Security Bulletin released on February 19, 2026, addresses a remote flaw in HPE Telco Service Activator that could let attackers bypass access restrictions. According to HPE, the issue stems from the Undertow HTTP server core used by the product. The…
Category: Cyber Security News
jsPDF Vulnerability Exposes Millions of Developers to Object Injection Attacks
A newly disclosed security flaw in the popular jsPDF library has exposed millions of web developers to PDF Object Injection attacks, allowing remote attackers to embed arbitrary objects and actions into generated PDF documents. Tracked as CVE-2026-25755, the vulnerability affects the addJS method used to embed…
PoC Exploit Released for Grandstream GXP1600 VoIP Phones RCE Vulnerability
A critical zero-day vulnerability, tracked as CVE-2026-2329, is affecting Grandstream’s GXP1600 series VoIP desk phones. The issue is an unauthenticated stack-based buffer overflow that can be exploited remotely to achieve root-level remote code execution (RCE) on a vulnerable device. Because the…
OWASP Smart Contract Top 10 2026 — Security Risks and Vulnerabilities
The Open Web Application Security Project (OWASP) has published the Smart Contract Top 10: 2026, a forward-looking standard awareness document designed to arm Web3 developers, security auditors, and protocol owners with actionable intelligence on the most critical vulnerabilities affecting smart…
CISA Warns of Multiple Roundcube Vulnerabilities Exploited in Attacks
CISA has officially updated its Known Exploited Vulnerabilities (KEV) Catalog to include new security flaws affecting a popular webmail platform. On February 20, 2026, the agency added two critical vulnerabilities found in Roundcube Webmail based on clear evidence that threat…
DPRK Linked Operators Sustain Aggressive Crypto Targeting 12 Months After Bybit Breach
February 21, 2026, marks one year since North Korea (DPRK)-linked operators stole approximately $1.46 billion in cryptoassets from Dubai-based exchange Bybit — the largest confirmed crypto theft in history. Rather than slowing down after that breach, the group has only…
Google Suspends OpenClaw Users from Antigravity AI After OAuth Token Abuse
Google has suspended access to its Antigravity AI platform for numerous users of the open-source tool OpenClaw, sparking backlash over aggressive enforcement of terms of service (ToS). The move targets developers leveraging OpenClaw’s OAuth plugin to tap into subsidized Gemini…
Threat Actors Allegedly Selling WhatsApp Crash Exploit on Hacking Forums
A recent discovery on underground hacking forums has raised alarms about a new exploit targeting the popular messaging application, WhatsApp. Threat intelligence platforms have identified a threat actor allegedly offering a script designed to crash the application across multiple operating…
Silver Fox APT Uses DLL Sideloading and BYOVD Techniques in Sophisticated Malware Attacks
The cybersecurity community recently witnessed the emergence of targeted malware campaigns linked to the Silver Fox threat group. This operation focuses heavily on Asia, targeting local organizations with carefully localized lures. By disguising attacks as routine business communications, actors successfully…
Google Blocked 1.75 Million Malicious Apps from Entering into the Play Store
AI-powered security systems blocked over 1.75 million malicious or policy-violating apps from reaching the Play Store in 2025, strengthening Android security. According to Google’s latest Android and Google Play security update, the company blocked over 1.75 million apps during the…
Cybersecurity News Weekly: PayPal Breach, Chrome 0-Day, BeyondTrust RCE Exploit, and More
Welcome to this week’s Cybersecurity Weekly Digest, your curated roundup of the most critical threats, attacks, breaches, and vulnerabilities making headlines from February 16 to 22, 2026. This week proved to be one of the most eventful of the year…
Cloudflare Down – 6 Hour of Massive Global Service Outage Cause Customers Unreachable From the Internet
Cloudflare experienced a significant six-hour global service outage on February 20, 2026, causing major disruptions for customers utilizing its Bring Your Own IP (BYOIP) services. The incident, which began at 17:48 UTC and lasted for six hours and seven minutes,…
Multiple Hacking Groups Exploit OpenClaw Instances to Steal API key and Deploy Malware
A widespread exploitation of OpenClaw, formerly known as MoltBot and ClawdBot, by multiple hacking groups to deploy malicious payloads. OpenClaw, an open-source autonomous AI framework developed by Peter Steinberger, now at OpenAI, has become a high-severity target following its viral adoption in late January…
SuperClaw – Open-Source Framework to Red-Team AI Agents for Security Testing
Superagentic AI has released SuperClaw, an open-source, pre-deployment security testing framework built specifically for autonomous AI coding agents. Announced in late 2025, SuperClaw addresses a growing blind spot in enterprise AI adoption: agents are routinely deployed with broad tool access…
Hackers Leveraging Multiple AI Services to Compromise 600+ FortiGate Devices
A financially motivated threat actor exploited various commercial generative AI services to compromise over 600 FortiGate devices across more than 55 countries between January 11 and February 18, 2026. The campaign marks a defining demonstration of how AI is lowering…
New Shai-Hulud–like npm Worm Attack 19+ Packages to Steal dev/CI Secrets
A new supply chain worm is actively targeting the npm ecosystem, with a research team identifying at least 19 malicious npm packages designed to steal developer and CI/CD secrets and automatically spread across repositories and workflows. The campaign, tracked as…
Cybersecurity Companies’ Stocks Fall Sharply as Anthropic Releases Claude Security Tool
Shares of major cybersecurity companies nosedived on Friday after AI startup Anthropic unveiled Claude Code Security, a new AI-powered tool capable of autonomously scanning codebases for software vulnerabilities and suggesting targeted patches sparking fears that artificial intelligence could begin displacing…
Anthropic Launches Claude Code Security to Scan Codebases for Security Vulnerabilities
A new feature inside Claude Code enables developers and security teams to identify and remediate vulnerabilities across their codebases, known as Claude Code Security. Currently available in a limited research preview, the tool offers AI-powered code scanning that goes beyond…
Grandstream VoIP Phones Vulnerability Allows Attackers to Gain Root Privileges
VoIP desk phones are trusted devices, but many are managed like office furniture. A newly disclosed flaw in Grandstream phones shows how a simple network-facing bug can turn a handset into an entry point for eavesdropping and wider access. In…
PayPal Data Breach Exposes SSNs and Business PII of Customers for Over Six Months
PayPal has issued a formal data breach notification disclosing that a coding error in its PayPal Working Capital (PPWC) loan application exposed the personally identifiable information (PII) of an undisclosed number of customers for approximately six months, from July 1,…