 23:18 : From Firewall Management to Adaptive Security: What IDC’s 2026 Report Means for Security Leaders
- 23:18 : Why I Finally Made Peace With the Term Zero Trust
- 23:5 : IT Security News Hourly Summary 2026-02-19 00h : 8 posts
- 22:55 : IT Security News Daily Summary 2026-02-18